From 91e09c42689d2fe056579d6e50bdd74cfebcdb2f Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 18 Dec 2024 03:03:49 +0000 Subject: [PATCH] Auto-Update: 2024-12-18T03:00:26.206255+00:00 --- CVE-2023/CVE-2023-468xx/CVE-2023-46846.json | 6 +++++- CVE-2024/CVE-2024-536xx/CVE-2024-53677.json | 4 ++-- CVE-2024/CVE-2024-559xx/CVE-2024-55956.json | 8 ++++++-- README.md | 15 ++++++++------- _state.csv | 10 +++++----- 5 files changed, 26 insertions(+), 17 deletions(-) diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46846.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46846.json index 0edd27c72fc..fb76b08d8f6 100644 --- a/CVE-2023/CVE-2023-468xx/CVE-2023-46846.json +++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46846.json @@ -2,7 +2,7 @@ "id": "CVE-2023-46846", "sourceIdentifier": "secalert@redhat.com", "published": "2023-11-03T08:15:07.953", - "lastModified": "2024-11-21T08:29:24.803", + "lastModified": "2024-12-18T01:15:06.010", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -264,6 +264,10 @@ "Third Party Advisory" ] }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:11049", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-46846", "source": "secalert@redhat.com", diff --git a/CVE-2024/CVE-2024-536xx/CVE-2024-53677.json b/CVE-2024/CVE-2024-536xx/CVE-2024-53677.json index 696d04441a9..99bdd1370c1 100644 --- a/CVE-2024/CVE-2024-536xx/CVE-2024-53677.json +++ b/CVE-2024/CVE-2024-536xx/CVE-2024-53677.json @@ -2,13 +2,13 @@ "id": "CVE-2024-53677", "sourceIdentifier": "security@apache.org", "published": "2024-12-11T16:15:14.593", - "lastModified": "2024-12-16T10:15:06.330", + "lastModified": "2024-12-18T01:15:06.237", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "File upload logic is flawed vulnerability in Apache Struts.\n\nThis issue affects Apache Struts: from 2.0.0 before 6.4.0.\n\nUsers are recommended to upgrade to version 6.4.0\u00a0migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload .\n\nYou can find more details in\u00a0 https://cwiki.apache.org/confluence/display/WW/S2-067" + "value": "File upload logic is flawed vulnerability in Apache Struts.\n\nThis issue affects Apache Struts: from 2.0.0 before 6.4.0.\n\nUsers are recommended to upgrade to version 6.4.0 and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload .\n\nYou can find more details in\u00a0 https://cwiki.apache.org/confluence/display/WW/S2-067" }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55956.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55956.json index 76356e40ff6..13caebfd219 100644 --- a/CVE-2024/CVE-2024-559xx/CVE-2024-55956.json +++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55956.json @@ -2,8 +2,8 @@ "id": "CVE-2024-55956", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-13T21:15:13.767", - "lastModified": "2024-12-16T18:15:12.170", - "vulnStatus": "Received", + "lastModified": "2024-12-18T02:00:02.997", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -39,6 +39,10 @@ } ] }, + "cisaExploitAdd": "2024-12-17", + "cisaActionDue": "2025-01-07", + "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", + "cisaVulnerabilityName": "Cleo Multiple Products Unauthenticated File Upload Vulnerability", "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", diff --git a/README.md b/README.md index 602ef0a5a4a..4fb8de35476 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-12-18T00:55:25.381382+00:00 +2024-12-18T03:00:26.206255+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-12-17T23:15:05.603000+00:00 +2024-12-18T02:00:02.997000+00:00 ``` ### Last Data Feed Release @@ -27,7 +27,7 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-12-17T01:00:04.350945+00:00 +2024-12-18T01:00:10.105595+00:00 ``` ### Total Number of included CVEs @@ -38,16 +38,17 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `0` -- [CVE-2024-10973](CVE-2024/CVE-2024-109xx/CVE-2024-10973.json) (`2024-12-17T23:15:05.423`) -- [CVE-2024-9779](CVE-2024/CVE-2024-97xx/CVE-2024-9779.json) (`2024-12-17T23:15:05.603`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `3` +- [CVE-2023-46846](CVE-2023/CVE-2023-468xx/CVE-2023-46846.json) (`2024-12-18T01:15:06.010`) +- [CVE-2024-53677](CVE-2024/CVE-2024-536xx/CVE-2024-53677.json) (`2024-12-18T01:15:06.237`) +- [CVE-2024-55956](CVE-2024/CVE-2024-559xx/CVE-2024-55956.json) (`2024-12-18T02:00:02.997`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 4b7eb9bea5b..a9e9310b09d 100644 --- a/_state.csv +++ b/_state.csv @@ -235831,7 +235831,7 @@ CVE-2023-46840,0,0,35101892971cbf6355ae8df6a82236e4f3dffa9cecb80f1c3349b445a8ac7 CVE-2023-46841,0,0,71e9de96ddef1ab2841aa33002d01f31cc3ab11cd177eac4236ba25c36b232a4,2024-11-21T08:29:24.397000 CVE-2023-46842,0,0,79191b4d36ae3903ee5a7b9711e63bf5596944942e06d8c4bd75cd870ab3491c,2024-12-04T17:15:11.343000 CVE-2023-46845,0,0,8cca69f35c18b37d1e400c1780d51f45ac93f2d00dcfe2123c24403e52459030,2024-11-21T08:29:24.673000 -CVE-2023-46846,0,0,70e31e88c7fd293c5d954bcd666c2a239b461e5b8ba0376b65e4ab9e1a7f75fc,2024-11-21T08:29:24.803000 +CVE-2023-46846,0,1,b73bc8a6a9a81e5c869755df7f9ec3e498228884dcb6e74b5679aa1ec816512a,2024-12-18T01:15:06.010000 CVE-2023-46847,0,0,25226d6c3ea5f3ae387efea28db924389911d043f96c3ee615accfee7a912619,2024-11-21T08:29:25 CVE-2023-46848,0,0,fc1a3cbe733e7d75d5767c3bf972500d8208d1d249d69703d688044c0e53a543,2024-11-21T08:29:25.190000 CVE-2023-46849,0,0,d939db9ad23b15e2c76e72ad352b3bf6d630c9fe03bd4a9ee0d93213deca79b3,2024-11-21T08:29:25.337000 @@ -243798,7 +243798,7 @@ CVE-2024-10969,0,0,8114c2dfe952beb461c299d8bda61eb6b5ef295ee43d6de90e2c4aa8ea5fd CVE-2024-1097,0,0,f1ad2b99b98b2176c3b3ccdd494bed6625a86a9f96e0ed3a25e7d4f3cd789ac4,2024-11-19T19:05:30.620000 CVE-2024-10971,0,0,f8d3e9d67661e4546a1e254ebb74d5d0c1dddae1c4d768a7ce5fd78bda7de46d,2024-11-21T08:49:10.613000 CVE-2024-10972,0,0,a8452c8051948f0543ecfcf985d65809bb0e2321a958294c43af09b4639f54ea,2024-12-16T16:15:05.880000 -CVE-2024-10973,1,1,c80a66ce1ed554bb5cbec7257ed71a970d72cbd34612f04a64996002382828c1,2024-12-17T23:15:05.423000 +CVE-2024-10973,0,0,c80a66ce1ed554bb5cbec7257ed71a970d72cbd34612f04a64996002382828c1,2024-12-17T23:15:05.423000 CVE-2024-10975,0,0,87dd438a371aa254e8d367f54246f88f9b61e035fde8423a2dec0ee6b83d81a4,2024-11-08T19:01:03.880000 CVE-2024-10976,0,0,74ddf3e112f382a760946f483990fa0747a570c018c9e28cec5188371748074d,2024-11-15T13:58:08.913000 CVE-2024-10977,0,0,e54cdfcf4a6415150b7b9a534f3117ac0a47dcbb5949b9162862d5471ded9bdf,2024-11-15T13:58:08.913000 @@ -269547,7 +269547,7 @@ CVE-2024-53673,0,0,998c285a4fe0e35cbecbdb698279013b408c1bb4163a1e69369fac314d145 CVE-2024-53674,0,0,f555b7f03d33cd061d1493d8fc99309d52915e66d5ae0672802dcf1d36a50f32,2024-12-12T19:49:49.800000 CVE-2024-53675,0,0,1183b1bd94841ad73311a268c8a0b2c37f3657514fc74825a9481690ca681ab0,2024-12-12T19:48:48.443000 CVE-2024-53676,0,0,9e5335d7636e62fb7cc2e79040736f3f5e3856b52ef7bfb0006141b3e5724acd,2024-12-11T16:49:45.783000 -CVE-2024-53677,0,0,b609243c036f17eeee5716ce5982790964aead13c9071ef1069dc5264f78d358,2024-12-16T10:15:06.330000 +CVE-2024-53677,0,1,b20f80da36871f8fb5324e3fc1c5ec83c8e6575f3a46d6f78ed41ab00c5aabf8,2024-12-18T01:15:06.237000 CVE-2024-5368,0,0,0267b73ce86fd5c42a4c0cf503f4bdead8427924f402a3554f435c1bc916f416,2024-11-21T09:47:30.877000 CVE-2024-5369,0,0,14abdfed4d5003ff16a96b2708e00658833baa1f8166ee56f5ba2dba896b20f5,2024-11-21T09:47:31.020000 CVE-2024-53691,0,0,09846e368cf7a07a1d919202728e77d0589572ed56c2c2f1bb03db07c3ec7fb0,2024-12-06T17:15:10.520000 @@ -270412,7 +270412,7 @@ CVE-2024-55946,0,0,fc4f0ce08741733d6f453b541d54aef404252708bb0bc4e901bbe32fa2942 CVE-2024-55949,0,0,fec4714a7969da92415b3b75b53f65d595fb44a2f90ba2d94f1f93dfae92a1f1,2024-12-16T20:15:13.683000 CVE-2024-5595,0,0,5c3da38e1b5f1812e17cdadfa64cfac3c13c5342e8821d9036b7da1dd32b505d,2024-08-02T17:35:43.927000 CVE-2024-55951,0,0,0f2ba68ba5d937d3f08ffc28ee064a50ef5129020d2db58a508d614718a5fb19,2024-12-16T20:15:13.823000 -CVE-2024-55956,0,0,f8dba9cc41cb9c12a5d90cb11c5a713786122e87fdd5f0d27b32d4206660fe63,2024-12-16T18:15:12.170000 +CVE-2024-55956,0,1,4dbbe7b27f9e49431f04e908bb363b692252b89466a6d6e1764b8f489f042f8d,2024-12-18T02:00:02.997000 CVE-2024-5596,0,0,eb53dbc41b5b12ac359e7b7f77cdb6558119327982ea8ec36e1ee0087b4d4e06,2024-11-21T09:47:59.330000 CVE-2024-55969,0,0,9c57b4a45308acc7d73a4bbfc26f9862d4b6f355188666b7df28aa8e0565bef6,2024-12-16T17:15:12.337000 CVE-2024-5597,0,0,c028f291e4b563828a2ebebe088654ce56adccaea078f8905bc0de855460aa3c,2024-11-21T09:47:59.443000 @@ -273986,7 +273986,7 @@ CVE-2024-9775,0,0,67011f9891bd518291e230fce5bb1e646dc07c3ccf350d707077824dc26595 CVE-2024-9776,0,0,691b7d4a970bfdfe6f45a48f305ac12244ac4e899e8a5e612ebd4c9c1703b9b5,2024-11-25T18:45:54.377000 CVE-2024-9777,0,0,93ee86692c4d166322b2f54769a2de3ae116ef1efe45b8b5542abe4611d31128,2024-11-29T20:57:53.423000 CVE-2024-9778,0,0,4286b148900a181fcf4357f30966399daed38ba90ac9bbc9d3c0e746c2f9499c,2024-11-25T19:20:37.163000 -CVE-2024-9779,1,1,184538a4f09dab7a4e79a2febe5b32315c96fa276deeb9dbce36217285c0ac67,2024-12-17T23:15:05.603000 +CVE-2024-9779,0,0,184538a4f09dab7a4e79a2febe5b32315c96fa276deeb9dbce36217285c0ac67,2024-12-17T23:15:05.603000 CVE-2024-9780,0,0,34097d04ca09fcb52346a937391687c2669115ee78117cb32b65565beb1f73d5,2024-10-17T14:18:18.433000 CVE-2024-9781,0,0,ced1c8001d752cc843e34081bf2e4d9e4751f03ea9a9263bc0ae7465d284c244,2024-11-25T18:09:33.853000 CVE-2024-9782,0,0,70dc6223aaf6c5771e0644ddb1dc552fdd17e48d755765fdb2f763bf7bfd654d,2024-10-16T16:44:19.637000