Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-34580

EPSS 0.02% · P5
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-34580

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Apache XML Security for C++ through 2.0.4 implements the XML Signature Syntax and Processing (XMLDsig) specification without protection against an SSRF payload in a KeyInfo element. NOTE: the project disputes this CVE Record on the grounds that any vulnerabilities are the result of a failure to configure XML Security for C++ securely. Even when avoiding this particular issue, any use of this library would need considerable additional code and a deep understanding of the standards and protocols involved to arrive at a secure implementation for any particular use case. We recommend against continued direct use of this library.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Apache Santuario 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Apache Santuario是美国阿帕奇(Apache)基金会的一套实现XML的主要安全标准,它包含两个库:Apache XML Security for Java和Apache XML Security for C++。 Apache Santuario 存在安全漏洞,该漏洞源于针对 KeyInfo 元素中的服务器端请求伪造载荷提供保护。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2024-34580

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-34580

登录查看更多情报信息。

Same Patch Batch · n/a · 2024-06-26 · 20 CVEs total

CVE-2024-215206.1 MEDIUMDjango REST framework 安全漏洞
CVE-2024-38950Libde265 安全漏洞
CVE-2023-26877SoftExpert Excellence Suite 安全漏洞
CVE-2024-36829Teldat M1 安全漏洞
CVE-2024-33327LumisXP 安全漏洞
CVE-2024-33328LumisXP 安全漏洞
CVE-2024-33329LumisXP 安全漏洞
CVE-2024-33326Lumisxp 安全漏洞
CVE-2024-37734OpenEMR 安全漏洞
CVE-2024-37571SAS Broker 安全漏洞
CVE-2024-38949Libde265 安全漏洞
CVE-2024-23766HMS Networks Anybus X-Gateway AB7832-F3 安全漏洞
CVE-2024-23765HMS Networks Anybus X-Gateway AB7832-F3 安全漏洞
CVE-2024-23767HMS Networks Anybus X-Gateway AB7832-F3 安全漏洞
CVE-2024-35545MAPOS 安全漏洞
CVE-2024-39243skycaiji 安全漏洞
CVE-2024-39242skycaiji 安全漏洞
CVE-2024-39241skycaiji 安全漏洞
CVE-2024-34581W3C XML Signature 安全漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2024-34580

No comments yet


Leave a comment