diff --git a/cves/2024/13xxx/CVE-2024-13136.json b/cves/2024/13xxx/CVE-2024-13136.json new file mode 100644 index 000000000000..669fad278fdf --- /dev/null +++ b/cves/2024/13xxx/CVE-2024-13136.json @@ -0,0 +1,162 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.1", + "cveMetadata": { + "cveId": "CVE-2024-13136", + "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", + "state": "PUBLISHED", + "assignerShortName": "VulDB", + "dateReserved": "2025-01-04T09:48:31.422Z", + "datePublished": "2025-01-05T09:00:15.361Z", + "dateUpdated": "2025-01-05T09:00:15.361Z" + }, + "containers": { + "cna": { + "providerMetadata": { + "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", + "shortName": "VulDB", + "dateUpdated": "2025-01-05T09:00:15.361Z" + }, + "title": "wangl1989 mysiteforme ShiroConfig.java rememberMeManager deserialization", + "problemTypes": [ + { + "descriptions": [ + { + "type": "CWE", + "cweId": "CWE-502", + "lang": "en", + "description": "Deserialization" + } + ] + }, + { + "descriptions": [ + { + "type": "CWE", + "cweId": "CWE-20", + "lang": "en", + "description": "Improper Input Validation" + } + ] + } + ], + "affected": [ + { + "vendor": "wangl1989", + "product": "mysiteforme", + "versions": [ + { + "version": "1.0", + "status": "affected" + } + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in wangl1989 mysiteforme 1.0 and classified as critical. Affected by this issue is the function rememberMeManager of the file src/main/java/com/mysiteforme/admin/config/ShiroConfig.java. The manipulation leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "de", + "value": "Eine Schwachstelle wurde in wangl1989 mysiteforme 1.0 gefunden. Sie wurde als kritisch eingestuft. Davon betroffen ist die Funktion rememberMeManager der Datei src/main/java/com/mysiteforme/admin/config/ShiroConfig.java. Durch Manipulieren mit unbekannten Daten kann eine deserialization-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung." + } + ], + "metrics": [ + { + "cvssV4_0": { + "version": "4.0", + "baseScore": 5.3, + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", + "baseSeverity": "MEDIUM" + } + }, + { + "cvssV3_1": { + "version": "3.1", + "baseScore": 6.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + } + }, + { + "cvssV3_0": { + "version": "3.0", + "baseScore": 6.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + } + }, + { + "cvssV2_0": { + "version": "2.0", + "baseScore": 6.5, + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P" + } + } + ], + "timeline": [ + { + "time": "2025-01-04T00:00:00.000Z", + "lang": "en", + "value": "Advisory disclosed" + }, + { + "time": "2025-01-04T01:00:00.000Z", + "lang": "en", + "value": "VulDB entry created" + }, + { + "time": "2025-01-04T10:53:44.000Z", + "lang": "en", + "value": "VulDB entry last update" + } + ], + "credits": [ + { + "lang": "en", + "value": "LVZC (VulDB User)", + "type": "reporter" + } + ], + "references": [ + { + "url": "https://vuldb.com/?id.290210", + "name": "VDB-290210 | wangl1989 mysiteforme ShiroConfig.java rememberMeManager deserialization", + "tags": [ + "vdb-entry", + "technical-description" + ] + }, + { + "url": "https://vuldb.com/?ctiid.290210", + "name": "VDB-290210 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required" + ] + }, + { + "url": "https://vuldb.com/?submit.468391", + "name": "Submit #468391 | wangl1989 mysiteforme 1.0 Remote Command Execution", + "tags": [ + "third-party-advisory" + ] + }, + { + "url": "https://github.com/wangl1989/mysiteforme/issues/52", + "tags": [ + "issue-tracking" + ] + }, + { + "url": "https://github.com/wangl1989/mysiteforme/issues/52#issue-2757682365", + "tags": [ + "exploit", + "issue-tracking" + ] + } + ] + } + } +} \ No newline at end of file diff --git a/cves/delta.json b/cves/delta.json index cfb1d5faacf4..6efbc40dfea6 100644 --- a/cves/delta.json +++ b/cves/delta.json @@ -1,12 +1,12 @@ { - "fetchTime": "2025-01-05T08:34:23.146Z", + "fetchTime": "2025-01-05T09:08:15.927Z", "numberOfChanges": 1, "new": [ { - "cveId": "CVE-2024-13135", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-13135", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/13xxx/CVE-2024-13135.json", - "dateUpdated": "2025-01-05T08:31:04.864Z" + "cveId": "CVE-2024-13136", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-13136", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/13xxx/CVE-2024-13136.json", + "dateUpdated": "2025-01-05T09:00:15.361Z" } ], "updated": [], diff --git a/cves/deltaLog.json b/cves/deltaLog.json index e235cc903a65..9c7d3ddb7edc 100644 --- a/cves/deltaLog.json +++ b/cves/deltaLog.json @@ -1,4 +1,18 @@ [ + { + "fetchTime": "2025-01-05T09:08:15.927Z", + "numberOfChanges": 1, + "new": [ + { + "cveId": "CVE-2024-13136", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-13136", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/13xxx/CVE-2024-13136.json", + "dateUpdated": "2025-01-05T09:00:15.361Z" + } + ], + "updated": [], + "error": [] + }, { "fetchTime": "2025-01-05T08:34:23.146Z", "numberOfChanges": 1, @@ -118803,175 +118817,5 @@ ], "updated": [], "error": [] - }, - { - "fetchTime": "2024-12-06T08:35:11.048Z", - "numberOfChanges": 27, - "new": [ - { - "cveId": "CVE-2024-10320", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-10320", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/10xxx/CVE-2024-10320.json", - "dateUpdated": "2024-12-06T08:24:54.348Z" - }, - { - "cveId": "CVE-2024-10689", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-10689", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/10xxx/CVE-2024-10689.json", - "dateUpdated": "2024-12-06T08:24:58.598Z" - }, - { - "cveId": "CVE-2024-10692", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-10692", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/10xxx/CVE-2024-10692.json", - "dateUpdated": "2024-12-06T08:24:58.199Z" - }, - { - "cveId": "CVE-2024-10849", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-10849", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/10xxx/CVE-2024-10849.json", - "dateUpdated": "2024-12-06T08:24:51.078Z" - }, - { - "cveId": "CVE-2024-10879", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-10879", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/10xxx/CVE-2024-10879.json", - "dateUpdated": "2024-12-06T08:24:49.569Z" - }, - { - "cveId": "CVE-2024-11204", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-11204", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/11xxx/CVE-2024-11204.json", - "dateUpdated": "2024-12-06T08:24:57.746Z" - }, - { - "cveId": "CVE-2024-11276", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-11276", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/11xxx/CVE-2024-11276.json", - "dateUpdated": "2024-12-06T08:24:53.619Z" - }, - { - "cveId": "CVE-2024-11292", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-11292", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/11xxx/CVE-2024-11292.json", - "dateUpdated": "2024-12-06T08:24:50.717Z" - }, - { - "cveId": "CVE-2024-11323", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-11323", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/11xxx/CVE-2024-11323.json", - "dateUpdated": "2024-12-06T08:24:52.190Z" - }, - { - "cveId": "CVE-2024-11336", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-11336", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/11xxx/CVE-2024-11336.json", - "dateUpdated": "2024-12-06T08:24:52.913Z" - }, - { - "cveId": "CVE-2024-11339", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-11339", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/11xxx/CVE-2024-11339.json", - "dateUpdated": "2024-12-06T08:24:58.973Z" - }, - { - "cveId": "CVE-2024-11352", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-11352", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/11xxx/CVE-2024-11352.json", - "dateUpdated": "2024-12-06T08:24:55.951Z" - }, - { - "cveId": "CVE-2024-11368", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-11368", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/11xxx/CVE-2024-11368.json", - "dateUpdated": "2024-12-06T08:24:53.260Z" - }, - { - "cveId": "CVE-2024-11444", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-11444", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/11xxx/CVE-2024-11444.json", - "dateUpdated": "2024-12-06T08:24:50.320Z" - }, - { - "cveId": "CVE-2024-11450", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-11450", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/11xxx/CVE-2024-11450.json", - "dateUpdated": "2024-12-06T08:24:53.990Z" - }, - { - "cveId": "CVE-2024-11687", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-11687", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/11xxx/CVE-2024-11687.json", - "dateUpdated": "2024-12-06T08:24:56.655Z" - }, - { - "cveId": "CVE-2024-11823", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-11823", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/11xxx/CVE-2024-11823.json", - "dateUpdated": "2024-12-06T08:24:57.031Z" - }, - { - "cveId": "CVE-2024-12003", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-12003", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/12xxx/CVE-2024-12003.json", - "dateUpdated": "2024-12-06T08:24:48.974Z" - }, - { - "cveId": "CVE-2024-12027", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-12027", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/12xxx/CVE-2024-12027.json", - "dateUpdated": "2024-12-06T08:24:52.558Z" - }, - { - "cveId": "CVE-2024-12028", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-12028", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/12xxx/CVE-2024-12028.json", - "dateUpdated": "2024-12-06T08:24:55.598Z" - }, - { - "cveId": "CVE-2024-12060", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-12060", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/12xxx/CVE-2024-12060.json", - "dateUpdated": "2024-12-06T08:24:49.945Z" - }, - { - "cveId": "CVE-2024-12110", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-12110", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/12xxx/CVE-2024-12110.json", - "dateUpdated": "2024-12-06T08:24:54.807Z" - }, - { - "cveId": "CVE-2024-12155", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-12155", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/12xxx/CVE-2024-12155.json", - "dateUpdated": "2024-12-06T08:24:57.390Z" - }, - { - "cveId": "CVE-2024-9705", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-9705", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/9xxx/CVE-2024-9705.json", - "dateUpdated": "2024-12-06T08:24:51.434Z" - }, - { - "cveId": "CVE-2024-9706", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-9706", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/9xxx/CVE-2024-9706.json", - "dateUpdated": "2024-12-06T08:24:56.298Z" - }, - { - "cveId": "CVE-2024-9866", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-9866", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/9xxx/CVE-2024-9866.json", - "dateUpdated": "2024-12-06T08:24:51.822Z" - }, - { - "cveId": "CVE-2024-9872", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-9872", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/9xxx/CVE-2024-9872.json", - "dateUpdated": "2024-12-06T08:24:55.229Z" - } - ], - "updated": [], - "error": [] } ] \ No newline at end of file