Skip to content

Commit

Permalink
Auto-Update: 2024-02-02T21:00:24.118271+00:00
Browse files Browse the repository at this point in the history
  • Loading branch information
cad-safe-bot committed Feb 2, 2024
1 parent 8a3d5e2 commit 4fe3c33
Show file tree
Hide file tree
Showing 14 changed files with 881 additions and 85 deletions.
43 changes: 43 additions & 0 deletions CVE-2023/CVE-2023-375xx/CVE-2023-37527.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,43 @@
{
"id": "CVE-2023-37527",
"sourceIdentifier": "[email protected]",
"published": "2024-02-02T19:15:07.990",
"lastModified": "2024-02-02T19:15:07.990",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A reflected cross-site scripting (XSS) vulnerability in the Web Reports component of HCL BigFix Platform can possibly allow an attacker to execute malicious javascript code in the application session or in database, via remote injection, while rendering content in a web page. \n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "[email protected]",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0110209",
"source": "[email protected]"
}
]
}
68 changes: 63 additions & 5 deletions CVE-2024/CVE-2024-08xx/CVE-2024-0889.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@
"id": "CVE-2024-0889",
"sourceIdentifier": "[email protected]",
"published": "2024-01-25T23:15:08.790",
"lastModified": "2024-01-26T13:51:45.267",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-02-02T19:45:04.827",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
Expand All @@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "[email protected]",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "[email protected]",
"type": "Secondary",
Expand Down Expand Up @@ -64,6 +84,16 @@
]
},
"weaknesses": [
{
"source": "[email protected]",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-404"
}
]
},
{
"source": "[email protected]",
"type": "Secondary",
Expand All @@ -75,18 +105,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kmint21:golden_ftp_server:2.02b:*:*:*:professional:*:*:*",
"matchCriteriaId": "CA19C169-A31E-4FC9-B3EF-E5482A1767AF"
}
]
}
]
}
],
"references": [
{
"url": "https://packetstormsecurity.com/files/176661/Golden-FTP-Server-2.02b-Denial-Of-Service.html",
"source": "[email protected]"
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?ctiid.252041",
"source": "[email protected]"
"source": "[email protected]",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.252041",
"source": "[email protected]"
"source": "[email protected]",
"tags": [
"Third Party Advisory"
]
}
]
}
58 changes: 53 additions & 5 deletions CVE-2024/CVE-2024-08xx/CVE-2024-0890.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@
"id": "CVE-2024-0890",
"sourceIdentifier": "[email protected]",
"published": "2024-01-25T23:15:09.017",
"lastModified": "2024-01-26T13:51:45.267",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-02-02T19:42:08.830",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
Expand All @@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "[email protected]",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "[email protected]",
"type": "Secondary",
Expand Down Expand Up @@ -75,18 +95,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hongmaple:octopus:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5564EB82-D0CE-4DD8-B45C-AFA07A8D38DD"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/biantaibao/octopus_SQL2/blob/main/report.md",
"source": "[email protected]"
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.252042",
"source": "[email protected]"
"source": "[email protected]",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.252042",
"source": "[email protected]"
"source": "[email protected]",
"tags": [
"Third Party Advisory"
]
}
]
}
57 changes: 52 additions & 5 deletions CVE-2024/CVE-2024-08xx/CVE-2024-0891.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@
"id": "CVE-2024-0891",
"sourceIdentifier": "[email protected]",
"published": "2024-01-25T23:15:09.250",
"lastModified": "2024-01-26T13:51:45.267",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-02-02T19:36:26.663",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
Expand All @@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "[email protected]",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "[email protected]",
"type": "Secondary",
Expand Down Expand Up @@ -75,18 +95,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hongmaple:octopus:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5564EB82-D0CE-4DD8-B45C-AFA07A8D38DD"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/biantaibao/octopus_XSS/blob/main/report.md",
"source": "[email protected]"
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.252043",
"source": "[email protected]"
"source": "[email protected]",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.252043",
"source": "[email protected]"
"source": "[email protected]",
"tags": [
"Third Party Advisory"
]
}
]
}
Loading

0 comments on commit 4fe3c33

Please sign in to comment.