mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 18:52:58 +00:00
Auto-Update: 2024-07-28T16:00:17.458342+00:00
This commit is contained in:
parent
359d68e15d
commit
138e23f6c5
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-14335",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2018-07-24T13:29:00.603",
|
||||
"lastModified": "2023-11-07T02:52:55.320",
|
||||
"lastModified": "2024-07-28T14:15:10.147",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -110,6 +110,10 @@
|
||||
"url": "https://lists.apache.org/thread.html/582d4165de6507b0be82d5a6f9a1ce392ec43a00c9fed32bacf7fe1e%40%3Cuser.ignite.apache.org%3E",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240726-0003/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/45105/",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-40897",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-07-26T06:15:02.290",
|
||||
"lastModified": "2024-07-26T12:38:41.683",
|
||||
"lastModified": "2024-07-28T14:15:10.533",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -17,6 +17,10 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/26/1",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/GStreamer/orc",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-4032",
|
||||
"sourceIdentifier": "cna@python.org",
|
||||
"published": "2024-06-17T15:15:52.517",
|
||||
"lastModified": "2024-06-20T12:44:22.977",
|
||||
"lastModified": "2024-07-28T14:15:10.783",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -57,6 +57,10 @@
|
||||
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/NRUHDUS2IV2USIZM2CVMSFL6SCKU3RZA/",
|
||||
"source": "cna@python.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240726-0004/",
|
||||
"source": "cna@python.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml",
|
||||
"source": "cna@python.org"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-5458",
|
||||
"sourceIdentifier": "security@php.net",
|
||||
"published": "2024-06-09T19:15:52.397",
|
||||
"lastModified": "2024-06-18T10:15:10.870",
|
||||
"lastModified": "2024-07-28T14:15:10.873",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -171,6 +171,10 @@
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/",
|
||||
"source": "security@php.net"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240726-0001/",
|
||||
"source": "security@php.net"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-5585",
|
||||
"sourceIdentifier": "security@php.net",
|
||||
"published": "2024-06-09T19:15:52.597",
|
||||
"lastModified": "2024-06-13T04:15:17.407",
|
||||
"lastModified": "2024-07-28T14:15:11.033",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -160,6 +160,10 @@
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/",
|
||||
"source": "security@php.net"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240726-0002/",
|
||||
"source": "security@php.net"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-5642",
|
||||
"sourceIdentifier": "cna@python.org",
|
||||
"published": "2024-06-27T21:15:16.070",
|
||||
"lastModified": "2024-07-01T14:15:05.807",
|
||||
"lastModified": "2024-07-28T14:15:11.220",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -40,6 +40,10 @@
|
||||
{
|
||||
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/PLP2JI3PJY33YG6P5BZYSSNU66HASXBQ/",
|
||||
"source": "cna@python.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240726-0005/",
|
||||
"source": "cna@python.org"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2024/CVE-2024-71xx/CVE-2024-7158.json
Normal file
137
CVE-2024/CVE-2024-71xx/CVE-2024-7158.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-7158",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-28T14:15:11.303",
|
||||
"lastModified": "2024-07-28T14:15:11.303",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in TOTOLINK A3100R 4.1.2cu.5050_B20200504. It has been declared as critical. This vulnerability affects the function setTelnetCfg of the file /cgi-bin/cstecgi.cgi of the component HTTP POST Request Handler. The manipulation of the argument telnet_enabled leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-272572. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3100R/setTelnetCfg.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.272572",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.272572",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.377543",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2024/CVE-2024-71xx/CVE-2024-7159.json
Normal file
137
CVE-2024/CVE-2024-71xx/CVE-2024-7159.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-7159",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-28T15:15:09.897",
|
||||
"lastModified": "2024-07-28T15:15:09.897",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in TOTOLINK A3600R 4.1.2cu.5182_B20201102. It has been rated as critical. This issue affects some unknown processing of the file /web_cste/cgi-bin/product.ini of the component Telnet Service. The manipulation leads to use of hard-coded password. The exploit has been disclosed to the public and may be used. The identifier VDB-272573 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "ADJACENT",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:A/AC:M/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "ADJACENT_NETWORK",
|
||||
"accessComplexity": "MEDIUM",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 4.9
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 4.4,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-259"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3600R/product.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.272573",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.272573",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.377942",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2024/CVE-2024-71xx/CVE-2024-7160.json
Normal file
137
CVE-2024/CVE-2024-71xx/CVE-2024-7160.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-7160",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-28T15:15:10.163",
|
||||
"lastModified": "2024-07-28T15:15:10.163",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in TOTOLINK A3700R 9.1.2u.5822_B20200513. Affected is the function setWanCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument hostName leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-272574 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3700R/setWanCfg.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.272574",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.272574",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.377080",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
23
README.md
23
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-07-28T12:00:16.877688+00:00
|
||||
2024-07-28T16:00:17.458342+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-07-28T11:15:12.107000+00:00
|
||||
2024-07-28T15:15:10.163000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,23 +33,28 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
258098
|
||||
258101
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `4`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
- [CVE-2024-7154](CVE-2024/CVE-2024-71xx/CVE-2024-7154.json) (`2024-07-28T10:15:01.897`)
|
||||
- [CVE-2024-7155](CVE-2024/CVE-2024-71xx/CVE-2024-7155.json) (`2024-07-28T10:15:03.053`)
|
||||
- [CVE-2024-7156](CVE-2024/CVE-2024-71xx/CVE-2024-7156.json) (`2024-07-28T11:15:11.820`)
|
||||
- [CVE-2024-7157](CVE-2024/CVE-2024-71xx/CVE-2024-7157.json) (`2024-07-28T11:15:12.107`)
|
||||
- [CVE-2024-7158](CVE-2024/CVE-2024-71xx/CVE-2024-7158.json) (`2024-07-28T14:15:11.303`)
|
||||
- [CVE-2024-7159](CVE-2024/CVE-2024-71xx/CVE-2024-7159.json) (`2024-07-28T15:15:09.897`)
|
||||
- [CVE-2024-7160](CVE-2024/CVE-2024-71xx/CVE-2024-7160.json) (`2024-07-28T15:15:10.163`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `6`
|
||||
|
||||
- [CVE-2018-14335](CVE-2018/CVE-2018-143xx/CVE-2018-14335.json) (`2024-07-28T14:15:10.147`)
|
||||
- [CVE-2024-4032](CVE-2024/CVE-2024-40xx/CVE-2024-4032.json) (`2024-07-28T14:15:10.783`)
|
||||
- [CVE-2024-40897](CVE-2024/CVE-2024-408xx/CVE-2024-40897.json) (`2024-07-28T14:15:10.533`)
|
||||
- [CVE-2024-5458](CVE-2024/CVE-2024-54xx/CVE-2024-5458.json) (`2024-07-28T14:15:10.873`)
|
||||
- [CVE-2024-5585](CVE-2024/CVE-2024-55xx/CVE-2024-5585.json) (`2024-07-28T14:15:11.033`)
|
||||
- [CVE-2024-5642](CVE-2024/CVE-2024-56xx/CVE-2024-5642.json) (`2024-07-28T14:15:11.220`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
23
_state.csv
23
_state.csv
@ -115023,7 +115023,7 @@ CVE-2018-14331,0,0,1733e7b3c78eb173f6e76f921a4b1f5947023f3b6403afccde2b928f50210
|
||||
CVE-2018-14332,0,0,bb15d876c7c697bea436f2865b795a9464bdc96c3e27a980a0cfbfc5eaefa1ff,2019-07-21T12:15:13.647000
|
||||
CVE-2018-14333,0,0,fca5b144141c8927646c58c7bf28b597b8cc11ea66f929f8037c82fecde2aef0,2018-09-17T19:51:15.093000
|
||||
CVE-2018-14334,0,0,2ed445cefbd8dc02dae3c6c9bb32557a08ace5b6278ac6d3207390bbfcf2221e,2018-09-17T17:02:03.977000
|
||||
CVE-2018-14335,0,0,5d499148b9cc758861927231b02255c4892e1fadd5e68d55bbd846c132264ce7,2023-11-07T02:52:55.320000
|
||||
CVE-2018-14335,0,1,361d3b12f9d2d87aaa191fed7231ae88731002f76b4b62dfcffe8773ab51919a,2024-07-28T14:15:10.147000
|
||||
CVE-2018-14336,0,0,537b076def27ceed63df540357c12c791443f0b9f11d7b54320de106daf70d90,2018-09-18T12:14:00.220000
|
||||
CVE-2018-14337,0,0,275d721464bb61f28b281bbc31f5f1039135b556716ccbc6030085efcabb1a71,2022-05-12T20:12:40.610000
|
||||
CVE-2018-14338,0,0,094ebee330e8d8e57b8626935c8559ca2b75ef5f03880febde375b1a53fb3eae,2018-09-17T14:25:43.537000
|
||||
@ -255555,7 +255555,7 @@ CVE-2024-4029,0,0,07f4a3557bfc1c26259e7db528f531861deb0f132a9070099c7eec2168b5c6
|
||||
CVE-2024-4030,0,0,5921f7a0bad0c927ce4dbb50662fc4a35b1a0000bcf4f0fcdcf8646834ec4372,2024-07-05T16:15:05.520000
|
||||
CVE-2024-4031,0,0,5f28e8c1b5067aec87f50d97cb32ada2d0e893cae64c0dbc730c44d567aac95b,2024-04-23T12:52:09.397000
|
||||
CVE-2024-40318,0,0,76064a0f8effb6d4b5e055e7ecef1c72c0b9ff1e125f96aea44f1996f0e67824,2024-07-26T12:38:41.683000
|
||||
CVE-2024-4032,0,0,3888c98c0dc9113e1403e75c67bd485cc9805e1b1c4cbd087358208523feaf6e,2024-06-20T12:44:22.977000
|
||||
CVE-2024-4032,0,1,3096efec5a4aac10abf7764e78ac4ae4cb7cabc4d2a57ccc635113d230119926,2024-07-28T14:15:10.783000
|
||||
CVE-2024-40322,0,0,9e0e5f7f0965d0ebc33e4a2793beba8c7539aefbe8b3463a17519c41c1cd56fe,2024-07-16T18:00:02.110000
|
||||
CVE-2024-40324,0,0,42ba2e9c480b101fd6baf201acbd20948dbfb546f5560ac981356a7b4da905aa,2024-07-26T12:38:41.683000
|
||||
CVE-2024-40328,0,0,1ecb3aeeb912c43ca654a9972851beb0d9eb6ba5a46f3041ea2c2c60432dd8b1,2024-07-11T15:06:20.507000
|
||||
@ -255724,7 +255724,7 @@ CVE-2024-4087,0,0,559dc8fcb531eb7d96e390fa33463b50a20c5a688e8dbefeb3187bf1d2c5f7
|
||||
CVE-2024-40872,0,0,61b6054f8d04261e92c08a44feec16dc1d8422a97543a2162e5dea5f0a6c8f9d,2024-07-26T12:38:41.683000
|
||||
CVE-2024-40873,0,0,16fd81fc79820f32ad2e7940b90409fc2d2f9351443634159d6f5e89b93d7b04,2024-07-26T12:38:41.683000
|
||||
CVE-2024-4088,0,0,61cc31924b86843bbd20c326ef7465dc1aa394b548458b2e1a9fc62c09ede628,2024-06-11T17:11:30.193000
|
||||
CVE-2024-40897,0,0,cd22e86e936352ba2702c5589042c441592bbfece3d34cdd2d76ce958bfde819,2024-07-26T12:38:41.683000
|
||||
CVE-2024-40897,0,1,6abf47f4a62ea89c178f137de2c06b0ad3aa344f78325532ce36c2ccb3219895,2024-07-28T14:15:10.533000
|
||||
CVE-2024-40898,0,0,6d797ebcdf9c53e0eade3a2c00a2f7d68b1d101b3405603dd30cc2157b772084,2024-07-18T12:28:43.707000
|
||||
CVE-2024-40899,0,0,e950acc969e56b6fc4b2198a92989ebcef19e4b4c9a9c8ad08fee90da2bba031,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40900,0,0,d5b683c8350615b20febf47a29bbffae93edd0a350147e3cd873aa7a5a37926c,2024-07-12T16:34:58.687000
|
||||
@ -257133,7 +257133,7 @@ CVE-2024-5453,0,0,b20a0834ca5689b452f6b7173de63ab33385cf72d5d8c59a0cf15e703dd6a3
|
||||
CVE-2024-5455,0,0,504a2312040d893e95d789f867e1d4122509ea9da589bac420b384edcb7af3cf,2024-07-17T13:46:09.660000
|
||||
CVE-2024-5456,0,0,4fbbd7e22723b0ac292a15510bd5e2f1843cb88c35dba173a43ab7680f62380a,2024-07-09T18:19:14.047000
|
||||
CVE-2024-5457,0,0,4bd3534e5c8e3846c6373878cbe704c78d4a9804975dea52f238f183cca2c68c,2024-07-19T17:55:55.343000
|
||||
CVE-2024-5458,0,0,ecce33b383e3250d0d6482d44440ec6cfd4fced73f96f924c4a6b853790d20fc,2024-06-18T10:15:10.870000
|
||||
CVE-2024-5458,0,1,15d5d5122295bf487ddcc0439ec7e3e6917eb8c9580bdae9f46ee7c9f1777fae,2024-07-28T14:15:10.873000
|
||||
CVE-2024-5459,0,0,c2af4e92b1764c27a294b8b9210b2518bf4b2703cdeb9e4502885231e13d99a3,2024-06-13T19:35:55.083000
|
||||
CVE-2024-5460,0,0,4e099435e4545094901bd58b61fc926119ab5684f745a9d9aa540744798c104f,2024-06-26T12:44:29.693000
|
||||
CVE-2024-5463,0,0,4d43b352cf9202f80c2f04ee56f4d6c5363c98e3eebea680338a85f124fca31c,2024-06-04T16:57:41.053000
|
||||
@ -257225,7 +257225,7 @@ CVE-2024-5575,0,0,0d0faeec0f613a9625ccc8cb2724627ce688cebf183de5add4fa7e9fd84a30
|
||||
CVE-2024-5577,0,0,5dd16baf94f18e7abae39f40d89c75af3dba9492f2b1af50e3d8516c5413b1e4,2024-06-17T12:42:04.623000
|
||||
CVE-2024-5582,0,0,3868d6c914880d2428453bd960a7aeb89cb5bb99f0fc09b9de444e14a34c6012,2024-07-19T16:05:10.290000
|
||||
CVE-2024-5584,0,0,7705ff7ae1b4fd1342d12756cedf379ac85bb5a3b8398b6b986f5e220e43afde,2024-06-11T13:54:12.057000
|
||||
CVE-2024-5585,0,0,9e089b029f69ddc50638e027531ef06d5e8acf986dd2efdfe6f9d39673e035c3,2024-06-13T04:15:17.407000
|
||||
CVE-2024-5585,0,1,b8a6130124c428c97635ba022f402f27dfa4e9cda99398d4024d0e451e3796fc,2024-07-28T14:15:11.033000
|
||||
CVE-2024-5587,0,0,6b9958828217f46ad00f93a8982028b537e303232ee58bb83f00389806575abd,2024-06-03T14:46:24.250000
|
||||
CVE-2024-5588,0,0,acef4f2a5b13b06d4d5ee520a9930094f7a31b3a0afbb85d203e32266b0c3daf,2024-06-04T19:21:10.267000
|
||||
CVE-2024-5589,0,0,b953e771129cea5914eaea0b8a60776be2e7649c39db097d6b9bdb3cfd517741,2024-06-03T14:46:24.250000
|
||||
@ -257267,7 +257267,7 @@ CVE-2024-5638,0,0,9dfdc1073077c73ad2f6423bd04e6b960706baa670ad3ef02a627876a0c1ff
|
||||
CVE-2024-5639,0,0,492ad0d47d56549888d5f48237edc279d0d32d853604c73193623cce2eae0704,2024-06-24T19:24:23.883000
|
||||
CVE-2024-5640,0,0,9b7c1b85267a9cc2caf72f61af05d24f2e85f909270110c050e922f8e0836e8a,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5641,0,0,1f23612877686d6e5143238f62dc02125c3d0a0d8a2499e0ec524473edb424e6,2024-07-05T17:14:44.840000
|
||||
CVE-2024-5642,0,0,473e29d44a01c1bd9d78a11628480be9d88df99635e7b451adc74e5ff8ecb62e,2024-07-01T14:15:05.807000
|
||||
CVE-2024-5642,0,1,bf58acd5f015124d4fa0c6ffb75779edb6afb99b41961d291eb7083813f4952e,2024-07-28T14:15:11.220000
|
||||
CVE-2024-5644,0,0,bd94085a240294e1c5f68d1f90c69c4fad395903cecf449c34955bd87fe371a3,2024-07-15T13:00:34.853000
|
||||
CVE-2024-5645,0,0,81ee0a48f8169b5fa6535595d6aeb783fba06dd48c6af38e338fa98641a45635,2024-06-11T17:57:47.197000
|
||||
CVE-2024-5646,0,0,54dff546debf316c7620aa15614b89fe6dc050f45cfaa67554d377c50ceda179,2024-06-13T18:36:09.013000
|
||||
@ -258093,7 +258093,10 @@ CVE-2024-7128,0,0,47460bc57c903b3fabdb73433c3bfc4f54879d354fc8cdc474587e0d4d4fa6
|
||||
CVE-2024-7151,0,0,06232e614d6867686f3c84d16156f95141f38a0335ce80e22280064659e83e56,2024-07-27T20:15:09.650000
|
||||
CVE-2024-7152,0,0,aac814756563dfb6eac01900cd30616c2d9c9df404e1ca487beb8a14d5d8de14,2024-07-27T21:15:09.743000
|
||||
CVE-2024-7153,0,0,32210d4464beb2119e16e6b44aee6361e3b850929f8029ca84d08fdbc2594529,2024-07-27T22:15:01.833000
|
||||
CVE-2024-7154,1,1,722e1cbe890e398365f8f0cf4f116924e0c3343019d5ec36c94189f3fa92b41d,2024-07-28T10:15:01.897000
|
||||
CVE-2024-7155,1,1,4216904d1fea5d4ec7e81cf57cd860ab32f7a4a7c445fe5cd8c2c9d3583d0fb7,2024-07-28T10:15:03.053000
|
||||
CVE-2024-7156,1,1,a04911f2fb7c065ecb3a79e8f1ac4e166133c01ea464282e46a6dc652b3dd459,2024-07-28T11:15:11.820000
|
||||
CVE-2024-7157,1,1,fc6f6b2cc34fd8697df19cbf17fcd4cd27eae2140fe5a399729db35436fd0871,2024-07-28T11:15:12.107000
|
||||
CVE-2024-7154,0,0,722e1cbe890e398365f8f0cf4f116924e0c3343019d5ec36c94189f3fa92b41d,2024-07-28T10:15:01.897000
|
||||
CVE-2024-7155,0,0,4216904d1fea5d4ec7e81cf57cd860ab32f7a4a7c445fe5cd8c2c9d3583d0fb7,2024-07-28T10:15:03.053000
|
||||
CVE-2024-7156,0,0,a04911f2fb7c065ecb3a79e8f1ac4e166133c01ea464282e46a6dc652b3dd459,2024-07-28T11:15:11.820000
|
||||
CVE-2024-7157,0,0,fc6f6b2cc34fd8697df19cbf17fcd4cd27eae2140fe5a399729db35436fd0871,2024-07-28T11:15:12.107000
|
||||
CVE-2024-7158,1,1,8b4598ff93542df87dc175453c9bd95fdcaeec8b3f59030fa45c1c99578e1b2d,2024-07-28T14:15:11.303000
|
||||
CVE-2024-7159,1,1,aa09cdc774bb904f7578dd0ed9d500a7cba38cf5f5fa8676610887cb373b3a30,2024-07-28T15:15:09.897000
|
||||
CVE-2024-7160,1,1,bd957275ec2f0f7bf2b2b785f1d1add29975b97e07067566cb44747fa4fcc461,2024-07-28T15:15:10.163000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user