Auto-Update: 2024-03-01T17:00:32.559867+00:00

This commit is contained in:
cad-safe-bot 2024-03-01 17:00:36 +00:00
parent b08af09562
commit f78741dbf4
32 changed files with 982 additions and 82 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46950",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-01T14:15:53.030",
"lastModified": "2024-03-01T14:15:53.030",
"vulnStatus": "Received",
"lastModified": "2024-03-01T15:23:36.177",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46951",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-01T14:15:53.087",
"lastModified": "2024-03-01T14:15:53.087",
"vulnStatus": "Received",
"lastModified": "2024-03-01T15:23:36.177",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-50378",
"sourceIdentifier": "security@apache.org",
"published": "2024-03-01T15:15:08.310",
"lastModified": "2024-03-01T15:23:36.177",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Lack of proper input validation and constraint enforcement in Apache Ambari prior to 2.7.8\u00a0\u00a0\n\n\u00a0Impact : As it will be stored XSS,\u00a0Could be exploited to perform unauthorized actions, varying from data access to session hijacking and delivering malicious payloads. \n\nUsers are recommended to upgrade to version 2.7.8 which fixes this issue.\n\n"
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/6hn0thq743vz9gh283s2d87wz8tqh37c",
"source": "security@apache.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52497",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-01T14:15:53.273",
"lastModified": "2024-03-01T14:15:53.273",
"vulnStatus": "Received",
"lastModified": "2024-03-01T15:23:36.177",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-0967",
"sourceIdentifier": "security@opentext.com",
"published": "2024-03-01T15:15:08.410",
"lastModified": "2024-03-01T15:23:36.177",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A potential vulnerability has been identified in OpenText / Micro Focus ArcSight Enterprise Security Manager (ESM). The vulnerability could be remotely exploited."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@opentext.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://portal.microfocus.com/s/article/KM000027060",
"source": "security@opentext.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-1624",
"sourceIdentifier": "3DS.Information-Security@3ds.com",
"published": "2024-03-01T16:15:45.723",
"lastModified": "2024-03-01T16:15:45.723",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An OS Command Injection vulnerability affecting documentation server on 3DEXPERIENCE from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x, SIMULIA Abaqus from Release 2022 through Release 2024, SIMULIA Isight from Release 2022 through Release 2024 and CATIA Composer from Release R2023 through Release R2024. A specially crafted HTTP request can lead to arbitrary command execution."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "3DS.Information-Security@3ds.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.4,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "3DS.Information-Security@3ds.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://www.3ds.com/vulnerability/advisories",
"source": "3DS.Information-Security@3ds.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2064",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-01T14:15:54.350",
"lastModified": "2024-03-01T14:15:54.350",
"vulnStatus": "Received",
"lastModified": "2024-03-01T15:23:36.177",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-2065",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-01T15:15:08.627",
"lastModified": "2024-03-01T15:23:36.177",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Barangay Population Monitoring System up to 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /endpoint/update-resident.php. The manipulation of the argument full_name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-255380."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Barangay%20Population%20Monitoring%20System/Stored%20XSS%20update-resident.php%20.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.255380",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.255380",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-2066",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-01T15:15:08.853",
"lastModified": "2024-03-01T15:23:36.177",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Computer Inventory System 1.0. It has been classified as problematic. This affects an unknown part of the file /endpoint/add-computer.php. The manipulation of the argument model leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-255381 was assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 2.4,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 3.3
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.4,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Computer%20Inventory%20System%20Using%20PHP/STORED%20XSS%20add-computer.php%20.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.255381",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.255381",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-2067",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-01T15:15:09.073",
"lastModified": "2024-03-01T15:23:36.177",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Computer Inventory System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /endpoint/delete-computer.php. The manipulation of the argument computer leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-255382 is the identifier assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Computer%20Inventory%20System%20Using%20PHP/SQL%20Injection%20delete-computer.php%20.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.255382",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.255382",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-2068",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-01T16:15:46.643",
"lastModified": "2024-03-01T16:15:46.643",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Computer Inventory System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /endpoint/update-computer.php. The manipulation of the argument model leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-255383."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Computer%20Inventory%20System%20Using%20PHP/STORED%20XSS%20upadte-computer.php%20.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.255383",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.255383",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-2069",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-01T16:15:46.857",
"lastModified": "2024-03-01T16:15:46.857",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in SourceCodester FAQ Management System 1.0. Affected is an unknown function of the file /endpoint/delete-faq.php. The manipulation of the argument faq leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-255384."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/smurf-reigz/security/blob/main/proof-of-concepts/SOURCECODESTER%20%5BFAQ%20Management%20System%20Using%20PHP%20and%20MySQL%5D%20SQLi%20on%20delete-faq.php.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.255384",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.255384",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-2070",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-01T16:15:47.063",
"lastModified": "2024-03-01T16:15:47.063",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in SourceCodester FAQ Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /endpoint/add-faq.php. The manipulation of the argument question/answer leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-255385 was assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/smurf-reigz/security/blob/main/proof-of-concepts/SOURCECODESTER%20%5BFAQ%20Management%20System%20Using%20PHP%20and%20MySQL%5D%20XSS%20on%20add-faq.php.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.255385",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.255385",
"source": "cna@vuldb.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-23120",
"sourceIdentifier": "psirt@autodesk.com",
"published": "2024-02-22T00:15:52.510",
"lastModified": "2024-02-22T19:07:27.197",
"lastModified": "2024-03-01T16:15:45.920",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted STP file when parsed in ASMIMPORT228A.dll through Autodesk AutoCAD can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process.\n"
"value": "A maliciously crafted STP file in ASMIMPORT228A.dll when parsed through\nAutodesk AutoCAD can force an Out-of-Bound Write. A malicious actor can\nleverage this vulnerability to cause a crash, write sensitive data, or execute\narbitrary code in the context of the current process.\n\n\n\n\n"
},
{
"lang": "es",
@ -31,6 +31,10 @@
{
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0002",
"source": "psirt@autodesk.com"
},
{
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0004",
"source": "psirt@autodesk.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24903",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-03-01T14:15:53.320",
"lastModified": "2024-03-01T14:15:53.320",
"vulnStatus": "Received",
"lastModified": "2024-03-01T15:23:36.177",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24904",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-03-01T14:15:53.517",
"lastModified": "2024-03-01T14:15:53.517",
"vulnStatus": "Received",
"lastModified": "2024-03-01T15:23:36.177",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24905",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-03-01T14:15:53.683",
"lastModified": "2024-03-01T14:15:53.683",
"vulnStatus": "Received",
"lastModified": "2024-03-01T15:23:36.177",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24907",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-03-01T14:15:53.843",
"lastModified": "2024-03-01T14:15:53.843",
"vulnStatus": "Received",
"lastModified": "2024-03-01T15:23:36.177",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-27138",
"sourceIdentifier": "security@apache.org",
"published": "2024-03-01T16:15:45.983",
"lastModified": "2024-03-01T16:15:45.983",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "** UNSUPPORTED WHEN ASSIGNED ** Incorrect Authorization vulnerability in Apache Archiva.\n\nApache Archiva has a setting to disable user registration, however this restriction can be bypassed. As Apache Archiva has been retired, we do not expect to release a version of Apache Archiva that fixes this issue. You are recommended to look into migrating to a different solution, or isolate your instance from any untrusted users.\n\nNOTE: This vulnerability only affects products that are no longer supported by the maintainer\n\n"
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/070qcpclcb3sqk1hn8j5lvzohp30k1m2",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-27139",
"sourceIdentifier": "security@apache.org",
"published": "2024-03-01T16:15:46.067",
"lastModified": "2024-03-01T16:15:46.067",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "** UNSUPPORTED WHEN ASSIGNED **\n\nIncorrect Authorization vulnerability in Apache Archiva: a vulnerability in Apache Archiva allows an unauthenticated attacker to modify account data, potentially leading to account takeover.\n\nThis issue affects Apache Archiva: from 2.0.0.\n\nAs this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users.\n\nNOTE: This vulnerability only affects products that are no longer supported by the maintainer.\n\n"
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/qr8b7r86p1hkn0dc0q827s981kf1bgd8",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-27140",
"sourceIdentifier": "security@apache.org",
"published": "2024-03-01T16:15:46.143",
"lastModified": "2024-03-01T16:15:46.143",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "** UNSUPPORTED WHEN ASSIGNED **\n\nImproper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Archiva.\n\nThis issue affects Apache Archiva: from 2.0.0.\n\nAs this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users. Alternatively, you could configure a HTTP proxy in front of your Archiva instance to only forward requests that do not have malicious characters in the URL.\n\nNOTE: This vulnerability only affects products that are no longer supported by the maintainer.\n\n"
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/xrn6nt904ozh3jym60c3f5hj2fb75pjy",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-27295",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-01T16:15:46.227",
"lastModified": "2024-03-01T16:15:46.227",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Directus is a real-time API and App dashboard for managing SQL database content. The password reset mechanism of the Directus backend allows attackers to receive a password reset email of a victim user, specifically having it arrive at a similar email address as the victim with a one or more characters changed to use accents. This is due to the fact that by default MySQL/MariaDB are configured for accent-insensitive and case-insensitive comparisons. This vulnerability is fixed in version 10.8.3.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-706"
}
]
}
],
"references": [
{
"url": "https://github.com/directus/directus/security/advisories/GHSA-qw9g-7549-7wg5",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-27296",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-01T16:15:46.413",
"lastModified": "2024-03-01T16:15:46.413",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Directus is a real-time API and App dashboard for managing SQL database content. Prior to version 10.8.3, the exact Directus version number was being shipped in compiled JS bundles which are accessible without authentication. With this information a malicious attacker can trivially look for known vulnerabilities in Directus core or any of its shipped dependencies in that specific running version. The problem has been resolved in versions 10.8.3 and newer."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://github.com/directus/directus/commit/a5a1c26ac48795ed3212a4c51b9523588aff4fa0",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/directus/directus/security/advisories/GHSA-5mhg-wv8w-p59j",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-27497",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-01T15:15:08.580",
"lastModified": "2024-03-01T15:23:36.177",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Linksys E2000 Ver.1.0.06 build 1 is vulnerable to authentication bypass via the position.js file."
}
],
"metrics": {},
"references": [
{
"url": "https://warp-desk-89d.notion.site/Linksys-E-2000-efcd532d8dcf4710a4af13fca131a5b8",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-27499",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-01T16:15:46.597",
"lastModified": "2024-03-01T16:15:46.597",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Bagisto v1.5.1 is vulnerable for Cross site scripting(XSS) via png file upload vulnerability in product review option."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Ek-Saini/security/blob/main/xss-bagisto-v1.5.1",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/bagisto/bagisto/pull/9474",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27567",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-01T14:15:54.143",
"lastModified": "2024-03-01T14:15:54.143",
"vulnStatus": "Received",
"lastModified": "2024-03-01T15:23:36.177",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27568",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-01T14:15:54.180",
"lastModified": "2024-03-01T14:15:54.180",
"vulnStatus": "Received",
"lastModified": "2024-03-01T15:23:36.177",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27569",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-01T14:15:54.213",
"lastModified": "2024-03-01T14:15:54.213",
"vulnStatus": "Received",
"lastModified": "2024-03-01T15:23:36.177",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27570",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-01T14:15:54.247",
"lastModified": "2024-03-01T14:15:54.247",
"vulnStatus": "Received",
"lastModified": "2024-03-01T15:23:36.177",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27571",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-01T14:15:54.280",
"lastModified": "2024-03-01T14:15:54.280",
"vulnStatus": "Received",
"lastModified": "2024-03-01T15:23:36.177",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27572",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-01T14:15:54.313",
"lastModified": "2024-03-01T14:15:54.313",
"vulnStatus": "Received",
"lastModified": "2024-03-01T15:23:36.177",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-03-01T15:01:14.659475+00:00
2024-03-01T17:00:32.559867+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-03-01T14:15:54.350000+00:00
2024-03-01T16:15:47.063000+00:00
```
### Last Data Feed Release
@ -29,66 +29,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
240211
240227
```
### CVEs added in the last Commit
Recently added CVEs: `22`
Recently added CVEs: `16`
* [CVE-2023-39254](CVE-2023/CVE-2023-392xx/CVE-2023-39254.json) (`2024-03-01T13:15:07.673`)
* [CVE-2023-48674](CVE-2023/CVE-2023-486xx/CVE-2023-48674.json) (`2024-03-01T13:15:07.877`)
* [CVE-2023-46950](CVE-2023/CVE-2023-469xx/CVE-2023-46950.json) (`2024-03-01T14:15:53.030`)
* [CVE-2023-46951](CVE-2023/CVE-2023-469xx/CVE-2023-46951.json) (`2024-03-01T14:15:53.087`)
* [CVE-2023-52497](CVE-2023/CVE-2023-524xx/CVE-2023-52497.json) (`2024-03-01T14:15:53.273`)
* [CVE-2024-24900](CVE-2024/CVE-2024-249xx/CVE-2024-24900.json) (`2024-03-01T13:15:08.090`)
* [CVE-2024-24906](CVE-2024/CVE-2024-249xx/CVE-2024-24906.json) (`2024-03-01T13:15:08.277`)
* [CVE-2024-2060](CVE-2024/CVE-2024-20xx/CVE-2024-2060.json) (`2024-03-01T13:15:08.460`)
* [CVE-2024-2061](CVE-2024/CVE-2024-20xx/CVE-2024-2061.json) (`2024-03-01T13:15:08.670`)
* [CVE-2024-2062](CVE-2024/CVE-2024-20xx/CVE-2024-2062.json) (`2024-03-01T13:15:08.913`)
* [CVE-2024-2063](CVE-2024/CVE-2024-20xx/CVE-2024-2063.json) (`2024-03-01T13:15:09.130`)
* [CVE-2024-24903](CVE-2024/CVE-2024-249xx/CVE-2024-24903.json) (`2024-03-01T14:15:53.320`)
* [CVE-2024-24904](CVE-2024/CVE-2024-249xx/CVE-2024-24904.json) (`2024-03-01T14:15:53.517`)
* [CVE-2024-24905](CVE-2024/CVE-2024-249xx/CVE-2024-24905.json) (`2024-03-01T14:15:53.683`)
* [CVE-2024-24907](CVE-2024/CVE-2024-249xx/CVE-2024-24907.json) (`2024-03-01T14:15:53.843`)
* [CVE-2024-27567](CVE-2024/CVE-2024-275xx/CVE-2024-27567.json) (`2024-03-01T14:15:54.143`)
* [CVE-2024-27568](CVE-2024/CVE-2024-275xx/CVE-2024-27568.json) (`2024-03-01T14:15:54.180`)
* [CVE-2024-27569](CVE-2024/CVE-2024-275xx/CVE-2024-27569.json) (`2024-03-01T14:15:54.213`)
* [CVE-2024-27570](CVE-2024/CVE-2024-275xx/CVE-2024-27570.json) (`2024-03-01T14:15:54.247`)
* [CVE-2024-27571](CVE-2024/CVE-2024-275xx/CVE-2024-27571.json) (`2024-03-01T14:15:54.280`)
* [CVE-2024-27572](CVE-2024/CVE-2024-275xx/CVE-2024-27572.json) (`2024-03-01T14:15:54.313`)
* [CVE-2024-2064](CVE-2024/CVE-2024-20xx/CVE-2024-2064.json) (`2024-03-01T14:15:54.350`)
* [CVE-2023-50378](CVE-2023/CVE-2023-503xx/CVE-2023-50378.json) (`2024-03-01T15:15:08.310`)
* [CVE-2024-0967](CVE-2024/CVE-2024-09xx/CVE-2024-0967.json) (`2024-03-01T15:15:08.410`)
* [CVE-2024-27497](CVE-2024/CVE-2024-274xx/CVE-2024-27497.json) (`2024-03-01T15:15:08.580`)
* [CVE-2024-2065](CVE-2024/CVE-2024-20xx/CVE-2024-2065.json) (`2024-03-01T15:15:08.627`)
* [CVE-2024-2066](CVE-2024/CVE-2024-20xx/CVE-2024-2066.json) (`2024-03-01T15:15:08.853`)
* [CVE-2024-2067](CVE-2024/CVE-2024-20xx/CVE-2024-2067.json) (`2024-03-01T15:15:09.073`)
* [CVE-2024-1624](CVE-2024/CVE-2024-16xx/CVE-2024-1624.json) (`2024-03-01T16:15:45.723`)
* [CVE-2024-27138](CVE-2024/CVE-2024-271xx/CVE-2024-27138.json) (`2024-03-01T16:15:45.983`)
* [CVE-2024-27139](CVE-2024/CVE-2024-271xx/CVE-2024-27139.json) (`2024-03-01T16:15:46.067`)
* [CVE-2024-27140](CVE-2024/CVE-2024-271xx/CVE-2024-27140.json) (`2024-03-01T16:15:46.143`)
* [CVE-2024-27295](CVE-2024/CVE-2024-272xx/CVE-2024-27295.json) (`2024-03-01T16:15:46.227`)
* [CVE-2024-27296](CVE-2024/CVE-2024-272xx/CVE-2024-27296.json) (`2024-03-01T16:15:46.413`)
* [CVE-2024-27499](CVE-2024/CVE-2024-274xx/CVE-2024-27499.json) (`2024-03-01T16:15:46.597`)
* [CVE-2024-2068](CVE-2024/CVE-2024-20xx/CVE-2024-2068.json) (`2024-03-01T16:15:46.643`)
* [CVE-2024-2069](CVE-2024/CVE-2024-20xx/CVE-2024-2069.json) (`2024-03-01T16:15:46.857`)
* [CVE-2024-2070](CVE-2024/CVE-2024-20xx/CVE-2024-2070.json) (`2024-03-01T16:15:47.063`)
### CVEs modified in the last Commit
Recently modified CVEs: `71`
Recently modified CVEs: `15`
* [CVE-2024-27656](CVE-2024/CVE-2024-276xx/CVE-2024-27656.json) (`2024-03-01T14:04:26.010`)
* [CVE-2024-27657](CVE-2024/CVE-2024-276xx/CVE-2024-27657.json) (`2024-03-01T14:04:26.010`)
* [CVE-2024-27658](CVE-2024/CVE-2024-276xx/CVE-2024-27658.json) (`2024-03-01T14:04:26.010`)
* [CVE-2024-27659](CVE-2024/CVE-2024-276xx/CVE-2024-27659.json) (`2024-03-01T14:04:26.010`)
* [CVE-2024-27660](CVE-2024/CVE-2024-276xx/CVE-2024-27660.json) (`2024-03-01T14:04:26.010`)
* [CVE-2024-27661](CVE-2024/CVE-2024-276xx/CVE-2024-27661.json) (`2024-03-01T14:04:26.010`)
* [CVE-2024-27662](CVE-2024/CVE-2024-276xx/CVE-2024-27662.json) (`2024-03-01T14:04:26.010`)
* [CVE-2024-2009](CVE-2024/CVE-2024-20xx/CVE-2024-2009.json) (`2024-03-01T14:04:26.010`)
* [CVE-2024-27294](CVE-2024/CVE-2024-272xx/CVE-2024-27294.json) (`2024-03-01T14:04:26.010`)
* [CVE-2024-0403](CVE-2024/CVE-2024-04xx/CVE-2024-0403.json) (`2024-03-01T14:04:26.010`)
* [CVE-2024-2021](CVE-2024/CVE-2024-20xx/CVE-2024-2021.json) (`2024-03-01T14:04:26.010`)
* [CVE-2024-2022](CVE-2024/CVE-2024-20xx/CVE-2024-2022.json) (`2024-03-01T14:04:26.010`)
* [CVE-2024-2045](CVE-2024/CVE-2024-20xx/CVE-2024-2045.json) (`2024-03-01T14:04:26.010`)
* [CVE-2024-1941](CVE-2024/CVE-2024-19xx/CVE-2024-1941.json) (`2024-03-01T14:04:26.010`)
* [CVE-2024-22100](CVE-2024/CVE-2024-221xx/CVE-2024-22100.json) (`2024-03-01T14:04:26.010`)
* [CVE-2024-25578](CVE-2024/CVE-2024-255xx/CVE-2024-25578.json) (`2024-03-01T14:04:26.010`)
* [CVE-2024-22891](CVE-2024/CVE-2024-228xx/CVE-2024-22891.json) (`2024-03-01T14:04:26.010`)
* [CVE-2024-25293](CVE-2024/CVE-2024-252xx/CVE-2024-25293.json) (`2024-03-01T14:04:26.010`)
* [CVE-2024-25386](CVE-2024/CVE-2024-253xx/CVE-2024-25386.json) (`2024-03-01T14:04:26.010`)
* [CVE-2024-1859](CVE-2024/CVE-2024-18xx/CVE-2024-1859.json) (`2024-03-01T14:04:26.010`)
* [CVE-2024-25552](CVE-2024/CVE-2024-255xx/CVE-2024-25552.json) (`2024-03-01T14:04:26.010`)
* [CVE-2024-27949](CVE-2024/CVE-2024-279xx/CVE-2024-27949.json) (`2024-03-01T14:04:26.010`)
* [CVE-2024-26590](CVE-2024/CVE-2024-265xx/CVE-2024-26590.json) (`2024-03-01T14:15:54.007`)
* [CVE-2024-26601](CVE-2024/CVE-2024-266xx/CVE-2024-26601.json) (`2024-03-01T14:15:54.050`)
* [CVE-2024-26603](CVE-2024/CVE-2024-266xx/CVE-2024-26603.json) (`2024-03-01T14:15:54.097`)
* [CVE-2023-46950](CVE-2023/CVE-2023-469xx/CVE-2023-46950.json) (`2024-03-01T15:23:36.177`)
* [CVE-2023-46951](CVE-2023/CVE-2023-469xx/CVE-2023-46951.json) (`2024-03-01T15:23:36.177`)
* [CVE-2023-52497](CVE-2023/CVE-2023-524xx/CVE-2023-52497.json) (`2024-03-01T15:23:36.177`)
* [CVE-2024-24903](CVE-2024/CVE-2024-249xx/CVE-2024-24903.json) (`2024-03-01T15:23:36.177`)
* [CVE-2024-24904](CVE-2024/CVE-2024-249xx/CVE-2024-24904.json) (`2024-03-01T15:23:36.177`)
* [CVE-2024-24905](CVE-2024/CVE-2024-249xx/CVE-2024-24905.json) (`2024-03-01T15:23:36.177`)
* [CVE-2024-24907](CVE-2024/CVE-2024-249xx/CVE-2024-24907.json) (`2024-03-01T15:23:36.177`)
* [CVE-2024-27567](CVE-2024/CVE-2024-275xx/CVE-2024-27567.json) (`2024-03-01T15:23:36.177`)
* [CVE-2024-27568](CVE-2024/CVE-2024-275xx/CVE-2024-27568.json) (`2024-03-01T15:23:36.177`)
* [CVE-2024-27569](CVE-2024/CVE-2024-275xx/CVE-2024-27569.json) (`2024-03-01T15:23:36.177`)
* [CVE-2024-27570](CVE-2024/CVE-2024-275xx/CVE-2024-27570.json) (`2024-03-01T15:23:36.177`)
* [CVE-2024-27571](CVE-2024/CVE-2024-275xx/CVE-2024-27571.json) (`2024-03-01T15:23:36.177`)
* [CVE-2024-27572](CVE-2024/CVE-2024-275xx/CVE-2024-27572.json) (`2024-03-01T15:23:36.177`)
* [CVE-2024-2064](CVE-2024/CVE-2024-20xx/CVE-2024-2064.json) (`2024-03-01T15:23:36.177`)
* [CVE-2024-23120](CVE-2024/CVE-2024-231xx/CVE-2024-23120.json) (`2024-03-01T16:15:45.920`)
## Download and Usage