diff --git a/CVE-2018/CVE-2018-143xx/CVE-2018-14335.json b/CVE-2018/CVE-2018-143xx/CVE-2018-14335.json index 076440785ce..e5fa625e1d7 100644 --- a/CVE-2018/CVE-2018-143xx/CVE-2018-14335.json +++ b/CVE-2018/CVE-2018-143xx/CVE-2018-14335.json @@ -2,7 +2,7 @@ "id": "CVE-2018-14335", "sourceIdentifier": "cve@mitre.org", "published": "2018-07-24T13:29:00.603", - "lastModified": "2023-11-07T02:52:55.320", + "lastModified": "2024-07-28T14:15:10.147", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -110,6 +110,10 @@ "url": "https://lists.apache.org/thread.html/582d4165de6507b0be82d5a6f9a1ce392ec43a00c9fed32bacf7fe1e%40%3Cuser.ignite.apache.org%3E", "source": "cve@mitre.org" }, + { + "url": "https://security.netapp.com/advisory/ntap-20240726-0003/", + "source": "cve@mitre.org" + }, { "url": "https://www.exploit-db.com/exploits/45105/", "source": "cve@mitre.org", diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40897.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40897.json index 25debf4a04c..9ea27bf876b 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40897.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40897.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40897", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-07-26T06:15:02.290", - "lastModified": "2024-07-26T12:38:41.683", + "lastModified": "2024-07-28T14:15:10.533", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -17,6 +17,10 @@ ], "metrics": {}, "references": [ + { + "url": "http://www.openwall.com/lists/oss-security/2024/07/26/1", + "source": "vultures@jpcert.or.jp" + }, { "url": "https://github.com/GStreamer/orc", "source": "vultures@jpcert.or.jp" diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4032.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4032.json index 91a9dc14686..0a63bcc5979 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4032.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4032.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4032", "sourceIdentifier": "cna@python.org", "published": "2024-06-17T15:15:52.517", - "lastModified": "2024-06-20T12:44:22.977", + "lastModified": "2024-07-28T14:15:10.783", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -57,6 +57,10 @@ "url": "https://mail.python.org/archives/list/security-announce@python.org/thread/NRUHDUS2IV2USIZM2CVMSFL6SCKU3RZA/", "source": "cna@python.org" }, + { + "url": "https://security.netapp.com/advisory/ntap-20240726-0004/", + "source": "cna@python.org" + }, { "url": "https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml", "source": "cna@python.org" diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5458.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5458.json index ecadc98b5f3..93f24bccd51 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5458.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5458.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5458", "sourceIdentifier": "security@php.net", "published": "2024-06-09T19:15:52.397", - "lastModified": "2024-06-18T10:15:10.870", + "lastModified": "2024-07-28T14:15:10.873", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -171,6 +171,10 @@ { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/", "source": "security@php.net" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240726-0001/", + "source": "security@php.net" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5585.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5585.json index 644861a4bc4..32ee82af164 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5585.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5585.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5585", "sourceIdentifier": "security@php.net", "published": "2024-06-09T19:15:52.597", - "lastModified": "2024-06-13T04:15:17.407", + "lastModified": "2024-07-28T14:15:11.033", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -160,6 +160,10 @@ { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/", "source": "security@php.net" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240726-0002/", + "source": "security@php.net" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5642.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5642.json index a7749223050..10d6eba67b7 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5642.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5642.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5642", "sourceIdentifier": "cna@python.org", "published": "2024-06-27T21:15:16.070", - "lastModified": "2024-07-01T14:15:05.807", + "lastModified": "2024-07-28T14:15:11.220", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -40,6 +40,10 @@ { "url": "https://mail.python.org/archives/list/security-announce@python.org/thread/PLP2JI3PJY33YG6P5BZYSSNU66HASXBQ/", "source": "cna@python.org" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240726-0005/", + "source": "cna@python.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7158.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7158.json new file mode 100644 index 00000000000..32ba34f03ed --- /dev/null +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7158.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7158", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-07-28T14:15:11.303", + "lastModified": "2024-07-28T14:15:11.303", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in TOTOLINK A3100R 4.1.2cu.5050_B20200504. It has been declared as critical. This vulnerability affects the function setTelnetCfg of the file /cgi-bin/cstecgi.cgi of the component HTTP POST Request Handler. The manipulation of the argument telnet_enabled leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-272572. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3100R/setTelnetCfg.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.272572", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.272572", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.377543", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7159.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7159.json new file mode 100644 index 00000000000..95c50ef88fb --- /dev/null +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7159.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7159", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-07-28T15:15:09.897", + "lastModified": "2024-07-28T15:15:09.897", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in TOTOLINK A3600R 4.1.2cu.5182_B20201102. It has been rated as critical. This issue affects some unknown processing of the file /web_cste/cgi-bin/product.ini of the component Telnet Service. The manipulation leads to use of hard-coded password. The exploit has been disclosed to the public and may be used. The identifier VDB-272573 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:A/AC:M/Au:S/C:P/I:P/A:P", + "accessVector": "ADJACENT_NETWORK", + "accessComplexity": "MEDIUM", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 4.9 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 4.4, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-259" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3600R/product.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.272573", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.272573", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.377942", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7160.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7160.json new file mode 100644 index 00000000000..cbd4f78f2a7 --- /dev/null +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7160.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7160", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-07-28T15:15:10.163", + "lastModified": "2024-07-28T15:15:10.163", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in TOTOLINK A3700R 9.1.2u.5822_B20200513. Affected is the function setWanCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument hostName leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-272574 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3700R/setWanCfg.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.272574", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.272574", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.377080", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index ddd2530becb..b203b47ec11 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-07-28T12:00:16.877688+00:00 +2024-07-28T16:00:17.458342+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-07-28T11:15:12.107000+00:00 +2024-07-28T15:15:10.163000+00:00 ``` ### Last Data Feed Release @@ -33,23 +33,28 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -258098 +258101 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `3` -- [CVE-2024-7154](CVE-2024/CVE-2024-71xx/CVE-2024-7154.json) (`2024-07-28T10:15:01.897`) -- [CVE-2024-7155](CVE-2024/CVE-2024-71xx/CVE-2024-7155.json) (`2024-07-28T10:15:03.053`) -- [CVE-2024-7156](CVE-2024/CVE-2024-71xx/CVE-2024-7156.json) (`2024-07-28T11:15:11.820`) -- [CVE-2024-7157](CVE-2024/CVE-2024-71xx/CVE-2024-7157.json) (`2024-07-28T11:15:12.107`) +- [CVE-2024-7158](CVE-2024/CVE-2024-71xx/CVE-2024-7158.json) (`2024-07-28T14:15:11.303`) +- [CVE-2024-7159](CVE-2024/CVE-2024-71xx/CVE-2024-7159.json) (`2024-07-28T15:15:09.897`) +- [CVE-2024-7160](CVE-2024/CVE-2024-71xx/CVE-2024-7160.json) (`2024-07-28T15:15:10.163`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `6` +- [CVE-2018-14335](CVE-2018/CVE-2018-143xx/CVE-2018-14335.json) (`2024-07-28T14:15:10.147`) +- [CVE-2024-4032](CVE-2024/CVE-2024-40xx/CVE-2024-4032.json) (`2024-07-28T14:15:10.783`) +- [CVE-2024-40897](CVE-2024/CVE-2024-408xx/CVE-2024-40897.json) (`2024-07-28T14:15:10.533`) +- [CVE-2024-5458](CVE-2024/CVE-2024-54xx/CVE-2024-5458.json) (`2024-07-28T14:15:10.873`) +- [CVE-2024-5585](CVE-2024/CVE-2024-55xx/CVE-2024-5585.json) (`2024-07-28T14:15:11.033`) +- [CVE-2024-5642](CVE-2024/CVE-2024-56xx/CVE-2024-5642.json) (`2024-07-28T14:15:11.220`) ## Download and Usage diff --git a/_state.csv b/_state.csv index b9902daf8f0..62a5b895f76 100644 --- a/_state.csv +++ b/_state.csv @@ -115023,7 +115023,7 @@ CVE-2018-14331,0,0,1733e7b3c78eb173f6e76f921a4b1f5947023f3b6403afccde2b928f50210 CVE-2018-14332,0,0,bb15d876c7c697bea436f2865b795a9464bdc96c3e27a980a0cfbfc5eaefa1ff,2019-07-21T12:15:13.647000 CVE-2018-14333,0,0,fca5b144141c8927646c58c7bf28b597b8cc11ea66f929f8037c82fecde2aef0,2018-09-17T19:51:15.093000 CVE-2018-14334,0,0,2ed445cefbd8dc02dae3c6c9bb32557a08ace5b6278ac6d3207390bbfcf2221e,2018-09-17T17:02:03.977000 -CVE-2018-14335,0,0,5d499148b9cc758861927231b02255c4892e1fadd5e68d55bbd846c132264ce7,2023-11-07T02:52:55.320000 +CVE-2018-14335,0,1,361d3b12f9d2d87aaa191fed7231ae88731002f76b4b62dfcffe8773ab51919a,2024-07-28T14:15:10.147000 CVE-2018-14336,0,0,537b076def27ceed63df540357c12c791443f0b9f11d7b54320de106daf70d90,2018-09-18T12:14:00.220000 CVE-2018-14337,0,0,275d721464bb61f28b281bbc31f5f1039135b556716ccbc6030085efcabb1a71,2022-05-12T20:12:40.610000 CVE-2018-14338,0,0,094ebee330e8d8e57b8626935c8559ca2b75ef5f03880febde375b1a53fb3eae,2018-09-17T14:25:43.537000 @@ -255555,7 +255555,7 @@ CVE-2024-4029,0,0,07f4a3557bfc1c26259e7db528f531861deb0f132a9070099c7eec2168b5c6 CVE-2024-4030,0,0,5921f7a0bad0c927ce4dbb50662fc4a35b1a0000bcf4f0fcdcf8646834ec4372,2024-07-05T16:15:05.520000 CVE-2024-4031,0,0,5f28e8c1b5067aec87f50d97cb32ada2d0e893cae64c0dbc730c44d567aac95b,2024-04-23T12:52:09.397000 CVE-2024-40318,0,0,76064a0f8effb6d4b5e055e7ecef1c72c0b9ff1e125f96aea44f1996f0e67824,2024-07-26T12:38:41.683000 -CVE-2024-4032,0,0,3888c98c0dc9113e1403e75c67bd485cc9805e1b1c4cbd087358208523feaf6e,2024-06-20T12:44:22.977000 +CVE-2024-4032,0,1,3096efec5a4aac10abf7764e78ac4ae4cb7cabc4d2a57ccc635113d230119926,2024-07-28T14:15:10.783000 CVE-2024-40322,0,0,9e0e5f7f0965d0ebc33e4a2793beba8c7539aefbe8b3463a17519c41c1cd56fe,2024-07-16T18:00:02.110000 CVE-2024-40324,0,0,42ba2e9c480b101fd6baf201acbd20948dbfb546f5560ac981356a7b4da905aa,2024-07-26T12:38:41.683000 CVE-2024-40328,0,0,1ecb3aeeb912c43ca654a9972851beb0d9eb6ba5a46f3041ea2c2c60432dd8b1,2024-07-11T15:06:20.507000 @@ -255724,7 +255724,7 @@ CVE-2024-4087,0,0,559dc8fcb531eb7d96e390fa33463b50a20c5a688e8dbefeb3187bf1d2c5f7 CVE-2024-40872,0,0,61b6054f8d04261e92c08a44feec16dc1d8422a97543a2162e5dea5f0a6c8f9d,2024-07-26T12:38:41.683000 CVE-2024-40873,0,0,16fd81fc79820f32ad2e7940b90409fc2d2f9351443634159d6f5e89b93d7b04,2024-07-26T12:38:41.683000 CVE-2024-4088,0,0,61cc31924b86843bbd20c326ef7465dc1aa394b548458b2e1a9fc62c09ede628,2024-06-11T17:11:30.193000 -CVE-2024-40897,0,0,cd22e86e936352ba2702c5589042c441592bbfece3d34cdd2d76ce958bfde819,2024-07-26T12:38:41.683000 +CVE-2024-40897,0,1,6abf47f4a62ea89c178f137de2c06b0ad3aa344f78325532ce36c2ccb3219895,2024-07-28T14:15:10.533000 CVE-2024-40898,0,0,6d797ebcdf9c53e0eade3a2c00a2f7d68b1d101b3405603dd30cc2157b772084,2024-07-18T12:28:43.707000 CVE-2024-40899,0,0,e950acc969e56b6fc4b2198a92989ebcef19e4b4c9a9c8ad08fee90da2bba031,2024-07-12T16:34:58.687000 CVE-2024-40900,0,0,d5b683c8350615b20febf47a29bbffae93edd0a350147e3cd873aa7a5a37926c,2024-07-12T16:34:58.687000 @@ -257133,7 +257133,7 @@ CVE-2024-5453,0,0,b20a0834ca5689b452f6b7173de63ab33385cf72d5d8c59a0cf15e703dd6a3 CVE-2024-5455,0,0,504a2312040d893e95d789f867e1d4122509ea9da589bac420b384edcb7af3cf,2024-07-17T13:46:09.660000 CVE-2024-5456,0,0,4fbbd7e22723b0ac292a15510bd5e2f1843cb88c35dba173a43ab7680f62380a,2024-07-09T18:19:14.047000 CVE-2024-5457,0,0,4bd3534e5c8e3846c6373878cbe704c78d4a9804975dea52f238f183cca2c68c,2024-07-19T17:55:55.343000 -CVE-2024-5458,0,0,ecce33b383e3250d0d6482d44440ec6cfd4fced73f96f924c4a6b853790d20fc,2024-06-18T10:15:10.870000 +CVE-2024-5458,0,1,15d5d5122295bf487ddcc0439ec7e3e6917eb8c9580bdae9f46ee7c9f1777fae,2024-07-28T14:15:10.873000 CVE-2024-5459,0,0,c2af4e92b1764c27a294b8b9210b2518bf4b2703cdeb9e4502885231e13d99a3,2024-06-13T19:35:55.083000 CVE-2024-5460,0,0,4e099435e4545094901bd58b61fc926119ab5684f745a9d9aa540744798c104f,2024-06-26T12:44:29.693000 CVE-2024-5463,0,0,4d43b352cf9202f80c2f04ee56f4d6c5363c98e3eebea680338a85f124fca31c,2024-06-04T16:57:41.053000 @@ -257225,7 +257225,7 @@ CVE-2024-5575,0,0,0d0faeec0f613a9625ccc8cb2724627ce688cebf183de5add4fa7e9fd84a30 CVE-2024-5577,0,0,5dd16baf94f18e7abae39f40d89c75af3dba9492f2b1af50e3d8516c5413b1e4,2024-06-17T12:42:04.623000 CVE-2024-5582,0,0,3868d6c914880d2428453bd960a7aeb89cb5bb99f0fc09b9de444e14a34c6012,2024-07-19T16:05:10.290000 CVE-2024-5584,0,0,7705ff7ae1b4fd1342d12756cedf379ac85bb5a3b8398b6b986f5e220e43afde,2024-06-11T13:54:12.057000 -CVE-2024-5585,0,0,9e089b029f69ddc50638e027531ef06d5e8acf986dd2efdfe6f9d39673e035c3,2024-06-13T04:15:17.407000 +CVE-2024-5585,0,1,b8a6130124c428c97635ba022f402f27dfa4e9cda99398d4024d0e451e3796fc,2024-07-28T14:15:11.033000 CVE-2024-5587,0,0,6b9958828217f46ad00f93a8982028b537e303232ee58bb83f00389806575abd,2024-06-03T14:46:24.250000 CVE-2024-5588,0,0,acef4f2a5b13b06d4d5ee520a9930094f7a31b3a0afbb85d203e32266b0c3daf,2024-06-04T19:21:10.267000 CVE-2024-5589,0,0,b953e771129cea5914eaea0b8a60776be2e7649c39db097d6b9bdb3cfd517741,2024-06-03T14:46:24.250000 @@ -257267,7 +257267,7 @@ CVE-2024-5638,0,0,9dfdc1073077c73ad2f6423bd04e6b960706baa670ad3ef02a627876a0c1ff CVE-2024-5639,0,0,492ad0d47d56549888d5f48237edc279d0d32d853604c73193623cce2eae0704,2024-06-24T19:24:23.883000 CVE-2024-5640,0,0,9b7c1b85267a9cc2caf72f61af05d24f2e85f909270110c050e922f8e0836e8a,2024-06-07T14:56:05.647000 CVE-2024-5641,0,0,1f23612877686d6e5143238f62dc02125c3d0a0d8a2499e0ec524473edb424e6,2024-07-05T17:14:44.840000 -CVE-2024-5642,0,0,473e29d44a01c1bd9d78a11628480be9d88df99635e7b451adc74e5ff8ecb62e,2024-07-01T14:15:05.807000 +CVE-2024-5642,0,1,bf58acd5f015124d4fa0c6ffb75779edb6afb99b41961d291eb7083813f4952e,2024-07-28T14:15:11.220000 CVE-2024-5644,0,0,bd94085a240294e1c5f68d1f90c69c4fad395903cecf449c34955bd87fe371a3,2024-07-15T13:00:34.853000 CVE-2024-5645,0,0,81ee0a48f8169b5fa6535595d6aeb783fba06dd48c6af38e338fa98641a45635,2024-06-11T17:57:47.197000 CVE-2024-5646,0,0,54dff546debf316c7620aa15614b89fe6dc050f45cfaa67554d377c50ceda179,2024-06-13T18:36:09.013000 @@ -258093,7 +258093,10 @@ CVE-2024-7128,0,0,47460bc57c903b3fabdb73433c3bfc4f54879d354fc8cdc474587e0d4d4fa6 CVE-2024-7151,0,0,06232e614d6867686f3c84d16156f95141f38a0335ce80e22280064659e83e56,2024-07-27T20:15:09.650000 CVE-2024-7152,0,0,aac814756563dfb6eac01900cd30616c2d9c9df404e1ca487beb8a14d5d8de14,2024-07-27T21:15:09.743000 CVE-2024-7153,0,0,32210d4464beb2119e16e6b44aee6361e3b850929f8029ca84d08fdbc2594529,2024-07-27T22:15:01.833000 -CVE-2024-7154,1,1,722e1cbe890e398365f8f0cf4f116924e0c3343019d5ec36c94189f3fa92b41d,2024-07-28T10:15:01.897000 -CVE-2024-7155,1,1,4216904d1fea5d4ec7e81cf57cd860ab32f7a4a7c445fe5cd8c2c9d3583d0fb7,2024-07-28T10:15:03.053000 -CVE-2024-7156,1,1,a04911f2fb7c065ecb3a79e8f1ac4e166133c01ea464282e46a6dc652b3dd459,2024-07-28T11:15:11.820000 -CVE-2024-7157,1,1,fc6f6b2cc34fd8697df19cbf17fcd4cd27eae2140fe5a399729db35436fd0871,2024-07-28T11:15:12.107000 +CVE-2024-7154,0,0,722e1cbe890e398365f8f0cf4f116924e0c3343019d5ec36c94189f3fa92b41d,2024-07-28T10:15:01.897000 +CVE-2024-7155,0,0,4216904d1fea5d4ec7e81cf57cd860ab32f7a4a7c445fe5cd8c2c9d3583d0fb7,2024-07-28T10:15:03.053000 +CVE-2024-7156,0,0,a04911f2fb7c065ecb3a79e8f1ac4e166133c01ea464282e46a6dc652b3dd459,2024-07-28T11:15:11.820000 +CVE-2024-7157,0,0,fc6f6b2cc34fd8697df19cbf17fcd4cd27eae2140fe5a399729db35436fd0871,2024-07-28T11:15:12.107000 +CVE-2024-7158,1,1,8b4598ff93542df87dc175453c9bd95fdcaeec8b3f59030fa45c1c99578e1b2d,2024-07-28T14:15:11.303000 +CVE-2024-7159,1,1,aa09cdc774bb904f7578dd0ed9d500a7cba38cf5f5fa8676610887cb373b3a30,2024-07-28T15:15:09.897000 +CVE-2024-7160,1,1,bd957275ec2f0f7bf2b2b785f1d1add29975b97e07067566cb44747fa4fcc461,2024-07-28T15:15:10.163000