mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2024-05-19T18:00:38.118739+00:00
This commit is contained in:
parent
460cef3e9e
commit
d0e7beb97b
28
CVE-2024/CVE-2024-360xx/CVE-2024-36053.json
Normal file
28
CVE-2024/CVE-2024-360xx/CVE-2024-36053.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2024-36053",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-19T16:15:45.687",
|
||||
"lastModified": "2024-05-19T16:15:45.687",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the mintupload package through 4.2.0 for Linux Mint, service-name mishandling leads to command injection via shell metacharacters in check_connection, drop_data_received_cb, and Service.remove. A user can modify a service name in a ~/.linuxmint/mintUpload/services/service file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://packages.linuxmint.com/pool/main/m/mintupload/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/linuxmint/mintupload/issues/42",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/linuxmint/mintupload/issues/43",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-05-19T16:00:38.574482+00:00
|
||||
2024-05-19T18:00:38.118739+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-05-19T14:15:35.700000+00:00
|
||||
2024-05-19T16:15:45.687000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,14 +33,14 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
250744
|
||||
250745
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `1`
|
||||
|
||||
- [CVE-2024-5101](CVE-2024/CVE-2024-51xx/CVE-2024-5101.json) (`2024-05-19T14:15:35.700`)
|
||||
- [CVE-2024-36053](CVE-2024/CVE-2024-360xx/CVE-2024-36053.json) (`2024-05-19T16:15:45.687`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
@ -249920,6 +249920,7 @@ CVE-2024-3601,0,0,fc79ccecd0a0bbb79cd9c210153588f7d4590d9827348da641a07d91a9dbdb
|
||||
CVE-2024-36043,0,0,121c137ca4054a94902e50b17c5cd8b97c93677eaa06345a29113c9550de7a3c,2024-05-18T20:15:15.903000
|
||||
CVE-2024-36048,0,0,0ee4078def62ee997db54c6f68eae897a62a6ab6b1b8e70ce19de000a0b239fd,2024-05-18T21:15:47.673000
|
||||
CVE-2024-36050,0,0,b22df6ffe793b6ac9ff6008c800098dd716d933a6144f94e508ea9c509180d3e,2024-05-18T22:15:07.460000
|
||||
CVE-2024-36053,1,1,d51c9a75127f54998ecb6ee58b412865a9dfdd688bdb7147c71644ad15266736,2024-05-19T16:15:45.687000
|
||||
CVE-2024-3606,0,0,aad549bdf5ff1831d91b9701456650bb1ccc1938c3f938f0c7eb426394ab8356,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3607,0,0,af4721086df8378a380a0243b924575fce7196863af6b8319186a0a7c6039e9f,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3609,0,0,6c3cd77579fee8e9517beb08b888a97a81906e9d1fc4f51c5d372766647e52cb,2024-05-17T18:36:05.263000
|
||||
@ -250742,4 +250743,4 @@ CVE-2024-5097,0,0,35d00783f08d4c1fcbaf7ec7e59ffe275260292302b76e258d33c4c0c5a1d4
|
||||
CVE-2024-5098,0,0,27e182691f6df2f6e5de66c3e5527fb52eb62e6c11728f25b5e5f30216127daf,2024-05-19T06:15:06.320000
|
||||
CVE-2024-5099,0,0,4293f4c81987dc00fde1b446c94f0fb96801ad62e3b48b03d925386f0d01f996,2024-05-19T08:15:06.367000
|
||||
CVE-2024-5100,0,0,c6616e790fe9d0055566f7986afbbf39bedb52a3fb1f8f9cf3fd594fbdcbac45,2024-05-19T12:15:08.310000
|
||||
CVE-2024-5101,1,1,fc10060049ea504f994e085091d4ed1d41b5c3f4a4a5b1cf97b8ade4d9f392f6,2024-05-19T14:15:35.700000
|
||||
CVE-2024-5101,0,0,fc10060049ea504f994e085091d4ed1d41b5c3f4a4a5b1cf97b8ade4d9f392f6,2024-05-19T14:15:35.700000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user