Skip to content

Commit

Permalink
generated content from 2024-04-04
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Apr 4, 2024
1 parent 36049bd commit c2c34d8
Show file tree
Hide file tree
Showing 166 changed files with 3,795 additions and 0 deletions.
165 changes: 165 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -230501,3 +230501,168 @@ vulnerability,CVE-2020-36826,vulnerability--eea9fa82-7dea-4491-b676-3596b52c068d
vulnerability,CVE-2020-36827,vulnerability--db4a16cd-f1e1-4c80-8abd-6c910fb12a0c
vulnerability,CVE-2020-36828,vulnerability--86eee5bb-2e5f-4428-aa3e-dec294bcb2e8
vulnerability,CVE-2020-36825,vulnerability--dda67917-e0a9-4c9d-8c4d-16758b8cebe9
vulnerability,CVE-2023-44039,vulnerability--1e595741-f160-4312-a1fa-4914e028bf4a
vulnerability,CVE-2023-44040,vulnerability--b76cfc2f-0737-4e19-a9fc-5d6dd5d768b0
vulnerability,CVE-2023-44038,vulnerability--982c6ff9-5eec-41f8-9d6d-ca7fd76f66a8
vulnerability,CVE-2023-34423,vulnerability--08745a61-7d07-4ee1-a5f7-dd525fab01da
vulnerability,CVE-2023-38729,vulnerability--1c1607fa-b696-40c5-9ba8-5c44248cbe5b
vulnerability,CVE-2023-25699,vulnerability--57094cef-2e9e-4442-a6fa-ae77045062f5
vulnerability,CVE-2023-35764,vulnerability--811cbc6b-8a95-4acf-a835-faf566f7ed9f
vulnerability,CVE-2023-35812,vulnerability--8a646205-08c1-4e4a-8d17-72a683b8df9e
vulnerability,CVE-2023-45552,vulnerability--cbdb3be5-3f11-4753-8c7f-33a2b0c77775
vulnerability,CVE-2023-52639,vulnerability--fc75007c-c703-45aa-85ac-f67d9ac21b13
vulnerability,CVE-2023-52638,vulnerability--ac637727-0f9e-4dc1-95f4-4029a3d4e1f0
vulnerability,CVE-2023-52637,vulnerability--2e0ec897-654c-4783-848a-8cc76d495cbf
vulnerability,CVE-2023-52296,vulnerability--e9e4e7d2-3d36-4b1d-a233-1f6de3897537
vulnerability,CVE-2021-27312,vulnerability--c1674afb-875e-4193-adfc-caf74a9c3235
vulnerability,CVE-2024-1327,vulnerability--15191d7c-c7f9-40d9-9aa6-607d8e8c038c
vulnerability,CVE-2024-1180,vulnerability--b7f617ac-a636-49d2-967b-94053f78732d
vulnerability,CVE-2024-24976,vulnerability--fa20c0c1-5386-461e-b0be-1517a728c111
vulnerability,CVE-2024-24506,vulnerability--86b975aa-9fcd-4f2d-8d90-53121aed0f55
vulnerability,CVE-2024-24707,vulnerability--79ed5f12-de49-47ad-a2a8-045a392f3fc7
vulnerability,CVE-2024-24724,vulnerability--e58ab719-ce01-4acc-a9e1-e92b758fa89a
vulnerability,CVE-2024-3226,vulnerability--55755d73-7297-42c9-b7fe-627b2306b9f3
vulnerability,CVE-2024-3259,vulnerability--af98d49b-4981-439e-bd95-f6add6e27591
vulnerability,CVE-2024-3225,vulnerability--2e8220b0-8d8f-45bf-acc7-46d772ec7363
vulnerability,CVE-2024-3222,vulnerability--26ddbbc8-85c1-4e1c-b171-41b2ee502676
vulnerability,CVE-2024-3256,vulnerability--acc2c6c8-afbc-4b57-885b-74cd28d1351b
vulnerability,CVE-2024-3223,vulnerability--169f08fa-552d-4541-a60b-c81af0294f81
vulnerability,CVE-2024-3227,vulnerability--b8a6625a-cf3a-401a-9889-74d28e3171f2
vulnerability,CVE-2024-3252,vulnerability--e75d21e7-fa1f-493a-91f7-e4bae094710d
vulnerability,CVE-2024-3254,vulnerability--f372d7f5-9cfd-46b0-81cf-5e03fc9ee08f
vulnerability,CVE-2024-3162,vulnerability--ab4a864f-c027-4516-863a-62714a24ca36
vulnerability,CVE-2024-3253,vulnerability--412812c3-1aa7-4ab2-94b4-07d5c0df99d7
vulnerability,CVE-2024-3224,vulnerability--6acb17ed-1728-45bf-850e-8a5c60d1abfb
vulnerability,CVE-2024-3257,vulnerability--f3f3a794-5978-4219-a77e-248095c3d46c
vulnerability,CVE-2024-3251,vulnerability--e9bbc371-78d3-4aa5-909f-416b3026089b
vulnerability,CVE-2024-3258,vulnerability--9ecb152d-b496-4722-801d-0091ea1598d0
vulnerability,CVE-2024-3255,vulnerability--e9c47088-70e7-4a8a-92f5-ec5a44ea856e
vulnerability,CVE-2024-28836,vulnerability--2af7db31-79c2-48b9-9590-af5a9dd81de4
vulnerability,CVE-2024-28589,vulnerability--00a97815-c81f-4717-a59a-b6704d3dc4f3
vulnerability,CVE-2024-28755,vulnerability--0f73f27b-1499-432c-a102-9997bdac3c8e
vulnerability,CVE-2024-28275,vulnerability--01933191-f59d-431c-b4df-4e6fddb49ad4
vulnerability,CVE-2024-28219,vulnerability--c417bd01-dfec-482c-a634-d0c94ac243f4
vulnerability,CVE-2024-28782,vulnerability--08b0046b-a588-45a9-9411-e9b940430ac1
vulnerability,CVE-2024-28515,vulnerability--953983cd-b775-4cd3-aa03-808e98ddadd8
vulnerability,CVE-2024-21870,vulnerability--3addd344-6546-49b5-b256-9033df8ad917
vulnerability,CVE-2024-29734,vulnerability--e904b953-8125-4425-824d-c73888252616
vulnerability,CVE-2024-29477,vulnerability--5fce294b-b6cf-4a50-a69a-a00f7f738f05
vulnerability,CVE-2024-22178,vulnerability--a082dcaa-699b-41d5-aaf4-70f1ac26c520
vulnerability,CVE-2024-22360,vulnerability--c2614f8e-9f69-4147-8cdf-2bd2f6da9f20
vulnerability,CVE-2024-27346,vulnerability--ea0653d5-6426-46a7-9869-b420de277c67
vulnerability,CVE-2024-27674,vulnerability--79532f4b-2cd8-4935-8860-e9f5f8284dd3
vulnerability,CVE-2024-27951,vulnerability--470fc4a4-4ef8-4f65-950a-e8f0089e3078
vulnerability,CVE-2024-27972,vulnerability--5f2617b5-750c-4a09-8b94-a6097cebce19
vulnerability,CVE-2024-27342,vulnerability--5426bcc7-39ed-468f-9530-136663453635
vulnerability,CVE-2024-27345,vulnerability--c92633a0-51d2-407e-bcd3-f230621e627e
vulnerability,CVE-2024-27341,vulnerability--23375c27-ea3e-4d2b-a4a6-bfe6f32dc4e5
vulnerability,CVE-2024-27201,vulnerability--86bb2828-6fd3-4c67-8169-ee8d6f72b084
vulnerability,CVE-2024-27336,vulnerability--4ef9bd9a-48b0-44ea-9395-fb77abfe034d
vulnerability,CVE-2024-27191,vulnerability--bec05086-3100-490c-8d1d-8ac6183fa019
vulnerability,CVE-2024-27339,vulnerability--78eadc4e-0250-4379-bba8-539e1ab61b85
vulnerability,CVE-2024-27344,vulnerability--5f971684-fa29-4258-8d7c-1d7b66031f5f
vulnerability,CVE-2024-27343,vulnerability--a3fadca0-1091-4bd2-beca-c964cbaf1190
vulnerability,CVE-2024-27340,vulnerability--60b861a6-24e8-4bb8-8b99-c74c0ec3eec6
vulnerability,CVE-2024-27254,vulnerability--cfaa8c78-a0d9-4174-9bb8-67136c08854f
vulnerability,CVE-2024-27338,vulnerability--b56241d0-a49b-47ee-925a-5abbc3a5e54b
vulnerability,CVE-2024-27335,vulnerability--7b44aff2-0508-41fd-844f-6d1a6194808c
vulnerability,CVE-2024-27337,vulnerability--8e5ac675-3dee-4e16-81e1-1dc95264cb89
vulnerability,CVE-2024-0394,vulnerability--9f730d60-1d0a-4407-8cef-a3fccd118061
vulnerability,CVE-2024-0172,vulnerability--84df174e-0d14-47ca-9b43-120f444f077d
vulnerability,CVE-2024-25096,vulnerability--69202cbc-beb4-47cf-8f20-85533a304d98
vulnerability,CVE-2024-25046,vulnerability--b43e5b0d-8f4c-48d1-95f0-a552aafe6fc9
vulnerability,CVE-2024-25918,vulnerability--225cb2bd-e557-4c17-a681-750b35056bee
vulnerability,CVE-2024-25864,vulnerability--db3f1588-d4fc-475f-85ee-ddb148269565
vulnerability,CVE-2024-25030,vulnerability--985ee209-655b-400c-8d1e-98dde0428eaf
vulnerability,CVE-2024-2322,vulnerability--1d160bd3-3637-4548-925e-a830a7badfbb
vulnerability,CVE-2024-2879,vulnerability--02150da9-1a63-4c99-9f83-8c0db7b5ecea
vulnerability,CVE-2024-26495,vulnerability--ac65cac5-d534-4c4f-b111-6112876114af
vulnerability,CVE-2024-26720,vulnerability--84d998b9-2278-4770-ba6e-4452190537a3
vulnerability,CVE-2024-26706,vulnerability--4100ff6f-f1dc-4d7e-acdf-cab38c14774b
vulnerability,CVE-2024-26698,vulnerability--1723b009-f410-4541-9095-01a6132f3dd1
vulnerability,CVE-2024-26723,vulnerability--0eaee491-faaa-495e-a0b8-289983fcff28
vulnerability,CVE-2024-26718,vulnerability--7454852d-f1ab-44ad-b7db-165fe414c867
vulnerability,CVE-2024-26697,vulnerability--619d6770-8f51-4ca4-84ab-6495b9f7177a
vulnerability,CVE-2024-26710,vulnerability--19ccfce1-9e50-4f06-a042-0468e228bef0
vulnerability,CVE-2024-26702,vulnerability--c5a268ad-c455-4683-8b9b-82f54dc6994c
vulnerability,CVE-2024-26704,vulnerability--d2d61ffc-71b9-4c7f-a9ba-8b360059ede7
vulnerability,CVE-2024-26699,vulnerability--7e446669-7751-4036-8b29-cba2627e2a89
vulnerability,CVE-2024-26717,vulnerability--7a7d6a2d-32b6-4e03-86cc-8217a2613091
vulnerability,CVE-2024-26708,vulnerability--b6ed3500-56a8-465b-939e-22b05ea86c98
vulnerability,CVE-2024-26689,vulnerability--4b88cfd2-78af-4b66-8a6f-b28bd65dedfd
vulnerability,CVE-2024-26695,vulnerability--d3968358-1e79-48cb-8606-7bf676a65761
vulnerability,CVE-2024-26703,vulnerability--a68ef215-3309-44c1-b6fa-5c3de85e409e
vulnerability,CVE-2024-26685,vulnerability--da7c4013-066e-4811-bf80-5068d3047157
vulnerability,CVE-2024-26726,vulnerability--710f73b3-8a57-442d-b74f-1ac25e376c62
vulnerability,CVE-2024-26686,vulnerability--1abe05f1-1ebe-4380-af39-361cbdf1a5cd
vulnerability,CVE-2024-26688,vulnerability--5603d3cd-9e4f-41ed-98c6-b38fe40896f9
vulnerability,CVE-2024-26687,vulnerability--b1a5ad74-1c03-41be-a9a4-8408a834cada
vulnerability,CVE-2024-26700,vulnerability--51f662bc-70e3-4b7b-95bc-d096feded23f
vulnerability,CVE-2024-26694,vulnerability--54b5e617-97b2-496c-b1d5-f04c9a1dfa48
vulnerability,CVE-2024-26725,vulnerability--228f2415-adb4-4d79-9338-909a770f568c
vulnerability,CVE-2024-26692,vulnerability--ee9d9b90-dd70-40b1-92e7-88ea14d69beb
vulnerability,CVE-2024-26712,vulnerability--f8b2299b-0316-4909-af33-286c452f8626
vulnerability,CVE-2024-26727,vulnerability--72e68f65-6498-4d74-af3a-04e659a8da0f
vulnerability,CVE-2024-26721,vulnerability--6236b04d-4f37-4da1-ad89-cb688a31b5e5
vulnerability,CVE-2024-26711,vulnerability--0bb262b8-e392-4872-a931-5f9e96cf5bff
vulnerability,CVE-2024-26713,vulnerability--f7b703a8-e66c-4a74-bfdf-233a7212ead3
vulnerability,CVE-2024-26705,vulnerability--4a70ca61-f200-4c45-a804-f9015dcbcc0b
vulnerability,CVE-2024-26709,vulnerability--d1692220-16f1-47c5-a5ac-d0dd257a2e2b
vulnerability,CVE-2024-26722,vulnerability--84a844fc-2eaf-487c-bbd4-dff15f0c3d3c
vulnerability,CVE-2024-26693,vulnerability--15553c19-c41b-4a8e-9a84-15019c274ad0
vulnerability,CVE-2024-26724,vulnerability--69f5cb1f-b373-45fb-8a05-c1e2fec9a33f
vulnerability,CVE-2024-26691,vulnerability--98029fe6-6786-4627-ae7b-3d3904230e05
vulnerability,CVE-2024-26707,vulnerability--0f4b6035-63ed-400b-86ae-ad5309cd9a9f
vulnerability,CVE-2024-26690,vulnerability--bf615ee5-2728-46e5-8f29-9c7e90b2e165
vulnerability,CVE-2024-26719,vulnerability--d694c5a3-f069-4fbf-ba2a-721cad77fd9c
vulnerability,CVE-2024-26696,vulnerability--2a9f31a5-fd36-46b6-a3a1-24e80ce2b6ee
vulnerability,CVE-2024-26714,vulnerability--3448cbf9-8c3d-4431-ba8b-6a06cfbdf20c
vulnerability,CVE-2024-26716,vulnerability--54450ee9-69dc-4be4-b923-d581f93ebc0e
vulnerability,CVE-2024-26715,vulnerability--ba26da55-32bd-4af1-8e17-c5b4629441a0
vulnerability,CVE-2024-20332,vulnerability--541a8df7-e174-4664-9c19-335d68562b9b
vulnerability,CVE-2024-20281,vulnerability--3791fc34-fa6f-4d99-9989-999a2cca5e65
vulnerability,CVE-2024-20348,vulnerability--62aca3a7-5db9-40bd-924c-c9b57c3c89b5
vulnerability,CVE-2024-20334,vulnerability--74638e94-b464-49bb-b6bf-1e4f4d95da51
vulnerability,CVE-2024-20367,vulnerability--15a5ad77-dfaa-429a-ae39-8d17ccf824e3
vulnerability,CVE-2024-20347,vulnerability--ce43ec4f-2dec-4709-aaab-7818e97d5768
vulnerability,CVE-2024-20283,vulnerability--6238d0a9-8aaf-4167-bbf9-d0d2c212b5ca
vulnerability,CVE-2024-20362,vulnerability--5fa235cc-2212-45a4-9e8f-75255925bb27
vulnerability,CVE-2024-20282,vulnerability--594a1425-9307-41cc-b06e-2a39c2e24fee
vulnerability,CVE-2024-20310,vulnerability--7f32f3d0-bdaa-483b-b246-c2d14d44bdcf
vulnerability,CVE-2024-20352,vulnerability--dc772340-e816-4bcb-878b-17d723d1b742
vulnerability,CVE-2024-20302,vulnerability--d47ce1b7-c9d8-4be1-9656-52df5fd2a8f6
vulnerability,CVE-2024-20368,vulnerability--6d82cb28-3b36-4bb3-93ad-b6e7114862fe
vulnerability,CVE-2024-30330,vulnerability--4163fbeb-3d5a-456c-b80e-dea9f6cc7147
vulnerability,CVE-2024-30323,vulnerability--cf4f83d4-89a1-45e7-9111-81f131f9b01e
vulnerability,CVE-2024-30322,vulnerability--421c2b5d-1362-44e0-9cb5-b159a7452e5f
vulnerability,CVE-2024-30324,vulnerability--59a256c9-21cb-44c1-8191-602417c7d53f
vulnerability,CVE-2024-30328,vulnerability--8d7c3c88-24fd-4513-8520-7999735e7b44
vulnerability,CVE-2024-30366,vulnerability--04bbcec0-398c-4bbe-95b9-6d499cca6fdf
vulnerability,CVE-2024-30327,vulnerability--e64af5c1-ed43-4adb-a4e6-a400b16605e3
vulnerability,CVE-2024-30571,vulnerability--528aad4d-5e0c-468e-8b12-364075503516
vulnerability,CVE-2024-30572,vulnerability--c0e5ac3c-2a90-4992-9339-2d6f0a04a17a
vulnerability,CVE-2024-30332,vulnerability--e32d0d52-821c-4186-b3eb-17036d2858c9
vulnerability,CVE-2024-30333,vulnerability--417fd5f0-c327-482e-bb62-154d7ddce48c
vulnerability,CVE-2024-30998,vulnerability--83fe83cf-50cc-4fea-95fc-236eaecb0aa6
vulnerability,CVE-2024-30329,vulnerability--8eb2b87c-0c08-4c37-94ae-b8d4712cfa6f
vulnerability,CVE-2024-30570,vulnerability--180e109e-1d24-4e46-8fd2-e3e6b49af965
vulnerability,CVE-2024-30569,vulnerability--f5b87127-eca6-4f2d-af38-d741ed5a4bad
vulnerability,CVE-2024-30325,vulnerability--8e2c5501-52a6-481d-b401-e091dd1bc26c
vulnerability,CVE-2024-30334,vulnerability--00225afa-11af-46fb-b5d8-06fb3565fad3
vulnerability,CVE-2024-30166,vulnerability--adbc7ab4-fdf7-4a3e-ad87-2e1695da188c
vulnerability,CVE-2024-30326,vulnerability--a170c4b4-1376-412d-8635-56eec14645bb
vulnerability,CVE-2024-30568,vulnerability--5a449e5f-48ea-4287-8111-ac0370f0637e
vulnerability,CVE-2024-30331,vulnerability--9ae4a48d-6a2f-467d-b560-df12d9fdeadf
vulnerability,CVE-2024-23540,vulnerability--3609bc6c-68cc-4440-942b-638adb43a82d
vulnerability,CVE-2024-31008,vulnerability--0a286cdf-1fbf-4649-b1bc-57e09792f9cd
vulnerability,CVE-2024-31420,vulnerability--a6f11174-6064-4b52-a3b2-2c1b65c5c4a5
vulnerability,CVE-2024-31010,vulnerability--17868195-bc38-44f8-9b4d-0dcc90fdbc03
vulnerability,CVE-2024-31392,vulnerability--953095c9-8cfe-4869-a5a1-fab41b56502a
vulnerability,CVE-2024-31390,vulnerability--ab8a1e32-eacd-4935-bb4f-e75c687f7c4a
vulnerability,CVE-2024-31011,vulnerability--922cc86c-7dcd-402e-91e9-c8a4ccd3c19b
vulnerability,CVE-2024-31009,vulnerability--1394ec45-02a6-422e-afc0-f0e8268b764b
vulnerability,CVE-2024-31012,vulnerability--49e02516-8af4-4623-a926-f9a79bedd7a0
vulnerability,CVE-2024-31419,vulnerability--b4fcac57-a074-4d18-9bd0-cfd29ffa6bb5
vulnerability,CVE-2024-31013,vulnerability--5ce1cae7-7e73-4f08-b059-55df5332bc1a
vulnerability,CVE-2024-31393,vulnerability--f704881e-9ca4-4dff-850c-d306d310a5f6
vulnerability,CVE-2024-31380,vulnerability--1e0d3def-9f4b-4c88-bd72-92b637ad44bc
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--59f73672-6e33-4578-a4d7-5dae6c0d6eb7",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--00225afa-11af-46fb-b5d8-06fb3565fad3",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-04-04T00:28:41.52764Z",
"modified": "2024-04-04T00:28:41.52764Z",
"name": "CVE-2024-30334",
"description": "Foxit PDF Reader Doc Object Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of Doc objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22640.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-30334"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--4248675f-7b48-4727-bea0-d4cf26837188",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--00a97815-c81f-4717-a59a-b6704d3dc4f3",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-04-04T00:28:40.885207Z",
"modified": "2024-04-04T00:28:40.885207Z",
"name": "CVE-2024-28589",
"description": "An issue was discovered in Axigen Mail Server for Windows versions 10.5.18 and before, allows local low-privileged attackers to execute arbitrary code and escalate privileges via insecure DLL loading from a world-writable directory during service initialization.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-28589"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--27fc6ea8-c49d-42d8-a49e-25d754211165",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--01933191-f59d-431c-b4df-4e6fddb49ad4",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-04-04T00:28:40.905339Z",
"modified": "2024-04-04T00:28:40.905339Z",
"name": "CVE-2024-28275",
"description": "Puwell Cloud Tech Co, Ltd 360Eyes Pro v3.9.5.16(3090516) was discovered to transmit sensitive information in cleartext. This vulnerability allows attackers to intercept and access sensitive information, including users' credentials and password change requests.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-28275"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--859ab15a-94fb-408a-8e0f-f241b2ee3ec9",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--02150da9-1a63-4c99-9f83-8c0db7b5ecea",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-04-04T00:28:41.310697Z",
"modified": "2024-04-04T00:28:41.310697Z",
"name": "CVE-2024-2879",
"description": "The LayerSlider plugin for WordPress is vulnerable to SQL Injection via the ls_get_popup_markup action in versions 7.9.11 and 7.10.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-2879"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--b6363db5-d0ba-46bf-aee3-3b04474689c1",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--04bbcec0-398c-4bbe-95b9-6d499cca6fdf",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-04-04T00:28:41.506426Z",
"modified": "2024-04-04T00:28:41.506426Z",
"name": "CVE-2024-30366",
"description": "Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23002.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-30366"
}
]
}
]
}
Loading

0 comments on commit c2c34d8

Please sign in to comment.