From 3e1d512a1435727406143ded275e2e48b8d2ce44 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 15 Jan 2024 00:55:28 +0000 Subject: [PATCH] Auto-Update: 2024-01-15T00:55:25.180566+00:00 --- CVE-2024/CVE-2024-05xx/CVE-2024-0522.json | 84 ++++++++++++++++++++++ CVE-2024/CVE-2024-05xx/CVE-2024-0523.json | 88 +++++++++++++++++++++++ CVE-2024/CVE-2024-05xx/CVE-2024-0524.json | 88 +++++++++++++++++++++++ CVE-2024/CVE-2024-05xx/CVE-2024-0525.json | 88 +++++++++++++++++++++++ CVE-2024/CVE-2024-05xx/CVE-2024-0526.json | 88 +++++++++++++++++++++++ README.md | 42 +++-------- 6 files changed, 447 insertions(+), 31 deletions(-) create mode 100644 CVE-2024/CVE-2024-05xx/CVE-2024-0522.json create mode 100644 CVE-2024/CVE-2024-05xx/CVE-2024-0523.json create mode 100644 CVE-2024/CVE-2024-05xx/CVE-2024-0524.json create mode 100644 CVE-2024/CVE-2024-05xx/CVE-2024-0525.json create mode 100644 CVE-2024/CVE-2024-05xx/CVE-2024-0526.json diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0522.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0522.json new file mode 100644 index 00000000000..4f94f8b2e79 --- /dev/null +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0522.json @@ -0,0 +1,84 @@ +{ + "id": "CVE-2024-0522", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-01-14T23:15:27.677", + "lastModified": "2024-01-14T23:15:27.677", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Allegro RomPager 4.01. It has been classified as problematic. Affected is an unknown function of the file usertable.htm?action=delete of the component HTTP POST Request Handler. The manipulation of the argument username leads to cross-site request forgery. It is possible to launch the attack remotely. Upgrading to version 4.30 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-250692. NOTE: The vendor explains that this is a very old issue that got fixed 20 years ago but without a public disclosure." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 5.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://vuldb.com/?ctiid.250692", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.250692", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0523.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0523.json new file mode 100644 index 00000000000..ccee60e937e --- /dev/null +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0523.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-0523", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-01-14T23:15:28.370", + "lastModified": "2024-01-14T23:15:28.370", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in CmsEasy up to 7.7.7. It has been declared as critical. Affected by this vulnerability is the function getslide_child_action in the library lib/admin/language_admin.php. The manipulation of the argument sid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250693 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/V3geD4g/cmseasy_vul/blob/main/SQL1-EN.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.250693", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.250693", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0524.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0524.json new file mode 100644 index 00000000000..18f01cd1469 --- /dev/null +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0524.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-0524", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-01-15T00:15:37.343", + "lastModified": "2024-01-15T00:15:37.343", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in CXBSoft Url-shorting up to 1.3.1. It has been rated as critical. Affected by this issue is some unknown functionality of the file index.php. The manipulation of the argument url leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-250694 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "ADJACENT_NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 5.2 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 5.1, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://note.zhaoj.in/share/GdpwiaItePFq", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.250694", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.250694", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0525.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0525.json new file mode 100644 index 00000000000..a77bf01c330 --- /dev/null +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0525.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-0525", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-01-15T00:15:37.590", + "lastModified": "2024-01-15T00:15:37.590", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in CXBSoft Url-shorting up to 1.3.1. This affects an unknown part of the file /pages/long_s_short.php of the component HTTP POST Request Handler. The manipulation of the argument longurl leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250695. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "ADJACENT_NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 5.2 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 5.1, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://note.zhaoj.in/share/9tjcunCPidgI", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.250695", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.250695", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0526.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0526.json new file mode 100644 index 00000000000..26f7d1d23a5 --- /dev/null +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0526.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-0526", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-01-15T00:15:37.807", + "lastModified": "2024-01-15T00:15:37.807", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in CXBSoft Url-shorting up to 1.3.1. This vulnerability affects unknown code of the file /pages/short_to_long.php of the component HTTP POST Request Handler. The manipulation of the argument shorturl leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250696. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "ADJACENT_NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 5.2 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 5.1, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://note.zhaoj.in/share/Zezf8fmoq7lk", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.250696", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.250696", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 9f00cb24d9f..d307e825819 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-01-14T23:00:25.826055+00:00 +2024-01-15T00:55:25.180566+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-01-14T22:48:45.253000+00:00 +2024-01-15T00:15:37.807000+00:00 ``` ### Last Data Feed Release @@ -29,44 +29,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -235866 +235871 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `5` +* [CVE-2024-0522](CVE-2024/CVE-2024-05xx/CVE-2024-0522.json) (`2024-01-14T23:15:27.677`) +* [CVE-2024-0523](CVE-2024/CVE-2024-05xx/CVE-2024-0523.json) (`2024-01-14T23:15:28.370`) +* [CVE-2024-0524](CVE-2024/CVE-2024-05xx/CVE-2024-0524.json) (`2024-01-15T00:15:37.343`) +* [CVE-2024-0525](CVE-2024/CVE-2024-05xx/CVE-2024-0525.json) (`2024-01-15T00:15:37.590`) +* [CVE-2024-0526](CVE-2024/CVE-2024-05xx/CVE-2024-0526.json) (`2024-01-15T00:15:37.807`) ### CVEs modified in the last Commit -Recently modified CVEs: `94` - -* [CVE-2024-0498](CVE-2024/CVE-2024-04xx/CVE-2024-0498.json) (`2024-01-14T21:42:17.123`) -* [CVE-2024-0499](CVE-2024/CVE-2024-04xx/CVE-2024-0499.json) (`2024-01-14T21:42:17.123`) -* [CVE-2024-0500](CVE-2024/CVE-2024-05xx/CVE-2024-0500.json) (`2024-01-14T21:42:17.123`) -* [CVE-2024-0501](CVE-2024/CVE-2024-05xx/CVE-2024-0501.json) (`2024-01-14T21:42:17.123`) -* [CVE-2024-0502](CVE-2024/CVE-2024-05xx/CVE-2024-0502.json) (`2024-01-14T21:42:17.123`) -* [CVE-2024-0503](CVE-2024/CVE-2024-05xx/CVE-2024-0503.json) (`2024-01-14T21:42:17.123`) -* [CVE-2024-0504](CVE-2024/CVE-2024-05xx/CVE-2024-0504.json) (`2024-01-14T21:42:17.123`) -* [CVE-2024-0505](CVE-2024/CVE-2024-05xx/CVE-2024-0505.json) (`2024-01-14T21:42:17.123`) -* [CVE-2024-0510](CVE-2024/CVE-2024-05xx/CVE-2024-0510.json) (`2024-01-14T21:42:17.123`) -* [CVE-2024-20661](CVE-2024/CVE-2024-206xx/CVE-2024-20661.json) (`2024-01-14T21:52:42.897`) -* [CVE-2024-20660](CVE-2024/CVE-2024-206xx/CVE-2024-20660.json) (`2024-01-14T21:52:52.067`) -* [CVE-2024-20691](CVE-2024/CVE-2024-206xx/CVE-2024-20691.json) (`2024-01-14T21:56:21.480`) -* [CVE-2024-20697](CVE-2024/CVE-2024-206xx/CVE-2024-20697.json) (`2024-01-14T21:56:59.407`) -* [CVE-2024-20699](CVE-2024/CVE-2024-206xx/CVE-2024-20699.json) (`2024-01-14T21:57:27.553`) -* [CVE-2024-20686](CVE-2024/CVE-2024-206xx/CVE-2024-20686.json) (`2024-01-14T22:06:45.580`) -* [CVE-2024-20687](CVE-2024/CVE-2024-206xx/CVE-2024-20687.json) (`2024-01-14T22:16:37.297`) -* [CVE-2024-20690](CVE-2024/CVE-2024-206xx/CVE-2024-20690.json) (`2024-01-14T22:18:00.680`) -* [CVE-2024-20681](CVE-2024/CVE-2024-206xx/CVE-2024-20681.json) (`2024-01-14T22:22:13.247`) -* [CVE-2024-20683](CVE-2024/CVE-2024-206xx/CVE-2024-20683.json) (`2024-01-14T22:23:33.287`) -* [CVE-2024-20682](CVE-2024/CVE-2024-206xx/CVE-2024-20682.json) (`2024-01-14T22:24:25.350`) -* [CVE-2024-20674](CVE-2024/CVE-2024-206xx/CVE-2024-20674.json) (`2024-01-14T22:37:10.873`) -* [CVE-2024-20676](CVE-2024/CVE-2024-206xx/CVE-2024-20676.json) (`2024-01-14T22:38:08.740`) -* [CVE-2024-20680](CVE-2024/CVE-2024-206xx/CVE-2024-20680.json) (`2024-01-14T22:39:00.147`) -* [CVE-2024-20666](CVE-2024/CVE-2024-206xx/CVE-2024-20666.json) (`2024-01-14T22:46:45.707`) -* [CVE-2024-20672](CVE-2024/CVE-2024-206xx/CVE-2024-20672.json) (`2024-01-14T22:48:45.253`) +Recently modified CVEs: `0` + ## Download and Usage