diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34467.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34467.json new file mode 100644 index 00000000000..694f0a5b768 --- /dev/null +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34467.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-34467", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-04T20:15:07.527", + "lastModified": "2024-05-04T20:15:07.527", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "ThinkPHP 8.0.3 allows remote attackers to discover the PHPSESSION cookie because think_exception.tpl (aka the debug error output source code) provides this in an error message for a crafted URI in a GET request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/top-think/framework/issues/2996", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34468.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34468.json new file mode 100644 index 00000000000..5ae2dcb25e1 --- /dev/null +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34468.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-34468", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-04T20:15:07.590", + "lastModified": "2024-05-04T20:15:07.590", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Rukovoditel before 3.5.3 allows XSS via user_photo to My Page." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://forum.rukovoditel.net/viewtopic.php?t=5071", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34469.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34469.json new file mode 100644 index 00000000000..7687b557f89 --- /dev/null +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34469.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-34469", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-04T20:15:07.640", + "lastModified": "2024-05-04T20:15:07.640", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Rukovoditel before 3.5.3 allows XSS via user_photo to index.php?module=users/registration&action=save." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://forum.rukovoditel.net/viewtopic.php?t=5071", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 1facc76f7ad..b8039a3790c 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-05-04T20:00:37.292586+00:00 +2024-05-04T22:00:37.927991+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-05-04T19:15:46.510000+00:00 +2024-05-04T20:15:07.640000+00:00 ``` ### Last Data Feed Release @@ -33,14 +33,16 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -248595 +248598 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `3` -- [CVE-2024-34462](CVE-2024/CVE-2024-344xx/CVE-2024-34462.json) (`2024-05-04T19:15:46.510`) +- [CVE-2024-34467](CVE-2024/CVE-2024-344xx/CVE-2024-34467.json) (`2024-05-04T20:15:07.527`) +- [CVE-2024-34468](CVE-2024/CVE-2024-344xx/CVE-2024-34468.json) (`2024-05-04T20:15:07.590`) +- [CVE-2024-34469](CVE-2024/CVE-2024-344xx/CVE-2024-34469.json) (`2024-05-04T20:15:07.640`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index 07895402496..dcafd864dfa 100644 --- a/_state.csv +++ b/_state.csv @@ -248174,7 +248174,10 @@ CVE-2024-34455,0,0,1d2aa3de083f43cd70ae96f0d7b0627d4e6a4c2b20f0d2da6ad87efb50de0 CVE-2024-3446,0,0,d41b6ff09ba21a5a975268b5a0441447c6b2bcfd6bedfe0914b9c96867cd290f,2024-04-18T08:15:38.340000 CVE-2024-34460,0,0,f55c45997cadc3bb62864286d65492b162b99f8e24b8566151735b6e6a70cd2a,2024-05-04T05:15:06.497000 CVE-2024-34461,0,0,a0ee1d1552fd6ae841473d1f66c127474e4be19544b272b8a13d4a1183e5c33b,2024-05-04T05:15:06.600000 -CVE-2024-34462,1,1,5ecd6a63ea79b677cba4075a24cd52b4dc449cea521188ad923b5338fcf81b6d,2024-05-04T19:15:46.510000 +CVE-2024-34462,0,0,5ecd6a63ea79b677cba4075a24cd52b4dc449cea521188ad923b5338fcf81b6d,2024-05-04T19:15:46.510000 +CVE-2024-34467,1,1,4683262053fdc353b9c61c94397953dc4ba3b3042121b7cfcbc76242c771de4a,2024-05-04T20:15:07.527000 +CVE-2024-34468,1,1,ef4414c529dd81feefb12dbabb422a2d4e32a68b1400d7b92f867fa069e893a6,2024-05-04T20:15:07.590000 +CVE-2024-34469,1,1,d70828a858d264407f975e33254424260533034cc1a1dc20efaf62c770a283c1,2024-05-04T20:15:07.640000 CVE-2024-3448,0,0,38511310080ef6cbfb33c1721e41ad41c6df0877e6ffcdbf14f478fa1ea7a673,2024-04-10T19:49:51.183000 CVE-2024-3455,0,0,18e948f1ff2182718852b2ba697f0fa9a8598811bb1c2e87509c3bd543b90a57,2024-04-11T01:26:03.233000 CVE-2024-3456,0,0,944b33373fddc7621692e3fce6708723c7abc962139d88da65ad0c4ce610f104,2024-04-11T01:26:03.310000