-
Notifications
You must be signed in to change notification settings - Fork 16
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Auto-Update: 2024-10-04T22:00:16.975346+00:00
- Loading branch information
1 parent
601e275
commit 23e93d9
Showing
18 changed files
with
904 additions
and
102 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,25 @@ | ||
{ | ||
"id": "CVE-2024-37868", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2024-10-04T21:15:13.150", | ||
"lastModified": "2024-10-04T21:15:13.150", | ||
"vulnStatus": "Received", | ||
"cveTags": [], | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "File Upload vulnerability in Itsourcecode Online Discussion Forum Project v.1.0 allows a remote attacker to execute arbitrary code via the \"sendreply.php\" file, and the uploaded file was received using the \"$- FILES\" variable." | ||
} | ||
], | ||
"metrics": {}, | ||
"references": [ | ||
{ | ||
"url": "https://gist.github.com/TERRENCE-REX/bfca92171143e28899bb8511f311f9ed", | ||
"source": "[email protected]" | ||
}, | ||
{ | ||
"url": "https://github.com/TERRENCE-REX/CVE/issues/1", | ||
"source": "[email protected]" | ||
} | ||
] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,25 @@ | ||
{ | ||
"id": "CVE-2024-37869", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2024-10-04T21:15:13.240", | ||
"lastModified": "2024-10-04T21:15:13.240", | ||
"vulnStatus": "Received", | ||
"cveTags": [], | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "File Upload vulnerability in Itsourcecode Online Discussion Forum Project v.1.0 allows a remote attacker to execute arbitrary code via the \"poster.php\" file, and the uploaded file was received using the \"$- FILES\" variable" | ||
} | ||
], | ||
"metrics": {}, | ||
"references": [ | ||
{ | ||
"url": "https://gist.github.com/TERRENCE-REX/7e5dfdd3583bf9fd81196f557a8b8879", | ||
"source": "[email protected]" | ||
}, | ||
{ | ||
"url": "https://github.com/TERRENCE-REX/CVE/issues/2", | ||
"source": "[email protected]" | ||
} | ||
] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,7 +2,7 @@ | |
"id": "CVE-2024-41512", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2024-10-04T18:15:08.153", | ||
"lastModified": "2024-10-04T18:15:08.153", | ||
"lastModified": "2024-10-04T21:15:13.293", | ||
"vulnStatus": "Received", | ||
"cveTags": [], | ||
"descriptions": [ | ||
|
@@ -13,6 +13,14 @@ | |
], | ||
"metrics": {}, | ||
"references": [ | ||
{ | ||
"url": "http://cadclick.de/", | ||
"source": "[email protected]" | ||
}, | ||
{ | ||
"url": "http://kimweb.de/", | ||
"source": "[email protected]" | ||
}, | ||
{ | ||
"url": "https://piuswalter.de/blog/multiple-critical-vulnerabilities-in-cadclick/", | ||
"source": "[email protected]" | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,7 +2,7 @@ | |
"id": "CVE-2024-41513", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2024-10-04T18:15:08.220", | ||
"lastModified": "2024-10-04T18:15:08.220", | ||
"lastModified": "2024-10-04T21:15:13.350", | ||
"vulnStatus": "Received", | ||
"cveTags": [], | ||
"descriptions": [ | ||
|
@@ -13,6 +13,14 @@ | |
], | ||
"metrics": {}, | ||
"references": [ | ||
{ | ||
"url": "http://cadclick.de/", | ||
"source": "[email protected]" | ||
}, | ||
{ | ||
"url": "http://kimweb.de/", | ||
"source": "[email protected]" | ||
}, | ||
{ | ||
"url": "https://piuswalter.de/blog/multiple-critical-vulnerabilities-in-cadclick/", | ||
"source": "[email protected]" | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,7 +2,7 @@ | |
"id": "CVE-2024-41514", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2024-10-04T18:15:08.297", | ||
"lastModified": "2024-10-04T18:15:08.297", | ||
"lastModified": "2024-10-04T21:15:13.400", | ||
"vulnStatus": "Received", | ||
"cveTags": [], | ||
"descriptions": [ | ||
|
@@ -13,6 +13,14 @@ | |
], | ||
"metrics": {}, | ||
"references": [ | ||
{ | ||
"url": "http://cadclick.de/", | ||
"source": "[email protected]" | ||
}, | ||
{ | ||
"url": "http://kimweb.de/", | ||
"source": "[email protected]" | ||
}, | ||
{ | ||
"url": "https://piuswalter.de/blog/multiple-critical-vulnerabilities-in-cadclick/", | ||
"source": "[email protected]" | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,82 @@ | ||
{ | ||
"id": "CVE-2024-43683", | ||
"sourceIdentifier": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5", | ||
"published": "2024-10-04T20:15:06.513", | ||
"lastModified": "2024-10-04T20:15:06.513", | ||
"vulnStatus": "Received", | ||
"cveTags": [], | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Microchip TimeProvider 4100 allows XSS Through HTTP Headers.This issue affects TimeProvider 4100: from 1.0." | ||
} | ||
], | ||
"metrics": { | ||
"cvssMetricV40": [ | ||
{ | ||
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5", | ||
"type": "Secondary", | ||
"cvssData": { | ||
"version": "4.0", | ||
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:U/V:C/RE:M/U:Amber", | ||
"attackVector": "NETWORK", | ||
"attackComplexity": "HIGH", | ||
"attackRequirements": "PRESENT", | ||
"privilegesRequired": "NONE", | ||
"userInteraction": "PASSIVE", | ||
"vulnerableSystemConfidentiality": "HIGH", | ||
"vulnerableSystemIntegrity": "HIGH", | ||
"vulnerableSystemAvailability": "HIGH", | ||
"subsequentSystemConfidentiality": "NONE", | ||
"subsequentSystemIntegrity": "NONE", | ||
"subsequentSystemAvailability": "HIGH", | ||
"exploitMaturity": "NOT_DEFINED", | ||
"confidentialityRequirements": "NOT_DEFINED", | ||
"integrityRequirements": "NOT_DEFINED", | ||
"availabilityRequirements": "NOT_DEFINED", | ||
"modifiedAttackVector": "NOT_DEFINED", | ||
"modifiedAttackComplexity": "NOT_DEFINED", | ||
"modifiedAttackRequirements": "NOT_DEFINED", | ||
"modifiedPrivilegesRequired": "NOT_DEFINED", | ||
"modifiedUserInteraction": "NOT_DEFINED", | ||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", | ||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED", | ||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED", | ||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", | ||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED", | ||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED", | ||
"safety": "NOT_DEFINED", | ||
"automatable": "NOT_DEFINED", | ||
"recovery": "USER", | ||
"valueDensity": "CONCENTRATED", | ||
"vulnerabilityResponseEffort": "MODERATE", | ||
"providerUrgency": "AMBER", | ||
"baseScore": 8.7, | ||
"baseSeverity": "HIGH" | ||
} | ||
} | ||
] | ||
}, | ||
"weaknesses": [ | ||
{ | ||
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5", | ||
"type": "Secondary", | ||
"description": [ | ||
{ | ||
"lang": "en", | ||
"value": "CWE-601" | ||
} | ||
] | ||
} | ||
], | ||
"references": [ | ||
{ | ||
"url": "https://www.gruppotim.it/it/footer/red-team.html", | ||
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5" | ||
}, | ||
{ | ||
"url": "https://www.microchip.com/en-us/solutions/technologies/embedded-security/how-to-report-potential-product-security-vulnerabilities", | ||
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5" | ||
} | ||
] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,82 @@ | ||
{ | ||
"id": "CVE-2024-43684", | ||
"sourceIdentifier": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5", | ||
"published": "2024-10-04T20:15:06.710", | ||
"lastModified": "2024-10-04T20:15:06.710", | ||
"vulnStatus": "Received", | ||
"cveTags": [], | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Microchip TimeProvider 4100 allows Cross Site Request Forgery, Cross-Site Scripting (XSS).This issue affects TimeProvider 4100: from 1.0." | ||
} | ||
], | ||
"metrics": { | ||
"cvssMetricV40": [ | ||
{ | ||
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5", | ||
"type": "Secondary", | ||
"cvssData": { | ||
"version": "4.0", | ||
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:U/V:C/RE:M/U:Amber", | ||
"attackVector": "NETWORK", | ||
"attackComplexity": "HIGH", | ||
"attackRequirements": "PRESENT", | ||
"privilegesRequired": "NONE", | ||
"userInteraction": "PASSIVE", | ||
"vulnerableSystemConfidentiality": "HIGH", | ||
"vulnerableSystemIntegrity": "HIGH", | ||
"vulnerableSystemAvailability": "HIGH", | ||
"subsequentSystemConfidentiality": "NONE", | ||
"subsequentSystemIntegrity": "NONE", | ||
"subsequentSystemAvailability": "HIGH", | ||
"exploitMaturity": "NOT_DEFINED", | ||
"confidentialityRequirements": "NOT_DEFINED", | ||
"integrityRequirements": "NOT_DEFINED", | ||
"availabilityRequirements": "NOT_DEFINED", | ||
"modifiedAttackVector": "NOT_DEFINED", | ||
"modifiedAttackComplexity": "NOT_DEFINED", | ||
"modifiedAttackRequirements": "NOT_DEFINED", | ||
"modifiedPrivilegesRequired": "NOT_DEFINED", | ||
"modifiedUserInteraction": "NOT_DEFINED", | ||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", | ||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED", | ||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED", | ||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", | ||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED", | ||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED", | ||
"safety": "NOT_DEFINED", | ||
"automatable": "NOT_DEFINED", | ||
"recovery": "USER", | ||
"valueDensity": "CONCENTRATED", | ||
"vulnerabilityResponseEffort": "MODERATE", | ||
"providerUrgency": "AMBER", | ||
"baseScore": 8.7, | ||
"baseSeverity": "HIGH" | ||
} | ||
} | ||
] | ||
}, | ||
"weaknesses": [ | ||
{ | ||
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5", | ||
"type": "Secondary", | ||
"description": [ | ||
{ | ||
"lang": "en", | ||
"value": "CWE-352" | ||
} | ||
] | ||
} | ||
], | ||
"references": [ | ||
{ | ||
"url": "https://www.gruppotim.it/it/footer/red-team.html", | ||
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5" | ||
}, | ||
{ | ||
"url": "https://www.microchip.com/en-us/solutions/technologies/embedded-security/how-to-report-potential-product-security-vulnerabilities", | ||
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5" | ||
} | ||
] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,82 @@ | ||
{ | ||
"id": "CVE-2024-43685", | ||
"sourceIdentifier": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5", | ||
"published": "2024-10-04T20:15:06.830", | ||
"lastModified": "2024-10-04T20:15:06.830", | ||
"vulnStatus": "Received", | ||
"cveTags": [], | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "Improper Authentication vulnerability in Microchip TimeProvider 4100 (login modules) allows Session Hijacking.This issue affects TimeProvider 4100: from 1.0 before 2.4.7." | ||
} | ||
], | ||
"metrics": { | ||
"cvssMetricV40": [ | ||
{ | ||
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5", | ||
"type": "Secondary", | ||
"cvssData": { | ||
"version": "4.0", | ||
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:U/V:C/RE:M/U:Amber", | ||
"attackVector": "NETWORK", | ||
"attackComplexity": "HIGH", | ||
"attackRequirements": "PRESENT", | ||
"privilegesRequired": "NONE", | ||
"userInteraction": "PASSIVE", | ||
"vulnerableSystemConfidentiality": "HIGH", | ||
"vulnerableSystemIntegrity": "HIGH", | ||
"vulnerableSystemAvailability": "HIGH", | ||
"subsequentSystemConfidentiality": "NONE", | ||
"subsequentSystemIntegrity": "NONE", | ||
"subsequentSystemAvailability": "HIGH", | ||
"exploitMaturity": "NOT_DEFINED", | ||
"confidentialityRequirements": "NOT_DEFINED", | ||
"integrityRequirements": "NOT_DEFINED", | ||
"availabilityRequirements": "NOT_DEFINED", | ||
"modifiedAttackVector": "NOT_DEFINED", | ||
"modifiedAttackComplexity": "NOT_DEFINED", | ||
"modifiedAttackRequirements": "NOT_DEFINED", | ||
"modifiedPrivilegesRequired": "NOT_DEFINED", | ||
"modifiedUserInteraction": "NOT_DEFINED", | ||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", | ||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED", | ||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED", | ||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", | ||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED", | ||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED", | ||
"safety": "NOT_DEFINED", | ||
"automatable": "NOT_DEFINED", | ||
"recovery": "USER", | ||
"valueDensity": "CONCENTRATED", | ||
"vulnerabilityResponseEffort": "MODERATE", | ||
"providerUrgency": "AMBER", | ||
"baseScore": 8.7, | ||
"baseSeverity": "HIGH" | ||
} | ||
} | ||
] | ||
}, | ||
"weaknesses": [ | ||
{ | ||
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5", | ||
"type": "Secondary", | ||
"description": [ | ||
{ | ||
"lang": "en", | ||
"value": "CWE-287" | ||
} | ||
] | ||
} | ||
], | ||
"references": [ | ||
{ | ||
"url": "https://www.gruppotim.it/it/footer/red-team.html", | ||
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5" | ||
}, | ||
{ | ||
"url": "https://www.microchip.com/en-us/solutions/technologies/embedded-security/how-to-report-potential-product-security-vulnerabilities/timeprovider-4100-grandmaster-session-token-fixation", | ||
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5" | ||
} | ||
] | ||
} |
Oops, something went wrong.