mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
ebf9b46b7f
commit
dfd6959f07
@ -39,6 +39,12 @@
|
||||
"product_name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "not down converted",
|
||||
"x_cve_json_5_version_data": {
|
||||
"defaultStatus": "unaffected"
|
||||
}
|
||||
},
|
||||
{
|
||||
"version_value": "not down converted",
|
||||
"x_cve_json_5_version_data": {
|
||||
@ -60,6 +66,12 @@
|
||||
"product_name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "not down converted",
|
||||
"x_cve_json_5_version_data": {
|
||||
"defaultStatus": "unaffected"
|
||||
}
|
||||
},
|
||||
{
|
||||
"version_value": "not down converted",
|
||||
"x_cve_json_5_version_data": {
|
||||
|
@ -11,7 +11,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability was found in SourceCodester Kortex Lite Advocate Office Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /control/add_act.php. The manipulation of the argument aname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-271402 is the identifier assigned to this vulnerability."
|
||||
"value": "A vulnerability was found in SourceCodester Kortex Lite Advocate Office Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /control/add_act.php. The manipulation of the argument aname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "deu",
|
||||
@ -74,9 +74,14 @@
|
||||
"name": "https://vuldb.com/?submit.373488"
|
||||
},
|
||||
{
|
||||
"url": "https://reports-kunull.vercel.app/CVEs/2024/CVE-2024-6729",
|
||||
"url": "https://reports.kunull.net/CVEs/2024/CVE-2024-6729",
|
||||
"refsource": "MISC",
|
||||
"name": "https://reports-kunull.vercel.app/CVEs/2024/CVE-2024-6729"
|
||||
"name": "https://reports.kunull.net/CVEs/2024/CVE-2024-6729"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.sourcecodester.com/"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -84,14 +89,6 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Kunal Walavalkar"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Kunull (VulDB User)"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Kunull (VulDB User)"
|
||||
}
|
||||
],
|
||||
"impact": {
|
||||
|
@ -11,7 +11,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability classified as critical has been found in SourceCodester Student Study Center Desk Management System 1.0. This affects an unknown part of the file /Master.php?f=save_student. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-271449 was assigned to this vulnerability."
|
||||
"value": "A vulnerability classified as critical has been found in SourceCodester Student Study Center Desk Management System 1.0. This affects an unknown part of the file /Master.php?f=save_student. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "deu",
|
||||
@ -74,9 +74,14 @@
|
||||
"name": "https://vuldb.com/?submit.374362"
|
||||
},
|
||||
{
|
||||
"url": "https://reports-kunull.vercel.app/CVEs/2024/CVE-2024-6731",
|
||||
"url": "https://reports.kunull.net/CVEs/2024/CVE-2024-6731",
|
||||
"refsource": "MISC",
|
||||
"name": "https://reports-kunull.vercel.app/CVEs/2024/CVE-2024-6731"
|
||||
"name": "https://reports.kunull.net/CVEs/2024/CVE-2024-6731"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.sourcecodester.com/"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -84,14 +89,6 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Kunal Walavalkar"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Kunull (VulDB User)"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Kunull (VulDB User)"
|
||||
}
|
||||
],
|
||||
"impact": {
|
||||
|
@ -11,7 +11,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability classified as critical was found in SourceCodester Student Study Center Desk Management System 1.0. This vulnerability affects unknown code of the file /sscdms/classes/Users.php?f=save. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-271450 is the identifier assigned to this vulnerability."
|
||||
"value": "A vulnerability classified as critical was found in SourceCodester Student Study Center Desk Management System 1.0. This vulnerability affects unknown code of the file /sscdms/classes/Users.php?f=save. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "deu",
|
||||
@ -74,9 +74,14 @@
|
||||
"name": "https://vuldb.com/?submit.374370"
|
||||
},
|
||||
{
|
||||
"url": "https://reports-kunull.vercel.app/CVEs/2024/CVE-2024-6732",
|
||||
"url": "https://reports.kunull.net/CVEs/2024/CVE-2024-6732",
|
||||
"refsource": "MISC",
|
||||
"name": "https://reports-kunull.vercel.app/CVEs/2024/CVE-2024-6732"
|
||||
"name": "https://reports.kunull.net/CVEs/2024/CVE-2024-6732"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.sourcecodester.com/"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -84,14 +89,6 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Kunal Walavalkar"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Kunull (VulDB User)"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Kunull (VulDB User)"
|
||||
}
|
||||
],
|
||||
"impact": {
|
||||
|
@ -11,7 +11,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability, which was classified as critical, was found in SourceCodester Computer Laboratory Management System 1.0. Affected is an unknown function of the file /lms/classes/Master.php?f=save_record. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-271704."
|
||||
"value": "A vulnerability, which was classified as critical, was found in SourceCodester Computer Laboratory Management System 1.0. Affected is an unknown function of the file /lms/classes/Master.php?f=save_record. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "deu",
|
||||
@ -74,14 +74,19 @@
|
||||
"name": "https://vuldb.com/?submit.374797"
|
||||
},
|
||||
{
|
||||
"url": "https://reports-kunull.vercel.app/CVEs/CVE-2024-6802",
|
||||
"url": "https://reports.kunull.net/CVEs/CVE-2024-6802",
|
||||
"refsource": "MISC",
|
||||
"name": "https://reports-kunull.vercel.app/CVEs/CVE-2024-6802"
|
||||
"name": "https://reports.kunull.net/CVEs/CVE-2024-6802"
|
||||
},
|
||||
{
|
||||
"url": "https://reports-kunull.vercel.app/CVEs/2024/CVE-2024-6802",
|
||||
"url": "https://reports.kunull.net/CVEs/2024/CVE-2024-6802",
|
||||
"refsource": "MISC",
|
||||
"name": "https://reports-kunull.vercel.app/CVEs/2024/CVE-2024-6802"
|
||||
"name": "https://reports.kunull.net/CVEs/2024/CVE-2024-6802"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.sourcecodester.com/"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -89,14 +94,6 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Kunal Walavalkar"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Kunull (VulDB User)"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Kunull (VulDB User)"
|
||||
}
|
||||
],
|
||||
"impact": {
|
||||
|
@ -11,7 +11,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability was found in SourceCodester Student Study Center Desk Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /sscdms/classes/Users.php?f=save of the component HTTP POST Request Handler. The manipulation of the argument firstname/middlename/lastname/username leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-271706 is the identifier assigned to this vulnerability."
|
||||
"value": "A vulnerability was found in SourceCodester Student Study Center Desk Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /sscdms/classes/Users.php?f=save of the component HTTP POST Request Handler. The manipulation of the argument firstname/middlename/lastname/username leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "deu",
|
||||
@ -74,9 +74,14 @@
|
||||
"name": "https://vuldb.com/?submit.374853"
|
||||
},
|
||||
{
|
||||
"url": "https://reports-kunull.vercel.app/CVEs/2024/CVE-2024-6807",
|
||||
"url": "https://reports.kunull.net/CVEs/2024/CVE-2024-6807",
|
||||
"refsource": "MISC",
|
||||
"name": "https://reports-kunull.vercel.app/CVEs/2024/CVE-2024-6807"
|
||||
"name": "https://reports.kunull.net/CVEs/2024/CVE-2024-6807"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.sourcecodester.com/"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -84,14 +89,6 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Kunal Walavalkar"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Kunull (VulDB User)"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Kunull (VulDB User)"
|
||||
}
|
||||
],
|
||||
"impact": {
|
||||
|
Loading…
x
Reference in New Issue
Block a user