"-Synchronized-Data."

This commit is contained in:
CVE Team 2024-08-26 05:00:35 +00:00
parent ebf9b46b7f
commit dfd6959f07
No known key found for this signature in database
GPG Key ID: BC5FD8F2443B23B7
6 changed files with 54 additions and 57 deletions

View File

@ -39,6 +39,12 @@
"product_name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unaffected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
@ -60,6 +66,12 @@
"product_name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unaffected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "A vulnerability was found in SourceCodester Kortex Lite Advocate Office Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /control/add_act.php. The manipulation of the argument aname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-271402 is the identifier assigned to this vulnerability."
"value": "A vulnerability was found in SourceCodester Kortex Lite Advocate Office Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /control/add_act.php. The manipulation of the argument aname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "deu",
@ -74,9 +74,14 @@
"name": "https://vuldb.com/?submit.373488"
},
{
"url": "https://reports-kunull.vercel.app/CVEs/2024/CVE-2024-6729",
"url": "https://reports.kunull.net/CVEs/2024/CVE-2024-6729",
"refsource": "MISC",
"name": "https://reports-kunull.vercel.app/CVEs/2024/CVE-2024-6729"
"name": "https://reports.kunull.net/CVEs/2024/CVE-2024-6729"
},
{
"url": "https://www.sourcecodester.com/",
"refsource": "MISC",
"name": "https://www.sourcecodester.com/"
}
]
},
@ -84,14 +89,6 @@
{
"lang": "en",
"value": "Kunal Walavalkar"
},
{
"lang": "en",
"value": "Kunull (VulDB User)"
},
{
"lang": "en",
"value": "Kunull (VulDB User)"
}
],
"impact": {

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "A vulnerability classified as critical has been found in SourceCodester Student Study Center Desk Management System 1.0. This affects an unknown part of the file /Master.php?f=save_student. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-271449 was assigned to this vulnerability."
"value": "A vulnerability classified as critical has been found in SourceCodester Student Study Center Desk Management System 1.0. This affects an unknown part of the file /Master.php?f=save_student. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "deu",
@ -74,9 +74,14 @@
"name": "https://vuldb.com/?submit.374362"
},
{
"url": "https://reports-kunull.vercel.app/CVEs/2024/CVE-2024-6731",
"url": "https://reports.kunull.net/CVEs/2024/CVE-2024-6731",
"refsource": "MISC",
"name": "https://reports-kunull.vercel.app/CVEs/2024/CVE-2024-6731"
"name": "https://reports.kunull.net/CVEs/2024/CVE-2024-6731"
},
{
"url": "https://www.sourcecodester.com/",
"refsource": "MISC",
"name": "https://www.sourcecodester.com/"
}
]
},
@ -84,14 +89,6 @@
{
"lang": "en",
"value": "Kunal Walavalkar"
},
{
"lang": "en",
"value": "Kunull (VulDB User)"
},
{
"lang": "en",
"value": "Kunull (VulDB User)"
}
],
"impact": {

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "A vulnerability classified as critical was found in SourceCodester Student Study Center Desk Management System 1.0. This vulnerability affects unknown code of the file /sscdms/classes/Users.php?f=save. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-271450 is the identifier assigned to this vulnerability."
"value": "A vulnerability classified as critical was found in SourceCodester Student Study Center Desk Management System 1.0. This vulnerability affects unknown code of the file /sscdms/classes/Users.php?f=save. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "deu",
@ -74,9 +74,14 @@
"name": "https://vuldb.com/?submit.374370"
},
{
"url": "https://reports-kunull.vercel.app/CVEs/2024/CVE-2024-6732",
"url": "https://reports.kunull.net/CVEs/2024/CVE-2024-6732",
"refsource": "MISC",
"name": "https://reports-kunull.vercel.app/CVEs/2024/CVE-2024-6732"
"name": "https://reports.kunull.net/CVEs/2024/CVE-2024-6732"
},
{
"url": "https://www.sourcecodester.com/",
"refsource": "MISC",
"name": "https://www.sourcecodester.com/"
}
]
},
@ -84,14 +89,6 @@
{
"lang": "en",
"value": "Kunal Walavalkar"
},
{
"lang": "en",
"value": "Kunull (VulDB User)"
},
{
"lang": "en",
"value": "Kunull (VulDB User)"
}
],
"impact": {

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "A vulnerability, which was classified as critical, was found in SourceCodester Computer Laboratory Management System 1.0. Affected is an unknown function of the file /lms/classes/Master.php?f=save_record. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-271704."
"value": "A vulnerability, which was classified as critical, was found in SourceCodester Computer Laboratory Management System 1.0. Affected is an unknown function of the file /lms/classes/Master.php?f=save_record. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "deu",
@ -74,14 +74,19 @@
"name": "https://vuldb.com/?submit.374797"
},
{
"url": "https://reports-kunull.vercel.app/CVEs/CVE-2024-6802",
"url": "https://reports.kunull.net/CVEs/CVE-2024-6802",
"refsource": "MISC",
"name": "https://reports-kunull.vercel.app/CVEs/CVE-2024-6802"
"name": "https://reports.kunull.net/CVEs/CVE-2024-6802"
},
{
"url": "https://reports-kunull.vercel.app/CVEs/2024/CVE-2024-6802",
"url": "https://reports.kunull.net/CVEs/2024/CVE-2024-6802",
"refsource": "MISC",
"name": "https://reports-kunull.vercel.app/CVEs/2024/CVE-2024-6802"
"name": "https://reports.kunull.net/CVEs/2024/CVE-2024-6802"
},
{
"url": "https://www.sourcecodester.com/",
"refsource": "MISC",
"name": "https://www.sourcecodester.com/"
}
]
},
@ -89,14 +94,6 @@
{
"lang": "en",
"value": "Kunal Walavalkar"
},
{
"lang": "en",
"value": "Kunull (VulDB User)"
},
{
"lang": "en",
"value": "Kunull (VulDB User)"
}
],
"impact": {

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "A vulnerability was found in SourceCodester Student Study Center Desk Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /sscdms/classes/Users.php?f=save of the component HTTP POST Request Handler. The manipulation of the argument firstname/middlename/lastname/username leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-271706 is the identifier assigned to this vulnerability."
"value": "A vulnerability was found in SourceCodester Student Study Center Desk Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /sscdms/classes/Users.php?f=save of the component HTTP POST Request Handler. The manipulation of the argument firstname/middlename/lastname/username leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "deu",
@ -74,9 +74,14 @@
"name": "https://vuldb.com/?submit.374853"
},
{
"url": "https://reports-kunull.vercel.app/CVEs/2024/CVE-2024-6807",
"url": "https://reports.kunull.net/CVEs/2024/CVE-2024-6807",
"refsource": "MISC",
"name": "https://reports-kunull.vercel.app/CVEs/2024/CVE-2024-6807"
"name": "https://reports.kunull.net/CVEs/2024/CVE-2024-6807"
},
{
"url": "https://www.sourcecodester.com/",
"refsource": "MISC",
"name": "https://www.sourcecodester.com/"
}
]
},
@ -84,14 +89,6 @@
{
"lang": "en",
"value": "Kunal Walavalkar"
},
{
"lang": "en",
"value": "Kunull (VulDB User)"
},
{
"lang": "en",
"value": "Kunull (VulDB User)"
}
],
"impact": {