mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-05-05T20:00:39.926963+00:00
This commit is contained in:
parent
505104080b
commit
2e4e00feea
24
CVE-2024/CVE-2024-345xx/CVE-2024-34500.json
Normal file
24
CVE-2024/CVE-2024-345xx/CVE-2024-34500.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-34500",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-05T19:15:07.123",
|
||||
"lastModified": "2024-05-05T19:15:07.123",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in the UnlinkedWikibase extension in MediaWiki before 1.39.6, 1.40.x before 1.40.2, and 1.41.x before 1.41.1. XSS can occur through an interface message. Error messages (in the $err var) are not escaped before being passed to Html::rawElement() in the getError() function in the Hooks class."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/UnlinkedWikibase/+/1002175",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://phabricator.wikimedia.org/T357203",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-345xx/CVE-2024-34502.json
Normal file
24
CVE-2024/CVE-2024-345xx/CVE-2024-34502.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-34502",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-05T19:15:07.197",
|
||||
"lastModified": "2024-05-05T19:15:07.197",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in WikibaseLexeme in MediaWiki before 1.39.6, 1.40.x before 1.40.2, and 1.41.x before 1.41.1. Loading Special:MergeLexemes will (attempt to) make an edit that merges the from-id to the to-id, even if the request was not a POST request, and even if it does not contain an edit token."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/WikibaseLexeme/+/1013359",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://phabricator.wikimedia.org/T357101",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-345xx/CVE-2024-34506.json
Normal file
20
CVE-2024/CVE-2024-345xx/CVE-2024-34506.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-34506",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-05T19:15:07.253",
|
||||
"lastModified": "2024-05-05T19:15:07.253",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in includes/specials/SpecialMovePage.php in MediaWiki before 1.39.7, 1.40.x before 1.40.3, and 1.41.x before 1.41.1. If a user with the necessary rights to move the page opens Special:MovePage for a page with tens of thousands of subpages, then the page will exceed the maximum request time, leading to a denial of service."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://phabricator.wikimedia.org/T357760",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-345xx/CVE-2024-34507.json
Normal file
20
CVE-2024/CVE-2024-345xx/CVE-2024-34507.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-34507",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-05T19:15:07.307",
|
||||
"lastModified": "2024-05-05T19:15:07.307",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in includes/CommentFormatter/CommentParser.php in MediaWiki before 1.39.7, 1.40.x before 1.40.3, and 1.41.x before 1.41.1. XSS can occur because of mishandling of the 0x1b character, as demonstrated by Special:RecentChanges#%1b0000000."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://phabricator.wikimedia.org/T355538",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-45xx/CVE-2024-4500.json
Normal file
92
CVE-2024/CVE-2024-45xx/CVE-2024-4500.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-4500",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-05T18:15:27.753",
|
||||
"lastModified": "2024-05-05T18:15:27.753",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in SourceCodester Prison Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /Employee/edit-photo.php. The manipulation of the argument userImage leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-263104."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/file_upload.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.263104",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.263104",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.329639",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
17
README.md
17
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-05-05T18:00:37.728251+00:00
|
||||
2024-05-05T20:00:39.926963+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-05-05T16:15:07.790000+00:00
|
||||
2024-05-05T19:15:07.307000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,21 +33,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
248618
|
||||
248623
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `0`
|
||||
Recently added CVEs: `5`
|
||||
|
||||
- [CVE-2024-34500](CVE-2024/CVE-2024-345xx/CVE-2024-34500.json) (`2024-05-05T19:15:07.123`)
|
||||
- [CVE-2024-34502](CVE-2024/CVE-2024-345xx/CVE-2024-34502.json) (`2024-05-05T19:15:07.197`)
|
||||
- [CVE-2024-34506](CVE-2024/CVE-2024-345xx/CVE-2024-34506.json) (`2024-05-05T19:15:07.253`)
|
||||
- [CVE-2024-34507](CVE-2024/CVE-2024-345xx/CVE-2024-34507.json) (`2024-05-05T19:15:07.307`)
|
||||
- [CVE-2024-4500](CVE-2024/CVE-2024-45xx/CVE-2024-4500.json) (`2024-05-05T18:15:27.753`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `2`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
- [CVE-2024-33308](CVE-2024/CVE-2024-333xx/CVE-2024-33308.json) (`2024-05-05T16:15:07.657`)
|
||||
- [CVE-2024-33309](CVE-2024/CVE-2024-333xx/CVE-2024-33309.json) (`2024-05-05T16:15:07.790`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
@ -247864,8 +247864,8 @@ CVE-2024-33304,0,0,274a53c2e590765b7d2a360a389d7f6093c47f341a39ac6c5d8d95530f3b1
|
||||
CVE-2024-33305,0,0,441bd225b8b59bb52bb6e45ab402df0b50dc1aa209fb9ad802c0ccf8660782cc,2024-05-02T18:00:37.360000
|
||||
CVE-2024-33306,0,0,428bbc6a8b5a62ff998dea118b0c1a9bedf7e8da9bb5b3a1ca2dc047c805df5f,2024-05-02T13:27:25.103000
|
||||
CVE-2024-33307,0,0,685e6dd47a08dab94c9ba0e23fd24014f68fb2d510e871d193d497b88ce19585,2024-05-02T13:27:25.103000
|
||||
CVE-2024-33308,0,1,22f12305f9d4744edfdce27892e7c455b8acd0bacd2de333f90dddd68c558fcf,2024-05-05T16:15:07.657000
|
||||
CVE-2024-33309,0,1,ffbb0713a6cae5084ad251c8217a2960da6c49821ad50e0ff9705e66893f8703,2024-05-05T16:15:07.790000
|
||||
CVE-2024-33308,0,0,22f12305f9d4744edfdce27892e7c455b8acd0bacd2de333f90dddd68c558fcf,2024-05-05T16:15:07.657000
|
||||
CVE-2024-33309,0,0,ffbb0713a6cae5084ad251c8217a2960da6c49821ad50e0ff9705e66893f8703,2024-05-05T16:15:07.790000
|
||||
CVE-2024-3333,0,0,8caee5b26018a8a7a4f06ec5d64d35dd731cf8d2f43a25885f4e67db044a1bff,2024-04-17T12:48:07.510000
|
||||
CVE-2024-33331,0,0,d376453cc8c649ab7a3cb33fa711c6bde798d37e4f57b1f2e9caeddda1eec751,2024-04-28T23:15:07.120000
|
||||
CVE-2024-33332,0,0,5b09c1082da77b8d3e91442a2c29c8546356fbe25aeb87e6d3bdb2141a4c33bc,2024-05-01T13:02:20.750000
|
||||
@ -248192,6 +248192,10 @@ CVE-2024-34487,0,0,6dfc3b7d0ace36ecae8ca020760cfdbd59942f34bccc73b55840c2a8713d0
|
||||
CVE-2024-34488,0,0,b1f23c5509e45c2bd9e4aabf7ce16a9c4aedf5e72ad79f15b2aa755b46e07ef0,2024-05-05T03:15:07.207000
|
||||
CVE-2024-34489,0,0,0cf37a67d279584b0ad86d17ca2dda407970ab9e93e91085f27b5c3b02c22b28,2024-05-05T03:15:07.250000
|
||||
CVE-2024-34490,0,0,27e9620568057cf2edd135f7d5749d2da00c288109019cdd5ae1fb06fa94c5d4,2024-05-05T03:15:07.293000
|
||||
CVE-2024-34500,1,1,58eeeb4ceee7cd56efef9405aae967c580bdd887869944bcbb113fe48fe2060e,2024-05-05T19:15:07.123000
|
||||
CVE-2024-34502,1,1,8a176dc8d4a6b9c7fef7feca2203e30e3bc49cd72dd5eb92234bdb310cc21562,2024-05-05T19:15:07.197000
|
||||
CVE-2024-34506,1,1,be90bb03e4465dcd59e0d2c96abe5fe3b0ea571022938936caf88d3cb7267ece,2024-05-05T19:15:07.253000
|
||||
CVE-2024-34507,1,1,b5ba2ea2df1211c2666eb42c55a42e747c64c39eb3ac0738b802dd96692e1fe7,2024-05-05T19:15:07.307000
|
||||
CVE-2024-3455,0,0,18e948f1ff2182718852b2ba697f0fa9a8598811bb1c2e87509c3bd543b90a57,2024-04-11T01:26:03.233000
|
||||
CVE-2024-3456,0,0,944b33373fddc7621692e3fce6708723c7abc962139d88da65ad0c4ce610f104,2024-04-11T01:26:03.310000
|
||||
CVE-2024-3457,0,0,eda30bdfb17395ab91987b75a43f4990cc086dc3cfa77a90fc0cb388efd5e793,2024-04-11T01:26:03.387000
|
||||
@ -248617,3 +248621,4 @@ CVE-2024-4494,0,0,433523d64129d02a2b7149cafb8e75a95864081fb6f1470373bea729561d33
|
||||
CVE-2024-4495,0,0,090c905364a66d6b3afd5ea162f8d6fc1e1632995f309fe54f30ab337afebb99,2024-05-05T06:15:06.637000
|
||||
CVE-2024-4496,0,0,e1fcc45b1034f985f4823efe20fe933874806e2d2221fef290013797f50d095e,2024-05-05T06:15:08.027000
|
||||
CVE-2024-4497,0,0,ccd8c07caa7e538c008422f1f8d5b32bba85ed00504a43d05b15927b41ba1488,2024-05-05T07:15:06.463000
|
||||
CVE-2024-4500,1,1,ff5efd9f33021e890cd375fe167f7344647ce437a4cb036a2626992a1c802eda,2024-05-05T18:15:27.753000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user