Auto-Update: 2024-04-05T08:00:42.996477+00:00

This commit is contained in:
cad-safe-bot 2024-04-05 08:03:32 +00:00
parent 0d2849287b
commit 73ee117432
8 changed files with 184 additions and 13 deletions

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-52235",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-05T06:15:10.060",
"lastModified": "2024-04-05T06:15:10.060",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SpaceX Starlink Wi-Fi router GEN 2 before 2023.53.0 and Starlink Dish before 07dd2798-ff15-4722-a9ee-de28928aed34 allow CSRF (e.g., for a reboot) via a DNS Rebinding attack."
}
],
"metrics": {},
"references": [
{
"url": "https://bugcrowd.com/disclosures/f529009b-90eb-4bf9-957d-6fe7ea890fa2/starlink-dishy-is-vulnerable-to-csrf-via-dns-rebinding",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2024-22363",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-05T06:15:10.200",
"lastModified": "2024-04-05T06:15:10.200",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SheetJS Community Edition before 0.20.2 is vulnerable.to Regular Expression Denial of Service (ReDoS)."
}
],
"metrics": {},
"references": [
{
"url": "https://cdn.sheetjs.com/advisories/CVE-2024-22363",
"source": "cve@mitre.org"
},
{
"url": "https://cwe.mitre.org/data/definitions/1333.html",
"source": "cve@mitre.org"
},
{
"url": "https://git.sheetjs.com/sheetjs/sheetjs/src/tag/v0.20.2",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-26329",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-05T07:15:10.970",
"lastModified": "2024-04-05T07:15:10.970",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Chilkat before v9.5.0.98, allows attackers to obtain sensitive information via predictable PRNG in ChilkatRand::randomBytes function."
}
],
"metrics": {},
"references": [
{
"url": "https://x41-dsec.de/lab/advisories/x41-2024-001-chilkat-prng/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2024-27448",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-05T06:15:10.263",
"lastModified": "2024-04-05T06:15:10.263",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "MailDev 2 through 2.1.0 allows Remote Code Execution via a crafted Content-ID header for an e-mail attachment, leading to lib/mailserver.js writing arbitrary code into the routes.js file."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Tim-Hoekstra/MailDev-2.1.0-Exploit-RCE",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/maildev/maildev/releases",
"source": "cve@mitre.org"
},
{
"url": "https://intrix.com.au/articles/exposing-major-security-flaw-in-maildev",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-29672",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-05T06:15:10.323",
"lastModified": "2024-04-05T06:15:10.323",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Directory Traversal vulnerability in zly2006 Reden before v.0.2.514 allows a remote attacker to execute arbitrary code via the DEBUG_RTC_REQUEST_SYNC_DATA in KeyCallbacks.kt."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://gist.github.com/apple502j/193358682885fe1a6708309ce934e4ed",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/zly2006/reden-is-what-we-made/commit/44c5320f0a1ccaa764dd91df6a12e747f81fe63a",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29863",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-05T07:15:11.110",
"lastModified": "2024-04-05T07:15:11.110",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A race condition in the installer executable in Qlik Qlikview before versions May 2022 SR3 (12.70.20300) and May 2023 SR2 (12,80.20200) may allow an existing lower privileged user to cause code to be executed in the context of a Windows Administrator."
}
],
"metrics": {},
"references": [
{
"url": "https://community.qlik.com/t5/Official-Support-Articles/High-Severity-Security-fix-for-QlikView-CVE-2024-29863/ta-p/2432661",
"source": "cve@mitre.org"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-04-05T06:00:37.918037+00:00
2024-04-05T08:00:42.996477+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-04-05T05:15:07.843000+00:00
2024-04-05T07:15:11.110000+00:00
```
### Last Data Feed Release
@ -33,23 +33,25 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
244168
244174
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `6`
- [CVE-2024-2509](CVE-2024/CVE-2024-25xx/CVE-2024-2509.json) (`2024-04-05T05:15:07.463`)
- [CVE-2023-52235](CVE-2023/CVE-2023-522xx/CVE-2023-52235.json) (`2024-04-05T06:15:10.060`)
- [CVE-2024-22363](CVE-2024/CVE-2024-223xx/CVE-2024-22363.json) (`2024-04-05T06:15:10.200`)
- [CVE-2024-26329](CVE-2024/CVE-2024-263xx/CVE-2024-26329.json) (`2024-04-05T07:15:10.970`)
- [CVE-2024-27448](CVE-2024/CVE-2024-274xx/CVE-2024-27448.json) (`2024-04-05T06:15:10.263`)
- [CVE-2024-29672](CVE-2024/CVE-2024-296xx/CVE-2024-29672.json) (`2024-04-05T06:15:10.323`)
- [CVE-2024-29863](CVE-2024/CVE-2024-298xx/CVE-2024-29863.json) (`2024-04-05T07:15:11.110`)
### CVEs modified in the last Commit
Recently modified CVEs: `3`
Recently modified CVEs: `0`
- [CVE-2024-3272](CVE-2024/CVE-2024-32xx/CVE-2024-3272.json) (`2024-04-05T05:15:07.580`)
- [CVE-2024-3273](CVE-2024/CVE-2024-32xx/CVE-2024-3273.json) (`2024-04-05T05:15:07.747`)
- [CVE-2024-3274](CVE-2024/CVE-2024-32xx/CVE-2024-3274.json) (`2024-04-05T05:15:07.843`)
## Download and Usage

View File

@ -236058,6 +236058,7 @@ CVE-2023-52229,0,0,ea00ad4e0597affd30c31fe4f98a420e37e7ad7335b14877a8e6dc8a42c24
CVE-2023-5223,0,0,89e8c184d21745a264c9fc9e444990021f80eaf45de773e9b410a22e5226ce45,2024-03-21T02:50:11.113000
CVE-2023-52231,0,0,b5d4f82f731fe2c9cd0c678c3b61a598c79c626b8e6400879ca4a307d29966f3,2024-03-28T12:42:56.150000
CVE-2023-52234,0,0,1fff4c9561934a3ed1e9215004c9ee935ccd38ea2e79cd4cda085a56cc775bc1,2024-03-28T12:42:56.150000
CVE-2023-52235,1,1,f4252331265cbed47d565e61c2d6af947ae9657df278785c08221b7895baa311,2024-04-05T06:15:10.060000
CVE-2023-52239,0,0,53232ab6cc2fc288fa443c530cf5456f2ca2ee6e47506bdc07862ff96f4b1242,2024-02-13T22:50:50.313000
CVE-2023-52240,0,0,e12239f2302ca733fadb51e07b144a2ef6f5c195fb579e55287a44a10e77cb78,2024-01-08T14:32:47.203000
CVE-2023-52251,0,0,37b652e51a7c39e57b6fb6d1511e1d015580821275c80dc97e7e00b5102f4597,2024-02-29T01:42:07.630000
@ -240467,6 +240468,7 @@ CVE-2024-2236,0,0,1caa0e5cdfb424662cbf6124414533e4ab1dd9ca210ea89ecd59ad25abc68f
CVE-2024-22360,0,0,dde3d7768ad1c8bc414b134384042470a384d3453ec0b0a0aa751c2a96e1b961,2024-04-03T17:24:18.150000
CVE-2024-22361,0,0,2cb34447b61b8680c66e6f142987700b31f9f16d4e9b8d748c59e5b8ad5a9a29,2024-02-16T21:35:31.953000
CVE-2024-22362,0,0,194d4da61fd0e172838ae5e875415deb5a10e6ec31fc18ececc7e4c5ad8228c4,2024-03-21T02:52:03.063000
CVE-2024-22363,1,1,a2fd052c0c680128839144798c1421a18aa4438b9681bf79d0004d695dacd4dd,2024-04-05T06:15:10.200000
CVE-2024-22365,0,0,b09f0e3dd0fc2bf60706805e33c1f78b209416e9ed2aa43cb1cfb00b1fe90d17,2024-02-14T00:27:40.143000
CVE-2024-22366,0,0,430ca6193adfaa0b9afcb94c1ccbb70fbf418a97a177252da5823216c0a609df,2024-01-30T22:15:32.033000
CVE-2024-22368,0,0,6b22b40b8e4884565fa5c7d8677cdf0e0ae6419db0baf589179542cd6fadbd26,2024-02-27T04:15:06.767000
@ -241658,7 +241660,7 @@ CVE-2024-25081,0,0,c28ed534590feb1739659669df4a7c74247df29d1ac0d5daa9ed512959af8
CVE-2024-25082,0,0,0376e5832e39b19bc504b78433ebb158054a5715ce980118648e2b6c7f603eff,2024-03-23T03:15:11.393000
CVE-2024-25083,0,0,ecc895ce722780048524674e78ace2df40ec2c99910e00911749a5ffd9d0dca3,2024-02-16T21:39:50.223000
CVE-2024-25089,0,0,5efabd2c26974f37d1846cb1668b5b36df31dff51c549d5b8d4c512bfb0c7d05,2024-02-13T00:38:12.137000
CVE-2024-2509,1,1,e34a229d63bc84791384d23b01283323f1475cd5ed4d696c700df524b07d1dcb,2024-04-05T05:15:07.463000
CVE-2024-2509,0,0,e34a229d63bc84791384d23b01283323f1475cd5ed4d696c700df524b07d1dcb,2024-04-05T05:15:07.463000
CVE-2024-25091,0,0,01b357047b564e780ed13b7e87b2fb8ec79ae12ad4e744cc9437e3dc74a94964,2024-03-01T14:04:04.827000
CVE-2024-25093,0,0,c29d732f68144a1dd5d537415c8d51940073ac1e6ff114431aa6a52d78b263f0,2024-02-29T13:49:29.390000
CVE-2024-25094,0,0,6ba9f5c53aa4aac51446efc522144ae35e985d8a070a664685b43e0df39aa007,2024-02-29T13:49:29.390000
@ -242319,6 +242321,7 @@ CVE-2024-26318,0,0,5a8434e81e693bc0f90a66d9a6d8655df17a4e5f3f1f4a63075d970f5e64f
CVE-2024-2632,0,0,ea393f116b0cce8559537657b6b48805c98531cb8a651d292d9e39cc33b1c1ca,2024-03-19T13:26:46
CVE-2024-26327,0,0,ed8d19077e03f59789fd57e15d79ebd6fa2e85738782585f472f97265da3d970,2024-02-20T19:50:53.960000
CVE-2024-26328,0,0,483204e568c37ddd385ae6419587f3cba8922820a5f3e4626565041a8ff87314,2024-02-20T19:50:53.960000
CVE-2024-26329,1,1,abe0338d3180af0be53532b1668c2fb2a7dc77c306bc74aac5adb05a928048ec,2024-04-05T07:15:10.970000
CVE-2024-2633,0,0,d6d619ede14eb7136c8ee12cb2cd0efea8cc18b4fa44aa46ef5af23251d75954,2024-03-19T13:26:46
CVE-2024-26333,0,0,72ddcf1e5079d4095fb63f71d350456e693bb97135c81208eeffa24430bb0b2f,2024-03-05T13:41:01.900000
CVE-2024-26334,0,0,561e27fe6d2eae55228bd8cfd4e061bf762c84a8f4fc571dc41629b9250a54d4,2024-03-05T13:41:01.900000
@ -242811,6 +242814,7 @@ CVE-2024-27440,0,0,f656cf3f867b554b4acbc17eee670f16835e4e41b3c8da203b1b487ef7d6f
CVE-2024-27441,0,0,e840685b8600bbca2bd5265ffc2375dd0e1834727afca845fa72402578217a21,2024-03-13T15:15:52.083000
CVE-2024-27444,0,0,e4b72098e3b1a45c8b94b724b5aa67a3c5d7a627e3b85b33a53ae8fca137be64,2024-02-26T16:32:25.577000
CVE-2024-27447,0,0,0ad05b799b801710378617c3e979150b26491a5a3c175938d5888d52afd14aa3,2024-02-26T16:32:25.577000
CVE-2024-27448,1,1,be24d2577b4483025f569d831033ddf830d10a5290591dcc6bd6ba289f63fd5b,2024-04-05T06:15:10.263000
CVE-2024-2745,0,0,21dd83e50808577458b12385abb6a5e6bc2a585cd70ef551295012e31869f5dd,2024-04-02T12:50:42.233000
CVE-2024-27454,0,0,6d3a09532b89ef204254e66da503964dcbafd450b5bdda0990f449d144c8e54b,2024-02-26T16:32:25.577000
CVE-2024-27455,0,0,2d941179924c9f77cb732b35f1b7b9f5792b70ca51de1e84f09167eb77852176,2024-03-26T16:15:12.263000
@ -243533,6 +243537,7 @@ CVE-2024-29644,0,0,39829980cc0c3cec42e83f1a7d1e74f651bed504f90005be4e46042a91527
CVE-2024-29650,0,0,8ad374bfabee755625e57dff59b85656db535734df280985070b11f8f0b8c3b6,2024-03-25T16:43:06.137000
CVE-2024-29666,0,0,a8926fce030310567330d9b7c126003f732556a2ce979a6a3fd232707f8bbd99,2024-03-26T12:55:05.010000
CVE-2024-29667,0,0,1425649af0fe5303ac647a61948436bd641374e6a3c12789edb4485c777699d5,2024-04-01T01:12:59.077000
CVE-2024-29672,1,1,6d7c3144a7c4f0335a7d56a16d1b970f3c8dfd1e397b4170b5f91cc4aa856463,2024-04-05T06:15:10.323000
CVE-2024-2968,0,0,bb1433aeb37408aced09cd0721b3e3c51d5f43d4ee9668f91f68b12504b22dc7,2024-03-29T12:45:02.937000
CVE-2024-29684,0,0,cda7b88ce861488cce375da0c97c96f4e8ca98f9272907d42a882870472a7fa4,2024-03-26T17:09:53.043000
CVE-2024-29686,0,0,3fe58549e83b02ecfa4305dc0559466a6aba26f966980b7f6cfaa89fef3c5836,2024-04-01T02:15:07.663000
@ -243611,6 +243616,7 @@ CVE-2024-29858,0,0,ec21ad079a83cd076ada45f6eaa6cdca3318bb07ab260d892702dff1f9c09
CVE-2024-29859,0,0,1a3bc8759fdc8c10e013f96dddd14f2ff64d6c749aade8e9054f9e130df1726e,2024-03-21T12:58:51.093000
CVE-2024-2986,0,0,2e8b76dcc13c2c0ef53bfba5513dd96506aae0980f1810e28f63c6a33c67f33f,2024-03-27T17:48:21.140000
CVE-2024-29862,0,0,a716ba813aa67ee5575393b9d0a0602e3eeaba0f3c15482bf8b9bf774b2f14bb,2024-03-21T12:58:51.093000
CVE-2024-29863,1,1,464d1b384d2a13b48267b12cb30c1c0bb3380f5fff95f7b0465f3639fc2cc0f1,2024-04-05T07:15:11.110000
CVE-2024-29864,0,0,a6ff60d6eca0eec860cad03d4ebcf6ddb2a8ce1d06f7fbda3179547925ea7c1b,2024-03-21T12:58:51.093000
CVE-2024-29865,0,0,c71ea820e322882cfd10f1c29db59e00803f8a609d75b87f5e2466dff384d5b6,2024-03-22T15:34:43.663000
CVE-2024-29866,0,0,2169c0f3fed16be1069cbb5502128dfabe18fe6fbc7db4f274cc3c93caea8ddd,2024-03-21T15:24:35.093000
@ -244155,9 +244161,9 @@ CVE-2024-3258,0,0,16d450bc3554c2a319117adc94d8a7dcb1f68b8821fc173e15562a1ba48b30
CVE-2024-3259,0,0,59128ca045cd2f7fbe88d58e11ffcce19ef1d2f5d6abea61087e98d65d4fd821,2024-04-03T17:24:18.150000
CVE-2024-3262,0,0,cf821e2b5e43ebb35bf150d05529241937c1e196ce499175549668020b0990b1,2024-04-04T12:48:22.650000
CVE-2024-3270,0,0,06803f1697053009ed748b01b78c6c9cfb2903b8272aa543347ffd9d7a62c641,2024-04-04T12:48:41.700000
CVE-2024-3272,0,1,32d3ad93a54dc7dcb0170715c810c40dd0605ff3f1d2f7f8a6ff591782374412,2024-04-05T05:15:07.580000
CVE-2024-3273,0,1,1ae2eaf61f98318aed8ff92c4b5febb2d8229962f8b7b2bc67bc40cbaea73f73,2024-04-05T05:15:07.747000
CVE-2024-3274,0,1,64bfe86321ec1e05b957bdddb515317b23c7b94e70b2d69aa950c222026c2d4b,2024-04-05T05:15:07.843000
CVE-2024-3272,0,0,32d3ad93a54dc7dcb0170715c810c40dd0605ff3f1d2f7f8a6ff591782374412,2024-04-05T05:15:07.580000
CVE-2024-3273,0,0,1ae2eaf61f98318aed8ff92c4b5febb2d8229962f8b7b2bc67bc40cbaea73f73,2024-04-05T05:15:07.747000
CVE-2024-3274,0,0,64bfe86321ec1e05b957bdddb515317b23c7b94e70b2d69aa950c222026c2d4b,2024-04-05T05:15:07.843000
CVE-2024-3296,0,0,166fd19b54c7f066a468db032b1192efadbbddbd2bd126df3550e4cdc8bb66bf,2024-04-04T16:33:06.610000
CVE-2024-3298,0,0,56186a0c5d2e3bcaa6b6bd1b394585c42533a8f19e8ba33fa08b025b47b84ed1,2024-04-04T16:33:06.610000
CVE-2024-3299,0,0,e27ead5ec50888cbdeacdd9f017ce3d5215207dea15a19473541db1dd6d943fd,2024-04-04T16:33:06.610000

Can't render this file because it is too large.