mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2024-02-16T03:00:25.249802+00:00
This commit is contained in:
parent
912aa53b80
commit
5f1ca0790d
@ -2,8 +2,12 @@
|
||||
"id": "CVE-2020-3259",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2020-05-06T17:15:12.777",
|
||||
"lastModified": "2023-08-16T16:17:07.960",
|
||||
"lastModified": "2024-02-16T02:00:03.227",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cisaExploitAdd": "2024-02-15",
|
||||
"cisaActionDue": "2024-03-07",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Cisco ASA and FTD Information Disclosure Vulnerability",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
28
CVE-2023/CVE-2023-400xx/CVE-2023-40093.json
Normal file
28
CVE-2023/CVE-2023-400xx/CVE-2023-40093.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2023-40093",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-02-16T02:15:49.963",
|
||||
"lastModified": "2024-02-16T02:15:49.963",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In multiple files, there is a possible way that trimmed content could be included in PDF output due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/cts/+/a952c93009cc81c41a086d73a4030a83b7683a04",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/external/pdfium/+/03925281cf25fec70318bf2225356d022b12b566",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-02-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-401xx/CVE-2023-40122.json
Normal file
24
CVE-2023/CVE-2023-401xx/CVE-2023-40122.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-40122",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-02-16T02:15:50.513",
|
||||
"lastModified": "2024-02-16T02:15:50.513",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In applyCustomDescription of SaveUi.java, there is a possible way to view other user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/55fc00a0788ea0995fe0851616b9ac21710a2931",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-02-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-00xx/CVE-2024-0014.json
Normal file
20
CVE-2024/CVE-2024-00xx/CVE-2024-0014.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-0014",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-02-16T02:15:50.580",
|
||||
"lastModified": "2024-02-16T02:15:50.580",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In startInstall of UpdateFetcher.java, there is a possible way to trigger a malicious config update due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-02-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-00xx/CVE-2024-0029.json
Normal file
24
CVE-2024/CVE-2024-00xx/CVE-2024-0029.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-0029",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-02-16T02:15:50.633",
|
||||
"lastModified": "2024-02-16T02:15:50.633",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In multiple files, there is a possible way to capture the device screen when disallowed by device policy due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/9b10fd9718f4e6f6843adbfc14e46a93aab93aad",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-02-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-00xx/CVE-2024-0030.json
Normal file
24
CVE-2024/CVE-2024-00xx/CVE-2024-0030.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-0030",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-02-16T02:15:50.710",
|
||||
"lastModified": "2024-02-16T02:15:50.710",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In btif_to_bta_response of btif_gatt_util.cc, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/57b823f4f758e2ef530909da07552b5aa80c6a7d",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-02-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-00xx/CVE-2024-0031.json
Normal file
24
CVE-2024/CVE-2024-00xx/CVE-2024-0031.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-0031",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-02-16T02:15:50.763",
|
||||
"lastModified": "2024-02-16T02:15:50.763",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In attp_build_read_by_type_value_cmd of att_protocol.cc , there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/de53890aaca2ae08b3ee2d6e3fd25f702fdfa661",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-02-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2024/CVE-2024-00xx/CVE-2024-0032.json
Normal file
28
CVE-2024/CVE-2024-00xx/CVE-2024-0032.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2024-0032",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-02-16T02:15:50.823",
|
||||
"lastModified": "2024-02-16T02:15:50.823",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In queryChildDocuments of FileSystemProvider.java, there is a possible way to request access to directories that should be hidden due to improper input validation. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/4af5db76f25348849252e0b8a08f4a517ef842b7",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/packages/providers/DownloadProvider/+/5acd646e0cf63e2c9c0862da7e03531ef0074394",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-02-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2024/CVE-2024-00xx/CVE-2024-0033.json
Normal file
28
CVE-2024/CVE-2024-00xx/CVE-2024-0033.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2024-0033",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-02-16T02:15:50.877",
|
||||
"lastModified": "2024-02-16T02:15:50.877",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In multiple functions of ashmem-dev.cpp, there is a possible missing seal due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/native/+/aa98edf0ce9dde4886979658a459900ca987f193",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/system/core/+/46d46dc46446f14f26fbe8fb102dd36c1dfc1229",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-02-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-00xx/CVE-2024-0034.json
Normal file
24
CVE-2024/CVE-2024-00xx/CVE-2024-0034.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-0034",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-02-16T02:15:50.933",
|
||||
"lastModified": "2024-02-16T02:15:50.933",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In BackgroundLaunchProcessController, there is a possible way to launch arbitrary activity from the background due to BAL Bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/653f7b0d234693309dc86161af01831b64033fe6",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-02-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-00xx/CVE-2024-0035.json
Normal file
24
CVE-2024/CVE-2024-00xx/CVE-2024-0035.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-0035",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-02-16T02:15:50.980",
|
||||
"lastModified": "2024-02-16T02:15:50.980",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In onNullBinding of TileLifecycleManager.java, there is a possible way to launch an activity from the background due to a missing null check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/7b7fff1eb5014d12200a32ff9047da396c7ab6a4",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-02-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-00xx/CVE-2024-0036.json
Normal file
24
CVE-2024/CVE-2024-00xx/CVE-2024-0036.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-0036",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-02-16T02:15:51.047",
|
||||
"lastModified": "2024-02-16T02:15:51.047",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In startNextMatchingActivity of ActivityTaskManagerService.java, there is a possible way to bypass the restrictions on starting activities from the background due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/3eaaa9687e90c65f51762deb343f18bef95d4e8e",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-02-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-00xx/CVE-2024-0037.json
Normal file
24
CVE-2024/CVE-2024-00xx/CVE-2024-0037.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-0037",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-02-16T02:15:51.097",
|
||||
"lastModified": "2024-02-16T02:15:51.097",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In applyCustomDescription of SaveUi.java, there is a possible way to view images belonging to a different user due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/55fc00a0788ea0995fe0851616b9ac21710a2931",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-02-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-00xx/CVE-2024-0038.json
Normal file
24
CVE-2024/CVE-2024-00xx/CVE-2024-0038.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-0038",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-02-16T02:15:51.157",
|
||||
"lastModified": "2024-02-16T02:15:51.157",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In injectInputEventToInputFilter of AccessibilityManagerService.java, there is a possible arbitrary input event injection due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/3e88d987235f5a2acd50a9b6bad78dbbf39cb079",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-02-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-00xx/CVE-2024-0040.json
Normal file
24
CVE-2024/CVE-2024-00xx/CVE-2024-0040.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-0040",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-02-16T02:15:51.203",
|
||||
"lastModified": "2024-02-16T02:15:51.203",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In setParameter of MtpPacket.cpp, there is a possible out of bounds read due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/av/+/2ca6c27dc0336fd98f47cfb96dc514efa98e8864",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-02-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-00xx/CVE-2024-0041.json
Normal file
24
CVE-2024/CVE-2024-00xx/CVE-2024-0041.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-0041",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-02-16T02:15:51.253",
|
||||
"lastModified": "2024-02-16T02:15:51.253",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In removePersistentDot of SystemStatusAnimationSchedulerImpl.kt, there is a possible race condition due to a logic error in the code. This could lead to local escalation of privilege that fails to remove the persistent dot with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/d6f7188773409c8f5ad5fc7d3eea5b1751439e26",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-02-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,20 @@
|
||||
"id": "CVE-2024-21410",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-02-13T18:15:59.680",
|
||||
"lastModified": "2024-02-13T18:22:43.577",
|
||||
"lastModified": "2024-02-16T02:00:03.233",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cisaExploitAdd": "2024-02-15",
|
||||
"cisaActionDue": "2024-03-07",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Microsoft Exchange Server Privilege Escalation Vulnerability",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Exchange Server Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de elevaci\u00f3n de privilegios de Microsoft Exchange Server"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
24
CVE-2024/CVE-2024-254xx/CVE-2024-25413.json
Normal file
24
CVE-2024/CVE-2024-254xx/CVE-2024-25413.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-25413",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-16T02:15:51.307",
|
||||
"lastModified": "2024-02-16T02:15:51.307",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A XSLT Server Side injection vulnerability in the Import Jobs function of FireBear Improved Import And Export v3.8.6 allows attackers to execute arbitrary commands via a crafted XSLT file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/capture0x/Magento-ver.-2.4.6",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://packetstormsecurity.com/files/175801/FireBear-Improved-Import-And-Export-3.8.6-XSLT-Server-Side-Injection.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-254xx/CVE-2024-25414.json
Normal file
24
CVE-2024/CVE-2024-254xx/CVE-2024-25414.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-25414",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-16T02:15:51.363",
|
||||
"lastModified": "2024-02-16T02:15:51.363",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An arbitrary file upload vulnerability in /admin/upgrade of CSZ CMS v1.3.0 allows attackers to execute arbitrary code via uploading a crafted Zip file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/capture0x/CSZ_CMS",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://packetstormsecurity.com/files/175889/CSZ-CMS-1.3.0-Shell-Upload.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2024/CVE-2024-254xx/CVE-2024-25415.json
Normal file
28
CVE-2024/CVE-2024-254xx/CVE-2024-25415.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2024-25415",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-16T02:15:51.443",
|
||||
"lastModified": "2024-02-16T02:15:51.443",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A remote code execution (RCE) vulnerability in /admin/define_language.php of CE Phoenix v1.0.8.20 allows attackers to execute arbitrary PHP code via injecting a crafted payload into the file english.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/capture0x/Phoenix",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://packetstormsecurity.com/files/175913/CE-Phoenix-1.0.8.20-Remote-Command-Execution.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://vulners.com/zdt/1337DAY-ID-39172",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
47
README.md
47
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-02-16T00:55:24.853976+00:00
|
||||
2024-02-16T03:00:25.249802+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-02-16T00:15:47.360000+00:00
|
||||
2024-02-16T02:15:51.443000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -23,40 +23,45 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2024-02-15T01:00:28.246777+00:00
|
||||
2024-02-16T01:00:28.248035+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
238716
|
||||
238734
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `14`
|
||||
Recently added CVEs: `18`
|
||||
|
||||
* [CVE-2023-40100](CVE-2023/CVE-2023-401xx/CVE-2023-40100.json) (`2024-02-15T23:15:07.743`)
|
||||
* [CVE-2023-40104](CVE-2023/CVE-2023-401xx/CVE-2023-40104.json) (`2024-02-15T23:15:08.017`)
|
||||
* [CVE-2023-40105](CVE-2023/CVE-2023-401xx/CVE-2023-40105.json) (`2024-02-15T23:15:08.083`)
|
||||
* [CVE-2023-40106](CVE-2023/CVE-2023-401xx/CVE-2023-40106.json) (`2024-02-15T23:15:08.137`)
|
||||
* [CVE-2023-40107](CVE-2023/CVE-2023-401xx/CVE-2023-40107.json) (`2024-02-15T23:15:08.197`)
|
||||
* [CVE-2023-40109](CVE-2023/CVE-2023-401xx/CVE-2023-40109.json) (`2024-02-15T23:15:08.260`)
|
||||
* [CVE-2023-40110](CVE-2023/CVE-2023-401xx/CVE-2023-40110.json) (`2024-02-15T23:15:08.420`)
|
||||
* [CVE-2023-40111](CVE-2023/CVE-2023-401xx/CVE-2023-40111.json) (`2024-02-15T23:15:08.487`)
|
||||
* [CVE-2023-40112](CVE-2023/CVE-2023-401xx/CVE-2023-40112.json) (`2024-02-15T23:15:08.543`)
|
||||
* [CVE-2023-40113](CVE-2023/CVE-2023-401xx/CVE-2023-40113.json) (`2024-02-15T23:15:08.597`)
|
||||
* [CVE-2023-40114](CVE-2023/CVE-2023-401xx/CVE-2023-40114.json) (`2024-02-15T23:15:08.647`)
|
||||
* [CVE-2023-40115](CVE-2023/CVE-2023-401xx/CVE-2023-40115.json) (`2024-02-15T23:15:08.693`)
|
||||
* [CVE-2023-40124](CVE-2023/CVE-2023-401xx/CVE-2023-40124.json) (`2024-02-15T23:15:08.743`)
|
||||
* [CVE-2024-23674](CVE-2024/CVE-2024-236xx/CVE-2024-23674.json) (`2024-02-15T23:15:08.827`)
|
||||
* [CVE-2023-40093](CVE-2023/CVE-2023-400xx/CVE-2023-40093.json) (`2024-02-16T02:15:49.963`)
|
||||
* [CVE-2023-40122](CVE-2023/CVE-2023-401xx/CVE-2023-40122.json) (`2024-02-16T02:15:50.513`)
|
||||
* [CVE-2024-0014](CVE-2024/CVE-2024-00xx/CVE-2024-0014.json) (`2024-02-16T02:15:50.580`)
|
||||
* [CVE-2024-0029](CVE-2024/CVE-2024-00xx/CVE-2024-0029.json) (`2024-02-16T02:15:50.633`)
|
||||
* [CVE-2024-0030](CVE-2024/CVE-2024-00xx/CVE-2024-0030.json) (`2024-02-16T02:15:50.710`)
|
||||
* [CVE-2024-0031](CVE-2024/CVE-2024-00xx/CVE-2024-0031.json) (`2024-02-16T02:15:50.763`)
|
||||
* [CVE-2024-0032](CVE-2024/CVE-2024-00xx/CVE-2024-0032.json) (`2024-02-16T02:15:50.823`)
|
||||
* [CVE-2024-0033](CVE-2024/CVE-2024-00xx/CVE-2024-0033.json) (`2024-02-16T02:15:50.877`)
|
||||
* [CVE-2024-0034](CVE-2024/CVE-2024-00xx/CVE-2024-0034.json) (`2024-02-16T02:15:50.933`)
|
||||
* [CVE-2024-0035](CVE-2024/CVE-2024-00xx/CVE-2024-0035.json) (`2024-02-16T02:15:50.980`)
|
||||
* [CVE-2024-0036](CVE-2024/CVE-2024-00xx/CVE-2024-0036.json) (`2024-02-16T02:15:51.047`)
|
||||
* [CVE-2024-0037](CVE-2024/CVE-2024-00xx/CVE-2024-0037.json) (`2024-02-16T02:15:51.097`)
|
||||
* [CVE-2024-0038](CVE-2024/CVE-2024-00xx/CVE-2024-0038.json) (`2024-02-16T02:15:51.157`)
|
||||
* [CVE-2024-0040](CVE-2024/CVE-2024-00xx/CVE-2024-0040.json) (`2024-02-16T02:15:51.203`)
|
||||
* [CVE-2024-0041](CVE-2024/CVE-2024-00xx/CVE-2024-0041.json) (`2024-02-16T02:15:51.253`)
|
||||
* [CVE-2024-25413](CVE-2024/CVE-2024-254xx/CVE-2024-25413.json) (`2024-02-16T02:15:51.307`)
|
||||
* [CVE-2024-25414](CVE-2024/CVE-2024-254xx/CVE-2024-25414.json) (`2024-02-16T02:15:51.363`)
|
||||
* [CVE-2024-25415](CVE-2024/CVE-2024-254xx/CVE-2024-25415.json) (`2024-02-16T02:15:51.443`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `2`
|
||||
|
||||
* [CVE-2022-41299](CVE-2022/CVE-2022-412xx/CVE-2022-41299.json) (`2024-02-16T00:15:47.360`)
|
||||
* [CVE-2020-3259](CVE-2020/CVE-2020-32xx/CVE-2020-3259.json) (`2024-02-16T02:00:03.227`)
|
||||
* [CVE-2024-21410](CVE-2024/CVE-2024-214xx/CVE-2024-21410.json) (`2024-02-16T02:00:03.233`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user