forked from CVEProject/cvelistV5
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- 8 new CVEs: CVE-2022-31631, CVE-2024-41168, CVE-2024-57601, CVE-2024-57602, CVE-2024-57603, CVE-2024-57604, CVE-2024-57605, CVE-2025-1229 - 0 updated CVEs:
- Loading branch information
cvelistV5 Github Action
committed
Feb 12, 2025
1 parent
5d6978d
commit 7d8d339
Showing
8 changed files
with
654 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,114 @@ | ||
{ | ||
"dataType": "CVE_RECORD", | ||
"dataVersion": "5.1", | ||
"cveMetadata": { | ||
"cveId": "CVE-2022-31631", | ||
"assignerOrgId": "dd77f84a-d19a-4638-8c3d-a322d820ed2b", | ||
"state": "PUBLISHED", | ||
"assignerShortName": "php", | ||
"dateReserved": "2022-05-25T21:03:32.861Z", | ||
"datePublished": "2025-02-12T22:10:45.418Z", | ||
"dateUpdated": "2025-02-12T22:10:45.418Z" | ||
}, | ||
"containers": { | ||
"cna": { | ||
"affected": [ | ||
{ | ||
"defaultStatus": "affected", | ||
"packageName": "pdo_sqlite", | ||
"product": "PHP", | ||
"vendor": "PHP Group", | ||
"versions": [ | ||
{ | ||
"lessThan": "8.0.27", | ||
"status": "affected", | ||
"version": "8.0.x", | ||
"versionType": "semver" | ||
}, | ||
{ | ||
"lessThan": "8.1.15", | ||
"status": "affected", | ||
"version": "8.1.x", | ||
"versionType": "semver" | ||
}, | ||
{ | ||
"lessThan": "8.2.2", | ||
"status": "affected", | ||
"version": "8.2.x", | ||
"versionType": "semver" | ||
} | ||
] | ||
} | ||
], | ||
"datePublic": "2022-12-19T13:27:00.000Z", | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"supportingMedia": [ | ||
{ | ||
"base64": false, | ||
"type": "text/html", | ||
"value": "<p>In PHP versions 8.0.* before 8.0.27, 8.1.* before 8.1.15, 8.2.* before 8.2.2 when using PDO::quote() function to quote user-supplied data for SQLite, supplying an overly long string may cause the driver to incorrectly quote the data, which may further lead to SQL injection vulnerabilities. </p>" | ||
} | ||
], | ||
"value": "In PHP versions 8.0.* before 8.0.27, 8.1.* before 8.1.15, 8.2.* before 8.2.2 when using PDO::quote() function to quote user-supplied data for SQLite, supplying an overly long string may cause the driver to incorrectly quote the data, which may further lead to SQL injection vulnerabilities." | ||
} | ||
], | ||
"metrics": [ | ||
{ | ||
"cvssV3_1": { | ||
"attackComplexity": "LOW", | ||
"attackVector": "NETWORK", | ||
"availabilityImpact": "NONE", | ||
"baseScore": 9.1, | ||
"baseSeverity": "CRITICAL", | ||
"confidentialityImpact": "HIGH", | ||
"integrityImpact": "HIGH", | ||
"privilegesRequired": "NONE", | ||
"scope": "UNCHANGED", | ||
"userInteraction": "NONE", | ||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", | ||
"version": "3.1" | ||
}, | ||
"format": "CVSS", | ||
"scenarios": [ | ||
{ | ||
"lang": "en", | ||
"value": "GENERAL" | ||
} | ||
] | ||
} | ||
], | ||
"problemTypes": [ | ||
{ | ||
"descriptions": [ | ||
{ | ||
"cweId": "CWE-74", | ||
"description": "CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')", | ||
"lang": "en", | ||
"type": "CWE" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "dd77f84a-d19a-4638-8c3d-a322d820ed2b", | ||
"shortName": "php", | ||
"dateUpdated": "2025-02-12T22:10:45.418Z" | ||
}, | ||
"references": [ | ||
{ | ||
"url": "https://bugs.php.net/bug.php?id=81740" | ||
} | ||
], | ||
"source": { | ||
"advisory": "https://bugs.php.net/bug.php?id=81740", | ||
"discovery": "INTERNAL" | ||
}, | ||
"title": "PDO::quote() may return unquoted string", | ||
"x_generator": { | ||
"engine": "Vulnogram 0.2.0" | ||
} | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,105 @@ | ||
{ | ||
"dataType": "CVE_RECORD", | ||
"dataVersion": "5.1", | ||
"cveMetadata": { | ||
"cveId": "CVE-2024-41168", | ||
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", | ||
"state": "PUBLISHED", | ||
"assignerShortName": "intel", | ||
"dateReserved": "2024-07-17T03:00:05.155Z", | ||
"datePublished": "2025-02-12T21:58:41.096Z", | ||
"dateUpdated": "2025-02-12T21:58:41.096Z" | ||
}, | ||
"containers": { | ||
"cna": { | ||
"providerMetadata": { | ||
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", | ||
"shortName": "intel", | ||
"dateUpdated": "2025-02-12T21:58:41.096Z" | ||
}, | ||
"problemTypes": [ | ||
{ | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"description": "Denial of Service" | ||
}, | ||
{ | ||
"lang": "en", | ||
"description": "Use After Free", | ||
"cweId": "CWE-416", | ||
"type": "CWE" | ||
} | ||
] | ||
} | ||
], | ||
"affected": [ | ||
{ | ||
"vendor": "n/a", | ||
"product": "Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software for Windows", | ||
"versions": [ | ||
{ | ||
"version": "before version 23.80", | ||
"status": "affected" | ||
} | ||
], | ||
"defaultStatus": "unaffected" | ||
} | ||
], | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "Use after free in some Intel(R) PROSet/Wireless WiFi and Killerâ„¢ WiFi software for Windows before version 23.80 may allow an unauthenticated user to potentially enable denial of service via adjacent access." | ||
} | ||
], | ||
"references": [ | ||
{ | ||
"name": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01224.html", | ||
"url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01224.html" | ||
} | ||
], | ||
"metrics": [ | ||
{ | ||
"format": "CVSS", | ||
"scenarios": [ | ||
{ | ||
"lang": "en", | ||
"value": "GENERAL" | ||
} | ||
], | ||
"cvssV3_1": { | ||
"version": "3.1", | ||
"baseScore": 7.4, | ||
"baseSeverity": "HIGH", | ||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", | ||
"attackVector": "ADJACENT_NETWORK", | ||
"attackComplexity": "LOW", | ||
"privilegesRequired": "NONE", | ||
"userInteraction": "NONE", | ||
"scope": "CHANGED", | ||
"confidentialityImpact": "NONE", | ||
"integrityImpact": "NONE", | ||
"availabilityImpact": "HIGH" | ||
}, | ||
"cvssV4_0": { | ||
"version": "4.0", | ||
"baseScore": 7.1, | ||
"baseSeverity": "HIGH", | ||
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", | ||
"attackVector": "ADJACENT", | ||
"attackComplexity": "LOW", | ||
"attackRequirements": "NONE", | ||
"privilegesRequired": "NONE", | ||
"userInteraction": "NONE", | ||
"vulnConfidentialityImpact": "NONE", | ||
"vulnIntegrityImpact": "NONE", | ||
"vulnAvailabilityImpact": "HIGH", | ||
"subConfidentialityImpact": "NONE", | ||
"subIntegrityImpact": "NONE", | ||
"subAvailabilityImpact": "LOW" | ||
} | ||
} | ||
] | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,56 @@ | ||
{ | ||
"dataType": "CVE_RECORD", | ||
"cveMetadata": { | ||
"state": "PUBLISHED", | ||
"cveId": "CVE-2024-57601", | ||
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", | ||
"assignerShortName": "mitre", | ||
"dateUpdated": "2025-02-12T21:57:53.342Z", | ||
"dateReserved": "2025-01-09T00:00:00.000Z", | ||
"datePublished": "2025-02-12T00:00:00.000Z" | ||
}, | ||
"containers": { | ||
"cna": { | ||
"providerMetadata": { | ||
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", | ||
"shortName": "mitre", | ||
"dateUpdated": "2025-02-12T21:57:53.342Z" | ||
}, | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "Cross Site Scripting vulnerability in Alex Tselegidis EasyAppointments v.1.5.0 allows a remote attacker to execute arbitrary code via the legal_settings parameter." | ||
} | ||
], | ||
"affected": [ | ||
{ | ||
"vendor": "n/a", | ||
"product": "n/a", | ||
"versions": [ | ||
{ | ||
"version": "n/a", | ||
"status": "affected" | ||
} | ||
] | ||
} | ||
], | ||
"references": [ | ||
{ | ||
"url": "https://hkohi.ca/vulnerability/13" | ||
} | ||
], | ||
"problemTypes": [ | ||
{ | ||
"descriptions": [ | ||
{ | ||
"type": "text", | ||
"lang": "en", | ||
"description": "n/a" | ||
} | ||
] | ||
} | ||
] | ||
} | ||
}, | ||
"dataVersion": "5.1" | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,56 @@ | ||
{ | ||
"dataType": "CVE_RECORD", | ||
"cveMetadata": { | ||
"state": "PUBLISHED", | ||
"cveId": "CVE-2024-57602", | ||
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", | ||
"assignerShortName": "mitre", | ||
"dateUpdated": "2025-02-12T22:07:09.113Z", | ||
"dateReserved": "2025-01-09T00:00:00.000Z", | ||
"datePublished": "2025-02-12T00:00:00.000Z" | ||
}, | ||
"containers": { | ||
"cna": { | ||
"providerMetadata": { | ||
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", | ||
"shortName": "mitre", | ||
"dateUpdated": "2025-02-12T22:07:09.113Z" | ||
}, | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "An issue in Alex Tselegidis EasyAppointments v.1.5.0 allows a remote attacker to escalate privileges via the index.php file." | ||
} | ||
], | ||
"affected": [ | ||
{ | ||
"vendor": "n/a", | ||
"product": "n/a", | ||
"versions": [ | ||
{ | ||
"version": "n/a", | ||
"status": "affected" | ||
} | ||
] | ||
} | ||
], | ||
"references": [ | ||
{ | ||
"url": "https://hkohi.ca/vulnerability/12" | ||
} | ||
], | ||
"problemTypes": [ | ||
{ | ||
"descriptions": [ | ||
{ | ||
"type": "text", | ||
"lang": "en", | ||
"description": "n/a" | ||
} | ||
] | ||
} | ||
] | ||
} | ||
}, | ||
"dataVersion": "5.1" | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,59 @@ | ||
{ | ||
"dataType": "CVE_RECORD", | ||
"cveMetadata": { | ||
"state": "PUBLISHED", | ||
"cveId": "CVE-2024-57603", | ||
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", | ||
"assignerShortName": "mitre", | ||
"dateUpdated": "2025-02-12T22:05:09.437Z", | ||
"dateReserved": "2025-01-09T00:00:00.000Z", | ||
"datePublished": "2025-02-12T00:00:00.000Z" | ||
}, | ||
"containers": { | ||
"cna": { | ||
"providerMetadata": { | ||
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", | ||
"shortName": "mitre", | ||
"dateUpdated": "2025-02-12T22:05:09.437Z" | ||
}, | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "An issue in MaysWind ezBookkeeping 0.7.0 allows a remote attacker to escalate privileges via the lack of rate limiting." | ||
} | ||
], | ||
"affected": [ | ||
{ | ||
"vendor": "n/a", | ||
"product": "n/a", | ||
"versions": [ | ||
{ | ||
"version": "n/a", | ||
"status": "affected" | ||
} | ||
] | ||
} | ||
], | ||
"references": [ | ||
{ | ||
"url": "https://github.com/mayswind/ezbookkeeping/issues/33" | ||
}, | ||
{ | ||
"url": "https://hkohi.ca/vulnerability/1" | ||
} | ||
], | ||
"problemTypes": [ | ||
{ | ||
"descriptions": [ | ||
{ | ||
"type": "text", | ||
"lang": "en", | ||
"description": "n/a" | ||
} | ||
] | ||
} | ||
] | ||
} | ||
}, | ||
"dataVersion": "5.1" | ||
} |
Oops, something went wrong.