diff --git a/2019/25xxx/GSD-2019-25210.json b/2019/25xxx/GSD-2019-25210.json new file mode 100644 index 00000000000..22b4f67d336 --- /dev/null +++ b/2019/25xxx/GSD-2019-25210.json @@ -0,0 +1,114 @@ +{ + "gsd": { + "metadata": { + "exploitCode": "unknown", + "remediation": "unknown", + "reportConfidence": "confirmed", + "type": "vulnerability" + }, + "osvSchema": { + "aliases": [ + "CVE-2019-25210" + ], + "details": "An issue was discovered in Cloud Native Computing Foundation (CNCF) Helm through 3.13.3. It displays values of secrets when the --dry-run flag is used. This is a security concern in some use cases, such as a --dry-run call by a CI/CD tool. NOTE: the vendor's position is that this behavior was introduced intentionally, and cannot be removed without breaking backwards compatibility (some users may be relying on these values).", + "id": "GSD-2019-25210", + "modified": "2024-03-04T06:05:46.530052Z", + "schema_version": "1.4.0" + } + }, + "namespaces": { + "cve.org": { + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-25210", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Cloud Native Computing Foundation (CNCF) Helm through 3.13.3. It displays values of secrets when the --dry-run flag is used. This is a security concern in some use cases, such as a --dry-run call by a CI/CD tool. NOTE: the vendor's position is that this behavior was introduced intentionally, and cannot be removed without breaking backwards compatibility (some users may be relying on these values)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/helm/helm/issues/7275", + "refsource": "MISC", + "url": "https://github.com/helm/helm/issues/7275" + }, + { + "name": "https://www.cncf.io/projects/helm/", + "refsource": "MISC", + "url": "https://www.cncf.io/projects/helm/" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Cloud Native Computing Foundation (CNCF) Helm through 3.13.3. It displays values of secrets when the --dry-run flag is used. This is a security concern in some use cases, such as a --dry-run call by a CI/CD tool. NOTE: the vendor's position is that this behavior was introduced intentionally, and cannot be removed without breaking backwards compatibility (some users may be relying on these values)." + } + ], + "id": "CVE-2019-25210", + "lastModified": "2024-03-03T21:15:49.867", + "metrics": {}, + "published": "2024-03-03T21:15:49.867", + "references": [ + { + "source": "cve@mitre.org", + "url": "https://github.com/helm/helm/issues/7275" + }, + { + "source": "cve@mitre.org", + "url": "https://www.cncf.io/projects/helm/" + } + ], + "sourceIdentifier": "cve@mitre.org", + "vulnStatus": "Received" + } + } + } +} \ No newline at end of file diff --git a/2022/43xxx/GSD-2022-43880.json b/2022/43xxx/GSD-2022-43880.json index e547f09c90f..f35dadd3355 100644 --- a/2022/43xxx/GSD-2022-43880.json +++ b/2022/43xxx/GSD-2022-43880.json @@ -14,6 +14,7 @@ "aliases": [ "CVE-2022-43880" ], + "details": "IBM QRadar WinCollect Agent 10.0 through 10.1.2 could allow a privileged user to cause a denial of service. IBM X-Force ID: 240151.", "id": "GSD-2022-43880", "modified": "2023-12-13T01:19:32.066724Z", "schema_version": "1.4.0" @@ -22,9 +23,34 @@ "namespaces": { "cve.org": { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "psirt@us.ibm.com", "ID": "CVE-2022-43880", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "QRadar WinCollect Agent ", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "10.0", + "version_value": "10.1.2" + } + ] + } + } + ] + }, + "vendor_name": "IBM" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -33,7 +59,119 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM QRadar WinCollect Agent 10.0 through 10.1.2 could allow a privileged user to cause a denial of service. IBM X-Force ID: 240151." + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "cweId": "CWE-400", + "lang": "eng", + "value": "CWE-400 Uncontrolled Resource Consumption" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.ibm.com/support/pages/node/6980843", + "refsource": "MISC", + "url": "https://www.ibm.com/support/pages/node/6980843" + }, + { + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/240151", + "refsource": "MISC", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/240151" + } + ] + }, + "source": { + "discovery": "UNKNOWN" + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "IBM QRadar WinCollect Agent 10.0 through 10.1.2 could allow a privileged user to cause a denial of service. IBM X-Force ID: 240151." + } + ], + "id": "CVE-2022-43880", + "lastModified": "2024-03-03T16:15:49.570", + "metrics": { + "cvssMetricV31": [ + { + "cvssData": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6, + "source": "psirt@us.ibm.com", + "type": "Secondary" + } + ] + }, + "published": "2024-03-03T16:15:49.570", + "references": [ + { + "source": "psirt@us.ibm.com", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/240151" + }, + { + "source": "psirt@us.ibm.com", + "url": "https://www.ibm.com/support/pages/node/6980843" + } + ], + "sourceIdentifier": "psirt@us.ibm.com", + "vulnStatus": "Received", + "weaknesses": [ + { + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ], + "source": "psirt@us.ibm.com", + "type": "Primary" } ] } diff --git a/2022/48xxx/GSD-2022-48676.json b/2022/48xxx/GSD-2022-48676.json new file mode 100644 index 00000000000..a90bc5c16c1 --- /dev/null +++ b/2022/48xxx/GSD-2022-48676.json @@ -0,0 +1,38 @@ +{ + "gsd": { + "metadata": { + "exploitCode": "unknown", + "remediation": "unknown", + "reportConfidence": "confirmed", + "type": "vulnerability" + }, + "osvSchema": { + "aliases": [ + "CVE-2022-48676" + ], + "id": "GSD-2022-48676", + "modified": "2024-03-04T06:00:40.174493Z", + "schema_version": "1.4.0" + } + }, + "namespaces": { + "cve.org": { + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2022-48676", + "STATE": "RESERVED" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } + } + } +} \ No newline at end of file diff --git a/2022/48xxx/GSD-2022-48677.json b/2022/48xxx/GSD-2022-48677.json new file mode 100644 index 00000000000..2fb25a335f7 --- /dev/null +++ b/2022/48xxx/GSD-2022-48677.json @@ -0,0 +1,38 @@ +{ + "gsd": { + "metadata": { + "exploitCode": "unknown", + "remediation": "unknown", + "reportConfidence": "confirmed", + "type": "vulnerability" + }, + "osvSchema": { + "aliases": [ + "CVE-2022-48677" + ], + "id": "GSD-2022-48677", + "modified": "2024-03-04T06:00:40.579353Z", + "schema_version": "1.4.0" + } + }, + "namespaces": { + "cve.org": { + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2022-48677", + "STATE": "RESERVED" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } + } + } +} \ No newline at end of file diff --git a/2022/48xxx/GSD-2022-48678.json b/2022/48xxx/GSD-2022-48678.json new file mode 100644 index 00000000000..dffa1e76193 --- /dev/null +++ b/2022/48xxx/GSD-2022-48678.json @@ -0,0 +1,38 @@ +{ + "gsd": { + "metadata": { + "exploitCode": "unknown", + "remediation": "unknown", + "reportConfidence": "confirmed", + "type": "vulnerability" + }, + "osvSchema": { + "aliases": [ + "CVE-2022-48678" + ], + "id": "GSD-2022-48678", + "modified": "2024-03-04T06:00:40.202712Z", + "schema_version": "1.4.0" + } + }, + "namespaces": { + "cve.org": { + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2022-48678", + "STATE": "RESERVED" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } + } + } +} \ No newline at end of file diff --git a/2022/48xxx/GSD-2022-48679.json b/2022/48xxx/GSD-2022-48679.json new file mode 100644 index 00000000000..dcba28eb947 --- /dev/null +++ b/2022/48xxx/GSD-2022-48679.json @@ -0,0 +1,38 @@ +{ + "gsd": { + "metadata": { + "exploitCode": "unknown", + "remediation": "unknown", + "reportConfidence": "confirmed", + "type": "vulnerability" + }, + "osvSchema": { + "aliases": [ + "CVE-2022-48679" + ], + "id": "GSD-2022-48679", + "modified": "2024-03-04T06:00:40.527062Z", + "schema_version": "1.4.0" + } + }, + "namespaces": { + "cve.org": { + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2022-48679", + "STATE": "RESERVED" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } + } + } +} \ No newline at end of file diff --git a/2023/27xxx/GSD-2023-27291.json b/2023/27xxx/GSD-2023-27291.json index 774fd811baf..70f7d03a3f4 100644 --- a/2023/27xxx/GSD-2023-27291.json +++ b/2023/27xxx/GSD-2023-27291.json @@ -14,6 +14,7 @@ "aliases": [ "CVE-2023-27291" ], + "details": "IBM Watson CP4D Data Stores 4.6.0, 4.6.1, 4.6.2, and 4.6.3 does not encrypt sensitive or critical information before storage or transmission which could allow an attacker to obtain sensitive information. IBM X-Force ID: 248740.", "id": "GSD-2023-27291", "modified": "2023-12-13T01:20:55.900295Z", "schema_version": "1.4.0" @@ -22,9 +23,33 @@ "namespaces": { "cve.org": { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "psirt@us.ibm.com", "ID": "CVE-2023-27291", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Watson CP4D Data Stores", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.6.0, 4.6.1, 4.6.2, 4.6.3" + } + ] + } + } + ] + }, + "vendor_name": "IBM" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -33,7 +58,119 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Watson CP4D Data Stores 4.6.0, 4.6.1, 4.6.2, and 4.6.3 does not encrypt sensitive or critical information before storage or transmission which could allow an attacker to obtain sensitive information. IBM X-Force ID: 248740." + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 4.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N", + "version": "3.1" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "cweId": "CWE-311", + "lang": "eng", + "value": "CWE-311 Missing Encryption of Sensitive Data" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.ibm.com/support/pages/node/6965458", + "refsource": "MISC", + "url": "https://www.ibm.com/support/pages/node/6965458" + }, + { + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/248740", + "refsource": "MISC", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/248740" + } + ] + }, + "source": { + "discovery": "UNKNOWN" + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "IBM Watson CP4D Data Stores 4.6.0, 4.6.1, 4.6.2, and 4.6.3 does not encrypt sensitive or critical information before storage or transmission which could allow an attacker to obtain sensitive information. IBM X-Force ID: 248740." + } + ], + "id": "CVE-2023-27291", + "lastModified": "2024-03-03T16:15:49.777", + "metrics": { + "cvssMetricV31": [ + { + "cvssData": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 4.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N", + "version": "3.1" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6, + "source": "psirt@us.ibm.com", + "type": "Secondary" + } + ] + }, + "published": "2024-03-03T16:15:49.777", + "references": [ + { + "source": "psirt@us.ibm.com", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/248740" + }, + { + "source": "psirt@us.ibm.com", + "url": "https://www.ibm.com/support/pages/node/6965458" + } + ], + "sourceIdentifier": "psirt@us.ibm.com", + "vulnStatus": "Received", + "weaknesses": [ + { + "description": [ + { + "lang": "en", + "value": "CWE-311" + } + ], + "source": "psirt@us.ibm.com", + "type": "Primary" } ] } diff --git a/2023/28xxx/GSD-2023-28512.json b/2023/28xxx/GSD-2023-28512.json index 0b9af20907b..ec5ad893166 100644 --- a/2023/28xxx/GSD-2023-28512.json +++ b/2023/28xxx/GSD-2023-28512.json @@ -14,6 +14,7 @@ "aliases": [ "CVE-2023-28512" ], + "details": "IBM Watson CP4D Data Stores 4.6.0, 4.6.1, and 4.6.2 could allow an attacker with specific knowledge about the system to manipulate data due to improper input validation. IBM X-Force ID: 250396.", "id": "GSD-2023-28512", "modified": "2023-12-13T01:20:48.681835Z", "schema_version": "1.4.0" @@ -22,9 +23,33 @@ "namespaces": { "cve.org": { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "psirt@us.ibm.com", "ID": "CVE-2023-28512", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Watson CP4D Data Stores", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.6.0, 4.6.1, 4.6.2" + } + ] + } + } + ] + }, + "vendor_name": "IBM" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -33,7 +58,119 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Watson CP4D Data Stores 4.6.0, 4.6.1, and 4.6.2 could allow an attacker with specific knowledge about the system to manipulate data due to improper input validation. IBM X-Force ID: 250396." + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", + "version": "3.1" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "cweId": "CWE-472", + "lang": "eng", + "value": "CWE-472 External Control of Assumed-Immutable Web Parameter" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.ibm.com/support/pages/node/6965456", + "refsource": "MISC", + "url": "https://www.ibm.com/support/pages/node/6965456" + }, + { + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/250396", + "refsource": "MISC", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/250396" + } + ] + }, + "source": { + "discovery": "UNKNOWN" + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "IBM Watson CP4D Data Stores 4.6.0, 4.6.1, and 4.6.2 could allow an attacker with specific knowledge about the system to manipulate data due to improper input validation. IBM X-Force ID: 250396." + } + ], + "id": "CVE-2023-28512", + "lastModified": "2024-03-03T16:15:49.983", + "metrics": { + "cvssMetricV31": [ + { + "cvssData": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", + "version": "3.1" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6, + "source": "psirt@us.ibm.com", + "type": "Secondary" + } + ] + }, + "published": "2024-03-03T16:15:49.983", + "references": [ + { + "source": "psirt@us.ibm.com", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/250396" + }, + { + "source": "psirt@us.ibm.com", + "url": "https://www.ibm.com/support/pages/node/6965456" + } + ], + "sourceIdentifier": "psirt@us.ibm.com", + "vulnStatus": "Received", + "weaknesses": [ + { + "description": [ + { + "lang": "en", + "value": "CWE-472" + } + ], + "source": "psirt@us.ibm.com", + "type": "Primary" } ] } diff --git a/2023/43xxx/GSD-2023-43054.json b/2023/43xxx/GSD-2023-43054.json index 1c0dda83716..e1991d94019 100644 --- a/2023/43xxx/GSD-2023-43054.json +++ b/2023/43xxx/GSD-2023-43054.json @@ -14,6 +14,7 @@ "aliases": [ "CVE-2023-43054" ], + "details": "IBM Engineering Test Management 7.0.2 and 7.0.3 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 267459.", "id": "GSD-2023-43054", "modified": "2023-12-13T01:20:44.993425Z", "schema_version": "1.4.0" @@ -22,9 +23,33 @@ "namespaces": { "cve.org": { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "psirt@us.ibm.com", "ID": "CVE-2023-43054", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Engineering Test Management", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "7.0.2, 7.0.3" + } + ] + } + } + ] + }, + "vendor_name": "IBM" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -33,7 +58,119 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Engineering Test Management 7.0.2 and 7.0.3 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 267459." + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "version": "3.1" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "cweId": "CWE-79", + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.ibm.com/support/pages/node/7122399", + "refsource": "MISC", + "url": "https://www.ibm.com/support/pages/node/7122399" + }, + { + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/267459", + "refsource": "MISC", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/267459" + } + ] + }, + "source": { + "discovery": "UNKNOWN" + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "IBM Engineering Test Management 7.0.2 and 7.0.3 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 267459." + } + ], + "id": "CVE-2023-43054", + "lastModified": "2024-03-03T13:15:06.880", + "metrics": { + "cvssMetricV31": [ + { + "cvssData": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "version": "3.1" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7, + "source": "psirt@us.ibm.com", + "type": "Secondary" + } + ] + }, + "published": "2024-03-03T13:15:06.880", + "references": [ + { + "source": "psirt@us.ibm.com", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/267459" + }, + { + "source": "psirt@us.ibm.com", + "url": "https://www.ibm.com/support/pages/node/7122399" + } + ], + "sourceIdentifier": "psirt@us.ibm.com", + "vulnStatus": "Received", + "weaknesses": [ + { + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ], + "source": "psirt@us.ibm.com", + "type": "Primary" } ] } diff --git a/2023/47xxx/GSD-2023-47742.json b/2023/47xxx/GSD-2023-47742.json index 756d57c709a..dd51e282041 100644 --- a/2023/47xxx/GSD-2023-47742.json +++ b/2023/47xxx/GSD-2023-47742.json @@ -14,6 +14,7 @@ "aliases": [ "CVE-2023-47742" ], + "details": "IBM QRadar Suite Products 1.10.12.0 through 1.10.18.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 could disclose sensitive information using man in the middle techniques due to not correctly enforcing all aspects of certificate validation in some circumstances. IBM X-Force ID: 272533.", "id": "GSD-2023-47742", "modified": "2023-12-13T01:20:51.569572Z", "schema_version": "1.4.0" @@ -22,9 +23,46 @@ "namespaces": { "cve.org": { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "psirt@us.ibm.com", "ID": "CVE-2023-47742", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "QRadar Suite Products", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "1.10.12.0", + "version_value": "1.10.18.0" + } + ] + } + }, + { + "product_name": "Cloud Pak for Security", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "1.10.0.0", + "version_value": "1.10.11.0" + } + ] + } + } + ] + }, + "vendor_name": "IBM" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -33,7 +71,119 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM QRadar Suite Products 1.10.12.0 through 1.10.18.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 could disclose sensitive information using man in the middle techniques due to not correctly enforcing all aspects of certificate validation in some circumstances. IBM X-Force ID: 272533." + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "cweId": "CWE-300", + "lang": "eng", + "value": "CWE-300 Channel Accessible by Non-Endpoint ('Man-in-the-Middle')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.ibm.com/support/pages/node/7129328", + "refsource": "MISC", + "url": "https://www.ibm.com/support/pages/node/7129328" + }, + { + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/272533", + "refsource": "MISC", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/272533" + } + ] + }, + "source": { + "discovery": "UNKNOWN" + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "IBM QRadar Suite Products 1.10.12.0 through 1.10.18.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 could disclose sensitive information using man in the middle techniques due to not correctly enforcing all aspects of certificate validation in some circumstances. IBM X-Force ID: 272533." + } + ], + "id": "CVE-2023-47742", + "lastModified": "2024-03-03T13:15:07.090", + "metrics": { + "cvssMetricV31": [ + { + "cvssData": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6, + "source": "psirt@us.ibm.com", + "type": "Secondary" + } + ] + }, + "published": "2024-03-03T13:15:07.090", + "references": [ + { + "source": "psirt@us.ibm.com", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/272533" + }, + { + "source": "psirt@us.ibm.com", + "url": "https://www.ibm.com/support/pages/node/7129328" + } + ], + "sourceIdentifier": "psirt@us.ibm.com", + "vulnStatus": "Received", + "weaknesses": [ + { + "description": [ + { + "lang": "en", + "value": "CWE-300" + } + ], + "source": "psirt@us.ibm.com", + "type": "Primary" } ] } diff --git a/2023/47xxx/GSD-2023-47745.json b/2023/47xxx/GSD-2023-47745.json index 63b5e1c001f..4352faa3044 100644 --- a/2023/47xxx/GSD-2023-47745.json +++ b/2023/47xxx/GSD-2023-47745.json @@ -14,6 +14,7 @@ "aliases": [ "CVE-2023-47745" ], + "details": "IBM MQ Operator 2.0.0 LTS, 2.0.18 LTS, 3.0.0 CD, 3.0.1 CD, 2.4.0 through 2.4.7, 2.3.0 through 2.3.3, 2.2.0 through 2.2.2, and 2.3.0 through 2.3.3 stores or transmits user credentials in plain clear text which can be read by a local user using a trace command. IBM X-Force ID: 272638.", "id": "GSD-2023-47745", "modified": "2023-12-13T01:20:51.840218Z", "schema_version": "1.4.0" @@ -22,9 +23,54 @@ "namespaces": { "cve.org": { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "psirt@us.ibm.com", "ID": "CVE-2023-47745", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "MQ Operator", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "2.0.0 LTS", + "version_value": "2.0.18 LTS" + }, + { + "version_affected": "<=", + "version_name": "2.4.0", + "version_value": "2.4.7" + }, + { + "version_affected": "<=", + "version_name": "2.3.0", + "version_value": "2.3.3" + }, + { + "version_affected": "<=", + "version_name": "2.2.0", + "version_value": "2.2.2" + }, + { + "version_affected": "<=", + "version_name": "3.0.0 CD", + "version_value": "3.0.1 CD" + } + ] + } + } + ] + }, + "vendor_name": "IBM" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -33,7 +79,119 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM MQ Operator 2.0.0 LTS, 2.0.18 LTS, 3.0.0 CD, 3.0.1 CD, 2.4.0 through 2.4.7, 2.3.0 through 2.3.3, 2.2.0 through 2.2.2, and 2.3.0 through 2.3.3 stores or transmits user credentials in plain clear text which can be read by a local user using a trace command. IBM X-Force ID: 272638." + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 6.2, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "cweId": "CWE-319", + "lang": "eng", + "value": "CWE-319 Cleartext Transmission of Sensitive Information" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.ibm.com/support/pages/node/7126571", + "refsource": "MISC", + "url": "https://www.ibm.com/support/pages/node/7126571" + }, + { + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/272638", + "refsource": "MISC", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/272638" + } + ] + }, + "source": { + "discovery": "UNKNOWN" + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "IBM MQ Operator 2.0.0 LTS, 2.0.18 LTS, 3.0.0 CD, 3.0.1 CD, 2.4.0 through 2.4.7, 2.3.0 through 2.3.3, 2.2.0 through 2.2.2, and 2.3.0 through 2.3.3 stores or transmits user credentials in plain clear text which can be read by a local user using a trace command. IBM X-Force ID: 272638." + } + ], + "id": "CVE-2023-47745", + "lastModified": "2024-03-03T12:15:36.280", + "metrics": { + "cvssMetricV31": [ + { + "cvssData": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 6.2, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6, + "source": "psirt@us.ibm.com", + "type": "Secondary" + } + ] + }, + "published": "2024-03-03T12:15:36.280", + "references": [ + { + "source": "psirt@us.ibm.com", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/272638" + }, + { + "source": "psirt@us.ibm.com", + "url": "https://www.ibm.com/support/pages/node/7126571" + } + ], + "sourceIdentifier": "psirt@us.ibm.com", + "vulnStatus": "Received", + "weaknesses": [ + { + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ], + "source": "psirt@us.ibm.com", + "type": "Primary" } ] } diff --git a/2023/4xxx/GSD-2023-4408.json b/2023/4xxx/GSD-2023-4408.json index df588992d33..f16519d5f15 100644 --- a/2023/4xxx/GSD-2023-4408.json +++ b/2023/4xxx/GSD-2023-4408.json @@ -156,6 +156,11 @@ "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/" + }, + { + "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/", + "refsource": "MISC", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/" } ] }, @@ -188,7 +193,7 @@ } ], "id": "CVE-2023-4408", - "lastModified": "2024-02-26T16:27:47.427", + "lastModified": "2024-03-04T03:15:06.087", "metrics": { "cvssMetricV31": [ { @@ -234,6 +239,10 @@ { "source": "security-officer@isc.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/" + }, + { + "source": "security-officer@isc.org", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/" } ], "sourceIdentifier": "security-officer@isc.org", diff --git a/2023/50xxx/GSD-2023-50387.json b/2023/50xxx/GSD-2023-50387.json index 96ab355aef1..828050fc601 100644 --- a/2023/50xxx/GSD-2023-50387.json +++ b/2023/50xxx/GSD-2023-50387.json @@ -209,6 +209,11 @@ "name": "FEDORA-2024-e00eceb11c", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/" + }, + { + "name": "FEDORA-2024-fae88b73eb", + "refsource": "FEDORA", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/" } ] } @@ -428,7 +433,7 @@ } ], "id": "CVE-2023-50387", - "lastModified": "2024-02-29T03:15:06.693", + "lastModified": "2024-03-04T03:15:06.217", "metrics": { "cvssMetricV31": [ { @@ -554,6 +559,10 @@ "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/" }, + { + "source": "cve@mitre.org", + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/" + }, { "source": "cve@mitre.org", "tags": [ diff --git a/2023/50xxx/GSD-2023-50868.json b/2023/50xxx/GSD-2023-50868.json index cc9ede0adac..9bf7db44183 100644 --- a/2023/50xxx/GSD-2023-50868.json +++ b/2023/50xxx/GSD-2023-50868.json @@ -175,6 +175,11 @@ "name": "FEDORA-2024-e00eceb11c", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/" + }, + { + "name": "FEDORA-2024-fae88b73eb", + "refsource": "FEDORA", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/" } ] } @@ -192,7 +197,7 @@ } ], "id": "CVE-2023-50868", - "lastModified": "2024-02-29T03:15:06.817", + "lastModified": "2024-03-04T03:15:06.500", "metrics": {}, "published": "2024-02-14T16:15:45.377", "references": [ @@ -268,6 +273,10 @@ "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/" }, + { + "source": "cve@mitre.org", + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/" + }, { "source": "cve@mitre.org", "url": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html" diff --git a/2023/52xxx/GSD-2023-52466.json b/2023/52xxx/GSD-2023-52466.json index 7f026c4df0f..04529ffa2c9 100644 --- a/2023/52xxx/GSD-2023-52466.json +++ b/2023/52xxx/GSD-2023-52466.json @@ -21,68 +21,7 @@ "CVE_data_meta": { "ASSIGNER": "cve@kernel.org", "ID": "CVE-2023-52466", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Linux", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "09cc90063240", - "version_value": "5b3e25efe16e" - }, - { - "version_value": "not down converted", - "x_cve_json_5_version_data": { - "defaultStatus": "affected", - "versions": [ - { - "status": "affected", - "version": "6.4" - }, - { - "lessThan": "6.4", - "status": "unaffected", - "version": "0", - "versionType": "custom" - }, - { - "lessThanOrEqual": "6.6.*", - "status": "unaffected", - "version": "6.6.14", - "versionType": "custom" - }, - { - "lessThanOrEqual": "6.7.*", - "status": "unaffected", - "version": "6.7.2", - "versionType": "custom" - }, - { - "lessThanOrEqual": "*", - "status": "unaffected", - "version": "6.8-rc1", - "versionType": "original_commit_for_fix" - } - ] - } - } - ] - } - } - ] - }, - "vendor_name": "Linux" - } - ] - } + "STATE": "REJECT" }, "data_format": "MITRE", "data_type": "CVE", @@ -91,41 +30,7 @@ "description_data": [ { "lang": "eng", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: Avoid potential out-of-bounds read in pci_dev_for_each_resource()\n\nCoverity complains that pointer in the pci_dev_for_each_resource() may be\nwrong, i.e., might be used for the out-of-bounds read.\n\nThere is no actual issue right now because we have another check afterwards\nand the out-of-bounds read is not being performed. In any case it's better\ncode with this fixed, hence the proposed change.\n\nAs Jonas pointed out \"It probably makes the code slightly less performant\nas res will now be checked for being not NULL (which will always be true),\nbut I doubt it will be significant (or in any hot paths).\"" - } - ] - }, - "generator": { - "engine": "bippy-5e66918c8507" - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "n/a" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://git.kernel.org/stable/c/5b3e25efe16e06779a9a7c7610217c1b921ec179", - "refsource": "MISC", - "url": "https://git.kernel.org/stable/c/5b3e25efe16e06779a9a7c7610217c1b921ec179" - }, - { - "name": "https://git.kernel.org/stable/c/bd26159dcaaa3e9a927070efd348e7ce7e5ee933", - "refsource": "MISC", - "url": "https://git.kernel.org/stable/c/bd26159dcaaa3e9a927070efd348e7ce7e5ee933" - }, - { - "name": "https://git.kernel.org/stable/c/3171e46d677a668eed3086da78671f1e4f5b8405", - "refsource": "MISC", - "url": "https://git.kernel.org/stable/c/3171e46d677a668eed3086da78671f1e4f5b8405" + "value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ] } @@ -135,29 +40,16 @@ "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: Avoid potential out-of-bounds read in pci_dev_for_each_resource()\n\nCoverity complains that pointer in the pci_dev_for_each_resource() may be\nwrong, i.e., might be used for the out-of-bounds read.\n\nThere is no actual issue right now because we have another check afterwards\nand the out-of-bounds read is not being performed. In any case it's better\ncode with this fixed, hence the proposed change.\n\nAs Jonas pointed out \"It probably makes the code slightly less performant\nas res will now be checked for being not NULL (which will always be true),\nbut I doubt it will be significant (or in any hot paths).\"" + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "id": "CVE-2023-52466", - "lastModified": "2024-02-26T16:32:25.577", + "lastModified": "2024-03-03T08:15:07.860", "metrics": {}, "published": "2024-02-26T16:27:48.600", - "references": [ - { - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "url": "https://git.kernel.org/stable/c/3171e46d677a668eed3086da78671f1e4f5b8405" - }, - { - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "url": "https://git.kernel.org/stable/c/5b3e25efe16e06779a9a7c7610217c1b921ec179" - }, - { - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "url": "https://git.kernel.org/stable/c/bd26159dcaaa3e9a927070efd348e7ce7e5ee933" - } - ], + "references": [], "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "vulnStatus": "Awaiting Analysis" + "vulnStatus": "Rejected" } } } diff --git a/2023/5xxx/GSD-2023-5517.json b/2023/5xxx/GSD-2023-5517.json index 9ee9f51ae63..e557d4a0aa6 100644 --- a/2023/5xxx/GSD-2023-5517.json +++ b/2023/5xxx/GSD-2023-5517.json @@ -145,6 +145,11 @@ "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/" + }, + { + "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/", + "refsource": "MISC", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/" } ] }, @@ -177,7 +182,7 @@ } ], "id": "CVE-2023-5517", - "lastModified": "2024-02-26T16:27:49.033", + "lastModified": "2024-03-04T03:15:06.577", "metrics": { "cvssMetricV31": [ { @@ -223,6 +228,10 @@ { "source": "security-officer@isc.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/" + }, + { + "source": "security-officer@isc.org", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/" } ], "sourceIdentifier": "security-officer@isc.org", diff --git a/2023/5xxx/GSD-2023-5679.json b/2023/5xxx/GSD-2023-5679.json index f1a671d8ac9..132d63a1345 100644 --- a/2023/5xxx/GSD-2023-5679.json +++ b/2023/5xxx/GSD-2023-5679.json @@ -145,6 +145,11 @@ "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/" + }, + { + "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/", + "refsource": "MISC", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/" } ] }, @@ -177,7 +182,7 @@ } ], "id": "CVE-2023-5679", - "lastModified": "2024-02-26T16:27:49.143", + "lastModified": "2024-03-04T03:15:06.680", "metrics": { "cvssMetricV31": [ { @@ -223,6 +228,10 @@ { "source": "security-officer@isc.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/" + }, + { + "source": "security-officer@isc.org", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/" } ], "sourceIdentifier": "security-officer@isc.org", diff --git a/2023/6xxx/GSD-2023-6516.json b/2023/6xxx/GSD-2023-6516.json index 42a21b68336..39756f8a5e1 100644 --- a/2023/6xxx/GSD-2023-6516.json +++ b/2023/6xxx/GSD-2023-6516.json @@ -126,6 +126,11 @@ "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/" + }, + { + "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/", + "refsource": "MISC", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/" } ] }, @@ -158,7 +163,7 @@ } ], "id": "CVE-2023-6516", - "lastModified": "2024-02-19T03:15:08.343", + "lastModified": "2024-03-04T03:15:06.827", "metrics": { "cvssMetricV31": [ { @@ -196,6 +201,10 @@ { "source": "security-officer@isc.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/" + }, + { + "source": "security-officer@isc.org", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/" } ], "sourceIdentifier": "security-officer@isc.org", diff --git a/2024/0xxx/GSD-2024-0765.json b/2024/0xxx/GSD-2024-0765.json index dcf681bfab4..249e55534f8 100644 --- a/2024/0xxx/GSD-2024-0765.json +++ b/2024/0xxx/GSD-2024-0765.json @@ -10,6 +10,7 @@ "aliases": [ "CVE-2024-0765" ], + "details": "As a default user on a multi-user instance of AnythingLLM, you could execute a call to the `/export-data` endpoint of the system and then unzip and read that export that would enable you do exfiltrate data of the system at that save state.\n\nThis would require the attacked to be granted explicit access to the system, but they can do this at any role. Additionally, post-download, the data is deleted so no evidence would exist that the exfiltration occured.", "id": "GSD-2024-0765", "modified": "2024-01-20T06:02:15.863545Z", "schema_version": "1.4.0" @@ -18,9 +19,34 @@ "namespaces": { "cve.org": { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "security@huntr.com", "ID": "CVE-2024-0765", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "mintplex-labs/anything-llm", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "unspecified", + "version_value": "1.0.0" + } + ] + } + } + ] + }, + "vendor_name": "mintplex-labs" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -29,7 +55,117 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "As a default user on a multi-user instance of AnythingLLM, you could execute a call to the `/export-data` endpoint of the system and then unzip and read that export that would enable you do exfiltrate data of the system at that save state.\n\nThis would require the attacked to be granted explicit access to the system, but they can do this at any role. Additionally, post-download, the data is deleted so no evidence would exist that the exfiltration occured." + } + ] + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N", + "version": "3.0" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "cweId": "CWE-200", + "lang": "eng", + "value": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://huntr.com/bounties/8978ab27-710c-44ce-bfd8-a2ea416dc786", + "refsource": "MISC", + "url": "https://huntr.com/bounties/8978ab27-710c-44ce-bfd8-a2ea416dc786" + }, + { + "name": "https://github.com/mintplex-labs/anything-llm/commit/08d33cfd8fc47c5052b6ea29597c964a9da641e2", + "refsource": "MISC", + "url": "https://github.com/mintplex-labs/anything-llm/commit/08d33cfd8fc47c5052b6ea29597c964a9da641e2" + } + ] + }, + "source": { + "advisory": "8978ab27-710c-44ce-bfd8-a2ea416dc786", + "discovery": "EXTERNAL" + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "As a default user on a multi-user instance of AnythingLLM, you could execute a call to the `/export-data` endpoint of the system and then unzip and read that export that would enable you do exfiltrate data of the system at that save state.\n\nThis would require the attacked to be granted explicit access to the system, but they can do this at any role. Additionally, post-download, the data is deleted so no evidence would exist that the exfiltration occured." + } + ], + "id": "CVE-2024-0765", + "lastModified": "2024-03-03T15:15:07.113", + "metrics": { + "cvssMetricV30": [ + { + "cvssData": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N", + "version": "3.0" + }, + "exploitabilityScore": 3.1, + "impactScore": 5.8, + "source": "security@huntr.dev", + "type": "Secondary" + } + ] + }, + "published": "2024-03-03T15:15:07.113", + "references": [ + { + "source": "security@huntr.dev", + "url": "https://github.com/mintplex-labs/anything-llm/commit/08d33cfd8fc47c5052b6ea29597c964a9da641e2" + }, + { + "source": "security@huntr.dev", + "url": "https://huntr.com/bounties/8978ab27-710c-44ce-bfd8-a2ea416dc786" + } + ], + "sourceIdentifier": "security@huntr.dev", + "vulnStatus": "Received", + "weaknesses": [ + { + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ], + "source": "security@huntr.dev", + "type": "Primary" } ] } diff --git a/2024/1xxx/GSD-2024-1923.json b/2024/1xxx/GSD-2024-1923.json index b838f63ccf9..60e20f58485 100644 --- a/2024/1xxx/GSD-2024-1923.json +++ b/2024/1xxx/GSD-2024-1923.json @@ -60,11 +60,11 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability was found in SourceCodester Simple Student Attendance System 1.0 and classified as critical. Affected by this issue is the function delete_class of the file /ajax-api.php of the component List of Classes Page. The manipulation of the argument id with the input 1337'+or+1=1;--+ leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-254858 is the identifier assigned to this vulnerability." + "value": "A vulnerability was found in SourceCodester Simple Student Attendance System 1.0 and classified as critical. Affected by this issue is the function delete_class/delete_student of the file /ajax-api.php of the component List of Classes Page. The manipulation of the argument id with the input 1337'+or+1=1;--+ leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-254858 is the identifier assigned to this vulnerability." }, { "lang": "deu", - "value": "Eine Schwachstelle wurde in SourceCodester Simple Student Attendance System 1.0 gefunden. Sie wurde als kritisch eingestuft. Betroffen davon ist die Funktion delete_class der Datei /ajax-api.php der Komponente List of Classes Page. Durch Beeinflussen des Arguments id mit der Eingabe 1337'+or+1=1;--+ mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + "value": "Eine Schwachstelle wurde in SourceCodester Simple Student Attendance System 1.0 gefunden. Sie wurde als kritisch eingestuft. Betroffen davon ist die Funktion delete_class/delete_student der Datei /ajax-api.php der Komponente List of Classes Page. Durch Beeinflussen des Arguments id mit der Eingabe 1337'+or+1=1;--+ mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ] }, @@ -127,7 +127,7 @@ "descriptions": [ { "lang": "en", - "value": "A vulnerability was found in SourceCodester Simple Student Attendance System 1.0 and classified as critical. Affected by this issue is the function delete_class of the file /ajax-api.php of the component List of Classes Page. The manipulation of the argument id with the input 1337'+or+1=1;--+ leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-254858 is the identifier assigned to this vulnerability." + "value": "A vulnerability was found in SourceCodester Simple Student Attendance System 1.0 and classified as critical. Affected by this issue is the function delete_class/delete_student of the file /ajax-api.php of the component List of Classes Page. The manipulation of the argument id with the input 1337'+or+1=1;--+ leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-254858 is the identifier assigned to this vulnerability." }, { "lang": "es", @@ -135,7 +135,7 @@ } ], "id": "CVE-2024-1923", - "lastModified": "2024-02-29T01:43:56.900", + "lastModified": "2024-03-03T15:15:07.427", "metrics": { "cvssMetricV2": [ { diff --git a/2024/20xxx/GSD-2024-20005.json b/2024/20xxx/GSD-2024-20005.json index 97186ed36c0..6d7d7c86235 100644 --- a/2024/20xxx/GSD-2024-20005.json +++ b/2024/20xxx/GSD-2024-20005.json @@ -14,6 +14,7 @@ "aliases": [ "CVE-2024-20005" ], + "details": "In da, there is a possible permission bypass due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08355599; Issue ID: ALPS08355599.", "id": "GSD-2024-20005", "modified": "2023-12-13T01:21:43.010045Z", "schema_version": "1.4.0" @@ -22,9 +23,33 @@ "namespaces": { "cve.org": { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "security@mediatek.com", "ID": "CVE-2024-20005", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8666, MT8666A, MT8666B, MT8667, MT8673, MT8675, MT8676, MT8678", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "Android 12.0, 13.0, 14.0" + } + ] + } + } + ] + }, + "vendor_name": "MediaTek, Inc." + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -33,9 +58,52 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In da, there is a possible permission bypass due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08355599; Issue ID: ALPS08355599." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] } ] + }, + "references": { + "reference_data": [ + { + "name": "https://corp.mediatek.com/product-security-bulletin/March-2024", + "refsource": "MISC", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "In da, there is a possible permission bypass due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08355599; Issue ID: ALPS08355599." + } + ], + "id": "CVE-2024-20005", + "lastModified": "2024-03-04T03:15:06.917", + "metrics": {}, + "published": "2024-03-04T03:15:06.917", + "references": [ + { + "source": "security@mediatek.com", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ], + "sourceIdentifier": "security@mediatek.com", + "vulnStatus": "Received" } } } diff --git a/2024/20xxx/GSD-2024-20017.json b/2024/20xxx/GSD-2024-20017.json index 579cd9e01d3..8b0f5c25ce1 100644 --- a/2024/20xxx/GSD-2024-20017.json +++ b/2024/20xxx/GSD-2024-20017.json @@ -14,6 +14,7 @@ "aliases": [ "CVE-2024-20017" ], + "details": "In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation Patch ID: WCNCR00350938; Issue ID: MSV-1132.", "id": "GSD-2024-20017", "modified": "2023-12-13T01:21:42.951500Z", "schema_version": "1.4.0" @@ -22,9 +23,33 @@ "namespaces": { "cve.org": { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "security@mediatek.com", "ID": "CVE-2024-20017", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "MT6890, MT7915, MT7916, MT7981, MT7986", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "SDK version 7.4.0.1 and before (for MT7915) / SDK version 7.6.7.0 and before (for MT7916, MT7981 and MT7986) / OpenWrt 19.07, 21.02" + } + ] + } + } + ] + }, + "vendor_name": "MediaTek, Inc." + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -33,9 +58,52 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation Patch ID: WCNCR00350938; Issue ID: MSV-1132." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] } ] + }, + "references": { + "reference_data": [ + { + "name": "https://corp.mediatek.com/product-security-bulletin/March-2024", + "refsource": "MISC", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation Patch ID: WCNCR00350938; Issue ID: MSV-1132." + } + ], + "id": "CVE-2024-20017", + "lastModified": "2024-03-04T03:15:06.970", + "metrics": {}, + "published": "2024-03-04T03:15:06.970", + "references": [ + { + "source": "security@mediatek.com", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ], + "sourceIdentifier": "security@mediatek.com", + "vulnStatus": "Received" } } } diff --git a/2024/20xxx/GSD-2024-20018.json b/2024/20xxx/GSD-2024-20018.json index 7e98faed8c6..3cbcde68faa 100644 --- a/2024/20xxx/GSD-2024-20018.json +++ b/2024/20xxx/GSD-2024-20018.json @@ -14,6 +14,7 @@ "aliases": [ "CVE-2024-20018" ], + "details": "In wlan driver, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00348479; Issue ID: MSV-1019.", "id": "GSD-2024-20018", "modified": "2023-12-13T01:21:42.861996Z", "schema_version": "1.4.0" @@ -22,9 +23,33 @@ "namespaces": { "cve.org": { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "security@mediatek.com", "ID": "CVE-2024-20018", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "MT7615", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "SDK version 5.1.0.0 and before" + } + ] + } + } + ] + }, + "vendor_name": "MediaTek, Inc." + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -33,9 +58,52 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In wlan driver, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00348479; Issue ID: MSV-1019." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] } ] + }, + "references": { + "reference_data": [ + { + "name": "https://corp.mediatek.com/product-security-bulletin/March-2024", + "refsource": "MISC", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "In wlan driver, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00348479; Issue ID: MSV-1019." + } + ], + "id": "CVE-2024-20018", + "lastModified": "2024-03-04T03:15:07.017", + "metrics": {}, + "published": "2024-03-04T03:15:07.017", + "references": [ + { + "source": "security@mediatek.com", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ], + "sourceIdentifier": "security@mediatek.com", + "vulnStatus": "Received" } } } diff --git a/2024/20xxx/GSD-2024-20019.json b/2024/20xxx/GSD-2024-20019.json index 639ce3d6650..6c974b40aae 100644 --- a/2024/20xxx/GSD-2024-20019.json +++ b/2024/20xxx/GSD-2024-20019.json @@ -14,6 +14,7 @@ "aliases": [ "CVE-2024-20019" ], + "details": "In wlan driver, there is a possible memory leak due to improper input handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00351241; Issue ID: MSV-1173.", "id": "GSD-2024-20019", "modified": "2023-12-13T01:21:42.823271Z", "schema_version": "1.4.0" @@ -22,9 +23,33 @@ "namespaces": { "cve.org": { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "security@mediatek.com", "ID": "CVE-2024-20019", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "MT7925, MT7927", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "SW package release 2023.11.10 and before" + } + ] + } + } + ] + }, + "vendor_name": "MediaTek, Inc." + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -33,9 +58,52 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In wlan driver, there is a possible memory leak due to improper input handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00351241; Issue ID: MSV-1173." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Denial of Service" + } + ] } ] + }, + "references": { + "reference_data": [ + { + "name": "https://corp.mediatek.com/product-security-bulletin/March-2024", + "refsource": "MISC", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "In wlan driver, there is a possible memory leak due to improper input handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00351241; Issue ID: MSV-1173." + } + ], + "id": "CVE-2024-20019", + "lastModified": "2024-03-04T03:15:07.060", + "metrics": {}, + "published": "2024-03-04T03:15:07.060", + "references": [ + { + "source": "security@mediatek.com", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ], + "sourceIdentifier": "security@mediatek.com", + "vulnStatus": "Received" } } } diff --git a/2024/20xxx/GSD-2024-20020.json b/2024/20xxx/GSD-2024-20020.json index 40e56cff282..912e3d4db6f 100644 --- a/2024/20xxx/GSD-2024-20020.json +++ b/2024/20xxx/GSD-2024-20020.json @@ -14,6 +14,7 @@ "aliases": [ "CVE-2024-20020" ], + "details": "In OPTEE, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08522504; Issue ID: ALPS08522504.", "id": "GSD-2024-20020", "modified": "2023-12-13T01:21:42.826627Z", "schema_version": "1.4.0" @@ -22,9 +23,33 @@ "namespaces": { "cve.org": { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "security@mediatek.com", "ID": "CVE-2024-20020", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "MT2713, MT2715, MT8173, MT8188, MT8195, MT8390, MT8395", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "Android 13.0" + } + ] + } + } + ] + }, + "vendor_name": "MediaTek, Inc." + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -33,9 +58,52 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In OPTEE, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08522504; Issue ID: ALPS08522504." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information Disclosure" + } + ] } ] + }, + "references": { + "reference_data": [ + { + "name": "https://corp.mediatek.com/product-security-bulletin/March-2024", + "refsource": "MISC", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "In OPTEE, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08522504; Issue ID: ALPS08522504." + } + ], + "id": "CVE-2024-20020", + "lastModified": "2024-03-04T03:15:07.107", + "metrics": {}, + "published": "2024-03-04T03:15:07.107", + "references": [ + { + "source": "security@mediatek.com", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ], + "sourceIdentifier": "security@mediatek.com", + "vulnStatus": "Received" } } } diff --git a/2024/20xxx/GSD-2024-20022.json b/2024/20xxx/GSD-2024-20022.json index a083f33e1f7..1946a2f4421 100644 --- a/2024/20xxx/GSD-2024-20022.json +++ b/2024/20xxx/GSD-2024-20022.json @@ -14,6 +14,7 @@ "aliases": [ "CVE-2024-20022" ], + "details": "In lk, there is a possible escalation of privilege due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08528255; Issue ID: ALPS08528255.", "id": "GSD-2024-20022", "modified": "2023-12-13T01:21:42.999868Z", "schema_version": "1.4.0" @@ -22,9 +23,33 @@ "namespaces": { "cve.org": { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "security@mediatek.com", "ID": "CVE-2024-20022", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "MT2737, MT6789, MT6835, MT6855, MT6879, MT6880, MT6886, MT6890, MT6895, MT6980, MT6983, MT6985, MT6989, MT6990, MT8321, MT8385, MT8666, MT8667, MT8673, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8796, MT8797, MT8798", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "Android 12.0, 13.0, 14.0 / OpenWrt 19.07, 21.02 / Yocto 3.3 / RDK-B 22Q3" + } + ] + } + } + ] + }, + "vendor_name": "MediaTek, Inc." + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -33,9 +58,52 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In lk, there is a possible escalation of privilege due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08528255; Issue ID: ALPS08528255." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] } ] + }, + "references": { + "reference_data": [ + { + "name": "https://corp.mediatek.com/product-security-bulletin/March-2024", + "refsource": "MISC", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "In lk, there is a possible escalation of privilege due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08528255; Issue ID: ALPS08528255." + } + ], + "id": "CVE-2024-20022", + "lastModified": "2024-03-04T03:15:07.150", + "metrics": {}, + "published": "2024-03-04T03:15:07.150", + "references": [ + { + "source": "security@mediatek.com", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ], + "sourceIdentifier": "security@mediatek.com", + "vulnStatus": "Received" } } } diff --git a/2024/20xxx/GSD-2024-20023.json b/2024/20xxx/GSD-2024-20023.json index 495e77f1cc3..fd023447c31 100644 --- a/2024/20xxx/GSD-2024-20023.json +++ b/2024/20xxx/GSD-2024-20023.json @@ -14,6 +14,7 @@ "aliases": [ "CVE-2024-20023" ], + "details": "In flashc, there is a possible out of bounds write due to lack of valudation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541638; Issue ID: ALPS08541638.", "id": "GSD-2024-20023", "modified": "2023-12-13T01:21:42.863828Z", "schema_version": "1.4.0" @@ -22,9 +23,33 @@ "namespaces": { "cve.org": { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "security@mediatek.com", "ID": "CVE-2024-20023", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "MT2713, MT2737, MT6781, MT6789, MT6835, MT6855, MT6879, MT6880, MT6886, MT6890, MT6895, MT6980, MT6983, MT6985, MT6989, MT6990, MT8188, MT8188T, MT8370, MT8390, MT8673, MT8676, MT8678", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "Android 12.0, 13.0, 14.0 / OpenWrt 19.07, 21.02 / Yocto 3.3 / RDK-B 22Q3" + } + ] + } + } + ] + }, + "vendor_name": "MediaTek, Inc." + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -33,9 +58,52 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In flashc, there is a possible out of bounds write due to lack of valudation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541638; Issue ID: ALPS08541638." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] } ] + }, + "references": { + "reference_data": [ + { + "name": "https://corp.mediatek.com/product-security-bulletin/March-2024", + "refsource": "MISC", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "In flashc, there is a possible out of bounds write due to lack of valudation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541638; Issue ID: ALPS08541638." + } + ], + "id": "CVE-2024-20023", + "lastModified": "2024-03-04T03:15:07.193", + "metrics": {}, + "published": "2024-03-04T03:15:07.193", + "references": [ + { + "source": "security@mediatek.com", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ], + "sourceIdentifier": "security@mediatek.com", + "vulnStatus": "Received" } } } diff --git a/2024/20xxx/GSD-2024-20024.json b/2024/20xxx/GSD-2024-20024.json index 37c7645bbc7..47f0250324d 100644 --- a/2024/20xxx/GSD-2024-20024.json +++ b/2024/20xxx/GSD-2024-20024.json @@ -14,6 +14,7 @@ "aliases": [ "CVE-2024-20024" ], + "details": "In flashc, there is a possible out of bounds write due to lack of valudation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541635; Issue ID: ALPS08541635.", "id": "GSD-2024-20024", "modified": "2023-12-13T01:21:43.032003Z", "schema_version": "1.4.0" @@ -22,9 +23,33 @@ "namespaces": { "cve.org": { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "security@mediatek.com", "ID": "CVE-2024-20024", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "MT6781, MT6789, MT6833, MT6835, MT6879, MT6886, MT6895, MT6983, MT6985, MT6989, MT8666, MT8666A, MT8666B, MT8667, MT8673, MT8676, MT8678", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "Android 12.0, 13.0, 14.0" + } + ] + } + } + ] + }, + "vendor_name": "MediaTek, Inc." + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -33,9 +58,52 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In flashc, there is a possible out of bounds write due to lack of valudation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541635; Issue ID: ALPS08541635." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] } ] + }, + "references": { + "reference_data": [ + { + "name": "https://corp.mediatek.com/product-security-bulletin/March-2024", + "refsource": "MISC", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "In flashc, there is a possible out of bounds write due to lack of valudation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541635; Issue ID: ALPS08541635." + } + ], + "id": "CVE-2024-20024", + "lastModified": "2024-03-04T03:15:07.237", + "metrics": {}, + "published": "2024-03-04T03:15:07.237", + "references": [ + { + "source": "security@mediatek.com", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ], + "sourceIdentifier": "security@mediatek.com", + "vulnStatus": "Received" } } } diff --git a/2024/20xxx/GSD-2024-20025.json b/2024/20xxx/GSD-2024-20025.json index 0ae85cd5d4f..c38327faa43 100644 --- a/2024/20xxx/GSD-2024-20025.json +++ b/2024/20xxx/GSD-2024-20025.json @@ -14,6 +14,7 @@ "aliases": [ "CVE-2024-20025" ], + "details": "In da, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541686; Issue ID: ALPS08541686.", "id": "GSD-2024-20025", "modified": "2023-12-13T01:21:43.187042Z", "schema_version": "1.4.0" @@ -22,9 +23,33 @@ "namespaces": { "cve.org": { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "security@mediatek.com", "ID": "CVE-2024-20025", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "MT6739, MT6757, MT6761, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6873, MT6877, MT6885, MT6893, MT8167, MT8168, MT8173, MT8175, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8395, MT8666, MT8673, MT8678, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8796, MT8797, MT8798", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "Android 12.0, 13.0, 14.0" + } + ] + } + } + ] + }, + "vendor_name": "MediaTek, Inc." + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -33,9 +58,52 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In da, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541686; Issue ID: ALPS08541686." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] } ] + }, + "references": { + "reference_data": [ + { + "name": "https://corp.mediatek.com/product-security-bulletin/March-2024", + "refsource": "MISC", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "In da, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541686; Issue ID: ALPS08541686." + } + ], + "id": "CVE-2024-20025", + "lastModified": "2024-03-04T03:15:07.280", + "metrics": {}, + "published": "2024-03-04T03:15:07.280", + "references": [ + { + "source": "security@mediatek.com", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ], + "sourceIdentifier": "security@mediatek.com", + "vulnStatus": "Received" } } } diff --git a/2024/20xxx/GSD-2024-20026.json b/2024/20xxx/GSD-2024-20026.json index d1c8eb60265..3d3f6966146 100644 --- a/2024/20xxx/GSD-2024-20026.json +++ b/2024/20xxx/GSD-2024-20026.json @@ -14,6 +14,7 @@ "aliases": [ "CVE-2024-20026" ], + "details": "In da, there is a possible information disclosure due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541632; Issue ID: ALPS08541632.", "id": "GSD-2024-20026", "modified": "2023-12-13T01:21:42.864651Z", "schema_version": "1.4.0" @@ -22,9 +23,33 @@ "namespaces": { "cve.org": { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "security@mediatek.com", "ID": "CVE-2024-20026", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "MT6739, MT6757, MT6761, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6873, MT6877, MT6885, MT6893, MT8163, MT8167, MT8168, MT8512", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "Android 12.0, 13.0, 14.0" + } + ] + } + } + ] + }, + "vendor_name": "MediaTek, Inc." + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -33,9 +58,52 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In da, there is a possible information disclosure due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541632; Issue ID: ALPS08541632." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information Disclosure" + } + ] } ] + }, + "references": { + "reference_data": [ + { + "name": "https://corp.mediatek.com/product-security-bulletin/March-2024", + "refsource": "MISC", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "In da, there is a possible information disclosure due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541632; Issue ID: ALPS08541632." + } + ], + "id": "CVE-2024-20026", + "lastModified": "2024-03-04T03:15:07.320", + "metrics": {}, + "published": "2024-03-04T03:15:07.320", + "references": [ + { + "source": "security@mediatek.com", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ], + "sourceIdentifier": "security@mediatek.com", + "vulnStatus": "Received" } } } diff --git a/2024/20xxx/GSD-2024-20027.json b/2024/20xxx/GSD-2024-20027.json index 8c7f99d5d3c..292f961703d 100644 --- a/2024/20xxx/GSD-2024-20027.json +++ b/2024/20xxx/GSD-2024-20027.json @@ -14,6 +14,7 @@ "aliases": [ "CVE-2024-20027" ], + "details": "In da, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541632; Issue ID: ALPS08541633.", "id": "GSD-2024-20027", "modified": "2023-12-13T01:21:43.103314Z", "schema_version": "1.4.0" @@ -22,9 +23,33 @@ "namespaces": { "cve.org": { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "security@mediatek.com", "ID": "CVE-2024-20027", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "MT6739, MT6757, MT6761, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6873, MT6877, MT6885, MT6893, MT8163, MT8167, MT8168, MT8512", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "Android 12.0, 13.0, 14.0" + } + ] + } + } + ] + }, + "vendor_name": "MediaTek, Inc." + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -33,9 +58,52 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In da, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541632; Issue ID: ALPS08541633." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] } ] + }, + "references": { + "reference_data": [ + { + "name": "https://corp.mediatek.com/product-security-bulletin/March-2024", + "refsource": "MISC", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "In da, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541632; Issue ID: ALPS08541633." + } + ], + "id": "CVE-2024-20027", + "lastModified": "2024-03-04T03:15:07.363", + "metrics": {}, + "published": "2024-03-04T03:15:07.363", + "references": [ + { + "source": "security@mediatek.com", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ], + "sourceIdentifier": "security@mediatek.com", + "vulnStatus": "Received" } } } diff --git a/2024/20xxx/GSD-2024-20028.json b/2024/20xxx/GSD-2024-20028.json index 77aa84ffc84..23716f97119 100644 --- a/2024/20xxx/GSD-2024-20028.json +++ b/2024/20xxx/GSD-2024-20028.json @@ -14,6 +14,7 @@ "aliases": [ "CVE-2024-20028" ], + "details": "In da, there is a possible out of bounds write due to lack of valudation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541632; Issue ID: ALPS08541687.", "id": "GSD-2024-20028", "modified": "2023-12-13T01:21:42.866875Z", "schema_version": "1.4.0" @@ -22,9 +23,33 @@ "namespaces": { "cve.org": { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "security@mediatek.com", "ID": "CVE-2024-20028", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "MT6739, MT6757, MT6761, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6873, MT6877, MT6885, MT6893, MT8163, MT8167, MT8168, MT8512", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "Android 12.0, 13.0, 14.0" + } + ] + } + } + ] + }, + "vendor_name": "MediaTek, Inc." + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -33,9 +58,52 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In da, there is a possible out of bounds write due to lack of valudation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541632; Issue ID: ALPS08541687." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] } ] + }, + "references": { + "reference_data": [ + { + "name": "https://corp.mediatek.com/product-security-bulletin/March-2024", + "refsource": "MISC", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "In da, there is a possible out of bounds write due to lack of valudation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541632; Issue ID: ALPS08541687." + } + ], + "id": "CVE-2024-20028", + "lastModified": "2024-03-04T03:15:07.403", + "metrics": {}, + "published": "2024-03-04T03:15:07.403", + "references": [ + { + "source": "security@mediatek.com", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ], + "sourceIdentifier": "security@mediatek.com", + "vulnStatus": "Received" } } } diff --git a/2024/20xxx/GSD-2024-20029.json b/2024/20xxx/GSD-2024-20029.json index f1bc64d6d54..a591ce13148 100644 --- a/2024/20xxx/GSD-2024-20029.json +++ b/2024/20xxx/GSD-2024-20029.json @@ -14,6 +14,7 @@ "aliases": [ "CVE-2024-20029" ], + "details": "In wlan firmware, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08477406; Issue ID: MSV-1010.", "id": "GSD-2024-20029", "modified": "2023-12-13T01:21:43.125483Z", "schema_version": "1.4.0" @@ -22,9 +23,33 @@ "namespaces": { "cve.org": { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "security@mediatek.com", "ID": "CVE-2024-20029", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "MT6985, MT6989, MT8678, MT8796", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "Android 13.0, 14.0" + } + ] + } + } + ] + }, + "vendor_name": "MediaTek, Inc." + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -33,9 +58,52 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In wlan firmware, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08477406; Issue ID: MSV-1010." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] } ] + }, + "references": { + "reference_data": [ + { + "name": "https://corp.mediatek.com/product-security-bulletin/March-2024", + "refsource": "MISC", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "In wlan firmware, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08477406; Issue ID: MSV-1010." + } + ], + "id": "CVE-2024-20029", + "lastModified": "2024-03-04T03:15:07.453", + "metrics": {}, + "published": "2024-03-04T03:15:07.453", + "references": [ + { + "source": "security@mediatek.com", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ], + "sourceIdentifier": "security@mediatek.com", + "vulnStatus": "Received" } } } diff --git a/2024/20xxx/GSD-2024-20030.json b/2024/20xxx/GSD-2024-20030.json index a5068bfc631..747bd6393a0 100644 --- a/2024/20xxx/GSD-2024-20030.json +++ b/2024/20xxx/GSD-2024-20030.json @@ -14,6 +14,7 @@ "aliases": [ "CVE-2024-20030" ], + "details": "In da, there is a possible information disclosure due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541632; Issue ID: ALPS08541741.", "id": "GSD-2024-20030", "modified": "2023-12-13T01:21:43.086133Z", "schema_version": "1.4.0" @@ -22,9 +23,33 @@ "namespaces": { "cve.org": { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "security@mediatek.com", "ID": "CVE-2024-20030", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "MT6739, MT6757, MT6761, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6873, MT6877, MT6885, MT6893, MT8167, MT8168, MT8195, MT8512", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "Android 12.0, 13.0, 14.0" + } + ] + } + } + ] + }, + "vendor_name": "MediaTek, Inc." + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -33,9 +58,52 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In da, there is a possible information disclosure due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541632; Issue ID: ALPS08541741." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information Disclosure" + } + ] } ] + }, + "references": { + "reference_data": [ + { + "name": "https://corp.mediatek.com/product-security-bulletin/March-2024", + "refsource": "MISC", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "In da, there is a possible information disclosure due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541632; Issue ID: ALPS08541741." + } + ], + "id": "CVE-2024-20030", + "lastModified": "2024-03-04T03:15:07.500", + "metrics": {}, + "published": "2024-03-04T03:15:07.500", + "references": [ + { + "source": "security@mediatek.com", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ], + "sourceIdentifier": "security@mediatek.com", + "vulnStatus": "Received" } } } diff --git a/2024/20xxx/GSD-2024-20031.json b/2024/20xxx/GSD-2024-20031.json index 535e6510d99..258b253cae7 100644 --- a/2024/20xxx/GSD-2024-20031.json +++ b/2024/20xxx/GSD-2024-20031.json @@ -14,6 +14,7 @@ "aliases": [ "CVE-2024-20031" ], + "details": "In da, there is a possible out of bounds write due to lack of valudation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541632; Issue ID: ALPS08541742.", "id": "GSD-2024-20031", "modified": "2023-12-13T01:21:43.099210Z", "schema_version": "1.4.0" @@ -22,9 +23,33 @@ "namespaces": { "cve.org": { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "security@mediatek.com", "ID": "CVE-2024-20031", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "MT6739, MT6757, MT6761, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6873, MT6877, MT6885, MT6893, MT8163, MT8167, MT8168, MT8512", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "Android 12.0, 13.0, 14.0" + } + ] + } + } + ] + }, + "vendor_name": "MediaTek, Inc." + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -33,9 +58,52 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In da, there is a possible out of bounds write due to lack of valudation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541632; Issue ID: ALPS08541742." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] } ] + }, + "references": { + "reference_data": [ + { + "name": "https://corp.mediatek.com/product-security-bulletin/March-2024", + "refsource": "MISC", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "In da, there is a possible out of bounds write due to lack of valudation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541632; Issue ID: ALPS08541742." + } + ], + "id": "CVE-2024-20031", + "lastModified": "2024-03-04T03:15:07.540", + "metrics": {}, + "published": "2024-03-04T03:15:07.540", + "references": [ + { + "source": "security@mediatek.com", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ], + "sourceIdentifier": "security@mediatek.com", + "vulnStatus": "Received" } } } diff --git a/2024/20xxx/GSD-2024-20032.json b/2024/20xxx/GSD-2024-20032.json index 9f3682bd2ce..a32dd7b1c61 100644 --- a/2024/20xxx/GSD-2024-20032.json +++ b/2024/20xxx/GSD-2024-20032.json @@ -14,6 +14,7 @@ "aliases": [ "CVE-2024-20032" ], + "details": "In aee, there is a possible permission bypass due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08487630; Issue ID: MSV-1020.", "id": "GSD-2024-20032", "modified": "2023-12-13T01:21:42.896201Z", "schema_version": "1.4.0" @@ -22,9 +23,33 @@ "namespaces": { "cve.org": { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "security@mediatek.com", "ID": "CVE-2024-20032", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT6989, MT8321, MT8673, MT8765, MT8766, MT8768, MT8781, MT8789, MT8791, MT8792, MT8796", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "Android 12.0, 13.0, 14.0" + } + ] + } + } + ] + }, + "vendor_name": "MediaTek, Inc." + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -33,9 +58,52 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In aee, there is a possible permission bypass due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08487630; Issue ID: MSV-1020." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] } ] + }, + "references": { + "reference_data": [ + { + "name": "https://corp.mediatek.com/product-security-bulletin/March-2024", + "refsource": "MISC", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "In aee, there is a possible permission bypass due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08487630; Issue ID: MSV-1020." + } + ], + "id": "CVE-2024-20032", + "lastModified": "2024-03-04T03:15:07.587", + "metrics": {}, + "published": "2024-03-04T03:15:07.587", + "references": [ + { + "source": "security@mediatek.com", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ], + "sourceIdentifier": "security@mediatek.com", + "vulnStatus": "Received" } } } diff --git a/2024/20xxx/GSD-2024-20033.json b/2024/20xxx/GSD-2024-20033.json index 7ddbb7ad0d8..ace8a4496bd 100644 --- a/2024/20xxx/GSD-2024-20033.json +++ b/2024/20xxx/GSD-2024-20033.json @@ -14,6 +14,7 @@ "aliases": [ "CVE-2024-20033" ], + "details": "In nvram, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08499945; Issue ID: ALPS08499945.", "id": "GSD-2024-20033", "modified": "2023-12-13T01:21:42.944876Z", "schema_version": "1.4.0" @@ -22,9 +23,33 @@ "namespaces": { "cve.org": { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "security@mediatek.com", "ID": "CVE-2024-20033", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "MT2713, MT6739, MT6761, MT6765, MT6768, MT6771, MT6779, MT6785, MT6789, MT6835, MT6855, MT6879, MT6883, MT6885, MT6886, MT6893, MT6895, MT6983, MT6985, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8185, MT8188, MT8195, MT8321, MT8362A, MT8365, MT8370, MT8385, MT8390, MT8395, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8755, MT8765, MT8766, MT8768, MT8775, MT8781, MT8786, MT8788, MT8789, MT8791, MT8792, MT8796, MT8797, MT8798", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "Android 12.0, 13.0, 14.0" + } + ] + } + } + ] + }, + "vendor_name": "MediaTek, Inc." + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -33,9 +58,52 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In nvram, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08499945; Issue ID: ALPS08499945." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information Disclosure" + } + ] } ] + }, + "references": { + "reference_data": [ + { + "name": "https://corp.mediatek.com/product-security-bulletin/March-2024", + "refsource": "MISC", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "In nvram, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08499945; Issue ID: ALPS08499945." + } + ], + "id": "CVE-2024-20033", + "lastModified": "2024-03-04T03:15:07.630", + "metrics": {}, + "published": "2024-03-04T03:15:07.630", + "references": [ + { + "source": "security@mediatek.com", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ], + "sourceIdentifier": "security@mediatek.com", + "vulnStatus": "Received" } } } diff --git a/2024/20xxx/GSD-2024-20034.json b/2024/20xxx/GSD-2024-20034.json index cac84e7b4f9..06655f0a33f 100644 --- a/2024/20xxx/GSD-2024-20034.json +++ b/2024/20xxx/GSD-2024-20034.json @@ -14,6 +14,7 @@ "aliases": [ "CVE-2024-20034" ], + "details": "In battery, there is a possible escalation of privilege due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08488849; Issue ID: ALPS08488849.", "id": "GSD-2024-20034", "modified": "2023-12-13T01:21:42.958424Z", "schema_version": "1.4.0" @@ -22,9 +23,33 @@ "namespaces": { "cve.org": { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "security@mediatek.com", "ID": "CVE-2024-20034", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "MT6761, MT6765, MT6768, MT6855, MT6895, MT8167, MT8168, MT8188, MT8321, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8797, MT8798", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "Android 12.0, 13.0, 14.0" + } + ] + } + } + ] + }, + "vendor_name": "MediaTek, Inc." + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -33,9 +58,52 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In battery, there is a possible escalation of privilege due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08488849; Issue ID: ALPS08488849." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] } ] + }, + "references": { + "reference_data": [ + { + "name": "https://corp.mediatek.com/product-security-bulletin/March-2024", + "refsource": "MISC", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "In battery, there is a possible escalation of privilege due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08488849; Issue ID: ALPS08488849." + } + ], + "id": "CVE-2024-20034", + "lastModified": "2024-03-04T03:15:07.673", + "metrics": {}, + "published": "2024-03-04T03:15:07.673", + "references": [ + { + "source": "security@mediatek.com", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ], + "sourceIdentifier": "security@mediatek.com", + "vulnStatus": "Received" } } } diff --git a/2024/20xxx/GSD-2024-20036.json b/2024/20xxx/GSD-2024-20036.json index a7cbe0b4a04..e2a7becb5d7 100644 --- a/2024/20xxx/GSD-2024-20036.json +++ b/2024/20xxx/GSD-2024-20036.json @@ -14,6 +14,7 @@ "aliases": [ "CVE-2024-20036" ], + "details": "In vdec, there is a possible permission bypass due to a permissions bypass. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08509508; Issue ID: ALPS08509508.", "id": "GSD-2024-20036", "modified": "2023-12-13T01:21:42.882734Z", "schema_version": "1.4.0" @@ -22,9 +23,33 @@ "namespaces": { "cve.org": { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "security@mediatek.com", "ID": "CVE-2024-20036", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "MT6835, MT6855, MT6879, MT6886, MT6895, MT6983, MT6985, MT8792, MT8796, MT8798", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "Android 12.0, 13.0, 14.0" + } + ] + } + } + ] + }, + "vendor_name": "MediaTek, Inc." + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -33,9 +58,52 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In vdec, there is a possible permission bypass due to a permissions bypass. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08509508; Issue ID: ALPS08509508." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information Disclosure" + } + ] } ] + }, + "references": { + "reference_data": [ + { + "name": "https://corp.mediatek.com/product-security-bulletin/March-2024", + "refsource": "MISC", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "In vdec, there is a possible permission bypass due to a permissions bypass. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08509508; Issue ID: ALPS08509508." + } + ], + "id": "CVE-2024-20036", + "lastModified": "2024-03-04T03:15:07.717", + "metrics": {}, + "published": "2024-03-04T03:15:07.717", + "references": [ + { + "source": "security@mediatek.com", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ], + "sourceIdentifier": "security@mediatek.com", + "vulnStatus": "Received" } } } diff --git a/2024/20xxx/GSD-2024-20037.json b/2024/20xxx/GSD-2024-20037.json index 58d92f4e60a..46d7fadab89 100644 --- a/2024/20xxx/GSD-2024-20037.json +++ b/2024/20xxx/GSD-2024-20037.json @@ -14,6 +14,7 @@ "aliases": [ "CVE-2024-20037" ], + "details": "In pq, there is a possible write-what-where condition due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08495937; Issue ID: ALPS08495937.", "id": "GSD-2024-20037", "modified": "2023-12-13T01:21:42.970189Z", "schema_version": "1.4.0" @@ -22,9 +23,33 @@ "namespaces": { "cve.org": { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "security@mediatek.com", "ID": "CVE-2024-20037", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6983, MT6985, MT6989, MT8168, MT8188, MT8195, MT8673, MT8675", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "Android 12.0, 13.0, 14.0" + } + ] + } + } + ] + }, + "vendor_name": "MediaTek, Inc." + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -33,9 +58,52 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In pq, there is a possible write-what-where condition due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08495937; Issue ID: ALPS08495937." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] } ] + }, + "references": { + "reference_data": [ + { + "name": "https://corp.mediatek.com/product-security-bulletin/March-2024", + "refsource": "MISC", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "In pq, there is a possible write-what-where condition due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08495937; Issue ID: ALPS08495937." + } + ], + "id": "CVE-2024-20037", + "lastModified": "2024-03-04T03:15:07.760", + "metrics": {}, + "published": "2024-03-04T03:15:07.760", + "references": [ + { + "source": "security@mediatek.com", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ], + "sourceIdentifier": "security@mediatek.com", + "vulnStatus": "Received" } } } diff --git a/2024/20xxx/GSD-2024-20038.json b/2024/20xxx/GSD-2024-20038.json index a1de3a9c308..cab2e871d19 100644 --- a/2024/20xxx/GSD-2024-20038.json +++ b/2024/20xxx/GSD-2024-20038.json @@ -14,6 +14,7 @@ "aliases": [ "CVE-2024-20038" ], + "details": "In pq, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08495932; Issue ID: ALPS08495932.", "id": "GSD-2024-20038", "modified": "2023-12-13T01:21:42.871238Z", "schema_version": "1.4.0" @@ -22,9 +23,33 @@ "namespaces": { "cve.org": { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "security@mediatek.com", "ID": "CVE-2024-20038", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6983, MT6985, MT6989, MT8168, MT8188, MT8195, MT8673, MT8675", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "Android 12.0, 13.0, 14.0" + } + ] + } + } + ] + }, + "vendor_name": "MediaTek, Inc." + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -33,9 +58,52 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In pq, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08495932; Issue ID: ALPS08495932." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information Disclosure" + } + ] } ] + }, + "references": { + "reference_data": [ + { + "name": "https://corp.mediatek.com/product-security-bulletin/March-2024", + "refsource": "MISC", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "In pq, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08495932; Issue ID: ALPS08495932." + } + ], + "id": "CVE-2024-20038", + "lastModified": "2024-03-04T03:15:07.800", + "metrics": {}, + "published": "2024-03-04T03:15:07.800", + "references": [ + { + "source": "security@mediatek.com", + "url": "https://corp.mediatek.com/product-security-bulletin/March-2024" + } + ], + "sourceIdentifier": "security@mediatek.com", + "vulnStatus": "Received" } } } diff --git a/2024/22xxx/GSD-2024-22054.json b/2024/22xxx/GSD-2024-22054.json index 0ebc8a20acb..b59bff31ed3 100644 --- a/2024/22xxx/GSD-2024-22054.json +++ b/2024/22xxx/GSD-2024-22054.json @@ -35,8 +35,8 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.6.65", - "version_value": "6.6.65" + "version_name": "6.6.55", + "version_value": "6.6.55" } ] } @@ -91,17 +91,7 @@ "description_data": [ { "lang": "eng", - "value": "A malformed discovery packet sent by a malicious actor with preexisting access to the network could interrupt the functionality of device management and discovery.\n\n \n\n \n\nAffected Products:\n\nUniFi Access Points\n\nUniFi Switches\n\nUniFi LTE Backup\n\nUniFi Express (Only Mesh Mode, Router mode is not affected)\n\n \n\nMitigation:\n\nUpdate UniFi Access Points to Version 6.6.65 or later.\n\nUpdate UniFi Switches to Version 6.6.61 or later.\n\nUpdate UniFi LTE Backup to Version 6.6.57 or later.\n\nUpdate UniFi Express to Version 3.2.5 or later." - } - ] - }, - "impact": { - "cvss": [ - { - "baseScore": 7.5, - "baseSeverity": "HIGH", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "version": "3.0" + "value": "A malformed discovery packet sent by a malicious actor with preexisting access to the network could interrupt the functionality of device management and discovery.\n\n\nAffected Products:\nUniFi Access Points\nUniFi Switches\nUniFi LTE Backup\nUniFi Express (Only Mesh Mode, Router mode is not affected)\n\n \nMitigation:\nUpdate UniFi Access Points to Version 6.6.55 or later.\nUpdate UniFi Switches to Version 6.6.61 or later.\nUpdate UniFi LTE Backup to Version 6.6.57 or later.\nUpdate UniFi Express to Version 3.2.5 or later." } ] }, @@ -132,35 +122,16 @@ "descriptions": [ { "lang": "en", - "value": "A malformed discovery packet sent by a malicious actor with preexisting access to the network could interrupt the functionality of device management and discovery.\n\n \n\n \n\nAffected Products:\n\nUniFi Access Points\n\nUniFi Switches\n\nUniFi LTE Backup\n\nUniFi Express (Only Mesh Mode, Router mode is not affected)\n\n \n\nMitigation:\n\nUpdate UniFi Access Points to Version 6.6.65 or later.\n\nUpdate UniFi Switches to Version 6.6.61 or later.\n\nUpdate UniFi LTE Backup to Version 6.6.57 or later.\n\nUpdate UniFi Express to Version 3.2.5 or later." + "value": "A malformed discovery packet sent by a malicious actor with preexisting access to the network could interrupt the functionality of device management and discovery.\n\n\nAffected Products:\nUniFi Access Points\nUniFi Switches\nUniFi LTE Backup\nUniFi Express (Only Mesh Mode, Router mode is not affected)\n\n \nMitigation:\nUpdate UniFi Access Points to Version 6.6.55 or later.\nUpdate UniFi Switches to Version 6.6.61 or later.\nUpdate UniFi LTE Backup to Version 6.6.57 or later.\nUpdate UniFi Express to Version 3.2.5 or later." + }, + { + "lang": "es", + "value": "Un paquete de descubrimiento con formato incorrecto enviado por un actor malintencionado con acceso preexistente a la red podr\u00eda interrumpir la funcionalidad de administraci\u00f3n y descubrimiento de dispositivos. Productos afectados: Puntos de acceso UniFi Conmutadores UniFi Copia de seguridad UniFi LTE UniFi Express (solo el modo malla, el modo enrutador no se ve afectado) Mitigaci\u00f3n: actualice los puntos de acceso UniFi a la versi\u00f3n 6.6.65 o posterior. Actualice UniFi Switches a la versi\u00f3n 6.6.61 o posterior. Actualice UniFi LTE Backup a la versi\u00f3n 6.6.57 o posterior. Actualice UniFi Express a la versi\u00f3n 3.2.5 o posterior." } ], "id": "CVE-2024-22054", - "lastModified": "2024-02-20T19:50:53.960", - "metrics": { - "cvssMetricV30": [ - { - "cvssData": { - "attackComplexity": "LOW", - "attackVector": "NETWORK", - "availabilityImpact": "HIGH", - "baseScore": 7.5, - "baseSeverity": "HIGH", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "privilegesRequired": "NONE", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "version": "3.0" - }, - "exploitabilityScore": 3.9, - "impactScore": 3.6, - "source": "support@hackerone.com", - "type": "Secondary" - } - ] - }, + "lastModified": "2024-03-04T02:15:16.820", + "metrics": {}, "published": "2024-02-20T18:15:51.393", "references": [ { diff --git a/2024/22xxx/GSD-2024-22355.json b/2024/22xxx/GSD-2024-22355.json index e9453cfb86a..f37fd5db538 100644 --- a/2024/22xxx/GSD-2024-22355.json +++ b/2024/22xxx/GSD-2024-22355.json @@ -10,6 +10,7 @@ "aliases": [ "CVE-2024-22355" ], + "details": "IBM QRadar Suite Products 1.10.12.0 through 1.10.18.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 280781.", "id": "GSD-2024-22355", "modified": "2024-01-09T06:02:15.336307Z", "schema_version": "1.4.0" @@ -18,9 +19,46 @@ "namespaces": { "cve.org": { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "psirt@us.ibm.com", "ID": "CVE-2024-22355", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "QRadar Suite Products", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "1.10.12.0", + "version_value": "1.10.18.0" + } + ] + } + }, + { + "product_name": "Cloud Pak for Security", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "1.10.0.0", + "version_value": "1.10.11.0" + } + ] + } + } + ] + }, + "vendor_name": "IBM" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -29,7 +67,119 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM QRadar Suite Products 1.10.12.0 through 1.10.18.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 280781." + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "cweId": "CWE-521", + "lang": "eng", + "value": "CWE-521 Weak Password Requirements" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.ibm.com/support/pages/node/7129328", + "refsource": "MISC", + "url": "https://www.ibm.com/support/pages/node/7129328" + }, + { + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/280781", + "refsource": "MISC", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/280781" + } + ] + }, + "source": { + "discovery": "UNKNOWN" + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "IBM QRadar Suite Products 1.10.12.0 through 1.10.18.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 280781." + } + ], + "id": "CVE-2024-22355", + "lastModified": "2024-03-03T13:15:07.293", + "metrics": { + "cvssMetricV31": [ + { + "cvssData": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6, + "source": "psirt@us.ibm.com", + "type": "Secondary" + } + ] + }, + "published": "2024-03-03T13:15:07.293", + "references": [ + { + "source": "psirt@us.ibm.com", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/280781" + }, + { + "source": "psirt@us.ibm.com", + "url": "https://www.ibm.com/support/pages/node/7129328" + } + ], + "sourceIdentifier": "psirt@us.ibm.com", + "vulnStatus": "Received", + "weaknesses": [ + { + "description": [ + { + "lang": "en", + "value": "CWE-521" + } + ], + "source": "psirt@us.ibm.com", + "type": "Secondary" } ] } diff --git a/2024/24xxx/GSD-2024-24302.json b/2024/24xxx/GSD-2024-24302.json index a49278b797a..895cf2fd498 100644 --- a/2024/24xxx/GSD-2024-24302.json +++ b/2024/24xxx/GSD-2024-24302.json @@ -10,6 +10,7 @@ "aliases": [ "CVE-2024-24302" ], + "details": "An issue was discovered in Tunis Soft \"Product Designer\" (productdesigner) module for PrestaShop before version 1.178.36, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via the postProcess() method.", "id": "GSD-2024-24302", "modified": "2024-01-26T06:02:26.012030Z", "schema_version": "1.4.0" @@ -20,7 +21,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2024-24302", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -29,9 +53,52 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Tunis Soft \"Product Designer\" (productdesigner) module for PrestaShop before version 1.178.36, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via the postProcess() method." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] } ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2024-02-29-productdesigner-502.md", + "refsource": "MISC", + "url": "https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2024-02-29-productdesigner-502.md" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Tunis Soft \"Product Designer\" (productdesigner) module for PrestaShop before version 1.178.36, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via the postProcess() method." + } + ], + "id": "CVE-2024-24302", + "lastModified": "2024-03-03T09:15:06.100", + "metrics": {}, + "published": "2024-03-03T09:15:06.100", + "references": [ + { + "source": "cve@mitre.org", + "url": "https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2024-02-29-productdesigner-502.md" + } + ], + "sourceIdentifier": "cve@mitre.org", + "vulnStatus": "Received" } } } diff --git a/2024/24xxx/GSD-2024-24307.json b/2024/24xxx/GSD-2024-24307.json index 6c1c13089a9..31c98e2e400 100644 --- a/2024/24xxx/GSD-2024-24307.json +++ b/2024/24xxx/GSD-2024-24307.json @@ -10,6 +10,7 @@ "aliases": [ "CVE-2024-24307" ], + "details": "Path Traversal vulnerability in Tunis Soft \"Product Designer\" (productdesigner) module for PrestaShop before version 1.178.36, allows a remote attacker to escalate privileges and obtain sensitive information via the ajaxProcessCropImage() method.", "id": "GSD-2024-24307", "modified": "2024-01-26T06:02:26.009754Z", "schema_version": "1.4.0" @@ -20,7 +21,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2024-24307", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -29,9 +53,52 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Path Traversal vulnerability in Tunis Soft \"Product Designer\" (productdesigner) module for PrestaShop before version 1.178.36, allows a remote attacker to escalate privileges and obtain sensitive information via the ajaxProcessCropImage() method." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] } ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2024-02-29-productdesigner-22.md", + "refsource": "MISC", + "url": "https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2024-02-29-productdesigner-22.md" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "Path Traversal vulnerability in Tunis Soft \"Product Designer\" (productdesigner) module for PrestaShop before version 1.178.36, allows a remote attacker to escalate privileges and obtain sensitive information via the ajaxProcessCropImage() method." + } + ], + "id": "CVE-2024-24307", + "lastModified": "2024-03-03T08:15:08.140", + "metrics": {}, + "published": "2024-03-03T08:15:08.140", + "references": [ + { + "source": "cve@mitre.org", + "url": "https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2024-02-29-productdesigner-22.md" + } + ], + "sourceIdentifier": "cve@mitre.org", + "vulnStatus": "Received" } } } diff --git a/2024/25xxx/GSD-2024-25551.json b/2024/25xxx/GSD-2024-25551.json index a8252617ad4..faefda93ac8 100644 --- a/2024/25xxx/GSD-2024-25551.json +++ b/2024/25xxx/GSD-2024-25551.json @@ -10,6 +10,7 @@ "aliases": [ "CVE-2024-25551" ], + "details": "Cross Site Scripting (XSS) vulnerability in sourcecodester Simple Student Attendance System v1.0 allows attackers to execute arbitrary code via crafted GET request to web application URL.", "id": "GSD-2024-25551", "modified": "2024-02-08T06:02:25.035953Z", "schema_version": "1.4.0" @@ -20,7 +21,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2024-25551", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -29,9 +53,52 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross Site Scripting (XSS) vulnerability in sourcecodester Simple Student Attendance System v1.0 allows attackers to execute arbitrary code via crafted GET request to web application URL." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] } ] + }, + "references": { + "reference_data": [ + { + "name": "https://medium.com/@jose.inaciot/my-first-cve-cve-2024-25551-f91787c05ae9", + "refsource": "MISC", + "url": "https://medium.com/@jose.inaciot/my-first-cve-cve-2024-25551-f91787c05ae9" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Scripting (XSS) vulnerability in sourcecodester Simple Student Attendance System v1.0 allows attackers to execute arbitrary code via crafted GET request to web application URL." + } + ], + "id": "CVE-2024-25551", + "lastModified": "2024-03-03T08:15:08.223", + "metrics": {}, + "published": "2024-03-03T08:15:08.223", + "references": [ + { + "source": "cve@mitre.org", + "url": "https://medium.com/%40jose.inaciot/my-first-cve-cve-2024-25551-f91787c05ae9" + } + ], + "sourceIdentifier": "cve@mitre.org", + "vulnStatus": "Received" } } } diff --git a/2024/25xxx/GSD-2024-25839.json b/2024/25xxx/GSD-2024-25839.json index c32321abb3f..e0d8c850668 100644 --- a/2024/25xxx/GSD-2024-25839.json +++ b/2024/25xxx/GSD-2024-25839.json @@ -10,6 +10,7 @@ "aliases": [ "CVE-2024-25839" ], + "details": "An issue was discovered in Webbax \"Super Newsletter\" (supernewsletter) module for PrestaShop versions 1.4.21 and before, allows local attackers to escalate privileges and obtain sensitive information.", "id": "GSD-2024-25839", "modified": "2024-02-13T06:02:27.141379Z", "schema_version": "1.4.0" @@ -20,7 +21,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2024-25839", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -29,9 +53,52 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Webbax \"Super Newsletter\" (supernewsletter) module for PrestaShop versions 1.4.21 and before, allows local attackers to escalate privileges and obtain sensitive information." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] } ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2024-02-29-supernewsletter.md", + "refsource": "MISC", + "url": "https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2024-02-29-supernewsletter.md" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Webbax \"Super Newsletter\" (supernewsletter) module for PrestaShop versions 1.4.21 and before, allows local attackers to escalate privileges and obtain sensitive information." + } + ], + "id": "CVE-2024-25839", + "lastModified": "2024-03-03T09:15:06.163", + "metrics": {}, + "published": "2024-03-03T09:15:06.163", + "references": [ + { + "source": "cve@mitre.org", + "url": "https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2024-02-29-supernewsletter.md" + } + ], + "sourceIdentifier": "cve@mitre.org", + "vulnStatus": "Received" } } } diff --git a/2024/25xxx/GSD-2024-25842.json b/2024/25xxx/GSD-2024-25842.json index ac81332dfde..2e185b3927b 100644 --- a/2024/25xxx/GSD-2024-25842.json +++ b/2024/25xxx/GSD-2024-25842.json @@ -10,6 +10,7 @@ "aliases": [ "CVE-2024-25842" ], + "details": "An issue was discovered in Presta World \"Account Manager - Sales Representative & Dealers - CRM\" (prestasalesmanager) module for PrestaShop before version 9.0, allows remote attackers to escalate privilege and obtain sensitive information via the uploadLogo() and postProcess methods.", "id": "GSD-2024-25842", "modified": "2024-02-13T06:02:27.155773Z", "schema_version": "1.4.0" @@ -20,7 +21,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2024-25842", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -29,9 +53,52 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Presta World \"Account Manager - Sales Representative & Dealers - CRM\" (prestasalesmanager) module for PrestaShop before version 9.0, allows remote attackers to escalate privilege and obtain sensitive information via the uploadLogo() and postProcess methods." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] } ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2024-02-29-prestasalesmanager.md", + "refsource": "MISC", + "url": "https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2024-02-29-prestasalesmanager.md" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Presta World \"Account Manager - Sales Representative & Dealers - CRM\" (prestasalesmanager) module for PrestaShop before version 9.0, allows remote attackers to escalate privilege and obtain sensitive information via the uploadLogo() and postProcess methods." + } + ], + "id": "CVE-2024-25842", + "lastModified": "2024-03-03T09:15:06.210", + "metrics": {}, + "published": "2024-03-03T09:15:06.210", + "references": [ + { + "source": "cve@mitre.org", + "url": "https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2024-02-29-prestasalesmanager.md" + } + ], + "sourceIdentifier": "cve@mitre.org", + "vulnStatus": "Received" } } } diff --git a/2024/25xxx/GSD-2024-25844.json b/2024/25xxx/GSD-2024-25844.json index 9dda65a31cf..df40fad9ee9 100644 --- a/2024/25xxx/GSD-2024-25844.json +++ b/2024/25xxx/GSD-2024-25844.json @@ -10,6 +10,7 @@ "aliases": [ "CVE-2024-25844" ], + "details": "An issue was discovered in Common-Services \"So Flexibilite\" (soflexibilite) module for PrestaShop before version 4.1.26, allows remote attackers to escalate privileges and obtain sensitive information via debug file.", "id": "GSD-2024-25844", "modified": "2024-02-13T06:02:27.164065Z", "schema_version": "1.4.0" @@ -20,7 +21,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2024-25844", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -29,9 +53,52 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Common-Services \"So Flexibilite\" (soflexibilite) module for PrestaShop before version 4.1.26, allows remote attackers to escalate privileges and obtain sensitive information via debug file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] } ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2024-02-29-soflexibilite.md", + "refsource": "MISC", + "url": "https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2024-02-29-soflexibilite.md" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Common-Services \"So Flexibilite\" (soflexibilite) module for PrestaShop before version 4.1.26, allows remote attackers to escalate privileges and obtain sensitive information via debug file." + } + ], + "id": "CVE-2024-25844", + "lastModified": "2024-03-03T08:15:08.280", + "metrics": {}, + "published": "2024-03-03T08:15:08.280", + "references": [ + { + "source": "cve@mitre.org", + "url": "https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2024-02-29-soflexibilite.md" + } + ], + "sourceIdentifier": "cve@mitre.org", + "vulnStatus": "Received" } } } diff --git a/2024/25xxx/GSD-2024-25847.json b/2024/25xxx/GSD-2024-25847.json index 5f2fad736c5..95a0ff5f8c8 100644 --- a/2024/25xxx/GSD-2024-25847.json +++ b/2024/25xxx/GSD-2024-25847.json @@ -10,6 +10,7 @@ "aliases": [ "CVE-2024-25847" ], + "details": "SQL Injection vulnerability in MyPrestaModules \"Product Catalog (CSV, Excel) Import\" (simpleimportproduct) modules for PrestaShop versions 6.5.0 and before, allows attackers to escalate privileges and obtain sensitive information via Send::__construct() and importProducts::_addDataToDb methods.", "id": "GSD-2024-25847", "modified": "2024-02-13T06:02:26.891597Z", "schema_version": "1.4.0" @@ -20,7 +21,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2024-25847", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -29,9 +53,52 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SQL Injection vulnerability in MyPrestaModules \"Product Catalog (CSV, Excel) Import\" (simpleimportproduct) modules for PrestaShop versions 6.5.0 and before, allows attackers to escalate privileges and obtain sensitive information via Send::__construct() and importProducts::_addDataToDb methods." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] } ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2024-02-29-simpleimportproduct.md", + "refsource": "MISC", + "url": "https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2024-02-29-simpleimportproduct.md" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "SQL Injection vulnerability in MyPrestaModules \"Product Catalog (CSV, Excel) Import\" (simpleimportproduct) modules for PrestaShop versions 6.5.0 and before, allows attackers to escalate privileges and obtain sensitive information via Send::__construct() and importProducts::_addDataToDb methods." + } + ], + "id": "CVE-2024-25847", + "lastModified": "2024-03-03T09:15:06.253", + "metrics": {}, + "published": "2024-03-03T09:15:06.253", + "references": [ + { + "source": "cve@mitre.org", + "url": "https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2024-02-29-simpleimportproduct.md" + } + ], + "sourceIdentifier": "cve@mitre.org", + "vulnStatus": "Received" } } } diff --git a/2024/26xxx/GSD-2024-26469.json b/2024/26xxx/GSD-2024-26469.json index 6cbfc8b0765..2429e284bae 100644 --- a/2024/26xxx/GSD-2024-26469.json +++ b/2024/26xxx/GSD-2024-26469.json @@ -10,6 +10,7 @@ "aliases": [ "CVE-2024-26469" ], + "details": "Server-Side Request Forgery (SSRF) vulnerability in Tunis Soft \"Product Designer\" (productdesigner) module for PrestaShop before version 1.178.36, allows remote attackers to cause a denial of service (DoS) and escalate privileges via the url parameter in the postProcess() method.", "id": "GSD-2024-26469", "modified": "2024-02-20T06:02:29.176138Z", "schema_version": "1.4.0" @@ -20,7 +21,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2024-26469", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -29,9 +53,52 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Server-Side Request Forgery (SSRF) vulnerability in Tunis Soft \"Product Designer\" (productdesigner) module for PrestaShop before version 1.178.36, allows remote attackers to cause a denial of service (DoS) and escalate privileges via the url parameter in the postProcess() method." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] } ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2024-02-29-productdesigner-918.md", + "refsource": "MISC", + "url": "https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2024-02-29-productdesigner-918.md" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "Server-Side Request Forgery (SSRF) vulnerability in Tunis Soft \"Product Designer\" (productdesigner) module for PrestaShop before version 1.178.36, allows remote attackers to cause a denial of service (DoS) and escalate privileges via the url parameter in the postProcess() method." + } + ], + "id": "CVE-2024-26469", + "lastModified": "2024-03-03T10:15:06.813", + "metrics": {}, + "published": "2024-03-03T10:15:06.813", + "references": [ + { + "source": "cve@mitre.org", + "url": "https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2024-02-29-productdesigner-918.md" + } + ], + "sourceIdentifier": "cve@mitre.org", + "vulnStatus": "Received" } } } diff --git a/2024/27xxx/GSD-2024-27255.json b/2024/27xxx/GSD-2024-27255.json index 13aa3d3d3e4..5ff76743d53 100644 --- a/2024/27xxx/GSD-2024-27255.json +++ b/2024/27xxx/GSD-2024-27255.json @@ -10,6 +10,7 @@ "aliases": [ "CVE-2024-27255" ], + "details": "IBM MQ Operator 2.0.0 LTS, 2.0.18 LTS, 3.0.0 CD, 3.0.1 CD, 2.4.0 through 2.4.7, 2.3.0 through 2.3.3, 2.2.0 through 2.2.2, and 2.3.0 through 2.3.3 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 283905.", "id": "GSD-2024-27255", "modified": "2024-02-22T06:03:35.292051Z", "schema_version": "1.4.0" @@ -18,9 +19,54 @@ "namespaces": { "cve.org": { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "psirt@us.ibm.com", "ID": "CVE-2024-27255", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "MQ Operator", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "2.0.0 LTS", + "version_value": "2.0.18 LTS" + }, + { + "version_affected": "<=", + "version_name": "2.4.0", + "version_value": "2.4.7" + }, + { + "version_affected": "<=", + "version_name": "2.3.0", + "version_value": "2.3.3" + }, + { + "version_affected": "<=", + "version_name": "2.2.0", + "version_value": "2.2.2" + }, + { + "version_affected": "<=", + "version_name": "3.0.0 CD", + "version_value": "3.0.1 CD" + } + ] + } + } + ] + }, + "vendor_name": "IBM" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -29,7 +75,119 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM MQ Operator 2.0.0 LTS, 2.0.18 LTS, 3.0.0 CD, 3.0.1 CD, 2.4.0 through 2.4.7, 2.3.0 through 2.3.3, 2.2.0 through 2.2.2, and 2.3.0 through 2.3.3 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 283905." + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "cweId": "CWE-327", + "lang": "eng", + "value": "CWE-327 Use of a Broken or Risky Cryptographic Algorithm" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.ibm.com/support/pages/node/7126571", + "refsource": "MISC", + "url": "https://www.ibm.com/support/pages/node/7126571" + }, + { + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/283905", + "refsource": "MISC", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/283905" + } + ] + }, + "source": { + "discovery": "UNKNOWN" + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "IBM MQ Operator 2.0.0 LTS, 2.0.18 LTS, 3.0.0 CD, 3.0.1 CD, 2.4.0 through 2.4.7, 2.3.0 through 2.3.3, 2.2.0 through 2.2.2, and 2.3.0 through 2.3.3 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 283905." + } + ], + "id": "CVE-2024-27255", + "lastModified": "2024-03-03T12:15:36.867", + "metrics": { + "cvssMetricV31": [ + { + "cvssData": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6, + "source": "psirt@us.ibm.com", + "type": "Secondary" + } + ] + }, + "published": "2024-03-03T12:15:36.867", + "references": [ + { + "source": "psirt@us.ibm.com", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/283905" + }, + { + "source": "psirt@us.ibm.com", + "url": "https://www.ibm.com/support/pages/node/7126571" + } + ], + "sourceIdentifier": "psirt@us.ibm.com", + "vulnStatus": "Received", + "weaknesses": [ + { + "description": [ + { + "lang": "en", + "value": "CWE-327" + } + ], + "source": "psirt@us.ibm.com", + "type": "Primary" } ] } diff --git a/2024/28xxx/GSD-2024-28080.json b/2024/28xxx/GSD-2024-28080.json new file mode 100644 index 00000000000..c10bd9901cf --- /dev/null +++ b/2024/28xxx/GSD-2024-28080.json @@ -0,0 +1,38 @@ +{ + "gsd": { + "metadata": { + "exploitCode": "unknown", + "remediation": "unknown", + "reportConfidence": "confirmed", + "type": "vulnerability" + }, + "osvSchema": { + "aliases": [ + "CVE-2024-28080" + ], + "id": "GSD-2024-28080", + "modified": "2024-03-04T06:03:06.212652Z", + "schema_version": "1.4.0" + } + }, + "namespaces": { + "cve.org": { + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2024-28080", + "STATE": "RESERVED" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } + } + } +} \ No newline at end of file diff --git a/2024/28xxx/GSD-2024-28081.json b/2024/28xxx/GSD-2024-28081.json new file mode 100644 index 00000000000..2d586bab285 --- /dev/null +++ b/2024/28xxx/GSD-2024-28081.json @@ -0,0 +1,38 @@ +{ + "gsd": { + "metadata": { + "exploitCode": "unknown", + "remediation": "unknown", + "reportConfidence": "confirmed", + "type": "vulnerability" + }, + "osvSchema": { + "aliases": [ + "CVE-2024-28081" + ], + "id": "GSD-2024-28081", + "modified": "2024-03-04T06:03:06.209685Z", + "schema_version": "1.4.0" + } + }, + "namespaces": { + "cve.org": { + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2024-28081", + "STATE": "RESERVED" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } + } + } +} \ No newline at end of file diff --git a/2024/28xxx/GSD-2024-28082.json b/2024/28xxx/GSD-2024-28082.json new file mode 100644 index 00000000000..2a955e16007 --- /dev/null +++ b/2024/28xxx/GSD-2024-28082.json @@ -0,0 +1,38 @@ +{ + "gsd": { + "metadata": { + "exploitCode": "unknown", + "remediation": "unknown", + "reportConfidence": "confirmed", + "type": "vulnerability" + }, + "osvSchema": { + "aliases": [ + "CVE-2024-28082" + ], + "id": "GSD-2024-28082", + "modified": "2024-03-04T06:03:06.231414Z", + "schema_version": "1.4.0" + } + }, + "namespaces": { + "cve.org": { + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2024-28082", + "STATE": "RESERVED" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } + } + } +} \ No newline at end of file diff --git a/2024/28xxx/GSD-2024-28083.json b/2024/28xxx/GSD-2024-28083.json new file mode 100644 index 00000000000..9f024ac4be4 --- /dev/null +++ b/2024/28xxx/GSD-2024-28083.json @@ -0,0 +1,38 @@ +{ + "gsd": { + "metadata": { + "exploitCode": "unknown", + "remediation": "unknown", + "reportConfidence": "confirmed", + "type": "vulnerability" + }, + "osvSchema": { + "aliases": [ + "CVE-2024-28083" + ], + "id": "GSD-2024-28083", + "modified": "2024-03-04T06:03:06.229491Z", + "schema_version": "1.4.0" + } + }, + "namespaces": { + "cve.org": { + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2024-28083", + "STATE": "RESERVED" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } + } + } +} \ No newline at end of file diff --git a/2024/28xxx/GSD-2024-28084.json b/2024/28xxx/GSD-2024-28084.json new file mode 100644 index 00000000000..bf38097dd2d --- /dev/null +++ b/2024/28xxx/GSD-2024-28084.json @@ -0,0 +1,114 @@ +{ + "gsd": { + "metadata": { + "exploitCode": "unknown", + "remediation": "unknown", + "reportConfidence": "confirmed", + "type": "vulnerability" + }, + "osvSchema": { + "aliases": [ + "CVE-2024-28084" + ], + "details": "p2putil.c in iNet wireless daemon (IWD) through 2.15 allows attackers to cause a denial of service (daemon crash) or possibly have unspecified other impact because of initialization issues in situations where parsing of advertised service information fails.", + "id": "GSD-2024-28084", + "modified": "2024-03-04T06:03:06.230794Z", + "schema_version": "1.4.0" + } + }, + "namespaces": { + "cve.org": { + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2024-28084", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "p2putil.c in iNet wireless daemon (IWD) through 2.15 allows attackers to cause a denial of service (daemon crash) or possibly have unspecified other impact because of initialization issues in situations where parsing of advertised service information fails." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://git.kernel.org/pub/scm/network/wireless/iwd.git/commit/?id=52a47c9fd428904de611a90cbf8b223af879684d", + "refsource": "MISC", + "url": "https://git.kernel.org/pub/scm/network/wireless/iwd.git/commit/?id=52a47c9fd428904de611a90cbf8b223af879684d" + }, + { + "name": "https://git.kernel.org/pub/scm/network/wireless/iwd.git/commit/?id=d34b4e16e045142590ed7cb653e01ed0ae5362eb", + "refsource": "MISC", + "url": "https://git.kernel.org/pub/scm/network/wireless/iwd.git/commit/?id=d34b4e16e045142590ed7cb653e01ed0ae5362eb" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "p2putil.c in iNet wireless daemon (IWD) through 2.15 allows attackers to cause a denial of service (daemon crash) or possibly have unspecified other impact because of initialization issues in situations where parsing of advertised service information fails." + } + ], + "id": "CVE-2024-28084", + "lastModified": "2024-03-03T21:15:49.963", + "metrics": {}, + "published": "2024-03-03T21:15:49.963", + "references": [ + { + "source": "cve@mitre.org", + "url": "https://git.kernel.org/pub/scm/network/wireless/iwd.git/commit/?id=52a47c9fd428904de611a90cbf8b223af879684d" + }, + { + "source": "cve@mitre.org", + "url": "https://git.kernel.org/pub/scm/network/wireless/iwd.git/commit/?id=d34b4e16e045142590ed7cb653e01ed0ae5362eb" + } + ], + "sourceIdentifier": "cve@mitre.org", + "vulnStatus": "Received" + } + } + } +} \ No newline at end of file diff --git a/2024/28xxx/GSD-2024-28085.json b/2024/28xxx/GSD-2024-28085.json new file mode 100644 index 00000000000..c66d9cfe900 --- /dev/null +++ b/2024/28xxx/GSD-2024-28085.json @@ -0,0 +1,38 @@ +{ + "gsd": { + "metadata": { + "exploitCode": "unknown", + "remediation": "unknown", + "reportConfidence": "confirmed", + "type": "vulnerability" + }, + "osvSchema": { + "aliases": [ + "CVE-2024-28085" + ], + "id": "GSD-2024-28085", + "modified": "2024-03-04T06:03:06.201680Z", + "schema_version": "1.4.0" + } + }, + "namespaces": { + "cve.org": { + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2024-28085", + "STATE": "RESERVED" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } + } + } +} \ No newline at end of file diff --git a/2024/28xxx/GSD-2024-28086.json b/2024/28xxx/GSD-2024-28086.json new file mode 100644 index 00000000000..345bdb2e6cf --- /dev/null +++ b/2024/28xxx/GSD-2024-28086.json @@ -0,0 +1,38 @@ +{ + "gsd": { + "metadata": { + "exploitCode": "unknown", + "remediation": "unknown", + "reportConfidence": "confirmed", + "type": "vulnerability" + }, + "osvSchema": { + "aliases": [ + "CVE-2024-28086" + ], + "id": "GSD-2024-28086", + "modified": "2024-03-04T06:03:06.203830Z", + "schema_version": "1.4.0" + } + }, + "namespaces": { + "cve.org": { + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2024-28086", + "STATE": "RESERVED" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } + } + } +} \ No newline at end of file diff --git a/2024/28xxx/GSD-2024-28087.json b/2024/28xxx/GSD-2024-28087.json new file mode 100644 index 00000000000..4b691db23b5 --- /dev/null +++ b/2024/28xxx/GSD-2024-28087.json @@ -0,0 +1,38 @@ +{ + "gsd": { + "metadata": { + "exploitCode": "unknown", + "remediation": "unknown", + "reportConfidence": "confirmed", + "type": "vulnerability" + }, + "osvSchema": { + "aliases": [ + "CVE-2024-28087" + ], + "id": "GSD-2024-28087", + "modified": "2024-03-04T06:03:06.230495Z", + "schema_version": "1.4.0" + } + }, + "namespaces": { + "cve.org": { + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2024-28087", + "STATE": "RESERVED" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } + } + } +} \ No newline at end of file diff --git a/2024/28xxx/GSD-2024-28088.json b/2024/28xxx/GSD-2024-28088.json new file mode 100644 index 00000000000..e4a1de9dd0f --- /dev/null +++ b/2024/28xxx/GSD-2024-28088.json @@ -0,0 +1,114 @@ +{ + "gsd": { + "metadata": { + "exploitCode": "unknown", + "remediation": "unknown", + "reportConfidence": "confirmed", + "type": "vulnerability" + }, + "osvSchema": { + "aliases": [ + "CVE-2024-28088" + ], + "details": "LangChain through 0.1.10 allows ../ directory traversal by an actor who is able to control the final part of the path parameter in a load_chain call. This bypasses the intended behavior of loading configurations only from the hwchase17/langchain-hub GitHub repository. The outcome can be disclosure of an API key for a large language model online service, or remote code execution.", + "id": "GSD-2024-28088", + "modified": "2024-03-04T06:03:06.207356Z", + "schema_version": "1.4.0" + } + }, + "namespaces": { + "cve.org": { + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2024-28088", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "LangChain through 0.1.10 allows ../ directory traversal by an actor who is able to control the final part of the path parameter in a load_chain call. This bypasses the intended behavior of loading configurations only from the hwchase17/langchain-hub GitHub repository. The outcome can be disclosure of an API key for a large language model online service, or remote code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/PinkDraconian/PoC-Langchain-RCE/blob/main/README.md", + "refsource": "MISC", + "url": "https://github.com/PinkDraconian/PoC-Langchain-RCE/blob/main/README.md" + }, + { + "name": "https://github.com/langchain-ai/langchain/blob/f96dd57501131840b713ed7c2e86cbf1ddc2761f/libs/core/langchain_core/utils/loading.py", + "refsource": "MISC", + "url": "https://github.com/langchain-ai/langchain/blob/f96dd57501131840b713ed7c2e86cbf1ddc2761f/libs/core/langchain_core/utils/loading.py" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "LangChain through 0.1.10 allows ../ directory traversal by an actor who is able to control the final part of the path parameter in a load_chain call. This bypasses the intended behavior of loading configurations only from the hwchase17/langchain-hub GitHub repository. The outcome can be disclosure of an API key for a large language model online service, or remote code execution." + } + ], + "id": "CVE-2024-28088", + "lastModified": "2024-03-04T00:15:47.017", + "metrics": {}, + "published": "2024-03-04T00:15:47.017", + "references": [ + { + "source": "cve@mitre.org", + "url": "https://github.com/PinkDraconian/PoC-Langchain-RCE/blob/main/README.md" + }, + { + "source": "cve@mitre.org", + "url": "https://github.com/langchain-ai/langchain/blob/f96dd57501131840b713ed7c2e86cbf1ddc2761f/libs/core/langchain_core/utils/loading.py" + } + ], + "sourceIdentifier": "cve@mitre.org", + "vulnStatus": "Received" + } + } + } +} \ No newline at end of file diff --git a/2024/28xxx/GSD-2024-28089.json b/2024/28xxx/GSD-2024-28089.json new file mode 100644 index 00000000000..fd507320afe --- /dev/null +++ b/2024/28xxx/GSD-2024-28089.json @@ -0,0 +1,38 @@ +{ + "gsd": { + "metadata": { + "exploitCode": "unknown", + "remediation": "unknown", + "reportConfidence": "confirmed", + "type": "vulnerability" + }, + "osvSchema": { + "aliases": [ + "CVE-2024-28089" + ], + "id": "GSD-2024-28089", + "modified": "2024-03-04T06:03:06.229706Z", + "schema_version": "1.4.0" + } + }, + "namespaces": { + "cve.org": { + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2024-28089", + "STATE": "RESERVED" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } + } + } +} \ No newline at end of file diff --git a/2024/28xxx/GSD-2024-28090.json b/2024/28xxx/GSD-2024-28090.json new file mode 100644 index 00000000000..ae003d3a6a6 --- /dev/null +++ b/2024/28xxx/GSD-2024-28090.json @@ -0,0 +1,38 @@ +{ + "gsd": { + "metadata": { + "exploitCode": "unknown", + "remediation": "unknown", + "reportConfidence": "confirmed", + "type": "vulnerability" + }, + "osvSchema": { + "aliases": [ + "CVE-2024-28090" + ], + "id": "GSD-2024-28090", + "modified": "2024-03-04T06:03:06.225268Z", + "schema_version": "1.4.0" + } + }, + "namespaces": { + "cve.org": { + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2024-28090", + "STATE": "RESERVED" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } + } + } +} \ No newline at end of file diff --git a/2024/28xxx/GSD-2024-28091.json b/2024/28xxx/GSD-2024-28091.json new file mode 100644 index 00000000000..e1072a6b72b --- /dev/null +++ b/2024/28xxx/GSD-2024-28091.json @@ -0,0 +1,38 @@ +{ + "gsd": { + "metadata": { + "exploitCode": "unknown", + "remediation": "unknown", + "reportConfidence": "confirmed", + "type": "vulnerability" + }, + "osvSchema": { + "aliases": [ + "CVE-2024-28091" + ], + "id": "GSD-2024-28091", + "modified": "2024-03-04T06:03:06.209006Z", + "schema_version": "1.4.0" + } + }, + "namespaces": { + "cve.org": { + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2024-28091", + "STATE": "RESERVED" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } + } + } +} \ No newline at end of file diff --git a/2024/28xxx/GSD-2024-28092.json b/2024/28xxx/GSD-2024-28092.json new file mode 100644 index 00000000000..eacf7e8346b --- /dev/null +++ b/2024/28xxx/GSD-2024-28092.json @@ -0,0 +1,38 @@ +{ + "gsd": { + "metadata": { + "exploitCode": "unknown", + "remediation": "unknown", + "reportConfidence": "confirmed", + "type": "vulnerability" + }, + "osvSchema": { + "aliases": [ + "CVE-2024-28092" + ], + "id": "GSD-2024-28092", + "modified": "2024-03-04T06:03:06.231192Z", + "schema_version": "1.4.0" + } + }, + "namespaces": { + "cve.org": { + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2024-28092", + "STATE": "RESERVED" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } + } + } +} \ No newline at end of file diff --git a/2024/28xxx/GSD-2024-28093.json b/2024/28xxx/GSD-2024-28093.json new file mode 100644 index 00000000000..1592aaacf26 --- /dev/null +++ b/2024/28xxx/GSD-2024-28093.json @@ -0,0 +1,38 @@ +{ + "gsd": { + "metadata": { + "exploitCode": "unknown", + "remediation": "unknown", + "reportConfidence": "confirmed", + "type": "vulnerability" + }, + "osvSchema": { + "aliases": [ + "CVE-2024-28093" + ], + "id": "GSD-2024-28093", + "modified": "2024-03-04T06:03:06.201451Z", + "schema_version": "1.4.0" + } + }, + "namespaces": { + "cve.org": { + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2024-28093", + "STATE": "RESERVED" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } + } + } +} \ No newline at end of file diff --git a/2024/28xxx/GSD-2024-28094.json b/2024/28xxx/GSD-2024-28094.json new file mode 100644 index 00000000000..c88e967d6c6 --- /dev/null +++ b/2024/28xxx/GSD-2024-28094.json @@ -0,0 +1,38 @@ +{ + "gsd": { + "metadata": { + "exploitCode": "unknown", + "remediation": "unknown", + "reportConfidence": "confirmed", + "type": "vulnerability" + }, + "osvSchema": { + "aliases": [ + "CVE-2024-28094" + ], + "id": "GSD-2024-28094", + "modified": "2024-03-04T06:03:06.204366Z", + "schema_version": "1.4.0" + } + }, + "namespaces": { + "cve.org": { + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2024-28094", + "STATE": "RESERVED" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } + } + } +} \ No newline at end of file diff --git a/2024/28xxx/GSD-2024-28095.json b/2024/28xxx/GSD-2024-28095.json new file mode 100644 index 00000000000..c90edba2e0d --- /dev/null +++ b/2024/28xxx/GSD-2024-28095.json @@ -0,0 +1,38 @@ +{ + "gsd": { + "metadata": { + "exploitCode": "unknown", + "remediation": "unknown", + "reportConfidence": "confirmed", + "type": "vulnerability" + }, + "osvSchema": { + "aliases": [ + "CVE-2024-28095" + ], + "id": "GSD-2024-28095", + "modified": "2024-03-04T06:03:06.207085Z", + "schema_version": "1.4.0" + } + }, + "namespaces": { + "cve.org": { + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2024-28095", + "STATE": "RESERVED" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } + } + } +} \ No newline at end of file diff --git a/2024/28xxx/GSD-2024-28096.json b/2024/28xxx/GSD-2024-28096.json new file mode 100644 index 00000000000..e7fa5a36449 --- /dev/null +++ b/2024/28xxx/GSD-2024-28096.json @@ -0,0 +1,38 @@ +{ + "gsd": { + "metadata": { + "exploitCode": "unknown", + "remediation": "unknown", + "reportConfidence": "confirmed", + "type": "vulnerability" + }, + "osvSchema": { + "aliases": [ + "CVE-2024-28096" + ], + "id": "GSD-2024-28096", + "modified": "2024-03-04T06:03:06.209207Z", + "schema_version": "1.4.0" + } + }, + "namespaces": { + "cve.org": { + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2024-28096", + "STATE": "RESERVED" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } + } + } +} \ No newline at end of file diff --git a/2024/28xxx/GSD-2024-28097.json b/2024/28xxx/GSD-2024-28097.json new file mode 100644 index 00000000000..429ce93433c --- /dev/null +++ b/2024/28xxx/GSD-2024-28097.json @@ -0,0 +1,38 @@ +{ + "gsd": { + "metadata": { + "exploitCode": "unknown", + "remediation": "unknown", + "reportConfidence": "confirmed", + "type": "vulnerability" + }, + "osvSchema": { + "aliases": [ + "CVE-2024-28097" + ], + "id": "GSD-2024-28097", + "modified": "2024-03-04T06:03:06.202124Z", + "schema_version": "1.4.0" + } + }, + "namespaces": { + "cve.org": { + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2024-28097", + "STATE": "RESERVED" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } + } + } +} \ No newline at end of file diff --git a/2024/2xxx/GSD-2024-2145.json b/2024/2xxx/GSD-2024-2145.json index 99269a0f7fb..d78a50bf173 100644 --- a/2024/2xxx/GSD-2024-2145.json +++ b/2024/2xxx/GSD-2024-2145.json @@ -10,6 +10,7 @@ "aliases": [ "CVE-2024-2145" ], + "details": "A vulnerability was found in SourceCodester Online Mobile Management Store 1.0. It has been classified as problematic. Affected is an unknown function of the file /endpoint/update-tracker.php. The manipulation of the argument firstname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-255498 is the identifier assigned to this vulnerability.", "id": "GSD-2024-2145", "modified": "2024-03-03T06:02:37.582921Z", "schema_version": "1.4.0" @@ -18,10 +19,40 @@ "namespaces": { "cve.org": { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "cna@vuldb.com", "ID": "CVE-2024-2145", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Online Mobile Management Store", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + }, + "vendor_name": "SourceCodester" + } + ] + } + }, + "credits": [ + { + "lang": "en", + "value": "rjavenido22 (VulDB User)" + } + ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", @@ -29,7 +60,154 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in SourceCodester Online Mobile Management Store 1.0. It has been classified as problematic. Affected is an unknown function of the file /endpoint/update-tracker.php. The manipulation of the argument firstname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-255498 is the identifier assigned to this vulnerability." + }, + { + "lang": "deu", + "value": "Es wurde eine problematische Schwachstelle in SourceCodester Online Mobile Management Store 1.0 ausgemacht. Dabei betrifft es einen unbekannter Codeteil der Datei /endpoint/update-tracker.php. Dank Manipulation des Arguments firstname mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "impact": { + "cvss": [ + { + "baseScore": 3.5, + "baseSeverity": "LOW", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "version": "3.1" + }, + { + "baseScore": 3.5, + "baseSeverity": "LOW", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "version": "3.0" + }, + { + "baseScore": 4, + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "version": "2.0" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "cweId": "CWE-79", + "lang": "eng", + "value": "CWE-79 Cross Site Scripting" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://vuldb.com/?id.255498", + "refsource": "MISC", + "url": "https://vuldb.com/?id.255498" + }, + { + "name": "https://vuldb.com/?ctiid.255498", + "refsource": "MISC", + "url": "https://vuldb.com/?ctiid.255498" + }, + { + "name": "https://github.com/vanitashtml/CVE-Dumps/blob/main/Stored%20XSS%20Mobile%20Management%20Store.md", + "refsource": "MISC", + "url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/Stored%20XSS%20Mobile%20Management%20Store.md" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Online Mobile Management Store 1.0. It has been classified as problematic. Affected is an unknown function of the file /endpoint/update-tracker.php. The manipulation of the argument firstname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-255498 is the identifier assigned to this vulnerability." + } + ], + "id": "CVE-2024-2145", + "lastModified": "2024-03-03T14:15:52.383", + "metrics": { + "cvssMetricV2": [ + { + "acInsufInfo": false, + "baseSeverity": "MEDIUM", + "cvssData": { + "accessComplexity": "LOW", + "accessVector": "NETWORK", + "authentication": "SINGLE", + "availabilityImpact": "NONE", + "baseScore": 4.0, + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "version": "2.0" + }, + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "obtainAllPrivilege": false, + "obtainOtherPrivilege": false, + "obtainUserPrivilege": false, + "source": "cna@vuldb.com", + "type": "Secondary", + "userInteractionRequired": false + } + ], + "cvssMetricV31": [ + { + "cvssData": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "version": "3.1" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4, + "source": "cna@vuldb.com", + "type": "Secondary" + } + ] + }, + "published": "2024-03-03T14:15:52.383", + "references": [ + { + "source": "cna@vuldb.com", + "url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/Stored%20XSS%20Mobile%20Management%20Store.md" + }, + { + "source": "cna@vuldb.com", + "url": "https://vuldb.com/?ctiid.255498" + }, + { + "source": "cna@vuldb.com", + "url": "https://vuldb.com/?id.255498" + } + ], + "sourceIdentifier": "cna@vuldb.com", + "vulnStatus": "Received", + "weaknesses": [ + { + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ], + "source": "cna@vuldb.com", + "type": "Primary" } ] } diff --git a/2024/2xxx/GSD-2024-2146.json b/2024/2xxx/GSD-2024-2146.json index 26b9bbe0b23..200ab9e14c0 100644 --- a/2024/2xxx/GSD-2024-2146.json +++ b/2024/2xxx/GSD-2024-2146.json @@ -10,6 +10,7 @@ "aliases": [ "CVE-2024-2146" ], + "details": "A vulnerability was found in SourceCodester Online Mobile Management Store 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /?p=products. The manipulation of the argument search leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-255499.", "id": "GSD-2024-2146", "modified": "2024-03-03T06:02:37.618354Z", "schema_version": "1.4.0" @@ -18,10 +19,40 @@ "namespaces": { "cve.org": { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "cna@vuldb.com", "ID": "CVE-2024-2146", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Online Mobile Management Store", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + }, + "vendor_name": "SourceCodester" + } + ] + } + }, + "credits": [ + { + "lang": "en", + "value": "rjavenido22 (VulDB User)" + } + ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", @@ -29,7 +60,154 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in SourceCodester Online Mobile Management Store 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /?p=products. The manipulation of the argument search leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-255499." + }, + { + "lang": "deu", + "value": "In SourceCodester Online Mobile Management Store 1.0 wurde eine problematische Schwachstelle ausgemacht. Hierbei betrifft es unbekannten Programmcode der Datei /?p=products. Mit der Manipulation des Arguments search mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "impact": { + "cvss": [ + { + "baseScore": 3.5, + "baseSeverity": "LOW", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "version": "3.1" + }, + { + "baseScore": 3.5, + "baseSeverity": "LOW", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "version": "3.0" + }, + { + "baseScore": 4, + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "version": "2.0" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "cweId": "CWE-79", + "lang": "eng", + "value": "CWE-79 Cross Site Scripting" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://vuldb.com/?id.255499", + "refsource": "MISC", + "url": "https://vuldb.com/?id.255499" + }, + { + "name": "https://vuldb.com/?ctiid.255499", + "refsource": "MISC", + "url": "https://vuldb.com/?ctiid.255499" + }, + { + "name": "https://github.com/vanitashtml/CVE-Dumps/blob/main/Reflected%20XSS%20in%20Mobile%20Management%20Store.md", + "refsource": "MISC", + "url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/Reflected%20XSS%20in%20Mobile%20Management%20Store.md" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Online Mobile Management Store 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /?p=products. The manipulation of the argument search leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-255499." + } + ], + "id": "CVE-2024-2146", + "lastModified": "2024-03-03T15:15:07.573", + "metrics": { + "cvssMetricV2": [ + { + "acInsufInfo": false, + "baseSeverity": "MEDIUM", + "cvssData": { + "accessComplexity": "LOW", + "accessVector": "NETWORK", + "authentication": "SINGLE", + "availabilityImpact": "NONE", + "baseScore": 4.0, + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "version": "2.0" + }, + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "obtainAllPrivilege": false, + "obtainOtherPrivilege": false, + "obtainUserPrivilege": false, + "source": "cna@vuldb.com", + "type": "Secondary", + "userInteractionRequired": false + } + ], + "cvssMetricV31": [ + { + "cvssData": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "version": "3.1" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4, + "source": "cna@vuldb.com", + "type": "Secondary" + } + ] + }, + "published": "2024-03-03T15:15:07.573", + "references": [ + { + "source": "cna@vuldb.com", + "url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/Reflected%20XSS%20in%20Mobile%20Management%20Store.md" + }, + { + "source": "cna@vuldb.com", + "url": "https://vuldb.com/?ctiid.255499" + }, + { + "source": "cna@vuldb.com", + "url": "https://vuldb.com/?id.255499" + } + ], + "sourceIdentifier": "cna@vuldb.com", + "vulnStatus": "Received", + "weaknesses": [ + { + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ], + "source": "cna@vuldb.com", + "type": "Primary" } ] } diff --git a/2024/2xxx/GSD-2024-2147.json b/2024/2xxx/GSD-2024-2147.json index 38199bdb7f8..67b94d1437d 100644 --- a/2024/2xxx/GSD-2024-2147.json +++ b/2024/2xxx/GSD-2024-2147.json @@ -10,6 +10,7 @@ "aliases": [ "CVE-2024-2147" ], + "details": "A vulnerability was found in SourceCodester Online Mobile Management Store 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/login.php. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-255500.", "id": "GSD-2024-2147", "modified": "2024-03-03T06:02:37.562215Z", "schema_version": "1.4.0" @@ -18,10 +19,40 @@ "namespaces": { "cve.org": { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "cna@vuldb.com", "ID": "CVE-2024-2147", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Online Mobile Management Store", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + }, + "vendor_name": "SourceCodester" + } + ] + } + }, + "credits": [ + { + "lang": "en", + "value": "rjavenido22 (VulDB User)" + } + ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", @@ -29,7 +60,154 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in SourceCodester Online Mobile Management Store 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/login.php. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-255500." + }, + { + "lang": "deu", + "value": "Eine kritische Schwachstelle wurde in SourceCodester Online Mobile Management Store 1.0 ausgemacht. Davon betroffen ist unbekannter Code der Datei /admin/login.php. Durch die Manipulation des Arguments username mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "impact": { + "cvss": [ + { + "baseScore": 7.3, + "baseSeverity": "HIGH", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "version": "3.1" + }, + { + "baseScore": 7.3, + "baseSeverity": "HIGH", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "version": "3.0" + }, + { + "baseScore": 7.5, + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "version": "2.0" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "cweId": "CWE-89", + "lang": "eng", + "value": "CWE-89 SQL Injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://vuldb.com/?id.255500", + "refsource": "MISC", + "url": "https://vuldb.com/?id.255500" + }, + { + "name": "https://vuldb.com/?ctiid.255500", + "refsource": "MISC", + "url": "https://vuldb.com/?ctiid.255500" + }, + { + "name": "https://github.com/vanitashtml/CVE-Dumps/blob/main/Sql%20Injection%20Authentication%20Bypass%20in%20Mobile%20Management%20Store.md", + "refsource": "MISC", + "url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/Sql%20Injection%20Authentication%20Bypass%20in%20Mobile%20Management%20Store.md" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Online Mobile Management Store 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/login.php. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-255500." + } + ], + "id": "CVE-2024-2147", + "lastModified": "2024-03-03T17:15:07.123", + "metrics": { + "cvssMetricV2": [ + { + "acInsufInfo": false, + "baseSeverity": "HIGH", + "cvssData": { + "accessComplexity": "LOW", + "accessVector": "NETWORK", + "authentication": "NONE", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5, + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "version": "2.0" + }, + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "obtainAllPrivilege": false, + "obtainOtherPrivilege": false, + "obtainUserPrivilege": false, + "source": "cna@vuldb.com", + "type": "Secondary", + "userInteractionRequired": false + } + ], + "cvssMetricV31": [ + { + "cvssData": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "version": "3.1" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4, + "source": "cna@vuldb.com", + "type": "Secondary" + } + ] + }, + "published": "2024-03-03T17:15:07.123", + "references": [ + { + "source": "cna@vuldb.com", + "url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/Sql%20Injection%20Authentication%20Bypass%20in%20Mobile%20Management%20Store.md" + }, + { + "source": "cna@vuldb.com", + "url": "https://vuldb.com/?ctiid.255500" + }, + { + "source": "cna@vuldb.com", + "url": "https://vuldb.com/?id.255500" + } + ], + "sourceIdentifier": "cna@vuldb.com", + "vulnStatus": "Received", + "weaknesses": [ + { + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ], + "source": "cna@vuldb.com", + "type": "Secondary" } ] } diff --git a/2024/2xxx/GSD-2024-2148.json b/2024/2xxx/GSD-2024-2148.json index b29d4cc5f45..382d5e96e2a 100644 --- a/2024/2xxx/GSD-2024-2148.json +++ b/2024/2xxx/GSD-2024-2148.json @@ -10,6 +10,7 @@ "aliases": [ "CVE-2024-2148" ], + "details": "A vulnerability classified as critical has been found in SourceCodester Online Mobile Management Store 1.0. This affects an unknown part of the file /classes/Users.php. The manipulation of the argument img leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-255501 was assigned to this vulnerability.", "id": "GSD-2024-2148", "modified": "2024-03-03T06:02:37.567940Z", "schema_version": "1.4.0" @@ -18,10 +19,40 @@ "namespaces": { "cve.org": { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "cna@vuldb.com", "ID": "CVE-2024-2148", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Online Mobile Management Store", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + }, + "vendor_name": "SourceCodester" + } + ] + } + }, + "credits": [ + { + "lang": "en", + "value": "rjavenido22 (VulDB User)" + } + ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", @@ -29,7 +60,154 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability classified as critical has been found in SourceCodester Online Mobile Management Store 1.0. This affects an unknown part of the file /classes/Users.php. The manipulation of the argument img leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-255501 was assigned to this vulnerability." + }, + { + "lang": "deu", + "value": "Es wurde eine Schwachstelle in SourceCodester Online Mobile Management Store 1.0 entdeckt. Sie wurde als kritisch eingestuft. Hiervon betroffen ist ein unbekannter Codeblock der Datei /classes/Users.php. Durch Manipulation des Arguments img mit unbekannten Daten kann eine unrestricted upload-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "impact": { + "cvss": [ + { + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "version": "3.1" + }, + { + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "version": "3.0" + }, + { + "baseScore": 6.5, + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "version": "2.0" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "cweId": "CWE-434", + "lang": "eng", + "value": "CWE-434 Unrestricted Upload" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://vuldb.com/?id.255501", + "refsource": "MISC", + "url": "https://vuldb.com/?id.255501" + }, + { + "name": "https://vuldb.com/?ctiid.255501", + "refsource": "MISC", + "url": "https://vuldb.com/?ctiid.255501" + }, + { + "name": "https://github.com/vanitashtml/CVE-Dumps/blob/main/RCE%20via%20Arbitrary%20File%20Upload%20in%20Mobile%20Management%20Store.md", + "refsource": "MISC", + "url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/RCE%20via%20Arbitrary%20File%20Upload%20in%20Mobile%20Management%20Store.md" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in SourceCodester Online Mobile Management Store 1.0. This affects an unknown part of the file /classes/Users.php. The manipulation of the argument img leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-255501 was assigned to this vulnerability." + } + ], + "id": "CVE-2024-2148", + "lastModified": "2024-03-03T17:15:07.353", + "metrics": { + "cvssMetricV2": [ + { + "acInsufInfo": false, + "baseSeverity": "MEDIUM", + "cvssData": { + "accessComplexity": "LOW", + "accessVector": "NETWORK", + "authentication": "SINGLE", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5, + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "version": "2.0" + }, + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "obtainAllPrivilege": false, + "obtainOtherPrivilege": false, + "obtainUserPrivilege": false, + "source": "cna@vuldb.com", + "type": "Secondary", + "userInteractionRequired": false + } + ], + "cvssMetricV31": [ + { + "cvssData": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "version": "3.1" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4, + "source": "cna@vuldb.com", + "type": "Secondary" + } + ] + }, + "published": "2024-03-03T17:15:07.353", + "references": [ + { + "source": "cna@vuldb.com", + "url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/RCE%20via%20Arbitrary%20File%20Upload%20in%20Mobile%20Management%20Store.md" + }, + { + "source": "cna@vuldb.com", + "url": "https://vuldb.com/?ctiid.255501" + }, + { + "source": "cna@vuldb.com", + "url": "https://vuldb.com/?id.255501" + } + ], + "sourceIdentifier": "cna@vuldb.com", + "vulnStatus": "Received", + "weaknesses": [ + { + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ], + "source": "cna@vuldb.com", + "type": "Primary" } ] } diff --git a/2024/2xxx/GSD-2024-2149.json b/2024/2xxx/GSD-2024-2149.json index 595870282e8..895c46e1b1f 100644 --- a/2024/2xxx/GSD-2024-2149.json +++ b/2024/2xxx/GSD-2024-2149.json @@ -10,6 +10,7 @@ "aliases": [ "CVE-2024-2149" ], + "details": "A vulnerability classified as critical was found in CodeAstro Membership Management System 1.0. This vulnerability affects unknown code of the file settings.php. The manipulation of the argument currency leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-255502 is the identifier assigned to this vulnerability.", "id": "GSD-2024-2149", "modified": "2024-03-03T06:02:37.612188Z", "schema_version": "1.4.0" @@ -18,10 +19,40 @@ "namespaces": { "cve.org": { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "cna@vuldb.com", "ID": "CVE-2024-2149", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Membership Management System", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + }, + "vendor_name": "CodeAstro" + } + ] + } + }, + "credits": [ + { + "lang": "en", + "value": "JiaDongGao (VulDB User)" + } + ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", @@ -29,7 +60,154 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability classified as critical was found in CodeAstro Membership Management System 1.0. This vulnerability affects unknown code of the file settings.php. The manipulation of the argument currency leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-255502 is the identifier assigned to this vulnerability." + }, + { + "lang": "deu", + "value": "In CodeAstro Membership Management System 1.0 wurde eine Schwachstelle entdeckt. Sie wurde als kritisch eingestuft. Betroffen ist eine unbekannte Verarbeitung der Datei settings.php. Mittels dem Manipulieren des Arguments currency mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "impact": { + "cvss": [ + { + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "version": "3.1" + }, + { + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "version": "3.0" + }, + { + "baseScore": 5.8, + "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P", + "version": "2.0" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "cweId": "CWE-89", + "lang": "eng", + "value": "CWE-89 SQL Injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://vuldb.com/?id.255502", + "refsource": "MISC", + "url": "https://vuldb.com/?id.255502" + }, + { + "name": "https://vuldb.com/?ctiid.255502", + "refsource": "MISC", + "url": "https://vuldb.com/?ctiid.255502" + }, + { + "name": "https://github.com/JiaDongGao1/CVE_Hunter/blob/main/SQLi-2.md", + "refsource": "MISC", + "url": "https://github.com/JiaDongGao1/CVE_Hunter/blob/main/SQLi-2.md" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in CodeAstro Membership Management System 1.0. This vulnerability affects unknown code of the file settings.php. The manipulation of the argument currency leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-255502 is the identifier assigned to this vulnerability." + } + ], + "id": "CVE-2024-2149", + "lastModified": "2024-03-03T18:15:10.723", + "metrics": { + "cvssMetricV2": [ + { + "acInsufInfo": false, + "baseSeverity": "MEDIUM", + "cvssData": { + "accessComplexity": "LOW", + "accessVector": "NETWORK", + "authentication": "MULTIPLE", + "availabilityImpact": "PARTIAL", + "baseScore": 5.8, + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P", + "version": "2.0" + }, + "exploitabilityScore": 6.4, + "impactScore": 6.4, + "obtainAllPrivilege": false, + "obtainOtherPrivilege": false, + "obtainUserPrivilege": false, + "source": "cna@vuldb.com", + "type": "Secondary", + "userInteractionRequired": false + } + ], + "cvssMetricV31": [ + { + "cvssData": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "version": "3.1" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4, + "source": "cna@vuldb.com", + "type": "Secondary" + } + ] + }, + "published": "2024-03-03T18:15:10.723", + "references": [ + { + "source": "cna@vuldb.com", + "url": "https://github.com/JiaDongGao1/CVE_Hunter/blob/main/SQLi-2.md" + }, + { + "source": "cna@vuldb.com", + "url": "https://vuldb.com/?ctiid.255502" + }, + { + "source": "cna@vuldb.com", + "url": "https://vuldb.com/?id.255502" + } + ], + "sourceIdentifier": "cna@vuldb.com", + "vulnStatus": "Received", + "weaknesses": [ + { + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ], + "source": "cna@vuldb.com", + "type": "Primary" } ] } diff --git a/2024/2xxx/GSD-2024-2150.json b/2024/2xxx/GSD-2024-2150.json index be6379b0dbd..1c24e44f4af 100644 --- a/2024/2xxx/GSD-2024-2150.json +++ b/2024/2xxx/GSD-2024-2150.json @@ -10,6 +10,7 @@ "aliases": [ "CVE-2024-2150" ], + "details": "A vulnerability, which was classified as critical, has been found in SourceCodester Insurance Management System 1.0. This issue affects some unknown processing. The manipulation of the argument page leads to file inclusion. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-255503.", "id": "GSD-2024-2150", "modified": "2024-03-03T06:02:37.616971Z", "schema_version": "1.4.0" @@ -18,10 +19,40 @@ "namespaces": { "cve.org": { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "cna@vuldb.com", "ID": "CVE-2024-2150", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Insurance Management System", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + }, + "vendor_name": "SourceCodester" + } + ] + } + }, + "credits": [ + { + "lang": "en", + "value": "wkeyi0x1 (VulDB User)" + } + ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", @@ -29,7 +60,154 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability, which was classified as critical, has been found in SourceCodester Insurance Management System 1.0. This issue affects some unknown processing. The manipulation of the argument page leads to file inclusion. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-255503." + }, + { + "lang": "deu", + "value": "Eine Schwachstelle wurde in SourceCodester Insurance Management System 1.0 entdeckt. Sie wurde als kritisch eingestuft. Betroffen davon ist ein unbekannter Prozess. Mittels Manipulieren des Arguments page mit unbekannten Daten kann eine file inclusion-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "impact": { + "cvss": [ + { + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "version": "3.1" + }, + { + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "version": "3.0" + }, + { + "baseScore": 5, + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "version": "2.0" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "cweId": "CWE-73", + "lang": "eng", + "value": "CWE-73 File Inclusion" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://vuldb.com/?id.255503", + "refsource": "MISC", + "url": "https://vuldb.com/?id.255503" + }, + { + "name": "https://vuldb.com/?ctiid.255503", + "refsource": "MISC", + "url": "https://vuldb.com/?ctiid.255503" + }, + { + "name": "https://github.com/wkeyi0x1/vul-report/blob/main/Insurance%20Management%20System%20PHP%20and%20MySQL/Insurance%20Management%20System%20PHP%20and%20MySQL%20v1.0%20-%20File%20Inclusion.md", + "refsource": "MISC", + "url": "https://github.com/wkeyi0x1/vul-report/blob/main/Insurance%20Management%20System%20PHP%20and%20MySQL/Insurance%20Management%20System%20PHP%20and%20MySQL%20v1.0%20-%20File%20Inclusion.md" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in SourceCodester Insurance Management System 1.0. This issue affects some unknown processing. The manipulation of the argument page leads to file inclusion. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-255503." + } + ], + "id": "CVE-2024-2150", + "lastModified": "2024-03-03T18:15:10.967", + "metrics": { + "cvssMetricV2": [ + { + "acInsufInfo": false, + "baseSeverity": "MEDIUM", + "cvssData": { + "accessComplexity": "LOW", + "accessVector": "NETWORK", + "authentication": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.0, + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "version": "2.0" + }, + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "obtainAllPrivilege": false, + "obtainOtherPrivilege": false, + "obtainUserPrivilege": false, + "source": "cna@vuldb.com", + "type": "Secondary", + "userInteractionRequired": false + } + ], + "cvssMetricV31": [ + { + "cvssData": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "version": "3.1" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4, + "source": "cna@vuldb.com", + "type": "Secondary" + } + ] + }, + "published": "2024-03-03T18:15:10.967", + "references": [ + { + "source": "cna@vuldb.com", + "url": "https://github.com/wkeyi0x1/vul-report/blob/main/Insurance%20Management%20System%20PHP%20and%20MySQL/Insurance%20Management%20System%20PHP%20and%20MySQL%20v1.0%20-%20File%20Inclusion.md" + }, + { + "source": "cna@vuldb.com", + "url": "https://vuldb.com/?ctiid.255503" + }, + { + "source": "cna@vuldb.com", + "url": "https://vuldb.com/?id.255503" + } + ], + "sourceIdentifier": "cna@vuldb.com", + "vulnStatus": "Received", + "weaknesses": [ + { + "description": [ + { + "lang": "en", + "value": "CWE-73" + } + ], + "source": "cna@vuldb.com", + "type": "Primary" } ] } diff --git a/2024/2xxx/GSD-2024-2151.json b/2024/2xxx/GSD-2024-2151.json new file mode 100644 index 00000000000..a373cdeca0c --- /dev/null +++ b/2024/2xxx/GSD-2024-2151.json @@ -0,0 +1,216 @@ +{ + "gsd": { + "metadata": { + "exploitCode": "unknown", + "remediation": "unknown", + "reportConfidence": "confirmed", + "type": "vulnerability" + }, + "osvSchema": { + "aliases": [ + "CVE-2024-2151" + ], + "details": "A vulnerability classified as problematic was found in SourceCodester Online Mobile Management Store 1.0. Affected by this vulnerability is an unknown functionality of the component Product Price Handler. The manipulation of the argument quantity with the input -1 leads to business logic errors. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-255583.", + "id": "GSD-2024-2151", + "modified": "2024-03-04T06:03:03.594130Z", + "schema_version": "1.4.0" + } + }, + "namespaces": { + "cve.org": { + "CVE_data_meta": { + "ASSIGNER": "cna@vuldb.com", + "ID": "CVE-2024-2151", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Online Mobile Management Store", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + }, + "vendor_name": "SourceCodester" + } + ] + } + }, + "credits": [ + { + "lang": "en", + "value": "rjavenido22 (VulDB User)" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A vulnerability classified as problematic was found in SourceCodester Online Mobile Management Store 1.0. Affected by this vulnerability is an unknown functionality of the component Product Price Handler. The manipulation of the argument quantity with the input -1 leads to business logic errors. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-255583." + }, + { + "lang": "deu", + "value": "In SourceCodester Online Mobile Management Store 1.0 wurde eine problematische Schwachstelle entdeckt. Dabei geht es um eine nicht genauer bekannte Funktion der Komponente Product Price Handler. Durch das Beeinflussen des Arguments quantity mit der Eingabe -1 mit unbekannten Daten kann eine business logic errors-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "impact": { + "cvss": [ + { + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "version": "3.1" + }, + { + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "version": "3.0" + }, + { + "baseScore": 4, + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "version": "2.0" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "cweId": "CWE-840", + "lang": "eng", + "value": "CWE-840 Business Logic Errors" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://vuldb.com/?id.255583", + "refsource": "MISC", + "url": "https://vuldb.com/?id.255583" + }, + { + "name": "https://vuldb.com/?ctiid.255583", + "refsource": "MISC", + "url": "https://vuldb.com/?ctiid.255583" + }, + { + "name": "https://github.com/vanitashtml/CVE-Dumps/blob/main/Business%20Logic%20in%20Mobile%20Management%20Store.md", + "refsource": "MISC", + "url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/Business%20Logic%20in%20Mobile%20Management%20Store.md" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic was found in SourceCodester Online Mobile Management Store 1.0. Affected by this vulnerability is an unknown functionality of the component Product Price Handler. The manipulation of the argument quantity with the input -1 leads to business logic errors. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-255583." + } + ], + "id": "CVE-2024-2151", + "lastModified": "2024-03-04T00:15:47.070", + "metrics": { + "cvssMetricV2": [ + { + "acInsufInfo": false, + "baseSeverity": "MEDIUM", + "cvssData": { + "accessComplexity": "LOW", + "accessVector": "NETWORK", + "authentication": "SINGLE", + "availabilityImpact": "NONE", + "baseScore": 4.0, + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "version": "2.0" + }, + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "obtainAllPrivilege": false, + "obtainOtherPrivilege": false, + "obtainUserPrivilege": false, + "source": "cna@vuldb.com", + "type": "Secondary", + "userInteractionRequired": false + } + ], + "cvssMetricV31": [ + { + "cvssData": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "version": "3.1" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4, + "source": "cna@vuldb.com", + "type": "Secondary" + } + ] + }, + "published": "2024-03-04T00:15:47.070", + "references": [ + { + "source": "cna@vuldb.com", + "url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/Business%20Logic%20in%20Mobile%20Management%20Store.md" + }, + { + "source": "cna@vuldb.com", + "url": "https://vuldb.com/?ctiid.255583" + }, + { + "source": "cna@vuldb.com", + "url": "https://vuldb.com/?id.255583" + } + ], + "sourceIdentifier": "cna@vuldb.com", + "vulnStatus": "Received", + "weaknesses": [ + { + "description": [ + { + "lang": "en", + "value": "CWE-840" + } + ], + "source": "cna@vuldb.com", + "type": "Primary" + } + ] + } + } + } +} \ No newline at end of file diff --git a/2024/2xxx/GSD-2024-2152.json b/2024/2xxx/GSD-2024-2152.json new file mode 100644 index 00000000000..7fc22684d48 --- /dev/null +++ b/2024/2xxx/GSD-2024-2152.json @@ -0,0 +1,216 @@ +{ + "gsd": { + "metadata": { + "exploitCode": "unknown", + "remediation": "unknown", + "reportConfidence": "confirmed", + "type": "vulnerability" + }, + "osvSchema": { + "aliases": [ + "CVE-2024-2152" + ], + "details": "A vulnerability, which was classified as critical, has been found in SourceCodester Online Mobile Management Store 1.0. Affected by this issue is some unknown functionality of the file /admin/product/manage_product.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-255584.", + "id": "GSD-2024-2152", + "modified": "2024-03-04T06:03:03.562758Z", + "schema_version": "1.4.0" + } + }, + "namespaces": { + "cve.org": { + "CVE_data_meta": { + "ASSIGNER": "cna@vuldb.com", + "ID": "CVE-2024-2152", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Online Mobile Management Store", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + }, + "vendor_name": "SourceCodester" + } + ] + } + }, + "credits": [ + { + "lang": "en", + "value": "rjavenido22 (VulDB User)" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A vulnerability, which was classified as critical, has been found in SourceCodester Online Mobile Management Store 1.0. Affected by this issue is some unknown functionality of the file /admin/product/manage_product.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-255584." + }, + { + "lang": "deu", + "value": "Eine kritische Schwachstelle wurde in SourceCodester Online Mobile Management Store 1.0 entdeckt. Hierbei geht es um eine nicht exakt ausgemachte Funktion der Datei /admin/product/manage_product.php. Durch Beeinflussen des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "impact": { + "cvss": [ + { + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "version": "3.1" + }, + { + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "version": "3.0" + }, + { + "baseScore": 5.8, + "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P", + "version": "2.0" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "cweId": "CWE-89", + "lang": "eng", + "value": "CWE-89 SQL Injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://vuldb.com/?id.255584", + "refsource": "MISC", + "url": "https://vuldb.com/?id.255584" + }, + { + "name": "https://vuldb.com/?ctiid.255584", + "refsource": "MISC", + "url": "https://vuldb.com/?ctiid.255584" + }, + { + "name": "https://github.com/vanitashtml/CVE-Dumps/blob/main/SQL%20Injection%20in%20Mobile%20Management%20Store.md", + "refsource": "MISC", + "url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/SQL%20Injection%20in%20Mobile%20Management%20Store.md" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in SourceCodester Online Mobile Management Store 1.0. Affected by this issue is some unknown functionality of the file /admin/product/manage_product.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-255584." + } + ], + "id": "CVE-2024-2152", + "lastModified": "2024-03-04T00:15:47.303", + "metrics": { + "cvssMetricV2": [ + { + "acInsufInfo": false, + "baseSeverity": "MEDIUM", + "cvssData": { + "accessComplexity": "LOW", + "accessVector": "NETWORK", + "authentication": "MULTIPLE", + "availabilityImpact": "PARTIAL", + "baseScore": 5.8, + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P", + "version": "2.0" + }, + "exploitabilityScore": 6.4, + "impactScore": 6.4, + "obtainAllPrivilege": false, + "obtainOtherPrivilege": false, + "obtainUserPrivilege": false, + "source": "cna@vuldb.com", + "type": "Secondary", + "userInteractionRequired": false + } + ], + "cvssMetricV31": [ + { + "cvssData": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "version": "3.1" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4, + "source": "cna@vuldb.com", + "type": "Secondary" + } + ] + }, + "published": "2024-03-04T00:15:47.303", + "references": [ + { + "source": "cna@vuldb.com", + "url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/SQL%20Injection%20in%20Mobile%20Management%20Store.md" + }, + { + "source": "cna@vuldb.com", + "url": "https://vuldb.com/?ctiid.255584" + }, + { + "source": "cna@vuldb.com", + "url": "https://vuldb.com/?id.255584" + } + ], + "sourceIdentifier": "cna@vuldb.com", + "vulnStatus": "Received", + "weaknesses": [ + { + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ], + "source": "cna@vuldb.com", + "type": "Primary" + } + ] + } + } + } +} \ No newline at end of file diff --git a/2024/2xxx/GSD-2024-2153.json b/2024/2xxx/GSD-2024-2153.json new file mode 100644 index 00000000000..f5977a52716 --- /dev/null +++ b/2024/2xxx/GSD-2024-2153.json @@ -0,0 +1,216 @@ +{ + "gsd": { + "metadata": { + "exploitCode": "unknown", + "remediation": "unknown", + "reportConfidence": "confirmed", + "type": "vulnerability" + }, + "osvSchema": { + "aliases": [ + "CVE-2024-2153" + ], + "details": "A vulnerability, which was classified as critical, was found in SourceCodester Online Mobile Management Store 1.0. This affects an unknown part of the file /admin/orders/view_order.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-255585 was assigned to this vulnerability.", + "id": "GSD-2024-2153", + "modified": "2024-03-04T06:03:03.565155Z", + "schema_version": "1.4.0" + } + }, + "namespaces": { + "cve.org": { + "CVE_data_meta": { + "ASSIGNER": "cna@vuldb.com", + "ID": "CVE-2024-2153", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Online Mobile Management Store", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + }, + "vendor_name": "SourceCodester" + } + ] + } + }, + "credits": [ + { + "lang": "en", + "value": "rjavenido22 (VulDB User)" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A vulnerability, which was classified as critical, was found in SourceCodester Online Mobile Management Store 1.0. This affects an unknown part of the file /admin/orders/view_order.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-255585 was assigned to this vulnerability." + }, + { + "lang": "deu", + "value": "Es wurde eine kritische Schwachstelle in SourceCodester Online Mobile Management Store 1.0 gefunden. Es betrifft eine unbekannte Funktion der Datei /admin/orders/view_order.php. Dank der Manipulation des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "impact": { + "cvss": [ + { + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "version": "3.1" + }, + { + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "version": "3.0" + }, + { + "baseScore": 6.5, + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "version": "2.0" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "cweId": "CWE-89", + "lang": "eng", + "value": "CWE-89 SQL Injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://vuldb.com/?id.255585", + "refsource": "MISC", + "url": "https://vuldb.com/?id.255585" + }, + { + "name": "https://vuldb.com/?ctiid.255585", + "refsource": "MISC", + "url": "https://vuldb.com/?ctiid.255585" + }, + { + "name": "https://github.com/vanitashtml/CVE-Dumps/blob/main/SQL%20Injection%20in%20View%20Order%20-%20Mobile%20Management%20Store.md", + "refsource": "MISC", + "url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/SQL%20Injection%20in%20View%20Order%20-%20Mobile%20Management%20Store.md" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in SourceCodester Online Mobile Management Store 1.0. This affects an unknown part of the file /admin/orders/view_order.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-255585 was assigned to this vulnerability." + } + ], + "id": "CVE-2024-2153", + "lastModified": "2024-03-04T01:15:06.953", + "metrics": { + "cvssMetricV2": [ + { + "acInsufInfo": false, + "baseSeverity": "MEDIUM", + "cvssData": { + "accessComplexity": "LOW", + "accessVector": "NETWORK", + "authentication": "SINGLE", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5, + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "version": "2.0" + }, + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "obtainAllPrivilege": false, + "obtainOtherPrivilege": false, + "obtainUserPrivilege": false, + "source": "cna@vuldb.com", + "type": "Secondary", + "userInteractionRequired": false + } + ], + "cvssMetricV31": [ + { + "cvssData": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "version": "3.1" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4, + "source": "cna@vuldb.com", + "type": "Secondary" + } + ] + }, + "published": "2024-03-04T01:15:06.953", + "references": [ + { + "source": "cna@vuldb.com", + "url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/SQL%20Injection%20in%20View%20Order%20-%20Mobile%20Management%20Store.md" + }, + { + "source": "cna@vuldb.com", + "url": "https://vuldb.com/?ctiid.255585" + }, + { + "source": "cna@vuldb.com", + "url": "https://vuldb.com/?id.255585" + } + ], + "sourceIdentifier": "cna@vuldb.com", + "vulnStatus": "Received", + "weaknesses": [ + { + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ], + "source": "cna@vuldb.com", + "type": "Primary" + } + ] + } + } + } +} \ No newline at end of file diff --git a/2024/2xxx/GSD-2024-2154.json b/2024/2xxx/GSD-2024-2154.json new file mode 100644 index 00000000000..6f59abbdf7f --- /dev/null +++ b/2024/2xxx/GSD-2024-2154.json @@ -0,0 +1,216 @@ +{ + "gsd": { + "metadata": { + "exploitCode": "unknown", + "remediation": "unknown", + "reportConfidence": "confirmed", + "type": "vulnerability" + }, + "osvSchema": { + "aliases": [ + "CVE-2024-2154" + ], + "details": "A vulnerability has been found in SourceCodester Online Mobile Management Store 1.0 and classified as critical. This vulnerability affects unknown code of the file view_product.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-255586 is the identifier assigned to this vulnerability.", + "id": "GSD-2024-2154", + "modified": "2024-03-04T06:03:03.563527Z", + "schema_version": "1.4.0" + } + }, + "namespaces": { + "cve.org": { + "CVE_data_meta": { + "ASSIGNER": "cna@vuldb.com", + "ID": "CVE-2024-2154", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Online Mobile Management Store", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + }, + "vendor_name": "SourceCodester" + } + ] + } + }, + "credits": [ + { + "lang": "en", + "value": "rjavenido22 (VulDB User)" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A vulnerability has been found in SourceCodester Online Mobile Management Store 1.0 and classified as critical. This vulnerability affects unknown code of the file view_product.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-255586 is the identifier assigned to this vulnerability." + }, + { + "lang": "deu", + "value": "In SourceCodester Online Mobile Management Store 1.0 wurde eine kritische Schwachstelle gefunden. Das betrifft eine unbekannte Funktionalit\u00e4t der Datei view_product.php. Dank Manipulation des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "impact": { + "cvss": [ + { + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "version": "3.1" + }, + { + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "version": "3.0" + }, + { + "baseScore": 6.5, + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "version": "2.0" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "cweId": "CWE-89", + "lang": "eng", + "value": "CWE-89 SQL Injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://vuldb.com/?id.255586", + "refsource": "MISC", + "url": "https://vuldb.com/?id.255586" + }, + { + "name": "https://vuldb.com/?ctiid.255586", + "refsource": "MISC", + "url": "https://vuldb.com/?ctiid.255586" + }, + { + "name": "https://github.com/vanitashtml/CVE-Dumps/blob/main/Unauthenticated%20SQL%20Injection%20-%20Mobile%20Management%20Store.md", + "refsource": "MISC", + "url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/Unauthenticated%20SQL%20Injection%20-%20Mobile%20Management%20Store.md" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in SourceCodester Online Mobile Management Store 1.0 and classified as critical. This vulnerability affects unknown code of the file view_product.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-255586 is the identifier assigned to this vulnerability." + } + ], + "id": "CVE-2024-2154", + "lastModified": "2024-03-04T01:15:07.200", + "metrics": { + "cvssMetricV2": [ + { + "acInsufInfo": false, + "baseSeverity": "MEDIUM", + "cvssData": { + "accessComplexity": "LOW", + "accessVector": "NETWORK", + "authentication": "SINGLE", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5, + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "version": "2.0" + }, + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "obtainAllPrivilege": false, + "obtainOtherPrivilege": false, + "obtainUserPrivilege": false, + "source": "cna@vuldb.com", + "type": "Secondary", + "userInteractionRequired": false + } + ], + "cvssMetricV31": [ + { + "cvssData": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "version": "3.1" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4, + "source": "cna@vuldb.com", + "type": "Secondary" + } + ] + }, + "published": "2024-03-04T01:15:07.200", + "references": [ + { + "source": "cna@vuldb.com", + "url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/Unauthenticated%20SQL%20Injection%20-%20Mobile%20Management%20Store.md" + }, + { + "source": "cna@vuldb.com", + "url": "https://vuldb.com/?ctiid.255586" + }, + { + "source": "cna@vuldb.com", + "url": "https://vuldb.com/?id.255586" + } + ], + "sourceIdentifier": "cna@vuldb.com", + "vulnStatus": "Received", + "weaknesses": [ + { + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ], + "source": "cna@vuldb.com", + "type": "Primary" + } + ] + } + } + } +} \ No newline at end of file diff --git a/2024/2xxx/GSD-2024-2155.json b/2024/2xxx/GSD-2024-2155.json new file mode 100644 index 00000000000..c0821b235a5 --- /dev/null +++ b/2024/2xxx/GSD-2024-2155.json @@ -0,0 +1,216 @@ +{ + "gsd": { + "metadata": { + "exploitCode": "unknown", + "remediation": "unknown", + "reportConfidence": "confirmed", + "type": "vulnerability" + }, + "osvSchema": { + "aliases": [ + "CVE-2024-2155" + ], + "details": "A vulnerability was found in SourceCodester Best POS Management System 1.0 and classified as problematic. This issue affects some unknown processing of the file index.php. The manipulation of the argument page leads to file inclusion. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-255587.", + "id": "GSD-2024-2155", + "modified": "2024-03-04T06:03:03.519641Z", + "schema_version": "1.4.0" + } + }, + "namespaces": { + "cve.org": { + "CVE_data_meta": { + "ASSIGNER": "cna@vuldb.com", + "ID": "CVE-2024-2155", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Best POS Management System", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + }, + "vendor_name": "SourceCodester" + } + ] + } + }, + "credits": [ + { + "lang": "en", + "value": "wkeyi0x1 (VulDB User)" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A vulnerability was found in SourceCodester Best POS Management System 1.0 and classified as problematic. This issue affects some unknown processing of the file index.php. The manipulation of the argument page leads to file inclusion. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-255587." + }, + { + "lang": "deu", + "value": "Eine problematische Schwachstelle wurde in SourceCodester Best POS Management System 1.0 gefunden. Dies betrifft einen unbekannten Teil der Datei index.php. Mit der Manipulation des Arguments page mit unbekannten Daten kann eine file inclusion-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "impact": { + "cvss": [ + { + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "version": "3.1" + }, + { + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "version": "3.0" + }, + { + "baseScore": 4, + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "version": "2.0" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "cweId": "CWE-73", + "lang": "eng", + "value": "CWE-73 File Inclusion" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://vuldb.com/?id.255587", + "refsource": "MISC", + "url": "https://vuldb.com/?id.255587" + }, + { + "name": "https://vuldb.com/?ctiid.255587", + "refsource": "MISC", + "url": "https://vuldb.com/?ctiid.255587" + }, + { + "name": "https://github.com/wkeyi0x1/vul-report/blob/main/Best%20pos%20management%20system%20in%20php/report.md", + "refsource": "MISC", + "url": "https://github.com/wkeyi0x1/vul-report/blob/main/Best%20pos%20management%20system%20in%20php/report.md" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Best POS Management System 1.0 and classified as problematic. This issue affects some unknown processing of the file index.php. The manipulation of the argument page leads to file inclusion. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-255587." + } + ], + "id": "CVE-2024-2155", + "lastModified": "2024-03-04T01:15:07.437", + "metrics": { + "cvssMetricV2": [ + { + "acInsufInfo": false, + "baseSeverity": "MEDIUM", + "cvssData": { + "accessComplexity": "LOW", + "accessVector": "NETWORK", + "authentication": "SINGLE", + "availabilityImpact": "NONE", + "baseScore": 4.0, + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "version": "2.0" + }, + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "obtainAllPrivilege": false, + "obtainOtherPrivilege": false, + "obtainUserPrivilege": false, + "source": "cna@vuldb.com", + "type": "Secondary", + "userInteractionRequired": false + } + ], + "cvssMetricV31": [ + { + "cvssData": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "version": "3.1" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4, + "source": "cna@vuldb.com", + "type": "Secondary" + } + ] + }, + "published": "2024-03-04T01:15:07.437", + "references": [ + { + "source": "cna@vuldb.com", + "url": "https://github.com/wkeyi0x1/vul-report/blob/main/Best%20pos%20management%20system%20in%20php/report.md" + }, + { + "source": "cna@vuldb.com", + "url": "https://vuldb.com/?ctiid.255587" + }, + { + "source": "cna@vuldb.com", + "url": "https://vuldb.com/?id.255587" + } + ], + "sourceIdentifier": "cna@vuldb.com", + "vulnStatus": "Received", + "weaknesses": [ + { + "description": [ + { + "lang": "en", + "value": "CWE-73" + } + ], + "source": "cna@vuldb.com", + "type": "Primary" + } + ] + } + } + } +} \ No newline at end of file diff --git a/2024/2xxx/GSD-2024-2156.json b/2024/2xxx/GSD-2024-2156.json new file mode 100644 index 00000000000..0432e2ee5ae --- /dev/null +++ b/2024/2xxx/GSD-2024-2156.json @@ -0,0 +1,216 @@ +{ + "gsd": { + "metadata": { + "exploitCode": "unknown", + "remediation": "unknown", + "reportConfidence": "confirmed", + "type": "vulnerability" + }, + "osvSchema": { + "aliases": [ + "CVE-2024-2156" + ], + "details": "A vulnerability was found in SourceCodester Best POS Management System 1.0. It has been classified as critical. Affected is an unknown function of the file admin_class.php. The manipulation of the argument img leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-255588.", + "id": "GSD-2024-2156", + "modified": "2024-03-04T06:03:03.554618Z", + "schema_version": "1.4.0" + } + }, + "namespaces": { + "cve.org": { + "CVE_data_meta": { + "ASSIGNER": "cna@vuldb.com", + "ID": "CVE-2024-2156", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Best POS Management System", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + }, + "vendor_name": "SourceCodester" + } + ] + } + }, + "credits": [ + { + "lang": "en", + "value": "wkeyi0x1 (VulDB User)" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A vulnerability was found in SourceCodester Best POS Management System 1.0. It has been classified as critical. Affected is an unknown function of the file admin_class.php. The manipulation of the argument img leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-255588." + }, + { + "lang": "deu", + "value": "Es wurde eine kritische Schwachstelle in SourceCodester Best POS Management System 1.0 ausgemacht. Dabei betrifft es einen unbekannter Codeteil der Datei admin_class.php. Durch die Manipulation des Arguments img mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "impact": { + "cvss": [ + { + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "version": "3.1" + }, + { + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "version": "3.0" + }, + { + "baseScore": 6.5, + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "version": "2.0" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "cweId": "CWE-89", + "lang": "eng", + "value": "CWE-89 SQL Injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://vuldb.com/?id.255588", + "refsource": "MISC", + "url": "https://vuldb.com/?id.255588" + }, + { + "name": "https://vuldb.com/?ctiid.255588", + "refsource": "MISC", + "url": "https://vuldb.com/?ctiid.255588" + }, + { + "name": "https://github.com/wkeyi0x1/vul-report/blob/main/Best%20pos%20management%20system%20in%20php/Report-SQLI-1.md", + "refsource": "MISC", + "url": "https://github.com/wkeyi0x1/vul-report/blob/main/Best%20pos%20management%20system%20in%20php/Report-SQLI-1.md" + } + ] + } + }, + "nvd.nist.gov": { + "cve": { + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Best POS Management System 1.0. It has been classified as critical. Affected is an unknown function of the file admin_class.php. The manipulation of the argument img leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-255588." + } + ], + "id": "CVE-2024-2156", + "lastModified": "2024-03-04T01:15:07.680", + "metrics": { + "cvssMetricV2": [ + { + "acInsufInfo": false, + "baseSeverity": "MEDIUM", + "cvssData": { + "accessComplexity": "LOW", + "accessVector": "NETWORK", + "authentication": "SINGLE", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5, + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "version": "2.0" + }, + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "obtainAllPrivilege": false, + "obtainOtherPrivilege": false, + "obtainUserPrivilege": false, + "source": "cna@vuldb.com", + "type": "Secondary", + "userInteractionRequired": false + } + ], + "cvssMetricV31": [ + { + "cvssData": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "version": "3.1" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4, + "source": "cna@vuldb.com", + "type": "Secondary" + } + ] + }, + "published": "2024-03-04T01:15:07.680", + "references": [ + { + "source": "cna@vuldb.com", + "url": "https://github.com/wkeyi0x1/vul-report/blob/main/Best%20pos%20management%20system%20in%20php/Report-SQLI-1.md" + }, + { + "source": "cna@vuldb.com", + "url": "https://vuldb.com/?ctiid.255588" + }, + { + "source": "cna@vuldb.com", + "url": "https://vuldb.com/?id.255588" + } + ], + "sourceIdentifier": "cna@vuldb.com", + "vulnStatus": "Received", + "weaknesses": [ + { + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ], + "source": "cna@vuldb.com", + "type": "Primary" + } + ] + } + } + } +} \ No newline at end of file diff --git a/nvd_updated_time.txt b/nvd_updated_time.txt index 4a0860375f0..ffb169bcf1e 100644 --- a/nvd_updated_time.txt +++ b/nvd_updated_time.txt @@ -1 +1 @@ -2024-03-03T06:00:06.000 +2024-03-04T06:00:09.000