Skip to content

Commit

Permalink
300 changes (0 new | 300 updated):
Browse files Browse the repository at this point in the history
      - 0 new CVEs:
      - 300 updated CVEs: CVE-2024-2271, CVE-2024-2272, CVE-2024-2273, CVE-2024-2274, CVE-2024-2275, CVE-2024-2276, CVE-2024-2277, CVE-2024-2278, CVE-2024-2279, CVE-2024-2280, CVE-2024-2281, CVE-2024-2282, CVE-2024-2283, CVE-2024-2284, CVE-2024-2285, CVE-2024-2286, CVE-2024-2287, CVE-2024-2288, CVE-2024-2289, CVE-2024-2290, CVE-2024-2291, CVE-2024-2293, CVE-2024-2294, CVE-2024-2295, CVE-2024-2296, CVE-2024-2298, CVE-2024-2299, CVE-2024-2300, CVE-2024-2301, CVE-2024-2302, CVE-2024-2303, CVE-2024-2304, CVE-2024-2305, CVE-2024-2306, CVE-2024-2307, CVE-2024-2308, CVE-2024-2309, CVE-2024-2310, CVE-2024-2311, CVE-2024-2312, CVE-2024-2313, CVE-2024-2314, CVE-2024-2316, CVE-2024-2317, CVE-2024-2318, CVE-2024-2319, CVE-2024-2322, CVE-2024-2324, CVE-2024-2325, CVE-2024-2326, CVE-2024-2327, CVE-2024-2328, CVE-2024-2329, CVE-2024-2330, CVE-2024-2331, CVE-2024-2332, CVE-2024-2333, CVE-2024-2334, CVE-2024-2335, CVE-2024-2336, CVE-2024-2338, CVE-2024-2339, CVE-2024-2340, CVE-2024-2341, CVE-2024-2342, CVE-2024-2343, CVE-2024-2344, CVE-2024-2345, CVE-2024-2346, CVE-2024-2347, CVE-2024-2348, CVE-2024-2349, CVE-2024-2350, CVE-2024-2351, CVE-2024-2352, CVE-2024-2353, CVE-2024-2354, CVE-2024-2355, CVE-2024-2357, CVE-2024-2358, CVE-2024-2359, CVE-2024-2360, CVE-2024-2361, CVE-2024-2362, CVE-2024-2363, CVE-2024-2364, CVE-2024-2365, CVE-2024-2366, CVE-2024-2368, CVE-2024-2369, CVE-2024-2371, CVE-2024-2377, CVE-2024-2378, CVE-2024-2379, CVE-2024-2380, CVE-2024-2381, CVE-2024-2382, CVE-2024-2383, CVE-2024-2384, CVE-2024-2387, CVE-2024-2389, CVE-2024-2390, CVE-2024-2391, CVE-2024-2392, CVE-2024-2393, CVE-2024-2394, CVE-2024-2395, CVE-2024-2397, CVE-2024-2398, CVE-2024-2399, CVE-2024-2400, CVE-2024-2401, CVE-2024-2402, CVE-2024-2403, CVE-2024-2404, CVE-2024-2405, CVE-2024-2406, CVE-2024-2408, CVE-2024-2409, CVE-2024-2410, CVE-2024-2411, CVE-2024-2412, CVE-2024-2413, CVE-2024-2414, CVE-2024-2415, CVE-2024-2416, CVE-2024-2417, CVE-2024-2418, CVE-2024-2419, CVE-2024-2420, CVE-2024-2421, CVE-2024-2422, CVE-2024-2423, CVE-2024-2424, CVE-2024-2425, CVE-2024-2426, CVE-2024-2427, CVE-2024-2428, CVE-2024-2429, CVE-2024-2431, CVE-2024-2432, CVE-2024-2433, CVE-2024-2434, CVE-2024-2435, CVE-2024-2436, CVE-2024-2439, CVE-2024-2440, CVE-2024-2441, CVE-2024-2442, CVE-2024-2443, CVE-2024-2444, CVE-2024-2445, CVE-2024-2446, CVE-2024-2447, CVE-2024-2448, CVE-2024-2449, CVE-2024-2450, CVE-2024-2451, CVE-2024-2452, CVE-2024-2453, CVE-2024-2454, CVE-2024-2456, CVE-2024-2457, CVE-2024-2458, CVE-2024-2459, CVE-2024-2460, CVE-2024-2461, CVE-2024-2462, CVE-2024-2463, CVE-2024-2464, CVE-2024-2465, CVE-2024-2466, CVE-2024-2467, CVE-2024-2468, CVE-2024-2469, CVE-2024-2470, CVE-2024-2471, CVE-2024-2472, CVE-2024-2473, CVE-2024-2474, CVE-2024-2475, CVE-2024-2476, CVE-2024-2477, CVE-2024-2478, CVE-2024-2479, CVE-2024-2480, CVE-2024-2481, CVE-2024-2482, CVE-2024-2483, CVE-2024-2484, CVE-2024-2485, CVE-2024-2486, CVE-2024-2487, CVE-2024-2488, CVE-2024-2489, CVE-2024-2490, CVE-2024-2491, CVE-2024-2492, CVE-2024-2493, CVE-2024-2494, CVE-2024-2495, CVE-2024-2496, CVE-2024-2497, CVE-2024-2499, CVE-2024-2500, CVE-2024-2501, CVE-2024-2503, CVE-2024-2504, CVE-2024-2505, CVE-2024-2506, CVE-2024-2507, CVE-2024-2509, CVE-2024-2511, CVE-2024-2513, CVE-2024-2514, CVE-2024-2515, CVE-2024-2516, CVE-2024-2517, CVE-2024-2518, CVE-2024-2519, CVE-2024-2520, CVE-2024-2521, CVE-2024-2522, CVE-2024-2523, CVE-2024-2524, CVE-2024-2525, CVE-2024-2526, CVE-2024-2527, CVE-2024-2528, CVE-2024-2529, CVE-2024-2530, CVE-2024-2531, CVE-2024-2532, CVE-2024-2533, CVE-2024-2534, CVE-2024-2535, CVE-2024-2536, CVE-2024-2537, CVE-2024-2538, CVE-2024-2539, CVE-2024-2542, CVE-2024-2543, CVE-2024-2544, CVE-2024-2546, CVE-2024-2547, CVE-2024-2548, CVE-2024-2553, CVE-2024-2554, CVE-2024-2555, CVE-2024-2556, CVE-2024-2557, CVE-2024-2558, CVE-2024-2559, CVE-2024-2560, CVE-2024-2561, CVE-2024-2562, CVE-2024-2563, CVE-2024-2564, CVE-2024-2565, CVE-2024-2566, CVE-2024-2567, CVE-2024-2568, CVE-2024-2569, CVE-2024-2570, CVE-2024-2571, CVE-2024-2572, CVE-2024-2573, CVE-2024-2574, CVE-2024-2575, CVE-2024-2576, CVE-2024-2577, CVE-2024-2578, CVE-2024-2579, CVE-2024-2580, CVE-2024-2581, CVE-2024-2583, CVE-2024-2584, CVE-2024-2585, CVE-2024-2586, CVE-2024-2587, CVE-2024-2588, CVE-2024-2589, CVE-2024-2590, CVE-2024-2591, CVE-2024-2592, CVE-2024-2593, CVE-2024-2594, CVE-2024-2595, CVE-2024-2596, CVE-2024-2597, CVE-2024-2598, CVE-2024-2599, CVE-2024-2603, CVE-2024-2604, CVE-2024-2605, CVE-2024-2606, CVE-2024-2607, CVE-2024-2608, CVE-2024-2609, CVE-2024-2610
  • Loading branch information
cvelistV5 Github Action - optimized committed Jul 5, 2024
1 parent 34247fe commit f744101
Show file tree
Hide file tree
Showing 302 changed files with 9,399 additions and 1,413 deletions.
29 changes: 27 additions & 2 deletions cves/2024/2xxx/CVE-2024-2271.json
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
"assignerShortName": "VulDB",
"dateReserved": "2024-03-07T14:34:44.799Z",
"datePublished": "2024-03-07T23:31:04.547Z",
"dateUpdated": "2024-06-21T15:32:41.826Z"
"dateUpdated": "2024-07-05T14:16:44.833Z"
},
"containers": {
"cna": {
Expand Down Expand Up @@ -144,7 +144,7 @@
"providerMetadata": {
"orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325",
"shortName": "secretariat-reference",
"dateUpdated": "2024-06-21T15:32:41.826Z"
"dateUpdated": "2024-07-05T14:16:44.833Z"
},
"references": [
{
Expand All @@ -171,6 +171,31 @@
"exploit",
"x_cve_prog_secretariat_snapshot"
]
},
{
"url": "https://vuldb.com/?id.256041/adp-test-6-28",
"name": "VDB-256041 | keerti1924 Online-Book-Store-Website HTTP POST Request shop.php sql injection",
"tags": [
"vdb-entry",
"technical-description",
"x_snapshot"
]
},
{
"url": "https://vuldb.com/?ctiid.256041/adp-test-6-28",
"name": "VDB-256041 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required",
"x_snapshot"
]
},
{
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/Blind%20SQL%20Injection%20%20Shop/Blind%20SQL%20Injection%20Shop.php%20.md/adp-test-6-28",
"tags": [
"exploit",
"x_snapshot"
]
}
]
}
Expand Down
29 changes: 27 additions & 2 deletions cves/2024/2xxx/CVE-2024-2272.json
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
"assignerShortName": "VulDB",
"dateReserved": "2024-03-07T14:34:48.063Z",
"datePublished": "2024-03-07T23:31:05.971Z",
"dateUpdated": "2024-06-21T15:32:42.243Z"
"dateUpdated": "2024-07-05T14:16:44.830Z"
},
"containers": {
"cna": {
Expand Down Expand Up @@ -144,7 +144,7 @@
"providerMetadata": {
"orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325",
"shortName": "secretariat-reference",
"dateUpdated": "2024-06-21T15:32:42.243Z"
"dateUpdated": "2024-07-05T14:16:44.830Z"
},
"references": [
{
Expand All @@ -171,6 +171,31 @@
"exploit",
"x_cve_prog_secretariat_snapshot"
]
},
{
"url": "https://vuldb.com/?id.256042/adp-test-6-28",
"name": "VDB-256042 | keerti1924 Online-Book-Store-Website HTTP POST Request home.php sql injection",
"tags": [
"vdb-entry",
"technical-description",
"x_snapshot"
]
},
{
"url": "https://vuldb.com/?ctiid.256042/adp-test-6-28",
"name": "VDB-256042 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required",
"x_snapshot"
]
},
{
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/Blind%20SQL%20Injection%20%20Home/Blind%20SQL%20Injection%20Home.php%20.md/adp-test-6-28",
"tags": [
"exploit",
"x_snapshot"
]
}
]
}
Expand Down
16 changes: 14 additions & 2 deletions cves/2024/2xxx/CVE-2024-2273.json
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
"assignerShortName": "Wordfence",
"dateReserved": "2024-03-07T14:41:07.693Z",
"datePublished": "2024-05-02T16:52:49.167Z",
"dateUpdated": "2024-06-21T15:32:42.641Z"
"dateUpdated": "2024-07-05T14:16:44.843Z"
},
"containers": {
"cna": {
Expand Down Expand Up @@ -86,7 +86,7 @@
"providerMetadata": {
"orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325",
"shortName": "secretariat-reference",
"dateUpdated": "2024-06-21T15:32:42.641Z"
"dateUpdated": "2024-07-05T14:16:44.843Z"
},
"references": [
{
Expand All @@ -100,6 +100,18 @@
"tags": [
"x_cve_prog_secretariat_snapshot"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e7fe482e-a4e8-411c-97a4-a32ccf5b3682?source=cve/adp-test-6-28",
"tags": [
"x_snapshot"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3075158%40kadence-blocks%2Ftrunk&old=3068562%40kadence-blocks%2Ftrunk&sfp_email=&sfph_mail=/adp-test-6-28",
"tags": [
"x_snapshot"
]
}
]
}
Expand Down
29 changes: 27 additions & 2 deletions cves/2024/2xxx/CVE-2024-2274.json
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
"assignerShortName": "VulDB",
"dateReserved": "2024-03-07T14:49:05.445Z",
"datePublished": "2024-03-08T00:00:10.944Z",
"dateUpdated": "2024-06-21T15:32:43.063Z"
"dateUpdated": "2024-07-05T14:16:45.464Z"
},
"containers": {
"cna": {
Expand Down Expand Up @@ -134,7 +134,7 @@
"providerMetadata": {
"orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325",
"shortName": "secretariat-reference",
"dateUpdated": "2024-06-21T15:32:43.063Z"
"dateUpdated": "2024-07-05T14:16:45.464Z"
},
"references": [
{
Expand All @@ -161,6 +161,31 @@
"exploit",
"x_cve_prog_secretariat_snapshot"
]
},
{
"url": "https://vuldb.com/?id.256043/adp-test-6-28",
"name": "VDB-256043 | Bdtask G-Prescription Gynaecology & OBS Consultation Software Prescription Dashboard Index cross site scripting",
"tags": [
"vdb-entry",
"technical-description",
"x_snapshot"
]
},
{
"url": "https://vuldb.com/?ctiid.256043/adp-test-6-28",
"name": "VDB-256043 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required",
"x_snapshot"
]
},
{
"url": "https://drive.google.com/file/d/11QliZKy-7ylKph1vwlXVHaRn5Jmk0Bjg/view?usp=drivesdk/adp-test-6-28",
"tags": [
"exploit",
"x_snapshot"
]
}
]
}
Expand Down
29 changes: 27 additions & 2 deletions cves/2024/2xxx/CVE-2024-2275.json
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
"assignerShortName": "VulDB",
"dateReserved": "2024-03-07T14:49:07.457Z",
"datePublished": "2024-03-08T00:00:12.883Z",
"dateUpdated": "2024-06-21T15:32:43.477Z"
"dateUpdated": "2024-07-05T14:16:45.721Z"
},
"containers": {
"cna": {
Expand Down Expand Up @@ -134,7 +134,7 @@
"providerMetadata": {
"orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325",
"shortName": "secretariat-reference",
"dateUpdated": "2024-06-21T15:32:43.477Z"
"dateUpdated": "2024-07-05T14:16:45.721Z"
},
"references": [
{
Expand All @@ -161,6 +161,31 @@
"exploit",
"x_cve_prog_secretariat_snapshot"
]
},
{
"url": "https://vuldb.com/?id.256044/adp-test-6-28",
"name": "VDB-256044 | Bdtask G-Prescription Gynaecology & OBS Consultation Software OBS Patient/Gynee Prescription cross site scripting",
"tags": [
"vdb-entry",
"technical-description",
"x_snapshot"
]
},
{
"url": "https://vuldb.com/?ctiid.256044/adp-test-6-28",
"name": "VDB-256044 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required",
"x_snapshot"
]
},
{
"url": "https://drive.google.com/file/d/11QliZKy-7ylKph1vwlXVHaRn5Jmk0Bjg/view?usp=drivesdk/adp-test-6-28",
"tags": [
"exploit",
"x_snapshot"
]
}
]
}
Expand Down
42 changes: 39 additions & 3 deletions cves/2024/2xxx/CVE-2024-2276.json
Original file line number Diff line number Diff line change
@@ -1,14 +1,14 @@
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"dataVersion": "5.1",
"cveMetadata": {
"cveId": "CVE-2024-2276",
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"state": "PUBLISHED",
"assignerShortName": "VulDB",
"dateReserved": "2024-03-07T14:49:12.813Z",
"datePublished": "2024-03-08T00:31:04.983Z",
"dateUpdated": "2024-06-11T17:44:17.481Z"
"dateUpdated": "2024-07-05T14:16:46.495Z"
},
"containers": {
"cna": {
Expand Down Expand Up @@ -128,6 +128,42 @@
]
}
]
}
},
"adp": [
{
"providerMetadata": {
"orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325",
"shortName": "secretariat-reference",
"dateUpdated": "2024-07-05T14:16:46.495Z"
},
"references": [
{
"url": "https://vuldb.com/?id.256045/adp-test-6-28",
"name": "VDB-256045 | Bdtask G-Prescription Gynaecology & OBS Consultation Software Edit Venue Page cross site scripting",
"tags": [
"vdb-entry",
"technical-description",
"x_snapshot"
]
},
{
"url": "https://vuldb.com/?ctiid.256045/adp-test-6-28",
"name": "VDB-256045 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required",
"x_snapshot"
]
},
{
"url": "https://drive.google.com/file/d/11QliZKy-7ylKph1vwlXVHaRn5Jmk0Bjg/view?usp=drivesdk/adp-test-6-28",
"tags": [
"exploit",
"x_snapshot"
]
}
]
}
]
}
}
28 changes: 26 additions & 2 deletions cves/2024/2xxx/CVE-2024-2277.json
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
"assignerShortName": "VulDB",
"dateReserved": "2024-03-07T14:49:14.829Z",
"datePublished": "2024-03-08T01:00:06.624Z",
"dateUpdated": "2024-06-21T15:32:44.070Z"
"dateUpdated": "2024-07-05T14:16:46.821Z"
},
"containers": {
"cna": {
Expand Down Expand Up @@ -133,7 +133,7 @@
"providerMetadata": {
"orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325",
"shortName": "secretariat-reference",
"dateUpdated": "2024-06-21T15:32:44.070Z"
"dateUpdated": "2024-07-05T14:16:46.821Z"
},
"references": [
{
Expand All @@ -159,6 +159,30 @@
"exploit",
"x_cve_prog_secretariat_snapshot"
]
},
{
"url": "https://vuldb.com/?id.256046/adp-test-6-28",
"name": "VDB-256046 | Bdtask G-Prescription Gynaecology & OBS Consultation Software Password Reset change_password_save cross-site request forgery",
"tags": [
"vdb-entry",
"x_snapshot"
]
},
{
"url": "https://vuldb.com/?ctiid.256046/adp-test-6-28",
"name": "VDB-256046 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required",
"x_snapshot"
]
},
{
"url": "https://drive.google.com/file/d/1SVYLzbnYzSyun79QBOsRuWuMkzyjclJM/view?usp=drivesdk/adp-test-6-28",
"tags": [
"exploit",
"x_snapshot"
]
}
]
}
Expand Down
13 changes: 11 additions & 2 deletions cves/2024/2xxx/CVE-2024-2278.json
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
"assignerShortName": "WPScan",
"dateReserved": "2024-03-07T14:54:10.963Z",
"datePublished": "2024-04-01T05:00:02.466Z",
"dateUpdated": "2024-06-21T15:32:44.507Z"
"dateUpdated": "2024-07-05T14:16:46.828Z"
},
"containers": {
"cna": {
Expand Down Expand Up @@ -115,7 +115,7 @@
"providerMetadata": {
"orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325",
"shortName": "secretariat-reference",
"dateUpdated": "2024-06-21T15:32:44.507Z"
"dateUpdated": "2024-07-05T14:16:46.828Z"
},
"references": [
{
Expand All @@ -126,6 +126,15 @@
"technical-description",
"x_cve_prog_secretariat_snapshot"
]
},
{
"url": "https://wpscan.com/vulnerability/2cbabde8-1e3e-4205-8a5c-b889447236a0//adp-test-6-28",
"tags": [
"exploit",
"vdb-entry",
"technical-description",
"x_snapshot"
]
}
]
}
Expand Down
Loading

0 comments on commit f744101

Please sign in to comment.