diff --git a/cves/2024/11xxx/CVE-2024-11650.json b/cves/2024/11xxx/CVE-2024-11650.json new file mode 100644 index 00000000000..2598fb65c59 --- /dev/null +++ b/cves/2024/11xxx/CVE-2024-11650.json @@ -0,0 +1,161 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.1", + "cveMetadata": { + "cveId": "CVE-2024-11650", + "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", + "state": "PUBLISHED", + "assignerShortName": "VulDB", + "dateReserved": "2024-11-24T15:03:41.995Z", + "datePublished": "2024-11-25T02:00:15.883Z", + "dateUpdated": "2024-11-25T02:00:15.883Z" + }, + "containers": { + "cna": { + "providerMetadata": { + "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", + "shortName": "VulDB", + "dateUpdated": "2024-11-25T02:00:15.883Z" + }, + "title": "Tenda i9 GetIPTV websReadEvent null pointer dereference", + "problemTypes": [ + { + "descriptions": [ + { + "type": "CWE", + "cweId": "CWE-476", + "lang": "en", + "description": "NULL Pointer Dereference" + } + ] + }, + { + "descriptions": [ + { + "type": "CWE", + "cweId": "CWE-404", + "lang": "en", + "description": "Denial of Service" + } + ] + } + ], + "affected": [ + { + "vendor": "Tenda", + "product": "i9", + "versions": [ + { + "version": "1.0.0.8(3828)", + "status": "affected" + } + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Tenda i9 1.0.0.8(3828) and classified as critical. This issue affects the function websReadEvent of the file /goform/GetIPTV. The manipulation leads to null pointer dereference. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "de", + "value": "Eine kritische Schwachstelle wurde in Tenda i9 1.0.0.8(3828) gefunden. Es geht hierbei um die Funktion websReadEvent der Datei /goform/GetIPTV. Durch Manipulation mit unbekannten Daten kann eine null pointer dereference-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung." + } + ], + "metrics": [ + { + "cvssV4_0": { + "version": "4.0", + "baseScore": 7.1, + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", + "baseSeverity": "HIGH" + } + }, + { + "cvssV3_1": { + "version": "3.1", + "baseScore": 6.5, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseSeverity": "MEDIUM" + } + }, + { + "cvssV3_0": { + "version": "3.0", + "baseScore": 6.5, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseSeverity": "MEDIUM" + } + }, + { + "cvssV2_0": { + "version": "2.0", + "baseScore": 6.8, + "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C" + } + } + ], + "timeline": [ + { + "time": "2024-11-24T00:00:00.000Z", + "lang": "en", + "value": "Advisory disclosed" + }, + { + "time": "2024-11-24T01:00:00.000Z", + "lang": "en", + "value": "VulDB entry created" + }, + { + "time": "2024-11-24T16:08:58.000Z", + "lang": "en", + "value": "VulDB entry last update" + } + ], + "credits": [ + { + "lang": "en", + "value": "xiaobor123 (VulDB User)", + "type": "reporter" + } + ], + "references": [ + { + "url": "https://vuldb.com/?id.285971", + "name": "VDB-285971 | Tenda i9 GetIPTV websReadEvent null pointer dereference", + "tags": [ + "vdb-entry", + "technical-description" + ] + }, + { + "url": "https://vuldb.com/?ctiid.285971", + "name": "VDB-285971 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required" + ] + }, + { + "url": "https://vuldb.com/?submit.446592", + "name": "Submit #446592 | Tenda i9 V1.0.0.8(3828) NULL Pointer Dereference", + "tags": [ + "third-party-advisory" + ] + }, + { + "url": "https://github.com/xiaobor123/tenda-vul-i9", + "tags": [ + "exploit" + ] + }, + { + "url": "https://www.tenda.com.cn/", + "tags": [ + "product" + ] + } + ] + } + } +} \ No newline at end of file diff --git a/cves/2024/8xxx/CVE-2024-8356.json b/cves/2024/8xxx/CVE-2024-8356.json index a4693e3a7ca..8f0e4f69571 100644 --- a/cves/2024/8xxx/CVE-2024-8356.json +++ b/cves/2024/8xxx/CVE-2024-8356.json @@ -8,7 +8,7 @@ "assignerShortName": "zdi", "dateReserved": "2024-08-30T16:16:05.013Z", "datePublished": "2024-11-22T21:32:48.390Z", - "dateUpdated": "2024-11-22T21:32:48.390Z" + "dateUpdated": "2024-11-25T01:43:36.441Z" }, "containers": { "cna": { @@ -75,6 +75,56 @@ } } ] - } + }, + "adp": [ + { + "metrics": [ + { + "other": { + "type": "ssvc", + "content": { + "id": "CVE-2024-8356", + "role": "CISA Coordinator", + "options": [ + { + "Exploitation": "none" + }, + { + "Automatable": "no" + }, + { + "Technical Impact": "total" + } + ], + "version": "2.0.3", + "timestamp": "2024-11-25T01:35:31.985790Z" + } + } + } + ], + "affected": [ + { + "cpes": [ + "cpe:2.3:a:visteon:infotainment:cmu150_na_74.00.324a:*:*:*:*:*:*:*" + ], + "vendor": "visteon", + "product": "infotainment", + "versions": [ + { + "status": "affected", + "version": "cmu150_na_74.00.324a" + } + ], + "defaultStatus": "unknown" + } + ], + "title": "CISA ADP Vulnrichment", + "providerMetadata": { + "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "shortName": "CISA-ADP", + "dateUpdated": "2024-11-25T01:43:36.441Z" + } + } + ] } } \ No newline at end of file diff --git a/cves/2024/8xxx/CVE-2024-8357.json b/cves/2024/8xxx/CVE-2024-8357.json index d068aec1710..ffe6cefaae0 100644 --- a/cves/2024/8xxx/CVE-2024-8357.json +++ b/cves/2024/8xxx/CVE-2024-8357.json @@ -8,7 +8,7 @@ "assignerShortName": "zdi", "dateReserved": "2024-08-30T16:16:08.490Z", "datePublished": "2024-11-22T21:32:58.640Z", - "dateUpdated": "2024-11-22T21:32:58.640Z" + "dateUpdated": "2024-11-25T01:43:36.596Z" }, "containers": { "cna": { @@ -75,6 +75,56 @@ } } ] - } + }, + "adp": [ + { + "metrics": [ + { + "other": { + "type": "ssvc", + "content": { + "id": "CVE-2024-8357", + "role": "CISA Coordinator", + "options": [ + { + "Exploitation": "none" + }, + { + "Automatable": "no" + }, + { + "Technical Impact": "total" + } + ], + "version": "2.0.3", + "timestamp": "2024-11-25T01:35:17.943794Z" + } + } + } + ], + "affected": [ + { + "cpes": [ + "cpe:2.3:a:visteon:infotainment:cmu150_na_74.00.324a:*:*:*:*:*:*:*" + ], + "vendor": "visteon", + "product": "infotainment", + "versions": [ + { + "status": "affected", + "version": "cmu150_na_74.00.324a" + } + ], + "defaultStatus": "unknown" + } + ], + "title": "CISA ADP Vulnrichment", + "providerMetadata": { + "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "shortName": "CISA-ADP", + "dateUpdated": "2024-11-25T01:43:36.596Z" + } + } + ] } } \ No newline at end of file diff --git a/cves/2024/8xxx/CVE-2024-8358.json b/cves/2024/8xxx/CVE-2024-8358.json index 05e51f54969..d218421685f 100644 --- a/cves/2024/8xxx/CVE-2024-8358.json +++ b/cves/2024/8xxx/CVE-2024-8358.json @@ -8,7 +8,7 @@ "assignerShortName": "zdi", "dateReserved": "2024-08-30T16:16:12.024Z", "datePublished": "2024-11-22T21:33:09.888Z", - "dateUpdated": "2024-11-22T21:33:09.888Z" + "dateUpdated": "2024-11-25T01:43:36.843Z" }, "containers": { "cna": { @@ -75,6 +75,56 @@ } } ] - } + }, + "adp": [ + { + "metrics": [ + { + "other": { + "type": "ssvc", + "content": { + "id": "CVE-2024-8358", + "role": "CISA Coordinator", + "options": [ + { + "Exploitation": "none" + }, + { + "Automatable": "no" + }, + { + "Technical Impact": "total" + } + ], + "version": "2.0.3", + "timestamp": "2024-11-25T01:35:10.262153Z" + } + } + } + ], + "affected": [ + { + "cpes": [ + "cpe:2.3:a:visteon:infotainment:cmu150_na_74.00.324a:*:*:*:*:*:*:*" + ], + "vendor": "visteon", + "product": "infotainment", + "versions": [ + { + "status": "affected", + "version": "cmu150_na_74.00.324a" + } + ], + "defaultStatus": "unknown" + } + ], + "title": "CISA ADP Vulnrichment", + "providerMetadata": { + "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "shortName": "CISA-ADP", + "dateUpdated": "2024-11-25T01:43:36.843Z" + } + } + ] } } \ No newline at end of file diff --git a/cves/2024/8xxx/CVE-2024-8359.json b/cves/2024/8xxx/CVE-2024-8359.json index 71fa6f45157..24efb201f34 100644 --- a/cves/2024/8xxx/CVE-2024-8359.json +++ b/cves/2024/8xxx/CVE-2024-8359.json @@ -8,7 +8,7 @@ "assignerShortName": "zdi", "dateReserved": "2024-08-30T16:16:15.644Z", "datePublished": "2024-11-22T21:33:19.843Z", - "dateUpdated": "2024-11-22T21:33:19.843Z" + "dateUpdated": "2024-11-25T01:43:36.966Z" }, "containers": { "cna": { @@ -75,6 +75,56 @@ } } ] - } + }, + "adp": [ + { + "metrics": [ + { + "other": { + "type": "ssvc", + "content": { + "id": "CVE-2024-8359", + "role": "CISA Coordinator", + "options": [ + { + "Exploitation": "none" + }, + { + "Automatable": "no" + }, + { + "Technical Impact": "total" + } + ], + "version": "2.0.3", + "timestamp": "2024-11-25T01:35:00.666444Z" + } + } + } + ], + "affected": [ + { + "cpes": [ + "cpe:2.3:a:visteon:infotainment:cmu150_na_74.00.324a:*:*:*:*:*:*:*" + ], + "vendor": "visteon", + "product": "infotainment", + "versions": [ + { + "status": "affected", + "version": "cmu150_na_74.00.324a" + } + ], + "defaultStatus": "unknown" + } + ], + "title": "CISA ADP Vulnrichment", + "providerMetadata": { + "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "shortName": "CISA-ADP", + "dateUpdated": "2024-11-25T01:43:36.966Z" + } + } + ] } } \ No newline at end of file diff --git a/cves/delta.json b/cves/delta.json index 55eb393075b..e9befa9ed20 100644 --- a/cves/delta.json +++ b/cves/delta.json @@ -1,38 +1,38 @@ { - "fetchTime": "2024-11-25T01:39:16.529Z", + "fetchTime": "2024-11-25T02:15:38.927Z", "numberOfChanges": 5, "new": [ { - "cveId": "CVE-2024-11649", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-11649", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/11xxx/CVE-2024-11649.json", - "dateUpdated": "2024-11-25T01:31:04.325Z" + "cveId": "CVE-2024-11650", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-11650", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/11xxx/CVE-2024-11650.json", + "dateUpdated": "2024-11-25T02:00:15.883Z" } ], "updated": [ { - "cveId": "CVE-2024-10234", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-10234", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/10xxx/CVE-2024-10234.json", - "dateUpdated": "2024-11-25T01:07:32.275Z" + "cveId": "CVE-2024-8356", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-8356", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/8xxx/CVE-2024-8356.json", + "dateUpdated": "2024-11-25T01:43:36.441Z" }, { - "cveId": "CVE-2024-11665", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-11665", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/11xxx/CVE-2024-11665.json", - "dateUpdated": "2024-11-25T01:30:24.409Z" + "cveId": "CVE-2024-8357", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-8357", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/8xxx/CVE-2024-8357.json", + "dateUpdated": "2024-11-25T01:43:36.596Z" }, { - "cveId": "CVE-2024-11666", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-11666", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/11xxx/CVE-2024-11666.json", - "dateUpdated": "2024-11-25T01:28:57.027Z" + "cveId": "CVE-2024-8358", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-8358", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/8xxx/CVE-2024-8358.json", + "dateUpdated": "2024-11-25T01:43:36.843Z" }, { - "cveId": "CVE-2024-8360", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-8360", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/8xxx/CVE-2024-8360.json", - "dateUpdated": "2024-11-25T01:36:35.700Z" + "cveId": "CVE-2024-8359", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-8359", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/8xxx/CVE-2024-8359.json", + "dateUpdated": "2024-11-25T01:43:36.966Z" } ], "error": [] diff --git a/cves/deltaLog.json b/cves/deltaLog.json index b08e6552ce2..8128e36f8c4 100644 --- a/cves/deltaLog.json +++ b/cves/deltaLog.json @@ -1,4 +1,43 @@ [ + { + "fetchTime": "2024-11-25T02:15:38.927Z", + "numberOfChanges": 5, + "new": [ + { + "cveId": "CVE-2024-11650", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-11650", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/11xxx/CVE-2024-11650.json", + "dateUpdated": "2024-11-25T02:00:15.883Z" + } + ], + "updated": [ + { + "cveId": "CVE-2024-8356", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-8356", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/8xxx/CVE-2024-8356.json", + "dateUpdated": "2024-11-25T01:43:36.441Z" + }, + { + "cveId": "CVE-2024-8357", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-8357", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/8xxx/CVE-2024-8357.json", + "dateUpdated": "2024-11-25T01:43:36.596Z" + }, + { + "cveId": "CVE-2024-8358", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-8358", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/8xxx/CVE-2024-8358.json", + "dateUpdated": "2024-11-25T01:43:36.843Z" + }, + { + "cveId": "CVE-2024-8359", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-8359", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/8xxx/CVE-2024-8359.json", + "dateUpdated": "2024-11-25T01:43:36.966Z" + } + ], + "error": [] + }, { "fetchTime": "2024-11-25T01:39:16.529Z", "numberOfChanges": 5,