mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-11 16:13:34 +00:00
Auto-Update: 2024-05-26T06:00:29.500441+00:00
This commit is contained in:
parent
727f7e284a
commit
a839babab1
92
CVE-2024/CVE-2024-53xx/CVE-2024-5353.json
Normal file
92
CVE-2024/CVE-2024-53xx/CVE-2024-5353.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-5353",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-26T04:15:08.350",
|
||||
"lastModified": "2024-05-26T04:15:08.350",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in anji-plus AJ-Report up to 1.4.1. This affects the function decompress of the component ZIP File Handler. The manipulation leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-266265 was assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/anji-plus/report/files/15363269/aj-report.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/anji-plus/report/issues/34",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.266265",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.266265",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-53xx/CVE-2024-5354.json
Normal file
92
CVE-2024/CVE-2024-53xx/CVE-2024-5354.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-5354",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-26T05:15:08.297",
|
||||
"lastModified": "2024-05-26T05:15:08.297",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic was found in anji-plus AJ-Report up to 1.4.1. This vulnerability affects unknown code of the file /reportShare/detailByCode. The manipulation of the argument shareToken leads to information disclosure. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-266266 is the identifier assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/anji-plus/report/files/15363269/aj-report.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/anji-plus/report/issues/34",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.266266",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.266266",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
37
README.md
37
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-05-26T02:00:29.531128+00:00
|
||||
2024-05-26T06:00:29.500441+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-05-26T01:15:08.647000+00:00
|
||||
2024-05-26T05:15:08.297000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,46 +33,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
251782
|
||||
251784
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `2`
|
||||
|
||||
- [CVE-2024-5351](CVE-2024/CVE-2024-53xx/CVE-2024-5351.json) (`2024-05-26T00:15:09.890`)
|
||||
- [CVE-2024-5352](CVE-2024/CVE-2024-53xx/CVE-2024-5352.json) (`2024-05-26T01:15:08.647`)
|
||||
- [CVE-2024-5353](CVE-2024/CVE-2024-53xx/CVE-2024-5353.json) (`2024-05-26T04:15:08.350`)
|
||||
- [CVE-2024-5354](CVE-2024/CVE-2024-53xx/CVE-2024-5354.json) (`2024-05-26T05:15:08.297`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1438`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
- [CVE-2024-5235](CVE-2024/CVE-2024-52xx/CVE-2024-5235.json) (`2024-05-24T01:15:30.977`)
|
||||
- [CVE-2024-5236](CVE-2024/CVE-2024-52xx/CVE-2024-5236.json) (`2024-05-24T01:15:30.977`)
|
||||
- [CVE-2024-5237](CVE-2024/CVE-2024-52xx/CVE-2024-5237.json) (`2024-05-24T01:15:30.977`)
|
||||
- [CVE-2024-5238](CVE-2024/CVE-2024-52xx/CVE-2024-5238.json) (`2024-05-24T01:15:30.977`)
|
||||
- [CVE-2024-5239](CVE-2024/CVE-2024-52xx/CVE-2024-5239.json) (`2024-05-24T01:15:30.977`)
|
||||
- [CVE-2024-5240](CVE-2024/CVE-2024-52xx/CVE-2024-5240.json) (`2024-05-24T01:15:30.977`)
|
||||
- [CVE-2024-5241](CVE-2024/CVE-2024-52xx/CVE-2024-5241.json) (`2024-05-24T01:15:30.977`)
|
||||
- [CVE-2024-5242](CVE-2024/CVE-2024-52xx/CVE-2024-5242.json) (`2024-05-24T01:15:30.977`)
|
||||
- [CVE-2024-5243](CVE-2024/CVE-2024-52xx/CVE-2024-5243.json) (`2024-05-24T01:15:30.977`)
|
||||
- [CVE-2024-5244](CVE-2024/CVE-2024-52xx/CVE-2024-5244.json) (`2024-05-24T01:15:30.977`)
|
||||
- [CVE-2024-5245](CVE-2024/CVE-2024-52xx/CVE-2024-5245.json) (`2024-05-24T01:15:30.977`)
|
||||
- [CVE-2024-5246](CVE-2024/CVE-2024-52xx/CVE-2024-5246.json) (`2024-05-24T01:15:30.977`)
|
||||
- [CVE-2024-5247](CVE-2024/CVE-2024-52xx/CVE-2024-5247.json) (`2024-05-24T01:15:30.977`)
|
||||
- [CVE-2024-5258](CVE-2024/CVE-2024-52xx/CVE-2024-5258.json) (`2024-05-24T01:15:30.977`)
|
||||
- [CVE-2024-5264](CVE-2024/CVE-2024-52xx/CVE-2024-5264.json) (`2024-05-24T01:15:30.977`)
|
||||
- [CVE-2024-5279](CVE-2024/CVE-2024-52xx/CVE-2024-5279.json) (`2024-05-24T01:15:30.977`)
|
||||
- [CVE-2024-5291](CVE-2024/CVE-2024-52xx/CVE-2024-5291.json) (`2024-05-24T01:15:30.977`)
|
||||
- [CVE-2024-5292](CVE-2024/CVE-2024-52xx/CVE-2024-5292.json) (`2024-05-24T01:15:30.977`)
|
||||
- [CVE-2024-5293](CVE-2024/CVE-2024-52xx/CVE-2024-5293.json) (`2024-05-24T01:15:30.977`)
|
||||
- [CVE-2024-5294](CVE-2024/CVE-2024-52xx/CVE-2024-5294.json) (`2024-05-24T01:15:30.977`)
|
||||
- [CVE-2024-5295](CVE-2024/CVE-2024-52xx/CVE-2024-5295.json) (`2024-05-24T01:15:30.977`)
|
||||
- [CVE-2024-5296](CVE-2024/CVE-2024-52xx/CVE-2024-5296.json) (`2024-05-24T01:15:30.977`)
|
||||
- [CVE-2024-5297](CVE-2024/CVE-2024-52xx/CVE-2024-5297.json) (`2024-05-24T01:15:30.977`)
|
||||
- [CVE-2024-5298](CVE-2024/CVE-2024-52xx/CVE-2024-5298.json) (`2024-05-24T01:15:30.977`)
|
||||
- [CVE-2024-5299](CVE-2024/CVE-2024-52xx/CVE-2024-5299.json) (`2024-05-24T01:15:30.977`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
2882
_state.csv
2882
_state.csv
File diff suppressed because it is too large
Load Diff
Loading…
x
Reference in New Issue
Block a user