mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-11-24T03:03:49.094100+00:00
This commit is contained in:
parent
1435a61442
commit
b2de190d1d
55
CVE-2024/CVE-2024-112xx/CVE-2024-11233.json
Normal file
55
CVE-2024/CVE-2024-112xx/CVE-2024-11233.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-11233",
|
||||
"sourceIdentifier": "security@php.net",
|
||||
"published": "2024-11-24T02:15:16.030",
|
||||
"lastModified": "2024-11-24T02:15:16.030",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, due to an error in\u00a0convert.quoted-printable-decode filter certain data can lead to buffer overread by one byte, which can in certain circumstances lead to crashes or disclose content of other memory areas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@php.net",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@php.net",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/php/php-src/security/advisories/GHSA-r977-prxv-hc43",
|
||||
"source": "security@php.net"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-112xx/CVE-2024-11234.json
Normal file
55
CVE-2024/CVE-2024-112xx/CVE-2024-11234.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-11234",
|
||||
"sourceIdentifier": "security@php.net",
|
||||
"published": "2024-11-24T01:15:03.987",
|
||||
"lastModified": "2024-11-24T01:15:03.987",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, when using streams with configured proxy and \"request_fulluri\" option, the URI is not properly sanitized which can lead to HTTP request smuggling and allow the attacker to use the proxy to perform arbitrary HTTP requests originating from the server, thus potentially gaining access to resources not normally available to the external user."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@php.net",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@php.net",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/php/php-src/security/advisories/GHSA-c5f2-jwm7-mmq2",
|
||||
"source": "security@php.net"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-112xx/CVE-2024-11236.json
Normal file
55
CVE-2024/CVE-2024-112xx/CVE-2024-11236.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-11236",
|
||||
"sourceIdentifier": "security@php.net",
|
||||
"published": "2024-11-24T01:15:04.387",
|
||||
"lastModified": "2024-11-24T01:15:04.387",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, uncontrolled long string inputs to ldap_escape()\u00a0function on 32-bit systems can cause an integer overflow, resulting in an out-of-bounds write."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@php.net",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@php.net",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/php/php-src/security/advisories/GHSA-5hqh-c84r-qjcv",
|
||||
"source": "security@php.net"
|
||||
}
|
||||
]
|
||||
}
|
16
README.md
16
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-11-24T00:55:39.915407+00:00
|
||||
2024-11-24T03:03:49.094100+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-11-23T23:15:03.810000+00:00
|
||||
2024-11-24T02:15:16.030000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -27,26 +27,28 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2024-11-23T01:00:10.075463+00:00
|
||||
2024-11-24T01:00:10.101150+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
271194
|
||||
271197
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `0`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
- [CVE-2024-11233](CVE-2024/CVE-2024-112xx/CVE-2024-11233.json) (`2024-11-24T02:15:16.030`)
|
||||
- [CVE-2024-11234](CVE-2024/CVE-2024-112xx/CVE-2024-11234.json) (`2024-11-24T01:15:03.987`)
|
||||
- [CVE-2024-11236](CVE-2024/CVE-2024-112xx/CVE-2024-11236.json) (`2024-11-24T01:15:04.387`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
- [CVE-2024-44947](CVE-2024/CVE-2024-449xx/CVE-2024-44947.json) (`2024-11-23T23:15:03.810`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
@ -243432,6 +243432,9 @@ CVE-2024-11228,0,0,9fc5ec42228f59de6756223b2f66605b831df8cf5121ac71cae8165002d20
|
||||
CVE-2024-11229,0,0,8de69af2e8ef71bf0699d395c3530a96b920df18def0dd7e9945c9cd35c53cd6,2024-11-23T12:15:18.983000
|
||||
CVE-2024-1123,0,0,b973e4c54de6f241a32cf221a70e04068421d86df4d000867b2228a54e55ef35,2024-03-11T01:32:39.697000
|
||||
CVE-2024-11231,0,0,340d4a67a1a53dfc3acaeb8d7a5545a089dda27cdd6d90b8d47ab035e0216159,2024-11-23T12:15:19.387000
|
||||
CVE-2024-11233,1,1,48390651d2a1ab2f99be692a515e725d9d6cfe2358f0d5991075187c2c6a2bf6,2024-11-24T02:15:16.030000
|
||||
CVE-2024-11234,1,1,8e921bffe97e147ad3138319e38f36b4c41b3c2c99dfe5064af2e2b07c838f5e,2024-11-24T01:15:03.987000
|
||||
CVE-2024-11236,1,1,4bcc8eabd790c7d86c7d4b9f4e5c8bbcb8e875f455dfed03d4d8c52ac0cc6fd1,2024-11-24T01:15:04.387000
|
||||
CVE-2024-11237,0,0,9213e2a4eef9d88853d744219598c19b6ea93ab11d996277723bb7fe3b4dafb0,2024-11-19T19:04:14.987000
|
||||
CVE-2024-11238,0,0,ce4db66c60999acd981d78df2e1b620167b9a91ec92fb71a2c401cfcff716486,2024-11-19T19:01:13.060000
|
||||
CVE-2024-11239,0,0,aefb59a8cfc2086746090c1190902046658072a530e6347767791876e7172fb6,2024-11-19T19:00:43.230000
|
||||
@ -262592,7 +262595,7 @@ CVE-2024-44943,0,0,283eaecb4a15bfc58a84156c8fa38a69ba8363c53f00af38995bb3b34fd2d
|
||||
CVE-2024-44944,0,0,e0ea7425a22b863e2537c36eca33f555e79ab9242c3477b220510c50a309c39f,2024-09-10T08:15:03.230000
|
||||
CVE-2024-44945,0,0,6df059f581f073064a2495782591f5696f5e78b88875e61106eab64ca2b50c36,2024-09-17T11:42:15.857000
|
||||
CVE-2024-44946,0,0,baba486800f48daca091ce86b0b3099b94d8fc83c17e121f4572ead5091851fa,2024-09-04T12:15:05.150000
|
||||
CVE-2024-44947,0,1,8d5827aa80795fd50fa8a4a90a96cc66a8d6b1733190b19220e1553388dec3c6,2024-11-23T23:15:03.810000
|
||||
CVE-2024-44947,0,0,8d5827aa80795fd50fa8a4a90a96cc66a8d6b1733190b19220e1553388dec3c6,2024-11-23T23:15:03.810000
|
||||
CVE-2024-44948,0,0,b6624809fc4e7fad2ef29d7ebf62dc5527a907fa09ba4a21a20058ddaf98aede,2024-09-05T12:53:21.110000
|
||||
CVE-2024-44949,0,0,b7b7622b983a3734466cfe3f2958346ada4afa05901a8b3e8d3a4caaf654fb3c,2024-10-09T13:53:32.513000
|
||||
CVE-2024-4495,0,0,cb1d8bc801c43f7ab8180176a646c9e39a56603c1305eac804522af3adac0fa8,2024-05-17T02:40:25.167000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user