Skip to content

Commit

Permalink
Show file tree
Hide file tree
Showing 22 changed files with 398 additions and 17 deletions.
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{
"schema_version": "1.4.0",
"id": "GHSA-5667-3wch-7q7w",
"modified": "2024-06-20T06:30:54Z",
"modified": "2024-07-25T21:31:19Z",
"published": "2024-03-27T09:30:40Z",
"aliases": [
"CVE-2024-1023"
Expand Down Expand Up @@ -103,6 +103,10 @@
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:3989"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:4884"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2024-1023"
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{
"schema_version": "1.4.0",
"id": "GHSA-9ph3-v2vh-3qx7",
"modified": "2024-06-20T06:30:54Z",
"modified": "2024-07-25T21:31:19Z",
"published": "2024-04-02T09:30:42Z",
"aliases": [
"CVE-2024-1300"
Expand Down Expand Up @@ -95,6 +95,10 @@
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2024-1300"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:4884"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:3989"
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{
"schema_version": "1.4.0",
"id": "GHSA-f8h5-v2vg-46rr",
"modified": "2024-07-15T00:30:40Z",
"modified": "2024-07-25T21:31:19Z",
"published": "2024-04-04T15:30:34Z",
"aliases": [
"CVE-2024-2700"
Expand Down Expand Up @@ -116,6 +116,10 @@
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:4028"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:4873"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2024-2700"
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{
"schema_version": "1.4.0",
"id": "GHSA-9442-gm4v-r222",
"modified": "2024-06-20T16:22:34Z",
"modified": "2024-07-25T21:31:19Z",
"published": "2024-06-20T15:31:19Z",
"aliases": [
"CVE-2024-6162"
Expand Down Expand Up @@ -44,6 +44,10 @@
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6162"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:4884"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2024-6162"
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{
"schema_version": "1.4.0",
"id": "GHSA-xpp6-8r3j-ww43",
"modified": "2024-07-09T21:04:44Z",
"modified": "2024-07-25T21:31:19Z",
"published": "2024-07-08T21:31:40Z",
"aliases": [
"CVE-2024-5971"
Expand Down Expand Up @@ -48,6 +48,10 @@
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:4392"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:4884"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2024-5971"
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{
"schema_version": "1.4.0",
"id": "GHSA-4mm4-33wm-56jr",
"modified": "2024-04-02T00:30:47Z",
"modified": "2024-07-25T21:31:19Z",
"published": "2024-04-02T00:30:47Z",
"aliases": [
"CVE-2024-3165"
Expand Down Expand Up @@ -29,6 +29,10 @@
"type": "WEB",
"url": "https://github.com/dotCMS/core/pull/28006"
},
{
"type": "WEB",
"url": "https://auth.dotcms.com/security/SI-70"
},
{
"type": "WEB",
"url": "https://auth.dotcms.com/security/SI-70?token=563ec927-3190-4478-bd77-0d6f8c6fc676"
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{
"schema_version": "1.4.0",
"id": "GHSA-vhhq-fxg5-hvp8",
"modified": "2024-04-02T15:30:36Z",
"modified": "2024-07-25T21:31:19Z",
"published": "2024-04-02T00:30:46Z",
"aliases": [
"CVE-2024-3164"
Expand Down Expand Up @@ -29,6 +29,10 @@
"type": "WEB",
"url": "https://github.com/dotCMS/core/pull/27912"
},
{
"type": "WEB",
"url": "https://auth.dotcms.com/security/SI-69"
},
{
"type": "WEB",
"url": "https://auth.dotcms.com/security/SI-69?token=dc1f0241-b697-41dd-8140-154658e90c54"
Expand Down
Original file line number Diff line number Diff line change
@@ -1,14 +1,17 @@
{
"schema_version": "1.4.0",
"id": "GHSA-3c87-xvq4-93w3",
"modified": "2024-06-12T18:30:41Z",
"modified": "2024-07-25T21:31:19Z",
"published": "2024-06-12T18:30:41Z",
"aliases": [
"CVE-2024-37878"
],
"details": "Cross Site Scripting vulnerability in TWCMS v.2.0.3 allows a remote attacker to execute arbitrary code via the /TWCMS-gh-pages/twcms/runtime/twcms_view/default,index.htm.php\" PHP directly echoes parameters input from external sources",
"severity": [

{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
}
],
"affected": [

Expand All @@ -25,9 +28,9 @@
],
"database_specific": {
"cwe_ids": [

"CWE-79"
],
"severity": null,
"severity": "MODERATE",
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-06-12T17:15:51Z"
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{
"schema_version": "1.4.0",
"id": "GHSA-4rrj-v9hp-2x5j",
"modified": "2024-06-12T18:30:41Z",
"modified": "2024-07-25T21:31:19Z",
"published": "2024-06-12T18:30:41Z",
"aliases": [
"CVE-2024-37040"
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{
"schema_version": "1.4.0",
"id": "GHSA-f3h5-qqxj-cvgg",
"modified": "2024-06-12T18:30:41Z",
"modified": "2024-07-25T21:31:19Z",
"published": "2024-06-12T18:30:41Z",
"aliases": [
"CVE-2024-37038"
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{
"schema_version": "1.4.0",
"id": "GHSA-x36j-wqpg-pv3x",
"modified": "2024-06-12T18:30:41Z",
"modified": "2024-07-25T21:31:19Z",
"published": "2024-06-12T18:30:41Z",
"aliases": [
"CVE-2024-5560"
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,46 @@
{
"schema_version": "1.4.0",
"id": "GHSA-4mh8-9689-38vr",
"modified": "2024-07-25T21:31:20Z",
"published": "2024-07-25T21:31:20Z",
"aliases": [
"CVE-2024-1724"
],
"details": "In snapd versions prior to 2.62, when using AppArmor for enforcement of \nsandbox permissions, snapd failed to restrict writes to the $HOME/bin\npath. In Ubuntu, when this path exists, it is automatically added to\nthe users PATH. An attacker who could convince a user to install a\nmalicious snap which used the 'home' plug could use this vulnerability\nto install arbitrary scripts into the users PATH which may then be run\nby the user outside of the expected snap sandbox and hence allow them\nto escape confinement.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L"
}
],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-1724"
},
{
"type": "WEB",
"url": "https://github.com/snapcore/snapd/pull/13689"
},
{
"type": "WEB",
"url": "https://github.com/snapcore/snapd/commit/aa191f97713de8dc3ce3ac818539f0b976eb8ef6"
},
{
"type": "WEB",
"url": "https://gld.mcphail.uk/posts/explaining-cve-2024-1724"
}
],
"database_specific": {
"cwe_ids": [
"CWE-732"
],
"severity": "MODERATE",
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-07-25T19:15:09Z"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,54 @@
{
"schema_version": "1.4.0",
"id": "GHSA-5pr4-6wfv-6xhj",
"modified": "2024-07-25T21:31:20Z",
"published": "2024-07-25T21:31:20Z",
"aliases": [
"CVE-2024-7105"
],
"details": "A vulnerability classified as critical has been found in ForIP Tecnologia Administração PABX 1.x. Affected is an unknown function of the file /detalheIdUra of the component Lista Ura Page. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-272430 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
}
],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7105"
},
{
"type": "WEB",
"url": "https://docs.google.com/document/d/1Q3kLR-HXSmj1LFpnCAt964YHACWwdckz4O8n4ocgB1I/edit?usp=sharing"
},
{
"type": "WEB",
"url": "https://vuldb.com/?ctiid.272430"
},
{
"type": "WEB",
"url": "https://vuldb.com/?id.272430"
},
{
"type": "WEB",
"url": "https://vuldb.com/?submit.376659"
}
],
"database_specific": {
"cwe_ids": [
"CWE-89"
],
"severity": "MODERATE",
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-07-25T21:15:11Z"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,42 @@
{
"schema_version": "1.4.0",
"id": "GHSA-64jh-cjwc-w8q6",
"modified": "2024-07-25T21:31:20Z",
"published": "2024-07-25T21:31:20Z",
"aliases": [
"CVE-2024-29068"
],
"details": "In snapd versions prior to 2.62, snapd failed to properly check the file\ntype when extracting a snap. The snap format is a squashfs file-system\nimage and so can contain files that are non-regular files (such as pipes \nor sockets etc). Various file entries within the snap squashfs image\n(such as icons etc) are directly read by snapd when it is extracted. An \nattacker who could convince a user to install a malicious snap which\ncontained non-regular files at these paths could then cause snapd to block\nindefinitely trying to read from such files and cause a denial of service.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:H"
}
],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29068"
},
{
"type": "WEB",
"url": "https://github.com/snapcore/snapd/pull/13682"
},
{
"type": "WEB",
"url": "https://github.com/snapcore/snapd/commit/b66fee81606a1c05f965a876ccbaf44174194063"
}
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"severity": "MODERATE",
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-07-25T20:15:04Z"
}
}
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{
"schema_version": "1.4.0",
"id": "GHSA-662h-2c64-c76h",
"modified": "2024-07-22T12:30:37Z",
"modified": "2024-07-25T21:31:19Z",
"published": "2024-07-22T12:30:37Z",
"aliases": [
"CVE-2024-37215"
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
{
"schema_version": "1.4.0",
"id": "GHSA-69p6-gp5x-j269",
"modified": "2024-07-25T21:31:20Z",
"published": "2024-07-25T21:31:20Z",
"aliases": [
"CVE-2024-29069"
],
"details": "In snapd versions prior to 2.62, snapd failed to properly check the\ndestination of symbolic links when extracting a snap. The snap format \nis a squashfs file-system image and so can contain symbolic links and\nother file types. Various file entries within the snap squashfs image\n(such as icons and desktop files etc) are directly read by snapd when\nit is extracted. An attacker who could convince a user to install a\nmalicious snap which contained symbolic links at these paths could then \ncause snapd to write out the contents of the symbolic link destination\ninto a world-readable directory. This in-turn could allow an unprivileged\nuser to gain access to privileged information.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L"
}
],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29069"
},
{
"type": "WEB",
"url": "https://github.com/snapcore/snapd/pull/13682"
}
],
"database_specific": {
"cwe_ids": [
"CWE-610"
],
"severity": "MODERATE",
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-07-25T20:15:04Z"
}
}
Loading

0 comments on commit dd2ab8e

Please sign in to comment.