Auto-Update: 2024-05-05T22:00:37.741998+00:00

This commit is contained in:
cad-safe-bot 2024-05-05 22:03:29 +00:00
parent 2e4e00feea
commit 5801a619dc
8 changed files with 283 additions and 14 deletions

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-34508",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-05T20:15:07.310",
"lastModified": "2024-05-05T20:15:07.310",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "dcmnet in DCMTK before 3.6.9 has a segmentation fault via an invalid DIMSE message."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/DCMTK/dcmtk/commit/c78e434c0c5f9d932874f0b17a8b4ce305ca01f5",
"source": "cve@mitre.org"
},
{
"url": "https://support.dcmtk.org/redmine/issues/1114",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-34509",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-05T20:15:07.367",
"lastModified": "2024-05-05T20:15:07.367",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "dcmdata in DCMTK before 3.6.9 has a segmentation fault via an invalid DIMSE message."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/DCMTK/dcmtk/commit/c78e434c0c5f9d932874f0b17a8b4ce305ca01f5",
"source": "cve@mitre.org"
},
{
"url": "https://support.dcmtk.org/redmine/issues/1114",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-34510",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-05T20:15:07.417",
"lastModified": "2024-05-05T20:15:07.417",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Gradio before 4.20 allows credential leakage on Windows."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://github.com/gradio-app/gradio/",
"source": "cve@mitre.org"
},
{
"url": "https://www.gradio.app/changelog#4-20-0",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-34511",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-05T20:15:07.627",
"lastModified": "2024-05-05T20:15:07.627",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Component Server in Gradio before 4.13 does not properly consider _is_server_fn for functions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 4.2
}
]
},
"references": [
{
"url": "https://github.com/gradio-app/gradio/",
"source": "cve@mitre.org"
},
{
"url": "https://www.gradio.app/changelog#4-13-0",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2024-34515",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-05T21:15:55.650",
"lastModified": "2024-05-05T21:15:55.650",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "image-optimizer before 1.7.3 allows PHAR deserialization, e.g., the phar:// protocol in arguments to file_exists()."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/spatie/image-optimizer/compare/1.7.2...1.7.3",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/spatie/image-optimizer/issues/210",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/spatie/image-optimizer/pull/211",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-4501",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-05T20:15:07.923",
"lastModified": "2024-05-05T20:15:07.923",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Ruijie RG-UAC up to 20240428. It has been rated as critical. This issue affects some unknown processing of the file /view/bugSolve/captureData/commit.php. The manipulation of the argument tcpDump leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263105 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.4,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/h0e4a0r1t/-2x3J-1rPc-1-0-/blob/main/Ruijie%20RG-UAC%20Unified%20Internet%20Behavior%20Management%20Audit%20System%20Backend%20RCE%20Vulnerability-view_bugSolve_captureData_commit.php.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.263105",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.263105",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.323810",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-05-05T20:00:39.926963+00:00
2024-05-05T22:00:37.741998+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-05-05T19:15:07.307000+00:00
2024-05-05T21:15:55.650000+00:00
```
### Last Data Feed Release
@ -33,18 +33,19 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
248623
248629
```
### CVEs added in the last Commit
Recently added CVEs: `5`
Recently added CVEs: `6`
- [CVE-2024-34500](CVE-2024/CVE-2024-345xx/CVE-2024-34500.json) (`2024-05-05T19:15:07.123`)
- [CVE-2024-34502](CVE-2024/CVE-2024-345xx/CVE-2024-34502.json) (`2024-05-05T19:15:07.197`)
- [CVE-2024-34506](CVE-2024/CVE-2024-345xx/CVE-2024-34506.json) (`2024-05-05T19:15:07.253`)
- [CVE-2024-34507](CVE-2024/CVE-2024-345xx/CVE-2024-34507.json) (`2024-05-05T19:15:07.307`)
- [CVE-2024-4500](CVE-2024/CVE-2024-45xx/CVE-2024-4500.json) (`2024-05-05T18:15:27.753`)
- [CVE-2024-34508](CVE-2024/CVE-2024-345xx/CVE-2024-34508.json) (`2024-05-05T20:15:07.310`)
- [CVE-2024-34509](CVE-2024/CVE-2024-345xx/CVE-2024-34509.json) (`2024-05-05T20:15:07.367`)
- [CVE-2024-34510](CVE-2024/CVE-2024-345xx/CVE-2024-34510.json) (`2024-05-05T20:15:07.417`)
- [CVE-2024-34511](CVE-2024/CVE-2024-345xx/CVE-2024-34511.json) (`2024-05-05T20:15:07.627`)
- [CVE-2024-34515](CVE-2024/CVE-2024-345xx/CVE-2024-34515.json) (`2024-05-05T21:15:55.650`)
- [CVE-2024-4501](CVE-2024/CVE-2024-45xx/CVE-2024-4501.json) (`2024-05-05T20:15:07.923`)
### CVEs modified in the last Commit

View File

@ -248192,10 +248192,15 @@ CVE-2024-34487,0,0,6dfc3b7d0ace36ecae8ca020760cfdbd59942f34bccc73b55840c2a8713d0
CVE-2024-34488,0,0,b1f23c5509e45c2bd9e4aabf7ce16a9c4aedf5e72ad79f15b2aa755b46e07ef0,2024-05-05T03:15:07.207000
CVE-2024-34489,0,0,0cf37a67d279584b0ad86d17ca2dda407970ab9e93e91085f27b5c3b02c22b28,2024-05-05T03:15:07.250000
CVE-2024-34490,0,0,27e9620568057cf2edd135f7d5749d2da00c288109019cdd5ae1fb06fa94c5d4,2024-05-05T03:15:07.293000
CVE-2024-34500,1,1,58eeeb4ceee7cd56efef9405aae967c580bdd887869944bcbb113fe48fe2060e,2024-05-05T19:15:07.123000
CVE-2024-34502,1,1,8a176dc8d4a6b9c7fef7feca2203e30e3bc49cd72dd5eb92234bdb310cc21562,2024-05-05T19:15:07.197000
CVE-2024-34506,1,1,be90bb03e4465dcd59e0d2c96abe5fe3b0ea571022938936caf88d3cb7267ece,2024-05-05T19:15:07.253000
CVE-2024-34507,1,1,b5ba2ea2df1211c2666eb42c55a42e747c64c39eb3ac0738b802dd96692e1fe7,2024-05-05T19:15:07.307000
CVE-2024-34500,0,0,58eeeb4ceee7cd56efef9405aae967c580bdd887869944bcbb113fe48fe2060e,2024-05-05T19:15:07.123000
CVE-2024-34502,0,0,8a176dc8d4a6b9c7fef7feca2203e30e3bc49cd72dd5eb92234bdb310cc21562,2024-05-05T19:15:07.197000
CVE-2024-34506,0,0,be90bb03e4465dcd59e0d2c96abe5fe3b0ea571022938936caf88d3cb7267ece,2024-05-05T19:15:07.253000
CVE-2024-34507,0,0,b5ba2ea2df1211c2666eb42c55a42e747c64c39eb3ac0738b802dd96692e1fe7,2024-05-05T19:15:07.307000
CVE-2024-34508,1,1,99ea82e896ebc25f60992ed5579c210ed81d3d42ca7acefe04b381fbf52f6c3a,2024-05-05T20:15:07.310000
CVE-2024-34509,1,1,6bf2150b2596626c514845d30540487bb1d950ccdf706219c76a6afbc5cfda72,2024-05-05T20:15:07.367000
CVE-2024-34510,1,1,70c105ba345d0fa8609a9db9459099b788908b71b0b900afc0747ce8d55f49a3,2024-05-05T20:15:07.417000
CVE-2024-34511,1,1,4e86e2a278a7abc19602c23a8e6582af1482bd970eb4f4e0c89a29dca169ee47,2024-05-05T20:15:07.627000
CVE-2024-34515,1,1,3c778723bf571e048a4b56610d5bfcf3e49a1dece61fe69668baa7b58396004a,2024-05-05T21:15:55.650000
CVE-2024-3455,0,0,18e948f1ff2182718852b2ba697f0fa9a8598811bb1c2e87509c3bd543b90a57,2024-04-11T01:26:03.233000
CVE-2024-3456,0,0,944b33373fddc7621692e3fce6708723c7abc962139d88da65ad0c4ce610f104,2024-04-11T01:26:03.310000
CVE-2024-3457,0,0,eda30bdfb17395ab91987b75a43f4990cc086dc3cfa77a90fc0cb388efd5e793,2024-04-11T01:26:03.387000
@ -248621,4 +248626,5 @@ CVE-2024-4494,0,0,433523d64129d02a2b7149cafb8e75a95864081fb6f1470373bea729561d33
CVE-2024-4495,0,0,090c905364a66d6b3afd5ea162f8d6fc1e1632995f309fe54f30ab337afebb99,2024-05-05T06:15:06.637000
CVE-2024-4496,0,0,e1fcc45b1034f985f4823efe20fe933874806e2d2221fef290013797f50d095e,2024-05-05T06:15:08.027000
CVE-2024-4497,0,0,ccd8c07caa7e538c008422f1f8d5b32bba85ed00504a43d05b15927b41ba1488,2024-05-05T07:15:06.463000
CVE-2024-4500,1,1,ff5efd9f33021e890cd375fe167f7344647ce437a4cb036a2626992a1c802eda,2024-05-05T18:15:27.753000
CVE-2024-4500,0,0,ff5efd9f33021e890cd375fe167f7344647ce437a4cb036a2626992a1c802eda,2024-05-05T18:15:27.753000
CVE-2024-4501,1,1,7d84c8624ffa9e467ffa6080915f7901ab1d1e830d9f877fb7181460457121f5,2024-05-05T20:15:07.923000

Can't render this file because it is too large.