diff --git a/advisories/unreviewed/2024/06/GHSA-jhrr-7ggp-3gv3/GHSA-jhrr-7ggp-3gv3.json b/advisories/unreviewed/2024/06/GHSA-jhrr-7ggp-3gv3/GHSA-jhrr-7ggp-3gv3.json index 81de628ba76f0..dde6a28aa6955 100644 --- a/advisories/unreviewed/2024/06/GHSA-jhrr-7ggp-3gv3/GHSA-jhrr-7ggp-3gv3.json +++ b/advisories/unreviewed/2024/06/GHSA-jhrr-7ggp-3gv3/GHSA-jhrr-7ggp-3gv3.json @@ -32,7 +32,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-258" + "CWE-258", + "CWE-521" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2024/07/GHSA-4jmm-c6jw-g796/GHSA-4jmm-c6jw-g796.json b/advisories/unreviewed/2024/07/GHSA-4jmm-c6jw-g796/GHSA-4jmm-c6jw-g796.json new file mode 100644 index 0000000000000..cd2849e8e7c19 --- /dev/null +++ b/advisories/unreviewed/2024/07/GHSA-4jmm-c6jw-g796/GHSA-4jmm-c6jw-g796.json @@ -0,0 +1,35 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4jmm-c6jw-g796", + "modified": "2024-07-31T21:32:38Z", + "published": "2024-07-31T21:32:38Z", + "aliases": [ + "CVE-2024-41255" + ], + "details": "filestash v0.4 is configured to skip TLS certificate verification when using the FTPS protocol, possibly allowing attackers to execute a man-in-the-middle attack via the Init function of index.go.", + "severity": [ + + ], + "affected": [ + + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41255" + }, + { + "type": "WEB", + "url": "https://gist.github.com/nyxfqq/c367f2ca9448810924dcf0f1af30b441" + } + ], + "database_specific": { + "cwe_ids": [ + + ], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2024-07-31T21:15:18Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2024/07/GHSA-56wj-jfhp-fq9f/GHSA-56wj-jfhp-fq9f.json b/advisories/unreviewed/2024/07/GHSA-56wj-jfhp-fq9f/GHSA-56wj-jfhp-fq9f.json new file mode 100644 index 0000000000000..0fd16ac829fe3 --- /dev/null +++ b/advisories/unreviewed/2024/07/GHSA-56wj-jfhp-fq9f/GHSA-56wj-jfhp-fq9f.json @@ -0,0 +1,38 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-56wj-jfhp-fq9f", + "modified": "2024-07-31T21:32:38Z", + "published": "2024-07-31T21:32:38Z", + "aliases": [ + "CVE-2019-6198" + ], + "details": "A vulnerability was reported in Lenovo PC Manager prior to version 2.8.90.11211 that could allow a local attacker to escalate privileges.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6198" + }, + { + "type": "WEB", + "url": "https://iknow.lenovo.com.cn/detail/186945.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-287" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2024-07-31T21:15:12Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2024/07/GHSA-6qqx-cj95-m623/GHSA-6qqx-cj95-m623.json b/advisories/unreviewed/2024/07/GHSA-6qqx-cj95-m623/GHSA-6qqx-cj95-m623.json new file mode 100644 index 0000000000000..0c440a1cab714 --- /dev/null +++ b/advisories/unreviewed/2024/07/GHSA-6qqx-cj95-m623/GHSA-6qqx-cj95-m623.json @@ -0,0 +1,38 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6qqx-cj95-m623", + "modified": "2024-07-31T21:32:38Z", + "published": "2024-07-31T21:32:37Z", + "aliases": [ + "CVE-2017-3772" + ], + "details": "A vulnerability was reported in Lenovo PC Manager versions prior to 2.6.40.3154 that could allow an attacker to cause a system reboot.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [ + + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3772" + }, + { + "type": "WEB", + "url": "https://iknow.lenovo.com.cn/detail/171959" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-20" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2024-07-31T21:15:12Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2024/07/GHSA-7gch-jrxx-fw58/GHSA-7gch-jrxx-fw58.json b/advisories/unreviewed/2024/07/GHSA-7gch-jrxx-fw58/GHSA-7gch-jrxx-fw58.json new file mode 100644 index 0000000000000..c2400c884037a --- /dev/null +++ b/advisories/unreviewed/2024/07/GHSA-7gch-jrxx-fw58/GHSA-7gch-jrxx-fw58.json @@ -0,0 +1,38 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7gch-jrxx-fw58", + "modified": "2024-07-31T21:32:38Z", + "published": "2024-07-31T21:32:38Z", + "aliases": [ + "CVE-2023-1577" + ], + "details": "A path hijacking vulnerability was reported in Lenovo Driver Manager prior to version 3.1.1307.1308 that could allow a local user to execute code with elevated privileges.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1577" + }, + { + "type": "WEB", + "url": "https://iknow.lenovo.com.cn/detail/dc_415202.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-20" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2024-07-31T21:15:15Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2024/07/GHSA-9jv3-q6v2-w6g3/GHSA-9jv3-q6v2-w6g3.json b/advisories/unreviewed/2024/07/GHSA-9jv3-q6v2-w6g3/GHSA-9jv3-q6v2-w6g3.json new file mode 100644 index 0000000000000..f16f2d74b49e3 --- /dev/null +++ b/advisories/unreviewed/2024/07/GHSA-9jv3-q6v2-w6g3/GHSA-9jv3-q6v2-w6g3.json @@ -0,0 +1,35 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9jv3-q6v2-w6g3", + "modified": "2024-07-31T21:32:38Z", + "published": "2024-07-31T21:32:38Z", + "aliases": [ + "CVE-2024-41253" + ], + "details": "goframe v2.7.2 is configured to skip TLS certificate verification, possibly allowing attackers to execute a man-in-the-middle attack via the gclient component.", + "severity": [ + + ], + "affected": [ + + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41253" + }, + { + "type": "WEB", + "url": "https://gist.github.com/nyxfqq/f69d41c69a4d0751841f4d972b9745da" + } + ], + "database_specific": { + "cwe_ids": [ + + ], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2024-07-31T21:15:17Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2024/07/GHSA-cw3q-225p-f4mw/GHSA-cw3q-225p-f4mw.json b/advisories/unreviewed/2024/07/GHSA-cw3q-225p-f4mw/GHSA-cw3q-225p-f4mw.json new file mode 100644 index 0000000000000..f03c895d214eb --- /dev/null +++ b/advisories/unreviewed/2024/07/GHSA-cw3q-225p-f4mw/GHSA-cw3q-225p-f4mw.json @@ -0,0 +1,38 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cw3q-225p-f4mw", + "modified": "2024-07-31T21:32:39Z", + "published": "2024-07-31T21:32:39Z", + "aliases": [ + "CVE-2024-4187" + ], + "details": "Stored XSS vulnerability has been discovered in OpenText™ Filr product, affecting versions 24.1.1 and 24.2. The vulnerability could cause users to not be warned when clicking links to external sites.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:P/AU:N/R:X/V:D/RE:L/U:Green" + } + ], + "affected": [ + + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4187" + }, + { + "type": "WEB", + "url": "https://portal.microfocus.com/s/article/KM000032291" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-356" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2024-07-31T21:15:18Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2024/07/GHSA-f6rc-73vx-29h5/GHSA-f6rc-73vx-29h5.json b/advisories/unreviewed/2024/07/GHSA-f6rc-73vx-29h5/GHSA-f6rc-73vx-29h5.json new file mode 100644 index 0000000000000..ea3dcefdccb9c --- /dev/null +++ b/advisories/unreviewed/2024/07/GHSA-f6rc-73vx-29h5/GHSA-f6rc-73vx-29h5.json @@ -0,0 +1,35 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-f6rc-73vx-29h5", + "modified": "2024-07-31T21:32:39Z", + "published": "2024-07-31T21:32:38Z", + "aliases": [ + "CVE-2024-41258" + ], + "details": "An issue was discovered in filestash v0.4. The usage of the ssh.InsecureIgnoreHostKey() disables host key verification, possibly allowing attackers to obtain sensitive information via a man-in-the-middle attack.", + "severity": [ + + ], + "affected": [ + + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41258" + }, + { + "type": "WEB", + "url": "https://gist.github.com/nyxfqq/ed8c2ba3398c9e28cd8dbf0902bd8edf" + } + ], + "database_specific": { + "cwe_ids": [ + + ], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2024-07-31T21:15:18Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2024/07/GHSA-gqv4-535f-vxpp/GHSA-gqv4-535f-vxpp.json b/advisories/unreviewed/2024/07/GHSA-gqv4-535f-vxpp/GHSA-gqv4-535f-vxpp.json new file mode 100644 index 0000000000000..918db7b392bb9 --- /dev/null +++ b/advisories/unreviewed/2024/07/GHSA-gqv4-535f-vxpp/GHSA-gqv4-535f-vxpp.json @@ -0,0 +1,43 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gqv4-535f-vxpp", + "modified": "2024-07-31T21:32:37Z", + "published": "2024-07-31T21:32:37Z", + "aliases": [ + "CVE-2024-41630" + ], + "details": "Stack-based buffer overflow vulnerability in Tenda AC18 V15.03.3.10_EN allows a remote attacker to execute arbitrary code via the ssid parameter at ip/goform/fast_setting_wifi_set.", + "severity": [ + + ], + "affected": [ + + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41630" + }, + { + "type": "WEB", + "url": "https://palm-vertebra-fe9.notion.site/form_fast_setting_wifi_set-fd47294cf4bb460bb95f804d39e53f34" + }, + { + "type": "WEB", + "url": "https://www.tendacn.com/hk/download/detail-3852.html" + }, + { + "type": "WEB", + "url": "https://www.tendacn.com/hk/download/detail-3863.html" + } + ], + "database_specific": { + "cwe_ids": [ + + ], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2024-07-31T19:15:12Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2024/07/GHSA-gqx3-6rgq-72pg/GHSA-gqx3-6rgq-72pg.json b/advisories/unreviewed/2024/07/GHSA-gqx3-6rgq-72pg/GHSA-gqx3-6rgq-72pg.json new file mode 100644 index 0000000000000..c5ae5f07e0afe --- /dev/null +++ b/advisories/unreviewed/2024/07/GHSA-gqx3-6rgq-72pg/GHSA-gqx3-6rgq-72pg.json @@ -0,0 +1,54 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gqx3-6rgq-72pg", + "modified": "2024-07-31T21:32:39Z", + "published": "2024-07-31T21:32:39Z", + "aliases": [ + "CVE-2024-7326" + ], + "details": "A vulnerability classified as critical has been found in IObit DualSafe Password Manager 1.4.0.3. This affects an unknown part in the library RTL120.BPL of the component BPL Handler. The manipulation leads to uncontrolled search path. It is possible to launch the attack on the local host. The identifier VDB-273249 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [ + + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7326" + }, + { + "type": "WEB", + "url": "https://lab52.io/blog/dll-side-loading-through-iobit-against-colombia" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.273249" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.273249" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.378150" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-427" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2024-07-31T21:15:19Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2024/07/GHSA-hh2c-m2f3-3q9f/GHSA-hh2c-m2f3-3q9f.json b/advisories/unreviewed/2024/07/GHSA-hh2c-m2f3-3q9f/GHSA-hh2c-m2f3-3q9f.json new file mode 100644 index 0000000000000..ea5b57f20dfd5 --- /dev/null +++ b/advisories/unreviewed/2024/07/GHSA-hh2c-m2f3-3q9f/GHSA-hh2c-m2f3-3q9f.json @@ -0,0 +1,38 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hh2c-m2f3-3q9f", + "modified": "2024-07-31T21:32:38Z", + "published": "2024-07-31T21:32:38Z", + "aliases": [ + "CVE-2022-4001" + ], + "details": "An authentication bypass vulnerability could allow an attacker to access API functions without authentication.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + } + ], + "affected": [ + + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4001" + }, + { + "type": "WEB", + "url": "https://en-us.support.motorola.com/app/answers/detail/a_id/176952/~/motorola-q14-mesh-router-vulnerabilities" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-287" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2024-07-31T21:15:14Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2024/07/GHSA-hw68-mw93-xgrg/GHSA-hw68-mw93-xgrg.json b/advisories/unreviewed/2024/07/GHSA-hw68-mw93-xgrg/GHSA-hw68-mw93-xgrg.json new file mode 100644 index 0000000000000..25b53d85dbf5a --- /dev/null +++ b/advisories/unreviewed/2024/07/GHSA-hw68-mw93-xgrg/GHSA-hw68-mw93-xgrg.json @@ -0,0 +1,50 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hw68-mw93-xgrg", + "modified": "2024-07-31T21:32:38Z", + "published": "2024-07-31T21:32:37Z", + "aliases": [ + "CVE-2024-7325" + ], + "details": "A vulnerability was found in IObit Driver Booster 11.0.0.0. It has been rated as critical. Affected by this issue is some unknown functionality in the library VCL120.BPL of the component BPL Handler. The manipulation leads to uncontrolled search path. Attacking locally is a requirement. The identifier of this vulnerability is VDB-273248. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [ + + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7325" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.273248" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.273248" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.378139" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-427" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2024-07-31T20:15:07Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2024/07/GHSA-jr9f-6cwx-mfjg/GHSA-jr9f-6cwx-mfjg.json b/advisories/unreviewed/2024/07/GHSA-jr9f-6cwx-mfjg/GHSA-jr9f-6cwx-mfjg.json new file mode 100644 index 0000000000000..fe7053cacc8c5 --- /dev/null +++ b/advisories/unreviewed/2024/07/GHSA-jr9f-6cwx-mfjg/GHSA-jr9f-6cwx-mfjg.json @@ -0,0 +1,38 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jr9f-6cwx-mfjg", + "modified": "2024-07-31T21:32:38Z", + "published": "2024-07-31T21:32:38Z", + "aliases": [ + "CVE-2022-4003" + ], + "details": "A denial-of-service vulnerability could allow an authenticated user to trigger an internal service restart via a specially crafted API request.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" + } + ], + "affected": [ + + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4003" + }, + { + "type": "WEB", + "url": "https://en-us.support.motorola.com/app/answers/detail/a_id/176952/~/motorola-q14-mesh-router-vulnerabilities" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-400" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2024-07-31T21:15:14Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2024/07/GHSA-mpvx-whpp-99xj/GHSA-mpvx-whpp-99xj.json b/advisories/unreviewed/2024/07/GHSA-mpvx-whpp-99xj/GHSA-mpvx-whpp-99xj.json new file mode 100644 index 0000000000000..03e3c28537028 --- /dev/null +++ b/advisories/unreviewed/2024/07/GHSA-mpvx-whpp-99xj/GHSA-mpvx-whpp-99xj.json @@ -0,0 +1,35 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mpvx-whpp-99xj", + "modified": "2024-07-31T21:32:38Z", + "published": "2024-07-31T21:32:38Z", + "aliases": [ + "CVE-2024-41256" + ], + "details": "Default configurations in the ShareProofVerifier function of filestash v0.4 causes the application to skip the TLS certificate verification process when sending out email verification codes, possibly allowing attackers to access sensitive data via a man-in-the-middle attack.", + "severity": [ + + ], + "affected": [ + + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41256" + }, + { + "type": "WEB", + "url": "https://gist.github.com/nyxfqq/a6da3fe6128b978ea1aaa5df639d5f98" + } + ], + "database_specific": { + "cwe_ids": [ + + ], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2024-07-31T21:15:18Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2024/07/GHSA-p9pr-gh8g-j3cx/GHSA-p9pr-gh8g-j3cx.json b/advisories/unreviewed/2024/07/GHSA-p9pr-gh8g-j3cx/GHSA-p9pr-gh8g-j3cx.json new file mode 100644 index 0000000000000..40d89ff49e1dc --- /dev/null +++ b/advisories/unreviewed/2024/07/GHSA-p9pr-gh8g-j3cx/GHSA-p9pr-gh8g-j3cx.json @@ -0,0 +1,35 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-p9pr-gh8g-j3cx", + "modified": "2024-07-31T21:32:37Z", + "published": "2024-07-31T21:32:37Z", + "aliases": [ + "CVE-2023-28149" + ], + "details": "An issue was discovered in the IhisiServiceSmm module in Insyde InsydeH2O with kernel 5.2 before 05.28.42, 5.3 before 05.37.42, 5.4 before 05.45.39, 5.5 before 05.53.39, and 5.6 before 05.60.39 that could allow an attacker to modify UEFI variables.", + "severity": [ + + ], + "affected": [ + + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28149" + }, + { + "type": "WEB", + "url": "https://www.insyde.com/security-pledge/SA-2023040" + } + ], + "database_specific": { + "cwe_ids": [ + + ], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2024-07-31T19:15:10Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2024/07/GHSA-qjh8-9wf4-5229/GHSA-qjh8-9wf4-5229.json b/advisories/unreviewed/2024/07/GHSA-qjh8-9wf4-5229/GHSA-qjh8-9wf4-5229.json new file mode 100644 index 0000000000000..240d4b6d7a993 --- /dev/null +++ b/advisories/unreviewed/2024/07/GHSA-qjh8-9wf4-5229/GHSA-qjh8-9wf4-5229.json @@ -0,0 +1,38 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qjh8-9wf4-5229", + "modified": "2024-07-31T21:32:38Z", + "published": "2024-07-31T21:32:38Z", + "aliases": [ + "CVE-2022-4002" + ], + "details": "A command injection vulnerability could allow an authenticated user to execute operating system commands as root via a specially crafted API request.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4002" + }, + { + "type": "WEB", + "url": "https://en-us.support.motorola.com/app/answers/detail/a_id/176952/~/motorola-q14-mesh-router-vulnerabilities" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-287" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2024-07-31T21:15:14Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2024/07/GHSA-qpgw-j75c-j585/GHSA-qpgw-j75c-j585.json b/advisories/unreviewed/2024/07/GHSA-qpgw-j75c-j585/GHSA-qpgw-j75c-j585.json new file mode 100644 index 0000000000000..32d572152d8e7 --- /dev/null +++ b/advisories/unreviewed/2024/07/GHSA-qpgw-j75c-j585/GHSA-qpgw-j75c-j585.json @@ -0,0 +1,35 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qpgw-j75c-j585", + "modified": "2024-07-31T21:32:38Z", + "published": "2024-07-31T21:32:38Z", + "aliases": [ + "CVE-2024-41254" + ], + "details": "An issue was discovered in litestream v0.3.13. The usage of the ssh.InsecureIgnoreHostKey() disables host key verification, possibly allowing attackers to obtain sensitive information via a man-in-the-middle attack.", + "severity": [ + + ], + "affected": [ + + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41254" + }, + { + "type": "WEB", + "url": "https://gist.github.com/nyxfqq/d857f268a53aa62402655c8dcd95c68f" + } + ], + "database_specific": { + "cwe_ids": [ + + ], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2024-07-31T21:15:17Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2024/07/GHSA-r6qh-j42j-pw64/GHSA-r6qh-j42j-pw64.json b/advisories/unreviewed/2024/07/GHSA-r6qh-j42j-pw64/GHSA-r6qh-j42j-pw64.json new file mode 100644 index 0000000000000..4559f02d2c6a0 --- /dev/null +++ b/advisories/unreviewed/2024/07/GHSA-r6qh-j42j-pw64/GHSA-r6qh-j42j-pw64.json @@ -0,0 +1,35 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r6qh-j42j-pw64", + "modified": "2024-07-31T21:32:38Z", + "published": "2024-07-31T21:32:38Z", + "aliases": [ + "CVE-2024-40464" + ], + "details": "An issue in beego v.2.2.0 and before allows a remote attacker to escalate privileges via the sendMail function located in beego/core/logs/smtp.go file", + "severity": [ + + ], + "affected": [ + + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40464" + }, + { + "type": "WEB", + "url": "https://gist.github.com/nyxfqq/b53b0148b9aa040de63f58a68fd11445" + } + ], + "database_specific": { + "cwe_ids": [ + + ], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2024-07-31T21:15:17Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2024/07/GHSA-w929-482x-r269/GHSA-w929-482x-r269.json b/advisories/unreviewed/2024/07/GHSA-w929-482x-r269/GHSA-w929-482x-r269.json new file mode 100644 index 0000000000000..1e8f8c688f4f4 --- /dev/null +++ b/advisories/unreviewed/2024/07/GHSA-w929-482x-r269/GHSA-w929-482x-r269.json @@ -0,0 +1,38 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w929-482x-r269", + "modified": "2024-07-31T21:32:37Z", + "published": "2024-07-31T21:32:37Z", + "aliases": [ + "CVE-2019-6197" + ], + "details": "A vulnerability was reported in Lenovo PC Manager prior to version 2.8.90.11211 that could allow a local attacker to escalate privileges.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6197" + }, + { + "type": "WEB", + "url": "https://iknow.lenovo.com.cn/detail/186945.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-287" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2024-07-31T21:15:12Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2024/07/GHSA-wr3p-r5fj-wf97/GHSA-wr3p-r5fj-wf97.json b/advisories/unreviewed/2024/07/GHSA-wr3p-r5fj-wf97/GHSA-wr3p-r5fj-wf97.json new file mode 100644 index 0000000000000..32ff80eb9524d --- /dev/null +++ b/advisories/unreviewed/2024/07/GHSA-wr3p-r5fj-wf97/GHSA-wr3p-r5fj-wf97.json @@ -0,0 +1,35 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wr3p-r5fj-wf97", + "modified": "2024-07-31T21:32:38Z", + "published": "2024-07-31T21:32:38Z", + "aliases": [ + "CVE-2024-40465" + ], + "details": "An issue in beego v.2.2.0 and before allows a remote attacker to escalate privileges via the getCacheFileName function in file.go file", + "severity": [ + + ], + "affected": [ + + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40465" + }, + { + "type": "WEB", + "url": "https://gist.github.com/nyxfqq/a5a2fc5147a1b34538e1ac05a3e56910" + } + ], + "database_specific": { + "cwe_ids": [ + + ], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2024-07-31T21:15:17Z" + } +} \ No newline at end of file