From ca2ef6b1db2d963d401a33600f260023e5d6ac2f Mon Sep 17 00:00:00 2001 From: cvelistV5 Github Action Date: Mon, 25 Nov 2024 01:39:26 +0000 Subject: [PATCH] 5 changes (1 new | 4 updated): - 1 new CVEs: CVE-2024-11649 - 4 updated CVEs: CVE-2024-10234, CVE-2024-11665, CVE-2024-11666, CVE-2024-8360 --- cves/2024/10xxx/CVE-2024-10234.json | 4 +- cves/2024/11xxx/CVE-2024-11649.json | 162 ++++++++++++++++++++++++++++ cves/2024/11xxx/CVE-2024-11665.json | 56 +++++++++- cves/2024/11xxx/CVE-2024-11666.json | 56 +++++++++- cves/2024/8xxx/CVE-2024-8360.json | 54 +++++++++- cves/delta.json | 39 +++++-- cves/deltaLog.json | 39 +++++++ 7 files changed, 395 insertions(+), 15 deletions(-) create mode 100644 cves/2024/11xxx/CVE-2024-11649.json diff --git a/cves/2024/10xxx/CVE-2024-10234.json b/cves/2024/10xxx/CVE-2024-10234.json index af2709f9aff0..34aeaba1eb08 100644 --- a/cves/2024/10xxx/CVE-2024-10234.json +++ b/cves/2024/10xxx/CVE-2024-10234.json @@ -8,7 +8,7 @@ "assignerShortName": "redhat", "dateReserved": "2024-10-22T01:50:57.793Z", "datePublished": "2024-10-22T13:17:57.891Z", - "dateUpdated": "2024-10-30T19:29:02.491Z" + "dateUpdated": "2024-11-25T01:07:32.275Z" }, "containers": { "cna": { @@ -165,7 +165,7 @@ "providerMetadata": { "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat", - "dateUpdated": "2024-10-30T19:29:02.491Z" + "dateUpdated": "2024-11-25T01:07:32.275Z" } }, "adp": [ diff --git a/cves/2024/11xxx/CVE-2024-11649.json b/cves/2024/11xxx/CVE-2024-11649.json new file mode 100644 index 000000000000..fef08736e83b --- /dev/null +++ b/cves/2024/11xxx/CVE-2024-11649.json @@ -0,0 +1,162 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.1", + "cveMetadata": { + "cveId": "CVE-2024-11649", + "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", + "state": "PUBLISHED", + "assignerShortName": "VulDB", + "dateReserved": "2024-11-24T15:01:38.592Z", + "datePublished": "2024-11-25T01:31:04.325Z", + "dateUpdated": "2024-11-25T01:31:04.325Z" + }, + "containers": { + "cna": { + "providerMetadata": { + "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", + "shortName": "VulDB", + "dateUpdated": "2024-11-25T01:31:04.325Z" + }, + "title": "1000 Projects Beauty Parlour Management System search-appointment.php sql injection", + "problemTypes": [ + { + "descriptions": [ + { + "type": "CWE", + "cweId": "CWE-89", + "lang": "en", + "description": "SQL Injection" + } + ] + }, + { + "descriptions": [ + { + "type": "CWE", + "cweId": "CWE-74", + "lang": "en", + "description": "Injection" + } + ] + } + ], + "affected": [ + { + "vendor": "1000 Projects", + "product": "Beauty Parlour Management System", + "versions": [ + { + "version": "1.0", + "status": "affected" + } + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in 1000 Projects Beauty Parlour Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/search-appointment.php. The manipulation of the argument searchdata leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "de", + "value": "In 1000 Projects Beauty Parlour Management System 1.0 wurde eine kritische Schwachstelle gefunden. Es geht um eine nicht näher bekannte Funktion der Datei /admin/search-appointment.php. Durch die Manipulation des Arguments searchdata mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung." + } + ], + "metrics": [ + { + "cvssV4_0": { + "version": "4.0", + "baseScore": 6.9, + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", + "baseSeverity": "MEDIUM" + } + }, + { + "cvssV3_1": { + "version": "3.1", + "baseScore": 7.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "HIGH" + } + }, + { + "cvssV3_0": { + "version": "3.0", + "baseScore": 7.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "HIGH" + } + }, + { + "cvssV2_0": { + "version": "2.0", + "baseScore": 7.5, + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" + } + } + ], + "timeline": [ + { + "time": "2024-11-24T00:00:00.000Z", + "lang": "en", + "value": "Advisory disclosed" + }, + { + "time": "2024-11-24T01:00:00.000Z", + "lang": "en", + "value": "VulDB entry created" + }, + { + "time": "2024-11-24T16:06:48.000Z", + "lang": "en", + "value": "VulDB entry last update" + } + ], + "credits": [ + { + "lang": "en", + "value": "zhugeaozun (VulDB User)", + "type": "reporter" + } + ], + "references": [ + { + "url": "https://vuldb.com/?id.285970", + "name": "VDB-285970 | 1000 Projects Beauty Parlour Management System search-appointment.php sql injection", + "tags": [ + "vdb-entry", + "technical-description" + ] + }, + { + "url": "https://vuldb.com/?ctiid.285970", + "name": "VDB-285970 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required" + ] + }, + { + "url": "https://vuldb.com/?submit.451245", + "name": "Submit #451245 | 1000 Projects Beauty Parlour Management System PHP SQLite Project V1.0 SQL Injection", + "tags": [ + "third-party-advisory" + ] + }, + { + "url": "https://github.com/zgaz/CVE/issues/1", + "tags": [ + "exploit", + "issue-tracking" + ] + }, + { + "url": "https://1000projects.org/", + "tags": [ + "product" + ] + } + ] + } + } +} \ No newline at end of file diff --git a/cves/2024/11xxx/CVE-2024-11665.json b/cves/2024/11xxx/CVE-2024-11665.json index 91b9b49c9290..2fe46e78cfad 100644 --- a/cves/2024/11xxx/CVE-2024-11665.json +++ b/cves/2024/11xxx/CVE-2024-11665.json @@ -8,7 +8,7 @@ "assignerShortName": "ONEKEY", "dateReserved": "2024-11-24T22:27:15.904Z", "datePublished": "2024-11-24T22:32:43.427Z", - "dateUpdated": "2024-11-24T23:18:51.581Z" + "dateUpdated": "2024-11-25T01:30:24.409Z" }, "containers": { "cna": { @@ -116,6 +116,58 @@ "x_generator": { "engine": "Vulnogram 0.2.0" } - } + }, + "adp": [ + { + "affected": [ + { + "vendor": "hardy-barth", + "product": "cph2_echarge_firmware", + "cpes": [ + "cpe:2.3:o:hardy-barth:cph2_echarge_firmware:*:*:*:*:*:*:*:*" + ], + "defaultStatus": "unaffected", + "versions": [ + { + "version": "0", + "status": "affected", + "lessThanOrEqual": "2.0.4", + "versionType": "semver" + } + ] + } + ], + "metrics": [ + { + "other": { + "type": "ssvc", + "content": { + "timestamp": "2024-11-25T01:30:19.320887Z", + "id": "CVE-2024-11665", + "options": [ + { + "Exploitation": "none" + }, + { + "Automatable": "yes" + }, + { + "Technical Impact": "total" + } + ], + "role": "CISA Coordinator", + "version": "2.0.3" + } + } + } + ], + "title": "CISA ADP Vulnrichment", + "providerMetadata": { + "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "shortName": "CISA-ADP", + "dateUpdated": "2024-11-25T01:30:24.409Z" + } + } + ] } } \ No newline at end of file diff --git a/cves/2024/11xxx/CVE-2024-11666.json b/cves/2024/11xxx/CVE-2024-11666.json index 96ec645bb866..bdffbb3d057b 100644 --- a/cves/2024/11xxx/CVE-2024-11666.json +++ b/cves/2024/11xxx/CVE-2024-11666.json @@ -8,7 +8,7 @@ "assignerShortName": "ONEKEY", "dateReserved": "2024-11-24T22:27:19.421Z", "datePublished": "2024-11-24T22:36:59.989Z", - "dateUpdated": "2024-11-24T23:19:03.796Z" + "dateUpdated": "2024-11-25T01:28:57.027Z" }, "containers": { "cna": { @@ -116,6 +116,58 @@ "x_generator": { "engine": "Vulnogram 0.2.0" } - } + }, + "adp": [ + { + "affected": [ + { + "vendor": "hardy-barth", + "product": "cph2_echarge_firmware", + "cpes": [ + "cpe:2.3:o:hardy-barth:cph2_echarge_firmware:*:*:*:*:*:*:*:*" + ], + "defaultStatus": "unaffected", + "versions": [ + { + "version": "0", + "status": "affected", + "lessThanOrEqual": "2.0.4", + "versionType": "semver" + } + ] + } + ], + "metrics": [ + { + "other": { + "type": "ssvc", + "content": { + "timestamp": "2024-11-25T01:27:53.302041Z", + "id": "CVE-2024-11666", + "options": [ + { + "Exploitation": "none" + }, + { + "Automatable": "no" + }, + { + "Technical Impact": "total" + } + ], + "role": "CISA Coordinator", + "version": "2.0.3" + } + } + } + ], + "title": "CISA ADP Vulnrichment", + "providerMetadata": { + "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "shortName": "CISA-ADP", + "dateUpdated": "2024-11-25T01:28:57.027Z" + } + } + ] } } \ No newline at end of file diff --git a/cves/2024/8xxx/CVE-2024-8360.json b/cves/2024/8xxx/CVE-2024-8360.json index 44c99fd6ca6a..ddd5bc35b286 100644 --- a/cves/2024/8xxx/CVE-2024-8360.json +++ b/cves/2024/8xxx/CVE-2024-8360.json @@ -8,7 +8,7 @@ "assignerShortName": "zdi", "dateReserved": "2024-08-30T16:16:19.322Z", "datePublished": "2024-11-22T21:33:32.855Z", - "dateUpdated": "2024-11-22T21:33:32.855Z" + "dateUpdated": "2024-11-25T01:36:35.700Z" }, "containers": { "cna": { @@ -75,6 +75,56 @@ } } ] - } + }, + "adp": [ + { + "affected": [ + { + "vendor": "visteon", + "product": "infotainment", + "cpes": [ + "cpe:2.3:a:visteon:infotainment:cmu150_na_74.00.324a:*:*:*:*:*:*:*" + ], + "defaultStatus": "unknown", + "versions": [ + { + "version": "cmu150_na_74.00.324a", + "status": "affected" + } + ] + } + ], + "metrics": [ + { + "other": { + "type": "ssvc", + "content": { + "timestamp": "2024-11-25T01:34:46.836089Z", + "id": "CVE-2024-8360", + "options": [ + { + "Exploitation": "none" + }, + { + "Automatable": "no" + }, + { + "Technical Impact": "total" + } + ], + "role": "CISA Coordinator", + "version": "2.0.3" + } + } + } + ], + "title": "CISA ADP Vulnrichment", + "providerMetadata": { + "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "shortName": "CISA-ADP", + "dateUpdated": "2024-11-25T01:36:35.700Z" + } + } + ] } } \ No newline at end of file diff --git a/cves/delta.json b/cves/delta.json index 60da9a9791c3..55eb393075b4 100644 --- a/cves/delta.json +++ b/cves/delta.json @@ -1,14 +1,39 @@ { - "fetchTime": "2024-11-25T01:01:06.766Z", - "numberOfChanges": 1, + "fetchTime": "2024-11-25T01:39:16.529Z", + "numberOfChanges": 5, "new": [ { - "cveId": "CVE-2024-11648", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-11648", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/11xxx/CVE-2024-11648.json", - "dateUpdated": "2024-11-25T01:00:14.754Z" + "cveId": "CVE-2024-11649", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-11649", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/11xxx/CVE-2024-11649.json", + "dateUpdated": "2024-11-25T01:31:04.325Z" + } + ], + "updated": [ + { + "cveId": "CVE-2024-10234", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-10234", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/10xxx/CVE-2024-10234.json", + "dateUpdated": "2024-11-25T01:07:32.275Z" + }, + { + "cveId": "CVE-2024-11665", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-11665", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/11xxx/CVE-2024-11665.json", + "dateUpdated": "2024-11-25T01:30:24.409Z" + }, + { + "cveId": "CVE-2024-11666", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-11666", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/11xxx/CVE-2024-11666.json", + "dateUpdated": "2024-11-25T01:28:57.027Z" + }, + { + "cveId": "CVE-2024-8360", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-8360", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/8xxx/CVE-2024-8360.json", + "dateUpdated": "2024-11-25T01:36:35.700Z" } ], - "updated": [], "error": [] } \ No newline at end of file diff --git a/cves/deltaLog.json b/cves/deltaLog.json index e578da06be6c..b08e6552ce28 100644 --- a/cves/deltaLog.json +++ b/cves/deltaLog.json @@ -1,4 +1,43 @@ [ + { + "fetchTime": "2024-11-25T01:39:16.529Z", + "numberOfChanges": 5, + "new": [ + { + "cveId": "CVE-2024-11649", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-11649", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/11xxx/CVE-2024-11649.json", + "dateUpdated": "2024-11-25T01:31:04.325Z" + } + ], + "updated": [ + { + "cveId": "CVE-2024-10234", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-10234", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/10xxx/CVE-2024-10234.json", + "dateUpdated": "2024-11-25T01:07:32.275Z" + }, + { + "cveId": "CVE-2024-11665", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-11665", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/11xxx/CVE-2024-11665.json", + "dateUpdated": "2024-11-25T01:30:24.409Z" + }, + { + "cveId": "CVE-2024-11666", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-11666", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/11xxx/CVE-2024-11666.json", + "dateUpdated": "2024-11-25T01:28:57.027Z" + }, + { + "cveId": "CVE-2024-8360", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-8360", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/8xxx/CVE-2024-8360.json", + "dateUpdated": "2024-11-25T01:36:35.700Z" + } + ], + "error": [] + }, { "fetchTime": "2024-11-25T01:01:06.766Z", "numberOfChanges": 1,