Skip to content

Commit

Permalink
Auto-Update: 2024-10-04T22:00:16.975346+00:00
Browse files Browse the repository at this point in the history
  • Loading branch information
cad-safe-bot committed Oct 4, 2024
1 parent 601e275 commit 23e93d9
Show file tree
Hide file tree
Showing 18 changed files with 904 additions and 102 deletions.
25 changes: 25 additions & 0 deletions CVE-2024/CVE-2024-378xx/CVE-2024-37868.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
{
"id": "CVE-2024-37868",
"sourceIdentifier": "[email protected]",
"published": "2024-10-04T21:15:13.150",
"lastModified": "2024-10-04T21:15:13.150",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "File Upload vulnerability in Itsourcecode Online Discussion Forum Project v.1.0 allows a remote attacker to execute arbitrary code via the \"sendreply.php\" file, and the uploaded file was received using the \"$- FILES\" variable."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/TERRENCE-REX/bfca92171143e28899bb8511f311f9ed",
"source": "[email protected]"
},
{
"url": "https://github.com/TERRENCE-REX/CVE/issues/1",
"source": "[email protected]"
}
]
}
25 changes: 25 additions & 0 deletions CVE-2024/CVE-2024-378xx/CVE-2024-37869.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
{
"id": "CVE-2024-37869",
"sourceIdentifier": "[email protected]",
"published": "2024-10-04T21:15:13.240",
"lastModified": "2024-10-04T21:15:13.240",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "File Upload vulnerability in Itsourcecode Online Discussion Forum Project v.1.0 allows a remote attacker to execute arbitrary code via the \"poster.php\" file, and the uploaded file was received using the \"$- FILES\" variable"
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/TERRENCE-REX/7e5dfdd3583bf9fd81196f557a8b8879",
"source": "[email protected]"
},
{
"url": "https://github.com/TERRENCE-REX/CVE/issues/2",
"source": "[email protected]"
}
]
}
10 changes: 9 additions & 1 deletion CVE-2024/CVE-2024-415xx/CVE-2024-41512.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2024-41512",
"sourceIdentifier": "[email protected]",
"published": "2024-10-04T18:15:08.153",
"lastModified": "2024-10-04T18:15:08.153",
"lastModified": "2024-10-04T21:15:13.293",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
Expand All @@ -13,6 +13,14 @@
],
"metrics": {},
"references": [
{
"url": "http://cadclick.de/",
"source": "[email protected]"
},
{
"url": "http://kimweb.de/",
"source": "[email protected]"
},
{
"url": "https://piuswalter.de/blog/multiple-critical-vulnerabilities-in-cadclick/",
"source": "[email protected]"
Expand Down
10 changes: 9 additions & 1 deletion CVE-2024/CVE-2024-415xx/CVE-2024-41513.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2024-41513",
"sourceIdentifier": "[email protected]",
"published": "2024-10-04T18:15:08.220",
"lastModified": "2024-10-04T18:15:08.220",
"lastModified": "2024-10-04T21:15:13.350",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
Expand All @@ -13,6 +13,14 @@
],
"metrics": {},
"references": [
{
"url": "http://cadclick.de/",
"source": "[email protected]"
},
{
"url": "http://kimweb.de/",
"source": "[email protected]"
},
{
"url": "https://piuswalter.de/blog/multiple-critical-vulnerabilities-in-cadclick/",
"source": "[email protected]"
Expand Down
10 changes: 9 additions & 1 deletion CVE-2024/CVE-2024-415xx/CVE-2024-41514.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2024-41514",
"sourceIdentifier": "[email protected]",
"published": "2024-10-04T18:15:08.297",
"lastModified": "2024-10-04T18:15:08.297",
"lastModified": "2024-10-04T21:15:13.400",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
Expand All @@ -13,6 +13,14 @@
],
"metrics": {},
"references": [
{
"url": "http://cadclick.de/",
"source": "[email protected]"
},
{
"url": "http://kimweb.de/",
"source": "[email protected]"
},
{
"url": "https://piuswalter.de/blog/multiple-critical-vulnerabilities-in-cadclick/",
"source": "[email protected]"
Expand Down
82 changes: 82 additions & 0 deletions CVE-2024/CVE-2024-436xx/CVE-2024-43683.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,82 @@
{
"id": "CVE-2024-43683",
"sourceIdentifier": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",
"published": "2024-10-04T20:15:06.513",
"lastModified": "2024-10-04T20:15:06.513",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Microchip TimeProvider 4100 allows XSS Through HTTP Headers.This issue affects TimeProvider 4100: from 1.0."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:U/V:C/RE:M/U:Amber",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "USER",
"valueDensity": "CONCENTRATED",
"vulnerabilityResponseEffort": "MODERATE",
"providerUrgency": "AMBER",
"baseScore": 8.7,
"baseSeverity": "HIGH"
}
}
]
},
"weaknesses": [
{
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://www.gruppotim.it/it/footer/red-team.html",
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5"
},
{
"url": "https://www.microchip.com/en-us/solutions/technologies/embedded-security/how-to-report-potential-product-security-vulnerabilities",
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5"
}
]
}
82 changes: 82 additions & 0 deletions CVE-2024/CVE-2024-436xx/CVE-2024-43684.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,82 @@
{
"id": "CVE-2024-43684",
"sourceIdentifier": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",
"published": "2024-10-04T20:15:06.710",
"lastModified": "2024-10-04T20:15:06.710",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Microchip TimeProvider 4100 allows Cross Site Request Forgery, Cross-Site Scripting (XSS).This issue affects TimeProvider 4100: from 1.0."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:U/V:C/RE:M/U:Amber",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "USER",
"valueDensity": "CONCENTRATED",
"vulnerabilityResponseEffort": "MODERATE",
"providerUrgency": "AMBER",
"baseScore": 8.7,
"baseSeverity": "HIGH"
}
}
]
},
"weaknesses": [
{
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://www.gruppotim.it/it/footer/red-team.html",
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5"
},
{
"url": "https://www.microchip.com/en-us/solutions/technologies/embedded-security/how-to-report-potential-product-security-vulnerabilities",
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5"
}
]
}
82 changes: 82 additions & 0 deletions CVE-2024/CVE-2024-436xx/CVE-2024-43685.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,82 @@
{
"id": "CVE-2024-43685",
"sourceIdentifier": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",
"published": "2024-10-04T20:15:06.830",
"lastModified": "2024-10-04T20:15:06.830",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Authentication vulnerability in Microchip TimeProvider 4100 (login modules) allows Session Hijacking.This issue affects TimeProvider 4100: from 1.0 before 2.4.7."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:U/V:C/RE:M/U:Amber",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "USER",
"valueDensity": "CONCENTRATED",
"vulnerabilityResponseEffort": "MODERATE",
"providerUrgency": "AMBER",
"baseScore": 8.7,
"baseSeverity": "HIGH"
}
}
]
},
"weaknesses": [
{
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://www.gruppotim.it/it/footer/red-team.html",
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5"
},
{
"url": "https://www.microchip.com/en-us/solutions/technologies/embedded-security/how-to-report-potential-product-security-vulnerabilities/timeprovider-4100-grandmaster-session-token-fixation",
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5"
}
]
}
Loading

0 comments on commit 23e93d9

Please sign in to comment.