Skip to content

Commit 27a55c2

Browse files
Advisory Database Sync
1 parent b66d584 commit 27a55c2

File tree

29 files changed

+1229
-0
lines changed

29 files changed

+1229
-0
lines changed
Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-34x9-x6hh-cvvw",
4+
"modified": "2024-11-04T03:30:40Z",
5+
"published": "2024-11-04T03:30:40Z",
6+
"aliases": [
7+
"CVE-2024-20120"
8+
],
9+
"details": "In KeyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08956986; Issue ID: MSV-1575.",
10+
"severity": [
11+
12+
],
13+
"affected": [
14+
15+
],
16+
"references": [
17+
{
18+
"type": "ADVISORY",
19+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20120"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024"
24+
}
25+
],
26+
"database_specific": {
27+
"cwe_ids": [
28+
"CWE-787"
29+
],
30+
"severity": null,
31+
"github_reviewed": false,
32+
"github_reviewed_at": null,
33+
"nvd_published_at": "2024-11-04T02:15:17Z"
34+
}
35+
}
Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-4g7x-pvhw-3mph",
4+
"modified": "2024-11-04T03:30:40Z",
5+
"published": "2024-11-04T03:30:40Z",
6+
"aliases": [
7+
"CVE-2024-20112"
8+
],
9+
"details": "In isp, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09071481; Issue ID: MSV-1730.",
10+
"severity": [
11+
12+
],
13+
"affected": [
14+
15+
],
16+
"references": [
17+
{
18+
"type": "ADVISORY",
19+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20112"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024"
24+
}
25+
],
26+
"database_specific": {
27+
"cwe_ids": [
28+
"CWE-125"
29+
],
30+
"severity": null,
31+
"github_reviewed": false,
32+
"github_reviewed_at": null,
33+
"nvd_published_at": "2024-11-04T02:15:16Z"
34+
}
35+
}
Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-4r9r-m8vg-chxf",
4+
"modified": "2024-11-04T03:30:40Z",
5+
"published": "2024-11-04T03:30:40Z",
6+
"aliases": [
7+
"CVE-2024-20117"
8+
],
9+
"details": "In vdec, there is a possible out of bounds read due to improper structure design. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09008925; Issue ID: MSV-1681.",
10+
"severity": [
11+
12+
],
13+
"affected": [
14+
15+
],
16+
"references": [
17+
{
18+
"type": "ADVISORY",
19+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20117"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024"
24+
}
25+
],
26+
"database_specific": {
27+
"cwe_ids": [
28+
"CWE-125"
29+
],
30+
"severity": null,
31+
"github_reviewed": false,
32+
"github_reviewed_at": null,
33+
"nvd_published_at": "2024-11-04T02:15:17Z"
34+
}
35+
}
Lines changed: 58 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,58 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-5qcc-6h23-g9c6",
4+
"modified": "2024-11-04T03:30:40Z",
5+
"published": "2024-11-04T03:30:39Z",
6+
"aliases": [
7+
"CVE-2024-10753"
8+
],
9+
"details": "A vulnerability was found in PHPGurukul Online Shopping Portal 2.0. It has been declared as problematic. This vulnerability affects unknown code of the file admin/assets/plugins/DataTables/media/unit_testing/templates/dom_data_two_headers.php. The manipulation of the argument scripts leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [
21+
22+
],
23+
"references": [
24+
{
25+
"type": "ADVISORY",
26+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10753"
27+
},
28+
{
29+
"type": "WEB",
30+
"url": "https://github.com/secuserx/CVE/blob/main/%5BXSS%20vulnerability%5D%20found%20in%20Online%20Shopping%20Portal%202.0%20-%20(dom_data_two_headers.php).md"
31+
},
32+
{
33+
"type": "WEB",
34+
"url": "https://phpgurukul.com"
35+
},
36+
{
37+
"type": "WEB",
38+
"url": "https://vuldb.com/?ctiid.282922"
39+
},
40+
{
41+
"type": "WEB",
42+
"url": "https://vuldb.com/?id.282922"
43+
},
44+
{
45+
"type": "WEB",
46+
"url": "https://vuldb.com/?submit.436375"
47+
}
48+
],
49+
"database_specific": {
50+
"cwe_ids": [
51+
"CWE-79"
52+
],
53+
"severity": "MODERATE",
54+
"github_reviewed": false,
55+
"github_reviewed_at": null,
56+
"nvd_published_at": "2024-11-04T02:15:15Z"
57+
}
58+
}
Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-79m4-m83j-wqr4",
4+
"modified": "2024-11-04T03:30:39Z",
5+
"published": "2024-11-04T03:30:39Z",
6+
"aliases": [
7+
"CVE-2024-20104"
8+
],
9+
"details": "In da, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09073261; Issue ID: MSV-1772.",
10+
"severity": [
11+
12+
],
13+
"affected": [
14+
15+
],
16+
"references": [
17+
{
18+
"type": "ADVISORY",
19+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20104"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024"
24+
}
25+
],
26+
"database_specific": {
27+
"cwe_ids": [
28+
"CWE-787"
29+
],
30+
"severity": null,
31+
"github_reviewed": false,
32+
"github_reviewed_at": null,
33+
"nvd_published_at": "2024-11-04T02:15:15Z"
34+
}
35+
}
Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-7fwp-9vj9-hr6v",
4+
"modified": "2024-11-04T03:30:39Z",
5+
"published": "2024-11-04T03:30:39Z",
6+
"aliases": [
7+
"CVE-2024-10752"
8+
],
9+
"details": "A vulnerability was found in Codezips Pet Shop Management System 1.0. It has been classified as critical. This affects an unknown part of the file /productsadd.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions contradicting file names to be affected.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [
21+
22+
],
23+
"references": [
24+
{
25+
"type": "ADVISORY",
26+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10752"
27+
},
28+
{
29+
"type": "WEB",
30+
"url": "https://github.com/primaryboy/CVE/issues/1"
31+
},
32+
{
33+
"type": "WEB",
34+
"url": "https://vuldb.com/?ctiid.282921"
35+
},
36+
{
37+
"type": "WEB",
38+
"url": "https://vuldb.com/?id.282921"
39+
},
40+
{
41+
"type": "WEB",
42+
"url": "https://vuldb.com/?submit.436316"
43+
}
44+
],
45+
"database_specific": {
46+
"cwe_ids": [
47+
"CWE-89"
48+
],
49+
"severity": "MODERATE",
50+
"github_reviewed": false,
51+
"github_reviewed_at": null,
52+
"nvd_published_at": "2024-11-04T02:15:15Z"
53+
}
54+
}
Lines changed: 58 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,58 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-8fqg-98qq-f4p9",
4+
"modified": "2024-11-04T03:30:40Z",
5+
"published": "2024-11-04T03:30:40Z",
6+
"aliases": [
7+
"CVE-2024-10756"
8+
],
9+
"details": "A vulnerability classified as problematic was found in PHPGurukul Online Shopping Portal 2.0. Affected by this vulnerability is an unknown functionality of the file /admin/assets/plugins/DataTables/media/unit_testing/templates/html_table.php. The manipulation of the argument scripts leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [
21+
22+
],
23+
"references": [
24+
{
25+
"type": "ADVISORY",
26+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10756"
27+
},
28+
{
29+
"type": "WEB",
30+
"url": "https://github.com/secuserx/CVE/blob/main/%5BXSS%20vulnerability%5D%20found%20in%20Online%20Shopping%20Portal%202.0%20-%20(html_table.php).md"
31+
},
32+
{
33+
"type": "WEB",
34+
"url": "https://phpgurukul.com"
35+
},
36+
{
37+
"type": "WEB",
38+
"url": "https://vuldb.com/?ctiid.282925"
39+
},
40+
{
41+
"type": "WEB",
42+
"url": "https://vuldb.com/?id.282925"
43+
},
44+
{
45+
"type": "WEB",
46+
"url": "https://vuldb.com/?submit.436381"
47+
}
48+
],
49+
"database_specific": {
50+
"cwe_ids": [
51+
"CWE-79"
52+
],
53+
"severity": "MODERATE",
54+
"github_reviewed": false,
55+
"github_reviewed_at": null,
56+
"nvd_published_at": "2024-11-04T03:15:04Z"
57+
}
58+
}
Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-9c8g-4qx4-v74x",
4+
"modified": "2024-11-04T03:30:40Z",
5+
"published": "2024-11-04T03:30:40Z",
6+
"aliases": [
7+
"CVE-2024-20109"
8+
],
9+
"details": "In ccu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09065928; Issue ID: MSV-1763.",
10+
"severity": [
11+
12+
],
13+
"affected": [
14+
15+
],
16+
"references": [
17+
{
18+
"type": "ADVISORY",
19+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20109"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024"
24+
}
25+
],
26+
"database_specific": {
27+
"cwe_ids": [
28+
"CWE-787"
29+
],
30+
"severity": null,
31+
"github_reviewed": false,
32+
"github_reviewed_at": null,
33+
"nvd_published_at": "2024-11-04T02:15:16Z"
34+
}
35+
}
Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-9w8c-9425-p69g",
4+
"modified": "2024-11-04T03:30:40Z",
5+
"published": "2024-11-04T03:30:40Z",
6+
"aliases": [
7+
"CVE-2024-20121"
8+
],
9+
"details": "In KeyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08956986; Issue ID: MSV-1574.",
10+
"severity": [
11+
12+
],
13+
"affected": [
14+
15+
],
16+
"references": [
17+
{
18+
"type": "ADVISORY",
19+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20121"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024"
24+
}
25+
],
26+
"database_specific": {
27+
"cwe_ids": [
28+
"CWE-787"
29+
],
30+
"severity": null,
31+
"github_reviewed": false,
32+
"github_reviewed_at": null,
33+
"nvd_published_at": "2024-11-04T02:15:17Z"
34+
}
35+
}

0 commit comments

Comments
 (0)