mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-03-01T17:00:32.559867+00:00
This commit is contained in:
parent
b08af09562
commit
f78741dbf4
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-46950",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-01T14:15:53.030",
|
||||
"lastModified": "2024-03-01T14:15:53.030",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-01T15:23:36.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-46951",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-01T14:15:53.087",
|
||||
"lastModified": "2024-03-01T14:15:53.087",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-01T15:23:36.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
32
CVE-2023/CVE-2023-503xx/CVE-2023-50378.json
Normal file
32
CVE-2023/CVE-2023-503xx/CVE-2023-50378.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2023-50378",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-03-01T15:15:08.310",
|
||||
"lastModified": "2024-03-01T15:23:36.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Lack of proper input validation and constraint enforcement in Apache Ambari prior to 2.7.8\u00a0\u00a0\n\n\u00a0Impact : As it will be stored XSS,\u00a0Could be exploited to perform unauthorized actions, varying from data access to session hijacking and delivering malicious payloads. \n\nUsers are recommended to upgrade to version 2.7.8 which fixes this issue.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/6hn0thq743vz9gh283s2d87wz8tqh37c",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-52497",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-01T14:15:53.273",
|
||||
"lastModified": "2024-03-01T14:15:53.273",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-01T15:23:36.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
43
CVE-2024/CVE-2024-09xx/CVE-2024-0967.json
Normal file
43
CVE-2024/CVE-2024-09xx/CVE-2024-0967.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2024-0967",
|
||||
"sourceIdentifier": "security@opentext.com",
|
||||
"published": "2024-03-01T15:15:08.410",
|
||||
"lastModified": "2024-03-01T15:23:36.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A potential vulnerability has been identified in OpenText / Micro Focus ArcSight Enterprise Security Manager (ESM). The vulnerability could be remotely exploited."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@opentext.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.microfocus.com/s/article/KM000027060",
|
||||
"source": "security@opentext.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-16xx/CVE-2024-1624.json
Normal file
55
CVE-2024/CVE-2024-16xx/CVE-2024-1624.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-1624",
|
||||
"sourceIdentifier": "3DS.Information-Security@3ds.com",
|
||||
"published": "2024-03-01T16:15:45.723",
|
||||
"lastModified": "2024-03-01T16:15:45.723",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An OS Command Injection vulnerability affecting documentation server on 3DEXPERIENCE from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x, SIMULIA Abaqus from Release 2022 through Release 2024, SIMULIA Isight from Release 2022 through Release 2024 and CATIA Composer from Release R2023 through Release R2024. A specially crafted HTTP request can lead to arbitrary command execution."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "3DS.Information-Security@3ds.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.4,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "3DS.Information-Security@3ds.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.3ds.com/vulnerability/advisories",
|
||||
"source": "3DS.Information-Security@3ds.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2064",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-01T14:15:54.350",
|
||||
"lastModified": "2024-03-01T14:15:54.350",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-01T15:23:36.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
88
CVE-2024/CVE-2024-20xx/CVE-2024-2065.json
Normal file
88
CVE-2024/CVE-2024-20xx/CVE-2024-2065.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2024-2065",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-01T15:15:08.627",
|
||||
"lastModified": "2024-03-01T15:23:36.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in SourceCodester Barangay Population Monitoring System up to 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /endpoint/update-resident.php. The manipulation of the argument full_name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-255380."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Barangay%20Population%20Monitoring%20System/Stored%20XSS%20update-resident.php%20.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.255380",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.255380",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2024/CVE-2024-20xx/CVE-2024-2066.json
Normal file
88
CVE-2024/CVE-2024-20xx/CVE-2024-2066.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2024-2066",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-01T15:15:08.853",
|
||||
"lastModified": "2024-03-01T15:23:36.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in SourceCodester Computer Inventory System 1.0. It has been classified as problematic. This affects an unknown part of the file /endpoint/add-computer.php. The manipulation of the argument model leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-255381 was assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 2.4,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "MULTIPLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.3
|
||||
},
|
||||
"baseSeverity": "LOW",
|
||||
"exploitabilityScore": 6.4,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Computer%20Inventory%20System%20Using%20PHP/STORED%20XSS%20add-computer.php%20.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.255381",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.255381",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2024/CVE-2024-20xx/CVE-2024-2067.json
Normal file
88
CVE-2024/CVE-2024-20xx/CVE-2024-2067.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2024-2067",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-01T15:15:09.073",
|
||||
"lastModified": "2024-03-01T15:23:36.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in SourceCodester Computer Inventory System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /endpoint/delete-computer.php. The manipulation of the argument computer leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-255382 is the identifier assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Computer%20Inventory%20System%20Using%20PHP/SQL%20Injection%20delete-computer.php%20.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.255382",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.255382",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2024/CVE-2024-20xx/CVE-2024-2068.json
Normal file
88
CVE-2024/CVE-2024-20xx/CVE-2024-2068.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2024-2068",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-01T16:15:46.643",
|
||||
"lastModified": "2024-03-01T16:15:46.643",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in SourceCodester Computer Inventory System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /endpoint/update-computer.php. The manipulation of the argument model leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-255383."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Computer%20Inventory%20System%20Using%20PHP/STORED%20XSS%20upadte-computer.php%20.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.255383",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.255383",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2024/CVE-2024-20xx/CVE-2024-2069.json
Normal file
88
CVE-2024/CVE-2024-20xx/CVE-2024-2069.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2024-2069",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-01T16:15:46.857",
|
||||
"lastModified": "2024-03-01T16:15:46.857",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in SourceCodester FAQ Management System 1.0. Affected is an unknown function of the file /endpoint/delete-faq.php. The manipulation of the argument faq leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-255384."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/smurf-reigz/security/blob/main/proof-of-concepts/SOURCECODESTER%20%5BFAQ%20Management%20System%20Using%20PHP%20and%20MySQL%5D%20SQLi%20on%20delete-faq.php.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.255384",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.255384",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2024/CVE-2024-20xx/CVE-2024-2070.json
Normal file
88
CVE-2024/CVE-2024-20xx/CVE-2024-2070.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2024-2070",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-01T16:15:47.063",
|
||||
"lastModified": "2024-03-01T16:15:47.063",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic was found in SourceCodester FAQ Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /endpoint/add-faq.php. The manipulation of the argument question/answer leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-255385 was assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/smurf-reigz/security/blob/main/proof-of-concepts/SOURCECODESTER%20%5BFAQ%20Management%20System%20Using%20PHP%20and%20MySQL%5D%20XSS%20on%20add-faq.php.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.255385",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.255385",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-23120",
|
||||
"sourceIdentifier": "psirt@autodesk.com",
|
||||
"published": "2024-02-22T00:15:52.510",
|
||||
"lastModified": "2024-02-22T19:07:27.197",
|
||||
"lastModified": "2024-03-01T16:15:45.920",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A maliciously crafted STP file when parsed in ASMIMPORT228A.dll through Autodesk AutoCAD can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process.\n"
|
||||
"value": "A maliciously crafted STP file in ASMIMPORT228A.dll when parsed through\nAutodesk AutoCAD can force an Out-of-Bound Write. A malicious actor can\nleverage this vulnerability to cause a crash, write sensitive data, or execute\narbitrary code in the context of the current process.\n\n\n\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -31,6 +31,10 @@
|
||||
{
|
||||
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0002",
|
||||
"source": "psirt@autodesk.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0004",
|
||||
"source": "psirt@autodesk.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-24903",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-03-01T14:15:53.320",
|
||||
"lastModified": "2024-03-01T14:15:53.320",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-01T15:23:36.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-24904",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-03-01T14:15:53.517",
|
||||
"lastModified": "2024-03-01T14:15:53.517",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-01T15:23:36.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-24905",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-03-01T14:15:53.683",
|
||||
"lastModified": "2024-03-01T14:15:53.683",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-01T15:23:36.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-24907",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-03-01T14:15:53.843",
|
||||
"lastModified": "2024-03-01T14:15:53.843",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-01T15:23:36.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
32
CVE-2024/CVE-2024-271xx/CVE-2024-27138.json
Normal file
32
CVE-2024/CVE-2024-271xx/CVE-2024-27138.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2024-27138",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-03-01T16:15:45.983",
|
||||
"lastModified": "2024-03-01T16:15:45.983",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "** UNSUPPORTED WHEN ASSIGNED ** Incorrect Authorization vulnerability in Apache Archiva.\n\nApache Archiva has a setting to disable user registration, however this restriction can be bypassed. As Apache Archiva has been retired, we do not expect to release a version of Apache Archiva that fixes this issue. You are recommended to look into migrating to a different solution, or isolate your instance from any untrusted users.\n\nNOTE: This vulnerability only affects products that are no longer supported by the maintainer\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/070qcpclcb3sqk1hn8j5lvzohp30k1m2",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2024/CVE-2024-271xx/CVE-2024-27139.json
Normal file
32
CVE-2024/CVE-2024-271xx/CVE-2024-27139.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2024-27139",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-03-01T16:15:46.067",
|
||||
"lastModified": "2024-03-01T16:15:46.067",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "** UNSUPPORTED WHEN ASSIGNED **\n\nIncorrect Authorization vulnerability in Apache Archiva: a vulnerability in Apache Archiva allows an unauthenticated attacker to modify account data, potentially leading to account takeover.\n\nThis issue affects Apache Archiva: from 2.0.0.\n\nAs this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users.\n\nNOTE: This vulnerability only affects products that are no longer supported by the maintainer.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/qr8b7r86p1hkn0dc0q827s981kf1bgd8",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2024/CVE-2024-271xx/CVE-2024-27140.json
Normal file
32
CVE-2024/CVE-2024-271xx/CVE-2024-27140.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2024-27140",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-03-01T16:15:46.143",
|
||||
"lastModified": "2024-03-01T16:15:46.143",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "** UNSUPPORTED WHEN ASSIGNED **\n\nImproper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Archiva.\n\nThis issue affects Apache Archiva: from 2.0.0.\n\nAs this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users. Alternatively, you could configure a HTTP proxy in front of your Archiva instance to only forward requests that do not have malicious characters in the URL.\n\nNOTE: This vulnerability only affects products that are no longer supported by the maintainer.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/xrn6nt904ozh3jym60c3f5hj2fb75pjy",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-272xx/CVE-2024-27295.json
Normal file
55
CVE-2024/CVE-2024-272xx/CVE-2024-27295.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-27295",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-01T16:15:46.227",
|
||||
"lastModified": "2024-03-01T16:15:46.227",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Directus is a real-time API and App dashboard for managing SQL database content. The password reset mechanism of the Directus backend allows attackers to receive a password reset email of a victim user, specifically having it arrive at a similar email address as the victim with a one or more characters changed to use accents. This is due to the fact that by default MySQL/MariaDB are configured for accent-insensitive and case-insensitive comparisons. This vulnerability is fixed in version 10.8.3.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-706"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/directus/directus/security/advisories/GHSA-qw9g-7549-7wg5",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-272xx/CVE-2024-27296.json
Normal file
59
CVE-2024/CVE-2024-272xx/CVE-2024-27296.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-27296",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-01T16:15:46.413",
|
||||
"lastModified": "2024-03-01T16:15:46.413",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Directus is a real-time API and App dashboard for managing SQL database content. Prior to version 10.8.3, the exact Directus version number was being shipped in compiled JS bundles which are accessible without authentication. With this information a malicious attacker can trivially look for known vulnerabilities in Directus core or any of its shipped dependencies in that specific running version. The problem has been resolved in versions 10.8.3 and newer."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/directus/directus/commit/a5a1c26ac48795ed3212a4c51b9523588aff4fa0",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/directus/directus/security/advisories/GHSA-5mhg-wv8w-p59j",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-274xx/CVE-2024-27497.json
Normal file
20
CVE-2024/CVE-2024-274xx/CVE-2024-27497.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-27497",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-01T15:15:08.580",
|
||||
"lastModified": "2024-03-01T15:23:36.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Linksys E2000 Ver.1.0.06 build 1 is vulnerable to authentication bypass via the position.js file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://warp-desk-89d.notion.site/Linksys-E-2000-efcd532d8dcf4710a4af13fca131a5b8",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-274xx/CVE-2024-27499.json
Normal file
24
CVE-2024/CVE-2024-274xx/CVE-2024-27499.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-27499",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-01T16:15:46.597",
|
||||
"lastModified": "2024-03-01T16:15:46.597",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Bagisto v1.5.1 is vulnerable for Cross site scripting(XSS) via png file upload vulnerability in product review option."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Ek-Saini/security/blob/main/xss-bagisto-v1.5.1",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/bagisto/bagisto/pull/9474",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-27567",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-01T14:15:54.143",
|
||||
"lastModified": "2024-03-01T14:15:54.143",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-01T15:23:36.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-27568",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-01T14:15:54.180",
|
||||
"lastModified": "2024-03-01T14:15:54.180",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-01T15:23:36.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-27569",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-01T14:15:54.213",
|
||||
"lastModified": "2024-03-01T14:15:54.213",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-01T15:23:36.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-27570",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-01T14:15:54.247",
|
||||
"lastModified": "2024-03-01T14:15:54.247",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-01T15:23:36.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-27571",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-01T14:15:54.280",
|
||||
"lastModified": "2024-03-01T14:15:54.280",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-01T15:23:36.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-27572",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-01T14:15:54.313",
|
||||
"lastModified": "2024-03-01T14:15:54.313",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-01T15:23:36.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
88
README.md
88
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-03-01T15:01:14.659475+00:00
|
||||
2024-03-01T17:00:32.559867+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-03-01T14:15:54.350000+00:00
|
||||
2024-03-01T16:15:47.063000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,66 +29,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
240211
|
||||
240227
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `22`
|
||||
Recently added CVEs: `16`
|
||||
|
||||
* [CVE-2023-39254](CVE-2023/CVE-2023-392xx/CVE-2023-39254.json) (`2024-03-01T13:15:07.673`)
|
||||
* [CVE-2023-48674](CVE-2023/CVE-2023-486xx/CVE-2023-48674.json) (`2024-03-01T13:15:07.877`)
|
||||
* [CVE-2023-46950](CVE-2023/CVE-2023-469xx/CVE-2023-46950.json) (`2024-03-01T14:15:53.030`)
|
||||
* [CVE-2023-46951](CVE-2023/CVE-2023-469xx/CVE-2023-46951.json) (`2024-03-01T14:15:53.087`)
|
||||
* [CVE-2023-52497](CVE-2023/CVE-2023-524xx/CVE-2023-52497.json) (`2024-03-01T14:15:53.273`)
|
||||
* [CVE-2024-24900](CVE-2024/CVE-2024-249xx/CVE-2024-24900.json) (`2024-03-01T13:15:08.090`)
|
||||
* [CVE-2024-24906](CVE-2024/CVE-2024-249xx/CVE-2024-24906.json) (`2024-03-01T13:15:08.277`)
|
||||
* [CVE-2024-2060](CVE-2024/CVE-2024-20xx/CVE-2024-2060.json) (`2024-03-01T13:15:08.460`)
|
||||
* [CVE-2024-2061](CVE-2024/CVE-2024-20xx/CVE-2024-2061.json) (`2024-03-01T13:15:08.670`)
|
||||
* [CVE-2024-2062](CVE-2024/CVE-2024-20xx/CVE-2024-2062.json) (`2024-03-01T13:15:08.913`)
|
||||
* [CVE-2024-2063](CVE-2024/CVE-2024-20xx/CVE-2024-2063.json) (`2024-03-01T13:15:09.130`)
|
||||
* [CVE-2024-24903](CVE-2024/CVE-2024-249xx/CVE-2024-24903.json) (`2024-03-01T14:15:53.320`)
|
||||
* [CVE-2024-24904](CVE-2024/CVE-2024-249xx/CVE-2024-24904.json) (`2024-03-01T14:15:53.517`)
|
||||
* [CVE-2024-24905](CVE-2024/CVE-2024-249xx/CVE-2024-24905.json) (`2024-03-01T14:15:53.683`)
|
||||
* [CVE-2024-24907](CVE-2024/CVE-2024-249xx/CVE-2024-24907.json) (`2024-03-01T14:15:53.843`)
|
||||
* [CVE-2024-27567](CVE-2024/CVE-2024-275xx/CVE-2024-27567.json) (`2024-03-01T14:15:54.143`)
|
||||
* [CVE-2024-27568](CVE-2024/CVE-2024-275xx/CVE-2024-27568.json) (`2024-03-01T14:15:54.180`)
|
||||
* [CVE-2024-27569](CVE-2024/CVE-2024-275xx/CVE-2024-27569.json) (`2024-03-01T14:15:54.213`)
|
||||
* [CVE-2024-27570](CVE-2024/CVE-2024-275xx/CVE-2024-27570.json) (`2024-03-01T14:15:54.247`)
|
||||
* [CVE-2024-27571](CVE-2024/CVE-2024-275xx/CVE-2024-27571.json) (`2024-03-01T14:15:54.280`)
|
||||
* [CVE-2024-27572](CVE-2024/CVE-2024-275xx/CVE-2024-27572.json) (`2024-03-01T14:15:54.313`)
|
||||
* [CVE-2024-2064](CVE-2024/CVE-2024-20xx/CVE-2024-2064.json) (`2024-03-01T14:15:54.350`)
|
||||
* [CVE-2023-50378](CVE-2023/CVE-2023-503xx/CVE-2023-50378.json) (`2024-03-01T15:15:08.310`)
|
||||
* [CVE-2024-0967](CVE-2024/CVE-2024-09xx/CVE-2024-0967.json) (`2024-03-01T15:15:08.410`)
|
||||
* [CVE-2024-27497](CVE-2024/CVE-2024-274xx/CVE-2024-27497.json) (`2024-03-01T15:15:08.580`)
|
||||
* [CVE-2024-2065](CVE-2024/CVE-2024-20xx/CVE-2024-2065.json) (`2024-03-01T15:15:08.627`)
|
||||
* [CVE-2024-2066](CVE-2024/CVE-2024-20xx/CVE-2024-2066.json) (`2024-03-01T15:15:08.853`)
|
||||
* [CVE-2024-2067](CVE-2024/CVE-2024-20xx/CVE-2024-2067.json) (`2024-03-01T15:15:09.073`)
|
||||
* [CVE-2024-1624](CVE-2024/CVE-2024-16xx/CVE-2024-1624.json) (`2024-03-01T16:15:45.723`)
|
||||
* [CVE-2024-27138](CVE-2024/CVE-2024-271xx/CVE-2024-27138.json) (`2024-03-01T16:15:45.983`)
|
||||
* [CVE-2024-27139](CVE-2024/CVE-2024-271xx/CVE-2024-27139.json) (`2024-03-01T16:15:46.067`)
|
||||
* [CVE-2024-27140](CVE-2024/CVE-2024-271xx/CVE-2024-27140.json) (`2024-03-01T16:15:46.143`)
|
||||
* [CVE-2024-27295](CVE-2024/CVE-2024-272xx/CVE-2024-27295.json) (`2024-03-01T16:15:46.227`)
|
||||
* [CVE-2024-27296](CVE-2024/CVE-2024-272xx/CVE-2024-27296.json) (`2024-03-01T16:15:46.413`)
|
||||
* [CVE-2024-27499](CVE-2024/CVE-2024-274xx/CVE-2024-27499.json) (`2024-03-01T16:15:46.597`)
|
||||
* [CVE-2024-2068](CVE-2024/CVE-2024-20xx/CVE-2024-2068.json) (`2024-03-01T16:15:46.643`)
|
||||
* [CVE-2024-2069](CVE-2024/CVE-2024-20xx/CVE-2024-2069.json) (`2024-03-01T16:15:46.857`)
|
||||
* [CVE-2024-2070](CVE-2024/CVE-2024-20xx/CVE-2024-2070.json) (`2024-03-01T16:15:47.063`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `71`
|
||||
Recently modified CVEs: `15`
|
||||
|
||||
* [CVE-2024-27656](CVE-2024/CVE-2024-276xx/CVE-2024-27656.json) (`2024-03-01T14:04:26.010`)
|
||||
* [CVE-2024-27657](CVE-2024/CVE-2024-276xx/CVE-2024-27657.json) (`2024-03-01T14:04:26.010`)
|
||||
* [CVE-2024-27658](CVE-2024/CVE-2024-276xx/CVE-2024-27658.json) (`2024-03-01T14:04:26.010`)
|
||||
* [CVE-2024-27659](CVE-2024/CVE-2024-276xx/CVE-2024-27659.json) (`2024-03-01T14:04:26.010`)
|
||||
* [CVE-2024-27660](CVE-2024/CVE-2024-276xx/CVE-2024-27660.json) (`2024-03-01T14:04:26.010`)
|
||||
* [CVE-2024-27661](CVE-2024/CVE-2024-276xx/CVE-2024-27661.json) (`2024-03-01T14:04:26.010`)
|
||||
* [CVE-2024-27662](CVE-2024/CVE-2024-276xx/CVE-2024-27662.json) (`2024-03-01T14:04:26.010`)
|
||||
* [CVE-2024-2009](CVE-2024/CVE-2024-20xx/CVE-2024-2009.json) (`2024-03-01T14:04:26.010`)
|
||||
* [CVE-2024-27294](CVE-2024/CVE-2024-272xx/CVE-2024-27294.json) (`2024-03-01T14:04:26.010`)
|
||||
* [CVE-2024-0403](CVE-2024/CVE-2024-04xx/CVE-2024-0403.json) (`2024-03-01T14:04:26.010`)
|
||||
* [CVE-2024-2021](CVE-2024/CVE-2024-20xx/CVE-2024-2021.json) (`2024-03-01T14:04:26.010`)
|
||||
* [CVE-2024-2022](CVE-2024/CVE-2024-20xx/CVE-2024-2022.json) (`2024-03-01T14:04:26.010`)
|
||||
* [CVE-2024-2045](CVE-2024/CVE-2024-20xx/CVE-2024-2045.json) (`2024-03-01T14:04:26.010`)
|
||||
* [CVE-2024-1941](CVE-2024/CVE-2024-19xx/CVE-2024-1941.json) (`2024-03-01T14:04:26.010`)
|
||||
* [CVE-2024-22100](CVE-2024/CVE-2024-221xx/CVE-2024-22100.json) (`2024-03-01T14:04:26.010`)
|
||||
* [CVE-2024-25578](CVE-2024/CVE-2024-255xx/CVE-2024-25578.json) (`2024-03-01T14:04:26.010`)
|
||||
* [CVE-2024-22891](CVE-2024/CVE-2024-228xx/CVE-2024-22891.json) (`2024-03-01T14:04:26.010`)
|
||||
* [CVE-2024-25293](CVE-2024/CVE-2024-252xx/CVE-2024-25293.json) (`2024-03-01T14:04:26.010`)
|
||||
* [CVE-2024-25386](CVE-2024/CVE-2024-253xx/CVE-2024-25386.json) (`2024-03-01T14:04:26.010`)
|
||||
* [CVE-2024-1859](CVE-2024/CVE-2024-18xx/CVE-2024-1859.json) (`2024-03-01T14:04:26.010`)
|
||||
* [CVE-2024-25552](CVE-2024/CVE-2024-255xx/CVE-2024-25552.json) (`2024-03-01T14:04:26.010`)
|
||||
* [CVE-2024-27949](CVE-2024/CVE-2024-279xx/CVE-2024-27949.json) (`2024-03-01T14:04:26.010`)
|
||||
* [CVE-2024-26590](CVE-2024/CVE-2024-265xx/CVE-2024-26590.json) (`2024-03-01T14:15:54.007`)
|
||||
* [CVE-2024-26601](CVE-2024/CVE-2024-266xx/CVE-2024-26601.json) (`2024-03-01T14:15:54.050`)
|
||||
* [CVE-2024-26603](CVE-2024/CVE-2024-266xx/CVE-2024-26603.json) (`2024-03-01T14:15:54.097`)
|
||||
* [CVE-2023-46950](CVE-2023/CVE-2023-469xx/CVE-2023-46950.json) (`2024-03-01T15:23:36.177`)
|
||||
* [CVE-2023-46951](CVE-2023/CVE-2023-469xx/CVE-2023-46951.json) (`2024-03-01T15:23:36.177`)
|
||||
* [CVE-2023-52497](CVE-2023/CVE-2023-524xx/CVE-2023-52497.json) (`2024-03-01T15:23:36.177`)
|
||||
* [CVE-2024-24903](CVE-2024/CVE-2024-249xx/CVE-2024-24903.json) (`2024-03-01T15:23:36.177`)
|
||||
* [CVE-2024-24904](CVE-2024/CVE-2024-249xx/CVE-2024-24904.json) (`2024-03-01T15:23:36.177`)
|
||||
* [CVE-2024-24905](CVE-2024/CVE-2024-249xx/CVE-2024-24905.json) (`2024-03-01T15:23:36.177`)
|
||||
* [CVE-2024-24907](CVE-2024/CVE-2024-249xx/CVE-2024-24907.json) (`2024-03-01T15:23:36.177`)
|
||||
* [CVE-2024-27567](CVE-2024/CVE-2024-275xx/CVE-2024-27567.json) (`2024-03-01T15:23:36.177`)
|
||||
* [CVE-2024-27568](CVE-2024/CVE-2024-275xx/CVE-2024-27568.json) (`2024-03-01T15:23:36.177`)
|
||||
* [CVE-2024-27569](CVE-2024/CVE-2024-275xx/CVE-2024-27569.json) (`2024-03-01T15:23:36.177`)
|
||||
* [CVE-2024-27570](CVE-2024/CVE-2024-275xx/CVE-2024-27570.json) (`2024-03-01T15:23:36.177`)
|
||||
* [CVE-2024-27571](CVE-2024/CVE-2024-275xx/CVE-2024-27571.json) (`2024-03-01T15:23:36.177`)
|
||||
* [CVE-2024-27572](CVE-2024/CVE-2024-275xx/CVE-2024-27572.json) (`2024-03-01T15:23:36.177`)
|
||||
* [CVE-2024-2064](CVE-2024/CVE-2024-20xx/CVE-2024-2064.json) (`2024-03-01T15:23:36.177`)
|
||||
* [CVE-2024-23120](CVE-2024/CVE-2024-231xx/CVE-2024-23120.json) (`2024-03-01T16:15:45.920`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user