diff --git a/CVE-2004/CVE-2004-21xx/CVE-2004-2154.json b/CVE-2004/CVE-2004-21xx/CVE-2004-2154.json index e3c8bdf9a18..2ecff7c7458 100644 --- a/CVE-2004/CVE-2004-21xx/CVE-2004-2154.json +++ b/CVE-2004/CVE-2004-21xx/CVE-2004-2154.json @@ -2,8 +2,8 @@ "id": "CVE-2004-2154", "sourceIdentifier": "secalert@redhat.com", "published": "2004-12-31T05:00:00.000", - "lastModified": "2024-02-15T21:17:54.433", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:41:22.520", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -70,6 +90,16 @@ "value": "CWE-178" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-178" + } + ] } ], "configurations": [ diff --git a/CVE-2012/CVE-2012-47xx/CVE-2012-4792.json b/CVE-2012/CVE-2012-47xx/CVE-2012-4792.json index b8c3ca75ad7..ad5e5d0ee5a 100644 --- a/CVE-2012/CVE-2012-47xx/CVE-2012-4792.json +++ b/CVE-2012/CVE-2012-47xx/CVE-2012-4792.json @@ -2,7 +2,7 @@ "id": "CVE-2012-4792", "sourceIdentifier": "secure@microsoft.com", "published": "2012-12-30T18:55:01.477", - "lastModified": "2024-07-24T01:00:02.067", + "lastModified": "2024-08-01T13:41:23.967", "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2024-07-23", @@ -20,6 +20,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -56,6 +78,16 @@ "value": "CWE-399" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2014/CVE-2014-1000xx/CVE-2014-100005.json b/CVE-2014/CVE-2014-1000xx/CVE-2014-100005.json index 0cf3fdc58e4..a09a5650180 100644 --- a/CVE-2014/CVE-2014-1000xx/CVE-2014-100005.json +++ b/CVE-2014/CVE-2014-1000xx/CVE-2014-100005.json @@ -2,8 +2,8 @@ "id": "CVE-2014-100005", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-13T11:59:04.477", - "lastModified": "2024-05-18T01:00:01.410", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:41:24.997", + "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2024-05-16", "cisaActionDue": "2024-06-06", @@ -20,6 +20,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -56,6 +78,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2015/CVE-2015-83xx/CVE-2015-8315.json b/CVE-2015/CVE-2015-83xx/CVE-2015-8315.json index dd92f8c57cc..c2a4221d19e 100644 --- a/CVE-2015/CVE-2015-83xx/CVE-2015-8315.json +++ b/CVE-2015/CVE-2015-83xx/CVE-2015-8315.json @@ -2,8 +2,8 @@ "id": "CVE-2015-8315", "sourceIdentifier": "cve@mitre.org", "published": "2017-01-23T21:59:00.423", - "lastModified": "2024-02-08T20:34:07.077", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:41:28.177", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-1333" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1333" + } + ] } ], "configurations": [ diff --git a/CVE-2016/CVE-2016-101xx/CVE-2016-10180.json b/CVE-2016/CVE-2016-101xx/CVE-2016-10180.json index 015af1173ab..6c30300bf57 100644 --- a/CVE-2016/CVE-2016-101xx/CVE-2016-10180.json +++ b/CVE-2016/CVE-2016-101xx/CVE-2016-10180.json @@ -2,8 +2,8 @@ "id": "CVE-2016-10180", "sourceIdentifier": "cve@mitre.org", "published": "2017-01-30T04:59:00.360", - "lastModified": "2024-02-09T02:41:18.860", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:41:29.000", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -74,6 +94,24 @@ "value": "CWE-335" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1241" + }, + { + "lang": "en", + "value": "CWE-330" + }, + { + "lang": "en", + "value": "CWE-335" + } + ] } ], "configurations": [ diff --git a/CVE-2016/CVE-2016-79xx/CVE-2016-7919.json b/CVE-2016/CVE-2016-79xx/CVE-2016-7919.json index a75d5952984..3bbc58ff329 100644 --- a/CVE-2016/CVE-2016-79xx/CVE-2016-7919.json +++ b/CVE-2016/CVE-2016-79xx/CVE-2016-7919.json @@ -2,7 +2,7 @@ "id": "CVE-2016-7919", "sourceIdentifier": "cve@mitre.org", "published": "2016-10-28T15:59:00.170", - "lastModified": "2024-07-23T18:15:04.600", + "lastModified": "2024-08-01T13:41:30.160", "vulnStatus": "Modified", "cveTags": [ { @@ -23,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -85,6 +107,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2016/CVE-2016-99xx/CVE-2016-9952.json b/CVE-2016/CVE-2016-99xx/CVE-2016-9952.json index 4c390c9d29c..44241a18841 100644 --- a/CVE-2016/CVE-2016-99xx/CVE-2016-9952.json +++ b/CVE-2016/CVE-2016-99xx/CVE-2016-9952.json @@ -2,8 +2,8 @@ "id": "CVE-2016-9952", "sourceIdentifier": "cve@mitre.org", "published": "2018-03-12T21:29:00.500", - "lastModified": "2023-12-15T19:06:18.803", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:41:30.963", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -74,6 +96,16 @@ "value": "CWE-295" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] } ], "configurations": [ diff --git a/CVE-2017/CVE-2017-109xx/CVE-2017-10955.json b/CVE-2017/CVE-2017-109xx/CVE-2017-10955.json index be401d607a1..f332252109d 100644 --- a/CVE-2017/CVE-2017-109xx/CVE-2017-10955.json +++ b/CVE-2017/CVE-2017-109xx/CVE-2017-10955.json @@ -2,7 +2,7 @@ "id": "CVE-2017-10955", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2017-10-19T19:29:00.267", - "lastModified": "2024-07-16T16:15:03.480", + "lastModified": "2024-08-01T13:41:31.777", "vulnStatus": "Modified", "cveTags": [ { @@ -23,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", diff --git a/CVE-2017/CVE-2017-170xx/CVE-2017-17058.json b/CVE-2017/CVE-2017-170xx/CVE-2017-17058.json index 4ae13137bdd..1e0f23847c1 100644 --- a/CVE-2017/CVE-2017-170xx/CVE-2017-17058.json +++ b/CVE-2017/CVE-2017-170xx/CVE-2017-17058.json @@ -2,7 +2,7 @@ "id": "CVE-2017-17058", "sourceIdentifier": "cve@mitre.org", "published": "2017-11-29T07:29:00.317", - "lastModified": "2024-07-23T19:15:11.173", + "lastModified": "2024-08-01T13:41:32.003", "vulnStatus": "Modified", "cveTags": [ { @@ -23,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -81,6 +103,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2017/CVE-2017-175xx/CVE-2017-17520.json b/CVE-2017/CVE-2017-175xx/CVE-2017-17520.json index 38036ef99d1..684ad0990b2 100644 --- a/CVE-2017/CVE-2017-175xx/CVE-2017-17520.json +++ b/CVE-2017/CVE-2017-175xx/CVE-2017-17520.json @@ -2,7 +2,7 @@ "id": "CVE-2017-17520", "sourceIdentifier": "cve@mitre.org", "published": "2017-12-14T16:29:00.620", - "lastModified": "2024-07-23T19:15:11.300", + "lastModified": "2024-08-01T13:41:32.803", "vulnStatus": "Modified", "cveTags": [ { @@ -23,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -81,6 +103,16 @@ "value": "CWE-74" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] } ], "configurations": [ diff --git a/CVE-2017/CVE-2017-37xx/CVE-2017-3772.json b/CVE-2017/CVE-2017-37xx/CVE-2017-3772.json index 493c5e529a2..eca754282d2 100644 --- a/CVE-2017/CVE-2017-37xx/CVE-2017-3772.json +++ b/CVE-2017/CVE-2017-37xx/CVE-2017-3772.json @@ -2,13 +2,17 @@ "id": "CVE-2017-3772", "sourceIdentifier": "psirt@lenovo.com", "published": "2024-07-31T21:15:12.063", - "lastModified": "2024-07-31T21:15:12.063", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was reported in Lenovo PC Manager versions prior to 2.6.40.3154 that could allow an attacker to cause a system reboot." + }, + { + "lang": "es", + "value": " Se inform\u00f3 una vulnerabilidad en las versiones de Lenovo PC Manager anteriores a la 2.6.40.3154 que podr\u00eda permitir que un atacante provocara un reinicio del sistema." } ], "metrics": { diff --git a/CVE-2017/CVE-2017-72xx/CVE-2017-7264.json b/CVE-2017/CVE-2017-72xx/CVE-2017-7264.json index 3788867efa6..140c0598422 100644 --- a/CVE-2017/CVE-2017-72xx/CVE-2017-7264.json +++ b/CVE-2017/CVE-2017-72xx/CVE-2017-7264.json @@ -2,7 +2,7 @@ "id": "CVE-2017-7264", "sourceIdentifier": "cve@mitre.org", "published": "2017-03-26T05:59:00.243", - "lastModified": "2024-07-15T21:15:02.673", + "lastModified": "2024-08-01T13:41:33.823", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", diff --git a/CVE-2017/CVE-2017-73xx/CVE-2017-7306.json b/CVE-2017/CVE-2017-73xx/CVE-2017-7306.json index 18aad9e356e..391c78947fc 100644 --- a/CVE-2017/CVE-2017-73xx/CVE-2017-7306.json +++ b/CVE-2017/CVE-2017-73xx/CVE-2017-7306.json @@ -2,7 +2,7 @@ "id": "CVE-2017-7306", "sourceIdentifier": "cve@mitre.org", "published": "2017-04-04T16:59:00.283", - "lastModified": "2024-07-23T19:15:11.397", + "lastModified": "2024-08-01T13:41:34.047", "vulnStatus": "Modified", "cveTags": [ { @@ -23,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -81,6 +103,16 @@ "value": "CWE-521" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-521" + } + ] } ], "configurations": [ diff --git a/CVE-2017/CVE-2017-89xx/CVE-2017-8912.json b/CVE-2017/CVE-2017-89xx/CVE-2017-8912.json index 8bbd5fee82b..8d512142669 100644 --- a/CVE-2017/CVE-2017-89xx/CVE-2017-8912.json +++ b/CVE-2017/CVE-2017-89xx/CVE-2017-8912.json @@ -2,7 +2,7 @@ "id": "CVE-2017-8912", "sourceIdentifier": "cve@mitre.org", "published": "2017-05-12T07:29:00.343", - "lastModified": "2024-07-23T19:15:11.510", + "lastModified": "2024-08-01T13:41:34.840", "vulnStatus": "Modified", "cveTags": [ { @@ -23,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -81,6 +103,16 @@ "value": "CWE-94" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2017/CVE-2017-94xx/CVE-2017-9443.json b/CVE-2017/CVE-2017-94xx/CVE-2017-9443.json index 0a29bca0353..1d6de36419a 100644 --- a/CVE-2017/CVE-2017-94xx/CVE-2017-9443.json +++ b/CVE-2017/CVE-2017-94xx/CVE-2017-9443.json @@ -2,7 +2,7 @@ "id": "CVE-2017-9443", "sourceIdentifier": "cve@mitre.org", "published": "2017-06-05T19:29:00.290", - "lastModified": "2024-07-23T19:15:11.613", + "lastModified": "2024-08-01T13:41:35.637", "vulnStatus": "Modified", "cveTags": [ { @@ -23,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -81,6 +103,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2018/CVE-2018-10000xx/CVE-2018-1000037.json b/CVE-2018/CVE-2018-10000xx/CVE-2018-1000037.json index 543047d3a17..0c338b1883d 100644 --- a/CVE-2018/CVE-2018-10000xx/CVE-2018-1000037.json +++ b/CVE-2018/CVE-2018-10000xx/CVE-2018-1000037.json @@ -2,7 +2,7 @@ "id": "CVE-2018-1000037", "sourceIdentifier": "cve@mitre.org", "published": "2018-05-24T13:29:00.430", - "lastModified": "2024-07-15T21:15:02.867", + "lastModified": "2024-08-01T13:41:36.483", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -74,6 +96,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2018/CVE-2018-106xx/CVE-2018-10682.json b/CVE-2018/CVE-2018-106xx/CVE-2018-10682.json index cdc2aacb869..7ee1c63d09b 100644 --- a/CVE-2018/CVE-2018-106xx/CVE-2018-10682.json +++ b/CVE-2018/CVE-2018-106xx/CVE-2018-10682.json @@ -2,7 +2,7 @@ "id": "CVE-2018-10682", "sourceIdentifier": "cve@mitre.org", "published": "2018-05-09T08:29:00.207", - "lastModified": "2024-07-23T20:15:02.767", + "lastModified": "2024-08-01T13:41:37.627", "vulnStatus": "Modified", "cveTags": [ { @@ -23,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -81,6 +103,16 @@ "value": "CWE-287" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2018/CVE-2018-117xx/CVE-2018-11728.json b/CVE-2018/CVE-2018-117xx/CVE-2018-11728.json index bfb26301c06..29b92802cc6 100644 --- a/CVE-2018/CVE-2018-117xx/CVE-2018-11728.json +++ b/CVE-2018/CVE-2018-117xx/CVE-2018-11728.json @@ -2,7 +2,7 @@ "id": "CVE-2018-11728", "sourceIdentifier": "cve@mitre.org", "published": "2018-06-19T21:29:00.630", - "lastModified": "2024-07-23T20:15:02.893", + "lastModified": "2024-08-01T13:41:38.410", "vulnStatus": "Modified", "cveTags": [ { @@ -30,6 +30,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -92,6 +114,20 @@ "value": "CWE-200" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + }, + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2018/CVE-2018-143xx/CVE-2018-14335.json b/CVE-2018/CVE-2018-143xx/CVE-2018-14335.json index e5fa625e1d7..fda440c8cae 100644 --- a/CVE-2018/CVE-2018-143xx/CVE-2018-14335.json +++ b/CVE-2018/CVE-2018-143xx/CVE-2018-14335.json @@ -2,7 +2,7 @@ "id": "CVE-2018-14335", "sourceIdentifier": "cve@mitre.org", "published": "2018-07-24T13:29:00.603", - "lastModified": "2024-07-28T14:15:10.147", + "lastModified": "2024-08-01T13:41:39.203", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -74,6 +96,16 @@ "value": "CWE-59" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-277" + } + ] } ], "configurations": [ diff --git a/CVE-2018/CVE-2018-204xx/CVE-2018-20405.json b/CVE-2018/CVE-2018-204xx/CVE-2018-20405.json index 9e37c8d98aa..0d99eb8a80c 100644 --- a/CVE-2018/CVE-2018-204xx/CVE-2018-20405.json +++ b/CVE-2018/CVE-2018-204xx/CVE-2018-20405.json @@ -2,7 +2,7 @@ "id": "CVE-2018-20405", "sourceIdentifier": "cve@mitre.org", "published": "2018-12-23T23:29:00.227", - "lastModified": "2024-07-23T20:15:03.050", + "lastModified": "2024-08-01T13:41:40.240", "vulnStatus": "Modified", "cveTags": [ { @@ -23,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -81,6 +103,16 @@ "value": "CWE-639" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] } ], "configurations": [ diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25031.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25031.json index 4f0e8128011..9a7b7a3bb90 100644 --- a/CVE-2018/CVE-2018-250xx/CVE-2018-25031.json +++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25031.json @@ -2,7 +2,7 @@ "id": "CVE-2018-25031", "sourceIdentifier": "cve@mitre.org", "published": "2022-03-11T07:15:07.190", - "lastModified": "2024-07-17T22:15:02.130", + "lastModified": "2024-08-01T13:41:41.080", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ], "cvssMetricV2": [ @@ -74,6 +94,24 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + }, + { + "lang": "en", + "value": "CWE-918" + }, + { + "lang": "en", + "value": "CWE-922" + } + ] } ], "configurations": [ diff --git a/CVE-2018/CVE-2018-251xx/CVE-2018-25100.json b/CVE-2018/CVE-2018-251xx/CVE-2018-25100.json index 6782b86e498..8d8f279fa69 100644 --- a/CVE-2018/CVE-2018-251xx/CVE-2018-25100.json +++ b/CVE-2018/CVE-2018-251xx/CVE-2018-25100.json @@ -2,7 +2,7 @@ "id": "CVE-2018-25100", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-24T01:15:45.380", - "lastModified": "2024-03-25T01:51:01.223", + "lastModified": "2024-08-01T13:41:42.160", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El m\u00f3dulo Mojolicious anterior a 7.66 para Perl puede filtrar cookies en determinadas situaciones relacionadas con varias cookies similares para el mismo dominio. Esto afecta a Mojo::UserAgent::CookieJar." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://github.com/mojolicious/mojo/commit/c16a56a9d6575ddc53d15e76d58f0ebcb0eeb149", diff --git a/CVE-2018/CVE-2018-52xx/CVE-2018-5270.json b/CVE-2018/CVE-2018-52xx/CVE-2018-5270.json index 0a0680e92da..2df4dd5c902 100644 --- a/CVE-2018/CVE-2018-52xx/CVE-2018-5270.json +++ b/CVE-2018/CVE-2018-52xx/CVE-2018-5270.json @@ -2,7 +2,7 @@ "id": "CVE-2018-5270", "sourceIdentifier": "cve@mitre.org", "published": "2018-01-08T05:29:00.397", - "lastModified": "2024-07-23T19:15:11.750", + "lastModified": "2024-08-01T13:41:42.953", "vulnStatus": "Modified", "cveTags": [ { @@ -23,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -81,6 +103,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2018/CVE-2018-52xx/CVE-2018-5279.json b/CVE-2018/CVE-2018-52xx/CVE-2018-5279.json index ada71a0de1b..d000b4dc025 100644 --- a/CVE-2018/CVE-2018-52xx/CVE-2018-5279.json +++ b/CVE-2018/CVE-2018-52xx/CVE-2018-5279.json @@ -2,7 +2,7 @@ "id": "CVE-2018-5279", "sourceIdentifier": "cve@mitre.org", "published": "2018-01-08T05:29:00.727", - "lastModified": "2024-07-23T19:15:11.860", + "lastModified": "2024-08-01T13:41:43.750", "vulnStatus": "Modified", "cveTags": [ { @@ -23,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -81,6 +103,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2018/CVE-2018-73xx/CVE-2018-7311.json b/CVE-2018/CVE-2018-73xx/CVE-2018-7311.json index c1a62557362..4fb67245424 100644 --- a/CVE-2018/CVE-2018-73xx/CVE-2018-7311.json +++ b/CVE-2018/CVE-2018-73xx/CVE-2018-7311.json @@ -2,7 +2,7 @@ "id": "CVE-2018-7311", "sourceIdentifier": "cve@mitre.org", "published": "2018-02-21T22:29:00.330", - "lastModified": "2024-07-23T19:15:11.953", + "lastModified": "2024-08-01T13:41:44.517", "vulnStatus": "Modified", "cveTags": [ { @@ -23,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -81,6 +103,16 @@ "value": "CWE-732" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] } ], "configurations": [ diff --git a/CVE-2018/CVE-2018-77xx/CVE-2018-7712.json b/CVE-2018/CVE-2018-77xx/CVE-2018-7712.json index 7f0ebdbd323..7ce1abb9fa4 100644 --- a/CVE-2018/CVE-2018-77xx/CVE-2018-7712.json +++ b/CVE-2018/CVE-2018-77xx/CVE-2018-7712.json @@ -2,7 +2,7 @@ "id": "CVE-2018-7712", "sourceIdentifier": "cve@mitre.org", "published": "2018-03-05T23:29:00.207", - "lastModified": "2024-07-23T20:15:03.163", + "lastModified": "2024-08-01T13:41:45.310", "vulnStatus": "Modified", "cveTags": [ { @@ -23,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -81,6 +103,16 @@ "value": "CWE-617" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-09xx/CVE-2019-0965.json b/CVE-2019/CVE-2019-09xx/CVE-2019-0965.json index 9f6d18b108b..2cd9089d6e7 100644 --- a/CVE-2019/CVE-2019-09xx/CVE-2019-0965.json +++ b/CVE-2019/CVE-2019-09xx/CVE-2019-0965.json @@ -2,7 +2,7 @@ "id": "CVE-2019-0965", "sourceIdentifier": "secure@microsoft.com", "published": "2019-08-14T21:15:13.187", - "lastModified": "2024-05-29T17:15:55.177", + "lastModified": "2024-08-01T13:41:46.293", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -74,6 +74,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-11xx/CVE-2019-1148.json b/CVE-2019/CVE-2019-11xx/CVE-2019-1148.json index d6ad414103a..597c92742cf 100644 --- a/CVE-2019/CVE-2019-11xx/CVE-2019-1148.json +++ b/CVE-2019/CVE-2019-11xx/CVE-2019-1148.json @@ -2,7 +2,7 @@ "id": "CVE-2019-1148", "sourceIdentifier": "secure@microsoft.com", "published": "2019-08-14T21:15:14.703", - "lastModified": "2024-05-29T17:16:01.113", + "lastModified": "2024-08-01T13:41:50.347", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -74,6 +74,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-11xx/CVE-2019-1163.json b/CVE-2019/CVE-2019-11xx/CVE-2019-1163.json index e2c78c8dd46..6af7852040a 100644 --- a/CVE-2019/CVE-2019-11xx/CVE-2019-1163.json +++ b/CVE-2019/CVE-2019-11xx/CVE-2019-1163.json @@ -2,7 +2,7 @@ "id": "CVE-2019-1163", "sourceIdentifier": "secure@microsoft.com", "published": "2019-08-14T21:15:15.703", - "lastModified": "2024-05-29T17:16:04.847", + "lastModified": "2024-08-01T13:41:51.080", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -74,6 +74,16 @@ "value": "CWE-354" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-354" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-11xx/CVE-2019-1164.json b/CVE-2019/CVE-2019-11xx/CVE-2019-1164.json index c6cea0e3387..5677604e3db 100644 --- a/CVE-2019/CVE-2019-11xx/CVE-2019-1164.json +++ b/CVE-2019/CVE-2019-11xx/CVE-2019-1164.json @@ -2,7 +2,7 @@ "id": "CVE-2019-1164", "sourceIdentifier": "secure@microsoft.com", "published": "2019-08-14T21:15:15.797", - "lastModified": "2024-05-29T17:16:05.140", + "lastModified": "2024-08-01T13:41:51.797", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -74,6 +74,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1260" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-12xx/CVE-2019-1213.json b/CVE-2019/CVE-2019-12xx/CVE-2019-1213.json index 2b548dc5ecd..f1c28d97145 100644 --- a/CVE-2019/CVE-2019-12xx/CVE-2019-1213.json +++ b/CVE-2019/CVE-2019-12xx/CVE-2019-1213.json @@ -2,7 +2,7 @@ "id": "CVE-2019-1213", "sourceIdentifier": "secure@microsoft.com", "published": "2019-08-14T21:15:18.470", - "lastModified": "2024-05-29T17:16:14.080", + "lastModified": "2024-08-01T13:41:53.187", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -74,6 +74,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-166xx/CVE-2019-16639.json b/CVE-2019/CVE-2019-166xx/CVE-2019-16639.json index a5378639bd8..4c64052a772 100644 --- a/CVE-2019/CVE-2019-166xx/CVE-2019-16639.json +++ b/CVE-2019/CVE-2019-166xx/CVE-2019-16639.json @@ -2,7 +2,7 @@ "id": "CVE-2019-16639", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-16T17:15:10.430", - "lastModified": "2024-07-16T18:00:02.110", + "lastModified": "2024-08-01T13:41:47.140", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se encontr\u00f3 un problema en la puerta de enlace de la serie Ruijie EG-2000. Hay una interfaz API newcli.php sin control de acceso, que puede permitir a un atacante (que solo tiene acceso a la interfaz web) usar comandos TELNET y/o mostrar contrase\u00f1as de administrador a trav\u00e9s de la subcadena mode_url=exec&command=. Esto afecta a EG-2000SE EG_RGOS 11.9 B11P1." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://0x.mk/?p=239", diff --git a/CVE-2019/CVE-2019-166xx/CVE-2019-16640.json b/CVE-2019/CVE-2019-166xx/CVE-2019-16640.json index 54820ab8085..9225357668c 100644 --- a/CVE-2019/CVE-2019-166xx/CVE-2019-16640.json +++ b/CVE-2019/CVE-2019-166xx/CVE-2019-16640.json @@ -2,7 +2,7 @@ "id": "CVE-2019-16640", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-16T17:15:10.513", - "lastModified": "2024-07-16T18:00:02.110", + "lastModified": "2024-08-01T13:41:47.967", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se encontr\u00f3 un problema en upload.php en la puerta de enlace de la serie Ruijie EG-2000. Un par\u00e1metro pasado a la clase UploadFile est\u00e1 mal manejado (%00 y /var/./html no est\u00e1n marcados), lo que puede permitir a un atacante cargar cualquier archivo en la puerta de enlace. Esto afecta a EG-2000SE EG_RGOS 11.9 B11P1." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://0x.mk/?p=239", diff --git a/CVE-2019/CVE-2019-176xx/CVE-2019-17626.json b/CVE-2019/CVE-2019-176xx/CVE-2019-17626.json index 2564a0a22f3..ae7528a78b3 100644 --- a/CVE-2019/CVE-2019-176xx/CVE-2019-17626.json +++ b/CVE-2019/CVE-2019-176xx/CVE-2019-17626.json @@ -2,7 +2,7 @@ "id": "CVE-2019-17626", "sourceIdentifier": "cve@mitre.org", "published": "2019-10-16T12:15:12.010", - "lastModified": "2024-07-19T14:15:04.930", + "lastModified": "2024-08-01T13:41:48.733", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-91" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-91" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-197xx/CVE-2019-19753.json b/CVE-2019/CVE-2019-197xx/CVE-2019-19753.json index 93b3ad36bdd..0cfaf95d024 100644 --- a/CVE-2019/CVE-2019-197xx/CVE-2019-19753.json +++ b/CVE-2019/CVE-2019-197xx/CVE-2019-19753.json @@ -2,7 +2,7 @@ "id": "CVE-2019-19753", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T18:15:19.437", - "lastModified": "2024-04-30T19:35:36.960", + "lastModified": "2024-08-01T13:41:49.557", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "SimpleMiningOS hasta v1259 se entrega con claves de host SSH integradas en la imagen de instalaci\u00f3n, lo que permite ataques de intermediario y hace que la identificaci\u00f3n de todos los nodos IPv4 p\u00fablicos sea trivial con Shodan.io. NOTA: el proveedor indic\u00f3 que no tiene planes de solucionar este problema y desaconseja la implementaci\u00f3n mediante IPv4 p\u00fablico." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-321" + } + ] + } + ], "references": [ { "url": "https://rsaxvc.net/blog/2020/4/10/Widespread_re-use_of_SSH_Host_Keys_in_Ethereum_Mining_Rig_Operating_Systems.html", diff --git a/CVE-2019/CVE-2019-204xx/CVE-2019-20464.json b/CVE-2019/CVE-2019-204xx/CVE-2019-20464.json index ed53b5b9bbe..96ef0344311 100644 --- a/CVE-2019/CVE-2019-204xx/CVE-2019-20464.json +++ b/CVE-2019/CVE-2019-204xx/CVE-2019-20464.json @@ -2,7 +2,7 @@ "id": "CVE-2019-20464", "sourceIdentifier": "cve@mitre.org", "published": "2021-04-02T16:15:13.053", - "lastModified": "2024-07-30T01:15:10.627", + "lastModified": "2024-08-01T13:41:54.067", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-287" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-204xx/CVE-2019-20466.json b/CVE-2019/CVE-2019-204xx/CVE-2019-20466.json index 351ef656424..5969cc01deb 100644 --- a/CVE-2019/CVE-2019-204xx/CVE-2019-20466.json +++ b/CVE-2019/CVE-2019-204xx/CVE-2019-20466.json @@ -2,7 +2,7 @@ "id": "CVE-2019-20466", "sourceIdentifier": "cve@mitre.org", "published": "2021-04-02T16:15:13.193", - "lastModified": "2024-07-30T01:15:10.803", + "lastModified": "2024-08-01T13:41:54.913", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-916" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-916" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-204xx/CVE-2019-20470.json b/CVE-2019/CVE-2019-204xx/CVE-2019-20470.json index b2494142a87..9a0984df808 100644 --- a/CVE-2019/CVE-2019-204xx/CVE-2019-20470.json +++ b/CVE-2019/CVE-2019-204xx/CVE-2019-20470.json @@ -2,7 +2,7 @@ "id": "CVE-2019-20470", "sourceIdentifier": "cve@mitre.org", "published": "2021-02-01T21:15:13.607", - "lastModified": "2024-07-30T01:15:11.137", + "lastModified": "2024-08-01T13:41:55.777", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-1188" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-204xx/CVE-2019-20473.json b/CVE-2019/CVE-2019-204xx/CVE-2019-20473.json index e0adc3cfbfc..41e6938fb71 100644 --- a/CVE-2019/CVE-2019-204xx/CVE-2019-20473.json +++ b/CVE-2019/CVE-2019-204xx/CVE-2019-20473.json @@ -2,7 +2,7 @@ "id": "CVE-2019-20473", "sourceIdentifier": "cve@mitre.org", "published": "2021-02-01T21:15:13.747", - "lastModified": "2024-07-30T01:15:11.313", + "lastModified": "2024-08-01T13:41:56.617", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-252xx/CVE-2019-25211.json b/CVE-2019/CVE-2019-252xx/CVE-2019-25211.json index 254d4401df8..b2c9c525ec4 100644 --- a/CVE-2019/CVE-2019-252xx/CVE-2019-25211.json +++ b/CVE-2019/CVE-2019-252xx/CVE-2019-25211.json @@ -2,7 +2,7 @@ "id": "CVE-2019-25211", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-29T00:15:02.107", - "lastModified": "2024-07-01T12:37:24.220", + "lastModified": "2024-08-01T13:41:57.540", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "parseWildcardRules en el middleware Gin-Gonic CORS anterior a 1.6.0 maneja mal un comod\u00edn al final de una cadena de origen, por ejemplo, https://example.community/* se permite cuando la intenci\u00f3n es que solo https://example.com/* debe permitirse, y http://localhost.example.com/* est\u00e1 permitido cuando la intenci\u00f3n es que solo se debe permitir http://localhost/*." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, "references": [ { "url": "https://github.com/gin-contrib/cors/commit/27b723a473efd80d5a498fa9f5933c80204c850d", diff --git a/CVE-2019/CVE-2019-61xx/CVE-2019-6197.json b/CVE-2019/CVE-2019-61xx/CVE-2019-6197.json index 9b31c8709f6..f78c28b52d9 100644 --- a/CVE-2019/CVE-2019-61xx/CVE-2019-6197.json +++ b/CVE-2019/CVE-2019-61xx/CVE-2019-6197.json @@ -2,13 +2,17 @@ "id": "CVE-2019-6197", "sourceIdentifier": "psirt@lenovo.com", "published": "2024-07-31T21:15:12.340", - "lastModified": "2024-07-31T21:15:12.340", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was reported in Lenovo PC Manager prior to version 2.8.90.11211 that could allow a local attacker to escalate privileges." + }, + { + "lang": "es", + "value": " Se inform\u00f3 una vulnerabilidad en Lenovo PC Manager antes de la versi\u00f3n 2.8.90.11211 que podr\u00eda permitir a un atacante local escalar privilegios." } ], "metrics": { diff --git a/CVE-2019/CVE-2019-61xx/CVE-2019-6198.json b/CVE-2019/CVE-2019-61xx/CVE-2019-6198.json index beccbdf87f7..bcabe60e1af 100644 --- a/CVE-2019/CVE-2019-61xx/CVE-2019-6198.json +++ b/CVE-2019/CVE-2019-61xx/CVE-2019-6198.json @@ -2,13 +2,17 @@ "id": "CVE-2019-6198", "sourceIdentifier": "psirt@lenovo.com", "published": "2024-07-31T21:15:12.557", - "lastModified": "2024-07-31T21:15:12.557", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was reported in Lenovo PC Manager prior to version\u00a02.8.90.11211 that could allow a local attacker to escalate privileges." + }, + { + "lang": "es", + "value": "Se inform\u00f3 una vulnerabilidad en Lenovo PC Manager antes de la versi\u00f3n 2.8.90.11211 que podr\u00eda permitir a un atacante local escalar privilegios." } ], "metrics": { diff --git a/CVE-2019/CVE-2019-62xx/CVE-2019-6268.json b/CVE-2019/CVE-2019-62xx/CVE-2019-6268.json index 281063c8238..76e4e85067d 100644 --- a/CVE-2019/CVE-2019-62xx/CVE-2019-6268.json +++ b/CVE-2019/CVE-2019-62xx/CVE-2019-6268.json @@ -2,7 +2,7 @@ "id": "CVE-2019-6268", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-08T02:15:47.077", - "lastModified": "2024-03-08T14:02:57.420", + "lastModified": "2024-08-01T13:41:57.803", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Los dispositivos RAD SecFlow-2 con Hardware 0202, Firmware 4.1.01.63 y U-Boot 2010.12 permiten URI que comienzan con /.. para Directory Traversal, como se demuestra al leer /etc/shadow." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-31" + } + ] + } + ], "references": [ { "url": "https://packetstormsecurity.com/files/177440/RAD-SecFlow-2-Path-Traversal.html", diff --git a/CVE-2020/CVE-2020-00xx/CVE-2020-0022.json b/CVE-2020/CVE-2020-00xx/CVE-2020-0022.json index afef868de5b..271b2c1de52 100644 --- a/CVE-2020/CVE-2020-00xx/CVE-2020-0022.json +++ b/CVE-2020/CVE-2020-00xx/CVE-2020-0022.json @@ -2,8 +2,8 @@ "id": "CVE-2020-0022", "sourceIdentifier": "security@android.com", "published": "2020-02-13T15:15:11.780", - "lastModified": "2024-02-02T13:50:38.707", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:41:58.593", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-682" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-682" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-118xx/CVE-2020-11877.json b/CVE-2020/CVE-2020-118xx/CVE-2020-11877.json index 57585c658ba..39753c32d55 100644 --- a/CVE-2020/CVE-2020-118xx/CVE-2020-11877.json +++ b/CVE-2020/CVE-2020-118xx/CVE-2020-11877.json @@ -2,7 +2,7 @@ "id": "CVE-2020-11877", "sourceIdentifier": "cve@mitre.org", "published": "2020-04-17T16:15:14.023", - "lastModified": "2024-07-18T20:15:03.123", + "lastModified": "2024-08-01T13:41:59.700", "vulnStatus": "Modified", "cveTags": [ { @@ -43,6 +43,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -81,6 +101,16 @@ "value": "CWE-330" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-330" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-119xx/CVE-2020-11915.json b/CVE-2020/CVE-2020-119xx/CVE-2020-11915.json index 42d73a0e5f3..2f255a079f6 100644 --- a/CVE-2020/CVE-2020-119xx/CVE-2020-11915.json +++ b/CVE-2020/CVE-2020-119xx/CVE-2020-11915.json @@ -2,7 +2,7 @@ "id": "CVE-2020-11915", "sourceIdentifier": "cve@mitre.org", "published": "2021-02-08T02:15:12.083", - "lastModified": "2024-07-30T01:15:11.393", + "lastModified": "2024-08-01T13:42:00.520", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-1188" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1188" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-119xx/CVE-2020-11925.json b/CVE-2020/CVE-2020-119xx/CVE-2020-11925.json index 0a8459bc108..e8b2bcb1880 100644 --- a/CVE-2020/CVE-2020-119xx/CVE-2020-11925.json +++ b/CVE-2020/CVE-2020-119xx/CVE-2020-11925.json @@ -2,7 +2,7 @@ "id": "CVE-2020-11925", "sourceIdentifier": "cve@mitre.org", "published": "2021-04-02T16:15:13.570", - "lastModified": "2024-07-30T01:15:11.857", + "lastModified": "2024-08-01T13:42:01.480", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-522" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-521" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-126xx/CVE-2020-12614.json b/CVE-2020/CVE-2020-126xx/CVE-2020-12614.json index 6d0d9447503..59288875650 100644 --- a/CVE-2020/CVE-2020-126xx/CVE-2020-12614.json +++ b/CVE-2020/CVE-2020-126xx/CVE-2020-12614.json @@ -2,8 +2,8 @@ "id": "CVE-2020-12614", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-12T15:15:07.363", - "lastModified": "2023-12-14T20:24:55.927", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:42:02.280", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-139xx/CVE-2020-13927.json b/CVE-2020/CVE-2020-139xx/CVE-2020-13927.json index 2c96c020a3b..f6ed34b8a55 100644 --- a/CVE-2020/CVE-2020-139xx/CVE-2020-13927.json +++ b/CVE-2020/CVE-2020-139xx/CVE-2020-13927.json @@ -2,8 +2,8 @@ "id": "CVE-2020-13927", "sourceIdentifier": "security@apache.org", "published": "2020-11-10T16:15:11.807", - "lastModified": "2024-02-14T17:16:32.187", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:42:03.150", + "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2022-01-18", "cisaActionDue": "2022-07-18", @@ -40,6 +40,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -82,6 +102,24 @@ "value": "CWE-306" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1056" + }, + { + "lang": "en", + "value": "CWE-1188" + }, + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-139xx/CVE-2020-13998.json b/CVE-2020/CVE-2020-139xx/CVE-2020-13998.json index d4960a6fa5b..5c65cdb3bcd 100644 --- a/CVE-2020/CVE-2020-139xx/CVE-2020-13998.json +++ b/CVE-2020/CVE-2020-139xx/CVE-2020-13998.json @@ -2,7 +2,7 @@ "id": "CVE-2020-13998", "sourceIdentifier": "cve@mitre.org", "published": "2020-06-11T02:15:10.713", - "lastModified": "2024-07-23T18:15:05.300", + "lastModified": "2024-08-01T13:42:03.950", "vulnStatus": "Modified", "cveTags": [ { @@ -43,6 +43,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -81,6 +101,16 @@ "value": "CWE-203" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-148xx/CVE-2020-14871.json b/CVE-2020/CVE-2020-148xx/CVE-2020-14871.json index 5a72aa28c64..6aa1d507b72 100644 --- a/CVE-2020/CVE-2020-148xx/CVE-2020-14871.json +++ b/CVE-2020/CVE-2020-148xx/CVE-2020-14871.json @@ -2,7 +2,7 @@ "id": "CVE-2020-14871", "sourceIdentifier": "secalert_us@oracle.com", "published": "2020-10-21T15:15:24.593", - "lastModified": "2024-07-03T09:15:03.037", + "lastModified": "2024-08-01T13:42:04.750", "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2021-11-03", @@ -78,6 +78,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-241xx/CVE-2020-24102.json b/CVE-2020/CVE-2020-241xx/CVE-2020-24102.json index d228160ebd4..8f380274516 100644 --- a/CVE-2020/CVE-2020-241xx/CVE-2020-24102.json +++ b/CVE-2020/CVE-2020-241xx/CVE-2020-24102.json @@ -2,7 +2,7 @@ "id": "CVE-2020-24102", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T18:15:02.967", - "lastModified": "2024-07-24T12:55:13.223", + "lastModified": "2024-08-01T13:42:06.163", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Vulnerabilidad de Directory Traversal en Punkbuster pbsv.d64 2.351, permite a atacantes remotos ejecutar c\u00f3digo arbitrario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://medium.com/%40prizmant/hacking-punkbuster-e22e6cf2f36e", diff --git a/CVE-2020/CVE-2020-274xx/CVE-2020-27478.json b/CVE-2020/CVE-2020-274xx/CVE-2020-27478.json index fec173be050..408ade08a37 100644 --- a/CVE-2020/CVE-2020-274xx/CVE-2020-27478.json +++ b/CVE-2020/CVE-2020-274xx/CVE-2020-27478.json @@ -2,7 +2,7 @@ "id": "CVE-2020-27478", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T19:15:22.773", - "lastModified": "2024-04-30T19:35:36.960", + "lastModified": "2024-08-01T13:42:07.060", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de cross-site scripting encontrada en Simplcommerce v.40734964b0811f3cbaf64b6dac261683d256f961 hasta 3103357200c70b4767986544e01b19dbf11505a7 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado en la funci\u00f3n de la barra de b\u00fasqueda." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/simplcommerce/SimplCommerce/issues/943", diff --git a/CVE-2020/CVE-2020-80xx/CVE-2020-8006.json b/CVE-2020/CVE-2020-80xx/CVE-2020-8006.json index 676747283c4..3be515fe4df 100644 --- a/CVE-2020/CVE-2020-80xx/CVE-2020-8006.json +++ b/CVE-2020/CVE-2020-80xx/CVE-2020-8006.json @@ -2,7 +2,7 @@ "id": "CVE-2020-8006", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-12T12:15:41.467", - "lastModified": "2024-04-12T12:43:46.210", + "lastModified": "2024-08-01T13:42:08.263", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El servidor en Circontrol Raption hasta 5.11.2 tiene un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria de autenticaci\u00f3n previa que puede explotarse para obtener control en tiempo de ejecuci\u00f3n del dispositivo como root. Los binarios ocpp1.5 y pwrstudio en la estaci\u00f3n de carga no utilizan una serie de mitigaciones de explotaci\u00f3n comunes. En particular, no hay canarios de pila y no utilizan el formato ejecutable independiente de la posici\u00f3n (PIE)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://circontrol.com/intelligent-charging-solutions/dc-chargers-series/raption-150/", diff --git a/CVE-2021/CVE-2021-222xx/CVE-2021-22280.json b/CVE-2021/CVE-2021-222xx/CVE-2021-22280.json index cfdffeeac12..aeb93914795 100644 --- a/CVE-2021/CVE-2021-222xx/CVE-2021-22280.json +++ b/CVE-2021/CVE-2021-222xx/CVE-2021-22280.json @@ -2,7 +2,7 @@ "id": "CVE-2021-22280", "sourceIdentifier": "cybersecurity@ch.abb.com", "published": "2024-05-14T20:15:11.263", - "lastModified": "2024-05-27T08:15:08.687", + "lastModified": "2024-08-01T13:42:09.047", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "https://www.br-automation.com/fileadmin/2021-10_DLL_Hijacking_Vulnerability_in_Automation_Studio-7dd34511.pdf", diff --git a/CVE-2021/CVE-2021-286xx/CVE-2021-28663.json b/CVE-2021/CVE-2021-286xx/CVE-2021-28663.json index 023c0dffaac..06da597a8cb 100644 --- a/CVE-2021/CVE-2021-286xx/CVE-2021-28663.json +++ b/CVE-2021/CVE-2021-286xx/CVE-2021-28663.json @@ -2,8 +2,8 @@ "id": "CVE-2021-28663", "sourceIdentifier": "cve@mitre.org", "published": "2021-05-10T15:15:07.557", - "lastModified": "2024-07-25T17:33:47.580", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:42:10.330", + "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", @@ -40,6 +40,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -78,6 +98,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-290xx/CVE-2021-29050.json b/CVE-2021/CVE-2021-290xx/CVE-2021-29050.json index 5fe621c03aa..1147fe1fd34 100644 --- a/CVE-2021/CVE-2021-290xx/CVE-2021-29050.json +++ b/CVE-2021/CVE-2021-290xx/CVE-2021-29050.json @@ -2,7 +2,7 @@ "id": "CVE-2021-29050", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-20T22:15:08.067", - "lastModified": "2024-02-22T19:07:37.840", + "lastModified": "2024-08-01T13:42:11.167", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en la p\u00e1gina de t\u00e9rminos de uso en Liferay Portal anterior a 7.3.6 y Liferay DXP 7.3 anterior al service pack 1, 7.2 anterior al fix pack 11 permite a atacantes remotos aceptar los t\u00e9rminos de uso del sitio mediante ingenier\u00eda social e incitar al usuario a visitar una p\u00e1gina maliciosa." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2021-29050", diff --git a/CVE-2021/CVE-2021-311xx/CVE-2021-31156.json b/CVE-2021/CVE-2021-311xx/CVE-2021-31156.json index c9a872eca6a..1662e4c7cb6 100644 --- a/CVE-2021/CVE-2021-311xx/CVE-2021-31156.json +++ b/CVE-2021/CVE-2021-311xx/CVE-2021-31156.json @@ -2,7 +2,7 @@ "id": "CVE-2021-31156", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T23:15:45.987", - "lastModified": "2024-03-29T12:45:02.937", + "lastModified": "2024-08-01T13:42:11.953", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Los dispositivos Allied Telesis AT-S115 1.2.0 anteriores a 1.00.024 con Boot Loader 1.00.006 permiten que Directory Traversal logre acceso parcial a los datos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/NitescuLucian/69cf22d17bf190325118304be04828e8", diff --git a/CVE-2021/CVE-2021-31xx/CVE-2021-3182.json b/CVE-2021/CVE-2021-31xx/CVE-2021-3182.json index 72829a95c24..d296ae7cae5 100644 --- a/CVE-2021/CVE-2021-31xx/CVE-2021-3182.json +++ b/CVE-2021/CVE-2021-31xx/CVE-2021-3182.json @@ -2,7 +2,7 @@ "id": "CVE-2021-3182", "sourceIdentifier": "cve@mitre.org", "published": "2021-01-19T15:15:12.403", - "lastModified": "2024-07-26T21:15:11.627", + "lastModified": "2024-08-01T13:42:19.390", "vulnStatus": "Modified", "cveTags": [ { @@ -43,6 +43,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -81,6 +101,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-330xx/CVE-2021-33026.json b/CVE-2021/CVE-2021-330xx/CVE-2021-33026.json index 6254fb937ff..45069c914aa 100644 --- a/CVE-2021/CVE-2021-330xx/CVE-2021-33026.json +++ b/CVE-2021/CVE-2021-330xx/CVE-2021-33026.json @@ -2,7 +2,7 @@ "id": "CVE-2021-33026", "sourceIdentifier": "cve@mitre.org", "published": "2021-05-13T23:15:07.367", - "lastModified": "2024-07-19T19:15:05.890", + "lastModified": "2024-08-01T13:42:13.313", "vulnStatus": "Modified", "cveTags": [ { @@ -43,6 +43,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -81,6 +101,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-339xx/CVE-2021-33990.json b/CVE-2021/CVE-2021-339xx/CVE-2021-33990.json index 11c1ba1e7b6..0403b022680 100644 --- a/CVE-2021/CVE-2021-339xx/CVE-2021-33990.json +++ b/CVE-2021/CVE-2021-339xx/CVE-2021-33990.json @@ -2,7 +2,7 @@ "id": "CVE-2021-33990", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-16T04:15:07.967", - "lastModified": "2024-07-12T16:15:02.600", + "lastModified": "2024-08-01T13:42:14.200", "vulnStatus": "Modified", "cveTags": [ { @@ -39,6 +39,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -52,6 +72,16 @@ "value": "CWE-281" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-34xx/CVE-2021-3407.json b/CVE-2021/CVE-2021-34xx/CVE-2021-3407.json index 19abdd69f39..3a407db3007 100644 --- a/CVE-2021/CVE-2021-34xx/CVE-2021-3407.json +++ b/CVE-2021/CVE-2021-34xx/CVE-2021-3407.json @@ -2,7 +2,7 @@ "id": "CVE-2021-3407", "sourceIdentifier": "secalert@redhat.com", "published": "2021-02-23T23:15:14.100", - "lastModified": "2024-07-17T22:15:03.267", + "lastModified": "2024-08-01T13:42:20.183", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ diff --git a/CVE-2021/CVE-2021-351xx/CVE-2021-35196.json b/CVE-2021/CVE-2021-351xx/CVE-2021-35196.json index b0e061a48b7..dc45134b889 100644 --- a/CVE-2021/CVE-2021-351xx/CVE-2021-35196.json +++ b/CVE-2021/CVE-2021-351xx/CVE-2021-35196.json @@ -2,7 +2,7 @@ "id": "CVE-2021-35196", "sourceIdentifier": "cve@mitre.org", "published": "2021-06-21T23:15:10.723", - "lastModified": "2024-07-19T19:15:06.043", + "lastModified": "2024-08-01T13:42:15.173", "vulnStatus": "Modified", "cveTags": [ { @@ -43,6 +43,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -81,6 +101,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-373xx/CVE-2021-37384.json b/CVE-2021/CVE-2021-373xx/CVE-2021-37384.json index 031052465b0..55f0f19d9e9 100644 --- a/CVE-2021/CVE-2021-373xx/CVE-2021-37384.json +++ b/CVE-2021/CVE-2021-373xx/CVE-2021-37384.json @@ -2,7 +2,7 @@ "id": "CVE-2021-37384", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-17T21:15:09.307", - "lastModified": "2024-05-16T22:15:08.467", + "lastModified": "2024-08-01T13:42:16.360", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-386xx/CVE-2021-38614.json b/CVE-2021/CVE-2021-386xx/CVE-2021-38614.json index 5d501ad697e..780b5cb7c79 100644 --- a/CVE-2021/CVE-2021-386xx/CVE-2021-38614.json +++ b/CVE-2021/CVE-2021-386xx/CVE-2021-38614.json @@ -2,7 +2,7 @@ "id": "CVE-2021-38614", "sourceIdentifier": "cve@mitre.org", "published": "2021-08-12T23:15:09.143", - "lastModified": "2024-07-19T18:15:04.450", + "lastModified": "2024-08-01T13:42:17.363", "vulnStatus": "Modified", "cveTags": [ { @@ -43,6 +43,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -81,6 +101,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-396xx/CVE-2021-39613.json b/CVE-2021/CVE-2021-396xx/CVE-2021-39613.json index f0de5988237..dd97c3e8690 100644 --- a/CVE-2021/CVE-2021-396xx/CVE-2021-39613.json +++ b/CVE-2021/CVE-2021-396xx/CVE-2021-39613.json @@ -2,7 +2,7 @@ "id": "CVE-2021-39613", "sourceIdentifier": "cve@mitre.org", "published": "2021-08-23T22:15:28.657", - "lastModified": "2024-07-30T16:15:02.850", + "lastModified": "2024-08-01T13:42:18.330", "vulnStatus": "Modified", "cveTags": [ { @@ -43,6 +43,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -81,6 +101,16 @@ "value": "CWE-798" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-404xx/CVE-2021-40456.json b/CVE-2021/CVE-2021-404xx/CVE-2021-40456.json index 32e17dd6615..65cfdd295f0 100644 --- a/CVE-2021/CVE-2021-404xx/CVE-2021-40456.json +++ b/CVE-2021/CVE-2021-404xx/CVE-2021-40456.json @@ -2,7 +2,7 @@ "id": "CVE-2021-40456", "sourceIdentifier": "secure@microsoft.com", "published": "2021-10-13T01:15:09.890", - "lastModified": "2023-08-01T23:15:17.273", + "lastModified": "2024-08-01T13:42:20.567", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -94,6 +94,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-409xx/CVE-2021-40905.json b/CVE-2021/CVE-2021-409xx/CVE-2021-40905.json index e647d315457..3b7ab72d85a 100644 --- a/CVE-2021/CVE-2021-409xx/CVE-2021-40905.json +++ b/CVE-2021/CVE-2021-409xx/CVE-2021-40905.json @@ -2,7 +2,7 @@ "id": "CVE-2021-40905", "sourceIdentifier": "cve@mitre.org", "published": "2022-03-25T23:15:08.237", - "lastModified": "2024-07-23T19:37:16.630", + "lastModified": "2024-08-01T13:42:21.827", "vulnStatus": "Modified", "cveTags": [ { @@ -43,6 +43,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -81,6 +101,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-415xx/CVE-2021-41503.json b/CVE-2021/CVE-2021-415xx/CVE-2021-41503.json index 9c200ddaf0a..421c1cb6cda 100644 --- a/CVE-2021/CVE-2021-415xx/CVE-2021-41503.json +++ b/CVE-2021/CVE-2021-415xx/CVE-2021-41503.json @@ -2,7 +2,7 @@ "id": "CVE-2021-41503", "sourceIdentifier": "cve@mitre.org", "published": "2021-09-24T20:15:07.373", - "lastModified": "2024-07-19T18:15:04.580", + "lastModified": "2024-08-01T13:42:22.777", "vulnStatus": "Modified", "cveTags": [ { @@ -43,6 +43,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -81,6 +101,16 @@ "value": "CWE-287" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-416xx/CVE-2021-41689.json b/CVE-2021/CVE-2021-416xx/CVE-2021-41689.json index fade4576d37..9404894ccf8 100644 --- a/CVE-2021/CVE-2021-416xx/CVE-2021-41689.json +++ b/CVE-2021/CVE-2021-416xx/CVE-2021-41689.json @@ -2,7 +2,7 @@ "id": "CVE-2021-41689", "sourceIdentifier": "cve@mitre.org", "published": "2022-06-28T13:15:10.587", - "lastModified": "2024-06-28T19:15:03.250", + "lastModified": "2024-08-01T13:42:23.660", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-476" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-426xx/CVE-2021-42694.json b/CVE-2021/CVE-2021-426xx/CVE-2021-42694.json index eab36464ef1..9c6906f4d6d 100644 --- a/CVE-2021/CVE-2021-426xx/CVE-2021-42694.json +++ b/CVE-2021/CVE-2021-426xx/CVE-2021-42694.json @@ -2,7 +2,7 @@ "id": "CVE-2021-42694", "sourceIdentifier": "cve@mitre.org", "published": "2021-11-01T04:15:08.043", - "lastModified": "2024-07-18T18:15:04.810", + "lastModified": "2024-08-01T13:42:24.450", "vulnStatus": "Modified", "cveTags": [ { @@ -43,6 +43,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 6.0 } ], "cvssMetricV2": [ @@ -81,6 +101,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1007" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-432xx/CVE-2021-43237.json b/CVE-2021/CVE-2021-432xx/CVE-2021-43237.json index 1c88431554c..a68b39c2e28 100644 --- a/CVE-2021/CVE-2021-432xx/CVE-2021-43237.json +++ b/CVE-2021/CVE-2021-432xx/CVE-2021-43237.json @@ -2,8 +2,8 @@ "id": "CVE-2021-43237", "sourceIdentifier": "secure@microsoft.com", "published": "2021-12-15T15:15:10.190", - "lastModified": "2022-07-12T17:42:04.277", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:42:25.550", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -94,6 +94,16 @@ "value": "CWE-59" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-44xx/CVE-2021-4436.json b/CVE-2021/CVE-2021-44xx/CVE-2021-4436.json index 695f018bc14..f41d34a06de 100644 --- a/CVE-2021/CVE-2021-44xx/CVE-2021-4436.json +++ b/CVE-2021/CVE-2021-44xx/CVE-2021-4436.json @@ -2,8 +2,8 @@ "id": "CVE-2021-4436", "sourceIdentifier": "contact@wpscan.com", "published": "2024-02-05T09:15:43.013", - "lastModified": "2024-02-10T02:04:43.427", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:42:31.623", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2021/CVE-2021-450xx/CVE-2021-45008.json b/CVE-2021/CVE-2021-450xx/CVE-2021-45008.json index b7098220b98..9864f7427d1 100644 --- a/CVE-2021/CVE-2021-450xx/CVE-2021-45008.json +++ b/CVE-2021/CVE-2021-450xx/CVE-2021-45008.json @@ -2,7 +2,7 @@ "id": "CVE-2021-45008", "sourceIdentifier": "cve@mitre.org", "published": "2022-02-21T12:15:13.393", - "lastModified": "2024-07-18T16:15:05.650", + "lastModified": "2024-08-01T13:42:27.030", "vulnStatus": "Modified", "cveTags": [ { @@ -43,6 +43,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -81,6 +101,16 @@ "value": "CWE-281" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-281" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-459xx/CVE-2021-45956.json b/CVE-2021/CVE-2021-459xx/CVE-2021-45956.json index 649a49e1947..8107a2376f5 100644 --- a/CVE-2021/CVE-2021-459xx/CVE-2021-45956.json +++ b/CVE-2021/CVE-2021-459xx/CVE-2021-45956.json @@ -2,7 +2,7 @@ "id": "CVE-2021-45956", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-01T00:15:08.720", - "lastModified": "2024-07-18T16:15:05.750", + "lastModified": "2024-08-01T13:42:28.027", "vulnStatus": "Modified", "cveTags": [ { @@ -43,6 +43,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -81,6 +101,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-469xx/CVE-2021-46973.json b/CVE-2021/CVE-2021-469xx/CVE-2021-46973.json index 1a72cc88fb3..b9476ffb7ce 100644 --- a/CVE-2021/CVE-2021-469xx/CVE-2021-46973.json +++ b/CVE-2021/CVE-2021-469xx/CVE-2021-46973.json @@ -2,7 +2,7 @@ "id": "CVE-2021-46973", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-27T19:04:07.457", - "lastModified": "2024-02-28T14:06:45.783", + "lastModified": "2024-08-01T13:42:29.060", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: qrtr: Evite el potencial use after free en el env\u00edo MHI. Es posible que MHI ul_callback se invoque inmediatamente despu\u00e9s de la puesta en cola del skb para la transmisi\u00f3n, lo que provocar\u00e1 que la devoluci\u00f3n de llamada disminuya el recuento del sk asociado y liberaci\u00f3n del skb. Como tal, la desreferencia de skb y el incremento del refcount de sk deben ocurrir antes de que el skb se ponga en cola, para evitar que el skb haga use after free y potencialmente que el sk elimine su \u00faltimo refcount." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/03c649dee8b1eb5600212a249542a70f47a5ab40", diff --git a/CVE-2021/CVE-2021-470xx/CVE-2021-47023.json b/CVE-2021/CVE-2021-470xx/CVE-2021-47023.json index d0e25875be4..465786fe1c6 100644 --- a/CVE-2021/CVE-2021-470xx/CVE-2021-47023.json +++ b/CVE-2021/CVE-2021-470xx/CVE-2021-47023.json @@ -2,7 +2,7 @@ "id": "CVE-2021-47023", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-28T09:15:39.197", - "lastModified": "2024-02-28T14:06:45.783", + "lastModified": "2024-08-01T13:42:29.830", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: net: marvell: prestera: corrige el manejo de eventos del puerto en init Por alguna raz\u00f3n, puede haber una falla durante la creaci\u00f3n de puertos si los eventos del puerto se manejan al mismo tiempo porque fw puede enviar el puerto inicial evento con estado inactivo. El bloqueo apunta a cancel_delayed_work(), que se llama cuando el puerto est\u00e1 inactivo. Actualmente no descubr\u00ed la causa real del problema, as\u00ed que lo solucion\u00e9 cancelando las estad\u00edsticas del puerto solo si el estado del puerto anterior estaba activo y funcionando. El siguiente es el fallo que se puede desencadenar: [28.311104] No se puede manejar la solicitud de paginaci\u00f3n del kernel en la direcci\u00f3n virtual 000071775f776600 [28.319097] Informaci\u00f3n de cancelaci\u00f3n de memoria: [28.321914] ESR = 0x96000004 [28.324996] EC = 0x25: DABT (EL actual), IL = 32 bits [ 28.330350] SET = 0, FnV = 0 [ 28.333430] EA = 0, S1PTW = 0 [ 28.336597] Informaci\u00f3n de cancelaci\u00f3n de datos: [ 28.339499] ISV = 0, ISS = 0x00000004 [ 28.343362] CM = 0, WnR = 0 [ 28.346354] tabla de p\u00e1ginas de usuario: p\u00e1ginas de 4k, VA de 48 bits, pgdp=0000000100bf7000 [ 28.352842] [000071775f776600] pgd=00000000000000000, p4d=0000000000000000 [ 28.359695] Error interno: Ups: 96000004 [#1] PREEMPT SMP [ 28.365310] M\u00f3dulos vinculados en: prestera_pci(+) prestera uio_pdrv_genirq [ 28.372005] CPU: 0 PID: 1291 Comm: kworker/0:1H No contaminado 5.11.0-rc4 #1 [ 28.378846] Nombre de hardware: DNI Placa AmazonGo1 A7040 (DT) [ 28.384283] Cola de trabajo : prestera_fw_wq prestera_fw_evt_work_fn [prestera_pci] [ 28.391413] pstate: 60000085 (nZCv daIf -PAN -UAO -TCO BTYPE=--) [ 28.397468] pc : get_work_pool+0x48/0x60 [ 28.401442] lr : try_to _grab_pending+0x6c/0x1b0 [28.406018] sp : ffff80001391bc60 [ 28.409358] x29: ffff80001391bc60 x28: 0000000000000000 [ 28.414725] x27: ffff000104fc8b40 x26: ffff80001127de88 [ 28.4200 89] x25: 0000000000000000 x24: ffff000106119760 [ 28.425452] x23: ffff00010775dd60 x22: ffff00010567e000 [ 28.430814] x21: 000000000000000000 x20: ffff80001391bcb0 [28.436175] x19: ffff00010775deb8 x18: 00000000000000c0 [ 28.441537] x17: 0000000000000000 x16: 000000008d9b0e88 [ 28.446898] x15: 00000000000000 01 x14: 00000000000002ba [ 28.452261] x13: 80a3002c00000002 x12: 00000000000005f4 [ 28.457622] x11: 0000000000000030 x10: 00000000000 0000c [28.462985] x9: 000000000000000c x8: 0000000000000030 [28.468346] x7: ffff800014400000 x6: ffff000106119758 [28.473708] x5: 00000000000000003 x4: ffff00010775dc60 [28.4790 68] x3: 0000000000000000 x2: 00000000000000060 [28.484429] x1: 000071775f776600 x0: ffff00010775deb8 [28.489791] Rastreo de llamadas: [28.492259] get_work_pool+ 0x48/ 0x60 [ 28.495874] cancel_delayed_work+0x38/0xb0 [ 28.500011] prestera_port_handle_event+0x90/0xa0 [prestera] [ 28.505743] prestera_evt_recv+0x98/0xe0 [prestera] [ 28.510683] prestera_fw _evt_work_fn+0x180/0x228 [prestera_pci] [ 28.516660] proceso_one_work+0x1e8/0x360 [ 28.520710] work_thread+0x44/0x480 [ 28.524412] kthread+0x154/0x160 [ 28.527670] ret_from_fork+0x10/0x38 [ 28.531290] C\u00f3digo: a8c17bfd d50323bf d65f03c0 92 78dc21 (f9400020) [28.537429] ---[ final de seguimiento 5eced933df3a080b ]---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0ce6052802be2cb61a57b753e41301339c88c839", diff --git a/CVE-2022/CVE-2022-19xx/CVE-2022-1941.json b/CVE-2022/CVE-2022-19xx/CVE-2022-1941.json index 4cc1164408c..506ef730bfc 100644 --- a/CVE-2022/CVE-2022-19xx/CVE-2022-1941.json +++ b/CVE-2022/CVE-2022-19xx/CVE-2022-1941.json @@ -2,7 +2,7 @@ "id": "CVE-2022-1941", "sourceIdentifier": "cve-coordination@google.com", "published": "2022-09-22T15:15:09.203", - "lastModified": "2024-07-05T16:15:03.447", + "lastModified": "2024-08-01T13:42:31.980", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21894.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21894.json index 3fe8c2743d2..2e00d93e832 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21894.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21894.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21894", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:12.130", - "lastModified": "2023-12-21T01:15:22.473", + "lastModified": "2024-08-01T13:42:32.223", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -74,6 +74,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-220xx/CVE-2022-22026.json b/CVE-2022/CVE-2022-220xx/CVE-2022-22026.json index 99248c40aef..3bb2a8671e0 100644 --- a/CVE-2022/CVE-2022-220xx/CVE-2022-22026.json +++ b/CVE-2022/CVE-2022-220xx/CVE-2022-22026.json @@ -2,7 +2,7 @@ "id": "CVE-2022-22026", "sourceIdentifier": "secure@microsoft.com", "published": "2022-07-12T23:15:09.253", - "lastModified": "2023-05-17T17:15:11.380", + "lastModified": "2024-08-01T13:42:33.120", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -74,6 +74,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-220xx/CVE-2022-22047.json b/CVE-2022/CVE-2022-220xx/CVE-2022-22047.json index e1b80df2886..d3b068c4db1 100644 --- a/CVE-2022/CVE-2022-220xx/CVE-2022-22047.json +++ b/CVE-2022/CVE-2022-220xx/CVE-2022-22047.json @@ -2,8 +2,8 @@ "id": "CVE-2022-22047", "sourceIdentifier": "secure@microsoft.com", "published": "2022-07-12T23:15:10.343", - "lastModified": "2024-06-28T14:13:17.207", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:42:33.910", + "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2022-07-12", "cisaActionDue": "2022-08-02", @@ -78,6 +78,16 @@ "value": "CWE-426" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-426" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-220xx/CVE-2022-22049.json b/CVE-2022/CVE-2022-220xx/CVE-2022-22049.json index 57c1aa1d20f..57b08773cd2 100644 --- a/CVE-2022/CVE-2022-220xx/CVE-2022-22049.json +++ b/CVE-2022/CVE-2022-220xx/CVE-2022-22049.json @@ -2,7 +2,7 @@ "id": "CVE-2022-22049", "sourceIdentifier": "secure@microsoft.com", "published": "2022-07-12T23:15:10.683", - "lastModified": "2023-05-17T17:15:12.677", + "lastModified": "2024-08-01T13:42:34.610", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -74,6 +74,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-229xx/CVE-2022-22948.json b/CVE-2022/CVE-2022-229xx/CVE-2022-22948.json index 30cc1362e55..8ab270b6d41 100644 --- a/CVE-2022/CVE-2022-229xx/CVE-2022-22948.json +++ b/CVE-2022/CVE-2022-229xx/CVE-2022-22948.json @@ -2,8 +2,8 @@ "id": "CVE-2022-22948", "sourceIdentifier": "security@vmware.com", "published": "2022-03-29T18:15:08.040", - "lastModified": "2024-07-18T01:00:03.190", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:42:35.333", + "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2024-07-17", "cisaActionDue": "2024-08-07", @@ -40,6 +40,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -78,6 +98,16 @@ "value": "CWE-276" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-230xx/CVE-2022-23085.json b/CVE-2022/CVE-2022-230xx/CVE-2022-23085.json index 13bc67dd4bd..6a41ca2677e 100644 --- a/CVE-2022/CVE-2022-230xx/CVE-2022-23085.json +++ b/CVE-2022/CVE-2022-230xx/CVE-2022-23085.json @@ -2,7 +2,7 @@ "id": "CVE-2022-23085", "sourceIdentifier": "secteam@freebsd.org", "published": "2024-02-15T05:15:09.110", - "lastModified": "2024-03-22T19:15:07.650", + "lastModified": "2024-08-01T13:42:36.137", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se pas\u00f3 una opci\u00f3n de entero proporcionada por el usuario a nmreq_copyin() sin comprobar si se desbordar\u00eda. Esta comprobaci\u00f3n de los l\u00edmites insuficiente podr\u00eda provocar da\u00f1os en la memoria del kernel. En sistemas configurados para incluir netmap en su devfs_ruleset, un proceso privilegiado que se ejecuta en una c\u00e1rcel puede afectar el entorno del host." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://security.freebsd.org/advisories/FreeBSD-SA-22:04.netmap.asc", diff --git a/CVE-2022/CVE-2022-230xx/CVE-2022-23088.json b/CVE-2022/CVE-2022-230xx/CVE-2022-23088.json index 79383416e14..03b43981e5e 100644 --- a/CVE-2022/CVE-2022-230xx/CVE-2022-23088.json +++ b/CVE-2022/CVE-2022-230xx/CVE-2022-23088.json @@ -2,7 +2,7 @@ "id": "CVE-2022-23088", "sourceIdentifier": "secteam@freebsd.org", "published": "2024-02-15T05:15:09.440", - "lastModified": "2024-02-15T06:23:39.303", + "lastModified": "2024-08-01T13:42:36.930", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La rutina de manejo de balizas 802.11 no pudo validar la longitud de un ID de malla IEEE 802.11 antes de copiarlo en un b\u00fafer asignado en mont\u00f3n. Mientras un cliente Wi-Fi de FreeBSD est\u00e1 en modo de escaneo (es decir, no asociado con un SSID), una trama de baliza maliciosa puede sobrescribir la memoria del kernel, lo que lleva a la ejecuci\u00f3n remota de c\u00f3digo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://security.freebsd.org/advisories/FreeBSD-SA-22:07.wifi_meshid.asc", diff --git a/CVE-2022/CVE-2022-245xx/CVE-2022-24540.json b/CVE-2022/CVE-2022-245xx/CVE-2022-24540.json index 9d83deed4d9..1994e150adf 100644 --- a/CVE-2022/CVE-2022-245xx/CVE-2022-24540.json +++ b/CVE-2022/CVE-2022-245xx/CVE-2022-24540.json @@ -2,7 +2,7 @@ "id": "CVE-2022-24540", "sourceIdentifier": "secure@microsoft.com", "published": "2022-04-15T19:15:11.650", - "lastModified": "2023-06-29T01:15:31.197", + "lastModified": "2024-08-01T13:42:38.470", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -74,6 +74,16 @@ "value": "CWE-362" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-268xx/CVE-2022-26821.json b/CVE-2022/CVE-2022-268xx/CVE-2022-26821.json index 62930076361..f47e589293b 100644 --- a/CVE-2022/CVE-2022-268xx/CVE-2022-26821.json +++ b/CVE-2022/CVE-2022-268xx/CVE-2022-26821.json @@ -2,7 +2,7 @@ "id": "CVE-2022-26821", "sourceIdentifier": "secure@microsoft.com", "published": "2022-04-15T19:15:14.137", - "lastModified": "2023-06-29T01:15:39.427", + "lastModified": "2024-08-01T13:42:40.033", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -74,6 +74,16 @@ "value": "CWE-362" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-269xx/CVE-2022-26910.json b/CVE-2022/CVE-2022-269xx/CVE-2022-26910.json index 7825115ccc2..65117b49f7b 100644 --- a/CVE-2022/CVE-2022-269xx/CVE-2022-26910.json +++ b/CVE-2022/CVE-2022-269xx/CVE-2022-26910.json @@ -2,7 +2,7 @@ "id": "CVE-2022-26910", "sourceIdentifier": "secure@microsoft.com", "published": "2022-04-15T19:15:15.143", - "lastModified": "2023-06-29T01:15:46.310", + "lastModified": "2024-08-01T13:42:41.000", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -74,6 +74,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-297xx/CVE-2022-29778.json b/CVE-2022/CVE-2022-297xx/CVE-2022-29778.json index 5ec9acab381..7670f1c04d7 100644 --- a/CVE-2022/CVE-2022-297xx/CVE-2022-29778.json +++ b/CVE-2022/CVE-2022-297xx/CVE-2022-29778.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29778", "sourceIdentifier": "cve@mitre.org", "published": "2022-06-03T21:15:08.007", - "lastModified": "2024-07-17T21:15:10.420", + "lastModified": "2024-08-01T13:42:42.130", "vulnStatus": "Modified", "cveTags": [ { @@ -43,6 +43,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -81,6 +101,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1052" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-302xx/CVE-2022-30203.json b/CVE-2022/CVE-2022-302xx/CVE-2022-30203.json index beb4162db19..b99c8aee625 100644 --- a/CVE-2022/CVE-2022-302xx/CVE-2022-30203.json +++ b/CVE-2022/CVE-2022-302xx/CVE-2022-30203.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30203", "sourceIdentifier": "secure@microsoft.com", "published": "2022-07-12T23:15:11.070", - "lastModified": "2023-05-17T17:15:13.077", + "lastModified": "2024-08-01T13:42:43.233", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -74,6 +74,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-302xx/CVE-2022-30271.json b/CVE-2022/CVE-2022-302xx/CVE-2022-30271.json index 88f55cd3e2b..84a16b80393 100644 --- a/CVE-2022/CVE-2022-302xx/CVE-2022-30271.json +++ b/CVE-2022/CVE-2022-302xx/CVE-2022-30271.json @@ -2,8 +2,8 @@ "id": "CVE-2022-30271", "sourceIdentifier": "cve@mitre.org", "published": "2022-07-26T23:15:08.177", - "lastModified": "2024-02-13T16:21:02.103", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:42:43.947", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-798" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-259" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30997.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30997.json index ff90b7e97ff..06d9c6a4f96 100644 --- a/CVE-2022/CVE-2022-309xx/CVE-2022-30997.json +++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30997.json @@ -2,8 +2,8 @@ "id": "CVE-2022-30997", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2022-06-28T13:15:12.607", - "lastModified": "2024-02-13T15:56:20.097", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:42:44.747", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.4, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-798" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-325xx/CVE-2022-32533.json b/CVE-2022/CVE-2022-325xx/CVE-2022-32533.json index 7efc38e4a40..26099473d39 100644 --- a/CVE-2022/CVE-2022-325xx/CVE-2022-32533.json +++ b/CVE-2022/CVE-2022-325xx/CVE-2022-32533.json @@ -2,7 +2,7 @@ "id": "CVE-2022-32533", "sourceIdentifier": "security@apache.org", "published": "2022-07-06T10:15:09.943", - "lastModified": "2024-07-17T20:15:05.093", + "lastModified": "2024-08-01T13:42:45.877", "vulnStatus": "Modified", "cveTags": [ { @@ -43,6 +43,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ diff --git a/CVE-2022/CVE-2022-342xx/CVE-2022-34270.json b/CVE-2022/CVE-2022-342xx/CVE-2022-34270.json index fe6bc7a14d9..66bb5ed8f60 100644 --- a/CVE-2022/CVE-2022-342xx/CVE-2022-34270.json +++ b/CVE-2022/CVE-2022-342xx/CVE-2022-34270.json @@ -2,7 +2,7 @@ "id": "CVE-2022-34270", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T01:35:13.267", - "lastModified": "2024-02-29T13:49:47.277", + "lastModified": "2024-08-01T13:42:46.790", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en RWS WorldServer antes de la versi\u00f3n 11.7.3. Los usuarios habituales pueden crear usuarios con la funci\u00f3n de administrador a trav\u00e9s de UserWSUserManager." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://www.rws.com/localization/products/trados-enterprise/worldserver/", diff --git a/CVE-2022/CVE-2022-349xx/CVE-2022-34965.json b/CVE-2022/CVE-2022-349xx/CVE-2022-34965.json index ae8a1919cc2..93f6554a372 100644 --- a/CVE-2022/CVE-2022-349xx/CVE-2022-34965.json +++ b/CVE-2022/CVE-2022-349xx/CVE-2022-34965.json @@ -2,7 +2,7 @@ "id": "CVE-2022-34965", "sourceIdentifier": "cve@mitre.org", "published": "2022-07-25T17:15:08.220", - "lastModified": "2024-07-16T21:15:09.883", + "lastModified": "2024-08-01T13:42:47.857", "vulnStatus": "Modified", "cveTags": [ { @@ -43,6 +43,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -56,6 +76,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-364xx/CVE-2022-36436.json b/CVE-2022/CVE-2022-364xx/CVE-2022-36436.json index 5abac78c92b..782f309b523 100644 --- a/CVE-2022/CVE-2022-364xx/CVE-2022-36436.json +++ b/CVE-2022/CVE-2022-364xx/CVE-2022-36436.json @@ -2,8 +2,8 @@ "id": "CVE-2022-36436", "sourceIdentifier": "cve@mitre.org", "published": "2022-09-14T11:15:49.567", - "lastModified": "2024-02-13T17:21:57.020", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:42:48.860", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-287" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38057.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38057.json index e89e2116350..7df664910ce 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38057.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38057.json @@ -2,7 +2,7 @@ "id": "CVE-2022-38057", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-25T12:15:08.010", - "lastModified": "2024-03-25T13:47:14.087", + "lastModified": "2024-08-01T13:42:50.213", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -49,6 +49,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "references": [ diff --git a/CVE-2022/CVE-2022-386xx/CVE-2022-38625.json b/CVE-2022/CVE-2022-386xx/CVE-2022-38625.json index 0a7dd020ec2..cd02c7f8fd7 100644 --- a/CVE-2022/CVE-2022-386xx/CVE-2022-38625.json +++ b/CVE-2022/CVE-2022-386xx/CVE-2022-38625.json @@ -2,7 +2,7 @@ "id": "CVE-2022-38625", "sourceIdentifier": "cve@mitre.org", "published": "2022-08-29T23:15:08.773", - "lastModified": "2024-07-16T21:15:10.027", + "lastModified": "2024-08-01T13:42:51.013", "vulnStatus": "Modified", "cveTags": [ { @@ -43,6 +43,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -56,6 +76,16 @@ "value": "CWE-345" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-345" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-407xx/CVE-2022-40705.json b/CVE-2022/CVE-2022-407xx/CVE-2022-40705.json index 1501fabf7a4..42713263f18 100644 --- a/CVE-2022/CVE-2022-407xx/CVE-2022-40705.json +++ b/CVE-2022/CVE-2022-407xx/CVE-2022-40705.json @@ -2,7 +2,7 @@ "id": "CVE-2022-40705", "sourceIdentifier": "security@apache.org", "published": "2022-09-22T09:15:09.790", - "lastModified": "2024-07-16T20:15:02.567", + "lastModified": "2024-08-01T13:42:52.383", "vulnStatus": "Modified", "cveTags": [ { @@ -43,6 +43,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-408xx/CVE-2022-40829.json b/CVE-2022/CVE-2022-408xx/CVE-2022-40829.json index e24489fb4e6..a163451dc82 100644 --- a/CVE-2022/CVE-2022-408xx/CVE-2022-40829.json +++ b/CVE-2022/CVE-2022-408xx/CVE-2022-40829.json @@ -2,7 +2,7 @@ "id": "CVE-2022-40829", "sourceIdentifier": "cve@mitre.org", "published": "2022-10-07T11:15:11.347", - "lastModified": "2024-07-18T20:15:03.313", + "lastModified": "2024-08-01T13:42:52.583", "vulnStatus": "Modified", "cveTags": [ { @@ -43,6 +43,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -56,6 +76,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-408xx/CVE-2022-40830.json b/CVE-2022/CVE-2022-408xx/CVE-2022-40830.json index 0d7ed6c72f5..30678a3694e 100644 --- a/CVE-2022/CVE-2022-408xx/CVE-2022-40830.json +++ b/CVE-2022/CVE-2022-408xx/CVE-2022-40830.json @@ -2,7 +2,7 @@ "id": "CVE-2022-40830", "sourceIdentifier": "cve@mitre.org", "published": "2022-10-07T11:15:11.433", - "lastModified": "2024-07-18T20:15:03.420", + "lastModified": "2024-08-01T13:42:53.373", "vulnStatus": "Modified", "cveTags": [ { @@ -43,6 +43,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -56,6 +76,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-40xx/CVE-2022-4001.json b/CVE-2022/CVE-2022-40xx/CVE-2022-4001.json index e31164dc9f7..ea43b64693c 100644 --- a/CVE-2022/CVE-2022-40xx/CVE-2022-4001.json +++ b/CVE-2022/CVE-2022-40xx/CVE-2022-4001.json @@ -2,13 +2,17 @@ "id": "CVE-2022-4001", "sourceIdentifier": "psirt@lenovo.com", "published": "2024-07-31T21:15:14.413", - "lastModified": "2024-07-31T21:15:14.413", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An authentication bypass vulnerability could allow an attacker to access API functions without authentication." + }, + { + "lang": "es", + "value": " Una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n podr\u00eda permitir a un atacante acceder a funciones API sin autenticaci\u00f3n." } ], "metrics": { diff --git a/CVE-2022/CVE-2022-40xx/CVE-2022-4002.json b/CVE-2022/CVE-2022-40xx/CVE-2022-4002.json index 94863e3885a..0cba32cc5ae 100644 --- a/CVE-2022/CVE-2022-40xx/CVE-2022-4002.json +++ b/CVE-2022/CVE-2022-40xx/CVE-2022-4002.json @@ -2,13 +2,17 @@ "id": "CVE-2022-4002", "sourceIdentifier": "psirt@lenovo.com", "published": "2024-07-31T21:15:14.627", - "lastModified": "2024-07-31T21:15:14.627", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A command injection vulnerability could allow an authenticated user to execute operating system commands as root via a specially crafted API request." + }, + { + "lang": "es", + "value": " Una vulnerabilidad de inyecci\u00f3n de comandos podr\u00eda permitir a un usuario autenticado ejecutar comandos del sistema operativo como root a trav\u00e9s de una solicitud API especialmente manipulada." } ], "metrics": { diff --git a/CVE-2022/CVE-2022-40xx/CVE-2022-4003.json b/CVE-2022/CVE-2022-40xx/CVE-2022-4003.json index d4554434f5f..494ec8ded06 100644 --- a/CVE-2022/CVE-2022-40xx/CVE-2022-4003.json +++ b/CVE-2022/CVE-2022-40xx/CVE-2022-4003.json @@ -2,13 +2,17 @@ "id": "CVE-2022-4003", "sourceIdentifier": "psirt@lenovo.com", "published": "2024-07-31T21:15:14.850", - "lastModified": "2024-07-31T21:15:14.850", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A denial-of-service vulnerability could allow an authenticated user to trigger an internal service restart via a specially crafted API request." + }, + { + "lang": "es", + "value": " Una vulnerabilidad de denegaci\u00f3n de servicio podr\u00eda permitir que un usuario autenticado active un reinicio del servicio interno mediante una solicitud API especialmente manipulada." } ], "metrics": { diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41039.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41039.json index 2b47e6009bd..ed979cf9dc1 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41039.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41039.json @@ -2,7 +2,7 @@ "id": "CVE-2022-41039", "sourceIdentifier": "secure@microsoft.com", "published": "2022-11-09T22:15:19.180", - "lastModified": "2023-03-10T18:15:10.737", + "lastModified": "2024-08-01T13:42:54.490", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -49,6 +49,16 @@ "value": "CWE-362" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41091.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41091.json index 832ae0139ef..32e70402b20 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41091.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41091.json @@ -2,8 +2,8 @@ "id": "CVE-2022-41091", "sourceIdentifier": "secure@microsoft.com", "published": "2022-11-09T22:15:22.093", - "lastModified": "2024-06-28T13:50:02.067", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:42:55.410", + "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2022-11-08", "cisaActionDue": "2022-12-09", @@ -53,6 +53,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-424xx/CVE-2022-42467.json b/CVE-2022/CVE-2022-424xx/CVE-2022-42467.json index c7b0d12676f..32e22941cd9 100644 --- a/CVE-2022/CVE-2022-424xx/CVE-2022-42467.json +++ b/CVE-2022/CVE-2022-424xx/CVE-2022-42467.json @@ -2,8 +2,8 @@ "id": "CVE-2022-42467", "sourceIdentifier": "security@apache.org", "published": "2022-10-19T08:15:11.427", - "lastModified": "2024-02-15T20:53:00.017", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:42:56.500", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -59,6 +79,16 @@ "value": "CWE-1188" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1188" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-440xx/CVE-2022-44032.json b/CVE-2022/CVE-2022-440xx/CVE-2022-44032.json index 2bcd8267ee1..c9b1f76cd13 100644 --- a/CVE-2022/CVE-2022-440xx/CVE-2022-44032.json +++ b/CVE-2022/CVE-2022-440xx/CVE-2022-44032.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44032", "sourceIdentifier": "cve@mitre.org", "published": "2022-10-30T01:15:08.823", - "lastModified": "2024-03-25T01:15:52.653", + "lastModified": "2024-08-01T13:42:57.660", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.5, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-362" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-440xx/CVE-2022-44036.json b/CVE-2022/CVE-2022-440xx/CVE-2022-44036.json index 12de614f6c6..9a858a3f9fe 100644 --- a/CVE-2022/CVE-2022-440xx/CVE-2022-44036.json +++ b/CVE-2022/CVE-2022-440xx/CVE-2022-44036.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44036", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-03T21:15:12.880", - "lastModified": "2024-07-16T16:15:03.690", + "lastModified": "2024-08-01T13:42:58.487", "vulnStatus": "Modified", "cveTags": [ { @@ -43,6 +43,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -56,6 +76,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-447xx/CVE-2022-44713.json b/CVE-2022/CVE-2022-447xx/CVE-2022-44713.json index 6f7a62f0755..ef9490ad77b 100644 --- a/CVE-2022/CVE-2022-447xx/CVE-2022-44713.json +++ b/CVE-2022/CVE-2022-447xx/CVE-2022-44713.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44713", "sourceIdentifier": "secure@microsoft.com", "published": "2022-12-13T19:15:14.857", - "lastModified": "2023-03-10T19:15:19.170", + "lastModified": "2024-08-01T13:42:59.740", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-451xx/CVE-2022-45136.json b/CVE-2022/CVE-2022-451xx/CVE-2022-45136.json index 6475e1e41e3..f44f777fd8d 100644 --- a/CVE-2022/CVE-2022-451xx/CVE-2022-45136.json +++ b/CVE-2022/CVE-2022-451xx/CVE-2022-45136.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45136", "sourceIdentifier": "security@apache.org", "published": "2022-11-14T16:15:12.237", - "lastModified": "2024-07-18T20:15:03.497", + "lastModified": "2024-08-01T13:43:00.537", "vulnStatus": "Modified", "cveTags": [ { @@ -43,6 +43,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -56,6 +76,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-455xx/CVE-2022-45544.json b/CVE-2022/CVE-2022-455xx/CVE-2022-45544.json index 46b04f7153d..2d15ec1a3ef 100644 --- a/CVE-2022/CVE-2022-455xx/CVE-2022-45544.json +++ b/CVE-2022/CVE-2022-455xx/CVE-2022-45544.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45544", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-07T16:15:08.607", - "lastModified": "2024-07-16T15:15:11.117", + "lastModified": "2024-08-01T13:43:01.593", "vulnStatus": "Modified", "cveTags": [ { @@ -39,6 +39,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -52,6 +72,16 @@ "value": "CWE-863" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-460xx/CVE-2022-46070.json b/CVE-2022/CVE-2022-460xx/CVE-2022-46070.json index c0ef4e52cab..a2ed76c5b94 100644 --- a/CVE-2022/CVE-2022-460xx/CVE-2022-46070.json +++ b/CVE-2022/CVE-2022-460xx/CVE-2022-46070.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46070", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-11T22:15:54.230", - "lastModified": "2024-03-12T12:40:13.500", + "lastModified": "2024-08-01T13:43:02.480", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "GV-ASManager V6.0.1.0 contiene una vulnerabilidad de inclusi\u00f3n de archivos locales en GeoWebServer a trav\u00e9s de Path." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://s3.amazonaws.com/geovision_downloads/TechNotice/CyberSecurity/Security_Advistory_ASManager-ASM-2022-11.pdf", diff --git a/CVE-2022/CVE-2022-464xx/CVE-2022-46498.json b/CVE-2022/CVE-2022-464xx/CVE-2022-46498.json index 046309400cd..b61ff226bb4 100644 --- a/CVE-2022/CVE-2022-464xx/CVE-2022-46498.json +++ b/CVE-2022/CVE-2022-464xx/CVE-2022-46498.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46498", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-07T09:15:38.017", - "lastModified": "2024-03-07T13:52:27.110", + "lastModified": "2024-08-01T13:43:03.260", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que Hospital Management System 1.0 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro doc_number en his_admin_view_single_employee.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/ASR511-OO7/CVE-2022-46498/blob/main/CVE-32", diff --git a/CVE-2022/CVE-2022-470xx/CVE-2022-47037.json b/CVE-2022/CVE-2022-470xx/CVE-2022-47037.json index 3e656399791..2303cb01dc4 100644 --- a/CVE-2022/CVE-2022-470xx/CVE-2022-47037.json +++ b/CVE-2022/CVE-2022-470xx/CVE-2022-47037.json @@ -2,8 +2,8 @@ "id": "CVE-2022-47037", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-18T03:15:06.017", - "lastModified": "2024-04-08T22:38:15.457", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:43:04.093", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-522" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-475xx/CVE-2022-47578.json b/CVE-2022/CVE-2022-475xx/CVE-2022-47578.json index 74eb704e731..985314665ea 100644 --- a/CVE-2022/CVE-2022-475xx/CVE-2022-47578.json +++ b/CVE-2022/CVE-2022-475xx/CVE-2022-47578.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47578", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-20T04:15:09.883", - "lastModified": "2024-07-22T20:15:03.103", + "lastModified": "2024-08-01T13:43:04.973", "vulnStatus": "Modified", "cveTags": [ { @@ -76,6 +76,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-288" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48285.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48285.json index 24b18e5271e..606787c4358 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48285.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48285.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48285", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-29T05:15:10.070", - "lastModified": "2024-06-21T19:15:24.193", + "lastModified": "2024-08-01T13:43:05.703", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48646.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48646.json index cb928ad90fb..7e00e5b0207 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48646.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48646.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48646", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-28T13:15:07.187", - "lastModified": "2024-04-29T12:42:03.667", + "lastModified": "2024-08-01T13:43:06.740", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -16,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/589c6eded10c77a12b7b2cf235b6b19a2bdb91fa", diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48683.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48683.json index 46e89048384..66aa0508d8d 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48683.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48683.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48683", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T20:15:12.677", - "lastModified": "2024-06-12T18:05:40.943", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:43:07.780", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1577.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1577.json index c5692f50d6a..973ae61d8d5 100644 --- a/CVE-2023/CVE-2023-15xx/CVE-2023-1577.json +++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1577.json @@ -2,13 +2,17 @@ "id": "CVE-2023-1577", "sourceIdentifier": "psirt@lenovo.com", "published": "2024-07-31T21:15:15.423", - "lastModified": "2024-07-31T21:15:15.423", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A path hijacking vulnerability was reported in Lenovo Driver Manager prior to version 3.1.1307.1308 that could allow a local user to execute code with elevated privileges." + }, + { + "lang": "es", + "value": " Se inform\u00f3 una vulnerabilidad de secuestro de ruta en Lenovo Driver Manager antes de la versi\u00f3n 3.1.1307.1308 que podr\u00eda permitir a un usuario local ejecutar c\u00f3digo con privilegios elevados." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-211xx/CVE-2023-21114.json b/CVE-2023/CVE-2023-211xx/CVE-2023-21114.json index d92b5d923e4..1f1914f04f6 100644 --- a/CVE-2023/CVE-2023-211xx/CVE-2023-21114.json +++ b/CVE-2023/CVE-2023-211xx/CVE-2023-21114.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21114", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:10.803", - "lastModified": "2024-07-11T13:06:13.187", + "lastModified": "2024-08-01T13:43:10.777", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En m\u00faltiples ubicaciones, existe una posible omisi\u00f3n de permiso debido a un agente confundido. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/packages/modules/Wifi/+/e6ca0c031758d8b1511f6a359bec316b6d2e22fe", diff --git a/CVE-2023/CVE-2023-237xx/CVE-2023-23752.json b/CVE-2023/CVE-2023-237xx/CVE-2023-23752.json index 7ea9b7c5bbc..81684a6ec39 100644 --- a/CVE-2023/CVE-2023-237xx/CVE-2023-23752.json +++ b/CVE-2023/CVE-2023-237xx/CVE-2023-23752.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23752", "sourceIdentifier": "security@joomla.org", "published": "2023-02-16T17:15:10.603", - "lastModified": "2024-01-09T02:00:01.953", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:43:17.320", + "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2024-01-08", "cisaActionDue": "2024-01-29", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-240xx/CVE-2023-24046.json b/CVE-2023/CVE-2023-240xx/CVE-2023-24046.json index e8fdebc1cc4..3be5d9bbf2b 100644 --- a/CVE-2023/CVE-2023-240xx/CVE-2023-24046.json +++ b/CVE-2023/CVE-2023-240xx/CVE-2023-24046.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24046", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-04T23:15:23.123", - "lastModified": "2023-12-08T16:03:04.717", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:43:18.417", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-240xx/CVE-2023-24047.json b/CVE-2023/CVE-2023-240xx/CVE-2023-24047.json index ac1674ae218..94987679341 100644 --- a/CVE-2023/CVE-2023-240xx/CVE-2023-24047.json +++ b/CVE-2023/CVE-2023-240xx/CVE-2023-24047.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24047", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-04T23:15:23.173", - "lastModified": "2023-12-08T16:23:33.007", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:43:19.220", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-522" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-240xx/CVE-2023-24048.json b/CVE-2023/CVE-2023-240xx/CVE-2023-24048.json index 5a3c13107ff..48b864c9e12 100644 --- a/CVE-2023/CVE-2023-240xx/CVE-2023-24048.json +++ b/CVE-2023/CVE-2023-240xx/CVE-2023-24048.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24048", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-04T23:15:23.220", - "lastModified": "2023-12-08T14:57:57.133", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:43:20.007", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-240xx/CVE-2023-24049.json b/CVE-2023/CVE-2023-240xx/CVE-2023-24049.json index eb2bde58e6f..915b3fdf276 100644 --- a/CVE-2023/CVE-2023-240xx/CVE-2023-24049.json +++ b/CVE-2023/CVE-2023-240xx/CVE-2023-24049.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24049", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-04T23:15:23.263", - "lastModified": "2023-12-08T16:32:19.967", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:43:20.783", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-521" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1393" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-240xx/CVE-2023-24050.json b/CVE-2023/CVE-2023-240xx/CVE-2023-24050.json index e73d73256aa..7e66473c848 100644 --- a/CVE-2023/CVE-2023-240xx/CVE-2023-24050.json +++ b/CVE-2023/CVE-2023-240xx/CVE-2023-24050.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24050", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-04T23:15:23.320", - "lastModified": "2023-12-08T16:37:34.153", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:43:21.560", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-240xx/CVE-2023-24051.json b/CVE-2023/CVE-2023-240xx/CVE-2023-24051.json index dc441003799..bad40307085 100644 --- a/CVE-2023/CVE-2023-240xx/CVE-2023-24051.json +++ b/CVE-2023/CVE-2023-240xx/CVE-2023-24051.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24051", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-04T23:15:23.367", - "lastModified": "2023-12-08T16:50:35.540", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:43:22.350", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-307" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-240xx/CVE-2023-24052.json b/CVE-2023/CVE-2023-240xx/CVE-2023-24052.json index 6ab7b69d002..eedad5a505c 100644 --- a/CVE-2023/CVE-2023-240xx/CVE-2023-24052.json +++ b/CVE-2023/CVE-2023-240xx/CVE-2023-24052.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24052", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-04T23:15:23.410", - "lastModified": "2023-12-08T17:38:12.703", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:43:23.130", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-242xx/CVE-2023-24229.json b/CVE-2023/CVE-2023-242xx/CVE-2023-24229.json index c4e2f335bfc..491c3a0bd3a 100644 --- a/CVE-2023/CVE-2023-242xx/CVE-2023-24229.json +++ b/CVE-2023/CVE-2023-242xx/CVE-2023-24229.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24229", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-15T18:15:10.460", - "lastModified": "2024-07-16T14:15:03.610", + "lastModified": "2024-08-01T13:43:23.910", "vulnStatus": "Modified", "cveTags": [ { @@ -39,6 +39,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -52,6 +72,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-243xx/CVE-2023-24330.json b/CVE-2023/CVE-2023-243xx/CVE-2023-24330.json index 6fadd93d0a1..f51a828c155 100644 --- a/CVE-2023/CVE-2023-243xx/CVE-2023-24330.json +++ b/CVE-2023/CVE-2023-243xx/CVE-2023-24330.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24330", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-21T21:15:08.503", - "lastModified": "2024-02-22T19:07:27.197", + "lastModified": "2024-08-01T13:43:24.723", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La vulnerabilidad de inyecci\u00f3n de comandos en D-Link Dir 882 con la versi\u00f3n de firmware DIR882A1_FW130B06 permite a los atacantes ejecutar comandos arbitrarios a trav\u00e9s de una solicitud POST manipulada para /HNAP1/." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/caoyebo/CVE/tree/main/dlink%20882%20-%20CVE-2023-24330", diff --git a/CVE-2023/CVE-2023-243xx/CVE-2023-24334.json b/CVE-2023/CVE-2023-243xx/CVE-2023-24334.json index a40eff19685..9c34627ed72 100644 --- a/CVE-2023/CVE-2023-243xx/CVE-2023-24334.json +++ b/CVE-2023/CVE-2023-243xx/CVE-2023-24334.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24334", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-21T21:15:08.723", - "lastModified": "2024-02-22T19:07:27.197", + "lastModified": "2024-08-01T13:43:27.040", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de desbordamiento en la regi\u00f3n stack de la memoria en Tenda AC23 con la versi\u00f3n de firmware US_AC23V1.0re_V16.03.07.45_cn_TDC01 permite a los atacantes ejecutar comandos arbitrarios a trav\u00e9s del par\u00e1metro schedStartTime." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/caoyebo/CVE/tree/main/TENDA%20AC23%20-%20CVE-2023-24334", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24932.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24932.json index 8d1918e7601..26bd228ae2a 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24932.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24932.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24932", "sourceIdentifier": "secure@microsoft.com", "published": "2023-05-09T18:15:12.407", - "lastModified": "2023-05-15T18:18:30.897", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:43:29.380", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-260xx/CVE-2023-26031.json b/CVE-2023/CVE-2023-260xx/CVE-2023-26031.json index 8b0e5071f55..0beb06b9352 100644 --- a/CVE-2023/CVE-2023-260xx/CVE-2023-26031.json +++ b/CVE-2023/CVE-2023-260xx/CVE-2023-26031.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26031", "sourceIdentifier": "security@apache.org", "published": "2023-11-16T09:15:06.920", - "lastModified": "2024-01-12T14:15:47.603", + "lastModified": "2024-08-01T13:43:31.307", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-262xx/CVE-2023-26257.json b/CVE-2023/CVE-2023-262xx/CVE-2023-26257.json index 1120a8fcb2c..3029559a6f5 100644 --- a/CVE-2023/CVE-2023-262xx/CVE-2023-26257.json +++ b/CVE-2023/CVE-2023-262xx/CVE-2023-26257.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26257", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-27T05:15:12.757", - "lastModified": "2024-06-27T18:15:12.610", + "lastModified": "2024-08-01T13:43:31.520", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-401" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-268xx/CVE-2023-26877.json b/CVE-2023/CVE-2023-268xx/CVE-2023-26877.json index 5a272fcccae..b2726b425e0 100644 --- a/CVE-2023/CVE-2023-268xx/CVE-2023-26877.json +++ b/CVE-2023/CVE-2023-268xx/CVE-2023-26877.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26877", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-26T20:15:14.777", - "lastModified": "2024-06-27T12:47:19.847", + "lastModified": "2024-08-01T13:43:32.710", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de carga de archivos encontrada en Softexpert Excellence Suite v.2.1 permite a atacantes ejecutar c\u00f3digo arbitrario mediante la carga de un archivo .php al endpoint form/efms_exec_html/file_upload_parser.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/rodnt/90ac26fdf891e602f6f090d6aebce32d", diff --git a/CVE-2023/CVE-2023-276xx/CVE-2023-27636.json b/CVE-2023/CVE-2023-276xx/CVE-2023-27636.json index b89581d4679..d35d2abb5c5 100644 --- a/CVE-2023/CVE-2023-276xx/CVE-2023-27636.json +++ b/CVE-2023/CVE-2023-276xx/CVE-2023-27636.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27636", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-16T21:15:50.620", - "lastModified": "2024-06-28T15:15:03.047", + "lastModified": "2024-08-01T13:43:34.370", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Progress Sitefinity anterior a 15.0.0 permite XSS por parte de usuarios autenticados a trav\u00e9s del formulario de contenido en el Editor SF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://aldisaw.id/security/2024/06/03/CVE-2023-27636.html", diff --git a/CVE-2023/CVE-2023-281xx/CVE-2023-28149.json b/CVE-2023/CVE-2023-281xx/CVE-2023-28149.json index 2d5185e2dbe..e7278475ee9 100644 --- a/CVE-2023/CVE-2023-281xx/CVE-2023-28149.json +++ b/CVE-2023/CVE-2023-281xx/CVE-2023-28149.json @@ -2,13 +2,17 @@ "id": "CVE-2023-28149", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-31T19:15:10.993", - "lastModified": "2024-07-31T19:15:10.993", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the IhisiServiceSmm module in Insyde InsydeH2O with kernel 5.2 before 05.28.42, 5.3 before 05.37.42, 5.4 before 05.45.39, 5.5 before 05.53.39, and 5.6 before 05.60.39 that could allow an attacker to modify UEFI variables." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 un problema en el m\u00f3dulo IhisiServiceSmm en Insyde InsydeH2O con kernel 5.2 anterior a 05.28.42, 5.3 anterior a 05.37.42, 5.4 anterior a 05.45.39, 5.5 anterior a 05.53.39 y 5.6 anterior a 05.60.39 que podr\u00eda permitir a un atacante modificar Variables UEFI." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28232.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28232.json index ac449f7c935..1f744d89c4d 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28232.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28232.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28232", "sourceIdentifier": "secure@microsoft.com", "published": "2023-04-11T21:15:23.563", - "lastModified": "2023-04-13T01:12:56.100", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:43:35.863", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28249.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28249.json index 46137786399..ddf6350945a 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28249.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28249.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28249", "sourceIdentifier": "secure@microsoft.com", "published": "2023-04-11T21:15:24.883", - "lastModified": "2023-04-19T13:36:34.890", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:43:36.880", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -65,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28270.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28270.json index 68e7e77ce1e..476bb138e6c 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28270.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28270.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28270", "sourceIdentifier": "secure@microsoft.com", "published": "2023-04-11T21:15:26.050", - "lastModified": "2023-04-19T15:17:58.427", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:43:37.997", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28335.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28335.json index 557046a9fe0..cad869cb0bd 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28335.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28335.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28335", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2023-03-23T21:15:20.257", - "lastModified": "2024-04-19T14:15:09.407", + "lastModified": "2024-08-01T13:43:39.323", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-295xx/CVE-2023-29581.json b/CVE-2023/CVE-2023-295xx/CVE-2023-29581.json index 185ff9a366d..c7fca9eecdb 100644 --- a/CVE-2023/CVE-2023-295xx/CVE-2023-29581.json +++ b/CVE-2023/CVE-2023-295xx/CVE-2023-29581.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29581", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-12T16:15:19.603", - "lastModified": "2024-07-23T15:15:03.180", + "lastModified": "2024-08-01T13:43:41.360", "vulnStatus": "Modified", "cveTags": [ { @@ -39,6 +39,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-295xx/CVE-2023-29583.json b/CVE-2023/CVE-2023-295xx/CVE-2023-29583.json index 744b68293d5..fa3baf5ed83 100644 --- a/CVE-2023/CVE-2023-295xx/CVE-2023-29583.json +++ b/CVE-2023/CVE-2023-295xx/CVE-2023-29583.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29583", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-24T13:15:07.523", - "lastModified": "2024-07-18T18:15:05.047", + "lastModified": "2024-08-01T13:43:41.557", "vulnStatus": "Modified", "cveTags": [ { @@ -39,6 +39,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 } ] }, @@ -52,6 +72,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-298xx/CVE-2023-29824.json b/CVE-2023/CVE-2023-298xx/CVE-2023-29824.json index 267bf4abd85..cf64f06a2c1 100644 --- a/CVE-2023/CVE-2023-298xx/CVE-2023-29824.json +++ b/CVE-2023/CVE-2023-298xx/CVE-2023-29824.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29824", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-06T21:15:09.060", - "lastModified": "2024-07-22T20:15:03.313", + "lastModified": "2024-08-01T13:43:42.387", "vulnStatus": "Modified", "cveTags": [ { @@ -43,6 +43,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -56,6 +76,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-310xx/CVE-2023-31045.json b/CVE-2023/CVE-2023-310xx/CVE-2023-31045.json index 81fd0736c65..56efcbfe411 100644 --- a/CVE-2023/CVE-2023-310xx/CVE-2023-31045.json +++ b/CVE-2023/CVE-2023-310xx/CVE-2023-31045.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31045", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-24T08:15:07.257", - "lastModified": "2024-07-18T21:15:02.370", + "lastModified": "2024-08-01T13:43:45.363", "vulnStatus": "Modified", "cveTags": [ { @@ -39,6 +39,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -52,6 +72,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-314xx/CVE-2023-31484.json b/CVE-2023/CVE-2023-314xx/CVE-2023-31484.json index f4f703c4802..0d5f9418b41 100644 --- a/CVE-2023/CVE-2023-314xx/CVE-2023-31484.json +++ b/CVE-2023/CVE-2023-314xx/CVE-2023-31484.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31484", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-29T00:15:09.000", - "lastModified": "2024-06-21T19:15:26.850", + "lastModified": "2024-08-01T13:43:46.380", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-295" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32020.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32020.json index d9d958226c5..18da1ccbf7c 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32020.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32020.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32020", "sourceIdentifier": "secure@microsoft.com", "published": "2023-06-14T00:15:11.563", - "lastModified": "2023-08-01T21:15:10.937", + "lastModified": "2024-08-01T13:43:48.313", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-350" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-335xx/CVE-2023-33584.json b/CVE-2023/CVE-2023-335xx/CVE-2023-33584.json index 6c21983be27..0adb69801dd 100644 --- a/CVE-2023/CVE-2023-335xx/CVE-2023-33584.json +++ b/CVE-2023/CVE-2023-335xx/CVE-2023-33584.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33584", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-21T13:15:10.117", - "lastModified": "2024-04-22T21:15:48.840", + "lastModified": "2024-08-01T13:43:52.090", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-338xx/CVE-2023-33806.json b/CVE-2023/CVE-2023-338xx/CVE-2023-33806.json index ddb6309bea8..9ac316f5e6f 100644 --- a/CVE-2023/CVE-2023-338xx/CVE-2023-33806.json +++ b/CVE-2023/CVE-2023-338xx/CVE-2023-33806.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33806", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-15T23:15:06.837", - "lastModified": "2024-04-16T13:24:07.103", + "lastModified": "2024-08-01T13:43:52.917", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Las configuraciones predeterminadas inseguras en Hikvision Interactive Tablet DS-D5B86RB/B V2.3.0 build220119 permiten a los atacantes ejecutar comandos arbitrarios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/s4fv4n/5a6374cf1dcad85226566eaa325a710d", diff --git a/CVE-2023/CVE-2023-350xx/CVE-2023-35078.json b/CVE-2023/CVE-2023-350xx/CVE-2023-35078.json index 77c8928d1b1..cc6c03586e2 100644 --- a/CVE-2023/CVE-2023-350xx/CVE-2023-35078.json +++ b/CVE-2023/CVE-2023-350xx/CVE-2023-35078.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35078", "sourceIdentifier": "support@hackerone.com", "published": "2023-07-25T07:15:10.897", - "lastModified": "2024-06-27T18:52:14.877", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:43:55.000", + "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2023-07-25", "cisaActionDue": "2023-08-15", @@ -71,6 +71,16 @@ "value": "CWE-287" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-351xx/CVE-2023-35121.json b/CVE-2023/CVE-2023-351xx/CVE-2023-35121.json index 532a1aa1458..d48ff7caa7e 100644 --- a/CVE-2023/CVE-2023-351xx/CVE-2023-35121.json +++ b/CVE-2023/CVE-2023-351xx/CVE-2023-35121.json @@ -2,7 +2,7 @@ "id": "CVE-2023-35121", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:16:00.123", - "lastModified": "2024-03-28T15:15:45.453", + "lastModified": "2024-08-01T13:43:55.757", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00988.html", diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35860.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35860.json index a9a7f7bf068..2710453768e 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35860.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35860.json @@ -2,7 +2,7 @@ "id": "CVE-2023-35860", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-13T16:15:10.387", - "lastModified": "2024-06-13T18:35:19.777", + "lastModified": "2024-08-01T13:43:58.613", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de Directory Traversal en Modern Campus: Omni CMS 2023.1 permite que un atacante remoto no autenticado enumere informaci\u00f3n del sistema de archivos a trav\u00e9s del par\u00e1metro dir en listado.php o rss.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-31" + } + ] + } + ], "references": [ { "url": "https://lp.constantcontactpages.com/cu/c2nSB5D/moderncampuscve", diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36092.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36092.json index 55911add2e9..a07672d7170 100644 --- a/CVE-2023/CVE-2023-360xx/CVE-2023-36092.json +++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36092.json @@ -2,7 +2,7 @@ "id": "CVE-2023-36092", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-31T14:15:10.633", - "lastModified": "2024-07-17T21:15:11.233", + "lastModified": "2024-08-01T13:44:04.543", "vulnStatus": "Modified", "cveTags": [ { @@ -39,6 +39,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -52,6 +72,16 @@ "value": "CWE-863" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-362xx/CVE-2023-36237.json b/CVE-2023/CVE-2023-362xx/CVE-2023-36237.json index cf69e18a726..2586f5283cb 100644 --- a/CVE-2023/CVE-2023-362xx/CVE-2023-36237.json +++ b/CVE-2023/CVE-2023-362xx/CVE-2023-36237.json @@ -2,7 +2,7 @@ "id": "CVE-2023-36237", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-26T22:15:06.933", - "lastModified": "2024-02-27T14:20:06.637", + "lastModified": "2024-08-01T13:44:05.510", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La vulnerabilidad de Cross Site Request Forgery en Bagisto anterior a v.1.5.1 permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script HTML manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/Ek-Saini/security/blob/main/CSRF-Bagisto", diff --git a/CVE-2023/CVE-2023-363xx/CVE-2023-36321.json b/CVE-2023/CVE-2023-363xx/CVE-2023-36321.json index f85e51c42eb..ea3d43f3da6 100644 --- a/CVE-2023/CVE-2023-363xx/CVE-2023-36321.json +++ b/CVE-2023/CVE-2023-363xx/CVE-2023-36321.json @@ -2,7 +2,7 @@ "id": "CVE-2023-36321", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-17T23:15:11.513", - "lastModified": "2024-06-27T18:15:12.750", + "lastModified": "2024-08-01T13:44:06.490", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-366xx/CVE-2023-36643.json b/CVE-2023/CVE-2023-366xx/CVE-2023-36643.json index 471b6883158..308850c122a 100644 --- a/CVE-2023/CVE-2023-366xx/CVE-2023-36643.json +++ b/CVE-2023/CVE-2023-366xx/CVE-2023-36643.json @@ -2,7 +2,7 @@ "id": "CVE-2023-36643", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-04T09:15:06.910", - "lastModified": "2024-04-04T12:48:41.700", + "lastModified": "2024-08-01T13:44:07.637", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://github.com/caffeinated-labs/CVE-2023-36643", diff --git a/CVE-2023/CVE-2023-366xx/CVE-2023-36645.json b/CVE-2023/CVE-2023-366xx/CVE-2023-36645.json index b595e964b14..b651f09367e 100644 --- a/CVE-2023/CVE-2023-366xx/CVE-2023-36645.json +++ b/CVE-2023/CVE-2023-366xx/CVE-2023-36645.json @@ -2,7 +2,7 @@ "id": "CVE-2023-36645", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-04T09:15:07.297", - "lastModified": "2024-04-04T12:48:41.700", + "lastModified": "2024-08-01T13:44:08.367", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/caffeinated-labs/CVE-2023-36645", diff --git a/CVE-2023/CVE-2023-375xx/CVE-2023-37536.json b/CVE-2023/CVE-2023-375xx/CVE-2023-37536.json index ba6847a3593..82603f9b458 100644 --- a/CVE-2023/CVE-2023-375xx/CVE-2023-37536.json +++ b/CVE-2023/CVE-2023-375xx/CVE-2023-37536.json @@ -2,7 +2,7 @@ "id": "CVE-2023-37536", "sourceIdentifier": "psirt@hcl.com", "published": "2023-10-11T07:15:10.580", - "lastModified": "2023-12-31T14:15:42.080", + "lastModified": "2024-08-01T13:44:10.753", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-190" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-680" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-375xx/CVE-2023-37539.json b/CVE-2023/CVE-2023-375xx/CVE-2023-37539.json index 90458c44df8..f1cadcb7f8d 100644 --- a/CVE-2023/CVE-2023-375xx/CVE-2023-37539.json +++ b/CVE-2023/CVE-2023-375xx/CVE-2023-37539.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37539", "sourceIdentifier": "psirt@hcl.com", "published": "2024-06-06T23:15:48.720", - "lastModified": "2024-07-16T14:23:29.953", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:44:11.527", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -69,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38035.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38035.json index fe397abef78..86c8b9d991b 100644 --- a/CVE-2023/CVE-2023-380xx/CVE-2023-38035.json +++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38035.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38035", "sourceIdentifier": "support@hackerone.com", "published": "2023-08-21T17:15:47.457", - "lastModified": "2024-06-27T18:48:42.510", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:44:12.457", + "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2023-08-22", "cisaActionDue": "2023-09-12", @@ -40,6 +40,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -53,6 +73,16 @@ "value": "CWE-863" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38042.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38042.json index e8c74755ad7..1fd2a6dcabc 100644 --- a/CVE-2023/CVE-2023-380xx/CVE-2023-38042.json +++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38042.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38042", "sourceIdentifier": "support@hackerone.com", "published": "2024-05-31T18:15:09.607", - "lastModified": "2024-05-31T19:14:47.793", + "lastModified": "2024-08-01T13:44:13.283", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-250" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-May-2024?language=en_US", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38197.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38197.json index 4378e17508c..a2c4fc0a2c5 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38197.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38197.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38197", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-13T02:15:09.677", - "lastModified": "2024-05-01T01:15:06.277", + "lastModified": "2024-08-01T13:44:15.063", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-835" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38522.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38522.json index 9e4c9d7f680..a9740f9e748 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38522.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38522.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38522", "sourceIdentifier": "security@apache.org", "published": "2024-07-26T10:15:01.923", - "lastModified": "2024-07-26T12:38:41.683", + "lastModified": "2024-08-01T13:44:16.693", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Apache Traffic Server acepta caracteres que no est\u00e1n permitidos para los nombres de campos HTTP y reenv\u00eda las solicitudes malformadas a los servidores de origen. Esto se puede utilizar para el contrabando de solicitudes y tambi\u00e9n puede provocar un envenenamiento de la cach\u00e9 si los servidores de origen son vulnerables. Este problema afecta a Apache Traffic Server: desde la versi\u00f3n 8.0.0 hasta la 8.1.10, desde la 9.0.0 hasta la 9.2.4. Se recomienda a los usuarios que actualicen a la versi\u00f3n 8.1.11 o 9.2.5, que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", @@ -26,6 +49,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-86" + } + ] } ], "references": [ diff --git a/CVE-2023/CVE-2023-389xx/CVE-2023-38945.json b/CVE-2023/CVE-2023-389xx/CVE-2023-38945.json index 9656a4555fa..ebfd8cc39f6 100644 --- a/CVE-2023/CVE-2023-389xx/CVE-2023-38945.json +++ b/CVE-2023/CVE-2023-389xx/CVE-2023-38945.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38945", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-06T00:15:52.247", - "lastModified": "2024-03-06T15:18:08.093", + "lastModified": "2024-08-01T13:44:18.370", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Multilaser RE160 v5.07.51_pt_MTL01 y v5.07.52_pt_MTL01, Multilaser RE160V v12.03.01.08_pt y V12.03.01.09_pt, y Multilaser RE163V v12.03.01.08_pt permiten a los atacantes eludir el control de acceso y obtener acceso completo a la aplicaci\u00f3n mediante el suministro una URL manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Mar/1", diff --git a/CVE-2023/CVE-2023-389xx/CVE-2023-38947.json b/CVE-2023/CVE-2023-389xx/CVE-2023-38947.json index 3933e407c5a..77d9188a0fc 100644 --- a/CVE-2023/CVE-2023-389xx/CVE-2023-38947.json +++ b/CVE-2023/CVE-2023-389xx/CVE-2023-38947.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38947", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-03T16:15:12.010", - "lastModified": "2024-07-16T16:15:03.893", + "lastModified": "2024-08-01T13:44:19.173", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-616" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-396xx/CVE-2023-39667.json b/CVE-2023/CVE-2023-396xx/CVE-2023-39667.json index 1615f5c76c6..ca354773391 100644 --- a/CVE-2023/CVE-2023-396xx/CVE-2023-39667.json +++ b/CVE-2023/CVE-2023-396xx/CVE-2023-39667.json @@ -2,7 +2,7 @@ "id": "CVE-2023-39667", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-18T03:15:22.020", - "lastModified": "2024-07-26T21:15:11.823", + "lastModified": "2024-08-01T13:44:20.820", "vulnStatus": "Modified", "cveTags": [ { @@ -43,6 +43,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -56,6 +76,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-400xx/CVE-2023-40077.json b/CVE-2023/CVE-2023-400xx/CVE-2023-40077.json index 7bee268e506..dce813a6d52 100644 --- a/CVE-2023/CVE-2023-400xx/CVE-2023-40077.json +++ b/CVE-2023/CVE-2023-400xx/CVE-2023-40077.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40077", "sourceIdentifier": "security@android.com", "published": "2023-12-04T23:15:23.760", - "lastModified": "2024-02-02T16:29:32.827", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:44:25.493", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-362" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-400xx/CVE-2023-40088.json b/CVE-2023/CVE-2023-400xx/CVE-2023-40088.json index 31415c5854b..651ea9e7ce6 100644 --- a/CVE-2023/CVE-2023-400xx/CVE-2023-40088.json +++ b/CVE-2023/CVE-2023-400xx/CVE-2023-40088.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40088", "sourceIdentifier": "security@android.com", "published": "2023-12-04T23:15:24.230", - "lastModified": "2024-02-02T03:15:16.057", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:44:26.347", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40104.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40104.json index e7e57c4908f..41a09fe3473 100644 --- a/CVE-2023/CVE-2023-401xx/CVE-2023-40104.json +++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40104.json @@ -2,7 +2,7 @@ "id": "CVE-2023-40104", "sourceIdentifier": "security@android.com", "published": "2024-02-15T23:15:08.017", - "lastModified": "2024-02-16T13:37:55.033", + "lastModified": "2024-08-01T13:44:27.157", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En los certificados ca, existe una forma posible de leer datos TLS cifrados debido a certificados criptogr\u00e1ficos que no son de confianza. Esto podr\u00eda conducir a la divulgaci\u00f3n remota de informaci\u00f3n sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/system/ca-certificates/+/91204b9fdbd77b3f27f94b73868607b2dccbfdad", diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40115.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40115.json index 49c97fc3978..69ea6bf40f7 100644 --- a/CVE-2023/CVE-2023-401xx/CVE-2023-40115.json +++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40115.json @@ -2,7 +2,7 @@ "id": "CVE-2023-40115", "sourceIdentifier": "security@android.com", "published": "2024-02-15T23:15:08.693", - "lastModified": "2024-02-16T13:37:55.033", + "lastModified": "2024-08-01T13:44:27.970", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En readLogs de StatsService.cpp, existe una posible corrupci\u00f3n de memoria debido a un use after free. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/packages/modules/StatsD/+/e4cd2d8f75d1b7b83a759d752f38099a9aa9997e", diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40275.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40275.json index effa0c6bfef..38dc3c8b92e 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40275.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40275.json @@ -2,7 +2,7 @@ "id": "CVE-2023-40275", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-19T01:15:44.743", - "lastModified": "2024-03-19T13:26:46.000", + "lastModified": "2024-08-01T13:44:29.067", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en OpenClinic GA 5.247.01. Permite la recuperaci\u00f3n de listas de pacientes mediante consultas como findFirstname= a _common/search/searchByAjax/patientslistShow.jsp." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://github.com/BugBountyHunterCVE/CVE-2023-40275/blob/main/CVE-2023-40275_Unauthenticated-Patient-List-Retrieval_OpenClinic-GA_5.247.01_Report.md", diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40278.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40278.json index 279c6d64c11..ee50dc9afc8 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40278.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40278.json @@ -2,7 +2,7 @@ "id": "CVE-2023-40278", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-19T12:15:07.473", - "lastModified": "2024-03-19T13:26:46.000", + "lastModified": "2024-08-01T13:44:29.937", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en OpenClinic GA 5.247.01. Se ha identificado una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en el componente printAppointmentPdf.jsp de OpenClinic GA. Al cambiar el par\u00e1metro AppointmentUid, un atacante puede determinar si existe una cita espec\u00edfica en funci\u00f3n del mensaje de error." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://github.com/BugBountyHunterCVE/CVE-2023-40278/blob/main/CVE-2023-40278_Information-Disclosure_OpenClinic-GA_5.247.01_Report.md", diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40279.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40279.json index df0a909638d..e62fbf28492 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40279.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40279.json @@ -2,7 +2,7 @@ "id": "CVE-2023-40279", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-19T13:15:06.837", - "lastModified": "2024-03-19T13:26:46.000", + "lastModified": "2024-08-01T13:44:30.750", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en OpenClinic GA 5.247.01. Un atacante puede realizar un directory path traversal a trav\u00e9s del par\u00e1metro P\u00e1gina en una solicitud GET a main.do." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://github.com/BugBountyHunterCVE/CVE-2023-40279/blob/main/CVE-2023-40279_Authenticated-Directory-Path-Traversal_OpenClinic-GA_5.247.01_Report.md", diff --git a/CVE-2023/CVE-2023-403xx/CVE-2023-40396.json b/CVE-2023/CVE-2023-403xx/CVE-2023-40396.json index eaaf3f4ed8c..e318dc6e7d8 100644 --- a/CVE-2023/CVE-2023-403xx/CVE-2023-40396.json +++ b/CVE-2023/CVE-2023-403xx/CVE-2023-40396.json @@ -2,7 +2,7 @@ "id": "CVE-2023-40396", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T21:15:11.453", - "lastModified": "2024-07-30T13:33:30.653", + "lastModified": "2024-08-01T13:44:31.750", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": " Este problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en macOS Monterey 12.6.4, macOS Big Sur 11.7.5, macOS Ventura 13.3, iOS 16.4 y iPadOS 16.4. Un proceso en el espacio aislado puede omitir las restricciones del espacio aislado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.7 + } + ] + }, "references": [ { "url": "https://support.apple.com/en-us/HT213936", diff --git a/CVE-2023/CVE-2023-407xx/CVE-2023-40743.json b/CVE-2023/CVE-2023-407xx/CVE-2023-40743.json index 3d6f673acce..e2354b02081 100644 --- a/CVE-2023/CVE-2023-407xx/CVE-2023-40743.json +++ b/CVE-2023/CVE-2023-407xx/CVE-2023-40743.json @@ -2,7 +2,7 @@ "id": "CVE-2023-40743", "sourceIdentifier": "security@apache.org", "published": "2023-09-05T15:15:42.687", - "lastModified": "2024-07-18T16:15:05.953", + "lastModified": "2024-08-01T13:44:34.403", "vulnStatus": "Modified", "cveTags": [ { @@ -43,6 +43,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -56,6 +76,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-75" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-407xx/CVE-2023-40747.json b/CVE-2023/CVE-2023-407xx/CVE-2023-40747.json index e8ce2463a22..bafd61dd394 100644 --- a/CVE-2023/CVE-2023-407xx/CVE-2023-40747.json +++ b/CVE-2023/CVE-2023-407xx/CVE-2023-40747.json @@ -2,7 +2,7 @@ "id": "CVE-2023-40747", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-03-18T01:15:48.440", - "lastModified": "2024-03-18T01:53:02.353", + "lastModified": "2024-08-01T13:44:37.343", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Existe una vulnerabilidad de Directory Traversal en los CGI de los productos PMailServer/PMailServer2 de AKI Software incluidos en Internal Simple Webserver. Si se explota esta vulnerabilidad, un atacante remoto puede acceder a archivos arbitrarios fuera de DocumentRoot." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://akisoftware.com/Vulnerability202301.html", diff --git a/CVE-2023/CVE-2023-412xx/CVE-2023-41264.json b/CVE-2023/CVE-2023-412xx/CVE-2023-41264.json index b5373a91665..39d9b63d905 100644 --- a/CVE-2023/CVE-2023-412xx/CVE-2023-41264.json +++ b/CVE-2023/CVE-2023-412xx/CVE-2023-41264.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41264", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-28T17:15:07.857", - "lastModified": "2023-12-04T19:17:54.180", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:44:37.760", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-287" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41724.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41724.json index 66f8745b84a..8452c0a81dc 100644 --- a/CVE-2023/CVE-2023-417xx/CVE-2023-41724.json +++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41724.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41724", "sourceIdentifier": "support@hackerone.com", "published": "2024-03-31T02:15:07.660", - "lastModified": "2024-04-01T15:31:21.150", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:44:44.643", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -71,6 +71,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42859.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42859.json index 19970a964ce..4109fb1c785 100644 --- a/CVE-2023/CVE-2023-428xx/CVE-2023-42859.json +++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42859.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42859", "sourceIdentifier": "product-security@apple.com", "published": "2024-02-21T07:15:49.670", - "lastModified": "2024-02-22T19:07:27.197", + "lastModified": "2024-08-01T13:44:47.733", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en macOS Sonoma 14.1, macOS Monterey 12.7.1, macOS Ventura 13.6.1. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del sistema de archivos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.2 + } + ] + }, "references": [ { "url": "https://support.apple.com/en-us/HT213983", diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42877.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42877.json index 92a8b19430b..70db7f1f2f4 100644 --- a/CVE-2023/CVE-2023-428xx/CVE-2023-42877.json +++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42877.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42877", "sourceIdentifier": "product-security@apple.com", "published": "2024-02-21T07:15:50.173", - "lastModified": "2024-02-22T19:07:27.197", + "lastModified": "2024-08-01T13:44:48.073", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en macOS Sonoma 14.1, macOS Monterey 12.7.1, macOS Ventura 13.6.1. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del sistema de archivos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.2 + } + ] + }, "references": [ { "url": "https://support.apple.com/en-us/HT213983", diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42918.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42918.json index e3921fb36b3..503830d7615 100644 --- a/CVE-2023/CVE-2023-429xx/CVE-2023-42918.json +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42918.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42918", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T21:15:11.610", - "lastModified": "2024-07-30T13:33:30.653", + "lastModified": "2024-08-01T13:44:48.283", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema se solucion\u00f3 en macOS Sonoma 14. Un proceso de espacio aislado puede omitir las restricciones del espacio aislado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/HT213940", diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42928.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42928.json index b8ef7eb499c..8502d84a167 100644 --- a/CVE-2023/CVE-2023-429xx/CVE-2023-42928.json +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42928.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42928", "sourceIdentifier": "product-security@apple.com", "published": "2024-02-21T07:15:50.603", - "lastModified": "2024-02-22T19:07:27.197", + "lastModified": "2024-08-01T13:44:49.103", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El problema se solucion\u00f3 con comprobaciones de los l\u00edmites mejoradas. Este problema se solucion\u00f3 en iOS 17.1 y iPadOS 17.1. Es posible que una aplicaci\u00f3n pueda obtener privilegios elevados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://support.apple.com/en-us/HT213982", diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42958.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42958.json index 4585c67f8a0..30424a67a63 100644 --- a/CVE-2023/CVE-2023-429xx/CVE-2023-42958.json +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42958.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42958", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T21:15:11.983", - "lastModified": "2024-07-30T13:33:30.653", + "lastModified": "2024-08-01T13:44:50.180", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": " Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema se solucion\u00f3 en macOS Ventura 13.4. Es posible que una aplicaci\u00f3n pueda obtener privilegios elevados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://support.apple.com/en-us/HT213758", diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42959.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42959.json index 94962e2e545..b786419c2b3 100644 --- a/CVE-2023/CVE-2023-429xx/CVE-2023-42959.json +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42959.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42959", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T21:15:12.047", - "lastModified": "2024-07-30T13:32:45.943", + "lastModified": "2024-08-01T13:44:50.437", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Se solucion\u00f3 una condici\u00f3n de ejecuci\u00f3n con un mejor manejo del estado. Este problema se solucion\u00f3 en macOS Sonoma 14. Es posible que una aplicaci\u00f3n pueda ejecutar c\u00f3digo arbitrario con privilegios del kernel." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/HT213940", diff --git a/CVE-2023/CVE-2023-433xx/CVE-2023-43318.json b/CVE-2023/CVE-2023-433xx/CVE-2023-43318.json index bdb4661b720..2dee1f48bff 100644 --- a/CVE-2023/CVE-2023-433xx/CVE-2023-43318.json +++ b/CVE-2023/CVE-2023-433xx/CVE-2023-43318.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43318", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-06T00:15:52.347", - "lastModified": "2024-03-12T15:01:14.340", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:44:51.273", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-444xx/CVE-2023-44487.json b/CVE-2023/CVE-2023-444xx/CVE-2023-44487.json index 8e1d5d7f23e..5b642d1b5f5 100644 --- a/CVE-2023/CVE-2023-444xx/CVE-2023-44487.json +++ b/CVE-2023/CVE-2023-444xx/CVE-2023-44487.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44487", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-10T14:15:10.883", - "lastModified": "2024-06-27T18:34:22.110", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:44:53.500", + "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2023-10-10", "cisaActionDue": "2023-10-31", @@ -40,6 +40,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -53,6 +73,16 @@ "value": "CWE-400" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-448xx/CVE-2023-44855.json b/CVE-2023/CVE-2023-448xx/CVE-2023-44855.json index b7b64c759b6..6b79e9ff6d1 100644 --- a/CVE-2023/CVE-2023-448xx/CVE-2023-44855.json +++ b/CVE-2023/CVE-2023-448xx/CVE-2023-44855.json @@ -2,7 +2,7 @@ "id": "CVE-2023-44855", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-12T05:15:46.683", - "lastModified": "2024-04-12T12:43:46.210", + "lastModified": "2024-08-01T13:44:55.020", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de Cross Site Scripting (XSS) en Cobham SAILOR VSAT Ku v.164B019 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado para los par\u00e1metros rdiag, remitente y destinatarios de la funci\u00f3n sub_219C4 en el archivo acu_web." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://pine-amphibian-9b9.notion.site/ENG-SAILOR-Ku-Software-XSS-Diagnostics-report-019462dcebf6428da34dd7daee21583b", diff --git a/CVE-2023/CVE-2023-454xx/CVE-2023-45481.json b/CVE-2023/CVE-2023-454xx/CVE-2023-45481.json index 7e2d72c2c69..8515ece0d9d 100644 --- a/CVE-2023/CVE-2023-454xx/CVE-2023-45481.json +++ b/CVE-2023/CVE-2023-454xx/CVE-2023-45481.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45481", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-29T06:15:46.660", - "lastModified": "2023-12-01T03:58:54.947", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:44:56.787", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45503.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45503.json index a2d25fc5713..5871262f743 100644 --- a/CVE-2023/CVE-2023-455xx/CVE-2023-45503.json +++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45503.json @@ -2,7 +2,7 @@ "id": "CVE-2023-45503", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-15T20:15:10.777", - "lastModified": "2024-04-16T13:24:07.103", + "lastModified": "2024-08-01T13:44:57.620", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en Macrob7 Macs CMS 1.1.4f, permite a atacantes remotos ejecutar c\u00f3digo arbitrario, provocar una denegaci\u00f3n de servicio (DoS), escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s de un payload manipulado para resetPassword, forgotPasswordProcess, saveUser, saveRole, deleteUser, deleteRole, deleteComment, deleteUser, allowComment, saveRole, forgotPasswordProcess, resetPassword, saveUser, addComment, saveRole, and saveUser endpoints." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://docs.google.com/spreadsheets/d/1AzXspN8oBAJ80YQxfN44bpbOuNzA3PZEccQ6IGQMs5E/edit?usp=sharing", diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45853.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45853.json index 3a962495fce..7e8db00ebfc 100644 --- a/CVE-2023/CVE-2023-458xx/CVE-2023-45853.json +++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45853.json @@ -2,7 +2,7 @@ "id": "CVE-2023-45853", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-14T02:15:09.323", - "lastModified": "2024-01-24T21:15:08.623", + "lastModified": "2024-08-01T13:44:58.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-190" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46223.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46223.json index 1c877ee9ea0..2e65bfae76d 100644 --- a/CVE-2023/CVE-2023-462xx/CVE-2023-46223.json +++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46223.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46223", "sourceIdentifier": "support@hackerone.com", "published": "2023-12-19T16:15:09.957", - "lastModified": "2023-12-21T04:47:26.523", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:45:00.090", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -71,6 +71,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46801.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46801.json index 910be739cb9..a307fc28748 100644 --- a/CVE-2023/CVE-2023-468xx/CVE-2023-46801.json +++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46801.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46801", "sourceIdentifier": "security@apache.org", "published": "2024-07-15T08:15:02.253", - "lastModified": "2024-07-16T18:06:22.640", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:45:00.980", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46808.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46808.json index 165c02e3368..e3962022f0c 100644 --- a/CVE-2023/CVE-2023-468xx/CVE-2023-46808.json +++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46808.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46808", "sourceIdentifier": "support@hackerone.com", "published": "2024-03-31T02:15:08.757", - "lastModified": "2024-04-01T15:31:56.613", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:45:01.253", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -71,6 +71,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-469xx/CVE-2023-46951.json b/CVE-2023/CVE-2023-469xx/CVE-2023-46951.json index 7ed4b9f3f7e..2c0cfd4bde2 100644 --- a/CVE-2023/CVE-2023-469xx/CVE-2023-46951.json +++ b/CVE-2023/CVE-2023-469xx/CVE-2023-46951.json @@ -2,7 +2,7 @@ "id": "CVE-2023-46951", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-01T14:15:53.087", - "lastModified": "2024-03-01T15:23:36.177", + "lastModified": "2024-08-01T13:45:03.913", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de Cross-Site Scripting en Contribsys Sidekiq v.6.5.8 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de un payload manipulado para la funci\u00f3n Uniquejobs." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/mhenrixon/sidekiq-unique-jobs/security/advisories/GHSA-cmh9-rx85-xj38", diff --git a/CVE-2023/CVE-2023-469xx/CVE-2023-46960.json b/CVE-2023/CVE-2023-469xx/CVE-2023-46960.json index 8d57d2a70a3..a846f6ddc5c 100644 --- a/CVE-2023/CVE-2023-469xx/CVE-2023-46960.json +++ b/CVE-2023/CVE-2023-469xx/CVE-2023-46960.json @@ -2,7 +2,7 @@ "id": "CVE-2023-46960", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T21:15:47.527", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-08-01T13:45:04.950", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de desbordamiento de b\u00fafer en PyPXE v.1.8.4 permite que un atacante remoto provoque una denegaci\u00f3n de servicio a trav\u00e9s de la funci\u00f3n de manejo en el m\u00f3dulo tftp." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/pypxe/PyPXE/issues/206", diff --git a/CVE-2023/CVE-2023-483xx/CVE-2023-48362.json b/CVE-2023/CVE-2023-483xx/CVE-2023-48362.json index 980aef32035..665ade24c60 100644 --- a/CVE-2023/CVE-2023-483xx/CVE-2023-48362.json +++ b/CVE-2023/CVE-2023-483xx/CVE-2023-48362.json @@ -2,7 +2,7 @@ "id": "CVE-2023-48362", "sourceIdentifier": "security@apache.org", "published": "2024-07-24T08:15:02.627", - "lastModified": "2024-07-24T14:15:05.180", + "lastModified": "2024-08-01T13:45:08.180", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "XXE en el complemento de formato XML en Apache Drill versi\u00f3n 1.19.0 y superior permite al usuario leer cualquier archivo en un sistema de archivos remoto o ejecutar comandos a trav\u00e9s de un archivo XML malicioso. Se recomienda a los usuarios actualizar a la versi\u00f3n 1.21.2, que soluciona este problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2023/CVE-2023-483xx/CVE-2023-48396.json b/CVE-2023/CVE-2023-483xx/CVE-2023-48396.json index ad60da99e87..1d0a0e11b01 100644 --- a/CVE-2023/CVE-2023-483xx/CVE-2023-48396.json +++ b/CVE-2023/CVE-2023-483xx/CVE-2023-48396.json @@ -2,7 +2,7 @@ "id": "CVE-2023-48396", "sourceIdentifier": "security@apache.org", "published": "2024-07-30T09:15:02.540", - "lastModified": "2024-07-30T13:32:45.943", + "lastModified": "2024-08-01T13:45:08.480", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": " Vulnerabilidad de autenticaci\u00f3n web en Apache SeaTunnel. Dado que la clave jwt est\u00e1 codificada en la aplicaci\u00f3n, un atacante puede falsificar cualquier token para iniciar sesi\u00f3n en cualquier usuario. El atacante puede obtener la clave secreta en /seatunnel-server/seatunnel-app/src/main/resources/application.yml y luego crear un token. Este problema afecta a Apache SeaTunnel: 1.0.0. Se recomienda a los usuarios actualizar a la versi\u00f3n 1.0.1, que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4860.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4860.json index f2a4d0734e5..291d9354e19 100644 --- a/CVE-2023/CVE-2023-48xx/CVE-2023-4860.json +++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4860.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4860", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-07-16T23:15:11.070", - "lastModified": "2024-07-17T13:34:20.520", + "lastModified": "2024-08-01T13:45:21.050", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La implementaci\u00f3n inapropiada en Skia en Google Chrome anterior a 115.0.5790.98 permiti\u00f3 a un atacante remoto que hab\u00eda comprometido el proceso de renderizado realizar potencialmente un escape de la zona de pruebas a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.6, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-303" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-desktop.html", diff --git a/CVE-2023/CVE-2023-492xx/CVE-2023-49232.json b/CVE-2023/CVE-2023-492xx/CVE-2023-49232.json index 53554383902..e1234ad7ae7 100644 --- a/CVE-2023/CVE-2023-492xx/CVE-2023-49232.json +++ b/CVE-2023/CVE-2023-492xx/CVE-2023-49232.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49232", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-29T17:15:11.500", - "lastModified": "2024-04-05T17:15:07.643", + "lastModified": "2024-08-01T13:45:09.797", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se encontr\u00f3 una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n en Stilog Visual Planning 8. Permite a un atacante no autenticado forzar por fuerza bruta los PIN de restablecimiento de contrase\u00f1a de los usuarios administrativos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Apr/2", diff --git a/CVE-2023/CVE-2023-493xx/CVE-2023-49340.json b/CVE-2023/CVE-2023-493xx/CVE-2023-49340.json index 35b10a2e7b9..34761e200dc 100644 --- a/CVE-2023/CVE-2023-493xx/CVE-2023-49340.json +++ b/CVE-2023/CVE-2023-493xx/CVE-2023-49340.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49340", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-09T05:15:08.723", - "lastModified": "2024-03-11T01:32:39.697", + "lastModified": "2024-08-01T13:45:10.687", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,46 @@ "value": "Se descubri\u00f3 un problema en Newland Nquire 1000 Interactive Kiosk versi\u00f3n NQ1000-II_G_V1.00.011, que permite a atacantes remotos escalar privilegios y eludir la autenticaci\u00f3n mediante un control de acceso incorrecto en el portal de administraci\u00f3n web." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1390" + }, + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], "references": [ { "url": "https://github.com/n0obit4/Vulnerability_Disclosure/tree/main/CVE-2023-49340", diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49544.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49544.json index a8e67e4bbbe..4345a514a6e 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49544.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49544.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49544", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-01T22:15:47.683", - "lastModified": "2024-03-01T22:22:25.913", + "lastModified": "2024-08-01T13:45:11.667", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una inclusi\u00f3n de archivo local (LFI) en Customer Support System v1 permite a los atacantes incluir archivos PHP internos y obtener acceso no autorizado mediante la manipulaci\u00f3n del par\u00e1metro page= en /customer_support/index.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/geraldoalcantara/CVE-2023-49544", diff --git a/CVE-2023/CVE-2023-496xx/CVE-2023-49673.json b/CVE-2023/CVE-2023-496xx/CVE-2023-49673.json index 8590897cb0f..1f8b80873c3 100644 --- a/CVE-2023/CVE-2023-496xx/CVE-2023-49673.json +++ b/CVE-2023/CVE-2023-496xx/CVE-2023-49673.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49673", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-11-29T14:15:07.707", - "lastModified": "2023-12-05T13:32:39.200", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:45:13.090", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49927.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49927.json index 835bf0bd36b..b69ffa68b32 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49927.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49927.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49927", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-05T19:15:11.373", - "lastModified": "2024-06-25T20:15:10.733", + "lastModified": "2024-08-01T13:45:15.087", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-311" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-331" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49928.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49928.json index ca5769aad81..8e34a6a859f 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49928.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49928.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49928", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-05T19:15:11.617", - "lastModified": "2024-06-25T21:15:51.353", + "lastModified": "2024-08-01T13:45:16.410", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49931.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49931.json index d8bdfb4ef9c..2851a5e44d4 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49931.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49931.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49931", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T01:41:40.110", - "lastModified": "2024-02-29T13:49:47.277", + "lastModified": "2024-08-01T13:45:16.760", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en Couchbase Server antes de la versi\u00f3n 7.2.4. Las llamadas cURL de SQL++ a /diag/eval no est\u00e1n suficientemente restringidas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://docs.couchbase.com/server/current/release-notes/relnotes.html", diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49960.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49960.json index 36492d8434f..c777d621088 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49960.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49960.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49960", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-26T16:27:47.373", - "lastModified": "2024-02-26T16:32:25.577", + "lastModified": "2024-08-01T13:45:17.753", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En Indo-Sol PROFINET-INspektor NT hasta 2.4.0, una vulnerabilidad de path traversal en el servicio httpuploadd del firmware permite a atacantes remotos escribir en archivos arbitrarios a trav\u00e9s de un par\u00e1metro de nombre de archivo manipulado en solicitudes al enpoint /upload." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://code-white.com/public-vulnerability-list/", diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49969.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49969.json index b3ce330f7dd..b3e8f05393a 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49969.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49969.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49969", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-05T00:15:52.303", - "lastModified": "2024-03-05T13:41:01.900", + "lastModified": "2024-08-01T13:45:18.787", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que Customer Support System v1 contiene una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro id en /customer_support/index.php?page=edit_customer." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/geraldoalcantara/CVE-2023-49969", diff --git a/CVE-2023/CVE-2023-500xx/CVE-2023-50053.json b/CVE-2023/CVE-2023-500xx/CVE-2023-50053.json index 09b78d6236a..41e07341f90 100644 --- a/CVE-2023/CVE-2023-500xx/CVE-2023-50053.json +++ b/CVE-2023/CVE-2023-500xx/CVE-2023-50053.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50053", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T19:15:23.037", - "lastModified": "2024-04-30T19:35:36.960", + "lastModified": "2024-08-01T13:45:22.157", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en Foundation.app La plataforma Foundation 1.0 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del proceso de autenticaci\u00f3n Web3 de Foundation, el mensaje firmado carece de un nonce (n\u00famero aleatorio)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-359" + } + ] + } + ], "references": [ { "url": "https://github.com/d0scoo1/Web3AuthRA", diff --git a/CVE-2023/CVE-2023-504xx/CVE-2023-50434.json b/CVE-2023/CVE-2023-504xx/CVE-2023-50434.json index 869b4e00ddb..7adfc5a035d 100644 --- a/CVE-2023/CVE-2023-504xx/CVE-2023-50434.json +++ b/CVE-2023/CVE-2023-504xx/CVE-2023-50434.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50434", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T22:15:06.883", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-08-01T13:45:24.853", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "emdns_resolve_raw en emdns.c en emdns a trav\u00e9s de fbd1eef llama a strlen con una entrada que puede no estar terminada en '\\0', lo que provoca una sobrelectura del b\u00fafer basado en pila. Esto puede ser provocado por un adversario remoto que puede enviar solicitudes DNS al servidor emdns. El impacto podr\u00eda variar seg\u00fan las librer\u00edas del sistema, el compilador y la arquitectura del procesador. El c\u00f3digo anterior a be565c3 no se ve afectado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://papers.mathyvanhoef.com/esorics2024.pdf", diff --git a/CVE-2023/CVE-2023-504xx/CVE-2023-50447.json b/CVE-2023/CVE-2023-504xx/CVE-2023-50447.json index 2db3924d3cc..a1cfcdcf586 100644 --- a/CVE-2023/CVE-2023-504xx/CVE-2023-50447.json +++ b/CVE-2023/CVE-2023-504xx/CVE-2023-50447.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50447", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-19T20:15:11.870", - "lastModified": "2024-03-27T21:15:48.783", + "lastModified": "2024-08-01T13:45:25.653", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-94" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-95" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-507xx/CVE-2023-50700.json b/CVE-2023/CVE-2023-507xx/CVE-2023-50700.json index 5e221fabd98..72221c7d205 100644 --- a/CVE-2023/CVE-2023-507xx/CVE-2023-50700.json +++ b/CVE-2023/CVE-2023-507xx/CVE-2023-50700.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50700", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-26T17:15:10.803", - "lastModified": "2024-07-29T14:12:08.783", + "lastModified": "2024-08-01T13:45:26.497", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " La vulnerabilidad de permisos inseguros en Deepin dde-file-manager 6.0.54 y versiones anteriores permite que usuarios sin privilegios llamen a operaciones privilegiadas a trav\u00e9s del m\u00e9todo D-Bus." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://bugzilla.opensuse.org/show_bug.cgi?id=1134131", diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50914.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50914.json index 837f2ee83ff..e915f7a2891 100644 --- a/CVE-2023/CVE-2023-509xx/CVE-2023-50914.json +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50914.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50914", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T14:15:10.820", - "lastModified": "2024-04-30T17:52:35.057", + "lastModified": "2024-08-01T13:45:27.550", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema de escalada de privilegios en el procedimiento de comunicaci\u00f3n entre procesos desde GOG Galaxy (Beta) 2.0.67.2 hasta v2.0.71.2 permite a los usuarios autenticados cambiar el DACL de directorios arbitrarios del sistema para incluir permisos de control total para todos modificando los par\u00e1metros de instrucci\u00f3n FixDirectoryPrivileges enviados. de GalaxyClient.exe a GalaxyClientService.exe." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-279" + } + ] + } + ], "references": [ { "url": "https://github.com/anvilsecure/gog-galaxy-app-research", diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51773.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51773.json index 7593b8ca49e..13745d1e433 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51773.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51773.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51773", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T01:42:05.557", - "lastModified": "2024-02-29T13:49:47.277", + "lastModified": "2024-08-01T13:45:31.117", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "BACnet Stack anterior a 1.3.2 tiene una funci\u00f3n de decodificaci\u00f3n sobrelectura del b\u00fafer APDU en bacapp_decode_application_data en bacapp.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] + } + ], "references": [ { "url": "https://github.com/bacnet-stack/bacnet-stack/blob/master/CHANGELOG.md", diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51787.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51787.json index 56c958ded4f..b3118b11740 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51787.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51787.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51787", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-15T06:15:46.067", - "lastModified": "2024-02-15T06:23:39.303", + "lastModified": "2024-08-01T13:45:32.003", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Se descubri\u00f3 un problema en Wind River VxWorks 7 22.09 y 23.03. Si se cierra una tarea de VxWorks o un subproceso POSIX que utiliza OpenSSL, la memoria limitada por tarea no se libera, lo que genera una p\u00e9rdida de memoria." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2023-51787", diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51794.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51794.json index 1c8d00db84c..c6dada4b839 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51794.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51794.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51794", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-26T15:15:48.240", - "lastModified": "2024-04-26T15:32:22.523", + "lastModified": "2024-08-01T13:45:32.210", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de desbordamiento de b\u00fafer en Ffmpeg v.N113007-g8d24a28d06 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de libavfilter/af_stereowiden.c:120:69." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://trac.ffmpeg.org/ticket/10746", diff --git a/CVE-2023/CVE-2023-518xx/CVE-2023-51801.json b/CVE-2023/CVE-2023-518xx/CVE-2023-51801.json index 962739ea093..387ebd315ef 100644 --- a/CVE-2023/CVE-2023-518xx/CVE-2023-51801.json +++ b/CVE-2023/CVE-2023-518xx/CVE-2023-51801.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51801", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T02:15:09.323", - "lastModified": "2024-02-29T13:49:29.390", + "lastModified": "2024-08-01T13:45:33.000", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n SQL en el Simple Student Attendance System v.1.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado en el par\u00e1metro id en las p\u00e1ginas Student_form.php y class_form.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/geraldoalcantara/CVE-2023-51801", diff --git a/CVE-2023/CVE-2023-520xx/CVE-2023-52040.json b/CVE-2023/CVE-2023-520xx/CVE-2023-52040.json index 92f2d526e3a..68314ecdc79 100644 --- a/CVE-2023/CVE-2023-520xx/CVE-2023-52040.json +++ b/CVE-2023/CVE-2023-520xx/CVE-2023-52040.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52040", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-24T18:15:08.557", - "lastModified": "2024-01-30T20:55:36.447", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:45:33.877", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-253" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-522xx/CVE-2023-52235.json b/CVE-2023/CVE-2023-522xx/CVE-2023-52235.json index 93aaafe9968..f599299ffd8 100644 --- a/CVE-2023/CVE-2023-522xx/CVE-2023-52235.json +++ b/CVE-2023/CVE-2023-522xx/CVE-2023-52235.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52235", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-05T06:15:10.060", - "lastModified": "2024-04-05T12:40:52.763", + "lastModified": "2024-08-01T13:45:35.437", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El router Wi-Fi SpaceX Starlink GEN 2 anterior a 2023.53.0 y Starlink Dish anterior a 07dd2798-ff15-4722-a9ee-de28928aed34 permiten CSRF (por ejemplo, para un reinicio) a trav\u00e9s de un ataque de reenlace de DNS." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-350" + } + ] + } + ], "references": [ { "url": "https://bugcrowd.com/disclosures/f529009b-90eb-4bf9-957d-6fe7ea890fa2/starlink-dishy-is-vulnerable-to-csrf-via-dns-rebinding", diff --git a/CVE-2023/CVE-2023-522xx/CVE-2023-52290.json b/CVE-2023/CVE-2023-522xx/CVE-2023-52290.json index 90d6e064df7..39d046b7cd7 100644 --- a/CVE-2023/CVE-2023-522xx/CVE-2023-52290.json +++ b/CVE-2023/CVE-2023-522xx/CVE-2023-52290.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52290", "sourceIdentifier": "security@apache.org", "published": "2024-07-16T08:15:02.050", - "lastModified": "2024-07-16T13:43:58.773", + "lastModified": "2024-08-01T13:45:36.313", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En streampark-console, las p\u00e1ginas de lista (por ejemplo, p\u00e1ginas de aplicaciones), los usuarios pueden ordenar las p\u00e1ginas por campo. Este campo de clasificaci\u00f3n se env\u00eda desde el front-end al back-end y la consulta SQL se genera utilizando este campo. Sin embargo, debido a que este campo de clasificaci\u00f3n no est\u00e1 validado, existe el riesgo de vulnerabilidad de inyecci\u00f3n SQL. El atacante debe iniciar sesi\u00f3n con \u00e9xito en el sistema para lanzar un ataque, lo que puede provocar una fuga de datos. Dado que no se escribir\u00e1n datos, esta es una vulnerabilidad de bajo impacto. Mitigaci\u00f3n: todos los usuarios deben actualizar a 2.1.4. Dichos par\u00e1metros se bloquear\u00e1n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2023/CVE-2023-522xx/CVE-2023-52291.json b/CVE-2023/CVE-2023-522xx/CVE-2023-52291.json index 4c3745dcb14..427ae1b3c5a 100644 --- a/CVE-2023/CVE-2023-522xx/CVE-2023-52291.json +++ b/CVE-2023/CVE-2023-522xx/CVE-2023-52291.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52291", "sourceIdentifier": "security@apache.org", "published": "2024-07-17T09:15:02.410", - "lastModified": "2024-07-22T16:15:02.770", + "lastModified": "2024-08-01T13:45:36.503", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-523xx/CVE-2023-52341.json b/CVE-2023/CVE-2023-523xx/CVE-2023-52341.json index a6a43d8e49b..fc7e0bb90e6 100644 --- a/CVE-2023/CVE-2023-523xx/CVE-2023-52341.json +++ b/CVE-2023/CVE-2023-523xx/CVE-2023-52341.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52341", "sourceIdentifier": "security@unisoc.com", "published": "2024-04-08T03:15:08.247", - "lastModified": "2024-04-08T18:48:40.217", + "lastModified": "2024-08-01T13:45:36.707", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el mensaje COUNTER CHECK de texto plano aceptado antes de la activaci\u00f3n de seguridad de AS, es posible que falte una verificaci\u00f3n de permiso. Esto podr\u00eda conducir a la divulgaci\u00f3n remota de informaci\u00f3n, sin necesidad de privilegios de ejecuci\u00f3n adicionales." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/1777143682512781313", diff --git a/CVE-2023/CVE-2023-523xx/CVE-2023-52360.json b/CVE-2023/CVE-2023-523xx/CVE-2023-52360.json index 52d562fea5f..8e6a911aa08 100644 --- a/CVE-2023/CVE-2023-523xx/CVE-2023-52360.json +++ b/CVE-2023/CVE-2023-523xx/CVE-2023-52360.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52360", "sourceIdentifier": "psirt@huawei.com", "published": "2024-02-18T03:15:08.683", - "lastModified": "2024-02-20T19:50:53.960", + "lastModified": "2024-08-01T13:45:37.677", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Vulnerabilidades l\u00f3gicas en la banda base. La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la integridad del servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405", diff --git a/CVE-2023/CVE-2023-523xx/CVE-2023-52370.json b/CVE-2023/CVE-2023-523xx/CVE-2023-52370.json index a5d03ee8d5d..d71dc2dbfb9 100644 --- a/CVE-2023/CVE-2023-523xx/CVE-2023-52370.json +++ b/CVE-2023/CVE-2023-523xx/CVE-2023-52370.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52370", "sourceIdentifier": "psirt@huawei.com", "published": "2024-02-18T04:15:07.803", - "lastModified": "2024-02-20T19:50:53.960", + "lastModified": "2024-08-01T13:45:37.880", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en el m\u00f3dulo de aceleraci\u00f3n de red. La explotaci\u00f3n exitosa de esta vulnerabilidad puede causar acceso no autorizado a archivos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@huawei.com", diff --git a/CVE-2023/CVE-2023-523xx/CVE-2023-52379.json b/CVE-2023/CVE-2023-523xx/CVE-2023-52379.json index 2879594ef09..013c5b60b67 100644 --- a/CVE-2023/CVE-2023-523xx/CVE-2023-52379.json +++ b/CVE-2023/CVE-2023-523xx/CVE-2023-52379.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52379", "sourceIdentifier": "psirt@huawei.com", "published": "2024-02-18T07:15:09.070", - "lastModified": "2024-02-20T19:50:53.960", + "lastModified": "2024-08-01T13:45:38.070", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Vulnerabilidad de control de permisos en el m\u00f3dulo CalendarProvider. La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/", diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52538.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52538.json index 64ec5cbe978..1bd8fe36f1b 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52538.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52538.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52538", "sourceIdentifier": "psirt@huawei.com", "published": "2024-04-08T09:15:08.453", - "lastModified": "2024-04-08T18:48:40.217", + "lastModified": "2024-08-01T13:45:38.693", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Vulnerabilidad de omitir la verificaci\u00f3n del nombre del paquete en el m\u00f3dulo HwIms. Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad afectar\u00e1 la disponibilidad." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/", diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52557.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52557.json index 96f67a1e5ee..be3d62c5c06 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52557.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52557.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52557", "sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725", "published": "2024-03-01T17:15:07.257", - "lastModified": "2024-03-01T22:22:25.913", + "lastModified": "2024-08-01T13:45:39.150", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En OpenBSD 7.3 antes de la errata 016, npppd(8) pod\u00eda fallar debido a un mensaje l2tp que ten\u00eda un AVP (par atributo-valor) con una longitud incorrecta." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "9119a7d8-5eab-497f-8521-727c672e3725", @@ -26,6 +49,16 @@ "value": "CWE-131" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-805" + } + ] } ], "references": [ diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52602.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52602.json index 699d80a0870..c95d2047177 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52602.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52602.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52602", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-06T07:15:10.883", - "lastModified": "2024-06-27T12:15:15.283", + "lastModified": "2024-08-01T13:45:40.310", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: jfs: arreglar slab-out-of-bounds Leer en dtSearch Actualmente, mientras se busca la p\u00e1gina actual en la tabla de entradas ordenadas de la p\u00e1gina, hay un acceso fuera de los l\u00edmites. Se agreg\u00f3 un cheque encuadernado para corregir el error. Dave: establece el c\u00f3digo de retorno en -EIO" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1b9d6828589d57f94a23fb1c46112cda39d7efdb", diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52629.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52629.json index afaadba2a86..64373b30d83 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52629.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52629.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52629", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-29T10:15:09.327", - "lastModified": "2024-03-29T12:45:02.937", + "lastModified": "2024-08-01T13:45:41.290", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: sh: push-switch: reordenar las operaciones de limpieza para evitar el error de use after free. El c\u00f3digo original coloca Flush_work() antes de timer_shutdown_sync() en switch_drv_remove(). Aunque usamos Flush_work() para detener al trabajador, podr\u00eda reprogramarse en switch_timer(). Como resultado, puede ocurrir un error de use after free. Los detalles se muestran a continuaci\u00f3n: (cpu 0) | (procesador 1) switch_drv_remove() | descarga_trabajo() | ... | switch_timer // temporizador | Schedule_work(&psw->trabajo) timer_shutdown_sync() | ... | switch_work_handler // trabajador kfree(psw) // gratis | | psw->state = 0 // uso Este parche coloca timer_shutdown_sync() antes de Flush_work() para mitigar los errores. Como resultado, el trabajador y el temporizador se detendr\u00e1n de forma segura antes de las operaciones de desasignaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/246f80a0b17f8f582b2c0996db02998239057c65", diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5625.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5625.json index fadc7d8dc18..08bd0932916 100644 --- a/CVE-2023/CVE-2023-56xx/CVE-2023-5625.json +++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5625.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5625", "sourceIdentifier": "secalert@redhat.com", "published": "2023-11-01T14:15:38.897", - "lastModified": "2024-01-16T21:15:08.283", + "lastModified": "2024-08-01T13:45:44.543", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5675.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5675.json index 7b8e96b4fdc..3ae4e2de4fa 100644 --- a/CVE-2023/CVE-2023-56xx/CVE-2023-5675.json +++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5675.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5675", "sourceIdentifier": "secalert@redhat.com", "published": "2024-04-25T16:15:08.570", - "lastModified": "2024-07-03T01:44:16.897", + "lastModified": "2024-08-01T13:45:45.357", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -49,16 +49,6 @@ "value": "CWE-285" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-287" - } - ] } ], "references": [ diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6067.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6067.json index 11cef62332d..4aa8de08d44 100644 --- a/CVE-2023/CVE-2023-60xx/CVE-2023-6067.json +++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6067.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6067", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-15T05:15:13.813", - "lastModified": "2024-04-15T13:15:31.997", + "lastModified": "2024-08-01T13:45:46.070", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento WP User Profile Avatar de WordPress hasta 1.0.1 no valida ni escapa algunos de sus atributos de shortcode antes de devolverlos a una p\u00e1gina/publicaci\u00f3n donde est\u00e1 incrustado el shortcode, lo que podr\u00eda permitir a los usuarios con el rol de colaborador y superior realizar ataques de Cross-Site Scripting Almacenado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/ae8e225a-5273-4db1-9c72-060304cca658/", diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6347.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6347.json index 817df02ab0e..36c8b606e50 100644 --- a/CVE-2023/CVE-2023-63xx/CVE-2023-6347.json +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6347.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6347", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-11-29T12:15:07.357", - "lastModified": "2024-01-31T17:15:23.647", + "lastModified": "2024-08-01T13:45:46.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6584.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6584.json index 1afa8f61caa..cccab054ba0 100644 --- a/CVE-2023/CVE-2023-65xx/CVE-2023-6584.json +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6584.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6584", "sourceIdentifier": "contact@wpscan.com", "published": "2024-02-27T09:15:37.087", - "lastModified": "2024-02-27T14:20:06.637", + "lastModified": "2024-08-01T13:45:47.720", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento WP JobSearch de WordPress anterior a 2.3.4 no impide que los atacantes inicien sesi\u00f3n como cualquier usuario con el \u00fanico conocimiento de la direcci\u00f3n de correo electr\u00f3nico de ese usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/e528e3cd-a45c-4bf7-a37a-101f5c257acd/", diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6960.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6960.json index e3d471d6d34..a9c5f634240 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6960.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6960.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6960", "sourceIdentifier": "cret@cert.org", "published": "2024-03-15T17:15:07.157", - "lastModified": "2024-03-17T22:38:29.433", + "lastModified": "2024-08-01T13:45:49.250", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Las claves virtuales y la configuraci\u00f3n de la aplicaci\u00f3n TTLock solo se eliminan del lado del cliente y, si se conservan, pueden acceder al bloqueo despu\u00e9s de la eliminaci\u00f3n prevista." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://alephsecurity.com/2024/03/07/kontrol-lux-lock-2/", diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7010.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7010.json index 54392c18db1..707ad3d5e79 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7010.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7010.json @@ -2,7 +2,7 @@ "id": "CVE-2023-7010", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-07-16T23:15:11.140", - "lastModified": "2024-07-17T13:34:20.520", + "lastModified": "2024-08-01T13:45:49.523", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El Use After Free en WebRTC en Google Chrome anterior a 117.0.5938.62 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_12.html", diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7011.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7011.json index 0e344c594ed..d847931c0f4 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7011.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7011.json @@ -2,7 +2,7 @@ "id": "CVE-2023-7011", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-07-16T23:15:11.210", - "lastModified": "2024-07-17T13:34:20.520", + "lastModified": "2024-08-01T13:45:50.333", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La implementaci\u00f3n inapropiada de Picture in Picture en Google Chrome anterior a 119.0.6045.105 permiti\u00f3 a un atacante remoto falsificar el contenido del Omnibox (barra de URL) a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chromium: media)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-451" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html", diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7012.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7012.json index b352ed33480..e2724ed8a23 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7012.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7012.json @@ -2,7 +2,7 @@ "id": "CVE-2023-7012", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-07-16T23:15:11.270", - "lastModified": "2024-07-17T13:34:20.520", + "lastModified": "2024-08-01T13:45:51.243", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,46 @@ "value": "La validaci\u00f3n de datos insuficiente en las solicitudes de permiso en Google Chrome anteriores a 117.0.5938.62 permiti\u00f3 que un atacante que convenciera a un usuario de instalar una aplicaci\u00f3n maliciosa pudiera realizar potencialmente un escape de la zona de pruebas a trav\u00e9s de un archivo malicioso. (Severidad de seguridad de Chromium: media)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-138" + }, + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_12.html", diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7268.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7268.json index 12afdccaf93..0f53fb4f7cb 100644 --- a/CVE-2023/CVE-2023-72xx/CVE-2023-7268.json +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7268.json @@ -2,7 +2,7 @@ "id": "CVE-2023-7268", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-19T06:15:02.140", - "lastModified": "2024-07-19T13:01:44.567", + "lastModified": "2024-08-01T13:45:52.747", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento ArtPlacer Widget de WordPress anterior a 2.21.2 no cuenta con verificaci\u00f3n de autorizaci\u00f3n al eliminar widgets, lo que permite a cualquier usuario autenticado, como el suscriptor, eliminar widgets arbitrarios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/9ac233dd-e00d-4aee-a41c-0de6e8aaefd7/", diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7269.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7269.json index 808f51d0455..703ec1689fa 100644 --- a/CVE-2023/CVE-2023-72xx/CVE-2023-7269.json +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7269.json @@ -2,7 +2,7 @@ "id": "CVE-2023-7269", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-19T06:15:03.137", - "lastModified": "2024-07-19T13:01:44.567", + "lastModified": "2024-08-01T13:45:52.937", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento ArtPlacer Widget de WordPress anterior a 2.21.2 no tiene verificaci\u00f3n CSRF en algunos lugares y le falta desinfecci\u00f3n y escape, lo que podr\u00eda permitir a los atacantes hacer que el administrador registrado agregue payloads XSS almacenado a trav\u00e9s de un ataque CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.7, + "impactScore": 5.3 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/1e8e1186-323b-473b-a0c4-580dc94020d7/", diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7270.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7270.json index 84903d97616..9ec5d675dbb 100644 --- a/CVE-2023/CVE-2023-72xx/CVE-2023-7270.json +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7270.json @@ -2,7 +2,7 @@ "id": "CVE-2023-7270", "sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf", "published": "2024-06-27T10:15:10.240", - "lastModified": "2024-07-04T07:15:10.497", + "lastModified": "2024-08-01T13:45:53.123", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en SoftMaker Office 2024/NX antes de la revisi\u00f3n 1214 y SoftMaker FreeOffice 2014 antes de la revisi\u00f3n 1215. FreeOffice 2021 tambi\u00e9n se ve afectado, pero no se solucionar\u00e1. Se descubri\u00f3 que los archivos de instalaci\u00f3n de SoftMaker Office y FreeOffice MSI produc\u00edan una ventana visible de conhost.exe ejecut\u00e1ndose como el usuario de SYSTEM cuando se utiliza la funci\u00f3n de reparaci\u00f3n de msiexec.exe.Esto permite a un atacante local con pocos privilegios utilizar una cadena de acciones para abrir un cmd.exe completamente funcional con los privilegios del usuario de SYSTEM." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/5", diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0020.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0020.json index 45784871e4d..54327e3b13a 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0020.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0020.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0020", "sourceIdentifier": "security@android.com", "published": "2024-02-16T20:15:47.667", - "lastModified": "2024-02-16T21:39:50.223", + "lastModified": "2024-08-01T13:45:54.660", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En onActivityResult de NotificationSoundPreference.java, existe una forma posible de escuchar archivos de audio que pertenecen a un usuario diferente debido a un diputado confundido. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n local entre los usuarios de un dispositivo sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://android.googlesource.com/platform/packages/apps/Settings/+/87f791f2351e366f842a0fd6fcb744069160d9a1", diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0031.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0031.json index 392ab05b3ae..fe69ecf064e 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0031.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0031.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0031", "sourceIdentifier": "security@android.com", "published": "2024-02-16T02:15:50.763", - "lastModified": "2024-02-16T13:37:55.033", + "lastModified": "2024-08-01T13:45:54.900", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En attp_build_read_by_type_value_cmd de att_protocol.cc, existe una posible escritura fuera de los l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a la ejecuci\u00f3n remota de c\u00f3digo sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/de53890aaca2ae08b3ee2d6e3fd25f702fdfa661", diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0034.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0034.json index f102b03d930..b6a080dbb54 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0034.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0034.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0034", "sourceIdentifier": "security@android.com", "published": "2024-02-16T02:15:50.933", - "lastModified": "2024-02-16T13:37:51.433", + "lastModified": "2024-08-01T13:45:55.720", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En BackgroundLaunchProcessController, existe una forma posible de iniciar actividad arbitraria desde segundo plano debido a BAL Bypass. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/653f7b0d234693309dc86161af01831b64033fe6", diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0040.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0040.json index 504feb08f16..0b1a87e5840 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0040.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0040.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0040", "sourceIdentifier": "security@android.com", "published": "2024-02-16T02:15:51.203", - "lastModified": "2024-02-16T13:37:51.433", + "lastModified": "2024-08-01T13:45:55.990", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En setParameter de MtpPacket.cpp, existe una posible lectura fuera de los l\u00edmites debido a un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico. Esto podr\u00eda conducir a la divulgaci\u00f3n remota de informaci\u00f3n sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/av/+/2ca6c27dc0336fd98f47cfb96dc514efa98e8864", diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0049.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0049.json index 0a38167e1c5..bef99ef65bb 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0049.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0049.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0049", "sourceIdentifier": "security@android.com", "published": "2024-03-11T17:15:45.727", - "lastModified": "2024-03-12T12:40:13.500", + "lastModified": "2024-08-01T13:45:56.777", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En varias ubicaciones, existe una posible escritura fuera de los l\u00edmites debido a un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/av/+/462689f06fd5e72ac63cd87b43ee52554ddf953e", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0446.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0446.json index c873f569e47..b9544c594db 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0446.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0446.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0446", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-02-22T00:15:51.903", - "lastModified": "2024-06-14T20:15:10.570", + "lastModified": "2024-08-01T13:45:58.510", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Un archivo STP, CATPART o MODEL creado con fines malintencionados cuando se analiza en ASMKERN228A.dll a trav\u00e9s de Autodesk AutoCAD puede forzar una escritura fuera de los l\u00edmites. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, escribir datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0760.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0760.json index b44bac4c420..4bf6fffab1c 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0760.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0760.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0760", "sourceIdentifier": "security-officer@isc.org", "published": "2024-07-23T15:15:03.520", - "lastModified": "2024-07-31T11:15:10.347", + "lastModified": "2024-08-01T13:45:59.803", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/07/23/1", diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0779.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0779.json index 885434be1fa..8045276325b 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0779.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0779.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0779", "sourceIdentifier": "contact@wpscan.com", "published": "2024-03-18T19:15:06.390", - "lastModified": "2024-03-18T19:40:00.173", + "lastModified": "2024-08-01T13:46:00.620", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Enjoy Social Feed plugin for WordPress website de WordPress hasta 6.2.2 no tiene autorizaci\u00f3n ni CSRF en varias funciones vinculadas a admin_init, lo que permite a usuarios no autenticados llamarlos y desvincular cuentas de Instagram de usuarios arbitrarios, por ejemplo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/ced134cf-82c5-401b-9476-b6456e1924e2/", diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1286.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1286.json index 93d2ed266d0..1082466b8b5 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1286.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1286.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1286", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-30T06:15:01.777", - "lastModified": "2024-07-30T13:32:45.943", + "lastModified": "2024-08-01T13:46:03.343", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": " El complemento de WordPress pmpro-membership-maps anterior a 0.7 no impide que los usuarios con al menos el rol de colaborador filtren informaci\u00f3n confidencial sobre los usuarios con membres\u00eda en el sitio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/49dc9ca3-d0ef-4a75-8b51-307e3e44e91b/", diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1287.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1287.json index 7cd1f982475..cdeed7fa367 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1287.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1287.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1287", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-30T06:15:02.210", - "lastModified": "2024-07-30T13:32:45.943", + "lastModified": "2024-08-01T13:46:03.523", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " El complemento de WordPress pmpro-member-directory anterior a 1.2.6 no impide que los usuarios con al menos el rol de colaborador filtren informaci\u00f3n confidencial de otros usuarios, incluidos los hashes de contrase\u00f1as." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-202" + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/169e5756-4e12-4add-82e9-47471c30f08c/", diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1295.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1295.json index 6ef29ec6ae2..aca89f9f9b1 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1295.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1295.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1295", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-14T06:15:10.937", - "lastModified": "2024-06-17T12:42:04.623", + "lastModified": "2024-08-01T13:46:04.293", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento events-calendar-pro de WordPress anterior a 6.4.0.1, el complemento Events Calendar WordPress anterior a 6.4.0.1 no impide que los usuarios con al menos el rol de colaborador filtren detalles sobre eventos a los que no deber\u00edan tener acceso. (por ejemplo, eventos protegidos con contrase\u00f1a, borradores, etc.)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/3cffbeb0-545a-4002-b02c-0fa38cada1db/", diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1660.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1660.json index 634baa93a53..b8e29f13450 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1660.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1660.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1660", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-15T05:15:14.900", - "lastModified": "2024-04-15T13:15:31.997", + "lastModified": "2024-08-01T13:46:08.063", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El complemento Top Bar de WordPress anterior a 3.0.5 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/5bd16f84-22bf-4170-b65c-08caf67d0005/", diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1672.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1672.json index bde9edf2503..20989ee14d6 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1672.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1672.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1672", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-02-21T04:15:08.297", - "lastModified": "2024-02-26T16:27:52.740", + "lastModified": "2024-08-01T13:46:08.940", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La implementaci\u00f3n inadecuada de la Pol\u00edtica de seguridad de contenido en Google Chrome anterior a 122.0.6261.57 permiti\u00f3 a un atacante remoto eludir la pol\u00edtica de seguridad de contenido a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chromium: media)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-474" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html", diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1673.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1673.json index 57526179f96..d65269f1d18 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1673.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1673.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1673", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-02-21T04:15:08.347", - "lastModified": "2024-02-26T16:27:52.780", + "lastModified": "2024-08-01T13:46:09.737", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Use after free en Accesibilidad en Google Chrome anterior a 122.0.6261.57 permit\u00eda a un atacante remoto que hab\u00eda comprometido el proceso de renderizado explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de gestos de interfaz de usuario espec\u00edficos. (Severidad de seguridad de Chromium: media)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html", diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1694.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1694.json index bf27449b9c0..290b6caedea 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1694.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1694.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1694", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-06-07T20:15:10.973", - "lastModified": "2024-06-10T02:52:08.267", + "lastModified": "2024-08-01T13:46:10.687", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La implementaci\u00f3n inadecuada en Google Updatetor anterior a 1.3.36.351 en Google Chrome permiti\u00f3 a un atacante local eludir el control de acceso discrecional a trav\u00e9s de un archivo malicioso. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-474" + } + ] + } + ], "references": [ { "url": "https://issues.chromium.org/issues/40946325", diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1715.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1715.json index 0a549763059..a42736d433f 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1715.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1715.json @@ -2,13 +2,17 @@ "id": "CVE-2024-1715", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-01T04:15:04.367", - "lastModified": "2024-08-01T04:15:04.367", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The AdFoxly \u2013 Ad Manager, AdSense Ads & Ads.txt plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the adfoxly_ad_status() function in all versions up to, and including, 1.8.5. This makes it possible for unauthenticated attackers to enable and disable ads." + }, + { + "lang": "es", + "value": "El complemento AdFoxly \u2013 Ad Manager, AdSense Ads & Ads.txt para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n adfoxly_ad_status() en todas las versiones hasta la 1.8.5 incluida. Esto hace posible que atacantes no autenticados habiliten y deshabiliten anuncios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1737.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1737.json index c688032aacf..19b206098e1 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1737.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1737.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1737", "sourceIdentifier": "security-officer@isc.org", "published": "2024-07-23T15:15:03.740", - "lastModified": "2024-07-31T11:15:10.487", + "lastModified": "2024-08-01T13:46:11.850", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/07/23/1", diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1747.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1747.json index f40fe4efe87..2956bbd19e1 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1747.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1747.json @@ -2,13 +2,17 @@ "id": "CVE-2024-1747", "sourceIdentifier": "contact@wpscan.com", "published": "2024-08-01T06:15:01.980", - "lastModified": "2024-08-01T06:15:01.980", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WooCommerce Customers Manager WordPress plugin before 30.2 does not have authorisation and CSRF in various AJAX actions, allowing any authenticated users, such as subscriber, to call them and update/delete/create customer metadata, also leading to Stored Cross-Site Scripting due to the lack of escaping of said metadata values." + }, + { + "lang": "es", + "value": " El complemento de WordPress WooCommerce Customers Manager anterior a 30.2 no tiene autorizaci\u00f3n ni CSRF en varias acciones AJAX, lo que permite a cualquier usuario autenticado, como un suscriptor, llamarlos y actualizar/eliminar/crear metadatos del cliente, lo que tambi\u00e9n genera Cross Site Scripting almacenado debido a la falta de escape de dichos valores de metadatos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1845.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1845.json index 3cdf38c953f..b99b42c2fc6 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1845.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1845.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1845", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-11T06:15:02.613", - "lastModified": "2024-07-12T16:59:38.207", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:46:13.657", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1899.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1899.json index 3e3eed87c0b..61ea02dce02 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1899.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1899.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1899", "sourceIdentifier": "vulnreport@tenable.com", "published": "2024-02-26T19:15:07.037", - "lastModified": "2024-02-26T22:10:40.463", + "lastModified": "2024-08-01T13:46:14.650", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-674" + } + ] + } + ], "references": [ { "url": "https://www.tenable.com/security/research/tra-2024-05", diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1975.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1975.json index 8959fcac878..009e070648a 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1975.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1975.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1975", "sourceIdentifier": "security-officer@isc.org", "published": "2024-07-23T15:15:03.943", - "lastModified": "2024-07-31T11:15:10.570", + "lastModified": "2024-08-01T13:46:16.177", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/07/23/1", diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20019.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20019.json index 4c9d1a60a62..1cc9e4f60a0 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20019.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20019.json @@ -2,7 +2,7 @@ "id": "CVE-2024-20019", "sourceIdentifier": "security@mediatek.com", "published": "2024-03-04T03:15:07.060", - "lastModified": "2024-03-04T13:58:23.447", + "lastModified": "2024-08-01T13:46:17.030", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el controlador WLAN, existe una posible p\u00e9rdida de memoria debido a un manejo inadecuado de la entrada. Esto podr\u00eda provocar una denegaci\u00f3n remota de servicio sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: WCNCR00351241; ID del problema: MSV-1173." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/March-2024", diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20043.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20043.json index 3cb90f7ff67..571e26062cd 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20043.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20043.json @@ -2,7 +2,7 @@ "id": "CVE-2024-20043", "sourceIdentifier": "security@mediatek.com", "published": "2024-04-01T03:15:08.007", - "lastModified": "2024-04-01T12:49:09.583", + "lastModified": "2024-08-01T13:46:17.817", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En da, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08541784; ID del problema: ALPS08541784." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20069.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20069.json index f1c249858d1..b393941171e 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20069.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20069.json @@ -2,7 +2,7 @@ "id": "CVE-2024-20069", "sourceIdentifier": "security@mediatek.com", "published": "2024-06-03T02:15:08.977", - "lastModified": "2024-06-06T03:15:08.747", + "lastModified": "2024-08-01T13:46:18.590", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el m\u00f3dem, existe una posible selecci\u00f3n de algoritmos menos seguros durante el IKE de VoWiFi debido a que falta una verificaci\u00f3n de degradaci\u00f3n de DH. Esto podr\u00eda conducir a la divulgaci\u00f3n remota de informaci\u00f3n sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: MOLY01286330; ID del problema: MSV-1430." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@mediatek.com", diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20080.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20080.json index 122b8bef1a7..9ba2f6e7578 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20080.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20080.json @@ -2,7 +2,7 @@ "id": "CVE-2024-20080", "sourceIdentifier": "security@mediatek.com", "published": "2024-07-01T05:15:04.430", - "lastModified": "2024-07-01T12:37:24.220", + "lastModified": "2024-08-01T13:46:18.790", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el servicio gnss existe una posible escalada de privilegios debido a una validaci\u00f3n inadecuada del certificado. Esto podr\u00eda conducir a una escalada remota de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08720039; ID del problema: MSV-1424." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@mediatek.com", diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2044.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2044.json index 1f7389c463a..6e81613ecca 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2044.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2044.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2044", "sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007", "published": "2024-03-07T21:15:08.767", - "lastModified": "2024-03-23T03:15:12.063", + "lastModified": "2024-08-01T13:49:39.293", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-31" + } + ] + } + ], "references": [ { "url": "https://github.com/pgadmin-org/pgadmin4/issues/7258", diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2090.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2090.json index c1c438af13c..2725b0e34cb 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2090.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2090.json @@ -2,13 +2,17 @@ "id": "CVE-2024-2090", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-01T05:15:09.993", - "lastModified": "2024-08-01T05:15:09.993", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Remote Content Shortcode plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.5 via the remote_content shortcode. This makes it possible for authenticated attackers, with contributor-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services." + }, + { + "lang": "es", + "value": " El complemento Remote Content Shortcode para WordPress es vulnerable a server-side request forgery en todas las versiones hasta la 1.5 incluida a trav\u00e9s del shortcode remote_content. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, realicen solicitudes web a ubicaciones arbitrarias que se originen en la aplicaci\u00f3n web y puedan usarse para consultar y modificar informaci\u00f3n de servicios internos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21140.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21140.json index 5d14df51249..9802b050f4c 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21140.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21140.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21140", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-07-16T23:15:15.043", - "lastModified": "2024-07-19T14:15:05.400", + "lastModified": "2024-08-01T13:46:27.193", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://security.netapp.com/advisory/ntap-20240719-0008/", diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21152.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21152.json index c25bc3e42df..d79644d085e 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21152.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21152.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21152", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-07-16T23:15:17.397", - "lastModified": "2024-07-17T13:34:20.520", + "lastModified": "2024-08-01T13:46:31.340", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujul2024.html", diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21153.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21153.json index 9c273c3bee4..f186b297327 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21153.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21153.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21153", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-07-16T23:15:17.587", - "lastModified": "2024-07-17T13:34:20.520", + "lastModified": "2024-08-01T13:46:32.083", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujul2024.html", diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21166.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21166.json index c17c9dc0cc4..b59c20acd59 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21166.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21166.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21166", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-07-16T23:15:19.880", - "lastModified": "2024-07-17T13:34:20.520", + "lastModified": "2024-08-01T13:46:33.843", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujul2024.html", diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21169.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21169.json index 920e286eeee..830e7f684c5 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21169.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21169.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21169", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-07-16T23:15:20.430", - "lastModified": "2024-07-17T13:34:20.520", + "lastModified": "2024-08-01T13:46:34.717", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujul2024.html", diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21184.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21184.json index e1312fc5d1c..b720598fbca 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21184.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21184.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21184", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-07-16T23:15:23.077", - "lastModified": "2024-07-19T13:38:01.037", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:46:38.110", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-250" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21498.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21498.json index 015ae3cbcee..090fb7652f0 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21498.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21498.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21498", "sourceIdentifier": "report@snyk.io", "published": "2024-02-17T05:15:10.087", - "lastModified": "2024-02-20T19:50:53.960", + "lastModified": "2024-08-01T13:46:44.130", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -49,6 +49,16 @@ "value": "CWE-918" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21507.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21507.json index f3e1aff1c8c..dbf7737946c 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21507.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21507.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21507", "sourceIdentifier": "report@snyk.io", "published": "2024-04-10T05:15:48.290", - "lastModified": "2024-04-10T13:23:38.787", + "lastModified": "2024-08-01T13:46:44.883", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -49,6 +49,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21513.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21513.json index 60c2ccc646f..64999735f01 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21513.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21513.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21513", "sourceIdentifier": "report@snyk.io", "published": "2024-07-15T05:15:01.857", - "lastModified": "2024-07-16T18:12:46.020", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:46:45.590", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -79,6 +79,16 @@ "value": "CWE-94" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21523.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21523.json index 7efb7ba6441..41556097194 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21523.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21523.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21523", "sourceIdentifier": "report@snyk.io", "published": "2024-07-10T05:15:11.153", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-08-01T13:46:46.460", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -49,6 +49,16 @@ "value": "CWE-400" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-241" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21687.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21687.json index c9cc0145487..8a3acb20469 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21687.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21687.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21687", "sourceIdentifier": "security@atlassian.com", "published": "2024-07-16T21:15:10.257", - "lastModified": "2024-07-17T13:34:20.520", + "lastModified": "2024-08-01T13:46:48.050", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], "references": [ { "url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1417150917", diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2102.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2102.json index 233eba1cf9d..7ba24dcc9a3 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2102.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2102.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2102", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-17T05:15:48.650", - "lastModified": "2024-04-17T12:48:07.510", + "lastModified": "2024-08-01T13:49:41.380", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Salon booking system de WordPress anterior a 9.6.3 no desinfecta adecuadamente ni escapa del campo 'Tel\u00e9fono m\u00f3vil' y del par\u00e1metro 'sms_prefix' al reservar una cita, lo que permite a los clientes realizar ataques de Cross-Site Scripting Almacenado. La carga \u00fatil se activa cuando un administrador visita la p\u00e1gina \"Reservas\" y el script malicioso se ejecuta en el contexto del administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/3d15f589-956c-4c71-98b1-3ba89d22262c/", diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22008.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22008.json index 9c9cc6ddfa4..2c43fa38a2e 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22008.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22008.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22008", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-03-11T19:15:47.280", - "lastModified": "2024-03-12T12:40:13.500", + "lastModified": "2024-08-01T13:46:51.077", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En config_gov_time_windows de tmu.c, hay una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-03-01", diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22052.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22052.json index 39bbf5b7403..fa2e3836d97 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22052.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22052.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22052", "sourceIdentifier": "support@hackerone.com", "published": "2024-04-04T20:15:08.333", - "lastModified": "2024-04-08T22:52:44.573", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:46:52.157", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -71,6 +71,16 @@ "value": "CWE-476" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22234.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22234.json index 3bb7ffd94b9..1357726384c 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22234.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22234.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22234", "sourceIdentifier": "security@vmware.com", "published": "2024-02-20T07:15:09.967", - "lastModified": "2024-03-15T11:15:08.857", + "lastModified": "2024-08-01T13:46:53.813", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://security.netapp.com/advisory/ntap-20240315-0003/", diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22271.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22271.json index a36b42bd9eb..88588c39f14 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22271.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22271.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22271", "sourceIdentifier": "security@vmware.com", "published": "2024-07-09T13:15:09.887", - "lastModified": "2024-07-09T18:19:14.047", + "lastModified": "2024-08-01T13:46:54.670", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "https://spring.io/security/cve-2024-22271", diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22393.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22393.json index 04a82e1209a..f84a74dc2ff 100644 --- a/CVE-2024/CVE-2024-223xx/CVE-2024-22393.json +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22393.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22393", "sourceIdentifier": "security@apache.org", "published": "2024-02-22T10:15:08.340", - "lastModified": "2024-02-22T19:07:27.197", + "lastModified": "2024-08-01T13:46:55.723", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Carga sin restricciones de archivos con vulnerabilidad de tipo peligroso en Apache Answer. Este problema afecta a Apache Answer: hasta 1.2.1. El ataque de inundaci\u00f3n de p\u00edxeles mediante la carga de archivos de p\u00edxeles de gran tama\u00f1o provocar\u00e1 que el servidor se quede sin memoria. Un usuario que haya iniciado sesi\u00f3n puede provocar un ataque de este tipo al cargar una imagen al publicar contenido. Se recomienda a los usuarios actualizar a la versi\u00f3n [1.2.5], que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-224xx/CVE-2024-22442.json b/CVE-2024/CVE-2024-224xx/CVE-2024-22442.json index 092e64824c3..2a88a6ea929 100644 --- a/CVE-2024/CVE-2024-224xx/CVE-2024-22442.json +++ b/CVE-2024/CVE-2024-224xx/CVE-2024-22442.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22442", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-07-16T16:15:04.017", - "lastModified": "2024-07-16T18:00:02.110", + "lastModified": "2024-08-01T13:46:56.070", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], "references": [ { "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04663en_us&docLocale=en_US", diff --git a/CVE-2024/CVE-2024-224xx/CVE-2024-22443.json b/CVE-2024/CVE-2024-224xx/CVE-2024-22443.json index 7bf2f4f25a6..fa6db86419a 100644 --- a/CVE-2024/CVE-2024-224xx/CVE-2024-22443.json +++ b/CVE-2024/CVE-2024-224xx/CVE-2024-22443.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22443", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-07-24T15:15:11.370", - "lastModified": "2024-07-26T13:14:58.543", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:46:57.173", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -69,6 +69,16 @@ "value": "CWE-1321" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-224xx/CVE-2024-22444.json b/CVE-2024/CVE-2024-224xx/CVE-2024-22444.json index 98bee178204..e2ad918708f 100644 --- a/CVE-2024/CVE-2024-224xx/CVE-2024-22444.json +++ b/CVE-2024/CVE-2024-224xx/CVE-2024-22444.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22444", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-07-24T16:15:06.220", - "lastModified": "2024-07-25T17:46:52.627", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:46:57.887", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -69,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-225xx/CVE-2024-22532.json b/CVE-2024/CVE-2024-225xx/CVE-2024-22532.json index c9832e28999..fde24464d48 100644 --- a/CVE-2024/CVE-2024-225xx/CVE-2024-22532.json +++ b/CVE-2024/CVE-2024-225xx/CVE-2024-22532.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22532", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-28T23:15:09.507", - "lastModified": "2024-02-29T13:49:47.277", + "lastModified": "2024-08-01T13:46:58.680", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de desbordamiento de b\u00fafer en XNSoft NConvert 7.163 (para Windows x86) permite a atacantes provocar una denegaci\u00f3n de servicio a trav\u00e9s de un archivo xwd manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://github.com/pwndorei/CVE-2024-22532", diff --git a/CVE-2024/CVE-2024-225xx/CVE-2024-22544.json b/CVE-2024/CVE-2024-225xx/CVE-2024-22544.json index 316fc6b3893..3ac94b94d1e 100644 --- a/CVE-2024/CVE-2024-225xx/CVE-2024-22544.json +++ b/CVE-2024/CVE-2024-225xx/CVE-2024-22544.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22544", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-27T01:15:07.037", - "lastModified": "2024-02-27T14:20:06.637", + "lastModified": "2024-08-01T13:46:59.453", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en Linksys Router E1700 versi\u00f3n 1.0.04 (compilaci\u00f3n 3), que permite a atacantes autenticados ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n setDateTime." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://mat4mee.notion.site/Remote-Code-Execution-RCE-on-the-Linksys-Router-E1700-765c9bbf6a7f4171b670bc778bf9b005", diff --git a/CVE-2024/CVE-2024-226xx/CVE-2024-22641.json b/CVE-2024/CVE-2024-226xx/CVE-2024-22641.json index 959ffcb8d76..d8e84cc4f11 100644 --- a/CVE-2024/CVE-2024-226xx/CVE-2024-22641.json +++ b/CVE-2024/CVE-2024-226xx/CVE-2024-22641.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22641", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T21:16:29.337", - "lastModified": "2024-05-29T13:02:09.280", + "lastModified": "2024-08-01T13:47:00.240", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "TCPDF versi\u00f3n 6.6.5 y anteriores es vulnerable a ReDoS (Denegaci\u00f3n de servicio de expresi\u00f3n regular) si se analiza un archivo SVG que no es de confianza." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://github.com/zunak/CVE-2024-22641", diff --git a/CVE-2024/CVE-2024-227xx/CVE-2024-22723.json b/CVE-2024/CVE-2024-227xx/CVE-2024-22723.json index 297a8f77ced..e3b6acd2bfd 100644 --- a/CVE-2024/CVE-2024-227xx/CVE-2024-22723.json +++ b/CVE-2024/CVE-2024-227xx/CVE-2024-22723.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22723", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-28T06:15:49.827", - "lastModified": "2024-02-28T14:06:45.783", + "lastModified": "2024-08-01T13:47:01.343", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Webtrees 2.1.18 es vulnerable a Directory Traversal. Al manipular el par\u00e1metro \"media_folder\" en la URL, un atacante (en este caso, un administrador) puede navegar m\u00e1s all\u00e1 del directorio deseado (el directorio 'media/') para acceder a archivos confidenciales en otras partes del sistema de archivos de la aplicaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-31" + } + ] + } + ], "references": [ { "url": "https://cupc4k3.medium.com/cve-2024-22723-webtrees-vulnerability-uncovering-sensitive-data-through-path-traversal-7442e7a38b68", diff --git a/CVE-2024/CVE-2024-229xx/CVE-2024-22988.json b/CVE-2024/CVE-2024-229xx/CVE-2024-22988.json index 6676166b30e..955b584f5fc 100644 --- a/CVE-2024/CVE-2024-229xx/CVE-2024-22988.json +++ b/CVE-2024/CVE-2024-229xx/CVE-2024-22988.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22988", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-23T23:15:09.623", - "lastModified": "2024-03-18T20:15:08.793", + "lastModified": "2024-08-01T13:47:02.130", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en zkteco zkbio WDMS v.8.0.5 permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente /files/backup/." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/whiteman007/b50a9b64007a5d7bcb7a8bee61d2cb47", diff --git a/CVE-2024/CVE-2024-230xx/CVE-2024-23078.json b/CVE-2024/CVE-2024-230xx/CVE-2024-23078.json index 41c92e11395..fdfd30a2618 100644 --- a/CVE-2024/CVE-2024-230xx/CVE-2024-23078.json +++ b/CVE-2024/CVE-2024-230xx/CVE-2024-23078.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23078", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T20:15:08.500", - "lastModified": "2024-07-12T16:15:02.917", + "lastModified": "2024-08-01T13:47:02.967", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -22,7 +22,42 @@ "value": "Se descubri\u00f3 que JGraphT Core v1.5.2 conten\u00eda una NullPointerException a trav\u00e9s del componente org.jgrapht.alg.util.ToleranceDoubleComparator::compare(Double, Double)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "http://jgrapht.com", diff --git a/CVE-2024/CVE-2024-230xx/CVE-2024-23085.json b/CVE-2024/CVE-2024-230xx/CVE-2024-23085.json index e705cd6dd8e..1ab5df4e7d1 100644 --- a/CVE-2024/CVE-2024-230xx/CVE-2024-23085.json +++ b/CVE-2024/CVE-2024-230xx/CVE-2024-23085.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23085", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T20:15:08.567", - "lastModified": "2024-07-18T17:15:04.153", + "lastModified": "2024-08-01T13:47:03.753", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -22,7 +22,42 @@ "value": "Se descubri\u00f3 que Apfloat v1.10.1 conten\u00eda una NullPointerException a trav\u00e9s del componente org.apfloat.internal.DoubleScramble::scramble(double[], int, int[])." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-690" + } + ] + } + ], "references": [ { "url": "http://apfloat.com", diff --git a/CVE-2024/CVE-2024-230xx/CVE-2024-23094.json b/CVE-2024/CVE-2024-230xx/CVE-2024-23094.json index f41dfbadc91..4c34d594728 100644 --- a/CVE-2024/CVE-2024-230xx/CVE-2024-23094.json +++ b/CVE-2024/CVE-2024-230xx/CVE-2024-23094.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23094", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-22T14:15:46.830", - "lastModified": "2024-02-22T19:07:27.197", + "lastModified": "2024-08-01T13:47:04.610", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que Flusity-CMS v2.33 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /cover/addons/info_media_gallery/action/edit_addon_post.php" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/TinkAnet/cve/blob/main/csrf3.md", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23120.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23120.json index 61894353849..ca9d223c6c3 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23120.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23120.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23120", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-02-22T00:15:52.510", - "lastModified": "2024-06-15T03:15:09.170", + "lastModified": "2024-08-01T13:47:05.543", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Un archivo STP creado con fines malintencionados cuando se analiza en ASMIMPORT228A.dll a trav\u00e9s de Autodesk AutoCAD puede forzar una escritura fuera de los l\u00edmites. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, escribir datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23121.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23121.json index 6143f5818ed..a2170e17e05 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23121.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23121.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23121", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-02-22T02:15:49.290", - "lastModified": "2024-06-15T04:15:12.550", + "lastModified": "2024-08-01T13:47:05.750", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Un archivo MODEL creado con fines malintencionados cuando se analiza en libodxdll.dll a trav\u00e9s de Autodesk AutoCAD puede forzar una escritura fuera de los l\u00edmites. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, escribir datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23122.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23122.json index 7979d85d973..dbfd7a1e1cf 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23122.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23122.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23122", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-02-22T02:15:49.363", - "lastModified": "2024-06-25T01:15:49.807", + "lastModified": "2024-08-01T13:47:05.937", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Un archivo 3DM creado con fines malintencionados, cuando se analiza en opennurbs.dll a trav\u00e9s de Autodesk AutoCAD, puede forzar una escritura fuera de los l\u00edmites. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, escribir datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23123.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23123.json index 0bb39d65a56..7ab660b62e7 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23123.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23123.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23123", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-02-22T02:15:49.433", - "lastModified": "2024-06-25T01:15:49.923", + "lastModified": "2024-08-01T13:47:06.133", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Un archivo CATPART creado con fines malintencionados, cuando se analiza en CC5Dll.dll y ASMBASE228A.dll a trav\u00e9s de Autodesk AutoCAD, puede forzar una escritura fuera de los l\u00edmites. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, escribir datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23124.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23124.json index 67cabe78744..29fe20655f8 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23124.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23124.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23124", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-02-22T03:15:08.027", - "lastModified": "2024-03-13T15:15:50.783", + "lastModified": "2024-08-01T13:47:06.327", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Un archivo STP creado con fines malintencionados cuando se analiza en ASMIMPORT228A.dll a trav\u00e9s de Autodesk AutoCAD puede forzar una escritura fuera de los l\u00edmites. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, escribir datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23125.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23125.json index 3d691e88601..c5ff33a3e5b 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23125.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23125.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23125", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-02-22T03:15:08.100", - "lastModified": "2024-02-22T19:07:27.197", + "lastModified": "2024-08-01T13:47:06.510", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Un archivo SLDPRT creado con fines malintencionados cuando se analiza ODXSW_DLL.dll a trav\u00e9s de Autodesk AutoCAD se puede utilizar para provocar un desbordamiento en la regi\u00f3n stack de la memoria. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, leer datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23126.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23126.json index 24d18ccc2a4..acc480a045d 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23126.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23126.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23126", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-02-22T03:15:08.170", - "lastModified": "2024-03-18T00:15:06.947", + "lastModified": "2024-08-01T13:47:06.683", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Un archivo CATPART creado con fines malintencionados cuando se analiza CC5Dll.dll a trav\u00e9s de Autodesk AutoCAD se puede utilizar para provocar un desbordamiento en la regi\u00f3n stack de la memoria. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, leer datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23127.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23127.json index 6fbbf239903..8ea45e35475 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23127.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23127.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23127", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-02-22T03:15:08.233", - "lastModified": "2024-06-25T01:15:49.990", + "lastModified": "2024-08-01T13:47:06.953", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Un archivo MODEL, SLDPRT o SLDASM creado con fines malintencionados cuando se analiza VCRUNTIME140.dll a trav\u00e9s de Autodesk AutoCAD se puede utilizar para provocar un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, leer datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23128.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23128.json index 9b09e58b93e..622a492d218 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23128.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23128.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23128", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-02-22T04:15:08.590", - "lastModified": "2024-06-25T01:15:50.063", + "lastModified": "2024-08-01T13:47:07.237", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Un archivo MODEL creado con fines malintencionados en libodxdll.dll cuando se analiza mediante Autodesk AutoCAD podr\u00eda provocar una vulnerabilidad de corrupci\u00f3n de memoria por infracci\u00f3n de acceso de escritura. Esta vulnerabilidad, junto con otras vulnerabilidades, podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo en el contexto del proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23129.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23129.json index 9f6984c484a..99a2d9d2815 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23129.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23129.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23129", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-02-22T04:15:08.667", - "lastModified": "2024-06-25T01:15:50.137", + "lastModified": "2024-08-01T13:47:07.420", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Un archivo MODEL 3DM, STP o SLDASM creado con fines malintencionados en opennurbs.dll cuando se analiza a trav\u00e9s de Autodesk AutoCAD podr\u00eda provocar una vulnerabilidad de corrupci\u00f3n de memoria por infracci\u00f3n de acceso de escritura. Esta vulnerabilidad, junto con otras vulnerabilidades, podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo en el contexto del proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23130.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23130.json index 4a15aac975a..daa0c1dbddf 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23130.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23130.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23130", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-02-22T04:15:08.737", - "lastModified": "2024-06-25T01:15:50.197", + "lastModified": "2024-08-01T13:47:07.610", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Un archivo SLDASM o SLDPRT creado con fines malintencionados en ODXSW_DLL.dll cuando se analiza a trav\u00e9s de Autodesk AutoCAD podr\u00eda provocar una vulnerabilidad de corrupci\u00f3n de memoria por infracci\u00f3n de acceso de escritura. Esta vulnerabilidad, junto con otras vulnerabilidades, podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo en el contexto del proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23131.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23131.json index e85216cac1e..63aec129fa9 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23131.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23131.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23131", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-02-22T04:15:08.797", - "lastModified": "2024-06-25T02:15:10.807", + "lastModified": "2024-08-01T13:47:07.813", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Un archivo STP creado con fines malintencionados en ASMKERN228A.dll o ASMDATAX228A.dll cuando se analiza mediante Autodesk AutoCAD podr\u00eda provocar una vulnerabilidad de corrupci\u00f3n de memoria por infracci\u00f3n de acceso de escritura. Esta vulnerabilidad, junto con otras vulnerabilidades, podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo en el contexto del proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23132.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23132.json index 160677333e2..576afe1aebd 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23132.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23132.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23132", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-02-22T04:15:08.857", - "lastModified": "2024-03-18T00:15:07.297", + "lastModified": "2024-08-01T13:47:08.000", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Un archivo STP creado con fines malintencionados en atf_dwg_consumer.dll cuando se analiza mediante Autodesk AutoCAD podr\u00eda provocar una vulnerabilidad de corrupci\u00f3n de memoria por infracci\u00f3n de acceso de escritura. Esta vulnerabilidad, junto con otras vulnerabilidades, podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo en el contexto del proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23133.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23133.json index 99549a2524f..3a6a21874a9 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23133.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23133.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23133", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-02-22T04:15:08.917", - "lastModified": "2024-03-18T00:15:07.340", + "lastModified": "2024-08-01T13:47:08.190", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Un archivo STP creado con fines malintencionados en ASMDATAX228A.dll cuando se analiza mediante Autodesk AutoCAD podr\u00eda provocar una vulnerabilidad de corrupci\u00f3n de memoria por infracci\u00f3n de acceso de escritura. Esta vulnerabilidad, junto con otras vulnerabilidades, podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo en el contexto del proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23134.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23134.json index bf5967ad6ff..092df9bf29b 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23134.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23134.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23134", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-02-22T05:15:09.187", - "lastModified": "2024-06-17T17:15:51.443", + "lastModified": "2024-08-01T13:47:08.377", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Un archivo IGS creado con fines malintencionados cuando tbb.dll se analiza a trav\u00e9s de Autodesk AutoCAD se puede utilizar en una vulnerabilidad de user-after-free. Esta vulnerabilidad, junto con otras vulnerabilidades, podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo en el proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23135.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23135.json index b0bfc7b5f21..7f1151dcb00 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23135.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23135.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23135", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-02-22T05:15:09.357", - "lastModified": "2024-03-18T00:15:07.437", + "lastModified": "2024-08-01T13:47:08.570", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Un archivo SLDPRT creado con fines malintencionados cuando ASMkern228A.dll se analiza a trav\u00e9s de Autodesk AutoCAD se puede utilizar en una vulnerabilidad de user-after-free. Esta vulnerabilidad, junto con otras vulnerabilidades, podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo en el proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23136.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23136.json index 9598b22a301..825aa1598aa 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23136.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23136.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23136", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-02-22T05:15:09.527", - "lastModified": "2024-03-18T00:15:07.490", + "lastModified": "2024-08-01T13:47:08.767", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Un archivo STP creado con fines malintencionados cuando ASMKERN228A.dll se analiza mediante Autodesk AutoCAD se puede utilizar para eliminar la referencia a un puntero que no es de confianza. Esta vulnerabilidad, junto con otras vulnerabilidades, podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo en el proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23137.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23137.json index 392d4f78f52..d0a412dbe2d 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23137.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23137.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23137", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-02-22T05:15:09.640", - "lastModified": "2024-06-25T02:15:10.873", + "lastModified": "2024-08-01T13:47:08.943", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Un archivo STP o SLDPRT creado con fines malintencionados cuando ODXSW_DLL.dll se analiza mediante Autodesk AutoCAD se puede utilizar para variables no inicializadas. Esta vulnerabilidad, junto con otras vulnerabilidades, podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo en el proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23235.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23235.json index ed6ffb056eb..39bc90e4534 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23235.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23235.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23235", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-08T02:15:47.970", - "lastModified": "2024-03-13T23:15:46.430", + "lastModified": "2024-08-01T13:47:09.287", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se abord\u00f3 una condici\u00f3n de ejecuci\u00f3n con validaci\u00f3n adicional. Este problema se solucion\u00f3 en macOS Sonoma 14.4, visionOS 1.1, iOS 17.4 y iPadOS 17.4, watchOS 10.4, iOS 16.7.6 y iPadOS 16.7.6, tvOS 17.4. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23253.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23253.json index 14ce9a904f5..4eabaa2637a 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23253.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23253.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23253", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-08T02:15:48.620", - "lastModified": "2024-03-13T21:15:56.870", + "lastModified": "2024-08-01T13:47:10.297", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema se solucion\u00f3 en macOS Sonoma 14.4. Es posible que una aplicaci\u00f3n pueda acceder a la librer\u00eda de fotos de un usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23258.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23258.json index f100a7a7fc8..946a3f0ad0b 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23258.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23258.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23258", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-08T02:15:48.803", - "lastModified": "2024-03-13T23:15:46.750", + "lastModified": "2024-08-01T13:47:11.070", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se solucion\u00f3 una lectura fuera de los l\u00edmites con una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en visionOS 1.1, macOS Sonoma 14.4. El procesamiento de una imagen puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23265.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23265.json index 55f7bdb0611..1598ded804a 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23265.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23265.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23265", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-08T02:15:49.077", - "lastModified": "2024-03-13T23:15:46.933", + "lastModified": "2024-08-01T13:47:11.933", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se solucion\u00f3 una vulnerabilidad de corrupci\u00f3n de memoria con un bloqueo mejorado. Este problema se solucion\u00f3 en macOS Monterey 12.7.4, macOS Ventura 13.6.5, macOS Sonoma 14.4, visionOS 1.1, iOS 17.4 y iPadOS 17.4, watchOS 10.4, iOS 16.7.6 y iPadOS 16.7.6, tvOS 17.4. Una aplicaci\u00f3n puede provocar la finalizaci\u00f3n inesperada del sistema o escribir en la memoria del kernel." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23268.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23268.json index e6e7cf8c5f5..8668a4e278b 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23268.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23268.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23268", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-08T02:15:49.223", - "lastModified": "2024-03-14T19:05:36.077", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:47:12.763", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-74" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-75" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23274.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23274.json index 48cc03857ee..982316db2a0 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23274.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23274.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23274", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-08T02:15:49.467", - "lastModified": "2024-03-14T19:54:38.937", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:47:13.570", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-74" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-75" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23278.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23278.json index 6885dc7b18e..0ddb6ff6b27 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23278.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23278.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23278", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-08T02:15:49.647", - "lastModified": "2024-03-13T22:15:10.883", + "lastModified": "2024-08-01T13:47:14.363", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en macOS Ventura 13.6.5, macOS Sonoma 14.4, iOS 17.4 y iPadOS 17.4, watchOS 10.4, iOS 16.7.6 y iPadOS 16.7.6, tvOS 17.4. Es posible que una aplicaci\u00f3n pueda salir de su zona de pruebas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23286.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23286.json index e33851aadfb..17f1d45f259 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23286.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23286.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23286", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-08T02:15:49.973", - "lastModified": "2024-03-13T23:15:47.573", + "lastModified": "2024-08-01T13:47:15.157", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se solucion\u00f3 un problema de desbordamiento del b\u00fafer mejorando el manejo de la memoria. Este problema se solucion\u00f3 en macOS Monterey 12.7.4, macOS Ventura 13.6.5, macOS Sonoma 14.4, visionOS 1.1, iOS 17.4 y iPadOS 17.4, watchOS 10.4, iOS 16.7.6 y iPadOS 16.7.6, tvOS 17.4. El procesamiento de una imagen puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23302.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23302.json index 5e19957f077..a1175fc3ffc 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23302.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23302.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23302", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T01:44:08.307", - "lastModified": "2024-02-29T13:49:29.390", + "lastModified": "2024-08-01T13:47:16.180", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Couchbase Server anterior a 7.2.4 tiene una fuga de clave privada en goxdcr.log." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://docs.couchbase.com/server/current/release-notes/relnotes.html", diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23320.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23320.json index 6c90851c3ab..b17497e6e76 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23320.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23320.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23320", "sourceIdentifier": "security@apache.org", "published": "2024-02-23T17:15:08.570", - "lastModified": "2024-02-23T19:31:25.817", + "lastModified": "2024-08-01T13:47:17.360", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Vulnerabilidad de validaci\u00f3n de entrada incorrecta en Apache DolphinScheduler. Un usuario autenticado puede hacer que se ejecute JavaScript arbitrario y sin espacio aislado en el servidor. Este problema es un legado de CVE-2023-49299. No lo solucionamos por completo en CVE-2023-49299 y agregamos un parche m\u00e1s para solucionarlo. Este problema afecta a Apache DolphinScheduler: hasta 3.2.1. Se recomienda a los usuarios actualizar a la versi\u00f3n 3.2.1, que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23321.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23321.json index 8497e4c1caa..e061421155c 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23321.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23321.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23321", "sourceIdentifier": "security@apache.org", "published": "2024-07-22T10:15:02.540", - "lastModified": "2024-07-22T14:15:04.500", + "lastModified": "2024-08-01T13:47:17.543", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Para las versiones 5.2.0 y anteriores de RocketMQ, bajo ciertas condiciones, existe el riesgo de exposici\u00f3n de informaci\u00f3n confidencial a un actor no autorizado incluso si RocketMQ est\u00e1 habilitado con funciones de autenticaci\u00f3n y autorizaci\u00f3n. Un atacante que posea privilegios de usuario habituales o que est\u00e9 incluido en la lista blanca de IP podr\u00eda adquirir la cuenta y la contrase\u00f1a del administrador a trav\u00e9s de interfaces espec\u00edficas. Tal acci\u00f3n les otorgar\u00eda control total sobre RocketMQ, siempre que tengan acceso a la lista de direcciones IP del corredor. Para mitigar estas amenazas a la seguridad, se recomienda encarecidamente que los usuarios actualicen a la versi\u00f3n 5.3.0 o posterior. Adem\u00e1s, recomendamos a los usuarios que utilicen RocketMQ ACL 2.0 en lugar de la RocketMQ ACL original al actualizar a la versi\u00f3n Apache RocketMQ 5.3.0." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-234xx/CVE-2024-23444.json b/CVE-2024/CVE-2024-234xx/CVE-2024-23444.json index bd0cf14c4b9..a9a464ac794 100644 --- a/CVE-2024/CVE-2024-234xx/CVE-2024-23444.json +++ b/CVE-2024/CVE-2024-234xx/CVE-2024-23444.json @@ -2,13 +2,17 @@ "id": "CVE-2024-23444", "sourceIdentifier": "bressers@elastic.co", "published": "2024-07-31T18:15:11.983", - "lastModified": "2024-07-31T18:15:11.983", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "It was discovered by Elastic engineering that when elasticsearch-certutil CLI tool is used with the csr option in order to create a new Certificate Signing Requests, the associated private key that is generated is stored on disk unencrypted even if the --pass parameter is passed in the command invocation." + }, + { + "lang": "es", + "value": " La ingenier\u00eda de Elastic descubri\u00f3 que cuando se utiliza la herramienta CLI elasticsearch-certutil con la opci\u00f3n csr para crear nuevas solicitudes de firma de certificado, la clave privada asociada que se genera se almacena en el disco sin cifrar incluso si se pasa el par\u00e1metro --pass en la invocaci\u00f3n del comando." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23807.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23807.json index 60fb2f2e135..3569635c2ad 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23807.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23807.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23807", "sourceIdentifier": "security@apache.org", "published": "2024-02-29T01:44:10.340", - "lastModified": "2024-02-29T13:49:29.390", + "lastModified": "2024-08-01T13:47:20.360", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El analizador XML Apache Xerces C++ en las versiones 3.0.0 anteriores a la 3.2.5 contiene un error de use-after-free que se activa durante el escaneo de DTD externos. Se recomienda a los usuarios actualizar a la versi\u00f3n 3.2.5, que soluciona el problema, o mitigarlo desactivando el procesamiento de DTD. Esto se puede lograr a trav\u00e9s del DOM usando una funci\u00f3n de analizador est\u00e1ndar, o v\u00eda SAX usando la variable de entorno XERCES_DISABLE_DTD. Este problema se revel\u00f3 anteriormente como CVE-2018-1311, pero desafortunadamente ese aviso indicaba incorrectamente que el problema se solucionar\u00eda en la versi\u00f3n 3.2.3 o 3.2.4." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", @@ -26,6 +49,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23910.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23910.json index ae2e440c40d..68e93b24bb2 100644 --- a/CVE-2024/CVE-2024-239xx/CVE-2024-23910.json +++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23910.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23910", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-02-28T23:15:09.557", - "lastModified": "2024-06-12T01:15:48.943", + "lastModified": "2024-08-01T13:47:21.280", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en los enrutadores LAN inal\u00e1mbricos ELECOM permite a un atacante remoto no autenticado secuestrar la autenticaci\u00f3n de los administradores y realizar operaciones no deseadas en el producto afectado. Los productos y versiones afectados son los siguientes: WRC-1167GS2-B v1.67 y anteriores, WRC-1167GS2H-B v1.67 y anteriores, WRC-2533GS2-B v1.62 y anteriores, WRC-2533GS2-W v1.62 y anteriores y WRC-2533GS2V-B v1.62 y anteriores." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://jvn.jp/en/jp/JVN44166658/", diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23995.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23995.json index e6333744142..28f4780b956 100644 --- a/CVE-2024/CVE-2024-239xx/CVE-2024-23995.json +++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23995.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23995", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T16:15:35.070", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-08-01T13:47:21.707", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Cross Site Scripting (XSS) en Beekeeper Studio 4.1.13 y anteriores permite a atacantes remotos ejecutar c\u00f3digo arbitrario en el nombre de la columna de una tabla de base de datos en tabulator-popup-container." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/EQSTLab/PoC/blob/main/2024/RCE/CVE-2024-23995/README.md", diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23997.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23997.json index caeb5f00c27..43982d21b22 100644 --- a/CVE-2024/CVE-2024-239xx/CVE-2024-23997.json +++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23997.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23997", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-05T16:15:04.147", - "lastModified": "2024-07-08T16:41:17.500", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:47:22.457", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-240xx/CVE-2024-24017.json b/CVE-2024/CVE-2024-240xx/CVE-2024-24017.json index 12213cbceb5..66464c200b8 100644 --- a/CVE-2024/CVE-2024-240xx/CVE-2024-24017.json +++ b/CVE-2024/CVE-2024-240xx/CVE-2024-24017.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24017", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-08T02:15:07.903", - "lastModified": "2024-02-10T04:00:29.880", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:47:23.277", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-242xx/CVE-2024-24257.json b/CVE-2024/CVE-2024-242xx/CVE-2024-24257.json index 28ebb8abc49..8c210838fa0 100644 --- a/CVE-2024/CVE-2024-242xx/CVE-2024-24257.json +++ b/CVE-2024/CVE-2024-242xx/CVE-2024-24257.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24257", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-26T17:15:11.173", - "lastModified": "2024-07-29T14:12:08.783", + "lastModified": "2024-08-01T13:47:24.290", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en Central Control Attendance Machine web management platform v.3.0 de skteco.com permite a un atacante obtener informaci\u00f3n confidencial a trav\u00e9s de un script manipulado para el componente csl/user." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-75" + } + ] + } + ], "references": [ { "url": "https://idssgmcc.github.io/aran.github.io/1.html", diff --git a/CVE-2024/CVE-2024-243xx/CVE-2024-24309.json b/CVE-2024/CVE-2024-243xx/CVE-2024-24309.json index 6ce4baffa12..b3ef10a0ebb 100644 --- a/CVE-2024/CVE-2024-243xx/CVE-2024-24309.json +++ b/CVE-2024/CVE-2024-243xx/CVE-2024-24309.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24309", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-23T22:15:54.913", - "lastModified": "2024-02-26T13:42:22.567", + "lastModified": "2024-08-01T13:47:25.043", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el m\u00f3dulo \"Survey TMA\" (ecomiz_survey_tma) hasta la versi\u00f3n 2.0.0 de Ecomiz para PrestaShop, un invitado puede descargar informaci\u00f3n personal sin restricciones." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://security.friendsofpresta.org/modules/2024/02/20/ecomiz_survey_tma.html", diff --git a/CVE-2024/CVE-2024-243xx/CVE-2024-24334.json b/CVE-2024/CVE-2024-243xx/CVE-2024-24334.json index c51d840abbb..90057ed696b 100644 --- a/CVE-2024/CVE-2024-243xx/CVE-2024-24334.json +++ b/CVE-2024/CVE-2024-243xx/CVE-2024-24334.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24334", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-27T03:15:11.260", - "lastModified": "2024-05-01T18:15:14.420", + "lastModified": "2024-08-01T13:47:25.807", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se produce un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en dfs_v2 dfs_file en RT-Thread hasta 5.0.2." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Mar/28", diff --git a/CVE-2024/CVE-2024-243xx/CVE-2024-24335.json b/CVE-2024/CVE-2024-243xx/CVE-2024-24335.json index eb63de909ed..4ec4371c23f 100644 --- a/CVE-2024/CVE-2024-243xx/CVE-2024-24335.json +++ b/CVE-2024/CVE-2024-243xx/CVE-2024-24335.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24335", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-27T03:15:11.330", - "lastModified": "2024-05-01T18:15:14.493", + "lastModified": "2024-08-01T13:47:26.587", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se produce un desbordamiento de b\u00fafer de almacenamiento din\u00e1micoen el sistema de archivos romfs dfs_v2 RT-Thread hasta 5.0.2." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/03/05/1", diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24478.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24478.json index caf5294e5b3..2f41d062c88 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24478.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24478.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24478", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-21T17:15:09.567", - "lastModified": "2024-07-26T20:15:03.130", + "lastModified": "2024-08-01T13:47:27.360", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -22,7 +22,42 @@ "value": "Un problema en el equipo Wireshark Wireshark anterior a v.4.2.0 permite que un atacante remoto provoque una denegaci\u00f3n de servicio a trav\u00e9s de los componentes paquete-bgp.c, dissect_bgp_open(tvbuff_t*tvb, proto_tree*tree, paquete_info*pinfo), optlen." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-680" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/1047524396/e82c55147cd3cb62ef20cbdb0ec83694", diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24485.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24485.json index 684431c24be..5ec7e65c744 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24485.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24485.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24485", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-15T19:15:09.740", - "lastModified": "2024-04-16T13:24:07.103", + "lastModified": "2024-08-01T13:47:28.140", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema descubierto en silex technology DS-600 Firmware v.1.4.1, permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del comando GET EEP_DATA." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://github.com/MostafaSoliman/Security-Advisories/blob/master/CVE-2024-24485", diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24486.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24486.json index 588f3c6492c..99e8b5b67e8 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24486.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24486.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24486", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-15T19:15:09.787", - "lastModified": "2024-07-08T14:17:37.030", + "lastModified": "2024-08-01T13:47:28.910", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-94" + "value": "CWE-284" } ] } diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24792.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24792.json index cbe6144103a..5a17cf52681 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24792.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24792.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24792", "sourceIdentifier": "security@golang.org", "published": "2024-06-27T18:15:13.740", - "lastModified": "2024-06-27T19:25:12.067", + "lastModified": "2024-08-01T13:47:30.627", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Analizar una imagen corrupta o maliciosa con \u00edndices de color no v\u00e1lidos puede provocar p\u00e1nico." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://go.dev/cl/588115", diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24974.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24974.json index b1f4fca80d7..dbb7230df4e 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24974.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24974.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24974", "sourceIdentifier": "security@openvpn.net", "published": "2024-07-08T11:15:10.103", - "lastModified": "2024-07-11T14:47:54.920", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:47:31.543", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24998.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24998.json index 1a287a4b4d9..66fc9229fed 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24998.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24998.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24998", "sourceIdentifier": "support@hackerone.com", "published": "2024-04-19T02:15:09.543", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-08-01T13:47:31.747", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-31" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US", diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2430.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2430.json index 740ba85041e..cb7c49265ee 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2430.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2430.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2430", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-12T06:15:03.173", - "lastModified": "2024-07-24T20:18:59.157", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:49:46.040", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 } ] }, diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2455.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2455.json new file mode 100644 index 00000000000..4d3f86e2265 --- /dev/null +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2455.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-2455", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-08-01T13:15:10.493", + "lastModified": "2024-08-01T13:15:10.493", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Element Pack - Addon for Elementor Page Builder WordPress Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the widget wrapper link URL in all versions up to, and including, 7.9.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://feedback.elementpack.pro/announcements", + "source": "security@wordfence.com" + }, + { + "url": "https://feedback.elementpack.pro/announcements#:~:text=Version%207.9.1%20Released", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1903527e-d7d9-48a0-b59d-65ec5e14def2?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2470.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2470.json index da1f814129b..cb49c3ddb29 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2470.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2470.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2470", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-04T06:15:09.937", - "lastModified": "2024-06-04T16:57:41.053", + "lastModified": "2024-08-01T13:49:46.933", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Simple Ajax Chat de WordPress anterior a 20240412 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/8514b8ce-ff23-4aba-b2f1-fd36beb7d2ff/", diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25006.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25006.json index 39c8bbe4013..360f0774df5 100644 --- a/CVE-2024/CVE-2024-250xx/CVE-2024-25006.json +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25006.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25006", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T01:44:14.417", - "lastModified": "2024-02-29T13:49:29.390", + "lastModified": "2024-08-01T13:47:32.460", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "XenForo anterior a 2.2.14 permite el Directory Traversal (con acceso de escritura) por parte de un usuario autenticado que tiene permisos para administrar estilos y utiliza un archivo ZIP para importar estilos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://xenforo.com/community/threads/xenforo-2-2-14-released.219044/", diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25088.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25088.json index 2898be60bd8..b1b950c91f2 100644 --- a/CVE-2024/CVE-2024-250xx/CVE-2024-25088.json +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25088.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25088", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-02T16:15:04.250", - "lastModified": "2024-07-05T17:04:50.340", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:47:33.673", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25198.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25198.json index f25217bd3f9..ed50617b088 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25198.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25198.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25198", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-20T14:15:09.260", - "lastModified": "2024-02-20T19:50:53.960", + "lastModified": "2024-08-01T13:47:35.120", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El orden de puntero inadecuado de laser_scan_filter_.reset() y tf_listener_.reset() (amcl_node.cpp) en las versiones humildes de Open Robotics Robotic Operating Sytstem 2 (ROS2) y Nav2 conduce a un use-after-free." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://github.com/ros-planning/navigation2/blob/main/nav2_amcl/src/amcl_node.cpp#L331-L344", diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25202.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25202.json index 05dd229e7a4..47653814573 100644 --- a/CVE-2024/CVE-2024-252xx/CVE-2024-25202.json +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25202.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25202", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-28T20:15:41.810", - "lastModified": "2024-03-11T22:15:55.080", + "lastModified": "2024-08-01T13:47:35.900", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de cross-site scripting en Phpgurukul User Registration & Login y User Management System 1.0 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de la barra de b\u00fasqueda." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://drive.google.com/file/d/1oMNcChsXPMP9pu9lIE2C11n8mzkmLhcY/view", diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25208.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25208.json index 802d094c6b1..39b7d8d300a 100644 --- a/CVE-2024/CVE-2024-252xx/CVE-2024-25208.json +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25208.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25208", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-14T15:15:08.863", - "lastModified": "2024-02-15T06:27:02.687", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:47:36.680", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25219.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25219.json index 1746e3c4adc..64413329b8f 100644 --- a/CVE-2024/CVE-2024-252xx/CVE-2024-25219.json +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25219.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25219", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-14T15:15:09.423", - "lastModified": "2024-02-16T19:45:28.097", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:47:37.463", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25260.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25260.json index 0dda8d81c9f..e6db588b2c0 100644 --- a/CVE-2024/CVE-2024-252xx/CVE-2024-25260.json +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25260.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25260", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-20T18:15:52.880", - "lastModified": "2024-02-20T19:50:53.960", + "lastModified": "2024-08-01T13:47:38.247", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que elfutils v0.189 conten\u00eda una desreferencia de puntero NULL a trav\u00e9s de la funci\u00f3n handle_verdef() en readelf.c. " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://github.com/schsiung/fuzzer_issues/issues/1", diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25269.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25269.json index fa1bc36b1e8..21d67d0b87f 100644 --- a/CVE-2024/CVE-2024-252xx/CVE-2024-25269.json +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25269.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25269", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-05T01:15:06.780", - "lastModified": "2024-03-05T13:41:01.900", + "lastModified": "2024-08-01T13:47:39.020", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "libheif <= 1.17.6 contiene una p\u00e9rdida de memoria en la funci\u00f3n JpegEncoder::Encode. Esta falla permite que un atacante provoque un ataque de denegaci\u00f3n de servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://github.com/strukturag/libheif/issues/1073", diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25290.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25290.json index d11156a3adb..380ce78d53f 100644 --- a/CVE-2024/CVE-2024-252xx/CVE-2024-25290.json +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25290.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25290", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-02T17:15:15.100", - "lastModified": "2024-05-02T18:00:37.360", + "lastModified": "2024-08-01T13:47:39.797", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en Casa Systems NL1901ACV R6B032 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro nombre de usuario de la funci\u00f3n agregar." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "https://cybercx.com.au/blog/zero-day-remote-code-execution-in-netcomm-nl1901acv-vdsl-modem/", diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25291.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25291.json index fb7cd0d2803..10f9de0e3cc 100644 --- a/CVE-2024/CVE-2024-252xx/CVE-2024-25291.json +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25291.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25291", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T07:15:07.453", - "lastModified": "2024-02-29T13:49:29.390", + "lastModified": "2024-08-01T13:47:40.580", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Deskfiler v1.2.3 permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un complemento manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/ji-zzang/EQST-PoC/tree/main/2024/RCE/CVE-2024-25291", diff --git a/CVE-2024/CVE-2024-253xx/CVE-2024-25350.json b/CVE-2024/CVE-2024-253xx/CVE-2024-25350.json index debefb5f2ee..d60cce9377d 100644 --- a/CVE-2024/CVE-2024-253xx/CVE-2024-25350.json +++ b/CVE-2024/CVE-2024-253xx/CVE-2024-25350.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25350", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-28T22:15:26.493", - "lastModified": "2024-02-29T13:49:47.277", + "lastModified": "2024-08-01T13:47:41.340", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en /zms/admin/edit-ticket.php en PHPGurukul Zoo Management System 1.0 a trav\u00e9s de los par\u00e1metros tickettype y tprice." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/ZooManagementSystem-SQL_Injection_Edit_Ticket.md", diff --git a/CVE-2024/CVE-2024-253xx/CVE-2024-25388.json b/CVE-2024/CVE-2024-253xx/CVE-2024-25388.json index 9f457ece915..1e2a91aa98a 100644 --- a/CVE-2024/CVE-2024-253xx/CVE-2024-25388.json +++ b/CVE-2024/CVE-2024-253xx/CVE-2024-25388.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25388", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-27T03:15:11.400", - "lastModified": "2024-05-01T18:15:15.110", + "lastModified": "2024-08-01T13:47:42.200", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "drivers/wlan/wlan_mgmt,c en RT-Thread hasta 5.0.2 tiene un error de firma de entero y el consiguiente desbordamiento del b\u00fafer." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-195" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/03/05/1", diff --git a/CVE-2024/CVE-2024-253xx/CVE-2024-25390.json b/CVE-2024/CVE-2024-253xx/CVE-2024-25390.json index 6b51ab2d1f7..5f351fc73bc 100644 --- a/CVE-2024/CVE-2024-253xx/CVE-2024-25390.json +++ b/CVE-2024/CVE-2024-253xx/CVE-2024-25390.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25390", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-27T03:15:11.537", - "lastModified": "2024-05-01T18:15:15.223", + "lastModified": "2024-08-01T13:47:42.977", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se produce un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en finsh/msh_file.c y finsh/msh.c en RT-Thread hasta 5.0.2." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/03/05/1", diff --git a/CVE-2024/CVE-2024-253xx/CVE-2024-25391.json b/CVE-2024/CVE-2024-253xx/CVE-2024-25391.json index 88b69d55c8d..0e5f0c4cb2d 100644 --- a/CVE-2024/CVE-2024-253xx/CVE-2024-25391.json +++ b/CVE-2024/CVE-2024-253xx/CVE-2024-25391.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25391", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-27T03:15:11.603", - "lastModified": "2024-05-01T18:15:15.270", + "lastModified": "2024-08-01T13:47:43.797", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se produce un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en libc/posix/ipc/mqueue.c en RT-Thread hasta 5.0.2." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/03/05/1", diff --git a/CVE-2024/CVE-2024-254xx/CVE-2024-25428.json b/CVE-2024/CVE-2024-254xx/CVE-2024-25428.json index b480f5e2071..d974acd9721 100644 --- a/CVE-2024/CVE-2024-254xx/CVE-2024-25428.json +++ b/CVE-2024/CVE-2024-254xx/CVE-2024-25428.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25428", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-20T22:15:08.727", - "lastModified": "2024-02-22T19:07:37.840", + "lastModified": "2024-08-01T13:47:44.563", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -16,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/wuweiit/mushroom/issues/19", diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25506.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25506.json index 61a46a9e8ac..c12db204258 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25506.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25506.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25506", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T20:15:07.773", - "lastModified": "2024-03-28T20:53:20.813", + "lastModified": "2024-08-01T13:47:45.357", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de cross-site scripting en Process Maker, Inc ProcessMaker anterior a 4.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario mediante el control de la cookie pm_sys_sys." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://medium.com/%40proflamyt/cve-2024-25506-425ba3212fb6", diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25545.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25545.json index 9c758cd0771..46665820603 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25545.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25545.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25545", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-12T13:15:15.220", - "lastModified": "2024-04-15T13:15:51.577", + "lastModified": "2024-08-01T13:47:46.123", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en Weave Weave Desktop v.7.78.10 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado en el componente del framework nwjs." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-358" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/khronokernel/b68709335aa097752423f5d6844c3aa3", diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25568.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25568.json index 0408355a627..e47d7b10ccb 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25568.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25568.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25568", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-04-04T00:15:06.990", - "lastModified": "2024-06-12T01:15:49.033", + "lastModified": "2024-08-01T13:47:46.990", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en WRC-X3200GST3-B v1.25 y anteriores, y WRC-G01-W v1.24 y anteriores permite que un atacante no autenticado adyacente a la red ejecute comandos arbitrarios del sistema operativo enviando una solicitud especialmente manipulada al producto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/vu/JVNVU95381465/", diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25652.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25652.json index dd35d815054..ee75176f361 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25652.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25652.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25652", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-14T03:15:08.877", - "lastModified": "2024-03-14T12:52:09.877", + "lastModified": "2024-08-01T13:47:48.337", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En Delinea PAM Secret Server 11.4, es posible que un usuario (con acceso a la funcionalidad de Informe) obtenga acceso no autorizado a sesiones remotas creadas por usuarios leg\u00edtimos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://www.cvcn.gov.it/cvcn/cve/CVE-2024-25652", diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25714.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25714.json index dc4ce8d78e4..543d468a3b1 100644 --- a/CVE-2024/CVE-2024-257xx/CVE-2024-25714.json +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25714.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25714", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-11T03:15:09.393", - "lastModified": "2024-02-11T22:29:15.837", + "lastModified": "2024-08-01T13:47:49.190", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En Rhonabwy hasta la versi\u00f3n 1.1.13, la verificaci\u00f3n de firmas HMAC utiliza una funci\u00f3n strcmp que es vulnerable a ataques de canal lateral, porque detiene la comparaci\u00f3n cuando se detecta la primera diferencia en las dos firmas. (La soluci\u00f3n utiliza gnutls_memcmp, que tiene ejecuci\u00f3n en tiempo constante)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1255" + } + ] + } + ], "references": [ { "url": "https://github.com/babelouest/rhonabwy/commit/f9fd9a1c77e48b514ebb3baf0360f87eef3d846e", diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25723.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25723.json index 8f5bd443515..6fa9a38e8e9 100644 --- a/CVE-2024/CVE-2024-257xx/CVE-2024-25723.json +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25723.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25723", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-27T15:15:07.757", - "lastModified": "2024-02-28T14:07:00.563", + "lastModified": "2024-08-01T13:47:49.970", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "ZenML Server en el paquete de aprendizaje autom\u00e1tico ZenML anterior a 0.46.7 para Python permite la escalada remota de privilegios porque el endpoint de la API REST /api/v1/users/{user_name_or_id}/activate permite el acceso bas\u00e1ndose en un nombre de usuario v\u00e1lido junto con una nueva contrase\u00f1a en el cuerpo de la solicitud. Estas tambi\u00e9n son versiones parcheadas: 0.44.4, 0.43.1 y 0.42.2." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://github.com/zenml-io/zenml", diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25729.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25729.json index 6f39eb14816..ae50298cc7a 100644 --- a/CVE-2024/CVE-2024-257xx/CVE-2024-25729.json +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25729.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25729", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-08T00:15:50.033", - "lastModified": "2024-03-08T14:02:57.420", + "lastModified": "2024-08-01T13:47:50.763", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Los dispositivos Arris SBG6580 tienen contrase\u00f1as de seguridad WPA2 predeterminadas predecibles que podr\u00edan provocar un acceso remoto no autorizado. (Usan los primeros 6 caracteres del SSID y los \u00faltimos 6 caracteres del BSSID, disminuyendo el \u00faltimo octeto)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-521" + } + ] + } + ], "references": [ { "url": "https://github.com/actuator/cve/blob/main/Arris/CVE-2024-25729", diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25753.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25753.json index 827ad622742..ed8af5cab1c 100644 --- a/CVE-2024/CVE-2024-257xx/CVE-2024-25753.json +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25753.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25753", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-22T23:15:07.703", - "lastModified": "2024-02-23T02:42:54.547", + "lastModified": "2024-08-01T13:47:51.623", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en Tenda AC9 v.3.0 con versi\u00f3n de firmware v.15.03.06.42_multi permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n formSetDeviceName." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0218/formSetDeviceName.md", diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25756.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25756.json index 2f04873dcbd..359654bfef6 100644 --- a/CVE-2024/CVE-2024-257xx/CVE-2024-25756.json +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25756.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25756", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-22T23:15:07.750", - "lastModified": "2024-02-23T02:42:54.547", + "lastModified": "2024-08-01T13:47:52.407", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en Tenda AC9 v.3.0 con versi\u00f3n de firmware v.15.03.06.42_multi permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n formWifiBasicSet." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0218/formWifiBasicSet.md", diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25847.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25847.json index 5379181c3ee..1ab9f9acdab 100644 --- a/CVE-2024/CVE-2024-258xx/CVE-2024-25847.json +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25847.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25847", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-03T09:15:06.253", - "lastModified": "2024-03-04T13:58:23.447", + "lastModified": "2024-08-01T13:47:53.253", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en los m\u00f3dulos MyPrestaModules \"Importaci\u00f3n de cat\u00e1logo de productos (CSV, Excel)\" (simpleimportproduct) para las versiones de PrestaShop 6.5.0 y anteriores, permite a los atacantes escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s de los m\u00e9todos Send::__construct() e importProducts::_addDataToDb ." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2024-02-29-simpleimportproduct.md", diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25849.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25849.json index 6d93ea21e9a..510216398c9 100644 --- a/CVE-2024/CVE-2024-258xx/CVE-2024-25849.json +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25849.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25849", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-08T02:15:50.580", - "lastModified": "2024-03-08T14:02:57.420", + "lastModified": "2024-08-01T13:47:54.067", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el m\u00f3dulo \"Hacer una oferta\" (makeanoffer) <= 1.7.1 de PrestaToolKit para PrestaShop, un invitado puede realizar una inyecci\u00f3n SQL a trav\u00e9s de MakeOffers::checkUserExistingOffer()` y `MakeOffers::addUserOffer()`." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://addons.prestashop.com/en/price-management/19507-make-an-offer.html", diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25864.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25864.json index 3d347fdd952..cc755c3e6af 100644 --- a/CVE-2024/CVE-2024-258xx/CVE-2024-25864.json +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25864.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25864", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-03T03:15:09.350", - "lastModified": "2024-04-03T12:38:04.840", + "lastModified": "2024-08-01T13:47:54.857", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "La vulnerabilidad de Server Side Request Forgery (SSRF) en las versiones de Friendica posteriores a la v.2023.12 permite a un atacante remoto ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s del componente fpostit.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, "references": [ { "url": "https://github.com/friendica/friendica/issues/13877", diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25869.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25869.json index 25541ceb349..7f9cf5c8a93 100644 --- a/CVE-2024/CVE-2024-258xx/CVE-2024-25869.json +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25869.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25869", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-28T22:15:26.690", - "lastModified": "2024-02-29T13:49:47.277", + "lastModified": "2024-08-01T13:47:55.047", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de carga de archivos sin restricciones en CodeAstro Membership Management System en PHP v.1.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario mediante la carga de un archivo php manipulado en el componente settings.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/MembershipManagementSystem-Unrestricted_Fileupload.md", diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25894.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25894.json index 8a96efaf944..1a8d83972cf 100644 --- a/CVE-2024/CVE-2024-258xx/CVE-2024-25894.json +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25894.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25894", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-21T18:15:51.623", - "lastModified": "2024-02-22T19:07:27.197", + "lastModified": "2024-08-01T13:47:55.813", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "ChurchCRM 5.5.0 /EventEditor.php es vulnerable a la inyecci\u00f3n SQL ciega (basada en el tiempo) a trav\u00e9s del par\u00e1metro POST EventCount." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/ChurchCRM/CRM/issues/6849", diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25897.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25897.json index 7c8346168dc..5585017552a 100644 --- a/CVE-2024/CVE-2024-258xx/CVE-2024-25897.json +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25897.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25897", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-21T18:15:51.777", - "lastModified": "2024-02-22T19:07:27.197", + "lastModified": "2024-08-01T13:47:56.570", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "ChurchCRM 5.5.0 FRCatalog.php es vulnerable a la inyecci\u00f3n SQL ciega (basada en el tiempo) a trav\u00e9s del par\u00e1metro GET CurrentFundraiser." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/ChurchCRM/CRM/issues/6856", diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25947.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25947.json index 838e4da2293..2a8bc7d42b8 100644 --- a/CVE-2024/CVE-2024-259xx/CVE-2024-25947.json +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25947.json @@ -2,13 +2,17 @@ "id": "CVE-2024-25947", "sourceIdentifier": "security_alert@emc.com", "published": "2024-08-01T07:15:02.140", - "lastModified": "2024-08-01T07:15:02.140", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dell iDRAC Service Module version 5.3.0.0 and prior, contain an Out of bound Read Vulnerability. A privileged local attacker could execute arbitrary code potentially resulting in a denial of service event." + }, + { + "lang": "es", + "value": "Dell iDRAC Service Module versi\u00f3n 5.3.0.0 y anteriores contiene una vulnerabilidad de lectura fuera de los l\u00edmites. Un atacante local privilegiado podr\u00eda ejecutar c\u00f3digo arbitrario, lo que podr\u00eda provocar un evento de denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25948.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25948.json index f474a6d02a3..4736730d792 100644 --- a/CVE-2024/CVE-2024-259xx/CVE-2024-25948.json +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25948.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25948", "sourceIdentifier": "security_alert@emc.com", "published": "2024-08-01T08:15:02.203", - "lastModified": "2024-08-01T08:15:02.203", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25974.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25974.json index 5c796f1972e..3a996795e9f 100644 --- a/CVE-2024/CVE-2024-259xx/CVE-2024-25974.json +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25974.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25974", "sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf", "published": "2024-02-20T08:15:07.823", - "lastModified": "2024-02-21T07:15:58.427", + "lastModified": "2024-08-01T13:47:57.737", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El LMS OpenOlat de Frentix GmbH se ve afectado por una vulnerabilidad de Cross-Site Scripting (XSS) Almacenado. Es posible cargar archivos dentro del Media Center de OpenOlat versi\u00f3n 18.1.5 (o inferior) como usuario autenticado sin ning\u00fan otro derecho. Aunque los tipos de archivos son limitados, se puede cargar una imagen SVG que contenga un payload XSS. Despu\u00e9s de una carga exitosa, el archivo se puede compartir con grupos de usuarios (incluidos administradores) que pueden ser atacados con el payload de JavaScript." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { "source": "551230f0-3615-47bd-b7cc-93e92e730bbf", diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25990.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25990.json index 28102f00fd3..39b4782500b 100644 --- a/CVE-2024/CVE-2024-259xx/CVE-2024-25990.json +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25990.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25990", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-03-11T19:15:47.743", - "lastModified": "2024-03-12T12:40:13.500", + "lastModified": "2024-08-01T13:47:57.997", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En pktproc_perftest_gen_rx_packet_sktbuf_mode de link_rx_pktproc.c, existe una posible escritura fuera de los l\u00edmites debido a una condici\u00f3n de ejecuci\u00f3n. Esto podr\u00eda llevar a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-03-01", diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2583.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2583.json index f6cf694f11d..2eaea8b39c0 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2583.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2583.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2583", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-13T05:15:48.923", - "lastModified": "2024-04-15T13:15:31.997", + "lastModified": "2024-08-01T13:49:48.777", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento WP Shortcodes Plugin \u2014 Shortcodes Ultimate WordPress anterior a 7.0.5 no escapa adecuadamente de algunos de sus atributos de c\u00f3digos cortos antes de que se repitan a los usuarios, lo que hace posible que los usuarios con el rol de colaborador realicen ataques XSS almacenados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/98d8c713-e8cd-4fad-a8fb-7a40db2742a2/", diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26023.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26023.json index dfa469cd4f8..daccddc8527 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26023.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26023.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26023", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-04-15T11:15:08.273", - "lastModified": "2024-04-15T13:15:31.997", + "lastModified": "2024-08-01T13:47:58.927", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en routers LAN inal\u00e1mbricos BUFFALO permite que un usuario que haya iniciado sesi\u00f3n ejecute comandos arbitrarios del sistema operativo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/jp/JVN58236836/", diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26294.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26294.json index 70295508885..3087fc2499c 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26294.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26294.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26294", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-02-27T22:15:14.923", - "lastModified": "2024-02-28T14:06:45.783", + "lastModified": "2024-08-01T13:48:03.680", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-001.txt", diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26295.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26295.json index 1f8535d4913..a16a347af38 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26295.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26295.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26295", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-02-27T22:15:15.100", - "lastModified": "2024-02-28T14:06:45.783", + "lastModified": "2024-08-01T13:48:04.430", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-001.txt", diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26296.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26296.json index 35c8830cfdc..ecff95b5594 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26296.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26296.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26296", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-02-27T22:15:15.263", - "lastModified": "2024-02-28T14:06:45.783", + "lastModified": "2024-08-01T13:48:05.123", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-001.txt", diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26297.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26297.json index cc87f0512fa..aae436f86dc 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26297.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26297.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26297", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-02-27T22:15:15.420", - "lastModified": "2024-02-28T14:06:45.783", + "lastModified": "2024-08-01T13:48:05.817", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-001.txt", diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26298.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26298.json index 0c7bab9c2ae..df4a295da8f 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26298.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26298.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26298", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-02-27T22:15:15.573", - "lastModified": "2024-02-28T14:06:45.783", + "lastModified": "2024-08-01T13:48:06.523", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-001.txt", diff --git a/CVE-2024/CVE-2024-263xx/CVE-2024-26304.json b/CVE-2024/CVE-2024-263xx/CVE-2024-26304.json index dd53ae31e6d..9766b726732 100644 --- a/CVE-2024/CVE-2024-263xx/CVE-2024-26304.json +++ b/CVE-2024/CVE-2024-263xx/CVE-2024-26304.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26304", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-05-01T15:15:14.680", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-08-01T13:48:07.227", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-004.txt", diff --git a/CVE-2024/CVE-2024-263xx/CVE-2024-26334.json b/CVE-2024/CVE-2024-263xx/CVE-2024-26334.json index 34d803bbe94..d1350898125 100644 --- a/CVE-2024/CVE-2024-263xx/CVE-2024-26334.json +++ b/CVE-2024/CVE-2024-263xx/CVE-2024-26334.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26334", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-05T09:15:45.040", - "lastModified": "2024-03-05T13:41:01.900", + "lastModified": "2024-08-01T13:48:08.113", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que swftools v0.9.2 conten\u00eda una infracci\u00f3n de segmentaci\u00f3n mediante la funci\u00f3n compileSWFActionCode en swftools/lib/action/actioncompiler.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://github.com/matthiaskramm/swftools/issues/221", diff --git a/CVE-2024/CVE-2024-263xx/CVE-2024-26342.json b/CVE-2024/CVE-2024-263xx/CVE-2024-26342.json index 49199271fc3..52caf6564c5 100644 --- a/CVE-2024/CVE-2024-263xx/CVE-2024-26342.json +++ b/CVE-2024/CVE-2024-263xx/CVE-2024-26342.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26342", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-28T18:15:45.890", - "lastModified": "2024-02-29T13:49:47.277", + "lastModified": "2024-08-01T13:48:08.900", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una desreferencia de puntero nulo en usr/sbin/httpd en ASUS AC68U 3.0.0.4.384.82230 permite a atacantes remotos activar DoS a trav\u00e9s de paquetes de red." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://github.com/Nicholas-wei/bug-discovery/blob/main/asus/2/ASUS_ac68u.md", diff --git a/CVE-2024/CVE-2024-263xx/CVE-2024-26369.json b/CVE-2024/CVE-2024-263xx/CVE-2024-26369.json index e43ac08982e..99579d4beb3 100644 --- a/CVE-2024/CVE-2024-263xx/CVE-2024-26369.json +++ b/CVE-2024/CVE-2024-263xx/CVE-2024-26369.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26369", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-19T06:15:06.267", - "lastModified": "2024-03-19T13:26:46.000", + "lastModified": "2024-08-01T13:48:09.673", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en el componente HistoryQosPolicy de FastDDS v2.12.x, v2.11.x, v2.10.x y v2.6.x provoca un SIGABRT (anulaci\u00f3n de se\u00f1al) al recibir los datos de DataWriter." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://github.com/eProsima/Fast-DDS/issues/4365", diff --git a/CVE-2024/CVE-2024-264xx/CVE-2024-26483.json b/CVE-2024/CVE-2024-264xx/CVE-2024-26483.json index aa6a2024d0f..fec8a4f0513 100644 --- a/CVE-2024/CVE-2024-264xx/CVE-2024-26483.json +++ b/CVE-2024/CVE-2024-264xx/CVE-2024-26483.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26483", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-22T05:15:09.973", - "lastModified": "2024-03-12T05:15:47.610", + "lastModified": "2024-08-01T13:48:10.447", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de carga de archivos arbitrarios en el m\u00f3dulo Imagen de perfil de Kirby CMS v4.1.0 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de un archivo PDF manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/getkirby/kirby/security/advisories/GHSA-xrvh-rvc4-5m43", diff --git a/CVE-2024/CVE-2024-265xx/CVE-2024-26580.json b/CVE-2024/CVE-2024-265xx/CVE-2024-26580.json index 449a7d829bc..ae96aa03fc8 100644 --- a/CVE-2024/CVE-2024-265xx/CVE-2024-26580.json +++ b/CVE-2024/CVE-2024-265xx/CVE-2024-26580.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26580", "sourceIdentifier": "security@apache.org", "published": "2024-03-06T12:15:45.743", - "lastModified": "2024-05-01T18:15:15.603", + "lastModified": "2024-08-01T13:48:11.393", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Vulnerabilidad de deserializaci\u00f3n de datos no confiables en Apache InLong. Este problema afecta a Apache InLong: desde 1.8.0 hasta 1.10.0, los atacantes pueden usar el payload espec\u00edfica para leer desde un archivo arbitrario. Se recomienda a los usuarios actualizar a Apache InLong 1.11.0 o seleccionar [1] para resolverlo. [1] https://github.com/apache/inlong/pull/9673" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", @@ -26,6 +49,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26723.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26723.json index 322eac6a7f2..1f8afeebf3b 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26723.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26723.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26723", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T15:15:54.143", - "lastModified": "2024-04-03T17:24:18.150", + "lastModified": "2024-08-01T13:48:12.423", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: lan966x: se solucion\u00f3 el bloqueo al agregar una interfaz con un retraso. Se produce un bloqueo al agregar una de las interfaces lan966x con un retraso. El problema se puede reproducir as\u00ed: enlace ip agregar nombre bond0 tipo bond miimon modo 100 balance-xor enlace ip establecer dev eth0 master bond0 La raz\u00f3n es que al agregar una interfaz bajo el retraso pasar\u00eda por todos los puertos e intentar\u00eda calcular determine qu\u00e9 otros puertos est\u00e1n bajo esa interfaz de retraso. Y el problema es que lan966x puede tener puertos que sean punteros NULL ya que no est\u00e1n sondeados. Entonces, al iterar sobre estos puertos, simplemente fallar\u00eda porque son punteros NULL. La soluci\u00f3n consiste en comprobar si hay punteros NULL antes de acceder a algo desde los puertos. Como hacemos en otros lugares." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/15faa1f67ab405d47789d4702f587ec7df7ef03e", diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26797.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26797.json index 9a744380e3e..fcd02279047 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26797.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26797.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26797", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-04T09:15:08.843", - "lastModified": "2024-04-04T12:48:22.650", + "lastModified": "2024-08-01T13:48:13.443", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Previene un posible desbordamiento del b\u00fafer en map_hw_resources Agrega una verificaci\u00f3n en la funci\u00f3n map_hw_resources para evitar un posible desbordamiento del b\u00fafer. La funci\u00f3n acced\u00eda a matrices utilizando un \u00edndice que potencialmente podr\u00eda ser mayor que el tama\u00f1o de las matrices, lo que provocaba un desbordamiento del b\u00fafer. Agrega una verificaci\u00f3n para garantizar que el \u00edndice est\u00e9 dentro de los l\u00edmites de las matrices. Si el \u00edndice est\u00e1 fuera de los l\u00edmites, se imprime un mensaje de error y, al interrumpirlo, continuar\u00e1 la ejecuci\u00f3n ignorando los datos adicionales antes de tiempo para evitar el desbordamiento del b\u00fafer. Reportado por smatch: drivers/gpu/drm/amd/amdgpu/../display/dc/dml2/dml2_wrapper.c:79 error map_hw_resources(): desbordamiento del b\u00fafer 'dml2->v20.scratch.dml_to_dc_pipe_mapping.disp_cfg_to_stream_id' 6 <= 7 controladores/gpu/drm/amd/amdgpu/../display/dc/dml2/dml2_wrapper.c:81 error map_hw_resources(): desbordamiento del b\u00fafer 'dml2->v20.scratch.dml_to_dc_pipe_mapping.disp_cfg_to_plane_id' 6 <= 7" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0f8ca019544a252d1afb468ce840c6dcbac73af4", diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26898.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26898.json index 0a517317d7f..7e679122356 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26898.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26898.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26898", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:10.820", - "lastModified": "2024-06-27T12:15:22.257", + "lastModified": "2024-08-01T13:48:14.737", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2628.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2628.json index 4dc8a3b6a33..9dd2244b6db 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2628.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2628.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2628", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-03-20T17:15:07.570", - "lastModified": "2024-04-01T15:23:07.793", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:49:49.370", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-474" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2640.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2640.json index 7c732c0faaa..c757888f969 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2640.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2640.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2640", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-12T06:15:03.433", - "lastModified": "2024-07-24T20:04:48.360", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:49:50.317", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 4.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27139.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27139.json index ccca829b843..f0daabb423b 100644 --- a/CVE-2024/CVE-2024-271xx/CVE-2024-27139.json +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27139.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27139", "sourceIdentifier": "security@apache.org", "published": "2024-03-01T16:15:46.067", - "lastModified": "2024-07-25T15:15:10.693", + "lastModified": "2024-08-01T13:48:17.100", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -22,7 +22,30 @@ "value": "** NO COMPATIBLE CUANDO EST\u00c1 ASIGNADO ** Vulnerabilidad de autorizaci\u00f3n incorrecta en Apache Archiva: una vulnerabilidad en Apache Archiva permite que un atacante no autenticado modifique los datos de la cuenta, lo que podr\u00eda llevar a la apropiaci\u00f3n de la cuenta. Este problema afecta a Apache Archiva: desde 2.0.0. Como este proyecto est\u00e1 retirado, no planeamos lanzar una versi\u00f3n que solucione este problema. Se recomienda a los usuarios que busquen una alternativa o restrinjan el acceso a la instancia a usuarios confiables. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27204.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27204.json index 3113767a55b..16b188d053c 100644 --- a/CVE-2024/CVE-2024-272xx/CVE-2024-27204.json +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27204.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27204", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-03-11T19:15:47.930", - "lastModified": "2024-03-12T12:40:13.500", + "lastModified": "2024-08-01T13:48:17.703", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En tmu_set_gov_active de tmu.c, hay una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-03-01", diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27210.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27210.json index 37a9d7ab36b..0ee2666e399 100644 --- a/CVE-2024/CVE-2024-272xx/CVE-2024-27210.json +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27210.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27210", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-03-11T19:15:48.200", - "lastModified": "2024-03-12T12:40:13.500", + "lastModified": "2024-08-01T13:48:18.507", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En Policy_check de fvp.c, hay una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-03-01", diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27213.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27213.json index 64cd2f7dcd7..01cd5435e8d 100644 --- a/CVE-2024/CVE-2024-272xx/CVE-2024-27213.json +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27213.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27213", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-03-11T19:15:48.333", - "lastModified": "2024-03-12T12:40:13.500", + "lastModified": "2024-08-01T13:48:19.280", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En BroadcastSystemMessage de servicemgr.cpp, existe una posible ejecuci\u00f3n remota de c\u00f3digo debido a un use after free. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-03-01", diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27224.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27224.json index 33b08409362..0922a9b4161 100644 --- a/CVE-2024/CVE-2024-272xx/CVE-2024-27224.json +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27224.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27224", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-03-11T19:15:48.647", - "lastModified": "2024-03-12T12:40:13.500", + "lastModified": "2024-08-01T13:48:20.053", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En strncpy de strncpy.c, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-03-01", diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27316.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27316.json index defb535b2c3..ea22b7c4efe 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27316.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27316.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27316", "sourceIdentifier": "security@apache.org", "published": "2024-04-04T20:15:08.720", - "lastModified": "2024-07-30T02:15:04.607", + "lastModified": "2024-08-01T13:48:22.100", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27348.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27348.json index 1e6de66e19a..b51c3194e00 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27348.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27348.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27348", "sourceIdentifier": "security@apache.org", "published": "2024-04-22T14:15:07.420", - "lastModified": "2024-05-01T17:15:30.443", + "lastModified": "2024-08-01T13:48:22.967", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de ejecuci\u00f3n remota de comandos RCE en Apache HugeGraph-Server. Este problema afecta a Apache HugeGraph-Server: desde 1.0.0 antes de 1.3.0 en Java8 y Java11. Se recomienda a los usuarios actualizar a la versi\u00f3n 1.3.0 con Java11 y habilitar el sistema de autenticaci\u00f3n lo que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/04/22/3", diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27354.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27354.json index 51b134c71be..c21c4593912 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27354.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27354.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27354", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-01T23:15:08.500", - "lastModified": "2024-03-21T02:52:19.927", + "lastModified": "2024-08-01T13:48:23.907", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en phpseclib 1.x anterior a 1.0.23, 2.x anterior a 2.0.47 y 3.x anterior a 3.0.36. Un atacante puede crear un certificado con formato incorrecto que contenga un valor principal extremadamente grande para provocar una denegaci\u00f3n de servicio (consumo de CPU para una verificaci\u00f3n de primalidad de isPrime). NOTA: este problema se introdujo al intentar solucionar CVE-2023-27560." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/katzj/ee72f3c2a00590812b2ea3c0c8890e0b", diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27357.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27357.json index 32811d48ca0..3aba1175bd1 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27357.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27357.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27357", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-26T17:15:11.580", - "lastModified": "2024-07-29T14:12:08.783", + "lastModified": "2024-08-01T13:48:24.737", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Se descubri\u00f3 un problema en WithSecure Elements Agent hasta 23.x para macOS, WithSecure Elements Client Security hasta 23.x para macOS y WithSecure MDR hasta 23.x para macOS. La escalada de privilegios locales puede ocurrir durante las instalaciones o actualizaciones por parte de los administradores." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.6, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://www.withsecure.com/en/support/security-advisories/cve-2024-27357", diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27385.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27385.json index 2e36d9d27f7..a74e1737fd1 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27385.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27385.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27385", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T21:15:12.287", - "lastModified": "2024-07-11T13:06:13.187", + "lastModified": "2024-08-01T13:48:25.863", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27386.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27386.json index e5c16588ba4..e513eb6c101 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27386.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27386.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27386", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T21:15:12.483", - "lastModified": "2024-07-11T13:06:13.187", + "lastModified": "2024-08-01T13:48:26.553", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27438.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27438.json index e557cbb8342..b2c19c9c11b 100644 --- a/CVE-2024/CVE-2024-274xx/CVE-2024-27438.json +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27438.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27438", "sourceIdentifier": "security@apache.org", "published": "2024-03-21T10:15:08.370", - "lastModified": "2024-05-01T19:15:22.450", + "lastModified": "2024-08-01T13:48:27.240", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Descarga de C\u00f3digo Sin Integridad Check vulnerabilidad en Apache Doris. Los archivos del controlador jdbc utilizados para el cat\u00e1logo JDBC no est\u00e1n verificados y pueden provocar la ejecuci\u00f3n remota de comandos. Una vez que el atacante est\u00e1 autorizado a crear un cat\u00e1logo JDBC, puede utilizar un archivo jar de controlador arbitrario con un fragmento de c\u00f3digo no verificado. Este fragmento de c\u00f3digo se ejecutar\u00e1 cuando el cat\u00e1logo se inicialice sin ninguna verificaci\u00f3n. Este problema afecta a Apache Doris: desde 1.2.0 hasta 2.0.4. Se recomienda a los usuarios actualizar a la versi\u00f3n 2.0.5 o 2.1.x, que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27453.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27453.json index 0dfbc2bc0aa..2c73f4b71b9 100644 --- a/CVE-2024/CVE-2024-274xx/CVE-2024-27453.json +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27453.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27453", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-03T18:15:09.250", - "lastModified": "2024-05-06T12:44:56.377", + "lastModified": "2024-08-01T13:48:27.533", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En Extreme XOS hasta 22.6.1.4, un usuario de solo lectura puede escalar privilegios a root mediante una solicitud HTTP POST manipulada al m\u00e9todo Python de la interfaz m\u00e1quina a m\u00e1quina (MMI)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + } + ] + } + ], "references": [ { "url": "https://extreme-networks.my.site.com/ExtrArticleDetail?an=000118266", diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27476.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27476.json index 30365bef54e..0470acab6c1 100644 --- a/CVE-2024/CVE-2024-274xx/CVE-2024-27476.json +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27476.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27476", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-10T15:16:04.923", - "lastModified": "2024-04-10T19:49:51.183", + "lastModified": "2024-08-01T13:48:28.390", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Leantime 3.0.6 es vulnerable a la inyecci\u00f3n de HTML a trav\u00e9s de /dashboard/show#/tickets/newTicket." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://drive.proton.me/urls/X9G9MY1FAW#NLS8RkHUihLY", diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27489.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27489.json index 961b00564df..77456dea19a 100644 --- a/CVE-2024/CVE-2024-274xx/CVE-2024-27489.json +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27489.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27489", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-19T15:15:10.210", - "lastModified": "2024-07-22T13:00:53.287", + "lastModified": "2024-08-01T13:48:29.187", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -16,6 +16,22 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-473" + }, + { + "lang": "en", + "value": "CWE-791" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/yyyyy7777777/a36541cb60d9e55628f78f2a68968212", diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27499.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27499.json index 8c78dea4534..e5a94d83643 100644 --- a/CVE-2024/CVE-2024-274xx/CVE-2024-27499.json +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27499.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27499", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-01T16:15:46.597", - "lastModified": "2024-03-01T22:22:25.913", + "lastModified": "2024-08-01T13:48:29.880", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Bagisto v1.5.1 es vulnerable a Cross-Site Scripting (XSS) a trav\u00e9s de la vulnerabilidad de carga de archivos png en la opci\u00f3n de revisi\u00f3n del producto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/Ek-Saini/security/blob/main/xss-bagisto-v1.5.1", diff --git a/CVE-2024/CVE-2024-275xx/CVE-2024-27558.json b/CVE-2024/CVE-2024-275xx/CVE-2024-27558.json index 459e456c312..30ab47638df 100644 --- a/CVE-2024/CVE-2024-275xx/CVE-2024-27558.json +++ b/CVE-2024/CVE-2024-275xx/CVE-2024-27558.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27558", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-01T17:15:07.490", - "lastModified": "2024-03-01T22:22:25.913", + "lastModified": "2024-08-01T13:48:30.653", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Stupid Simple CMS 1.2.4 es vulnerable a Cross Site Scripting (XSS) dentro del t\u00edtulo del blog de la configuraci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/kilooooo/cms/blob/main/2.md", diff --git a/CVE-2024/CVE-2024-275xx/CVE-2024-27559.json b/CVE-2024/CVE-2024-275xx/CVE-2024-27559.json index bd996844233..ce906f3d1cd 100644 --- a/CVE-2024/CVE-2024-275xx/CVE-2024-27559.json +++ b/CVE-2024/CVE-2024-275xx/CVE-2024-27559.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27559", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-01T17:15:07.530", - "lastModified": "2024-03-01T22:22:25.913", + "lastModified": "2024-08-01T13:48:31.443", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que Stupid Simple CMS v1.2.4 contiene un Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /save_settings.php" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/kilooooo/cms/blob/main/1.md", diff --git a/CVE-2024/CVE-2024-275xx/CVE-2024-27567.json b/CVE-2024/CVE-2024-275xx/CVE-2024-27567.json index 0dc60d2e6d3..83323bf69b6 100644 --- a/CVE-2024/CVE-2024-275xx/CVE-2024-27567.json +++ b/CVE-2024/CVE-2024-275xx/CVE-2024-27567.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27567", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-01T14:15:54.143", - "lastModified": "2024-03-01T15:23:36.177", + "lastModified": "2024-08-01T13:48:32.200", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que LBT T300-T390 v2.2.1.8 conten\u00eda un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria a trav\u00e9s del par\u00e1metro vpn_client_ip en la funci\u00f3n config_vpn_pptp. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante una solicitud POST manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/config_vpn_pptp.md", diff --git a/CVE-2024/CVE-2024-275xx/CVE-2024-27572.json b/CVE-2024/CVE-2024-275xx/CVE-2024-27572.json index 33f0a83c06c..b59a556c60e 100644 --- a/CVE-2024/CVE-2024-275xx/CVE-2024-27572.json +++ b/CVE-2024/CVE-2024-275xx/CVE-2024-27572.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27572", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-01T14:15:54.313", - "lastModified": "2024-03-01T15:23:36.177", + "lastModified": "2024-08-01T13:48:32.977", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que LBT T300-T390 v2.2.1.8 conten\u00eda un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria a trav\u00e9s del par\u00e1metro ApCliSsid en la funci\u00f3n updateCurAPlist. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante una solicitud POST manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/updateCurAPlist.md", diff --git a/CVE-2024/CVE-2024-276xx/CVE-2024-27620.json b/CVE-2024/CVE-2024-276xx/CVE-2024-27620.json index ea02cf0484c..3b7f44a6e59 100644 --- a/CVE-2024/CVE-2024-276xx/CVE-2024-27620.json +++ b/CVE-2024/CVE-2024-276xx/CVE-2024-27620.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27620", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-06T19:15:07.183", - "lastModified": "2024-04-08T18:48:40.217", + "lastModified": "2024-08-01T13:48:33.830", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en Ladder v.0.0.1 a v.0.0.21 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de una solicitud manipulada a la API." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], "references": [ { "url": "http://ladder.com", diff --git a/CVE-2024/CVE-2024-276xx/CVE-2024-27629.json b/CVE-2024/CVE-2024-276xx/CVE-2024-27629.json index e9b04d38758..89400bb98fd 100644 --- a/CVE-2024/CVE-2024-276xx/CVE-2024-27629.json +++ b/CVE-2024/CVE-2024-276xx/CVE-2024-27629.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27629", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-28T19:15:05.243", - "lastModified": "2024-07-01T12:37:24.220", + "lastModified": "2024-08-01T13:48:34.650", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en dc2niix anterior a v.1.0.20240202 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s del nombre del archivo generado que no se escapa correctamente ni se inyecta en una llamada al sistema cuando se utilizan ciertos tipos de compresi\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-116" + } + ] + } + ], "references": [ { "url": "https://github.com/rordenlab/dcm2niix/pull/789", diff --git a/CVE-2024/CVE-2024-276xx/CVE-2024-27655.json b/CVE-2024/CVE-2024-276xx/CVE-2024-27655.json index 74215af70ca..050ea499069 100644 --- a/CVE-2024/CVE-2024-276xx/CVE-2024-27655.json +++ b/CVE-2024/CVE-2024-276xx/CVE-2024-27655.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27655", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T20:15:41.500", - "lastModified": "2024-03-01T14:04:26.010", + "lastModified": "2024-08-01T13:48:35.833", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que D-Link DIR-823G A1V1.0.2B05 conten\u00eda un desbordamiento del b\u00fafer a trav\u00e9s del par\u00e1metro SOAPACTION. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante una entrada manipulada y posiblemente la ejecuci\u00f3n remota de c\u00f3digo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://calm-healer-839.notion.site/D-LINK-DIR-823G-OOBW-0x41E094-f1bd478368644136ad2e3a33e59041b2?pvs=4", diff --git a/CVE-2024/CVE-2024-276xx/CVE-2024-27656.json b/CVE-2024/CVE-2024-276xx/CVE-2024-27656.json index b00e11dd532..6eb12e34d3d 100644 --- a/CVE-2024/CVE-2024-276xx/CVE-2024-27656.json +++ b/CVE-2024/CVE-2024-276xx/CVE-2024-27656.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27656", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T20:15:41.547", - "lastModified": "2024-03-01T14:04:26.010", + "lastModified": "2024-08-01T13:48:36.973", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que D-Link DIR-823G A1V1.0.2B05 conten\u00eda un desbordamiento del b\u00fafer a trav\u00e9s del par\u00e1metro Cookie. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante una entrada manipulada y posiblemente la ejecuci\u00f3n remota de c\u00f3digo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://calm-healer-839.notion.site/D-LINK-DIR-823G-OOBW-0x41E2A0-8ea57277c7cd4ea18dbc40bcb41a98f2?pvs=4", diff --git a/CVE-2024/CVE-2024-276xx/CVE-2024-27657.json b/CVE-2024/CVE-2024-276xx/CVE-2024-27657.json index 9588b075b2e..018d37d504d 100644 --- a/CVE-2024/CVE-2024-276xx/CVE-2024-27657.json +++ b/CVE-2024/CVE-2024-276xx/CVE-2024-27657.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27657", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T20:15:41.597", - "lastModified": "2024-03-01T14:04:26.010", + "lastModified": "2024-08-01T13:48:37.967", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que D-Link DIR-823G A1V1.0.2B05 conten\u00eda un desbordamiento del b\u00fafer a trav\u00e9s del par\u00e1metro User-Agent. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante una entrada manipulada y posiblemente la ejecuci\u00f3n remota de c\u00f3digo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://calm-healer-839.notion.site/D-LINK-DIR-823G-OOBW-0x41D5B0-462500887ea3464692e3e697cc43838c?pvs=4", diff --git a/CVE-2024/CVE-2024-276xx/CVE-2024-27658.json b/CVE-2024/CVE-2024-276xx/CVE-2024-27658.json index cc9c641f712..67ecf39ce96 100644 --- a/CVE-2024/CVE-2024-276xx/CVE-2024-27658.json +++ b/CVE-2024/CVE-2024-276xx/CVE-2024-27658.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27658", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T20:15:41.640", - "lastModified": "2024-03-01T14:04:26.010", + "lastModified": "2024-08-01T13:48:39.527", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que D-Link DIR-823G A1V1.0.2B05 conten\u00eda desreferencias de puntero nulo en sub_4484A8(). Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante una entrada manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-395" + } + ] + } + ], "references": [ { "url": "https://calm-healer-839.notion.site/D-LINK-DIR-823G-NPD-0x44900C-8f23082721854117bdea70b6113433fd?pvs=4", diff --git a/CVE-2024/CVE-2024-276xx/CVE-2024-27659.json b/CVE-2024/CVE-2024-276xx/CVE-2024-27659.json index 13340605c9f..4f49066e824 100644 --- a/CVE-2024/CVE-2024-276xx/CVE-2024-27659.json +++ b/CVE-2024/CVE-2024-276xx/CVE-2024-27659.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27659", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T20:15:41.687", - "lastModified": "2024-03-01T14:04:26.010", + "lastModified": "2024-08-01T13:48:41.040", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que D-Link DIR-823G A1V1.0.2B05 conten\u00eda desreferencias de puntero nulo en sub_42AF30(). Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante una entrada manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-395" + } + ] + } + ], "references": [ { "url": "https://calm-healer-839.notion.site/D-LINK-DIR-823G-NPD-0x42B4C4-dfeae31d711f414796e1d9eb9cea7d31?pvs=4", diff --git a/CVE-2024/CVE-2024-276xx/CVE-2024-27661.json b/CVE-2024/CVE-2024-276xx/CVE-2024-27661.json index eb29efb7e5a..83bfa156e02 100644 --- a/CVE-2024/CVE-2024-276xx/CVE-2024-27661.json +++ b/CVE-2024/CVE-2024-276xx/CVE-2024-27661.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27661", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T20:15:41.773", - "lastModified": "2024-03-01T14:04:26.010", + "lastModified": "2024-08-01T13:48:42.050", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que D-Link DIR-823G A1V1.0.2B05 conten\u00eda desreferencias de puntero nulo en sub_4484A8(). Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante una entrada manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-395" + } + ] + } + ], "references": [ { "url": "https://calm-healer-839.notion.site/D-LINK-DIR-823G-NPD-0x42444C-34458f12482346b291f334eea12e6fd0?pvs=4", diff --git a/CVE-2024/CVE-2024-276xx/CVE-2024-27662.json b/CVE-2024/CVE-2024-276xx/CVE-2024-27662.json index f9376e05a0a..53ab5dfefb2 100644 --- a/CVE-2024/CVE-2024-276xx/CVE-2024-27662.json +++ b/CVE-2024/CVE-2024-276xx/CVE-2024-27662.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27662", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T20:15:41.817", - "lastModified": "2024-03-01T14:04:26.010", + "lastModified": "2024-08-01T13:48:43.087", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que D-Link DIR-823G A1V1.0.2B05 conten\u00eda desreferencias de puntero nulo en sub_4110f4(). Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante una entrada manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-395" + } + ] + } + ], "references": [ { "url": "https://calm-healer-839.notion.site/D-LINK-DIR-823G-NPD-0x4116F0-5befc4a65457482c8c4dcb16910ab820?pvs=4", diff --git a/CVE-2024/CVE-2024-276xx/CVE-2024-27694.json b/CVE-2024/CVE-2024-276xx/CVE-2024-27694.json index 84d6038df0b..3ebf041ef84 100644 --- a/CVE-2024/CVE-2024-276xx/CVE-2024-27694.json +++ b/CVE-2024/CVE-2024-276xx/CVE-2024-27694.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27694", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-04T16:15:49.727", - "lastModified": "2024-03-05T13:41:01.900", + "lastModified": "2024-08-01T13:48:43.923", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que FlyCms v1.0 contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) a trav\u00e9s del archivo /system/share/ztree_category_edit." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/sms2056/cms/blob/main/1.md", diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27743.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27743.json index a8300fd7f72..fbf3cece2b4 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27743.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27743.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27743", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-01T22:15:47.823", - "lastModified": "2024-03-13T07:15:36.253", + "lastModified": "2024-08-01T13:48:44.883", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Una vulnerabilidad de Cross-Site Scripting en Petrol Pump Mangement Software v.1.0 permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado en el par\u00e1metro Direcci\u00f3n en el componente add_invoices.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27743.md", diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27758.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27758.json index 432f3d2a597..fd7eac03825 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27758.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27758.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27758", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-12T16:15:08.600", - "lastModified": "2024-03-12T17:46:17.273", + "lastModified": "2024-08-01T13:48:45.070", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En RPyC anterior a 6.0.0, cuando un servidor expone un m\u00e9todo que llama al atributo llamado __array__ para un netref proporcionado por el cliente (por ejemplo, np.array(client_netref)), un atacante remoto puede crear una clase que resulte en la ejecuci\u00f3n remota de c\u00f3digo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/renbou/957f70d27470982994f12a1d70153d09", diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27798.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27798.json index fe99db9e566..7899113e580 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27798.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27798.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27798", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T15:13:03.593", - "lastModified": "2024-06-11T08:15:48.807", + "lastModified": "2024-08-01T13:48:46.017", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Se abord\u00f3 un problema de autorizaci\u00f3n con una mejora de gesti\u00f3n de estado. Este problema se solucion\u00f3 en macOS Sonoma 14.5. Un atacante puede aumentar los privilegios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "http://seclists.org/fulldisclosure/2024/May/12", diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27802.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27802.json index 44eed03e1c9..0a7314baf43 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27802.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27802.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27802", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:49.860", - "lastModified": "2024-07-02T13:37:19.690", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:48:46.507", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27821.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27821.json index aa6120e2c36..f8eb3af0c59 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27821.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27821.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27821", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T15:13:05.287", - "lastModified": "2024-06-10T18:15:29.097", + "lastModified": "2024-08-01T13:48:48.400", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se solucion\u00f3 un problema de manejo de rutas con una validaci\u00f3n mejorada. Este problema se solucion\u00f3 en iOS 17.5 y iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. Un acceso directo puede generar datos confidenciales del usuario sin consentimiento." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/May/10", diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27824.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27824.json index f7f6b532d3f..f48fccccae4 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27824.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27824.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27824", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T15:13:05.807", - "lastModified": "2024-06-11T08:15:49.830", + "lastModified": "2024-08-01T13:48:49.263", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Este problema se solucion\u00f3 eliminando el c\u00f3digo vulnerable. Este problema se solucion\u00f3 en macOS Sonoma 14.5. Es posible que una aplicaci\u00f3n pueda elevar los privilegios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "http://seclists.org/fulldisclosure/2024/May/12", diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27826.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27826.json index 2be722c68a1..5d5f42b42d6 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27826.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27826.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27826", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:10.240", - "lastModified": "2024-07-30T13:32:45.943", + "lastModified": "2024-08-01T13:48:49.460", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " El problema se solucion\u00f3 mejorando el manejo de la memoria. Este problema se solucion\u00f3 en macOS Ventura 13.6.8, macOS Sonoma 14.5, macOS Monterey 12.7.6, watchOS 10.5, visionOS 1.3, tvOS 17.5, iOS 17.5 y iPadOS 17.5. Una aplicaci\u00f3n puede ejecutar c\u00f3digo arbitrario con privilegios del kernel." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/19", diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27842.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27842.json index 723652e2d5f..37d2e2fd829 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27842.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27842.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27842", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T15:13:08.183", - "lastModified": "2024-06-10T18:15:29.733", + "lastModified": "2024-08-01T13:48:50.723", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en macOS Sonoma 14.5. Una aplicaci\u00f3n puede ejecutar c\u00f3digo arbitrario con privilegios del kernel." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-358" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/May/12", diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27843.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27843.json index a06dd2ae75a..3bcfa7000e8 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27843.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27843.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27843", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T15:13:08.437", - "lastModified": "2024-06-11T08:15:50.327", + "lastModified": "2024-08-01T13:48:51.490", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Se solucion\u00f3 un problema de l\u00f3gica con controles mejorados. Este problema se solucion\u00f3 en macOS Sonoma 14.5. Es posible que una aplicaci\u00f3n pueda elevar los privilegios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "http://seclists.org/fulldisclosure/2024/May/12", diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27844.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27844.json index a3584507a18..7e1a915b346 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27844.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27844.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27844", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:51.390", - "lastModified": "2024-07-03T16:25:29.453", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:48:51.670", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27855.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27855.json index c0a6a91e659..be64117d02b 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27855.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27855.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27855", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:51.753", - "lastModified": "2024-07-03T16:12:55.173", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:48:51.967", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27878.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27878.json index 173249602b7..80777561b79 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27878.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27878.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27878", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:10.747", - "lastModified": "2024-07-30T13:32:45.943", + "lastModified": "2024-08-01T13:48:52.587", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": " Se solucion\u00f3 un problema de desbordamiento de b\u00fafer mejorando el manejo de la memoria. Este problema se solucion\u00f3 en macOS Sonoma 14.6. Una aplicaci\u00f3n con privilegios de root puede ejecutar c\u00f3digo arbitrario con privilegios de kernel." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/18", diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27886.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27886.json index f533b537d9e..b06c7ba4722 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27886.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27886.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27886", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:11.067", - "lastModified": "2024-07-30T13:32:45.943", + "lastModified": "2024-08-01T13:48:53.140", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Se abord\u00f3 un problema l\u00f3gico con restricciones mejoradas. Este problema se solucion\u00f3 en macOS Sonoma 14.4. Una aplicaci\u00f3n sin privilegios puede registrar pulsaciones de teclas en otras aplicaciones, incluidas aquellas que utilizan el modo de entrada seguro." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-783" + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/HT214084", diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27888.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27888.json index 0a3a7766631..f365b904656 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27888.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27888.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27888", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:11.183", - "lastModified": "2024-07-30T13:32:45.943", + "lastModified": "2024-08-01T13:48:54.013", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Se solucion\u00f3 un problema de permisos eliminando el c\u00f3digo vulnerable y agregando comprobaciones adicionales. Este problema se solucion\u00f3 en macOS Sonoma 14.4. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del sistema de archivos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-281" + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/HT214084", diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27905.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27905.json index 13e92a08340..62cdc57c37c 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27905.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27905.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27905", "sourceIdentifier": "security@apache.org", "published": "2024-02-27T15:15:07.930", - "lastModified": "2024-07-25T16:15:04.310", + "lastModified": "2024-08-01T13:48:54.847", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -22,7 +22,30 @@ "value": "** NO SOPORTADO CUANDO EST\u00c1 ASIGNADO ** Exposici\u00f3n de informaci\u00f3n confidencial a una vulnerabilidad de actor no autorizado en Apache Aurora. Un endpoint que expone elementos internos a usuarios no autenticados se puede utilizar como un \"or\u00e1culo de relleno\" que permite a un atacante an\u00f3nimo construir una cookie de autenticaci\u00f3n v\u00e1lida. Potencialmente, esto podr\u00eda combinarse con vulnerabilidades en otros componentes para lograr la ejecuci\u00f3n remota de c\u00f3digo. Como este proyecto est\u00e1 retirado, no planeamos lanzar una versi\u00f3n que solucione este problema. Se recomienda a los usuarios que busquen una alternativa o restrinjan el acceso a la instancia a usuarios confiables. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante. " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28007.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28007.json index 80a9daffba0..7780dcba302 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28007.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28007.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28007", "sourceIdentifier": "psirt-info@cyber.jp.nec.com", "published": "2024-03-28T01:15:47.250", - "lastModified": "2024-04-02T06:15:14.830", + "lastModified": "2024-08-01T13:48:55.777", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Vulnerabilidad de autenticaci\u00f3n incorrecta en NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF8 00HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP , WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N, WR8150N, WR41 00N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S , WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN y MR02LN, todas las versiones permiten a un atacante ejecutar un comando arbitrario con privilegios de root a trav\u00e9s de Internet." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt-info@cyber.jp.nec.com", diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28008.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28008.json index 026f6e1c04a..e274da8ce8c 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28008.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28008.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28008", "sourceIdentifier": "psirt-info@cyber.jp.nec.com", "published": "2024-03-28T01:15:47.327", - "lastModified": "2024-04-02T06:15:14.930", + "lastModified": "2024-08-01T13:48:56.020", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "C\u00f3digo de depuraci\u00f3n activo en NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF80 0HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP , WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N, WR8150N, WR41 00N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S , WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN y MR02LN, todas las versiones, permiten a un atacante ejecutar un comando arbitrario del sistema operativo a trav\u00e9s de Internet." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt-info@cyber.jp.nec.com", diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28015.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28015.json index 8d7fedb5df9..fdfcc19b3e3 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28015.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28015.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28015", "sourceIdentifier": "psirt-info@cyber.jp.nec.com", "published": "2024-03-28T01:15:47.843", - "lastModified": "2024-04-02T06:15:15.527", + "lastModified": "2024-08-01T13:48:56.427", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Neutralizaci\u00f3n inadecuada de elementos especiales utilizados en una vulnerabilidad de comando del sistema operativo en NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2 , W300P, WF800HP, WR8165N, WG2200HP , WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8 170N, WR8700N, WR8300N, WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N , WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN y MR02 Todas las versiones de LN permiten a un atacante ejecutar un comando arbitrario del sistema operativo con privilegios de root a trav\u00e9s de Internet." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt-info@cyber.jp.nec.com", diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28039.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28039.json index b53184bd3c8..f20e7338a5f 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28039.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28039.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28039", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-03-18T09:15:06.483", - "lastModified": "2024-03-18T12:38:25.490", + "lastModified": "2024-08-01T13:48:56.840", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Existe una vulnerabilidad de restricci\u00f3n inadecuada de referencias de entidades externas XML en todas las versiones de FitNesse, lo que permite a un atacante remoto no autenticado obtener informaci\u00f3n confidencial, alterar datos o provocar una condici\u00f3n de denegaci\u00f3n de servicio (DoS)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], "references": [ { "url": "http://fitnesse.org/FitNesseDownload", diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28041.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28041.json index 1a421958636..a8e71ec6f2d 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28041.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28041.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28041", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-03-25T04:15:08.880", - "lastModified": "2024-03-25T13:47:14.087", + "lastModified": "2024-08-01T13:48:57.640", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "HGW BL1500HM Ver 002.001.013 y anteriores permiten que un atacante no autenticado adyacente a la red ejecute un comando arbitrario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/vu/JVNVU93546510/", diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28064.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28064.json index 5b3b044dc6a..1e0155a2886 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28064.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28064.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28064", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-18T22:15:07.343", - "lastModified": "2024-05-20T13:00:04.957", + "lastModified": "2024-08-01T13:48:58.547", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Kiteworks Totemomail 7.x y 8.x anteriores a 8.3.0 permiten directory traversal en /responsiveUI/EnvelopeOpenServlet messageId para operaciones de lectura y eliminaci\u00f3n de archivos no autenticados (con displayLoginChunkedImages) y operaciones de escritura (con storeLoginChunkedImages)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-26" + } + ] + } + ], "references": [ { "url": "https://www.objectif-securite.ch/advisories/totemomail-path-traversal.txt", diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28147.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28147.json index 00d482e9bbe..800aa2039f7 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28147.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28147.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28147", "sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf", "published": "2024-06-20T11:15:55.913", - "lastModified": "2024-06-24T05:15:09.493", + "lastModified": "2024-08-01T13:49:00.167", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Un usuario autenticado puede cargar archivos arbitrarios en la funci\u00f3n de carga para im\u00e1genes de vista previa de la colecci\u00f3n. Un atacante puede cargar un archivo HTML que incluya c\u00f3digo JavaScript malicioso que se ejecutar\u00e1 si un usuario visita la URL directa de la imagen de vista previa de la colecci\u00f3n (Stored Cross Site Scripting). Tambi\u00e9n es posible cargar archivos SVG que incluyan entidades XML anidadas. Estos se analizan cuando un usuario visita la URL directa de la imagen de vista previa de la colecci\u00f3n, que puede utilizarse para un ataque de denegaci\u00f3n de servicio. Este problema afecta a edu-sharing: <8.0.8-RC2, <8.1.4-RC0, <9.0.0-RC19." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.0 + } + ] + }, "weaknesses": [ { "source": "551230f0-3615-47bd-b7cc-93e92e730bbf", diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28157.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28157.json index c1978fa415b..829fe43d779 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28157.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28157.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28157", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-03-06T17:15:10.890", - "lastModified": "2024-05-01T18:15:17.027", + "lastModified": "2024-08-01T13:49:00.507", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Jenkins GitBucket Plugin 0.8 y versiones anteriores no desinfectan las URL de Gitbucket en las vistas de compilaci\u00f3n, lo que genera una vulnerabilidad de Cross-Site Scripting (XSS) almacenadas que pueden explotar los atacantes capaces de configurar trabajos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/03/06/3", diff --git a/CVE-2024/CVE-2024-282xx/CVE-2024-28275.json b/CVE-2024/CVE-2024-282xx/CVE-2024-28275.json index 85cf6e5cb7d..48308197bbd 100644 --- a/CVE-2024/CVE-2024-282xx/CVE-2024-28275.json +++ b/CVE-2024/CVE-2024-282xx/CVE-2024-28275.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28275", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-03T15:15:54.490", - "lastModified": "2024-04-03T17:24:18.150", + "lastModified": "2024-08-01T13:49:02.517", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que Puwell Cloud Tech Co, Ltd 360Eyes Pro v3.9.5.16(3090516) transmite informaci\u00f3n confidencial en texto sin cifrar. Esta vulnerabilidad permite a los atacantes interceptar y acceder a informaci\u00f3n confidencial, incluidas las credenciales de los usuarios y las solicitudes de cambio de contrase\u00f1a." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + } + ], "references": [ { "url": "https://paste.sr.ht/~edaigle/0b4a037fbd3166c8c72fee18efaa7decaf75b0ab", diff --git a/CVE-2024/CVE-2024-283xx/CVE-2024-28386.json b/CVE-2024/CVE-2024-283xx/CVE-2024-28386.json index de998e109d7..36639a38fcf 100644 --- a/CVE-2024/CVE-2024-283xx/CVE-2024-28386.json +++ b/CVE-2024/CVE-2024-283xx/CVE-2024-28386.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28386", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-25T14:15:09.553", - "lastModified": "2024-03-25T16:43:06.137", + "lastModified": "2024-08-01T13:49:03.327", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en Home-Made.io fastmagsync v.1.7.51 y anteriores permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente getPhpBin()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "http://fastmagsync.com", diff --git a/CVE-2024/CVE-2024-283xx/CVE-2024-28391.json b/CVE-2024/CVE-2024-283xx/CVE-2024-28391.json index dc35c468e7e..a4927e68a6a 100644 --- a/CVE-2024/CVE-2024-283xx/CVE-2024-28391.json +++ b/CVE-2024/CVE-2024-283xx/CVE-2024-28391.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28391", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-14T04:15:09.697", - "lastModified": "2024-03-14T12:52:09.877", + "lastModified": "2024-08-01T13:49:04.167", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en el m\u00f3dulo Quickproducttable de los m\u00f3dulos FME para PrestaShop v.1.2.1 y anteriores, permite a un atacante remoto escalar privilegios y obtener informaci\u00f3n a trav\u00e9s de los m\u00e9todos readCsv(), displayAjaxProductChangeAttr, displayAjaxProductAddToCart, getSearchProducts y displayAjaxProductSku." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://security.friendsofpresta.org/modules/2024/03/12/quickproducttable.html", diff --git a/CVE-2024/CVE-2024-283xx/CVE-2024-28395.json b/CVE-2024/CVE-2024-283xx/CVE-2024-28395.json index 035318379ce..41c0d840e1d 100644 --- a/CVE-2024/CVE-2024-283xx/CVE-2024-28395.json +++ b/CVE-2024/CVE-2024-283xx/CVE-2024-28395.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28395", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T14:15:08.590", - "lastModified": "2024-03-20T17:18:26.603", + "lastModified": "2024-08-01T13:49:05.027", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "SQL injection vulnerability in Best-Kit bestkit_popup v.1.7.2 and before allows a remote attacker to escalate privileges via the bestkit_popup.php component." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://addons.prestashop.com/en/pop-up/20208-pop-up-schedule-popup-splash-window.html", diff --git a/CVE-2024/CVE-2024-284xx/CVE-2024-28402.json b/CVE-2024/CVE-2024-284xx/CVE-2024-28402.json index 6d19deb3381..4a74f6158b4 100644 --- a/CVE-2024/CVE-2024-284xx/CVE-2024-28402.json +++ b/CVE-2024/CVE-2024-284xx/CVE-2024-28402.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28402", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-11T01:25:09.977", - "lastModified": "2024-04-11T12:47:44.137", + "lastModified": "2024-08-01T13:49:05.850", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "TOTOLINK X2000R anterior a V1.0.0-B20231213.1013 contiene una vulnerabilidad de cross-site scripting almacenados (XSS) en el filtrado de IP/puerto en la p\u00e1gina de firewall." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/X2000R/XSS_4_IP_Port_Filtering/XSS.md", diff --git a/CVE-2024/CVE-2024-284xx/CVE-2024-28424.json b/CVE-2024/CVE-2024-284xx/CVE-2024-28424.json index be3e4fe8c8c..3f550217e46 100644 --- a/CVE-2024/CVE-2024-284xx/CVE-2024-28424.json +++ b/CVE-2024/CVE-2024-284xx/CVE-2024-28424.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28424", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-14T19:15:50.930", - "lastModified": "2024-03-14T20:11:36.180", + "lastModified": "2024-08-01T13:49:06.680", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que zenml v0.55.4 conten\u00eda una vulnerabilidad de carga de archivos arbitraria en la funci\u00f3n de carga en /materializers/cloudpickle_materializer.py. Esta vulnerabilidad permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/bayuncao/vul-cve-18", diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28535.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28535.json index d527bc521b5..7802e70358c 100644 --- a/CVE-2024/CVE-2024-285xx/CVE-2024-28535.json +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28535.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28535", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-12T13:15:49.690", - "lastModified": "2024-03-21T20:58:46.217", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:49:07.553", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28558.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28558.json index c456cddc9fd..1051a1df406 100644 --- a/CVE-2024/CVE-2024-285xx/CVE-2024-28558.json +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28558.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28558", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-15T19:15:09.957", - "lastModified": "2024-04-16T13:24:07.103", + "lastModified": "2024-08-01T13:49:08.363", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en sourcecodester Petrol pump management software v1.0, permite a atacantes remotos ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s de un payload manipulado en admin/app/web_crud.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/xuanluansec/vul/blob/main/vul/sql/sql-3.md", diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28559.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28559.json index 450cc76bb47..415154ec9a5 100644 --- a/CVE-2024/CVE-2024-285xx/CVE-2024-28559.json +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28559.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28559", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-22T12:15:07.790", - "lastModified": "2024-03-22T12:45:36.130", + "lastModified": "2024-08-01T13:49:09.173", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en Niushop B2B2C v.5.3.3 y anteriores permite a un atacante escalar privilegios a trav\u00e9s de la funci\u00f3n setPrice() del componente Goodsbatchset.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://chiggerlor.substack.com/p/cve-2024-28560-cve-2024-28559", diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28589.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28589.json index 2680caa9c6a..9f6f61ceb1e 100644 --- a/CVE-2024/CVE-2024-285xx/CVE-2024-28589.json +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28589.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28589", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-03T08:15:49.117", - "lastModified": "2024-04-03T12:38:04.840", + "lastModified": "2024-08-01T13:49:10.093", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en Axigen Mail Server para Windows versiones 10.5.18 y anteriores, que permite a atacantes locales con pocos privilegios ejecutar c\u00f3digo arbitrario y escalar privilegios mediante la carga insegura de DLL desde un directorio de escritura mundial durante la inicializaci\u00f3n del servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + } + ], "references": [ { "url": "https://www.axigen.com/knowledgebase/Local-Privilege-Escalation-Vulnerability-on-Axigen-for-Windows-CVE-2024-28589-_402.html", diff --git a/CVE-2024/CVE-2024-286xx/CVE-2024-28671.json b/CVE-2024/CVE-2024-286xx/CVE-2024-28671.json index cd9b66883b1..db9c9e01c57 100644 --- a/CVE-2024/CVE-2024-286xx/CVE-2024-28671.json +++ b/CVE-2024/CVE-2024-286xx/CVE-2024-28671.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28671", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T16:15:30.197", - "lastModified": "2024-03-13T18:15:58.530", + "lastModified": "2024-08-01T13:49:10.897", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que DedeCMS v5.7 contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) a trav\u00e9s de /dede/stepselect_main.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/777erp/cms/blob/main/7.md", diff --git a/CVE-2024/CVE-2024-286xx/CVE-2024-28676.json b/CVE-2024/CVE-2024-286xx/CVE-2024-28676.json index f6a9d24ac2f..90b5947e981 100644 --- a/CVE-2024/CVE-2024-286xx/CVE-2024-28676.json +++ b/CVE-2024/CVE-2024-286xx/CVE-2024-28676.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28676", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T16:15:30.347", - "lastModified": "2024-03-13T18:15:58.530", + "lastModified": "2024-08-01T13:49:11.717", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que DedeCMS v5.7 contiene una vulnerabilidad de Cross Site Scripting (XSS) a trav\u00e9s de /dede/article_edit.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/777erp/cms/blob/main/18.md", diff --git a/CVE-2024/CVE-2024-286xx/CVE-2024-28698.json b/CVE-2024/CVE-2024-286xx/CVE-2024-28698.json index e3e4e2b4585..7930c04ad98 100644 --- a/CVE-2024/CVE-2024-286xx/CVE-2024-28698.json +++ b/CVE-2024/CVE-2024-286xx/CVE-2024-28698.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28698", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T18:15:03.120", - "lastModified": "2024-07-24T12:55:13.223", + "lastModified": "2024-08-01T13:49:12.527", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de Directory Traversal en Marimer LLC CSLA .Net anterior a 8.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado para el componente MobileFormatter." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://github.com/MarimerLLC/csla/pull/3552", diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28714.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28714.json index 4db2cbd7d0b..adb268a46e2 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28714.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28714.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28714", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T23:15:46.410", - "lastModified": "2024-03-29T12:45:02.937", + "lastModified": "2024-08-01T13:49:13.347", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en el sistema de comercio electr\u00f3nico CRMEB_Java v.1.3.4 permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro groupid." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "http://crmebjava.com", diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28725.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28725.json index fd88f972c96..c9e0c4c7493 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28725.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28725.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28725", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T21:15:48.317", - "lastModified": "2024-05-07T13:39:32.710", + "lastModified": "2024-08-01T13:49:14.173", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La vulnerabilidad de cross site scripting (XSS) en YzmCMS 7.0 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de la administraci\u00f3n de anuncios, la administraci\u00f3n de carrusel y la configuraci\u00f3n del sistema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/asenzhenshuai/DongDong/blob/main/yzmcms-xss.pdf", diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28735.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28735.json index 9540e76da6c..a3deb035dca 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28735.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28735.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28735", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T15:15:07.920", - "lastModified": "2024-04-25T19:15:49.910", + "lastModified": "2024-08-01T13:49:15.007", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Las versiones de Unit4 Financials by Coda anteriores al 2023Q4 sufren una vulnerabilidad de omisi\u00f3n de autorizaci\u00f3n de control de acceso incorrecto que permite a un usuario autenticado modificar la contrase\u00f1a de cualquier usuario de la aplicaci\u00f3n mediante una solicitud manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], "references": [ { "url": "http://financials.com", diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28744.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28744.json index dd5726409b5..3f243f49aaf 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28744.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28744.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28744", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-04-08T01:15:56.660", - "lastModified": "2024-04-08T18:48:40.217", + "lastModified": "2024-08-01T13:49:15.900", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La contrase\u00f1a est\u00e1 vac\u00eda en la configuraci\u00f3n inicial del firmware ACERA 9010-08 v02.04 y anterior, y del firmware ACERA 9010-24 v02.04 y anterior. Un atacante no autenticado puede iniciar sesi\u00f3n en el producto sin contrase\u00f1a y obtener y/o alterar informaci\u00f3n como la configuraci\u00f3n de red y la informaci\u00f3n del usuario. Los productos se ven afectados s\u00f3lo cuando se ejecutan en modo que no sea MS con la configuraci\u00f3n inicial." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-258" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/vu/JVNVU99285099/", diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28752.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28752.json index f19f8858129..0876e56295e 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28752.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28752.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28752", "sourceIdentifier": "security@apache.org", "published": "2024-03-15T11:15:09.220", - "lastModified": "2024-06-10T17:16:24.460", + "lastModified": "2024-08-01T13:49:17.413", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Una vulnerabilidad SSRF que utiliza Aegis DataBinding en versiones de Apache CXF anteriores a 4.0.4, 3.6.3 y 3.5.8 permite a un atacante realizar ataques de estilo SSRF en servicios web que toman al menos un par\u00e1metro de cualquier tipo. Los usuarios de otros enlaces de datos (incluido el enlace de datos predeterminado) no se ven afectados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.3, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.8 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", @@ -26,6 +49,16 @@ "value": "CWE-918" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28804.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28804.json index 0bbb588e9e9..3d7e1cfee06 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28804.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28804.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28804", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-29T19:15:11.917", - "lastModified": "2024-07-30T13:33:30.653", + "lastModified": "2024-08-01T13:49:18.607", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Se descubri\u00f3 un problema en Italtel i-MCS NFV 12.1.0-20211215. El Cross Site Scripting (XSS) almacenado puede realizarse mediante POST." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://www.gruppotim.it/it/footer/red-team.html", diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28805.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28805.json index 6588d1e0d60..e7ef28fa411 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28805.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28805.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28805", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-29T19:15:11.990", - "lastModified": "2024-07-30T13:33:30.653", + "lastModified": "2024-08-01T13:49:19.450", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Se descubri\u00f3 un problema en Italtel i-MCS NFV 12.1.0-20211215. Hay un control de acceso incorrecto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://www.gruppotim.it/it/footer/red-team.html", diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28815.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28815.json index ba0634f7989..c11622a04ac 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28815.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28815.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28815", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-27T07:15:49.493", - "lastModified": "2024-04-30T07:15:48.897", + "lastModified": "2024-08-01T13:49:20.227", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad en el componente BluStar de Mitel InAttend 2.6 SP4 a 2.7 y CMG 8.5 SP4 a 8.6 podr\u00eda permitir el acceso a informaci\u00f3n confidencial, cambios en la configuraci\u00f3n del sistema o la ejecuci\u00f3n de comandos arbitrarios dentro del contexto del sistema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1188" + } + ] + } + ], "references": [ { "url": "https://cwe.mitre.org/data/definitions/1188.html", diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28894.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28894.json index 6898eba9304..42bba132c27 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28894.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28894.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28894", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-04-15T11:15:08.440", - "lastModified": "2024-04-15T13:15:31.997", + "lastModified": "2024-08-01T13:49:21.557", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Existe una vulnerabilidad de lectura fuera de los l\u00edmites causada por una verificaci\u00f3n incorrecta de los valores de longitud de las opciones en los encabezados IPv6 en la serie de redes TCP/IP del middleware Cente, que puede permitir que un atacante no autenticado detenga las operaciones del dispositivo enviando un paquete especialmente manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/vu/JVNVU94016877/", diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28972.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28972.json index a420e1d0f36..d14c251a8d3 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28972.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28972.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28972", "sourceIdentifier": "security_alert@emc.com", "published": "2024-08-01T08:15:02.520", - "lastModified": "2024-08-01T08:15:02.520", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2843.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2843.json index d0a3b35d333..f28c2e9369b 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2843.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2843.json @@ -2,13 +2,17 @@ "id": "CVE-2024-2843", "sourceIdentifier": "contact@wpscan.com", "published": "2024-08-01T06:15:02.367", - "lastModified": "2024-08-01T06:15:02.367", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WooCommerce Customers Manager WordPress plugin before 30.1 does not have CSRF checks in some places, which could allow attackers to make logged in admin users delete users via CSRF attacks" + }, + { + "lang": "es", + "value": " El complemento de WordPress WooCommerce Customers Manager anterior a 30.1 no tiene comprobaciones CSRF en algunos lugares, lo que podr\u00eda permitir a los atacantes hacer que los usuarios administradores registrados eliminen usuarios mediante ataques CSRF." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2858.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2858.json index 2f21a5a33f1..8dd72e0f0bd 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2858.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2858.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2858", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-15T05:15:15.350", - "lastModified": "2024-04-15T13:15:31.997", + "lastModified": "2024-08-01T13:49:55.107", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Simple Buttons Creator de WordPress hasta la versi\u00f3n 1.04 no tiene comprobaciones CSRF en algunos lugares, lo que podr\u00eda permitir a los atacantes hacer que los usuarios que han iniciado sesi\u00f3n realicen acciones no deseadas a trav\u00e9s de ataques CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.3, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/43297210-17a6-4b51-b8ca-32ceef9fc09a/", diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2859.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2859.json index 5c74c450538..e6d064799b8 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2859.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2859.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2859", "sourceIdentifier": "sirt@brocade.com", "published": "2024-04-27T00:15:07.010", - "lastModified": "2024-06-28T16:15:04.067", + "lastModified": "2024-08-01T13:49:55.310", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://security.netapp.com/advisory/ntap-20240628-0003/", diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2870.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2870.json index 41ecb7344e4..4b365cf0993 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2870.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2870.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2870", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:02.310", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:49:56.253", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento socialdriver-framework de WordPress anterior al 30.04.2024 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con altos privilegios, como el administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/688522d2-ee28-44f8-828d-352f06e43885/", diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2872.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2872.json index 91a62392fb9..8c0aee121c2 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2872.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2872.json @@ -2,13 +2,17 @@ "id": "CVE-2024-2872", "sourceIdentifier": "contact@wpscan.com", "published": "2024-08-01T06:15:02.443", - "lastModified": "2024-08-01T06:15:02.443", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The socialdriver-framework WordPress plugin before 2024.04.30 does not sanitise and escape some of its settings, which could allow high privilege users such as contributor to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" + }, + { + "lang": "es", + "value": "El complemento de WordPress socialdriver-framework anterior al 30/04/2024 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con altos privilegios, como el colaborador, realizar ataques de Cross Site Scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en la configuraci\u00f3n de m\u00faltiples sitios)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29014.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29014.json index 1972e04d78e..df1fca76980 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29014.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29014.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29014", "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2024-07-18T08:15:02.173", - "lastModified": "2024-07-18T17:15:04.240", + "lastModified": "2024-08-01T13:49:23.520", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Una vulnerabilidad en el cliente SonicWall SMA100 NetExtender Windows (32 y 64 bits) 10.2.339 y versiones anteriores permite a un atacante ejecutar c\u00f3digo arbitrario al procesar una actualizaci\u00f3n del cliente EPC." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "PSIRT@sonicwall.com", diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29070.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29070.json index 2280e1e79f0..895ea6a75ce 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29070.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29070.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29070", "sourceIdentifier": "security@apache.org", "published": "2024-07-23T09:15:02.503", - "lastModified": "2024-07-24T12:55:13.223", + "lastModified": "2024-08-01T13:49:24.570", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En versiones anteriores a la 2.1.4, la sesi\u00f3n no se invalida despu\u00e9s de cerrar sesi\u00f3n. Cuando el usuario inicia sesi\u00f3n correctamente, el servicio Backend devuelve \"Authorization\" como credencial de autenticaci\u00f3n de front-end. La \"Authorization\" a\u00fan puede iniciar solicitudes y acceder a datos incluso despu\u00e9s de cerrar sesi\u00f3n. Mitigaci\u00f3n: todos los usuarios deben actualizar a 2.1.4" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29178.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29178.json index ebcc2d06107..59886a9b400 100644 --- a/CVE-2024/CVE-2024-291xx/CVE-2024-29178.json +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29178.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29178", "sourceIdentifier": "security@apache.org", "published": "2024-07-18T12:15:02.960", - "lastModified": "2024-07-18T14:15:04.453", + "lastModified": "2024-08-01T13:49:25.303", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En versiones anteriores a la 2.1.4, un usuario pod\u00eda iniciar sesi\u00f3n y realizar un ataque de inyecci\u00f3n de plantilla que generaba una ejecuci\u00f3n remota de c\u00f3digo en el servidor. El atacante deb\u00eda iniciar sesi\u00f3n correctamente en el sistema para lanzar un ataque, por lo que se trata de una vulnerabilidad de impacto moderado. Mitigaci\u00f3n: todos los usuarios deben actualizar a 2.1.4" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29219.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29219.json index fabea0100c9..3c6d780f452 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29219.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29219.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29219", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-04-15T11:15:08.593", - "lastModified": "2024-04-15T13:15:31.997", + "lastModified": "2024-08-01T13:49:26.097", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Existe una vulnerabilidad de lectura fuera de los l\u00edmites en KV STUDIO Ver.11.64 y anteriores y en KV REPLAY VIEWER Ver.2.64 y anteriores, lo que puede provocar la divulgaci\u00f3n de informaci\u00f3n o la ejecuci\u00f3n de c\u00f3digo arbitrario al hacer que un usuario del producto afectado abra un archivo especialmente manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/vu/JVNVU95439120/", diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29275.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29275.json index 2a81a8d640b..01d80ef9829 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29275.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29275.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29275", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-22T05:15:47.583", - "lastModified": "2024-03-22T12:45:36.130", + "lastModified": "2024-08-01T13:49:27.553", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en SeaCMS versi\u00f3n 12.9, permite a atacantes remotos no autenticados ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro id en class.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/seacms-net/CMS/issues/15", diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29278.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29278.json index ffea61e5272..94a973b29cf 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29278.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29278.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29278", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-30T01:15:47.063", - "lastModified": "2024-04-01T01:12:59.077", + "lastModified": "2024-08-01T13:49:28.357", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "funboot v1.1 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s del campo de t\u00edtulo en \"crear un mensaje\"." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/QDming/cve/blob/main/cve", diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29296.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29296.json index 9b0f0310700..7a70d2ad3a3 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29296.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29296.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29296", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-10T15:16:05.033", - "lastModified": "2024-04-10T19:49:51.183", + "lastModified": "2024-08-01T13:49:29.143", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se encontr\u00f3 una vulnerabilidad de enumeraci\u00f3n de usuarios en Portainer CE 2.19.4. Este problema ocurre durante el proceso de autenticaci\u00f3n del usuario, donde una diferencia en el tiempo de respuesta podr\u00eda permitir que un usuario remoto no autenticado determine si un nombre de usuario es v\u00e1lido o no." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-286" + } + ] + } + ], "references": [ { "url": "http://portainer.com", diff --git a/CVE-2024/CVE-2024-293xx/CVE-2024-29366.json b/CVE-2024/CVE-2024-293xx/CVE-2024-29366.json index 9bebb38b078..495bd2f409a 100644 --- a/CVE-2024/CVE-2024-293xx/CVE-2024-29366.json +++ b/CVE-2024/CVE-2024-293xx/CVE-2024-29366.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29366", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-22T17:15:08.887", - "lastModified": "2024-03-22T19:02:10.300", + "lastModified": "2024-08-01T13:49:29.947", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos en el binario cgibin en el firmware del router DIR-845L <= v1.01KRb03." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/20Yiju/DLink/blob/master/DIR-845L/CI.md", diff --git a/CVE-2024/CVE-2024-294xx/CVE-2024-29460.json b/CVE-2024/CVE-2024-294xx/CVE-2024-29460.json index e014806c3b7..4fcdc764fb6 100644 --- a/CVE-2024/CVE-2024-294xx/CVE-2024-29460.json +++ b/CVE-2024/CVE-2024-294xx/CVE-2024-29460.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29460", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-10T21:15:06.583", - "lastModified": "2024-04-11T12:47:44.137", + "lastModified": "2024-08-01T13:49:30.940", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en PX4 Autopilot v.1.14.0 permite a un atacante manipular la ruta de vuelo, lo que permite que el dron se estrelle a trav\u00e9s de la ubicaci\u00f3n del punto de inicio del componente Mission_block.cpp." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-229" + } + ] + } + ], "references": [ { "url": "https://github.com/Drone-Lab/PX4-Autopilot/blob/report-can%27t-finish-mission/report-can%27t-finish-mission.md", diff --git a/CVE-2024/CVE-2024-295xx/CVE-2024-29513.json b/CVE-2024/CVE-2024-295xx/CVE-2024-29513.json index 25108aaf61e..dd49c3c2c33 100644 --- a/CVE-2024/CVE-2024-295xx/CVE-2024-29513.json +++ b/CVE-2024/CVE-2024-295xx/CVE-2024-29513.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29513", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:16:16.670", - "lastModified": "2024-05-14T16:13:02.773", + "lastModified": "2024-08-01T13:49:32.137", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en briscKernelDriver.sys en BlueRiSC WindowsSCOPE Cyber Forensics anterior a 3.3 permite a un atacante local ejecutar c\u00f3digo arbitrario dentro del controlador y crear una condici\u00f3n de denegaci\u00f3n de servicio local debido a que se aplica una DACL inadecuada al dispositivo que crea el controlador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/dru1d-foofus/briscKernelDriver", diff --git a/CVE-2024/CVE-2024-296xx/CVE-2024-29661.json b/CVE-2024/CVE-2024-296xx/CVE-2024-29661.json index ff35fd86c70..4faead13f06 100644 --- a/CVE-2024/CVE-2024-296xx/CVE-2024-29661.json +++ b/CVE-2024/CVE-2024-296xx/CVE-2024-29661.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29661", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T12:15:07.720", - "lastModified": "2024-04-22T13:28:34.007", + "lastModified": "2024-08-01T13:49:32.940", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de carga de archivos en DedeCMS v5.7 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://github.com/ysl1415926/cve/blob/main/DedeCMSv5.7_getshell.md", diff --git a/CVE-2024/CVE-2024-296xx/CVE-2024-29667.json b/CVE-2024/CVE-2024-296xx/CVE-2024-29667.json index 44e0394ccb7..c44750be6a5 100644 --- a/CVE-2024/CVE-2024-296xx/CVE-2024-29667.json +++ b/CVE-2024/CVE-2024-296xx/CVE-2024-29667.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29667", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-29T18:15:08.057", - "lastModified": "2024-04-01T01:12:59.077", + "lastModified": "2024-08-01T13:49:33.747", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en Tongtianxing Technology Co., Ltd CMSV6 v.7.31.0.2 a v.7.31.0.3 permite a un atacante remoto escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro ids." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://github.com/whgojp/cve-reports/wiki/CMSV6-vehicle-monitoring-platform-system-SQL-injection", diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29736.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29736.json index ea3f7d4c8d7..f127fc8dddb 100644 --- a/CVE-2024/CVE-2024-297xx/CVE-2024-29736.json +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29736.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29736", "sourceIdentifier": "security@apache.org", "published": "2024-07-19T09:15:04.003", - "lastModified": "2024-07-19T13:01:44.567", + "lastModified": "2024-08-01T13:49:34.540", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Una vulnerabilidad SSRF en la descripci\u00f3n del servicio WADL en versiones de Apache CXF anteriores a 4.0.5, 3.6.4 y 3.5.9 permite a un atacante realizar ataques de estilo SSRF en servicios web REST. El ataque s\u00f3lo se aplica si se configura un par\u00e1metro de hoja de estilo personalizado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29737.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29737.json index b0ba1401c1f..07ab6798cc1 100644 --- a/CVE-2024/CVE-2024-297xx/CVE-2024-29737.json +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29737.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29737", "sourceIdentifier": "security@apache.org", "published": "2024-07-17T09:15:02.527", - "lastModified": "2024-07-19T16:11:25.013", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:49:34.853", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29748.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29748.json index 6b5d0c181cb..7526d4cd9af 100644 --- a/CVE-2024/CVE-2024-297xx/CVE-2024-29748.json +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29748.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29748", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-04-05T20:15:08.407", - "lastModified": "2024-04-08T22:52:33.780", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:49:35.273", + "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2024-04-04", "cisaActionDue": "2024-04-25", @@ -40,6 +40,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -53,6 +73,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-280" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29828.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29828.json index 74ff9467183..9586c560afe 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29828.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29828.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29828", "sourceIdentifier": "support@hackerone.com", "published": "2024-05-31T18:15:11.947", - "lastModified": "2024-05-31T19:14:47.793", + "lastModified": "2024-08-01T13:49:36.537", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29941.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29941.json index c28edfcb469..9dff5ec8335 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29941.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29941.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29941", "sourceIdentifier": "56c94bcb-ac34-4d7f-b660-d297a6b7ff82", "published": "2024-05-06T23:15:06.527", - "lastModified": "2024-05-07T13:39:32.710", + "lastModified": "2024-08-01T13:49:37.723", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El almacenamiento inseguro de las claves de cifrado ICT MIFARE y DESFire en el binario del firmware permite a actores malintencionados crear credenciales para cualquier c\u00f3digo de sitio y n\u00famero de tarjeta que utilice el cifrado ICT predeterminado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + } + ], "references": [ { "url": "https://ict.co/media/1xdhaugi/credential-cloning.pdf", diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2907.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2907.json index 4a337a3d94b..7119bb46b58 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2907.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2907.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2907", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-25T06:15:58.887", - "lastModified": "2024-04-25T13:18:13.537", + "lastModified": "2024-08-01T13:49:56.797", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El complemento AGCA WordPress anterior a 7.2.2 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/d2588b47-a518-4cb2-a557-2c7eaffa17e4/", diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30213.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30213.json index 7c7af2cbb6a..883edb1f24b 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30213.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30213.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30213", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-12T23:15:09.927", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:50:04.330", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "StoneFly Storage Concentrator (SC y SCVM) anterior a 8.0.4.26 permite a los usuarios autenticados remotamente lograr la inyecci\u00f3n de comandos a trav\u00e9s de una URL de ping, lo que lleva a la ejecuci\u00f3n remota de c\u00f3digo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://stonefly.com/security-advisories/cve-2024-30213/", diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30220.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30220.json index 0f6ef1a05cc..b10d76ca7bb 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30220.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30220.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30220", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-04-15T11:15:08.697", - "lastModified": "2024-07-16T16:15:04.620", + "lastModified": "2024-08-01T13:50:05.380", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -22,7 +22,42 @@ "value": "La vulnerabilidad de inyecci\u00f3n de comandos en MZK-MF300N en todas las versiones de firmware permite que un atacante no autenticado adyacente a la red ejecute un comando arbitrario enviando una solicitud especialmente manipulada a un puerto determinado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/vu/JVNVU91975826/", diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30416.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30416.json index 30c12fac1fe..ec4014a059a 100644 --- a/CVE-2024/CVE-2024-304xx/CVE-2024-30416.json +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30416.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30416", "sourceIdentifier": "psirt@huawei.com", "published": "2024-04-07T09:15:08.650", - "lastModified": "2024-04-08T18:48:40.217", + "lastModified": "2024-08-01T13:50:07.780", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Vulnerabilidad de Use-After-Free (UAF) en el m\u00f3dulo del controlador subyacente. Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad afectar\u00e1 la disponibilidad." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "psirt@huawei.com", diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30471.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30471.json index c3f771e34eb..1c99488b386 100644 --- a/CVE-2024/CVE-2024-304xx/CVE-2024-30471.json +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30471.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30471", "sourceIdentifier": "security@apache.org", "published": "2024-07-17T09:15:02.640", - "lastModified": "2024-07-25T13:39:17.913", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:50:08.403", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-367" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30567.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30567.json index 9f5806798bb..e3e26437c49 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30567.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30567.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30567", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-16T00:15:11.620", - "lastModified": "2024-04-16T13:24:07.103", + "lastModified": "2024-08-01T13:50:09.870", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en JNT Telecom JNT Liftcom UMS V1.J Core Version JM-V15 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funcionalidad de soluci\u00f3n de problemas de red." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/s4fv4n/f0e8eccd0ce4bd1ac109fa2481c90ee6", diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30570.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30570.json index 543f1a3414a..c1d89258766 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30570.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30570.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30570", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-03T13:16:02.563", - "lastModified": "2024-04-03T17:24:18.150", + "lastModified": "2024-08-01T13:50:10.667", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -16,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://github.com/funny-mud-peee/IoT-vuls/blob/main/netgear%20R6850/Info%20Leak%20in%20Netgear-R6850%EF%BC%88debuginfo.htm%EF%BC%89.md", diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30583.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30583.json index f78edca390d..e415575d5d1 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30583.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30583.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30583", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T14:15:14.997", - "lastModified": "2024-03-28T16:07:30.893", + "lastModified": "2024-08-01T13:50:11.490", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Tenda FH1202 v1.2.0.14(408) tiene una vulnerabilidad de desbordamiento de la regi\u00f3n stack de la memoria en el par\u00e1metro mitInterface de la funci\u00f3n fromAddressNat." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/fromAddressNat_mitInterface.md", diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30584.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30584.json index 0235eca878a..8d635bb0b0a 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30584.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30584.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30584", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T14:15:15.047", - "lastModified": "2024-03-28T16:07:30.893", + "lastModified": "2024-08-01T13:50:12.260", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Tenda FH1202 v1.2.0.14(408) tiene una vulnerabilidad de desbordamiento de la regi\u00f3n stack de la memoria en el par\u00e1metro de seguridad de la funci\u00f3n formWifiBasicSet." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formWifiBasicSet_security.md", diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30585.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30585.json index 39c42a5419f..3262b9b535d 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30585.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30585.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30585", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T14:15:15.090", - "lastModified": "2024-03-28T16:07:30.893", + "lastModified": "2024-08-01T13:50:13.033", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Tenda FH1202 v1.2.0.14(408) tiene una vulnerabilidad de desbordamiento de la regi\u00f3n stack de la memoria en el par\u00e1metro deviceId de la funci\u00f3n saveParentControlInfo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/saveParentControlInfo_deviceId.md", diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30590.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30590.json index 33fc7ba5a8a..9feaad9f257 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30590.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30590.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30590", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T14:15:15.347", - "lastModified": "2024-03-28T16:07:30.893", + "lastModified": "2024-08-01T13:50:13.810", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Tenda FH1202 v1.2.0.14(408) tiene una vulnerabilidad de desbordamiento de la regi\u00f3n stack de la memoria en el par\u00e1metro schedEndTime de la funci\u00f3n setSchedWifi." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/setSchedWifi_end.md", diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30592.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30592.json index ae254619dfd..de5ee8b8507 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30592.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30592.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30592", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T14:15:15.437", - "lastModified": "2024-03-28T16:07:30.893", + "lastModified": "2024-08-01T13:50:14.590", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Tenda FH1202 v1.2.0.14(408) tiene una vulnerabilidad de desbordamiento de la regi\u00f3n stack de la memoria en el par\u00e1metro de p\u00e1gina de la funci\u00f3n fromAddressNat." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/fromAddressNat_page.md", diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30593.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30593.json index 6bcb0c901b6..6c5ef89954d 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30593.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30593.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30593", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T13:15:47.950", - "lastModified": "2024-03-28T16:07:30.893", + "lastModified": "2024-08-01T13:50:15.377", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Tenda FH1202 v1.2.0.14(408) tiene una vulnerabilidad de desbordamiento de la regi\u00f3n stack de la memoria ubicada en el par\u00e1metro deviceName de la funci\u00f3n formSetDeviceName." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formSetDeviceName_devName.md", diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30597.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30597.json index f3295222af1..a2ac948142a 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30597.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30597.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30597", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T15:15:46.407", - "lastModified": "2024-03-28T16:07:30.893", + "lastModified": "2024-08-01T13:50:16.157", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El firmware Tenda FH1203 v2.0.1.6 tiene una vulnerabilidad de desbordamiento de la regi\u00f3n stack de la memoria en el par\u00e1metro de seguridad de la funci\u00f3n formWifiBasicSet." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/formWifiBasicSet_security.md", diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30599.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30599.json index 54c221822b5..189eb7e5c73 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30599.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30599.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30599", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T15:15:46.527", - "lastModified": "2024-03-28T16:07:30.893", + "lastModified": "2024-08-01T13:50:16.990", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Tenda FH1203 v2.0.1.6 tiene una vulnerabilidad de desbordamiento de la regi\u00f3n stack de la memoria en el par\u00e1metro deviceMac de la funci\u00f3n addWifiMacFilter." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/addWifiMacFilter_deviceMac.md", diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30601.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30601.json index 83e2b54727c..cef0c2adfc2 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30601.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30601.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30601", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T15:15:46.660", - "lastModified": "2024-03-28T16:07:30.893", + "lastModified": "2024-08-01T13:50:17.780", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Tenda FH1203 v2.0.1.6 tiene una vulnerabilidad de desbordamiento de la regi\u00f3n stack de la memoria en el par\u00e1metro de tiempo de la funci\u00f3n saveParentControlInfo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/saveParentControlInfo_time.md", diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30602.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30602.json index 3f684cc4a31..66a806226ea 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30602.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30602.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30602", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T15:15:46.723", - "lastModified": "2024-03-28T16:07:30.893", + "lastModified": "2024-08-01T13:50:18.560", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Tenda FH1203 v2.0.1.6 tiene una vulnerabilidad de desbordamiento de la regi\u00f3n stack de la memoria en el par\u00e1metro schedStartTime de la funci\u00f3n setSchedWifi." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/setSchedWifi_start.md", diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30607.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30607.json index 4757dd223a6..96b14279cee 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30607.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30607.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30607", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T14:15:15.530", - "lastModified": "2024-03-28T16:07:30.893", + "lastModified": "2024-08-01T13:50:19.340", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Tenda FH1203 v2.0.1.6 tiene una vulnerabilidad de desbordamiento de la regi\u00f3n stack de la memoria en el par\u00e1metro deviceId de la funci\u00f3n saveParentControlInfo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/saveParentControlInfo_deviceId.md", diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30620.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30620.json index a2b9c0075de..d1236433e89 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30620.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30620.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30620", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-02T14:15:08.150", - "lastModified": "2024-04-08T22:48:50.340", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:50:20.133", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30625.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30625.json index a5213c5b7d1..035a846e6b5 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30625.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30625.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30625", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-29T13:15:16.033", - "lastModified": "2024-03-29T13:28:22.880", + "lastModified": "2024-08-01T13:50:20.930", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Tenda FH1205 v2.0.0.7(775) tiene una vulnerabilidad de desbordamiento de la regi\u00f3n stack de la memoria en el par\u00e1metro de entradas de la funci\u00f3n fromAddressNat." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/fromAddressNat_entrys.md", diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30627.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30627.json index 781f8292695..6141f1d7693 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30627.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30627.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30627", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-29T13:15:16.133", - "lastModified": "2024-03-29T13:28:22.880", + "lastModified": "2024-08-01T13:50:21.693", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Tenda FH1205 v2.0.0.7(775) tiene una vulnerabilidad de desbordamiento de la regi\u00f3n stack de la memoria en el par\u00e1metro deviceId de la funci\u00f3n saveParentControlInfo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/saveParentControlInfo_deviceId.md", diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30628.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30628.json index 5a8a1bfc60f..10fac524030 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30628.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30628.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30628", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-29T13:15:16.183", - "lastModified": "2024-03-29T13:28:22.880", + "lastModified": "2024-08-01T13:50:22.470", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -16,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/fromAddressNat_page.md", diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30633.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30633.json index 54a544d64a5..7b61b83e6a2 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30633.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30633.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30633", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-29T13:15:16.410", - "lastModified": "2024-03-29T13:28:22.880", + "lastModified": "2024-08-01T13:50:23.153", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Tenda FH1205 v2.0.0.7(775) tiene una vulnerabilidad de desbordamiento de la regi\u00f3n stack de la memoria en el par\u00e1metro de seguridad de la funci\u00f3n formWifiBasicSet." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/formWifiBasicSet_security.md", diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30634.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30634.json index 5b32d7499c1..93303c7b130 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30634.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30634.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30634", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-29T14:15:14.550", - "lastModified": "2024-04-01T01:12:59.077", + "lastModified": "2024-08-01T13:50:23.927", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Tenda F1202 v1.2.0.20(408) tiene una vulnerabilidad de desbordamiento de la regi\u00f3n stack de la memoria a trav\u00e9s del par\u00e1metro mitInterface en la funci\u00f3n fromAddressNat." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromAddressNat_mitInterface.md", diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30635.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30635.json index f23e7799c0c..7cb1b66b6cd 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30635.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30635.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30635", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-29T14:15:14.607", - "lastModified": "2024-04-01T01:12:59.077", + "lastModified": "2024-08-01T13:50:24.723", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Tenda F1202 v1.2.0.20(408) tiene una vulnerabilidad de desbordamiento de la regi\u00f3n stack de la memoria ubicada en el par\u00e1metro funcpara1 en la funci\u00f3n formSetCfm." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/formSetCfm.md", diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30645.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30645.json index e976b7128c5..c7c160f9fa4 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30645.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30645.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30645", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-29T16:15:11.687", - "lastModified": "2024-04-01T01:12:59.077", + "lastModified": "2024-08-01T13:50:25.530", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Tenda AC15V1.0 V15.03.20_multi tiene una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro nombre del dispositivo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/setUsbUnload.md", diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30800.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30800.json index 0d4d1e0b7cc..5c73a96cc97 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30800.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30800.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30800", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-23T13:15:46.700", - "lastModified": "2024-07-03T01:54:13.930", + "lastModified": "2024-08-01T13:50:26.523", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -22,23 +22,35 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "HIGH", "userInteraction": "REQUIRED", "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", + "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 6.3, + "baseScore": 5.6, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 0.3, - "impactScore": 5.9 + "impactScore": 5.2 } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-229" + } + ] + } + ], "references": [ { "url": "https://github.com/PX4/PX4-Autopilot/issues/22282", diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30809.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30809.json index 141ca524e99..ec701179eb6 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30809.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30809.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30809", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-02T18:15:12.563", - "lastModified": "2024-04-02T20:31:58.463", + "lastModified": "2024-08-01T13:50:27.443", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en Bento4 v1.6.0-641-2-g1529b83. Hay un heap-use-after-free en Ap4Sample.h en AP4_Sample::GetOffset() const, lo que lleva a una denegaci\u00f3n de servicio (DoS), como lo demuestra mp42ts." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://github.com/axiomatic-systems/Bento4/issues/937", diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30848.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30848.json index 967ad05b748..dc20ee69d2f 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30848.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30848.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30848", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-20T21:15:49.717", - "lastModified": "2024-06-21T11:22:01.687", + "lastModified": "2024-08-01T13:50:28.210", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de Cross-site scripting (XSS) en el servicio de correo electr\u00f3nico SilverSky versi\u00f3n 5.0.3126 permite a atacantes remotos inyectar scripts web o HTML arbitrarios a trav\u00e9s del par\u00e1metro de versi\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/Excis3/CVE-Disclosure/blob/main/CVE-2024-30848.md", diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30849.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30849.json index 52d49c996ed..fa1fbf7a608 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30849.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30849.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30849", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-05T08:15:07.733", - "lastModified": "2024-04-05T12:40:52.763", + "lastModified": "2024-08-01T13:50:28.983", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de carga de archivos arbitrarios en Sourcecodester Complete E-Commerce Site v1.0, permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro de nombre de archivo en admin/products_photo.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], "references": [ { "url": "https://github.com/wkeyi0x1/vul-report/issues/3", diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30858.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30858.json index a732d0a815e..a8acf8b333d 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30858.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30858.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30858", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-01T16:15:09.530", - "lastModified": "2024-04-02T12:50:42.233", + "lastModified": "2024-08-01T13:50:29.850", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "netentsec NS-ASG 6.3 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de /admin/edit_fire_wall.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-edit_fire_wall.md", diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30868.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30868.json index d3dede25a43..b6029300612 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30868.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30868.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30868", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-01T13:17:17.327", - "lastModified": "2024-04-01T15:53:18.060", + "lastModified": "2024-08-01T13:50:30.630", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "netentsec NS-ASG 6.3 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de /admin/add_getlogin.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-add_getlogin.md", diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30880.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30880.json index fa7d5776362..ef566a1e527 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30880.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30880.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30880", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-11T05:15:47.603", - "lastModified": "2024-04-11T12:47:44.137", + "lastModified": "2024-08-01T13:50:31.417", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de cross-site scripting (XSS) reflejado en RageFrame2 v2.6.43, permite a atacantes remotos ejecutar scripts web o HTML arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro m\u00faltiple en la funci\u00f3n de recorte de im\u00e1genes." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/jianyan74/rageframe2/issues/114", diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30884.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30884.json index 0af1d628237..80d83fd3a72 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30884.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30884.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30884", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-11T05:15:47.683", - "lastModified": "2024-04-11T12:47:44.137", + "lastModified": "2024-08-01T13:50:32.180", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) reflejado en Discuz! versi\u00f3n X3.4 20220811, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s de un payload manipulado para el par\u00e1metro mainbegin en el componente misc.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/Hebing123/cve/issues/28", diff --git a/CVE-2024/CVE-2024-309xx/CVE-2024-30917.json b/CVE-2024/CVE-2024-309xx/CVE-2024-30917.json index db08a11d06c..55af6eb8b85 100644 --- a/CVE-2024/CVE-2024-309xx/CVE-2024-30917.json +++ b/CVE-2024/CVE-2024-309xx/CVE-2024-30917.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30917", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-11T06:15:07.083", - "lastModified": "2024-04-11T12:47:44.137", + "lastModified": "2024-08-01T13:50:32.947", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,46 @@ "value": "Se descubri\u00f3 un problema en eProsima FastDDS v.2.14.0 y anteriores, que permite a un atacante local provocar una denegaci\u00f3n de servicio (DoS) y obtener informaci\u00f3n confidencial a trav\u00e9s de un par\u00e1metro history_depth manipulado en el componente DurabilityService QoS." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-229" + }, + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], "references": [ { "url": "https://github.com/eProsima/Fast-DDS/issues/4609", diff --git a/CVE-2024/CVE-2024-309xx/CVE-2024-30977.json b/CVE-2024/CVE-2024-309xx/CVE-2024-30977.json index 54d5396d042..a89c9605d4b 100644 --- a/CVE-2024/CVE-2024-309xx/CVE-2024-30977.json +++ b/CVE-2024/CVE-2024-309xx/CVE-2024-30977.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30977", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-05T21:15:09.740", - "lastModified": "2024-04-08T18:49:25.863", + "lastModified": "2024-08-01T13:50:33.723", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en Secnet Security Network Intelligent AC Management System v.1.02.040 permite a un atacante local escalar privilegios a trav\u00e9s del componente de contrase\u00f1a." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "http://www.secnet.cn/newsdetail/388.html", diff --git a/CVE-2024/CVE-2024-309xx/CVE-2024-30979.json b/CVE-2024/CVE-2024-309xx/CVE-2024-30979.json index 19609968917..72c926c91c0 100644 --- a/CVE-2024/CVE-2024-309xx/CVE-2024-30979.json +++ b/CVE-2024/CVE-2024-309xx/CVE-2024-30979.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30979", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T16:15:08.577", - "lastModified": "2024-04-17T16:51:07.347", + "lastModified": "2024-08-01T13:50:34.503", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de cross-site scripting en Cyber Cafe Management System 1.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro compname en edit-computer-details.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://medium.com/%40shanunirwan/cve-2024-30979-stored-cross-site-scripting-xss-in-cyber-cafe-management-system-project-ccms-1-44b10f50817b", diff --git a/CVE-2024/CVE-2024-309xx/CVE-2024-30986.json b/CVE-2024/CVE-2024-309xx/CVE-2024-30986.json index 6bf950b2b98..e111c18a657 100644 --- a/CVE-2024/CVE-2024-309xx/CVE-2024-30986.json +++ b/CVE-2024/CVE-2024-309xx/CVE-2024-30986.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30986", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T18:15:16.157", - "lastModified": "2024-04-17T20:08:21.887", + "lastModified": "2024-08-01T13:50:35.277", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de cross site scripting en /edit-services-details.php of phpgurukul Client Management System using PHP & MySQL 1.1 permite a atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de los par\u00e1metros \"precio\" y \"nombre\"." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://medium.com/%40shanunirwan/cve-2024-30986-multiple-stored-cross-site-scripting-vulnerabilities-in-client-management-system-3fb702d9d510", diff --git a/CVE-2024/CVE-2024-309xx/CVE-2024-30987.json b/CVE-2024/CVE-2024-309xx/CVE-2024-30987.json index 3ee3aaea2ff..e6ac0803c3c 100644 --- a/CVE-2024/CVE-2024-309xx/CVE-2024-30987.json +++ b/CVE-2024/CVE-2024-309xx/CVE-2024-30987.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30987", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T18:15:16.210", - "lastModified": "2024-04-17T20:08:21.887", + "lastModified": "2024-08-01T13:50:36.050", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de cross site scripting en /bwdates-reports-ds.php of phpgurukul Client Management System using PHP & MySQL 1.1 permite a los atacantes ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s de los par\u00e1metros fromdate y todate." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://medium.com/%40shanunirwan/cve-2024-30987-multiple-stored-cross-site-scripting-vulnerabilities-in-client-management-system-b6a7a177d254", diff --git a/CVE-2024/CVE-2024-309xx/CVE-2024-30988.json b/CVE-2024/CVE-2024-309xx/CVE-2024-30988.json index 83c9bb3a7f9..bd3ed2a3110 100644 --- a/CVE-2024/CVE-2024-309xx/CVE-2024-30988.json +++ b/CVE-2024/CVE-2024-309xx/CVE-2024-30988.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30988", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T18:15:16.273", - "lastModified": "2024-04-17T20:08:21.887", + "lastModified": "2024-08-01T13:50:36.877", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de cross site scripting en /search-invoices.php of phpgurukul Client Management System using PHP & MySQL 1.1 permite a los atacantes ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s de la barra de b\u00fasqueda." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://medium.com/%40shanunirwan/cve-2024-30988-cross-site-scripting-vulnerability-in-client-management-system-using-php-mysql-1-1-e7a677936c23", diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3026.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3026.json index 04877d48855..aea0fe9253e 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3026.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3026.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3026", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:02.547", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:56:16.607", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento WordPress Button Plugin MaxButtons de WordPress anterior a 9.7.8 no sanitiza ni escapa a algunos par\u00e1metros, lo que podr\u00eda permitir a los usuarios con un rol tan bajo como el de editor realizar ataques de cross-site scripting" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/aba9d8a5-20a7-49e5-841c-9cfcb9bc6144/", diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3082.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3082.json index dda4a1630ff..2e03bc4c83c 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3082.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3082.json @@ -2,13 +2,17 @@ "id": "CVE-2024-3082", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2024-07-31T14:15:07.157", - "lastModified": "2024-07-31T14:15:07.157", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A \u201cCWE-256: Plaintext Storage of a Password\u201d affecting the administrative account allows an attacker with physical access to the machine to retrieve the password in cleartext." + }, + { + "lang": "es", + "value": " Un \u201cCWE-256: Almacenamiento en texto plano de una contrase\u00f1a\u201d que afecta a la cuenta administrativa permite que un atacante con acceso f\u00edsico a la m\u00e1quina recupere la contrase\u00f1a en texto plano." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3083.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3083.json index 754251d63dc..3137c49cbdf 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3083.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3083.json @@ -2,13 +2,17 @@ "id": "CVE-2024-3083", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2024-07-31T14:15:07.433", - "lastModified": "2024-07-31T14:15:07.433", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A \u201cCWE-352: Cross-Site Request Forgery (CSRF)\u201d can be exploited by remote attackers to perform state-changing operations with administrative privileges by luring authenticated victims into visiting a malicious web page." + }, + { + "lang": "es", + "value": " Atacantes remotos pueden explotar un \u201cCWE-352: Cross-Site Request Forgery (CSRF)\u201d para realizar operaciones de cambio de estado con privilegios administrativos al atraer a v\u00edctimas autenticadas para que visiten una p\u00e1gina web maliciosa." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31003.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31003.json index 2c14e351d34..c61839bf800 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31003.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31003.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31003", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-02T08:16:05.277", - "lastModified": "2024-04-02T12:50:42.233", + "lastModified": "2024-08-01T13:50:37.813", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -16,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/axiomatic-systems/Bento4/issues/939", diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31008.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31008.json index f9e59a97ee0..167e77d2008 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31008.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31008.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31008", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-03T06:15:07.750", - "lastModified": "2024-04-03T12:38:04.840", + "lastModified": "2024-08-01T13:50:38.620", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en la versi\u00f3n 4.1.0 de WUZHICMS que permite a un atacante ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s del archivo index.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] + } + ], "references": [ { "url": "https://github.com/majic-banana/vulnerability/blob/main/POC/WUZHICMS4.1.0-Captcha%20bypass%20%28logic%20vulnerability%29.md", diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31009.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31009.json index 59809df8de2..5c00ccf57cd 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31009.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31009.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31009", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-03T04:15:12.403", - "lastModified": "2024-04-03T12:38:04.840", + "lastModified": "2024-08-01T13:50:39.423", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en SEMCMS v.4.8, permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro lgid en Banner.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/ss122-0ss/semcms/blob/main/README.md", diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31013.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31013.json index cb2bde75b6d..3506810d6e3 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31013.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31013.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31013", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-03T04:15:12.907", - "lastModified": "2024-04-03T12:38:04.840", + "lastModified": "2024-08-01T13:50:40.203", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de Cross Site Scripting (XSS) en emlog versi\u00f3n Pro 2.3, permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado en la parte inferior de la p\u00e1gina de inicio en el par\u00e1metro footer_info." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/emlog/emlog/issues/291", diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31022.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31022.json index 3f8e248276a..8dd0eb1a65e 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31022.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31022.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31022", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T06:15:07.690", - "lastModified": "2024-04-08T18:48:40.217", + "lastModified": "2024-08-01T13:50:40.970", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en CandyCMS versi\u00f3n 1.0.0 que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente install.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://www.xuxblog.top/2024/03/25/CandyCMS-Pre-Auth-RCE/", diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31030.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31030.json index 90ab52a1ed0..03d1d582baa 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31030.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31030.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31030", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-31T18:15:12.893", - "lastModified": "2024-05-31T19:14:47.793", + "lastModified": "2024-08-01T13:50:41.730", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en coap_msg.c en FreeCoAP v.0.7 de Keith Cullen permite a atacantes remotos provocar una denegaci\u00f3n de servicio o potencialmente revelar informaci\u00f3n a trav\u00e9s de un paquete especialmente manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://github.com/keith-cullen/FreeCoAP/issues/36", diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31047.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31047.json index af4dc7ddbc2..34b6c1c3529 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31047.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31047.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31047", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T23:15:08.023", - "lastModified": "2024-04-09T12:48:04.090", + "lastModified": "2024-08-01T13:50:42.517", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en Academy Software Foundation openexr v.3.2.3 y anteriores permite que un atacante local provoque una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de la funci\u00f3n de conversi\u00f3n de exrmultipart.cpp." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], "references": [ { "url": "https://github.com/AcademySoftwareFoundation/openexr/issues/1680", diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31061.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31061.json index 7264c3afa76..164c3884508 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31061.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31061.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31061", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T19:15:48.887", - "lastModified": "2024-03-28T20:53:20.813", + "lastModified": "2024-08-01T13:50:43.283", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de cross-site scripting en Insurance Mangement System v.1.0.0 y anteriores permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del campo de entrada Apellido." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/sahildari/cve/blob/master/CVE-2024-31061.md", diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31065.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31065.json index bd946629484..3627d5e9ef8 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31065.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31065.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31065", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T19:15:49.110", - "lastModified": "2024-03-28T20:53:20.813", + "lastModified": "2024-08-01T13:50:44.083", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de cross-site scripting en Insurance Mangement System v.1.0.0 y anteriores permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del campo de entrada Ciudad." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/sahildari/cve/blob/master/CVE-2024-31065.md", diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31070.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31070.json index 844a6403d41..d7b3132c548 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31070.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31070.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31070", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-07-17T09:15:02.813", - "lastModified": "2024-07-17T13:34:20.520", + "lastModified": "2024-08-01T13:50:44.860", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La inicializaci\u00f3n de un recurso con una vulnerabilidad predeterminada insegura en las series FutureNet NXR, VXR y WXR proporcionadas por Century Systems Co., Ltd. permite a un atacante remoto no autenticado acceder al servicio telnet de forma ilimitada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1188" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/vu/JVNVU96424864/", diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31077.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31077.json index c1883ff156f..7e8a62c9ad8 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31077.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31077.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31077", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-04-23T05:15:49.323", - "lastModified": "2024-04-23T12:52:09.397", + "lastModified": "2024-08-01T13:50:46.110", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Forminator anterior a 1.29.3 contiene una vulnerabilidad de inyecci\u00f3n SQL. Si se explota esta vulnerabilidad, un atacante remoto autenticado con privilegios administrativos puede obtener y alterar cualquier informaci\u00f3n en la base de datos y provocar una condici\u00f3n de denegaci\u00f3n de servicio (DoS)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/jp/JVN50132400/", diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31094.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31094.json index d77e684566f..7383f454874 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31094.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31094.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31094", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-31T18:15:47.697", - "lastModified": "2024-04-01T01:12:59.077", + "lastModified": "2024-08-01T13:50:47.140", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Vulnerabilidad de deserializaci\u00f3n de datos no confiables en Filter Custom Fields & Taxonomies Light de WordPress. Este problema afecta a Filter Custom Fields & Taxonomies Light: desde n/a hasta 1.05." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "audit@patchstack.com", diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31095.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31095.json index 6aa84ab6395..72470f39235 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31095.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31095.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31095", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-31T19:15:47.717", - "lastModified": "2024-04-01T01:12:59.077", + "lastModified": "2024-08-01T13:50:47.373", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Vulnerabilidad de omisi\u00f3n de autorizaci\u00f3n a trav\u00e9s de clave controlada por el usuario en Ricard Torres Thumbs Rating. Este problema afecta a Thumbs Rating: desde n/a hasta 5.1.0." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, "weaknesses": [ { "source": "audit@patchstack.com", diff --git a/CVE-2024/CVE-2024-311xx/CVE-2024-31199.json b/CVE-2024/CVE-2024-311xx/CVE-2024-31199.json index 6950599f7f1..388cfb52109 100644 --- a/CVE-2024/CVE-2024-311xx/CVE-2024-31199.json +++ b/CVE-2024/CVE-2024-311xx/CVE-2024-31199.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31199", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2024-07-31T14:15:03.420", - "lastModified": "2024-07-31T14:15:03.420", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A \u201cCWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\u201d allows malicious users to permanently inject arbitrary Javascript code." + }, + { + "lang": "es", + "value": " Un \u201cCWE-79: Neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting')\u201d permite a usuarios malintencionados inyectar permanentemente c\u00f3digo Javascript arbitrario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-312xx/CVE-2024-31200.json b/CVE-2024/CVE-2024-312xx/CVE-2024-31200.json index cf0b13fa9e8..0ce076c1921 100644 --- a/CVE-2024/CVE-2024-312xx/CVE-2024-31200.json +++ b/CVE-2024/CVE-2024-312xx/CVE-2024-31200.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31200", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2024-07-31T14:15:03.823", - "lastModified": "2024-07-31T14:15:03.823", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A \u201cCWE-201: Insertion of Sensitive Information Into Sent Data\u201d affecting the administrative account allows an attacker with physical access to the machine to retrieve the password in cleartext when an administrative session is open in the browser." + }, + { + "lang": "es", + "value": " Un \u201cCWE-201: Inserci\u00f3n de informaci\u00f3n confidencial en datos enviados\u201d que afecta la cuenta administrativa permite a un atacante con acceso f\u00edsico a la m\u00e1quina recuperar la contrase\u00f1a en texto plano cuando se abre una sesi\u00f3n administrativa en el navegador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-312xx/CVE-2024-31201.json b/CVE-2024/CVE-2024-312xx/CVE-2024-31201.json index 1b00a2123f0..8398c2de7ab 100644 --- a/CVE-2024/CVE-2024-312xx/CVE-2024-31201.json +++ b/CVE-2024/CVE-2024-312xx/CVE-2024-31201.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31201", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2024-07-31T14:15:04.430", - "lastModified": "2024-07-31T14:15:04.430", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A \u201cCWE-428: Unquoted Search Path or Element\u201d affects the ThermoscanIP_Scrutation service. Such misconfiguration could be abused in scenarios where incorrect permissions were assigned to the C:\\ path to attempt a privilege escalation on the local machine." + }, + { + "lang": "es", + "value": "Un \"CWE-428: Ruta o elemento de b\u00fasqueda sin comillas\" afecta al servicio ThermoscanIP_Scrutation. Se podr\u00eda abusar de esta mala configuraci\u00f3n en escenarios donde se asignaron permisos incorrectos a la ruta C:\\ para intentar una escalada de privilegios en la m\u00e1quina local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-312xx/CVE-2024-31202.json b/CVE-2024/CVE-2024-312xx/CVE-2024-31202.json index b96f49e9388..fe21158e234 100644 --- a/CVE-2024/CVE-2024-312xx/CVE-2024-31202.json +++ b/CVE-2024/CVE-2024-312xx/CVE-2024-31202.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31202", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2024-07-31T14:15:05.127", - "lastModified": "2024-07-31T14:15:05.127", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A \u201cCWE-732: Incorrect Permission Assignment for Critical Resource\u201d in the ThermoscanIP installation folder allows a local attacker to perform a Local Privilege Escalation." + }, + { + "lang": "es", + "value": " Un \"CWE-732: Asignaci\u00f3n de permisos incorrecta para recursos cr\u00edticos\" en la carpeta de instalaci\u00f3n de ThermoscanIP permite a un atacante local realizar una escalada de privilegios local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-312xx/CVE-2024-31203.json b/CVE-2024/CVE-2024-312xx/CVE-2024-31203.json index c6a83bbd3d2..7c3d3aa2a7c 100644 --- a/CVE-2024/CVE-2024-312xx/CVE-2024-31203.json +++ b/CVE-2024/CVE-2024-312xx/CVE-2024-31203.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31203", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2024-07-31T14:15:05.760", - "lastModified": "2024-07-31T14:15:05.760", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A \u201cCWE-121: Stack-based Buffer Overflow\u201d in the wd210std.dll dynamic library packaged with the ThermoscanIP installer allows a local attacker to possibly trigger a Denial-of-Service (DoS) condition on the target component." + }, + { + "lang": "es", + "value": " Un \"CWE-121: desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria\" en la librer\u00eda din\u00e1mica wd210std.dll empaquetada con el instalador de ThermoscanIP permite a un atacante local posiblemente desencadenar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en el componente objetivo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31310.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31310.json index cd31a4d2106..a1d9253bd53 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31310.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31310.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31310", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:12.773", - "lastModified": "2024-07-11T13:06:13.187", + "lastModified": "2024-08-01T13:50:49.710", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En newServiceInfoLocked de AutofillManagerServiceImpl.java, existe una manera posible de ocultar una aplicaci\u00f3n de servicio de Autocompletar habilitada en la configuraci\u00f3n del servicio de Autocompletar debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/74afbb05ca08738f66d82df867bbee66de4884bc", diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31313.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31313.json index da400ac7017..de3f6ee5955 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31313.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31313.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31313", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:12.960", - "lastModified": "2024-07-11T13:06:13.187", + "lastModified": "2024-08-01T13:50:49.893", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En availableToWriteBytes de MessageQueueBase.h, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de l\u00edmites incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/system/libfmq/+/79bbf4aeef4b254c52da670a972e22956c8c659d", diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31318.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31318.json index 5fe75008466..bbc768e7963 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31318.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31318.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31318", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:13.260", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-08-01T13:50:50.663", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En CompanionDeviceManagerService.java, existe una forma posible de emparejar un dispositivo complementario sin la aceptaci\u00f3n del usuario debido a que falta una verificaci\u00f3n de permiso. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/b68b257d56a8600d53b4d2d06fb82aa44086a4a5", diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31325.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31325.json index 13fe0cecadb..d9b59fbbc2e 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31325.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31325.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31325", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:13.677", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-08-01T13:50:51.583", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En varias ubicaciones, existe una forma posible de revelar im\u00e1genes entre los datos de los usuarios debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/9fcd2070f22c0c6b30ecdc914cef83b5891d5f68", diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31335.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31335.json index 80922f47c4e..81987d8dc29 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31335.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31335.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31335", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:14.070", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-08-01T13:50:52.347", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En DevmemIntChangeSparse2 de devicemem_server.c, existe una posible ejecuci\u00f3n de c\u00f3digo arbitrario debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda conducir a una escalada local de privilegios en el kernel sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-783" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2024-07-01", diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31396.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31396.json index 5993f31e8b3..e3337845c47 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31396.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31396.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31396", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-05-22T05:15:53.183", - "lastModified": "2024-05-22T12:46:53.887", + "lastModified": "2024-08-01T13:50:53.827", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La vulnerabilidad de inyecci\u00f3n de c\u00f3digo existe en las versiones de la serie a-blog cms Ver.3.1.x anteriores a la Ver.3.1.12 y en las versiones de la serie Ver.3.0.x anteriores a la Ver.3.0.32. Si se explota esta vulnerabilidad, un usuario con privilegios de administrador o superiores que pueda iniciar sesi\u00f3n en el producto puede ejecutar un comando arbitrario en el servidor." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://developer.a-blogcms.jp/blog/news/JVN-70977403.html", diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31411.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31411.json index 53bd10704e6..6c2f477b3bd 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31411.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31411.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31411", "sourceIdentifier": "security@apache.org", "published": "2024-07-17T10:15:01.810", - "lastModified": "2024-07-17T13:34:20.520", + "lastModified": "2024-08-01T13:50:54.623", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Carga sin restricciones de archivos con vulnerabilidad de tipo peligroso en Apache StreamPipes. Un tipo tan peligroso podr\u00eda ser un archivo ejecutable que pueda conducir a una ejecuci\u00f3n remota de c\u00f3digo (RCE). La carga sin restricciones s\u00f3lo es posible para usuarios autenticados y autorizados. Este problema afecta a Apache StreamPipes: hasta 0.93.0. Se recomienda a los usuarios actualizar a la versi\u00f3n 0.95.0, que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 6.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 4.7 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31412.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31412.json index 574056d5958..1db97ea256d 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31412.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31412.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31412", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-05-01T13:15:52.030", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-08-01T13:50:54.890", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Existe una vulnerabilidad de lectura fuera de los l\u00edmites en CX-Programmer incluido en CX-One CXONE-AL[][]D-V4 Ver. 9.81 o menor. Abrir un archivo de proyecto especialmente manipulado puede provocar la divulgaci\u00f3n de informaci\u00f3n y/o el bloqueo del producto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/vu/JVNVU98274902/", diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31507.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31507.json index c3d224b63f9..a389b1d85c8 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31507.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31507.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31507", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-09T18:15:10.523", - "lastModified": "2024-04-10T13:24:00.070", + "lastModified": "2024-08-01T13:50:56.497", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Sourcecodester Online Graduate Tracer System v1.0 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro \"solicitud\" en admin/fetch_gendercs.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/CveSecLook/cve/issues/6", diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31551.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31551.json index 2bc862a950a..593516e9521 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31551.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31551.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31551", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-26T22:15:08.080", - "lastModified": "2024-04-29T12:42:03.667", + "lastModified": "2024-08-01T13:50:57.340", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de Directory Traversal en lib/admin/image.admin.php en cmseasy v7.7.7.9 20240105 permite a atacantes eliminar archivos arbitrarios mediante una solicitud GET manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-26" + } + ] + } + ], "references": [ { "url": "https://www.yuque.com/sickle-ffnce/awixr8/qu8i0p9y0h277m6u", diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31581.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31581.json index 613d9d2828e..91c5badc078 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31581.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31581.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31581", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T19:15:07.840", - "lastModified": "2024-06-10T18:15:31.323", + "lastModified": "2024-08-01T13:50:58.110", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que la versi\u00f3n n6.1 de FFmpeg conten\u00eda una validaci\u00f3n incorrecta de la vulnerabilidad del \u00edndice de matriz en libavcodec/cbs_h266_syntax_template.c. Esta vulnerabilidad permite a los atacantes provocar un comportamiento indefinido dentro de la aplicaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/1047524396/a7e9273e12553775826784035333cdd8", diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31582.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31582.json index f70f32a2ac2..b4f708295d5 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31582.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31582.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31582", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T19:15:07.893", - "lastModified": "2024-06-10T18:15:31.387", + "lastModified": "2024-08-01T13:50:58.913", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que la versi\u00f3n n6.1 de FFmpeg conten\u00eda una vulnerabilidad de desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en la funci\u00f3n draw_block_rectangle de libavfilter/vf_codecview.c. Esta vulnerabilidad permite a los atacantes provocar un comportamiento indefinido o una denegaci\u00f3n de servicio (DoS) mediante entradas manipuladas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/1047524396/b47d5efe3bc420fb91dbb77c73c0fff3", diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31587.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31587.json index 6afb32ed335..d69813b28f5 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31587.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31587.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31587", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T16:15:10.370", - "lastModified": "2024-04-19T16:19:49.043", + "lastModified": "2024-08-01T13:50:59.700", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,46 @@ "value": "SecuSTATION Camera V2.5.5.3116-S50-SMA-B20160811A y anteriores permiten a un atacante no autenticado descargar archivos de configuraci\u00f3n del dispositivo mediante una solicitud manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + }, + { + "lang": "en", + "value": "CWE-312" + } + ] + } + ], "references": [ { "url": "https://github.com/kklzzcun/kklzzcun.github.io/blob/main/Camera.md", diff --git a/CVE-2024/CVE-2024-316xx/CVE-2024-31601.json b/CVE-2024/CVE-2024-316xx/CVE-2024-31601.json index da0b10c2ed5..cdb112d5ce0 100644 --- a/CVE-2024/CVE-2024-316xx/CVE-2024-31601.json +++ b/CVE-2024/CVE-2024-316xx/CVE-2024-31601.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31601", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-26T21:15:49.207", - "lastModified": "2024-04-29T12:42:03.667", + "lastModified": "2024-08-01T13:51:00.487", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en Beijing Panabit Network Software Co., Ltd. La plataforma de an\u00e1lisis de big data Panalog v. 20240323 y anteriores permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente exportpdf.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-616" + } + ] + } + ], "references": [ { "url": "https://github.com/tianqing191/book.io", diff --git a/CVE-2024/CVE-2024-316xx/CVE-2024-31609.json b/CVE-2024/CVE-2024-316xx/CVE-2024-31609.json index b97a9f9657e..2c743ac8f27 100644 --- a/CVE-2024/CVE-2024-316xx/CVE-2024-31609.json +++ b/CVE-2024/CVE-2024-316xx/CVE-2024-31609.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31609", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-25T22:15:08.937", - "lastModified": "2024-04-26T12:58:17.720", + "lastModified": "2024-08-01T13:51:01.270", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La vulnerabilidad de Cross Site Scripting (XSS) en BOSSCMS v3.10 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de los campos de c\u00f3digo de encabezado y c\u00f3digo de pie de p\u00e1gina en la configuraci\u00f3n del c\u00f3digo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/ss122-0ss/BOSSCMS/blob/main/readme.md", diff --git a/CVE-2024/CVE-2024-316xx/CVE-2024-31611.json b/CVE-2024/CVE-2024-316xx/CVE-2024-31611.json index f655d2fa698..42d4d7c58e5 100644 --- a/CVE-2024/CVE-2024-316xx/CVE-2024-31611.json +++ b/CVE-2024/CVE-2024-316xx/CVE-2024-31611.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31611", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-10T17:16:26.493", - "lastModified": "2024-06-12T17:44:20.730", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:51:02.050", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-316xx/CVE-2024-31621.json b/CVE-2024/CVE-2024-316xx/CVE-2024-31621.json index 4b2eb8897de..fe29f4d5276 100644 --- a/CVE-2024/CVE-2024-316xx/CVE-2024-31621.json +++ b/CVE-2024/CVE-2024-316xx/CVE-2024-31621.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31621", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T17:15:19.057", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-08-01T13:51:02.777", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en FlowiseAI Inc Flowise v.1.6.2 y anteriores permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado para el componente api/v1." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 7.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://flowiseai.com/", diff --git a/CVE-2024/CVE-2024-316xx/CVE-2024-31649.json b/CVE-2024/CVE-2024-316xx/CVE-2024-31649.json index e85b7637008..8c276bab9fe 100644 --- a/CVE-2024/CVE-2024-316xx/CVE-2024-31649.json +++ b/CVE-2024/CVE-2024-316xx/CVE-2024-31649.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31649", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-15T21:15:07.547", - "lastModified": "2024-04-16T13:24:07.103", + "lastModified": "2024-08-01T13:51:03.573", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Cross-site scripting (XSS) en Cosmetics and Beauty Product Online Store v1.0 permite a los atacantes ejecutar scripts web o HTML arbitrario a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro Nombre del producto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-31649.md", diff --git a/CVE-2024/CVE-2024-316xx/CVE-2024-31678.json b/CVE-2024/CVE-2024-316xx/CVE-2024-31678.json index 6d894bd71aa..3e9aea0d0c1 100644 --- a/CVE-2024/CVE-2024-316xx/CVE-2024-31678.json +++ b/CVE-2024/CVE-2024-316xx/CVE-2024-31678.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31678", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-11T16:15:25.127", - "lastModified": "2024-04-12T12:44:04.930", + "lastModified": "2024-08-01T13:51:04.350", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Sourcecodester Loan Management System v1.0 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro \"contrase\u00f1a\" en el archivo \"login.php\"." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/CveSecLook/cve/issues/10", diff --git a/CVE-2024/CVE-2024-316xx/CVE-2024-31682.json b/CVE-2024/CVE-2024-316xx/CVE-2024-31682.json index 59fff07cd95..aef293273b8 100644 --- a/CVE-2024/CVE-2024-316xx/CVE-2024-31682.json +++ b/CVE-2024/CVE-2024-316xx/CVE-2024-31682.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31682", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-03T20:15:09.010", - "lastModified": "2024-06-04T16:57:41.057", + "lastModified": "2024-08-01T13:51:05.133", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Control de acceso incorrecto en el mecanismo de autenticaci\u00f3n de huellas digitales de Phone Cleaner: Boost & Clean v2.2.0 permite a los atacantes eludir la autenticaci\u00f3n de huellas digitales debido al uso de una API obsoleta." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://zzzxiin.github.io/post/phone-cleaner/", diff --git a/CVE-2024/CVE-2024-317xx/CVE-2024-31741.json b/CVE-2024/CVE-2024-317xx/CVE-2024-31741.json index 71f5550ea8a..857affbae17 100644 --- a/CVE-2024/CVE-2024-317xx/CVE-2024-31741.json +++ b/CVE-2024/CVE-2024-317xx/CVE-2024-31741.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31741", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-26T22:15:08.137", - "lastModified": "2024-04-29T12:42:03.667", + "lastModified": "2024-08-01T13:51:06.003", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La vulnerabilidad de Cross Site Scripting en MiniCMS v.1.11 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de una cadena manipulada en la URL despu\u00e9s de iniciar sesi\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/bg5sbk/MiniCMS/issues/49", diff --git a/CVE-2024/CVE-2024-317xx/CVE-2024-31760.json b/CVE-2024/CVE-2024-317xx/CVE-2024-31760.json index cf66a419f14..5fb2c34e478 100644 --- a/CVE-2024/CVE-2024-317xx/CVE-2024-31760.json +++ b/CVE-2024/CVE-2024-317xx/CVE-2024-31760.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31760", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-16T23:15:09.107", - "lastModified": "2024-04-17T12:48:07.510", + "lastModified": "2024-08-01T13:51:06.777", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en sanluan flipped-aurora gin-vue-admin 2.4.x permite a un atacante escalar privilegios a trav\u00e9s del componente Caducidad de sesi\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/menghaining/8d424faebfe869c80eadaea12bbdd158", diff --git a/CVE-2024/CVE-2024-317xx/CVE-2024-31784.json b/CVE-2024/CVE-2024-317xx/CVE-2024-31784.json index ecfb7b73113..9deb03fb86e 100644 --- a/CVE-2024/CVE-2024-317xx/CVE-2024-31784.json +++ b/CVE-2024/CVE-2024-317xx/CVE-2024-31784.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31784", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-16T04:15:09.200", - "lastModified": "2024-04-16T13:24:07.103", + "lastModified": "2024-08-01T13:51:07.627", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en Typora v.1.8.10 y anteriores permite a un atacante local obtener informaci\u00f3n confidencial y ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado para el componente src." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.3, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] + } + ], "references": [ { "url": "https://github.com/0x0fc/TyporaIframe/blob/main/TyporaIframeVuln.md", diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31803.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31803.json index 3e980b8d666..55b52ff8fc9 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31803.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31803.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31803", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:25:43.390", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-08-01T13:51:08.687", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La vulnerabilidad de desbordamiento de b\u00fafer en emp-ot v.0.2.4 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n FerretCOT::read_pre_data128_from_file." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/FudanMPL/Vulnerabilities-in-MPC-Framework/tree/main/emp-ot/stack-buffer-overflow-ferret_cot", diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31806.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31806.json index bc21a1a42da..a3a7a229489 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31806.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31806.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31806", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T13:15:08.550", - "lastModified": "2024-04-08T18:48:40.217", + "lastModified": "2024-08-01T13:51:09.630", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Se descubri\u00f3 que TOTOLINK EX200 V4.0.3c.7646_B20201211 contiene una vulnerabilidad de denegaci\u00f3n de servicio (DoS) en la funci\u00f3n RebootSystem que puede reiniciar el sistema sin autorizaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/DoS_RebootSystem/DoS.md", diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31808.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31808.json index ad6b3d0545d..17358765a61 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31808.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31808.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31808", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T13:15:08.650", - "lastModified": "2024-04-08T18:48:40.217", + "lastModified": "2024-08-01T13:51:09.823", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK EX200 V4.0.3c.7646_B20201211 contiene una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) a trav\u00e9s del par\u00e1metro webWlanIdx en la funci\u00f3n setWebWlanIdx." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-233" + } + ] + } + ], "references": [ { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/CI_3_setWebWlanIdx/CI.md", diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31809.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31809.json index 201a7b19877..6181c62ecae 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31809.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31809.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31809", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T13:15:08.700", - "lastModified": "2024-04-08T18:48:40.217", + "lastModified": "2024-08-01T13:51:10.623", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK EX200 V4.0.3c.7646_B20201211 contiene una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) a trav\u00e9s del par\u00e1metro FileName en la funci\u00f3n setUpgradeFW." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-75" + } + ] + } + ], "references": [ { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/CI_4_setUpgradeFW/CI.md", diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31812.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31812.json index 311fc17a11c..78c654be652 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31812.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31812.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31812", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T13:15:08.800", - "lastModified": "2024-04-08T18:48:40.217", + "lastModified": "2024-08-01T13:51:11.397", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En TOTOLINK EX200 V4.0.3c.7646_B20201211, un atacante puede obtener informaci\u00f3n confidencial sin autorizaci\u00f3n a trav\u00e9s de la funci\u00f3n getWiFiExtenderConfig." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-75" + } + ] + } + ], "references": [ { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/Leak_getWiFiExtenderConfig/Leak.md", diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31814.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31814.json index 160fc401a8a..9d9fe521e9b 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31814.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31814.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31814", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T13:15:08.887", - "lastModified": "2024-04-08T18:48:40.217", + "lastModified": "2024-08-01T13:51:12.177", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "TOTOLINK EX200 V4.0.3c.7646_B20201211 permite a los atacantes omitir el inicio de sesi\u00f3n a trav\u00e9s de la funci\u00f3n Form_Login." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-288" + } + ] + } + ], "references": [ { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/Login_Bypass/bypass.md", diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31817.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31817.json index 064a7d549c3..b6d5f422748 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31817.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31817.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31817", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T13:15:09.030", - "lastModified": "2024-04-08T18:48:40.217", + "lastModified": "2024-08-01T13:51:12.960", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En TOTOLINK EX200 V4.0.3c.7646_B20201211, un atacante puede obtener informaci\u00f3n confidencial sin autorizaci\u00f3n a trav\u00e9s de la funci\u00f3n getSysStatusCfg." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/Leak_getSysStatusCfg/Leak.md", diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31820.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31820.json index 2322308b30e..067e523ea1e 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31820.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31820.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31820", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T18:15:07.683", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-08-01T13:51:13.733", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en el commit Ecommerce-CodeIgniter-Bootstrap v. d22b54e8915f167a135046ceb857caaf8479c4da permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del m\u00e9todo getLangFolderForEdit del componente Languages.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/LioTree/890b0eea95fce6225d820afe4e3510e9", diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31822.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31822.json index 98705eae4ec..23ce2de6e33 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31822.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31822.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31822", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T18:15:07.817", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-08-01T13:51:14.517", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en el commit Ecommerce-CodeIgniter-Bootstrap v. d22b54e8915f167a135046ceb857caaf8479c4da permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del m\u00e9todo saveLanguageFiles del componente Languages.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/LioTree/f83e25b2c5e144c0b3ad8919e6483c7a", diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31864.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31864.json index 361e38f283b..bdd5dfc9b8c 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31864.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31864.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31864", "sourceIdentifier": "security@apache.org", "published": "2024-04-09T16:15:08.113", - "lastModified": "2024-05-01T18:15:23.563", + "lastModified": "2024-08-01T13:51:15.603", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Vulnerabilidad de control inadecuado de generaci\u00f3n de c\u00f3digo (\"inyecci\u00f3n de c\u00f3digo\") en Apache Zeppelin. El atacante puede inyectar configuraci\u00f3n confidencial o c\u00f3digo malicioso al conectar la base de datos MySQL a trav\u00e9s del controlador JDBC. Este problema afecta a Apache Zeppelin: anteriores a 0.11.1. Se recomienda a los usuarios actualizar a la versi\u00f3n 0.11.1, que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31959.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31959.json index 9a74c6ea201..3a67a836298 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31959.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31959.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31959", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-07T17:15:50.563", - "lastModified": "2024-06-07T19:24:09.243", + "lastModified": "2024-08-01T13:51:16.797", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31970.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31970.json index 0478b091146..8da5533c59b 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31970.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31970.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31970", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T16:15:06.600", - "lastModified": "2024-07-25T17:46:25.310", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:51:17.520", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31977.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31977.json index e27dc2123b4..a7d136c32d1 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31977.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31977.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31977", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T15:15:11.863", - "lastModified": "2024-07-26T13:15:58.687", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:51:18.420", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31979.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31979.json index d76864d81ef..ec6607804c1 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31979.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31979.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31979", "sourceIdentifier": "security@apache.org", "published": "2024-07-17T09:15:02.907", - "lastModified": "2024-07-25T13:38:56.897", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:51:19.213", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3111.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3111.json index 83865f56927..8570bc5a99b 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3111.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3111.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3111", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-27T06:15:11.643", - "lastModified": "2024-06-28T13:28:47.937", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:56:17.710", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 } ] }, diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3112.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3112.json index e4af4c3ffa4..0db578c1ed6 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3112.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3112.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3112", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-12T06:15:03.937", - "lastModified": "2024-07-24T20:03:22.417", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:56:17.910", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3113.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3113.json index af9064c339f..b1048a15c19 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3113.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3113.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3113", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-30T06:15:02.337", - "lastModified": "2024-07-30T13:32:45.943", + "lastModified": "2024-08-01T13:56:18.230", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "FormFlow: WhatsApp Social and Advanced Form Builder with Easy Lead Collection complemento de WordPress anterior a 2.12.2 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con altos privilegios, como el administrador, realizar ataques de Cross Site Scripting almacenado incluso cuando el unfiltered_html la capacidad no est\u00e1 permitida (por ejemplo, en la configuraci\u00f3n de varios sitios)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/ad85c5c7-f4d1-4374-b3b7-8ee022d27d34/", diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3156.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3156.json index bcf30b86814..93a6866c82f 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3156.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3156.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3156", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-04-06T15:15:26.887", - "lastModified": "2024-04-26T16:00:34.653", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:56:20.987", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3168.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3168.json index 7802fecfa1e..f7ae7c9beb9 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3168.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3168.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3168", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-07-16T23:15:23.703", - "lastModified": "2024-07-19T13:25:11.660", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:56:21.960", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3169.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3169.json index 808a059f52a..0f1a8d5a617 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3169.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3169.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3169", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-07-16T23:15:23.773", - "lastModified": "2024-07-19T13:24:56.617", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:56:22.240", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3170.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3170.json index 9d65f90b713..f2e814e121a 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3170.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3170.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3170", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-07-16T23:15:23.837", - "lastModified": "2024-07-18T15:04:35.447", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:56:23.270", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3171.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3171.json index f292062af3d..cf8a47878f7 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3171.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3171.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3171", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-07-16T23:15:23.903", - "lastModified": "2024-07-18T15:03:07.550", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:56:24.363", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3173.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3173.json index 1ec8be4fa38..d9b48f5db88 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3173.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3173.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3173", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-07-16T23:15:24.027", - "lastModified": "2024-07-18T15:02:26.407", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:56:25.427", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-345" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3174.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3174.json index fcd0c80697a..f2cdf57c781 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3174.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3174.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3174", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-07-16T23:15:24.087", - "lastModified": "2024-07-18T15:05:16.670", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:56:26.347", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3175.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3175.json index 954aa0ce9fc..3d899d2729d 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3175.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3175.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3175", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-07-16T23:15:24.147", - "lastModified": "2024-07-18T15:05:29.593", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:56:26.597", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1287" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-320xx/CVE-2024-32007.json b/CVE-2024/CVE-2024-320xx/CVE-2024-32007.json index 1af3146fb44..e6befad9b0c 100644 --- a/CVE-2024/CVE-2024-320xx/CVE-2024-32007.json +++ b/CVE-2024/CVE-2024-320xx/CVE-2024-32007.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32007", "sourceIdentifier": "security@apache.org", "published": "2024-07-19T09:15:04.713", - "lastModified": "2024-07-19T20:22:53.447", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:51:19.560", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-321xx/CVE-2024-32162.json b/CVE-2024/CVE-2024-321xx/CVE-2024-32162.json index dc50fd88cee..e71ca612277 100644 --- a/CVE-2024/CVE-2024-321xx/CVE-2024-32162.json +++ b/CVE-2024/CVE-2024-321xx/CVE-2024-32162.json @@ -2,7 +2,7 @@ "id": "CVE-2024-32162", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T19:15:08.060", - "lastModified": "2024-04-17T20:08:21.887", + "lastModified": "2024-08-01T13:51:21.033", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "CMSeasy 7.7.7.9 es vulnerable a la eliminaci\u00f3n arbitraria de archivos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-791" + } + ] + } + ], "references": [ { "url": "http://cmseasy.com", diff --git a/CVE-2024/CVE-2024-321xx/CVE-2024-32166.json b/CVE-2024/CVE-2024-321xx/CVE-2024-32166.json index 8e2556a4e87..b153a21c247 100644 --- a/CVE-2024/CVE-2024-321xx/CVE-2024-32166.json +++ b/CVE-2024/CVE-2024-321xx/CVE-2024-32166.json @@ -2,7 +2,7 @@ "id": "CVE-2024-32166", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T14:15:11.190", - "lastModified": "2024-04-19T16:19:49.043", + "lastModified": "2024-08-01T13:51:21.837", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Webid v1.2.1 sufre una vulnerabilidad de referencia de objeto directo inseguro (IDOR): control de acceso roto, que permite a los atacantes comprar ahora una subasta que est\u00e1 suspendida (escalada de privilegios horizontal)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], "references": [ { "url": "https://github.com/Fewword/Poc/blob/main/webid/webid-poc14.md", diff --git a/CVE-2024/CVE-2024-321xx/CVE-2024-32167.json b/CVE-2024/CVE-2024-321xx/CVE-2024-32167.json index 3277283e5e9..a75d85a4b3c 100644 --- a/CVE-2024/CVE-2024-321xx/CVE-2024-32167.json +++ b/CVE-2024/CVE-2024-321xx/CVE-2024-32167.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32167", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-10T20:15:13.367", - "lastModified": "2024-06-12T18:00:30.120", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:51:22.630", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, diff --git a/CVE-2024/CVE-2024-322xx/CVE-2024-32210.json b/CVE-2024/CVE-2024-322xx/CVE-2024-32210.json index 1d7389e0f40..8a8047315dd 100644 --- a/CVE-2024/CVE-2024-322xx/CVE-2024-32210.json +++ b/CVE-2024/CVE-2024-322xx/CVE-2024-32210.json @@ -2,7 +2,7 @@ "id": "CVE-2024-32210", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T18:15:23.930", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-08-01T13:51:22.850", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La versi\u00f3n 1.0.20.120 y anteriores de la aplicaci\u00f3n LoMag WareHouse Management deb\u00edan utilizar contrase\u00f1as codificadas de forma predeterminada para formularios y conexiones SQL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-259" + } + ] + } + ], "references": [ { "url": "https://gainsec.com/2024/04/28/cve-2024-32210-cve-2024-32211-cve-2024-32212-cve-2024-32213-lomag-integrator-ce-warehouse-management/", diff --git a/CVE-2024/CVE-2024-322xx/CVE-2024-32282.json b/CVE-2024/CVE-2024-322xx/CVE-2024-32282.json index 648529e41ab..977db9774a8 100644 --- a/CVE-2024/CVE-2024-322xx/CVE-2024-32282.json +++ b/CVE-2024/CVE-2024-322xx/CVE-2024-32282.json @@ -2,7 +2,7 @@ "id": "CVE-2024-32282", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T14:15:08.627", - "lastModified": "2024-04-17T15:31:50.160", + "lastModified": "2024-08-01T13:51:24.047", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El firmware Tenda FH1202 v1.2.0.14(408) contiene una vulnerabilidad de inyecci\u00f3n de comandos en la funci\u00f3n formexeCommand a trav\u00e9s del par\u00e1metro cmdinput." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formexecommand_cmdi.md", diff --git a/CVE-2024/CVE-2024-322xx/CVE-2024-32285.json b/CVE-2024/CVE-2024-322xx/CVE-2024-32285.json index 6b9da12c376..a0bed094aae 100644 --- a/CVE-2024/CVE-2024-322xx/CVE-2024-32285.json +++ b/CVE-2024/CVE-2024-322xx/CVE-2024-32285.json @@ -2,7 +2,7 @@ "id": "CVE-2024-32285", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T14:15:08.740", - "lastModified": "2024-04-17T15:31:50.160", + "lastModified": "2024-08-01T13:51:24.843", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El firmware Tenda W30E v1.0 V1.0.1.25(633) tiene una vulnerabilidad de desbordamiento de pila a trav\u00e9s del par\u00e1metro de contrase\u00f1a en la funci\u00f3n formaddUserName." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formaddUserName.md", diff --git a/CVE-2024/CVE-2024-322xx/CVE-2024-32288.json b/CVE-2024/CVE-2024-322xx/CVE-2024-32288.json index f7f84a2c7d9..edc2739e0ae 100644 --- a/CVE-2024/CVE-2024-322xx/CVE-2024-32288.json +++ b/CVE-2024/CVE-2024-322xx/CVE-2024-32288.json @@ -2,7 +2,7 @@ "id": "CVE-2024-32288", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T14:15:08.903", - "lastModified": "2024-04-17T15:31:50.160", + "lastModified": "2024-08-01T13:51:25.653", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El firmware Tenda W30E v1.0 V1.0.1.25(633) tiene una vulnerabilidad de desbordamiento de pila ubicada a trav\u00e9s del par\u00e1metro de p\u00e1gina en la funci\u00f3n fromwebExcptypemanFilter." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromwebExcptypemanFilter.md", diff --git a/CVE-2024/CVE-2024-322xx/CVE-2024-32293.json b/CVE-2024/CVE-2024-322xx/CVE-2024-32293.json index 57fa2be958f..c07edd835fc 100644 --- a/CVE-2024/CVE-2024-322xx/CVE-2024-32293.json +++ b/CVE-2024/CVE-2024-322xx/CVE-2024-32293.json @@ -2,7 +2,7 @@ "id": "CVE-2024-32293", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T14:15:09.113", - "lastModified": "2024-04-17T15:31:50.160", + "lastModified": "2024-08-01T13:51:26.453", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El firmware Tenda W30E v1.0 V1.0.1.25(633) tiene una vulnerabilidad de desbordamiento de pila a trav\u00e9s del par\u00e1metro de p\u00e1gina en la funci\u00f3n fromDhcpListClient." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromDhcpListClient_page.md", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32302.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32302.json index ba111b6f1fc..04ddacb6a22 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32302.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32302.json @@ -2,7 +2,7 @@ "id": "CVE-2024-32302", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T14:15:09.207", - "lastModified": "2024-04-17T15:31:50.160", + "lastModified": "2024-08-01T13:51:27.897", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El firmware Tenda FH1202 v1.2.0.14(408) tiene una vulnerabilidad de desbordamiento de pila a trav\u00e9s del par\u00e1metro PPW en la funci\u00f3n fromWizardHandle." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/fromWizardHandle.md", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32303.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32303.json index dff3efe78ee..41e9ec05491 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32303.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32303.json @@ -2,7 +2,7 @@ "id": "CVE-2024-32303", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T16:15:08.837", - "lastModified": "2024-04-17T16:51:07.347", + "lastModified": "2024-08-01T13:51:28.717", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El firmware Tenda AC15 v15.03.20_multi, v15.03.05.19 y v15.03.05.18 tiene una vulnerabilidad de desbordamiento de pila ubicada a trav\u00e9s del par\u00e1metro PPW en la funci\u00f3n fromWizardHandle." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/fromWizardHandle.md", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32310.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32310.json index b3cbd84ab4d..2e61885b0aa 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32310.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32310.json @@ -2,7 +2,7 @@ "id": "CVE-2024-32310", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T13:15:08.390", - "lastModified": "2024-04-17T15:31:50.160", + "lastModified": "2024-08-01T13:51:29.533", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El firmware Tenda F1203 V2.0.1.6 tiene una vulnerabilidad de desbordamiento de pila ubicada en el par\u00e1metro PPW de la funci\u00f3n fromWizardHandle." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1203/fromWizardHandle.md", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32324.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32324.json index d6796957b5d..7742048df6a 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32324.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32324.json @@ -2,7 +2,7 @@ "id": "CVE-2024-32324", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-25T20:15:07.213", - "lastModified": "2024-04-26T12:58:17.720", + "lastModified": "2024-08-01T13:51:30.347", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de desbordamiento de b\u00fafer en Shenzhen Libituo Technology Co., Ltd LBT-T300-T400 v.3.2 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de la variable vpn_client_ip de la funci\u00f3n config_vpn_pptp en el programa rc." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/teamoever/CVE/blob/main/LBT-T300-T400.md", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32332.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32332.json index cf169fa9956..026a08fb0f9 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32332.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32332.json @@ -2,7 +2,7 @@ "id": "CVE-2024-32332", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-18T17:15:48.930", - "lastModified": "2024-04-18T18:25:55.267", + "lastModified": "2024-08-01T13:51:31.147", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "TOTOLINK N300RT V2.1.8-B20201030.1539 contiene una vulnerabilidad de Cross Site Scripting (XSS) en la configuraci\u00f3n de WDS en la p\u00e1gina inal\u00e1mbrica." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/N300RT/XSS_1_WDS_Settings/README.md", diff --git a/CVE-2024/CVE-2024-324xx/CVE-2024-32409.json b/CVE-2024/CVE-2024-324xx/CVE-2024-32409.json index 312292d7da0..0873a963429 100644 --- a/CVE-2024/CVE-2024-324xx/CVE-2024-32409.json +++ b/CVE-2024/CVE-2024-324xx/CVE-2024-32409.json @@ -2,7 +2,7 @@ "id": "CVE-2024-32409", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T16:15:10.883", - "lastModified": "2024-07-03T01:56:34.063", + "lastModified": "2024-08-01T13:51:32.040", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -22,20 +22,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 0.0, - "baseSeverity": "NONE" + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 0.0 + "impactScore": 3.7 } ] }, diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32905.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32905.json index 463aeaa40ad..e1a540e1e8f 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32905.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32905.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32905", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:54.730", - "lastModified": "2024-07-11T15:13:21.467", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:51:38.530", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32908.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32908.json index 01dfc01245e..d790cc87b6a 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32908.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32908.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32908", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:54.957", - "lastModified": "2024-07-11T15:07:31.087", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:51:39.347", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-362" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32919.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32919.json index 052cf2822eb..82442085457 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32919.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32919.json @@ -2,7 +2,7 @@ "id": "CVE-2024-32919", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:55.757", - "lastModified": "2024-06-17T12:43:31.090", + "lastModified": "2024-08-01T13:51:40.153", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En lwis_add_completion_fence de lwis_fence.c, existe una posible escalada de privilegios debido a una confusi\u00f3n de tipos. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3261.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3261.json index a06cae23fc3..e18969c8e51 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3261.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3261.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3261", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-24T05:15:47.207", - "lastModified": "2024-04-24T13:39:42.883", + "lastModified": "2024-08-01T13:56:29.727", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Strong Testimonials de WordPress anterior a 3.1.12 no valida ni escapa algunos de sus campos de testimonios antes de devolverlos a una p\u00e1gina/publicaci\u00f3n, lo que podr\u00eda permitir a los usuarios con el rol de colaborador y superior realizar ataques de Cross-Site Scripting Almacenado. El ataque requiere que se realice una vista espec\u00edfica." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/5a0d5922-eefc-48e1-9681-b63e420bb8b3/", diff --git a/CVE-2024/CVE-2024-330xx/CVE-2024-33078.json b/CVE-2024/CVE-2024-330xx/CVE-2024-33078.json index ef9a972f827..d69e6388ed2 100644 --- a/CVE-2024/CVE-2024-330xx/CVE-2024-33078.json +++ b/CVE-2024/CVE-2024-330xx/CVE-2024-33078.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33078", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T18:15:24.283", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-08-01T13:51:41.723", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Tencent Lippag v4.3 es vulnerable al desbordamiento de b\u00fafer. Un usuario puede enviar una imagen manipulada para desencadenar un desbordamiento que conduzca a la ejecuci\u00f3n remota de c\u00f3digo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-680" + } + ] + } + ], "references": [ { "url": "https://github.com/HBLocker/CVE-2024-33078/", diff --git a/CVE-2024/CVE-2024-331xx/CVE-2024-33118.json b/CVE-2024/CVE-2024-331xx/CVE-2024-33118.json index 14eb3439539..abde25d170a 100644 --- a/CVE-2024/CVE-2024-331xx/CVE-2024-33118.json +++ b/CVE-2024/CVE-2024-331xx/CVE-2024-33118.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33118", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T20:15:10.950", - "lastModified": "2024-05-07T13:39:32.710", + "lastModified": "2024-08-01T13:51:42.520", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que LuckyFrameWeb v3.5.2 contiene una vulnerabilidad de lectura arbitraria a trav\u00e9s del m\u00e9todo fileDownload en la clase com.luckyframe.project.common.CommonController." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-494" + } + ] + } + ], "references": [ { "url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/33118.txt", diff --git a/CVE-2024/CVE-2024-331xx/CVE-2024-33139.json b/CVE-2024/CVE-2024-331xx/CVE-2024-33139.json index 7047d0de21b..7f566b64392 100644 --- a/CVE-2024/CVE-2024-331xx/CVE-2024-33139.json +++ b/CVE-2024/CVE-2024-331xx/CVE-2024-33139.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33139", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T16:15:07.727", - "lastModified": "2024-05-07T20:07:58.737", + "lastModified": "2024-08-01T13:51:43.317", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que J2EEFAST v2.7.0 contiene una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro sql_filter en la funci\u00f3n findpage." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/33139.txt", diff --git a/CVE-2024/CVE-2024-331xx/CVE-2024-33180.json b/CVE-2024/CVE-2024-331xx/CVE-2024-33180.json index 88a2ea9443d..2d9ea9e8655 100644 --- a/CVE-2024/CVE-2024-331xx/CVE-2024-33180.json +++ b/CVE-2024/CVE-2024-331xx/CVE-2024-33180.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33180", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-16T16:15:04.767", - "lastModified": "2024-07-19T18:56:27.127", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:51:44.097", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-331xx/CVE-2024-33181.json b/CVE-2024/CVE-2024-331xx/CVE-2024-33181.json index 8d2ad7e8559..ea8a38df315 100644 --- a/CVE-2024/CVE-2024-331xx/CVE-2024-33181.json +++ b/CVE-2024/CVE-2024-331xx/CVE-2024-33181.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33181", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-16T18:15:07.617", - "lastModified": "2024-07-17T13:34:20.520", + "lastModified": "2024-08-01T13:51:44.900", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que Tenda AC18 V15.03.3.10_EN contiene una vulnerabilidad de desbordamiento del b\u00fafer basada en pila a trav\u00e9s del par\u00e1metro deviceMac en ip/goform/addWifiMacFilter." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://palm-vertebra-fe9.notion.site/addWifiMacFilter_2-0f7fab42d4254867b46fe92b25dc7c40", diff --git a/CVE-2024/CVE-2024-331xx/CVE-2024-33182.json b/CVE-2024/CVE-2024-331xx/CVE-2024-33182.json index 7a3baeaf0f5..bafe4d02378 100644 --- a/CVE-2024/CVE-2024-331xx/CVE-2024-33182.json +++ b/CVE-2024/CVE-2024-331xx/CVE-2024-33182.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33182", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-16T16:15:04.850", - "lastModified": "2024-07-19T18:56:50.050", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:51:45.673", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 8.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.5 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33218.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33218.json index 49664bc7975..d81ae642dfb 100644 --- a/CVE-2024/CVE-2024-332xx/CVE-2024-33218.json +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33218.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33218", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-22T15:15:28.550", - "lastModified": "2024-05-22T18:59:20.240", + "lastModified": "2024-08-01T13:51:46.453", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en el componente AsUpIO64.sys de ASUSTeK Computer Inc ASUS USB 3.0 Boost Storage Driver 5.30.20.0 permite a los atacantes escalar privilegios y ejecutar c\u00f3digo arbitrario mediante el env\u00edo de solicitudes IOCTL manipuladas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-782" + } + ] + } + ], "references": [ { "url": "https://github.com/DriverHunter/Win-Driver-EXP/tree/main/CVE-2024-33218", diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33221.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33221.json index 77b021e2115..e320a7c3f64 100644 --- a/CVE-2024/CVE-2024-332xx/CVE-2024-33221.json +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33221.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33221", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-22T15:15:28.870", - "lastModified": "2024-05-22T18:59:20.240", + "lastModified": "2024-08-01T13:51:47.243", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en el componente AsusBSItf.sys de ASUSTeK Computer Inc ASUS BIOS Flash Driver v3.2.12.0 permite a los atacantes escalar privilegios y ejecutar c\u00f3digo arbitrario mediante el env\u00edo de solicitudes IOCTL manipuladas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-782" + } + ] + } + ], "references": [ { "url": "https://github.com/DriverHunter/Win-Driver-EXP/tree/main/CVE-2024-33221", diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33222.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33222.json index c9889d81fa1..fd477d30c7a 100644 --- a/CVE-2024/CVE-2024-332xx/CVE-2024-33222.json +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33222.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33222", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-22T16:15:09.960", - "lastModified": "2024-05-22T18:59:20.240", + "lastModified": "2024-08-01T13:51:48.023", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en el componente ATSZIO64.sys de ASUSTeK Computer Inc ASUS ATSZIO Driver v0.2.1.7 permite a los atacantes escalar privilegios y ejecutar c\u00f3digo arbitrario mediante el env\u00edo de solicitudes IOCTL manipuladas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-782" + } + ] + } + ], "references": [ { "url": "https://github.com/DriverHunter/Win-Driver-EXP/tree/main/CVE-2024-33222", diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33253.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33253.json index 2bbc93d1611..e0a5a86a990 100644 --- a/CVE-2024/CVE-2024-332xx/CVE-2024-33253.json +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33253.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33253", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-13T23:15:50.403", - "lastModified": "2024-06-17T12:43:31.090", + "lastModified": "2024-08-01T13:51:48.870", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de Cross-site scripting (XSS) en GUnet OpenEclass E-learning Platform versi\u00f3n 3.15 y anteriores permite a un atacante privilegiado autenticado ejecutar c\u00f3digo arbitrario a trav\u00e9s de los campos de t\u00edtulo y descripci\u00f3n de la funci\u00f3n de edici\u00f3n de plantilla de insignia." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/FreySolarEye/CVE/blob/master/GUnet%20OpenEclass%20E-learning%20platform%203.15%20-%20%27certbadge.php%27%20Stored%20Cross%20Site%20Scripting", diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33255.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33255.json index c94ab842a2f..b163c810d23 100644 --- a/CVE-2024/CVE-2024-332xx/CVE-2024-33255.json +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33255.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33255", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-26T15:15:49.130", - "lastModified": "2024-04-26T15:32:22.523", + "lastModified": "2024-08-01T13:51:50.153", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que la confirmaci\u00f3n de Jerryscript cefd391 conten\u00eda un error de afirmaci\u00f3n a trav\u00e9s de ECMA_STRING_IS_REF_EQUALS_TO_ONE (string_p) en ecma_free_string_list." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] + } + ], "references": [ { "url": "https://github.com/jerryscript-project/jerryscript/issues/5135", diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33263.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33263.json index c26c307aa77..4c6fccc0c1f 100644 --- a/CVE-2024/CVE-2024-332xx/CVE-2024-33263.json +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33263.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33263", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:37:31.263", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-08-01T13:51:50.933", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Se descubri\u00f3 que el commit 3b45d15 de QuickJS conten\u00eda un error de aserci\u00f3n a trav\u00e9s de JS_FreeRuntime (JSRuntime *) en quickjs.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://github.com/bellard/quickjs/issues/277", diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33268.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33268.json index 1a759a44e03..1153b63fa8f 100644 --- a/CVE-2024/CVE-2024-332xx/CVE-2024-33268.json +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33268.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33268", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T20:15:08.560", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-08-01T13:51:51.127", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n SQL en Digincube mdgiftproduct anterior a 1.4.1 permite a un atacante ejecutar comandos SQL arbitrarios a trav\u00e9s del m\u00e9todo MdGiftRule::addGiftToCart." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://security.friendsofpresta.org/modules/2024/04/25/mdgiftproduct.html", diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33272.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33272.json index 68e2186a8cd..6dd822a0c71 100644 --- a/CVE-2024/CVE-2024-332xx/CVE-2024-33272.json +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33272.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33272", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T20:15:08.707", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-08-01T13:51:51.900", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en KnowBand para PrestaShop autosuggest anterior a 2.0.0 permite a un atacante ejecutar comandos SQL arbitrarios a trav\u00e9s de los componentes AutosuggestSearchModuleFrontController::initContent() y AutosuggestSearchModuleFrontController::getKbProducts()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://security.friendsofpresta.org/modules/2024/04/25/autosuggest.html", diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33365.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33365.json index ac12c2e4422..5ac90e162dc 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33365.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33365.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33365", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-29T17:15:10.947", - "lastModified": "2024-07-30T13:33:30.653", + "lastModified": "2024-08-01T13:51:53.400", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Vulnerabilidad de desbordamiento de b\u00fafer en Tenda AC10 v4 US_AC10V4.0si_V16.03.10.20_cn permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n Virtual_Data_Check en el componente bin/httpd." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/johnathanhuutri/CVE_report/blob/master/CVE-2024-33365/README.md", diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33371.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33371.json index 25f4f44a9fa..a5608c3ea72 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33371.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33371.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33371", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T20:15:08.527", - "lastModified": "2024-05-01T13:02:20.750", + "lastModified": "2024-08-01T13:51:54.193", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de Cross Site Scripting en DedeCMS v.5.7.113 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro typeid en el componente makehtml_list_action.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://gitee.com/zchuanwen/cve/issues/I9HQRY", diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33375.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33375.json index c9a7c93f421..dfd217a67bd 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33375.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33375.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33375", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-14T15:15:50.170", - "lastModified": "2024-06-17T19:15:58.107", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-01T13:51:54.967", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que LB-LINK BL-W1210M v2.0 almacena las credenciales de usuario en texto plano dentro del firmware del enrutador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-256" + } + ] + } + ], "references": [ { "url": "https://github.com/ShravanSinghRathore/Security-Advisory-Multiple-Vulnerabilities-in-LB-link-BL-W1210M-Router/wiki/Credentials-Stored-in-Cleartext--%7C--Unencrypted-Credentials-%28CVE%E2%80%902024%E2%80%9033375%29", diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33433.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33433.json index bdb7d13018d..e4abc5582d7 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33433.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33433.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33433", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:37:38.317", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-08-01T13:51:56.190", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de Cross Site Scripting en TOTOLINK X2000R anterior a v1.0.0-B20231213.1013 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro Control de acceso de invitados en la p\u00e1gina inal\u00e1mbrica." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-233" + } + ] + } + ], "references": [ { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/X2000R/XSS_2_Guest_Access_Control/README.md", diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33437.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33437.json index 566921f49ae..5b9a9b14941 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33437.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33437.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33437", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T20:15:08.680", - "lastModified": "2024-05-01T13:02:20.750", + "lastModified": "2024-08-01T13:51:56.957", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Un problema en CSS Exfil Protection v.1.1.0 permite a un atacante remoto obtener informaci\u00f3n confidencial debido a la falta de soporte para las reglas de estilo CSS." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://github.com/mlgualtieri/CSS-Exfil-Protection/issues/41", diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33438.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33438.json index ce734a861c0..4b86480aef9 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33438.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33438.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33438", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T18:15:08.047", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-08-01T13:51:57.143", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La vulnerabilidad de carga de archivos en CubeCart anterior a 6.5.5 permite a un usuario autenticado ejecutar c\u00f3digo arbitrario a trav\u00e9s de un archivo .phar manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://forums.cubecart.com/topic/59046-cubecart-655-released-minor-security-update/", diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33449.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33449.json index 8dc5399524a..16c6dd7133c 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33449.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33449.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33449", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T17:15:19.470", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-08-01T13:51:58.900", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema SSRF en el servicio PDFMyURL permite a un atacante remoto obtener informaci\u00f3n confidencial y ejecutar c\u00f3digo arbitrario mediante una solicitud POST en el par\u00e1metro URL" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://grumpz.net/uncovering-an-ssrf-vulnerability-in-pdfmyurl-affecting-numerous-users", diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33465.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33465.json index b8c944d964b..eedfb7a540d 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33465.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33465.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33465", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T15:15:53.350", - "lastModified": "2024-04-30T17:52:35.057", + "lastModified": "2024-08-01T13:51:59.690", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de Cross Site Scripting en MajorDoMo anterior a v.0662e5e permite a un atacante escalar privilegios a trav\u00e9s del componente thumb/thumb.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://hbzms.github.io/", diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33513.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33513.json index 347a5b154bd..00b4467f09d 100644 --- a/CVE-2024/CVE-2024-335xx/CVE-2024-33513.json +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33513.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33513", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-05-01T17:15:36.510", - "lastModified": "2024-07-03T01:58:20.920", + "lastModified": "2024-08-01T13:52:00.640", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -59,6 +59,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-004.txt", diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33517.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33517.json index c92966b7e17..580e9572c1e 100644 --- a/CVE-2024/CVE-2024-335xx/CVE-2024-33517.json +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33517.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33517", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-05-01T17:15:37.163", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-08-01T13:52:01.677", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-004.txt", diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33519.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33519.json index fab0df71894..0acbf107552 100644 --- a/CVE-2024/CVE-2024-335xx/CVE-2024-33519.json +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33519.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33519", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-07-24T20:15:03.640", - "lastModified": "2024-07-25T12:36:39.947", + "lastModified": "2024-08-01T13:52:02.460", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] + } + ], "references": [ { "url": "https://csaf.arubanetworks.com/2024/hpe_aruba_networking_-_hpesbnw04673.txt", diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33526.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33526.json index c5bc3d3dc2c..ab13b316a7a 100644 --- a/CVE-2024/CVE-2024-335xx/CVE-2024-33526.json +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33526.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33526", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-21T15:15:28.933", - "lastModified": "2024-05-23T17:15:29.020", + "lastModified": "2024-08-01T13:52:03.173", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Una vulnerabilidad de Cross Site Scripting Almacenado (XSS) en la caracter\u00edstica \"Importaci\u00f3n de rol de usuario y t\u00edtulo de rol de usuario\" en ILIAS 7 anterior a 7.30 e ILIAS 8 anterior a 8.11 permite a atacantes remotos autenticados con privilegios administrativos inyectar scripts web o HTML de su elecci\u00f3n mediante la carga de archivos XML." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://docu.ilias.de/ilias.php?baseClass=illmpresentationgui&cmd=layout&ref_id=1719&obj_id=170029", diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33663.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33663.json index f8f1b2fb778..1064b128906 100644 --- a/CVE-2024/CVE-2024-336xx/CVE-2024-33663.json +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33663.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33663", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-26T00:15:09.010", - "lastModified": "2024-04-26T12:58:17.720", + "lastModified": "2024-08-01T13:52:05.147", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "python-jose hasta 3.3.0 tiene confusi\u00f3n de algoritmos con claves OpenSSH ECDSA y otros formatos de claves. Esto es similar a CVE-2022-29217." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-327" + } + ] + } + ], "references": [ { "url": "https://github.com/mpdavis/python-jose/issues/346", diff --git a/CVE-2024/CVE-2024-337xx/CVE-2024-33786.json b/CVE-2024/CVE-2024-337xx/CVE-2024-33786.json index e94616f4394..e9d7316775b 100644 --- a/CVE-2024/CVE-2024-337xx/CVE-2024-33786.json +++ b/CVE-2024/CVE-2024-337xx/CVE-2024-33786.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33786", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-03T13:15:21.983", - "lastModified": "2024-05-03T14:17:53.690", + "lastModified": "2024-08-01T13:52:06.273", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de carga de archivos arbitrarios en Zhongcheng Kexin Ticketing Management Platform 20.04 permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://github.com/jiankeguyue/VulnerabilityReport/blob/main/zhongcheng_kexin_ticketing_management_platform.md", diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33802.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33802.json index 0c117ff5dbe..45e6fde4683 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33802.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33802.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33802", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T16:15:16.347", - "lastModified": "2024-05-28T17:11:47.007", + "lastModified": "2024-08-01T13:52:07.557", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n SQL en /model/get_student_subject.php en campcodes Complete Web-Based School Management System 1.0 permite a un atacante ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro index." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2014.pdf", diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33819.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33819.json index dca765a9222..b33d580de57 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33819.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33819.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33819", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:07.797", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-08-01T13:52:08.333", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que Globitel KSA SpeechLog v8.1 contiene una vulnerabilidad de Cross Site Scripting (XSS) almacenadas en la funci\u00f3n Guardar consulta." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://medium.com/%40rajput.thakur/speechlog-v-8-1-stored-cross-site-scripting-cve-2024-33819-1b1164fb0ecd", diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33849.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33849.json index 9cb57749215..23444873d11 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33849.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33849.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33849", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T16:15:16.820", - "lastModified": "2024-05-28T17:11:47.007", + "lastModified": "2024-08-01T13:52:09.410", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,54 @@ "value": "La soluci\u00f3n ci CI-Out-of-Office Manager hasta 6.0.0.77 utiliza una clave criptogr\u00e1fica codificada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1391" + }, + { + "lang": "en", + "value": "CWE-321" + }, + { + "lang": "en", + "value": "CWE-522" + }, + { + "lang": "en", + "value": "CWE-657" + } + ] + } + ], "references": [ { "url": "https://www.ci-solution.com/produkte/ps-out-of-office.html", diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33879.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33879.json index 78a085d3c07..596d9536b4d 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33879.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33879.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33879", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-24T17:15:10.257", - "lastModified": "2024-06-26T14:40:53.927", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:52:10.267", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33883.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33883.json index ff200bd121a..3963f37b015 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33883.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33883.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33883", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-28T16:15:23.233", - "lastModified": "2024-06-10T17:16:28.217", + "lastModified": "2024-08-01T13:52:11.050", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El paquete ejs (tambi\u00e9n conocido como plantillas de JavaScript integradas) anterior a 3.1.10 para Node.js carece de cierta protecci\u00f3n contra la contaminaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] + } + ], "references": [ { "url": "https://github.com/mde/ejs/commit/e469741dca7df2eb400199e1cdb74621e3f89aa5", diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33898.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33898.json index 97ce404160b..76fe069138e 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33898.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33898.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33898", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-24T22:15:10.207", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-08-01T13:52:11.823", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El servidor de configuraci\u00f3n autom\u00e1tica (ACS) de Axiros AXESS 4.x y 5.0.0 tiene un control de acceso incorrecto. Una omisi\u00f3n de autorizaci\u00f3n permite a atacantes remotos lograr la ejecuci\u00f3n remota de c\u00f3digo no autenticado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://www.axiros.com/2024/03/vulnerability-in-axusermanager", diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33901.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33901.json index 8e7178fb329..746f93b7493 100644 --- a/CVE-2024/CVE-2024-339xx/CVE-2024-33901.json +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33901.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33901", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-20T21:15:09.243", - "lastModified": "2024-07-29T15:15:10.533", + "lastModified": "2024-08-01T13:52:12.590", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -22,7 +22,42 @@ "value": "Un problema en KeePassXC 2.7.7 permite a un atacante recuperar algunas contrase\u00f1as almacenadas en la base de datos .kdbx." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-316" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Fastor01/30c6d89c842feb1865ec2cd2d3806838", diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3330.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3330.json index e3dc618797c..4b357dae501 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3330.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3330.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3330", "sourceIdentifier": "security@tibco.com", "published": "2024-06-27T19:15:14.937", - "lastModified": "2024-06-27T19:25:12.067", + "lastModified": "2024-08-01T13:56:30.807", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-250" + } + ] + } + ], "references": [ { "url": "https://community.spotfire.com/articles/spotfire/spotfire-security-advisory-june-262024-spotfire-cve-2024-3330-r3435/", diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3353.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3353.json index 6addc51abd1..d0beba6b2a7 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3353.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3353.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3353", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-05T20:15:09.193", - "lastModified": "2024-05-17T02:39:51.867", + "lastModified": "2024-08-01T13:56:31.790", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 } ], "cvssMetricV2": [ diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34005.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34005.json index 6a6cd121802..78fbb4de335 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34005.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34005.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34005", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-05-31T21:15:09.440", - "lastModified": "2024-06-03T14:46:24.250", + "lastModified": "2024-08-01T13:52:13.690", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En un entorno de alojamiento compartido que ha sido mal configurado para permitir el acceso al contenido de otros usuarios, un usuario de Moodle con acceso para restaurar los m\u00f3dulos de actividad de la base de datos y acceso directo al servidor web fuera de la ra\u00edz web de Moodle podr\u00eda ejecutar una inclusi\u00f3n de archivo local." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "patrick@puiterwijk.org", diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34021.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34021.json index 8288c87879f..8eae487eae1 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34021.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34021.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34021", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-08-01T02:15:01.873", - "lastModified": "2024-08-01T02:15:01.873", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted upload of file with dangerous type vulnerability exists in ELECOM wireless LAN routers. A specially crafted file may be uploaded to the affected product by a logged-in user with an administrative privilege, resulting in an arbitrary OS command execution." + }, + { + "lang": "es", + "value": "Existe una carga sin restricciones de archivos con vulnerabilidad de tipo peligroso en los enrutadores LAN inal\u00e1mbricos ELECOM. Un usuario que haya iniciado sesi\u00f3n con privilegios administrativos puede cargar un archivo especialmente manipulado en el producto afectado, lo que resultar\u00e1 en la ejecuci\u00f3n arbitraria de un comando del sistema operativo." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34043.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34043.json index e4740b43893..274812c1084 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34043.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34043.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34043", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T00:15:07.560", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-08-01T13:52:14.133", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "O-RAN RICAPP kpimon-go I-Release tiene una violaci\u00f3n de segmentaci\u00f3n a trav\u00e9s de un determinado mensaje E2AP-PDU." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://jira.o-ran-sc.org/browse/RICAPP-235", diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34050.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34050.json index decb338f452..80dd7e4a931 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34050.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34050.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34050", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T00:15:07.920", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-08-01T13:52:14.410", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Open Networking Foundation SD-RAN Rimedo rimedo-ts 0.1.1 tiene un p\u00e1nico de los l\u00edmites de segmento fuera de rango en \"return uint64(b[2])<<16 | uint64(b[1])<<8 | uint64( b[0])\" en reader.go." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] + } + ], "references": [ { "url": "https://github.com/onosproject/rimedo-ts/issues/16", diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34149.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34149.json index a2af69160b0..0336900623a 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34149.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34149.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34149", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T23:15:06.703", - "lastModified": "2024-07-30T16:15:03.927", + "lastModified": "2024-08-01T13:52:15.683", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -22,7 +22,30 @@ "value": "En Bitcoin Core hasta 27.0 y Bitcoin Knots anteriores a 25.1.knots20231115, tapscript carece de una verificaci\u00f3n de los l\u00edmite de tama\u00f1o de pol\u00edtica, un problema diferente al de CVE-2023-50428. NOTA: algunas partes se oponen a esta nueva verificaci\u00f3n de los l\u00edmites (por ejemplo, porque est\u00e1n de acuerdo con el objetivo pero no est\u00e1n de acuerdo con el mecanismo t\u00e9cnico, o porque tienen un objetivo diferente)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://github.com/bitcoin/bitcoin/pull/29769", diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34196.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34196.json index 0c5958eb3fc..48312538732 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34196.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34196.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34196", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:32.730", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-08-01T13:52:15.947", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Totolink AC1200 Wireless Dual Band Gigabit Router A3002RU_V3 Firmware V3.0.0-B20230809.1615 es vulnerable al desbordamiento del b\u00fafer. El programa \"boa\" permite a los atacantes modificar el valor del campo \"vwlan_idx\" mediante \"formMultiAP\". Esto puede provocar un desbordamiento de la pila a trav\u00e9s de la funci\u00f3n CGI \"formWlEncrypt\" al construir solicitudes HTTP maliciosas y pasar un valor SSID de WLAN que excede la longitud esperada, lo que podr\u00eda resultar en la ejecuci\u00f3n de comandos o ataques de denegaci\u00f3n de servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Swind1er/1ec2fde42254598a72f1d716f9cfe2a1", diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34204.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34204.json index 6408ea39871..f20d1966aa3 100644 --- a/CVE-2024/CVE-2024-342xx/CVE-2024-34204.json +++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34204.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34204", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:33.767", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-08-01T13:52:16.747", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK outdoor CPE CP450 v4.1.0cu.747_B20191224 contiene una vulnerabilidad de inyecci\u00f3n de comando en la funci\u00f3n setUpgradeFW a trav\u00e9s del par\u00e1metro FileName." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/n0wstr/IOTVuln/tree/main/CP450/setUpgradeFW", diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34231.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34231.json index 58932d71ebd..07b9de5a1a3 100644 --- a/CVE-2024/CVE-2024-342xx/CVE-2024-34231.json +++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34231.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34231", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:37.193", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-08-01T13:52:18.070", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de Cross Site Scripting (XSS) en Sourcecodester Laboratory Management System v1.0 permite a los atacantes ejecutar script web o HTML de su elecci\u00f3n a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro Nombre corto del sistema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/Amrita2000/CVES/blob/main/CVE-2024-34231.md", diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34273.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34273.json index 37ebded4a01..822745a972b 100644 --- a/CVE-2024/CVE-2024-342xx/CVE-2024-34273.json +++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34273.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34273", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-16T16:15:08.600", - "lastModified": "2024-05-17T18:36:31.297", + "lastModified": "2024-08-01T13:52:18.903", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Se descubri\u00f3 que njwt hasta v0.4.0 conten\u00eda una contaminaci\u00f3n de prototipo en el m\u00e9todo Parser.prototype.parse." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] + } + ], "references": [ { "url": "https://github.com/chrisandoryan/vuln-advisory/blob/main/nJwt/CVE-2024-34273.md", diff --git a/CVE-2024/CVE-2024-343xx/CVE-2024-34312.json b/CVE-2024/CVE-2024-343xx/CVE-2024-34312.json index 19f6b5da0a0..3f87f3dedfe 100644 --- a/CVE-2024/CVE-2024-343xx/CVE-2024-34312.json +++ b/CVE-2024/CVE-2024-343xx/CVE-2024-34312.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34312", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-24T20:15:10.480", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-08-01T13:52:19.707", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Se descubri\u00f3 que Virtual Programming Lab para Moodle hasta v4.2.3 contiene una vulnerabilidad de Cross Site Scripting (XSS) a trav\u00e9s del componente vplide.js." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://github.com/vincentscode/CVE-2024-34312", diff --git a/CVE-2024/CVE-2024-343xx/CVE-2024-34329.json b/CVE-2024/CVE-2024-343xx/CVE-2024-34329.json index ff6c7f7ffa0..15c76796af9 100644 --- a/CVE-2024/CVE-2024-343xx/CVE-2024-34329.json +++ b/CVE-2024/CVE-2024-343xx/CVE-2024-34329.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34329", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T20:15:03.673", - "lastModified": "2024-07-24T12:55:13.223", + "lastModified": "2024-08-01T13:52:19.990", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Los permisos inseguros en Entrust Datacard XPS Card Printer Driver 8.4 y versiones anteriores permiten a atacantes no autenticados ejecutar c\u00f3digo arbitrario como SYSTEM a trav\u00e9s de un payload DLL manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-378" + } + ] + } + ], "references": [ { "url": "https://github.com/pamoutaf/CVE-2024-34329/blob/main/README.md", diff --git a/CVE-2024/CVE-2024-343xx/CVE-2024-34392.json b/CVE-2024/CVE-2024-343xx/CVE-2024-34392.json index b73863d5625..00164bcdccd 100644 --- a/CVE-2024/CVE-2024-343xx/CVE-2024-34392.json +++ b/CVE-2024/CVE-2024-343xx/CVE-2024-34392.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34392", "sourceIdentifier": "reefs@jfrog.com", "published": "2024-05-02T19:15:06.333", - "lastModified": "2024-05-03T12:50:34.250", + "lastModified": "2024-08-01T13:52:21.033", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] + } + ], "references": [ { "url": "https://github.com/libxmljs/libxmljs/issues/646", diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34446.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34446.json index 5727d6127bf..acc61a4e39a 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34446.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34446.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34446", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-03T15:15:08.210", - "lastModified": "2024-05-03T15:32:19.637", + "lastModified": "2024-08-01T13:52:21.980", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Mullvad VPN hasta 2024.1 en Android no configura un servidor DNS en estado de bloqueo (despu\u00e9s de un error grave al crear un t\u00fanel) y, por lo tanto, el tr\u00e1fico DNS puede salir del dispositivo. Los operadores de servidores DNS no deseados pueden observar y registrar datos que muestren que el dispositivo afectado fue el origen de solicitudes DNS confidenciales." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-923" + } + ] + } + ], "references": [ { "url": "https://github.com/mullvad/mullvadvpn-app/blob/main/CHANGELOG.md", diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34469.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34469.json index cc60e3f0dbe..341365b6d37 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34469.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34469.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34469", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-04T20:15:07.640", - "lastModified": "2024-05-06T12:44:56.377", + "lastModified": "2024-08-01T13:52:22.830", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Rukovoditel anterior a 3.5.3 permite XSS a trav\u00e9s de user_photo para index.php?module=users/registration&action=save." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://forum.rukovoditel.net/viewtopic.php?t=5071", diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34476.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34476.json index 9ec1d3f5c4d..7391d1ef3ba 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34476.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34476.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34476", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-05T00:15:07.330", - "lastModified": "2024-05-06T12:44:56.377", + "lastModified": "2024-08-01T13:52:23.687", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Open5GS anterior a 2.7.1 es vulnerable a una afirmaci\u00f3n accesible que puede causar una falla de AMF a trav\u00e9s de mensajes NAS desde un UE: ogs_nas_encrypt en lib/nas/common/security.c para pkbuf->len." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-805" + } + ] + } + ], "references": [ { "url": "https://github.com/open5gs/open5gs/compare/v2.7.0...v2.7.1", diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34486.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34486.json index 93c8287bcc7..b3be366beaa 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34486.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34486.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34486", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-05T03:15:07.120", - "lastModified": "2024-05-06T12:44:56.377", + "lastModified": "2024-08-01T13:52:24.443", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "OFPPacketQueue en parser.py en Faucet SDN Ryu 4.34 permite a atacantes provocar una denegaci\u00f3n de servicio (bucle infinito) a trav\u00e9s de OFPQueueProp.len=0." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-606" + } + ] + } + ], "references": [ { "url": "https://github.com/faucetsdn/ryu/issues/190", diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34725.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34725.json index 9eaacada5e2..be1f9705f2d 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34725.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34725.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34725", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:14.593", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-08-01T13:52:25.887", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,46 @@ "value": "En DevmemIntUnexportCtx de devicemem_server.c, existe una posible ejecuci\u00f3n de c\u00f3digo arbitrario debido a una condici\u00f3n de ejecuci\u00f3n. Esto podr\u00eda conducir a una escalada local de privilegios en el kernel sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + }, + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2024-07-01", diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34929.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34929.json index 528b86d1d61..dbcf858a098 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34929.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34929.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34929", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-23T17:15:29.550", - "lastModified": "2024-05-24T01:15:30.977", + "lastModified": "2024-08-01T13:52:26.657", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n SQL en /view/find_friends.php en Campcodes Complete Web-Based School Management System 1.0 permite a un atacante ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro my_index." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2030.pdf", diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34935.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34935.json index 51e3cf7ebec..4d1f99f74da 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34935.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34935.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34935", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-23T17:15:30.280", - "lastModified": "2024-05-24T01:15:30.977", + "lastModified": "2024-08-01T13:52:27.497", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n SQL en /view/conversation_history_admin.php en Campcodes Complete Web-Based School Management System 1.0 permite a un atacante ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro conversation_id." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2027.pdf", diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34942.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34942.json index 4da5ee63489..3316ba2683b 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34942.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34942.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34942", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:39:38.043", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-08-01T13:52:28.260", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que Tenda FH1206 V1.2.0.8(8155)_EN contiene una vulnerabilidad de desbordamiento del b\u00fafer basada en pila a trav\u00e9s del par\u00e1metro funcpara1 en ip/goform/exeCommand." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://palm-vertebra-fe9.notion.site/formexeCommand-200db77a90d34c708b903c935c7c65c0", diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34982.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34982.json index 256d98010c3..2320cbceaba 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34982.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34982.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34982", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-17T14:15:11.200", - "lastModified": "2024-05-17T18:35:35.070", + "lastModified": "2024-08-01T13:52:29.093", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Una vulnerabilidad de carga de archivos arbitrarios en el componente /include/file.php de lylme_spage v1.9.5 permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://github.com/n2ryx/CVE/blob/main/Lylme_pagev1.9.5.md", diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34990.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34990.json index 6c4d731bc41..272bfec18a9 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34990.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34990.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34990", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-19T21:15:57.023", - "lastModified": "2024-06-20T12:43:25.663", + "lastModified": "2024-08-01T13:52:30.057", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el m\u00f3dulo \"Help Desk - Sistema de gesti\u00f3n de atenci\u00f3n al cliente\" (helpdesk) hasta la versi\u00f3n 2.4.0 de los M\u00f3dulos FME para PrestaShop, un cliente puede cargar archivos .php. Los m\u00e9todos `HelpdeskHelpdeskModuleFrontController::submitTicket()` y `HelpdeskHelpdeskModuleFrontController::replyTicket()` permiten cargar archivos .php en una ruta predecible para los clientes conectados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 10.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2024-06-18-helpdesk.md", diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34993.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34993.json index b7e92012ae0..ab52c84898f 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34993.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34993.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34993", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-19T20:15:11.053", - "lastModified": "2024-06-20T12:43:25.663", + "lastModified": "2024-08-01T13:52:30.833", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el m\u00f3dulo \"Exportaci\u00f3n masiva de productos a Google Merchant-Google Shopping\" (bagoogleshopping) hasta la versi\u00f3n 1.0.26 de Buy Addons for PrestaShop, un invitado puede realizar una inyecci\u00f3n SQL a trav\u00e9s de `GenerateCategories::renderCategories()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2024-06-18-bagoogleshopping.md", diff --git a/CVE-2024/CVE-2024-350xx/CVE-2024-35056.json b/CVE-2024/CVE-2024-350xx/CVE-2024-35056.json index 0b945c3094f..f9c497ebcfb 100644 --- a/CVE-2024/CVE-2024-350xx/CVE-2024-35056.json +++ b/CVE-2024/CVE-2024-350xx/CVE-2024-35056.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35056", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-21T18:15:09.737", - "lastModified": "2024-07-17T17:15:15.263", + "lastModified": "2024-08-01T13:52:31.603", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Se descubri\u00f3 que NASA AIT-Core v2.5.2 contiene m\u00faltiples vulnerabilidades de inyecci\u00f3n SQL a trav\u00e9s de las funciones query_packets e insert." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/advisories/GHSA-gpgj-xrgw-8mx2", diff --git a/CVE-2024/CVE-2024-351xx/CVE-2024-35161.json b/CVE-2024/CVE-2024-351xx/CVE-2024-35161.json index 7cbef35a0e0..97daa3e1912 100644 --- a/CVE-2024/CVE-2024-351xx/CVE-2024-35161.json +++ b/CVE-2024/CVE-2024-351xx/CVE-2024-35161.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35161", "sourceIdentifier": "security@apache.org", "published": "2024-07-26T10:15:02.567", - "lastModified": "2024-07-26T12:38:41.683", + "lastModified": "2024-08-01T13:52:33.223", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Apache Traffic Server reenv\u00eda la secci\u00f3n fragmentada HTTP mal formada a los servidores de origen. Esto se puede utilizar para el contrabando de solicitudes y tambi\u00e9n puede provocar un envenenamiento de la cach\u00e9 si los servidores de origen son vulnerables. Este problema afecta a Apache Traffic Server: desde la versi\u00f3n 8.0.0 hasta la 8.1.10, desde la versi\u00f3n 9.0.0 hasta la 9.2.4. Los usuarios pueden establecer una nueva configuraci\u00f3n (proxy.config.http.drop_chunked_trailers) para no reenviar la secci\u00f3n fragmentada del tr\u00e1iler. Se recomienda a los usuarios que actualicen a la versi\u00f3n 8.1.11 o 9.2.5, que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35338.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35338.json index 825450055e6..e128d41bb11 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35338.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35338.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35338", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-16T16:15:04.933", - "lastModified": "2024-07-19T18:58:08.977", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:52:35.817", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-798" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35341.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35341.json index ae255827223..13f71f6ac3e 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35341.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35341.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35341", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T17:15:10.443", - "lastModified": "2024-05-29T13:02:09.280", + "lastModified": "2024-08-01T13:52:36.597", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Ciertos productos Anpviz permiten a usuarios no autenticados descargar la configuraci\u00f3n en ejecuci\u00f3n del dispositivo a trav\u00e9s de una solicitud HTTP GET a los URI /ConfigFile.ini o /config.xml. Este archivo de configuraci\u00f3n contiene nombres de usuario y contrase\u00f1as cifradas (cifradas con una clave codificada com\u00fan a todos los dispositivos). Esto afecta a IPC-D250, IPC-D260, IPC-B850, IPC-D850, IPC-D350, IPC-D3150, IPC-D4250, IPC-D380, IPC-D880, IPC-D280, IPC-D3180, MC800N, YM500L, Firmware YM800N_N2, YMF50B, YM800SV2, YM500L8 y YM200E10 v3.2.2.2 y versiones anteriores y posiblemente m\u00e1s proveedores/modelos de c\u00e1mara IP." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://willgu.es/pages/anpviz-ip-camera-vuln.html", diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35343.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35343.json index 730ea90f5ca..02a89566dc6 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35343.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35343.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35343", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T17:15:10.580", - "lastModified": "2024-05-29T13:02:09.280", + "lastModified": "2024-08-01T13:52:37.563", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Ciertos productos Anpviz permiten a usuarios no autenticados descargar archivos arbitrarios desde el sistema de archivos del dispositivo a trav\u00e9s de una solicitud HTTP GET al URI /playback/. Esto afecta a IPC-D250, IPC-D260, IPC-B850, IPC-D850, IPC-D350, IPC-D3150, IPC-D4250, IPC-D380, IPC-D880, IPC-D280, IPC-D3180, MC800N, YM500L, Firmware YM800N_N2, YMF50B, YM800SV2, YM500L8 y YM200E10 (c\u00e1maras IP) v3.2.2.2 y versiones anteriores y posiblemente m\u00e1s proveedores/modelos de c\u00e1maras IP." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://willgu.es/pages/anpviz-ip-camera-vuln.html", diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35349.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35349.json index aa1b7d8fce2..a7b5b41c7ac 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35349.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35349.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35349", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-30T17:15:33.213", - "lastModified": "2024-07-18T16:50:12.123", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:52:38.343", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35384.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35384.json index 930e1a02d7a..7fedaf8c149 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35384.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35384.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35384", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-21T14:15:12.217", - "lastModified": "2024-05-21T16:54:26.047", + "lastModified": "2024-08-01T13:52:39.203", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": " Un problema en Cesanta mjs 2.20.0 permite a un atacante remoto provocar una denegaci\u00f3n de servicio a trav\u00e9s de la funci\u00f3n mjs_array_length en el archivo mjs.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://github.com/cesanta/mjs/issues/287", diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35399.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35399.json index 0e9fde72727..cc35e908ccd 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35399.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35399.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35399", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T15:15:09.567", - "lastModified": "2024-05-28T17:11:55.903", + "lastModified": "2024-08-01T13:52:39.410", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK CP900L v4.1.5cu.798_B20221228 conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro de contrase\u00f1a en la funci\u00f3n loginAuth" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "http://totolink.com", diff --git a/CVE-2024/CVE-2024-354xx/CVE-2024-35429.json b/CVE-2024/CVE-2024-354xx/CVE-2024-35429.json index 7fef7891816..c5288dae7a6 100644 --- a/CVE-2024/CVE-2024-354xx/CVE-2024-35429.json +++ b/CVE-2024/CVE-2024-354xx/CVE-2024-35429.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35429", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-30T17:15:34.180", - "lastModified": "2024-07-18T16:45:32.443", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:52:40.290", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-31" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-354xx/CVE-2024-35431.json b/CVE-2024/CVE-2024-354xx/CVE-2024-35431.json index acd6510ca32..41a661b96d5 100644 --- a/CVE-2024/CVE-2024-354xx/CVE-2024-35431.json +++ b/CVE-2024/CVE-2024-354xx/CVE-2024-35431.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35431", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-30T17:15:34.277", - "lastModified": "2024-05-30T18:18:58.870", + "lastModified": "2024-08-01T13:52:41.087", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "ZKTeco ZKBio CVSecurity 6.1.1 es vulnerable a Directory Traversal a trav\u00e9s de photoBase64. Un usuario no autenticado puede descargar archivos locales desde el servidor." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-31" + } + ] + } + ], "references": [ { "url": "https://github.com/mrojz/ZKT-Bio-CVSecurity/blob/main/CVE-2024-35431.md", diff --git a/CVE-2024/CVE-2024-355xx/CVE-2024-35553.json b/CVE-2024/CVE-2024-355xx/CVE-2024-35553.json index f6cc5de5929..943f7e88c2e 100644 --- a/CVE-2024/CVE-2024-355xx/CVE-2024-35553.json +++ b/CVE-2024/CVE-2024-355xx/CVE-2024-35553.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35553", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-22T14:15:09.223", - "lastModified": "2024-05-22T14:30:41.953", + "lastModified": "2024-08-01T13:52:41.867", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que idccms v1.35 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /admin/infoMove_deal.php?mudi=add&nohrefStr=close." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 8.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/bearman113/1.md/blob/main/21/csrf.md", diff --git a/CVE-2024/CVE-2024-355xx/CVE-2024-35578.json b/CVE-2024/CVE-2024-355xx/CVE-2024-35578.json index 01df2d47af7..304dac94f18 100644 --- a/CVE-2024/CVE-2024-355xx/CVE-2024-35578.json +++ b/CVE-2024/CVE-2024-355xx/CVE-2024-35578.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35578", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-20T18:15:10.650", - "lastModified": "2024-05-20T19:34:58.277", + "lastModified": "2024-08-01T13:52:42.763", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Tenda AX1806 v1.0.0.1 contiene un desbordamiento de pila a trav\u00e9s del par\u00e1metro adv.iptv.stballvlans en la funci\u00f3n formSetIptv." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://detailed-stetson-767.notion.site/Tenda-AX1806-Buffer-Overflow-in-formSetIptv-cebf9202122a4582ae86c5253b3f6da3?pvs=4", diff --git a/CVE-2024/CVE-2024-355xx/CVE-2024-35583.json b/CVE-2024/CVE-2024-355xx/CVE-2024-35583.json index 2a89c468519..ebeb4748a5a 100644 --- a/CVE-2024/CVE-2024-355xx/CVE-2024-35583.json +++ b/CVE-2024/CVE-2024-355xx/CVE-2024-35583.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35583", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T20:16:36.100", - "lastModified": "2024-05-29T13:02:09.280", + "lastModified": "2024-08-01T13:52:43.587", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de Cross-site scripting (XSS) en Sourcecodester Laboratory Management System v1.0 permite a los atacantes ejecutar scripts web o HTML arbitrario a trav\u00e9s de un payload manipulado inyectado en el campo de entrada Comentarios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/r04i7/CVE/blob/main/CVE-2024-35583.md", diff --git a/CVE-2024/CVE-2024-356xx/CVE-2024-35670.json b/CVE-2024/CVE-2024-356xx/CVE-2024-35670.json index 5c264bf7ff0..abc82af30e4 100644 --- a/CVE-2024/CVE-2024-356xx/CVE-2024-35670.json +++ b/CVE-2024/CVE-2024-356xx/CVE-2024-35670.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35670", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-04T19:20:08.777", - "lastModified": "2024-06-11T14:32:50.147", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:52:44.810", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -69,6 +69,16 @@ "value": "CWE-287" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36073.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36073.json index c1a5acbac02..8b715ccf2d3 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36073.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36073.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36073", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-27T21:15:15.420", - "lastModified": "2024-06-28T10:27:00.920", + "lastModified": "2024-08-01T13:52:46.217", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Netwrix CoSoSys Endpoint Protector hasta 5.9.3 y CoSoSys Unify hasta 7.0.6 contienen una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el componente de sombreado de Endpoint Protector y el agente Unify que permite a un atacante con acceso administrativo a Endpoint Protector o al servidor Unify sobrescribir la configuraci\u00f3n confidencial y posteriormente ejecutar comandos del sistema con privilegios de SYSTEM/root en un endpoint del cliente elegido." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://helpcenter.netwrix.com/bundle/z-kb-articles-salesforce/page/kA0Qk0000001E5lKAE.html", diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36432.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36432.json index 79741ee28af..968ecfd1053 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36432.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36432.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36432", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-15T19:15:02.593", - "lastModified": "2024-07-16T13:43:58.773", + "lastModified": "2024-08-01T13:52:48.333", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1246" + } + ] + } + ], "references": [ { "url": "https://www.supermicro.com/en/support/security_center#%21advisories", diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36433.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36433.json index 7a1cbb79eb6..335ce960968 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36433.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36433.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36433", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-15T19:15:02.837", - "lastModified": "2024-07-16T13:43:58.773", + "lastModified": "2024-08-01T13:52:49.060", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], "references": [ { "url": "https://www.supermicro.com/en/support/security_BIOS_Jul_2024", diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36434.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36434.json index 0f3e90d676b..d26c650a051 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36434.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36434.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36434", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-15T19:15:03.053", - "lastModified": "2024-07-16T13:43:58.773", + "lastModified": "2024-08-01T13:52:49.800", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], "references": [ { "url": "https://www.supermicro.com/en/support/security_BIOS_Jul_2024", diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36435.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36435.json index dcf7d5bf5c2..08704575d8f 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36435.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36435.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36435", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-11T21:15:12.507", - "lastModified": "2024-07-12T12:49:11.340", + "lastModified": "2024-08-01T13:52:50.527", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://www.supermicro.com/zh_tw/support/security_BMC_IPMI_Jul_2024", diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36438.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36438.json index 642ada1906c..34440f3d10a 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36438.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36438.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36438", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-15T19:15:03.320", - "lastModified": "2024-07-16T13:43:58.773", + "lastModified": "2024-08-01T13:52:51.240", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,50 @@ "value": "eLinkSmart Hidden Smart Cabinet Lock 2024-05-22 tiene un control de acceso incorrecto y no realiza una verificaci\u00f3n de autorizaci\u00f3n, lo que puede provocar la duplicaci\u00f3n de tarjetas y otros ataques." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1263" + }, + { + "lang": "en", + "value": "CWE-284" + }, + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], "references": [ { "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-044.txt", diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36454.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36454.json index aca03f4280e..60310db1574 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36454.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36454.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36454", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-06-12T06:15:09.127", - "lastModified": "2024-06-13T18:36:09.013", + "lastModified": "2024-08-01T13:52:52.033", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El problema del uso de recursos no inicializados existe en IPCOM EX2 Series (V01L0x Series) V01L07NF0201 y anteriores, y en IPCOM VE2 Series V01L07NF0201 y anteriores. Si se aprovecha esta vulnerabilidad, el sistema puede reiniciarse o suspenderse al recibir un paquete especialmente manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/jp/JVN25594256/", diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36455.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36455.json index 88ce29ddc42..0a1a9431029 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36455.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36455.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36455", "sourceIdentifier": "secure@symantec.com", "published": "2024-07-15T14:15:02.700", - "lastModified": "2024-07-16T13:43:58.773", + "lastModified": "2024-08-01T13:52:52.813", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -61,6 +61,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-665" + } + ] + } + ], "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24678", diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36456.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36456.json index 8e232f76fd1..bf7783f30cb 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36456.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36456.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36456", "sourceIdentifier": "secure@symantec.com", "published": "2024-07-15T14:15:02.827", - "lastModified": "2024-07-16T13:43:58.773", + "lastModified": "2024-08-01T13:52:53.540", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -61,6 +61,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24678", diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36475.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36475.json index 25abf5fe7bf..7ab788b5371 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36475.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36475.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36475", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-07-17T09:15:03.013", - "lastModified": "2024-07-17T13:34:20.520", + "lastModified": "2024-08-01T13:52:54.403", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Las series FutureNet NXR, VXR y WXR proporcionadas por Century Systems Co., Ltd. contienen una vulnerabilidad de c\u00f3digo de depuraci\u00f3n activa. Si un usuario que sabe c\u00f3mo utilizar la funci\u00f3n de depuraci\u00f3n inicia sesi\u00f3n en el producto, se puede utilizar la funci\u00f3n de depuraci\u00f3n y se puede ejecutar un comando arbitrario del sistema operativo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-489" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/vu/JVNVU96424864/", diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36480.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36480.json index b4df9dcb22e..da8751433cf 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36480.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36480.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36480", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-06-19T07:15:46.340", - "lastModified": "2024-06-20T12:44:01.637", + "lastModified": "2024-08-01T13:52:55.747", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Existe un problema de uso de credenciales codificadas en Ricoh Streamline NX PC Client versi\u00f3n 3.7.2 y versiones anteriores. Si se explota esta vulnerabilidad, un atacante puede obtener la cuenta LocalSystem de la PC donde est\u00e1 instalado el producto. Como resultado, es posible que se realicen operaciones no deseadas en la PC." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/jp/JVN00442488/", diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36491.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36491.json index 5efc5c28d07..cc00c85356d 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36491.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36491.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36491", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-07-17T09:15:03.090", - "lastModified": "2024-07-17T13:34:20.520", + "lastModified": "2024-08-01T13:52:56.787", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Las series FutureNet NXR, VXR y WXR proporcionadas por Century Systems Co., Ltd. permiten que un atacante remoto no autenticado ejecute un comando arbitrario del sistema operativo, obtenga y/o altere informaci\u00f3n confidencial y pueda provocar una condici\u00f3n de denegaci\u00f3n de servicio (DoS)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/vu/JVNVU96424864/", diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36522.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36522.json index a28bfa7930b..5f57ec47c9f 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36522.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36522.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36522", "sourceIdentifier": "security@apache.org", "published": "2024-07-12T13:15:11.867", - "lastModified": "2024-07-12T16:34:58.687", + "lastModified": "2024-08-01T13:52:58.033", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "La configuraci\u00f3n predeterminada de XSLTResourceStream.java es vulnerable a la ejecuci\u00f3n remota de c\u00f3digo mediante inyecci\u00f3n XSLT cuando se procesa entrada de una fuente que no es de confianza sin validaci\u00f3n. Se recomienda a los usuarios actualizar a las versiones 10.1.0, 9.18.0 u 8.16.0, que solucionan este problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36526.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36526.json index 94cce9c84e1..30e6865139d 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36526.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36526.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36526", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T17:15:19.430", - "lastModified": "2024-07-09T18:18:38.713", + "lastModified": "2024-08-01T13:52:58.227", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que ZKTeco ZKBio CVSecurity v6.1.1 contiene una clave criptogr\u00e1fica codificada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-259" + } + ] + } + ], "references": [ { "url": "https://github.com/mrojz/ZKT-Bio-CVSecurity/blob/main/CVE-2024-36526.md", diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36531.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36531.json index 8321b8801ea..c1c34f586a9 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36531.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36531.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36531", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-10T15:15:52.550", - "lastModified": "2024-06-10T18:06:22.600", + "lastModified": "2024-08-01T13:52:59.007", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "nukeviet v.4.5 y anteriores y nukeviet-egov v.1.2.02 y anteriores son vulnerables a la ejecuci\u00f3n de c\u00f3digo arbitrario a trav\u00e9s del componente /admin/extensions/upload.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://mat4mee.notion.site/Module-upload-in-nukeViet-leads-to-RCE-01ff3ff4c80d402d8c7c8a2b15a24c33", diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36533.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36533.json index 1ef267e998a..270a82e22ee 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36533.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36533.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36533", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T20:15:03.903", - "lastModified": "2024-07-25T12:36:39.947", + "lastModified": "2024-08-01T13:52:59.810", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Los permisos inseguros en volcano v1.8.2 permiten a los atacantes acceder a datos confidenciales y escalar privilegios obteniendo el token de la cuenta de servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1259" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/HouqiyuA/a0e05a26ecc80bd970ac4649faecc930", diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36535.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36535.json index 9a6325b5ecf..7869543a461 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36535.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36535.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36535", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T20:15:04.030", - "lastModified": "2024-07-25T12:36:39.947", + "lastModified": "2024-08-01T13:53:00.610", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Los permisos inseguros en meshery v0.7.51 permiten a los atacantes acceder a datos confidenciales y escalar privilegios obteniendo el token de la cuenta de servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/HouqiyuA/2950c3993cdeff23afcbd73ba7a33879", diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36536.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36536.json index e279971aa02..fdaa1255798 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36536.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36536.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36536", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T19:15:04.293", - "lastModified": "2024-07-25T12:36:39.947", + "lastModified": "2024-08-01T13:53:01.390", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Los permisos inseguros en fabedge v0.8.1 permiten a los atacantes acceder a datos confidenciales y escalar privilegios obteniendo el token de la cuenta de servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/HouqiyuA/381f100f2ba82a8ada03994aac5bb2e8", diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36537.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36537.json index cd370a4ed5f..d8ae9581b6a 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36537.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36537.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36537", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T19:15:04.373", - "lastModified": "2024-07-25T12:36:39.947", + "lastModified": "2024-08-01T13:53:02.180", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Los permisos inseguros en cert-manager v1.14.4 permiten a los atacantes acceder a datos confidenciales y escalar privilegios al obtener el token de la cuenta de servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/HouqiyuA/27879a6366a65fcd5f6c6fcbcf68d8e3", diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36538.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36538.json index 5c90546f056..fb13685a8ba 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36538.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36538.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36538", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T19:15:04.487", - "lastModified": "2024-07-25T12:36:39.947", + "lastModified": "2024-08-01T13:53:02.957", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Los permisos inseguros en caos-mesh v2.6.3 permiten a los atacantes acceder a datos confidenciales y escalar privilegios obteniendo el token de la cuenta de servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-278" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/HouqiyuA/f06d1fa07b5287b862c1e0b288f301e5", diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36539.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36539.json index 1fb3422b373..822b3257411 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36539.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36539.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36539", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T17:15:10.767", - "lastModified": "2024-07-25T12:36:39.947", + "lastModified": "2024-08-01T13:53:03.723", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Los permisos inseguros en contour v1.28.3 permiten a los atacantes acceder a datos confidenciales y escalar privilegios obteniendo el token de la cuenta de servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-277" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/HouqiyuA/c92f9ec979653dceeea947afd0b47a80", diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36540.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36540.json index 78d068a6ff5..2938ac868d6 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36540.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36540.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36540", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T17:15:10.827", - "lastModified": "2024-07-25T12:36:39.947", + "lastModified": "2024-08-01T13:53:04.590", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Los permisos inseguros en external-secrets v0.9.16 permiten a los atacantes acceder a datos confidenciales y escalar privilegios obteniendo el token de la cuenta de servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/HouqiyuA/a4834f3c8450f9d89e2bc4d5c4beef6a", diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36541.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36541.json index 732ff1c5884..ea79e6cbe95 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36541.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36541.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36541", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T16:15:06.870", - "lastModified": "2024-07-25T17:44:25.170", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:53:05.347", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-276" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36542.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36542.json index ff3732d386e..707228c5ba6 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36542.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36542.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36542", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-25T17:15:10.710", - "lastModified": "2024-07-26T12:38:41.683", + "lastModified": "2024-08-01T13:53:06.130", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Los permisos inseguros en kuma v2.7.0 permiten a los atacantes acceder a datos confidenciales y escalar privilegios obteniendo el token de la cuenta de servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/HouqiyuA/e1685843b6f42b47dbf97e2e92e63428", diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36572.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36572.json index 622d613a400..fe189bd5ccb 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36572.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36572.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36572", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-30T20:15:03.630", - "lastModified": "2024-07-31T12:57:02.300", + "lastModified": "2024-08-01T13:53:06.967", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Prototype pollution en allpro form-manager 0.7.4 permite a los atacantes ejecutar c\u00f3digo arbitrario y causar otros impactos a trav\u00e9s de las funciones setDefaults, mergeBranch y Object.setObjectValue." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/mestrtee/1771ab4fba733ca898b6e2463dc6ed19", diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36573.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36573.json index 58fdcebf803..59d09e03c73 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36573.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36573.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36573", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-17T16:15:14.947", - "lastModified": "2024-06-20T12:44:22.977", + "lastModified": "2024-08-01T13:53:08.237", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "almela obx anterior a v.0.0.4 tiene un problema de contaminaci\u00f3n de prototipos que permite la ejecuci\u00f3n de c\u00f3digo arbitrario a trav\u00e9s de obx/build/index.js:656), reduce (@almela/obx/build/index.js:470), Object.set (obx/build/index.js:269) componente." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/mestrtee/fd8181bbc180d775f8367a2b9e0ffcd1", diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36581.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36581.json index 71a442865cc..260777f3016 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36581.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36581.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36581", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-17T15:15:51.130", - "lastModified": "2024-06-20T12:44:22.977", + "lastModified": "2024-08-01T13:53:09.057", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema de contaminaci\u00f3n de prototipos en abw Badger-database 1.2.1 permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s de dist/badger-database.esm." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/mestrtee/f6b2ed1b3b4bc0df994c7455fc6110bd", diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36587.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36587.json index 4842745022b..389fa05d91c 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36587.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36587.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36587", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-13T19:15:51.977", - "lastModified": "2024-06-17T12:43:31.090", + "lastModified": "2024-08-01T13:53:10.050", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Los permisos inseguros en DNSCrypt-proxy v2.0.0alpha9 a v2.1.5 permiten a atacantes sin privilegios escalar privilegios a root sobrescribiendo el binario dnscrypt-proxy." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + } + ] + } + ], "references": [ { "url": "https://github.com/go-compile/security-advisories/blob/master/vulns/CVE-2024-36587.md", diff --git a/CVE-2024/CVE-2024-366xx/CVE-2024-36674.json b/CVE-2024/CVE-2024-366xx/CVE-2024-36674.json index 0ca1f347012..fd2141cb22a 100644 --- a/CVE-2024/CVE-2024-366xx/CVE-2024-36674.json +++ b/CVE-2024/CVE-2024-366xx/CVE-2024-36674.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36674", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-03T16:15:08.897", - "lastModified": "2024-06-03T19:23:17.807", + "lastModified": "2024-08-01T13:53:10.830", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "LyLme_spage v1.9.5 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s de admin/link.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/LyLme/lylme_spage/issues/91", diff --git a/CVE-2024/CVE-2024-366xx/CVE-2024-36682.json b/CVE-2024/CVE-2024-366xx/CVE-2024-36682.json index f971931b7bf..72b132fbb60 100644 --- a/CVE-2024/CVE-2024-366xx/CVE-2024-36682.json +++ b/CVE-2024/CVE-2024-366xx/CVE-2024-36682.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36682", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-24T22:15:10.377", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-08-01T13:53:12.263", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el m\u00f3dulo \"Configuraci\u00f3n del tema\" (pk_themesettings) <= 1.8.8 de Promokit.eu para PrestaShop, un invitado puede descargar todos los correos electr\u00f3nicos recopilados mientras SHOP est\u00e1 en modo de mantenimiento. Debido a la falta de control de permisos, un invitado puede acceder al archivo de texto que recopila el correo electr\u00f3nico cuando el mantenimiento est\u00e1 habilitado, lo que puede provocar una filtraci\u00f3n de informaci\u00f3n personal." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-359" + } + ] + } + ], "references": [ { "url": "https://security.friendsofpresta.org/modules/2024/06/20/pk_themesettings.html", diff --git a/CVE-2024/CVE-2024-366xx/CVE-2024-36684.json b/CVE-2024/CVE-2024-366xx/CVE-2024-36684.json index db99383fcd1..fca935555fb 100644 --- a/CVE-2024/CVE-2024-366xx/CVE-2024-36684.json +++ b/CVE-2024/CVE-2024-366xx/CVE-2024-36684.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36684", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-19T21:15:57.680", - "lastModified": "2024-06-20T12:43:25.663", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-01T13:53:13.027", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "En el m\u00f3dulo \"Enlaces personalizados\" (pk_customlinks) <= 2.3 de Promokit.eu para PrestaShop, un invitado puede realizar una inyecci\u00f3n SQL. El script ajax.php tiene una llamada SQL sensible que puede ejecutarse con una llamada http trivial y explotarse para falsificar una inyecci\u00f3n SQL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://security.friendsofpresta.org/modules/2024/06/18/pk_customlinks.html", diff --git a/CVE-2024/CVE-2024-367xx/CVE-2024-36732.json b/CVE-2024/CVE-2024-367xx/CVE-2024-36732.json index 7fd86c00b1f..934507dcfe6 100644 --- a/CVE-2024/CVE-2024-367xx/CVE-2024-36732.json +++ b/CVE-2024/CVE-2024-367xx/CVE-2024-36732.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36732", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-06T19:15:57.937", - "lastModified": "2024-06-07T14:56:05.647", + "lastModified": "2024-08-01T13:53:14.287", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en OneFlow-Inc. Oneflow v0.9.1 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) cuando se procesa una matriz vac\u00eda con oneflow.tensordot." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Redmept1on/3feef7639b2bc7891d0cfda6d932adfd", diff --git a/CVE-2024/CVE-2024-367xx/CVE-2024-36742.json b/CVE-2024/CVE-2024-367xx/CVE-2024-36742.json index e4b42054d90..9bda900c36d 100644 --- a/CVE-2024/CVE-2024-367xx/CVE-2024-36742.json +++ b/CVE-2024/CVE-2024-367xx/CVE-2024-36742.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36742", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-06T17:15:51.157", - "lastModified": "2024-06-07T14:56:05.647", + "lastModified": "2024-08-01T13:53:15.053", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en el par\u00e1metro oneflow.scatter_nd OneFlow-Inc. Oneflow v0.9.1 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) cuando el par\u00e1metro de \u00edndice excede el rango de forma." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Redmept1on/761f0d0d09a912b8b93e0cf8dd877e94", diff --git a/CVE-2024/CVE-2024-367xx/CVE-2024-36755.json b/CVE-2024/CVE-2024-367xx/CVE-2024-36755.json index 5f045c640b0..0746630040e 100644 --- a/CVE-2024/CVE-2024-367xx/CVE-2024-36755.json +++ b/CVE-2024/CVE-2024-367xx/CVE-2024-36755.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36755", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-27T21:15:15.700", - "lastModified": "2024-06-28T10:27:00.920", + "lastModified": "2024-08-01T13:53:15.830", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "D-Link DIR-1950 hasta v1.11B03 no valida los certificados SSL al solicitar la \u00faltima versi\u00f3n del firmware y la URL de descarga. Esto puede permitir a los atacantes degradar la versi\u00f3n del firmware o cambiar la URL de descarga mediante un ataque de intermediario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-599" + } + ] + } + ], "references": [ { "url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10401", diff --git a/CVE-2024/CVE-2024-367xx/CVE-2024-36783.json b/CVE-2024/CVE-2024-367xx/CVE-2024-36783.json index feb9e11508b..ce87ca1a892 100644 --- a/CVE-2024/CVE-2024-367xx/CVE-2024-36783.json +++ b/CVE-2024/CVE-2024-367xx/CVE-2024-36783.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36783", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-03T20:15:09.370", - "lastModified": "2024-06-04T16:57:41.057", + "lastModified": "2024-08-01T13:53:16.600", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK LR350 V9.3.5u.6369_B20220309 contiene una inyecci\u00f3n de comando a trav\u00e9s del par\u00e1metro host_time en la funci\u00f3n NTPSyncWithHost." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/totolink%20LR350/NTPSyncWithHost/README.md", diff --git a/CVE-2024/CVE-2024-367xx/CVE-2024-36787.json b/CVE-2024/CVE-2024-367xx/CVE-2024-36787.json index 01cbabc107f..7d5705452e6 100644 --- a/CVE-2024/CVE-2024-367xx/CVE-2024-36787.json +++ b/CVE-2024/CVE-2024-367xx/CVE-2024-36787.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36787", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-07T15:15:50.140", - "lastModified": "2024-06-07T19:24:09.243", + "lastModified": "2024-08-01T13:53:17.367", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Un problema en Netgear WNR614 JNR1010V2 N300-V1.1.0.54_1.0.1 permite a los atacantes eludir la autenticaci\u00f3n y acceder a la interfaz administrativa a trav\u00e9s de vectores no especificados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://redfoxsec.com/blog/security-advisory-multiple-vulnerabilities-in-netgear-wnr614-router/", diff --git a/CVE-2024/CVE-2024-368xx/CVE-2024-36821.json b/CVE-2024/CVE-2024-368xx/CVE-2024-36821.json index a800cf058f1..0ee893d1a76 100644 --- a/CVE-2024/CVE-2024-368xx/CVE-2024-36821.json +++ b/CVE-2024/CVE-2024-368xx/CVE-2024-36821.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36821", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-11T18:15:13.927", - "lastModified": "2024-06-17T21:15:50.960", + "lastModified": "2024-08-01T13:53:17.693", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Permisos inseguros en Linksys Velop WiFi 5 (WHW01v1) 1.1.13.202617 permite a los atacantes escalar privilegios de Invitado a ra\u00edz a trav\u00e9s de un directory traversal." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-379" + } + ] + } + ], "references": [ { "url": "https://downloads.linksys.com/support/assets/releasenotes/WHW01_VLP01_1.1.13.202617_Customer_Release_Notes.txt", diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3632.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3632.json index 94819ef6801..61a8b11c360 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3632.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3632.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3632", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:02.617", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:56:37.647", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Smart Image Gallery de WordPress anterior a 1.0.19 no tiene activada la verificaci\u00f3n CSRF al actualizar su configuraci\u00f3n, lo que podr\u00eda permitir a los atacantes hacer que un administrador que haya iniciado sesi\u00f3n los cambie mediante un ataque CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/9b11682d-4705-4595-943f-0fa093d0b644/", diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3660.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3660.json index f733e2a2fc5..d773638b04d 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3660.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3660.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3660", "sourceIdentifier": "cret@cert.org", "published": "2024-04-16T21:15:08.603", - "lastModified": "2024-04-17T12:48:31.863", + "lastModified": "2024-08-01T13:56:38.227", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Una vulnerabilidad de inyecci\u00f3n de c\u00f3digo arbitrario en el framework Keras de TensorFlow (<2.13) permite a los atacantes ejecutar c\u00f3digo arbitrario con los mismos permisos que la aplicaci\u00f3n utilizando un modelo que permite c\u00f3digo arbitrario independientemente de la aplicaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://kb.cert.org/vuls/id/253266", diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3669.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3669.json index 04fe357a242..dbb8a376265 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3669.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3669.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3669", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-30T06:15:02.487", - "lastModified": "2024-07-30T13:32:45.943", + "lastModified": "2024-08-01T13:56:38.537", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": " El complemento Web Directory Free de WordPress anterior a 1.7.2 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross Site Scripting reflejado que podr\u00eda usarse contra usuarios con privilegios elevados, como el administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 4.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/3c37c9a9-1424-427a-adc7-c2336a47e9cf/", diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3692.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3692.json index a40fdc6e9d0..23d2341af98 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3692.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3692.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3692", "sourceIdentifier": "contact@wpscan.com", "published": "2024-05-03T06:15:14.590", - "lastModified": "2024-05-03T12:48:41.067", + "lastModified": "2024-08-01T13:56:38.743", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Gutenverse WordPress anterior a 1.9.1 no valida la opci\u00f3n htmlTag en varios de sus bloques antes de devolverlo a una p\u00e1gina/publicaci\u00f3n donde est\u00e1 incrustado el bloque, lo que podr\u00eda permitir a los usuarios con el rol de colaborador y superior realizar ataques de Cross-Site Scripting Almacenado" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/6f100f85-3a76-44be-8092-06eb8595b0c9/", diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37016.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37016.json index d551b7c6e8c..7979dcaef1b 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37016.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37016.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37016", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-15T18:15:04.337", - "lastModified": "2024-07-16T13:43:58.773", + "lastModified": "2024-08-01T13:53:20.103", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La alarma de puerta inal\u00e1mbrica Mengshen M70 2024-05-24 permite la omisi\u00f3n de autenticaci\u00f3n mediante un enfoque de captura-reproducci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-294" + } + ] + } + ], "references": [ { "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-045.txt", diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37084.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37084.json index a3394127828..612d3932f27 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37084.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37084.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37084", "sourceIdentifier": "security@vmware.com", "published": "2024-07-25T10:15:07.260", - "lastModified": "2024-07-25T12:36:39.947", + "lastModified": "2024-08-01T13:53:22.230", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://spring.io/security/cve-2024-37084", diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37085.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37085.json index d7623bc5807..d94c549d0ec 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37085.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37085.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37085", "sourceIdentifier": "security@vmware.com", "published": "2024-06-25T15:15:12.377", - "lastModified": "2024-07-31T14:46:29.270", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:53:23.320", + "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2024-07-30", "cisaActionDue": "2024-08-20", @@ -73,6 +73,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-305" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37135.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37135.json index c149267853e..c384cab0ed9 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37135.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37135.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37135", "sourceIdentifier": "security_alert@emc.com", "published": "2024-07-31T14:15:06.373", - "lastModified": "2024-07-31T14:15:06.373", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "DM5500 5.16.0.0, contains an information disclosure vulnerability. A local attacker with high privileges could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable application with privileges of the compromised account." + }, + { + "lang": "es", + "value": "DM5500 5.16.0.0, contiene una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n. Un atacante local con altos privilegios podr\u00eda explotar esta vulnerabilidad, lo que dar\u00eda lugar a la divulgaci\u00f3n de determinadas credenciales de usuario. Es posible que el atacante pueda utilizar las credenciales expuestas para acceder a la aplicaci\u00f3n vulnerable con los privilegios de la cuenta comprometida." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37381.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37381.json index b4d4f6588ce..df20b1b5c8b 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37381.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37381.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37381", "sourceIdentifier": "support@hackerone.com", "published": "2024-07-29T06:15:01.827", - "lastModified": "2024-07-29T14:12:08.783", + "lastModified": "2024-08-01T13:53:31.757", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-EPM-July-2024-for-EPM-2024", diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37385.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37385.json index b5f03918ee1..090d39b6370 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37385.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37385.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37385", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-07T04:15:30.720", - "lastModified": "2024-06-07T14:56:05.647", + "lastModified": "2024-08-01T13:53:32.450", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Roundcube Webmail anterior a 1.5.7 y 1.6.x anterior a 1.6.7 en Windows permite la inyecci\u00f3n de comandos a trav\u00e9s de im_convert_path e im_identify_path. NOTA: este problema existe debido a una soluci\u00f3n incompleta para CVE-2020-12641." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/roundcube/roundcubemail/commit/5ea9f37ce39374b6124586c0590fec7015d35d7f", diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37386.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37386.json index a75e92a453c..79f91173dc9 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37386.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37386.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37386", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-15T19:15:03.430", - "lastModified": "2024-07-24T16:15:06.970", + "lastModified": "2024-08-01T13:53:36.410", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en Stormshield Network Security (SNS) 4.0.0 a 4.3.25, 4.4.0 a 4.7.5 y 4.8.0. Ciertas manipulaciones permiten reiniciar en modo monousuario a pesar de la activaci\u00f3n del arranque seguro. Las siguientes versiones solucionan este problema: 4.3.27, 4.7.6 y 4.8.1." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://advisories.stormshield.eu/2024-017", diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37405.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37405.json index d1b74202eef..5d74cf19fdc 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37405.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37405.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37405", "sourceIdentifier": "support@hackerone.com", "published": "2024-07-12T16:15:03.207", - "lastModified": "2024-07-12T16:34:58.687", + "lastModified": "2024-08-01T13:53:37.273", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://hackerone.com/reports/2580062", diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37570.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37570.json index 99ca912d1e6..0596b8901cc 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37570.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37570.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37570", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-09T20:15:09.460", - "lastModified": "2024-06-12T16:32:34.513", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:53:45.687", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-75" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37619.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37619.json index 74a5a6e9107..c644e4211b9 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37619.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37619.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37619", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-17T14:15:10.943", - "lastModified": "2024-07-18T20:58:38.730", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:54:07.797", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37621.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37621.json index aa4e0781e4a..54b5e368afd 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37621.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37621.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37621", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-17T14:15:11.153", - "lastModified": "2024-06-20T12:44:22.977", + "lastModified": "2024-08-01T13:54:08.677", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,46 @@ "value": "Se descubri\u00f3 que StrongShop v1.0 conten\u00eda una vulnerabilidad de inyecci\u00f3n de plantilla del lado del servidor (SSTI) a trav\u00e9s del componente /shippingOptionConfig/index.blade.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1336" + }, + { + "lang": "en", + "value": "CWE-97" + } + ] + } + ], "references": [ { "url": "https://github.com/Hebing123/cve/issues/47", diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37632.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37632.json index 8f96b132716..84606d06d7c 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37632.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37632.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37632", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-13T19:15:52.357", - "lastModified": "2024-06-17T12:43:31.090", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-01T13:54:09.520", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,30 @@ "value": "Se descubri\u00f3 que TOTOLINK A3700R V9.1.2u.6165_20211012 conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro de contrase\u00f1a en la funci\u00f3n loginAuth." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK/A3700R/loginAuth/README.md", diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37663.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37663.json index 6dfe2ca871d..8ea2467a87b 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37663.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37663.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37663", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-17T18:15:17.653", - "lastModified": "2024-06-20T12:44:22.977", + "lastModified": "2024-08-01T13:54:09.780", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El enrutador Redmi RB03 v1.0.57 es vulnerable a ataques de mensajes de redireccionamiento ICMP falsificados. Un atacante en la misma WLAN que la v\u00edctima puede secuestrar el tr\u00e1fico entre la v\u00edctima y cualquier servidor remoto enviando mensajes de redireccionamiento ICMP falsificados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 0.0, + "baseSeverity": "NONE" + }, + "exploitabilityScore": 1.5, + "impactScore": 0.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-940" + } + ] + } + ], "references": [ { "url": "https://github.com/ouuan/router-vuln-report/blob/master/icmp-redirect/redmi-rb03-redirect.md", diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37664.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37664.json index 842a80c8bfc..e48c32cc959 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37664.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37664.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37664", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-17T18:15:17.743", - "lastModified": "2024-06-20T12:44:22.977", + "lastModified": "2024-08-01T13:54:10.727", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El enrutador Redmi RB03 v1.0.57 es vulnerable a TCP DoS o ataques de secuestro. Un atacante en la misma WLAN que la v\u00edctima puede desconectar o secuestrar el tr\u00e1fico entre la v\u00edctima y cualquier servidor remoto enviando mensajes TCP RST falsificados para desalojar las asignaciones NAT en el enrutador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 0.0, + "baseSeverity": "NONE" + }, + "exploitabilityScore": 1.5, + "impactScore": 0.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-940" + } + ] + } + ], "references": [ { "url": "https://github.com/ouuan/router-vuln-report/blob/master/nat-rst/redmi-rb03-nat-rst.md", diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37676.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37676.json index a3433638236..4929f11aba7 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37676.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37676.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37676", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-20T16:15:13.917", - "lastModified": "2024-06-21T11:22:01.687", + "lastModified": "2024-08-01T13:54:11.730", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,46 @@ "value": "Un problema en htop-dev htop v.2.20 permite que un atacante local provoque un acceso fuera de los l\u00edmites en la funci\u00f3n Header_populateFromSettings." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "http://htop.com", diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37681.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37681.json index 8fd38adfef3..adca79be556 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37681.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37681.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37681", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-24T20:15:10.810", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-08-01T13:54:12.510", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema del sistema de gesti\u00f3n en segundo plano de Shanxi Internet Chuangxiang Technology Co., Ltd v1.0.1 permite que un atacante remoto provoque una denegaci\u00f3n de servicio a trav\u00e9s del componente index.html." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], "references": [ { "url": "https://github.com/dabaizhizhu/123/issues/6", diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37699.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37699.json index e71eb2b4b09..144caad14d2 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37699.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37699.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37699", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-20T18:15:12.920", - "lastModified": "2024-06-21T11:22:01.687", + "lastModified": "2024-08-01T13:54:13.280", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en DataLife Engine v.17.1 y anteriores es vulnerable a la inyecci\u00f3n SQL en dboption." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://dle-news.ru/pressrelease/1909-datalife-engine-v172-press-release.html", diff --git a/CVE-2024/CVE-2024-377xx/CVE-2024-37726.json b/CVE-2024/CVE-2024-377xx/CVE-2024-37726.json index 4b662aed8a3..c9ea3762af3 100644 --- a/CVE-2024/CVE-2024-377xx/CVE-2024-37726.json +++ b/CVE-2024/CVE-2024-377xx/CVE-2024-37726.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37726", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-03T14:15:06.120", - "lastModified": "2024-07-05T12:55:51.367", + "lastModified": "2024-08-01T13:54:14.057", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de permisos inseguros en Micro-Star International Co., Ltd MSI Center v.2.0.36.0 permite a un atacante local escalar privilegios a trav\u00e9s de la funci\u00f3n Exportar informaci\u00f3n del sistema en MSI.CentralServer.exe" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://github.com/carsonchan12345/CVE-2024-37726-MSI-Center-Local-Privilege-Escalation", diff --git a/CVE-2024/CVE-2024-377xx/CVE-2024-37765.json b/CVE-2024/CVE-2024-377xx/CVE-2024-37765.json index babbc518fa4..d7e796a03f8 100644 --- a/CVE-2024/CVE-2024-377xx/CVE-2024-37765.json +++ b/CVE-2024/CVE-2024-377xx/CVE-2024-37765.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37765", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T22:15:03.167", - "lastModified": "2024-07-02T12:09:16.907", + "lastModified": "2024-08-01T13:54:14.823", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Machform hasta la versi\u00f3n 19 se ve afectado por una inyecci\u00f3n SQL ciega autenticada en la p\u00e1gina de configuraci\u00f3n de la cuenta de usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/Atreb92/cve-2024-37765", diff --git a/CVE-2024/CVE-2024-377xx/CVE-2024-37769.json b/CVE-2024/CVE-2024-377xx/CVE-2024-37769.json index 2ee957f3ead..08170844825 100644 --- a/CVE-2024/CVE-2024-377xx/CVE-2024-37769.json +++ b/CVE-2024/CVE-2024-377xx/CVE-2024-37769.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37769", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-05T16:15:05.110", - "lastModified": "2024-07-08T16:37:28.323", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:54:15.670", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-278" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-377xx/CVE-2024-37798.json b/CVE-2024/CVE-2024-377xx/CVE-2024-37798.json index 19f7fb18fb3..44f58c4379d 100644 --- a/CVE-2024/CVE-2024-377xx/CVE-2024-37798.json +++ b/CVE-2024/CVE-2024-377xx/CVE-2024-37798.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37798", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-17T21:15:51.180", - "lastModified": "2024-06-20T12:44:22.977", + "lastModified": "2024-08-01T13:54:16.443", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de Cross-site scripting (XSS) en search-appointment.php en el Panel de administraci\u00f3n de Phpgurukul Beauty Parlor Management System 1.0 permite a atacantes remotos inyectar scripts web o HTML arbitrarios a trav\u00e9s del campo de entrada de b\u00fasqueda." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://cyberxtron.com/blog/cve-2024-37798---cross-site-scripting-xss-in-beauty-parlour-management-system--5187", diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37818.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37818.json index 2609b635265..818c5e9637b 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37818.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37818.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37818", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-20T19:15:50.260", - "lastModified": "2024-06-21T11:22:01.687", + "lastModified": "2024-08-01T13:54:17.330", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que Strapi v4.24.4 conten\u00eda Server-Side Request Forgeryr (SSRF) a trav\u00e9s del componente /strapi.io/_next/image. Esta vulnerabilidad permite a los atacantes escanear en busca de puertos abiertos o acceder a informaci\u00f3n confidencial mediante una solicitud GET manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], "references": [ { "url": "https://medium.com/%40barkadevaibhav491/server-side-request-forgery-in-strapi-e02d5fe218ab", diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37830.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37830.json index c7ebecf6d2a..ef5e193bc2a 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37830.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37830.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37830", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T20:15:11.683", - "lastModified": "2024-07-11T13:06:13.187", + "lastModified": "2024-08-01T13:54:18.747", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en Outline <= v0.76.1 permite a los atacantes redirigir a un usuario v\u00edctima a un sitio malicioso interceptando y cambiando la cookie de estado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], "references": [ { "url": "https://github.com/sysentr0py/CVEs/tree/main/CVE-2024-37830", diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37831.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37831.json index ec53211694a..06135226d05 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37831.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37831.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37831", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-14T20:15:11.777", - "lastModified": "2024-06-17T12:42:04.623", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-01T13:54:20.343", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Itsourcecode Payroll Management System 1.0 es vulnerable a la inyecci\u00f3n SQL en payroll_items.php a trav\u00e9s del par\u00e1metro ID." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/ganzhi-qcy/cve/issues/5", diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37843.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37843.json index 661ba601406..e301abe88d0 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37843.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37843.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37843", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-25T21:15:59.770", - "lastModified": "2024-07-19T18:37:07.720", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:54:21.843", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37857.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37857.json index f66803df163..ee91505aae2 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37857.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37857.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37857", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-29T19:15:12.257", - "lastModified": "2024-07-30T13:33:30.653", + "lastModified": "2024-08-01T13:54:22.703", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Vulnerabilidad de inyecci\u00f3n SQL en Lost and Found Information System 1.0 permite a un atacante remoto escalar privilegios mediante el par\u00e1metro id a php-lfis/admin/categories/view_category.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "http://lost.com", diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37858.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37858.json index 40f7f2c4b77..bff90b4253a 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37858.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37858.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37858", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-29T19:15:12.323", - "lastModified": "2024-07-30T13:33:30.653", + "lastModified": "2024-08-01T13:54:23.510", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Vulnerabilidad de inyecci\u00f3n SQL en Lost and Found Information System 1.0 permite a un atacante remoto escalar privilegios a trav\u00e9s del par\u00e1metro id a php-lfis/admin/categories/manage_category.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "http://lost.com", diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37859.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37859.json index cb374cdbe8e..0e25730a08f 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37859.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37859.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37859", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-29T19:15:12.390", - "lastModified": "2024-07-30T13:33:30.653", + "lastModified": "2024-08-01T13:54:24.283", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de Cross Site Scripting en Lost and Found Information System 1.0 permite a un atacante remoto escalar privilegios a trav\u00e9s del par\u00e1metro page a php-lfis/admin/index.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "http://lost.com", diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37873.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37873.json index a70c0508479..6035ade2639 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37873.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37873.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37873", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T20:15:11.923", - "lastModified": "2024-07-11T13:06:13.187", + "lastModified": "2024-08-01T13:54:25.740", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en view_payslip.php en el proyecto Itsourcecode Payroll Management System en PHP con c\u00f3digo fuente 1.0 permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s del par\u00e1metro id." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/TThuyyy/cve1/issues/2", diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37877.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37877.json index 0e7fc4b3425..db6fdf8ef5c 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37877.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37877.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37877", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-13T16:15:11.450", - "lastModified": "2024-06-13T18:35:19.777", + "lastModified": "2024-08-01T13:54:27.070", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "UERANSIM anterior a 3.2.6 permite la lectura fuera de los l\u00edmites cuando se env\u00eda un paquete RLS a gNodeB con una longitud de PDU con formato incorrecto. Esto ocurre en la funci\u00f3n readOctetString en src/utils/octet_view.cpp y en la funci\u00f3n DecodeRlsMessage en src/lib/rls/rls_pdu.cpp" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://github.com/f4rs1ght/vuln-research/tree/main/CVE-2024-37877", diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37880.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37880.json index be50b21f5db..dd50fe1de4c 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37880.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37880.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37880", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-10T02:15:47.160", - "lastModified": "2024-06-12T16:30:15.053", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:54:27.953", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-203" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37881.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37881.json index 846744d285e..0244723a6e9 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37881.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37881.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37881", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-06-19T07:15:46.743", - "lastModified": "2024-06-20T12:44:01.637", + "lastModified": "2024-08-01T13:54:28.750", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,46 @@ "value": "SiteGuard WP Plugin proporciona una funcionalidad para personalizar la ruta a la p\u00e1gina de inicio de sesi\u00f3n wp-login.php e implementa una medida para evitar la redirecci\u00f3n desde otras URL. Sin embargo, las versiones del complemento SiteGuard WP anteriores a la 1.7.7 no implementaron una medida para evitar la redirecci\u00f3n desde wp-register.php. Como resultado, la ruta personalizada a la p\u00e1gina de inicio de sesi\u00f3n puede quedar expuesta." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-201" + }, + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/jp/JVN60331535/", diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37898.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37898.json index 3fb1da90e3a..1b84aa5bb74 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37898.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37898.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37898", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-31T16:15:03.197", - "lastModified": "2024-07-31T16:15:03.197", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. When a user has view but not edit right on a page in XWiki, that user can delete the page and replace it by a page with new content without having delete right. The previous version of the page is moved into the recycle bin and can be restored from there by an admin. As the user is recorded as deleter, the user would in theory also be able to view the deleted content, but this is not directly possible as rights of the previous version are transferred to the new page and thus the user still doesn't have view right on the page. It therefore doesn't seem to be possible to exploit this to gain any rights. This has been patched in XWiki 14.10.21, 15.5.5 and 15.10.6 by cancelling save operations by users when a new document shall be saved despite the document's existing already." + }, + { + "lang": "es", + "value": "XWiki Platform es una plataforma wiki gen\u00e9rica que ofrece servicios de ejecuci\u00f3n para aplicaciones creadas sobre ella. Cuando un usuario tiene derecho de ver pero no de editar en una p\u00e1gina en XWiki, ese usuario puede eliminar la p\u00e1gina y reemplazarla por una p\u00e1gina con contenido nuevo sin tener derecho de eliminaci\u00f3n. La versi\u00f3n anterior de la p\u00e1gina se mueve a la papelera de reciclaje y un administrador puede restaurarla desde all\u00ed. Como el usuario est\u00e1 registrado como eliminador, en teor\u00eda el usuario tambi\u00e9n podr\u00eda ver el contenido eliminado, pero esto no es directamente posible ya que los derechos de la versi\u00f3n anterior se transfieren a la nueva p\u00e1gina y, por lo tanto, el usuario a\u00fan no puede verlo. justo en la p\u00e1gina. Por lo tanto, no parece posible explotar esto para obtener ning\u00fan derecho. Esto se ha parcheado en XWiki 14.10.21, 15.5.5 y 15.10.6 cancelando las operaciones de guardado por parte de los usuarios cuando se guarda un nuevo documento a pesar de que ya existe." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37900.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37900.json index fffeff4f054..d56ba3e7877 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37900.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37900.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37900", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-31T16:15:03.440", - "lastModified": "2024-07-31T16:15:03.440", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. When uploading an attachment with a malicious filename, malicious JavaScript code could be executed. This requires a social engineering attack to get the victim into uploading a file with a malicious name. The malicious code is solely executed during the upload and affects only the user uploading the attachment. While this allows performing actions in the name of that user, it seems unlikely that a user wouldn't notice the malicious filename while uploading the attachment. This has been patched in XWiki 14.10.21, 15.5.5, 15.10.6 and 16.0.0." + }, + { + "lang": "es", + "value": " XWiki Platform es una plataforma wiki gen\u00e9rica que ofrece servicios de ejecuci\u00f3n para aplicaciones creadas sobre ella. Al cargar un archivo adjunto con un nombre de archivo malicioso, se podr\u00eda ejecutar c\u00f3digo JavaScript malicioso. Esto requiere un ataque de ingenier\u00eda social para lograr que la v\u00edctima cargue un archivo con un nombre malicioso. El c\u00f3digo malicioso se ejecuta \u00fanicamente durante la carga y afecta \u00fanicamente al usuario que carga el archivo adjunto. Si bien esto permite realizar acciones en nombre de ese usuario, parece poco probable que un usuario no note el nombre de archivo malicioso al cargar el archivo adjunto. Esto ha sido parcheado en XWiki 14.10.21, 15.5.5, 15.10.6 y 16.0.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37901.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37901.json index 4b7abd1cae8..b913afb342f 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37901.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37901.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37901", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-31T16:15:03.683", - "lastModified": "2024-07-31T16:15:03.683", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with edit right on any page can perform arbitrary remote code execution by adding instances of `XWiki.SearchSuggestConfig` and `XWiki.SearchSuggestSourceClass` to their user profile or any other page. This compromises the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.21, 15.5.5 and 15.10.2." + }, + { + "lang": "es", + "value": " XWiki Platform es una plataforma wiki gen\u00e9rica que ofrece servicios de ejecuci\u00f3n para aplicaciones creadas sobre ella. Cualquier usuario con derecho de edici\u00f3n en cualquier p\u00e1gina puede realizar la ejecuci\u00f3n remota de c\u00f3digo arbitrario agregando instancias de `XWiki.SearchSuggestConfig` y `XWiki.SearchSuggestSourceClass` a su perfil de usuario o a cualquier otra p\u00e1gina. Esto compromete la confidencialidad, integridad y disponibilidad de toda la instalaci\u00f3n de XWiki. Esta vulnerabilidad ha sido parcheada en XWiki 14.10.21, 15.5.5 y 15.10.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37956.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37956.json index 22445375c89..c44e91221ed 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37956.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37956.json @@ -2,13 +2,13 @@ "id": "CVE-2024-37956", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-20T09:15:09.247", - "lastModified": "2024-07-22T13:00:31.330", + "lastModified": "2024-08-01T13:15:10.750", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Vektor,Inc. VK All in One Expansion Unit allows Stored XSS.This issue affects VK All in One Expansion Unit: from n/a through 9.98.1.0." + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Vektor,Inc. VK All in One Expansion Unit allows Stored XSS.This issue affects VK All in One Expansion Unit: from n/a through 9.99.1.0." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3701.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3701.json index 3f6ec709f27..2acd03bb098 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3701.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3701.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3701", "sourceIdentifier": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea", "published": "2024-04-15T08:15:18.377", - "lastModified": "2024-04-15T13:15:31.997", + "lastModified": "2024-08-01T13:56:39.127", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El componente de la aplicaci\u00f3n del sistema (com.transsion.kolun.aiservice) no realiza una verificaci\u00f3n de autenticaci\u00f3n, lo que permite a los atacantes realizar explotaciones maliciosas y afectar los servicios del sistema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], "references": [ { "url": "https://security.tecno.com/SRC/blogdetail/236?lang=en_US", diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3710.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3710.json index b47a681c41c..dc761dc1405 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3710.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3710.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3710", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:02.700", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:56:40.053", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Image Photo Gallery Final Tiles Grid de WordPress anterior a 3.6.0 no valida ni escapa algunos de sus atributos de c\u00f3digo corto antes de devolverlos a la p\u00e1gina, lo que podr\u00eda permitir a los usuarios con un rol tan bajo como colaborador realizar ataques de Cross-Site Scripting Almacenado. que podr\u00eda usarse contra usuarios con privilegios elevados, como el administrador" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 4.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/bde10913-4f7e-4590-86eb-33bfa904f95f/", diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3751.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3751.json index b62e7c4ef1a..14f01593016 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3751.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3751.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3751", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:02.773", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:56:40.890", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Seriously Simple Podcasting de WordPress anterior a 3.3.0 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/1c684b05-2545-4fa5-ba9e-91d8b8f725ac/", diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3753.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3753.json index 268dd0a8682..f90588936a4 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3753.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3753.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3753", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:02.840", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:56:41.100", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Hostel WordPress anterior a 1.1.5.3 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con privilegios elevados, como el administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/e140e109-4176-4b26-bf63-198262a31409/", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38182.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38182.json index 6c6c6730474..5e63c4e5c0a 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38182.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38182.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38182", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-31T23:15:13.560", - "lastModified": "2024-07-31T23:15:13.560", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "secure@microsoft.com", @@ -16,6 +16,10 @@ { "lang": "en", "value": "Weak authentication in Microsoft Dynamics 365 allows an unauthenticated attacker to elevate privileges over a network." + }, + { + "lang": "es", + "value": "La autenticaci\u00f3n d\u00e9bil en Microsoft Dynamics 365 permite que un atacante no autenticado eleve los privilegios en una red." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38287.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38287.json index a08599db296..d5f5d1d2200 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38287.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38287.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38287", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-25T20:15:04.887", - "lastModified": "2024-07-26T12:38:41.683", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-01T13:54:42.590", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "El mecanismo de restablecimiento de contrase\u00f1a en la funcionalidad Forgot Password en R-HUB TurboMeeting hasta 8.x permite a atacantes remotos no autenticados forzar a la aplicaci\u00f3n a restablecer la contrase\u00f1a del administrador a un valor aleatorio inseguro de 8 d\u00edgitos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-640" + } + ] + } + ], "references": [ { "url": "https://github.com/google/security-research/security/advisories/GHSA-c84v-4pjw-4mh2", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38288.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38288.json index 76f8a722dd1..1b6a6eca07a 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38288.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38288.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38288", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-25T20:15:04.953", - "lastModified": "2024-07-26T12:38:41.683", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-01T13:54:43.867", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Un problema de inyecci\u00f3n de comandos en la funcionalidad de Certificate Signing Request (CSR) en R-HUB TurboMeeting hasta 8.x permite a atacantes autenticados con privilegios de administrador ejecutar comandos arbitrarios en el servidor subyacente como root." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/google/security-research/security/advisories/GHSA-gx6g-8mvx-3q5c", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38289.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38289.json index cdcf4345cf8..29889b72122 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38289.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38289.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38289", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-25T20:15:05.017", - "lastModified": "2024-07-26T12:38:41.683", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-01T13:54:45.130", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Un problema de inyecci\u00f3n de SQL basado en booleanos en el endpoint Virtual Meeting Password (VMP) en R-HUB TurboMeeting hasta 8.x permite a atacantes remotos no autenticados extraer contrase\u00f1as hash de la base de datos y autenticarse en la aplicaci\u00f3n, a trav\u00e9s de una entrada SQL manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/google/security-research/security/advisories/GHSA-vx5j-8pgx-v42v", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38293.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38293.json index 33e712cb142..0410173304d 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38293.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38293.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38293", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-13T05:15:50.517", - "lastModified": "2024-07-03T02:04:54.487", + "lastModified": "2024-08-01T13:54:46.393", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -22,20 +22,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 8.8, - "baseSeverity": "HIGH" + "baseScore": 9.6, + "baseSeverity": "CRITICAL" }, "exploitabilityScore": 2.8, - "impactScore": 5.9 + "impactScore": 6.0 } ] }, @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-89" + "value": "CWE-352" } ] } diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38294.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38294.json index 9c2ba47e276..17203680317 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38294.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38294.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38294", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-13T05:15:50.667", - "lastModified": "2024-06-13T18:36:09.010", + "lastModified": "2024-08-01T13:54:47.250", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "ALCASAR anterior a 3.6.1 permite la ejecuci\u00f3n remota de c\u00f3digo email_registration_back.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://adullact.net/frs/download.php/file/8930/CHANGELOG.md", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38295.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38295.json index b9faf997a06..2b2ca6b86a0 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38295.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38295.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38295", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-13T05:15:50.760", - "lastModified": "2024-06-13T18:36:09.010", + "lastModified": "2024-08-01T13:54:47.520", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "ALCASAR anterior a 3.6.1 permite la ejecuci\u00f3n remota de c\u00f3digo still_connected.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://adullact.net/frs/download.php/file/8930/CHANGELOG.md", diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38347.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38347.json index ca1e8ca2211..c8d14796f41 100644 --- a/CVE-2024/CVE-2024-383xx/CVE-2024-38347.json +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38347.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38347", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-18T17:15:52.583", - "lastModified": "2024-07-11T02:51:11.043", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:54:48.000", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38447.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38447.json index a38e9f90a7a..4f00780f844 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38447.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38447.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38447", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-17T18:15:03.990", - "lastModified": "2024-07-18T12:28:43.707", + "lastModified": "2024-08-01T13:54:50.470", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "NATO NCI ANET 3.4.1 permite la referencia directa insegura a objetos a trav\u00e9s de un campo de ID modificado en una solicitud de un borrador de informe privado (que pertenece a un usuario arbitrario)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], "references": [ { "url": "https://www.linkedin.com/pulse/idors-ncia-anet-v341-visionspace-technologies-hepxe", diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38457.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38457.json index 1dc9bc7781e..8e42aacdae9 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38457.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38457.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38457", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-16T15:15:51.703", - "lastModified": "2024-07-26T13:29:10.210", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:54:51.367", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38473.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38473.json index 209e256e764..69f97373534 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38473.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38473.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38473", "sourceIdentifier": "security@apache.org", "published": "2024-07-01T19:15:04.657", - "lastModified": "2024-07-12T14:15:15.133", + "lastModified": "2024-08-01T13:54:52.397", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El problema de codificaci\u00f3n en mod_proxy en Apache HTTP Server 2.4.59 y versiones anteriores permite que las URL de solicitud con codificaci\u00f3n incorrecta se env\u00eden a servicios backend, lo que potencialmente evita la autenticaci\u00f3n mediante solicitudes manipuladas. Se recomienda a los usuarios actualizar a la versi\u00f3n 2.4.60, que soluciona este problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38481.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38481.json index b991a9fe7d5..7410fb28b13 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38481.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38481.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38481", "sourceIdentifier": "security_alert@emc.com", "published": "2024-08-01T08:15:02.767", - "lastModified": "2024-08-01T08:15:02.767", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38489.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38489.json index 794bfca5b18..b4c5d5baf9b 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38489.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38489.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38489", "sourceIdentifier": "security_alert@emc.com", "published": "2024-08-01T08:15:02.980", - "lastModified": "2024-08-01T08:15:02.980", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38490.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38490.json index a218e23d31e..f127a8b87b1 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38490.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38490.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38490", "sourceIdentifier": "security_alert@emc.com", "published": "2024-08-01T08:15:03.187", - "lastModified": "2024-08-01T08:15:03.187", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38492.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38492.json index 93600d55043..2e4e73377e7 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38492.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38492.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38492", "sourceIdentifier": "secure@symantec.com", "published": "2024-07-15T14:15:03.240", - "lastModified": "2024-07-16T13:43:58.773", + "lastModified": "2024-08-01T13:54:53.013", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -61,6 +61,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24678", diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38494.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38494.json index 774be9d820e..76cc7373b19 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38494.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38494.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38494", "sourceIdentifier": "secure@symantec.com", "published": "2024-07-15T14:15:03.420", - "lastModified": "2024-07-16T13:43:58.773", + "lastModified": "2024-08-01T13:54:53.837", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -61,6 +61,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-444" + } + ] + } + ], "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24678", diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38909.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38909.json index a612caed349..126c94196f2 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38909.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38909.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38909", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-30T14:15:02.897", - "lastModified": "2024-07-31T12:57:02.300", + "lastModified": "2024-08-01T13:55:08.623", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Studio 42 elFinder 2.1.64 es vulnerable a un control de acceso incorrecto. Copiar archivos con una extensi\u00f3n no autorizada entre directorios de servidores permite a un atacante arbitrario exponer secretos, realizar RCE, etc." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "http://elfinder.com", diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38944.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38944.json index 26537c91f32..90ef864ec4b 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38944.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38944.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38944", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T19:15:02.760", - "lastModified": "2024-07-24T12:55:13.223", + "lastModified": "2024-08-01T13:55:09.433", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en Intelight X-1L Traffic controller Maxtime v.1.9.6 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente /cgi-bin/generateForm.cgi?formID=142." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/LemonSec/6aaea8320187a38e1a398fa321f12303", diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38963.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38963.json index fed5996682e..5ef1940538a 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38963.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38963.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38963", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T22:15:02.560", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-08-01T13:55:10.347", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Nopcommerce 4.70.1 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s de los par\u00e1metros combinados \"AddProductReview.Title\" y \"AddProductReview.ReviewText\" (Reviews) al crear una nueva rese\u00f1a." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/iamtron01/Vulnerability-Research/tree/main/CVE-2024-38963", diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38983.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38983.json index 2aff358b72f..e8f5ee29d42 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38983.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38983.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38983", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-30T21:15:09.700", - "lastModified": "2024-07-31T12:57:02.300", + "lastModified": "2024-08-01T13:55:11.147", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Prototype Pollution en alykoshin mini-deep-assign v0.0.8 permite a un atacante ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (DoS) y causar otros impactos a trav\u00e9s del m\u00e9todo _assign() en (/lib/index.js:91)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/mestrtee/f82d0c3a8fe3a125f06425caef5d22ed", diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38984.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38984.json index af0ce7c846d..45a9d24fbbf 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38984.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38984.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38984", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-30T20:15:03.873", - "lastModified": "2024-07-31T12:57:02.300", + "lastModified": "2024-08-01T13:55:12.530", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Prototype Pollution en lukebond json-override 0.2.0 permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de la propiedad __proto__." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/mestrtee/97a9a7d73fc8b38fcf01322239dd5fb1", diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38986.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38986.json index 55a67503a71..8808df9b661 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38986.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38986.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38986", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-30T20:15:03.990", - "lastModified": "2024-07-31T12:57:02.300", + "lastModified": "2024-08-01T13:55:13.857", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Prototype Pollution en 75 lb deep-merge 1.1.1 permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) y provocar otros impactos mediante m\u00e9todos de fusi\u00f3n de lodash para fusionar objetos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/mestrtee/b20c3aee8bea16e1863933778da6e4cb", diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3816.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3816.json index d38e119ad3d..6089c160e4b 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3816.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3816.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3816", "sourceIdentifier": "cvd@cert.pl", "published": "2024-06-28T13:15:03.283", - "lastModified": "2024-07-03T14:37:07.750", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:56:42.403", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3833.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3833.json index eb8dd4c5205..0bef4b4db16 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3833.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3833.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3833", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-04-17T08:15:10.243", - "lastModified": "2024-05-03T03:16:28.940", + "lastModified": "2024-08-01T13:56:42.740", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La corrupci\u00f3n de objetos en WebAssembly en Google Chrome anterior a 124.0.6367.60 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n de objetos a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-374" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html", diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3864.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3864.json index c686395cd11..c77ab931af9 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3864.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3864.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3864", "sourceIdentifier": "security@mozilla.org", "published": "2024-04-16T16:15:08.913", - "lastModified": "2024-04-24T10:15:07.597", + "lastModified": "2024-08-01T13:56:44.317", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Error de seguridad de la memoria presente en Firefox 124, Firefox ESR 115.9 y Thunderbird 115.9. Este error mostr\u00f3 evidencia de corrupci\u00f3n de memoria y suponemos que con suficiente esfuerzo esto podr\u00eda haberse aprovechado para ejecutar c\u00f3digo arbitrario. Esta vulnerabilidad afecta a Firefox < 125 y Firefox ESR < 115.10." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1888333", diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39002.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39002.json index f779d156bfb..8041b96c73d 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39002.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39002.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39002", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:05.450", - "lastModified": "2024-07-01T16:37:39.040", + "lastModified": "2024-08-01T13:55:15.163", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que rjrodger jsonic-next v2.12.1 conten\u00eda un prototipo de contaminaci\u00f3n a trav\u00e9s de la funci\u00f3n util.clone. Esta vulnerabilidad permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante la inyecci\u00f3n de propiedades arbitrarias." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/mestrtee/9a2b522d59c53f31f45c1edb96459693", diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39010.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39010.json index 63d900d863c..cbba918be20 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39010.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39010.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39010", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-30T20:15:04.103", - "lastModified": "2024-07-31T12:57:02.300", + "lastModified": "2024-08-01T13:55:15.990", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Se descubri\u00f3 que Chase-moskal snapstate v0.0.9 conten\u00eda prototype pollution a trav\u00e9s de la funci\u00f3n intentNestedProperty. Esta vulnerabilidad permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante la inyecci\u00f3n de propiedades arbitrarias." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/mestrtee/af7a746df91ab5e944bd7a186816c262", diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39011.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39011.json index d6d82e27c5f..c4288f58b52 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39011.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39011.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39011", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-30T20:15:04.203", - "lastModified": "2024-07-31T12:57:02.300", + "lastModified": "2024-08-01T13:55:17.323", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Prototype Pollution en chargeover redoc v2.0.9-rc.69 permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) y provocar otros impactos a trav\u00e9s de la funci\u00f3n mergeObjects." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/mestrtee/693ef1c8b0a5ff1ae19f253381711f3e", diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39022.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39022.json index eb05b4123d6..ffb0c96e7dd 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39022.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39022.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39022", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-05T19:15:10.087", - "lastModified": "2024-07-08T15:49:22.437", + "lastModified": "2024-08-01T13:55:18.953", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Se descubri\u00f3 que idccms v1.35 conten\u00eda una vulnerabilidad de Cross Site Request Forgery (CSRF) a trav\u00e9s de /admin/infoSys_deal.php?mudi=deal" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/da271133/cms2/blob/main/47/csrf.md", diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39028.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39028.json index 4e9503e309b..0b3b6f8bbf2 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39028.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39028.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39028", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-05T14:15:03.100", - "lastModified": "2024-07-08T15:47:26.720", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:55:19.873", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39063.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39063.json index 0a0af0f9faf..59334004eb1 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39063.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39063.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39063", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T20:15:12.080", - "lastModified": "2024-07-11T13:06:13.187", + "lastModified": "2024-08-01T13:55:20.867", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Lime Survey <= 6.5.12 es vulnerable a Cross Site Request Forgery (CSRF). YII_CSRF_TOKEN solo se verifica cuando se pasa en el cuerpo de las solicitudes POST, pero no se realiza la misma verificaci\u00f3n en las solicitudes GET equivalentes." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/sysentr0py/CVEs/tree/main/CVE-2024-39063", diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39069.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39069.json index c2ac0a424e6..7e0b1ba582c 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39069.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39069.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39069", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T22:15:02.653", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-08-01T13:55:21.670", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en ifood Order Manager v3.35.5 'Gestor de Peddios.exe' permite a atacantes ejecutar c\u00f3digo arbitrario mediante un ataque de secuestro de DLL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-491" + } + ] + } + ], "references": [ { "url": "https://github.com/AungSoePaing/CVE-2024-39069", diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39072.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39072.json index ac1fe09f156..1d6998d7da6 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39072.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39072.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39072", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T21:15:15.317", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-08-01T13:55:22.510", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "AMTT Hotel Broadband Operation System (HiBOS) v3.0.3.151204 es vulnerable a la inyecci\u00f3n de SQL a trav\u00e9s de manager/conference/calendar_remind.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Y5neKO/4c15581606c118aa2172afd3b8b74328", diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39090.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39090.json index 5ce1eef3177..54f9518a297 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39090.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39090.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39090", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-18T20:15:04.163", - "lastModified": "2024-07-19T13:01:44.567", + "lastModified": "2024-08-01T13:55:23.317", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La versi\u00f3n 2.0 del proyecto PHPGurukul Online Shopping Portal contiene una vulnerabilidad que permite que la Cross-Site Request Forgery (CSRF) conduzca a Cross-Site Scripting (XSS) Almacenado. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo JavaScript arbitrario en el contexto de la sesi\u00f3n de un usuario, lo que podr\u00eda llevar a la apropiaci\u00f3n de la cuenta." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/arijitdirghanji/My-CVEs/blob/main/CVE-2024-39090.md", diff --git a/CVE-2024/CVE-2024-391xx/CVE-2024-39123.json b/CVE-2024/CVE-2024-391xx/CVE-2024-39123.json index c06dc9f8e81..cc248be5318 100644 --- a/CVE-2024/CVE-2024-391xx/CVE-2024-39123.json +++ b/CVE-2024/CVE-2024-391xx/CVE-2024-39123.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39123", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-19T20:15:07.797", - "lastModified": "2024-07-22T13:00:53.287", + "lastModified": "2024-08-01T13:55:24.107", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " En janeczku Calibre-Web 0.6.0 a 0.6.21, la funci\u00f3n edit_book_comments es vulnerable a Cross Site Scripting (XSS) debido a una sanitizaci\u00f3n inadecuada realizada por la funci\u00f3n clean_string. La vulnerabilidad surge de la forma en que la funci\u00f3n clean_string maneja la sanitizaci\u00f3n de HTML." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/pentesttoolscom/vulnerability-research/tree/master/CVE-2024-39123", diff --git a/CVE-2024/CVE-2024-391xx/CVE-2024-39155.json b/CVE-2024/CVE-2024-391xx/CVE-2024-39155.json index e004ab39ed3..78d1b630a80 100644 --- a/CVE-2024/CVE-2024-391xx/CVE-2024-39155.json +++ b/CVE-2024/CVE-2024-391xx/CVE-2024-39155.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39155", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-27T14:15:15.913", - "lastModified": "2024-06-27T17:11:52.390", + "lastModified": "2024-08-01T13:55:25.313", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que idccms v1.35 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /admin/ipRecord_deal.php?mudi=add." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/Thirtypenny77/cms2/blob/main/56/csrf.md", diff --git a/CVE-2024/CVE-2024-391xx/CVE-2024-39165.json b/CVE-2024/CVE-2024-391xx/CVE-2024-39165.json index 67e5cd514f6..6111a316e96 100644 --- a/CVE-2024/CVE-2024-391xx/CVE-2024-39165.json +++ b/CVE-2024/CVE-2024-391xx/CVE-2024-39165.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39165", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-04T13:15:10.023", - "lastModified": "2024-07-05T12:55:51.367", + "lastModified": "2024-08-01T13:55:29.123", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "QR/demoapp/qr_image.php en Asial JpGraph Professional hasta 4.2.6-pro permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una carga PHP en el par\u00e1metro de datos junto con un nombre de archivo .php en el par\u00e1metro de nombre de archivo. Esto ocurre porque con el producto se env\u00eda una carpeta QR/demoapp innecesaria." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://www.synacktiv.com/advisories/jpgraph-professional-version-pre-authenticated-remote-code-execution", diff --git a/CVE-2024/CVE-2024-391xx/CVE-2024-39173.json b/CVE-2024/CVE-2024-391xx/CVE-2024-39173.json index c02f25eb438..7107c670883 100644 --- a/CVE-2024/CVE-2024-391xx/CVE-2024-39173.json +++ b/CVE-2024/CVE-2024-391xx/CVE-2024-39173.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39173", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-18T20:15:04.227", - "lastModified": "2024-07-19T13:01:44.567", + "lastModified": "2024-08-01T13:55:45.000", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que calculadora-boilerplate v1.0 contiene una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) a trav\u00e9s de la funci\u00f3n eval en /routes/calculator.js. Esta vulnerabilidad permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado inyectado en el campo de entrada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-95" + } + ] + } + ], "references": [ { "url": "http://kropov.com/calculator-boilerplate-cve.txt", diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39202.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39202.json index 4a8fa2c3acc..e5c85b41ab7 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39202.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39202.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39202", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-08T16:15:08.490", - "lastModified": "2024-07-11T16:13:13.487", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:55:45.870", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 7.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.5 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39209.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39209.json index 4110c7183fc..bb023686bc6 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39209.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39209.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39209", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-27T21:15:15.980", - "lastModified": "2024-06-28T10:27:00.920", + "lastModified": "2024-08-01T13:55:46.647", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que luci-app-sms-tool v1.9-6 contiene una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro de puntuaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/yanggao017/e392a633b8cee6f42c514b125860081c", diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39250.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39250.json index 92f90676fbe..edb52d81208 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39250.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39250.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39250", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T20:15:04.057", - "lastModified": "2024-07-24T12:55:13.223", + "lastModified": "2024-08-01T13:55:47.607", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que EfroTech Timetrax v8.3 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL no autenticada a trav\u00e9s del par\u00e1metro q en la interfaz web de b\u00fasqueda." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/efrann/CVE-2024-39250", diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39318.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39318.json index aefd3284281..c72b07185a4 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39318.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39318.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39318", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-31T16:15:03.937", - "lastModified": "2024-07-31T16:15:03.937", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Ibexa Admin UI Bundle contains all the necessary parts to run the Ibexa DXP Back Office interface. The file upload widget is vulnerable to XSS payloads in filenames. Access permission to upload files is required. As such, in most cases only authenticated editors and administrators will have the required permission. It is not persistent, i.e. the payload is only executed during the upload. In effect, an attacker will have to trick an editor/administrator into uploading a strangely named file." + }, + { + "lang": "es", + "value": "El paquete Ibexa Admin UI Bundle contiene todas las piezas necesarias para ejecutar la interfaz de Back Office de Ibexa DXP. El widget de carga de archivos es vulnerable a los payloads XSS en los nombres de archivos. Se requiere permiso de acceso para cargar archivos. Como tal, en la mayor\u00eda de los casos s\u00f3lo los editores y administradores autenticados tendr\u00e1n el permiso requerido. No es persistente, es decir, el payload s\u00f3lo se ejecuta durante la carga. En efecto, un atacante tendr\u00e1 que enga\u00f1ar a un editor/administrador para que cargue un archivo con un nombre extra\u00f1o." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39340.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39340.json index 9b894e82fe4..688fed5682e 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39340.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39340.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39340", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-12T13:15:12.057", - "lastModified": "2024-07-15T22:15:02.910", + "lastModified": "2024-08-01T13:55:49.473", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Securepoint UTM anterior a 12.6.5 maneja mal los c\u00f3digos OTP." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], "references": [ { "url": "https://wiki.securepoint.de/UTM/Changelog", diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39345.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39345.json index 4911e91d4fc..923499cf286 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39345.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39345.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39345", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T15:15:12.360", - "lastModified": "2024-07-25T17:48:18.550", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:55:50.247", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-259" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39379.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39379.json index cd5318a35a3..93aa7d3f3ae 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39379.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39379.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39379", "sourceIdentifier": "psirt@adobe.com", "published": "2024-07-31T13:15:10.253", - "lastModified": "2024-07-31T13:15:10.253", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Acrobat for Edge versions 126.0.2592.81 and earlier are affected by an out-of-bounds read vulnerability that could lead to arbitrary file system read access. An attacker could exploit this vulnerability to read contents from a location in memory past the buffer boundary, potentially leading to sensitive information disclosure. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": " Las versiones 126.0.2592.81 y anteriores de Acrobat para Edge se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar un acceso de lectura arbitrario al sistema de archivos. Un atacante podr\u00eda aprovechar esta vulnerabilidad para leer contenidos desde una ubicaci\u00f3n en la memoria m\u00e1s all\u00e1 del l\u00edmite del b\u00fafer, lo que podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n confidencial. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39607.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39607.json index 878f6f463b4..a763eb6ac03 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39607.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39607.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39607", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-08-01T02:15:01.950", - "lastModified": "2024-08-01T02:15:01.950", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "OS command injection vulnerability exists in ELECOM wireless LAN routers. A specially crafted request may be sent to the affected product by a logged-in user with an administrative privilege to execute an arbitrary OS command." + }, + { + "lang": "es", + "value": " Existe una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en los enrutadores LAN inal\u00e1mbricos ELECOM. Un usuario que haya iniciado sesi\u00f3n y tenga privilegios administrativos puede enviar una solicitud especialmente manipulada al producto afectado para ejecutar un comando arbitrario del sistema operativo." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39614.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39614.json index 6006b518d3b..c2a63ed4ff3 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39614.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39614.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39614", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-10T05:15:12.237", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-08-01T13:55:55.837", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en Django 5.0 anterior a 5.0.7 y 4.2 anterior a 4.2.14. get_supported_language_variant() estaba sujeto a un posible ataque de denegaci\u00f3n de servicio cuando se usaba con cadenas muy largas que conten\u00edan caracteres espec\u00edficos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-130" + } + ] + } + ], "references": [ { "url": "https://docs.djangoproject.com/en/dev/releases/security/", diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39694.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39694.json index 11470bd58b5..8e3423ff4e5 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39694.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39694.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39694", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-31T16:15:04.207", - "lastModified": "2024-07-31T16:15:04.207", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Duende IdentityServer is an OpenID Connect and OAuth 2.x framework for ASP.NET Core. It is possible for an attacker to craft malicious Urls that certain functions in IdentityServer will incorrectly treat as local and trusted. If such a Url is returned as a redirect, some browsers will follow it to a third-party, untrusted site. Note: by itself, this vulnerability does **not** allow an attacker to obtain user credentials, authorization codes, access tokens, refresh tokens, or identity tokens. An attacker could however exploit this vulnerability as part of a phishing attack designed to steal user credentials. This vulnerability is fixed in 7.0.6, 6.3.10, 6.2.5, 6.1.8, and 6.0.5. Duende.IdentityServer 5.1 and earlier and all versions of IdentityServer4 are no longer supported and will not be receiving updates. If upgrading is not possible, use `IUrlHelper.IsLocalUrl` from ASP.NET Core to validate return Urls in user interface code in the IdentityServer host." + }, + { + "lang": "es", + "value": "Duende IdentityServer es un framework OpenID Connect y OAuth 2.x para ASP.NET Core. Es posible que un atacante cree URL maliciosas que ciertas funciones de IdentityServer traten incorrectamente como locales y confiables. Si dicha URL se devuelve como redireccionamiento, algunos navegadores la seguir\u00e1n hasta un sitio de terceros que no es de confianza. Nota: por s\u00ed sola, esta vulnerabilidad **no** permite que un atacante obtenga credenciales de usuario, c\u00f3digos de autorizaci\u00f3n, tokens de acceso, tokens de actualizaci\u00f3n o tokens de identidad. Sin embargo, un atacante podr\u00eda aprovechar esta vulnerabilidad como parte de un ataque de phishing dise\u00f1ado para robar las credenciales de los usuarios. Esta vulnerabilidad se solucion\u00f3 en 7.0.6, 6.3.10, 6.2.5, 6.1.8 y 6.0.5. Duende.IdentityServer 5.1 y anteriores y todas las versiones de IdentityServer4 ya no son compatibles y no recibir\u00e1n actualizaciones. Si no es posible realizar la actualizaci\u00f3n, use `IUrlHelper.IsLocalUrl` de ASP.NET Core para validar las URL de retorno en el c\u00f3digo de la interfaz de usuario en el host IdentityServer." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39863.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39863.json index 5d514c3871c..b8ba3ce44f0 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39863.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39863.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39863", "sourceIdentifier": "security@apache.org", "published": "2024-07-17T08:15:01.933", - "lastModified": "2024-07-22T09:15:11.180", + "lastModified": "2024-08-01T13:55:59.780", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39877.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39877.json index 25bfb24c5c7..b9017c51efd 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39877.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39877.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39877", "sourceIdentifier": "security@apache.org", "published": "2024-07-17T08:15:02.073", - "lastModified": "2024-07-19T16:04:04.003", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:56:00.307", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-94" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-277" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39927.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39927.json index 5777d61ad1f..b85a8e0ebe5 100644 --- a/CVE-2024/CVE-2024-399xx/CVE-2024-39927.json +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39927.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39927", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-07-10T07:15:03.317", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-08-01T13:56:03.057", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Existe una vulnerabilidad de escritura fuera de los l\u00edmites en las impresoras y equipos multifunci\u00f3n Ricoh. Si un atacante remoto env\u00eda una solicitud especialmente manipulada a los productos afectados, los productos pueden causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) y/o los datos del usuario pueden ser destruidos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://jp.ricoh.com/security/products/vulnerabilities/vul?id=ricoh-2024-000008", diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39944.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39944.json index 178c5543ef0..4c54107bdfa 100644 --- a/CVE-2024/CVE-2024-399xx/CVE-2024-39944.json +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39944.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39944", "sourceIdentifier": "cybersecurity@dahuatech.com", "published": "2024-07-31T04:15:02.410", - "lastModified": "2024-07-31T12:57:02.300", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-01T13:56:03.993", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "https://www.dahuasecurity.com/aboutUs/trustedCenter/details/768", diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39948.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39948.json index 35676bdb2ae..1cfcece938e 100644 --- a/CVE-2024/CVE-2024-399xx/CVE-2024-39948.json +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39948.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39948", "sourceIdentifier": "cybersecurity@dahuatech.com", "published": "2024-07-31T04:15:05.173", - "lastModified": "2024-07-31T12:57:02.300", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-01T13:56:05.350", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "https://www.dahuasecurity.com/aboutUs/trustedCenter/details/768", diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39950.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39950.json index f997465d25f..daa47c0f382 100644 --- a/CVE-2024/CVE-2024-399xx/CVE-2024-39950.json +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39950.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39950", "sourceIdentifier": "cybersecurity@dahuatech.com", "published": "2024-07-31T04:15:05.837", - "lastModified": "2024-07-31T12:57:02.300", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-01T13:56:11.127", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "https://www.dahuasecurity.com/aboutUs/trustedCenter/details/768", diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39962.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39962.json index 9823b347134..311ae9745cf 100644 --- a/CVE-2024/CVE-2024-399xx/CVE-2024-39962.json +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39962.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39962", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-19T15:15:10.320", - "lastModified": "2024-07-22T13:00:53.287", + "lastModified": "2024-08-01T13:56:13.933", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Se descubri\u00f3 que D-Link DIR-823X AX3000 Dual-Band Gigabit Wireless Router v21_D240126 contiene una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) en el par\u00e1metro ntp_zone_val en /goform/set_ntp. Esta vulnerabilidad se explota mediante una solicitud HTTP manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Swind1er/40c33f1b1549028677cb4e2e5ef69109", diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39963.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39963.json index 607ba07b018..709d0ebf490 100644 --- a/CVE-2024/CVE-2024-399xx/CVE-2024-39963.json +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39963.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39963", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-19T15:15:10.383", - "lastModified": "2024-07-22T13:00:53.287", + "lastModified": "2024-08-01T13:56:15.110", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Se descubri\u00f3 que el enrutador AX3000 Dual-Band Gigabit Wi-Fi 6 Router AX9 V22.03.01.46 y AX3000 Dual-Band Gigabit Wi-Fi 6 Router AX12 V1.0 V22.03.01.46 conten\u00edan una vulnerabilidad de ejecuci\u00f3n remota de comandos (RCE) autenticada a trav\u00e9s de el par\u00e1metro macFilterType en /goform/setMacFilterCfg." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Swind1er/c8e4369c7fdfd750c8ad01a276105c57", diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3903.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3903.json index 56bd9e0f5ff..21d7b068e37 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3903.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3903.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3903", "sourceIdentifier": "contact@wpscan.com", "published": "2024-05-14T15:42:33.087", - "lastModified": "2024-05-14T16:11:39.510", + "lastModified": "2024-08-01T13:56:45.143", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Add Custom CSS y JS de WordPress hasta la versi\u00f3n 1.20 no tiene verificaci\u00f3n CSRF en algunos lugares y le falta sanitizaci\u00f3n y escape, lo que podr\u00eda permitir a los atacantes iniciar sesi\u00f3n como autor y agregar payloads XSS almacenado a trav\u00e9s de un ataque CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/0a0e7bd4-948d-47c9-9219-380bda9f3034/", diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3919.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3919.json index 685c5cf8d24..6098e4c4edb 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3919.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3919.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3919", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:02.900", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:56:45.767", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento OpenPGP Form Encryption para WordPress anterior a 1.5.1 no valida ni escapa algunos de sus atributos de shortcode antes de devolverlos a una p\u00e1gina/publicaci\u00f3n donde est\u00e1 incrustado el shortcode, lo que podr\u00eda permitir a los usuarios con el rol de colaborador y superiores realizar ataques de Cross-Site Scripting Almacenado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/4e38c7d9-5b6a-4dfc-8f22-3ff30565ce43/", diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3963.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3963.json index 9153f445905..9e7c7c33075 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3963.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3963.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3963", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:02.967", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:56:47.180", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Giveaways and Contests by RafflePress de WordPress anterior a la versi\u00f3n 1.12.14 no sanitiza ni escapa a algunos par\u00e1metros, lo que podr\u00eda permitir a los usuarios con una funci\u00f3n tan baja como la de editor realizar ataques de cross-site scripting" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/827d738e-5369-431e-8438-b5c4d8c1f8f1/", diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3964.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3964.json index a2ada07f14e..28df9573273 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3964.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3964.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3964", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:03.030", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:56:47.440", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Product Inquiry for WooCommerce WordPress anterior a 3.1.8 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con altos privilegios, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/ff468772-3e6a-439c-a4d7-94bd2ce1a964/", diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3972.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3972.json index 9e04789d81f..967618cc63a 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3972.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3972.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3972", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-14T06:15:12.330", - "lastModified": "2024-07-29T16:51:05.463", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:56:47.637", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3977.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3977.json index 3b9525672a0..db86fa86b49 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3977.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3977.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3977", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-14T06:15:12.427", - "lastModified": "2024-07-29T16:43:10.197", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:56:47.833", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.7 } ] }, diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3978.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3978.json index f35d6933a01..7428eab4552 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3978.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3978.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3978", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-14T06:15:12.520", - "lastModified": "2024-07-29T16:42:44.887", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:56:48.040", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 } ] }, diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3983.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3983.json index 4d60ad8921d..56a9c80ce9c 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3983.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3983.json @@ -2,13 +2,17 @@ "id": "CVE-2024-3983", "sourceIdentifier": "contact@wpscan.com", "published": "2024-08-01T06:15:02.517", - "lastModified": "2024-08-01T06:15:02.517", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WooCommerce Customers Manager WordPress plugin before 30.1 does not have CSRF checks in some bulk actions, which could allow attackers to make logged in admins perform unwanted actions, such as deleting customers via CSRF attacks" + }, + { + "lang": "es", + "value": " El complemento de WordPress WooCommerce Customers Manager anterior a la versi\u00f3n 30.1 no tiene comprobaciones CSRF en algunas acciones masivas, lo que podr\u00eda permitir a los atacantes hacer que los administradores que han iniciado sesi\u00f3n realicen acciones no deseadas, como eliminar clientes mediante ataques CSRF." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40034.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40034.json index e395aa1be3e..0a4d3393f80 100644 --- a/CVE-2024/CVE-2024-400xx/CVE-2024-40034.json +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40034.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40034", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T19:15:13.373", - "lastModified": "2024-07-22T20:10:03.787", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:56:48.430", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40037.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40037.json index f1be4ddd29d..eb33f002660 100644 --- a/CVE-2024/CVE-2024-400xx/CVE-2024-40037.json +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40037.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40037", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T19:15:13.600", - "lastModified": "2024-07-22T20:02:15.483", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:56:49.230", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-401xx/CVE-2024-40110.json b/CVE-2024/CVE-2024-401xx/CVE-2024-40110.json index 0b8246bcf58..6b604b39ac8 100644 --- a/CVE-2024/CVE-2024-401xx/CVE-2024-40110.json +++ b/CVE-2024/CVE-2024-401xx/CVE-2024-40110.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40110", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-12T17:15:10.833", - "lastModified": "2024-07-12T19:04:57.907", + "lastModified": "2024-08-01T13:56:50.340", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Sourcecodester Poultry Farm Management System v1.0 contiene una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) no autenticada a trav\u00e9s del par\u00e1metro productimage en /farm/product.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/w3bn00b3r/Unauthenticated-Remote-Code-Execution-RCE---Poultry-Farm-Management-System-v1.0/", diff --git a/CVE-2024/CVE-2024-401xx/CVE-2024-40116.json b/CVE-2024/CVE-2024-401xx/CVE-2024-40116.json index cba400a1303..bb39b712460 100644 --- a/CVE-2024/CVE-2024-401xx/CVE-2024-40116.json +++ b/CVE-2024/CVE-2024-401xx/CVE-2024-40116.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40116", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-26T20:15:04.980", - "lastModified": "2024-07-29T14:12:08.783", + "lastModified": "2024-08-01T13:56:51.153", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -16,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-256" + } + ] + } + ], "references": [ { "url": "https://github.com/nepenthe0320/cve_poc/blob/master/Solar-Log%201000%20-%20Unprotected%20Storage%20of%20Credentials", diff --git a/CVE-2024/CVE-2024-401xx/CVE-2024-40117.json b/CVE-2024/CVE-2024-401xx/CVE-2024-40117.json index cda88d36646..2ca4e3d0cbb 100644 --- a/CVE-2024/CVE-2024-401xx/CVE-2024-40117.json +++ b/CVE-2024/CVE-2024-401xx/CVE-2024-40117.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40117", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-26T20:15:05.033", - "lastModified": "2024-07-29T14:12:08.783", + "lastModified": "2024-08-01T13:56:51.860", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " El control de acceso incorrecto en Solar-Log 1000 anterior a v2.8.2 y compilaci\u00f3n 52-23.04.2013 permite a los atacantes obtener privilegios administrativos mediante la conexi\u00f3n al servidor de administraci\u00f3n web." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://github.com/nepenthe0320/cve_poc/blob/master/CVE-2024-40117", diff --git a/CVE-2024/CVE-2024-401xx/CVE-2024-40119.json b/CVE-2024/CVE-2024-401xx/CVE-2024-40119.json index 2d7959dcb13..a744e245dca 100644 --- a/CVE-2024/CVE-2024-401xx/CVE-2024-40119.json +++ b/CVE-2024/CVE-2024-401xx/CVE-2024-40119.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40119", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-17T20:15:06.423", - "lastModified": "2024-07-18T12:28:43.707", + "lastModified": "2024-08-01T13:56:52.650", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Nepstech Wifi Router xpon (terminal) modelo NTPL-Xpon1GFEVN v.1.0 Firmware V2.0.1 contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) en la funci\u00f3n de cambio de contrase\u00f1a, que permite a atacantes remotos cambiar la contrase\u00f1a de administrador sin el consentimiento del usuario, lo que lleva a a una posible apropiaci\u00f3n de cuentas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/sudo-subho/nepstech-xpon-router-CVE-2024-40119", diff --git a/CVE-2024/CVE-2024-401xx/CVE-2024-40129.json b/CVE-2024/CVE-2024-401xx/CVE-2024-40129.json index ac7707d1353..800146de01d 100644 --- a/CVE-2024/CVE-2024-401xx/CVE-2024-40129.json +++ b/CVE-2024/CVE-2024-401xx/CVE-2024-40129.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40129", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-16T19:15:12.600", - "lastModified": "2024-07-17T13:34:20.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-01T13:56:53.610", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Open5GS v2.6.4 es vulnerable al desbordamiento del b\u00fafer a trav\u00e9s de /lib/pfcp/context.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://github.com/open5gs/open5gs/commit/2fbc445d32aa7749166396a9c055a199f90a1b01", diff --git a/CVE-2024/CVE-2024-401xx/CVE-2024-40130.json b/CVE-2024/CVE-2024-401xx/CVE-2024-40130.json index 92682331e5c..e88dc1cb7a1 100644 --- a/CVE-2024/CVE-2024-401xx/CVE-2024-40130.json +++ b/CVE-2024/CVE-2024-401xx/CVE-2024-40130.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40130", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-16T19:15:12.683", - "lastModified": "2024-07-17T13:34:20.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-01T13:56:59.047", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "open5gs v2.6.4 es vulnerable al desbordamiento del b\u00fafer a trav\u00e9s de /lib/core/abts.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/open5gs/open5gs/commit/2f8ae91b0b9467f94f128090c88cae91bd73e008", diff --git a/CVE-2024/CVE-2024-401xx/CVE-2024-40137.json b/CVE-2024/CVE-2024-401xx/CVE-2024-40137.json index e98fa2e8026..cf226e6cfb1 100644 --- a/CVE-2024/CVE-2024-401xx/CVE-2024-40137.json +++ b/CVE-2024/CVE-2024-401xx/CVE-2024-40137.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40137", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T19:15:04.637", - "lastModified": "2024-07-25T12:36:39.947", + "lastModified": "2024-08-01T13:57:00.547", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que Dolibarr ERP CRM anterior a 19.0.2-php8.2 conten\u00eda una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) a trav\u00e9s del par\u00e1metro Computed en la funci\u00f3n Users Module Setup." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] + } + ], "references": [ { "url": "https://github.com/c0d3x27/CVEs/tree/main/CVE-2024-40137", diff --git a/CVE-2024/CVE-2024-403xx/CVE-2024-40318.json b/CVE-2024/CVE-2024-403xx/CVE-2024-40318.json index 6ced6ec372a..3f000f68833 100644 --- a/CVE-2024/CVE-2024-403xx/CVE-2024-40318.json +++ b/CVE-2024/CVE-2024-403xx/CVE-2024-40318.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40318", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-25T19:15:10.230", - "lastModified": "2024-07-26T12:38:41.683", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-01T13:57:01.373", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de carga de archivos arbitrarios en Webkul Qloapps v1.6.0.0 permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://github.com/3v1lC0d3/RCE-QloApps/blob/main/qloapps--RCE.pdf", diff --git a/CVE-2024/CVE-2024-403xx/CVE-2024-40322.json b/CVE-2024/CVE-2024-403xx/CVE-2024-40322.json index d1563780221..b21a9647489 100644 --- a/CVE-2024/CVE-2024-403xx/CVE-2024-40322.json +++ b/CVE-2024/CVE-2024-403xx/CVE-2024-40322.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40322", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-16T16:15:05.290", - "lastModified": "2024-07-16T18:00:02.110", + "lastModified": "2024-08-01T13:57:02.697", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en JFinalCMS v.5.0.0. Hay una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s de /admin/div_data/data" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/KakeruJ/CVE/blob/main/JFinalCMS_SQL.md", diff --git a/CVE-2024/CVE-2024-403xx/CVE-2024-40324.json b/CVE-2024/CVE-2024-403xx/CVE-2024-40324.json index 6f285bef5c6..fae69ba4724 100644 --- a/CVE-2024/CVE-2024-403xx/CVE-2024-40324.json +++ b/CVE-2024/CVE-2024-403xx/CVE-2024-40324.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40324", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-25T20:15:05.077", - "lastModified": "2024-07-26T12:38:41.683", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-01T13:57:04.970", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,46 @@ "value": "Una vulnerabilidad de inyecci\u00f3n CRLF en E-Staff v5.1 permite a los atacantes insertar caracteres Carriage Return (CR) y Line Feed (LF) en los campos de entrada, lo que lleva a la divisi\u00f3n de la respuesta HTTP y la manipulaci\u00f3n del encabezado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-113" + }, + { + "lang": "en", + "value": "CWE-93" + } + ] + } + ], "references": [ { "url": "https://github.com/aleksey-vi/CVE-2024-40324", diff --git a/CVE-2024/CVE-2024-403xx/CVE-2024-40332.json b/CVE-2024/CVE-2024-403xx/CVE-2024-40332.json index 106a0e7348a..7eee26ddad6 100644 --- a/CVE-2024/CVE-2024-403xx/CVE-2024-40332.json +++ b/CVE-2024/CVE-2024-403xx/CVE-2024-40332.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40332", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-10T14:15:12.540", - "lastModified": "2024-07-31T14:13:02.353", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:57:07.730", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 4.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-403xx/CVE-2024-40334.json b/CVE-2024/CVE-2024-403xx/CVE-2024-40334.json index 66a37a85fcb..8854fbeaf0b 100644 --- a/CVE-2024/CVE-2024-403xx/CVE-2024-40334.json +++ b/CVE-2024/CVE-2024-403xx/CVE-2024-40334.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40334", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-10T13:15:10.760", - "lastModified": "2024-07-31T14:08:39.863", + "lastModified": "2024-08-01T13:57:11.203", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-403xx/CVE-2024-40348.json b/CVE-2024/CVE-2024-403xx/CVE-2024-40348.json index 54e8f898001..2db2a8ba998 100644 --- a/CVE-2024/CVE-2024-403xx/CVE-2024-40348.json +++ b/CVE-2024/CVE-2024-403xx/CVE-2024-40348.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40348", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-20T04:15:05.037", - "lastModified": "2024-07-22T13:00:53.287", + "lastModified": "2024-08-01T13:57:13.270", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Un problema en el componente /api/swaggerui/static de Bazaar v1.4.3 permite a atacantes no autenticados ejecutar un directory traversal." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://github.com/4rdr/proofs/blob/main/info/Bazaar_1.4.3_File_Traversal_via_Filename.md", diff --git a/CVE-2024/CVE-2024-403xx/CVE-2024-40392.json b/CVE-2024/CVE-2024-403xx/CVE-2024-40392.json index 0ae02aac81e..45f51a223e4 100644 --- a/CVE-2024/CVE-2024-403xx/CVE-2024-40392.json +++ b/CVE-2024/CVE-2024-403xx/CVE-2024-40392.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40392", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-16T19:15:12.773", - "lastModified": "2024-07-17T13:34:20.520", + "lastModified": "2024-08-01T13:57:14.083", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que SourceCodester Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code 1.0 contiene una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro de nombre en addnew.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/CveSecLook/cve/issues/46", diff --git a/CVE-2024/CVE-2024-403xx/CVE-2024-40394.json b/CVE-2024/CVE-2024-403xx/CVE-2024-40394.json index d0395fab0d9..574fa1cd6ee 100644 --- a/CVE-2024/CVE-2024-403xx/CVE-2024-40394.json +++ b/CVE-2024/CVE-2024-403xx/CVE-2024-40394.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40394", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-16T19:15:12.957", - "lastModified": "2024-07-17T13:34:20.520", + "lastModified": "2024-08-01T13:57:15.033", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que Simple Library Management System Project Using PHP/MySQL v1.0 contiene una vulnerabilidad de carga de archivos arbitraria a trav\u00e9s del componente ajax.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://github.com/CveSecLook/cve/issues/48", diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40400.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40400.json index 1ebfb317133..16c6eaa19fe 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40400.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40400.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40400", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-19T19:15:09.147", - "lastModified": "2024-07-22T13:00:53.287", + "lastModified": "2024-08-01T13:57:15.850", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Una vulnerabilidad de carga de archivos arbitrarios en la funci\u00f3n de carga de im\u00e1genes de Automad v2.0.0 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de un archivo manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://github.com/marcantondahmen/automad/issues/106", diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40402.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40402.json index 37dec9decae..b3ce52c2404 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40402.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40402.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40402", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-17T20:15:06.507", - "lastModified": "2024-07-18T12:28:43.707", + "lastModified": "2024-08-01T13:57:16.643", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se encontr\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en 'ajax.php' de Sourcecodester Simple Library Management System 1.0. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada del usuario del par\u00e1metro 'nombre de usuario', lo que permite a los atacantes inyectar consultas SQL maliciosas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/CveSecLook/cve/issues/49", diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40412.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40412.json index b92e4e708d4..46065a8fc44 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40412.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40412.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40412", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-10T16:15:04.290", - "lastModified": "2024-07-15T17:15:02.723", + "lastModified": "2024-08-01T13:57:17.453", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Tenda AX12 v1.0 v22.03.01.46 contiene un desbordamiento de pila en el par\u00e1metro deviceList de la funci\u00f3n sub_42E410." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/Feng-ZZ-pwn/IOT/blob/main/Tenda%20AX12/1/README.md", diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40414.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40414.json index f08424d440f..17be4483105 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40414.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40414.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40414", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-15T17:15:02.783", - "lastModified": "2024-07-16T13:43:58.773", + "lastModified": "2024-08-01T13:57:18.247", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad en /goform/SetNetControlList en la funci\u00f3n sub_656BC en el firmware Tenda AX1806 1.0.0.1 provoca un desbordamiento del b\u00fafer basado en pila." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.6, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/Feng-ZZ-pwn/IOT/blob/main/Tenda%20AX_1806/2/SetNetControlList.md", diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40415.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40415.json index cd03d6b03dc..e955085f3ba 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40415.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40415.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40415", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-15T18:15:05.490", - "lastModified": "2024-07-16T13:43:58.773", + "lastModified": "2024-08-01T13:57:19.517", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad en /goform/SetStaticRouteCfg en la funci\u00f3n sub_519F4 en el firmware Tenda AX1806 1.0.0.1 provoca un desbordamiento del b\u00fafer basado en pila." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/Feng-ZZ-pwn/IOT/blob/main/Tenda%20AX_1806/4/SetStaticRouteCfg.md", diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40416.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40416.json index 293e429481b..6bf813dee1b 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40416.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40416.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40416", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-15T18:15:05.543", - "lastModified": "2024-07-16T13:43:58.773", + "lastModified": "2024-08-01T13:57:20.773", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad en /goform/SetVirtualServerCfg en la funci\u00f3n sub_6320C en el firmware Tenda AX1806 1.0.0.1 provoca un desbordamiento del b\u00fafer basado en pila." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/Feng-ZZ-pwn/IOT/blob/main/Tenda%20AX_1806/3/SetVirtualServerCfg.md", diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40417.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40417.json index 033d31aaa6d..41322c9f31a 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40417.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40417.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40417", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-10T16:15:04.373", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-08-01T13:57:22.967", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se encontr\u00f3 una vulnerabilidad en Tenda AX1806 1.0.0.1. La funci\u00f3n formSetRebootTimer del archivo /goform/SetIpMacBind es afectada por esta vulnerabilidad. La manipulaci\u00f3n de la lista de argumentos provoca un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/Feng-ZZ-pwn/IOT/blob/main/Tenda%20AX_1806/1/SetIpMacBind.md", diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40420.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40420.json index dc4cda6f9b3..acee113ef37 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40420.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40420.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40420", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-17T19:15:11.363", - "lastModified": "2024-07-18T12:28:43.707", + "lastModified": "2024-08-01T13:57:24.680", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de Server-Side Template Injection (SSTI) en la funci\u00f3n de edici\u00f3n de tema del proyecto openCart v4.0.2.3 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la inyecci\u00f3n de un payload manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/A3h1nt/CVEs/blob/main/OpenCart/Readme.md", diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40425.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40425.json index 7576f382a1b..6f9a12e50a9 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40425.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40425.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40425", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-16T18:15:08.433", - "lastModified": "2024-07-17T13:34:20.520", + "lastModified": "2024-08-01T13:57:26.300", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de carga de archivos en Nanjin Xingyuantu Technology Co Sparkshop (Spark Mall B2C Mall v.1.1.6 y anteriores permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente contorller/common.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/J1rrY-learn/26524d4714a81cf2d64583069e96f765", diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40430.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40430.json index 722bbfc89e2..d5bc087b03a 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40430.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40430.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40430", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T07:15:02.207", - "lastModified": "2024-07-31T20:15:05.960", + "lastModified": "2024-08-01T13:57:27.417", "vulnStatus": "Modified", "cveTags": [ { @@ -43,6 +43,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -56,6 +76,16 @@ "value": "CWE-639" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40433.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40433.json index b39cd671a2b..f188652b634 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40433.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40433.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40433", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-26T22:15:03.943", - "lastModified": "2024-07-29T14:12:08.783", + "lastModified": "2024-08-01T13:57:28.500", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " La vulnerabilidad de permisos inseguros en Tencent wechat v.8.0.37 permite a un atacante escalar privilegios a trav\u00e9s del componente de vista web." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + } + ] + } + ], "references": [ { "url": "https://github.com/yikaikkk/CookieShareInWebView/blob/master/README.md", diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40455.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40455.json index b87a8656301..26982cf5fb7 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40455.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40455.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40455", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-16T20:15:03.587", - "lastModified": "2024-07-17T13:34:20.520", + "lastModified": "2024-08-01T13:57:29.287", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Una vulnerabilidad de eliminaci\u00f3n de archivos arbitrarios en ThinkSAAS v3.7 permite a los atacantes eliminar archivos arbitrarios mediante una solicitud manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 2.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://gold-textbook-8ff.notion.site/ThinkSAAS-Arbitrary-folder-deletion-vulnerability-f992ed6124bc46ccaa8c2982274b17e2?pvs=25", diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40456.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40456.json index 2f01b4fa1ab..06a148bb9da 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40456.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40456.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40456", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-16T20:15:03.687", - "lastModified": "2024-07-17T13:34:20.520", + "lastModified": "2024-08-01T13:57:29.487", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que ThinkSAAS v3.7.0 contiene una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro de nombre en \\system\\action\\update.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://www.notion.so/ThinkSAAS-administrator-backend-SQL-injection-3a5c8c72fc374446892f8dc81ec94923?pvs=4", diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40464.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40464.json index 87146de229a..20097be357d 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40464.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40464.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40464", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-31T21:15:17.640", - "lastModified": "2024-07-31T21:15:17.640", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in beego v.2.2.0 and before allows a remote attacker to escalate privileges via the sendMail function located in beego/core/logs/smtp.go file" + }, + { + "lang": "es", + "value": " Un problema en beego v.2.2.0 y anteriores permite a un atacante remoto escalar privilegios a trav\u00e9s de la funci\u00f3n sendMail ubicada en el archivo beego/core/logs/smtp.go" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40465.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40465.json index fe9060bbbf5..0c9224a028e 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40465.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40465.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40465", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-31T21:15:17.733", - "lastModified": "2024-07-31T21:15:17.733", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in beego v.2.2.0 and before allows a remote attacker to escalate privileges via the getCacheFileName function in file.go file" + }, + { + "lang": "es", + "value": "Un problema en beego v.2.2.0 y anteriores permite a un atacante remoto escalar privilegios a trav\u00e9s de la funci\u00f3n getCacheFileName en el archivo file.go" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40492.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40492.json index 3773f44736e..23a42f50e2d 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40492.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40492.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40492", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-17T22:15:03.923", - "lastModified": "2024-07-18T12:28:43.707", + "lastModified": "2024-08-01T13:57:30.260", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de Cross Site Scripting en Heartbeat Chat v.15.2.1 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n setname." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/minendie/POC_CVE-2024-40492", diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40495.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40495.json index 0d2e72938bb..53de108fa9f 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40495.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40495.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40495", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T19:15:04.693", - "lastModified": "2024-07-25T12:36:39.947", + "lastModified": "2024-08-01T13:57:31.037", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Se descubri\u00f3 una vulnerabilidad en Linksys Router E2500 con firmware 2.0.00, que permite a atacantes autenticados ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n hnd_parentalctrl_unblock." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "http://e2500.com", diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40502.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40502.json index 68abc7d197a..0675db396ce 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40502.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40502.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40502", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T21:15:04.077", - "lastModified": "2024-07-24T12:55:13.223", + "lastModified": "2024-08-01T13:57:31.240", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Vulnerabilidad de inyecci\u00f3n SQL en Hospital Management System Project in ASP.Net MVC 1 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n btn_login_b_Click de Loginpage.aspx" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://itsourcecode.com/author/angeljudesuarez/", diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40503.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40503.json index 18294416d1d..adabe5f7f5a 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40503.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40503.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40503", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-16T19:15:13.043", - "lastModified": "2024-07-17T13:34:20.520", + "lastModified": "2024-08-01T13:57:32.010", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en Tenda AX12 v.16.03.49.18_cn+ permite que un atacante remoto provoque una denegaci\u00f3n de servicio a trav\u00e9s de la funcionalidad de enrutamiento y el manejo de paquetes ICMP." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-940" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mivik/8927ad100a638756e1fe214dd5fca5f9", diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40505.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40505.json index 34ef1972334..97fa9717143 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40505.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40505.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40505", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-16T20:15:03.777", - "lastModified": "2024-07-17T13:34:20.520", + "lastModified": "2024-08-01T13:57:32.800", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "**NO COMPATIBLE CUANDO EST\u00c1 ASIGNADO** La vulnerabilidad de Directory Traversal en el firmware D-Link DAP-1650 v.1.03 permite a un atacante local escalar privilegios a trav\u00e9s del componente hedwig.cgi." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.3, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.5, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-35" + } + ] + } + ], "references": [ { "url": "https://coldwx.github.io/CVE-2024-40505.html", diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40515.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40515.json index 783c0c0981a..67231810931 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40515.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40515.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40515", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-16T20:15:03.863", - "lastModified": "2024-07-17T13:34:20.520", + "lastModified": "2024-08-01T13:57:33.567", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en SHENZHEN TENDA TECHNOLOGY CO.,LTD Tenda AX2pro V16.03.29.48_cn permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funcionalidad de enrutamiento." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-940" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/as-lky/410d6ae5c8ead88c2e0f5c641b2382ec", diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40516.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40516.json index 9fcc7544919..6cbbfa99dcf 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40516.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40516.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40516", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-16T19:15:13.133", - "lastModified": "2024-07-17T13:34:20.520", + "lastModified": "2024-08-01T13:57:34.333", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en H3C Technologies Co., Limited H3C Magic RC3000 RC3000V100R009 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funcionalidad de enrutamiento." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-940" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/as-lky/2acc62c6283c7a1fe3af046b05091d15", diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40518.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40518.json index f63a8512045..d58e28054ae 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40518.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40518.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40518", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-12T16:15:04.850", - "lastModified": "2024-07-12T18:45:07.223", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:57:35.120", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40520.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40520.json index 3c0df3b72a7..6da9d4ef222 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40520.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40520.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40520", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-12T16:15:04.967", - "lastModified": "2024-07-12T18:44:51.213", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:57:36.063", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40522.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40522.json index 6b95b8b9ed2..043e055fd21 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40522.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40522.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40522", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-12T16:15:05.080", - "lastModified": "2024-07-12T18:44:30.100", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:57:36.927", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40524.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40524.json index bc738b78135..1db3705cadb 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40524.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40524.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40524", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-15T23:15:02.423", - "lastModified": "2024-07-16T13:43:58.773", + "lastModified": "2024-08-01T13:57:37.610", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La vulnerabilidad de Directory Traversal en xmind2testcase v.1.5 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente webtool\\application.py." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://www.yuque.com/iceqaq/rtn9q7/cdd9w9phgxuqy4to", diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40539.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40539.json index b27390d160d..d0c1622c2cf 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40539.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40539.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40539", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-12T16:15:05.133", - "lastModified": "2024-07-12T18:43:42.057", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:57:39.077", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40540.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40540.json index 2925746e677..74292957324 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40540.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40540.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40540", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-12T16:15:05.187", - "lastModified": "2024-07-12T18:43:31.003", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:57:39.867", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40541.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40541.json index e9479a3ecd8..16710591aa7 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40541.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40541.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40541", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-12T16:15:05.240", - "lastModified": "2024-07-12T18:43:21.387", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:57:40.763", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40542.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40542.json index ba93fcee054..a4b69afff7c 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40542.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40542.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40542", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-12T16:15:05.300", - "lastModified": "2024-07-12T18:43:04.377", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:57:41.593", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40543.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40543.json index 48f75f9cc86..88cb561e4f5 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40543.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40543.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40543", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-12T16:15:05.350", - "lastModified": "2024-07-12T18:42:28.807", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:57:42.377", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-918" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40545.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40545.json index 82c9617fd8a..b2001670df2 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40545.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40545.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40545", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-12T16:15:05.457", - "lastModified": "2024-07-12T18:41:43.840", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:57:43.260", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40546.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40546.json index fd2e2b2dbbe..859cbd7f88a 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40546.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40546.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40546", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-12T16:15:05.517", - "lastModified": "2024-07-12T18:41:36.303", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:57:44.057", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40547.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40547.json index e67bd8a285e..2b09b2406f1 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40547.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40547.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40547", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-12T16:15:05.567", - "lastModified": "2024-07-12T18:41:18.863", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:57:44.873", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40548.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40548.json index 40fa078391b..dd776eee9f8 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40548.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40548.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40548", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-12T16:15:05.623", - "lastModified": "2024-07-12T18:40:53.650", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:57:45.097", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40550.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40550.json index 1c2a09ee4d4..4a2108a54c0 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40550.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40550.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40550", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-12T16:15:05.730", - "lastModified": "2024-07-12T18:40:22.040", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:57:46.093", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40551.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40551.json index ed6649541ab..e284d021546 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40551.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40551.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40551", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-12T16:15:05.797", - "lastModified": "2024-07-12T18:40:13.010", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:57:47.573", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40553.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40553.json index 5fdd3af8bfc..e489cd9b40c 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40553.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40553.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40553", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-15T16:15:03.147", - "lastModified": "2024-07-16T13:43:58.773", + "lastModified": "2024-08-01T13:57:48.930", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que Tmall_demo v2024.07.03 conten\u00eda una carga de archivo arbitraria a trav\u00e9s del componente uploadUserHeadImage." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://gitee.com/project_team/Tmall_demo/issues/IAANVC", diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40560.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40560.json index 5e244ae34af..16a234cb255 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40560.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40560.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40560", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-15T16:15:03.347", - "lastModified": "2024-07-16T13:43:58.773", + "lastModified": "2024-08-01T13:57:50.440", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que Tmall_demo anterior a v2024.07.03 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gitee.com/project_team/Tmall_demo/issues/IAAOT1", diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40576.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40576.json index 3b816748e46..8343d59ab7d 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40576.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40576.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40576", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-29T14:15:03.677", - "lastModified": "2024-07-30T22:15:02.417", + "lastModified": "2024-08-01T13:57:51.520", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de Cross Site Scripting en Best House Rental Management System 1.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de los par\u00e1metros \"House No\" y \"Description\" en la p\u00e1gina de casas en el componente index.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/jubilianite/CVEs/blob/main/CVE-2024-40576.md", diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40645.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40645.json index 199560c7d4b..054d6d91687 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40645.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40645.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40645", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-31T19:15:11.870", - "lastModified": "2024-07-31T19:15:11.870", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "FOG is a cloning/imaging/rescue suite/inventory management system. An improperly restricted file upload feature allows authenticated users to execute arbitrary code on the fogproject server. The Rebranding feature has a check on the client banner image requiring it to be 650 pixels wide and 120 pixels high. Apart from that, there are no checks on things like file extensions. This can be abused by appending a PHP webshell to the end of the image and changing the extension to anything the PHP web server will parse. This vulnerability is fixed in 1.5.10.41." + }, + { + "lang": "es", + "value": "FOG es un sistema de gesti\u00f3n de inventario, clonaci\u00f3n, im\u00e1genes, suite de rescate. Una funci\u00f3n de carga de archivos restringida incorrectamente permite a los usuarios autenticados ejecutar c\u00f3digo arbitrario en el servidor de fogproject. La funci\u00f3n de cambio de marca tiene una verificaci\u00f3n en la imagen del banner del cliente que requiere que tenga 650 p\u00edxeles de ancho y 120 p\u00edxeles de alto. Aparte de eso, no hay controles sobre cosas como las extensiones de archivos. Se puede abusar de esto agregando un webshell PHP al final de la imagen y cambiando la extensi\u00f3n a cualquier cosa que el servidor web PHP analice. Esta vulnerabilidad se solucion\u00f3 en 1.5.10.41." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40724.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40724.json index 9fa69254e7e..a1912238b44 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40724.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40724.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40724", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-07-19T08:15:02.070", - "lastModified": "2024-07-19T13:01:44.567", + "lastModified": "2024-08-01T13:57:55.270", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": " Una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n Heap de la memoria en versiones de Assimp anteriores a la 5.4.2 permite a un atacante local ejecutar c\u00f3digo arbitrario ingresando un archivo especialmente manipulado en el producto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://github.com/assimp/assimp/pull/5651/commits/614911bb3b1bfc3a1799ae2b3cca306270f3fb97", diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40728.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40728.json index e0e72d902ab..52a04164e30 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40728.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40728.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40728", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T18:15:11.270", - "lastModified": "2024-07-11T02:59:17.007", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:57:55.770", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40729.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40729.json index ce0fd8ac474..59ca136c8ff 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40729.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40729.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40729", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T18:15:11.353", - "lastModified": "2024-07-11T02:59:25.527", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:57:56.627", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40732.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40732.json index ed2ef21d791..d4cc71f016a 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40732.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40732.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40732", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T18:15:11.610", - "lastModified": "2024-07-11T02:57:54.827", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:57:57.473", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40738.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40738.json index f7e813c1bb1..866d6518fbd 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40738.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40738.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40738", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T18:15:12.107", - "lastModified": "2024-07-11T02:57:13.407", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:57:58.327", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40741.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40741.json index e5e07fdfbae..948486d5ae0 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40741.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40741.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40741", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T18:15:12.350", - "lastModified": "2024-07-11T02:54:30.653", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:57:59.147", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40764.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40764.json index db50d7d920f..8494f337c7b 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40764.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40764.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40764", "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2024-07-18T08:15:02.340", - "lastModified": "2024-07-18T12:28:43.707", + "lastModified": "2024-08-01T13:58:00.227", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Una vulnerabilidad de desbordamiento de b\u00fafer basada en mont\u00f3n en SonicOS IPSec VPN permite que un atacante remoto no autenticado provoque una denegaci\u00f3n de servicio (DoS)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "PSIRT@sonicwall.com", diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40777.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40777.json index 6b52bd380ac..670ff70e3ba 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40777.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40777.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40777", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:11.457", - "lastModified": "2024-07-30T13:32:45.943", + "lastModified": "2024-08-01T13:58:01.910", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": " Se solucion\u00f3 un problema de acceso fuera de los l\u00edmites mejorando la verificaci\u00f3n de l\u00edmites. Este problema se solucion\u00f3 en iOS 17.6 y iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Procesar un archivo creado con fines malintencionados puede provocar la finalizaci\u00f3n inesperada de la aplicaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/16", diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40781.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40781.json index 0bc73101b69..23d912a0645 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40781.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40781.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40781", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:11.727", - "lastModified": "2024-07-30T13:32:45.943", + "lastModified": "2024-08-01T13:58:02.880", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. Un atacante local puede aumentar sus privilegios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/18", diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40782.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40782.json index 4b3a4b8dab9..d8865ca9b77 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40782.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40782.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40782", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:11.790", - "lastModified": "2024-07-30T13:32:45.943", + "lastModified": "2024-08-01T13:58:03.853", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se solucion\u00f3 un problema de use after free con una gesti\u00f3n de memoria mejorada. Este problema se solucion\u00f3 en iOS 16.7.9 y iPadOS 16.7.9, Safari 17.6, iOS 17.6 y iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. El procesamiento de contenido web manipulado con fines malintencionados puede provocar un fallo inesperado del proceso." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/15", diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40783.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40783.json index a8ec8a32a17..a46aeca33f0 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40783.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40783.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40783", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:11.853", - "lastModified": "2024-07-30T13:32:45.943", + "lastModified": "2024-08-01T13:58:04.677", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " El problema se solucion\u00f3 mejorando la restricci\u00f3n del acceso a los contenedores de datos. Este problema se solucion\u00f3 en macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. Es posible que una aplicaci\u00f3n maliciosa pueda omitir las preferencias de privacidad." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/18", diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40784.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40784.json index 6ebb5d345fe..8e5f59caf14 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40784.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40784.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40784", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:11.923", - "lastModified": "2024-07-30T13:32:45.943", + "lastModified": "2024-08-01T13:58:05.490", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": " Se solucion\u00f3 un desbordamiento de enteros con una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en iOS 16.7.9 y iPadOS 16.7.9, macOS Ventura 13.6.8, iOS 17.6 y iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Procesar un archivo manipulado con fines malintencionados puede provocar la finalizaci\u00f3n inesperada de la aplicaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/16", diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40800.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40800.json index f0b7acecb77..02beeb724dd 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40800.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40800.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40800", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:12.743", - "lastModified": "2024-07-30T15:15:12.693", + "lastModified": "2024-08-01T13:58:06.780", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Se solucion\u00f3 un problema de validaci\u00f3n de entradas mejorando la validaci\u00f3n de entradas. Este problema se solucion\u00f3 en macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del sistema de archivos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-281" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/18", diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40802.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40802.json index 3c54aee86a9..67449699565 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40802.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40802.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40802", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:12.810", - "lastModified": "2024-07-30T13:32:45.943", + "lastModified": "2024-08-01T13:58:07.597", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. Un atacante local puede aumentar sus privilegios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/18", diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40805.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40805.json index 02106540aa4..9791a00c125 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40805.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40805.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40805", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:13.017", - "lastModified": "2024-07-30T13:32:45.943", + "lastModified": "2024-08-01T13:58:08.603", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema se solucion\u00f3 en watchOS 10.6, macOS Sonoma 14.6, iOS 17.6 y iPadOS 17.6, tvOS 17.6. Es posible que una aplicaci\u00f3n pueda omitir las preferencias de privacidad." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-281" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/16", diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40811.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40811.json index 4b7e6d30758..005fd289f8c 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40811.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40811.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40811", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:13.273", - "lastModified": "2024-07-30T13:32:45.943", + "lastModified": "2024-08-01T13:58:09.693", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en macOS Sonoma 14.6. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del sistema de archivos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-281" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/18", diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40814.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40814.json index 73cd472a253..166bbb05a71 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40814.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40814.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40814", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:13.460", - "lastModified": "2024-07-30T13:32:45.943", + "lastModified": "2024-08-01T13:58:10.717", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Se solucion\u00f3 un problema de degradaci\u00f3n con restricciones adicionales de firma de c\u00f3digo. Este problema se solucion\u00f3 en macOS Sonoma 14.6. Es posible que una aplicaci\u00f3n pueda omitir las preferencias de privacidad." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/18", diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40821.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40821.json index ddbf7d80a75..0078c52bc87 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40821.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40821.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40821", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:13.770", - "lastModified": "2024-07-30T13:32:45.943", + "lastModified": "2024-08-01T13:58:11.907", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se solucion\u00f3 un problema de acceso con restricciones adicionales de la sandbox. Este problema se solucion\u00f3 en macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. Es posible que las extensiones de aplicaciones de terceros no reciban las restricciones correctas de la sandbox." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-281" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/18", diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40824.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40824.json index a03e7822bb5..ec11fd1293c 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40824.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40824.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40824", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:13.990", - "lastModified": "2024-07-30T13:32:45.943", + "lastModified": "2024-08-01T13:58:12.907", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Esta cuesti\u00f3n se abord\u00f3 mediante una mejor gesti\u00f3n estatal. Este problema se solucion\u00f3 en watchOS 10.6, macOS Sonoma 14.6, iOS 17.6 y iPadOS 17.6, tvOS 17.6. Es posible que una aplicaci\u00f3n pueda omitir las preferencias de privacidad." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-281" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/16", diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40828.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40828.json index dbb4d9b7f90..1e839b41340 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40828.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40828.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40828", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:14.130", - "lastModified": "2024-07-30T13:32:45.943", + "lastModified": "2024-08-01T13:58:13.833", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. Es posible que una aplicaci\u00f3n maliciosa pueda obtener privilegios de root." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-281" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/18", diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40829.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40829.json index 3c696b5caab..f47ec4286c8 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40829.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40829.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40829", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:14.193", - "lastModified": "2024-07-30T13:32:45.943", + "lastModified": "2024-08-01T13:58:14.633", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": " El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en watchOS 10.6, iOS 17.6 y iPadOS 17.6, iOS 16.7.9 y iPadOS 16.7.9, macOS Ventura 13.6.8. Un atacante podr\u00eda ver contenido restringido desde la pantalla de bloqueo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/16", diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40836.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40836.json index dbddbf115ba..7ef78f916c7 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40836.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40836.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40836", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:14.570", - "lastModified": "2024-07-30T13:32:45.943", + "lastModified": "2024-08-01T13:58:15.220", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Se solucion\u00f3 un problema de l\u00f3gica con controles mejorados. Este problema se solucion\u00f3 en watchOS 10.6, macOS Sonoma 14.6, iOS 17.6 y iPadOS 17.6, iOS 16.7.9 y iPadOS 16.7.9. Un acceso directo puede utilizar datos confidenciales con determinadas acciones sin avisar al usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/16", diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40883.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40883.json index ae9e3560acf..d7e110f2270 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40883.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40883.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40883", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-08-01T02:15:02.023", - "lastModified": "2024-08-01T02:15:02.023", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site request forgery vulnerability exists in ELECOM wireless LAN routers. Viewing a malicious page while logging in to the affected product with an administrative privilege, the user may be directed to perform unintended operations such as changing the login ID, login password, etc." + }, + { + "lang": "es", + "value": " Existe una vulnerabilidad de Cross-site request forgery en los enrutadores LAN inal\u00e1mbricos ELECOM. Al ver una p\u00e1gina maliciosa mientras inicia sesi\u00f3n en el producto afectado con un privilegio administrativo, se puede dirigir al usuario a realizar operaciones no deseadas, como cambiar el ID de inicio de sesi\u00f3n, la contrase\u00f1a de inicio de sesi\u00f3n, etc." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40895.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40895.json index 5101bb908f7..dd283458c6c 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40895.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40895.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40895", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-07-30T09:15:03.987", - "lastModified": "2024-07-30T13:32:45.943", + "lastModified": "2024-08-01T13:58:15.617", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " FFRI AMC versiones 3.4.0 a 3.5.3 y algunos productos OEM que implementan/agrupan FFRI AMC versiones 3.4.0 a 3.5.3 permiten a un atacante remoto no autenticado ejecutar comandos arbitrarios del sistema operativo cuando se cumplen ciertas condiciones en un entorno donde el programa de notificaci\u00f3n La configuraci\u00f3n est\u00e1 habilitada y la ruta del archivo ejecutable est\u00e1 configurada en una extensi\u00f3n de archivo por lotes (.bat) o archivo de comando (.cmd)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/jp/JVN26734798/", diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40897.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40897.json index 9ea27bf876b..0a953767b07 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40897.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40897.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40897", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-07-26T06:15:02.290", - "lastModified": "2024-07-28T14:15:10.533", + "lastModified": "2024-08-01T13:58:16.503", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en orcparse.c de versiones de ORC anteriores a la 0.4.39. Si se enga\u00f1a a un desarrollador para que procese un archivo especialmente manipulado con el compilador ORC afectado, se puede ejecutar un c\u00f3digo arbitrario en el entorno de compilaci\u00f3n del desarrollador. Esto puede poner en peligro las m\u00e1quinas de desarrollo o los entornos de compilaci\u00f3n de CI." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/07/26/1", diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40898.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40898.json index 41453fad048..f4f2426ce4d 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40898.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40898.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40898", "sourceIdentifier": "security@apache.org", "published": "2024-07-18T10:15:03.217", - "lastModified": "2024-07-18T12:28:43.707", + "lastModified": "2024-08-01T13:58:17.817", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "SSRF en el servidor Apache HTTP en Windows con mod_rewrite en el contexto de servidor/vhost, permite potencialmente filtrar hashes NTML a un servidor malicioso a trav\u00e9s de SSRF y solicitudes maliciosas. Se recomienda a los usuarios actualizar a la versi\u00f3n 2.4.62, que soluciona este problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4058.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4058.json index 2a00287a4eb..b357da93f50 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4058.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4058.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4058", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-01T13:15:52.200", - "lastModified": "2024-06-07T15:40:49.707", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:59:23.240", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.2, + "impactScore": 6.0 } ] }, diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4076.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4076.json index 9080c1b81c5..b66dc7bb83c 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4076.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4076.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4076", "sourceIdentifier": "security-officer@isc.org", "published": "2024-07-23T15:15:05.500", - "lastModified": "2024-07-31T11:15:10.657", + "lastModified": "2024-08-01T13:59:24.073", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/07/23/1", diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4090.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4090.json index 42b2f7510f0..588870f13da 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4090.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4090.json @@ -2,13 +2,17 @@ "id": "CVE-2024-4090", "sourceIdentifier": "contact@wpscan.com", "published": "2024-08-01T06:15:02.587", - "lastModified": "2024-08-01T06:15:02.587", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Floating Notification Bar, Sticky Menu on Scroll, Announcement Banner, and Sticky Header for Any WordPress plugin before 2.7.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed" + }, + { + "lang": "es", + "value": "El complemento Floating Notification Bar, Sticky Menu on Scroll, Announcement Banner, and Sticky Header for Any de WordPress anterior a 2.7.2 no sanitiza ni escapan a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross Site Scripting. incluso cuando unfiltered_html no est\u00e1 permitido" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4096.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4096.json index 8e4ae32252f..2d1f6dadc34 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4096.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4096.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4096", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-30T06:15:02.723", - "lastModified": "2024-07-30T13:32:45.943", + "lastModified": "2024-08-01T13:59:25.313", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Responsive Tabs de WordPress hasta la versi\u00f3n 4.0.8 no sanitiza ni escapa a algunas de sus configuraciones de pesta\u00f1as, lo que podr\u00eda permitir a usuarios con altos privilegios, como Colaboradores y superiores, realizar ataques de Cross Site Scripting almacenado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/4dba5e9e-24be-458a-9150-7c7a958e66cb/", diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41107.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41107.json index 6d8ce6c1c44..d4e1247910d 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41107.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41107.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41107", "sourceIdentifier": "security@apache.org", "published": "2024-07-19T11:15:03.323", - "lastModified": "2024-07-19T14:15:06.080", + "lastModified": "2024-08-01T13:58:18.103", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "La autenticaci\u00f3n SAML de CloudStack (deshabilitada de forma predeterminada) no exige la verificaci\u00f3n de firmas. En entornos de CloudStack donde la autenticaci\u00f3n SAML est\u00e1 habilitada, un atacante que inicia la autenticaci\u00f3n de inicio de sesi\u00f3n \u00fanico SAML de CloudStack puede omitir la autenticaci\u00f3n SAML enviando una respuesta SAML falsificada sin firma y con un nombre de usuario conocido o adivinado y otros detalles de usuario de un usuario de CloudStack habilitado para SAML. cuenta. En tales entornos, esto puede resultar en un compromiso total de los recursos que posee y/o a los que puede acceder una cuenta de usuario habilitada para SAML. Se recomienda a los usuarios afectados que deshabiliten el complemento de autenticaci\u00f3n SAML configurando \"saml2.enabled\" en configuraci\u00f3n global en \"false\" o actualicen a la versi\u00f3n 4.18.2.2, 4.19.1.0 o posterior, que soluciona este problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41108.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41108.json index b5e1cd711b4..199849f148a 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41108.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41108.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41108", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-31T19:15:12.110", - "lastModified": "2024-07-31T19:15:12.110", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "FOG is a free open-source cloning/imaging/rescue suite/inventory management system. The hostinfo page has missing/improper access control since only the host's mac address is required to obtain the configuration information. This data can only be retrieved if a task is pending on that host.\u00a0Otherwise, an error message containing \"Invalid tasking!\" will be returned. The domainpassword in the hostinfo dump is hidden even to authenticated users, as it is displayed as a row of asterisks when navigating to the host's Active Directory settings. This vulnerability is fixed in 1.5.10.41." + }, + { + "lang": "es", + "value": "FOG es un sistema gratuito de gesti\u00f3n de inventario, im\u00e1genes, clonaci\u00f3n y rescate de c\u00f3digo abierto. Falta el control de acceso de la p\u00e1gina hostinfo o \u00e9ste es inadecuado, ya que solo se requiere la direcci\u00f3n mac del host para obtener la informaci\u00f3n de configuraci\u00f3n. Estos datos solo se pueden recuperar si hay una tarea pendiente en ese host. De lo contrario, aparecer\u00e1 un mensaje de error que contiene \"\u00a1Invalid tasking!\" Ser\u00e1 devuelto. La contrase\u00f1a de dominio en el volcado de informaci\u00f3n del host est\u00e1 oculta incluso para los usuarios autenticados, ya que se muestra como una fila de asteriscos al navegar a la configuraci\u00f3n de Active Directory del host. Esta vulnerabilidad se solucion\u00f3 en 1.5.10.41." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41133.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41133.json index de0402c1152..aaf7697b84a 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41133.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41133.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41133", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-07-24T20:15:04.237", - "lastModified": "2024-07-25T12:36:39.947", + "lastModified": "2024-08-01T13:58:20.157", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://csaf.arubanetworks.com/2024/hpe_aruba_networking_-_hpesbnw04673.txt", diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41134.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41134.json index da3df8be7d5..25bc6ee3a02 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41134.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41134.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41134", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-07-24T20:15:04.427", - "lastModified": "2024-07-25T12:36:39.947", + "lastModified": "2024-08-01T13:58:20.873", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://csaf.arubanetworks.com/2024/hpe_aruba_networking_-_hpesbnw04673.txt", diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41135.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41135.json index 745ad9e12ba..9da2e0b3ce9 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41135.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41135.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41135", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-07-24T20:15:04.600", - "lastModified": "2024-07-25T12:36:39.947", + "lastModified": "2024-08-01T13:58:21.583", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://csaf.arubanetworks.com/2024/hpe_aruba_networking_-_hpesbnw04673.txt", diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41136.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41136.json index dac69b72305..ad821ab9f79 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41136.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41136.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41136", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-07-24T21:15:11.857", - "lastModified": "2024-07-26T13:22:02.033", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:58:22.270", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -69,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41139.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41139.json index 01e84a1f953..ddbe709c5ab 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41139.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41139.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41139", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-07-29T09:15:02.563", - "lastModified": "2024-07-29T14:12:08.783", + "lastModified": "2024-08-01T13:58:22.960", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Existe una vulnerabilidad de asignaci\u00f3n de privilegios incorrecta en SKYSEA Client View Ver.6.010.06 a Ver.19.210.04e. Si un usuario que puede iniciar sesi\u00f3n en el PC donde est\u00e1 instalado el cliente Windows del producto coloca un archivo DLL especialmente manipulado en una carpeta espec\u00edfica, se puede ejecutar c\u00f3digo arbitrario con privilegios de SYSTEM." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/jp/JVN84326763/", diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41172.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41172.json index 0b5f023c7cd..377d601fdd2 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41172.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41172.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41172", "sourceIdentifier": "security@apache.org", "published": "2024-07-19T09:15:05.640", - "lastModified": "2024-07-19T13:01:44.567", + "lastModified": "2024-08-01T13:58:23.907", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En las versiones de Apache CXF anteriores a 3.6.4 y 4.0.5 (las versiones 3.5.x y inferiores no se ven afectadas), un conducto de cliente HTTP de CXF puede impedir que las instancias de HTTPClient se recopilen como basura y es posible que el consumo de memoria contin\u00fae aumentando eventualmente causando que la aplicaci\u00f3n se quede sin memoria." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41178.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41178.json index e913e78f81d..e1d88a1e8ed 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41178.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41178.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41178", "sourceIdentifier": "security@apache.org", "published": "2024-07-23T17:15:12.663", - "lastModified": "2024-07-24T12:55:13.223", + "lastModified": "2024-08-01T13:58:24.173", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Exposici\u00f3n de credenciales temporales en registros en Apache Arrow Rust Object Store (caja `object_store`), versi\u00f3n 0.10.1 y anteriores en todas las plataformas que utilizan AWS WebIdentityTokens. En determinadas condiciones de error, los registros pueden contener el token OIDC pasado a AssumeRoleWithWebIdentity https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRoleWithWebIdentity.html. Esto permite que alguien con acceso a los registros se haga pasar por esa identidad, incluida la realizaci\u00f3n de sus propias llamadas a AssumeRoleWithWebIdentity, hasta que caduque el token OIDC. Normalmente, los tokens OIDC son v\u00e1lidos por hasta una hora, aunque esto variar\u00e1 seg\u00fan el emisor. Se recomienda a los usuarios utilizar un mecanismo de autenticaci\u00f3n de AWS diferente, deshabilitar el registro o actualizar a la versi\u00f3n 0.10.2, que soluciona este problema. Detalles: cuando se utilizan AWS WebIdentityTokens con la caja object_store, en caso de error y reintento autom\u00e1tico, el error de solicitud subyacente, incluida la URL completa con las credenciales, potencialmente en los par\u00e1metros, se escribe en los registros. Gracias a Paul Hatcherian por informar de esta vulnerabilidad." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41184.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41184.json index ec2c1b2543d..77a96304c63 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41184.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41184.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41184", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-18T01:15:15.253", - "lastModified": "2024-07-18T14:15:05.137", + "lastModified": "2024-08-01T13:58:24.370", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -22,7 +22,42 @@ "value": "En el controlador vrrp_ipsets_handler (fglobal_parser.c) de keepalived hasta 2.3.1, puede ocurrir un desbordamiento de enteros. NOTA: Es posible que este registro CVE no valga la pena porque el usuario debe configurar un nombre de ipset vac\u00edo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], "references": [ { "url": "https://github.com/acassen/keepalived/issues/2447#issuecomment-2231329734", diff --git a/CVE-2024/CVE-2024-412xx/CVE-2024-41253.json b/CVE-2024/CVE-2024-412xx/CVE-2024-41253.json index 344006dac42..cd061d0b308 100644 --- a/CVE-2024/CVE-2024-412xx/CVE-2024-41253.json +++ b/CVE-2024/CVE-2024-412xx/CVE-2024-41253.json @@ -2,16 +2,55 @@ "id": "CVE-2024-41253", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-31T21:15:17.847", - "lastModified": "2024-07-31T21:15:17.847", - "vulnStatus": "Received", + "lastModified": "2024-08-01T13:58:25.153", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "goframe v2.7.2 is configured to skip TLS certificate verification, possibly allowing attackers to execute a man-in-the-middle attack via the gclient component." + }, + { + "lang": "es", + "value": " goframe v2.7.2 est\u00e1 configurado para omitir la verificaci\u00f3n del certificado TLS, lo que posiblemente permita a los atacantes ejecutar un ataque de man-in-the-middle a trav\u00e9s del componente gclient." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-599" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/nyxfqq/f69d41c69a4d0751841f4d972b9745da", diff --git a/CVE-2024/CVE-2024-412xx/CVE-2024-41254.json b/CVE-2024/CVE-2024-412xx/CVE-2024-41254.json index ef0e7ca485a..a9e017d84d5 100644 --- a/CVE-2024/CVE-2024-412xx/CVE-2024-41254.json +++ b/CVE-2024/CVE-2024-412xx/CVE-2024-41254.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41254", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-31T21:15:17.940", - "lastModified": "2024-07-31T21:15:17.940", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in litestream v0.3.13. The usage of the ssh.InsecureIgnoreHostKey() disables host key verification, possibly allowing attackers to obtain sensitive information via a man-in-the-middle attack." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 un problema en litestream v0.3.13. El uso de ssh.InsecureIgnoreHostKey() deshabilita la verificaci\u00f3n de la clave del host, lo que posiblemente permita a los atacantes obtener informaci\u00f3n confidencial a trav\u00e9s de un ataque de man-in-the-middle." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-412xx/CVE-2024-41255.json b/CVE-2024/CVE-2024-412xx/CVE-2024-41255.json index 6640db23999..19cbbbd5f6b 100644 --- a/CVE-2024/CVE-2024-412xx/CVE-2024-41255.json +++ b/CVE-2024/CVE-2024-412xx/CVE-2024-41255.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41255", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-31T21:15:18.030", - "lastModified": "2024-07-31T21:15:18.030", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "filestash v0.4 is configured to skip TLS certificate verification when using the FTPS protocol, possibly allowing attackers to execute a man-in-the-middle attack via the Init function of index.go." + }, + { + "lang": "es", + "value": " filestash v0.4 est\u00e1 configurado para omitir la verificaci\u00f3n del certificado TLS cuando se usa el protocolo FTPS, lo que posiblemente permita a los atacantes ejecutar un ataque de man-in-the-middle a trav\u00e9s de la funci\u00f3n Init de index.go." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-412xx/CVE-2024-41256.json b/CVE-2024/CVE-2024-412xx/CVE-2024-41256.json index 167b9653bfe..b3b032092c6 100644 --- a/CVE-2024/CVE-2024-412xx/CVE-2024-41256.json +++ b/CVE-2024/CVE-2024-412xx/CVE-2024-41256.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41256", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-31T21:15:18.117", - "lastModified": "2024-07-31T21:15:18.117", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Default configurations in the ShareProofVerifier function of filestash v0.4 causes the application to skip the TLS certificate verification process when sending out email verification codes, possibly allowing attackers to access sensitive data via a man-in-the-middle attack." + }, + { + "lang": "es", + "value": "Las configuraciones predeterminadas en la funci\u00f3n ShareProofVerifier de filestash v0.4 hacen que la aplicaci\u00f3n omita el proceso de verificaci\u00f3n del certificado TLS al enviar c\u00f3digos de verificaci\u00f3n por correo electr\u00f3nico, lo que posiblemente permita a los atacantes acceder a datos confidenciales a trav\u00e9s de un ataque de man-in-the-middle." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-412xx/CVE-2024-41258.json b/CVE-2024/CVE-2024-412xx/CVE-2024-41258.json index 21e0d619d2e..66e7a4f29a2 100644 --- a/CVE-2024/CVE-2024-412xx/CVE-2024-41258.json +++ b/CVE-2024/CVE-2024-412xx/CVE-2024-41258.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41258", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-31T21:15:18.200", - "lastModified": "2024-07-31T21:15:18.200", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in filestash v0.4. The usage of the ssh.InsecureIgnoreHostKey() disables host key verification, possibly allowing attackers to obtain sensitive information via a man-in-the-middle attack." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 un problema en filestash v0.4. El uso de ssh.InsecureIgnoreHostKey() deshabilita la verificaci\u00f3n de la clave del host, lo que posiblemente permita a los atacantes obtener informaci\u00f3n confidencial a trav\u00e9s de un ataque de man-in-the-middle." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-412xx/CVE-2024-41262.json b/CVE-2024/CVE-2024-412xx/CVE-2024-41262.json index 8bb5cb35b23..6199868b6eb 100644 --- a/CVE-2024/CVE-2024-412xx/CVE-2024-41262.json +++ b/CVE-2024/CVE-2024-412xx/CVE-2024-41262.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41262", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-31T22:15:02.427", - "lastModified": "2024-07-31T22:15:02.427", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "mmudb v1.9.3 was discovered to use the HTTP protocol in the ShowMetricsRaw and ShowMetricsAsText functions, possibly allowing attackers to intercept communications via a man-in-the-middle attack." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que mmudb v1.9.3 utiliza el protocolo HTTP en las funciones ShowMetricsRaw y ShowMetricsAsText, lo que posiblemente permite a los atacantes interceptar las comunicaciones a trav\u00e9s de un ataque de man-in-the-middle." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-412xx/CVE-2024-41281.json b/CVE-2024/CVE-2024-412xx/CVE-2024-41281.json index dfec1e1ed94..542c2216a43 100644 --- a/CVE-2024/CVE-2024-412xx/CVE-2024-41281.json +++ b/CVE-2024/CVE-2024-412xx/CVE-2024-41281.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41281", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-19T17:15:03.330", - "lastModified": "2024-07-22T13:00:53.287", + "lastModified": "2024-08-01T13:58:25.943", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Linksys WRT54G v4.21.5 tiene una vulnerabilidad de desbordamiento de pila en la funci\u00f3n get_merge_mac." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/BuaaIOTTeam/Iot_Linksys/blob/main/Linksys_WRT54G_get_merge_mac.md", diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41305.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41305.json index 637218f2cd6..178b2481e84 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41305.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41305.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41305", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-30T18:15:05.910", - "lastModified": "2024-07-31T12:57:02.300", + "lastModified": "2024-08-01T13:58:26.800", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Server-Side Request Forgery (SSRF) en la p\u00e1gina de complementos de WonderCMS v3.4.3 permite a los atacantes forzar a la aplicaci\u00f3n a realizar solicitudes arbitrarias mediante la inyecci\u00f3n de URL manipuladas en el par\u00e1metro pluginThemeUrl." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/patrickdeanramos/WonderCMS-version-3.4.3-is-vulnerable-to-Server-Side-Request-Forgery", diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41314.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41314.json index 590986a3583..97520c13b2b 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41314.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41314.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41314", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T14:15:06.627", - "lastModified": "2024-07-24T12:55:13.223", + "lastModified": "2024-08-01T13:58:28.057", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Se descubri\u00f3 que TOTOLINK A6000R V1.0.1-B20201211.2000 contiene una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro iface en la funci\u00f3n vif_disable." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/yanggao017/8593748d4e2de1582344b4035b2456c6", diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41315.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41315.json index c4c231d99ab..76de13c4286 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41315.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41315.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41315", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T14:15:06.693", - "lastModified": "2024-07-24T12:55:13.223", + "lastModified": "2024-08-01T13:58:28.840", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Se descubri\u00f3 que TOTOLINK A6000R V1.0.1-B20201211.2000 contiene una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro ifname en la funci\u00f3n apcli_do_enr_pin_wps." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/yanggao017/add8d85589614d09e3e8ccb1fb335f64", diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41316.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41316.json index 70368f636c3..b2220ee80e9 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41316.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41316.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41316", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T14:15:06.757", - "lastModified": "2024-07-24T12:55:13.223", + "lastModified": "2024-08-01T13:58:29.627", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Se descubri\u00f3 que TOTOLINK A6000R V1.0.1-B20201211.2000 contiene una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro ifname en la funci\u00f3n apcli_cancel_wps." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/yanggao017/690f3e4b5045bbdf1209baa30fb53065", diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41317.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41317.json index b44f8ae55f8..c6bf4c78f50 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41317.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41317.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41317", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T14:15:06.817", - "lastModified": "2024-07-24T12:55:13.223", + "lastModified": "2024-08-01T13:58:30.410", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Se descubri\u00f3 que TOTOLINK A6000R V1.0.1-B20201211.2000 contiene una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro ifname en la funci\u00f3n apcli_do_enr_pbc_wps." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/yanggao017/8b7a567996f1986ac9fb3ab427c59227", diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41318.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41318.json index b15c640a978..096b38f8ec7 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41318.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41318.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41318", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T14:15:06.880", - "lastModified": "2024-07-24T12:55:13.223", + "lastModified": "2024-08-01T13:58:31.180", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK A6000R V1.0.1-B20201211.2000 contiene una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro ifname en la funci\u00f3n apcli_wps_gen_pincode." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/yanggao017/dc88fb2e29291503addf1e7aa3775578", diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41319.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41319.json index 56c638a5d88..9cf494ecb57 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41319.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41319.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41319", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-23T15:15:05.050", - "lastModified": "2024-07-25T17:49:23.857", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:58:31.957", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41320.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41320.json index 9ecb8f03b8d..25d3294fe83 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41320.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41320.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41320", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T14:15:06.940", - "lastModified": "2024-07-24T12:55:13.223", + "lastModified": "2024-08-01T13:58:32.723", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Se descubri\u00f3 que TOTOLINK A6000R V1.0.1-B20201211.2000 contiene una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro ifname en la funci\u00f3n get_apcli_conn_info." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/yanggao017/081d8638c117e708a4d36783b9230ce5", diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41353.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41353.json index d135cf01acd..c26d0f0a0e7 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41353.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41353.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41353", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-26T17:15:12.457", - "lastModified": "2024-07-29T14:12:08.783", + "lastModified": "2024-08-01T13:58:33.490", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " phpipam 1.6 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s de app\\admin\\groups\\edit-group.php" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/phpipam/phpipam/issues/4147", diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41354.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41354.json index f03fa4ea4be..ad85bfb1d40 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41354.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41354.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41354", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-26T17:15:12.513", - "lastModified": "2024-07-29T14:12:08.783", + "lastModified": "2024-08-01T13:58:34.267", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "phpipam 1.6 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s de /app/admin/widgets/edit.php" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/phpipam/phpipam/issues/4150", diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41355.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41355.json index b35b8abde26..9fcf2a7db76 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41355.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41355.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41355", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-26T16:15:03.277", - "lastModified": "2024-07-29T14:12:08.783", + "lastModified": "2024-08-01T13:58:35.033", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " phpipam 1.6 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s de /app/tools/request-ip/index.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/phpipam/phpipam/issues/4151", diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41356.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41356.json index 61fce190efe..72f90849404 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41356.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41356.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41356", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-26T16:15:03.357", - "lastModified": "2024-07-29T14:12:08.783", + "lastModified": "2024-08-01T13:58:35.803", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " phpipam 1.6 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s de app\\admin\\firewall-zones\\zones-edit-network.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/phpipam/phpipam/issues/4146", diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41357.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41357.json index bccd9d19a63..0bf15270243 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41357.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41357.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41357", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-26T16:15:03.427", - "lastModified": "2024-07-29T14:12:08.783", + "lastModified": "2024-08-01T13:58:36.627", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " phpipam 1.6 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s de /app/admin/powerDNS/record-edit.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/phpipam/phpipam/issues/4149", diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41373.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41373.json index f07dab713e5..37c072f1b1a 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41373.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41373.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41373", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-26T17:15:12.573", - "lastModified": "2024-07-29T14:12:08.783", + "lastModified": "2024-08-01T13:58:37.403", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " ICEcoder 8.1 contiene una vulnerabilidad Path Traversal a trav\u00e9s de lib/backup-versions-preview-loader.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://github.com/xjzzzxx/vulFound/blob/main/icecoder/icecoder8.1_PT.md", diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41374.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41374.json index b6164e6a268..ea723f672f5 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41374.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41374.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41374", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-26T17:15:12.630", - "lastModified": "2024-07-29T14:12:08.783", + "lastModified": "2024-08-01T13:58:38.380", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " ICEcoder 8.1 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s de lib/settings-screen.php" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/xjzzzxx/vulFound/blob/main/icecoder/icecoder8.1_xss2.md", diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41375.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41375.json index e362fed2b8f..fb4c4bd2701 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41375.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41375.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41375", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-26T17:15:12.690", - "lastModified": "2024-07-29T14:12:08.783", + "lastModified": "2024-08-01T13:58:39.487", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " ICEcoder 8.1 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s de lib/terminal-xhr.php" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/xjzzzxx/vulFound/blob/main/icecoder/icecoder8.1_xss1.md", diff --git a/CVE-2024/CVE-2024-414xx/CVE-2024-41438.json b/CVE-2024/CVE-2024-414xx/CVE-2024-41438.json index dacdcf684c9..9d0ec654398 100644 --- a/CVE-2024/CVE-2024-414xx/CVE-2024-41438.json +++ b/CVE-2024/CVE-2024-414xx/CVE-2024-41438.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41438", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-30T19:15:11.027", - "lastModified": "2024-07-31T12:57:02.300", + "lastModified": "2024-08-01T13:58:40.670", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en la funci\u00f3n cp_stored() (/vendor/cute_png.h) de hicolor v0.5.0 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un archivo PNG manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/heapof-r65280-cp_stored-cute_png-543c2", diff --git a/CVE-2024/CVE-2024-414xx/CVE-2024-41440.json b/CVE-2024/CVE-2024-414xx/CVE-2024-41440.json index 098ac586eb1..561bebb62c9 100644 --- a/CVE-2024/CVE-2024-414xx/CVE-2024-41440.json +++ b/CVE-2024/CVE-2024-414xx/CVE-2024-41440.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41440", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-30T19:15:11.210", - "lastModified": "2024-07-31T12:57:02.300", + "lastModified": "2024-08-01T13:58:41.773", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en la funci\u00f3n png_quantize() de hicolor v0.5.0 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un archivo PNG manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/heapof-w1-png_quantize-cli-220c32", diff --git a/CVE-2024/CVE-2024-414xx/CVE-2024-41459.json b/CVE-2024/CVE-2024-414xx/CVE-2024-41459.json index 2901bf32d75..853a354c878 100644 --- a/CVE-2024/CVE-2024-414xx/CVE-2024-41459.json +++ b/CVE-2024/CVE-2024-414xx/CVE-2024-41459.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41459", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T21:15:12.037", - "lastModified": "2024-07-26T13:21:21.527", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:58:42.827", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-414xx/CVE-2024-41460.json b/CVE-2024/CVE-2024-414xx/CVE-2024-41460.json index 5d919195f4c..435e7d8fb0f 100644 --- a/CVE-2024/CVE-2024-414xx/CVE-2024-41460.json +++ b/CVE-2024/CVE-2024-414xx/CVE-2024-41460.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41460", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T21:15:12.097", - "lastModified": "2024-07-26T13:21:12.487", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:58:43.920", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-414xx/CVE-2024-41461.json b/CVE-2024/CVE-2024-414xx/CVE-2024-41461.json index 651283ee5af..ce079e47909 100644 --- a/CVE-2024/CVE-2024-414xx/CVE-2024-41461.json +++ b/CVE-2024/CVE-2024-414xx/CVE-2024-41461.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41461", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T21:15:12.150", - "lastModified": "2024-07-26T13:20:59.047", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:58:44.983", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-414xx/CVE-2024-41462.json b/CVE-2024/CVE-2024-414xx/CVE-2024-41462.json index 2e9c8a5838a..e54638121d7 100644 --- a/CVE-2024/CVE-2024-414xx/CVE-2024-41462.json +++ b/CVE-2024/CVE-2024-414xx/CVE-2024-41462.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41462", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T21:15:12.207", - "lastModified": "2024-07-26T13:20:13.453", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:58:45.997", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-414xx/CVE-2024-41463.json b/CVE-2024/CVE-2024-414xx/CVE-2024-41463.json index 21597741c7f..fd845fb5e00 100644 --- a/CVE-2024/CVE-2024-414xx/CVE-2024-41463.json +++ b/CVE-2024/CVE-2024-414xx/CVE-2024-41463.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41463", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T21:15:12.260", - "lastModified": "2024-07-26T13:20:00.773", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:58:46.833", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-414xx/CVE-2024-41464.json b/CVE-2024/CVE-2024-414xx/CVE-2024-41464.json index 27240ea1cc9..6169fa1b4de 100644 --- a/CVE-2024/CVE-2024-414xx/CVE-2024-41464.json +++ b/CVE-2024/CVE-2024-414xx/CVE-2024-41464.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41464", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T21:15:12.313", - "lastModified": "2024-07-26T13:19:24.927", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:58:47.627", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-414xx/CVE-2024-41465.json b/CVE-2024/CVE-2024-414xx/CVE-2024-41465.json index daece90af2e..4514f850498 100644 --- a/CVE-2024/CVE-2024-414xx/CVE-2024-41465.json +++ b/CVE-2024/CVE-2024-414xx/CVE-2024-41465.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41465", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T21:15:12.370", - "lastModified": "2024-07-26T13:19:42.807", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:58:48.403", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-414xx/CVE-2024-41466.json b/CVE-2024/CVE-2024-414xx/CVE-2024-41466.json index 546aaa1b193..faf81ab312c 100644 --- a/CVE-2024/CVE-2024-414xx/CVE-2024-41466.json +++ b/CVE-2024/CVE-2024-414xx/CVE-2024-41466.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41466", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T21:15:12.423", - "lastModified": "2024-07-26T13:19:11.667", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:58:49.187", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-414xx/CVE-2024-41468.json b/CVE-2024/CVE-2024-414xx/CVE-2024-41468.json index 77532154306..d3f3d2fca9b 100644 --- a/CVE-2024/CVE-2024-414xx/CVE-2024-41468.json +++ b/CVE-2024/CVE-2024-414xx/CVE-2024-41468.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41468", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-25T22:15:09.113", - "lastModified": "2024-07-26T12:38:41.683", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-01T13:58:49.970", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que Tenda FH1201 v1.2.0.14 contiene una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro cmdinput en /goform/exeCommand" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/iotresearch/iot-vuln/blob/main/Tenda/FH1201/exeCommand/README.md", diff --git a/CVE-2024/CVE-2024-414xx/CVE-2024-41473.json b/CVE-2024/CVE-2024-414xx/CVE-2024-41473.json index 583abb93271..70a6a52a8ac 100644 --- a/CVE-2024/CVE-2024-414xx/CVE-2024-41473.json +++ b/CVE-2024/CVE-2024-414xx/CVE-2024-41473.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41473", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-25T22:15:09.177", - "lastModified": "2024-07-26T12:38:41.683", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-01T13:58:51.243", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que Tenda FH1201 v1.2.0.14 contiene una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro mac en ip/goform/WriteFacMac" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://github.com/iotresearch/iot-vuln/tree/main/Tenda/FH1201/WriteFacMac", diff --git a/CVE-2024/CVE-2024-414xx/CVE-2024-41492.json b/CVE-2024/CVE-2024-414xx/CVE-2024-41492.json index 82b4498e495..3163cd1810f 100644 --- a/CVE-2024/CVE-2024-414xx/CVE-2024-41492.json +++ b/CVE-2024/CVE-2024-414xx/CVE-2024-41492.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41492", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-19T17:15:03.410", - "lastModified": "2024-07-22T13:00:53.287", + "lastModified": "2024-08-01T13:58:52.487", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Un desbordamiento de pila en Tenda AX1806 v1.0.0.1 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una entrada manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Swind1er/4176fdc25e415296904c9fb19e2f8293", diff --git a/CVE-2024/CVE-2024-415xx/CVE-2024-41550.json b/CVE-2024/CVE-2024-415xx/CVE-2024-41550.json index 4eaa6eb64d3..7ec83228482 100644 --- a/CVE-2024/CVE-2024-415xx/CVE-2024-41550.json +++ b/CVE-2024/CVE-2024-415xx/CVE-2024-41550.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41550", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T20:15:04.777", - "lastModified": "2024-07-25T12:36:39.947", + "lastModified": "2024-08-01T13:58:53.253", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "CampCodes Supplier Management System v1.0 es vulnerable a la inyecci\u00f3n de SQL a trav\u00e9s de Supply_Management_System/admin/view_invoice_items.php?id=." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/Chencihai/Chencihai/blob/main/cve/supplier-management-system/SQLi-2.md", diff --git a/CVE-2024/CVE-2024-415xx/CVE-2024-41551.json b/CVE-2024/CVE-2024-415xx/CVE-2024-41551.json index 211dbc09b36..95fc5e47960 100644 --- a/CVE-2024/CVE-2024-415xx/CVE-2024-41551.json +++ b/CVE-2024/CVE-2024-415xx/CVE-2024-41551.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41551", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T20:15:04.837", - "lastModified": "2024-07-26T13:22:53.920", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:58:54.023", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-415xx/CVE-2024-41597.json b/CVE-2024/CVE-2024-415xx/CVE-2024-41597.json index 63fe9f9dc5c..d8f46417904 100644 --- a/CVE-2024/CVE-2024-415xx/CVE-2024-41597.json +++ b/CVE-2024/CVE-2024-415xx/CVE-2024-41597.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41597", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-19T20:15:08.993", - "lastModified": "2024-07-22T13:00:53.287", + "lastModified": "2024-08-01T13:58:54.793", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La vulnerabilidad de Cross Site Request Forgery en ProcessWire v.3.0.229 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un archivo HTML manipulado para la funcionalidad de comentarios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/DefensiumDevelopers/608be4d10b016dce0566925368a8b08c#file-cve-2024-41597-md", diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41601.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41601.json index 58bf69066e4..421b07a6893 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41601.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41601.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41601", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-19T17:15:03.490", - "lastModified": "2024-07-22T13:00:53.287", + "lastModified": "2024-08-01T13:58:55.750", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La vulnerabilidad de permisos inseguros en lin-CMS v.0.2.0 y anteriores permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del m\u00e9todo de inicio de sesi\u00f3n en el componente UserController.java." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-378" + } + ] + } + ], "references": [ { "url": "https://github.com/topsky979/Security-Collections/tree/main/CVE-2024-41601", diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41602.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41602.json index d7d9e23e1d5..9d570fa0586 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41602.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41602.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41602", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-19T17:15:03.570", - "lastModified": "2024-07-22T13:00:53.287", + "lastModified": "2024-08-01T13:58:56.507", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Vulnerabilidad de falsificaci\u00f3n de solicitudes entre sitios en Spina CMS v.2.18.0 y anteriores permite a un atacante remoto escalar privilegios a trav\u00e9s de una URL manipulada" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/topsky979/Security-Collections/tree/main/CVE-2024-41602", diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41603.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41603.json index 7afc285ffe3..e6e8f5d0e45 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41603.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41603.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41603", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-19T17:15:03.640", - "lastModified": "2024-07-22T13:00:53.287", + "lastModified": "2024-08-01T13:58:57.330", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Se descubri\u00f3 que Spina CMS v2.18.0 contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) a trav\u00e9s del URI /admin/layout." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.6, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/topsky979/Security-Collections/tree/main/CVE-2024-41603", diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41610.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41610.json index 0c3b8fa350a..16e79d28a78 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41610.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41610.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41610", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-30T20:15:04.713", - "lastModified": "2024-07-31T12:57:02.300", + "lastModified": "2024-08-01T13:58:58.120", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "D-Link DIR-820LW REVB FIRMWARE PATCH 2.03.B01_TC contiene credenciales codificadas en el servicio Telnet, lo que permite a los atacantes iniciar sesi\u00f3n de forma remota en el servicio Telnet y realizar comandos arbitrarios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], "references": [ { "url": "https://github.com/Nop3z/CVE/blob/main/dlink/dir-820/Dlink-820LW-hardcoded-vulnerability.md", diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41611.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41611.json index 88e3599e98d..a3eeb8a5f31 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41611.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41611.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41611", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-30T20:15:04.810", - "lastModified": "2024-07-31T12:57:02.300", + "lastModified": "2024-08-01T13:58:58.890", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " En D-Link DIR-860L REVA FIRMWARE PATCH 1.10..B04, el servicio Telnet contiene credenciales codificadas, lo que permite a los atacantes iniciar sesi\u00f3n de forma remota en el servicio Telnet y realizar comandos arbitrarios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], "references": [ { "url": "https://github.com/Nop3z/CVE/blob/main/dlink/dir-820/Dlink-860L-hardcoded-vulnerability.md", diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41628.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41628.json index b4ae3d65038..85500b39b60 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41628.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41628.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41628", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-26T21:15:14.303", - "lastModified": "2024-07-29T14:12:08.783", + "lastModified": "2024-08-01T13:58:59.747", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de Directory Traversal en Manynines Cluster Control 1.9.8 anterior a 1.9.8-9778, 2.0.0 anterior a 2.0.0-9779 y 2.1.0 anterior a 2.1.0-9780 permite a un atacante remoto incluir y mostrar contenido de archivo en una solicitud HTTP a trav\u00e9s de la API CMON." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "http://clustercontrol.com", diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41630.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41630.json index aa3d6733047..b58c85e61e0 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41630.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41630.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41630", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-31T19:15:12.390", - "lastModified": "2024-07-31T19:15:12.390", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow vulnerability in Tenda AC18 V15.03.3.10_EN allows a remote attacker to execute arbitrary code via the ssid parameter at ip/goform/fast_setting_wifi_set." + }, + { + "lang": "es", + "value": " Vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en Tenda AC18 V15.03.3.10_EN permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro ssid en ip/goform/fast_setting_wifi_set." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41631.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41631.json index 9e49c99c88e..6adafaa4e77 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41631.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41631.json @@ -2,16 +2,43 @@ "id": "CVE-2024-41631", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-29T16:15:04.987", - "lastModified": "2024-07-29T16:21:52.517", + "lastModified": "2024-08-01T13:59:00.513", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer Overflow vulnerability in host-host NEUQ_board v.1.0 allows a remote attacker to cause a denial of service via the password.h component." + }, + { + "lang": "es", + "value": " Vulnerabilidad de desbordamiento de b\u00fafer en host-host NEUQ_board v.1.0 permite que un atacante remoto provoque una denegaci\u00f3n de servicio a trav\u00e9s del componente password.h." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://github.com/host-host", diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41637.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41637.json index 1914cc30d86..84cce6bb6f7 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41637.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41637.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41637", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-29T06:15:02.267", - "lastModified": "2024-07-29T14:12:08.783", + "lastModified": "2024-08-01T13:59:00.710", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " RaspAP anterior a 3.1.5 permite a un atacante escalar privilegios: el usuario www-data tiene acceso de escritura al archivo restapi.service y tambi\u00e9n posee privilegios Sudo para ejecutar varios comandos cr\u00edticos sin contrase\u00f1a." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 8.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://blog.0xzon.dev/2024-07-27-CVE-2024-41637/", diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41640.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41640.json index 44ba950cf6e..3e40224750e 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41640.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41640.json @@ -2,16 +2,55 @@ "id": "CVE-2024-41640", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-29T16:15:05.057", - "lastModified": "2024-07-29T16:21:52.517", + "lastModified": "2024-08-01T13:59:01.527", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross Site Scripting (XSS) vulnerability in AML Surety Eco up to 3.5 allows an attacker to run arbitrary code via crafted GET request using the id parameter." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross Site Scripting (XSS) en AML Surety Eco hasta 3.5 permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud GET manipulada utilizando el par\u00e1metro id." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/alemusix/CVE-2024-41640", diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41660.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41660.json index 1adeb97b504..58cff77c80a 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41660.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41660.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41660", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-31T20:15:06.147", - "lastModified": "2024-07-31T20:15:06.147", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "slpd-lite is a unicast SLP UDP server. Any OpenBMC system that includes the slpd-lite package is impacted. Installing this package is the default when building OpenBMC. Nefarious users can send slp packets to the BMC using UDP port 427 to cause memory overflow issues within the slpd-lite daemon on the BMC. Patches will be available in the latest openbmc/slpd-lite repository." + }, + { + "lang": "es", + "value": " slpd-lite es un servidor SLP UDP de unidifusi\u00f3n. Cualquier sistema OpenBMC que incluya el paquete slpd-lite se ver\u00e1 afectado. La instalaci\u00f3n de este paquete es la opci\u00f3n predeterminada al compilar OpenBMC. Los usuarios nefastos pueden enviar paquetes slp al BMC utilizando el puerto UDP 427 para provocar problemas de desbordamiento de memoria dentro del daemon slpd-lite del BMC. Los parches estar\u00e1n disponibles en el \u00faltimo repositorio openbmc/slpd-lite." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41703.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41703.json index b47e9d02d5c..883e4879568 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41703.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41703.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41703", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T05:15:03.450", - "lastModified": "2024-07-25T16:55:48.747", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:59:05.890", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41704.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41704.json index b79053e71ab..76f68a4fc9a 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41704.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41704.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41704", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T05:15:03.537", - "lastModified": "2024-07-25T16:55:24.307", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:59:06.900", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41705.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41705.json index e442b04c1f2..d02900b1d71 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41705.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41705.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41705", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-25T08:15:02.467", - "lastModified": "2024-07-30T20:33:08.920", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:59:07.983", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -69,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41706.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41706.json index f143ef125d7..7ff36d88616 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41706.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41706.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41706", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-25T08:15:02.783", - "lastModified": "2024-07-30T20:32:18.270", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:59:08.790", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -69,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41726.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41726.json index e808930d830..4c508c83d7d 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41726.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41726.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41726", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-07-29T09:15:02.703", - "lastModified": "2024-07-29T14:12:08.783", + "lastModified": "2024-08-01T13:59:09.707", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Existe una vulnerabilidad de Path traversal en SKYSEA Client View Ver.3.013.00 a Ver.19.210.04e. Si se explota esta vulnerabilidad, un usuario que pueda iniciar sesi\u00f3n en el PC donde est\u00e1 instalado el cliente Windows del producto puede ejecutar un archivo ejecutable arbitrario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/jp/JVN84326763/", diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41880.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41880.json index c75b3908736..aa45c06d2c3 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41880.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41880.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41880", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T19:15:02.990", - "lastModified": "2024-07-24T12:55:13.223", + "lastModified": "2024-08-01T13:59:12.507", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " En veilid-core en Veilid anterior a 0.3.4, la funci\u00f3n de ping del protocolo puede usarse indebidamente de una manera que disminuye la efectividad de las rutas privadas y de seguridad." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] + } + ], "references": [ { "url": "https://gitlab.com/veilid/veilid/-/issues/395", diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41881.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41881.json index d19c8456e8d..e33f13ef8e3 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41881.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41881.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41881", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-07-29T09:15:02.773", - "lastModified": "2024-07-29T14:12:08.783", + "lastModified": "2024-08-01T13:59:13.313", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Las versiones SDoP anteriores a la 1.11 no manejan adecuadamente algunos par\u00e1metros dentro de los datos de entrada, lo que genera una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria. Cuando se enga\u00f1a a un usuario del producto afectado para que procese un archivo XML especialmente manipulado, se puede ejecutar c\u00f3digo arbitrario en el entorno del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/PhilipHazel/SDoP", diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41914.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41914.json index 07090ff3c35..23c0b21e461 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41914.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41914.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41914", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-07-24T15:15:12.437", - "lastModified": "2024-07-25T17:47:35.247", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:59:14.250", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -69,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41915.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41915.json index ddb540ac654..8f72527d24e 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41915.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41915.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41915", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-07-30T17:15:13.450", - "lastModified": "2024-07-31T12:57:02.300", + "lastModified": "2024-08-01T13:59:14.947", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04675en_us&docLocale=en_US", diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41924.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41924.json index 08bd760f3b2..6829ac1a485 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41924.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41924.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41924", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-07-30T09:15:05.203", - "lastModified": "2024-07-30T13:32:45.943", + "lastModified": "2024-08-01T13:59:15.743", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": " En la serie EC-CUBE 4 existe la aceptaci\u00f3n de datos extra\u00f1os que no son de confianza con vulnerabilidad de datos confiables. Si se explota esta vulnerabilidad, un atacante que obtuvo el privilegio administrativo puede instalar un paquete PHP arbitrario. Si se instalan versiones obsoletas de paquetes PHP, el producto puede verse afectado por algunas vulnerabilidades conocidas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://jvn.jp/en/jp/JVN48324254/", diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41947.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41947.json index 338f80432bf..a81f9a43458 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41947.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41947.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41947", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-31T16:15:04.540", - "lastModified": "2024-07-31T16:15:04.540", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. By creating a conflict when another user with more rights is currently editing a page, it is possible to execute JavaScript snippets on the side of the other user, which compromises the confidentiality, integrity and availability of the whole XWiki installation. This has been patched in XWiki 15.10.8 and 16.3.0RC1." + }, + { + "lang": "es", + "value": " XWiki Platform es una plataforma wiki gen\u00e9rica que ofrece servicios de ejecuci\u00f3n para aplicaciones creadas sobre ella. Al crear un conflicto cuando otro usuario con m\u00e1s derechos est\u00e1 editando una p\u00e1gina, es posible ejecutar fragmentos de JavaScript del otro usuario, lo que compromete la confidencialidad, integridad y disponibilidad de toda la instalaci\u00f3n de XWiki. Esto ha sido parcheado en XWiki 15.10.8 y 16.3.0RC1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41950.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41950.json index 1b735fab6b5..0dedfde0ef1 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41950.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41950.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41950", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-31T16:15:04.797", - "lastModified": "2024-07-31T16:15:04.797", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Haystack is an end-to-end LLM framework that allows you to build applications powered by LLMs, Transformer models, vector search and more. Haystack clients that let their users create and run Pipelines from scratch are vulnerable to remote code executions. Certain Components in Haystack use Jinja2 templates, if anyone can create and render that template on the client machine they run any code. The vulnerability has been fixed with Haystack `2.3.1`." + }, + { + "lang": "es", + "value": "Haystack es un framework LLM de un extremo a otro que le permite crear aplicaciones impulsadas por LLM, modelos Transformer, b\u00fasqueda vectorial y m\u00e1s. Los clientes Haystack que permiten a sus usuarios crear y ejecutar Pipelines desde cero son vulnerables a ejecuciones remotas de c\u00f3digo. Ciertos componentes en Haystack usan plantillas Jinja2, si alguien puede crear y representar esa plantilla en la m\u00e1quina cliente, ejecuta cualquier c\u00f3digo. La vulnerabilidad se ha solucionado con Haystack `2.3.1`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41951.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41951.json index debfcfc2f23..acad71e10e6 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41951.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41951.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41951", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-31T20:15:06.357", - "lastModified": "2024-07-31T20:15:06.357", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pheonix App is a Python application designed to streamline various tasks, from managing files to playing mini-games. The issue is that the map of encoding/decoding languages are visible in code. The Problem was patched in 0.2.4." + }, + { + "lang": "es", + "value": " Pheonix App es una aplicaci\u00f3n Python dise\u00f1ada para agilizar diversas tareas, desde administrar archivos hasta jugar minijuegos. El problema es que el mapa de lenguajes de codificaci\u00f3n/decodificaci\u00f3n es visible en el c\u00f3digo. El problema se solucion\u00f3 en 0.2.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41952.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41952.json index 8f5e5b091b9..64239e8d5ab 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41952.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41952.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41952", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-31T17:15:10.597", - "lastModified": "2024-07-31T17:15:10.597", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zitadel is an open source identity management system. ZITADEL administrators can enable a setting called \"Ignoring unknown usernames\" which helps mitigate attacks that try to guess/enumerate usernames. If enabled, ZITADEL will show the password prompt even if the user doesn't exist and report \"Username or Password invalid\". Due to a implementation change to prevent deadlocks calling the database, the flag would not be correctly respected in all cases and an attacker would gain information if an account exist within ZITADEL, since the error message shows \"object not found\" instead of the generic error message. This vulnerability is fixed in 2.58.1, 2.57.1, 2.56.2, 2.55.5, 2.54.8, and 2.53.9." + }, + { + "lang": "es", + "value": "Zitadel es un sistema de gesti\u00f3n de identidades de c\u00f3digo abierto. Los administradores de ZITADEL pueden habilitar una configuraci\u00f3n llamada \"Ignoring unknown usernames\" que ayuda a mitigar los ataques que intentan adivinar/enumerar nombres de usuario. Si est\u00e1 habilitado, ZITADEL mostrar\u00e1 la solicitud de contrase\u00f1a incluso si el usuario no existe e informar\u00e1 \"Username or Password invalid\". Debido a un cambio de implementaci\u00f3n para evitar interbloqueos al llamar a la base de datos, el flag no se respetar\u00eda correctamente en todos los casos y un atacante obtendr\u00eda informaci\u00f3n si existe una cuenta dentro de ZITADEL, ya que el mensaje de error muestra \"object not found\" en lugar del error gen\u00e9rico. mensaje. Esta vulnerabilidad se solucion\u00f3 en 2.58.1, 2.57.1, 2.56.2, 2.55.5, 2.54.8 y 2.53.9." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41953.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41953.json index ad53e6dc084..42315262e32 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41953.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41953.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41953", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-31T17:15:10.850", - "lastModified": "2024-07-31T17:15:10.850", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zitadel is an open source identity management system. ZITADEL uses HTML for emails and renders certain information such as usernames dynamically. That information can be entered by users or administrators. Due to a missing output sanitization, these emails could include malicious code. This may potentially lead to a threat where an attacker, without privileges, could send out altered notifications that are part of the registration processes. An attacker could create a malicious link, where the injected code would be rendered as part of the email. On the user's detail page, the username was also not sanitized and would also render HTML, giving an attacker the same vulnerability. While it was possible to inject HTML including javascript, the execution of such scripts would be prevented by most email clients and the Content Security Policy in Console UI. This vulnerability is fixed in 2.58.1, 2.57.1, 2.56.2, 2.55.5, 2.54.8 2.53.9, and 2.52.3." + }, + { + "lang": "es", + "value": "Zitadel es un sistema de gesti\u00f3n de identidades de c\u00f3digo abierto. ZITADEL utiliza HTML para los correos electr\u00f3nicos y muestra cierta informaci\u00f3n, como los nombres de usuario, de forma din\u00e1mica. Esa informaci\u00f3n puede ser ingresada por usuarios o administradores. Debido a la falta de sanitizaci\u00f3n de la salida, estos correos electr\u00f3nicos podr\u00edan incluir c\u00f3digo malicioso. Esto puede generar potencialmente una amenaza en la que un atacante, sin privilegios, podr\u00eda enviar notificaciones alteradas que forman parte de los procesos de registro. Un atacante podr\u00eda crear un enlace malicioso, donde el c\u00f3digo inyectado se presentar\u00eda como parte del correo electr\u00f3nico. En la p\u00e1gina de detalles del usuario, el nombre de usuario tampoco estaba sanitizado y tambi\u00e9n representaba HTML, lo que le daba al atacante la misma vulnerabilidad. Si bien era posible inyectar HTML, incluido JavaScript, la mayor\u00eda de los clientes de correo electr\u00f3nico y la Pol\u00edtica de seguridad de contenido en la interfaz de usuario de la consola impedir\u00edan la ejecuci\u00f3n de dichos scripts. Esta vulnerabilidad se solucion\u00f3 en 2.58.1, 2.57.1, 2.56.2, 2.55.5, 2.54.8 2.53.9 y 2.52.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41954.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41954.json index 44fddb0e9f6..acb0b690712 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41954.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41954.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41954", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-31T20:15:06.587", - "lastModified": "2024-07-31T20:15:06.587", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "FOG is a cloning/imaging/rescue suite/inventory management system. The application stores plaintext service account credentials in the \"/opt/fog/.fogsettings\" file. This file is by default readable by all users on the host. By exploiting these credentials, a malicious user could create new accounts for the web application and much more. The vulnerability is fixed in 1.5.10.41." + }, + { + "lang": "es", + "value": "FOG es un sistema de gesti\u00f3n de inventario, clonaci\u00f3n, im\u00e1genes, suite de rescate. La aplicaci\u00f3n almacena las credenciales de la cuenta de servicio en texto plano en el archivo \"/opt/fog/.fogsettings\". Este archivo es legible de forma predeterminada por todos los usuarios del host. Al explotar estas credenciales, un usuario malintencionado podr\u00eda crear nuevas cuentas para la aplicaci\u00f3n web y mucho m\u00e1s. La vulnerabilidad se solucion\u00f3 en 1.5.10.41." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41955.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41955.json index 2893cc119e2..5bc07024597 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41955.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41955.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41955", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-31T20:15:06.793", - "lastModified": "2024-07-31T20:15:06.793", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mobile Security Framework (MobSF) is a security research platform for mobile applications in Android, iOS and Windows Mobile. An open redirect vulnerability exist in MobSF authentication view. Update to MobSF v4.0.5." + }, + { + "lang": "es", + "value": " Mobile Security Framework (MobSF) es una plataforma de investigaci\u00f3n de seguridad para aplicaciones m\u00f3viles en Android, iOS y Windows Mobile. Existe una vulnerabilidad de redireccionamiento abierto en la vista de autenticaci\u00f3n de MobSF. Actualizaci\u00f3n a MobSF v4.0.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4143.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4143.json index 9b99fadcb96..dc45f21b859 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4143.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4143.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4143", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2024-07-15T22:15:03.223", - "lastModified": "2024-07-16T13:43:58.773", + "lastModified": "2024-08-01T13:59:25.697", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se ha identificado una posible vulnerabilidad de seguridad en ciertos productos de PC HP que utilizan AMI BIOS, lo que podr\u00eda permitir la ejecuci\u00f3n de c\u00f3digo arbitrario. AMI ha lanzado actualizaciones de firmware para mitigar esta vulnerabilidad." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://support.hp.com/us-en/document/ish_10914391-10914417-16/hpsbhf03953", diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4187.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4187.json index 00c6e77e841..7590eaf30a5 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4187.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4187.json @@ -2,13 +2,17 @@ "id": "CVE-2024-4187", "sourceIdentifier": "security@opentext.com", "published": "2024-07-31T21:15:18.320", - "lastModified": "2024-07-31T21:15:18.320", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stored XSS vulnerability has been discovered in OpenText\u2122 Filr product, affecting versions 24.1.1 and 24.2. The vulnerability could cause users to not be warned when clicking links to external sites." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 una vulnerabilidad de XSS almacenado en el producto OpenText\u2122 Filr, que afecta a las versiones 24.1.1 y 24.2. La vulnerabilidad podr\u00eda hacer que los usuarios no reciban advertencias al hacer clic en enlaces a sitios externos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42007.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42007.json index d5ee74a1a0f..78f236259c8 100644 --- a/CVE-2024/CVE-2024-420xx/CVE-2024-42007.json +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42007.json @@ -2,7 +2,7 @@ "id": "CVE-2024-42007", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-26T19:15:10.917", - "lastModified": "2024-07-29T14:12:08.783", + "lastModified": "2024-08-01T13:59:16.630", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,22 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + }, + { + "lang": "en", + "value": "CWE-548" + } + ] + } + ], "references": [ { "url": "https://github.com/NoiseByNorthwest/php-spx/issues/251", diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42029.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42029.json index 06b2915f0bb..65b61ae411d 100644 --- a/CVE-2024/CVE-2024-420xx/CVE-2024-42029.json +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42029.json @@ -2,7 +2,7 @@ "id": "CVE-2024-42029", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-27T04:15:02.760", - "lastModified": "2024-07-29T14:12:08.783", + "lastModified": "2024-08-01T13:59:17.407", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "xdg-desktop-portal-hyprland (tambi\u00e9n conocido como backend de XDG Desktop Portal para Hyprland) anterior a 1.3.3 permite la ejecuci\u00f3n de comandos del sistema operativo, por ejemplo, porque no se utilizan comillas simples al enviar una lista de ID y t\u00edtulos de aplicaciones a trav\u00e9s del entorno." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://github.com/hyprwm/xdg-desktop-portal-hyprland/commit/0bb709491baffd69f4f861802f00cf60c77cc2cd", diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42049.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42049.json index ceb44ade821..05daecf8917 100644 --- a/CVE-2024/CVE-2024-420xx/CVE-2024-42049.json +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42049.json @@ -2,7 +2,7 @@ "id": "CVE-2024-42049", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-28T02:15:09.823", - "lastModified": "2024-07-29T14:12:08.783", + "lastModified": "2024-08-01T13:59:18.253", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " TightVNC (Servidor para Windows) anterior a 2.8.84 permite a los atacantes conectarse a la tuber\u00eda de control a trav\u00e9s de una conexi\u00f3n de red." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://sourceforge.net/p/vnc-tight/bugs/1629/", diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42050.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42050.json index a0a294b2dad..4ced357e66a 100644 --- a/CVE-2024/CVE-2024-420xx/CVE-2024-42050.json +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42050.json @@ -2,7 +2,7 @@ "id": "CVE-2024-42050", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-28T03:15:01.767", - "lastModified": "2024-07-29T14:12:08.783", + "lastModified": "2024-08-01T13:59:19.083", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://github.com/SpacePlant/Vulns/blob/main/Advisories/2024/4.md", diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42051.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42051.json index dd3cba0c07d..2265723dd3a 100644 --- a/CVE-2024/CVE-2024-420xx/CVE-2024-42051.json +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42051.json @@ -2,7 +2,7 @@ "id": "CVE-2024-42051", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-28T03:15:02.033", - "lastModified": "2024-07-29T14:12:08.783", + "lastModified": "2024-08-01T13:59:19.940", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1391" + } + ] + } + ], "references": [ { "url": "https://github.com/SpacePlant/Vulns/blob/main/Advisories/2024/3.md", diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42053.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42053.json index 418badad49b..5ab9622de9f 100644 --- a/CVE-2024/CVE-2024-420xx/CVE-2024-42053.json +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42053.json @@ -2,7 +2,7 @@ "id": "CVE-2024-42053", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-28T03:15:02.400", - "lastModified": "2024-07-29T14:12:08.783", + "lastModified": "2024-08-01T13:59:21.227", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://github.com/SpacePlant/Vulns/blob/main/Advisories/2024/2.md", diff --git a/CVE-2024/CVE-2024-423xx/CVE-2024-42381.json b/CVE-2024/CVE-2024-423xx/CVE-2024-42381.json index d7bf934db3a..bee6c0e60cc 100644 --- a/CVE-2024/CVE-2024-423xx/CVE-2024-42381.json +++ b/CVE-2024/CVE-2024-423xx/CVE-2024-42381.json @@ -2,7 +2,7 @@ "id": "CVE-2024-42381", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-31T06:15:02.130", - "lastModified": "2024-07-31T12:57:02.300", + "lastModified": "2024-08-01T13:59:22.207", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-830" + } + ] + } + ], "references": [ { "url": "https://blog.trailofbits.com/2024/07/30/our-audit-of-homebrew/", diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4215.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4215.json index ede48bb4cc5..7c8a8a21932 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4215.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4215.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4215", "sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007", "published": "2024-05-02T18:15:07.593", - "lastModified": "2024-06-10T18:15:36.443", + "lastModified": "2024-08-01T13:59:27.703", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/pgadmin-org/pgadmin4/issues/7425", diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4217.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4217.json index 07f9f816f0c..f16bddac4ca 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4217.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4217.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4217", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:03.097", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:59:28.453", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento shortcodes-ultimate-pro de WordPress anterior a 7.1.5 no escapa adecuadamente a algunas de las configuraciones de sus c\u00f3digos cortos, lo que hace posible que los atacantes con una cuenta de Contributor realicen ataques XSS almacenados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/55cb43bf-7c8f-4df7-b4de-bf2bb1c2766d/", diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4224.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4224.json index 8ab6d8c4e21..5d81b1d564b 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4224.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4224.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4224", "sourceIdentifier": "cve@takeonme.org", "published": "2024-07-15T21:15:03.883", - "lastModified": "2024-07-16T13:43:58.773", + "lastModified": "2024-08-01T13:59:28.640", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Existe un cross-site scripting (XSS) almacenado autenticado en TP-Link TL-SG1016DE que afecta la versi\u00f3n TL-SG1016DE(UN) V7.6_1.0.0 Build 20230616, que podr\u00eda permitir a un adversario ejecutar JavaScript en el navegador de un administrador. Este problema se solucion\u00f3 en TL-SG1016DE(UN) V7_1.0.1 Build 20240628." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { "source": "cve@takeonme.org", diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4231.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4231.json index 8bf31b00a35..d162769980b 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4231.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4231.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4231", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-05-14T15:43:08.323", - "lastModified": "2024-06-05T13:15:12.980", + "lastModified": "2024-08-01T13:59:28.843", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -59,6 +59,28 @@ "baseSeverity": "MEDIUM" } } + ], + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 + } ] }, "weaknesses": [ diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4260.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4260.json index b238c132216..3a855288859 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4260.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4260.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4260", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-23T06:15:09.907", - "lastModified": "2024-07-24T12:55:13.223", + "lastModified": "2024-08-01T13:59:29.547", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": " El complemento Page Builder Gutenberg Blocks de WordPress anterior a 3.1.12 no impide que los usuarios hagan ping a hosts arbitrarios a trav\u00e9s de algunos de sus c\u00f3digos cortos, lo que podr\u00eda permitir a usuarios con altos privilegios, como los contribuyentes, realizar ataques SSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/69f33e20-8ff4-491c-8f37-a4eadd4ea8cf/", diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4269.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4269.json index 87fda1d986d..8e9fdbfda89 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4269.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4269.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4269", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:03.170", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:59:29.737", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento SVG Block WordPress anterior a la versi\u00f3n 1.1.20 no sanitiza el contenido del archivo SVG, lo que permite a los usuarios con al menos el rol de autor de SVG con JavaScript malicioso realizar ataques XSS almacenados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/8aae7aa1-6170-45d8-903f-8520913276da/", diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4272.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4272.json index aec2642a0bb..ab07fcaa16d 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4272.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4272.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4272", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:03.230", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:59:29.913", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Support SVG WordPress anterior a 1.1.0 no sanitiza el contenido del archivo SVG, lo que permite a los usuarios con al menos el rol de autor de SVG con JavaScript malicioso realizar ataques XSS almacenados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/ed1b1540-a0e2-434e-8769-9532c3ed5e31/", diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4290.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4290.json index 67be076a689..f38ac92bf8a 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4290.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4290.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4290", "sourceIdentifier": "contact@wpscan.com", "published": "2024-05-21T06:15:09.767", - "lastModified": "2024-05-21T12:37:59.687", + "lastModified": "2024-08-01T13:59:30.177", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": " El complemento de WordPress Sailthru Triggermail hasta la versi\u00f3n 1.1 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/a9a10d0f-d8f2-4f3e-92bf-94fc08416d87/", diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4305.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4305.json index 81d8c93f536..e8197e9d3c1 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4305.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4305.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4305", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-17T06:15:09.140", - "lastModified": "2024-06-17T12:42:04.623", + "lastModified": "2024-08-01T13:59:30.377", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Post Grid Gutenberg Blocks and WordPress Blog Plugin de WordPress anterior a 4.1.0 no valida ni escapa algunas de sus opciones de bloqueo antes de devolverlas a una p\u00e1gina/publicaci\u00f3n donde est\u00e1 incrustado el bloque, lo que podr\u00eda permitir a los usuarios con el rol de colaborador y superior para realizar ataques de Cross-Site Scripting Almacenado" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 4.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/635be98d-4c17-4e75-871f-9794d85a2eb1/", diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4483.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4483.json index 4bf60f599a5..f144c7cdea2 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4483.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4483.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4483", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-29T06:15:02.357", - "lastModified": "2024-07-29T14:12:08.783", + "lastModified": "2024-08-01T13:59:31.397", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": " El complemento de WordPress Email Encoder anterior a 2.2.2 no escapa el par\u00e1metro WP_Email_Encoder_Bundle_options[protection_text] antes de devolverlo a un atributo en una p\u00e1gina de administraci\u00f3n, lo que genera Cross Site Scripting almacenado" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/8f2ac76c-f3f8-41f9-a32a-f414825cf6f1/", diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4602.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4602.json index 93cbed3a889..5a670c40074 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4602.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4602.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4602", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:03.297", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:59:32.233", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Embed Peertube Playlist de WordPress anterior a 1.10 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/bc15bac7-8241-472a-a7c1-58070714501d/", diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4655.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4655.json index 85ce3537eb2..a362f5842dc 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4655.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4655.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4655", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-11T06:15:02.750", - "lastModified": "2024-07-12T16:59:06.710", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:59:32.490", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 } ] }, diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4664.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4664.json index fc361c85f80..5b2f4c121d5 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4664.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4664.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4664", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-27T06:15:13.627", - "lastModified": "2024-06-28T13:28:06.347", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:59:32.680", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4749.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4749.json index 840349a030b..322eaf55602 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4749.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4749.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4749", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-04T06:15:11.877", - "lastModified": "2024-06-04T16:57:41.053", + "lastModified": "2024-08-01T13:59:33.520", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento wp-eMember de WordPress anterior a 10.3.9 no sanitiza ni escapa el par\u00e1metro \"fieldId\" antes de devolverlo a la p\u00e1gina, lo que genera Cross-Site Scripting Reflejado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 8.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/6cc05a33-6592-4d35-8e66-9b6a9884df7e/", diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4752.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4752.json index 421eb055574..4ab3a6894a2 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4752.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4752.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4752", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:03.370", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:59:33.713", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento EventON WordPress anterior a 2.2.15 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/70d1f5d5-1a96-494b-9203-96a7780026da/", diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4753.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4753.json index 4d529f931a2..bd7538eda46 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4753.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4753.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4753", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-12T06:15:04.190", - "lastModified": "2024-07-24T19:53:04.617", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:59:33.903", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 } ] }, diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4756.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4756.json index ee93da1e0a1..de4404a490c 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4756.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4756.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4756", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-07T06:15:11.920", - "lastModified": "2024-06-07T14:56:05.647", + "lastModified": "2024-08-01T13:59:34.090", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento WP Backpack de WordPress hasta la versi\u00f3n 2.1 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/ce4688b6-6713-43b5-aa63-8a3b036bd332/", diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4770.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4770.json index 30db0886335..5958120b9c8 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4770.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4770.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4770", "sourceIdentifier": "security@mozilla.org", "published": "2024-05-14T18:15:14.560", - "lastModified": "2024-06-10T17:16:34.013", + "lastModified": "2024-08-01T13:59:34.293", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Al guardar una p\u00e1gina en PDF, ciertos estilos de fuente podr\u00edan haber provocado un posible bloqueo del use-after-free. Esta vulnerabilidad afecta a Firefox < 126, Firefox ESR < 115.11 y Thunderbird < 115.11." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1893270", diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4773.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4773.json index 47b36c45e36..ad7c44f4c65 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4773.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4773.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4773", "sourceIdentifier": "security@mozilla.org", "published": "2024-05-14T18:15:15.330", - "lastModified": "2024-05-14T19:17:55.627", + "lastModified": "2024-08-01T13:59:35.080", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Cuando se produjo un error de red durante la carga de la p\u00e1gina, el contenido anterior podr\u00eda haber permanecido visible con una barra de URL en blanco. Esto podr\u00eda haberse utilizado para ocultar un sitio web falsificado. Esta vulnerabilidad afecta a Firefox < 126." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1875248", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4934.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4934.json index 76c0466a521..77c40b950e6 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4934.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4934.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4934", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-01T06:15:23.847", - "lastModified": "2024-07-01T12:37:24.220", + "lastModified": "2024-08-01T13:59:37.220", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Quiz and Survey Master (QSM) WordPress anterior a 9.0.2 no valida ni escapa algunos de sus campos del cuestionario antes de devolverlos a una p\u00e1gina/publicaci\u00f3n donde est\u00e1 incrustado el cuestionario, lo que podr\u00eda permitir a los usuarios con el rol de colaborador y superiores realizar ataques de cross site scripting almacenado" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/a2270ee1-3211-4b16-b3d7-6cdd732f7155/", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4977.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4977.json index c95f42a7f52..30c58a69b62 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4977.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4977.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4977", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:03.440", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:59:37.487", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Index WP MySQL For Speed WordPress anterior a 1.4.18 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con altos privilegios, como el administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 4.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/89791a80-5cff-4a1a-8163-94b5be4081a5/", diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5002.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5002.json index 92e29a0c7bf..e9fbc8004a4 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5002.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5002.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5002", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:03.500", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:59:37.720", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento User Submitted Posts de WordPress anterior a 20240516 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/da09b99a-fa40-428f-80b4-0af764fd2f4f/", diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5004.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5004.json index de1beb9c148..7f38dbc7fc5 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5004.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5004.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5004", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-22T06:15:02.423", - "lastModified": "2024-07-25T15:21:18.437", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:59:37.913", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5028.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5028.json index f6c14e55d8a..341fcf67cfc 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5028.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5028.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5028", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:03.563", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:59:38.360", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento CM WordPress Search And Replace de WordPress anterior a 1.3.9 no tiene comprobaciones CSRF en algunos lugares, lo que podr\u00eda permitir a los atacantes hacer que los usuarios que han iniciado sesi\u00f3n realicen acciones no deseadas a trav\u00e9s de ataques CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/0bae8494-7b01-4203-a4f7-ccc60efbdda7/", diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5032.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5032.json index 1bbc24f0de6..93adf57fd2e 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5032.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5032.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5032", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:03.633", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:59:38.540", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento SULly WordPress anterior a 4.3.1 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con privilegios elevados, como el administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/4bb92693-23b3-4250-baee-af38b7e615e0/", diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5033.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5033.json index 27a37dbf775..64dd308b8a4 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5033.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5033.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5033", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:03.707", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:59:38.730", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento SULly WordPress anterior a 4.3.1 no tiene verificaci\u00f3n CSRF en algunos lugares y le falta sanitizaci\u00f3n y escape, lo que podr\u00eda permitir a los atacantes hacer que el administrador registrado agregue payloads XSS Almacenado a trav\u00e9s de un ataque CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/dd42765a-1300-453f-9835-6e646c87e496/", diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5034.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5034.json index 0740d640975..99890bf3e42 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5034.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5034.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5034", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:03.780", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:59:38.920", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento SULly WordPress anterior a 4.3.1 no tiene comprobaciones CSRF en algunos lugares, lo que podr\u00eda permitir a los atacantes hacer que los usuarios que han iniciado sesi\u00f3n realicen acciones no deseadas a trav\u00e9s de ataques CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/31f3a3b5-07bf-4cb3-b358-8488808733e0/", diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5074.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5074.json index 83538f8a902..6ac325ab9b0 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5074.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5074.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5074", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:03.840", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:59:39.780", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento wp-eMember de WordPress anterior a 10.6.6 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con privilegios elevados, como el administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/174a2ba8-0215-480f-93ec-83ebc4a3200e/", diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5075.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5075.json index aeba8522bf5..c0b36271703 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5075.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5075.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5075", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:03.910", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:59:39.960", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento wp-eMember de WordPress anterior a 10.6.6 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con privilegios elevados, como el administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/b47d93d6-5511-451a-853f-c8b0fba20969/", diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5076.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5076.json index 0a97e6d0db6..8f04f513ad1 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5076.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5076.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5076", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:03.970", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:59:40.143", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento wp-eMember de WordPress anterior a 10.6.6 no tiene comprobaciones CSRF en algunos lugares, lo que podr\u00eda permitir a los atacantes hacer que los usuarios que han iniciado sesi\u00f3n realicen acciones no deseadas a trav\u00e9s de ataques CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/01cbc841-a30f-4df5-ab7f-0c2c7469657b/", diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5077.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5077.json index 03926723171..65149d2a061 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5077.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5077.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5077", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:04.033", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:59:40.333", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento wp-eMember de WordPress anterior a 10.6.6 no tiene verificaci\u00f3n CSRF en algunos lugares y le falta sanitizaci\u00f3n y escape, lo que podr\u00eda permitir a los atacantes hacer que el administrador registrado agregue payloads XSS Almacenado a trav\u00e9s de un ataque CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 4.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/00fcbcf3-41ee-45e7-a0a9-0d46cb7ef859/", diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5079.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5079.json index b51ae3732b0..e79ef719c27 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5079.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5079.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5079", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:04.097", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:59:40.517", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento wp-eMember de WordPress anterior a 10.6.7 no sanitiza ni escapa de algunos de los campos cuando los miembros se registran, lo que permite a usuarios no autenticados realizar ataques de Cross-Site Scripting Almacenado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/bdb5509e-80ab-4e47-83a4-9347796eec40/", diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5080.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5080.json index 941fb9f5475..adf30b7275b 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5080.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5080.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5080", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:04.163", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:59:40.707", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento wp-eMember de WordPress anterior a 10.6.6 no valida los archivos que se cargar\u00e1n, lo que podr\u00eda permitir a los administradores cargar archivos arbitrarios como PHP en el servidor." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/15f78aad-001c-4219-aa7e-46537e1357a2/", diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5151.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5151.json index b181e04922a..9e371c522be 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5151.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5151.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5151", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:04.237", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:59:41.310", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento SULly WordPress anterior a 4.3.1 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/1ede4c66-9932-4ba6-bba1-0ba13f5a2f8f/", diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5167.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5167.json index 71278874abe..a9d119f8ad7 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5167.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5167.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5167", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:04.303", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:59:41.660", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento CM Email Registration Blacklist y Whitelist de WordPress anterior a 1.4.9 no tiene verificaci\u00f3n CSRF al agregar o eliminar un elemento de la lista negra o blanca, lo que podr\u00eda permitir a los atacantes hacer que un administrador que haya iniciado sesi\u00f3n agregue o elimine configuraciones de la lista negra o del men\u00fa de la lista blanca a trav\u00e9s de un ataque CSRF" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/67bb5ab8-4493-4f5b-a989-41576675b61a/", diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5169.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5169.json index 288a4ce3f6a..a8edf8cdb72 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5169.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5169.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5169", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-26T06:15:16.543", - "lastModified": "2024-06-26T12:44:29.693", + "lastModified": "2024-08-01T13:59:41.847", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Video Widget de WordPress hasta la versi\u00f3n 1.2.3 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/f0de62e3-5e85-43f3-8e3e-e816dafb1406/", diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5280.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5280.json index aec8d09842b..8886c27e2fa 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5280.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5280.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5280", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:04.360", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:59:43.187", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento wp-affiliate-platform de WordPress anterior a 6.5.1 no tiene verificaci\u00f3n CSRF en algunos lugares y le falta sanitizaci\u00f3n y escape, lo que podr\u00eda permitir a los atacantes hacer que los usuarios que no han iniciado sesi\u00f3n ejecuten un payload XSS a trav\u00e9s de un ataque CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/bbc214ba-4e97-4b3a-a21b-2931a9e36973/", diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5281.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5281.json index e646bd88c9c..9d3d3b2c360 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5281.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5281.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5281", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:04.430", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:59:43.367", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento wp-affiliate-platform de WordPress anterior a 6.5.1 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con altos privilegios, como el administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/3c0bdb0f-a06a-47a8-9198-a2bf2678b8f1/", diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5282.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5282.json index d2ff69ddb2d..7dde90f8d4e 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5282.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5282.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5282", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:04.490", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:59:43.553", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento wp-affiliate-platform de WordPress anterior a 6.5.1 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con altos privilegios, como el administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/bf3fb97e-12fa-4b37-b28b-1771ddb5ceb1/", diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5283.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5283.json index ee6976433e2..30d2a771b0f 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5283.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5283.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5283", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:04.553", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:59:43.747", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento wp-affiliate-platform de WordPress anterior a 6.5.1 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con altos privilegios, como el administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/3e1adcd3-7c46-45e8-9e2b-2ede0d79c943/", diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5284.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5284.json index f3091e86aaa..8f035224b9c 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5284.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5284.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5284", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:04.617", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:59:43.927", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento wp-affiliate-platform de WordPress anterior a 6.5.1 no tiene verificaci\u00f3n CSRF en algunos lugares y le falta sanitizaci\u00f3n y escape, lo que podr\u00eda permitir a los atacantes hacer que el administrador que haya iniciado sesi\u00f3n agregue payloads XSS Almacenado a trav\u00e9s de un ataque CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 4.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/a601a267-e781-439f-9c76-b4c841e819e5/", diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5285.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5285.json index b66b10da72d..b7ff4655c16 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5285.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5285.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5285", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-29T06:15:02.463", - "lastModified": "2024-07-29T14:12:08.783", + "lastModified": "2024-08-01T13:59:44.103", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " El complemento de WordPress wp-affiliate-platform anterior a 6.5.2 no tiene activada la verificaci\u00f3n CSRF al eliminar afiliados, lo que podr\u00eda permitir a los atacantes realizar un cambio de usuario registrado y eliminarlos mediante un ataque CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/792f3904-88bd-47d1-9049-afccdd74853a/", diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5286.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5286.json index b3ae7b30a93..a3ed08483a8 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5286.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5286.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5286", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:04.700", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:59:44.950", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento wp-affiliate-platform de WordPress anterior a 6.5.1 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con altos privilegios, como el administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/a0b3069c-59d3-41ea-9b48-f5a4cf9ca45f/", diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5287.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5287.json index 91cc5e1ba1f..8668e05ec9c 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5287.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5287.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5287", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:04.780", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:59:45.123", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento wp-affiliate-platform de WordPress anterior a 6.5.1 no tiene activada la verificaci\u00f3n CSRF al actualizar su configuraci\u00f3n, lo que podr\u00eda permitir a los atacantes hacer que un usuario que haya iniciado sesi\u00f3n los cambie mediante un ataque CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/b4fd535c-a273-419d-9e2e-be1cbd822793/", diff --git a/CVE-2024/CVE-2024-53xx/CVE-2024-5330.json b/CVE-2024/CVE-2024-53xx/CVE-2024-5330.json index d206703e138..e433e0e1cc1 100644 --- a/CVE-2024/CVE-2024-53xx/CVE-2024-5330.json +++ b/CVE-2024/CVE-2024-53xx/CVE-2024-5330.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5330", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-01T07:15:02.520", - "lastModified": "2024-08-01T07:15:02.520", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Breakdance plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the breakdance_css_file_paths_cache parameter in all versions up to, and including, 1.7.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Breakdance para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del par\u00e1metro breakdance_css_file_paths_cache en todas las versiones hasta la 1.7.2 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de Colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-53xx/CVE-2024-5331.json b/CVE-2024/CVE-2024-53xx/CVE-2024-5331.json index 7ba5b0cc540..197a2236935 100644 --- a/CVE-2024/CVE-2024-53xx/CVE-2024-5331.json +++ b/CVE-2024/CVE-2024-53xx/CVE-2024-5331.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5331", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-01T07:15:02.783", - "lastModified": "2024-08-01T07:15:02.783", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Breakdance plugin for WordPress is vulnerable to unauthorized access of data in all versions up to, and including, 1.7.2. This makes it possible for authenticated attackers, with Contributor-level access and above, to export form submissions." + }, + { + "lang": "es", + "value": " El complemento Breakdance para WordPress es vulnerable al acceso no autorizado a los datos en todas las versiones hasta la 1.7.2 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, exporten env\u00edos de formularios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5442.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5442.json index 84575e1d4f1..46b19ec7e86 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5442.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5442.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5442", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:04.847", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:59:46.210", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Photo Gallery, Sliders, Proofing y WordPress anterior a 3.59.3 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con altos privilegios, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo en configuraci\u00f3n multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/4f1fa417-f760-4132-95c2-a38d0b631263/", diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5450.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5450.json index 5b45c571f59..e9e226e134b 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5450.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5450.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5450", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:04.927", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:59:46.483", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Bug Library de WordPress anterior a 2.1.1 no verifica el tipo de archivo en los informes de errores enviados por los usuarios, lo que permite a un usuario no autenticado cargar archivos PHP." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/d91217bc-9f8f-4971-885e-89edc45b2a4d/", diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5472.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5472.json index 66f822691ed..3e5ee144e4d 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5472.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5472.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5472", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:05.000", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:59:47.140", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento WP QuickLaTeX WordPress anterior a 3.8.7 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/dcddc2de-c32c-4f8c-8490-f3d980b05822/", diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5492.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5492.json index a78d7b340bd..8a0da7c40bd 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5492.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5492.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5492", "sourceIdentifier": "secure@citrix.com", "published": "2024-07-10T19:15:11.293", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-08-01T13:59:48.837", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -61,6 +61,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], "references": [ { "url": "https://support.citrix.com/article/CTX677944/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20245491-and-cve20245492", diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5495.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5495.json index cd03ee4554f..282899dc9e3 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5495.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5495.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5495", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-30T23:15:48.433", - "lastModified": "2024-06-10T17:16:34.740", + "lastModified": "2024-08-01T13:59:50.400", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Use after free en Dawn en Google Chrome anterior a 125.0.6422.141 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html", diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5500.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5500.json index f2fe76c2567..3321d7b530d 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5500.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5500.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5500", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-07-16T23:15:24.487", - "lastModified": "2024-07-18T14:47:24.677", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:59:52.040", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-358" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5573.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5573.json index 6d097ae58c0..3448906aa72 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5573.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5573.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5573", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-26T06:15:17.300", - "lastModified": "2024-06-26T12:44:29.693", + "lastModified": "2024-08-01T13:59:54.013", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Easy Table of Contents de WordPress anterior a 2.0.66 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con altos privilegios, como editores, realizar ataques de Cross-Site Scripting incluso cuando unfiltered_html no est\u00e1 permitido." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/3b01044b-355f-40d3-8e11-23a890f98c76/", diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5575.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5575.json index 6dbc31096ff..86b30849ae5 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5575.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5575.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5575", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:05.070", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:59:54.197", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Ditty WordPress anterior a la versi\u00f3n 3.1.43 no sanitiza ni escapa a algunas de las configuraciones de sus bloques, lo que podr\u00eda permitir a usuarios con altos privilegios, como autores, realizar ataques de cross-site scripting incluso cuando unfiltered_html no est\u00e1 permitido." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/65d1abb7-92e9-4cc4-a1d0-84985b484af3/", diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5604.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5604.json index 5b76098fd00..e0715223374 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5604.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5604.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5604", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-19T06:15:03.480", - "lastModified": "2024-07-19T13:01:44.567", + "lastModified": "2024-08-01T13:59:54.710", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Bug Library de WordPress anterior a 2.1.2 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/29985150-8d49-4a3f-8411-5d7263b424d8/", diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5626.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5626.json index 01e50362442..44381da275a 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5626.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5626.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5626", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-12T06:15:04.420", - "lastModified": "2024-07-24T19:52:09.273", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:59:55.383", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 } ] }, diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5630.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5630.json index 383e60c6cfb..de97740ca35 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5630.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5630.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5630", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-15T06:15:01.827", - "lastModified": "2024-07-16T18:10:17.693", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T13:59:55.667", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5644.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5644.json index 64e3b1136f7..f342ddfba4b 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5644.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5644.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5644", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:05.243", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:59:56.260", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Tournamatch de WordPress anterior a 4.6.1 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/afe14c7a-95b2-4d3f-901a-e53ecef70d49/", diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5678.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5678.json index 7d849079847..30ca3e9f615 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5678.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5678.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5678", "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", "published": "2024-08-01T07:15:03.053", - "lastModified": "2024-08-01T07:15:03.053", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zohocorp ManageEngine Applications Manager versions\u00a0170900 and below are vulnerable to the authenticated admin-only SQL Injection in the Create Monitor feature." + }, + { + "lang": "es", + "value": " Zohocorp ManageEngine Applications Manager versiones 170900 e inferiores son vulnerables a la inyecci\u00f3n SQL autenticada solo para administradores en la funci\u00f3n Create Monitor." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5692.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5692.json index b6e0b7ffaac..8f9dfbbefe6 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5692.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5692.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5692", "sourceIdentifier": "security@mozilla.org", "published": "2024-06-11T13:15:50.770", - "lastModified": "2024-06-13T23:15:50.707", + "lastModified": "2024-08-01T13:59:56.967", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En Windows, al utilizar la funci\u00f3n \"Guardar como\", un atacante podr\u00eda haber enga\u00f1ado al navegador para que guardara el archivo con una extensi\u00f3n no permitida como \".url\" al incluir un car\u00e1cter no v\u00e1lido en la extensi\u00f3n. *Nota:* Este problema solo afectaba a los sistemas operativos Windows. Otros sistemas operativos no se ven afectados. Esta vulnerabilidad afecta a Firefox < 127 y Firefox ESR < 115.12." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1891234", diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5696.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5696.json index 2eebda41ffe..d4247857298 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5696.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5696.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5696", "sourceIdentifier": "security@mozilla.org", "published": "2024-06-11T13:15:51.100", - "lastModified": "2024-06-19T10:15:11.430", + "lastModified": "2024-08-01T13:59:57.203", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Al manipular el texto en una etiqueta `<input>`, un atacante podr\u00eda haber da\u00f1ado la memoria y provocar un bloqueo potencialmente explotable. Esta vulnerabilidad afecta a Firefox < 127 y Firefox ESR < 115.12." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1896555", diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5713.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5713.json index b1a3c87c54f..a5335590b84 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5713.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5713.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5713", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:05.313", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:59:58.300", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento If-So Dynamic Content Personalization de WordPress anterior a 1.8.0.4 no escapa del par\u00e1metro $_SERVER['REQUEST_URI'] antes de devolverlo en un atributo, lo que podr\u00eda generar cross-site scripting reflejado en navegadores web antiguos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/eb3f24a7-3171-42c3-9016-e29da4f384fa/", diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5715.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5715.json index 27a9cd9a41e..45d9828b4c2 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5715.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5715.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5715", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:05.393", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:59:58.493", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento de WordPress wp-eMember anterior a 10.6.7 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con privilegios elevados, como el administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/d86bc001-51ae-4dcc-869b-80c91251cc2e/", diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5744.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5744.json index 5086c92047f..f5833789cce 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5744.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5744.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5744", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:05.457", - "lastModified": "2024-07-15T13:00:34.853", + "lastModified": "2024-08-01T13:59:58.940", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento wp-eMember anterior de WordPress a 10.6.7 no escapa del par\u00e1metro $_SERVER['REQUEST_URI'] antes de devolverlo en un atributo, lo que podr\u00eda generar cross-site scripting reflejado en navegadores web antiguos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 4.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/ba50e25c-7250-4025-a72f-74f8eb756246/", diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5765.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5765.json index f409b38936e..2bdf36f9bab 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5765.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5765.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5765", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-30T06:15:02.823", - "lastModified": "2024-07-30T13:32:45.943", + "lastModified": "2024-08-01T13:59:59.193", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": " El complemento WpStickyBar de WordPress hasta la versi\u00f3n 2.1.0 no sanitiza ni escapa adecuadamente un par\u00e1metro antes de usarlo en una declaraci\u00f3n SQL a trav\u00e9s de una acci\u00f3n AJAX disponible para usuarios no autenticados, lo que lleva a una inyecci\u00f3n de SQL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/0b73f84c-611e-4681-b362-35e721478ba4/", diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5807.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5807.json index d242d46cfc2..b48fbd7db36 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5807.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5807.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5807", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-30T06:15:02.917", - "lastModified": "2024-07-30T13:32:45.943", + "lastModified": "2024-08-01T13:59:59.787", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": " El complemento Business Card WordPress hasta la versi\u00f3n 1.0.0 no impide que los usuarios con privilegios elevados, como los administradores, carguen archivos PHP maliciosos, lo que podr\u00eda permitirles ejecutar c\u00f3digo arbitrario en los servidores que alojan su sitio, incluso en configuraciones Multisitio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/badb16b5-8c06-4170-b605-ea7af8982c1f/", diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5808.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5808.json index d2bd228304c..b840bedc559 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5808.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5808.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5808", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-30T06:15:03.070", - "lastModified": "2024-07-30T13:32:45.943", + "lastModified": "2024-08-01T13:59:59.967", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": " El complemento de WordPress WP Ajax Contact Form hasta la versi\u00f3n 2.2.2 no tiene activada la verificaci\u00f3n CSRF al eliminar correos electr\u00f3nicos de la lista de correo electr\u00f3nico, lo que podr\u00eda permitir a los atacantes hacer que un administrador que haya iniciado sesi\u00f3n realice dicha acci\u00f3n a trav\u00e9s de un ataque CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/1783bbce-3cc3-4a7e-a491-b713cee8278b/", diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5809.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5809.json index 63e534032de..70f07ab127d 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5809.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5809.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5809", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-30T06:15:03.180", - "lastModified": "2024-07-30T13:32:45.943", + "lastModified": "2024-08-01T14:00:00.230", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento de WordPress WP Ajax Contact Form hasta la versi\u00f3n 2.2.2 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross Site Scripting reflejado que podr\u00eda usarse contra usuarios administradores." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/0af9fbcf-5f0e-4f7f-ae60-b46e704cf0a5/", diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5811.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5811.json index 10ed29d5c92..12df69e1db9 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5811.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5811.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5811", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-12T06:15:04.670", - "lastModified": "2024-07-24T19:41:17.503", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T14:00:00.527", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5836.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5836.json index 35683d817e5..26a25d8e995 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5836.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5836.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5836", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-06-11T21:15:54.657", - "lastModified": "2024-06-20T15:08:33.157", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T14:00:02.493", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-474" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5840.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5840.json index 93d48685ebb..da389aa824d 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5840.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5840.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5840", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-06-11T21:15:54.933", - "lastModified": "2024-06-20T14:55:25.307", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T14:00:03.987", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5882.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5882.json index 7fa1897799b..749348d51e7 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5882.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5882.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5882", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-29T06:15:02.547", - "lastModified": "2024-07-29T14:12:08.783", + "lastModified": "2024-08-01T14:00:04.947", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": " El complemento de WordPress Ultimate Classified Listings anterior a 1.3 no valida los par\u00e1metros `ucl_page` y `layout`, lo que permite a usuarios no autenticados acceder a archivos PHP en el servidor desde la p\u00e1gina de listados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/5e8d7808-8f3e-4fc9-a1e7-e108da031ca7/", diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5883.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5883.json index c3b11fc0a6a..d6e12964f57 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5883.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5883.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5883", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-29T06:15:02.627", - "lastModified": "2024-07-29T14:12:08.783", + "lastModified": "2024-08-01T14:00:05.160", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": " El complemento de WordPress Ultimate Classified Listings anterior a 1.3 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross Site Scripting reflejado que podr\u00eda usarse contra usuarios con altos privilegios, como el administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/a1894884-c739-4ef4-8d9c-392171ab3d68/", diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5973.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5973.json index 5f406d2d705..c920cb3b728 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5973.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5973.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5973", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-22T06:15:02.590", - "lastModified": "2024-07-25T15:18:05.157", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-01T14:00:06.420", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6193.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6193.json index 878f882b243..0e1de4ed021 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6193.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6193.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6193", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-20T16:15:15.110", - "lastModified": "2024-06-21T11:22:01.687", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-01T13:52:16.463", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:itsourcecode:vehicle_management_system_project_in_php_and_mysql_with_source_code:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A78DEBCC-775E-4584-81CA-8C3C1DD16C4C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/HryspaHodor/CVE/issues/5", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Technical Description", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.269165", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.269165", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.359018", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6194.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6194.json index ba930032881..1b64d796fba 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6194.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6194.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6194", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-20T16:15:15.393", - "lastModified": "2024-06-21T11:22:01.687", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-01T13:52:05.673", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:itsourcecode:tailoring_management_system_in_php_with_source_code:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "22AA317A-3C61-4F74-BB73-80E1247BCA62" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/HryspaHodor/CVE/issues/6", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Technical Description", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.269166", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.269166", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.359019", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6195.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6195.json index a0c64d1948d..372b66916c5 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6195.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6195.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6195", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-20T16:15:15.680", - "lastModified": "2024-06-21T11:22:01.687", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-01T13:51:26.273", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:itsourcecode:tailoring_management_system_in_php_with_source_code:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "22AA317A-3C61-4F74-BB73-80E1247BCA62" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/2768210355/cve/issues/2", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Technical Description", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.269167", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.269167", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.359127", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6196.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6196.json index afef86726a3..fcec3db9e25 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6196.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6196.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6196", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-20T16:15:15.967", - "lastModified": "2024-06-21T17:15:11.350", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-01T13:49:15.767", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:itsourcecode:banking_management_system_project_in_php:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3CCE1617-AD47-4BC0-B29F-2DE2AC771A5E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/2768210355/cve/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Technical Description", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.269168", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.269168", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.359126", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6208.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6208.json index 2094f819c52..7201aba8cd2 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6208.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6208.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6208", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-31T13:15:10.600", - "lastModified": "2024-07-31T13:15:10.600", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Download Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wpdm_all_packages' shortcode in all versions up to, and including, 3.2.97 due to insufficient input sanitization and output escaping on the 'cols' parameter. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Download Manager para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del c\u00f3digo corto 'wpdm_all_packages' del complemento en todas las versiones hasta la 3.2.97 incluida debido a una sanitizaci\u00f3n de entrada y a un escape de salida insuficientes en el par\u00e1metro 'cols'. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6346.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6346.json index 8924be4c0cb..372585730bf 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6346.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6346.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6346", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-01T10:15:02.023", - "lastModified": "2024-08-01T10:15:02.023", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6496.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6496.json index 64777f3bb18..fda25d302e6 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6496.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6496.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6496", "sourceIdentifier": "contact@wpscan.com", "published": "2024-08-01T06:15:02.660", - "lastModified": "2024-08-01T06:15:02.660", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Light Poll WordPress plugin through 1.0.0 does not have CSRF checks when deleting polls, which could allow attackers to make logged in users perform such action via a CSRF attack" + }, + { + "lang": "es", + "value": "El complemento Light Poll de WordPress hasta la versi\u00f3n 1.0.0 no tiene comprobaciones CSRF al eliminar encuestas, lo que podr\u00eda permitir a los atacantes hacer que los usuarios que han iniciado sesi\u00f3n realicen dicha acci\u00f3n a trav\u00e9s de un ataque CSRF." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6529.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6529.json index 076ab97f649..e44cc0a02ba 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6529.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6529.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6529", "sourceIdentifier": "contact@wpscan.com", "published": "2024-08-01T06:15:02.737", - "lastModified": "2024-08-01T06:15:02.737", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Ultimate Classified Listings WordPress plugin before 1.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + }, + { + "lang": "es", + "value": " El complemento de WordPress Ultimate Classified Listings anterior a 1.4 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross Site Scripting reflejado que podr\u00eda usarse contra usuarios con altos privilegios, como el administrador." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6687.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6687.json index 8a7311ef943..7fb88a53be5 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6687.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6687.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6687", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-01T02:15:02.087", - "lastModified": "2024-08-01T02:15:02.087", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The CTT Expresso para WooCommerce plugin for WordPress is vulnerable to sensitive information exposure in all versions up to and including 3.2.12 via the /wp-content/uploads/cepw directory. The generated .pdf and log files are publicly accessible and contain sensitive information such as sender and receiver names, phone numbers, physical addresses, and email addresses" + }, + { + "lang": "es", + "value": " El complemento CTT Expresso para WooCommerce para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 3.2.12 incluida a trav\u00e9s del directorio /wp-content/uploads/cepw. Los archivos .pdf y de registro generados son de acceso p\u00fablico y contienen informaci\u00f3n confidencial, como nombres del remitente y del destinatario, n\u00fameros de tel\u00e9fono, direcciones f\u00edsicas y direcciones de correo electr\u00f3nico." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6698.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6698.json index 31f63111c01..100756e9e47 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6698.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6698.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6698", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-01T04:15:04.767", - "lastModified": "2024-08-01T04:15:04.767", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The FundEngine plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.7.0. This is due to the plugin not properly verifying user meta updated through the update_user_meta function. This makes it possible for authenticated attackers, with subscriber-level access and above, to update their user meta which can be leveraged to update their capabilities to gain administrator access." + }, + { + "lang": "es", + "value": " El complemento FundEngine para WordPress es vulnerable a la escalada de privilegios en todas las versiones hasta la 1.7.0 incluida. Esto se debe a que el complemento no verifica correctamente el metadato del usuario actualizado a trav\u00e9s de la funci\u00f3n update_user_meta. Esto hace posible que los atacantes autenticados, con acceso a nivel de suscriptor y superior, actualicen su meta de usuario, que puede aprovecharse para actualizar sus capacidades y obtener acceso de administrador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-69xx/CVE-2024-6973.json b/CVE-2024/CVE-2024-69xx/CVE-2024-6973.json index 18efe759446..7631441c8ef 100644 --- a/CVE-2024/CVE-2024-69xx/CVE-2024-6973.json +++ b/CVE-2024/CVE-2024-69xx/CVE-2024-6973.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6973", "sourceIdentifier": "2505284f-8ffb-486c-bf60-e19c1097a90b", "published": "2024-07-31T17:15:11.153", - "lastModified": "2024-07-31T20:15:07.293", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Remote Code Execution in Cato Windows SDP client via crafted URLs.\nThis issue affects Windows SDP Client before 5.10.34." + }, + { + "lang": "es", + "value": " Ejecuci\u00f3n remota de c\u00f3digo en el cliente Cato Windows SDP a trav\u00e9s de URL dise\u00f1adas. Este problema afecta a SDP Client  de Windows anterior a la versi\u00f3n 5.10.34." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-69xx/CVE-2024-6974.json b/CVE-2024/CVE-2024-69xx/CVE-2024-6974.json index 28c51187b04..3516cdfa0b2 100644 --- a/CVE-2024/CVE-2024-69xx/CVE-2024-6974.json +++ b/CVE-2024/CVE-2024-69xx/CVE-2024-6974.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6974", "sourceIdentifier": "2505284f-8ffb-486c-bf60-e19c1097a90b", "published": "2024-07-31T17:15:11.413", - "lastModified": "2024-07-31T20:15:07.513", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cato Networks Windows SDP Client Local Privilege Escalation via self-upgradeThis issue affects SDP Client: before 5.10.34." + }, + { + "lang": "es", + "value": " Escalada de privilegios locales del cliente SDP de Cato Networks Windows mediante actualizaci\u00f3n autom\u00e1tica. Este problema afecta a SDP Client : anterior a 5.10.34." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-69xx/CVE-2024-6975.json b/CVE-2024/CVE-2024-69xx/CVE-2024-6975.json index 772d86f6230..4f11d06ba49 100644 --- a/CVE-2024/CVE-2024-69xx/CVE-2024-6975.json +++ b/CVE-2024/CVE-2024-69xx/CVE-2024-6975.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6975", "sourceIdentifier": "2505284f-8ffb-486c-bf60-e19c1097a90b", "published": "2024-07-31T17:15:11.640", - "lastModified": "2024-08-01T09:15:03.097", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-69xx/CVE-2024-6977.json b/CVE-2024/CVE-2024-69xx/CVE-2024-6977.json index 64a2c919f05..47a54dbe875 100644 --- a/CVE-2024/CVE-2024-69xx/CVE-2024-6977.json +++ b/CVE-2024/CVE-2024-69xx/CVE-2024-6977.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6977", "sourceIdentifier": "2505284f-8ffb-486c-bf60-e19c1097a90b", "published": "2024-07-31T17:15:11.860", - "lastModified": "2024-07-31T17:15:11.860", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in Cato Networks SDP Client on Windows allows the insertion of sensitive information into the log file, which can lead to an account takeover. However, the attack requires bypassing protections on modifying the tunnel token on a the attacker's system.This issue affects SDP Client: before 5.10.34." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en Cato Networks SDP Client en Windows permite la inserci\u00f3n de informaci\u00f3n confidencial en el archivo de registro, lo que puede llevar a la apropiaci\u00f3n de la cuenta. Sin embargo, el ataque requiere eludir las protecciones al modificar el token del t\u00fanel en el sistema del atacante. Este problema afecta a SDP Client: anterior a 5.10.34." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-69xx/CVE-2024-6978.json b/CVE-2024/CVE-2024-69xx/CVE-2024-6978.json index 3935ee22d7f..a984e8c3dcb 100644 --- a/CVE-2024/CVE-2024-69xx/CVE-2024-6978.json +++ b/CVE-2024/CVE-2024-69xx/CVE-2024-6978.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6978", "sourceIdentifier": "2505284f-8ffb-486c-bf60-e19c1097a90b", "published": "2024-07-31T17:15:12.090", - "lastModified": "2024-07-31T20:15:07.717", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cato Networks Windows SDP Client Local root certificates can be installed by low-privileged users.This issue affects SDP Client: before 5.10.28." + }, + { + "lang": "es", + "value": "Los certificados ra\u00edz locales del cliente Cato Networks Windows SDP pueden ser instalados por usuarios con pocos privilegios. Este problema afecta a SDP Client: anterior a 5.10.28." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7302.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7302.json index 1515a5548bc..e198949e4f1 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7302.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7302.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7302", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-01T07:15:03.300", - "lastModified": "2024-08-01T07:15:03.300", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7324.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7324.json index 1b28c29992e..26aa3e03549 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7324.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7324.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7324", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-31T18:15:13.037", - "lastModified": "2024-07-31T18:15:13.037", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in IObit iTop Data Recovery Pro 4.4.0.687. It has been declared as critical. Affected by this vulnerability is an unknown functionality in the library madbasic_.bpl of the component BPL Handler. The manipulation leads to uncontrolled search path. Local access is required to approach this attack. The associated identifier of this vulnerability is VDB-273247. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en IObit iTop Data Recovery Pro 4.4.0.687. Ha sido declarada cr\u00edtica. Una funci\u00f3n desconocida en la librer\u00eda madbasic_.bpl del componente BPL Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a una ruta de b\u00fasqueda incontrolada. Se requiere acceso local para abordar este ataque. El identificador asociado de esta vulnerabilidad es VDB-273247. NOTA: Se contact\u00f3 al proveedor tempranamente sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7325.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7325.json index 1d404432688..126fe2a86c2 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7325.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7325.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7325", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-31T20:15:07.817", - "lastModified": "2024-07-31T20:15:07.817", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in IObit Driver Booster 11.0.0.0. It has been rated as critical. Affected by this issue is some unknown functionality in the library VCL120.BPL of the component BPL Handler. The manipulation leads to uncontrolled search path. Attacking locally is a requirement. The identifier of this vulnerability is VDB-273248. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": " Se encontr\u00f3 una vulnerabilidad en IObit Driver Booster 11.0.0.0. Ha sido calificada como cr\u00edtica. Una funci\u00f3n desconocida en la librer\u00eda VCL120.BPL del componente BPL Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a una ruta de b\u00fasqueda incontrolada. Atacar localmente es un requisito. El identificador de esta vulnerabilidad es VDB-273248. NOTA: Se contact\u00f3 al proveedor tempranamente sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7326.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7326.json index 0fa7165deb3..a729d8d7095 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7326.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7326.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7326", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-31T21:15:19.190", - "lastModified": "2024-07-31T21:15:19.190", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in IObit DualSafe Password Manager 1.4.0.3. This affects an unknown part in the library RTL120.BPL of the component BPL Handler. The manipulation leads to uncontrolled search path. It is possible to launch the attack on the local host. The identifier VDB-273249 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en IObit DualSafe Password Manager 1.4.0.3 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida en la librer\u00eda RTL120.BPL del componente BPL Handler afecta a una funci\u00f3n desconocida. La manipulaci\u00f3n conduce a una ruta de b\u00fasqueda incontrolada. Es posible lanzar el ataque al servidor local. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-273249. NOTA: Se contact\u00f3 al proveedor tempranamente sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7327.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7327.json index 7ef7dc983b0..6288da72f92 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7327.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7327.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7327", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-31T22:15:02.520", - "lastModified": "2024-07-31T22:15:02.520", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in Xinhu RockOA 2.6.2. This vulnerability affects the function dataAction of the file /webmain/task/openapi/openmodhetongAction.php. The manipulation of the argument nickName leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-273250 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": " Una vulnerabilidad fue encontrada en Xinhu RockOA 2.6.2 y clasificada como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n dataAction del archivo /webmain/task/openapi/openmodhetongAction.php. La manipulaci\u00f3n del argumento nickName conduce a la inyecci\u00f3n de SQL. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-273250 es el identificador asignado a esta vulnerabilidad. NOTA: Se contact\u00f3 al proveedor tempranamente sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7328.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7328.json index d9d9c1593f1..81c9ba4e34a 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7328.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7328.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7328", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-31T23:15:13.787", - "lastModified": "2024-07-31T23:15:13.787", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in YouDianCMS 7. This issue affects some unknown processing of the file /t.php?action=phpinfo. The manipulation leads to information disclosure. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-273251. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": " Una vulnerabilidad fue encontrada en YouDianCMS 7 y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del procesamiento del archivo /t.php?action=phpinfo es afectada por este problema. La manipulaci\u00f3n conduce a la divulgaci\u00f3n de informaci\u00f3n. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-273251. NOTA: Se contact\u00f3 al proveedor tempranamente sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7329.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7329.json index 35a579c7f29..59e8eb11308 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7329.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7329.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7329", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-31T23:15:14.063", - "lastModified": "2024-07-31T23:15:14.063", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in YouDianCMS 7. Affected is an unknown function of the file /Public/ckeditor/plugins/multiimage/dialogs/image_upload.php. The manipulation of the argument files leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273252. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad clasificada como cr\u00edtica ha sido encontrada en YouDianCMS 7. Una funci\u00f3n desconocida del archivo /Public/ckeditor/plugins/multiimage/dialogs/image_upload.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento files conduce a una carga sin restricciones. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-273252. NOTA: Se contact\u00f3 al proveedor tempranamente sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7330.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7330.json index 538c51331ac..07f2440bca6 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7330.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7330.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7330", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-01T00:15:02.480", - "lastModified": "2024-08-01T00:15:02.480", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in YouDianCMS 7 and classified as critical. Affected by this vulnerability is the function curl_exec of the file /App/Core/Extend/Function/ydLib.php. The manipulation of the argument url leads to server-side request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273253 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en YouDianCMS 7 y clasificada como cr\u00edtica. La funci\u00f3n curl_exec del archivo /App/Core/Extend/Function/ydLib.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento URL conduce a server-side request forgery. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-273253. NOTA: Se contact\u00f3 al proveedor tempranamente sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7331.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7331.json index 09abad71f98..bee61f019a5 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7331.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7331.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7331", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-01T00:15:02.770", - "lastModified": "2024-08-01T00:15:02.770", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in TOTOLINK A3300R 17.0.0cu.557_B20221024 and classified as critical. Affected by this issue is the function UploadCustomModule of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument File leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-273254 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en TOTOLINK A3300R 17.0.0cu.557_B20221024 y clasificada como cr\u00edtica. La funci\u00f3n UploadCustomModule del archivo /cgi-bin/cstecgi.cgi es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento File provoca un desbordamiento dl b\u00fafer. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-273254 es el identificador asignado a esta vulnerabilidad. NOTA: Se contact\u00f3 al proveedor tempranamente sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7332.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7332.json index 5aa9a211adc..7011fb23cc9 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7332.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7332.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7332", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-01T01:15:09.663", - "lastModified": "2024-08-01T01:15:09.663", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in TOTOLINK CP450 4.1.0cu.747_B20191224. It has been classified as critical. This affects an unknown part of the file /web_cste/cgi-bin/product.ini of the component Telnet Service. The manipulation leads to use of hard-coded password. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-273255. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": " Se encontr\u00f3 una vulnerabilidad en TOTOLINK CP450 4.1.0cu.747_B20191224. Ha sido clasificada como cr\u00edtica. Una parte desconocida del archivo /web_cste/cgi-bin/product.ini del componente Telnet Service afecta a una parte desconocida. La manipulaci\u00f3n conduce al uso de una contrase\u00f1a codificada. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-273255. NOTA: Se contact\u00f3 al proveedor tempranamente sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7333.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7333.json index 7ea0dbb4313..fb00e5827b2 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7333.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7333.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7333", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-01T02:15:02.317", - "lastModified": "2024-08-01T02:15:02.317", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in TOTOLINK N350RT 9.3.5u.6139_B20201216. It has been declared as critical. This vulnerability affects the function setParentalRules of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument week/sTime/eTime leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273256. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": " Se encontr\u00f3 una vulnerabilidad en TOTOLINK N350RT 9.3.5u.6139_B20201216. Ha sido declarada cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n setParentalRules del archivo /cgi-bin/cstecgi.cgi. La manipulaci\u00f3n del argumento week/sTime/eTime provoca un desbordamiento de b\u00fafer. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-273256. NOTA: Se contact\u00f3 al proveedor tempranamente sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7334.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7334.json index 5a599b65aa2..e0dd5bf432a 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7334.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7334.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7334", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-01T02:15:02.617", - "lastModified": "2024-08-01T02:15:02.617", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in TOTOLINK EX1200L 9.3.5u.6146_B20201023. It has been rated as critical. This issue affects the function UploadCustomModule of the file /cgi-bin/cstecgi.cgi. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273257 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en TOTOLINK EX1200L 9.3.5u.6146_B20201023. Ha sido calificada como cr\u00edtica. Este problema afecta la funci\u00f3n UploadCustomModule del archivo /cgi-bin/cstecgi.cgi. La manipulaci\u00f3n provoca un desbordamiento de b\u00fafer. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-273257. NOTA: Se contact\u00f3 al proveedor tempranamente sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7335.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7335.json index 9698eaaeae1..4b98a29c13f 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7335.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7335.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7335", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-01T02:15:02.900", - "lastModified": "2024-08-01T02:15:02.900", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in TOTOLINK EX200 4.0.3c.7646_B20201211. Affected is the function getSaveConfig of the file /cgi-bin/cstecgi.cgi?action=save&setting. The manipulation of the argument http_host leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-273258 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en TOTOLINK EX200 4.0.3c.7646_B20201211 y clasificada como cr\u00edtica. La funci\u00f3n getSaveConfig del fichero /cgi-bin/cstecgi.cgi?action=save&setting est\u00e1 afectada por la vulnerabilidad. La manipulaci\u00f3n del argumento http_host provoca un desbordamiento de b\u00fafer. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-273258 es el identificador asignado a esta vulnerabilidad. NOTA: Se contact\u00f3 al proveedor tempranamente sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7336.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7336.json index 19361546610..317d9e6cbb6 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7336.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7336.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7336", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-01T03:15:01.717", - "lastModified": "2024-08-01T03:15:01.717", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in TOTOLINK EX200 4.0.3c.7646_B20201211. Affected by this vulnerability is the function loginauth of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument http_host leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-273259. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en TOTOLINK EX200 4.0.3c.7646_B20201211 y clasificada como cr\u00edtica. La funci\u00f3n loginauth del archivo /cgi-bin/cstecgi.cgi es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento http_host provoca un desbordamiento de b\u00fafer. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-273259. NOTA: Se contact\u00f3 al proveedor tempranamente sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7337.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7337.json index 29ffb20fdea..cc2ee6409c9 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7337.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7337.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7337", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-01T03:15:01.987", - "lastModified": "2024-08-01T03:15:01.987", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in TOTOLINK EX1200L 9.3.5u.6146_B20201023. Affected by this issue is the function loginauth of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument http_host leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273260. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": " Una vulnerabilidad fue encontrada en TOTOLINK EX1200L 9.3.5u.6146_B20201023 y clasificada como cr\u00edtica. La funci\u00f3n loginauth del archivo /cgi-bin/cstecgi.cgi es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento http_host provoca un desbordamiento de b\u00fafer. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-273260. NOTA: Se contact\u00f3 al proveedor tempranamente sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7338.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7338.json index ca1c094a86a..31a85f51ca2 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7338.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7338.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7338", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-01T04:15:05.017", - "lastModified": "2024-08-01T04:15:05.017", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in TOTOLINK EX1200L 9.3.5u.6146_B20201023. This affects the function setParentalRules of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument week/sTime/eTime leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273261 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en TOTOLINK EX1200L 9.3.5u.6146_B20201023 y clasificada como cr\u00edtica. Esto afecta a la funci\u00f3n setParentalRules del archivo /cgi-bin/cstecgi.cgi. La manipulaci\u00f3n del argumento week/sTime/eTime provoca un desbordamiento de b\u00fafer. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-273261. NOTA: Se contact\u00f3 al proveedor tempranamente sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7339.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7339.json index 0bb246ce72b..e379836e476 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7339.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7339.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7339", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-01T04:15:05.320", - "lastModified": "2024-08-01T04:15:05.320", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in TVT DVR TD-2104TS-CL, DVR TD-2108TS-HP, Provision-ISR DVR SH-4050A5-5L(MM) and AVISION DVR AV108T and classified as problematic. This vulnerability affects unknown code of the file /queryDevInfo. The manipulation leads to information disclosure. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-273262 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en TVT DVR TD-2104TS-CL, DVR TD-2108TS-HP, Provision-ISR DVR SH-4050A5-5L(MM) y AVISION DVR AV108T y se ha clasificado como problem\u00e1tica. Esta vulnerabilidad afecta a c\u00f3digo desconocido del archivo /queryDevInfo. La manipulaci\u00f3n conduce a la divulgaci\u00f3n de informaci\u00f3n. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-273262 es el identificador asignado a esta vulnerabilidad. NOTA: Se contact\u00f3 al proveedor tempranamente sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7340.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7340.json index 95b08bd999f..6e6ef82d1ce 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7340.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7340.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7340", "sourceIdentifier": "reefs@jfrog.com", "published": "2024-07-31T15:15:11.203", - "lastModified": "2024-07-31T15:15:11.203", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Weave server API allows remote users to fetch files from a specific directory, but due to a lack of input validation, it is possible to traverse and leak arbitrary files remotely. In various common scenarios, this allows a low-privileged user to assume the role of the server admin." + }, + { + "lang": "es", + "value": "La API Weave server permite a los usuarios remotos recuperar archivos de un directorio espec\u00edfico, pero debido a la falta de validaci\u00f3n de entrada, es posible atravesar y filtrar archivos arbitrarios de forma remota. En varios escenarios comunes, esto permite que un usuario con pocos privilegios asuma el rol de administrador del servidor." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7342.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7342.json index 095b527e952..7d1b8219daf 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7342.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7342.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7342", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-01T05:15:10.303", - "lastModified": "2024-08-01T05:15:10.303", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Baidu UEditor 1.4.3.3. It has been classified as problematic. This affects an unknown part of the file /ueditor/php/controller.php?action=uploadfile&encode=utf-8. The manipulation of the argument upfile leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273273 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Baidu UEditor 1.4.3.3. Ha sido clasificada como problem\u00e1tica. Esto afecta a una parte desconocida del archivo /ueditor/php/controller.php?action=uploadfile&encode=utf-8. La manipulaci\u00f3n del argumento upfile conduce a una carga sin restricciones. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-273273. NOTA: Se contact\u00f3 al proveedor tempranamente sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7343.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7343.json index cddc37cc341..954670b662d 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7343.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7343.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7343", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-01T05:15:10.573", - "lastModified": "2024-08-01T05:15:10.573", - "vulnStatus": "Received", + "lastModified": "2024-08-01T12:42:36.933", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Baidu UEditor 1.4.2. It has been declared as problematic. This vulnerability affects unknown code of the file /ueditor142/php/controller.php?action=catchimage. The manipulation of the argument source[] leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-273274 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Baidu UEditor 1.4.2. Ha sido declarada problem\u00e1tica. Esta vulnerabilidad afecta a c\u00f3digo desconocido del archivo /ueditor142/php/controller.php?action=catchimage. La manipulaci\u00f3n del argumento source[] conduce a Cross Site Scripting. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-273274 es el identificador asignado a esta vulnerabilidad. NOTA: Se contact\u00f3 al proveedor tempranamente sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7357.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7357.json new file mode 100644 index 00000000000..c7aff0e6105 --- /dev/null +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7357.json @@ -0,0 +1,148 @@ +{ + "id": "CVE-2024-7357", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-01T13:15:10.950", + "lastModified": "2024-08-01T13:15:10.950", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cna@vuldb.com", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DIR-600 up to 2.18. It has been rated as critical. This issue affects the function soapcgi_main of the file /soap.cgi. The manipulation of the argument service leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273329 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/BeaCox/IoT_vuln/tree/main/D-Link/DIR-600/soapcgi_main_injection", + "source": "cna@vuldb.com" + }, + { + "url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10408", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.273329", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.273329", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.383695", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index b1598aa3990..c6f15edf5b3 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-08-01T12:00:16.698172+00:00 +2024-08-01T14:00:22.673916+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-08-01T10:15:02.023000+00:00 +2024-08-01T14:00:06.420000+00:00 ``` ### Last Data Feed Release @@ -33,20 +33,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -258728 +258730 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `2` -- [CVE-2024-6346](CVE-2024/CVE-2024-63xx/CVE-2024-6346.json) (`2024-08-01T10:15:02.023`) +- [CVE-2024-2455](CVE-2024/CVE-2024-24xx/CVE-2024-2455.json) (`2024-08-01T13:15:10.493`) +- [CVE-2024-7357](CVE-2024/CVE-2024-73xx/CVE-2024-7357.json) (`2024-08-01T13:15:10.950`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `1123` +- [CVE-2024-6973](CVE-2024/CVE-2024-69xx/CVE-2024-6973.json) (`2024-08-01T12:42:36.933`) +- [CVE-2024-6974](CVE-2024/CVE-2024-69xx/CVE-2024-6974.json) (`2024-08-01T12:42:36.933`) +- [CVE-2024-6975](CVE-2024/CVE-2024-69xx/CVE-2024-6975.json) (`2024-08-01T12:42:36.933`) +- [CVE-2024-6977](CVE-2024/CVE-2024-69xx/CVE-2024-6977.json) (`2024-08-01T12:42:36.933`) +- [CVE-2024-6978](CVE-2024/CVE-2024-69xx/CVE-2024-6978.json) (`2024-08-01T12:42:36.933`) +- [CVE-2024-7302](CVE-2024/CVE-2024-73xx/CVE-2024-7302.json) (`2024-08-01T12:42:36.933`) +- [CVE-2024-7324](CVE-2024/CVE-2024-73xx/CVE-2024-7324.json) (`2024-08-01T12:42:36.933`) +- [CVE-2024-7325](CVE-2024/CVE-2024-73xx/CVE-2024-7325.json) (`2024-08-01T12:42:36.933`) +- [CVE-2024-7326](CVE-2024/CVE-2024-73xx/CVE-2024-7326.json) (`2024-08-01T12:42:36.933`) +- [CVE-2024-7327](CVE-2024/CVE-2024-73xx/CVE-2024-7327.json) (`2024-08-01T12:42:36.933`) +- [CVE-2024-7328](CVE-2024/CVE-2024-73xx/CVE-2024-7328.json) (`2024-08-01T12:42:36.933`) +- [CVE-2024-7329](CVE-2024/CVE-2024-73xx/CVE-2024-7329.json) (`2024-08-01T12:42:36.933`) +- [CVE-2024-7330](CVE-2024/CVE-2024-73xx/CVE-2024-7330.json) (`2024-08-01T12:42:36.933`) +- [CVE-2024-7331](CVE-2024/CVE-2024-73xx/CVE-2024-7331.json) (`2024-08-01T12:42:36.933`) +- [CVE-2024-7332](CVE-2024/CVE-2024-73xx/CVE-2024-7332.json) (`2024-08-01T12:42:36.933`) +- [CVE-2024-7333](CVE-2024/CVE-2024-73xx/CVE-2024-7333.json) (`2024-08-01T12:42:36.933`) +- [CVE-2024-7334](CVE-2024/CVE-2024-73xx/CVE-2024-7334.json) (`2024-08-01T12:42:36.933`) +- [CVE-2024-7335](CVE-2024/CVE-2024-73xx/CVE-2024-7335.json) (`2024-08-01T12:42:36.933`) +- [CVE-2024-7336](CVE-2024/CVE-2024-73xx/CVE-2024-7336.json) (`2024-08-01T12:42:36.933`) +- [CVE-2024-7337](CVE-2024/CVE-2024-73xx/CVE-2024-7337.json) (`2024-08-01T12:42:36.933`) +- [CVE-2024-7338](CVE-2024/CVE-2024-73xx/CVE-2024-7338.json) (`2024-08-01T12:42:36.933`) +- [CVE-2024-7339](CVE-2024/CVE-2024-73xx/CVE-2024-7339.json) (`2024-08-01T12:42:36.933`) +- [CVE-2024-7340](CVE-2024/CVE-2024-73xx/CVE-2024-7340.json) (`2024-08-01T12:42:36.933`) +- [CVE-2024-7342](CVE-2024/CVE-2024-73xx/CVE-2024-7342.json) (`2024-08-01T12:42:36.933`) +- [CVE-2024-7343](CVE-2024/CVE-2024-73xx/CVE-2024-7343.json) (`2024-08-01T12:42:36.933`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 012b95573fa..8f2a745eb3f 100644 --- a/_state.csv +++ b/_state.csv @@ -10400,7 +10400,7 @@ CVE-2004-2150,0,0,8c547dfad61194d3ebfc12a1d0122df03c022e0b5dc1e2afef7f32fc505575 CVE-2004-2151,0,0,416a7157a9600d626873bab94dcc979451dc5633b2fa547b597ddb5e3b0cd954,2017-07-11T01:31:40.247000 CVE-2004-2152,0,0,5593ce4cf69ec08676b00430be4eff9ec042c6a4706affdceb5402560886284f,2017-07-11T01:31:40.310000 CVE-2004-2153,0,0,39286ffabc68bca54cf16184f8700b523a3278f78ae7553cbdbd85ffb1bb8500,2017-07-11T01:31:40.357000 -CVE-2004-2154,0,0,0a24778d583bf720d9dee2a680c0ca04f083ac41ef3662c1d8df4d3b74a35af1,2024-02-15T21:17:54.433000 +CVE-2004-2154,0,1,99f015807786bf0f6b37d3488beaf74549028756fb2859ee85423391b1955512,2024-08-01T13:41:22.520000 CVE-2004-2155,0,0,bc389f607a453215db5785cd2ffaf1f521b03f5c84db84635072c340d235a7eb,2017-07-11T01:31:40.420000 CVE-2004-2156,0,0,e13fad1b9c0078a5dc122a8ed9afb104a0de86727e0c756971ceb6c1bb1380e3,2017-07-11T01:31:40.483000 CVE-2004-2157,0,0,ac2d5c5b5c18f9e342db29df25ae4c61a9513034c25cf7205e19dec2a8e275ed,2017-07-11T01:31:40.530000 @@ -56090,7 +56090,7 @@ CVE-2012-4788,0,0,f87bf4d7ce681416bba231e37279e0a65bf150252d9911255b6d1bfe7ebfd8 CVE-2012-4789,0,0,508928860a05a11e6d858f1e3c3925e4c5007cd8b4a0bc72a7a7f0c2b51662af,2023-11-07T02:12:00.040000 CVE-2012-4790,0,0,3862114452546abcef077abc91acc425dfeabef30a067b89da3914d08ed51430,2023-11-07T02:12:00.303000 CVE-2012-4791,0,0,b18e9c779212295979473cc92a1f49dd84e3305fb08aea10e3154385977dda2c,2019-06-01T00:29:00.870000 -CVE-2012-4792,0,0,6c229657243805c89c950f7b53f61cd801b5fb5fe5aa69d2f24136efe0318e7a,2024-07-24T01:00:02.067000 +CVE-2012-4792,0,1,d662ec5eef396ce26c342ef8cceb3886a7d7208fd0a19ee2383cf55af990934d,2024-08-01T13:41:23.967000 CVE-2012-4793,0,0,92da0dbb5cc63b44693f0e0e5e7553aaf9515197036b78516eb5fa246640aa0e,2023-11-07T02:12:00.547000 CVE-2012-4794,0,0,1640d1f0262ae679e9886d49d137b9f409f54a07545f049b938eda635b0533d0,2023-11-07T02:12:00.780000 CVE-2012-4795,0,0,7617a82e058db94f46451d1c08c452583f2e4da675ae8d3d7531c7a71c3c3b4c,2023-11-07T02:12:01.003000 @@ -65432,7 +65432,7 @@ CVE-2014-100001,0,0,496d283e4077eb91781700470d529f28f56a9879d89873bb4bbe708a8f66 CVE-2014-100002,0,0,1fe07cb5580616868b609fab25539d322badf9ed4acaa13d89867111a168d0fe,2017-09-08T01:29:00.980000 CVE-2014-100003,0,0,535504af9f6d657d634bcdf619e1925599052cdfdd8e7318c585a59d4b34907d,2015-03-24T20:49:10.563000 CVE-2014-100004,0,0,385016359e044be489079162254f0709adbec8ec723092128f8d11cf5c0b3b7f,2018-10-09T19:42:19.983000 -CVE-2014-100005,0,0,df73f8ec8996c8fcff23969e8d7b3ae82a302a3b734f6d1d4de9f35a07bd27c7,2024-05-18T01:00:01.410000 +CVE-2014-100005,0,1,43e6ef219d260f2090e734db662c671abef740ed8616b0583b532532db46c775,2024-08-01T13:41:24.997000 CVE-2014-100006,0,0,bcf5f7dbbf5e5cb3b9fb326d90b640ed92a3e165bcea5109a96f9a5b32827cfc,2017-09-08T01:29:01.153000 CVE-2014-100007,0,0,3be48e186ab7a25218ae6cfd191b523f12edae47ccd4b7f0680f2bd21ac96717,2017-09-08T01:29:01.197000 CVE-2014-100008,0,0,3d85995dfcf3a67ed6e45685004c57e8f9c0d5f0a79a63acf1bcbb76a1bb4184,2017-09-08T01:29:01.260000 @@ -81035,7 +81035,7 @@ CVE-2015-8310,0,0,aaadb9fa65781ce4ff6da76f0627ae15f6df0dba523d3efecf398c263c85cd CVE-2015-8312,0,0,1d0e5d35726876250f10ce332d1ce5f2b2e964f333f442fc45794618ef00e59f,2023-11-07T02:28:23.333000 CVE-2015-8313,0,0,524cf14d73b64c827adaf0fcd506a8283643b30454732d24ca1bf446151d92c0,2020-01-09T17:47:31.220000 CVE-2015-8314,0,0,bcadf692f9b1179d71518bebf939c39baa434171391433da78e3abe4a25a430b,2023-12-14T20:34:05.650000 -CVE-2015-8315,0,0,2814f8cc5c3c80f7060b7db986500ed86abaac0579ad4f90cdebbe7c856e5b98,2024-02-08T20:34:07.077000 +CVE-2015-8315,0,1,b090ff633d56b208038c9b5d000fd4176bd9f97b45d7efa7a41f3485e98ec3e0,2024-08-01T13:41:28.177000 CVE-2015-8316,0,0,cef8fc86e78ae530d48619173b42143f17e980ab13cbec47663a87973f7d354b,2017-09-21T18:50:58.893000 CVE-2015-8317,0,0,e76695eb99432fc232d2c47ce841e63f3b24f66f380d7b69da6a594848368e32,2017-09-14T01:29:04.303000 CVE-2015-8318,0,0,0fe5310064e3b25dfa18287347f5086d8c0b429fe6a1fbc1dae235fcc5c1cae8,2016-04-11T14:27:00.797000 @@ -83503,7 +83503,7 @@ CVE-2016-10177,0,0,dfb3e3e00db2577ec4c3237d796e07bf2d69475412aa555c8b12411099fe9 CVE-2016-10178,0,0,bf6f999d19322a4e02d1791fe56b2fe9c6b9845204f2855c81ad339a7a69d224,2021-04-23T18:44:53.037000 CVE-2016-10179,0,0,b7282fe756c412e17438cf717a5dbda07eb87dd37c7cd8ed6eafee5d1c20ca12,2021-04-23T18:49:59.207000 CVE-2016-1018,0,0,b7e9c9df6c54f05c160757654fb5af2c6b1d91567282ac2a661145e596419183,2023-01-30T18:15:06.663000 -CVE-2016-10180,0,0,770b7c3ffd7e62099184cdc90e51ca70e7103e685a40a953043b33fb65a840c7,2024-02-09T02:41:18.860000 +CVE-2016-10180,0,1,435d6c060de814f8840c96e8efe3257f77067ce9e62d82273f9d0f915e71aeb8,2024-08-01T13:41:29 CVE-2016-10181,0,0,01d0f174e52dd6a0ec9c678697c020ad80ec8f19ca363996967aa89537c9e005,2021-04-23T18:43:52.017000 CVE-2016-10182,0,0,8950d44b1c3afc80124ecd0b56e43752cf0b8ab8972cf9ad1ecb85a1c8d150c8,2021-04-23T18:45:40 CVE-2016-10183,0,0,0b36aa7d4c08beb27b5739fa1b2b1887fa5311dca6b6ccde6974264d1557d41d,2021-04-23T18:44:15.903000 @@ -90828,7 +90828,7 @@ CVE-2016-7914,0,0,1c872a24762365466ae4590ac38cb5d69b7040b0004b36540e0dc5a8c28292 CVE-2016-7915,0,0,1785fd5f13c713450ac4227417640cc3e78b5efe50dfb4c56117a063ac1d5212,2018-01-05T02:31:15.997000 CVE-2016-7916,0,0,0110c81a58be9bff4c8fa440a8d03a7a9b2a40ed656f254f90f07ec5987548e3,2017-01-18T02:59:12.610000 CVE-2016-7917,0,0,f9e042d5b2b2daac24b0887071880a7e021b1789789abd0adb57eebedefe59f3,2016-12-02T23:13:07.220000 -CVE-2016-7919,0,0,65b3a347a520c7f6f5dfee94b7be9b37b1d42598a8b699b7363f33d8948f475a,2024-07-23T18:15:04.600000 +CVE-2016-7919,0,1,cff8f015981ea47437196aec5cfde46541b20c77685a2379b91fea37df2f26fb,2024-08-01T13:41:30.160000 CVE-2016-7921,0,0,bfdf4c526c253ac0b648e8708107c27a4265aa26d13eb15563492d405ad50d05,2023-11-07T02:35:16.317000 CVE-2016-7922,0,0,81f16d3e9865ae7b810273db1781a9061cd1728bf6093b0e882b3d5e56bdd181,2023-11-07T02:35:16.347000 CVE-2016-7923,0,0,f23484381669f98e321e9635d76d5bf277dfe0608f794e5955e86f252c7f9c1e,2023-11-07T02:35:16.410000 @@ -92718,7 +92718,7 @@ CVE-2016-9942,0,0,2f3342253a2d0615ea48781edbc780d438136db8f3b18119ab8af7ae4ac248 CVE-2016-9949,0,0,ce14cdd403f05c88f5b5bb6498ab81ad08e2a147d60c3b081714972f2bd0e0ab,2017-01-07T03:00:45.917000 CVE-2016-9950,0,0,eede726c592fc1f584f3dca64abdf1a76c174c027801966e5df8e038ea266e5d,2017-01-07T03:00:45.980000 CVE-2016-9951,0,0,e7b61937b065602623b5c91e81ef4fc70b7f8d2dad68b27baa8641d31b96e21f,2017-01-07T03:00:46.027000 -CVE-2016-9952,0,0,bab71f9b5628f853bb7f5489d9646499209eba6b68bb25d97ef79cdbe586c65c,2023-12-15T19:06:18.803000 +CVE-2016-9952,0,1,cd12aab3b98a40c5c9fe0274734a9891b1930feffed32f04ea3947765ac62126,2024-08-01T13:41:30.963000 CVE-2016-9953,0,0,ed5cba4b007566a655b9f26380010a3bd76857738808eb8f31c6470867eb8440,2023-12-15T19:06:18.803000 CVE-2016-9954,0,0,7a4c87b66e65fd0499d8f5311947af9e4d3ff1fd1a2f99745deeff8c02736f52,2017-04-27T13:22:00.133000 CVE-2016-9955,0,0,80546ec022822e453f1f52324d91c3453aa112949bd355b57c200bd9ee1f19e6,2018-10-02T15:52:32.403000 @@ -94916,7 +94916,7 @@ CVE-2017-10951,0,0,407e2506eec6749d2d6c372aaad3b67e9d0e6dd24c09c5a8454e70beab5f7 CVE-2017-10952,0,0,404c76db44d0623d91f763f016ee23a95904c497f448eba2513399171da028e9,2019-10-09T23:21:50.980000 CVE-2017-10953,0,0,196489ed486aa0eb2051d24048531f502c4c61e95a265466f1c5773327ba69c4,2019-10-09T23:21:51.150000 CVE-2017-10954,0,0,b439b3c349af190bc4511ee852286ca09114991b3822f0d7ca1e4f746a24961b,2019-10-09T23:21:51.290000 -CVE-2017-10955,0,0,926643355dfb1f3065bafd885388a959039c432bbd979fd78e14028a28b46553,2024-07-16T16:15:03.480000 +CVE-2017-10955,0,1,cbd27072eeef1e07edea409d26f286bdb719c9be5c65b037e39818ba8158971f,2024-08-01T13:41:31.777000 CVE-2017-10956,0,0,d22d27a04b49cc44f4e4891d4bf00c25253b174384cce6af13621ac520783b9c,2019-10-09T23:21:51.557000 CVE-2017-10957,0,0,a45796f249f2a427c2b17cf234da900e87682b0211a02224eb371096339e2056,2019-10-09T23:21:51.713000 CVE-2017-10958,0,0,4c1962e9e14fb70f842c7b2d115e3bef0f8744175edbf8119807b49090bc612f,2019-10-09T23:21:51.823000 @@ -100362,7 +100362,7 @@ CVE-2017-17054,0,0,b0b75aea8aa727245bd724b248737acccb800add2afd02984861c20cad886 CVE-2017-17055,0,0,6fb72d06d2d3aec3d1452e872f9056cd03e1decc205756715d70681b555edf8a,2017-12-21T18:54:43.823000 CVE-2017-17056,0,0,d1390ce58a329c270a86df6ce79a5090142f3698dd20c41c50b3153c7f55b29a,2017-12-20T17:10:58.270000 CVE-2017-17057,0,0,2f518aaf4793f730877e64ec583f7c0607bdbc4687fd4d141ac18803560a8862,2017-12-21T16:53:52.907000 -CVE-2017-17058,0,0,5075c57efe265c8cf8a5eab83358ef9b534dd32762e7fc147351f4b4c02b65dc,2024-07-23T19:15:11.173000 +CVE-2017-17058,0,1,6bf84a5709635e71a5df68dbdd74a073aa8a56817db5ffeff39ee3769d145202,2024-08-01T13:41:32.003000 CVE-2017-17059,0,0,a2d9cf98213246e02185925cf60a41af6c92f727a0c8c90ab6bad7c91c84b75f,2017-12-19T17:04:18.517000 CVE-2017-17060,0,0,acf2205352fde117e89aea56ea9ebcda13cc188be737a19f55398cafd99eb23b,2019-05-23T20:41:11.247000 CVE-2017-17061,0,0,27cc8b801d25516b3f630f7f68eb8644070b0db78c60333510f0b3b05e1aec40,2019-05-23T18:38:26.753000 @@ -100803,7 +100803,7 @@ CVE-2017-17517,0,0,7350fcef80dd0deb9218dc091aef211b436cf3f5702ccce58e2c978b42dfd CVE-2017-17518,0,0,8f688fec547284849b3b3a7604a0864a38404c245ed781811a0845dc532742d2,2024-05-17T01:16:07.970000 CVE-2017-17519,0,0,ecd82a916353062b51c07ee7d9439a666dfd419c270851ea34b3e9eef63e1723,2017-12-29T15:39:24.263000 CVE-2017-1752,0,0,f1f499132f1412e442a31656198825c1fa3fae424935704cb64fe46aa4bf08fb,2018-06-28T14:56:03.697000 -CVE-2017-17520,0,0,b9d723bb3e0dbbb0fca3b61f24c0a39a52026f5ae94a51bc6e32107f3494bf55,2024-07-23T19:15:11.300000 +CVE-2017-17520,0,1,c088b7221f28758e7842f3a68d40d780fed01274444c93b459913e83c2a386eb,2024-08-01T13:41:32.803000 CVE-2017-17521,0,0,0901c9d47ad63c0e88fb6e0eb607edc016779d5370ad1e5215620dd3da2e19fd,2020-01-13T14:23:36.850000 CVE-2017-17522,0,0,41a216cc6ab128ed255c0f944e89f52bde1bb6acf86a381fbeb31d207bcc4cdf,2024-05-17T01:16:08.227000 CVE-2017-17523,0,0,e3fc8a85a7bc988554e5d186cd436ff42d74702984863b6cb92419dda2aa974f,2017-12-29T15:38:34.293000 @@ -104128,7 +104128,7 @@ CVE-2017-3768,0,0,a9d3cdbe35d4cbde354522677133c37182e14896a4a819ed3c4de775f8191c CVE-2017-3769,0,0,ee7156f2282f60586259b2c2663b47e1500fe186456c5cbb66a732b073afad8f,2024-07-29T21:15:11.107000 CVE-2017-3770,0,0,50498b73d2e169a119c833acc8e6884b909fe57fd2f88c994b613d01d5b79a15,2019-10-03T00:03:26.223000 CVE-2017-3771,0,0,842fbd922aa5ab87bb1b786a79feb9336c4c27a9ebf45517f79af44ded7b2be3,2019-10-03T00:03:26.223000 -CVE-2017-3772,0,0,6e84b09b4608f9b3f75b1cdb13ddf440362580b53dbfe84a56d7acf466363001,2024-07-31T21:15:12.063000 +CVE-2017-3772,0,1,ce910abae86b4c65fcbaf7789eed94db28e2c6b68c9039b352dbf73a40426762,2024-08-01T12:42:36.933000 CVE-2017-3773,0,0,4f1c640be58fc5f21d6a63a5a68a2536a425a7f8d15f531f4f700289ecfd7ff1,2023-11-07T02:44:13.170000 CVE-2017-3774,0,0,d409d3f34db015c7daec361952a5a6d7fd1d6f73296ee3273429d749d1d764fa,2018-05-24T16:27:03.247000 CVE-2017-3775,0,0,ab41f4023b00bda26c97ad0eb99ef0d3cb35ca29d6e3b05ce617672fe8d191ca,2018-06-13T15:58:17.390000 @@ -107271,7 +107271,7 @@ CVE-2017-7259,0,0,571c59745fb72171848cbec67b01cd7395960fde6278757ecb34e86163beea CVE-2017-7261,0,0,5d4482ce57d5049c4514e03968c105efd06c3856a07be4567447823c2b860e50,2017-03-29T01:59:02.890000 CVE-2017-7262,0,0,f78bc38632d70f21b7078a4e9db2032da6abc2c24dc4facf58d5aa5df81ab103,2017-03-29T13:57:42.320000 CVE-2017-7263,0,0,51b071ac9f1aedb7d54bc263a94d26159fb2954d002b42dfac4a37d8260b650c,2017-03-29T01:59:03 -CVE-2017-7264,0,0,09de7ea4a569a0956bb7612ff8e6d13eae78f4f2b39bb1c33db0342689758d16,2024-07-15T21:15:02.673000 +CVE-2017-7264,0,1,1f73d813e51d6ef3db8ab7bfe8944d616e87884a6f26e53002d330052cdb52fe,2024-08-01T13:41:33.823000 CVE-2017-7266,0,0,0b71a2968113f2f8d9030c214fd310d647c1171b7725d852e2a15e261686341b,2017-03-29T01:59:03.110000 CVE-2017-7269,0,0,5c55eb1ac33241769906ae5bd31be4a25232707aca13d8ab990794e81f06f3c3,2024-07-25T14:01:24.977000 CVE-2017-7271,0,0,4abb50bf24b45576e32e408897e16efe8f10cb28e2556d4eaeac68cb450ad3e9,2017-05-08T01:29:00.267000 @@ -107305,7 +107305,7 @@ CVE-2017-7302,0,0,2a82a15393b5eb29b0a753907606c77e5892ac80acbd64c5a6b4686a6e2a0f CVE-2017-7303,0,0,34ae6a992e5931ab9dbb6881fe3234cf48f2bae1cf4a0af8a0b1f4cf22d6aef8,2017-03-31T17:00:51.633000 CVE-2017-7304,0,0,8a1608dfb9a5ac3d417659fe8210479911b78c9acb00de248c6cbb6ccb393b22,2017-03-31T17:06:40.837000 CVE-2017-7305,0,0,d739678bba8185dee45364bf3e1cf7ecbc55473862a823851d277f19c45f23b3,2024-07-03T01:35:22.590000 -CVE-2017-7306,0,0,7f2a6f416c76b281cd6231f7c5bf0dc2fc48c79ea8b04d9278a9a803b7d4beda,2024-07-23T19:15:11.397000 +CVE-2017-7306,0,1,8339aad8830b3da165ad4328d89a9a4aff61534de008ae2bd96cf5e1876f8193,2024-08-01T13:41:34.047000 CVE-2017-7307,0,0,58b3693aaf7f530f77cb69ae6b698e10dce607763482ee730816ef5606500245,2019-10-03T00:03:26.223000 CVE-2017-7308,0,0,33463313b5faa58dc2ddad0d2e5345a3005d072b6e023dcf2ebdaff5a6d2ea4b,2023-02-14T18:32:40.287000 CVE-2017-7309,0,0,f709e8dd547a2a4042b03315b8e74bb04f7122d5e9555a9ac9374a1503412066,2017-07-12T01:29:19.897000 @@ -108759,7 +108759,7 @@ CVE-2017-8906,0,0,5a4d6e2e9147df5232cb7681e16ca4d380f9eeafc13b8911d8aab42b12d578 CVE-2017-8907,0,0,b6dbbda1a01f2804ba33cd442a2acefab2b8d2dc6440efa3185e0499f66ceebf,2019-10-03T00:03:26.223000 CVE-2017-8908,0,0,7b84bdf96429bf0883bc69650fedb99ea00b682633d5b5e40aff0dd73aba1e3e,2017-05-23T01:29:03.583000 CVE-2017-8911,0,0,afe251c5a36af4cb0b5616846816b72cc1f3d0719df3d6f3594d9b3d698f55a1,2017-11-04T01:29:55.303000 -CVE-2017-8912,0,0,c2c97aaad8a477b4a7412513dc96c1ae945fd7dddf97288c0a3f35e4fd5d0827,2024-07-23T19:15:11.510000 +CVE-2017-8912,0,1,279e07194840449aac5691757cdd9921e2ffe49fe78e49deb822918bcf0df810,2024-08-01T13:41:34.840000 CVE-2017-8913,0,0,4ec943348703786790d42e46fb35789e939cd7c93682a54d7ed184ba6f83ad15,2021-04-20T19:37:03.733000 CVE-2017-8914,0,0,9291a86dca3e52fda802e53c8427fb148265a77fb71036c1a5fa82eddc0d5a58,2019-10-03T00:03:26.223000 CVE-2017-8915,0,0,3df781304ad151af3a69bf85da9be143e4a1e685ad514ec0e61f9fdaa1b98e7c,2019-10-03T00:03:26.223000 @@ -109238,7 +109238,7 @@ CVE-2017-9439,0,0,456f16a5e48c436581a51d320ede1d67b85a567c7da9bc7eaa063565aca482 CVE-2017-9440,0,0,2123eb4ea3a03cedde6e2eddbaa29d3fe6e33ff0b3ee0a93b6111ae21ce4a4ec,2019-10-03T00:03:26.223000 CVE-2017-9441,0,0,35d68af061ceede3afc9eea9a9f44e18a0437788c942224e752ca200a7907814,2024-06-04T19:16:55.397000 CVE-2017-9442,0,0,4ebbf0693c5c9a704bc7fa9747bc19ca7eba240945d94d3ed31d5282ce73a0f9,2024-05-17T01:20:48.493000 -CVE-2017-9443,0,0,4d3d139142eeaaab25b9121505ca52a01b6b4a73f5eae7ff82462d76de3df92f,2024-07-23T19:15:11.613000 +CVE-2017-9443,0,1,fcc7e1b343f0a7b4ad3963daa487bbb51963b041361f45dfe6305c33d3c03212,2024-08-01T13:41:35.637000 CVE-2017-9444,0,0,a8a61be64f1fe6f977b85debc8187d06e9259b178fd3bed8f2748cb6c8036855,2017-06-12T17:44:06.033000 CVE-2017-9445,0,0,d6be1ea9b4c58b122efae1f18c475ff8e18f92ed88131ae04d2ef94b8c02389d,2022-01-31T18:19:39.563000 CVE-2017-9447,0,0,2e37e92fc7dbcb5c0ddff50bdd095107ab87c1850a06bc1223edc46c06a3fc54,2018-03-23T16:03:35.213000 @@ -110721,7 +110721,7 @@ CVE-2018-1000033,0,0,858f48a27cfc6cd6d38e2a781fd60cdb956846a6a7c628da28b0249b3e0 CVE-2018-1000034,0,0,9f046a3ae33c12eb65a81471eae361c3c96c94d7941f77661d1067393a31b9d4,2018-02-26T19:11:58.640000 CVE-2018-1000035,0,0,f3ac17321769176439c0dad8e3b5075b803f2592212d8b46134ec73584b72275,2020-08-24T17:37:01.140000 CVE-2018-1000036,0,0,9c7069ad9539e5ac71c6df2912bc9b5184a459cd394083481a163973b41f5c3a,2024-07-15T21:15:02.777000 -CVE-2018-1000037,0,0,984247b9eac36aa83bffe37f21293831c68822e0a1c484b308ee24bdf63680af,2024-07-15T21:15:02.867000 +CVE-2018-1000037,0,1,27ca64f2cffd813816e345cb550071151a5a2faed9a4e94e92efdb588391d46e,2024-08-01T13:41:36.483000 CVE-2018-1000038,0,0,b454f40c0c455deb6991c79687c6bdeb2e53142a93c425761594677e384c6dfa,2024-07-15T21:15:02.963000 CVE-2018-1000039,0,0,edf6f44c4fdf4e6a4a530dad1ede9a8d7fccf68640f370ffef2a6e604a7ba536,2024-07-15T21:15:03.053000 CVE-2018-1000040,0,0,807ea1c813f13665488403000f357cef3d96b9c07ba0fbe0c6ada9b9f7c54dc5,2024-07-15T21:15:03.160000 @@ -111748,7 +111748,7 @@ CVE-2018-10677,0,0,e6353ef152910640524de92256623b825c4780c8ca02932f29a5c23c98e7a CVE-2018-10678,0,0,c486ffcb4dcaa207c3184ef9ebc7af82eafba5d8ee69082cd556fdb3e04d2ad6,2018-06-05T13:03:39.613000 CVE-2018-1068,0,0,ba0e2c07de84b6647bb8513ba0dbb5d42c69f06321d850f0e86b7533516f0675,2023-06-21T15:56:59.840000 CVE-2018-10680,0,0,5f03392b4e313238ed10e896124357af5d28b9a3b6fe9bf76fb7e3d4f4f04429,2024-05-17T01:22:09.580000 -CVE-2018-10682,0,0,9c886b88b1b648a62b979a1c7cbad1300a0ff88abee8827364e55a3246a7b1f1,2024-07-23T20:15:02.767000 +CVE-2018-10682,0,1,2702311e4991ac2eb8a23f116106fada316ef2aa456707b96eaa5aeae40d6125,2024-08-01T13:41:37.627000 CVE-2018-10683,0,0,61e83b08d5e6c35785d30c2d40abe0924c03f1bad4b5273cba8c6325999c65f6,2024-05-17T01:22:09.813000 CVE-2018-10685,0,0,e2090cb1e1ec44d88a1a9ebd668586170e4a222052d6713a3a9bd7ff9c95a673,2021-08-02T00:15:08.277000 CVE-2018-10686,0,0,f9d62ca64f51a48f874574e0ede19028e2a93962cfb4ec7311b69c65e7798bf9,2023-11-07T02:51:31.547000 @@ -112718,7 +112718,7 @@ CVE-2018-11724,0,0,e212ebd9eeba401db55874e910e4ff372914882f640754d74ab7099d1182a CVE-2018-11725,0,0,3affbf7a2a404efd9bd73b1e738d279e1fe3185a480cf5d9407bc72a2318c084,2018-08-08T15:18:46.960000 CVE-2018-11726,0,0,2cb5e9e12741a89260083e7f578206cf3b6f8ea09afae04edd250cd331f1882a,2020-08-24T17:37:01.140000 CVE-2018-11727,0,0,4f7f02237c8041686b9317f11213e3f397ff89dd4dbd4e4c7a17101a5274cb56,2024-07-03T01:35:31.443000 -CVE-2018-11728,0,0,669812c7e0937b3f0714c392cda4272ace5c4f8110ad8a054365856b2f9f0a1d,2024-07-23T20:15:02.893000 +CVE-2018-11728,0,1,72ec206807410fd31f4d0e5202dd1e9c0d395e69d06c8ef4a29f64524d911d45,2024-08-01T13:41:38.410000 CVE-2018-11729,0,0,268c738b71bea4e74cd8612f20ce8e8e90053ba9996f19dcce3a92181691335b,2024-05-17T01:22:41.120000 CVE-2018-1173,0,0,8f0f684ec4fd525e62cfa0da8a698a13f86234ec042a6b5546b5646b3b71e062,2019-10-09T23:38:13.507000 CVE-2018-11730,0,0,76b817327ead925e17b1de07591711d25cb9d4e9418ea43002e0e6682ba3ee7e,2024-05-17T01:22:41.213000 @@ -115027,7 +115027,7 @@ CVE-2018-14331,0,0,1733e7b3c78eb173f6e76f921a4b1f5947023f3b6403afccde2b928f50210 CVE-2018-14332,0,0,bb15d876c7c697bea436f2865b795a9464bdc96c3e27a980a0cfbfc5eaefa1ff,2019-07-21T12:15:13.647000 CVE-2018-14333,0,0,fca5b144141c8927646c58c7bf28b597b8cc11ea66f929f8037c82fecde2aef0,2018-09-17T19:51:15.093000 CVE-2018-14334,0,0,2ed445cefbd8dc02dae3c6c9bb32557a08ace5b6278ac6d3207390bbfcf2221e,2018-09-17T17:02:03.977000 -CVE-2018-14335,0,0,361d3b12f9d2d87aaa191fed7231ae88731002f76b4b62dfcffe8773ab51919a,2024-07-28T14:15:10.147000 +CVE-2018-14335,0,1,e547c603aa34ba8fed0765bee7bb47733af38344a6ceade93746d75d43d277f8,2024-08-01T13:41:39.203000 CVE-2018-14336,0,0,537b076def27ceed63df540357c12c791443f0b9f11d7b54320de106daf70d90,2018-09-18T12:14:00.220000 CVE-2018-14337,0,0,275d721464bb61f28b281bbc31f5f1039135b556716ccbc6030085efcabb1a71,2022-05-12T20:12:40.610000 CVE-2018-14338,0,0,094ebee330e8d8e57b8626935c8559ca2b75ef5f03880febde375b1a53fb3eae,2018-09-17T14:25:43.537000 @@ -120061,7 +120061,7 @@ CVE-2018-20400,0,0,141db72688c2d54df58ffdc753fe8785f5289bb1eebf7d45361549c81af30 CVE-2018-20401,0,0,122aa95f19aa5b7b92c6ca56d0a300ff361eef9f783b4f955971b62eaa5dcd55,2019-10-03T00:03:26.223000 CVE-2018-20402,0,0,db91a67bc759fb46d771ad055f7dcccc3b2d0e4a343872ee995fb61f5378d4e7,2019-10-03T00:03:26.223000 CVE-2018-20404,0,0,6e81367a4f3cf7f7e34fb649cf0846754221cc5364bac19bf3521ebef1f12e0a,2019-02-14T18:28:26.547000 -CVE-2018-20405,0,0,fa4fe017e3727ec9b3723a0fda44154d08127cb55dfb98c49d6b289552c9fbd6,2024-07-23T20:15:03.050000 +CVE-2018-20405,0,1,d8220767b141012bb126a96b242da61e5bca30249568e8bbfba872a38bc7d683,2024-08-01T13:41:40.240000 CVE-2018-20406,0,0,a5ca93cb418ed79e580a36659ab3eff635e5808af318a1337eb552f6d58864e2,2023-11-07T02:56:16.970000 CVE-2018-20407,0,0,4427983cd3ea320f34710935c28335ffafe031f8b4ce794b65d1e7a1a5ae00e8,2019-10-03T00:03:26.223000 CVE-2018-20408,0,0,77d7a5d3108ee397ec5bd7c0b40b1279f2c5ca3deba8d92759590963d87202dc,2019-10-03T00:03:26.223000 @@ -121314,7 +121314,7 @@ CVE-2018-25028,0,0,f8d63491deeceb41c450ce7c162bc94d0fb413c8d161119b1512c342b0865 CVE-2018-25029,0,0,7ccab6ea2195b5dd76c36bd6ed569ce887f6f05b36621177f20eebf813cdbf51,2022-02-09T15:45:48.157000 CVE-2018-2503,0,0,9d55343570c109a43add370d783b903ac0623bf175f051499f55aca47eacbde0,2021-09-09T17:17:24.160000 CVE-2018-25030,0,0,02a9358d201382a704d7f138a3119bd7ee0e360fc4e5a40b1eee38c35559e1b9,2022-04-04T19:13:21.520000 -CVE-2018-25031,0,0,56b5c39642e66e28458e6230fe48a4a43fea94a41f4c78621d3a983bf632abd5,2024-07-17T22:15:02.130000 +CVE-2018-25031,0,1,8948b9d9369502bcbd02474110814367f8bdfaf888e64d2a2035e3bd3e614e14,2024-08-01T13:41:41.080000 CVE-2018-25032,0,0,3012a2b19a039592d330912db6df82bf4697afa3b316ff1ce8a29e7eafe5a03d,2023-11-07T02:56:26.393000 CVE-2018-25033,0,0,f0629aee2eebec42636f555818f70093ddc02b3111bf52c252c0cab48b37702c,2022-10-06T17:50:38.090000 CVE-2018-25034,0,0,2a8e3f404ad2ceab1cf87b8301be191bb8486d945ca7af8c9e79480c3e1bfdf4,2024-05-17T01:27:25.100000 @@ -121385,7 +121385,7 @@ CVE-2018-25096,0,0,0f1a9d2fe0943450f70fc2f111ebfdebd2f2c63d07ffdb5b75cb7af27e02a CVE-2018-25097,0,0,b132b2c05ec96134ee21d6c1f5f845fb6d9b53254de5311e7c1f18ebf1a12d65,2024-05-17T01:27:30.893000 CVE-2018-25098,0,0,49cc91eb8b166c87ee873e9d859cdae56021ef44482375cea406308fd3920c3d,2024-07-05T18:15:17.597000 CVE-2018-25099,0,0,586c7631a0b69d643c54a64a2d6b1e5bcbdf77958964a738487d2e947c8f6cc3,2024-03-18T12:38:25.490000 -CVE-2018-25100,0,0,0f5c8a455da6d93d3b611e35c0144046eda4a11c4eedcf809c55eea4021208f8,2024-03-25T01:51:01.223000 +CVE-2018-25100,0,1,d942384485e6477ac02d774d7915e3145ff5d011228e897d01068d424d5fde66,2024-08-01T13:41:42.160000 CVE-2018-25101,0,0,f5cb23a560b5f7e2ed0bc287e9dbbe48d218ed9a2d3fbe094521b3e09b217300,2024-06-04T19:16:57.060000 CVE-2018-25103,0,0,e59105c00442742ab1ecc8faba8dbf0d67b37225837a23e9578526d5287d5f7e,2024-07-09T16:15:02.787000 CVE-2018-2515,0,0,5409b099d6b1ad12de2273669dad1cdf61ce6e1c2e305b93396a548635b48aa4,2023-11-07T02:57:57.887000 @@ -123750,7 +123750,7 @@ CVE-2018-5266,0,0,ccb3b2ec5393d3d4fe147f9a53636478babde16aca6f35b6d920e81b430f79 CVE-2018-5267,0,0,e31169d4f354e9ff9b0767df15612f5766a84e12a38960e7049bba8951d1236f,2019-10-03T00:03:26.223000 CVE-2018-5268,0,0,f509277a46e7fd4d8d3150eeadc6179cbd5cb3a993d7eb2fcc9c2d25ec290a88,2021-11-30T18:55:35.257000 CVE-2018-5269,0,0,2e8621a57480098f54b8f656d420e0755737b82b1564e56871520017d4391162,2021-11-30T18:55:40.083000 -CVE-2018-5270,0,0,82b94b6b1e1adef5732117bc0de307bc3f7b69184abd2e6ffe58584ad0ae8c03,2024-07-23T19:15:11.750000 +CVE-2018-5270,0,1,9318deb53d6f5e6cf6d4f6b0aaf9d388723a25489e9e6b78c0ea418cb6444efa,2024-08-01T13:41:42.953000 CVE-2018-5271,0,0,c2d6adeed1407111e0777b691bd1fa3921591996c0b37fd33360c7a698792da1,2024-05-17T01:28:43.537000 CVE-2018-5272,0,0,cc598f77f81d0282e50a9af05817d7eaeb339ca4f5b2193445ab614172a1ab1c,2024-05-17T01:28:43.647000 CVE-2018-5273,0,0,d1926354924dd94e6d65ab493bd0dc48c3c276f53f0ae5312fd3907414d4f1bb,2024-05-17T01:28:43.730000 @@ -123759,7 +123759,7 @@ CVE-2018-5275,0,0,2dafdf649b53f07c1c7e721b9b5a46015522ec92be776ade6cf06ad0316479 CVE-2018-5276,0,0,b4a4a2b97a7e8dbbc3923f3569ea4b9b0c78d87ecf8c8654ff353a34d2e4f23d,2024-06-26T20:15:12.850000 CVE-2018-5277,0,0,c24d1fae4597aed0909d70d9a426e8d806b4400bd951d3aaae53bb24c945fa52,2024-05-17T01:28:44.083000 CVE-2018-5278,0,0,44f54c917ae67ea183a1f5bf9a6df3d3ef75bdd878461985ea281f0f5b629de8,2024-07-03T01:35:39.040000 -CVE-2018-5279,0,0,01a783d83c40840bd908b769e3c0390ca606285d35336865e6032c49bb82f02e,2024-07-23T19:15:11.860000 +CVE-2018-5279,0,1,cd3d00d590e253b482fb17a60589ed8eaf1c3bbfc3b3204875818a71a72383b1,2024-08-01T13:41:43.750000 CVE-2018-5280,0,0,42a40a924ff1351c091ed4ddf9485247ed88b141a9691972aa89e43868880e15,2022-06-16T16:18:23.657000 CVE-2018-5281,0,0,7ff07aff8df6a3312dffe2acfcdaf35ef439515b56391bd2200978e720b7bd26,2022-06-16T16:18:39.807000 CVE-2018-5282,0,0,ded531761b685b62c7b6b363ed4eb1e0c5e55b33e390036fcc56739f775785f7,2024-05-17T01:28:44.440000 @@ -125347,7 +125347,7 @@ CVE-2018-7304,0,0,2484b1d25016458af46aec9d511223aff51d24323b6723fa7635e095e460ba CVE-2018-7305,0,0,c51574b996bb982d98efbb15c25bd3e3e86b242e60bc719aa41e57642d5fe2bc,2020-08-24T17:37:01.140000 CVE-2018-7307,0,0,3fb86a35223205c17b9301ee39c1ae032d70d564fd618ee473adc122be03b419,2018-03-28T22:04:47.733000 CVE-2018-7308,0,0,4ad7df474699037fad079eaa91e1e24baf630636234fd5b1dbdeae467fd10fbf,2018-03-16T17:48:27.643000 -CVE-2018-7311,0,0,5a906e992704ac942c543cbad6e1520070423984dae795636bc4b8f39c0326aa,2024-07-23T19:15:11.953000 +CVE-2018-7311,0,1,174d148f84d3164d06f50624ff2cc73d412959b2f170a828238b0f7556223a6d,2024-08-01T13:41:44.517000 CVE-2018-7312,0,0,19ee1f1e7b15233c9d941db00f38f9e7a8c29b5b479060691062e1cbee6a7360,2018-03-02T14:56:21.183000 CVE-2018-7313,0,0,e83951a8ee872bf9274ba102379c3852d3db75f8dfd619cd81b49637c801c3ad,2018-03-05T15:57:20.620000 CVE-2018-7314,0,0,9a66f7282af8e5ae04f8921e57aae80ace6955af7bb44deb0694c5674da04ec6,2018-03-06T13:58:07.683000 @@ -125606,7 +125606,7 @@ CVE-2018-7705,0,0,984d0f17c510c48e78c9d06614e4fa2e153140bce2f01c15292e9c02496353 CVE-2018-7706,0,0,bac708b738734e2c8f52700b14bdd74ef49772f7e3b916c810268f5541ef409c,2018-04-06T14:09:32.703000 CVE-2018-7707,0,0,7fc602c488e496840b9bf5d43517dd478b1941120e1e4a8a2dd7f2bb5bd1dfda,2018-04-06T14:40:36.127000 CVE-2018-7711,0,0,e0d7320dacdb20be3c00cc59406db5a4bf9108c60dd5f12e77216e2e4eb9660c,2018-03-29T15:24:08.410000 -CVE-2018-7712,0,0,201a3c91ec0ec7113927dce6b8424eb5298410079cfd05bf3ebd6e40b4a162d0,2024-07-23T20:15:03.163000 +CVE-2018-7712,0,1,59071e5d9f24384addd53140a7956e4200ac9cb7661476632064837f103d3426,2024-08-01T13:41:45.310000 CVE-2018-7713,0,0,50eeedeb2fa52c9decad33631ecc881d909604c6d5a2a2551a1ace68f5d89c0b,2024-05-17T01:29:44.390000 CVE-2018-7714,0,0,e1180da7e45f3576c00822e52997760b3bb4ae1704cc2c2b5876939fd58995ca,2024-05-17T01:29:44.483000 CVE-2018-7715,0,0,0b9446d9f84445eabc6567b12b4e348ac19f05de3f3bf760c63702fd44951c8e,2020-05-04T14:14:16.177000 @@ -127872,7 +127872,7 @@ CVE-2019-0961,0,0,3fd67a9cb187d7a437bd755cb7971938fc53890fdb6c6469e93c9bc5da8a25 CVE-2019-0962,0,0,0064cb6a103263f204f3f2bc506b8a2012b7b8c0a762d9f26293648b1a22793c,2020-08-24T17:37:01.140000 CVE-2019-0963,0,0,8bf5bbb3a0a1083aef60216b3a5afbacbbacaeaa89447b1a2ece02c0ff271c87,2019-05-17T14:36:01.213000 CVE-2019-0964,0,0,3906665a12666531422e1f42f8c89440edeec609663c65a8fea0a9b6e04ae26c,2023-11-07T03:02:10.253000 -CVE-2019-0965,0,0,0875b0e9a8428967a5704525031a90b541b897fb443c7752e41deffca04ee957,2024-05-29T17:15:55.177000 +CVE-2019-0965,0,1,e857f549016b0efcaa60c21c74bccecd16b8c320be389973c7ae97015aa4683b,2024-08-01T13:41:46.293000 CVE-2019-0966,0,0,a1a61454f25a90ce1db5e395b4619175ae1b9d60948804554a0f7eb26b5e5d94,2019-07-18T14:49:13.377000 CVE-2019-0967,0,0,1a25ac7551f2942987f8b2ba6fea6524d3cd56886ebaabb77349ab289f7f5c6a,2023-11-07T03:02:10.573000 CVE-2019-0968,0,0,e28105e17235e683452e2786aa7c7eb518d271fa827a4d6e600b5e40d4ae0a0f,2020-08-24T17:37:01.140000 @@ -129657,7 +129657,7 @@ CVE-2019-11476,0,0,4250ff60f492e8b20fc1abf9925c8afef0f097907429bf15815c49cd9131c CVE-2019-11477,0,0,aa021ed8c19a625453250402316bba46d13f28a21bb3494e15439dc18e547bb6,2024-02-27T21:04:17.560000 CVE-2019-11478,0,0,7831c5373bfeb8003c9920c5679bc174277983e2fd57d74c54e0c361eeb4e59c,2024-02-27T21:04:17.560000 CVE-2019-11479,0,0,1e86288e4d6bebdc1d8a31c765ab69c6e2c95420eeda685afc84af455a1f819b,2023-11-07T03:03:02.020000 -CVE-2019-1148,0,0,16cce36466556398bcceaa08d657ceefc9c0915594d1290a8b05776b8adaedd2,2024-05-29T17:16:01.113000 +CVE-2019-1148,0,1,024fbe4692bee15c8e571ad35d1b3b0ab63ed735345a24d4eddb94fe4441c380,2024-08-01T13:41:50.347000 CVE-2019-11480,0,0,5ed42cbc1adeef17022310b60de1c07d908dd173bc0791e1f6007992bb8bb368,2020-04-14T15:40:40.920000 CVE-2019-11481,0,0,8b2527448b4d5850d2e5aa07713cc25d9cc3bcd3c35f655a9f8768fb6ad849ad,2023-06-12T07:15:11.413000 CVE-2019-11482,0,0,2cd92a0da49c3c284588309bc4ded92f59abaf1d79bdb047f17e3630dc579b36,2020-02-12T18:49:20.363000 @@ -129804,7 +129804,7 @@ CVE-2019-11626,0,0,dcb564080da6ab3b5af4b3f0abc8fb901866ae5ca6edc4f8a12853bbe840c CVE-2019-11627,0,0,be67f6b15b80fd38955a4b043d2d08ebb80c067ada0a7681643a4b397e319367,2020-08-31T18:13:24.403000 CVE-2019-11628,0,0,d35786e94f25f00501d65c8f39f7d5d3011757914d87326e30a01be732a97a65,2020-08-24T17:37:01.140000 CVE-2019-11629,0,0,dba1fdbaedb4254b5ec50da08e2f5aa32dcefd26efeffcc5c58b2013f0f39236,2019-05-07T19:01:24.440000 -CVE-2019-1163,0,0,dfa89c8c43c2f5eba6fb4e841592647803a3139af4fcbf3abf45a2bd14ce7269,2024-05-29T17:16:04.847000 +CVE-2019-1163,0,1,95ff9a9b99a41aecb8fbea57786fadeda72e3ea58e85627a0c3fad29559de107,2024-08-01T13:41:51.080000 CVE-2019-11631,0,0,620c4724efe6b153ae856fd66e29ecc80cca8c55b0a1bb55d25294cc0b9752d8,2023-11-07T03:03:03.997000 CVE-2019-11632,0,0,00c661a4a3c66780ce37b91b0891450370bc775946b9a564c490fa14f3ea4884,2022-07-27T16:44:32.450000 CVE-2019-11633,0,0,5b1c4ebdcdba09c8105d04d5f8924833008d171ef6f0c848d64898fa05a3809b,2020-08-24T17:37:01.140000 @@ -129813,7 +129813,7 @@ CVE-2019-11636,0,0,791c0ede69f058be058d1c7aedf399c7164a246931b1c076484e16735d561 CVE-2019-11637,0,0,eb95e08e49e3cce2ff4dcdf69572b9ff3e58e066dab88e864db9afed23638939,2019-05-01T19:32:33.897000 CVE-2019-11638,0,0,620719e1417dccf2bbb9d0271c2cb256503e9ff3f77c0b29fbd359faa99952e8,2019-05-01T19:29:26.923000 CVE-2019-11639,0,0,fc9862902dbd7f72e802389d03bf3d17574414cb9756fc9bca82d75a73ddd71a,2020-08-24T17:37:01.140000 -CVE-2019-1164,0,0,4fc7888c9362f45a20df3a061b2cb54394aefdf222963d17e0dc8ea228bf2547,2024-05-29T17:16:05.140000 +CVE-2019-1164,0,1,83bec8e66aa655cb70a71fab222ef76e84e65ba6c3635012db4f984e59813876,2024-08-01T13:41:51.797000 CVE-2019-11640,0,0,9133ce3a16b9522060b6693ed59f675b95f2994d50a38381635faad19850f1bb,2020-08-24T17:37:01.140000 CVE-2019-11641,0,0,da89c61c32299cbe86158d52ecd080822118d7a32b7df889e2374b4571f64d32,2020-08-24T17:37:01.140000 CVE-2019-11642,0,0,9b43c48dfe3cfd46ff47b3198535617901d718df8ffa4e0f5da266d6774fa671,2020-08-24T17:37:01.140000 @@ -130264,7 +130264,7 @@ CVE-2019-12126,0,0,01a6bac40d8edcf8f0910ce7883b2ce07c8708a07bc8614f2c2131b87b033 CVE-2019-12127,0,0,e88c12731ccf1405adf763f3feb3a143a65121ab279063f94103c66d1ee0dbf5,2020-03-20T15:41:39.317000 CVE-2019-12128,0,0,66434082e5f498aa639b5c8e50efea3a5ad428110fbd04b9dcc5d96422c6b6cf,2020-08-24T17:37:01.140000 CVE-2019-12129,0,0,08efaa65dc1f62cc762f60d34830a94beaf8236c41a435e4934496e58b968ee0,2020-08-24T17:37:01.140000 -CVE-2019-1213,0,0,2adef2ac104b68efe8be68cf11e33c0972c9aef9ebd6b01f4ba2c5fc1ee2c0d2,2024-05-29T17:16:14.080000 +CVE-2019-1213,0,1,b5a2c2cdee9271760500f455de81979b14dac3f982f8b3563144e3695b34bd01,2024-08-01T13:41:53.187000 CVE-2019-12130,0,0,c14af02c20e1e245fe8f191ba2fd96e2d4e8ddc5d9bee9beed3dd6b7d8f8e34c,2020-08-24T17:37:01.140000 CVE-2019-12131,0,0,8756827859c9b716ef4cb2f87203b0c76f30edac79cf12dfaa693369832b4fb1,2020-03-20T13:11:41.273000 CVE-2019-12132,0,0,a14b74953d14dc698931c5ee8c2eed9928a4f07000e0e061f6ac361cb063aeee,2020-03-20T12:25:44.987000 @@ -134283,9 +134283,9 @@ CVE-2019-1661,0,0,314f2fa36c04c8ac0962b1ede00afe9346115e677a50e8c29373c835c8974c CVE-2019-1662,0,0,44b09d7a895ff4b623578020a37512fde6b5d73f8aa818bc1b23359ada4f07bc,2019-10-09T23:47:39.360000 CVE-2019-1663,0,0,3fee4ded5595740322896de3663804181cc6b5f7ceb32f610b6a5fbc0e923d00,2020-10-05T20:27:08.843000 CVE-2019-16638,0,0,8f3e753d12140ef570a71cf2c78798bf325339b26d29cb307775fb953fcf1d97,2024-07-16T18:00:02.110000 -CVE-2019-16639,0,0,3cbf251ff23f676aca75535c4b7c8a44ac3b62ee7fd3793760c2e37e174757d3,2024-07-16T18:00:02.110000 +CVE-2019-16639,0,1,6efaa42804a674fa7d93986a0a6e7a1f37c1904923e332ff339e18def3966ebe,2024-08-01T13:41:47.140000 CVE-2019-1664,0,0,f039a4352907379f67242f2a325b659cc04ef31c36811e9bed4ca6c63d0f631b,2020-10-05T20:21:37.210000 -CVE-2019-16640,0,0,e066a1d07833d5961c8a58eb27cdebf32c60745aa8f181899b9a728193c449e3,2024-07-16T18:00:02.110000 +CVE-2019-16640,0,1,0be7221f1bbfc0ff0758299e3c5437d51d925e67acceabb90125beefe3f738a7,2024-08-01T13:41:47.967000 CVE-2019-16641,0,0,1a92f6c7f167fe7613ae77559370857e285bf235d4f772da4656a05208ec3cb5,2024-07-16T18:00:02.110000 CVE-2019-16642,0,0,6ae26e86962a4b621f40627f9ae2559a7d36e5cccd7be0d19f3f52fe9fb9e81f,2019-09-20T18:14:38.333000 CVE-2019-16643,0,0,53bcc8ba146db39a9fe4dee28a8376236ca1379883c31a383d28fc11c5c45355,2019-09-20T20:03:41.477000 @@ -135208,7 +135208,7 @@ CVE-2019-1762,0,0,3dfc024db74375afdf9a77e3e3d3e77477c0dc637b15bea512092209468fef CVE-2019-17621,0,0,85c741f8f9d3768b4e0bc281bd2ffe8a1855adf9bd3e1544afe4cacd9303ad45,2024-06-27T19:16:32.357000 CVE-2019-17624,0,0,34cab4b9b8d5fd56bfc68f777500f1464c84eadfdadf7fa0aa670b2a02bdf5e3,2020-08-24T17:18:39.590000 CVE-2019-17625,0,0,f99f6d326f4f07f8173685deb9c85452c592dde1d884b81fde79c62991d31705,2019-10-16T22:36:38.803000 -CVE-2019-17626,0,0,d2aa81cde2600dfc256b5d4d18d747ff1f1ad0f938c459c4a76386c31a4f51fb,2024-07-19T14:15:04.930000 +CVE-2019-17626,0,1,68ead9e1ae3b3ed427e469fef099a2a4ef17ae6e10ac9a6d319ae7c51cd49a79,2024-08-01T13:41:48.733000 CVE-2019-17627,0,0,2086a1ffab420c4fd78d53df0f3352f1f205cc73c687051ffb86e903c95610e9,2019-10-18T17:00:37.100000 CVE-2019-17629,0,0,614b65deffa0b7bdceaa98f22d6aa3f8eb8c190d3d454fa4d90cc0a6f0072c6f,2019-10-16T19:11:34.597000 CVE-2019-1763,0,0,b419eaed4c26a3ac25bfa3529a129186a61beb7ca26002e3ca272799a77e5f6a,2020-10-08T19:58:23.100000 @@ -136723,7 +136723,7 @@ CVE-2019-1975,0,0,07a939b381a65ae38c7920f17a1c2920eb19c782c3c9846a962370d15b6688 CVE-2019-19750,0,0,6d810aefe05e2924b202e94ea3b33f6e56245239530b0ad7a6266669ab22c56c,2024-07-03T01:35:46.357000 CVE-2019-19751,0,0,333e2228e5359aa9aa6607b9b93a13db1e1e4a3afd8a27e1b0809b961a7ade91,2024-07-03T01:35:47.590000 CVE-2019-19752,0,0,ca1be8726247421589be653e6b118d85fb80821e3a23f9fa9ad5253805bdcc1d,2024-04-30T19:35:36.960000 -CVE-2019-19753,0,0,0e55808f4640e5891d9e8ceab559b3d230907664fba6e92c50c2e13c019d04d9,2024-04-30T19:35:36.960000 +CVE-2019-19753,0,1,52a2eda005171f44f58b41fc51a75b87a28c32216d9047f516bbb7dcadc26132,2024-08-01T13:41:49.557000 CVE-2019-19754,0,0,cea16ae880519bbe1d98fa9bfa11e9d2b0fb7aed20d6d73373e4fe599034df53,2024-07-03T01:35:48.790000 CVE-2019-19755,0,0,576757e2e80399dccbdae0a683a118ad6db6a7bb95bf0a7d9944e6ac94367178,2024-04-30T19:35:36.960000 CVE-2019-19756,0,0,1ac0bdab62e30eb5ab1a78699b860a548408938df444dc2031b32d44e57bf16c,2021-11-02T19:16:30.403000 @@ -137355,15 +137355,15 @@ CVE-2019-20455,0,0,daf31bba9026c418b4aea3791f020711fbed6d99c9cd896a0c42be955fa8a CVE-2019-20456,0,0,5ffdec9dafee7fd301766358bf501920942dc3a2787a156bca775d7e0de56f68,2020-02-26T15:10:12.293000 CVE-2019-2046,0,0,ad2b3932c8d1e3d30b7050d3687fe386b72bd21c29795965d8e46543b88b60b4,2021-07-21T11:39:23.747000 CVE-2019-20463,0,0,4ff5adb0065b0740b37d188956763d99d2a5544f1d74340b30686c0709a88df2,2024-07-30T01:15:10.510000 -CVE-2019-20464,0,0,f9b0c3f2bbdf0bd4df09f884edfd724b4a9f0cda751b85bbc377a9b8a0f8a808,2024-07-30T01:15:10.627000 +CVE-2019-20464,0,1,cbf249cf6488e4eee761ec744b712531e70e62139008cf34f74f29db6d2926c8,2024-08-01T13:41:54.067000 CVE-2019-20465,0,0,83158f972c198287d63c03423cdc407b3f1ecccb5d05534f06f3b912f7b5b865,2024-07-30T01:15:10.720000 -CVE-2019-20466,0,0,e943f4a2b675ab2bf055a7bada04fede5e6990bc499e2958e31b55e1e38cbb7c,2024-07-30T01:15:10.803000 +CVE-2019-20466,0,1,6241978aad639e96077d2394097e0ff1d681f48a22d0b06be89495f0fee8e276,2024-08-01T13:41:54.913000 CVE-2019-20467,0,0,a262a0da4323f751e5d424d90d285d640c26baf67cd9492208f20dcec2dfc94f,2024-07-30T01:15:10.893000 CVE-2019-20468,0,0,81a3f4066c0e84ff04bb0b3f5d44c494876099fcd7f5f9297dd99b26595d1c66,2024-07-30T01:15:11.007000 CVE-2019-2047,0,0,39d6e243b2ff476db07be9e4ffba0368a9d218b4b325be13c9a06ebb9014f3f9,2021-07-21T11:39:23.747000 -CVE-2019-20470,0,0,b67a12b48ab27a564b27e5dcc03881449244be09bfbe9ce73116e5378e936eb1,2024-07-30T01:15:11.137000 +CVE-2019-20470,0,1,2ad6e14fc14d0d07898b470e5757da49945753375935430bd6841ab8e0d5cf44,2024-08-01T13:41:55.777000 CVE-2019-20471,0,0,f5234f96a91801542f9419959437ee135091c0eda34c90d9e9a8938d445b8a11,2024-07-30T01:15:11.233000 -CVE-2019-20473,0,0,cf407aefea92abc121bb38938c507f0fcc0951b3f07629af1c9e9527da04c979,2024-07-30T01:15:11.313000 +CVE-2019-20473,0,1,e481ac0c66e05ab3e1b4fe31fd83e18f1a11bac975a85144bc7bb11874c7bc9c,2024-08-01T13:41:56.617000 CVE-2019-20474,0,0,57e2b48ce5d539e18ac2d72bce93e92561ab9a40d2accc1b68949e376410c01b,2022-01-01T19:54:56.077000 CVE-2019-20477,0,0,980075eba63e1b6dba87305a73c4446e3d265aa1cc0ce387abc09a4c8d026438,2023-11-07T03:09:10.187000 CVE-2019-20478,0,0,3052bd87150f2625608ec75a4a1b7e4c5ec6e1e0bd8a706a001881a75b7f1f3d,2021-07-21T11:39:23.747000 @@ -138391,7 +138391,7 @@ CVE-2019-2519,0,0,0e9acdb4d549216c68ca810570b0264e762a71355e7ff69ebfc353e8eab0a1 CVE-2019-2520,0,0,59ba4c21fd930851ef6ffbb2330129d4dbfa7416d73fe480e781c4f52ef7210b,2020-08-24T17:37:01.140000 CVE-2019-2521,0,0,557cd7afc62b8b0d5545a61da2b67008378b171f216bd58bad5399af2682286d,2020-08-24T17:37:01.140000 CVE-2019-25210,0,0,296fa2a8d5baa75f2881122562a2ccde5cdc0b65c36302a81e4c115ef70e0c3a,2024-05-17T01:36:44.030000 -CVE-2019-25211,0,0,3551f053251482d7c4eea3a2f2f95512b0513afe16a4257463cbed7289ad3bb9,2024-07-01T12:37:24.220000 +CVE-2019-25211,0,1,469c1561e074b807caf6701e40210358657a37dbe70bde81f85c8d68a4456e96,2024-08-01T13:41:57.540000 CVE-2019-2522,0,0,438e5228ba492857a388b8016b2219394ce3508b8a36f1f8aede8ea3eeec2072,2020-08-24T17:37:01.140000 CVE-2019-2523,0,0,4a0e4915f05e6fa4b1849fafb208e6fb024214d6840b1c8202b1873b064ed383,2020-08-24T17:37:01.140000 CVE-2019-2524,0,0,bee2c79f8df3b71e86ab52db9d5dee51c63979ccd70534be30c64d8fa54a9384,2020-08-24T17:37:01.140000 @@ -141081,8 +141081,8 @@ CVE-2019-6193,0,0,5252032daec5c50053e0084e41e72ddc126830441b5cd9f1bc5d3b51ad6fae CVE-2019-6194,0,0,c68604ccf954a52cb6716566256a77cd3db53ede5f3a06738e8986c8de4ff505,2020-02-21T20:35:11.513000 CVE-2019-6195,0,0,b8ca041cf524a8af2c264b56ac34b349c13f470cc74fcc154488e5c74e7c9b20,2020-03-04T18:26:14.687000 CVE-2019-6196,0,0,4e909cb41ad592ca4f9d4234fb8effc0e79b826acdde1c26c8be3b2a71ed819a,2020-06-22T15:12:23.177000 -CVE-2019-6197,0,0,f68f57a2d8d6cb0d11c2e1a77ad69db1704160cbe4f2907b07d54c45afd8035d,2024-07-31T21:15:12.340000 -CVE-2019-6198,0,0,32c83511dfd9e03f67239a120f1af0753694536a37ad4de1002edb6f62b89772,2024-07-31T21:15:12.557000 +CVE-2019-6197,0,1,cdd719eaa28dafd1d2235daedf4c93ca982671d1445e53a47338975938fdcb1b,2024-08-01T12:42:36.933000 +CVE-2019-6198,0,1,8ad20c54d4d9ecfe49c3587388e29cad44474ff7508270580465499daa3fffad,2024-08-01T12:42:36.933000 CVE-2019-6200,0,0,dc5aae0492d24fa91b4536b3552981c383b9d63f882441062844dbbfff411875,2019-03-06T13:28:02.637000 CVE-2019-6201,0,0,6886bf3befefe8be6891d8a439f88c625009f9073fcc0b27ce550b3121034599,2020-08-24T17:37:01.140000 CVE-2019-6202,0,0,657c4129d3c19fe26b6472cba4a044c11a1227aa706b62bc264b8678126b92c7,2019-03-06T14:10:11.387000 @@ -141147,7 +141147,7 @@ CVE-2019-6264,0,0,fc8ea904db4f10f3988d04090ffcd1e6a6f2c7e82395cdbc8e648fea5b3209 CVE-2019-6265,0,0,b95253275a0c506e65ddb9acefc838a4cb60e079f950e399680483a2f206c0e9,2020-08-24T17:37:01.140000 CVE-2019-6266,0,0,603d3ddd8c972f170d70f6db66e8a2d371cdb18deebcaad6adad7d4854d6c96b,2019-02-28T20:03:03.007000 CVE-2019-6267,0,0,f554ab889be2c93c1fb4ba9dd83ffedc4fb154c0cda08aae442ff3650e27e529,2019-01-17T14:50:04.787000 -CVE-2019-6268,0,0,41064d84772da5000471a0a8cc673620eadf3177d2f7da8b6fcf1192419bd09f,2024-03-08T14:02:57.420000 +CVE-2019-6268,0,1,d262ff5f1d4880699fc38a807b42f0b64808433a5da38f7932d823c6faab1bd0,2024-08-01T13:41:57.803000 CVE-2019-6272,0,0,479ad0b4fa9099d0361b716df8cf2a0fbaecd8db0048e119e1cb92e4ac8c92a6,2019-03-25T17:14:10.683000 CVE-2019-6273,0,0,79e44d4280b1484bf57a808cf8457229111853c111301c6f5ef5911486a0f59a,2020-08-24T17:37:01.140000 CVE-2019-6274,0,0,90777c75b9c824ecc8fa35016aeb41a8f64d4ff32bff0ecebadbea90d128341c,2019-03-25T17:49:12.990000 @@ -144116,7 +144116,7 @@ CVE-2020-0018,0,0,389795bc00107856e18e2c791b130fd0eab617ab2b14b0d249842d62a3e6f2 CVE-2020-0019,0,0,0376ac7ed0e6f7184ff6d9e84eaa31d078df246af38ca95849264e651eebebbc,2021-07-21T11:39:23.747000 CVE-2020-0020,0,0,d2cc0239eddfcdb927c74f59222ff4ec9ea6a772660d5eb44396432602954adc,2020-02-18T15:54:26.990000 CVE-2020-0021,0,0,d8ff7592b4f81ada2aaf961e65a6e4f1ecbde0ad7197219af192929cbefc6034,2020-02-18T13:17:39.637000 -CVE-2020-0022,0,0,fbddc10cec0ecc0ad1b36f6f0bb9add797e8d175bb227661c85617ffacf1cd2b,2024-02-02T13:50:38.707000 +CVE-2020-0022,0,1,a3b68a00f8013df6a7fd152454075419f67baea28eff3f122fa61b6a6d1efc7c,2024-08-01T13:41:58.593000 CVE-2020-0023,0,0,a5aa668c1de079cad60e541f9769474f499818a17026bb83f2a2156d13a38615,2021-07-21T11:39:23.747000 CVE-2020-0024,0,0,1756c469064419216153aad674dd235a75ef2065c93b1d79dddfa75b81ecd469,2020-05-18T19:01:41.357000 CVE-2020-0025,0,0,dc8ffbe7bbd60f250b9a241dba95655f486942b996a9f8f5b84278917afd055a,2021-07-21T11:39:23.747000 @@ -146847,7 +146847,7 @@ CVE-2020-11873,0,0,e10983d298bf26905074b1376b18a6fb2ce4022b07cf08545dbe48946e79f CVE-2020-11874,0,0,0931ef4396a06329f5ba74f0e8267108893efb97db1286140d42ed1950fffbf8,2020-04-24T14:33:38.877000 CVE-2020-11875,0,0,5e40e52a4ae4fe29ca1dba607728501933ad63ad90bd460d30945d89983ea9df,2022-10-05T16:54:28.790000 CVE-2020-11876,0,0,dc8638b13cdde6b23736ccc1a119415afa07ed7852fafc98a53b970c0c8fa83a,2024-07-03T01:36:13.627000 -CVE-2020-11877,0,0,5bb1ddc82b64bf35bfe43f2701f57452f8e242ac849030a12f128b8ce3813d0b,2024-07-18T20:15:03.123000 +CVE-2020-11877,0,1,2eace65ccdc7a31f89dedf40da4920159e5d0653514a3e1ec8474223941258c7,2024-08-01T13:41:59.700000 CVE-2020-11878,0,0,4940f59e556727a9709624aadff1d766eb7c8db1e5f5ce637e529f3382cf11b5,2020-04-29T19:10:17.993000 CVE-2020-11879,0,0,9fdda09471501dd9f6cf37b91cdabb1a3e94324aea5fc9d6daf4c76c282d3180,2020-09-04T15:00:27.887000 CVE-2020-1188,0,0,94f2c52c88f3cff3ef6fc71cc95501d5c325ea0a16834ebe3a86a28be8a1da24,2021-07-21T11:39:23.747000 @@ -146887,13 +146887,13 @@ CVE-2020-11911,0,0,2694f5a615ee60b9477b3869ddf2f87a1351b318670f8c4fbb8000a6149fc CVE-2020-11912,0,0,001e952128c7bcc5ba8822eabe19435f44973ff2e6be3c376a4d89e35db556b7,2020-07-22T01:15:19.883000 CVE-2020-11913,0,0,73d1dbbcdd4d68945063c1a13a98c4f4419a183d9171be039ef71d68a5285663,2020-07-22T01:15:19.977000 CVE-2020-11914,0,0,933895f61d4cd343cf6df7a50e21b2954b2ca93a6c3c96497c9a184889a05019,2020-07-22T01:15:20.070000 -CVE-2020-11915,0,0,ebc65921da618f05ae9d6adf586d810a480e9ed4e387f58de01a0de89c4391ca,2024-07-30T01:15:11.393000 +CVE-2020-11915,0,1,7d89f75419f7463d1384054a54ad59fa6d293cc882195a4b2b681bf21b80d80a,2024-08-01T13:42:00.520000 CVE-2020-1192,0,0,2da57e2a62a232a210f5ef6c2cdc72a098f145c18d45a7b4e5ff9c45ae3505e5,2021-12-01T14:19:18.020000 CVE-2020-11920,0,0,63941de7aa14c11714aee7d8036115dfa77ff108df5dc59cf94071d6615c5125,2024-07-30T01:15:11.510000 CVE-2020-11922,0,0,374a3245dac4cc2e16375466fda67c18e505c6a102baaec58ee711677b960103,2024-07-30T01:15:11.600000 CVE-2020-11923,0,0,fb3be716d0f908996ee76f0715683ffb65fd813fd0fec133d8eaadb72ba1c5ae,2024-07-30T01:15:11.690000 CVE-2020-11924,0,0,939327d07f44134100d79060d056bb5981da70e775752f8252fc18e6ee82797b,2024-07-30T01:15:11.780000 -CVE-2020-11925,0,0,f8c4c19e2a91b04ba406ddb196dc77ed80f37ac037de372910ae58d30ccf95c7,2024-07-30T01:15:11.857000 +CVE-2020-11925,0,1,f96a2c1cbb5e00ad3d2d97dfbd0b5b50d52d2501ad45fb0d9de2e2d77ad70e95,2024-08-01T13:42:01.480000 CVE-2020-11928,0,0,90cf3cf1b6e5c940d77ccfaf8a7f457eaa98ed971d149e26bd55d0344c85db00,2023-08-07T18:11:24.533000 CVE-2020-1193,0,0,21c495b68407af19663b0ccb52795639d4811c35526449d985ec528699966a5d,2023-12-31T22:15:59.130000 CVE-2020-11930,0,0,cd761d767cbaaa15ae2c7cec98390a36e7af4474ac6d23c3ad040c28e6c39903,2020-05-19T14:15:10.893000 @@ -147479,7 +147479,7 @@ CVE-2020-12608,0,0,38402cda65bd20adaafaf8fa56a3912a5168f9abd0f091a07708c042a17d4 CVE-2020-1261,0,0,facd24f80876f2ac6682cd4ffcda5908f697f57ca36f3a6dbb2ed3896e794500,2021-07-21T11:39:23.747000 CVE-2020-12612,0,0,27c013661b38b08d73a9ed802a24540f4841a815e7c5477dd782dabe8437df9c,2023-12-15T16:24:27.337000 CVE-2020-12613,0,0,c95356c17bc093130235aa64aae86584b7d9b965bf99a8b709408a2aaf3f050c,2023-12-14T16:37:11.820000 -CVE-2020-12614,0,0,8391ad3d0c4044c8593852d7d817af171b093c7a71cab731f180614c70e56b13,2023-12-14T20:24:55.927000 +CVE-2020-12614,0,1,847dc8f32da2d3c78a4e8ef365590ce7648ef554d7da2f4e7aa6d04370642371,2024-08-01T13:42:02.280000 CVE-2020-12615,0,0,36d741a8300c40d0907640fbe1b56e3d7d47937811858f27d7bb5e898c668199,2023-12-15T16:04:51.323000 CVE-2020-12618,0,0,6597e2bb9a8de14b97fe7ce944c521c20b776df974886bc6ada82eff63e8acda,2021-07-21T11:39:23.747000 CVE-2020-12619,0,0,ee598b4bf1d4265af77d330472cf7b83e088560073a1c2a3d5a6cf8d6eb12600,2021-07-21T11:39:23.747000 @@ -148723,7 +148723,7 @@ CVE-2020-13923,0,0,65e19af9fa394b0d83887d5f23dd2daa1c2894538f4d16389200e40ebbfeb CVE-2020-13924,0,0,f8d691e70a03fbbb2fa21ed665d0d66b819ad0a9e6f07b7305661b1e1f358e9a,2021-03-23T12:34:28.723000 CVE-2020-13925,0,0,a43d0dc13f59d30ab572e730e46ffd2a6ba29c0a476126a587dfb7e577fe640c,2023-11-07T03:17:00.150000 CVE-2020-13926,0,0,36b2665746368f5923f22f1f76d6998b05d582ef1b674d82ccfdcc73a2b25c99,2023-11-07T03:17:00.207000 -CVE-2020-13927,0,0,73c57432f67c00ab06d0a6d1f6908fd2502792f5704c7e5aaa3471868614a65c,2024-02-14T17:16:32.187000 +CVE-2020-13927,0,1,d8598f0b5e6b61da61f04cd256bbbdb1d9b6f49fbf0e0ba59ccf784e8a28f4e9,2024-08-01T13:42:03.150000 CVE-2020-13928,0,0,63352051c49706d46141615f9b2b7c5d234f478c0df736d07e8cf5983fad5b54,2020-09-23T16:53:34.597000 CVE-2020-13929,0,0,4de03d8407da55b3ace309502313d8c6a5d60120aa555c299f747a515910fe7e,2023-11-24T14:15:07.847000 CVE-2020-1393,0,0,d2242a7ff4ba7e3f1730955b7cbf45453f16906bb13bc62daa91d72d7b2b899c,2021-07-21T11:39:23.747000 @@ -148792,7 +148792,7 @@ CVE-2020-13994,0,0,9365a07b4065d56e008b761a79fa3b31a3826c490fd432117675895e0d743 CVE-2020-13995,0,0,2ab02764e269f0ce3f834ebecd1b6f3f84897303fe3a3b28c501aa4c66d21197,2022-05-03T16:04:40.443000 CVE-2020-13996,0,0,b3f838a42c12db2ddf10b62ba88e0f31cb171dd4a6512056bcf78a55e76e2d8d,2020-06-15T12:24:47.680000 CVE-2020-13997,0,0,fd062f7ee483995505cd7b26a255b60c07475ce165b8b05eede1ab9ca098e142,2021-07-21T11:39:23.747000 -CVE-2020-13998,0,0,229d6cab6dca77eefa0d4ce330d402683a0edd09c0b7a4534f6bb10a29053ecc,2024-07-23T18:15:05.300000 +CVE-2020-13998,0,1,581f4d3f5c77e4695e255f2672ae28120e3da0f50a66a3c11395e306edfdbc1c,2024-08-01T13:42:03.950000 CVE-2020-13999,0,0,dbc8060cd87c61ffa1bf3947372fa57b2b92bdc9462aa8e619702796457969f8,2023-11-07T03:17:05 CVE-2020-1400,0,0,f1e2dae70f75ac20510ba4c9c9418f01919cce4840be5c1acd65d1b74a18a742,2022-04-27T15:35:04.913000 CVE-2020-14000,0,0,c97c41daab3807ecae5924cb16ae971a0a7cb9818f9c4b72f6a788ef887d237e,2020-07-24T15:02:50.647000 @@ -149628,7 +149628,7 @@ CVE-2020-14868,0,0,e32e49e6a4797649db505dea650e3d41393c7c12c8a24dd5d640d697eae88 CVE-2020-14869,0,0,b61fee0305a8115ef801c13a9e9f8d63161e9032224748f3e60d4c45603dd736,2022-07-01T16:26:00.560000 CVE-2020-1487,0,0,8f091dc99f3abb111f2350158fd03e5c20ad678fcc0db94912abb45a9fed4659,2024-01-19T00:15:12.413000 CVE-2020-14870,0,0,34e96ef127c4af0f0e56e6d73aed814b8df5b16ce3fe93506e4eb456eb72629d,2022-01-04T17:54:00.973000 -CVE-2020-14871,0,0,1094fd0e834cb6e90ff4b2f27d7473a2f1f9eeb718445370469f633457d28400,2024-07-03T09:15:03.037000 +CVE-2020-14871,0,1,ee8399bb1c78c5d1c8bcdf235471678604ceb7486325bace9fd573d78ce13783,2024-08-01T13:42:04.750000 CVE-2020-14872,0,0,b623fece75c6402e36c4fd241a4a5eb317c7200091e113471a7026887516cece,2021-02-22T19:39:47.027000 CVE-2020-14873,0,0,69abd85f589bad690cb36a992d97f2827b6810ee28b2f30d0e06a08ed082d96e,2022-01-04T17:55:11.033000 CVE-2020-14874,0,0,b23c124d9d0ff1b523cf3779ec2852b91f78f7b367755a83c0bdc222ae13dba5,2021-05-10T12:15:07.477000 @@ -153826,7 +153826,7 @@ CVE-2020-24075,0,0,a4e1c0929a794592036d4f4f55f2018c473c4420020ce6d38d3ff859bb8f2 CVE-2020-24085,0,0,36dc9ecfad21733adba79f670b8a0c7f72d1bc23a9ed5c08a1249114aa915aee,2021-01-30T01:52:56.210000 CVE-2020-24088,0,0,5daaaa8199391d28694f1b5e660719fee34f66a68451cf84904db2a0d6ae742c,2023-09-13T15:03:46.090000 CVE-2020-24089,0,0,7427b5dec3e8323e3589b26611c1fbfcb9d33a565a9c245ef2e62d02a728a986,2023-09-21T13:21:26.303000 -CVE-2020-24102,0,0,4dc99be1c23b766b4f26e96f2c2ddde1049e7b757649b21d1f80b9b3d114d1f3,2024-07-24T12:55:13.223000 +CVE-2020-24102,0,1,d3877bead379765bc8bffb763a2d8dd99333c47ae5cb0b72e7c15b6d60e1c603,2024-08-01T13:42:06.163000 CVE-2020-24104,0,0,fbb4efcf58d1f727ffff0ae67b74aa346d7d8b26414283515bb2ec728cd84fb4,2020-08-31T16:29:12.210000 CVE-2020-24113,0,0,a33d0a4b1ae816dfcdb9871437627d7bc94b10a4e745b33597c039104d4ac8f1,2023-08-28T20:09:43.660000 CVE-2020-24115,0,0,30853f4c52f41b9976ea7ab90988e1af4c04baad5d97a60bd069017a25a9ac4b,2023-11-07T03:19:50.900000 @@ -156133,7 +156133,7 @@ CVE-2020-27464,0,0,8b82bbef074bb6a9f8590399bf324a4ec22df2b86eb60380bb88db6ff8217 CVE-2020-27466,0,0,f68f7b90e3bc1b6f35aea94e4a865ee5d9dc9ca7715a0ff9e4d7f527f4a6e88f,2021-08-24T15:15:33.280000 CVE-2020-27467,0,0,f65ea2007f3db33028902dbeea2fb28dcd47c6a4814e562c9bcb584cab7d3c29,2022-03-02T18:58:07.053000 CVE-2020-2747,0,0,6fdffec257eb0bd3ab51d56d07b99ab030a70c13737b908f2dec6da081da247b,2020-04-15T18:35:17.767000 -CVE-2020-27478,0,0,b3c6c7676af0d53e07403d08a12756716062509a789f34bc109c562eedc266c8,2024-04-30T19:35:36.960000 +CVE-2020-27478,0,1,42612e0b24f23be078e5584a7dfc9ea0fe852632b9f427062b2ebe965dd7d82f,2024-08-01T13:42:07.060000 CVE-2020-2748,0,0,f6364b507519021c4a2416d68290f420fbdf3789991a3b58994b64d25d0530d5,2021-02-25T15:06:43.823000 CVE-2020-27481,0,0,6ae80d9c815dfecfdd47b6c36d1dcb1f57178aa294e387ea81aa2785aa169416,2020-11-23T17:14:49.733000 CVE-2020-27483,0,0,e24f2381cf420e4ab54a50a535d7b1f96838452743cbdcf7c709a31f669b95ff,2020-12-02T14:55:09.437000 @@ -162922,7 +162922,7 @@ CVE-2020-8001,0,0,2f81ed2e8c3ebe6b44b6e1b7a24510e2ecdc71d702eff90f58c17ef670cfa7 CVE-2020-8002,0,0,a91f0434cddb4a98fb4b157d93b911300a82950d62d6dfb655c491548ddcaa96,2023-02-03T18:42:23.660000 CVE-2020-8003,0,0,f090a2390163bfb8cbf156c5ba35165f89bd076c852d7ad3c02826a3cf7fb3cc,2023-02-03T18:42:42.553000 CVE-2020-8004,0,0,381e8d4dacedc9224586be39b95f78e79a7c14c58d212bb1706c58ee47dccbad,2021-07-21T11:39:23.747000 -CVE-2020-8006,0,0,d290fcea7788a50884feaf9611eba9cf976c1d6acc52e491dbed216da292584d,2024-04-12T12:43:46.210000 +CVE-2020-8006,0,1,93c0def1621a4b5b1fae44c6fecfcc5fd39b1256affda504129c371d42f116bb,2024-08-01T13:42:08.263000 CVE-2020-8009,0,0,d4b2a4dd2aaca1b98a42d3ed7d270681249c680247677ca5f1dcc471e7b7b9f2,2020-02-06T19:37:44.430000 CVE-2020-8010,0,0,8e2d2265f28be0ae5012acc592cba5c99763e73cc7c993d6837c801cbcfa38c2,2022-04-29T15:57:59.317000 CVE-2020-8011,0,0,5ddd34a10fa7e2d1e6960449d7ded481d69a3531e7edb067929d5377473c3936,2021-12-30T21:49:34.493000 @@ -168485,7 +168485,7 @@ CVE-2021-22277,0,0,776d6f8150721bd18d2b409f73ef40c499dedcf1dc488b72788123cc7b66f CVE-2021-22278,0,0,b6b4676fdc534af7a815f2b58cbb9b189a8ab20b5d8cdf1495d551e351de9b79,2023-05-16T20:56:48.347000 CVE-2021-22279,0,0,85b89da653e3f8c767ae08bbf569ea9199f47b76bd4f810fccd17d6c015da101,2021-12-17T01:41:46.123000 CVE-2021-2228,0,0,157b1d2b83a6a996dec5fbd5e6829fff359b2894d0e8e71acbf782ab5bc6d90a,2021-04-28T18:29:27.327000 -CVE-2021-22280,0,0,fb38145b5cbc6f8829897b35dd157b6d64f0f775b5a31f8e49d6faec3a4a67cf,2024-05-27T08:15:08.687000 +CVE-2021-22280,0,1,a925569493cf644fa2d7a9ea899d16f63f61ed30c5db99da8baab106e820ba4d,2024-08-01T13:42:09.047000 CVE-2021-22281,0,0,ac5c52c8d399f84d42a73cf694adcff3405b749fde9603032f6ef7be57cb9021,2024-02-10T01:03:31.623000 CVE-2021-22282,0,0,55c9e3cd6e7084c3bfe697ffff4a3128855690780b3ac6059faeeaad2ea56641,2024-02-10T04:04:59.457000 CVE-2021-22283,0,0,f415eba2213ca8a559fe9fe3f109a8cb5395306a4b7222382ad25a3c4b667275,2023-11-07T03:30:11.330000 @@ -173319,7 +173319,7 @@ CVE-2021-28658,0,0,10240e8932be071f64b4d7ceed1e91e7f062e6003dbac0fc4e86da8e120c1 CVE-2021-28660,0,0,37dd1ac15f6bfc5905c8cee7cb65edb18da857d6aac9dd47852bf8d4c8fd5627,2023-11-09T14:44:33.733000 CVE-2021-28661,0,0,305c2bbe1579faf986356b3383f915c0a456f3474023c19856e9b6f20a6beaf4,2021-10-15T01:53:15 CVE-2021-28662,0,0,cea384b692d24de8092d9d160858a16e48ac42a91a4bc999dd6627163feb91ca,2023-11-07T03:32:18.137000 -CVE-2021-28663,0,0,3111805e33df7854c014956f0c15854d9547c855507a13752f4e3e6d545b5ef0,2024-07-25T17:33:47.580000 +CVE-2021-28663,0,1,d0a55f6399ee222a11872b9fb2da3cd962293fae06903070c65377b8e89709fb,2024-08-01T13:42:10.330000 CVE-2021-28664,0,0,e5bcccc2bd506ab6b3600c389c3b4f5b03283589ad0db7b7f46fc6378cf228db,2024-07-25T17:59:50.377000 CVE-2021-28665,0,0,3bd907d3d23a03b2b014d35e71d71cd61a30be665ae5c6583c4556d40847301f,2022-07-12T17:42:04.277000 CVE-2021-28667,0,0,055fa8c06183fc89d048f9424e212a5e038d60254dfafa0d7be08895557719a4,2021-03-25T13:44:17.310000 @@ -173529,7 +173529,7 @@ CVE-2021-29046,0,0,4d027d55f38ce33f07d72ab2e57147f1e135a60693a83b26db46689625616 CVE-2021-29047,0,0,e85d49e89d2a1c718e391032634129fb28a6eb74d28e9c8c25f15e47b5fc9572,2021-05-24T20:45:15.090000 CVE-2021-29048,0,0,8b02c537230905e5a5279d049bad6ced38c6bb7657811e7d97862994d9ca12ca,2021-05-25T13:07:55.393000 CVE-2021-29049,0,0,44ab0cc2c42e7598267afd00ad226e8c02eb8eca39b14b78e473b593b0aa8833,2021-06-16T01:08:12.773000 -CVE-2021-29050,0,0,d518e52fa679c414ac648b3a811aa6873e3c4e0152ea0a6b557cd6b44dab50ae,2024-02-22T19:07:37.840000 +CVE-2021-29050,0,1,194d3594981edd04ebe9ab56596d33be800107df498f967005540628423b572b,2024-08-01T13:42:11.167000 CVE-2021-29051,0,0,4e31c1873e7a11a860679eb30651511461543e6efe161ded9d4a0e7119ec4faf,2021-05-25T13:28:52.407000 CVE-2021-29052,0,0,e8ebc3607d26718f71fae157a1bb14ff91fc1edf5d1819ca4aea684e39f015c6,2021-05-25T18:22:30.973000 CVE-2021-29053,0,0,c9cb13d245cedae24473eab707c268bd947e6d24337ebe4fb208a5cc371aa378,2021-05-24T20:58:07.147000 @@ -175205,7 +175205,7 @@ CVE-2021-31152,0,0,f7627c706e97342a85afe7bdeb0de17c81c5a52a2f9a9ccb8bb994a4ba030 CVE-2021-31153,0,0,bde1210b8ef68229aa9b4e0f11274c61ec7e0d47da57d61a8bdd70305179854a,2022-07-12T17:42:04.277000 CVE-2021-31154,0,0,877a81f41e5aa8667db6fd9812bee138a333f6cec698370069fdde5b920267cd,2022-07-12T17:42:04.277000 CVE-2021-31155,0,0,5356b38cfe829c1368528097168c32d666ce9f541de4b82bb97403320e28e77a,2022-07-12T17:42:04.277000 -CVE-2021-31156,0,0,f20b5d7a26912a3f1021a5de7a34bb98ba08af8b09763dbd89aae21f5ac820fe,2024-03-29T12:45:02.937000 +CVE-2021-31156,0,1,0ebb9632633ee77433c36a1d745c5bd7793f004e92c79d3bc85cda02ef409a40,2024-08-01T13:42:11.953000 CVE-2021-31158,0,0,68825642fbd18ba28de99732876f19d3f5b721332505d7fc1356b5920693ebcd,2021-05-25T18:58:43.340000 CVE-2021-31159,0,0,b35cb7c0893c6d5c07a8fc8d6b7b95d1d17101edf428d7681be383e71ff4f1c5,2021-07-09T12:49:54.783000 CVE-2021-3116,0,0,d705b43adb1623e8f44ad1ea951b0d6d8bf7cb4ace5f61461f41e5093ec9151a,2024-02-15T21:40:16.967000 @@ -175693,7 +175693,7 @@ CVE-2021-31816,0,0,5eeabcb9b56307bcec818ef51ad63bcc19530532ac42c067ce11eac2b9646 CVE-2021-31817,0,0,7b2391399fdccf5521dcd15b2dd2d2416743cb7675990ddebc8bd2e63140a131,2023-11-07T03:35:00.780000 CVE-2021-31818,0,0,8659aa7aba6bd3e3dbdf7f4fbca7c54d6b6ea410f7f5543973d85c08f47671e3,2023-11-07T03:35:00.873000 CVE-2021-31819,0,0,e01280334fe5b6ab814bcf41dc4bec754002006067c448512f85094c5308bd16,2023-11-07T03:35:00.943000 -CVE-2021-3182,0,0,2ff051d9ef1610ad1f6121608f4fa99c9bcdffade1cfc0a14985d9337d58aa90,2024-07-26T21:15:11.627000 +CVE-2021-3182,0,1,1fa7545ddb1a4e1c88cab2d579f11ce8e101b3c66e04f56adce3dc8c63e5d684,2024-08-01T13:42:19.390000 CVE-2021-31820,0,0,78a5bee7b74705a39e19370a260be2cf2fcbcdd3ffd91e3881697d5083d6d769,2023-11-07T03:35:01.003000 CVE-2021-31821,0,0,33ce61c0b91c0f789442d5cadb2c8b13f1054bc183e18ecb076063a9469da8dc,2022-01-26T03:06:05.543000 CVE-2021-31822,0,0,89d8e16c4b2b8298cc7f98972229f62525d0b468937cdd566b2a172246d4d83a,2023-11-07T03:35:01.083000 @@ -176613,7 +176613,7 @@ CVE-2021-33022,0,0,12387620eb30ab39a033a98a69d8adf5e0c7f3aa2f0730cdba76bdbda3df0 CVE-2021-33023,0,0,84957ca62689d40114d714b0c9d1a223287a39086e70ca61881201e2684877ed,2021-10-20T22:16:01.683000 CVE-2021-33024,0,0,b6524dbe4a1cd7bf93fdbf13b8840b0b97d76ac7145f02c41a784cf3ed6c1b59,2022-04-08T20:44:38.887000 CVE-2021-33025,0,0,21fd0dace77928df316063f32312d1acf81d9ac5df72b0121053b1830e1c6991,2022-05-25T14:42:57.127000 -CVE-2021-33026,0,0,e1c89680bcc6e7153f0139150f21f658e25d33aa5318f35ddeb9f649599b096c,2024-07-19T19:15:05.890000 +CVE-2021-33026,0,1,03fdb38bc58dda5b490d173aeaf25b3cfd3aad59de127bd855cbcb17837acd2d,2024-08-01T13:42:13.313000 CVE-2021-33027,0,0,0801bc34fc460d7a6d4506776bdc66ae449fd654eec6748996397180c19cdd01,2021-07-28T19:39:16.430000 CVE-2021-33031,0,0,510b4ee13ad9642728234f837e85ce4e18a9e35b7795bd363872b93ef9b01a8e,2021-06-22T18:29:56.030000 CVE-2021-33032,0,0,3d7de3fb5f01a40c864db1d961772ba77a2ef2eb768b56aa55c2492a69cdfeee,2021-09-21T16:18:17.080000 @@ -177331,7 +177331,7 @@ CVE-2021-33981,0,0,cab1c277a0ed5c168f764a99cffa691d551b4f0d95a06393cdaafd0cdbf74 CVE-2021-33982,0,0,0fd9f6091bb790244f86f71fde2b876e5dc644f476d51026545c4bfc9e745397,2021-09-15T00:15:12.243000 CVE-2021-33983,0,0,f364c385b2a939c68012f5340da55dd0188b3cd2fb7ad3f28303ac4cf7273add,2023-03-01T14:35:35.453000 CVE-2021-33988,0,0,496657c8983f44bfb7892d0c040c974b38d9be6baa22646f4b3254d7adb633cf,2021-10-20T22:13:35.920000 -CVE-2021-33990,0,0,6d4c5318e06d3c84a9619f9894ba1fabaf474dfaeba9177e947c3cf866d1880a,2024-07-12T16:15:02.600000 +CVE-2021-33990,0,1,566369b4ad4b1fe8ef7c5e4d403bb8c88882d16fd43ed49241dcdbe494bdf3f3,2024-08-01T13:42:14.200000 CVE-2021-3401,0,0,9b9759171902da6a83b79d8a1d5adbfbb4de1c91834a8f97f03d6feb0eae5c45,2022-06-28T14:11:45.273000 CVE-2021-3402,0,0,dcced8e46942434874ad1fb312e0f8fc9307677edc30037bf2e26a7066ae2df9,2023-11-07T03:37:58.917000 CVE-2021-3403,0,0,2d086700c0c9b4a4a58845389d97573b27cc1632371bfd969865def03ca057c3,2022-04-25T20:17:58.637000 @@ -177344,7 +177344,7 @@ CVE-2021-34066,0,0,5126193e9c71443b4a22f0935088fa7ee82f64eda0c2e1df14adc32887a0c CVE-2021-34067,0,0,5a0a61b0c0d0fc042b1c83eea1073d85b4330e36961e3ff3b94e800d392c3b4b,2021-06-28T19:28:44.813000 CVE-2021-34068,0,0,e8d6b8018740e03c17e69dafb24f61ac0f7df5e531dcd9c94ca32e3517286dc9,2021-06-28T19:29:26.300000 CVE-2021-34069,0,0,e7ad0b523697bec4aab65c5ddce8d4c5ab89991372a77313f0b10b216b14192d,2021-06-28T19:31:38.967000 -CVE-2021-3407,0,0,9ec547d9916a8df0fd80f06512c6626cd94433c9980bd1ba6593fcd09b446511,2024-07-17T22:15:03.267000 +CVE-2021-3407,0,1,2d6ecac3d382bb92a8086bdd3c062ea61b9c726a56d47fc808fe637f0186673c,2024-08-01T13:42:20.183000 CVE-2021-34070,0,0,104b59404eff79ab9d17bb47922cec730764feabe226adb513d4f02b90a5274d,2021-06-28T19:47:06.480000 CVE-2021-34071,0,0,1d01218a96968960fb6b41dc5ea96329b5d0429e0dfec032a981cd29856b82f2,2021-06-28T19:28:22.080000 CVE-2021-34073,0,0,6673cbd9119103710430438dc8240a1499ffc7e7ed800b0a61b4e18eb60755fc,2022-02-02T18:57:52.867000 @@ -178297,7 +178297,7 @@ CVE-2021-3517,0,0,a1d962dfb005b2e5b98c5af02df290ef64262857839ca532498beca7ccdbdd CVE-2021-3518,0,0,a76e97de17ac8f24c61961e5a7d8254226f8468d4aec699c6b57a015dd8e1e0a,2023-11-07T03:38:04.050000 CVE-2021-3519,0,0,10977120fb7b4b66273cf50940e4d6bd76a1a997aa363c6e358c8486afb107c4,2021-11-19T22:04:31.987000 CVE-2021-35193,0,0,a162afbc7a5171c627141e195f850061f3e08439984b46f73143e95bd5312c58,2021-08-11T15:25:11.357000 -CVE-2021-35196,0,0,51115fe02c24dd9aa5f1b59d96aabf0d1c32122a5416e1f669f2347c49a27313,2024-07-19T19:15:06.043000 +CVE-2021-35196,0,1,f271dc813783f778a56ea0a18e9a06f1a0c0fc62355c420d610556da3e3f3f27,2024-08-01T13:42:15.173000 CVE-2021-35197,0,0,22e8eda6d6da7bd81b1e3317fa4ee52603241e7efeefe5b25be85876bc1a8b43,2023-11-07T03:36:30.150000 CVE-2021-35198,0,0,cc19841f95cab4d85eab6ca777ade77a70d4e0471df59e5b70b5b81f5d971646,2021-10-04T17:33:36.207000 CVE-2021-35199,0,0,8e943a274ef674f856afd4581cd12225bc3ccb44bd8eaac54942c11c734cb67b,2021-10-04T17:34:23.810000 @@ -179771,7 +179771,7 @@ CVE-2021-37378,0,0,f82f2dfc647619a71e9ca86c6c1739371820e84cb80164191e16ac0228c1e CVE-2021-37379,0,0,71574910208e22549b01e9bcd2dc0f178a9b7c68c87453e3521fc4e206417291,2024-06-04T19:17:06.083000 CVE-2021-3738,0,0,3229d21a2eb86b533022aa4f9c03af5757d6539e525c3f9e249d641572b52ec7,2023-09-17T09:15:09.923000 CVE-2021-37381,0,0,36e2309ba57bcf2bcc20e949d5a071968af133f14de6abf89cbee645b90a97c7,2021-08-13T18:42:59.763000 -CVE-2021-37384,0,0,7568aed608b9f4dcc74cb22c017744211af7bbdc94b828a3e22382a25aa851a0,2024-05-16T22:15:08.467000 +CVE-2021-37384,0,1,f2844aafad4d02136d8e2525e7ff6772cff4e1f2006c1b87ee431deb96d5aa0d,2024-08-01T13:42:16.360000 CVE-2021-37386,0,0,a5209aa4598c00111794e1f76b8fa3b7cdd4f9d185132ee00c3a483312ef4893,2023-08-22T22:15:08.200000 CVE-2021-37388,0,0,25d4d35859a9e89f020cbd148383f838a4632bb2dc268d112a6b3789166e4144,2021-08-13T18:00:58.260000 CVE-2021-37389,0,0,b931c76f236e74f85f1bc82b87aea3e5d7a9564f5b8d1de5964d41447d325847,2021-08-17T15:34:02.817000 @@ -180741,7 +180741,7 @@ CVE-2021-3861,0,0,d96c927b4ce8a2c2584938d898f7247493a7a11b1c9168a50ee73528787262 CVE-2021-38611,0,0,facd38ca235b5190c149ab951e02227e8e39012fb5f93c6ec8be351d9b2836f4,2021-08-31T11:30:40.837000 CVE-2021-38612,0,0,291d09919a2d4e076f51c41552434ace4e345360004390eba05af900524cf7d3,2021-08-31T11:31:18.017000 CVE-2021-38613,0,0,15f7f15d144dc659400000a596d12b65d4001066898169998efb6fa4be89003e,2021-10-05T15:38:00.637000 -CVE-2021-38614,0,0,3c6cdc8aaf419aa0dd08384359d72862e67f3a9da2f1567cbda6404d54ccd61b,2024-07-19T18:15:04.450000 +CVE-2021-38614,0,1,45de418c672ecd3081db584322f7dfdc08169609c1a43981c0df5fe8829c5709,2024-08-01T13:42:17.363000 CVE-2021-38615,0,0,05c8f60751f80d9360d4c188fdf5dcc5bc0216124ec7f5af113d9d463264c0eb,2022-07-12T17:42:04.277000 CVE-2021-38616,0,0,cdd69265ff2e527ac9e39b2cad636e30599eb5d07c5ec90c1463a359fc40ab09,2022-07-12T17:42:04.277000 CVE-2021-38617,0,0,505127447e69a7d6e20623bf518d01e3a284c60816be7323a42675dd8361e6fe,2022-07-12T17:42:04.277000 @@ -181486,7 +181486,7 @@ CVE-2021-39602,0,0,4b2494c33e82c8e2f2efabed22e33408965db634d8e0a50ecd550843bf084 CVE-2021-39608,0,0,ce014907ecf8f98f00ade28cdbc1c113927ef263f92b37f2e1e7409305fa3dfb,2021-09-14T18:44:06.410000 CVE-2021-39609,0,0,bb6ed2fdbc44bdedc7b36b045f8bb043c33087fc67200291d48729043972e863,2022-07-28T00:30:35.780000 CVE-2021-3961,0,0,7062c913ceaf3cfd16a1935e22749b49bcfce0a8f3e5cd25bdd4e524f6740cdb,2021-11-23T17:58:00.417000 -CVE-2021-39613,0,0,42386538a61dc67bf7c102f6568d600504730de095f6a8c230bcc00aee2de093,2024-07-30T16:15:02.850000 +CVE-2021-39613,0,1,49a9c15bac3b0f665c8e5baffc256d68dee6de951b9d2edb467042c8deffbbde,2024-08-01T13:42:18.330000 CVE-2021-39614,0,0,ae8218c0748eb783280802554bf3af0dd502bb1ac68d3afec1a4fc78a799d195,2021-08-30T16:22:00.760000 CVE-2021-39615,0,0,313c572c07cbd6b3017d4ff4b78672da4ebf0b30e8db828d2e4a5e4f81c980c6,2024-05-17T02:00:03.840000 CVE-2021-39616,0,0,a72adf1aa4cdde36a276737e428e8887e8d100759618725f9b47e4575aaf9982,2022-02-15T18:14:11.893000 @@ -182212,7 +182212,7 @@ CVE-2021-40452,0,0,5fafdb809ee70fde4ba5fca1a17d55e2792015c7006c673a40c911e320a16 CVE-2021-40453,0,0,cb007dc47e79bd3145b3eee0e80e348c9ab308711594591b4beb01977a4c85dd,2023-12-28T00:15:08.333000 CVE-2021-40454,0,0,34708b82412d8c15d2f1d761a8ed3ece5b4eb6e3fb030cfc227c0ccfa41b188a,2023-08-01T23:15:17.050000 CVE-2021-40455,0,0,4d729743a54e741bd29770b80b681a4508cced23ebb0c9f839473bb5398f6205,2023-08-01T23:15:17.153000 -CVE-2021-40456,0,0,d4115597844008128a86db62f8190e8da4170998b9b22077216cff55de416e27,2023-08-01T23:15:17.273000 +CVE-2021-40456,0,1,a6dad9c29f0fe567a94dca26cba93c0b71e7e19adbb18ce9ea9579041619a258,2024-08-01T13:42:20.567000 CVE-2021-40457,0,0,30d93a2feca6740b5fe32a896abf01a9f7be8d1750ffe1a8b775e291c00409d6,2023-12-28T16:15:48.583000 CVE-2021-4046,0,0,a4da578472f2459eb2718b489ea7a52bf125c472eaa0fe6c2473ceb2415e600e,2023-11-22T12:15:21.930000 CVE-2021-40460,0,0,2f84fed648528bcfcc6ee832028d0d3e520e265163c798719a801432d5c6c187,2023-08-01T23:15:17.367000 @@ -182564,7 +182564,7 @@ CVE-2021-40901,0,0,edba63cc392009fd6b1d0e487a7b714747c72e7bee86ff3f4f754899b1695 CVE-2021-40902,0,0,6ca05ad50e9b6e3b6777fb7141ae29d52cdde7ce22d093da5421ae0bae6bca02,2022-06-17T22:36:31.700000 CVE-2021-40903,0,0,19ad65615908d4357b942595ec77e5bfded07d3621453115e06f2472ba0e0d05,2023-08-08T14:22:24.967000 CVE-2021-40904,0,0,3b86fbb931fab57afba3955e2a87aae29672f815602fe8c1d99a7092f38577ac,2024-07-23T19:37:16.630000 -CVE-2021-40905,0,0,8c0c6eba68d354b1200b042fda3790d0a0276a01bc12e85f564688ea9673c3c3,2024-07-23T19:37:16.630000 +CVE-2021-40905,0,1,e3a3a9f7050e2f13b2bba454096f0c5e9270cb8be610a34af2e5bf7d7493b6cc,2024-08-01T13:42:21.827000 CVE-2021-40906,0,0,23cbe7d276948ae4df63bfeecc5d0535d3ec05928f53ae05fc4cbc7e5b04b26f,2024-07-23T19:37:16.630000 CVE-2021-40907,0,0,1fa3d54ee26bf3b326c6981dac0551d6cd7c294c0a1f104ee1cb7288161ecb10,2022-01-28T16:42:20.147000 CVE-2021-40908,0,0,afaacd61e7aab04dc2699413fcfe1cde5187ecc26cf58efcb5b2534047a32c58,2022-01-28T16:43:11.057000 @@ -183080,7 +183080,7 @@ CVE-2021-41499,0,0,4533365444b601534321d4d5de70f1946f80a8336beda80700193c685d9cf CVE-2021-4150,0,0,0d0b7965b219bc0ddf1a71b047245b29307a4594165e78413979a713c60d4cbf,2022-06-22T15:55:44.063000 CVE-2021-41500,0,0,eaef38d53f541677aa204a9ebc1602de2c37f11789109a34722a5d88a6dcfe34,2023-11-07T03:38:57.167000 CVE-2021-41502,0,0,b724d6ba66b92ba8c6b97cade3706ad4a07572464937ce6bfbf2977f2e864a29,2022-06-17T17:31:33.673000 -CVE-2021-41503,0,0,507044a732cba75567c9200de5f96b200fca3f8bf0bec202815e9a93f937e02a,2024-07-19T18:15:04.580000 +CVE-2021-41503,0,1,6d94f8d4df72a5951e1f59c0d94e98d7679d231d7ca1e8d223863e7f77518264,2024-08-01T13:42:22.777000 CVE-2021-41504,0,0,fb1adfb7674ffa96cc983b72eff36e98681ffceec30954458e632d5d81177850,2024-05-17T02:01:13.233000 CVE-2021-41506,0,0,01d8b9a3a83b6e4dd58b7f9cb9f746d4b0cc6e281fbbd19de359fa7a4a03956e,2023-08-08T14:22:24.967000 CVE-2021-41511,0,0,6299aae48910aa774784abd64e72607fa5e292e1f043623428d5d9d2ecdb4eb6,2021-11-30T22:39:04.107000 @@ -183211,7 +183211,7 @@ CVE-2021-41682,0,0,57fe034f4ec5f9446b921148acc50fd9d4fe691cc92f7fdd9662f2b9b2a0c CVE-2021-41683,0,0,d121b7f3b5db0383c1b9bd842186240930f98781d96e934e9147faacfa1f7095,2022-06-28T18:31:40.310000 CVE-2021-41687,0,0,927e290842080cb8cd28cafaa9c0a5c0497310c3f8b18bf42c5bfd08081096cc,2024-06-28T19:15:03.040000 CVE-2021-41688,0,0,870633c8a249aa419e347151e39c34666b83a4b854e2ab66c8893ed6e7fe83f7,2024-06-28T19:15:03.170000 -CVE-2021-41689,0,0,1c670b6320841070ee4a6ae9b8fe0f482d2f6002a705c49ca272f9e466f14312,2024-06-28T19:15:03.250000 +CVE-2021-41689,0,1,d4fcf4dc370739b0bad0ab977a3f02c52197c18392f094b90e8d4f50d3be7a5a,2024-08-01T13:42:23.660000 CVE-2021-4169,0,0,a14b710b6c3d43b763f7dbb91e907a59072b6b68bba7ece6076d7d978ba3c1c9,2021-12-30T21:07:23.753000 CVE-2021-41690,0,0,d4203f81b9720d95643a7da5275f0d8abd1b18210e78e12db4d93449105d9d5e,2024-06-28T19:15:03.330000 CVE-2021-41694,0,0,f50452abd758a90efb8659fe89ef0455f4d267a5131c762b8f8e62ab5bbf1180,2023-08-08T14:21:49.707000 @@ -183862,7 +183862,7 @@ CVE-2021-42687,0,0,51aff8bb8be2dfed23e5e2283ce8a960a865bbf78379ca2f376af01110d43 CVE-2021-42688,0,0,646457e21c7114292df4109589a24f0f288dd18fb24ec94d267d31ede6bdd204,2021-12-09T14:05:17.687000 CVE-2021-4269,0,0,08b719a96cba7dec3a11b26321c09d6eb626c38187e3cc307ce1a1023588c7b5,2023-11-07T03:40:29.450000 CVE-2021-42692,0,0,83b2956d3775f5dec583c92f53fdd8bc4c1fa855e8b7ccb98fca5842039fedea,2022-06-03T02:56:05.980000 -CVE-2021-42694,0,0,f82cee7991d4289d4d571ec41447caef665b2d346fb4ce8de29c91ee07fdcb82,2024-07-18T18:15:04.810000 +CVE-2021-42694,0,1,451056350fbe1d7d5a6c88af63affb539311dc98a871061aa691832f7e896400,2024-08-01T13:42:24.450000 CVE-2021-42697,0,0,05f0c4f5dd4d421cf8e92c234de33ee1f0c98041acd57668964d6a55f79c825a,2022-06-13T15:41:16.767000 CVE-2021-42698,0,0,6e5c540194b901c9f12a1bd85f98d4b2a1097d11a022c232bbc9598df8a0e75d,2021-11-09T13:56:23.843000 CVE-2021-42699,0,0,f7c15d007953981fdcfe0e5042345932e64c3a607431e6511ffbeadf41010118,2021-11-09T14:35:52.460000 @@ -184258,7 +184258,7 @@ CVE-2021-43233,0,0,1ad41bc0e4fe48744075d970b7417cf682c287a7ab6acac5ba26f17e787b8 CVE-2021-43234,0,0,535a73b278caf6053d3f9e5dd743a9711fdb1c61f28ba43193c053a553ff7e44,2022-05-23T17:42:16.803000 CVE-2021-43235,0,0,0ef01592ccb4a215a42aeb79e6805011bd2fdd85905087c8bc0655586cf32610,2023-12-28T00:15:11.143000 CVE-2021-43236,0,0,7f9981bfbc0885d851108fd67d6e489ca5ac54d8baa91bda21fd921df78bc97c,2023-12-28T00:15:11.243000 -CVE-2021-43237,0,0,2e9fb212c432234c5a41db537f9744679b5edfa925d9ed2e6f96239928119a4b,2022-07-12T17:42:04.277000 +CVE-2021-43237,0,1,7f286d5644e251919590a2470ed27fefa478c5445fba278a1f80b3e8e837f6f5,2024-08-01T13:42:25.550000 CVE-2021-43238,0,0,2a94b1faba7c4ba273bf77dd632ad1e534e24fd4651254988e392009d4940b02,2022-07-12T17:42:04.277000 CVE-2021-43239,0,0,ab4f1cd734bd85e610dcda9f21ec27fd8c0e69b16f7d5be0d95feb696496bf7d,2022-07-12T17:42:04.277000 CVE-2021-4324,0,0,06941f9ab319c035baed79f002dfb8c6c417baad8a1848b4faf496e3ea18fe3e,2023-08-12T06:15:13.483000 @@ -185108,7 +185108,7 @@ CVE-2021-44356,0,0,03a602de62c64af9465ffa5b5bf7c8563bd4ce714497b9fec951d17e960a9 CVE-2021-44357,0,0,fbf33c82d9749a87a51a42dc944f628a6272f73c41f7b20adc90fdc8f702fb49,2022-04-21T15:51:38.440000 CVE-2021-44358,0,0,8fb296165ec37dffb4ea34029aaa7f5e24958850310b37aa683d2389f7451d19,2022-10-25T17:49:30.297000 CVE-2021-44359,0,0,e643f6980b786d5a46b8c967de741fea56c22f4d596b9539dd9e78b3ebe29fe9,2022-10-25T17:49:21.970000 -CVE-2021-4436,0,0,f8c27c9e72bd71fcb7086ba03d6c02e4874f29bb2a92acfa7aae0b76842f2e42,2024-02-10T02:04:43.427000 +CVE-2021-4436,0,1,4cb1e0d158278d5fb4fce36f45af5672f63d8f062b40eec6a9846692d8798544,2024-08-01T13:42:31.623000 CVE-2021-44360,0,0,85a46475fc64f753c650eb23e1d46a1555a4b3de4d3fef6a2047c332d27ab942,2022-10-25T17:49:17.600000 CVE-2021-44361,0,0,b6762cacce91dd9ee5527f61811dec1797873dcf52bf1e8da38f70e638398e25,2022-10-25T17:49:13.530000 CVE-2021-44362,0,0,70c26a06d8ed033622908d58acd6105e465fc5dbc2a896ad92c3ea8659c8a3d1,2022-10-25T17:49:08.320000 @@ -185522,7 +185522,7 @@ CVE-2021-44994,0,0,8563d1426afaff3e2559a540ead652640d95dede77429ddf1c933e91b5bdb CVE-2021-45003,0,0,b565c2f6b54571cce778c964f32303b6b062a7541bb146b83b7042fe9a0a68c6,2022-04-12T18:17:07.383000 CVE-2021-45005,0,0,f2f9c404c947ec07f63e5a376b483796b9d15f129eebaa1919c220ea39f25ec4,2022-02-22T20:37:18.420000 CVE-2021-45007,0,0,3d2bf4dd2c04db48917c34b4cb293c410edcca4ff609c78516c710e4b72bcb3f,2024-06-10T19:15:51.720000 -CVE-2021-45008,0,0,365fe83e50433cb3fe5536d6a008f7f9530535e0a83dccd6db9a58ad78095a11,2024-07-18T16:15:05.650000 +CVE-2021-45008,0,1,e31d5f6cb70decdb1e2b87dbe22f16bc8d9adbbe53d873f95e7ad9bf3dc811c8,2024-08-01T13:42:27.030000 CVE-2021-45010,0,0,ac91e8ce137ec23808e843a9c127cd61b48905a4f30e7c084be03adc4e2bd01b,2022-03-21T18:56:55.743000 CVE-2021-45014,0,0,aa1ee392f191e6dd7a735c4bf74a7eb91332ce59b5d515b7c44d9b5654243daa,2021-12-15T22:20:38.910000 CVE-2021-45015,0,0,42dc86ad4383e838d0bcf91f7d5787a097d9df2ddb102e03fec9c5ab8da8ed34,2022-07-12T17:42:04.277000 @@ -186121,7 +186121,7 @@ CVE-2021-45952,0,0,f1e579c49bb95a7f9bfbb0f5ae28465611d6f1140361974fc65b2f0f49dc4 CVE-2021-45953,0,0,03c43075d37b54fdf715782efe6917fd80e8b1863228ef976b043e0e634225e2,2024-05-17T02:02:52.617000 CVE-2021-45954,0,0,78b2778517183dc5d3ff11045f67a64111d2d47c926143e4ff2f884c6f07b0a9,2024-05-17T02:02:52.697000 CVE-2021-45955,0,0,14427c355062e40fcf7f9dc2e9f7a9ea93d0404aeb7f9674c38d5af6194e086a,2024-06-11T16:15:16.080000 -CVE-2021-45956,0,0,3ae1daf2d3977c14e3b2c53d7fbbe0e9d84a2db22cbc818798095373ecaa4141,2024-07-18T16:15:05.750000 +CVE-2021-45956,0,1,dbe76142a185336ef6bdf2bbed82f38bf17c0385a8f4b80e9275e222261e8201,2024-08-01T13:42:28.027000 CVE-2021-45957,0,0,492d1507b3590bdc63eabf917f1b6bbd524e5848306973915e13f21f84c47780,2024-05-17T02:02:52.953000 CVE-2021-45958,0,0,d33a398d64b3b5653e96312e6f2bb2ba0125a0fe6f09a442f36a0664632fe919,2023-11-07T03:39:57.137000 CVE-2021-45959,0,0,03196b6d71fb336ce6b8ec4bf56fce0974b2b8175070246c0a6d5b28e8f2e426,2023-11-07T03:39:57.233000 @@ -186813,7 +186813,7 @@ CVE-2021-46969,0,0,2442b4d168529e6235ad42a19423413c8061f66da3e7a2ea9cdf5ed9cb2e6 CVE-2021-46970,0,0,38ad2dfd3a74fef99034005d7aee5aba8eeae3c676148951accab60b691e8b45,2024-02-28T14:06:45.783000 CVE-2021-46971,0,0,1c1dbe13545ff4585806b1b93888c938eed6fdb3477d1640ebdf745564ef2d99,2024-02-28T14:06:45.783000 CVE-2021-46972,0,0,83ba641ac17e78a38d76eca1d8d68533c6ec93d7f0d4a909820ee299e348556b,2024-02-28T14:06:45.783000 -CVE-2021-46973,0,0,346acd0130cbfa086558d169b5a2bb55dadb052295b491471a9b28b07d407ec5,2024-02-28T14:06:45.783000 +CVE-2021-46973,0,1,4b226a700334fd120a1d15b42eb1508be8d6bf2f1493377c14530d983654e203,2024-08-01T13:42:29.060000 CVE-2021-46974,0,0,68106efb1dea0e888fc3f320c7c7f115f18907377c2b796169ea6fdae092bbb8,2024-02-28T14:06:45.783000 CVE-2021-46975,0,0,379ee4cd812bfdbb2fdb73351c9c5db9b3f393ba3702c95ca5be896799b9eeec,2024-03-19T14:15:07.467000 CVE-2021-46976,0,0,d459fe959a5a76c1fabcab8d05c872a73f329bb3a08d112447c0d44f1b1b1803,2024-02-28T14:06:45.783000 @@ -186863,7 +186863,7 @@ CVE-2021-47019,0,0,cd658ef20d79e09f94db08a402206e07bad31af7b747293785a0f997f8100 CVE-2021-47020,0,0,3f1513794f9fa6f6d1fa30ced2f58e669fedd6326cd100ce1e37366bca0a50c5,2024-03-01T14:04:26.010000 CVE-2021-47021,0,0,9b358774567fe50179d1f4db93b99a7a3238ac5b927480afdde61a0f7943b664,2024-02-28T14:06:45.783000 CVE-2021-47022,0,0,59be32a3f1a08166e4014ec59d4ebdb524edccbcc930be81506830c6a2855d58,2024-02-28T14:06:45.783000 -CVE-2021-47023,0,0,6146fcc52e69a3aa48198db405675afe63fe13a238f0c81e33435db212fdae48,2024-02-28T14:06:45.783000 +CVE-2021-47023,0,1,23a1e68a708386cf0880da14cb600d90b0c0f8930ba33d316ee3667c1f90d249,2024-08-01T13:42:29.830000 CVE-2021-47024,0,0,254caea9e85f7939a88cc79b40ef6f81dc077ebaa4e7954e567e3475016cca7c,2024-02-28T14:06:45.783000 CVE-2021-47025,0,0,21a8682e32d8175631f981b9b32006a41a0b800e12b88e9ba4a2a479dc1c7c12,2024-02-28T14:06:45.783000 CVE-2021-47026,0,0,ee5b52f37088ac43beaa8f41447f70e6b8f156f688f30dd24f1ca587f6d88347,2024-02-28T14:06:45.783000 @@ -189282,7 +189282,7 @@ CVE-2022-1937,0,0,db0ce3c83f934bd2e5d4ba79ac81895345d189de42febf49a4e30ba8c72b45 CVE-2022-1938,0,0,d35d5a449fa1ccdb424d46089e89cb5dbda8303fcee2cd34fb5f026f63bf55f6,2022-11-05T02:21:45.253000 CVE-2022-1939,0,0,06bf46b8c41b7c8df5fed866becf2df5360053616ae36ae636b74489f9e3b7a5,2022-06-28T18:30:00.583000 CVE-2022-1940,0,0,a569bd4c28e864937651c022196c4b08d3cf1550f7156595e28accbbfd338114,2022-06-13T18:33:04.377000 -CVE-2022-1941,0,0,bc6a66c2b9a652efca17c90bf64f073ce9a69469b6bbfabfb015625ec157fcdc,2024-07-05T16:15:03.447000 +CVE-2022-1941,0,1,79f21b365557494aa1c71d3d2095a9ea43203f322341c1d6420792f6140e6c40,2024-08-01T13:42:31.980000 CVE-2022-1942,0,0,ac312175dff19936a69f1156a656a1aa4587c79366d7530dfdeb185b96147fe7,2023-11-07T03:42:19.650000 CVE-2022-1943,0,0,2b2cde4e72bc1a9ec299f92001a42166aa74c24383c19cee32a353c4ffa93fc3,2023-05-16T10:47:50.740000 CVE-2022-1944,0,0,c937d9573b701c9cba8319ba116d70cba49220c0b64de760cee6598a0181c62d,2022-06-13T18:37:12.907000 @@ -191170,7 +191170,7 @@ CVE-2022-21890,0,0,38eb8b403e97a68ab1047293ba9d2a468a82d9acb7d7eeef83380d3c2bae3 CVE-2022-21891,0,0,35bfb5e2cfb208e109b287b2edd277d7b903a6399b66dfd6e5f4bd9aad6e5a7d,2023-12-21T01:15:21.927000 CVE-2022-21892,0,0,9bc3dba70e61496813b9092c184f9350f23abd44e53dd78a64c4abc23ce99462,2023-12-21T01:15:22.040000 CVE-2022-21893,0,0,eb4034bdd95651c96b47ee9074e1f7dad0620b10690b9b1569187da096fa133e,2023-12-21T01:15:22.173000 -CVE-2022-21894,0,0,6f5cb88ca7aa04bf312d6bcc3a54a45998b1b1331ad2a60b3c6e3cca96a73385,2023-12-21T01:15:22.473000 +CVE-2022-21894,0,1,af493f05907909eec3b640b085e18e52e184fbe9c259133b2f25171b89c98233,2024-08-01T13:42:32.223000 CVE-2022-21895,0,0,5b824406cc302075779348ea2b22099e494f2cc88ede519a576306dd25209b62,2023-12-21T01:15:22.610000 CVE-2022-21896,0,0,3fe7cb0584be031df72e264ee5b68fd188a61fcf400c0c5f6ad8f9df02a58c0b,2023-12-21T01:15:22.823000 CVE-2022-21897,0,0,a66f9704552b4ad9e63a76d038f0d6e77ed83e169bf2619901fc3cd3dce65e57,2023-12-21T01:15:23.017000 @@ -191302,7 +191302,7 @@ CVE-2022-22022,0,0,48ab351fdd7568994cd4bf8aebd3ab6611faf7b9376b22954b44acc217e1e CVE-2022-22023,0,0,3a2473c282cce02963f49edc53393845b8473681e5a1cc73f232629b617933bf,2023-05-17T17:15:11.130000 CVE-2022-22024,0,0,b231ca4917a857fdad2ad84809e58826ec45afe360afbdd2f67952e6fb4bb0dd,2023-05-17T17:15:11.213000 CVE-2022-22025,0,0,d5905e52de769f22395f34d661df8f524df33516023330cdf84a446d8cf44c3e,2023-05-17T17:15:11.293000 -CVE-2022-22026,0,0,a233112cf6ed9488ce0a066a14d85cb506767fe63241ec9d0825fb2cadf3c1fb,2023-05-17T17:15:11.380000 +CVE-2022-22026,0,1,635d934c59e77ff9e35a20621e96b19102f93e6de759517fc21f5bea4a4ff400,2024-08-01T13:42:33.120000 CVE-2022-22027,0,0,a88eea7894cf9d71abed6407b21b2a235dee77b1fc8b8b2fa8994d5bff34403a,2023-08-08T14:22:24.967000 CVE-2022-22028,0,0,02ca8d946af74af5e99410e3bbd1c4432bc782bc49f5dd0929f6ca6ddb2a80b6,2023-08-08T14:22:24.967000 CVE-2022-22029,0,0,59a8d1ae4495dec9054ad906eda88dcdfc6ab20995268e81e575420af8a9b3ee,2023-08-08T14:22:24.967000 @@ -191318,9 +191318,9 @@ CVE-2022-22041,0,0,d3cccac29387ce214ddbd2cd19cb78c1c05dec0454b9ea5f9c7fd67006f7c CVE-2022-22042,0,0,2abbaeddbe5de6203d505b32e26cf30cae1259b3ec71ef6cea66f0c1bf94eb2e,2023-08-08T14:22:24.967000 CVE-2022-22043,0,0,1b681a813e212c22e73a38da6e8ddefdc649c6b2bef1fa4e9b33af907df24aeb,2023-08-08T14:21:49.707000 CVE-2022-22045,0,0,15b9a6508e8046c2ae80d693962c96af666b6da8464013702f9397b5e3e23229,2023-08-08T14:21:49.707000 -CVE-2022-22047,0,0,a6d2daacf52cfb2564f39209ec36d1131b4602f44d6cbb9e0bb79599ef59ef3b,2024-06-28T14:13:17.207000 +CVE-2022-22047,0,1,ce5627183bc9914eb82efe70ac0deb1879f323cdebdbcfbb0575387f0d608209,2024-08-01T13:42:33.910000 CVE-2022-22048,0,0,62c56ab3790e58e22f7fab6db751eb0e4a95819fcc03e19e3b70cabc70333a76,2023-08-08T14:22:24.967000 -CVE-2022-22049,0,0,44483caa8ee21a94421c18fd1834d1ce6987c749ac45f1f4893d90f3aa92224d,2023-05-17T17:15:12.677000 +CVE-2022-22049,0,1,9b326e70b5cfe820ce7fb00331e9be1b624b55bf25fa7ceaf7a141f61bfe98cf,2024-08-01T13:42:34.610000 CVE-2022-22050,0,0,5a46bf6de322f73c472f8b425f19a486a18092768c56edd453d0db745c94c29a,2023-05-17T17:15:12.757000 CVE-2022-22054,0,0,789f235d22e23ee720e1c6231cd3a63a6d16f82151c275370d88a70e2f4ca5e9,2022-01-21T13:51:25.570000 CVE-2022-22055,0,0,a9515fff63149b37ab493867622089a164fac2133542f31fb34cf9b50f7fa1e6,2022-01-21T03:30:50.480000 @@ -192137,7 +192137,7 @@ CVE-2022-22944,0,0,676327d4717b5599b517d5b9312003bcf76a812f9682a770d499e471fe26d CVE-2022-22945,0,0,bdfdc441e34f91eac1742b462e9c0a34fe3ccbc2ba19b6adc6510fa95bca2424,2022-02-24T19:34:56.947000 CVE-2022-22946,0,0,73897096059cc424e53bda43ae5450b515058d43231cccbf62c5a84242160584,2023-02-22T17:46:02.053000 CVE-2022-22947,0,0,738b6d7713474e3640f15bcd0d152fc4f07008ff7eed844c4608516845220bea,2023-07-24T13:47:34.933000 -CVE-2022-22948,0,0,ce21bf3961b0ce4d12a0e857c996b766bc1e28e4173002304b3c80c3d6835a13,2024-07-18T01:00:03.190000 +CVE-2022-22948,0,1,1b8bf0c26fedc88249afc3b8d7696a3b64f3466f4a7a745145766c6b9d627f32,2024-08-01T13:42:35.333000 CVE-2022-2295,0,0,e4b52112ad8f99baa7a29a7f5984129d950df22bc437645727743c1c8383cf88,2023-11-07T03:46:26.940000 CVE-2022-22950,0,0,bc50cb5b67d3eab9006ffdc7603f3dd6c3d4b852de6313ed43aa1f6a3b01b571,2022-06-22T13:53:48.523000 CVE-2022-22951,0,0,15080fd6724635e5906f80ec4801576fa6eb657b857d86f9f47fc7611d4882fa,2022-03-29T18:07:19.457000 @@ -192279,10 +192279,10 @@ CVE-2022-23081,0,0,37257b1b16b08f7ae6b3f40d43cd0898150fbf23c1e781581f0b3aaab04cd CVE-2022-23082,0,0,ed78bdf538bf7b60edbc93ab6504b678e167f80f5b68fc48b75db1e83d9856cb,2022-06-10T00:39:46.607000 CVE-2022-23083,0,0,684a6dd88ae5ed867b99fc818b8fefbb26179e2cd128f1a245762ef7032c445b,2022-01-26T14:23:02.100000 CVE-2022-23084,0,0,eed95f3fcb710f55aeaa0b13782419b97e1ab24731bc10139becaf7cdc3a00c6,2024-04-19T07:15:08.510000 -CVE-2022-23085,0,0,2756dc3801605b8e2a0afb5371ce2a83eb237c1b9f2a49fef8dba85e732399b6,2024-03-22T19:15:07.650000 +CVE-2022-23085,0,1,6c73d80fe53102f1d24a88a241ff940732efb10aff95a9e7b73dbc233257f85c,2024-08-01T13:42:36.137000 CVE-2022-23086,0,0,1986afec393a76319bf2f11604293837b0b02358fda7fa1eee7a754322983738,2024-04-19T07:15:08.670000 CVE-2022-23087,0,0,7c11c887965510f82185d4811a8db490ae631d7aafb2819d8ae31377af05c24f,2024-05-14T10:18:03.900000 -CVE-2022-23088,0,0,d494a2af27c32bbf377e573069afb11f4aa2c4160f1c9d25f816d1467d99026d,2024-02-15T06:23:39.303000 +CVE-2022-23088,0,1,41b982ff884b09c7af016b00e2197b8636d45745a8254c2bcb871053e56fd8c8,2024-08-01T13:42:36.930000 CVE-2022-23089,0,0,a18ed816bdf6550bacfc7602b0b6a6a3a9b978a024fd3339be9009323e78d936,2024-05-14T10:18:04.163000 CVE-2022-2309,0,0,9b7bb7aaadbdfc33b034de1ee18067d4777cd3243dac3eeed568b1523264f53a,2023-11-07T03:46:28.713000 CVE-2022-23090,0,0,e3745a2b25820ebcfb47a5b967b273d18a73dcd4fc09664109c2e95ef883bdd1,2024-05-14T10:18:04.273000 @@ -193565,7 +193565,7 @@ CVE-2022-24537,0,0,31b75a94f97388a61f47d73a8952608e7bb16168a556b6938d51c24280720 CVE-2022-24538,0,0,0a29a6dba0dba0f2480b6af97d0b4658ef21bffc8a5931e2735a5b913989f123,2023-06-29T01:15:30.837000 CVE-2022-24539,0,0,612bca0545ef9ee9e82bacc3c149af2a943471af702d3a8a780404719efec336,2023-06-29T01:15:31.057000 CVE-2022-2454,0,0,d39cd8b77be6a7bdb013ff6799b7c8aeda259cf74b2241e43d022c82d1c70698,2023-05-27T04:15:21.350000 -CVE-2022-24540,0,0,be97113773420c7d27d356b1bb2ea60bb83ef4a209ff4217dd08b7457d38e0ca,2023-06-29T01:15:31.197000 +CVE-2022-24540,0,1,6b319f6f9066be995e8ca80436a8e82f2cf858721ad33e8ecf9e58c46eb1b8b4,2024-08-01T13:42:38.470000 CVE-2022-24541,0,0,5b7d6aac67531220ac6a1cd53eed033213eba0bdd99ef50f9630242b12afe048,2023-06-29T01:15:31.333000 CVE-2022-24542,0,0,e32f60e4feb44d8e7ad375868a8127731d70853bdc12ab6e90e082f43198fa92,2023-06-29T01:15:31.477000 CVE-2022-24543,0,0,3595a1c965bceddf50c62b813f915d3233d5f717749f4c9753a6ebcf98ce3fdc,2023-06-29T01:15:31.617000 @@ -195469,7 +195469,7 @@ CVE-2022-26818,0,0,325cefb849bfda1e4c4321448955112908d1810f96fbdcad2f3d00c0a62dd CVE-2022-26819,0,0,d80d14f5bbde3f2c49f1816a43e4d3ae83956a7cedcbb6472840bb47e3572b92,2023-06-29T01:15:39.110000 CVE-2022-2682,0,0,7531ff2647a78f826e1478bd728ccf5755df1f0518d42631490c28f8d73e7291,2022-08-08T17:36:07.743000 CVE-2022-26820,0,0,970f8caba4880562690f595cdd78b73bd257cdb6b9e53f750a029454e68903a5,2023-06-29T01:15:39.270000 -CVE-2022-26821,0,0,a23480bd1fec5c48839a79cab4774ab7c2a1754c0cb0b494081c7e8311247321,2023-06-29T01:15:39.427000 +CVE-2022-26821,0,1,2b8d85cc9fe7f73a0e058db7e5ff1abb77166693f58cd9bd6109208cf40d2a1b,2024-08-01T13:42:40.033000 CVE-2022-26822,0,0,a2544128c46801c6b819b85687a9ea3f4e4af99146ef2ffda651956fed43fbe7,2023-06-29T01:15:39.633000 CVE-2022-26823,0,0,ec53a82959212ace55f8651642d0dd5fb21fe52f5ce5df501ce817490b437653,2023-06-29T01:15:39.910000 CVE-2022-26824,0,0,5801ca4cc9ffbb4212493c187a51a5782ab2f59e2ca3a9088c37e48af2c24f9a,2023-06-29T01:15:40.143000 @@ -195553,7 +195553,7 @@ CVE-2022-26907,0,0,393c9673f020132caaa8b739850888cbac8126cdea8496041f75024401754 CVE-2022-26908,0,0,3caf2053e043c62976cb3b40ed1723c0cb8d8952f0541a31420c03110010a614,2023-08-08T14:22:24.967000 CVE-2022-26909,0,0,cfa67939396a22bdbb89000bfbe700a11c5c09eb7776fd6372a8f66a3c2e74ec,2023-08-08T14:22:24.967000 CVE-2022-2691,0,0,1b03574f86c9d72a9796ff76f4339f3756247869a85a6ce1654a82ec50dd1abc,2022-08-11T14:16:36.510000 -CVE-2022-26910,0,0,82cb00d5781d4dea88dffe76da3aefad3980e5bf2753d2c2afc90b876a3c86ec,2023-06-29T01:15:46.310000 +CVE-2022-26910,0,1,b0235bfea7a0595fd4bdfa1d5b6843f7ada813e797c6fa6a722c4d988aff2435,2024-08-01T13:42:41 CVE-2022-26911,0,0,79d01abd16ff6c0e099975562382c319ac61ab6fd06de0ade72f896504dd1d9f,2023-06-29T01:15:46.623000 CVE-2022-26912,0,0,698f46d3caafe2b831412b02c0aa87d3312e9680f7b1d97e7d6651a95075d4a2,2023-08-08T14:22:24.967000 CVE-2022-26913,0,0,556d2c2c70e5932dc1b7f980cbf89be0b8d731d93cb16089f4de7cfbad0a35c4,2023-12-21T00:15:12.647000 @@ -197836,7 +197836,7 @@ CVE-2022-29774,0,0,4b405ebdc9880eb5e5f41a971fd9e8cdddcec5f8340499115bd3833104aa8 CVE-2022-29775,0,0,5d73d0fb7d452aa0ae0f70c62aae14b28e034e0bc0986c8b4d0bb7a914149c2b,2022-06-28T19:53:37.160000 CVE-2022-29776,0,0,4cdc08b5c45b7b5439f00feb6539cb41bb6c6b9f1add4f9f2663693f8e3eed75,2022-12-09T19:31:36.280000 CVE-2022-29777,0,0,d71e9a12c44f246b46b58a2998764bc78f51e80848d4de28ca6f34832c727b7d,2022-12-09T19:32:33.730000 -CVE-2022-29778,0,0,c27c2a51f1946ba5dfb393a1c0891eda480f098a846ca8e5faf738ec41f7a782,2024-07-17T21:15:10.420000 +CVE-2022-29778,0,1,c68ec397210d8595673b5c15534c4e6794952de93fc40d195b5046e5f9a93cd9,2024-08-01T13:42:42.130000 CVE-2022-29779,0,0,e39b7eea01eef3b09d5171b370f89a05dddbb8744377c507f1f880b1717d5e4a,2022-06-09T21:00:51.453000 CVE-2022-2978,0,0,2519950ad7f6bccd7f12634265539f230c2362432aa9cd89bdd5aceb9d9e0343,2023-11-07T03:47:08.933000 CVE-2022-29780,0,0,602ee99cdfe30fba858477573ba6cacca0e2df97c18c6f77078067b869cdc0d4,2022-06-09T21:00:23.453000 @@ -198192,7 +198192,7 @@ CVE-2022-30197,0,0,184954cf2a57df3a45aad8f4104e963f8ecc2dfc4ea6d4ed53a85df5ea133 CVE-2022-30198,0,0,f74414e51cc76510c99b881cf6e66acd26efff37c7c1a7136b6015abed4f2e44,2023-12-20T20:15:09.790000 CVE-2022-30200,0,0,e85ba3306e44c409c61bfaad9fffbbf6c7b7fbd42b3dd060eb687fe06813a045,2023-04-11T21:15:10.733000 CVE-2022-30202,0,0,86e7f3dece17a675551035c38bcc6a713b595575d4612ee33c39d00ad69b811c,2023-05-17T17:15:12.997000 -CVE-2022-30203,0,0,2858beab019b2710ae45f5c0b5b773402f6180ea9c64363919971d047a3e9acf,2023-05-17T17:15:13.077000 +CVE-2022-30203,0,1,4b8fbd9f1746a9a1c2bb65280523802bf6572bb907339b3195686c84a2be2125,2024-08-01T13:42:43.233000 CVE-2022-30205,0,0,9a258c0b0abd6ec5c82427ad410bf70fed21624fdb5e1a3862b4214670c84f04,2023-05-17T17:15:13.160000 CVE-2022-30206,0,0,6e3e4e78de05a371f7e1fff7fa4616d23c667c46d0db868ce1e8277bab3d9bbf,2023-05-17T17:15:13.237000 CVE-2022-30208,0,0,21340f0fdf46873353e7acdae9e93c9ac74f428b6b53047c52d50dd4d68c39bc,2023-05-17T17:15:13.317000 @@ -198243,7 +198243,7 @@ CVE-2022-30264,0,0,c52657d080a9465a6c6cf9a186016e520ea009e077a5f384615199934b950 CVE-2022-30269,0,0,5868162215e8b51fe9ac18a156ac58d0bc7e2d66d859e577a50dacd6d1339b17,2022-08-02T20:03:02.587000 CVE-2022-3027,0,0,af678187a7d9b1411368d9291e5a9a50f2e0ee3ac0e8f5553351544665c9facf,2022-09-14T22:42:43.970000 CVE-2022-30270,0,0,cc02ba7717979f62b70d2357facb67ec085780ba9eb05210cc2edb02d544c1dd,2023-08-08T14:22:24.967000 -CVE-2022-30271,0,0,40853567d46eb4224b0d6bef24b06be2f87050d6e3997c41a7f824eb9adb34b8,2024-02-13T16:21:02.103000 +CVE-2022-30271,0,1,cae6e85caddd8dabea8c3d616fd8a1a84ca9b9c509db2c74495ad40670cc5fbd,2024-08-01T13:42:43.947000 CVE-2022-30272,0,0,6ad303b8c965ed1aeb43c3ca8546929071702357bb08e4bd2a91758145fc5bd4,2024-02-15T03:19:02.693000 CVE-2022-30273,0,0,53d4316ad8b4a6cd24b661e8ee524ae4ec1ba9a7f7e02e5ae409b5c081b0e703,2024-02-14T16:10:40.897000 CVE-2022-30274,0,0,421e36c91e2c998631b0a049ff0b4439c138670b03e16f189cd8cf9072f15b74,2022-08-02T19:26:58.617000 @@ -198844,7 +198844,7 @@ CVE-2022-30993,0,0,34f0c235db8b8f8c2dadb8b48e535644912ae72a93d3205c89b5c959d885d CVE-2022-30994,0,0,c49a68afcff76dd3b85aae35461972ee2157a76c6fda07effd406e83dc691e55,2022-06-01T19:30:44.787000 CVE-2022-30995,0,0,d505f3381a38fbeb8efbd50ad9d6f4b9d219e031af398100909138afaa752cd5,2023-05-09T17:03:06.093000 CVE-2022-30996,0,0,158a5aa88dd24e18d892df33cb63cd7a18ccc6468e357654a2c8521ffad04064,2023-11-07T03:47:27.987000 -CVE-2022-30997,0,0,a300054e40401c1ec74330392f220811e3074c19b70833643064d9c5c79ce76e,2024-02-13T15:56:20.097000 +CVE-2022-30997,0,1,e1f7258b436ca4ac00b3def447e2d9b1863691d8d3ebb1e7608b5ba51b72c5a5,2024-08-01T13:42:44.747000 CVE-2022-30998,0,0,1ba57aad9c77a9222445e4bd14442424f8c9eafa4b081005f3ff0ed82430aa1e,2022-07-26T15:05:51.570000 CVE-2022-30999,0,0,3b20a73aa4d058b17b3fbe1fa11a707e1963f4392673ab2c1415bd27e44aa3af,2022-06-10T16:02:14.483000 CVE-2022-3100,0,0,78020318e04df83e6c5451e77bc122b3d186043a21587d271176770e701c3bca,2023-01-26T15:11:24.793000 @@ -200112,7 +200112,7 @@ CVE-2022-32529,0,0,6bd1e33907ab03942db441a704749d5237537711dfb4984a7a34dda2a9b6d CVE-2022-32530,0,0,ed8039115a14a7f8af4947fe4ad6c9df4373588c39405c68cc3576f0e73e794e,2022-07-06T17:11:39.337000 CVE-2022-32531,0,0,eb46bfb2170b2224850e0160a9756c1f061bd33e6067a40ae60eeb39fbae8904,2023-11-07T03:47:51.047000 CVE-2022-32532,0,0,94b3221bac69995ff52a5e9a66d0a8fd7ea4a17522de95fd372c1c0919921e04,2022-07-08T01:24:30.947000 -CVE-2022-32533,0,0,8301426adc4bd54261eaf8eaeb736bee41cbf0ade2fb5446d34760d73f42c1fc,2024-07-17T20:15:05.093000 +CVE-2022-32533,0,1,bea706639164ee02abfa6ca7f2e852e5de19538f7516c77a10cb5bc6bb2a5634,2024-08-01T13:42:45.877000 CVE-2022-32534,0,0,49082fcd77bc9ed33ce1ca5189b1d0fff5c5b4fc85b523f95d21dad8c0624f61,2023-06-29T14:24:10.490000 CVE-2022-32535,0,0,c23527abbc835749505ee2ce59cc5365f156b2932be4767c37f320c75fe6f7ea,2022-07-01T13:57:39.323000 CVE-2022-32536,0,0,7cf13b78624f79eae1ae83be4b8da553ca755efbcb608aac7283ac023a1cef99,2022-07-01T13:56:45.913000 @@ -201376,7 +201376,7 @@ CVE-2022-34267,0,0,0079fc66602e72d5c2594a90774759c916a60052b2b6090492949883e022a CVE-2022-34268,0,0,1e0db119741017d8de4c1b7c1f1cdb028c7106b341d87a193a3ba87d46af2dbe,2024-01-03T23:10:41.060000 CVE-2022-34269,0,0,cf8159c3ebb11ab8a9a4d77da0bf7de5f45812f3c197d4715b092613b17654f1,2024-02-29T13:49:47.277000 CVE-2022-3427,0,0,710d56f10629ce45fd03f70d8b89c63fb345e4e1fabb40e9fa63e7c475c4f843,2023-11-07T03:51:14.290000 -CVE-2022-34270,0,0,dea01e01091c9faf90a831dd2a791bda170b2a06042cf5eb0071ad3695c38f49,2024-02-29T13:49:47.277000 +CVE-2022-34270,0,1,7e9d5beea9d538ec33f87a5dca04906e81cdb3b68c67d8442f6a52d41e6185aa,2024-08-01T13:42:46.790000 CVE-2022-34271,0,0,31f548b27df0dcd3bebe3ca096fdf47ffee64dc6a056d36fde164e373b96f9ac,2023-11-07T03:48:31.317000 CVE-2022-34272,0,0,77a2a8dceb8985973008eeaf52250ea51b938a258932e2bf51139524d4a20891,2022-07-15T17:46:38.663000 CVE-2022-34273,0,0,d23db525408c23e842b021f973b500c68b802fc9f70a8c32a8c75cf23934436b,2022-07-15T18:48:45.843000 @@ -201991,7 +201991,7 @@ CVE-2022-34961,0,0,950db433126b0f0993cc299b6a8fa9ddbb54bee583e8a58b9daa4d11c824d CVE-2022-34962,0,0,bdce395ace4d4df00d395737110c7b54e48bfbf99ee22f30f3995b312dc8857f,2022-08-02T15:09:25.723000 CVE-2022-34963,0,0,577aae8448c31e0a3af69efddc9519d403ec019b7a641b5da2fdd61d2fca3170,2022-07-29T16:33:08.277000 CVE-2022-34964,0,0,ccab524960e57cb7b9b97ab2c4bac577e892d8defb1e5ea531e87bd9793fbab3,2022-07-29T17:28:42.897000 -CVE-2022-34965,0,0,6f32ed92687b83f58bac13c32c8e6bbdf6b12de01c72673bf2e64f0fea472b2a,2024-07-16T21:15:09.883000 +CVE-2022-34965,0,1,0e1d7bbe2471b9f52ae4ac07e2fe9ec704ad8cef545a71e69e17e7de80c45c85,2024-08-01T13:42:47.857000 CVE-2022-34966,0,0,428cee7bc9383af9104fc6f483cd08c98cec57203e2ce7dcd06f59925c02b9fc,2023-08-08T14:21:49.707000 CVE-2022-34967,0,0,201a58ef5025879d453a4092fe2b0613b9d22305eed853b159f7ad831136a1ef,2022-08-09T17:22:09.933000 CVE-2022-34968,0,0,b4f540f73eb546e9312750cd470c2d6380dfce998b083315da7de631b8e9d15a,2022-08-09T17:19:38.027000 @@ -203260,7 +203260,7 @@ CVE-2022-3643,0,0,1d9069d3f12a17aed117bc4e5ca87445cc72204d8bce8ceff4e80a5eccc6d3 CVE-2022-36431,0,0,6446edea2f89abe2d86003fa16b1159042890888301bda3f5a5b9010aa860fe8,2022-12-05T18:07:17.667000 CVE-2022-36432,0,0,078a5fb0c7510f2fbdbd2ee6b62bafe9feaa017d9f8f79d7bedf1ea277294d06,2022-11-21T19:39:46.673000 CVE-2022-36433,0,0,fed97d2db2fddbc85c793b1f9fa2f23e54008519fe159b95500f07790ebd6f55,2022-12-01T21:50:26.180000 -CVE-2022-36436,0,0,351c6f345e49a3c90c46e354318d75ab8d1c2ae17b3a2a0c51cfd5b84abcc10c,2024-02-13T17:21:57.020000 +CVE-2022-36436,0,1,221d4151a5185b623bb6879d9bc8aad0594aca363cabe48092ae361a284c40c8,2024-08-01T13:42:48.860000 CVE-2022-36437,0,0,8f04aef9aca27a8055583288d747e0743a81f4b6cdc5b0120403bf0166581856,2023-01-09T18:33:45.887000 CVE-2022-36438,0,0,4920e0b43be0b04ad32523ef2fe5c898c45f388a265eb3d37ea702e5580f41e7,2023-11-07T03:49:38.273000 CVE-2022-36439,0,0,8ee653aa9b7d81769d0c390754bfbc8d1aad7e6f0761e43faec2dd959a4418e2,2023-11-07T03:49:38.340000 @@ -204450,7 +204450,7 @@ CVE-2022-38053,0,0,9f6c159a4209ebb3d920ccdbab29cd03230c352790c9f3531fffccd8d227e CVE-2022-38054,0,0,74489f46e3800fabc2d28e3f1ffeadfa1c0e40022a4a9baac124955c9e7c9cc4,2022-09-09T13:46:53.483000 CVE-2022-38055,0,0,7d99c7c81a6b052e2db693889a1f89ced57101a02d14f5908b955aef10ff6e48,2024-06-24T19:12:16.797000 CVE-2022-38056,0,0,e97a30dcff64bf6a960ba6cee4dab824cf0d5f0b44e0fe5564fb5bf80cdc7822,2023-03-06T18:40:40.143000 -CVE-2022-38057,0,0,53f78c8660213182e65a80dbc925200be902e52c9f46f424a3f26d7fc4a1e80b,2024-03-25T13:47:14.087000 +CVE-2022-38057,0,1,9114594a62a0c5ec384aa6ba769047e4a53a7a6889e8de6c09911e90c8a38aee,2024-08-01T13:42:50.213000 CVE-2022-38058,0,0,7caad5eb50085c26b716e44185adfaec4500da078ed2ee81020b590eb21f8e24,2023-07-21T19:51:54.410000 CVE-2022-38059,0,0,4d81ec358c0ecb50fd72c22502f3eaf13fa9db3fab6ce6c620116c7148be3e16,2022-09-10T03:37:49.763000 CVE-2022-3806,0,0,961dc11c00bfb9b1ecd590ca0f724d81b753d02b386268d6d97f6c930da22501,2023-02-02T14:10:37.720000 @@ -204913,7 +204913,7 @@ CVE-2022-38618,0,0,bd8334b1e208f68d8c7480017efb156c0496c7081204cd2d2527873a98c74 CVE-2022-38619,0,0,baa75493ac582f10eeb5e47fbeffe40352086c4f155f50330a9f7ff9819cc5ff,2022-09-22T13:03:29.647000 CVE-2022-3862,0,0,1e14c2e9115e443ca1022cde05fba70b1337c83771f71b71d1097c3de88bdbb9,2023-11-07T03:51:54.017000 CVE-2022-38621,0,0,7e5376116068e534bd5b739452fca37c46477488cabf404b4eb4e4408cb5ea1d,2022-09-21T14:13:06.647000 -CVE-2022-38625,0,0,5c7e588209d86a5ac3dba53fd60c021b06871f209482df49573fe377fd07dcb3,2024-07-16T21:15:10.027000 +CVE-2022-38625,0,1,c6dc5d7be5266865d95a1bac24448d712bf6030dceb4098ccb521a17b6df50c1,2024-08-01T13:42:51.013000 CVE-2022-38627,0,0,6fa70cf692b77ea18329aa80fa68e4e056fe59b1cc16b0f473d59f8d38738a58,2023-01-10T16:56:35.530000 CVE-2022-38628,0,0,16a1c93b1056c2faca040f777f3d22fff4a353ca0b25d5e20933b4cf855e4fb2,2023-08-08T14:21:49.707000 CVE-2022-3863,0,0,884edc4948a5c2d74dcbc54a918c10d91257ffba1fd580fa9b3d7d5c159e7058,2023-01-09T19:14:44.877000 @@ -205844,11 +205844,11 @@ CVE-2022-40004,0,0,f91a0e592888f7001e6749fa3183070ffdc17296bc8d218e044c2579a53b9 CVE-2022-40005,0,0,50e04a2df5ab29079dbdd1ff3569597085dce55e53e7c5faa485449c643f444c,2023-01-05T02:44:17.760000 CVE-2022-40008,0,0,4b1d97520bc74c08affaa913d0471e3acf74dfbca641f6316fda5268a13b09a2,2022-09-21T19:57:23.383000 CVE-2022-40009,0,0,67a4aeefba53391ebde421468c6fc4c88f28c4922f283b1f8f1d0bb9319583a2,2022-09-21T19:57:10.413000 -CVE-2022-4001,0,0,2ae926fe48a21f82159222a312ec5ee88822cbf7568b8a1b18054ad806bdeb43,2024-07-31T21:15:14.413000 +CVE-2022-4001,0,1,39e00833890a7e901d0618677cbe7c015974d8ce8b3fdf8bf76b065f6484f859,2024-08-01T12:42:36.933000 CVE-2022-40010,0,0,e4ca794be921efc2a54ccc228989c9f920859f75c1b81f110a445bfe4d43d096,2023-07-03T19:22:31.680000 CVE-2022-40011,0,0,e0a7836f1f6caf5aaa0d1e732024ed4ec13801bc1a9feee6d639fca30c8c0a6d,2022-12-31T02:46:55.660000 CVE-2022-40016,0,0,4293ce2e94fa998b63d2973615f26a794c4e99e338b5386d7fd92fabc930a9b4,2023-02-24T18:00:30.037000 -CVE-2022-4002,0,0,a899559ebcab3fb792bd9636826319ef59e8c745070304ae7b69781044fc532f,2024-07-31T21:15:14.627000 +CVE-2022-4002,0,1,7e8f62c13362e65e0bfaa0eb570383dd27d18d3cabb3ad738c31dd929d1362e7,2024-08-01T12:42:36.933000 CVE-2022-40021,0,0,55495082a7e8fc42c46524fdc4cee33425e125ba7b8e79f799714cd824fe1e66,2023-03-01T13:25:18.070000 CVE-2022-40022,0,0,359622a2487ae7d5c9d1eb92d527a2b82b1805cff5f50680a87e6c0cbf3db6c7,2023-06-14T07:15:08.870000 CVE-2022-40023,0,0,317fae2e5472d2e61e852b0d952fabbaf592f8f971a366ffa8994d62e922648d,2023-08-08T14:22:24.967000 @@ -205856,7 +205856,7 @@ CVE-2022-40026,0,0,52559a29a375df8685cfac6399fe291a8d354c1ff8e84d0a4321b0a4e9fdf CVE-2022-40027,0,0,eff062cfff51df7f2d813d05e3dca5f0765df4a5be02cb57c50281f02478e582,2022-09-22T16:14:04.963000 CVE-2022-40028,0,0,280b1f9db19790d0026a8471ba9b82c539c1fbe37ff9db98ad39fcc7de98c4ea,2022-09-22T16:13:20.320000 CVE-2022-40029,0,0,f53cea960ac0734496cceb5b801cdeb46b65691454ac6da85ea7731bc20047c4,2022-09-22T16:12:30.937000 -CVE-2022-4003,0,0,2d06cb34e3a1ced7752a25909606f9d0d42f3aa6be3992893e13ad077328142c,2024-07-31T21:15:14.850000 +CVE-2022-4003,0,1,5aab2014a9e64de2324feda68acf45e247b0c676ba53d4362f106922b2cfc3d8,2024-08-01T12:42:36.933000 CVE-2022-40030,0,0,aa0bde9d2db758f20e54811a13859d5076699b2a7600b82157dce996cc74adcb,2022-09-22T16:11:05.273000 CVE-2022-40032,0,0,854b9692f1f37c61f06e3e33a5e50fef722063a372572d033a137af029be6682,2023-04-06T17:15:09.507000 CVE-2022-40034,0,0,298fbec15b4b696efb3008c20dd71d86f5fe2e6ce3c5512bf5bea0d9eef6af57,2023-02-01T02:41:40.263000 @@ -206396,7 +206396,7 @@ CVE-2022-40701,0,0,eeff2f3ad2c0254a948d15d94ff8ea7c71b765f6191463d21bff66fdce03b CVE-2022-40702,0,0,7f047fe2aa47f60364d4acb4f4717d48b0fc3e21e9c573d82be888cccdf14288,2024-01-24T18:44:35.330000 CVE-2022-40703,0,0,a88750aa6aa4c38db87c31870bd7023daf29e023d3c20c56e591c7a565da5b8d,2023-11-07T03:52:36.113000 CVE-2022-40704,0,0,b8a8030807eb0315bbdb623b9a3dbb58a6e580c3a8cdd5e2d677911532c5e3e0,2023-01-24T19:46:41.243000 -CVE-2022-40705,0,0,e25693e7b5946ee6297a63061d6c620ba4a58c7be9c18b5f0498146905146582,2024-07-16T20:15:02.567000 +CVE-2022-40705,0,1,a4c66ffbc53c500cb593a98d8f24854c3788bfaed817c0421276d946f2858a9f,2024-08-01T13:42:52.383000 CVE-2022-40707,0,0,ac92f2127e7718126975e244b5684164d640381e8e13852a706206304cebadf2,2024-02-27T20:39:46.280000 CVE-2022-40708,0,0,9b33daf4302cc89e12faff9eafa5d5639be6f4e78d6f8bf0f9be7bfdbd9e7fbb,2024-02-27T20:39:51.010000 CVE-2022-40709,0,0,d51d53c3aea71a07dea4de7c08c3380d813adbeead7b897775521fca14a39936,2024-02-27T20:39:59.900000 @@ -206489,9 +206489,9 @@ CVE-2022-40825,0,0,df2fbc5e46740cc7e4a10c0304af85fe1cb1bd9832668b12afc0dfb3c784b CVE-2022-40826,0,0,7f68525eef61266a5d914eb78e686c486efdc7afce66445fc76113f14b1f9e5e,2024-07-03T01:38:47.693000 CVE-2022-40827,0,0,4292c0023fd788f3871b94ceda699e1eabbdcb3b9e6c036f28caabfda51d8eeb,2024-06-06T18:15:12.513000 CVE-2022-40828,0,0,ea49b63b5ac293716ff02f49d7116f62123d4f2b27195705a219afeee944291d,2024-06-06T18:15:12.643000 -CVE-2022-40829,0,0,6a51e7f1ea606236ff00526d405cee48fe9fe995d7120bfcc93c838464915a3e,2024-07-18T20:15:03.313000 +CVE-2022-40829,0,1,e2049a38815863b916ffc286d42d2c8aec26af025c9366cfb4c5c255ffe877d1,2024-08-01T13:42:52.583000 CVE-2022-4083,0,0,e58000862acc2069dae4d3702570c3db9872b392a471d91d10148534a6c05b1c,2023-11-07T03:56:52.997000 -CVE-2022-40830,0,0,0a4c4b98135a540f35b672c4b6309c4ce449fcadb4437c7893bbfa064a4ec41f,2024-07-18T20:15:03.420000 +CVE-2022-40830,0,1,c3c8592e38609ffe6c49540863d64c574e8c192911da443115a7348c2d9c92ec,2024-08-01T13:42:53.373000 CVE-2022-40831,0,0,94252b8674a782ad371561e7a12691aa4362a392b1300d5717b41075aa65dffd,2024-05-17T21:15:07.487000 CVE-2022-40832,0,0,7bd932cec46225fb698b46543eda9d65dfbc39399bb7c331ccde9aa6bb0b8922,2024-05-17T21:15:07.570000 CVE-2022-40833,0,0,af8d5de14cb6acebcb1481ed6f043463b3b55de4fe4e2903e774a2b852172bd4,2024-06-04T19:17:17.973000 @@ -206664,7 +206664,7 @@ CVE-2022-41035,0,0,884117a2dca5aac9f13e5d02e9fa93c5b80af363a1bcd518142a8021ee698 CVE-2022-41036,0,0,0882ce8d244f959147eba5aa1ccddddfd5b1a5ae6b2ae66fc0a9964bcaccba05,2023-12-20T20:15:18.157000 CVE-2022-41037,0,0,0dd6731301e7b968330421a2c23051843856c1e012875f084ee455d6978d07aa,2023-12-20T20:15:18.240000 CVE-2022-41038,0,0,169c3c994f869da01c60a1ddbb091fb6fdeb75928810bd22c0494b4218c3182f,2023-12-20T20:15:18.320000 -CVE-2022-41039,0,0,e20e6dbcc145b7aec2d507643008699149ac165426aff581f6791ccef4bbbc0e,2023-03-10T18:15:10.737000 +CVE-2022-41039,0,1,a4d9b0d0ab9b34981d9746ae13031897b067f0654b783b6ce0b406eafc093764,2024-08-01T13:42:54.490000 CVE-2022-4104,0,0,7703b63cea05708a6a15145456c724c88183d4b832d8b99c2d9c80b6de16e380,2022-12-01T23:00:50.490000 CVE-2022-41040,0,0,578459c387907b265960565d95d06f6a46d5bb7e4f8e9d4dac4fea700cbfc696,2024-06-28T13:57:25.057000 CVE-2022-41042,0,0,2d6cdcf9c8ebeb1f28097263c955593d2be79a4e01e7ebf4b4e13d238f6f071a,2023-12-20T20:15:18.497000 @@ -206709,7 +206709,7 @@ CVE-2022-41088,0,0,2afe2802b691517ef094a9ecf0aa32e401ec2c7eeb65add09e56b7ed0e582 CVE-2022-41089,0,0,cf797f2ee1cc7d26a87e7e32b48f2313005db11bd988a30fa22ec201c14ad172,2023-11-17T17:39:58.597000 CVE-2022-4109,0,0,935f90b67e1a7168123217639f1b815e4ea6f12264085b3c2ac76fda101ac3e1,2023-11-07T03:56:57.037000 CVE-2022-41090,0,0,3da464723200d3320daa740d8a5dc9cc47f6e9a5150e9cc6a67b81747d5d6c5d,2023-03-10T18:15:12.867000 -CVE-2022-41091,0,0,9c686254db09f40d6a49a62d09e603d1f16426e88cd7062216e9535725f21bf6,2024-06-28T13:50:02.067000 +CVE-2022-41091,0,1,0cf1895eced19b4f7505c12ab0279328a4dcdd054b2dbd9598b349ad77df469d,2024-08-01T13:42:55.410000 CVE-2022-41092,0,0,d2fbdd9585583486cd757dccd800dbd74d4e20ff8dbe25e9affbba265169fb0e,2023-03-10T18:15:13.070000 CVE-2022-41093,0,0,93d1c9488df9c21df9a6127ae455a3182dd407be39ff49e9435ec89cb6728fe7,2023-03-10T18:15:13.173000 CVE-2022-41094,0,0,854dffbdb07f2e2cb6334e8cc8a754943d70f64a988f177140d577492677d16d,2023-03-10T19:15:11.620000 @@ -207899,7 +207899,7 @@ CVE-2022-42463,0,0,96de089307d988445eb9830a05c5ab56442cd2bd9c7ad4a574e3a4db2e145 CVE-2022-42464,0,0,c14e32b0262a5c16f31c5882e2208e2ffaf732e103f1063ccc5958c384502077,2022-10-18T19:39:13.863000 CVE-2022-42465,0,0,2ad242e9a8e69dbc5f3fa3b0554e14bd7035d37dc4daadb3c3827b9d024c61e1,2023-11-07T03:53:21.200000 CVE-2022-42466,0,0,ed1a8d987c3d5cc30f1765a5345fd17d6da8ce64581209f9b36ebd596d622c22,2022-10-21T16:31:11.570000 -CVE-2022-42467,0,0,5dbc214fb01b75ca09b175b5ae9239119bba5f1d84066df8aeb3b60b4482cf76,2024-02-15T20:53:00.017000 +CVE-2022-42467,0,1,7ee57a79e4fd1f344b6c6164c71e03cd213833728e908c210e198444468f4c07,2024-08-01T13:42:56.500000 CVE-2022-42468,0,0,0873bf8562e164adc7a6d6fa0d29a40744396a168b99e57ec025cba9e930857f,2022-10-28T17:41:20.447000 CVE-2022-42469,0,0,ec03186260848cd4c6db6422b13caab195552cedfdd5ad6f3216e54bf63fca5f,2023-11-07T03:53:21.523000 CVE-2022-4247,0,0,674c8843ef6ee113f64d62d9f747b8e7b271a043ea80872c226d2f7044aaf18f,2023-11-07T03:57:18.180000 @@ -209092,10 +209092,10 @@ CVE-2022-44029,0,0,3abc823920c9f892a699faa4bb9e82aa814a550ed43c80c543b2f3b7c7287 CVE-2022-4403,0,0,a73e0aeba8432a8afa30dc67dcf53beb330a83d7d963caa7b05048f733047d98,2023-11-07T03:57:46.473000 CVE-2022-44030,0,0,3fdf056110bafccb3a9aeb85400fdd8b676165773d545f063085f1848b736459,2022-12-08T19:07:43.723000 CVE-2022-44031,0,0,aec17858b5cf1e03782ffc67be8e392c2b91232d0d561c6b51519042c733c351,2022-12-12T19:26:38.113000 -CVE-2022-44032,0,0,7cf7def2dc4949fa9eb2e90bda447ce629a5efaedfb9bc4a7f3d13cf56773492,2024-03-25T01:15:52.653000 +CVE-2022-44032,0,1,b3f9244a2246a004d56ab7dabf95db156766357fc7a92b8279c51952b5a903d2,2024-08-01T13:42:57.660000 CVE-2022-44033,0,0,1fe9a550b48cf3932f810607a28c019a2029faef86731429d784f6f47a09ab8a,2024-03-25T01:15:52.727000 CVE-2022-44034,0,0,f99b5ac6bed6e455a701a682a2f9ee700258fbd4b7d01423df5b32c711476f6d,2024-03-25T01:15:52.787000 -CVE-2022-44036,0,0,2af786a2dcb3075340529438134a9e094f1364e998d00ece43b3f16e8450a118,2024-07-16T16:15:03.690000 +CVE-2022-44036,0,1,17403a6ae56c6542acf09316dbb001f4cef5a41f60ecd57ed1aa0ff74bb85688,2024-08-01T13:42:58.487000 CVE-2022-44037,0,0,b4b707cba363b5c00c5eeda9b45ec3ff432a2c7527cfae92cd7c83ec4d0a9903,2023-08-08T14:21:49.707000 CVE-2022-44038,0,0,0563508d9e2bc0b6d1b807952c08ab085501ba06dc6d9a1159a781d0205e65ee,2022-12-01T20:25:20.850000 CVE-2022-44039,0,0,9fb074caee2a5671df19f03763b0f0e3629a6bdbedd3095c0d9cc5c2e81d2aa8,2022-12-07T04:50:27.127000 @@ -209496,7 +209496,7 @@ CVE-2022-44707,0,0,7b94daf18331adce4078cc7f4b30f46cddc12773738427c2d6d084ecf5037 CVE-2022-44708,0,0,17bfb15c3e5582b4e977d129eacc793ec22e93cb1b0a354d6d6a15f420724433,2023-11-25T11:15:10.460000 CVE-2022-4471,0,0,34cadad53115a6bf123ef961c0b9bc4ab079ff2525812441c249ef33722d7a05,2023-11-07T03:57:54.770000 CVE-2022-44710,0,0,70065f215cc8808cab26047104d860ef37fea7b3f0328c7a18e7e029aa666d47,2023-08-08T14:21:49.707000 -CVE-2022-44713,0,0,78bc24059c5fea45279c72eed39c2f95a4bad2729effd511c52820c0cc61829c,2023-03-10T19:15:19.170000 +CVE-2022-44713,0,1,8c3702f5367a2a237ac8e0ad3de986b68c84c636edc92d49137e42b7783d6ff3,2024-08-01T13:42:59.740000 CVE-2022-44715,0,0,6cf8e306738ce7d695eea8f2d0d3d1aa908049aacf6805e8634df08c480f31be,2023-02-06T19:29:28.547000 CVE-2022-44717,0,0,7d986d16f752ac9fd51c84595c2c64981435903109d9144b46b2e4b29dd4cc52,2023-02-07T19:21:00.917000 CVE-2022-44718,0,0,174ea0fad7ba1c40a36434e3dd06786de73adfd767b29fe06826ef4e1d2d5cb8,2023-02-07T21:59:26.667000 @@ -209738,7 +209738,7 @@ CVE-2022-4513,0,0,a623e2548c4d198cab3b5e24a7879401cd60e6db3e6750b2a35aac31b8b19e CVE-2022-45130,0,0,1be36ef4e68d679c4e5a26f49234d0e7be7af22ec7ccfe192333d6b33618ba9e,2022-11-15T18:18:08.173000 CVE-2022-45132,0,0,266cf6e7ca80af05fb82f59632edcd6ff3f2aaf2090d78f0714b9ce6c20da608,2023-11-07T03:54:36.650000 CVE-2022-45135,0,0,ba17cc024027c3452790963589aad35f48eedcd67e70bfa2bd3fa557b8cf15c1,2023-12-05T18:14:31.810000 -CVE-2022-45136,0,0,b0e37c6ba20238990ceccc5a3e38915959e855e06fa8f832ca27b58d3b5428d6,2024-07-18T20:15:03.497000 +CVE-2022-45136,0,1,8e38d9fc607b1d699693e35fc4d85c5300948e8e40dc515958abba15bf2ab05e,2024-08-01T13:43:00.537000 CVE-2022-45137,0,0,73f176b2e87fd65174896043f76ee01f9aa425160bf34c9a021bd94852172979,2023-03-08T15:20:05.963000 CVE-2022-45138,0,0,56cdcb695833ac94db92e73442425c0756d3b4cb60ec5b71a9bd98ed7d826f47,2023-03-07T22:54:12.070000 CVE-2022-45139,0,0,0f9ecf7fd88926638810a74c5f94e2fb01e3e5aa298fdf28e89161fd70fac237,2023-03-07T22:54:57.223000 @@ -210039,7 +210039,7 @@ CVE-2022-45540,0,0,bbd27c8cba89d8122eb2428495be1870b35f38057fd2d2b453595ed05e203 CVE-2022-45541,0,0,9ec19ac4010f1d3fb2e01f4084f200e36cac47251ebef759bad42d3574aefcd2,2023-01-25T19:41:34.107000 CVE-2022-45542,0,0,67d80f87825ab8b3d4112167cb53ca7d9afef094a2f286c18d7892f374314397,2023-01-25T19:47:26.690000 CVE-2022-45543,0,0,15b193bbb9cefb0e5ada4c518ca37842ddc7f6241ae3f737822f6e854041ec68,2023-11-07T03:54:44.880000 -CVE-2022-45544,0,0,2635c78dcc67fbaa5f839ab3b135a971f7fa98b2fe13dbfb3340d7c5419a565a,2024-07-16T15:15:11.117000 +CVE-2022-45544,0,1,37f5f61d9ad460246f78915eb0897fa4a47fd782cb4571be9592434e8fd32e13,2024-08-01T13:43:01.593000 CVE-2022-45546,0,0,3c26b8f5a600007bfa660a001a9333ae8e4ae6564d7d374239baf2b9f60053b2,2023-02-23T04:58:30.297000 CVE-2022-45548,0,0,1253b7d9bb232cfef30f4b35804f5acd0792f5bc715717678a5ff6ff7d68a92a,2022-12-07T21:46:14.057000 CVE-2022-4555,0,0,c06ae6b657b5df4caaeecc9a131e948b6eedbec954bd7447c93b2964ba1cc8d1,2023-11-07T03:58:08.620000 @@ -210349,7 +210349,7 @@ CVE-2022-4606,0,0,e77dd96c375ef779fce6a3809a9b13ef3a30739153e20e78b059a746289eb0 CVE-2022-46061,0,0,be4197f5639570577bf9c90d5a78c53da9a27bc96cf5e47b221523ff862fa0df,2022-12-16T04:58:35.193000 CVE-2022-46062,0,0,a62447faf6191234fd073f7f04daa5ca967d15cdc1ac0bade32f473f4942eedb,2022-12-15T20:45:59.180000 CVE-2022-4607,0,0,51fecc2b74af78c751ce44f251fb3fc77e365ecde32decb95ed7d487554d708e,2024-05-17T02:16:49.867000 -CVE-2022-46070,0,0,58a8157613f63b3d901e1fc73a4c66bc0cb9ba22988535416f76ca81ec706833,2024-03-12T12:40:13.500000 +CVE-2022-46070,0,1,4ecf5c1db19d88736b12a9a205cacb5114430779b961d74fcc3fadc9858138b5,2024-08-01T13:43:02.480000 CVE-2022-46071,0,0,1bb15fce7e765bd1251b599e73c152f59f1c6483dc6f023ab1d14f16fd5a362b,2023-01-30T17:55:05.703000 CVE-2022-46072,0,0,af8c5c288bdd1fda22b6a9cbb389ff5714efbcb10a5523bdc9813939696c3510,2023-01-30T17:51:29.990000 CVE-2022-46073,0,0,938c44f3cefd65f5a9a055cc23a5f2ed13e6600966f2ad2bbcd7040b658623e2,2023-01-30T17:53:04.420000 @@ -210684,7 +210684,7 @@ CVE-2022-46492,0,0,0d81290360c5ada607484ec0ad93da74f5a2923c0d38acd52abc7a99f70f8 CVE-2022-46493,0,0,8bc0a9915aba601c6842b74a3b025d212c7066b5f6bd6752f00c22069375ded3,2022-12-30T21:51:55.933000 CVE-2022-46496,0,0,c3befa1df0c30d834ae1c378018c388a17eda39b09699ab7fe1e9a9331d9cad5,2023-02-14T23:37:54.023000 CVE-2022-46497,0,0,dcd1abb9de3dc65c257ba425d5a9b9928fa3724a60328a4a2de7f515de6199f3,2024-03-07T13:52:27.110000 -CVE-2022-46498,0,0,499ee74c0572b0f0763bcd7645c3d9a52930097bf3d0ba0bc933489fd5a7d2d9,2024-03-07T13:52:27.110000 +CVE-2022-46498,0,1,062148cc3061fa91c4a108e42bef3a9f125c3d1f2bb16b9b89663981c79acc97,2024-08-01T13:43:03.260000 CVE-2022-46499,0,0,4fec6c2a135b70823f992fdcd160df854aafb347f73c5151b681a0ecab9beb94,2024-03-07T13:52:27.110000 CVE-2022-4650,0,0,f3263e15cad35090681797f47376b7071744d021767c2be8dc922dbf6caa2f31,2023-11-07T03:58:28.357000 CVE-2022-46501,0,0,4251bbc23744b8ffe32f24c305e28ddd17b5c7256ced71ab655746032ac840ea,2023-03-10T18:34:02.307000 @@ -211071,7 +211071,7 @@ CVE-2022-4703,0,0,f78248b31accf080599354486580964f551255ff6ed6ef09d177a7a907159d CVE-2022-47034,0,0,98aa3b88fe44ebebdd6f3403032d5dd494d3c3f436ddb19e226483cbe52d4913,2023-02-22T20:14:11.913000 CVE-2022-47035,0,0,9c17a783de3d1c4fb79c08594df7b8d1d253df4680033940ecf4fcd5e91855a7,2023-02-07T21:48:39.107000 CVE-2022-47036,0,0,d2949ed4b0aeb5e6062edd38f93263f4100a539133f4438634e37ca72320787f,2024-03-18T12:38:25.490000 -CVE-2022-47037,0,0,a524020545b5e70b3d6fe32c68530eb7aedd1d3759d561ec6f4342e0f02b40f8,2024-04-08T22:38:15.457000 +CVE-2022-47037,0,1,4642170ef4d1d57857d2c14f41831941268cb1a303a79e288c7bfcfddc1fd411,2024-08-01T13:43:04.093000 CVE-2022-4704,0,0,46af92468c03d8a14d68056eeb3062570290bd5634248e988990bd16456ff359,2023-11-07T03:58:38.160000 CVE-2022-47040,0,0,17f0056871c82cc5c6c5c59f8133dacdaed97db32f71e20007f765b1815456cf,2023-02-06T16:23:30.867000 CVE-2022-47042,0,0,c4ba36c60d0c1d2e2c9ec6942683cdaa0a82225e19b7a5bb810efaa832ad4e7c,2023-02-01T15:55:27.787000 @@ -211444,7 +211444,7 @@ CVE-2022-47561,0,0,de11f79a00c7ca927f54e47db0d40c8f7d831e8a9a0ef1bd4f2f777063a05 CVE-2022-47562,0,0,336c39c5d1deb3564dbe238de72734c8be76434f574974ce6ea3a0bbfd3b800e,2024-05-17T02:16:08.290000 CVE-2022-4757,0,0,77d1bf11b7d58eb60b7f784ca043a5dd4e3ac7e6e7f9174c63924f0e53c5591e,2023-11-07T03:58:49.510000 CVE-2022-47577,0,0,2b0e0eced8626132f9e3e4e1c8090152761cee06d36607c6042ac1962a53fcd8,2024-07-03T18:15:04.360000 -CVE-2022-47578,0,0,7a78179480c3085b780366d3a2c46ac776232f022a5f26f50f8e67c1bce6d68a,2024-07-22T20:15:03.103000 +CVE-2022-47578,0,1,b17ffed4d98d6e92c639fc32e502e92ac0721dbc39538a64aee60d8161266c61,2024-08-01T13:43:04.973000 CVE-2022-4758,0,0,aa076c1ac2fb1eda680593b215b956171fa1f1cc9c969eb12835bba176b9d353,2023-11-07T03:58:49.713000 CVE-2022-47581,0,0,31a371bb55d699f8f9855cd1db50625c68028eb5659869e77981781f0cbad60c,2022-12-28T18:58:26.093000 CVE-2022-47583,0,0,707f2cdab19bfa5285cf1bce776affd7887e366bd3220edb557a074f0fe1111c,2023-10-25T19:46:29.443000 @@ -211799,7 +211799,7 @@ CVE-2022-48281,0,0,f169b47165bba31d8851a7a4ff136a4590e2c75b834d97b9e29ccd018d9e3 CVE-2022-48282,0,0,014239a6755c9455666ffa6b31e5f5c296fc90ee292dffec34c283610b0c36df,2023-06-21T13:15:09.800000 CVE-2022-48283,0,0,8742d226c797e6d20380dacc383e7e45dcee802ceaf632adaaf59cbd38941e39,2023-08-08T14:21:49.707000 CVE-2022-48284,0,0,2d1839403895bb849ab7ebd5b5260a7cc1f84e2a853caf22e8c33bb9c2740f92,2023-08-08T14:21:49.707000 -CVE-2022-48285,0,0,07a947f6e4017abc5731e7fc80d84213e30e755462254413bc447e55de6edfaf,2024-06-21T19:15:24.193000 +CVE-2022-48285,0,1,d9cd435930cac363f5790f50c692282d5aa087af9baa92688917605c028d1821,2024-08-01T13:43:05.703000 CVE-2022-48286,0,0,66916419642d3761a264b38fd363de5bf8d0f4dd6e1709fe02ec6571b77b4124,2023-08-08T14:22:24.967000 CVE-2022-48287,0,0,ab27922fb40b7187b4ad322ed391c2209f6fa2e2ea9a8b291eeac24aa18241ce,2023-02-16T14:20:03.613000 CVE-2022-48288,0,0,69110fe739738f45c0f5142116b27c13d6da6efe6b90f57adcd26a4b963e3730,2023-02-16T14:17:00.243000 @@ -212108,7 +212108,7 @@ CVE-2022-48642,0,0,46049320411d54d94258eba770b701bfe0b63d116a731b90894f4499a7e7e CVE-2022-48643,0,0,f501c66e7560c01128f4bde7ed1c922c51bf2137743e231acbacc80f33921a9a,2024-04-29T12:42:03.667000 CVE-2022-48644,0,0,aee50eaa1080ba42d663c290ef222665900fa3d1e2dc76a2a113640774c9167b,2024-04-29T12:42:03.667000 CVE-2022-48645,0,0,1e1822917f82ebc32aaccd859c4caaf954dc1b4f7d1404b6f0133173beec7b08,2024-04-29T12:42:03.667000 -CVE-2022-48646,0,0,dfc70574ecf191ef889f076f44b40c5cabdac3a9666c8f51958f83509832310a,2024-04-29T12:42:03.667000 +CVE-2022-48646,0,1,393b531aeaf71e8f57e6f878453845389e592b53c36ae78f23196deb2de4bb42,2024-08-01T13:43:06.740000 CVE-2022-48647,0,0,63a2d6011a27e3884bbf52c53c04a6667615b24da49dc1b7925f7441f3b1dc19,2024-04-29T12:42:03.667000 CVE-2022-48648,0,0,dfadd22a87307801d0d16b9b01438d2bba84ad33295315fbb2e82d8be6718c71,2024-04-29T12:42:03.667000 CVE-2022-48649,0,0,0a15744c4cfd26154a17feb04c983f0ec779f45173af81b2d41d9c016bdb8dd6,2024-04-29T12:42:03.667000 @@ -212144,7 +212144,7 @@ CVE-2022-48675,0,0,b3df6fb35ce0e1560f696400ff4b6286ee8f3f6c3ff79a14684d48a1656e8 CVE-2022-4868,0,0,de8ed75e13886b935b9010c58d4bf944210c807882b1811aaef0c24bb30f18fc,2023-01-06T21:20:41.477000 CVE-2022-48681,0,0,fcf7cb340908d491cd75b625cd54b5cf245a127526adf8317a0395aafbd2bf2e,2024-05-28T12:39:28.377000 CVE-2022-48682,0,0,2e52457fc9bbe7887b71e5b817d10f33e0f540cef64c328e2f03240ccf514b9f,2024-04-26T12:58:17.720000 -CVE-2022-48683,0,0,e38bcfb3d1f73c2924ec8eabde0a77fde11f1affc8d526addcf7adf200b81d28,2024-06-12T18:05:40.943000 +CVE-2022-48683,0,1,4621581937065a2132f268979a2992d0d4d1788908ca660df5cb46257e067c07,2024-08-01T13:43:07.780000 CVE-2022-48684,0,0,4f92efa369cdee66d6f53eb185220c289dbd6040fa52ad2a4c427379f363d035,2024-07-03T01:39:07.940000 CVE-2022-48685,0,0,279d877bd3e5e695339d59d1554a8781d3242fb426a6baf3c7acd095af7bbbff,2024-07-03T01:39:08.670000 CVE-2022-48686,0,0,653933df85aeb53741c4da508441bc4178f22de8ca5ed91694baaa41b1db130d,2024-05-23T20:33:45.640000 @@ -213925,7 +213925,7 @@ CVE-2023-1573,0,0,7939398951a41cde776a82a2882d5d2fec4e3bcfafab8a6bab93479600d715 CVE-2023-1574,0,0,bb4ada258e527262ec9c1e564ff1ea3eabd2509806f1a474326cc753548f7d1f,2023-11-07T04:04:10.400000 CVE-2023-1575,0,0,f811fd520e2db6c6e57e3d4509f960ffa8a39e7841c7bdfcaeab3867649bffdd,2023-11-07T04:04:10.567000 CVE-2023-1576,0,0,ef2f2d7ef5f003955027a9696c660724e0afac7b8354b8ee997b1c99faa02c4b,2023-11-07T04:04:10.800000 -CVE-2023-1577,0,0,c829e0278ca472283c9190d9bdf36248f2b554ce7601de1f9a7f265caf3004fb,2024-07-31T21:15:15.423000 +CVE-2023-1577,0,1,9bb7e9613225f2da28f695d89b328a6f22ab7ec97d457b6d0abbc7d77a7f1b3f,2024-08-01T12:42:36.933000 CVE-2023-1578,0,0,6263cebcfb388a666b983b865652ac01e5982368805925e75cfd9baf8b0148b0,2023-03-24T20:59:40.380000 CVE-2023-1579,0,0,8a5351cdb9caa5543c406229031bc98908bc9da8ce9c96b58cbfd6b128ff7404,2023-11-07T04:04:10.970000 CVE-2023-1580,0,0,45d0177157acfe9e834e03f4bd4c6174aac525767ec0c54d75bffa92c7ddabcb,2023-11-07T04:04:11.487000 @@ -215209,7 +215209,7 @@ CVE-2023-21110,0,0,a4af03b6d1e779eb7940616f2ec0892ffff0424e1f012fa3a3b1680014ca7 CVE-2023-21111,0,0,a4afb16c05996e3ce363632322dbccfdc388418e2c0703f93b68dfc840d98396,2023-05-24T00:17:46.907000 CVE-2023-21112,0,0,24627e2080c6192ae973117ae00b8d1e749eab833e8ba360c0f75ca2a322f84a,2023-05-24T00:17:58.943000 CVE-2023-21113,0,0,5c37ad87c9b9d0755705ea4fe1325214a1e2dc34c7f084bb3023bc3e357f4208,2024-07-11T15:05:05.923000 -CVE-2023-21114,0,0,3e2df9d97c140daf83c88d8dfcfaa1f66ada4aa6ce27284c95d2768b9e9d76dc,2024-07-11T13:06:13.187000 +CVE-2023-21114,0,1,268a84550cb557f826f955df0b0d446f649819a3076530ea1e93ca7720d8f1e2,2024-08-01T13:43:10.777000 CVE-2023-21115,0,0,43f09c1405fbb51e77b79e99d92ef767730be0189c23b4932947cc1452326b29,2023-06-22T20:53:57.617000 CVE-2023-21116,0,0,939a8303e9fd647e5e8756ea1f3090461ea1099ea519077c5a838190df77b6cd,2023-05-24T00:19:34.900000 CVE-2023-21117,0,0,239f13c46b78f89ce58a228fa5cce7c2b0a2cbc0f5166e5983f61793a27b1b1d,2023-05-24T00:19:55.867000 @@ -217464,7 +217464,7 @@ CVE-2023-23749,0,0,3878868eef314bce081959309d462863f8892e62305734abfcd08da5f2bfc CVE-2023-2375,0,0,c387a270b44d665a0bba9ab65ffa8e459e023db724a1b3f655d09a7470058191,2024-05-17T02:22:54.347000 CVE-2023-23750,0,0,dd0978f5764167a0d724c16e2cb2c1c19b4ed9298bea49382a7e6f2d9aa060ee,2023-02-08T20:49:34.647000 CVE-2023-23751,0,0,f608c0cbbde0e6321854d03c027f76a06f3deb87ff76fab140a2c9e64a717948,2023-02-09T01:31:41.873000 -CVE-2023-23752,0,0,87f3963d69604ec36a4a518722e590750a7cbd5bf7ac077a5f999a358a2dae7d,2024-01-09T02:00:01.953000 +CVE-2023-23752,0,1,08a2da0e67cb9513dff8bd14a0b5bf16eba08852a583dbd9f9c8c466fd5e87dd,2024-08-01T13:43:17.320000 CVE-2023-23753,0,0,96dae71af5c2d0298f491e1e211bc5097ba519be714653d0f0d0719219187818,2023-05-02T17:10:25.427000 CVE-2023-23754,0,0,87c0248bc7fe5beb50f39f5eeac98123169cde95ddbfe313d4aad2094d896df5,2023-06-06T18:07:07.163000 CVE-2023-23755,0,0,86909a27bffb8de0ff0df711ae982b4916859ce9597256e93fed7cf473758bf9,2023-06-06T18:12:24.850000 @@ -217746,14 +217746,14 @@ CVE-2023-24040,0,0,5c80f3425737eb9c2b8263458aeffbcba717be48c81ae17da37af26dc01aa CVE-2023-24042,0,0,1e23aacaf188164d4587fa922eb964199ced19ccc4c6940095aaf9ce090c3232,2023-01-30T16:40:27.380000 CVE-2023-24044,0,0,a81d8ffe7f8b59e844fc2bd466006674fa58f2c3c0ab90ecb1d3d160c0686cc2,2024-05-17T02:20:10.870000 CVE-2023-24045,0,0,a57c6b9d4a46eb1802eac6cea30f2ffb4b6c920ec56abcc1e8feee430be453e8,2023-03-09T19:35:36.820000 -CVE-2023-24046,0,0,c4c1d65f8885fd60d24fed554ac75300078f3c0453a6d49bebe712f8f8b419f9,2023-12-08T16:03:04.717000 -CVE-2023-24047,0,0,eeb2e8fa50683198fd9ef8346b76c1007a80d6759c5f236ab1a604b8b29cd1a2,2023-12-08T16:23:33.007000 -CVE-2023-24048,0,0,5c9181905a73e1ddafd92886cf7420327c1d45abdc9dcfa759193735e6f1411b,2023-12-08T14:57:57.133000 -CVE-2023-24049,0,0,92c2c195b08d98256d632fe23839f6aaa5d0a164651b89aad5aac7d4dcd01bac,2023-12-08T16:32:19.967000 +CVE-2023-24046,0,1,e43a1667e9e993ee2d36e10e9c1b0cb88114b444150184a8e8a01a231896eb97,2024-08-01T13:43:18.417000 +CVE-2023-24047,0,1,7cddea95290518482ba572ba61ff6ffd7c6d10e232629e625d358672d8d468a0,2024-08-01T13:43:19.220000 +CVE-2023-24048,0,1,c65916b10d06871abd9d0ac9956f07e67def9dc981f6a7ff3893ab568cb935e9,2024-08-01T13:43:20.007000 +CVE-2023-24049,0,1,7f5a544db31b64f02d345fc1dffe034f34858f4164cc81b20851a90cc863a683,2024-08-01T13:43:20.783000 CVE-2023-2405,0,0,ff728851c53b3f2060ea00b935480fc0578d39878ec1030d59b00051e87ad9a3,2023-11-07T04:12:36.747000 -CVE-2023-24050,0,0,2c30bc57b298271eca1b03e17284cebbe78007204383b65c864331c13c44f0a2,2023-12-08T16:37:34.153000 -CVE-2023-24051,0,0,271e55af4da733216aafb91aaefbdd8ee4de9a424afb62cd393bfea909acd902,2023-12-08T16:50:35.540000 -CVE-2023-24052,0,0,c67dc32a6ffd2aa7fe25fa5870e31e5b94fd34575ddeda4c10743892cb77648d,2023-12-08T17:38:12.703000 +CVE-2023-24050,0,1,6cb71a2ecf84e6cab957fa9d560ba9e9056af2ee3a1aa9ba3ac6dfebf9ae2406,2024-08-01T13:43:21.560000 +CVE-2023-24051,0,1,da2566614f35722c2e25d0bc13092f34f4e7cfd99edcf9ae6e3415de8dd3a48a,2024-08-01T13:43:22.350000 +CVE-2023-24052,0,1,15db580f8c37666e0af74cc4da9b778f8a5926c7335bb4c5aa1c8695fde9d169,2024-08-01T13:43:23.130000 CVE-2023-24054,0,0,2a49b721be9be42218a52c6e6c5f5d8c6575d5cc32c6a7365e2ec43afafef21a,2023-11-07T04:08:18.513000 CVE-2023-24055,0,0,0433b5d9ebc83e44e73a229ba56ecf88faa3bc96bbefc459d758a8898d41b4f2,2024-06-10T17:16:11.240000 CVE-2023-24056,0,0,1d52045368780242bfc274a90d6403643f68be30e28bbed6cf526dd0f046b8b9,2023-02-03T16:47:22.920000 @@ -217874,7 +217874,7 @@ CVE-2023-24219,0,0,d568d196223bcd32569b7f8b0a7ae67eb68234370dfadda9c3669eaf83d97 CVE-2023-2422,0,0,07b5d485334b2cbdda5cdc00a618f270e75b2fb69022aad6e96c2e04916811f4,2023-11-07T04:12:40.367000 CVE-2023-24220,0,0,4bd1b194587a8b6f018099d8d9943d3a14ab7b6496806f9980047f34ae961b12,2023-02-25T04:52:36.520000 CVE-2023-24221,0,0,dd5dc742b9af4f1c6a417c4733a73f4840c8f8eccb8715e3eae22ac9394cdc21,2023-02-25T04:52:12.413000 -CVE-2023-24229,0,0,65afe3705edaefbe1e467d4ae8089945d3e0b5b36388c21189d5cc0d5a5bcce2,2024-07-16T14:15:03.610000 +CVE-2023-24229,0,1,670cb8fe0d9595d4513b4b8417e59edad42c8b8262b35ea23af49832ff2515ac,2024-08-01T13:43:23.910000 CVE-2023-2423,0,0,6851869169f054d9d32c9b9d7c713ac839ff73d00ac1f14816584549c35751e4,2023-08-15T00:42:07.427000 CVE-2023-24230,0,0,593d99213bfac73b5f19aa30fdef1e0855530e3bf2519d6f5a57a647b2e91d42,2023-11-07T04:08:21.103000 CVE-2023-24231,0,0,d7400227e889eab9928089a7ad2398b2a8c0b121b0a57eee3af4eb7e4ea241db,2023-11-07T04:08:21.990000 @@ -217914,11 +217914,11 @@ CVE-2023-24322,0,0,283d66ee0e0d60f4090a12407da5fc2969033a313062efc5c83a5f12c005e CVE-2023-24323,0,0,92b11d15308fad93bd22d499efa5ee75e35365737f85c1531d844b8f51c9a554,2023-02-16T19:02:03.687000 CVE-2023-24329,0,0,1b95607613aa9d2188cb23c68e9cdf08ab9105bc3d2499e4cb60d2415b185921,2023-11-07T04:08:25.790000 CVE-2023-2433,0,0,fcefb1d744e2436ca34c1e96068dcbd24fc8579f4fa267fa852ea1937f688b01,2023-11-07T04:12:41.397000 -CVE-2023-24330,0,0,56e1f6cf92613ab5a2a0effbe03d2de3f48938709611d23680629ded605a9fda,2024-02-22T19:07:27.197000 +CVE-2023-24330,0,1,f05bada3541e493f7c0e952b860209e4955262c38b475c09bca0b6c5156aade2,2024-08-01T13:43:24.723000 CVE-2023-24331,0,0,050f04d9bf3b2540619b4f1f79736e1598d2474273dc0664c9e95b1007380a03,2024-02-22T19:07:27.197000 CVE-2023-24332,0,0,3dc5413fe04f67a6663dffeddae7d80e9b7b21d4e8b5ee5e169487a2a60c5909,2024-02-22T19:07:27.197000 CVE-2023-24333,0,0,3802b33c7cad8c386d2ca49a744a79027853ce07a3ef304671c801e3c9a7dcd0,2024-02-22T19:07:27.197000 -CVE-2023-24334,0,0,9de3ec3ca592522a571721a4e87df2fa4a9ea9719535fedf3ae95e96435001df,2024-02-22T19:07:27.197000 +CVE-2023-24334,0,1,6e7ba58a919aa1ee8ff4fce321878db0fcd5ef0e2aebc034e541821e975781cb,2024-08-01T13:43:27.040000 CVE-2023-2434,0,0,a9f172aa8578fb49449bc37bd820ab24b165eed89a9643a4cca796b2ac20b5bf,2023-12-18T15:32:39.347000 CVE-2023-24343,0,0,d251214a0e80bbc1652809830ae45654632b0e128cea4fecfea9ad00cc1f3017,2023-04-26T18:55:30.893000 CVE-2023-24344,0,0,898cc029d561f340f682ae791e85aeeced04bea974336b8dee914944ebfe2c6e,2023-04-26T18:55:30.893000 @@ -218414,7 +218414,7 @@ CVE-2023-24929,0,0,9c086f637575d846a91f44292b28b65e1ede6367d84f4efb5a7781f8f1191 CVE-2023-2493,0,0,4eb26d08dcc086d749191987db488961e77282ea9070088a022b17d882b415fb,2023-11-07T04:12:45.970000 CVE-2023-24930,0,0,2eb8ceca75d7f661b7f1f8ad33bf0bda8866cff243889509e6b7aa4eb895f10f,2024-05-29T04:15:39.970000 CVE-2023-24931,0,0,f73bec59d73794f7a7766a5633980c5f6e90d2ada65f70fba531aeea53872116,2024-05-29T02:15:22.033000 -CVE-2023-24932,0,0,66092e659474469a5ab476b34911d6191194eb586dd4ff07fa23196a896b9cea,2023-05-15T18:18:30.897000 +CVE-2023-24932,0,1,5bb0a6e3729b636081706ede9ef289751759ef16a22687589080197f08416c48,2024-08-01T13:43:29.380000 CVE-2023-24934,0,0,d2f15b349039ac669f3e579a52b741410b10b11f945bacc64c426f3ee4f00543,2024-05-29T02:15:22.290000 CVE-2023-24935,0,0,c47f2aacdf95a620c7a44cd2396a50956d274b1dadd6529acab427618c7818bf,2024-05-29T02:15:22.540000 CVE-2023-24936,0,0,9a33aa50c47228d81e64f1fddb7d492c954cf7816adb34103362d71ac037ef2e,2023-08-01T21:15:10.297000 @@ -219337,7 +219337,7 @@ CVE-2023-26023,0,0,bf7f45eb43f656e5a2c0034397287ee8bde96ac526309a673ae112ef759ff CVE-2023-26024,0,0,db59bc89cdf9d3cbfb06338ac5b62513dd0547a1a4f051c439caafcace4d191b,2023-12-06T18:51:10.323000 CVE-2023-26026,0,0,9d4fc8ae77db69c6c04dc4dd3fae29dc591b099947fecb438ca71d1c94800582,2023-07-28T16:36:20.187000 CVE-2023-2603,0,0,5c2edc4b230ab73934fa6df5aaecfabf8f1a7178b4f82823ba1cf427aa43726d,2023-11-30T05:15:08.800000 -CVE-2023-26031,0,0,3902b54d431c76c48aff7422c38aee796c315f4303fcbb88cee883df45201713,2024-01-12T14:15:47.603000 +CVE-2023-26031,0,1,3c1225c9f1cc3a824a50548b415ab5a795739af789c2ff216b590967c4819438,2024-08-01T13:43:31.307000 CVE-2023-26032,0,0,af212f2a69ef5c68ddf9252c5c4b9157ce43ad804c8bcaafbd8abd209df067ed,2023-11-07T04:09:17.300000 CVE-2023-26033,0,0,4a8f9bcc40c6d30ecba5268011217b91f390fab9d982ebd2cb2fa899f4d8bdb4,2023-03-06T18:54:30.003000 CVE-2023-26034,0,0,6a59187a339a8b8091a5a14cafe0e796e5aacc6a2d2df84b986990630d53d82d,2023-11-07T04:09:17.447000 @@ -219510,7 +219510,7 @@ CVE-2023-2625,0,0,9986d8092e79a4b295b9781284b5a771179624be994dd8d9e9634af08ab346 CVE-2023-26253,0,0,1ae34e99a0e17ae55380be2767abcad6c3e45c70e14babf83d8ba52ebd904367,2023-11-07T04:09:31.830000 CVE-2023-26255,0,0,b27b7b35069d526c2e9439f829d4e01c2c260f85e15fafc5bbc344db5e61ba4c,2023-03-07T22:58:04.663000 CVE-2023-26256,0,0,aa2ee0261488614f69e6a7547b91450ddd75176addfcd117999d63e78467705f,2023-03-07T22:58:26.567000 -CVE-2023-26257,0,0,74d998bcec1464946917f0d7dcf7d55b3deaf54608c78d780d74a49d82d16d82,2024-06-27T18:15:12.610000 +CVE-2023-26257,0,1,11323eea9d7fca81b84f8c01b5b20735f61ced020632048c324944bfeeb7459e,2024-08-01T13:43:31.520000 CVE-2023-26258,0,0,804f159c2ca7b779eb86ae9c413887195bb6d43488842886e7eab1b8ca0e823d,2023-07-12T21:15:08.920000 CVE-2023-2626,0,0,2bf550d326435b40644869bd782ee5ed84a054c0da2a266d5053bc0450601e93,2024-05-21T04:15:11.727000 CVE-2023-26260,0,0,e0d7343dd2a3d0513262019a5afae8509df0404e07905250f93b30521b6d32e6,2023-04-19T19:12:33.547000 @@ -219951,7 +219951,7 @@ CVE-2023-26865,0,0,49e9364425e1e1bd25cfa6d535af08aaffb5e757fb8bbf31873bbc53715a8 CVE-2023-26866,0,0,78c875c9de197b9daaaf656d338548d9974c5f384558397f81c24c9fbddf5fd9,2023-04-11T15:36:22.103000 CVE-2023-2687,0,0,d01327a18a14b94d02b2024144cb95a9bec5e82e54b0639f3bddcb355c3c4b0a,2023-06-09T17:45:05.567000 CVE-2023-26876,0,0,065cad39ce88c02a1fdb45cd02617a29e7f5e05c4318b2fdf4cc695e53f88344,2023-04-28T16:15:09.780000 -CVE-2023-26877,0,0,641eb539dfdcbd8e28c82a840c48acd04c07837faf2a0e3db882f31d27296bca,2024-06-27T12:47:19.847000 +CVE-2023-26877,0,1,c97978ad01dbf888257e5b7ce151c071c1fd1884251bc32f0c0ee92fb383b3d4,2024-08-01T13:43:32.710000 CVE-2023-2688,0,0,af64c2273ea6be79c2a54a86413e9fe8179b7b3de868502eee1f20811eae1163,2023-11-07T04:13:08.290000 CVE-2023-2689,0,0,c485401504d3e3e2125eb30ce2628bed87ada9458d8491f165a81afa758507a0,2024-05-17T02:23:11.003000 CVE-2023-2690,0,0,f0f02c4456094da2b1ed842c57d4a7dfb11f11d2abf7c2e288f204f3b51137d0,2024-05-17T02:23:11.117000 @@ -220547,7 +220547,7 @@ CVE-2023-27632,0,0,7d63548d0abe85e0b0632ab7aaf41f7ead23df0f48603c9db3839cf29d10f CVE-2023-27633,0,0,667915267380321c38091d3911cbba4db7ed7d4486126c4c2e607eb21aee4206,2023-11-30T19:19:27.577000 CVE-2023-27634,0,0,eaa23db8570d1347105bceb81f013c40b227ebf03b3ad9c57e98eb59567f5f06,2023-06-22T16:20:13.857000 CVE-2023-27635,0,0,a170767a3a9745c536f76deaac4974d5bd153d1fb1267ed8ca68c7bf522f58ac,2023-03-13T16:40:51.640000 -CVE-2023-27636,0,0,80b1c1fcf50226ed85a8603e102eb28553f29e8168b0e1284048b055821b20ac,2024-06-28T15:15:03.047000 +CVE-2023-27636,0,1,f14544f873ac09af597b31bc980ffb0b82578abe3013496de32f7bcf6b106cdb,2024-08-01T13:43:34.370000 CVE-2023-27637,0,0,09c54c05a6fc0cdafe1a0a5f17e0b09492affbb7af175f018052ffb34b848c42,2023-06-21T15:58:54.023000 CVE-2023-27638,0,0,4a9411179b2442608547cd54016c6025bc41a8d74d58cedfa7327acf1b2b9c0e,2023-06-21T15:58:51.637000 CVE-2023-27639,0,0,3c1eda8a47206555c299dfbebd4c1eb14d2a6a52bbb717933a2ca5930a4f1dc7,2023-06-09T15:48:23.720000 @@ -220970,7 +220970,7 @@ CVE-2023-28142,0,0,5348d765bbe00552f4b21547eb51331c1961a74e60dddf51d61eea1387e13 CVE-2023-28143,0,0,2930f4b3d1bbeb13bc36a13a085a1ddfe693ee73e55c43efb28ccefdb766d85d,2023-04-28T00:42:51.857000 CVE-2023-28144,0,0,b49d26291a340c49284192a67f5e0647690fc7789846391ecc87683ebe8ecc82,2023-03-20T19:42:14.197000 CVE-2023-28147,0,0,47d7c693d87c0910f05ddbf3504df8d78da2c6e0b3aa172621acd7ad4075afe5,2023-06-09T18:49:06.737000 -CVE-2023-28149,0,0,1b8a300198637b5dadaed2fd8b57c4c5d05a3155e06fc90bec62765c2f0e8b31,2024-07-31T19:15:10.993000 +CVE-2023-28149,0,1,54eb5695c1d32b635259c59e2875aa4fdf397c82ab4ad0a7d8d7cbf5e8ab3121,2024-08-01T12:42:36.933000 CVE-2023-2815,0,0,76d4fb095d100c8b17284725ff901d4cf7fcf13b14aca4d157d2670594f54653,2024-05-17T02:23:17.093000 CVE-2023-28150,0,0,850fc3edb9208c5c3fc18f5aab1f201ee1dd54ebe2f647d8b39dc9133fad1181,2023-03-30T15:44:05.453000 CVE-2023-28151,0,0,f5d1d693289a3ec8b086cdb9c9f5e9b84f5907327ee865cb6dfe9a0e20e0dad9,2023-03-30T16:51:00.080000 @@ -221050,7 +221050,7 @@ CVE-2023-28228,0,0,bd4080c9e5b3de71debe81f1a9427313e2b584b82156c8e8d568853b39d52 CVE-2023-28229,0,0,d393b73106c77024a928a5d4c153fdaa4703474f2bf5e78ca61fbc8245af1a9a,2024-05-29T02:15:28.323000 CVE-2023-2823,0,0,3f6d99a249d1520e9c2b052754f16826e20a7359c56f3d3cef39e392b49f0cd3,2024-05-17T02:23:17.463000 CVE-2023-28231,0,0,ca3790678f841908dd919d2bf5479de4a9a263a361dd73ca499a879eb761c192,2024-05-29T02:15:28.583000 -CVE-2023-28232,0,0,69f47986f72be6b38626a7124792d957c923b57f766505ce0c2ee3c235b3d531,2023-04-13T01:12:56.100000 +CVE-2023-28232,0,1,0df79fe320d39f6ee568fd1f8a9663421c7eec5a2318aa88224d6d65fd765db4,2024-08-01T13:43:35.863000 CVE-2023-28233,0,0,3a0374cc60b0627d748fb073b6b62e987ebb6b3e91f84916b84fdebae400859c,2023-04-14T16:16:22.667000 CVE-2023-28234,0,0,b6f7cb7b270d5473387a63124f03c3f6a400d720ea668854ff4a9665222915c9,2023-04-14T16:17:02.857000 CVE-2023-28235,0,0,18586b4ae503d0d4a653f37b598666ea3ff006b4b2d67ebb572cdbd9f718d908,2023-04-14T17:52:07.760000 @@ -221065,7 +221065,7 @@ CVE-2023-28244,0,0,78a89c9fede5ba3d3965fff00b557b6fcde6843063f318c012679793c7c2f CVE-2023-28246,0,0,ac8da0d51047c0d714ada7216e4b45218778e88b4f2c7eccb6b1fe99b295cbf7,2024-05-29T02:15:30.230000 CVE-2023-28247,0,0,9030fc7aa54853e57a2a82286e2301e68c6db227d9a5ca66c266ae0bd2393a45,2024-05-29T02:15:30.357000 CVE-2023-28248,0,0,805065bec24cde5b3f77c9e5908bc1d62d6535aacbe12a2e9a8f59dd15c1332c,2024-05-29T02:15:30.473000 -CVE-2023-28249,0,0,044cdeaf9a2466585bc4d6a165a8bc2eb10e603f5220825cc2fae2c775b59d02,2023-04-19T13:36:34.890000 +CVE-2023-28249,0,1,536cc86d5b5771e17aac82d098477df64d731614d3405d0de8b3fa9defdcd258,2024-08-01T13:43:36.880000 CVE-2023-2825,0,0,e7343177e21fa4b6613f7594cdbcd7731be297bc45334410a457812e199ab603,2023-05-29T03:52:00.857000 CVE-2023-28250,0,0,191055f89da4f391b3b168e83a2077698e142afb3382ba6927b59f801af33f0a,2024-05-29T02:15:30.723000 CVE-2023-28251,0,0,aed9c0fc1d72e413ea76578fce643fe62f99ba19e5ad204f1e51bdb518d79738,2023-05-15T19:40:19.857000 @@ -221084,7 +221084,7 @@ CVE-2023-28267,0,0,73892fd52fd020eeefeb00dad12985f3201fe8dbfb1f12db287ab74c72f03 CVE-2023-28268,0,0,8b1892f507bb8f2a05bff211813ef9f770d1aa03990efc3435bc8efbfe4458a6,2023-04-19T15:40:30.837000 CVE-2023-28269,0,0,819c8d714bf4e99b9ea63c99a3e18ebf5758b555e96e3adb76c2a69eee006498,2024-05-29T02:15:32.803000 CVE-2023-2827,0,0,c1b638493c48c8428dc8cc9f5d5d699473c9ab02354b028d79b93d11d01b9f5b,2023-06-26T14:08:41.080000 -CVE-2023-28270,0,0,3968468b1bcf771c888b18afc18c19f8c2b2d1741330eb064f082c91578a02ab,2023-04-19T15:17:58.427000 +CVE-2023-28270,0,1,401502288148169c0120d86992de5ccf2e21d9278dd773b2f8ed3eb082867098,2024-08-01T13:43:37.997000 CVE-2023-28271,0,0,e20054a83b2877e4e0806482d6b235b662551e6ea1111f0823c6661ef927e01b,2024-05-29T02:15:33 CVE-2023-28272,0,0,d8a2ce16314851d96eb2d111ab79c1fe29f584ed5dc9269d0c7bf5e80100eaef,2024-05-29T02:15:33.190000 CVE-2023-28273,0,0,5778af26bdca18e6d4cc5929a662d4430b16dacc7af4497d616d85912324471b,2024-05-29T02:15:33.510000 @@ -221148,7 +221148,7 @@ CVE-2023-28331,0,0,a620a7420af012e2197fefbe396104476f490a7f10451478ad621e1b07f06 CVE-2023-28332,0,0,7f453c0b2294d02fc19a8bf7bfa32a5effaf22d60e1b858e89a8cc341c2406be,2024-04-19T14:15:09.180000 CVE-2023-28333,0,0,cdd263ba73d39d67e43868153b27be67dc38b67123627c36c2edd1ed5a4ea9ea,2024-07-03T01:39:50.127000 CVE-2023-28334,0,0,020bbf287cbf678ce94e82c216d690573f97fb53753548627acac36cd9828c68,2024-07-08T14:16:28.753000 -CVE-2023-28335,0,0,d56fa729a1b7969a408e2fc9b6a43ae086e65a0623ca5b6090d736c861dff8f8,2024-04-19T14:15:09.407000 +CVE-2023-28335,0,1,d5755b1d89acfe24f357fab64c5e0ab6061c03f0d410b5de9078ea01c90b1c88,2024-08-01T13:43:39.323000 CVE-2023-28336,0,0,89770e936d682659488b9d02add86334932400f43463a5f6bbd56820126ac2c0,2024-04-19T14:15:09.473000 CVE-2023-28337,0,0,da4c1e5f9246ef2d0f5d00bffd7eb7877f260d7a60a0e1e83a034fde460c18b4,2023-03-21T17:40:15.477000 CVE-2023-28338,0,0,63493945c9afa5412fe9a29c5e88c948f2e03825146c8ae0526b10ba85f56841,2023-03-21T17:57:33.130000 @@ -222270,9 +222270,9 @@ CVE-2023-29578,0,0,f58e4cfe2bbcf81a350d059842ea4d6c6b04838d2651111cf3d4585298dbd CVE-2023-29579,0,0,28468ff69e9a6557c02253ea7ed3570181d5c8845f1afa1cba907ee0ab5a3415,2024-05-17T02:22:27.113000 CVE-2023-2958,0,0,85f829d96608f899deea4dfc15649f90f7aef4944e1dbf6338c275a5e763dd22,2023-07-31T17:46:45.333000 CVE-2023-29580,0,0,6dcf1674dbda7f5e1025e60d0e9fe8e3ba7fec96d7027bf837157aa4720b4ffe,2023-04-21T14:52:34.300000 -CVE-2023-29581,0,0,191da2ffd387fca064afbbd65bcc1e3bfa7f52ee0c8a4afc777f1d480719eb42,2024-07-23T15:15:03.180000 +CVE-2023-29581,0,1,4436e215e1ef98b1952daf2d14281bf9734f0320cfef30e892ac5301398cd7a8,2024-08-01T13:43:41.360000 CVE-2023-29582,0,0,3804170943994ec102d49d2f6ce51e0be5c75778178b33a939af6fa77d114ee3,2024-05-17T02:22:27.343000 -CVE-2023-29583,0,0,bc016245907014284b4cad7297e49fec4175de71ef513e961e881c519db255d9,2024-07-18T18:15:05.047000 +CVE-2023-29583,0,1,1d4fcc3f69959cc92e6cce35b4dab1cfe1d9db22d257b76b3e65d07ce6f81740,2024-08-01T13:43:41.557000 CVE-2023-29584,0,0,831cddac2cd925bf62dea9fe091ac0aeef558699a444ef91f6c61edb2e4d84e8,2023-04-19T19:28:11.347000 CVE-2023-29586,0,0,097f81b5832a610c1acc08ddf20d8a47c2434463aec8a06fd088e4aeba55ec12,2023-06-21T14:15:09.833000 CVE-2023-2959,0,0,fc516d320d591e34a70457ac565a726c0e1cc127af4535e801c8d19c3defd463,2023-08-16T08:15:41.177000 @@ -222392,7 +222392,7 @@ CVE-2023-29818,0,0,7568a2981286bb1c12e01c3c1e7cbec7d2001841515481446b9dd8205b216 CVE-2023-29819,0,0,a92bbc45a194f9170973fc9fb7fcc0d1feebd36b7ea7db6763d08eb3d46e4218,2023-05-24T14:15:28.837000 CVE-2023-2982,0,0,2a122bb8c503401a5fdcf08727ecace015e18a2434fc3c2b60fc13babd3f77db,2023-11-07T04:13:38.480000 CVE-2023-29820,0,0,de34abf1150eff34220e0a768afda6f9237d3cab549fb65091cf8211c6a55ac3,2024-05-17T02:22:31.460000 -CVE-2023-29824,0,0,04b9071ebee9cc16a0ecfbfd0d810f78d73d1848527d593c80077f47354125f8,2024-07-22T20:15:03.313000 +CVE-2023-29824,0,1,0d20d6bceb67ae1dbf965ca4aaa13a223563785a6dd390915645b4a1f6d8c877,2024-08-01T13:43:42.387000 CVE-2023-29827,0,0,ec2d2e383e2de357f253802db98612b7906334c7ec113772f043dd3f78efd678,2024-05-17T02:22:31.660000 CVE-2023-2983,0,0,b83cbc9668684a51bebc9e80b9f51566fbdd51ac8a49be51e383dd26307b38d6,2023-06-05T18:04:44.993000 CVE-2023-29835,0,0,f702c6b414fb53fc9de6e4bbd4b0df7a732a4ca1834f843392ece5bed5f78913,2023-05-08T16:22:23.493000 @@ -223238,7 +223238,7 @@ CVE-2023-3104,0,0,d8b14e81e2189f7d00f11efdbf51362c63da456007caee04e2229572a4fc19 CVE-2023-31041,0,0,d3f74113b8e24fb7c0c0ea099f9f16d14e383fd28713189dea1c7477de7e468c,2023-08-24T21:26:16.843000 CVE-2023-31042,0,0,e9e4089fb29b1dd553ccbf7459726b99b949b96ffd3c665020bf1be4ec17b111,2023-10-05T15:46:26.893000 CVE-2023-31043,0,0,7966c380c4ff52ef4c652dd5937ce2c7a47f54de433713bc1d8968bd78e2e74d,2023-05-02T17:16:27.860000 -CVE-2023-31045,0,0,07ddac83c1a400a29b3aed35b990bf6716ec01a2419808722bf5b039f4e6795a,2024-07-18T21:15:02.370000 +CVE-2023-31045,0,1,ca118c244817af38911005f7a41e32a9f49f3e2c08f443e6b738be1d373246e2,2024-08-01T13:43:45.363000 CVE-2023-31046,0,0,896ed8272cae6e4a49b645831705effa351f1140f72a933ffff1f7a3ea535912,2023-10-26T17:14:53.670000 CVE-2023-31047,0,0,799c27446196896a2155b4ff736d0e4c98fa4d3a17dd14303b0af7537b3e601f,2023-11-07T04:14:10.440000 CVE-2023-31048,0,0,aaca7c9df3199789e78e095ad636c1fd23faddd65351d96699b3887b21e3cb79,2023-12-18T14:51:21.633000 @@ -223550,7 +223550,7 @@ CVE-2023-31477,0,0,c2c6a564c8404b0f07ebbb0e6d06104f00d0f461e1b81293c91fd546e5da1 CVE-2023-31478,0,0,47da0bc6942fc79bbf1327278c16a6ba0dbdcabe3a6fb386a1020a9a46d5ac6c,2023-05-17T16:04:19.150000 CVE-2023-3148,0,0,a4041e8e9ba71404f7fe5df36c91f7b9ed4082cfbffa6b02fa6f815b6e4142a2,2024-05-17T02:27:18.530000 CVE-2023-31483,0,0,03bc6d1105706bd0ee7eefcb5f2ea4a5a050d1f9a6e64edd23b68249219a19c5,2023-05-08T17:16:37.827000 -CVE-2023-31484,0,0,3f4cc0b7749dc72318dc0839045b13d7e102e55cda08a386a860020a2bff1e1c,2024-06-21T19:15:26.850000 +CVE-2023-31484,0,1,2f36e5a6eee8487579729341cc3b1024b7965d7c870d80eaf8f322913cd020aa,2024-08-01T13:43:46.380000 CVE-2023-31485,0,0,1a8d48529569d0dad5b8aaa164be5f4d91596c1d315bd5ce5e381764248be163,2023-05-08T17:07:50.933000 CVE-2023-31486,0,0,98315401afb0949e35761901d2a78aa37f15e6ae4c35c39d54e4a50bd48bf6d9,2023-06-21T18:19:52.937000 CVE-2023-31488,0,0,9801bb6a67551145e78000f85eca575b3b4bb03095ba3825a2196ff67daf17dd,2024-01-19T17:50:52.807000 @@ -223838,7 +223838,7 @@ CVE-2023-32017,0,0,8ad87647be090f9e17a65c54798beb768a7c4a546f649bcaaf0eb733f73ef CVE-2023-32018,0,0,d47f74312a63ee8ccbed039935c2d21ed9b3b005d01c108a0098d8e4aeeb0f39,2024-05-29T02:15:46.537000 CVE-2023-32019,0,0,7dbbce8ebfdbf4919d5e3161e601e2b15e1e647ac819a5f83f01e649384b59c9,2023-07-05T17:15:09.380000 CVE-2023-3202,0,0,495a19800e0476cead479990b05091c0bfd02179ae08a3b0a65b81f03f2436ee,2023-11-07T04:18:12.800000 -CVE-2023-32020,0,0,7092486d1a3862015eeca67f3c17e283f8e383a9577ec255dcaac6db4ccdb25a,2023-08-01T21:15:10.937000 +CVE-2023-32020,0,1,2f714641d665d97bfa9502ec5bc265fb46736576b6bff3682bf835ab2892dd7d,2024-08-01T13:43:48.313000 CVE-2023-32021,0,0,f305d14d53ad29ce117f28b38ad4869a7668c120321d0844a2b27e389e4ed0a5,2023-06-21T16:59:35.310000 CVE-2023-32022,0,0,1d1ccc054d190f4ca35214724e6df0b127fcce3523a6dfc836396131a5184b81,2024-05-29T02:15:46.770000 CVE-2023-32024,0,0,e20ba2f6e5b86584daf9bec7a309eea2f7422dd323cb196316a55d71a14d1e60,2024-05-29T02:15:46.893000 @@ -225204,7 +225204,7 @@ CVE-2023-3357,0,0,600350ce8cb54d3cd472e5c55fbe0564cc7d45cade0900caff64a5b44a2568 CVE-2023-33570,0,0,9f2846f85e3716647871afc65ae46c02368acab156056b82c3fabd74ffe466ea,2023-07-10T15:53:05.990000 CVE-2023-3358,0,0,12e8757394b39f03915a68fdab7c57a08d2dd1a06e5f61eff9ec3fcd54fa4870,2023-07-06T16:54:55.357000 CVE-2023-33580,0,0,b896a7d26da1c4a99df4635960a09e8061b54d8b1045b27b06cfff27cfdd8bba,2024-05-14T13:14:08.210000 -CVE-2023-33584,0,0,e2bc8eccb7300023e61f1093bf62e96cb853d7191577d1080d6ad167bf503b59,2024-04-22T21:15:48.840000 +CVE-2023-33584,0,1,a1f261b95d9793aa4dc94db58be1fdcb1978b62cb448302d23854fb5713a34a5,2024-08-01T13:43:52.090000 CVE-2023-3359,0,0,7f349026bdb808074eb0d523a222b94708cd05b6ac1c81f8f322d6dac7c8427f,2023-07-06T16:56:35.407000 CVE-2023-33591,0,0,6954bee932d8b941e70bef242e7fc267053992ca325a9cd1ce96449a755b6a30,2023-06-28T15:47:35.893000 CVE-2023-33592,0,0,7c4409bdba2c84ea3ca29a0763e3041ef6a52fd88856d82842982b89ccd016b7,2023-09-25T16:46:20.430000 @@ -225342,7 +225342,7 @@ CVE-2023-33799,0,0,4345f958fe1f7c80a86e8c5eee47f45d4c6e2e354affba51d59217f6f28b8 CVE-2023-3380,0,0,c08194d14feb107a13211c736e570dbeedc2e5b353b983bdd1dacd3569a2c251,2024-05-17T02:27:27.863000 CVE-2023-33800,0,0,4265560a058e8e22718cc709f696040891f58adec58a76dc8a7228ba841d303a,2024-02-02T13:54:55.517000 CVE-2023-33802,0,0,2ad6e1e35d9f462c0f74c99bc90a396350631fba295c1c8c8bca73a81bc5fe38,2023-08-01T20:51:21.320000 -CVE-2023-33806,0,0,fd612822dd3cfa2503c93a20de1162532090894a3552799c13f506b995bdf109,2024-04-16T13:24:07.103000 +CVE-2023-33806,0,1,f40c09cf97cbf92293a4fb2695cdd6e2419af5b714cfdc58292eb1582e80f587,2024-08-01T13:43:52.917000 CVE-2023-3381,0,0,08bb79c300c0e6b4810f2ea3ae93353c136b944ac951151bbaf56b05d4a38aeb,2024-05-17T02:27:27.977000 CVE-2023-33817,0,0,7d2a36a895391e5556d150e9870ec018e588dba8d89f3d31183f528fb957da72,2023-06-17T03:12:09.227000 CVE-2023-3382,0,0,7523fb1ab5a6e38772209aafda64ae6b107a7d22748c7afae7586dda38d607e2,2024-05-17T02:27:28.100000 @@ -226260,7 +226260,7 @@ CVE-2023-35073,0,0,91676ef9234413c20056267f1b23f3fc91186085c28bf58d620ac435fb946 CVE-2023-35074,0,0,d58a8202e17cd7a12f29ed6859b3917f02407a9bc5152ae0eeb0054421c41e82,2024-01-31T15:15:09.530000 CVE-2023-35075,0,0,ebcab3d28a8e7c4667a16294ef19344a35e265b6dfa6a760ddae627883a43a6b,2023-11-30T21:40:10.447000 CVE-2023-35077,0,0,715f6f37b33d732493bfc6262341db0fa1f7bfb938ef4a9f6d6bac836796033d,2023-07-31T18:49:27.270000 -CVE-2023-35078,0,0,d43d89ba567fb23cf44a8a550495dd86b72531482d6abc59de76c93a84817684,2024-06-27T18:52:14.877000 +CVE-2023-35078,0,1,20be717ee35083482bafe6d196c2ea261801042a6e57124b690c8aedf57b1977,2024-08-01T13:43:55 CVE-2023-3508,0,0,67a5fa449334d332748f548336efebf425a6709217f758de2ebf60309ca83efd,2023-11-07T04:18:53.553000 CVE-2023-35080,0,0,86ffc1a18fc5ce5bbe75fd294f3b585b06a8e33da45cbcb66a2f181f1d87bd81,2023-11-22T15:08:08.207000 CVE-2023-35081,0,0,190a14316cdd4c0117df1975a28c315ccaaf42100f3cccceffce7474e081f95b,2023-08-08T20:25:09.337000 @@ -226288,7 +226288,7 @@ CVE-2023-35110,0,0,043126565ba92b799922dc21a666a51dc02a5e55cec8671f1918a11125e5c CVE-2023-35116,0,0,96f528c3f7db948c532f4943e72634d9206c11caf82ea5d24b0276082fcf325a,2024-05-17T02:25:19.373000 CVE-2023-3512,0,0,58a90cb0503d94386708542ccb6b4adc9e09d521b27214f02600c9850e42ef20,2023-10-05T17:04:39.053000 CVE-2023-35120,0,0,6895e39ff5bab21e029090538770a48239c04f9c6dde5269a05290c7022cf178,2023-07-13T22:50:44.740000 -CVE-2023-35121,0,0,921329fae3370c7694119f1680e892e107f3c63ec457cfe8d5c2d41c09c4c203,2024-03-28T15:15:45.453000 +CVE-2023-35121,0,1,b87aa1ec00565595ec40c7793f61aa774ec970e08df90d0377ab3f2f916bc38a,2024-08-01T13:43:55.757000 CVE-2023-35124,0,0,6fe26dca916d74e52176eafce890edd463abecf6fd8d73a92bc44bb20d4ab697,2023-09-08T17:28:28.417000 CVE-2023-35126,0,0,86a166d77ee66a1bc7607bd0151fa4e53b10a3c6c74d4db7a6362ffcdab64414,2023-10-25T14:48:30.890000 CVE-2023-35127,0,0,fc09279127afb5d782b884fbeceb55e1fb2620ca1f455d815c0b1a4c419b2935,2023-11-30T17:24:26.147000 @@ -226713,7 +226713,7 @@ CVE-2023-35857,0,0,f2b8c23dcf2ef59e1b311ee194e1394166df8dddb30e8fdb03398275652c6 CVE-2023-35858,0,0,89c699311d612c7ccd45b078a0938d7b347412bbf450f40451b911ac3920f103,2024-07-03T01:40:22.063000 CVE-2023-35859,0,0,df6e84f60c7c99a8535f13f340a10e418aedf1e96b48d6f41c28821d78412a80,2024-07-18T17:07:58.540000 CVE-2023-3586,0,0,430c7b5dcfbbfb47c2d74e9630adf8e67c7d24822ed2779c2105b8046e11ad8f,2023-07-27T19:37:49.247000 -CVE-2023-35860,0,0,e6b959e60532901e9e7ef72d5b76e2b5dc1f358c76357516d32bf0d40c5c8013,2024-06-13T18:35:19.777000 +CVE-2023-35860,0,1,971e6977b870b170f08db1213c0bf77cc56a76241b44122b9d0458cde29cb937,2024-08-01T13:43:58.613000 CVE-2023-35861,0,0,8c3e62ac4c86d149a4d1e92dbc7340486be92e4a5090ccd8793a32643ab1b13d,2023-08-07T19:19:25.817000 CVE-2023-35862,0,0,e6fbfc8e5f675c408dfbb80d0fd994d3d13f183a8cb3f3d92b741db786947d3a,2023-06-27T12:50:18.327000 CVE-2023-35863,0,0,cbb3608b436941ca40fc8a80428d35db8eb42f5a5a45f413b4802ea90385cfe0,2023-07-14T15:43:56.137000 @@ -226912,7 +226912,7 @@ CVE-2023-36089,0,0,b388473e1585af74095a3b9207d75d367c0cdf899b7998b91f22de8cf8f2a CVE-2023-3609,0,0,7269dbbb1cfa33112c6b43a3d80eb6d6a13af8ba32febdd289ce46d0045ac320,2024-01-11T19:15:10.430000 CVE-2023-36090,0,0,68e4bfc22ecb09ec9dc4263dc55925c645da8ad3ef0086c94eb0af429e5544c1,2024-06-05T21:15:11.203000 CVE-2023-36091,0,0,7b41b7d4bac075f0b475f04d1db5fa3dc3641b28d8a6126230c2e94bb02a74ee,2024-07-12T16:11:14.523000 -CVE-2023-36092,0,0,6b9e9a4dc0be64102444d151bcb829994460b1a79bc2015634e4066d4d934096,2024-07-17T21:15:11.233000 +CVE-2023-36092,0,1,feee39eb86c0d2ff4310afef9dfa4161ddd45a347682ece48f73ddd260f136d3,2024-08-01T13:44:04.543000 CVE-2023-36093,0,0,af28f3bc24d287796fa0b8a0aa9aca2283ae01a5b1a3c619056cdf2ebc93f0b0,2023-06-28T07:22:21.237000 CVE-2023-36095,0,0,ceab2a6fe5ff376a689e3efe372405a2a8939b96d91fd88ffa7233875163d234,2023-08-14T18:15:10.927000 CVE-2023-36097,0,0,d69938fc728da34d8768a0c5fff74b9f5fdf3c3a2579ad3f611d775612b7514c,2023-06-28T07:22:39.250000 @@ -226989,7 +226989,7 @@ CVE-2023-3623,0,0,b7e005d2108946324b70854d6e6512dec19207efb016ca6236bbfd3c4cc4d3 CVE-2023-36234,0,0,a6663c5e30d395d561de90ff52304e2332618ef3efd52e81ba511c2a86f4b525,2024-02-02T13:54:55.517000 CVE-2023-36235,0,0,2b3e9f7f5a236420091fd31c65ef906ea1e1aaf195bca8c8a6de6ca143c608d4,2024-01-24T18:17:24.737000 CVE-2023-36236,0,0,ade1bae37fd3ff6554ed23e3d36bf0cd03d785d03bf01ee620f45df074ef7926,2024-01-20T18:46:09.557000 -CVE-2023-36237,0,0,6d09432d60c843801686599e683f50d4b75909aa3b208085624d16b8bef1cd4f,2024-02-27T14:20:06.637000 +CVE-2023-36237,0,1,6cdbb2f4f772ed3466812b89bf4b43296dc4e2767eadf62364857699c4da69a9,2024-08-01T13:44:05.510000 CVE-2023-36238,0,0,7ed6618423a7f958c81af0b13eb3e711f180845a0e762bb21431ed5bd6f8cf50,2024-03-14T12:52:21.763000 CVE-2023-36239,0,0,cb1f60977bb0e88b80b7a994f098aa5fd0277f25f00d533d6315ab66a3a92dec,2023-06-29T20:58:32.827000 CVE-2023-3624,0,0,2359737609e52e7bb8e66c413ea0b9e9b9a124a75d3e344a359ee48efb51b316,2024-05-17T02:27:39.323000 @@ -227038,7 +227038,7 @@ CVE-2023-36315,0,0,b89c25168c0676bfb15c084abdd263ec1cd51e0be09e61a50ddf301b32777 CVE-2023-36317,0,0,959958d6cd7826ec8d0c7b36c6aa635daf72c03ab85bcabe975e4c423c67f2b0,2023-08-25T13:19:43.420000 CVE-2023-36319,0,0,4f2f9b43de4f619c1ecd79d747be40d5cfa224891e28131a7aa2b697e390ee2c,2023-09-21T13:20:09.453000 CVE-2023-3632,0,0,c0b2e40cbda3f2ee6107fd6d29665ee1a2dc274485d787cec90bc7cd79e0d9ec,2023-08-16T08:15:41.550000 -CVE-2023-36321,0,0,ed317670abf2a25adc524d2905730cd3b61e070297bf2d65be9253d30fd65883,2024-06-27T18:15:12.750000 +CVE-2023-36321,0,1,3a757d1927b56aa55826750e72e53ed68bd81a53376818344594d48da7b7b82d,2024-08-01T13:44:06.490000 CVE-2023-36326,0,0,ded9eb90a8ff10548777c4348acf8633173a5fdf3caf961f9c4181c6b713fc5e,2023-09-06T00:04:24.377000 CVE-2023-36327,0,0,7eeaf1acc33373866f4ef20f13e035096e985e7a884ec7a542b5579b42a728cc,2023-09-06T00:05:15.863000 CVE-2023-36328,0,0,2bcddcad90867d8da646da5264dfa03e8941e4a150d5759638d15ecb3a68202e,2024-03-07T17:46:02.277000 @@ -227310,9 +227310,9 @@ CVE-2023-3664,0,0,d8388918372be3a81c378ee664fc6b79ba827d9ef7ac30a75481759294dcd8 CVE-2023-36640,0,0,e20cc3aa95df4590c21babf1ea93621e3ecc1f2cbdfd6f4d2eb22bcd2e861ae6,2024-05-23T17:46:46.207000 CVE-2023-36641,0,0,065ff0dd7cc8be6a70d90c7e06da150ed8b811a91b8d049fa33f5d755afa6446,2023-11-20T19:59:59.920000 CVE-2023-36642,0,0,28af65fcbafcf444e491880f1a78d89af4d834345108ae6cbf598bac2d1e35b8,2023-11-07T04:16:39.923000 -CVE-2023-36643,0,0,9470219eb6baa4e8ede6b3420cbd4450e2d20135646c9df49b63788ad06b4104,2024-04-04T12:48:41.700000 +CVE-2023-36643,0,1,58c9475ea0b9b85ea5625584c110cd8d6c77d83d24ff3fa17132192b33f5a00c,2024-08-01T13:44:07.637000 CVE-2023-36644,0,0,8f3f3d48331dbbb9642b53d08a78b2b91ac58c75f0d92365d4d998ec9c1a7066,2024-04-04T12:48:41.700000 -CVE-2023-36645,0,0,85d1a64960bd9eabb4ba907136850abb93ffede4ad2c2c177ef3b8e123683c54,2024-04-04T12:48:41.700000 +CVE-2023-36645,0,1,44848f2322dbe9e6efe5ab05a859b18a170a015140d660f0d42532943322bda9,2024-08-01T13:44:08.367000 CVE-2023-36646,0,0,98d9abc88bba069e5019b90b6fba014418ed8e1ff04a391fe00b4e79ce9346e5,2023-12-13T20:38:27.083000 CVE-2023-36647,0,0,b9321e695ac9d6b9e445464d228900e551e18e03ed55bca5a684c98f8a367a1e,2023-12-14T00:03:46.357000 CVE-2023-36648,0,0,234415d967f7bc889dd0c050eb05351ff93a40f095c878a027d44f699b2cb9a7,2023-12-13T23:38:17.737000 @@ -228003,10 +228003,10 @@ CVE-2023-37530,0,0,698b20f24058dfdf4b1f85c1b2f9fa7e2e3b73d944d61ef5a32e23b7f6862 CVE-2023-37531,0,0,f46d4ec810c498998623d2f2468f508fd051e8530d6bbc08c3538185e07a7762,2024-02-29T13:49:47.277000 CVE-2023-37532,0,0,53802fca89a130b308643acadc6fba939e339d7beb6ba5b0975ca2b237a497bc,2023-10-30T19:56:22.573000 CVE-2023-37533,0,0,eb144dbf2a9b9d155fed727d5020377f76e570c49e0c0dfd1b7b7b536433e87b,2023-11-16T16:44:55.610000 -CVE-2023-37536,0,0,a79d539b51900fccccd51cdee5d9dfbf26476b943f0bc63161781bc2b856ac87,2023-12-31T14:15:42.080000 +CVE-2023-37536,0,1,041c08821769409935ca5937c8769b2af5312006e40977fcf70ba662eace5ac1,2024-08-01T13:44:10.753000 CVE-2023-37537,0,0,668cc4ef2c3bedcb9b7aa5291e0f510eb017eaeea4f2121c576d9316ffa36c48,2023-10-24T20:39:25.043000 CVE-2023-37538,0,0,f5df475d23358809f10f5b875f0df5f89b50359fff9cbc4fc2e3d043623902e2,2023-10-18T16:40:26.580000 -CVE-2023-37539,0,0,af83f3051fad4eecf72c32325ea0578a1e5f9e3ce7a0329b2e09b53dc87ffafe,2024-07-16T14:23:29.953000 +CVE-2023-37539,0,1,f5ad991a7235d53d7ad3dfd48814d5d4b1c8314c1332f15b8949db201edbc6d7,2024-08-01T13:44:11.527000 CVE-2023-3754,0,0,d95c87403c07b6b3b86b9c0ce13879a940a365f1d4e03f0ab922c08265afefbd,2024-05-17T02:27:45.643000 CVE-2023-37540,0,0,962bbe0cfc5a67c187be958196b7a18f4ae64844343b376ce6821aabeb2da944,2024-02-23T16:14:43.447000 CVE-2023-37541,0,0,6314f70ea3d9ed9df64f396a902819101f3cf8e0c36275d42758ab7df7d6185c,2024-06-25T18:50:42.040000 @@ -228368,12 +228368,12 @@ CVE-2023-38031,0,0,8e4403b504c38638929f6b6c72e890c80b5a2372f26ff7861e3a8cd91c561 CVE-2023-38032,0,0,ae5b58cc1d1ada4aeb5960a117fb81960770410012e25cdf5e7d1e7e1cdbd51f,2023-09-12T20:46:03.037000 CVE-2023-38033,0,0,d4cf406db2044059b29e0ed13892e84ec2f44bccf03c2a0c8bb05188b0ccf83a,2023-09-12T20:46:11.303000 CVE-2023-38034,0,0,6c7e5adaffaf03f1fce5314cb5967c3667b119a4fd578cabdd54450ab0aa1904,2023-08-17T14:42:06.533000 -CVE-2023-38035,0,0,55ff08b9c715dfc143540aa02d2b9a4bb49461e2a5648937614477a80ae16d12,2024-06-27T18:48:42.510000 +CVE-2023-38035,0,1,7459236bc90eaa2074e400c67dee3fa765e6f764f816ff04e8c87a9d637de6b6,2024-08-01T13:44:12.457000 CVE-2023-38039,0,0,b16042e1ff4c30029c2b843531b4deb953af50e45659a3ed6f52ab46f077bdf6,2024-04-01T15:45:33.510000 CVE-2023-3804,0,0,bc020934a9698e595df6fcf07709fbbf204012de06d44e5cbbab7c1d018b0e6b,2024-05-17T02:27:49.553000 CVE-2023-38040,0,0,9631390f3fc54131cda3a8bccee0cca2bc55fe6732953e8c2f01c88f572abe9f,2023-09-20T15:42:07.227000 CVE-2023-38041,0,0,eef83f917c15867b79b9ca8b1f963e2309f7f819879f76cc19de29d682bb3de7,2023-10-31T15:09:45.307000 -CVE-2023-38042,0,0,008492264f79b47bc4dde2a8e077113973f7fdec09cefd163a4a57fb2e3a383e,2024-05-31T19:14:47.793000 +CVE-2023-38042,0,1,0dc89694d4f9448810544a87cc141464abf53a4d4a4f8475760f11b5e224c593,2024-08-01T13:44:13.283000 CVE-2023-38043,0,0,a64fa74670f6e3fc93036e01f2a3957eac36a32fd2044f2ba6af63ffa7bad83c,2023-11-23T00:15:08.033000 CVE-2023-38044,0,0,613f8e965099524c58b0cb42029f1834804933c7c226667c86ecb66c34fd3732,2023-08-09T17:51:49.967000 CVE-2023-38045,0,0,38944f3aef59a7696bb5a4fc08703f072edee60de8f7a0ffc8f42e5076d014b5,2023-08-09T17:51:59.253000 @@ -228531,7 +228531,7 @@ CVE-2023-38192,0,0,5755bc21be5dbcbf891999de847b69099a525b8e22877fa8775ef79d05e5a CVE-2023-38193,0,0,219d2960e9eb59689a29debc73c9bfc5cee8bebe6896245138dfbbad9eac1137,2023-10-28T03:45:50.750000 CVE-2023-38194,0,0,8c993663e258e9ac57ae0e4beb71c1034d75ce8b175a7e7ca583c65976fcd210,2023-10-28T03:46:10.970000 CVE-2023-38195,0,0,ac7335aa25479a7dd88f899b99964ac13bedb4fdcf3229997e38e24ea509f7f8,2023-08-01T13:46:25.913000 -CVE-2023-38197,0,0,e36ca5b03ec4813f349ac7dc190b00c08a9a93b72f68658bafe4ce37c7a64bba,2024-05-01T01:15:06.277000 +CVE-2023-38197,0,1,93e9b21d96cef7b071fa0630850b9280527ecfc7665ffdaf5c1a114441ea2e90,2024-08-01T13:44:15.063000 CVE-2023-38198,0,0,ef85054fa8438ac052ba4f57fa357877b346d9da7c1f0a600daa0dbd6e8d65a0,2023-07-25T14:30:35.337000 CVE-2023-38199,0,0,de8ccef5dc614aba2379b7e9c3a48813e945a782bdba9395d21885285c35e7bf,2023-09-05T04:15:09.017000 CVE-2023-3820,0,0,50a7cdeb81a8ee17bfc09e7fd0923a7a55a57c37361f22e37bdf60ce60965064,2023-07-26T21:27:15.650000 @@ -228845,7 +228845,7 @@ CVE-2023-38519,0,0,6feaff72ade735a2704fe8b8d9fef165f38317b422d397afb665c1d949162 CVE-2023-3852,0,0,2e1924f99097894c16104baab278a5a9ebf2db30430b465cf669815f850b7012,2024-05-17T02:27:53.627000 CVE-2023-38520,0,0,197a50cf0e44468d0337f27c399e1eb786a843546ac6c93f4b96fc50b52947ed,2024-06-04T16:57:41.053000 CVE-2023-38521,0,0,db18a9cb610e915922179831c59c7c6fe34d72db737eedb8a3400ffd344e745d,2023-09-08T06:42:06.290000 -CVE-2023-38522,0,0,2c9794ba80d8014cc4ac6b02261b562971a5b739fce6fb17b793f9a8023d9c76,2024-07-26T12:38:41.683000 +CVE-2023-38522,0,1,50bf829b6b52038bf2d38c0b1bf32c25623a47f6d9cb7bc81bbf82c6ef10fb44,2024-08-01T13:44:16.693000 CVE-2023-38523,0,0,4aeddda5cda4b987f05bc442064079c7a51cd36ed6a7d399ee18b0f7f42fa30b,2023-08-01T15:24:35.470000 CVE-2023-38524,0,0,c9e82639b2360f7e976dd3c089d1e601c218712b31ea68380c38a40a316e9b16,2024-06-11T12:15:10.860000 CVE-2023-38525,0,0,a4b40a45af79e11e4c16594d15803bcacdf8a6cc50b68a023dfce812a89911bf,2024-06-11T12:15:11.073000 @@ -229183,9 +229183,9 @@ CVE-2023-38941,0,0,1e1bcd179f872e35a8928ee921ca22ff72d442a73f2b7af7bd6b466055edd CVE-2023-38942,0,0,6f005f6e840b09796632754d285cd402b68e77792b4af4d3af0fa7e97c65080e,2023-08-14T18:40:24.287000 CVE-2023-38943,0,0,1d6e8b0ca705baa11d68ef0a995ae67cd6dd1d27d4ad115cf35db0b2d10a2f29,2023-08-09T17:16:40.333000 CVE-2023-38944,0,0,c051db4326b418193fc5c261961befe70f746c5374ed8fe4bca54114943329a2,2024-03-06T15:18:08.093000 -CVE-2023-38945,0,0,5e95c9f22ba804683dfcf6708c2c65daa1140e38fb5895bdd0b0c5e4bbdee616,2024-03-06T15:18:08.093000 +CVE-2023-38945,0,1,b3443492f84cec4ac4dffb7d4608c3ecaa5fe5f2b22d0a972664663aaed158e3,2024-08-01T13:44:18.370000 CVE-2023-38946,0,0,151228275f9811254ab62028e457be29c69ef82c0b6dea78d5f804e8214b4750,2024-03-06T15:18:08.093000 -CVE-2023-38947,0,0,c9b8f5b09e6eeaad95d956984df339992f3edef13644e0e7074f9fe1bf4e9a45,2024-07-16T16:15:03.893000 +CVE-2023-38947,0,1,005c7add3837054ed831ef7b615204f6da8a70df53969f423ee6e7fa00969cdc,2024-08-01T13:44:19.173000 CVE-2023-38948,0,0,ce73ed126bacc008ba256f8918902da058696f3c56092748dddb6e2fa671076e,2023-08-08T20:53:51.983000 CVE-2023-38949,0,0,972fa1585eeb1ea8e6d89004d5ac41af50810d8d7501416905994e65b77c254a,2023-08-08T19:02:37.480000 CVE-2023-38950,0,0,b5f91b3c6a0a0c1541b72408cc5705c673329bf254f2bc92a536c9a6c449d2b5,2023-08-08T19:02:30.850000 @@ -229750,7 +229750,7 @@ CVE-2023-39662,0,0,6a96c2885efd4488974a44c495d2a61deab6c037ecc3a5054b69f0381f46b CVE-2023-39663,0,0,c81411776dd631db4718deddbb94a9b60fdc2349e6e9df63a670a849ef085cdf,2024-05-17T02:27:04.853000 CVE-2023-39665,0,0,cd7d638b307c589eef3e2d51997979d09edcd662dcb928cf0c162bd3bd32cc7a,2024-05-17T02:27:04.943000 CVE-2023-39666,0,0,b47ffde7bf9263b550160f8979d458bafbd5f8068e14a66d218c6fe0c396a4e1,2023-08-25T16:15:17.530000 -CVE-2023-39667,0,0,cfce55194c22837792ed6996c65e4bb2b714c4452c349a4f2341046b8244d421,2024-07-26T21:15:11.823000 +CVE-2023-39667,0,1,d3c1123422df45f4c82b46b6fd888c1bdea71642d69ec071989cd7f191cd451f,2024-08-01T13:44:20.820000 CVE-2023-39668,0,0,2cd590dbaee1155a1d67120fb80b5a7d90e2016fb8d3f07d6154503ab710615a,2024-05-17T02:27:05.173000 CVE-2023-39669,0,0,8c910f0746e632a02dffb54009bd483909e260c24712bb69c8064c85878a7482,2023-08-25T13:42:37.727000 CVE-2023-3967,0,0,6c8391302c96f7e2170588e1afd30e3611a9f7ac343c62bdb73881b8f727fe8b,2023-10-04T20:59:13.480000 @@ -230016,7 +230016,7 @@ CVE-2023-40073,0,0,27947554a83b04e5627bffce9a4778f09e4597fe411128984cd8eb8ec0e78 CVE-2023-40074,0,0,ab7eb68da577e4e6364c14ef196b2969e59f78044e7179ee9dbc9fd2b5fb2121,2024-02-02T16:29:22.447000 CVE-2023-40075,0,0,56e58757b9f00748170ba073641b9f3389137b0711031a46d1a1462b57fae7b7,2024-02-02T16:29:25.807000 CVE-2023-40076,0,0,2d2225f673f121528bb05e03fb05bf87bf177071fddbf5d1d2f9d3919d3bcd3e,2024-02-02T16:29:29.143000 -CVE-2023-40077,0,0,5a1be290e27bb77157b32fd0fce559ff071d7e20b96f0a25baf19dff49eb0592,2024-02-02T16:29:32.827000 +CVE-2023-40077,0,1,1a2ce0335d0bafd0e31d8b1d2c9b63ec181b7c171a2c525336d7849c63d00174,2024-08-01T13:44:25.493000 CVE-2023-40078,0,0,13b654c387fce81a3a75f6e61610105a97a12eb71fc8a8f25c023a253710a7b2,2024-02-02T16:29:38.007000 CVE-2023-40079,0,0,53382145af6c391f7d34c84ff1977347b1cfbc3729497a493fe2341282761aab,2024-02-15T20:53:24.200000 CVE-2023-4008,0,0,8fa2d1d755fc4aa9bd7749634565b9feebdbd272f7a41bd3f35dacabb356f95d,2023-08-07T19:29:10.320000 @@ -230027,7 +230027,7 @@ CVE-2023-40083,0,0,7e36eb5d3d078df7adf2c732ee84157c53eab20fb1f97185fca9da999d69a CVE-2023-40084,0,0,163d6169f260a1719c7667fa04c5dfc46ceb6bfa26c432eabc4a3099be4f208f,2024-02-09T00:24:31.993000 CVE-2023-40085,0,0,f3c492e99f80c25ffde654fefaa2e9ce2855c3f1213cd933b56d149e43426a58,2024-02-16T19:26:55.393000 CVE-2023-40087,0,0,535d2d3e8150fd0dc0d65b51df51e06124b0797d730c69c88602ff79f93e09d8,2024-02-09T00:23:21.477000 -CVE-2023-40088,0,0,e35db7f397a9feb86040ee69bb8e4ab97cd281573666a51b670eb263ae9a75ae,2024-02-02T03:15:16.057000 +CVE-2023-40088,0,1,76ca841451e7e7826b1a43907510e7fa391bd2534e45bd91e7eda1e3d7af00e9,2024-08-01T13:44:26.347000 CVE-2023-40089,0,0,f1bd1a80e522b1c16673b5e4a2bff12a9690283a23284cedc8ff4bd6f7f3c001,2024-02-02T03:15:30.553000 CVE-2023-4009,0,0,31ef66ee2384a7e29167fffef0895f5cf8b8d86e23a20e6529f062cf0f920d45,2023-08-31T19:15:11.473000 CVE-2023-40090,0,0,a6fe6a0a57ddfba25e54ae988a1513fccee10f861d719877296294b81374b673,2024-02-02T03:15:34.857000 @@ -230043,7 +230043,7 @@ CVE-2023-4010,0,0,a8a9f7812f565816476651b6e5296effbd88d1bb2d79eb39527cfc3f0a26df CVE-2023-40100,0,0,50885e1c8769688bc390208d2038bf237fc25b1a40529a82483ae99f45848f88,2024-02-16T13:38:00.047000 CVE-2023-40101,0,0,3ce51d90b0e7e589809d744dc88bb96b7c66c60685aebf47c83df3167c5dd843,2023-11-07T00:52:28.560000 CVE-2023-40103,0,0,450c3a391def7a8afcbefb17dfde1c695cebaffcfd18ba45db0f0094ffb67ee0,2024-02-02T03:14:29.707000 -CVE-2023-40104,0,0,ed78d933dafff26c9adaf2af992bad938168f2ad75214bd01910e1c9720b25d9,2024-02-16T13:37:55.033000 +CVE-2023-40104,0,1,0cf270b8607bfa9d4e1d8714c505120c5fc75b5ddb276c75d9c23f91e95a9b08,2024-08-01T13:44:27.157000 CVE-2023-40105,0,0,aad385399771bf8ef1682cd01ea151bd6776f60f896cc985fd26fd6d806bf2b4,2024-02-16T13:37:55.033000 CVE-2023-40106,0,0,6d9f8c84c211a0ff1a7429561ccdcbd5b138bf68f865cdf0fd7423613ec0599e,2024-02-16T13:37:55.033000 CVE-2023-40107,0,0,66f62207d9e25b242ec6da7f35b2ef9ecf0f1e96681d1510eaef351f3c32142f,2024-02-16T13:37:55.033000 @@ -230054,7 +230054,7 @@ CVE-2023-40111,0,0,f1ce81f644f8445e9edc563f366dea3f110d604fec94f86b52e2f9e00728d CVE-2023-40112,0,0,4ddec6ab2662940b93a3dc42430a4fadcac48159b9ef1e91d81653103c488b43,2024-02-16T13:37:55.033000 CVE-2023-40113,0,0,dad3819774db3e875db7c132fed9de97c7d6741efc9f62a28c01187a90cb75bc,2024-02-16T13:37:55.033000 CVE-2023-40114,0,0,c6b7c3355d0d142601bde9764bc107a08aff0a9fc3c60630a9e31551fd07469e,2024-02-16T13:37:55.033000 -CVE-2023-40115,0,0,9bbf257dd700b37e78f1e063d57240ad3fed98b6f686bbe4542951c951df5a5d,2024-02-16T13:37:55.033000 +CVE-2023-40115,0,1,6ad67ef2c7829749737245dfadc3fcfd57b4fbfd7581d4abd8672c61e42143e0,2024-08-01T13:44:27.970000 CVE-2023-40116,0,0,fd7eabcb426fa5f4a29a166c8edb69a1f9a74a2f45f7b71a79b11321ea6b7183,2023-10-30T17:12:54.827000 CVE-2023-40117,0,0,57dd588e64faf0fa05de5473eaae07275e194e00cf25e46098211736a1cf0d97,2023-10-30T17:13:04.600000 CVE-2023-4012,0,0,6e0ae190d5d18e7f1e6f0a04840beb8d3ed8ae610df9db5b817781661a1b6108,2024-06-21T04:15:10.860000 @@ -230183,11 +230183,11 @@ CVE-2023-40271,0,0,6b7cac9f3aa7106de89543b184fd87ed595daa98acee7e01c87cb1a2e5f22 CVE-2023-40272,0,0,dc2163a711fa92f8bca2bd6cb8aeefb8d5caede053b4827a4026ffd948affedb,2023-08-24T17:00:07.203000 CVE-2023-40273,0,0,d1efd309979d86acc3f5a21eda89b107ca70fabd17da2ac82c7c1040e68168d3,2023-08-29T16:14:08.630000 CVE-2023-40274,0,0,f20f5b1641662d852a3d92ec12b3069f4904a342ddf85c169c1d25358b0bc60a,2023-08-22T17:47:49.207000 -CVE-2023-40275,0,0,0b866aab894c3517b2ac66c55bf402974641b1753cff8dfb46172626ece96dc5,2024-03-19T13:26:46 +CVE-2023-40275,0,1,bb235e4d61f5beda262b4c42a88b68d3e4b0c5cc4d47ebabd44e56511d114a27,2024-08-01T13:44:29.067000 CVE-2023-40276,0,0,8b131353126c20994a155484503a1c13d031f7db2c404f8e6c7f2ef2856df41e,2024-03-19T13:26:46 CVE-2023-40277,0,0,367dfb7488afc815bd8c4545b147e2406ff15f260fa0d2925d2bf3019e8c4d39,2024-03-19T13:26:46 -CVE-2023-40278,0,0,d69d97b11a57bc41b580e1b452b58d08f8568a1179decd44eae28506610f0d7e,2024-03-19T13:26:46 -CVE-2023-40279,0,0,4ef17b0942871f4d6931f5274bfc20da1d59bddf98833dc44e187096817d77d2,2024-03-19T13:26:46 +CVE-2023-40278,0,1,41d387aaf3943c453b5825c77eec780252ce5d033aec5d9317b605a24ad29b16,2024-08-01T13:44:29.937000 +CVE-2023-40279,0,1,e12f0163c25ba05fe97fbc761253a7ac429929955a8e1591b432eb282bd99375,2024-08-01T13:44:30.750000 CVE-2023-4028,0,0,3db9881eb13cd2c545d4062dd4b39101a44069634f91a12bd1293e0ee41a1646,2023-08-24T17:53:34.333000 CVE-2023-40280,0,0,03fbbdc18db9809b3f14287bcf58f256845dcc3a783cac57c0c35cce12e91b21,2024-03-19T13:26:46 CVE-2023-40281,0,0,975e61d6130bdb6b4b8fd5d6775dc596d1a5b63bf1cd5120dcff04fdcaf35e2f,2023-08-23T15:27:41.540000 @@ -230287,7 +230287,7 @@ CVE-2023-40392,0,0,b54a0d5914b9186321a665f5b2009e1d4bda632c5b381d56f487e57d220d2 CVE-2023-40393,0,0,e0720121847159abda778d2f646c0c7e848f8bc72fbac40185b3c98f6a69162e,2024-01-17T18:30:39.897000 CVE-2023-40394,0,0,526da955586233b1a7b2dc9d999b1f0be86354cdad86453374676f9733b0041a,2024-01-18T14:31:24.653000 CVE-2023-40395,0,0,8951a0da5934955ebf0f075ae9e557422fd4c66d3267f9876fe4bc4a0543d4dc,2023-11-07T04:20:13.073000 -CVE-2023-40396,0,0,feadc1858547a2aff5507ced35f4fc907d05acb1c262bf964f73a7c292f8ae4b,2024-07-30T13:33:30.653000 +CVE-2023-40396,0,1,e1517e772ec4dbc05a3aef534f3a4d927ba0243756be018ecf915193c20bdb5c,2024-08-01T13:44:31.750000 CVE-2023-40397,0,0,48f5d35694eda11e063d524064bdc097e2aab2bd9e9d13544e89fbc0b53f0c7b,2024-01-05T14:15:47.920000 CVE-2023-40398,0,0,8dad9a4bcdf6f1cbe52da3ac9d15a5ef57dc7f0f9af7df935c40ca5cc3f30a57,2024-07-30T13:33:30.653000 CVE-2023-40399,0,0,091e5a2db15fd5f665ca444b78b62be5004d4abcf322f2dee4eb3017386c844e,2023-11-07T04:20:13.200000 @@ -230616,10 +230616,10 @@ CVE-2023-40731,0,0,0d3b4e375c466ae10676028b39f9bcec599de7e021f7941e33591b60d27b8 CVE-2023-40732,0,0,0de335b97cb2d8ea28ba2daf4a9181c7d5927ddd29e5111dad0cca9b99f8a9b1,2023-09-14T16:49:50.890000 CVE-2023-40735,0,0,0feaed1aea48e0287a04119a000dbd9408abbadc89293c8e77d4e65c950799b7,2023-11-07T04:20:21.290000 CVE-2023-4074,0,0,51839cd8c1d88842439840ca3e3c8c020fefa804c32fe4e5a053d3a124748d9b,2024-01-31T17:15:14.080000 -CVE-2023-40743,0,0,59a3c433aa57c466bc9e5d3bf62d030707779324dbe52749f1317e9c1eda269f,2024-07-18T16:15:05.953000 +CVE-2023-40743,0,1,1c2f182059d9f7483afd524f2645265fa61127949bf0140bd0f1df2c437c602b,2024-08-01T13:44:34.403000 CVE-2023-40744,0,0,bd2ca97004f8ab866b5a6f1be3d1e9b3c291466120a8c648383110306df29689,2023-11-07T04:20:21.733000 CVE-2023-40745,0,0,970f79e3b06a1675f90343966a3599f17e88727866837be14538b9d634f636a2,2024-04-30T15:15:50.610000 -CVE-2023-40747,0,0,315c038a63d7087817a96a8045680a0a5ad664822e66f46e4a29010a4a8868e8,2024-03-18T01:53:02.353000 +CVE-2023-40747,0,1,68af7975bd2446121e8ce7ef10f441abfeac30899d55866c86da7577aa102683,2024-08-01T13:44:37.343000 CVE-2023-40748,0,0,646eb6f1945f36904f313f03d1997fcdce2f7590156d68f51631426f65207684,2023-11-07T04:20:22.133000 CVE-2023-40749,0,0,91a54968aa350bc4465b2bfdd7e16dba40d725a62ca880d1153f1437c9f76711,2023-11-07T04:20:23.247000 CVE-2023-4075,0,0,2d6f4352c81e27b2f1663f83da97fd163401cd642c89fe9f50ce71792365ed3b,2024-01-31T17:15:14.137000 @@ -231013,7 +231013,7 @@ CVE-2023-41260,0,0,c6b3c57281b86e5e6e6f0275bea2351c6dbe7a9cc3cb39d85f454ca43f47a CVE-2023-41261,0,0,c86ec737c54286565878c0093ce9504e1fada31e29d26dee85c4e63bc188613b,2023-10-16T18:25:05.140000 CVE-2023-41262,0,0,cfb0f64cf093138f784d94aa803de4c5937e23efd43dcd1055a31ba029128054,2023-10-16T18:17:04.240000 CVE-2023-41263,0,0,094720288d882b16bce74f8a3c21bbb4ef8d8223e12c5536de0e0c5d491cc3b8,2023-10-16T18:24:04.600000 -CVE-2023-41264,0,0,c4c8a60628c9fc649c83f5ec543a8a46f256b3aff0a27c9da569708a0244773f,2023-12-04T19:17:54.180000 +CVE-2023-41264,0,1,19205e4dffccea5e89e823528cc534a6b2151c280f40f347026790eb8dc01744,2024-08-01T13:44:37.760000 CVE-2023-41265,0,0,5ce8e7b6a80cf8e7f4684ec30a1da22d1e20b3fadf72bb1b7563f915a098031a,2023-09-08T13:59:58.123000 CVE-2023-41266,0,0,13cf9865ab0957e6a40043126ab36b689db51153262d73b06616b614c6fb408e,2023-09-08T13:57:32.727000 CVE-2023-41267,0,0,a1382ab5a18055ea77cc3bd8c6478550b3b378148502ceeaa996746670b95a29,2023-09-19T17:52:38.127000 @@ -231296,7 +231296,7 @@ CVE-2023-4172,0,0,91a5523735beaaf386988ad574da4f746b7e3dea210dbb60bef0f34aab091d CVE-2023-41720,0,0,0093919089e89ef5358fa71b3834e693e345c61cd72f1576c7fde67f41fd42db,2024-03-26T19:27:41.727000 CVE-2023-41721,0,0,9d8300dea3629f20fa77b98b3cf509692439737c0069e95af62a9f4fff6b933b,2023-10-31T20:02:00.777000 CVE-2023-41723,0,0,aaa0ff80b06e16db3127d59a5b19fb8c6f1bb032144613ccb8f008f360fd5606,2023-11-14T20:30:54.470000 -CVE-2023-41724,0,0,5874a26312d55e079772fa249f848288a9ea8245ac23f1a7249c1a6b63b2da1f,2024-04-01T15:31:21.150000 +CVE-2023-41724,0,1,fb1604319899a68549be540318d0c25739412976b98d9685e4f321322d31d223,2024-08-01T13:44:44.643000 CVE-2023-41725,0,0,b376dbcda8d671a6de06f0e8a35574a9e0dcdbbda4e727e7a5514752eac083f9,2023-11-09T20:48:01.590000 CVE-2023-41726,0,0,30c993c3ee0a3c7e30527a9a7949e66acb3c53715cf1bc872dec60b0ec5f36b4,2023-11-09T20:47:03.140000 CVE-2023-41727,0,0,5d0c6fa0e81b175511881d91062e902367c1e24e2675c1fd014a7b6126680648,2023-12-21T04:48:25.067000 @@ -232157,7 +232157,7 @@ CVE-2023-42855,0,0,c045030bd8a1cf212b71774d729ef5ea863b6078dc3c0d7749061859ccdc6 CVE-2023-42856,0,0,3785bc6082e7fa65742eabd642d5d65c5d33879ffd7643e13cc058ba75458a60,2023-11-02T18:00:05.630000 CVE-2023-42857,0,0,9ea98d96cc65b90009b648670c5da30d2e3d83b1ae536f9a719789ff9eb40128,2023-11-02T18:00:33.847000 CVE-2023-42858,0,0,3cde77cff878b7bb98d08b0160f9736789daeec37f86aa56fd544ce01873eae4,2024-02-22T19:07:27.197000 -CVE-2023-42859,0,0,ac7e98709fadfb0f9e73469709f51a0e76956cb8b9d7c0afb883b4ed91d812f7,2024-02-22T19:07:27.197000 +CVE-2023-42859,0,1,056e476b883af3601285b7d51ae8531980184ba9abc1b8c0a16964226a0b857e,2024-08-01T13:44:47.733000 CVE-2023-42860,0,0,cb68b7c82514ef900a7acd7613121b5f748ef4ff4bdc9490298810a61c3cc7e3,2024-02-22T19:07:27.197000 CVE-2023-42861,0,0,d8d65111e4802e544404dd9d1d2d3c6540cc7742d5e3fa7afcb7a11f5c1a79ab,2024-06-10T17:16:13.247000 CVE-2023-42862,0,0,a36257707b4fb74a8615ecf862e41d30af8f3c8f9308b2858c6cc934e94b61f7,2024-01-17T20:51:42.080000 @@ -232170,7 +232170,7 @@ CVE-2023-42872,0,0,89caf9b59964cf9b9d094258bce26b8b185e25cef5a5508065b1c6001ad7b CVE-2023-42873,0,0,e686cea391819c4142966b12ed58d878dc6bba5d3054cec5e70eef0f4876faf8,2024-02-22T19:07:27.197000 CVE-2023-42874,0,0,964baee28b6c72a15098069b9e881e1b193059d80a9fe10f47c0787dba9650a1,2023-12-13T23:29:19.097000 CVE-2023-42876,0,0,974317a11812600494105057904f88983c49db0f187d890a9f6b1ea5995af4ff,2024-01-12T14:42:40.430000 -CVE-2023-42877,0,0,17a3468145ab4fe52b12a9e7d83d473947deedb8bf3f4de21a79664c0476c8a7,2024-02-22T19:07:27.197000 +CVE-2023-42877,0,1,6cad27eae60657c9f948e06003fc8819bbc3ef2215aadba8c1d4e84902953011,2024-08-01T13:44:48.073000 CVE-2023-42878,0,0,18d26538c3c540f160b380da6481aa70db571efaa8701a38f15863e5493dee5c,2024-02-22T19:07:27.197000 CVE-2023-42881,0,0,70098e759836313249a706e0cb3a6283e2dcaf1ae77d9c5e80b4ac943c30b13e,2024-01-26T20:50:42.450000 CVE-2023-42882,0,0,d25d8200d86ee6aec5cd25ed7c72a0a44dcf7931e005d38d26518af2e78b4882,2024-02-02T03:10:11.640000 @@ -232210,7 +232210,7 @@ CVE-2023-42914,0,0,f5f29cd9efb0b6e902e417bba37ba297b7c917356de5179adf80ab896d374 CVE-2023-42915,0,0,a491c801967ea665e6a1e7894d12e52fc0e3bc74c17c4ea7b2e5a98e97053fd8,2024-02-14T03:15:13.210000 CVE-2023-42916,0,0,fb420376f2574e0c95f9ff3cb36f6c359496786a1c3b0d46b831510c60b8804d,2024-07-03T01:41:31.913000 CVE-2023-42917,0,0,15549d591e10c4a0f8e1ae1b9de5e6d4081ffb5c46b1b7c185d2789ea21a2acb,2024-06-26T20:01:23.280000 -CVE-2023-42918,0,0,1f00bc1520aaedd8b83f1edab6c70d990b9ebc3d378538af8d5ba33d73cd35ac,2024-07-30T13:33:30.653000 +CVE-2023-42918,0,1,e7908c8ff0df70036d83a2992880cac479113ceab891ae7f56021128a2de4e5a,2024-08-01T13:44:48.283000 CVE-2023-42919,0,0,f9a3b1dae89bc9cf392d1cf8dea65cc44606d99a0ff0603d430f6ace7681b3a7,2023-12-14T14:08:16.317000 CVE-2023-4292,0,0,3ea59f0e5840e07b56bc2aae1b281e2ab80136b2b379398236c012d0899a4d88,2023-09-22T13:48:01.647000 CVE-2023-42920,0,0,967029ebc9d2fa13e49b3b2a7e43266d0af79ef15d4513e03a7c68b3187f308f,2024-03-20T13:00:16.367000 @@ -232220,7 +232220,7 @@ CVE-2023-42924,0,0,ee67d224e135add0a3ebe533e99aadef1fb79612269a77d92db5afc056caa CVE-2023-42925,0,0,55692b67e52e889f6428ea6fe625aa40841e489d52e6fc460e2b0d75c53d5f4e,2024-07-30T13:33:30.653000 CVE-2023-42926,0,0,10536a0e5d0896ff760b50cd54c1cef47c09b911f9aeabee54318eada99b22f1,2024-02-02T03:11:34.350000 CVE-2023-42927,0,0,14031071501231274e24e297950a9bf2d187da6694c43ed89fc9fa105221fcbf,2023-12-20T17:15:08.377000 -CVE-2023-42928,0,0,0f96803af50c6bf772f0d2998c444df6f973590aa281ef5d0e5f7a9046ef4c87,2024-02-22T19:07:27.197000 +CVE-2023-42928,0,1,22aa3a2e4e0e0621b755fab05358d10340fe6ca794f9e924d8a66423ddc1e866,2024-08-01T13:44:49.103000 CVE-2023-42929,0,0,d69966076d0165d9b3c28cf3f5258f7af78be3e1fca4d2abcbd675929782ffb2,2024-01-12T14:42:35.277000 CVE-2023-4293,0,0,25a930cabefd3da6413e2a6b1102e5e9ab925db3891f1492ca8cd657e719e67d,2023-11-07T04:22:25.750000 CVE-2023-42930,0,0,7798cb838c89cab08a179ecdacf92fcc3c9962a80ba08db86ed92752433dfd64,2024-04-08T22:46:51.907000 @@ -232252,8 +232252,8 @@ CVE-2023-42954,0,0,065c350829c9b241771d1bca2f08dbf3f9951aa86fb8dbf545b8b0f102b1a CVE-2023-42955,0,0,048bd99f0ab58fd5fb77045b6c0168d4d4fb97b035ea28ad7d10928caea120b4,2024-07-03T01:41:33.800000 CVE-2023-42956,0,0,66b0dda941d2a4925cbdb9e601d4277739f51c5e0165d598d707e4a6d9b3fb9b,2024-06-12T10:15:27.210000 CVE-2023-42957,0,0,8db787f77350a40f43aa6f3cb4d53ed916eefa173423174ab3e447f4ebb025d1,2024-07-30T13:33:30.653000 -CVE-2023-42958,0,0,c058d0a2288d6d703bd9fa8906f4fa22d13d3fac269f73d9b153d7cafa0cdfbd,2024-07-30T13:33:30.653000 -CVE-2023-42959,0,0,3968fcadbf9da3927628d10328403217fd7650f134b478d462158a8d7e693678,2024-07-30T13:32:45.943000 +CVE-2023-42958,0,1,760598b0abc36aab49bd8bbc215415c35c61f0968e0fe7feac7b2f6189acf5d9,2024-08-01T13:44:50.180000 +CVE-2023-42959,0,1,12f3e1f633059524305473e9c00809cb86b8280a007b09c56c5f657aca98d63e,2024-08-01T13:44:50.437000 CVE-2023-4296,0,0,3d00ed163c8e5c949ecd1a08dbe73fb55471b00b7765a672fc6fbeae6eca925e,2023-11-07T04:22:26.050000 CVE-2023-42962,0,0,35794e89578ee19a4b7d15e17dbc849654eef14cc3d488dadb444cc2c1961a1a,2024-04-08T22:47:42.510000 CVE-2023-4297,0,0,047ed4f9023e2ddaed83a6b2684e12e7cb9df8581e91d1a9b5f1e7175f976ace,2024-07-12T16:11:19.193000 @@ -232420,7 +232420,7 @@ CVE-2023-43309,0,0,f9fb1dcf4f393585a40304244aaaa8188437adfbdbb433509ad7e699b7518 CVE-2023-4331,0,0,8f61f700b64f0edd2eea7030c332b6b6f728457d4de46ff84194a9f4248baba9,2023-08-21T18:40:23.583000 CVE-2023-43314,0,0,7424090a92c1a4d8ebcdf9749f73ac03bdc11a85ab86cbe23d8f408091e298a8,2024-05-17T02:29:09.190000 CVE-2023-43317,0,0,1ddbaaa8c9f4400846e669d4060a5102e5950d4bfa79cade0be186d59f615233,2024-01-30T22:17:58.823000 -CVE-2023-43318,0,0,44b96c3f9d23d15691665eb6a520bb1de657f66bed1e03cfe9592f6436c876ba,2024-03-12T15:01:14.340000 +CVE-2023-43318,0,1,75d7d8ebff5221c1f0d21cb8c2c3c1c2edf8004da8ec50a8b3b98fb82d25951c,2024-08-01T13:44:51.273000 CVE-2023-43319,0,0,ff61cb7b4d52ca4259fa9eaf8bcfe859d3825a51187737b1f3d837ed0bffaf2a,2023-11-07T04:21:21.217000 CVE-2023-4332,0,0,246105d381afc1238e2d79a54c1dd1bba7d8858151ca6712f114fee02fa3a4d8,2023-08-21T18:39:08.247000 CVE-2023-43320,0,0,95fc16303be9283388e0755b1149dc0b7d6fad4b62c262d31a7b493b93ec34ef,2024-02-02T17:15:10.963000 @@ -233316,7 +233316,7 @@ CVE-2023-44483,0,0,00e587c0b6e2decb3868fbeaa6d2f71473fbb5a01af7692e29f989962de37 CVE-2023-44484,0,0,f6a63e20c3830783cea3451862f4a0a4536671cc106d5dffa285d7c27465675c,2024-01-02T16:15:11.687000 CVE-2023-44485,0,0,1fded516443ed9d4a6dc21d78fcaff9fa6c633a261c62418d91bd847201a9be3,2024-01-02T16:15:11.810000 CVE-2023-44486,0,0,2b43d0a14e9cca4a775d6d63ef007efbe7181ff5204ebf454cdf39ffb38da42b,2024-01-02T16:15:11.897000 -CVE-2023-44487,0,0,2b098f31eddc4aa12611ebb49ac8b303bcae58b5a5ddf71c267aa118f8ee10c7,2024-06-27T18:34:22.110000 +CVE-2023-44487,0,1,aaea54b7a2a9f124474c3651a8b250e1b70a7856568401a45898aba7b730c6fe,2024-08-01T13:44:53.500000 CVE-2023-44488,0,0,226adae3fa01e5b5019017686fd84bb17ae256ba17ed784298b3a404fae6d26d,2023-11-16T01:37:32.350000 CVE-2023-4449,0,0,12be572f507c6a051043a1ef10f7e88b8a8ff6ece331f9f72fbd3badfdde391e,2024-05-17T02:31:34.993000 CVE-2023-4450,0,0,22236107310f09e0ecbf46e68e3f9be1f4ec87d45b6ff013e584defda64bba8b,2024-05-17T02:31:35.103000 @@ -233397,7 +233397,7 @@ CVE-2023-4485,0,0,d526a2f954c2736d53f3460e51a08ad20649b599f0f9d65c5a7ab7793bc309 CVE-2023-44852,0,0,81fa0729ea0f25cfdf47c83b9b359d370eb0ad757ed0d34e038272288625118d,2024-04-12T12:43:46.210000 CVE-2023-44853,0,0,063d78de1e79f39a8a7ba8b021087b2fe317ac5c06b40bbf2260beeeda1a9bd3,2024-07-11T15:05:11.010000 CVE-2023-44854,0,0,4e48088f87e2b11e1467bc2e46295bb34cce24866803fdf912aedaaaf1ece32a,2024-04-12T12:43:46.210000 -CVE-2023-44855,0,0,2757ce5deeef9729d9c087fba8ae41108dd2168d99d50ccf0bb7f81f2a0ae76e,2024-04-12T12:43:46.210000 +CVE-2023-44855,0,1,92111c6cfff436f5910c36b2425cefcca54a17fd5b869b376ff0baaabbc0006e,2024-08-01T13:44:55.020000 CVE-2023-44856,0,0,f988e943bca6b7ea9a2f7fe5652c816fecac430440a0709eb58962252da40f32,2024-04-12T12:43:46.210000 CVE-2023-44857,0,0,26efa4526fba2775c0abb30007c2cd5f8e11cb8211d852c759d226044c613250,2024-07-03T01:41:47.663000 CVE-2023-4486,0,0,a8f8d8a9e43c17d4d331dc7091e0f90261622ff32f1355021d3c32aa04c5841d,2023-12-19T17:15:07.377000 @@ -233788,7 +233788,7 @@ CVE-2023-45471,0,0,717a23add0dd8415e4a5b853132999c08fb7d3044d04cc9a7df1a36077456 CVE-2023-45479,0,0,d328102c8ce3b4b9615ce325dff7a567ed7ed6b72bb1aea9e8e597c47c0137e5,2023-12-01T03:59:39.983000 CVE-2023-4548,0,0,ecdbee8d6ba3456143b7610a00e7053c6d3089190692cebe0d10819c13343483,2024-05-17T02:31:38.903000 CVE-2023-45480,0,0,a7e654654dea33287e7c689b81d5f87eb3d5b9fa5e5339f8cd456e5ef3306360,2023-12-01T03:59:17.300000 -CVE-2023-45481,0,0,ef0ce0e7f289a575b13361f45d6d875ac986f95f48cbdc7fb625278fc8786d20,2023-12-01T03:58:54.947000 +CVE-2023-45481,0,1,06c726e5212f53177e6eb305b6b0ad80d00a6e2c545fa3290fa203ff282d1b00,2024-08-01T13:44:56.787000 CVE-2023-45482,0,0,84445a68cc11625c73f5f5449c49a8f6065af3d7d34923a4dfe2d55eb9bfd3f6,2023-12-01T03:58:37.397000 CVE-2023-45483,0,0,b847dbad3b5728613d39481abbb586482d5bd36c4325ae2da316e249587f79f4,2023-12-01T03:57:22.423000 CVE-2023-45484,0,0,b4fe3f0cf090a2f789c43c9a45c534bc90e10422a7d96b20f610129d3c5ae20e,2023-12-01T03:56:31.783000 @@ -233797,7 +233797,7 @@ CVE-2023-4549,0,0,34c85471cbbdf708c74e1f52983fe50243b3a39a2190cf2cedf9485eeaafab CVE-2023-45498,0,0,55a54ce99ed452b215a7e7a67752ca666f8cb156f54873012c21d771ff16c8af,2023-12-21T15:15:08.843000 CVE-2023-45499,0,0,b94fc4cbe7e8f6581972fdd4001072956251f5adba1e96dae5bcc67d96a894c6,2023-12-21T15:15:08.953000 CVE-2023-4550,0,0,3875d2ef928bb2ce7bc2731ff3fd246e8c140e8ac5064f7af0ae86a5a345a2a6,2024-02-05T18:30:53.983000 -CVE-2023-45503,0,0,2d4ae9401f9b69424e6c7f3613c0511c33e480665b8a4d0e9ba549afd05a78f2,2024-04-16T13:24:07.103000 +CVE-2023-45503,0,1,0bcc6bee1985b91dfb34ba4df83762a6c6977dcacd78e3459a513da67f8664ae,2024-08-01T13:44:57.620000 CVE-2023-4551,0,0,30c450811df944077c61b850656a1ad83903b648c76a118de39bc5f11543f4ad,2024-02-05T22:02:02.550000 CVE-2023-45510,0,0,f2546ff9b0af948c39cb4f7f24ea5054e847f018bad13673f9c1f34423bc8ea0,2023-10-18T13:00:07.247000 CVE-2023-45511,0,0,3dfbbc8b2cba8609d5ecabe922fd4ad7109660263a629d88090eb6b2af13ba93,2023-10-18T12:59:41.747000 @@ -234070,7 +234070,7 @@ CVE-2023-4585,0,0,0c7d484dd3fd4858183e24c37b7c22e1d3749e885c104e9186641bba529400 CVE-2023-45850,0,0,54f0aa089c8ebefba26fc84db9cc11c8567f61a11232a6923c6e132d5e43be38,2024-02-14T18:15:46.203000 CVE-2023-45851,0,0,a3947611dcf22f6805d628e99aaae522253196bfe6bc115a5e6e07eee5573efb,2023-11-06T14:33:29.510000 CVE-2023-45852,0,0,9f9928a73d27493bd16960e42e3753b817edb53bf0a279e8c73f0394583e4b85,2023-10-18T21:02:05.847000 -CVE-2023-45853,0,0,5dafbd2718d62527b4a11d2eb0ea089534771d4a917334ed4778e00e411b6e4e,2024-01-24T21:15:08.623000 +CVE-2023-45853,0,1,6503429cbf2e1e20ebf7ebe132f95a8b90c44cef1beb7aaa8cc28ef474dcc45b,2024-08-01T13:44:58.990000 CVE-2023-45855,0,0,912d651ace420e3e306dbd306a33a1e9381017090da4aa2e9ea6f83c20cb2d32,2023-10-19T12:47:29.590000 CVE-2023-45856,0,0,9549076e6d0a6fd1b223e9b67c01e74b49d52dd52325c68b86809e5c56a367bc,2023-10-19T12:51:51.217000 CVE-2023-45857,0,0,73cdaec7d516e0e7ed8e90335cf635a85ba7d5cc487bbd7bc0e61ce086b2cacc,2024-06-21T19:15:29.593000 @@ -234335,7 +234335,7 @@ CVE-2023-4622,0,0,1cb62bd6881eb1a3b6d6fe84d9657a8e22e8f46e24925e3438f3090c6aab7a CVE-2023-46220,0,0,ba4bf40806d7fbc51d39609a9a139967f55a50b3f25787e8c65a77a82608d49d,2023-12-21T04:46:59.847000 CVE-2023-46221,0,0,3f4cf52ad53889115a59b9eff27bf0ac84a669e2bf983465175950c67f0b9644,2023-12-21T04:47:10.487000 CVE-2023-46222,0,0,3123950008c301fe4d358449290c9877e0f0482e6ebc98f09afee4fca834e62a,2023-12-21T04:47:18.880000 -CVE-2023-46223,0,0,712e8cce6a52ade557a43f25da8429d1a14d7bf74f50ebee47b25f2cd0b07a78,2023-12-21T04:47:26.523000 +CVE-2023-46223,0,1,38a43f76069b31beb223db391d497b19be91b2ceee1c68eed1e001a503d654e1,2024-08-01T13:45:00.090000 CVE-2023-46224,0,0,d14bbb63f0c81858bc1d96d2b6dadec6252508c2d42c34c8a62c15c2905460df,2023-12-21T04:47:34.747000 CVE-2023-46225,0,0,b3e67b189c2e653115cffad80a7d6447cd17f9d5f61a23c3e04db67c532a8c8c,2023-12-21T04:47:42.900000 CVE-2023-46226,0,0,3beb12482da8bbb0f5b195fb91cfb33d29b0329b010dda9a9f22051a9e426dd6,2024-01-22T19:56:58.157000 @@ -234797,14 +234797,14 @@ CVE-2023-46798,0,0,e6def47390ad0cca62c048a4ac18fd46e071329d2995b648bb5bf2f8420e9 CVE-2023-46799,0,0,4361c68cf7b923562592dd8fdbdffd552913294117946ddb972d4a241348b466,2024-01-02T22:15:08.863000 CVE-2023-4680,0,0,1f83e9eb1c73bdb55735cc4047268843416b3ea41519074c0832f6dc353107ef,2023-09-20T14:55:39.430000 CVE-2023-46800,0,0,d52933e53d6d15f5a2eaebc826a5324854d68f2efe77d60c5a7b7fcae21b94c4,2023-11-13T17:57:34.490000 -CVE-2023-46801,0,0,aaa34cc011fea6223f51c8d8c801c4b08766c5c3cef06b13ad027227d35246d1,2024-07-16T18:06:22.640000 +CVE-2023-46801,0,1,4e1a8a1f940de104e1d38238b3b24ce46843f18ab50836a6a35b43390998bdeb,2024-08-01T13:45:00.980000 CVE-2023-46802,0,0,c0da1cc5144de9428d72b3f4e2aaf6e20b248ee8e4010663f547f245abb34d46,2023-11-14T15:30:13.830000 CVE-2023-46803,0,0,cb9bb8e58cc7d3efaa7032194e8201cb447933fa588b63421b6631ce6a007215,2023-12-21T04:49:22.117000 CVE-2023-46804,0,0,076b3f265bfaa2ea0a3df1bc482a172069ea8f2d8965ae045330a23041a00075,2023-12-21T04:49:19.073000 CVE-2023-46805,0,0,7a9f1e3efe4219f546adedaa2f65c4351ffba57ecf76ecbea9c0806444d5c5e9,2024-06-10T15:39:50.823000 CVE-2023-46806,0,0,49a0b042d8e030d1507dfed8a0c175f6283ca7615330bcadaded676c9bd069b4,2024-07-03T01:42:07.793000 CVE-2023-46807,0,0,c28cf6fba75d9bfea83f438d6bca59021e282ddfe25b1a9c7a037441645e037f,2024-07-03T01:42:08.520000 -CVE-2023-46808,0,0,3e6a01ffa6961671a36886b9a77131e10662d8d0c7627b99156b98c096d54f5c,2024-04-01T15:31:56.613000 +CVE-2023-46808,0,1,cdef8400d49144d76cd14db640e72e6ddc3bbdae9c9f71cbce92c9ab43c7187b,2024-08-01T13:45:01.253000 CVE-2023-4681,0,0,6a7d42fff12f87aaaa676e4a97a7c2caef6ee302b35c3ac3cee7aec36c668259,2023-09-05T16:22:15.077000 CVE-2023-46810,0,0,69baafce6135d40a26721e62348bd610599075db40480cebd36847b59a0b98f6,2024-05-31T19:14:47.793000 CVE-2023-46813,0,0,54a5b81ea9d5fb0a268b9293a603071610c41491ab8bbea7095535d094697af9,2024-01-11T21:15:10.350000 @@ -234884,14 +234884,14 @@ CVE-2023-46944,0,0,cdecfb8ec33e56621b60ab98b450535b2a63b71d0ae32649b6017af3e94bf CVE-2023-46947,0,0,69c22ce145401493ee925255d856f76068fc4e105d8df29e207613a75508c727,2023-11-13T18:50:17.157000 CVE-2023-4695,0,0,4336782c8ea05850b9eeaa8589b146f9074b1ac72d74510c5d547425385f33fc,2023-09-07T19:10:59.810000 CVE-2023-46950,0,0,2a81b4957f3cac97ad96ab7ff9e72cb278bda70deb4f0f95930e56a3cbc47560,2024-03-01T15:23:36.177000 -CVE-2023-46951,0,0,2d9878d66630415cb56805b838abb6e555c61ce9b84a671f45129c52420edb04,2024-03-01T15:23:36.177000 +CVE-2023-46951,0,1,109e2cbefa7e947d662ef6c944162b97936120093db19f170230b0541b6882f1,2024-08-01T13:45:03.913000 CVE-2023-46952,0,0,4bcf3948e8ecb1744ce911545c8fe6c861e6c40af1d5cc477719602d32e4f796,2024-01-23T21:44:21.433000 CVE-2023-46953,0,0,a872c64c0c4c630030a60d7892d6bcb58eb0d3a3b33b50c7787cc33ab267e7ac,2024-01-11T17:06:37.437000 CVE-2023-46954,0,0,4555002c4c62abc01ac36bee743cac877d3c7eea57b71b3900e5569dd91ed77c,2023-11-09T21:38:55.393000 CVE-2023-46956,0,0,31cbd0a04e29ac22bd9f823d3179040618ffc4e9e1a4e90764004517af632bb2,2023-12-06T18:39:39.687000 CVE-2023-46958,0,0,31f8b75382fc3c74f5a3e2ab21d8f78785fc9b74284c4de658492d100aed0607,2023-11-09T20:10:12.967000 CVE-2023-4696,0,0,c17d353a65b5fe55231e71fd5dd8d9e90c20a1609f561de61d8d7b05e4fee642,2023-09-01T13:06:59.890000 -CVE-2023-46960,0,0,db35098dc80b23c8f0ab0d65925e41077e51a3bb44539e9d122c86552b5c79e3,2024-04-30T13:11:16.690000 +CVE-2023-46960,0,1,60db2322c4a9b765f494d0ebafcd8efdc2e2d2d8adcbfbca9f64c33ec63e600d,2024-08-01T13:45:04.950000 CVE-2023-46963,0,0,35077921eccf07ef2dd7ed76ca66b1edda65dcfed35fff2218ba7101c90c7075,2023-11-14T17:37:06.293000 CVE-2023-46964,0,0,0d7def73494b6867df0b91db2d842e5c633f4a9bb171d96b528d1e1045602cd4,2023-11-22T16:15:09.337000 CVE-2023-46967,0,0,3d5cfe860df67560dcbe891d71b2f0b5ce068e2b287137c3a38b235225e6ccb2,2024-02-20T21:52:55.187000 @@ -235816,7 +235816,7 @@ CVE-2023-48358,0,0,fd42ec30edf0b4bc87a28db5c64e1d59dfe5aa82b9d6889cf14523d9f1e0b CVE-2023-48359,0,0,ccb3f595ead47de0e806cbd75338965d59fe717be8a86c3f09bb684f53159c8a,2024-01-24T20:35:30.263000 CVE-2023-4836,0,0,08652eb22d8d820537a32135d6cdb0072945ba41f47c5813b91b860f7c20fc7e,2023-11-08T18:30:46.937000 CVE-2023-48360,0,0,5b6e5d7b5fe192061e064b563bfee066f7ff8cfae4d4ee5e2ae28883a2e5e83c,2024-01-05T22:04:53.347000 -CVE-2023-48362,0,0,2690f0d0cf647d3cb450d6d6a93a797aac88ce2f8b2f4be2d6392f9574f65861,2024-07-24T14:15:05.180000 +CVE-2023-48362,0,1,c60460a7ec9b197cf25724f18c64e4d49372388ed86257e4c3dca619d16fe550,2024-08-01T13:45:08.180000 CVE-2023-48363,0,0,2bfc4ec5e7e25cb483b369af5958deb5dd28dd7cd426eb9cf32d0a8e81c4f250,2024-07-09T12:15:10.147000 CVE-2023-48364,0,0,b82391d36b810ac4492568e964e6ec98f18ee88a09432c62aa0865e4a71170e3,2024-07-09T12:15:10.277000 CVE-2023-48365,0,0,08ac0336d1b7c8130bf42658d4f4f8599137b51618c91dfe4765b7deedb1fc3a,2023-11-29T20:43:54.133000 @@ -235846,7 +235846,7 @@ CVE-2023-48392,0,0,9c3aaa36cf10f8e1592b9126c1f846c6c07db58043210a53056a744b730a0 CVE-2023-48393,0,0,e0a815d8080ad5cea41d92984ef3a9fd7095a42aa57d20c0d12a59109c002386,2023-12-22T15:43:05.987000 CVE-2023-48394,0,0,c3024715840789d9f312132faa6fbaf0c1f9f5e5dcaedc7eeb2cfc7e710910d2,2023-12-22T15:33:02.573000 CVE-2023-48395,0,0,f4526cf83078b38c5056fd136243e449325c90f84eaf2a2201d315d32d83e447,2023-12-22T15:28:27.923000 -CVE-2023-48396,0,0,689c9620e1bf6f04ff015d9323791ee232de47a8c98b8ff7a8282bc8a9828bd3,2024-07-30T13:32:45.943000 +CVE-2023-48396,0,1,7460321eae536ecf3c703f4e925de8665dc31bbe351d91f092291f68a8433a25,2024-08-01T13:45:08.480000 CVE-2023-48397,0,0,8ec89914f42c906f53d68364d7b6e597661ed4a8d677d7d81388609a835cf322,2024-03-12T21:15:55.883000 CVE-2023-48398,0,0,95bc3f0fc672fe6706032de73057764755b65a6e047d7d0a83c7838730374b09,2024-03-12T21:15:55.977000 CVE-2023-48399,0,0,2adddd0123f92d5301226919e6681905241faecb6990fd36a9f3f8b4c3c9508b,2024-03-12T21:15:56.047000 @@ -236063,7 +236063,7 @@ CVE-2023-48596,0,0,8012fab9194fab2507fe0fbf251c36accf7611dd6daa1f71f5cb02ed64fcb CVE-2023-48597,0,0,96ddd8ef61145341990fb1172f77f82f82e745fb700199ce3474a4770be50930,2023-12-16T01:16:41.063000 CVE-2023-48598,0,0,b18ea2afad5e9ec2520ad9b108ab83761bc886d1bab3914df4c23e690413b989,2023-12-16T01:16:48.647000 CVE-2023-48599,0,0,b5f0e3ae5d1f48741ffea456afc7d804cd4caa0ce10c280f084fe65fc19a839b,2023-12-16T01:16:56.333000 -CVE-2023-4860,0,0,6fc6482066335449b97a61c12074dadc2038df375cbc406a0527764cdcecee8d,2024-07-17T13:34:20.520000 +CVE-2023-4860,0,1,a86dda81763fa4a471434e89e17010fe3d323110aab75235c061f673933d0905,2024-08-01T13:45:21.050000 CVE-2023-48600,0,0,ebd9779998638b3dc462e2076abc6d0cfa59a8fe20c5add73420a4f5696615ee,2023-12-16T01:17:04.043000 CVE-2023-48601,0,0,bfad754b5140388a8dfde275a37e4874aedced9a6a81e4bd29b099d0c6deb64c,2023-12-16T01:17:11.730000 CVE-2023-48602,0,0,ceb4eba9d2414baa69f98ceb45f92344e5d9599347badac89deee90d430f266f,2023-12-16T01:17:20.077000 @@ -236534,7 +236534,7 @@ CVE-2023-49229,0,0,274f5e76e0abf25dd952bfa2abc364ec937485698e496e95193eb5367d2ae CVE-2023-4923,0,0,ce7fc500dde57469ac63f0d59e3b430b03bd8f45530b68eebb245625ccf8cf01,2023-11-07T04:23:10.377000 CVE-2023-49230,0,0,4ac429fff5dad6e7c2619e17899b81d72294b4ca67a40312f774f6a762a4a586,2024-01-04T17:17:22.257000 CVE-2023-49231,0,0,c50f7d4edb51eaf2d8520b58a27247c21c0ddf7734872c602b4b992f1811e9ca,2024-04-05T17:15:07.567000 -CVE-2023-49232,0,0,28fe9efbeea703ae086ef41d2df401450fdd43c37aff1f9f889c34750c7273a5,2024-04-05T17:15:07.643000 +CVE-2023-49232,0,1,9ca3b1a982e1c7a2ec1772835ea21cbd9593765c02546da72550a094ad870e5e,2024-08-01T13:45:09.797000 CVE-2023-49234,0,0,42b8e485b1c2a4cac6ef6d6ad94acb217368faece94ca890be93bbb463698a19,2024-04-05T17:15:07.690000 CVE-2023-49235,0,0,251e067594908fcdc9ea0af907df30c24f21af889b96692ba9e2877adfcb0e54,2024-01-12T19:51:24.593000 CVE-2023-49236,0,0,043e2d596773c1427321050092baafadbd74f95bf10543e717d7f7b30af8f0a7,2024-01-12T20:39:27.197000 @@ -236621,7 +236621,7 @@ CVE-2023-49337,0,0,e424406de5c43c131143c16d111e773c8556787e526b7f62d53e176ae0c6b CVE-2023-49338,0,0,fa3bf55d0b5318e101267d5f4c126776700bea84adfbb2e6dbc68fed8dd82145,2024-02-29T13:49:47.277000 CVE-2023-49339,0,0,d5ab1ea5e20bb916fca99bbb895528d219777cc227dacc9f5ba9887d2fc2b098,2024-02-13T14:01:40.577000 CVE-2023-4934,0,0,5bda99711a1c7b5e53779ffb125b8e009708afa5e83126fe4dceceec3c818038,2023-10-02T16:39:41.720000 -CVE-2023-49340,0,0,4e7d2edc92bbdd56cc7e077010571e6c30305acd6feef066f72c9073181e639a,2024-03-11T01:32:39.697000 +CVE-2023-49340,0,1,2fec675eb8e4c16f2410d6f1b888906e569c7e065980f36c37bb644d4c4fdee2,2024-08-01T13:45:10.687000 CVE-2023-49341,0,0,d69fd77ee150392f1be0e5fae900ec72d4bd4e90458388796feaad9dcddf5ad4,2024-03-11T01:32:39.697000 CVE-2023-49342,0,0,951ffd764427a957f36a813b90959d5f48377825c95b5aababeab2db6f241ba5,2023-12-20T21:02:43.633000 CVE-2023-49343,0,0,46033bf4299116d557965c4ed60ff9182e6a79dd42bd60f471b9d9cab2771155,2023-12-20T21:05:50.880000 @@ -236730,7 +236730,7 @@ CVE-2023-49528,0,0,bcff757c4ee07f22736afa13a889e6d02ee86ae241b71b1c98b3c18a1dcda CVE-2023-49539,0,0,3d9077c363f63e00a9a99e014f79fcf2da947642965bca45dcb61b1a8743768c,2024-03-01T22:22:25.913000 CVE-2023-49540,0,0,ae550eb7b800d3321bcb4fc7602f8e1ca26c9a01bc91cec14f12987154304e97,2024-03-01T22:22:25.913000 CVE-2023-49543,0,0,9b27cf28e2f4c20b40d2a61fced0fc62af90f21931996c253e884b5f19a62074,2024-03-01T22:22:25.913000 -CVE-2023-49544,0,0,3884de3167b93f4b3c45ef9de4baeb7f93af43de77e16f070eb2bae587e0719b,2024-03-01T22:22:25.913000 +CVE-2023-49544,0,1,4165df005ca812878112fcb221906d65322102731e6bd43d48afbe4e5ae39573,2024-08-01T13:45:11.667000 CVE-2023-49545,0,0,2026852fe298b5835ad85e1eea0f18e4689a742c4986c111d1c98765d7287b86,2024-03-01T22:22:25.913000 CVE-2023-49546,0,0,42c4c73e286dbbc54bb4d1edee710426f74da9660183ef38c8db0ddb322c4c0d,2024-03-05T13:41:01.900000 CVE-2023-49547,0,0,0d72f4b66aa616990dce257fb750379ef931b2acf59d9d176a6ef0cb0371efa7,2024-03-05T13:41:01.900000 @@ -236809,7 +236809,7 @@ CVE-2023-4966,0,0,a91556d261f30cc1d7bf83b215bc1706f86d14047e8e2c4411c17b6e5aaf11 CVE-2023-49665,0,0,32532609d051d5218bbe8556101c2028aee9de0bdd25cfdca1be8309af9b6e14,2024-01-10T01:13:39.947000 CVE-2023-49666,0,0,fd7e4f66e36bcb33cc80a752bd40bf7e09820fa4a2d39908c2eb9ca2d7b8492b,2024-01-10T01:13:33.633000 CVE-2023-4967,0,0,661ad4522a51748f7b312f9393bf67756c03bb1cf9a1e822b4eedab8ae5723f7,2023-11-07T19:39:01.713000 -CVE-2023-49673,0,0,ccfc242e32b3fea3003a662996604ba36617c3dbd99861136d3c1fcb8999126d,2023-12-05T13:32:39.200000 +CVE-2023-49673,0,1,b1c80f8f16565efb398a02820ccbd76dea6dc40521c370921d6a5f2fbfb8552c,2024-08-01T13:45:13.090000 CVE-2023-49674,0,0,9a3769bac056dda2b0de7ce3324862885611c203372a153698b68ca91d57860a,2023-12-05T14:05:54.363000 CVE-2023-49675,0,0,56b34e8d8e91308b64374e13921b83b55c5ec1138228e8c524f0d85c80a39105,2024-05-06T12:44:56.377000 CVE-2023-49676,0,0,d3df23d3d70d49ca7ef748c2557db2ee0bf9170113f3b9e43786b418abd98943,2024-05-06T12:44:56.377000 @@ -236997,11 +236997,11 @@ CVE-2023-49921,0,0,5d44ce3bb605189e8d6ad286171426f92163138b55f71b61fba7eec317cce CVE-2023-49922,0,0,2895cd4c3f9a214bcf714282482758940b383f1b5313c3e10f62d5e5c7f90ab1,2023-12-19T15:11:00.423000 CVE-2023-49923,0,0,8c5463191a66a374ded20ebbf457fd749a3488a11cf52dd1dfa09195520416ce,2023-12-19T15:07:43.147000 CVE-2023-49926,0,0,38fff8a194f95993dded19af912bc12c507a9daed8ebe448c5987637a13e1fa2,2023-12-06T20:51:09.867000 -CVE-2023-49927,0,0,06dffdefa27bc185e859c2072ed949e73c3c4ecadb95e2fc4fdf00667f80e27f,2024-06-25T20:15:10.733000 -CVE-2023-49928,0,0,423355d300777f5960fbc6e2a6a1a543c684406352c22724d125cf6d3ad7fe89,2024-06-25T21:15:51.353000 +CVE-2023-49927,0,1,94aba0a35d0974b359992d3ad99c9b3ea6e38e56541b185cb1e2af67ee2dd875,2024-08-01T13:45:15.087000 +CVE-2023-49928,0,1,d49ba7a583086b1bbda110f48abecc6db093a113b11d388683c30d63740da25a,2024-08-01T13:45:16.410000 CVE-2023-4993,0,0,c7a4a9cbe98f324ff2d040c43029bec30f021071cb1d29e1bc2fe0d3b17603ad,2024-02-15T19:55:09.230000 CVE-2023-49930,0,0,9180758c2e2fb8e65785b163acef8232513362030c78b81dd3fbe03d49a97ad6,2024-02-29T13:49:47.277000 -CVE-2023-49931,0,0,c87f058f92a7fe3207193aae3b94d0b9ff0b1fcf5cc981a91b00b7b053e3f97d,2024-02-29T13:49:47.277000 +CVE-2023-49931,0,1,9f779b8dd56ed9a6e76d4f51d0093b527ac652bb2b9defe75c6433896632ac84,2024-08-01T13:45:16.760000 CVE-2023-49932,0,0,59ff3ff4b83cb6898b0bb54042988b3ca79cc8cad00178e37a516dc8162b988a,2024-02-29T13:49:47.277000 CVE-2023-49933,0,0,7536ee44dbbe275747972e255048a2d1b5f0786262ff10ed337be1a3865e9504,2024-01-03T03:15:09.697000 CVE-2023-49934,0,0,74baeba8f2c3bc85f6f6d1baa771035fea00a8a3b39ee6830c482d386eb26078,2024-01-03T03:15:09.803000 @@ -237025,14 +237025,14 @@ CVE-2023-49957,0,0,8f9b199be485b1673dc5447e376ee2bb3e20dd97ded779983109c4fe9a062 CVE-2023-49958,0,0,b945a1ad87a6850f903fcbe81b308072aaa99bd1a9243cd822dc7b8e97f97b11,2023-12-13T13:53:04.123000 CVE-2023-49959,0,0,88693f11e9749c7b6e276c7f9d19f715b73a4f2009b695830855f5158498f5ae,2024-02-26T16:32:25.577000 CVE-2023-4996,0,0,6a96837fcca1d7deaa6aa589d92a14b4327d14c87ed64a80dfeb3367527137a1,2023-11-14T17:04:04.747000 -CVE-2023-49960,0,0,36c81ea6d4a22e7ff64bf406ea565f6001773407e77c21b821beab3542b9fb7b,2024-02-26T16:32:25.577000 +CVE-2023-49960,0,1,0e9ad95596e6a050966eeae850b05c374feaaec388768a0ded233d222e3ddb12,2024-08-01T13:45:17.753000 CVE-2023-49961,0,0,fe18aca8b440f329c1d528d19a34369d87e6c8005ab3d538fd1c3f47cafa72b1,2024-01-12T16:13:48.350000 CVE-2023-49963,0,0,cc3a77502e77d00f9c20011e97a97957573a6f8abb51b75925791cafed3f9e9f,2024-04-19T18:29:53.040000 CVE-2023-49964,0,0,4a201f112134a3d6cf6021d5b91032c58a31552b69366b1a2d0998d8e981118b,2023-12-14T14:36:17.293000 CVE-2023-49965,0,0,e0d8a82e98c6c9a3815ede421319b87954864ded3456793693be862d41bc33bc,2024-04-08T18:49:25.863000 CVE-2023-49967,0,0,747a56ed33b32c4d1b311fdebeb305be64d8bfa851a5ebfe9be1ea5d7affb098,2023-12-09T04:48:27.967000 CVE-2023-49968,0,0,443b0a12900df986124c3c0058d5658df13e1f540049ddc612a4f43f44d6cfc3,2024-03-05T13:41:01.900000 -CVE-2023-49969,0,0,63061325cb13f98f133c26869b45d1a118cf0a7d0b6ab8518549c5351de19c47,2024-03-05T13:41:01.900000 +CVE-2023-49969,0,1,469876939b4b9f9c3637cadc1ea51d82fbf4e880cd6bad43cc5c9ae371564219,2024-08-01T13:45:18.787000 CVE-2023-4997,0,0,4afed0de14254e77a99b729070c5643ffbf1676389fe16cc856891c73125b6a9,2023-10-05T17:04:09.880000 CVE-2023-49970,0,0,5502d6fa1c46a421a8d44ecff9c8db4116bf0ff4c0f42a9e95eba6058d2868c7,2024-03-05T13:41:01.900000 CVE-2023-49971,0,0,ca9bad332970c1257540fd45c01eab9c9974869c1035167df4351b38d32d2977,2024-03-06T15:18:08.093000 @@ -237084,7 +237084,7 @@ CVE-2023-50038,0,0,ff5d192e7fc1b72f7fc91ee889b3e57ced3d9310a305102079a962d3b604a CVE-2023-5004,0,0,e9c8d000c46a971371653c9299f9477c1d350bcd7ede26af818f1f3cd6a6fce8,2023-10-02T18:08:26.417000 CVE-2023-50044,0,0,c9dad549cf95cdf6f6a82dc7c47870e6807ae3192bcaf46f220bb6a3fa47ca36,2023-12-29T00:15:50.170000 CVE-2023-5005,0,0,745cb1ab76d83a3107371edfdd319096e1b6d1d025dbda4b9d241b022cb9185d,2023-12-21T19:25:31.277000 -CVE-2023-50053,0,0,95e65ec3936a0d71b77017e8e0ac1a042feab8a2fb9167ba487e8e06ae88f0c5,2024-04-30T19:35:36.960000 +CVE-2023-50053,0,1,9b450f039e219e8c0dc6b5319645fc133cad473316e16f22c0a481e9974339ce,2024-08-01T13:45:22.157000 CVE-2023-50059,0,0,c672df92e602de468d6a10dde3ef7658749e2af6fdb872b8bc56a5b1138f8560,2024-04-30T19:35:36.960000 CVE-2023-5006,0,0,21d14cc4876f8cc1a801d8b8c70a50bf2886311fb727493df0ced96b6e0ba142,2024-01-24T17:16:48.267000 CVE-2023-50061,0,0,b1e3995dc3fd0fc7fe136f60cffc40dccfe3ce4602a59d160c32d5355319e83f,2024-02-15T05:02:52.427000 @@ -237326,7 +237326,7 @@ CVE-2023-50430,0,0,2b4176ddd3b9eebfdb3313b53fe15bfa66cbccd2433967b694198d372f0d1 CVE-2023-50431,0,0,ce67465e9f1496f406cce0377694b14ad4509f4122055381a78462991a530b3a,2024-03-25T01:15:54.980000 CVE-2023-50432,0,0,c08f27e1996614a80b06549eae73e36c5ce5ae51536270832f0a5c16afd3388e,2024-04-30T13:11:16.690000 CVE-2023-50433,0,0,cca42f158b78379b22c82685abf3167233ccba4295ff0ff4f81eb4a5d3eaf7ae,2024-04-30T13:11:16.690000 -CVE-2023-50434,0,0,64d61f1a9787eecdca71333f3fbe9aadd55b758f691f0af1ab5f2ef69989e485,2024-04-30T13:11:16.690000 +CVE-2023-50434,0,1,dcae0085efa2a160f35308b2cfed9a6c4c97f96728c51d0e99c64b121bad7ee3,2024-08-01T13:45:24.853000 CVE-2023-50436,0,0,ed32d35f9bbdbf2811a8eab402768e68d119c724560cb58715088d750e00a6f9,2024-02-29T13:49:47.277000 CVE-2023-50437,0,0,e0da5edc20aa51f9290d9d56149b9b02de20c591ded7d24ad4685d0f91133f40,2024-02-29T13:49:47.277000 CVE-2023-50439,0,0,6b771bac02a72f028393ea4844a2183a7f75d742009abba66069d074c7166b89,2023-12-20T18:29:44.920000 @@ -237338,7 +237338,7 @@ CVE-2023-50443,0,0,a3f70bcc18995eabd4fab96e66d52bc49a84ac0d943c6abd3d1481f305552 CVE-2023-50444,0,0,3229e0a21ab932a63d2b67534d06069326c992397b86c3e1745b09ec51fbf9b4,2023-12-20T18:31:52.980000 CVE-2023-50445,0,0,c46c9ed53637e012ae7f341d8f4351d1697f0ce5316f2de804732128a76d9079,2024-07-03T01:42:57.717000 CVE-2023-50446,0,0,05e90bdb79807651d8037fa8c667c9a19505de1eab37e6da2fafe851ee2d676d,2023-12-13T19:46:58.377000 -CVE-2023-50447,0,0,bce4359a6346091ba0de45025b802b632be184fe6cc8349d49f981a4ac7d2b9e,2024-03-27T21:15:48.783000 +CVE-2023-50447,0,1,2c84ba14b7c9200cccdefb139d20e8bf42fd373f947557ed8a16e0f288517556,2024-08-01T13:45:25.653000 CVE-2023-50448,0,0,a281c868b24ad9a5cc974c7f4d592b1f8b1a2e5553e684b6d1d64d7fba284b2a,2024-01-04T23:56:47.930000 CVE-2023-50449,0,0,662edcc591b62a54a2a94e44b7184be9031cca3421374181b8c6be371ac7fe90,2023-12-13T16:02:58.210000 CVE-2023-5045,0,0,b31f14c9da0d090c1d2e0e800263a0504c8d13f1d35a29ebe899ae30c2115578,2023-11-30T09:15:07.950000 @@ -237408,7 +237408,7 @@ CVE-2023-50692,0,0,6348689bc92a3d7d2b93f4ab7cffabad0f40b97f51e9c86bf7ce40c57b840 CVE-2023-50693,0,0,dd08939e4ce32c03f59f04532580821ca5b697adc34a251e1c45db564373a664,2024-03-05T21:15:07.367000 CVE-2023-50694,0,0,78b1aa0914931a0876815df8adb1c998b4fa38e7b62d7363c774f0a97cabce80,2024-03-21T02:49:58.640000 CVE-2023-5070,0,0,9fb6a723c8279931601cd42b57dae05abcb788776665c70d867d5b3fe8e04ffe,2023-11-07T04:23:25.600000 -CVE-2023-50700,0,0,8f9230002bc634370949151b2412d5f3e0a61f7268c269b9067d411e2e96d111,2024-07-29T14:12:08.783000 +CVE-2023-50700,0,1,a170e7fca21b0a66cf96d92c9a79d76d10f0f906521b1974e4809465f286d528,2024-08-01T13:45:26.497000 CVE-2023-50702,0,0,aabbc77a2d305beae7af1d1ea3729a356ffb437e099440502361eda2d189553a,2024-03-27T12:29:30.307000 CVE-2023-50703,0,0,5412fe627eb96f0f79abae297ed08738bff2931ef5956788ab3e3239f68219e5,2023-12-29T16:32:32.477000 CVE-2023-50704,0,0,d49cda3dff4ba1c0ede49172a75175738fe4d5075a250a9b7bfefb732a3e26ef,2023-12-29T16:31:20.133000 @@ -237572,7 +237572,7 @@ CVE-2023-50901,0,0,b7752738e102253e2a0b7f39c5048c8e82ab91167a2df0aef9325215132bf CVE-2023-50902,0,0,504cd643898a7bc9ec645ee1b1a6396b1411bd18a914c3eab7567bef7c52ce55,2024-01-05T16:21:34.563000 CVE-2023-50905,0,0,227b513834ccb933eaaa4ec5f656b3600ed541d68106bc4e0cd277296952a8db,2024-02-29T13:49:29.390000 CVE-2023-5091,0,0,c7cec8ac0ed74b7bec3e72292573f05043de9e8a9ce53b24a41d3fe5231601fe,2024-01-12T13:39:11.443000 -CVE-2023-50914,0,0,eccfa6dbd6148e464c145c521688d8ece40f3977a81d1c9d23c98404e1f1e524,2024-04-30T17:52:35.057000 +CVE-2023-50914,0,1,b9a3b99e6dc877c892cd69f7f83eb476e322aeb24c5e1b4d7b94bc557819e92b,2024-08-01T13:45:27.550000 CVE-2023-50915,0,0,00a3ea633ae9e4b305c66a6f1d527334c4e7bed6ec1f5b05792ab5b0d7042af6,2024-07-03T01:42:59.473000 CVE-2023-50916,0,0,00ac90d6f74533f9d83a8d94ffd39828316e52d159ef6dd1a2642e91e75f657d,2024-01-19T17:49:52.770000 CVE-2023-50917,0,0,edfd64e12031b9529d9f1a6c091d74038139f3d7423db9147a366f1ed333ee87,2024-01-22T17:15:09.207000 @@ -238184,7 +238184,7 @@ CVE-2023-5177,0,0,f75b34c71c16a0d96e8b0b7857900cb78abf85aa87072150d20ca2ea529b75 CVE-2023-51770,0,0,5bf80758827a35cd84a2c6588e041a9ac7140f0025df86404307d95241ae5ccd,2024-02-20T19:50:53.960000 CVE-2023-51771,0,0,a479f1ce1bd7dc2ffc2cfd5be60cebb22f1330966e42c7757d83ece213e024b8,2024-01-03T21:02:26.533000 CVE-2023-51772,0,0,97b22f767533395414441fe2251bdada7aa18f7f2b70c62f25e5f2a92e875517,2024-01-03T20:37:31.497000 -CVE-2023-51773,0,0,5025ad66558d3b448e12a839169f12f3ea96bcd75ec41203d80e3d086d312156,2024-02-29T13:49:47.277000 +CVE-2023-51773,0,1,4ae688bebcb4cb0d9117d4b4588fe602303beb98fb4d277200d4d496c1c2d5c2,2024-08-01T13:45:31.117000 CVE-2023-51774,0,0,bf83a1047e73a35782bb6dbd5f33e2937de57c51a00d21d5802839ed73d2d5f6,2024-02-29T13:49:47.277000 CVE-2023-51775,0,0,20a554028e8ea000b3ad667057017f7d805886d2edb05a843a9fa093f4af010f,2024-02-29T13:49:47.277000 CVE-2023-51776,0,0,b9aef48cc097ae0f925e40ba4cceb9b388ed86c752d2831ee209060cce14a9ab,2024-07-05T15:56:40.920000 @@ -238198,20 +238198,20 @@ CVE-2023-51782,0,0,226d3cdca2a1281d03aacf683fa229f2432a76022577875d6f89499a1a729 CVE-2023-51784,0,0,7d601840dd52665386e56042b61153e0dd9d156e79737ee0b7e9f683c831f447,2024-01-09T19:19:59.413000 CVE-2023-51785,0,0,af6e089d4b220f7ed1c33a8e658fcc887cbb36e7a814321622f657ea15e4ed43,2024-01-09T20:18:47.197000 CVE-2023-51786,0,0,4fdc458116d4201237bfbb5319db2b5146e0a5b0d8d2248d8ea493764516b98a,2024-05-01T18:15:11.990000 -CVE-2023-51787,0,0,948ebbde04338f85fff7b239dfc98bbc03660a60ade070a0fa0b9cc23f76fbd9,2024-02-15T06:23:39.303000 +CVE-2023-51787,0,1,32045d14c29a8e094b6fc542eae69fe0fa1d19c1ca4a4442151912591cfe915f,2024-08-01T13:45:32.003000 CVE-2023-5179,0,0,ad8ed58fdb4084553e041d0d1d973d60d06712443de8134346a8a8ead34c4da1,2023-11-14T21:29:41.243000 CVE-2023-51790,0,0,edec2966f862ac428116e4ceaa6692f22a64b8089d15af6bb6c63e0fe09db359,2024-01-18T19:47:57.360000 CVE-2023-51791,0,0,87766c92c59658db618453044f42ccf339cd6c1b3df114431d44a1d21e1cad84,2024-07-03T01:43:19.107000 CVE-2023-51792,0,0,7d8f3e64f0e3a253e4c7a397ca38ef25dc0134afeebb28d2f1443032c2248e98,2024-07-03T01:43:19.913000 CVE-2023-51793,0,0,f16336383b20e4486ab2bdbaee11737ed89ba61bef56cc3fe1951b13c7e9c182,2024-07-03T01:43:20.733000 -CVE-2023-51794,0,0,b55eec47b783c5d60ab3afddbfb2990aacd72c3459009cb5db0718f2c1159050,2024-04-26T15:32:22.523000 +CVE-2023-51794,0,1,3dbaa64894af93ed976ad967b8587961f3000f1e04a75da897f91d63088f107b,2024-08-01T13:45:32.210000 CVE-2023-51795,0,0,41b6f5402a8178a714e5febf29ef36c0df54c514b584c16c16c7e7f627bdcc57,2024-07-03T01:43:21.537000 CVE-2023-51796,0,0,3bdae660f318686e13d3a2a8a11434f559a9ba3bec20be5b73aed2cdea2caea4,2024-07-03T01:43:22.343000 CVE-2023-51797,0,0,15fc85d3358fc86d221e1d0ab3fdefddcc3d7931f292adf653ee482f3b3f049e,2024-07-03T01:43:23.157000 CVE-2023-51798,0,0,3544aa30bd6dda454e0b3df26600e87350716d42514085effafca2449c32796c,2024-07-03T01:43:23.963000 CVE-2023-5180,0,0,05de7a925f3b457b2b9f8a9dc5ce3c9a3d8ff4c9a3d8e7d0ed796b81c1f1e2d9,2024-01-04T15:43:40.260000 CVE-2023-51800,0,0,aec707ebf83795ccffe5b85b0b80e9d945940370369c9a262a9751b93b04a105,2024-02-29T13:49:29.390000 -CVE-2023-51801,0,0,3fad536b46351889467ac90bde4a0f3a1fbfc81240e366e6fd869df59746c33f,2024-02-29T13:49:29.390000 +CVE-2023-51801,0,1,daec35424d16e8651180e47ce7964aaa86708153ff4d98fb80cf1eeaac664121,2024-08-01T13:45:33 CVE-2023-51802,0,0,26d2eb61c4bcd76ccdbaa324cdefd7f58728d6a0c595e8ec56ace22886ad7131,2024-02-29T13:49:29.390000 CVE-2023-51803,0,0,5790a7a80f4880b3e3a0fa86790ea4c84e94ec68c366f5e2ddc287043198ebc5,2024-04-01T01:12:59.077000 CVE-2023-51804,0,0,484231f86431903367c628cc303d28e03b88ec949625269f6f66e77d83c9df00,2024-01-24T17:31:25.440000 @@ -238309,7 +238309,7 @@ CVE-2023-52032,0,0,97ab280ce7f21720b81b7f6893c45f8f4965477ca6bac23b53d863df7c1b8 CVE-2023-52038,0,0,05b7a670545c5a4e65beb5f28c01606d3ab01c273d22f07fbb891e3794c8613c,2024-01-30T21:02:47.613000 CVE-2023-52039,0,0,c5eef7162bd1e1ce751c3c199ba02ddfa22436ea63a594c162daa9ad1740d7fd,2024-01-30T20:59:31.530000 CVE-2023-5204,0,0,8ca655249825d178ece09fc5352ceb26e87055104512991305d7a295d26b5f57,2023-12-22T19:03:16.240000 -CVE-2023-52040,0,0,3c299e6e3b1c3e9167230300de11dea6edc12ca984c8eac98bf8305e5d6369fe,2024-01-30T20:55:36.447000 +CVE-2023-52040,0,1,762939d11515580f100465151a16fe161b0f305136b11d8c988a24ca3b912b57,2024-08-01T13:45:33.877000 CVE-2023-52041,0,0,d822171150327a12062651891084a07154ed2e15efb3b51e285b66f24f49d7e8,2024-01-19T20:39:37.587000 CVE-2023-52042,0,0,cb1e6f3f8508317b40a561318e91d8c7f0a6b87ac2a0d9aafa3b3cf38e7811d3,2024-01-19T20:41:35.410000 CVE-2023-52043,0,0,7eaf060af774c8e1f4c03b48ff5bc234f4b5ce940181e844fdb57d43a56d9b09,2024-04-04T12:48:41.700000 @@ -238480,7 +238480,7 @@ CVE-2023-52231,0,0,08910e67e1d661eac1810458524fbe38ca1a931168489e58f1bac5e30cf0a CVE-2023-52232,0,0,45d3aa35ef8e0f2d639d34980ed8a1931aaa1ae2c3b5112d879ef946fd6cd3c6,2024-07-22T19:22:50.377000 CVE-2023-52233,0,0,24329e5e8cb78c20619a65267a796d9746047722fd9c88dad387db2cd78e1605,2024-06-13T18:36:45.417000 CVE-2023-52234,0,0,b707356d9d4723f917fa187ba8fa5cf2cf3d62219c365d8a06113be9107bd2bc,2024-03-28T12:42:56.150000 -CVE-2023-52235,0,0,8144d6a3888b84464ddabf4da9556c657fd97b27b53dcda401f507f66037819e,2024-04-05T12:40:52.763000 +CVE-2023-52235,0,1,393089f89f04b2a17ccdfbaf283799956e18edf610320686f51b038923cbf6ac,2024-08-01T13:45:35.437000 CVE-2023-52237,0,0,a03a0527de0d63b641fea4f770933e108f7ca9b5946394d26750720fd32f5ac7,2024-07-09T18:19:14.047000 CVE-2023-52238,0,0,2e30f8ea841c23e8933cf1b836ef637cf4b8631ae7fa0358b09f6a845f9431a9,2024-07-09T18:19:14.047000 CVE-2023-52239,0,0,de3960fdb3dca065b47274f73317aba57491c0b343797175a22d9fea827b75d0,2024-02-13T22:50:50.313000 @@ -238508,8 +238508,8 @@ CVE-2023-52286,0,0,d57c75df7d4ddd4390fb4bc0cb787c8d5ccb33cbef5a941d5aa3217832550 CVE-2023-52288,0,0,297c3e93d2578fa4354d42073bbfcc9c84a93418874a891bfd157ba56fb9cdc0,2024-01-24T18:40:15.637000 CVE-2023-52289,0,0,b0b62bf64cde12eff577800bdca9d7c0c719bc9a23d6c24a235e18254584af67,2024-01-24T18:48:24.283000 CVE-2023-5229,0,0,96ae4a14c7f75bcf2b6cbe69f7946f8795ec64211a57e06d1e0d2d6ff05a7656,2023-11-08T18:35:10.590000 -CVE-2023-52290,0,0,cd08aaa992f9c881db9779a1aaa8cc010df296ca37c36938ad854f978bac5217,2024-07-16T13:43:58.773000 -CVE-2023-52291,0,0,bc7020574e9d5b41ea1dba52c32fbce8b522537cdd52326ff8615fbbcbdb1853,2024-07-22T16:15:02.770000 +CVE-2023-52290,0,1,5369dfa1357ded926db5bce8b556a4f563025a224b9a6a76b0f1a10cae0d67e0,2024-08-01T13:45:36.313000 +CVE-2023-52291,0,1,a4580f6f675de9ace22fe389271d278665ff098428eed5181bf554e6692e32d7,2024-08-01T13:45:36.503000 CVE-2023-52296,0,0,85a5b959f2db874145dc7271afa4c982911881063ce8b8741fd891792d7a0806,2024-06-10T17:16:16.537000 CVE-2023-5230,0,0,a536f5ec0e596e59d6ed211c038722ef9594f65abf67a435dc22663a31135f5f,2023-11-07T04:23:38.493000 CVE-2023-52302,0,0,22ea8ee42f1d0c97611b1d0c11616324d4f2cec9c11a2c69cd863452202dca24,2024-01-05T12:14:39.403000 @@ -238543,7 +238543,7 @@ CVE-2023-52338,0,0,c19a89634d444e8b7418866f672b3a80a92a3dcfedfc6c85a948f1f2cb0e5 CVE-2023-52339,0,0,9f1cad1fa2a2f42579998fc9fe787e5193e444211822abc9836a67e63e1edb7e,2024-02-05T03:15:07.563000 CVE-2023-5234,0,0,aef3fc2b8ae003c9924c974f3bb05bf3d8e87189a981252ee97d34bc614416ec,2023-11-29T02:25:14.437000 CVE-2023-52340,0,0,efcc45d139400c921426d64a1335d9bdc07b1697256afd1ef16215d589e13c89,2024-07-08T16:42:51.350000 -CVE-2023-52341,0,0,f56cb0074cfafc8d1663e1bcc4011391054a9137ce8bd0bbef118dc90280c992,2024-04-08T18:48:40.217000 +CVE-2023-52341,0,1,752ec91f49f7d27aa4aefb97c1028c0e3ba02b8dbe8f5ef4e4a5be61da661cf4,2024-08-01T13:45:36.707000 CVE-2023-52342,0,0,92c83860d2cbe94f9a2cafa0e6b9752a974d549198d415350ccb967d9f0be845,2024-04-08T18:48:40.217000 CVE-2023-52343,0,0,a7e6c18e23d3a69b842723f8c5414f2f6df809646d4ef3dcee4864419d13be72,2024-04-08T18:48:40.217000 CVE-2023-52344,0,0,b7bdf893497358fce61c7e7c376341fa7e28c8aeaf6089f1eaf3b8ab0febdf07,2024-04-08T18:48:40.217000 @@ -238564,7 +238564,7 @@ CVE-2023-52357,0,0,26288d103cd637bbcda04e71a721251665a0c23a32b663f57db1b9fc577e9 CVE-2023-52358,0,0,0a9b9b1ce599c5b6e28af28108c550a9307f5fa18440515cf987b65d0e1a3c4d,2024-02-20T19:50:53.960000 CVE-2023-52359,0,0,c42a0504fa8d5279c90e2ecc0d752e3045b67971944e9a1090f1657f4d4452b1,2024-04-08T18:48:40.217000 CVE-2023-5236,0,0,61f284a28b459b95f041f3e6b117d89c47706bfb9d23e8a0259457bbdaa561ab,2024-01-25T14:15:26.617000 -CVE-2023-52360,0,0,8366ba504b0c5b6c4ae0441802be4a9a33c3ff5a56ef2bca8c2c903da47a636b,2024-02-20T19:50:53.960000 +CVE-2023-52360,0,1,ecfeb27a76b3cb4fc769668e2502fbe290543c70b0ad7217d769381a048f79b6,2024-08-01T13:45:37.677000 CVE-2023-52361,0,0,092ab8720c04450fa7a554161bf44d8a64b8cb41e66ca97a56cfbb8a97e57137,2024-02-20T19:50:53.960000 CVE-2023-52362,0,0,43adf8e6c64a96c436ca7a8a4039c94bf893e1cb423359d1487ffcd189c406ae,2024-02-20T19:50:53.960000 CVE-2023-52363,0,0,99d169dd3c72fa3419e618676e8cf0cd222763ee208d2535052bfc2f7a5e1e20,2024-02-20T19:50:53.960000 @@ -238575,7 +238575,7 @@ CVE-2023-52367,0,0,059d33a9b5e3c4078b26cbdc15a1861aeba6ae88b6776bd4d8541399245b8 CVE-2023-52368,0,0,ab6ff08815d4283a11d94d78d409b6cb80ad558c4d3f1353292c6023cff0808c,2024-02-20T19:50:53.960000 CVE-2023-52369,0,0,1047464a4296b31a7cf6f87a7a312b39cc01e8c732edf6ebc4526ed97e7841ad,2024-02-20T19:50:53.960000 CVE-2023-5237,0,0,db1f0f2f7a19094ea1f9b84a42cb29bd24bfd8de18c9b9f788659e27198cee30,2023-11-08T18:36:19.067000 -CVE-2023-52370,0,0,1b4bf821deb9a0ab9ba59d48c8790dc30a5b821136389b01af44ae7f3f1041ab,2024-02-20T19:50:53.960000 +CVE-2023-52370,0,1,194d6af6488714fb96d0145469d88cf52f2414a90576119ca3f31777c0e5960f,2024-08-01T13:45:37.880000 CVE-2023-52371,0,0,68afcc6c5e3be2631149b94ebe8da77fbeccdd49b46a67545e3a6091830505f9,2024-02-20T19:50:53.960000 CVE-2023-52372,0,0,15bf2071dc5da824a9df6bfd38af92c18dd9fd6f2d339d50b05268dc8c69c3c7,2024-02-20T19:50:53.960000 CVE-2023-52373,0,0,b688042e235deab3885c2fa0dca42afdbe734d6e8b4da6930a3ca13df8c7b884,2024-02-20T19:50:53.960000 @@ -238584,7 +238584,7 @@ CVE-2023-52375,0,0,8b1124f491eac6a9625ff675ba683400b5b7d3f23a913d0d79196202d05c3 CVE-2023-52376,0,0,966c0b9afbf77fef7dc680bf9065060f324b30ed0f773f88e03a29b8b0b46d13,2024-02-20T19:50:53.960000 CVE-2023-52377,0,0,b7bb8dcb6ccf72aa22b68fe6a7295a9e9583539669264335e5baefdd8fb2b023,2024-02-20T19:50:53.960000 CVE-2023-52378,0,0,7d972f87df9155825bdca8688e6d1bd2426c7da77f9fdbba23cf94fc02560c06,2024-02-20T19:50:53.960000 -CVE-2023-52379,0,0,6d0bac810caa0893bbb362aa5978f65520ff7c811cd3b7a84835622eba230723,2024-02-20T19:50:53.960000 +CVE-2023-52379,0,1,93b64dbad4e7209449b731f7d3e953f0a7c364b7d5a6a5a8e4913ba277d5b0b1,2024-08-01T13:45:38.070000 CVE-2023-5238,0,0,44149c37400f2ca89e434bc998cc9876859c66663ced7d38cf2d325a22daea0b,2023-11-08T18:37:35.557000 CVE-2023-52380,0,0,e1da9b2cba3b4c13652316a85b4966c730f53429d3d34d4abd7f5512f9dde035,2024-02-20T19:50:53.960000 CVE-2023-52381,0,0,e5219322efb600bdde9aed5e915415f14e055ca6cc17b4c2408a846abd2aed28,2024-02-20T19:50:53.960000 @@ -238728,7 +238728,7 @@ CVE-2023-52534,0,0,561b04782ad233f3a992132df8769a7ea9cca6fb96df63b18027307d5770e CVE-2023-52535,0,0,fe6b3187a44c437c26ab3318b1139c9091f6bec389d5c218d94a801b45cfd652,2024-04-08T18:48:40.217000 CVE-2023-52536,0,0,31a4fc764ec17dfd98dd3f2041aa9cf3362d0496d5ba27ab57e1ac620a9f85cd,2024-04-08T18:48:40.217000 CVE-2023-52537,0,0,400cd78cd8b352dd02038249b9f8e2d0516ed5dff3ceb2e5e48f81a0cd592175,2024-04-08T18:48:40.217000 -CVE-2023-52538,0,0,582e9af06d725a7c81633468ec00230fb7f1fbb5290095f5314660befa03bd51,2024-04-08T18:48:40.217000 +CVE-2023-52538,0,1,9c269667a219bd0a186db35ef8e2818d381c8926a2b266c9f2e28d3c047bb2ee,2024-08-01T13:45:38.693000 CVE-2023-52539,0,0,9b4786ab6d7c6f09efb40cf2f8e983776253f66b1d7a2b2bc6f8734a04aa2d41,2024-04-08T18:48:40.217000 CVE-2023-5254,0,0,5f7cee797c6f86eb738b8a7c6816dfcd5a4e6f8647e76dd5bd92cb5b95399be3,2023-11-07T04:23:40.643000 CVE-2023-52540,0,0,6043f7b2833db7ef103b97561cb4ef82751086dbea7d4957ecb9ee6908b9f107,2024-04-08T18:48:40.217000 @@ -238749,7 +238749,7 @@ CVE-2023-52553,0,0,0b5e8011d72662a90a7105b55e6e9be9c1109bc7fe16304b5353648e40ab8 CVE-2023-52554,0,0,a7b452516de481914970af267df91b8f4f93787e9f1cdb5f43aa2638a4b639ef,2024-04-08T18:48:40.217000 CVE-2023-52555,0,0,2e432c1fad688e469cb913a356b94c6dc8ac65a2b869c45cd70751045b3313b6,2024-03-01T14:04:26.010000 CVE-2023-52556,0,0,7e3a11269360b6276bc76b9c4c1e84711ad94d2bfd285528e8777ca57579453a,2024-03-01T22:22:25.913000 -CVE-2023-52557,0,0,466753dd6449fdd4884c769819863ac4e97d3099ea378225ed43b07a7bb6289e,2024-03-01T22:22:25.913000 +CVE-2023-52557,0,1,5ed6bf0a491f3ec717ecac7d6471909703923a149768b3b4e52317d23f8d24e0,2024-08-01T13:45:39.150000 CVE-2023-52558,0,0,7a2164a6ea51bedc215ff5cabec224ee6fc723b56d536531a97955800cae293d,2024-03-01T22:22:25.913000 CVE-2023-52559,0,0,04af586fb20ce25776f7cc5f46253da9986ceb3c1247d4979acb72706c00df50,2024-03-04T13:58:23.447000 CVE-2023-5256,0,0,449fde9e1570afc881ecb8318037371064e22167db61edf93119604c758ac2ba,2023-10-05T14:54:22.537000 @@ -238799,7 +238799,7 @@ CVE-2023-52599,0,0,e52b7677b4119304508ee91b323d8d072f5b5aa9859db67615da9e76835e7 CVE-2023-5260,0,0,eea990ee194786c0ea758019a51c9ffc454af1aecc04aa0aed3120bf95b39b00,2024-05-17T02:32:55.730000 CVE-2023-52600,0,0,acfb39c10d6aa8ad31c55c0fd1aa24c15265a45495dfaddcd5d119565b845e1d,2024-06-27T12:15:15.037000 CVE-2023-52601,0,0,3fd52c8a1b50a9b5570b05df419d601255d40370ac95587faf771910e39ca893,2024-06-27T12:15:15.180000 -CVE-2023-52602,0,0,d06a23d0c6c07f9001b7f20d00f47f7590a5dd2bd755d4bc1fde240b41625690,2024-06-27T12:15:15.283000 +CVE-2023-52602,0,1,97cb19b3162d8332eb3e6e51514444644e7a01bdc7ddae6382fe9cd29542aa97,2024-08-01T13:45:40.310000 CVE-2023-52603,0,0,966aebb2764637363e724fdcdf310ced397aa72d3905743f2d4c73e15ee1cbf9,2024-06-27T13:15:53.370000 CVE-2023-52604,0,0,2a7cc4b346ad3f46e4f7a12c10a5e6e4d984c9ae78ce238728ed2f4f76dec090,2024-06-27T12:15:15.360000 CVE-2023-52605,0,0,eef3cf44ce41a02a3399eb957485c8288751166988c05159972483b6e58d98c9,2024-03-18T15:15:41.097000 @@ -238828,7 +238828,7 @@ CVE-2023-52625,0,0,33e2b5c9631b6255ea3d926003091e30d9a4307751bdc59e18c65ddda8484 CVE-2023-52626,0,0,5c2f2378516bd010d48ba17ce823ea0145216cde165d7d8985c9f0a3930373e5,2024-03-27T12:29:41.530000 CVE-2023-52627,0,0,9d7f45792a268dbd9a6b6780659c5482a0b2549356181746ce43b9c86c359c53,2024-06-25T22:15:16.457000 CVE-2023-52628,0,0,3329a75501420e00bba96b49322ededdee6ebf8d515e2f0926cf7b2c91254fe1,2024-07-05T08:15:02.090000 -CVE-2023-52629,0,0,c84479cf4d47e65dd76c3be73afc0bcc77a65551355e1ec8bad858c0ee1ebc3b,2024-03-29T12:45:02.937000 +CVE-2023-52629,0,1,4aac381cfdcf6533bcbb5898019c55c00aa9c06c15dffc1a2cc7ddcb7c527b58,2024-08-01T13:45:41.290000 CVE-2023-5263,0,0,a5ca98a04e38722def5acce0f3cee4430b6299b258ed512a5240ea8a8830bc4e,2024-05-17T02:32:56.130000 CVE-2023-52630,0,0,c87212efbf5139852fd7e71805df929a746c8df75c9ee82e120adfee45deba78,2024-04-30T09:15:06.730000 CVE-2023-52631,0,0,bbf044b5c0e3f013b5ff402e28693a55fd5fc67ad183959a1460b0d8e1c300d1,2024-04-02T12:50:42.233000 @@ -239426,7 +239426,7 @@ CVE-2023-5621,0,0,c418664501b2f113540a10fbe54573420e49f52f46bc96886f617927fd44a4 CVE-2023-5622,0,0,f19fe82900e70a4450099d29884259279e7aeae442e6aa22b36ae355f702bc7b,2023-11-07T18:04:15.357000 CVE-2023-5623,0,0,60f1ad58d64cba8a36278b2a247125d7b5bacd0d8e604669415615e47be1fb7a,2023-11-07T13:49:33.017000 CVE-2023-5624,0,0,ba5097aba2a2a247854c1d9b4796e1185da31c5dd8141edfd0344a8f714da575,2023-11-06T18:20:25.737000 -CVE-2023-5625,0,0,91a8261beeeba4d1192bc9bef380feac32b981a8bc4e2692734b2f2b4f20caff,2024-01-16T21:15:08.283000 +CVE-2023-5625,0,1,ac0ecbb6ed7210743894554a366916e8815b219327e42d98b1f6277193a8851d,2024-08-01T13:45:44.543000 CVE-2023-5626,0,0,340b8c1c87a43fe8a63e58d41c520f026228ad8445e5d8be6ece89714d56eba5,2023-10-25T00:11:45.460000 CVE-2023-5627,0,0,02bc7ecc7610787f79ee1f759006d4f0a686d373d965838b8defe095f670549d,2023-11-09T13:56:03.517000 CVE-2023-5629,0,0,7e6798797b363836a6f68c0660a0441b52f3631f60a9991276c08a96f308608b,2023-12-27T18:45:15.347000 @@ -239471,7 +239471,7 @@ CVE-2023-5671,0,0,50ac10b9cc7488ff45beca022ca2c8bfeca913601f0e3037d8310da6b8aebf CVE-2023-5672,0,0,3a02ae788e6479b0973d2859fc92f0f3aa5f1eacc4aeaf95969cc73a95f6377c,2024-01-04T17:08:45.617000 CVE-2023-5673,0,0,0790e42d3f7d18a38cdd70e6e65a841d138cd94613d9381c2d41690098ccc5b6,2024-01-04T17:09:37.303000 CVE-2023-5674,0,0,ad6a524623973b785443ed5ef1d7ce3fc434ea992e37165634367ac391476b75,2024-01-04T18:49:34.613000 -CVE-2023-5675,0,0,95e8de0bc40b05155482dcdd97fbfc8fc9ae0472c4e1a540ce976bbd424621c2,2024-07-03T01:44:16.897000 +CVE-2023-5675,0,1,26d656fccd5c8593a8d4a9ed8d70f37dec8e8fe19baf58f5aece6460feff10db,2024-08-01T13:45:45.357000 CVE-2023-5676,0,0,a627ea7bf88ea5b6dccb528b94589245e9f9ba331b8e03892a33208a41506408,2023-11-22T22:39:25.137000 CVE-2023-5677,0,0,08b2893d4601209dee22cd4c45290e5831a26efa6eeca1fc36aea8ab189442dc,2024-02-13T00:38:00.893000 CVE-2023-5678,0,0,410c59a532425f57eceb10bb83477668d8f115078db660202ca50c34d2a6eb50,2024-05-01T18:15:12.393000 @@ -239835,7 +239835,7 @@ CVE-2023-6063,0,0,6829cec6327e2b0ca6394f26a21b2458a09f31b0b2f6c2afeecc6087b47b68 CVE-2023-6064,0,0,78f03cee895ce352a716ad3ae99edb567890d5e6d833a85cb97f2aab2ee7460b,2024-01-08T17:25:22.350000 CVE-2023-6065,0,0,606126f7b21cc8bd97a9171210df62e7270ca53b21c9589911c9dd9a729f42c6,2023-12-21T19:51:08.273000 CVE-2023-6066,0,0,2078a10ede19d6b10d06cf744ed553ff17d783b70411236fd14f487252ab9fd4,2024-01-19T18:27:55.880000 -CVE-2023-6067,0,0,f0f3adc65b1820b216e40ac2c2a9ca6a2cd3be840a6cfe1b24ac5be313be2877,2024-04-15T13:15:31.997000 +CVE-2023-6067,0,1,92c0e24d25c4c3174c14c0b9dee792650759358310a887bf95a117c37c9a24bd,2024-08-01T13:45:46.070000 CVE-2023-6068,0,0,d391e7dc3baa4acb71147241680476a912bc4fc919e84d4d641716e0ce8de4da,2024-03-05T13:41:01.900000 CVE-2023-6069,0,0,dbb658dc6007e5fd181fbb971fa33f46668ecab36c7bcee70c28c6c82a6c6274,2024-01-21T03:06:57.293000 CVE-2023-6070,0,0,94daca7bf405362d13e319969ccce2360c367db1b7eb8b88be12d5968a3dc9c5,2023-12-05T15:11:13.197000 @@ -240083,7 +240083,7 @@ CVE-2023-6343,0,0,f091fa856a9b706a445a374d35d079425568796a86fdd229d3a8d0aa5c4dfb CVE-2023-6344,0,0,2ebdf91e147c3c3d211c6ba44fa50e2f62c0f32ca28613c16f472568dde943c2,2023-12-06T18:18:18.493000 CVE-2023-6345,0,0,af644d51136e16beb5a16156244f2ee0bed30520e8c640223c09cd8c542efc85,2024-06-17T13:34:35.237000 CVE-2023-6346,0,0,40322808d66924571478554281be89a0366cf53106b8faddf7c6041d0db67b48,2024-01-31T17:15:23.213000 -CVE-2023-6347,0,0,2822f1f35cf49f08a81126cd03f4bd5b1dddbdae500676dbf2400faa14ab2556,2024-01-31T17:15:23.647000 +CVE-2023-6347,0,1,88c4289d70c8fc8416c1fc1702ad178cc871d1bf9a9f3ccf2aa742defef2c5c1,2024-08-01T13:45:46.990000 CVE-2023-6348,0,0,807a1e006822c5a78a51ec3941adb5ef9674f51489a7d505dc1a1f8a2808bc21,2024-01-31T17:15:23.980000 CVE-2023-6349,0,0,a88eb6f6189c327ada7bf81f34cfb7112fde40e07b077fb65940bd95bc4e5f7e,2024-05-28T12:39:28.377000 CVE-2023-6350,0,0,10357e0b2a392181275a4419a1ebe211ec2e827e70104346760813680d252343,2024-01-31T17:15:24.350000 @@ -240288,7 +240288,7 @@ CVE-2023-6580,0,0,3632bc97a409c65531788b82d0672087bbf4dca037727333994ef471b92fb9 CVE-2023-6581,0,0,d0900638074a9e2bf26e4140905379079856cac102c301c4c8ee8dd75e683d46,2024-05-17T02:33:47.550000 CVE-2023-6582,0,0,1a027be661b094e73c31bfb50db44be219a4f990363fb5471e09e3d5ca2d0e51,2024-01-17T18:45:11.677000 CVE-2023-6583,0,0,21747000af50c2bd6c4b8b6c66e340f66b1695cdbb1a986ec00ce5959faa5c24,2024-01-17T18:42:13.750000 -CVE-2023-6584,0,0,9161c2aef3e65f23f21242ece7be7c560ecb14f9dc3d036d96de66df586a0ea3,2024-02-27T14:20:06.637000 +CVE-2023-6584,0,1,8773a46c0bf1e98def92bf09be9f216087e9553ba2b162c8add10fe75120d24f,2024-08-01T13:45:47.720000 CVE-2023-6585,0,0,19580d7a2e634d54f61809017ce9c2ae0e9f0f89f82a9c84d0db21255f9df684,2024-02-27T14:20:06.637000 CVE-2023-6588,0,0,dd063a41944b062c6e460e59f76370d247a67c6df97c981e6163aa98d4cdd787,2023-12-12T18:50:19.453000 CVE-2023-6591,0,0,b1a1a9a44c9c1f2dc332be3ec650e1344bc484da0c0de6cd6cccf242741516ca,2024-02-12T17:31:21.670000 @@ -240608,7 +240608,7 @@ CVE-2023-6956,0,0,ebab8c4d5b24405f0d58e5a99fa9a736eda2c65adad9bc90f9186d3a4f452f CVE-2023-6957,0,0,07959fb3f32e925a62f4301abfce36bb0dff388d72f0d4f67e8b6a8fe0020487,2024-03-13T18:16:18.563000 CVE-2023-6958,0,0,dfa9f23d52119de772dd91366d6bc1b2e70ca715d55949e74432bb3d34dda7cd,2024-01-24T20:47:14.900000 CVE-2023-6959,0,0,96b18c24aedfbe73c0e4fe4e1964e1cd30e76197a68db626ad57d5c0bae8b12d,2024-02-14T17:01:57.227000 -CVE-2023-6960,0,0,09cf5b1d60684b4c0b1f8c61ba8897f68a901b7e53a9e37158c066957032880b,2024-03-17T22:38:29.433000 +CVE-2023-6960,0,1,888cf22446dd7655a6247c88ca2ff27fead22d6d6ecc0c6c10ab9a0c1723c39d,2024-08-01T13:45:49.250000 CVE-2023-6961,0,0,43d4b56c87de087240bd914171c41ee9cfc77338524ac0adf913d00076762fe6,2024-05-02T18:00:37.360000 CVE-2023-6962,0,0,986479cdf0104030985cc73b8c5cd922aed26e09aac7f4f0ca21a4d53b3d6646,2024-05-02T18:00:37.360000 CVE-2023-6963,0,0,5d78e338c4f8af8931aea1f2dde5afb8bbdfc8f31ec8fab4d6db3d80bfcdecf2,2024-02-14T17:05:16.533000 @@ -240651,9 +240651,9 @@ CVE-2023-7006,0,0,c76fa7d7bbf2d30f24549b46180eea27a958c95cde9d36c3d3144294e287d4 CVE-2023-7007,0,0,201bc0fe07d63cae12d37f4e7e0187c4ee161ed55409b97632d99c3e6ac276f1,2024-03-17T22:38:29.433000 CVE-2023-7008,0,0,9791ae795c7d961166d06a76669573b4fa31dab53744564771ac85534b25a4a7,2024-05-22T17:16:10.830000 CVE-2023-7009,0,0,81ced3dbb78353b9bd441e865215f9d5307a504699aee8be8e8e368ecdc4d853,2024-03-17T22:38:29.433000 -CVE-2023-7010,0,0,fe3843e7ad45db071bd5bbabd17cc7a0cae35dc808d634aa9ce89e0e360c7204,2024-07-17T13:34:20.520000 -CVE-2023-7011,0,0,4427d904b77bdeb16ee1d7b4c62a38e8f9b3a3bbb05605793250894d9a8f6fd5,2024-07-17T13:34:20.520000 -CVE-2023-7012,0,0,6b507eedf514b671e3ef3d544137c2bb7b1cea92f0be0e7af16ed1860b537ce4,2024-07-17T13:34:20.520000 +CVE-2023-7010,0,1,cd158f29b2c7149d1830cd2f20f16ce1ea838d74d4dcc2619187c2c912c36474,2024-08-01T13:45:49.523000 +CVE-2023-7011,0,1,5479a1bc0d015e17b6f3ef6f0339f44a1c082d026b873ec2affbb8aad427236c,2024-08-01T13:45:50.333000 +CVE-2023-7012,0,1,620dc45a3ed63b83dcd1d3f918e32b2704bfbaa7d6dfdf613d6128a81864b9c7,2024-08-01T13:45:51.243000 CVE-2023-7013,0,0,752e84fc788817f789f383d9b4727a6a371c7a1c500c5d0ed88cf4177f13826e,2024-07-17T13:34:20.520000 CVE-2023-7014,0,0,343f60c0c60318ab32b52871ee4d7ec4b33f7cbb001a30f4e8bb917247b8186a,2024-02-15T15:07:55.347000 CVE-2023-7015,0,0,f6191da82f2fc008d6b0296c01ac7c77ae2915d456ba40916209a6adb4acf55a,2024-03-13T18:16:18.563000 @@ -240871,9 +240871,9 @@ CVE-2023-7258,0,0,743a17302c5d0deefce3c9c18515bc1a780c1d3e967dd943e69bc9c091c417 CVE-2023-7259,0,0,48e34f6790939be91bf1f945206235146161db18f274c444cfe683dbe37045a0,2024-06-04T19:18:14.193000 CVE-2023-7261,0,0,44080cc2bc0d6a25d80bc7855327b03309b2d9def17d97f1c55e50122c67ac97,2024-07-03T01:44:30.563000 CVE-2023-7264,0,0,51dd8b83703649c91504628a1d95022ef41c77d28d8363a527e775cafaba1511,2024-06-11T13:54:12.057000 -CVE-2023-7268,0,0,c61b2680229d9fa33f1c954c8726fa832de0e98c894a6bedd271579a687f7cbb,2024-07-19T13:01:44.567000 -CVE-2023-7269,0,0,3f1411775e418b1331660b2e2f08e21ffd79ce221427bae98ae26bf35cbe5cb7,2024-07-19T13:01:44.567000 -CVE-2023-7270,0,0,3d7ad3a206c04c3798343468b0d534eca04f86eefe46ec321113ac7e2ecdcd6a,2024-07-04T07:15:10.497000 +CVE-2023-7268,0,1,cddf00fb75fb363308068c92d4a58df3d516324074a1a2ced29fd3b08d0ccedc,2024-08-01T13:45:52.747000 +CVE-2023-7269,0,1,110b6fee8b2eb3cb456f239293a3205ab38d8cdb9856a830f8977329472aa48f,2024-08-01T13:45:52.937000 +CVE-2023-7270,0,1,c4a95bbd7a0e223852dd2f2d2c06a04667d14324aaf73c1dbbc09c6df6d4237c,2024-08-01T13:45:53.123000 CVE-2023-7271,0,0,d3dfbc895014f6fee39494b1979fe9a27f5d54abe140606ba373f42540f5c875,2024-07-26T18:19:28 CVE-2023-7272,0,0,cc43888de86ffd529fd218a38f2e0a497e79588d2ca6b5dec5063052cab77d6c,2024-07-18T12:28:43.707000 CVE-2024-0006,0,0,ad936d6110273ab63552e81bb6d0ac8ad8706e8706811fa2ef455d43c6091213,2024-07-22T13:00:53.287000 @@ -240888,7 +240888,7 @@ CVE-2024-0016,0,0,9f5b99ef0d039809c901d88070265a95558aa17f1c51832fa2b12f3ceeec72 CVE-2024-0017,0,0,e30ea632c5fd7e4383ceb5900aa731fb2d3b5c50d8f9b57582813b251f138048,2024-02-16T21:39:50.223000 CVE-2024-0018,0,0,6caed825b99cf1d08d2c43a7dde202929e0ed4736df7763b37a69bde9efd3455,2024-02-16T21:39:50.223000 CVE-2024-0019,0,0,99addb01bdd59dfa56c3bb78510b54e791e3b9af747d8108035ab5d4ed5b10b6,2024-02-16T21:39:50.223000 -CVE-2024-0020,0,0,712dd8da8680172c97d22d3763169a9cb65216ee21f6963d007dfa516ed1cf90,2024-02-16T21:39:50.223000 +CVE-2024-0020,0,1,e73ca517c90039568523c56c44f0cf8b451388b3358b22e01f666a71e39cd157,2024-08-01T13:45:54.660000 CVE-2024-0021,0,0,48878e30e65ca9b7752f91ec634b409988ea482f472219ebf9713d370864d726,2024-02-16T21:39:50.223000 CVE-2024-0022,0,0,3cd621aee24b508cab60e42df908bea04c2b9934f8ccf5b596c88265f9b01d22,2024-05-08T13:15:00.690000 CVE-2024-0023,0,0,91670c2de393b4df4a82610047e68fa9b86a2aa6f6cccd122d84d8ca2ad9f4e0,2024-02-16T21:39:50.223000 @@ -240898,16 +240898,16 @@ CVE-2024-0026,0,0,774ed6ba82d0d9c7a541b3db4a5a359cf56663a0f101d669bdf9d716d0a132 CVE-2024-0027,0,0,8812c8953c6645d49bd5f62acac1b6ed41a4a4a9272988ed4e3b759e771e9ede,2024-05-08T13:15:00.690000 CVE-2024-0029,0,0,55e8334b75ebe900149ddbd8622fac8b29c21a3b953c0b848545a4ed036cbf2f,2024-02-16T13:37:55.033000 CVE-2024-0030,0,0,664cd7a57ff97b4bdc547136f42c1935d0bd6bd5737c5207391f4f56120b6f46,2024-02-16T13:37:55.033000 -CVE-2024-0031,0,0,c88512acad242e98114b603bc7515a9b828ecad1ae63a9e467f3f7956a3c4d49,2024-02-16T13:37:55.033000 +CVE-2024-0031,0,1,b1cddaec25187c54af4bebb0dcc796dbc4415ad876a9b9d3fa787304a60914ff,2024-08-01T13:45:54.900000 CVE-2024-0032,0,0,fc22f68933af2c7d437ee6e4910dddc9fa796af5b59e8f4b2de22081edbdf814,2024-02-16T13:37:55.033000 CVE-2024-0033,0,0,451187864181f0d77b4dfa1da68a841ea2123d8d206b209d6c417273ec6aed29,2024-02-16T13:37:51.433000 -CVE-2024-0034,0,0,e613cde092846c724613bf75d2619a248b17006b0eb3d7cd76bc93722db7b8f0,2024-02-16T13:37:51.433000 +CVE-2024-0034,0,1,cf6982fa2541b8054d4b654ea4c176621af3fadbf8e13dda28278df5290d9039,2024-08-01T13:45:55.720000 CVE-2024-0035,0,0,9eaae678f1f9bc39ffb7f55e9bf0592ae82d1ab0298cf35f56b4c4901d254625,2024-02-16T13:37:51.433000 CVE-2024-0036,0,0,d9c0b6734c282a6d9728365410b8e629548c8409828f413d80063f93ca75f370,2024-02-16T13:37:51.433000 CVE-2024-0037,0,0,afae0135406bbad6488057d26d0f96084f22f97b3b4cd7fc16729b7c9f861063,2024-02-16T13:37:51.433000 CVE-2024-0038,0,0,ea347078d5115696feec8ec271b749eacff96a2d3bca9777e248043aee98fcbc,2024-02-16T13:37:51.433000 CVE-2024-0039,0,0,68d4a281bb1d84f85cd5be142d8735596562f1396cf3f56249110327634e46fe,2024-03-12T12:40:13.500000 -CVE-2024-0040,0,0,cea7ce0e4c27d9ae0a351a895f58e825858e3b9c41ce2f87cf6b7736ce624212,2024-02-16T13:37:51.433000 +CVE-2024-0040,0,1,cb768c0c56422d8be59b8ead41b2abde5abcab3c6641c5456375c74ed8738c47,2024-08-01T13:45:55.990000 CVE-2024-0041,0,0,b813d6bcf6c48b25cab056ec33aebf10f8835e0ad83b4b9b3e3dda0209c4933b,2024-02-16T13:37:51.433000 CVE-2024-0042,0,0,34dd3c01d1963f1fea072b87cd9587b8d1a38074bff497ca57638675955e85e5,2024-07-08T14:16:55.973000 CVE-2024-0043,0,0,f3099d06b40cffee02572b8511d5ab7fd4ed425254fa8e65e2f8173e0b0fad0e,2024-07-03T01:44:34.530000 @@ -240916,7 +240916,7 @@ CVE-2024-0045,0,0,ac422fdfb68e98cda45a9f3b2c924a0f3e621e205fe65a13c6a460bdf86b6e CVE-2024-0046,0,0,8445d29de027101116922d508cb8dd56eee777aca9a81aa42d8b93ddc9ba5ea0,2024-03-12T12:40:13.500000 CVE-2024-0047,0,0,c25f47e47c68f8ba9b41086c423ef72168ff29979539e7bc97672b3ded3ec18c,2024-03-12T12:40:13.500000 CVE-2024-0048,0,0,30be6e3e50a23d26d89c4e1eb4fa3a008e8939a0b64350645365e22b39561aec,2024-03-12T12:40:13.500000 -CVE-2024-0049,0,0,34a7dcb78485a69ed1a91affb3173b2ae6e75bca0385aed5532808fd51af4632,2024-03-12T12:40:13.500000 +CVE-2024-0049,0,1,f9f835822b69f6be57714cc4435ee72c0d6574c4bbf25abdddb096ed40c941c2,2024-08-01T13:45:56.777000 CVE-2024-0050,0,0,951882ffdd33d24a879cb9e3e3102d9a55d8b7f86c6ed371f54fd9cab3650a53,2024-03-12T12:40:13.500000 CVE-2024-0051,0,0,499108fe16dea1529516a3cfe4336e416f629611e159efd5458affbb8c6db782,2024-03-12T12:40:13.500000 CVE-2024-0052,0,0,028f0ef50c0a5bd8d4204c572d3df54976f47eea47c82f4c337b4b73e60f4aea,2024-03-12T12:40:13.500000 @@ -241226,7 +241226,7 @@ CVE-2024-0442,0,0,e668f9212f8d92d7ca5312abf3cb533771fdb94474e576e87bfd2f8f7f395e CVE-2024-0443,0,0,1c53aa6f952906cf4494d41e0b6c286bd1c1df90573f36235023670c7a62c9b8,2024-05-20T11:15:08.403000 CVE-2024-0444,0,0,da0fa6d26cc5ba8ce3eaf1affe1c4cb847e93e14dbc8841fc351198d58a63014,2024-06-10T02:52:08.267000 CVE-2024-0445,0,0,c10e707d5647ab1342257f9a4a29093e03ceeaec29e911035db503d83d4cd38f,2024-05-14T16:13:02.773000 -CVE-2024-0446,0,0,88b5b37362cd0f7f277f452f07d96f66a862c36893b9c97d78e95547fb7a6580,2024-06-14T20:15:10.570000 +CVE-2024-0446,0,1,14e4292f078b9efd266582a258304634f5d47672c88d7dae04b631ceca34d5ab,2024-08-01T13:45:58.510000 CVE-2024-0447,0,0,d6ac0f7ff90c513ebab097a18d7b8b626aaf721cf0d368c49ee19d424ead086a,2024-03-13T18:16:18.563000 CVE-2024-0448,0,0,87f04b60756132266856b5c1485ba8f9ba7b5da5dfc1346e7969a7ec23954a89,2024-02-13T18:33:30.020000 CVE-2024-0449,0,0,67e43a1e8e6f7b7512d19cac5c78ebbe72fba0525f0d16344eb20eaddb9565ad,2024-03-13T18:16:18.563000 @@ -241526,7 +241526,7 @@ CVE-2024-0756,0,0,b74435a4e5e1d4f3b3a4ce7f115d91d803212fb6f57df8fa4a2fa8d8698a38 CVE-2024-0757,0,0,82f1d5fe239632b077ccabeaf1b70c316c565ea22ca5e26cba66c98605a2ac8c,2024-06-04T16:57:41.053000 CVE-2024-0758,0,0,fc97ebc5b04803b57ecd71df236ee98d87d4a211b2215bb34049825cdbd967a6,2024-01-26T17:00:10.607000 CVE-2024-0759,0,0,1f29bc7ec90b9be141ba5df168c832467834f0104b9d12619d749a3c91302f63,2024-03-07T20:15:50.480000 -CVE-2024-0760,0,0,890830f312160c50b512353409e3f5860bb46b29b9ef9a697afa442cfbcbfca1,2024-07-31T11:15:10.347000 +CVE-2024-0760,0,1,bac0ff58784dd2bd6e4e16ec591594c40fb8a94e7c975dcced660677a640adbe,2024-08-01T13:45:59.803000 CVE-2024-0761,0,0,b79031e86661bd45f67f34e880253c63ee13d5042f1a53406b385d1b1dffaecd,2024-02-13T17:16:46.780000 CVE-2024-0762,0,0,81ad586535781fa8baa3508ec280780590072000f5a50fe32a89e5b366d40ac6,2024-06-21T10:15:10.580000 CVE-2024-0763,0,0,5db758bc3605bfbe323fa32ed26d84a2f001f92484a51218ea35fbdc0710d446,2024-02-28T14:06:45.783000 @@ -241543,7 +241543,7 @@ CVE-2024-0774,0,0,15c49eaf793f25ab22e8feb6cac6347d66353d7ca680118b3df214ff5f1c3a CVE-2024-0775,0,0,04e79303aed834c3663e22288e6d782f176be85607f62a433c753d92c4d1b779,2024-01-29T19:08:44.387000 CVE-2024-0776,0,0,6b6e1dbefcd1b1bee875f387d1849126a103e56933f5cca10f479e015aeb7009,2024-05-17T02:34:57.543000 CVE-2024-0778,0,0,9eb2b3a6e9549baebf908c2c7b4edd6f4b5382b5510b15c60b02a43ea6f3112b,2024-05-17T02:34:57.650000 -CVE-2024-0779,0,0,49bd0e0012850fec73b2ed5fa5ce9bff5373e2453b4a023855861172d7354bb6,2024-03-18T19:40:00.173000 +CVE-2024-0779,0,1,54287d130c77a447efbd69203977432f0dc46895c41dbcc2dac73e355f2f2638,2024-08-01T13:46:00.620000 CVE-2024-0780,0,0,f20f3b9457f9d772dd82634dd5915c49c36c05e33732ae4577a5a32593a8aebe,2024-03-18T19:40:00.173000 CVE-2024-0781,0,0,e3928c7bec97cfde56686872d6f4f69ffc380a7aa4fff8a49b57267bb64940ac,2024-05-17T02:34:57.813000 CVE-2024-0782,0,0,dd227a8b469ce6630eb22142a87d0da772ecdb0285534b1bcdde3ca20e489d0a,2024-05-17T02:34:57.917000 @@ -242013,8 +242013,8 @@ CVE-2024-1282,0,0,2eb3c24a78d526ba60f7de9b228772cc4cdca541c83c9925e23d3c86e361e3 CVE-2024-1283,0,0,a97e435850ca7b90657c47e89bd465a7244a29a008bfd047df6690ffa63f1da5,2024-02-14T18:19:42.423000 CVE-2024-1284,0,0,55604dea33d2cbf989f030bf509fafa79de3f9786c8a35caf42d87f103a6d0ee,2024-02-14T18:19:17.177000 CVE-2024-1285,0,0,dc1a281c695ebb0384667e83aa8e8b27899294b8b3ab6a7160b2802a0632094a,2024-03-05T13:41:01.900000 -CVE-2024-1286,0,0,7c4e8de94d16ea2b30f95afaa8b4d4ff90b7cd27520ccb5f155441e8729c6512,2024-07-30T13:32:45.943000 -CVE-2024-1287,0,0,21a43b5f7960da24273145969577329a899f272f78aa2ace5fe5161b801f1b64,2024-07-30T13:32:45.943000 +CVE-2024-1286,0,1,3bd6b0500eb850a439565ed5856133c7184d0b24874ae807295a8d702d6d5eae,2024-08-01T13:46:03.343000 +CVE-2024-1287,0,1,100f0b9c941fc22c694187ba257ba0aaf21504e99f2562e31c93639a1641267b,2024-08-01T13:46:03.523000 CVE-2024-1288,0,0,9b4b26e98e455da0bf3a01191faed41bc4e93cd412694a208b945f21b0c39ba4,2024-02-29T13:49:29.390000 CVE-2024-1289,0,0,ce4baaa839d6e246e03946bbec3160687088f2a904b66c70b5f22766bbcb5e31,2024-04-10T13:24:00.070000 CVE-2024-1290,0,0,d8c98dc21c8ebffa389e2adca534c5228f87db07c9e83c1a3e5e389d19cbb2e7,2024-03-12T12:40:13.500000 @@ -242022,7 +242022,7 @@ CVE-2024-1291,0,0,10fafd045b32182cd18c1a4d750c94ac76cbc3f03fb2ffd85b82cb5e2ff8d4 CVE-2024-1292,0,0,7fc7fb1b96765afbbd247550892db7527119c1a8e57d7581e5473c321f8579e4,2024-04-08T18:48:40.217000 CVE-2024-1293,0,0,e471e79b77611f62bb59b862001c132352bd2a8beca8853eefebde5311abd9b7,2024-03-13T18:16:18.563000 CVE-2024-1294,0,0,7708751bfdcdf83e56e4de24760c2a792b7bd0c3c50de29207d3173f5160ef9d,2024-02-29T13:49:29.390000 -CVE-2024-1295,0,0,2bce82ad7584e58efaaf4c55aaba1a78255f89142a09f66a2ddc8ec897c191c6,2024-06-17T12:42:04.623000 +CVE-2024-1295,0,1,733dffb9b3baff0f6f00e53d1be334413dc75010eb733a4dfa035e41314523c5,2024-08-01T13:46:04.293000 CVE-2024-1296,0,0,cf8635aadac748620898188ca490946b2b5c75731feefb613195ade4e01744f7,2024-03-13T18:16:18.563000 CVE-2024-1297,0,0,99ab590c2d129ba188fde6f8a07a02c34afd396d53204b7be1878740241d5dfb,2024-02-20T19:50:53.960000 CVE-2024-1298,0,0,411af97e2820bfadb11b2eaf3380004504a4d88488591f09c66407ba8874f33d,2024-06-11T04:15:12.513000 @@ -242353,7 +242353,7 @@ CVE-2024-1655,0,0,6f8f5d96c23f16dd85462488caf0792739b9e6c2291572202cdaf3786063e6 CVE-2024-1657,0,0,db1dca61fd86668e15d6de257cffb8827bc48118ce93399dcda0f29a164fb66e,2024-04-25T17:24:59.967000 CVE-2024-1658,0,0,cdf09354b8cecc8c3b3eb229e6889eceb0036447d9401d9215716ef5bb07f428,2024-03-18T19:40:00.173000 CVE-2024-1659,0,0,4f41cd118a7ec0f572b148c6cc50852ff19807b11bb7671f4099db7035e809bd,2024-06-13T18:36:09.010000 -CVE-2024-1660,0,0,606d2d9461ea4a95415d852e854d79946150cdb598330fb0a2daf923fec11339,2024-04-15T13:15:31.997000 +CVE-2024-1660,0,1,f1a7ef3875210067be92212b471afff7e1f14d1fcb7e7247ace79bc190c8f7ad,2024-08-01T13:46:08.063000 CVE-2024-1661,0,0,1418f33a1134b317d73f7a0e51e7103fe6d53caa5820735e8b8d23944c62dc53,2024-05-17T02:35:32.207000 CVE-2024-1662,0,0,7ac244609c0ebd4fed55548ab08a88807988fd96126d0e3368dfb0fac4ac3898,2024-06-11T17:27:19.127000 CVE-2024-1664,0,0,c939f82f7f39765fe854cfcf77784c4030c0a10aa3c81805812b1dad48e7ae66,2024-04-09T12:48:04.090000 @@ -242363,8 +242363,8 @@ CVE-2024-1668,0,0,5d777dacf70894c13bb98378761ebbab538d2f58e3be366f3dd859cfdec3a5 CVE-2024-1669,0,0,7051f11d6175af0afa7adcb8852b15d12f5bb44802faedbbae321e1477b73fea,2024-02-26T16:27:52.577000 CVE-2024-1670,0,0,a52bf5588667ab3c6352dda7d66363ad70218ee54b9823389483c89a38572a75,2024-02-26T16:27:52.643000 CVE-2024-1671,0,0,b90d151a59720bfc66cb3bbbb41d4e1a2a08b8f84ae511718307d6e0d6c90578,2024-02-26T16:27:52.697000 -CVE-2024-1672,0,0,3217f2460d447634172924d56726c677d1b075c0e363555340c92f7ac4694597,2024-02-26T16:27:52.740000 -CVE-2024-1673,0,0,67396bd5b848d41ce13ef0879da5b1da29f5624f4c45242dabebe7714a93f938,2024-02-26T16:27:52.780000 +CVE-2024-1672,0,1,5df25617ae1b8580bd17e41342f3db39038751d4dea40ef6d92d4a83e8eeb0f4,2024-08-01T13:46:08.940000 +CVE-2024-1673,0,1,72b6738109f060ca33cec8daa581f20d84f924c2dda86dec338ec0b1edf6aa3e,2024-08-01T13:46:09.737000 CVE-2024-1674,0,0,4d84e36811dabb70c79f006b1fddf82b6781a26d6832b626a618ba98da8173a6,2024-02-26T16:27:52.823000 CVE-2024-1675,0,0,694007ff503c67bb2473e2a3fd85a3cbeb468f543b49d8b91c288ff6cfb53b8e,2024-02-26T16:27:52.870000 CVE-2024-1676,0,0,173e7d89d59c334734934d206529b0c3801a830263693157944d6c86717f4cf5,2024-02-26T16:27:52.910000 @@ -242384,7 +242384,7 @@ CVE-2024-1690,0,0,43710398ffbfd97fd2d2298464d22f4652f5075ca69bcdcca56d9f56aad3c2 CVE-2024-1691,0,0,2ef9826de93209d069c81e6ab358d8eb246774f7a80e6c411cef0c396fac265e,2024-03-13T18:15:58.530000 CVE-2024-1692,0,0,e629a44d67e992e57af157f5aea9a741f288cdc07f581fddcf0fc8e93b27323f,2024-04-01T01:12:59.077000 CVE-2024-1693,0,0,7d3cbcfec88fed9681b32070817b963b8ddcb473d92ad7474c8d67a492ce3782,2024-05-14T16:13:02.773000 -CVE-2024-1694,0,0,fda2d205335786bcc7d2123f7a89755dabea6636efba5902637d57bdbde40c69,2024-06-10T02:52:08.267000 +CVE-2024-1694,0,1,bf85801f0832fa365d7f8985fe10eb8a950958f13710e85ca1e046f87150cc0b,2024-08-01T13:46:10.687000 CVE-2024-1695,0,0,8e603ec667654cc4b678430735bbb950c30369f42a605012688aadb7093e6714,2024-05-07T13:39:32.710000 CVE-2024-1696,0,0,a663827cac86b281a6bafba3681725496e03564ad841117e5d12a480311031fd,2024-03-12T12:40:13.500000 CVE-2024-1697,0,0,122d0b7b2464b5cdb9c8634ff2a556f4e654f017fc1c1b4f9f5a42e2fdd2fc2b,2024-03-25T01:51:01.223000 @@ -242404,7 +242404,7 @@ CVE-2024-1711,0,0,8da112f3097be36e5a03e0ede9f41c01ed4c7e0029ec48f53a0b02c63e79d0 CVE-2024-1712,0,0,2706cad7a11fec91f38938cc077ef2589480c703025fecbc08338dcd88a6afe0,2024-04-15T13:15:31.997000 CVE-2024-1713,0,0,e37c1d591c60ce6420c1a8f513ed83f4365b07beb0b63047a411871aff3ed555,2024-03-15T12:53:06.423000 CVE-2024-1714,0,0,89f5925d48309652312dfa6936852577b82bb527296f4567de0ae860b9af2880,2024-03-07T13:52:27.110000 -CVE-2024-1715,0,0,6138b94270722d0092ff53f0b2c8ffdff3a07b1d773f954069698108b40daa6f,2024-08-01T04:15:04.367000 +CVE-2024-1715,0,1,c96c93b795dae15c35103e83a447a7e967360b042f35eb30ea914a9c7c620537,2024-08-01T12:42:36.933000 CVE-2024-1716,0,0,c5f5d9a61c9aa9da7a42d2c2603e3f8d0ce08ac19f5354115847d2e53bbebf64,2024-05-02T18:00:37.360000 CVE-2024-1717,0,0,0972da8fc5e5f6236802b364284b15bfd904079e9cdd316b293f6c1517b8b02b,2024-06-04T16:57:41.053000 CVE-2024-1718,0,0,8f00858e2fb091044c9d726487547ff27c3d43ee3b63311cf8df3291da694c7e,2024-06-04T16:57:41.053000 @@ -242425,7 +242425,7 @@ CVE-2024-1732,0,0,834564798b34803457a0ec9cad4eefb5bcc466f88b5c86130580cd8ef81bdf CVE-2024-1733,0,0,1de98e53179418755768544ec663a550e1c566834940320a34ae086f141e0f3f,2024-03-17T22:38:29.433000 CVE-2024-1735,0,0,3dcff7ae67c98fab6233fc660b83fa45dc36cbd0301a4874decf976f37ddb465,2024-06-12T08:15:50.043000 CVE-2024-1736,0,0,a622ca00070de7a96b73d1a11c2dcf2634e69d5606345f8f86e99a97ccacdaf4,2024-07-18T19:50:31.223000 -CVE-2024-1737,0,0,31b52338c715c76f51e84224108938a8017d05b1b57fe92f529e474626ff33db,2024-07-31T11:15:10.487000 +CVE-2024-1737,0,1,431ef45da0f4b4670d42afc3c1240d1e4f77449968f30478ad5d3ddba17c5c7f,2024-08-01T13:46:11.850000 CVE-2024-1738,0,0,65086d20a025a8acdbd054263ca4cd14eb5b5ba61d808610c94ef2eec44edd2f,2024-05-15T16:15:09.807000 CVE-2024-1739,0,0,0f6aa88dfc12de7693a69727eb574af9b67e4c54140ec3c21c30b657e8fcbacf,2024-07-03T01:45:31.133000 CVE-2024-1740,0,0,974b4647e97273950b6a297affa420d08f59acef309aa37814c6598a456898d5,2024-04-10T19:49:51.183000 @@ -242434,7 +242434,7 @@ CVE-2024-1742,0,0,ef8e2131c95185fddee2b27fa43b85956207ef471d56b7605b9d2e6a1c53a4 CVE-2024-1743,0,0,483e7e67b70ea440915c26337d00527748cea35503b453ed4beec805a523f208,2024-07-03T01:45:31.390000 CVE-2024-1745,0,0,2df7fa4c4fa47f53e57d7b3e9d1babc8c2b1750e2bc785796313c72e8ffb6593,2024-03-26T12:55:05.010000 CVE-2024-1746,0,0,8022383f443dbbb627f1c414153375fa50b320afeba598d9c8de3dc5c8a81f57,2024-04-15T13:15:31.997000 -CVE-2024-1747,0,0,bba88062968e921ca1473ab61d2b6b3e36b1f4c0248a27106c749c99d98abf88,2024-08-01T06:15:01.980000 +CVE-2024-1747,0,1,26085c02b92319e3c2e3a29bc0a91f1b1bda84075404147afb7aef5772adc4e6,2024-08-01T12:42:36.933000 CVE-2024-1748,0,0,225d9c0ba3d2388d2e1d2564afa842c8e38abf8b0b7cfc5e0b1ec6fc81b6c96c,2024-05-17T02:35:34.880000 CVE-2024-1749,0,0,f620be6c4367805be5c83719352e695698d105470ce084642dece004f1c7c3f4,2024-05-17T02:35:35.020000 CVE-2024-1750,0,0,7f9ce3864064263c9a72249a090e6a4b7033b154fc6d744d107ff4cdf65d126b,2024-05-17T02:35:35.177000 @@ -242527,7 +242527,7 @@ CVE-2024-1841,0,0,f4e8bd74a5fbd12f19dcea0b5dba0f8a2a457d15fb920f05a0a2b61c4b3cff CVE-2024-1842,0,0,e8664ac54c4f11affb3e56503eb727b236964e0ec4aa86fbb87f3f907d7f98c2,2024-05-02T18:00:37.360000 CVE-2024-1843,0,0,0d3bf930de854f1c0c8da830fb3267d2771bb5ca0f0dad3394acd20cdf2736a2,2024-03-13T18:15:58.530000 CVE-2024-1844,0,0,8eafa490137dd0762fdf2a9173e258dc01143942e9be70a3263d7ca4a0a3afc7,2024-03-20T13:00:16.367000 -CVE-2024-1845,0,0,10bc4cc2949e6b23618b2a9381307c601fac2bda30d5d8332af9db43bd2188d6,2024-07-12T16:59:38.207000 +CVE-2024-1845,0,1,1946c93a6c240e4e5045ff6e29a47e68dd22f002bd1a04b11fdfb01d9849dbfd,2024-08-01T13:46:13.657000 CVE-2024-1846,0,0,889de99236ecf870bdb5d58961aefcf71000d8ed0803c867da29fd8d060c65cf,2024-04-15T13:15:31.997000 CVE-2024-1847,0,0,ef1a51fdea90e50c6ab0d92b8aee649d76b06b89602970828675e826a4aee626,2024-04-04T15:15:37.850000 CVE-2024-1848,0,0,897465c2fe8def268bffaf464f47e8ac363145e816cdd8378ab0f8bbf6eed195,2024-03-22T12:45:36.130000 @@ -242579,7 +242579,7 @@ CVE-2024-1895,0,0,d1e7c3c0750acc96a7fb0f0dd2cc3bb7d13a5aca58c4ae1642bf959fd7d659 CVE-2024-1896,0,0,bcbed857ec4f4eb0c9316a694b68de7bbe818d846908c446e6c57b1c66517170,2024-05-02T18:00:37.360000 CVE-2024-1897,0,0,0efb8d9a4d1f85779f8525208eb15fef6382b5b7cf3f1e753843d932081544db,2024-05-02T18:00:37.360000 CVE-2024-1898,0,0,2048e63a97333551e3764a3fbd061d10d8f595ae0c5039d398dcf763445bbb5e,2024-03-06T15:18:08.093000 -CVE-2024-1899,0,0,a6cc941154de0e9c0dc38ff7e86ddbb7cea8ccc06dc595550f154b58a3de84b6,2024-02-26T22:10:40.463000 +CVE-2024-1899,0,1,559b7c50ffa921a98a9a4eb560a9551cb0fd4d6955293dc50c887af682b17f74,2024-08-01T13:46:14.650000 CVE-2024-1900,0,0,c93c9cee1b5533e9623da41f5a887996ced3ed0b29b5ea0591219c246a9caf78,2024-03-06T15:18:08.093000 CVE-2024-1901,0,0,59c71952d62ec3100057313c435157c9947d25a94b4af27143fd915982bc6691,2024-03-06T15:18:08.093000 CVE-2024-1902,0,0,552aec039b904208185561d339cc67918e0f20cfa46c31de74a1c935a699387c,2024-04-15T18:15:10.070000 @@ -242649,7 +242649,7 @@ CVE-2024-1971,0,0,0d9cb5107f1036f4f23265da8dd7b2bd2dcf4479650a723be6560fae09ba01 CVE-2024-1972,0,0,2560881ff7431f691f7bc00728ec8a23e2620398774dabc33f53c4508cee2e65,2024-05-17T02:35:43.363000 CVE-2024-1973,0,0,626b2f0735da4862b031577cf6d60a60bb435d6eef085a140fda3327fd09bd68,2024-03-26T12:55:05.010000 CVE-2024-1974,0,0,dc475e5db2810e48258099e8096a48a8d4eea51b1241d562afef1cfd4323c64d,2024-04-10T13:23:38.787000 -CVE-2024-1975,0,0,7af007d8bf906accbf726f829d552a0f60fb822578776cd75cabfa6ae0313819,2024-07-31T11:15:10.570000 +CVE-2024-1975,0,1,a44f2b7ccc523da3820a233c66a53c89f599691219506cbec9b0bb71ecd2ed32,2024-08-01T13:46:16.177000 CVE-2024-1976,0,0,c42fde98a9f4f021d37eae05be5cdd6a425eba391cce3b7b3b2e8b240d70bd79,2024-02-29T13:49:29.390000 CVE-2024-1977,0,0,f4c93cb09e0dd632ab410c1ff88e1a572fb17d35be648b109a192a65dc30f9e6,2024-02-29T13:49:29.390000 CVE-2024-1978,0,0,194a996e86c18d7c40d1315b29a524d0f48e8a7d042ccb89cd8a2a6beb64d004,2024-02-29T13:49:29.390000 @@ -242692,7 +242692,7 @@ CVE-2024-20015,0,0,d1d8bdd6d1fa1f4d1678fcb9177a4ae4da0af52770fa46e26129dd1c299d4 CVE-2024-20016,0,0,23d42679a125731e1842dc4827fc98ffaa2afa5f0ebd1d4093677bb31bac3891,2024-07-03T01:45:46.207000 CVE-2024-20017,0,0,0d8c37ffcf86a62528063befbe2092023e2f2e52feeafdbdca4d0b453a827170,2024-03-07T03:15:06.853000 CVE-2024-20018,0,0,fdee8f35aa7caf1b76ebb5153dda589ed5f3a39d7e0627457cfb496a915da983,2024-03-04T13:58:23.447000 -CVE-2024-20019,0,0,06577ca4d7515eb7a97df701f7879021d1e43e402d93cb1dfbed1ddee9c2ac11,2024-03-04T13:58:23.447000 +CVE-2024-20019,0,1,9ac59b07fd070968055b3fc5eec95b892ffe4596c92f97cb9ed025632cc29b53,2024-08-01T13:46:17.030000 CVE-2024-2002,0,0,9bb787dd73ad4270fec473ae00d969f2b5c55795bbfeec9dd3a74d6c7578cada,2024-04-19T23:15:10.720000 CVE-2024-20020,0,0,1af2be5239e7889690a24490c95fb1d9708b12f77c9dc96edd896786cba1d93c,2024-03-04T13:58:23.447000 CVE-2024-20021,0,0,9da6b4090664581723961fe14bfe7a2d90b8c57bd1123df3f77b75a47e068fa3,2024-07-03T01:45:47.187000 @@ -242718,7 +242718,7 @@ CVE-2024-2004,0,0,306db60d89047f410d6d61c78e80dc7bb4c98731b18731d539f0ad8a070bfc CVE-2024-20040,0,0,7794263a0ff9ef7a9a293c11fabe2693e4a31f8e28a938c194a6c9b335ae777e,2024-04-01T12:49:09.583000 CVE-2024-20041,0,0,797b0699213b143be2b5cc6707e3db6951b01d8acd1047588c4a44bd9a512123,2024-07-03T01:45:50.520000 CVE-2024-20042,0,0,32382b46cafc275eb8cb8740c3ccddf6582487704ec09b63083a965b2c45f6dc,2024-07-03T01:45:51.343000 -CVE-2024-20043,0,0,26ae3b43ff91e6bf659746155696d366f36da7bd480831020aa824d3e1226c68,2024-04-01T12:49:09.583000 +CVE-2024-20043,0,1,9d08b57823a7799fd71aabd74ae5b9e264651170e52f1494fb1aba445a2da6af,2024-08-01T13:46:17.817000 CVE-2024-20044,0,0,7b00cd01d330620de78c873c2b5a5d1db703e947cc4fd0c1c90748e651832421,2024-07-03T01:45:52.167000 CVE-2024-20045,0,0,474f87795caacdac62e2bb0672a22684b0d2c3ee03c744a052a1b929c228a9a0,2024-04-01T12:49:09.583000 CVE-2024-20046,0,0,2b2346806d601871102b47d1857114a53d4c008a1b72821d4c813d568163c45f,2024-07-03T01:45:53.103000 @@ -242743,7 +242743,7 @@ CVE-2024-20065,0,0,64d81629fd2b421d070fc983a5c3988d207c67350ddf57b091bc21df01bdc CVE-2024-20066,0,0,9acd743ae0739d0105b8f29fb9d4ae5e2d28c957df392539618dc63926de0ee0,2024-06-03T14:46:24.250000 CVE-2024-20067,0,0,1f8b2f8c715bdcaed434516377e7c3641986c19edc4e9bc14558e6ec2383790e,2024-07-03T01:45:57.883000 CVE-2024-20068,0,0,679bf43563d4114fa5098e0c9b0aa62c3a9922c68431f8362f508d44bd4491dd,2024-06-03T14:46:24.250000 -CVE-2024-20069,0,0,2ffa70bed1f2497897f9fb2c22f9122e068f78b7273e9b3788644edd67aa4ed9,2024-06-06T03:15:08.747000 +CVE-2024-20069,0,1,172335f530710667e7919bfa3b2133c1f2b8547ae34d6fb283548afd07a6be8a,2024-08-01T13:46:18.590000 CVE-2024-2007,0,0,a3fe3f3185f5699d68e2f942355bc2ef347eee74a5b1980d4a10ee9977afe62a,2024-05-17T02:37:59.197000 CVE-2024-20070,0,0,ae885049fd2221a76bca2636832ad5f29da86da3a58d64d82733ecc73da349ae,2024-06-03T14:46:24.250000 CVE-2024-20071,0,0,410f42d94adb2ac030a10c212dc2dfbda3e5d2020644b7c1536ad292ae26f08f,2024-07-03T01:45:58.913000 @@ -242756,7 +242756,7 @@ CVE-2024-20077,0,0,5ac9101dfc5d925867f375757f40d5d4d6e0cc7f8cf8a55648aa9d83a17a5 CVE-2024-20078,0,0,d5f48505c574c6565f4358009b04f1f8167b5408792fb9d871c2e1d23683448a,2024-07-03T01:46:00.490000 CVE-2024-20079,0,0,2b8a0e5983dc5248cc97f95dd3191ef3fe114b43595192c541ca56a9b4ab2524,2024-07-01T12:37:24.220000 CVE-2024-2008,0,0,9a3dfffdf84cbaecec5e4ac83fc5a2438eae99d0d114b1045bad131ec5701236,2024-04-04T12:48:41.700000 -CVE-2024-20080,0,0,9f77e554af3bbd3c0972041ad77ad07151acaabcf84a676d09d66327102a89a6,2024-07-01T12:37:24.220000 +CVE-2024-20080,0,1,90f248eed6a75fce7971996f28983ff9968e454d013e84d03f8b65c25bdd5601,2024-08-01T13:46:18.790000 CVE-2024-20081,0,0,c71489cf0f2bedca59bdc5569ddfc23bc345fff8731fd4100ad31f358075b686,2024-07-01T12:37:24.220000 CVE-2024-2009,0,0,e315bb187496fdfbd237809339603453c22bbf947712d2f37b8c2f26c500e401,2024-05-17T02:37:59.337000 CVE-2024-2011,0,0,272771111cefc333003471d127119de63334f3a19776f05f1d2885aa0ec12744,2024-06-13T18:36:45.417000 @@ -242895,7 +242895,7 @@ CVE-2024-2042,0,0,148bfce3b5f48e2144e9167826ed5f6f120e539bf15296a435b2ce580e8b1f CVE-2024-20429,0,0,f467ae3dedce5a1f38518317999bbc8fc79bc2960eb95679505ee1fcb992ae20,2024-07-18T12:28:43.707000 CVE-2024-2043,0,0,7a3896d230f6f1ae602a08f92e2eaaa644b5893021849dee8a675eb9b7c81e88,2024-05-02T18:00:37.360000 CVE-2024-20435,0,0,bea0a896db86de220514ce1618de53b05523503910f680b3361f4c8bb8734dd9,2024-07-18T12:28:43.707000 -CVE-2024-2044,0,0,18ef6f7655f9f95707cfbf1a13de0d80a7ff66dee83ae08307be87037636e53d,2024-03-23T03:15:12.063000 +CVE-2024-2044,0,1,20580816ecbcb2d456bf5030911ad2dbba893322604e54631bb30d65d5e1ff74,2024-08-01T13:49:39.293000 CVE-2024-2045,0,0,711ac9453656184dc732c4f4633f4f7bda646ec847d7f0c1c60c568976f58aa0,2024-03-01T14:04:26.010000 CVE-2024-20456,0,0,bf56f0f0f8d3ed0f6616c43fc8ca6a47b6257ec17aaac25185ba7a05790b5cc9,2024-07-11T13:05:54.930000 CVE-2024-2047,0,0,65f16d2420b90c918e9e57877aac5f0440eb772d779ccbd58288e6312f3c8025,2024-04-01T01:12:59.077000 @@ -243167,7 +243167,7 @@ CVE-2024-20896,0,0,f5a79ceeb25ba9647cc21d9543d8800186d8f9878e72a48e8635d8a794830 CVE-2024-20897,0,0,b4907e5ec226b893be4856201e70d18b101abd8c29a80b91c03b5cd7e58521bb,2024-07-05T15:56:19.790000 CVE-2024-20898,0,0,cca3eeadcac09bbca92b2c130b68dfddff8b8a1ceb0b17efa6f710b9770bba6b,2024-07-05T17:11:39.327000 CVE-2024-20899,0,0,1ea5d3c975e5b8e190a2ecdcdb2ffe2594326badefc6428838ae53a3dbe043d3,2024-07-05T17:11:57.943000 -CVE-2024-2090,0,0,d0f185b95ea4846cc7f0564ace325a7938c2de7017e560c0a42f21b52adb1bcf,2024-08-01T05:15:09.993000 +CVE-2024-2090,0,1,fd740e48f3f1bf206125be718e7b11b445beb9b28db87f1795fcc38f51fc8ca6,2024-08-01T12:42:36.933000 CVE-2024-20900,0,0,dd950b876d70624a07b7af1c0b796b44690939cd5e1be274d843ac0163ab8cf9,2024-07-05T17:11:51.040000 CVE-2024-20901,0,0,5f9dc6d7e5ec003b4ebac42377482eb7121a0918aab2f40a5dfa15c434211c61,2024-07-05T17:12:08.827000 CVE-2024-20903,0,0,c9ef8d846e3822bbe70c984e58a2c7d206219c2d005aefebbfe48d3291a64941,2024-02-20T19:51:05.510000 @@ -243292,7 +243292,7 @@ CVE-2024-21016,0,0,641a7c74149bd4b401bd2e10b6cfaae489650e22f58047d4136bd4a3e1264 CVE-2024-21017,0,0,f8876929485591395a0c8beb0fd8b64c4fd6f6f0b341e00b72251c19cbbb2907,2024-04-17T12:48:31.863000 CVE-2024-21018,0,0,cb52a8fdc7a4ae231f24e399d225f4515ac33de79654502635708c1e90c2b58f,2024-04-17T12:48:31.863000 CVE-2024-21019,0,0,73923fdd6992d7670932a7bcfccad8b39eb82569c95d5e913e0b30282fa52c3b,2024-04-17T12:48:31.863000 -CVE-2024-2102,0,0,6fb56c3374562e6cffdbefb52afb5af03f518cc9d0ee6687ea96aa7db30c29b9,2024-04-17T12:48:07.510000 +CVE-2024-2102,0,1,063af9520b1c53909e19a4c543dd4e89e92c8386c428fad7438fe729761d527f,2024-08-01T13:49:41.380000 CVE-2024-21020,0,0,d93fbad604c8e8745c1fad68359513bcf3ca7a5201c226f17ea97a532899c166,2024-04-17T12:48:31.863000 CVE-2024-21021,0,0,b6e440cb47f4455a8f7f21333abe159a9793be0fa8a8c63ca1e08d9c4c708934,2024-04-17T12:48:31.863000 CVE-2024-21022,0,0,7ccbb7b797124115a160253b5a2400bd740ca6dfa914b0db3e9b919856d02d6b,2024-04-17T12:48:31.863000 @@ -243421,7 +243421,7 @@ CVE-2024-21136,0,0,ad8ed641eb9e0dfe773d7b453ce1a777791004300592ffcb4b9aeccb6189d CVE-2024-21137,0,0,8b1ccafbde54d689b232a5ba4da880526c6b578bae146f59db158760bdc4f414,2024-07-17T13:34:20.520000 CVE-2024-21138,0,0,48e73281e1321884b4e1b592183d2ed2dbef5bea392b3b824bf77e00d538c447,2024-07-19T14:15:05.290000 CVE-2024-21139,0,0,ac1e7874c883d227974696e6da1f4ea74ebc9ccd7cdf45b6f9f9065cbabb6c27,2024-07-17T13:34:20.520000 -CVE-2024-21140,0,0,a355b887f2f3e95c0cfcaf2066fbef2d48cd303288049a5e4f501e4b1ab2b1f0,2024-07-19T14:15:05.400000 +CVE-2024-21140,0,1,4152c752f631d64c27b06e5115099663133590db63a2cfff7e518248f96c3d60,2024-08-01T13:46:27.193000 CVE-2024-21141,0,0,a46fdd63fb31ff99b4780cb153ac9f2ae29000b590679f43cbb64095a7fb0c47,2024-07-17T13:34:20.520000 CVE-2024-21142,0,0,f819d3a8ba6f5d3f6da22376ee3aac7e9c1012257d5ae28b11f63731d1547f92,2024-07-17T13:34:20.520000 CVE-2024-21143,0,0,00d3158bf58fdef1b0ea359eb4fd1877d407a38c8141a35ed2d92f7d5fd7ff90,2024-07-17T13:34:20.520000 @@ -243434,8 +243434,8 @@ CVE-2024-21149,0,0,ee2bd3223896d48493ed4bc80a50d18703c1a2b0e21db09049566849fca16 CVE-2024-2115,0,0,66506b198b4ece0adfc9016031263e6294a50c545f577c56b849d0c705d750c7,2024-04-05T12:40:52.763000 CVE-2024-21150,0,0,8bf7ad156aade7fa3f13e2261e319a8085198969642f90d90774096fb77f35b3,2024-07-17T13:34:20.520000 CVE-2024-21151,0,0,e8ca35bec02993425acd90acfb4d2e73c5aae2b099512170076bd06c14602c1e,2024-07-17T13:34:20.520000 -CVE-2024-21152,0,0,a85adfe3861867eb820adfd4ea02bad98fa8a900dccacd96f1f55d687a656b7b,2024-07-17T13:34:20.520000 -CVE-2024-21153,0,0,c8458119fcbfd9f02f5a1ce247970bb6210f07655c548eaa3d76c87f0f4acc61,2024-07-17T13:34:20.520000 +CVE-2024-21152,0,1,b2610bd2c7701194ba56c825a61e9ba1ea84b82c16dc44ae810ef7cc4bff4111,2024-08-01T13:46:31.340000 +CVE-2024-21153,0,1,fb20f04f00fbd9902df909e6edacf1b7ee25352a9294f3fab6e03e96a0219c8e,2024-08-01T13:46:32.083000 CVE-2024-21154,0,0,099d567eb33a29f6624253dbe8f06985b46ef882f1082779ae31006311c8f39d,2024-07-17T13:34:20.520000 CVE-2024-21155,0,0,a8a570c6113128d8e322a917915d458e58ad7e39aa8fddcd9ddda272c2940422,2024-07-17T13:34:20.520000 CVE-2024-21157,0,0,a99073388e7d69b417e5124a12222be6b32277aac3b517188bf963739bc47a99,2024-07-17T13:34:20.520000 @@ -243448,10 +243448,10 @@ CVE-2024-21162,0,0,6599b8c3e8d4ce2bd56d758955204dc60835461542055bd440e060f275ede CVE-2024-21163,0,0,1c218c6447f5bc6b8f4a4bcf8e9b987dd785d628ca9f5052cf582edba99f160a,2024-07-17T13:34:20.520000 CVE-2024-21164,0,0,409d31e6725bddcbc7809866c9718b7fe29398e89ea9c04f4ddf0f02e0b7f477,2024-07-17T13:34:20.520000 CVE-2024-21165,0,0,20993784304d7762a8021f9b16e9507bbf65223455c94632351bf958464a2463,2024-07-17T13:34:20.520000 -CVE-2024-21166,0,0,cd0ccb7e26b0042d10682fafcef59b8e3db872ca836c80fcf20e795acbb2febd,2024-07-17T13:34:20.520000 +CVE-2024-21166,0,1,ede3b755f5804621a8ef25d79d9679055f7e04ae20b8138869340e09adf91227,2024-08-01T13:46:33.843000 CVE-2024-21167,0,0,68c8f227666c06298257f7b468706125c2676562df674ce8154b7de7b4496211,2024-07-17T13:34:20.520000 CVE-2024-21168,0,0,c69572c1110a4cc480c0e5afb70d08f9984a6bb55f4f3c55f471c687df059b4a,2024-07-17T13:34:20.520000 -CVE-2024-21169,0,0,6d416c479843a0071bd22af5367121416561bcfc9518573d5c37574bade21f3a,2024-07-17T13:34:20.520000 +CVE-2024-21169,0,1,75cfaa7dbb3017d69d1c32e7c9a3a07923f1edef87ef625d3961fd8622ff3f69,2024-08-01T13:46:34.717000 CVE-2024-2117,0,0,79d7dda411024d417201240caa69efdac6b41c6c0da01c1949cb476b1159e785,2024-04-10T13:23:38.787000 CVE-2024-21170,0,0,c5187e657a00f549910e595ece74fe4bb94a48a7327eb2a07a05c5358de9a8fa,2024-07-17T13:34:20.520000 CVE-2024-21171,0,0,47628d9da4d18c12e2a9053c2a08c0bd86b220494d7e2bc5ca61d2d605df9a9d,2024-07-17T13:34:20.520000 @@ -243467,7 +243467,7 @@ CVE-2024-21180,0,0,4da0fde33dfbebbe0b3ca286005ad286ff1f5b333d68223ed96e66f77c83b CVE-2024-21181,0,0,bcc5028a8221ef30b0110435c5ffe37b8bd34748cfc42293d9ebcfa99a85594f,2024-07-19T13:37:27.357000 CVE-2024-21182,0,0,1124989def14cb215f68114dd9b658abe71699b5e68782a29805527846fc0b21,2024-07-19T13:37:37.967000 CVE-2024-21183,0,0,5ae39870bee023fced3efcc39ddd05bb0b0ca09db0609fc111fcd577d8d2ed2d,2024-07-19T13:37:47.980000 -CVE-2024-21184,0,0,833a2bbb045bad80556ab103664bf106ee9ce7b3911f1ef3ab655696d8412687,2024-07-19T13:38:01.037000 +CVE-2024-21184,0,1,37cd37fb545516fbb59fd1ba869a88e708c94a5eeb702cc6c468d416d7511790,2024-08-01T13:46:38.110000 CVE-2024-21185,0,0,f54700702dbfdaddcef28547e3238c76c435075d556ca83da19506ff0ce6fe1d,2024-07-19T13:38:11.350000 CVE-2024-21188,0,0,7669d96d6b451543b1a30be166716e2130148a874048e1cadefe6966bde664f8,2024-07-19T13:39:30.817000 CVE-2024-2119,0,0,11b037b49d290ba489439edd17815bf1f5dbc31c03ff8b80541b76c9d70af605,2024-05-22T12:46:53.887000 @@ -243684,7 +243684,7 @@ CVE-2024-21494,0,0,0bbab6d51758efdfbb0a7b2f9291f8e5deeed39eed0d020b8776487f79305 CVE-2024-21495,0,0,d8114eaee60fb319f9f14d9bbb95c01136acc0dc9b681a7e416381982ba11775,2024-02-20T19:50:53.960000 CVE-2024-21496,0,0,bc18d667bbb1c01eb5e4fc46b2bc38bbb8c81dc55742fa4593dbeabf01f13b10,2024-02-20T19:50:53.960000 CVE-2024-21497,0,0,8aedc196ee518fe8560cc512f459ccbfc6592e8201a18667b2196e5e6bb6b22b,2024-02-20T19:50:53.960000 -CVE-2024-21498,0,0,4117e6d3ad1aeca57b662a40e9e4660968764283c31a8658b5b3f6b794d22c3c,2024-02-20T19:50:53.960000 +CVE-2024-21498,0,1,3c9376a89b1471a3f3dcd2f26b2302ecf028dd3649469284754d6d6bbe15e588,2024-08-01T13:46:44.130000 CVE-2024-21499,0,0,056024a19cf11190da9415625f86200e7f99c9c1c15d5f4eac3772c0369f1c48,2024-02-20T19:50:53.960000 CVE-2024-2150,0,0,c22643bdc0b2ebd66d5b5ba194b52141f4bdaa1a38843b6dbc7c558d59d8b77c,2024-05-17T02:38:04.570000 CVE-2024-21500,0,0,e32cca032c5c817f0140a0fc7fc7560c3a63cfca90476fe248b7470595a38be1,2024-02-20T19:50:53.960000 @@ -243694,13 +243694,13 @@ CVE-2024-21503,0,0,e2363221420f9e91165d2e5e4f11cb5254f6968c7e760608a87c93e517f34 CVE-2024-21504,0,0,d1975e31d99912870265dfe3c0f9fa565e4267402a6881e83026bdfe490998fd,2024-03-19T13:26:46 CVE-2024-21505,0,0,eeec50ed2729f8fe5c135b167a12073f62da960f51e71d942aa5d105e291ffcd,2024-03-25T13:47:14.087000 CVE-2024-21506,0,0,0501aa9e15543c672d3de96d3e8d3d0c1c21afb2e19e663e8d9159c8a48b6b13,2024-06-05T15:15:11.173000 -CVE-2024-21507,0,0,a45d56121bc22987a7e171885c0776f984df93b2eda6bf30cd6e65f8aba12e81,2024-04-10T13:23:38.787000 +CVE-2024-21507,0,1,8947ae846b77ababc3f73b93eb86705240bc1e66f68d9ab3cc4c15c2d2f15ce9,2024-08-01T13:46:44.883000 CVE-2024-21508,0,0,91d3f4fd811265c7ae6cfbde19cc50f2a3032a6b0f431ed4f4fe4fe4037296ca,2024-04-11T12:47:44.137000 CVE-2024-21509,0,0,08fba31db3f8065b5101d619dbf09f6a70e9bd75e0cdca8a16d4f1b7287d5cf7,2024-04-10T13:23:38.787000 CVE-2024-2151,0,0,567e14a5be97fe288f7c22c1f514dc3379a49ed0781c50046999a25212abd777,2024-05-17T02:38:04.663000 CVE-2024-21511,0,0,034219c7f11132d003e7f8ae540b3244138c125a352f628cb71b799c63f5d2cc,2024-04-23T12:52:09.397000 CVE-2024-21512,0,0,9cbfb13f3fd71c5173001386cf9b3561f71a4fbd60ae5c210558dde9343c193b,2024-06-06T13:15:31.390000 -CVE-2024-21513,0,0,3f4c542ac5d5831f978929644b6d144b3f0b07f794f6201b819aae59e579a64b,2024-07-16T18:12:46.020000 +CVE-2024-21513,0,1,2cc4921b2e7cf735a4c6ffcd0f834de9cbd6a82ef6ed4bcebed2a92ed1ba3df5,2024-08-01T13:46:45.590000 CVE-2024-21514,0,0,e35fdd4092be130115fbeba8b97bd5409f312ce1ce7e7ffdef71e8b5183b17b0,2024-06-24T19:59:16.767000 CVE-2024-21515,0,0,1016168f136676e2e2388766ab91d4af3b5f99f1c59142f068698c8df1e46a6d,2024-06-24T19:58:28.987000 CVE-2024-21516,0,0,abe3a9cd7507c4a7cc049f342ee17d37e317ed8b9557eb7b4e8fb458fc8f5c80,2024-07-03T01:46:42.813000 @@ -243711,7 +243711,7 @@ CVE-2024-2152,0,0,f2e88e66faf33e9c4d36d3f1c2c4a23ba71382dd197e078197925765fec314 CVE-2024-21520,0,0,a0a1b113a382a8f0d2c8531b6b39066eaa70707f33ee106e6bb420796b3de015,2024-07-04T15:15:10.210000 CVE-2024-21521,0,0,3d24dbb51985d4e34dfc96b8ce06b7a168669f2571a1659e2371fa09c11d0b75,2024-07-11T13:05:54.930000 CVE-2024-21522,0,0,2e8ebbda5c13599cfe2044d3c4c2928534e0a16f56db3f6070b4ffc7e0448bbd,2024-07-11T13:05:54.930000 -CVE-2024-21523,0,0,1cb7f20515fe4bf9fce48ef1ad15a8074d4b45196b3f852e54372991de8b829f,2024-07-11T13:05:54.930000 +CVE-2024-21523,0,1,2330ac0e4e609e6cb7b2d157ba739c957bd5fcf4369b9f17b9fa0a4336dfb21a,2024-08-01T13:46:46.460000 CVE-2024-21524,0,0,1b404e02733b1d9bbc968bbcd180a83e2167b1bd45b755297d40db9c945a4d6e,2024-07-11T13:05:54.930000 CVE-2024-21525,0,0,b0b4bb7ac52f850d274c4462f4e1c3c5bb13c947283cf1a8b69a39e30d235a9e,2024-07-11T13:05:54.930000 CVE-2024-21526,0,0,effd07762d29cbaa402155d2c949789e21ab2c387b4e4af3dcba88775e370e17,2024-07-11T15:05:20.940000 @@ -243818,7 +243818,7 @@ CVE-2024-21683,0,0,9e98100df1746075be9f809cd7f00fd6b0e3e97382e91b70d2a85ac430e36 CVE-2024-21684,0,0,59f12a4b04761da303d7e3a40c8e6edc45c41d4945c065d5a0ffea737104115d,2024-07-25T12:36:39.947000 CVE-2024-21685,0,0,5660fcc85eb1dde5c65259d6d6205ae74624ad923dcf6470bb4f3577f99d7f00,2024-06-20T12:44:01.637000 CVE-2024-21686,0,0,4a77c3c56e7b5b00a78de09ce573bf8e0630b6f60379d0ccdce9209c8559bd43,2024-07-17T13:34:20.520000 -CVE-2024-21687,0,0,7f853701aecb2ebf7acbec91687c790cb83db5ee246802aacc74de3322b22abf,2024-07-17T13:34:20.520000 +CVE-2024-21687,0,1,376ba9a42cfc804d783dd58059d1accf85ade36be58bc6e24e95588c80302a09,2024-08-01T13:46:48.050000 CVE-2024-2169,0,0,ccec08a82f821939c7d9060fb6509a15844937ebc051af4ba9acc04d6186c6c4,2024-03-20T13:00:16.367000 CVE-2024-2170,0,0,758d6332b5fccd657d38a7eddcc769e16fb72e0c1b6514443e29b8614302434a,2024-03-26T12:55:05.010000 CVE-2024-2171,0,0,e9c79cd9676afcf55166b18cc4887c5a70983811183f36611429f962ee8d8a26,2024-06-07T14:56:05.647000 @@ -243997,7 +243997,7 @@ CVE-2024-22004,0,0,b52e7465a30d7c5ebe6c493dd6cc2d67cc064cc642f18d912a28d694a4c40 CVE-2024-22005,0,0,7c6f103bf7460af3aa2ef64d365e023cef0df975935f7ead94d03dd82aac0ecc,2024-03-15T20:15:07.527000 CVE-2024-22006,0,0,9db530d54f3e0b6eeed21f2d20e1fc7569473f02c8a78e672208ec470c1d339f,2024-03-15T20:15:07.573000 CVE-2024-22007,0,0,2479ced51fb83261e64a00a1f223b2d29fd1fe799fa62b23006611131f326136,2024-03-12T12:40:13.500000 -CVE-2024-22008,0,0,7fc9a1b982e5d3314a941e9f7566743db161c505a82931621e7866f209391948,2024-03-12T12:40:13.500000 +CVE-2024-22008,0,1,6c890483b6824de06d1dd219a50dd94a51e16527823b55b553e6e2498de2507f,2024-08-01T13:46:51.077000 CVE-2024-22009,0,0,53e477b181d94f850019213f4840e6cce7061a4c364953474f122f965d518dc5,2024-03-15T20:15:07.623000 CVE-2024-22010,0,0,48bb31cd9fda5132d6bf173e5f25a90e9963e9143797f12960e4a1affd5276cd,2024-03-12T12:40:13.500000 CVE-2024-22011,0,0,f1daed51c903d88d263d46bfaefe467f13d6b47a3368a8cc0e99c1a391f6eea9,2024-03-12T12:40:13.500000 @@ -244032,7 +244032,7 @@ CVE-2024-22048,0,0,1cf5c84b51f32a2d9cd455b177bc7d0068798ea13c6da0e35bdf97da35666 CVE-2024-22049,0,0,e0aa4de23030cf0b7110d536cc1314669971a90897b5486d2170114af934a148,2024-01-23T19:15:08.283000 CVE-2024-22050,0,0,26cad76c4bed44f07cae5f3f97ba89ef5443ee14184d92fe046d3355cebb8d7f,2024-01-10T15:10:36.697000 CVE-2024-22051,0,0,d4701fb32ccba7ff31152d6da41e61ccee5919598235b1b16530fe1bd582850a,2024-01-11T17:07:05.660000 -CVE-2024-22052,0,0,089292edbbfb1451ba6b0c69e4f181eeb9155db919d4ed8ffc4c89beac6f32d9,2024-04-08T22:52:44.573000 +CVE-2024-22052,0,1,a05a12f336cc805a072166830fe6ae20b18bce4605108c6a31a4ab38fa44ff65,2024-08-01T13:46:52.157000 CVE-2024-22053,0,0,fcc7090aebe2df352917521dee947feb77d6dc39631742e8018d520fad4e92a3,2024-07-03T01:47:01.167000 CVE-2024-22054,0,0,73a8715b10390b13a6a2cc88f16bcf8c00d729cbe7bf795076d77dcd8cc105c4,2024-03-04T02:15:16.820000 CVE-2024-22058,0,0,eae5b623fec72c03a6a5d974e26c7d12252da5cb9c755e2b5a8deaacf0fa051e,2024-05-31T19:14:47.793000 @@ -244182,7 +244182,7 @@ CVE-2024-22230,0,0,42f4eee95fd60b5eeaeba93093e0d1567146d443874a02c4d11adf0112ba9 CVE-2024-22231,0,0,511fa9516414d7af8c7274e67e3775ba0bd5ea4e4372d7ed475e2f6577e63eb1,2024-06-27T12:47:19.847000 CVE-2024-22232,0,0,16f48b01e14124e59e3d216e92136923db7e9d4460dde4847bbe209c022e0527,2024-06-27T12:47:19.847000 CVE-2024-22233,0,0,f9c5ca449ffbd175d1b94e4da4966e19820256fd387d8fcd2757bd4d96bb8484,2024-06-14T13:15:50.443000 -CVE-2024-22234,0,0,f4f9dc1bfd99f450d70a13f199931f55b904e985229e400b261be7704caf3085,2024-03-15T11:15:08.857000 +CVE-2024-22234,0,1,5eb57c20410059b178d94ad04ecb7aa76616f3f1dc3b2653aeb3afd19ac4df79,2024-08-01T13:46:53.813000 CVE-2024-22235,0,0,f1b9a9878ac26d6802beff9e53ed05992b038328f600000798dfe8b5020ae4a4,2024-02-22T19:07:37.840000 CVE-2024-22236,0,0,61e97ae2fe26d2e18102eb4d36276d9a0d1226b5de29ed6cba58ba9185026fe1,2024-02-09T01:01:27.447000 CVE-2024-22237,0,0,263ad6fa0f0b14ab26f84a9f82c36b4a04e45b9ed264518913e3b94572536c19,2024-02-10T04:12:42.680000 @@ -244219,7 +244219,7 @@ CVE-2024-22268,0,0,823f1c8fe109f7318b4cb5fcaf25c94abb4b72eb405c2d208677e483171c2 CVE-2024-22269,0,0,83ec4dd4286041c4360e0d35616ab25a9b861fe9ef36df2e2fc4ebcfa2a6967e,2024-07-03T01:47:12.157000 CVE-2024-2227,0,0,6858b6fb3beef7b6297eae7344c0bc611e8d1dd2c2ff64967d8d2ab0b2897ccc,2024-03-22T19:02:10.300000 CVE-2024-22270,0,0,3b61ed6d3b8900d9cc3e84c361e3721adbde3754af1325a87616cc3f0092bf39,2024-05-14T19:18:31.490000 -CVE-2024-22271,0,0,c2e596e885d5168129ca8e76c7b2da9cc943b9f742ab8562112bd4e7e1caf84c,2024-07-09T18:19:14.047000 +CVE-2024-22271,0,1,c68c7abf466a660fd4d52c665cf118cb88242b1be3f139e271f3b7d99c4e675f,2024-08-01T13:46:54.670000 CVE-2024-22272,0,0,a4dcf85cbf4922799718d1c10a1120b8457bb2d971adaefbd7555789801981e0,2024-06-28T10:27:00.920000 CVE-2024-22273,0,0,bbfe4422f6a695e0d7f4adf7fd8e62a3d62f7c38479d626b031b977da58959d8,2024-05-22T12:46:53.887000 CVE-2024-22274,0,0,87361af428d962de76a852670d2cc5984c82c5471ebe2a2d40c0bfba59a3e184,2024-07-03T01:47:13.067000 @@ -244323,7 +244323,7 @@ CVE-2024-22389,0,0,451d1ae02a6041295b930e0ff664283dd61ab8032aac29f3de0110c211267 CVE-2024-2239,0,0,62d5946fcfafb2a4be7efadc9b7155219cc610ca4673c610a784dbbc3d091b1f,2024-03-13T18:15:58.530000 CVE-2024-22390,0,0,55902feb124ae1975588cd87c6024bd399658d0d39667fda823793e05c4f62c0,2024-07-03T01:47:16.433000 CVE-2024-22391,0,0,1f24cf22f6c35797cf3f1b5f513aeb27d6c9ee9188ababd3d8b06daf33275477,2024-05-05T03:15:06.950000 -CVE-2024-22393,0,0,644ce1fbf27738a89208ef0ac4ab7c5595bd79c7e7e77ca758ff1b68e6b2968a,2024-02-22T19:07:27.197000 +CVE-2024-22393,0,1,708a22f5d3d86e394b7bd57dc98253e578e5dadb2c4096ced276d5893ef994b3,2024-08-01T13:46:55.723000 CVE-2024-22394,0,0,ff5d094c82b627ed23cbc9e3d21e923a656eaed78e78037950e31bab38d65a83,2024-02-14T21:46:40.537000 CVE-2024-22395,0,0,0d29784f93066fed6298e77c63a9a7ba15d287ad4907fe05e0ebf699a961fc21,2024-02-26T13:42:22.567000 CVE-2024-22396,0,0,a5f00b94b83832b467db4300982cd3b6b686890c80cea01a13cc610352a5b12f,2024-07-03T01:47:17.270000 @@ -244372,9 +244372,9 @@ CVE-2024-22439,0,0,d7a7b572beee53b66512fc19be17c3d6cb68344acbd1d99f9e2956209263c CVE-2024-2244,0,0,41aec355f079deb3c815718a9277f010e5e21c50317c0cc2fa902ffd2d6d5133,2024-03-27T12:29:30.307000 CVE-2024-22440,0,0,3d70b2afb8c1daefa939392497f652da82a7db6224ab8e08ddbf5f360293d915,2024-04-17T12:48:07.510000 CVE-2024-22441,0,0,d974db705829cf05b22e157df217440dd5d74842713d9bc45c9eb02f022d665b,2024-06-13T18:35:19.777000 -CVE-2024-22442,0,0,6cd8943b606f82f9805c763a4b9ec31735cf88cf76efca2ccc718cdf40618170,2024-07-16T18:00:02.110000 -CVE-2024-22443,0,0,ae675c6aa6bb43b003e795f1ca7c48e877ce18561eabd0b71d0b4fed4c2c7467,2024-07-26T13:14:58.543000 -CVE-2024-22444,0,0,cc61e6e2ccde6f2547adb3aa17f32c76eab8e6f52cecac1eb7fac684054f7b3c,2024-07-25T17:46:52.627000 +CVE-2024-22442,0,1,2e0b0f4766af07c0d6b3ff6e8268c5353293e8f6325a14598f04babe00a2c3d3,2024-08-01T13:46:56.070000 +CVE-2024-22443,0,1,27a67673b7c0ae8982f980390674c80990ca93968fa9f3b73c7d5ad9ff61d8d2,2024-08-01T13:46:57.173000 +CVE-2024-22444,0,1,1378366e0b636efd3e2101cecabd93b96114212b319eff1d0d59da40fea2e792,2024-08-01T13:46:57.887000 CVE-2024-22445,0,0,a6af5c7306e37f1c831f19f1accec343bae2ff2fdb348ced0577263d09a6b8e1,2024-02-27T16:51:44.013000 CVE-2024-22448,0,0,8e90df505cef41effc57c679101495cb231edb0790ae704dce635c915090456b,2024-04-10T13:23:38.787000 CVE-2024-22449,0,0,f33d4db580b05ecc377b9d7d6de8d5383f1a67c4e1bbff2a1ad282c40aa707a2,2024-02-03T00:30:30.737000 @@ -244418,10 +244418,10 @@ CVE-2024-22525,0,0,c98d00e2df86bf18090655d340ad08b672b00445bc806eb15a6b726f34c71 CVE-2024-22526,0,0,218c7b0985406f5be9160a4eba34edfa9ea3d3e7eea50564dba9ab623f1f5014,2024-04-12T12:43:46.210000 CVE-2024-22529,0,0,c99a9546a8a1bf73954eb7152b5917a72a7df555ecc955a1c1717a6f52ba76ad,2024-01-31T18:42:44.573000 CVE-2024-2253,0,0,9e9e4eb36754a889ba12eae0616f7d1597a027d9b393d499aed081cb747c7f40,2024-05-30T13:15:41.297000 -CVE-2024-22532,0,0,17766d930edb56acfab9bea2dd42353f3edfa263b20128e801452ef2b6dae599,2024-02-29T13:49:47.277000 +CVE-2024-22532,0,1,de186662f33e74d83cd8fffe00aab46fcd2955cb2806c1da45608ae2427d3c0c,2024-08-01T13:46:58.680000 CVE-2024-22533,0,0,85338afee49dae9d2d34419392208a0e08c059f930c68060a5bc4d947f64730e,2024-02-10T04:09:13.303000 CVE-2024-22543,0,0,b394fea0f9ec82c032a72697191c5255a9224f67e82d2cec41e6415b42196cbc,2024-02-27T14:20:06.637000 -CVE-2024-22544,0,0,45473dc3ea13d499b71964f92950583da3532709a2d3ba1a31ecd7b5f3b5653c,2024-02-27T14:20:06.637000 +CVE-2024-22544,0,1,c83930b3fd617d56b4e76bf97e8edd2a7a4295e7011794060244a8c71ee5f812,2024-08-01T13:46:59.453000 CVE-2024-22545,0,0,68df59d7f199c8b9a762129a9a26d5183a0bcd88eec159e4a975bd0c437f8e2d,2024-03-05T18:15:48.443000 CVE-2024-22546,0,0,e9e7789c2178195f81c38b7f4473534160dfa78b46fb2352260cdce1bd7f6814,2024-07-03T01:47:18.977000 CVE-2024-22547,0,0,5534d593f1aafde3e601d76d67e6100562df5859256bf1cfa370cb7e71529204,2024-02-23T02:42:58.253000 @@ -244464,7 +244464,7 @@ CVE-2024-22638,0,0,567c8040e6fc2e5a03c356d6770b7bbd871cf61ab6ee24734f5363799320a CVE-2024-22639,0,0,78ac2dd98a2c36648dd89c2143e1bfa7723664c6f502a718b0a41d6adb7494e2,2024-01-29T15:57:50.477000 CVE-2024-2264,0,0,e94d7c0b6c013dc028ba7566b1495dd69a9096736a570dbf0d5a07545ee515dc,2024-05-17T02:38:07.433000 CVE-2024-22640,0,0,102e2d28349ae3c03a07486f025247cff5be73b09510fcc21313c4b6c8ce55b1,2024-07-03T01:47:19.810000 -CVE-2024-22641,0,0,577d48339322f3740f441b46c5746b4ada32bbe306a57eda5eb37725ad75faca,2024-05-29T13:02:09.280000 +CVE-2024-22641,0,1,8518831b10b926b5a766ef4812b3a811669cf2afdb04d4180cb876f3d4bc4588,2024-08-01T13:47:00.240000 CVE-2024-22643,0,0,c973ad1f15c030479dfe5d3ebff74b8b6a60eb7637fce00b034343eed1ccf51c,2024-02-03T00:28:40.073000 CVE-2024-22646,0,0,d098a5aa957d6f6acfb9e711faae9069e7d01a8820d4d34fadf5788877e3882b,2024-02-03T00:28:48.987000 CVE-2024-22647,0,0,796e1b343c2bf9b5760c4c151f19b54db6d974a37365decd0809ed77a5fcd7c6,2024-02-03T00:29:11.063000 @@ -244493,7 +244493,7 @@ CVE-2024-2272,0,0,bc7fc0edef953b8e6907a8afb1963293ca16cc15ca659728d50442893cc672 CVE-2024-22720,0,0,9b189ed7ed41dddb5c89809962586573f4f56f2a5e75240cf2e0c1b185b206be,2024-01-30T20:51:16.247000 CVE-2024-22721,0,0,adc321e89d42abc6b26e927fdcb28dc5c84ae45c2baec9ae8b21187b009f66ba,2024-04-12T12:43:57.400000 CVE-2024-22722,0,0,2ec00a5c8e46809886d975f9e62c1646ed03ce66e913f1360753f43119db0813,2024-07-03T01:47:20.897000 -CVE-2024-22723,0,0,2bc9c6f4f704132ec4029ecca5be0ef283e525e4bcb3055b3e4cd733c0d930ac,2024-02-28T14:06:45.783000 +CVE-2024-22723,0,1,5e0104614f79979231b68cb0938b4f8c78660f8d758e8dd4467e139288dfbdc1,2024-08-01T13:47:01.343000 CVE-2024-22724,0,0,f04bb0773d70e218cb04a1eae11b7ff703933a7f824a16aba4031882d5107c0c,2024-03-21T12:58:51.093000 CVE-2024-22725,0,0,5fa379724d5fca6a5a451858a4ba6ac34ebc02b0c57c2f76559d231c12c113c5,2024-01-30T20:42:46.143000 CVE-2024-22727,0,0,21f0a699093390ba1d8ee3a22a8e6961dde2045354957e98f8b2db244c882256,2024-02-20T19:50:53.960000 @@ -244598,7 +244598,7 @@ CVE-2024-2296,0,0,4b4e38496c150aa121f924b55507494e23c722eac7303f62d302d2fe247056 CVE-2024-2298,0,0,0b6f38e4606dd1f851582ee6562890ecbc5294b55d00f7ab787253dd85dc70c3,2024-03-08T14:02:57.420000 CVE-2024-22983,0,0,21a117df6d38f31cce3b1ce96041317061b0701c68ef40e0a723ae3f05d075fb,2024-02-29T13:49:47.277000 CVE-2024-22984,0,0,fc6f2532d62536f57f6959754844311196ea55b6a39fbf85c7d2f459ee5381d0,2024-02-07T20:15:49.320000 -CVE-2024-22988,0,0,18123ab74d1371179ed743a930c94c07d790183cd1b757239383bc968284d6eb,2024-03-18T20:15:08.793000 +CVE-2024-22988,0,1,bcdb5f15ed4779291106b8a41380d22faef3821d715b2e437ea810ac15384a3b,2024-08-01T13:47:02.130000 CVE-2024-2299,0,0,bcaf001b188a6a59c651086d5de9bc1bcbff13b9f9f974e12ea28b63208cc548,2024-05-14T16:13:02.773000 CVE-2024-2300,0,0,7a5117241d9098121463dddf0b884449123757ea52654c5bf7c4430ae3130af4,2024-06-13T18:36:09.010000 CVE-2024-2301,0,0,1afb458e5f9d4ae44ae9449a435822a07045827b45328651403747fa4ca77bd6,2024-05-24T01:15:30.977000 @@ -244623,7 +244623,7 @@ CVE-2024-23061,0,0,4bc85ee93751bdf2ecee1ac20f811b6d9a6f53cf85093d58751326cdb25cc CVE-2024-2307,0,0,6e1c015f3d6c569a19e33c3b29b1ee5858f1aa7b73f614547925fd730d9ad323,2024-05-22T17:16:14.610000 CVE-2024-23076,0,0,f861521de4816f86c1691e31bd07cf8b243c578022b2ee633fb880a5cebbf9de,2024-05-17T02:36:28.137000 CVE-2024-23077,0,0,b5b6d9a3c015e69452d4c921746030274a5009b89df29adf90804205742c4312,2024-05-17T02:36:28.210000 -CVE-2024-23078,0,0,7cf7b08a799de04bc4585f91b5300980ca378e028889c148475798b65c29bde0,2024-07-12T16:15:02.917000 +CVE-2024-23078,0,1,fd35363432103e7ab4e87c3c14c2b5ba7212eeb7292e1d48063764f43c0f6c56,2024-08-01T13:47:02.967000 CVE-2024-23079,0,0,95e995d94f99d92d1d21be45395774e1bd5e28142f5001e4af706bf196359434,2024-05-17T02:36:28.343000 CVE-2024-2308,0,0,5bb2112645629721229497ec215ea65583df40f8b60e0deeb65bb784d4510e83,2024-03-17T22:38:29.433000 CVE-2024-23080,0,0,0b010f0d32455d640aa92c7b45cda816ae2c426bca669dd47a2863e8679e1a4e,2024-05-17T02:36:28.443000 @@ -244631,11 +244631,11 @@ CVE-2024-23081,0,0,078215a33a0e65d1bf204665d49f224ac224d31cd434f015859eabbf6fa70 CVE-2024-23082,0,0,bad23bcf5fdee5bb3a78a059bb533b173cc8f7d40bad5de6d70112077a3255fc,2024-07-05T18:15:25.690000 CVE-2024-23083,0,0,7d07005149d0543c535fbb2a6d9dfd9a92b94b35d3986ea14d60e9ea25be310a,2024-07-05T18:15:25.753000 CVE-2024-23084,0,0,cdbad45b66a87047b7c868d82656b02c2c6601123e829c75abdc78dcd3218b5c,2024-05-17T02:36:28.667000 -CVE-2024-23085,0,0,40b2754432f57304e5ba4ddb2c16f85a4cdd6f8d714844cccfe43d46eaffceb8,2024-07-18T17:15:04.153000 +CVE-2024-23085,0,1,7e45ccd5d7451883dde17bb2bd0896b8db293983b5a41f96a039fed087629a3f,2024-08-01T13:47:03.753000 CVE-2024-23086,0,0,753b1c8c5c763a6e62d9eb0702a0b32482390716cc5de18d73998c8eadd08ab5,2024-05-17T02:36:28.767000 CVE-2024-2309,0,0,b4bab766083001057d63d861d742eba6fb7b051d100b953adf8a9460cad67846,2024-07-03T01:53:08.927000 CVE-2024-23091,0,0,9e6e7c73746923abc8f887b1bec6224a287a493c4a440b67b32dc8c6b5e6f967,2024-07-31T12:57:02.300000 -CVE-2024-23094,0,0,ae3cd4735681e405e8af607bdcf8cae4e1643a6c0b25415971bd9238d6318a33,2024-02-22T19:07:27.197000 +CVE-2024-23094,0,1,b3be5d271cf78aadb59fda5aaee79baaaf5b6075dd9f37b3166eb28ef143d682,2024-08-01T13:47:04.610000 CVE-2024-2310,0,0,499b89515ad327ded91d404511ae8dcfd3fae99d14d1816e5fc98cd9421d4da6,2024-07-03T01:53:09.113000 CVE-2024-23105,0,0,b6c7dcc2141f6a5f9b64f4fa2deaa854669f89b7d4c0ddd615de0435e0b10df0,2024-05-23T15:52:39.123000 CVE-2024-23107,0,0,d6937b9348182dfe97924e1cecfe2c6687d7424fe7d5ddbdbf511e3c22e50290,2024-06-03T14:46:24.250000 @@ -244653,25 +244653,25 @@ CVE-2024-23117,0,0,35c4c339ac9e75a53935ba1466f971b15f8b507bfeb01dc62bdf9baf493fb CVE-2024-23118,0,0,a6932fed931e948900868e19184bd5293baf34fc2fea24f4b3a27774f4116d69,2024-04-02T12:50:42.233000 CVE-2024-23119,0,0,9a414f2a75a07eb6ec092c7ba07281e94e357b98adc0cb14b562b02b46f72a30,2024-04-02T12:50:42.233000 CVE-2024-2312,0,0,4aae63f80e054a543782fe1a45b760c6df630c83b1d34ce229f705227ccedec2,2024-04-26T09:15:12.073000 -CVE-2024-23120,0,0,054fa294d256c4879cd930bd05bd6c80495ff3d308dbacb82a2e6cef2be51101,2024-06-15T03:15:09.170000 -CVE-2024-23121,0,0,4ddd1ecd702abca537b55ebc757d5c96e83603a11b2e613e358674f2909734ef,2024-06-15T04:15:12.550000 -CVE-2024-23122,0,0,0c932013cbccf7d15c9c69299bd209ebb182bad841c134b98e661244b157d26e,2024-06-25T01:15:49.807000 -CVE-2024-23123,0,0,6791818203121ef5efcbe16ed355841c96d242958ff6a27fc1e7b0e204681496,2024-06-25T01:15:49.923000 -CVE-2024-23124,0,0,e1f985934db51234e012a04355632096fa54723c3a8d8713a5cce738ae9b21f6,2024-03-13T15:15:50.783000 -CVE-2024-23125,0,0,304083973aba6bc7118b0deb6ad31749871dcde4bc96bcc3500716a9ef2c8404,2024-02-22T19:07:27.197000 -CVE-2024-23126,0,0,65443b0199c0c3b4a84a48118a263554e5e63b167ceaad448744a58d2cde34b5,2024-03-18T00:15:06.947000 -CVE-2024-23127,0,0,44784c4ae86b28f62d1ffcd6deeed1e67073c53cd7092781fcc78ab3e234e83c,2024-06-25T01:15:49.990000 -CVE-2024-23128,0,0,16c95e3d83145d1204fe5e7cf924a4f480761c49be1e495a9939dac5b6ca859a,2024-06-25T01:15:50.063000 -CVE-2024-23129,0,0,4c4963c27eae3e16777edd796f58142688102519dfaec3f63704d4f476d29117,2024-06-25T01:15:50.137000 +CVE-2024-23120,0,1,c3248d8758ae899cd31adc96c96b93f29a9eb6582d8cb1e34b54f10340d7f5a9,2024-08-01T13:47:05.543000 +CVE-2024-23121,0,1,01c9579853ec7a888bd73b51c4672da84c2864a71a0dcf5fa275506220111428,2024-08-01T13:47:05.750000 +CVE-2024-23122,0,1,ea2690ecf87340775c3b37fb579e071c35b55e52a46bc072c681a011d8558e1a,2024-08-01T13:47:05.937000 +CVE-2024-23123,0,1,1ee99ff0745a771270023d36bb5f3d71a0b1f61852c2b50d7a06966ba264a7e8,2024-08-01T13:47:06.133000 +CVE-2024-23124,0,1,1d73e9e0f85e855e8bff9d28d034def04e215ff8b673b255040f67918284ed7a,2024-08-01T13:47:06.327000 +CVE-2024-23125,0,1,ca8d134c14364bb84d5a5c987d800f0d809dc28d070bc1b8438977b9812bbb43,2024-08-01T13:47:06.510000 +CVE-2024-23126,0,1,f9b7a37b12a37c5c7277b2ce9d22472d021ec469cc1c1e9088f94e75d3b4dbd6,2024-08-01T13:47:06.683000 +CVE-2024-23127,0,1,5e4c9804cba02035d0e709e1b81b9be5aafb3fce549c822a92120718a0d5565b,2024-08-01T13:47:06.953000 +CVE-2024-23128,0,1,b57ab88d0994c55fbaeea3fd9ede5d09ff9e759df280c21c58c86da58f4a6a8a,2024-08-01T13:47:07.237000 +CVE-2024-23129,0,1,ba5f03f3599602c34902af5e11c8b7cb1570f4b89281ff1016aabc4c174ce41c,2024-08-01T13:47:07.420000 CVE-2024-2313,0,0,075d0dd3965a8f6292cd94b1e687862600739570412df3797a71203f855555fa,2024-03-11T01:32:29.610000 -CVE-2024-23130,0,0,9fea211e820e4a30fffee0ee99e5be50934aaccd086fc311d61961457a8961f7,2024-06-25T01:15:50.197000 -CVE-2024-23131,0,0,0bc8dadab1a8b7d9ac58cad704d7e1edbceecfa6a8eb4ff368e476d006893af5,2024-06-25T02:15:10.807000 -CVE-2024-23132,0,0,33117dda5141d98fd58d52fc80cc5c00b69395ff0accdd276d6632aaa82659c9,2024-03-18T00:15:07.297000 -CVE-2024-23133,0,0,76904b4d3358750d4983d8478ff1743c176d32bf0d2db006cfd51671ea6a7a06,2024-03-18T00:15:07.340000 -CVE-2024-23134,0,0,b3f9b80d586548439dfcf18b452b604f763e0c49a3778d160008bddd3d984549,2024-06-17T17:15:51.443000 -CVE-2024-23135,0,0,2b4bb97a04eeb9ef6a8b6bd92603a0e44ca31b1549935af81b40f4e2f68c840e,2024-03-18T00:15:07.437000 -CVE-2024-23136,0,0,45054a183cb92d4e3fc08f4ae10d7b68e15f2ade823c86d7992de0a272605642,2024-03-18T00:15:07.490000 -CVE-2024-23137,0,0,463eb7c77c94a68910e4864db1e223687b1a6bc00a28e7a3ca12e76e21fd59bb,2024-06-25T02:15:10.873000 +CVE-2024-23130,0,1,dd4f7b288f69f73880a09c7e69068c887336f5d3838f90f72b16ef4a667595a3,2024-08-01T13:47:07.610000 +CVE-2024-23131,0,1,e1633a0e1d814b562024cfe93cec9aaf41eaedfdc4a7ff93290d1c7deac8a415,2024-08-01T13:47:07.813000 +CVE-2024-23132,0,1,80484e693eb6699958054796059dd8cce16a5eedc8d4fee95894c7d42915312b,2024-08-01T13:47:08 +CVE-2024-23133,0,1,a1e00e7a03cb6b16fdbf503e3fb37bb12107359a52a01c21bde58beae6a93548,2024-08-01T13:47:08.190000 +CVE-2024-23134,0,1,fe08df5c4d9956e700f69978be35d203f380b607bce1813d4aac1b5edceb5389,2024-08-01T13:47:08.377000 +CVE-2024-23135,0,1,b8428fdcbb56cfb80a17bdda771db486dbb0b07c4c46cbd323874ccb2ec1045e,2024-08-01T13:47:08.570000 +CVE-2024-23136,0,1,5c7e73e066092a83b6d3237fb70742d894c0f8bdae097daf58d5eb3d71664289,2024-08-01T13:47:08.767000 +CVE-2024-23137,0,1,e38360629fd5316dc25f01b3adbeeaeb2a102d1cf7fe7360395ce3bdac530db2,2024-08-01T13:47:08.943000 CVE-2024-23138,0,0,030654fb6a5aabeb0090f959473ffc21c06b17916db5a77f5052c14f492bde6c,2024-03-18T01:13:31.203000 CVE-2024-23139,0,0,35cb47c400464b57719331d5b3dddf43848e4e2f1c61c334202d91cd3c250a58,2024-03-18T01:13:31.203000 CVE-2024-2314,0,0,3b71d263c7a4c3dcca8be42f39bd5f8b12c090fb88deb907348937dd04f5eb6e,2024-03-11T01:32:29.610000 @@ -244754,7 +244754,7 @@ CVE-2024-23231,0,0,0c006833f1467b383e93b7d07c3cef0ebd7c088db978ea80541620978106c CVE-2024-23232,0,0,9e7b49448cac16c45fbeaf042c9f71b2d8db550fb449e33aa9abdc891de85b63,2024-03-13T21:15:56.087000 CVE-2024-23233,0,0,313670ac068b12d9fa516d4a3c082e80e45b5e5dbe4efd3c4e89ac3ce5144465,2024-03-13T21:15:56.140000 CVE-2024-23234,0,0,c787fd9b9dd5b8b66257c96b28ad978afb2adc11e7d4d94f50f7a42ebc673053,2024-03-13T23:15:46.387000 -CVE-2024-23235,0,0,7b02810cc4ebccc13488cea1ed53cf95b42afeb1c68eedf894cdea2e9d8d1714,2024-03-13T23:15:46.430000 +CVE-2024-23235,0,1,8475456fe966a8434d45c9ecd97011b49e7b6d9a91cff5dc02bc68aaf295e889,2024-08-01T13:47:09.287000 CVE-2024-23236,0,0,35e1e8394e7b9f6ad4331abd77ccd4bc245703e2c3f094e21b2b9f6f0cc432ae,2024-07-03T01:47:39.753000 CVE-2024-23238,0,0,aaa3fd31e128b178e81c1926164f07b50bd2a9e571c0ecd932e6079ad66db9b0,2024-03-13T21:15:56.270000 CVE-2024-23239,0,0,17a811a7a40ab6626263a25969f3b0683f14fcd51c6df6a2a6c4fb1d83529ebc,2024-03-13T22:15:09.947000 @@ -244773,12 +244773,12 @@ CVE-2024-2325,0,0,7c23733ac07d678fef2131155333b86f0e270e103dc635d072d48231d3950c CVE-2024-23250,0,0,07279c8c12ac3b5810e0a08afc9a612f0127647f21ad57d9453a83d5e0073cd2,2024-03-13T22:15:10.157000 CVE-2024-23251,0,0,092f1229e72a5c3cf728a0733bb73dcf6be0d42bcc4cdd3b35ac4b29d4862c68,2024-07-03T01:47:41.057000 CVE-2024-23252,0,0,14d67c7764d249aa5fb6c8bb08b3f6111a58e8166149c197fa34aac49c932454,2024-03-26T19:15:48.757000 -CVE-2024-23253,0,0,b130d3f35a0b8e04caf3565b50188d8728c2150f81b5d130df7abc7bc962d251,2024-03-13T21:15:56.870000 +CVE-2024-23253,0,1,c61f28471228959a59f22427de9050d3ce0815a3a80230f51f121f0b328ce908,2024-08-01T13:47:10.297000 CVE-2024-23254,0,0,91656cbb724e3acbebb9f0cca461e0f28f5717ac0667c7d7dfafe962d0dbd187,2024-05-07T06:15:07.777000 CVE-2024-23255,0,0,a5ca3fb3abeaf0d48fa78b827a0e71af49286a9e705474e18919d6e0df3839cc,2024-03-13T21:15:56.963000 CVE-2024-23256,0,0,f8e22ecab119a716f236ada3b1ba055de6721a19df3f3029fd3e26b16b944e65,2024-03-13T21:15:57.037000 CVE-2024-23257,0,0,04671ba4d7755d803b21278e549ded5212cc3a0cc19bba456587683c0a6c72bb,2024-03-13T23:15:46.707000 -CVE-2024-23258,0,0,52aef1e9d6cc8d17d23b996b2711a0df58dc5d1ea500a1b8fa34d0615dc37a0f,2024-03-13T23:15:46.750000 +CVE-2024-23258,0,1,dee83e7f7f5ed1c3a1d8a3468f9f35c6db6dab8eafb2a604bfe9a51903ddba0b,2024-08-01T13:47:11.070000 CVE-2024-23259,0,0,32180f50b016e600303bef490f7c44972cd0819551854177dd2a129ee13314e5,2024-03-13T21:15:57.180000 CVE-2024-2326,0,0,3c8b37146da325cce38aec51267ca4284760cd42c72a832b281add7789332b70,2024-03-25T01:51:01.223000 CVE-2024-23260,0,0,cfbcfeb19854283a9e5066e6e8e5e90d2605569101e96973822703b992d8a487,2024-03-13T21:15:57.227000 @@ -244786,21 +244786,21 @@ CVE-2024-23261,0,0,5d36fb0c95c00f8fa8fdb35d4376daf846942d450a32fd72e086d52b6e24d CVE-2024-23262,0,0,62d9ca66899810aa5c6562616e9cb31025a85566f240255b691a56f330edff70,2024-03-13T23:15:46.790000 CVE-2024-23263,0,0,d226157fc33b45c7e307e7b0bb570cfcc69dc1555ae79726ac7dbaf98cfcacab,2024-07-03T01:47:42.140000 CVE-2024-23264,0,0,e8679cdfb620ed4032710b82b0ab29602601551c60ac1c22de87e1638374eb53,2024-03-13T23:15:46.883000 -CVE-2024-23265,0,0,1c5e2ff7897ebd7379de0519de3afec304ab3a1bccd5d1ffcd198f07889106e0,2024-03-13T23:15:46.933000 +CVE-2024-23265,0,1,6123f7f85c15c983034240d9907579a1ab6684a57f3e28e3861d2a0ec41bd039,2024-08-01T13:47:11.933000 CVE-2024-23266,0,0,eacbd3007fcbe1161eccac73fc96ab254bcfb0d656c8329e2335cf54979494ad,2024-03-14T19:54:56.477000 CVE-2024-23267,0,0,c36dd7f9fc461aa9c42a5946d83bfd7bb0fa3bbd99abeaa1e13fb8376313d94f,2024-03-14T19:05:20.860000 -CVE-2024-23268,0,0,62e27add690f5cd25211a613a3aecfaf836852f7d79801696a6dde8edf0d4acb,2024-03-14T19:05:36.077000 +CVE-2024-23268,0,1,c190ac3cc0fb03705a81f1a53af309f2c71d42e51147758115d0124e2befacef,2024-08-01T13:47:12.763000 CVE-2024-23269,0,0,9e9e7c57cbd336ee52652b0b10217fa4752174804b0034d41e92767a5d834b0f,2024-03-13T23:15:47.147000 CVE-2024-2327,0,0,4e669655e7235d83b817628e0f2323f5805cb3a615d914e04cfd3dc4744901b1,2024-04-10T13:23:38.787000 CVE-2024-23270,0,0,28df95279a065d4fb560d8ddc3f063a98204d7aae90b75e123a1f8fe0bcda4e7,2024-03-14T19:06:02.210000 CVE-2024-23271,0,0,6a29a9531f0b7611530f759ed6be3e45e418fbf4ab5efa9d49fa0fca351f3056,2024-07-03T01:47:42.990000 CVE-2024-23272,0,0,862f7d259a6cfce25fc04a6db8d5e2417105b7f51cabfc9af10955b3e49ce2cd,2024-03-14T19:54:08.100000 CVE-2024-23273,0,0,8ea5a132f7f9599d563a8466af6d69a139c2be77bdbd7e0c7a2fee86dd445737,2024-03-14T19:54:26.287000 -CVE-2024-23274,0,0,b95d909e8f1b75ced8f58b9d622910de0f4a2ee7a0ed636e01227c3938eba33c,2024-03-14T19:54:38.937000 +CVE-2024-23274,0,1,d63dec58c682291f417ab20be0e0fbb2c8ea2b0b1f5246aeb4f66431c08118d0,2024-08-01T13:47:13.570000 CVE-2024-23275,0,0,2c9c1f4d2ca81860bcf12d49a2478f6772035d6cdcedc7473a9a2bfb8f8dfedf,2024-03-14T20:34:02.077000 CVE-2024-23276,0,0,6f3b52f749f8311c4232b3c82ff3f246f15d88c45d906f1a4e0e3bdde6ac41e7,2024-03-14T20:34:18.527000 CVE-2024-23277,0,0,329d44f192e6d8ad64377bfea1b406324a89ddf322f5987758a35ef433724dec,2024-03-14T20:34:31.303000 -CVE-2024-23278,0,0,a4d42b78e51765255d4f1cd1be001fedb5c0db34b6ea6b929abc549150e2cb1e,2024-03-13T22:15:10.883000 +CVE-2024-23278,0,1,766bded776e256695874796c761a698226a698abed559def31f9f418b44fbd0e,2024-08-01T13:47:14.363000 CVE-2024-23279,0,0,04cf6340eed14797588fb60b9db6f98aa22f7faf3625a9866457c3db2729515d,2024-03-13T21:15:58.063000 CVE-2024-2328,0,0,db4dcfea63581146a34d92e0d3290b1bf593c898de5919596eb70f461d745708,2024-05-02T18:00:37.360000 CVE-2024-23280,0,0,efb1bcf297f60f31863c7e1b6916d298830875542d7b014b2cdc47abb78291f4,2024-05-07T06:15:08.307000 @@ -244809,7 +244809,7 @@ CVE-2024-23282,0,0,c62334a5e57c1243f61646f2eedad046b36ab2f26cdcb61d7623edf7cfea6 CVE-2024-23283,0,0,1f095cdd8b34f411aaa62314ba1c3f2a94f230aab686eb84d27f0d98461ba616,2024-03-13T23:15:47.470000 CVE-2024-23284,0,0,65ec6190d01341e583d233a656fc9dacb2a5d33dd6ef8512150ae4498bbdfe93,2024-05-07T06:15:08.473000 CVE-2024-23285,0,0,4ebe01a43c630cc77720d9ba9f95f3bc6ab0247303b278a8661f0306226ef86d,2024-03-13T21:15:58.280000 -CVE-2024-23286,0,0,3f3ef64a178f54e4953d54f6b0a5ca6be806b352019a421ce007b326732ef3f6,2024-03-13T23:15:47.573000 +CVE-2024-23286,0,1,f8f0ff0a8076d1acdcd931a303004a0abe139b7ebcc3b6a020d77caf3a452f67,2024-08-01T13:47:15.157000 CVE-2024-23287,0,0,112483d9936a74ffcff3d96013576a1bfbb7b8c01b845a9cbe424d560297f227,2024-03-13T22:15:11.120000 CVE-2024-23288,0,0,26b1136d0d4444408c9f51d02208acadeac0b309c2fd8cd24b38e5f71e3d14bf,2024-03-13T22:15:11.173000 CVE-2024-23289,0,0,88178045365eb11e89ccefeb5771451d6b6166955f5f6c5f6a64f2f080826233,2024-03-13T22:15:11.227000 @@ -244827,7 +244827,7 @@ CVE-2024-23299,0,0,c511e81be43ab0bab76e86bc6db7a8fc5840f12996fc93f1ff034882f594e CVE-2024-2330,0,0,9ae945264bb052d68e9c213073b32e3a9e8de8241b1a06dd279470149a8f98ca,2024-05-17T02:38:10.540000 CVE-2024-23300,0,0,7e1caa6fe553583588e73d8cf5caa79d80d218f85cc1a33b34688bc3b7c6c49a,2024-03-13T22:15:11.643000 CVE-2024-23301,0,0,a646d4df741b42c2dc0e4cbabf6dc5f956c04b320d79355488193a17c0d15054,2024-02-21T03:15:08.950000 -CVE-2024-23302,0,0,cb0b077aabd3b90d52ca486bc0fe38470c9431e1bb86088fb918ef5c09a3d800,2024-02-29T13:49:29.390000 +CVE-2024-23302,0,1,2ddd453ac39ce861860de7e52d65f79881b5ce017d7277a32daa1782216fda57,2024-08-01T13:47:16.180000 CVE-2024-23304,0,0,c210b8458eada95481bee3ca20d298009a8b07cdabcf318485b1e55ed47d562f,2024-02-13T22:49:18.687000 CVE-2024-23305,0,0,1bec79bc4020f6ec3f876f6219b03c33047027e58293560df4d9a57dbab1f775,2024-04-02T15:15:52.870000 CVE-2024-23306,0,0,91f46f52d9e5de00866e9203178e37e34a29f802d826e4f6441f99c1a5c6820c,2024-02-14T18:04:45.380000 @@ -244842,8 +244842,8 @@ CVE-2024-23316,0,0,20d31ea49b58741a3b16aecbab3e866768fe82b73dbe3c1495ac4cd331301 CVE-2024-23317,0,0,b3d4db9a6c4ba1ce642dcb721062f8e13232707c61d4a2c28ce4845f9c04f28e,2024-07-11T13:05:54.930000 CVE-2024-23319,0,0,4a7fda9e8071d1fa76d196825210fd8cd3d29e8648472f0b500740dc1467f4fc,2024-02-15T18:44:04.737000 CVE-2024-2332,0,0,cc5467ba19ca1d2bf5a2ec6b13b0c5d8a5ce3b3eab4f44d8463709803f4da34a,2024-05-17T02:38:10.740000 -CVE-2024-23320,0,0,3ce257b3b3ddf4ca95fefb74a3c250029a8cef60bacfccb944f950722ef9b820,2024-02-23T19:31:25.817000 -CVE-2024-23321,0,0,b79e4b8f99cf4f7a00a50e0560f32c41615fefa5261323d9d6a4e5f65eafb8b1,2024-07-22T14:15:04.500000 +CVE-2024-23320,0,1,6fd5aa31e372843847f4e959f0e968559315a9dd978b50b33c878f1d03cfcac6,2024-08-01T13:47:17.360000 +CVE-2024-23321,0,1,d8392c23948026fc9815ec91d0430a7e82baad2a231bfe58a33ae6a2942c78d3,2024-08-01T13:47:17.543000 CVE-2024-23322,0,0,6c6980b136285edc46373134483ed816f3fd3ee6fbb7f3e1febbb6f33bcbf690,2024-02-15T04:48:20.247000 CVE-2024-23323,0,0,f603fe6a083c2cd5c48c5d3a316c9a1d4ec2c37ff8f0e7d0d927e564c077bd85,2024-02-15T04:48:09.937000 CVE-2024-23324,0,0,bf60e6965b5ce278543e16b9ab637ce05df1815af3d2d0d4acd276370e6add4e,2024-02-15T04:46:33.747000 @@ -244896,7 +244896,7 @@ CVE-2024-23440,0,0,888cd3d174129643abdafcbeddc64e6f21d5ae8e2b2e370f6f7b930a90b3e CVE-2024-23441,0,0,390d5d2bcc3b1398b0150c0f0c98b785cb9627d9865bfc83ae73159a1a10f10c,2024-02-05T18:41:43.547000 CVE-2024-23442,0,0,443db8dbb1f8b987d963a7dd5d60c961dd33264e42510a9f3b5600fa33a14f9f,2024-06-17T12:42:04.623000 CVE-2024-23443,0,0,39619cd9ac9d9c83b0ac7c9e7dc99ae54ae4def9a52df44cf7e3d4e8d6ff7018,2024-06-20T12:44:01.637000 -CVE-2024-23444,0,0,b80e846b2921026fae0ca1e493866a7de943ad611d2d3c7cbabeee30b00358a7,2024-07-31T18:15:11.983000 +CVE-2024-23444,0,1,9d04c210297b8378296ccd9e937d21ef43ab4badaaad1c5feb386881ba03d55c,2024-08-01T12:42:36.933000 CVE-2024-23445,0,0,6c527df37925bfee88abbff37b4b4e377f6526ae267b170f8c243c193159d3f0,2024-06-13T18:36:09.010000 CVE-2024-23446,0,0,4d7124defa0cb48f303fd49a5701937ff8d343d7ed35efe26f93d719e40bd716,2024-02-14T20:10:24.323000 CVE-2024-23447,0,0,ead5eeded6dc2e4e220b06ad6f5040f9ba1bf7850a4aca072f42a67732bb7fc3,2024-02-14T20:02:00.753000 @@ -245198,7 +245198,7 @@ CVE-2024-23803,0,0,acb079a869ba69b5fa9517baa83702edab7124f6e966e5bed18b9f9c193b5 CVE-2024-23804,0,0,7277bdccb9bc646fb902ff98c0c67e6ba4574dcc991595c5d6ee5434140321d4,2024-02-15T04:36:11.463000 CVE-2024-23805,0,0,5f26e955a2557d4c816d3384b83559235e768aa9a9c3cad2b60c3a7d1b3514a2,2024-02-14T18:04:45.380000 CVE-2024-23806,0,0,622577a7c1f83d23cbbaf6932e2b202382427e0e25f327865e4dbe1293284541,2024-02-15T05:01:56.693000 -CVE-2024-23807,0,0,6825e82b4c6e57ecf4f356b76b9f2ed70650b5d13730da1475c10d511845268e,2024-02-29T13:49:29.390000 +CVE-2024-23807,0,1,984c8ec132fb9b34a66f1a6b18d86d01b97fb3adc24cfd01ea198f14feb9f784,2024-08-01T13:47:20.360000 CVE-2024-23808,0,0,14e0c0844d35fca6b59513ca1c1b2a1154f1a862633ac35af1f74037de9e88e0,2024-05-07T13:39:32.710000 CVE-2024-23809,0,0,8c1e9b945a93ac6e01dcce0462ab4df31dc74ec41362c54c0e6e8a37cf3dbf20,2024-04-02T15:15:53.217000 CVE-2024-2381,0,0,5a9cd9b234fef7a31657af4f278618b21876d2cae8b0b3cc005b031ddb0ad981,2024-06-20T12:44:01.637000 @@ -245299,7 +245299,7 @@ CVE-2024-23903,0,0,0aedd9c9076c2ddbdf6881d7733c616ea31854a80041fece67f18f6379f4a CVE-2024-23904,0,0,a951ec872dbe283943db2cda1f329d6103f39dc8a3dbbab6b3bff9a6b9e2af38,2024-01-29T19:26:29.770000 CVE-2024-23905,0,0,a35e7dacddd2c1f3b32033e91045b0ad026e0a51c2fa232b2e0b46787dc2be1c,2024-01-29T19:26:11.517000 CVE-2024-2391,0,0,60da3844b5911777951235a640805c94e8dc2cfa119cea41ed5149fa8aa45d94,2024-05-17T02:38:12.397000 -CVE-2024-23910,0,0,db194618b706e789dc8f6def7024da4447060a1c1a603669d6c16ed67da81e8f,2024-06-12T01:15:48.943000 +CVE-2024-23910,0,1,21defb9e6d6dbf8d0f521ec76503d783a0a5ec9ee34bb29da0316f9a979d5f65,2024-08-01T13:47:21.280000 CVE-2024-23911,0,0,fdddcb19f4466c54e569787b1df836a5978efd401f095a2d3642663fd0df94ef,2024-07-03T01:48:10 CVE-2024-23912,0,0,210cf35daf58146f5a2ec254acd74292d26b1663729ba2d0483f8b346b0042f9,2024-05-03T12:48:41.067000 CVE-2024-23913,0,0,32316a55a8e1da81d9abb95b33e0db8e8724ab28f77e16dfed40dc690a6cb334,2024-05-03T12:48:41.067000 @@ -245329,8 +245329,8 @@ CVE-2024-23980,0,0,bf2b71f939973eb2601ccef55cf253f9d61b06b906f33487d035e08b35f35 CVE-2024-23982,0,0,e20dba7ecea0c7b0131ca1d7f8e3faacb630088896c2abfd0452f78392132abf,2024-02-14T18:04:45.380000 CVE-2024-23985,0,0,8249d0d4805632d5c5b5c3e0e9d62d8a14497ce894e5db21c14ac796aaeb2e32,2024-02-01T17:33:41.777000 CVE-2024-2399,0,0,6767e789c5e7e80586d75b3b6704c8a0508ed89afe73da734c95859ddd63a842,2024-03-15T12:53:06.423000 -CVE-2024-23995,0,0,6fceeb281fa3c69d1c4bab85811f2fd53adcd2d3ca99f66528148b3681c765ae,2024-04-30T13:11:16.690000 -CVE-2024-23997,0,0,ef5ed82b52199290419df226903d49f9642c5092d24fb995fb9a2b7f20196c62,2024-07-08T16:41:17.500000 +CVE-2024-23995,0,1,b89d5b0b19b8e796cddc69c7abcf82d6f1de53b74b1a90e7e705094a6be0aef1,2024-08-01T13:47:21.707000 +CVE-2024-23997,0,1,a3df80a9eadf5b12f2e5ab68a7546da13872f7b6d205a88a201108d5ff66b5dc,2024-08-01T13:47:22.457000 CVE-2024-23998,0,0,463262dbca07048f11c2d6fea168e73cc5fa7a3032757dc98b7129a752040582,2024-07-09T16:22:20.347000 CVE-2024-2400,0,0,3c01f84d3fa80c469358bedf1c357b5cfbb0672c254578767177db5c4a8a41b0,2024-03-16T03:15:07.307000 CVE-2024-24000,0,0,d0de83d12aad2aabc5672cbb661c0fdffc75d5f5e1df363eb030e7cdff4bc69b,2024-02-13T20:30:10.053000 @@ -245342,7 +245342,7 @@ CVE-2024-2401,0,0,c363a50dfd91f1dd653b2efa179df5e550e42c637cc55d653d48d0591c4024 CVE-2024-24013,0,0,e50ab935bddb712c7d096d8dae346284a9ea6118a4f4e6139e0e17ae98a94119,2024-02-10T04:05:10.963000 CVE-2024-24014,0,0,2254f915085796285b123ca5e05751b02b0d81d0dccf22977e9ea29f889e3030,2024-02-10T04:00:34.467000 CVE-2024-24015,0,0,6dd8da6fd758089d629fcd12838913dcde6db052a6374d2b8f5793d22fe99979,2024-02-10T04:05:12.147000 -CVE-2024-24017,0,0,acc822966933e4e58b44fd1507ae426a7313d011384f43b959acebfadeb2a62c,2024-02-10T04:00:29.880000 +CVE-2024-24017,0,1,81c6774a56f1a586f4f906f1f0b789f480a61b64162df23776574dcc345f003f,2024-08-01T13:47:23.277000 CVE-2024-24018,0,0,66626bf92ddfad532b99d0b35acef3a9eaf6184c69914a430432ce2d48a53bb9,2024-02-10T04:01:03.227000 CVE-2024-24019,0,0,f7d524e99ee9469f902506a2564eea181d03a93dd9aaf0d0017baf7a52b53e6f,2024-02-10T04:05:08.660000 CVE-2024-2402,0,0,df08564cd50bc510e33f7e2bf771c364246af0166a116c323f50615d32c9f1bb,2024-04-24T13:39:42.883000 @@ -245440,7 +245440,7 @@ CVE-2024-2425,0,0,5244503cb81f1535e5c26158f97c8ff5a0be1d108c008e859e8897a136ecd7 CVE-2024-24254,0,0,aa3e1e0113c1afb51d7c9ea40615c9f0ca117924787150a26ed63a73b49e27db,2024-02-15T18:46:57.737000 CVE-2024-24255,0,0,e76da96580c60a9eda41d1841209285ca4cff39dd4bb1ea645c35657b9851939,2024-02-15T18:46:41.247000 CVE-2024-24256,0,0,fcdfa612c3f1867287942ad18dfc81885197768fb299b50a1e03fe4abbe75856,2024-02-15T14:28:31.380000 -CVE-2024-24257,0,0,ddaf9b4200e0380aa64bd570729dbd5e4944f6ac4dcfbdccc7a665c710f84161,2024-07-29T14:12:08.783000 +CVE-2024-24257,0,1,be1ad47bd4d795f252422bc7418137262b954311599ce561f29c104d0afa01eb,2024-08-01T13:47:24.290000 CVE-2024-24258,0,0,b6889ab8117d84f2b926a30d9ca7e037f41ed41c51b57e24ece8c5f1f0d35cca,2024-02-21T03:15:09.043000 CVE-2024-24259,0,0,27500963c89a35e88885dfebaf6906d578facbf79a9197c97e367a82d6750a09,2024-02-21T03:15:09.110000 CVE-2024-2426,0,0,6e67bd7547823c0951b38b7ed025ecb6861ed3d2534fad1723b99007466f0b1c,2024-03-26T12:55:05.010000 @@ -245461,7 +245461,7 @@ CVE-2024-2429,0,0,08d7402ff9466db3c7efc43c3fe7c48cb37116309b4178b27b38e4f29021f8 CVE-2024-24291,0,0,f9a99cce2d5669fe488c53da57cec1a603932ca409a68a957e4a3be597d5560e,2024-02-13T20:13:26.593000 CVE-2024-24293,0,0,773227dbc7ce53f8a6dcd14b8b0a0c218560b0d6384e5030dad9fe7e55f27c2c,2024-05-20T19:34:58.277000 CVE-2024-24294,0,0,fb53dd3f3a0181debfcca619f6a3363f362852d8c93652ea4617fd4b0661a31c,2024-07-03T01:48:14.450000 -CVE-2024-2430,0,0,33fa20d860bd51090cc6b5ca265b28fc1f97d258738150f32ea9369e4fa89583,2024-07-24T20:18:59.157000 +CVE-2024-2430,0,1,c79cca8eeb2327c37f864866fd920048670109f57492fac8de77c9e62b23498e,2024-08-01T13:49:46.040000 CVE-2024-24300,0,0,65b112b83768361d2f8a250366173ef8dc7d0daae82c329cf90ad16d5a46ebd8,2024-02-15T06:23:39.303000 CVE-2024-24301,0,0,09fef4ec6b3f7e08d0238c798debb077539e76e61034c99c0f3a3241209eb436,2024-02-15T06:23:39.303000 CVE-2024-24302,0,0,772bc3946fe7698710ee11197feaab740359b0c096b2ee136ddb7f1dcb856d06,2024-07-03T01:48:15.277000 @@ -245469,7 +245469,7 @@ CVE-2024-24303,0,0,1b8ff87407101e3ade8b623ffad8ec7905f9dec8c0366ab6b55ba0460b0fe CVE-2024-24304,0,0,da2049d6e037296a577319f7d1190adf56def2498ce12560f8feb099b85c1170,2024-02-14T19:54:48.247000 CVE-2024-24307,0,0,39a344019676e6416da2523a0df5c9f8c3ef5d6158c597c3ca0abd8588967a1c,2024-03-04T13:58:23.447000 CVE-2024-24308,0,0,1c7b217f4d07f1cef0d4c8802d8e004cd219229214920fa463f6f25f09db8557,2024-02-15T19:34:49.943000 -CVE-2024-24309,0,0,2cca5c38ce8b90384e251caf1000d263452074c20e9793c175e478444ec9601a,2024-02-26T13:42:22.567000 +CVE-2024-24309,0,1,74ad226e5a232da1142911f5bab25c55d444703b053d90d81df4ec63a1f3a3f6,2024-08-01T13:47:25.043000 CVE-2024-2431,0,0,dd32a7ce0f7c35ba1e9622f905a1fe8fb75316c93f0f97412aef8e5b2aa9d804,2024-03-13T18:15:58.530000 CVE-2024-24310,0,0,af04adebe05e8114c2a9b004dbebb8cc6f695f58ee0a67c77d2adc708c42b448,2024-02-26T13:42:22.567000 CVE-2024-24311,0,0,0b1cb4c07817a4dcaf8ad6ee7df96b5fd803208f5f5402c3441d71356d2e8e1c,2024-02-14T21:39:26.980000 @@ -245490,8 +245490,8 @@ CVE-2024-24330,0,0,6f4394e82ffdaddc9904fbc3397bf25ed86fab2a1cc87acc40260a4358ba2 CVE-2024-24331,0,0,bddc95574abf52042b97c97068260c630620c1b140753c5184f26e948930f822,2024-02-01T04:18:45.817000 CVE-2024-24332,0,0,061392bccd873408c89db0e96815bf2edd50add3d02e20d0ccce713baa35aad0,2024-02-01T04:49:16.350000 CVE-2024-24333,0,0,242255791f359917c9577e9e1908f59331e2d2d00004e6f9f8172875fc23ff9c,2024-02-01T04:50:09.707000 -CVE-2024-24334,0,0,2804a23ab03f9402b3ec848e2ff100ea67ca36e02f47088445d018871c2bcf08,2024-05-01T18:15:14.420000 -CVE-2024-24335,0,0,074afb1c1f587d5faf4fd5800a1b0bd43811b581206f9dc3b1585e8d73d0bad0,2024-05-01T18:15:14.493000 +CVE-2024-24334,0,1,2fc19e7bbfc8d6f8ab140ae138a0d497f7aa7001981d6f838304497cc65c0be6,2024-08-01T13:47:25.807000 +CVE-2024-24335,0,1,ffcc3f8e28a1440d1fe2b8cc01711656e7fc5c04d9d5a1913e0292e820ddbfcc,2024-08-01T13:47:26.587000 CVE-2024-24336,0,0,0bc89cbf407fac7b8e4dd340b7bf905a47346ae9d6a54373d9b8c6ff7fbc5fd0,2024-03-20T13:00:16.367000 CVE-2024-24337,0,0,094f8cc47d42a08478d1d6a24f80eb2610489628ad3a80aaaec39b738e46aa7c,2024-02-13T14:01:49.147000 CVE-2024-2434,0,0,fd07f7ab5e2f479dc9adc0f83447a443eff6e1d59e7754fcb9d00da68e153f33,2024-04-25T13:18:02.660000 @@ -245529,12 +245529,12 @@ CVE-2024-24470,0,0,16e381fa0a431abc8440a13d798da189428114544eb84ba0cdf0c6b44081e CVE-2024-24474,0,0,d6ea2ee40f5f1cd1cc0dfa5fdec2c7d7301f40c888d5c564203a791b4618355b,2024-06-10T16:15:12.127000 CVE-2024-24475,0,0,cc33da32b8386d85f2716db0b7573f224c2a2466da82581395da702e95a8ad4c,2024-02-21T01:15:07.890000 CVE-2024-24476,0,0,e766665f69182c1f3557268003087cdfc6509e9cda36790582ac68af47e48686,2024-05-17T02:36:45.190000 -CVE-2024-24478,0,0,62e30857a4d44114fd5efdfbc76080a2308f6441ed4725de3b419b7ba43f2043,2024-07-26T20:15:03.130000 +CVE-2024-24478,0,1,4effdf269cf7b2fbfd3849b8e01c22765a0998552750c3553d574ef5edb68c0c,2024-08-01T13:47:27.360000 CVE-2024-24479,0,0,1427cab5944e071e960a306ac75d24a7c79615e6d73f8c04025cc996aaed7619,2024-05-17T02:36:45.310000 CVE-2024-2448,0,0,1625ab16b72103512d70f9dadaa1a93632daea1863fd2e539d584ce390412d31,2024-03-22T15:34:43.663000 CVE-2024-24482,0,0,5c9b64ec1667a173bb6afb8b1bcf7fabb196d3bdf8989774e772dce880877953,2024-02-12T17:46:35.760000 -CVE-2024-24485,0,0,b2568071871c796567d76e908b037e679763025ed13255733f0ba7c59fd074bb,2024-04-16T13:24:07.103000 -CVE-2024-24486,0,0,afebaf61f3b75669fd0b18862267b3612427e15b853da36136f90ed281f72919,2024-07-08T14:17:37.030000 +CVE-2024-24485,0,1,9426e8acbe5aa5491edd22d1644bd3d59530558cf8304c9d43312f2731f0be31,2024-08-01T13:47:28.140000 +CVE-2024-24486,0,1,39e529b53ee8ac0a551e78b15c95d1426fc6a2dfc69d8cf43736905c6cdd255a,2024-08-01T13:47:28.910000 CVE-2024-24487,0,0,61850b43e58031befd51f24dca0d71cabb99802e7eb8c3674186f5ae5bc1c9ee,2024-07-03T01:48:18.013000 CVE-2024-24488,0,0,8a1b774f9a98ad947e4d6a39beb8bb8d2efb3d9f71ed41c9871eba8bd31bba90,2024-02-15T02:23:45.887000 CVE-2024-2449,0,0,46b9f015783fbc3bb0212edf8e8eeec1124980baa369640fcf7ef0a9e4831bdd,2024-03-22T15:34:43.663000 @@ -245561,6 +245561,7 @@ CVE-2024-2454,0,0,aa2e42dd0f7f3fb6dd327d54b3ddb96859239f3cd7f3ec3259d3934a3a1351 CVE-2024-24543,0,0,6385de143d1b0b1fdcac1d167b2fcd059d27448a1d2af20c5a3fd2632900f66a,2024-02-14T17:13:32.827000 CVE-2024-24548,0,0,b2630c3d24a789753fdaa109f39bed000429d845fa16c1ba7d96c172523068ec,2024-07-03T01:48:20.620000 CVE-2024-24549,0,0,f5a15fcd5d9acee072cefdba50b124ee1362445c36c6cff50be2ef6d7391ffe1,2024-06-23T09:15:11.213000 +CVE-2024-2455,1,1,81310777e2324bfe2f2135b06fbda9caf947f682036ff3a323efc62dc88004f5,2024-08-01T13:15:10.493000 CVE-2024-24550,0,0,91eff862acdcc27750c50b47ce447c3c9c3416434f24687f7378afff1f649bd4,2024-06-24T12:57:36.513000 CVE-2024-24551,0,0,41b8feea4c57aca430d02394b62e3944b862a79d0fb8a08429e306b869ff2908,2024-06-24T12:57:36.513000 CVE-2024-24552,0,0,a32dccf302bfc20ba754a253e224014a80e60749cb89e80f2c2957456d9e5ec1,2024-06-24T12:57:36.513000 @@ -245632,7 +245633,7 @@ CVE-2024-24696,0,0,493abf9e7c1236756720555c7f43f1301a6f5875560eeaaa62abf347ceddc CVE-2024-24697,0,0,fc8cb016f36fd910eeaf64b66dc231cb060ec899e3e50c99d656beb01db44200,2024-02-14T13:59:35.580000 CVE-2024-24698,0,0,0e286a7a5a83ea89cff35f9869a2b0fc402da5c5818990f977c776b111b97e86,2024-02-14T13:59:35.580000 CVE-2024-24699,0,0,12f8a16e50a0b56367152cd6544ebddc14566fc60e183e9e17bfada0aea759e6,2024-02-14T13:59:35.580000 -CVE-2024-2470,0,0,8a90d09a735e0c096f9ed774996a283869e878f4479aef245dd102fa9d55b20b,2024-06-04T16:57:41.053000 +CVE-2024-2470,0,1,18e1880afe1444954891abe795fc3a0d849c951a72a80f6d9a727adff6033cb3,2024-08-01T13:49:46.933000 CVE-2024-24700,0,0,6c812a85c120df76a0c27beeca26ed6599a5d3758b067997d6a02be8b6ae6a34,2024-03-27T12:29:30.307000 CVE-2024-24701,0,0,7dbf748739ea8aec16a32431fc778a695ca753bd427169b88ea34fe1ecebf7dc,2024-02-29T13:49:29.390000 CVE-2024-24702,0,0,3fe3e66470feb7d8afa63869031f638ad573537ea45f465ad0b800dd1bea386a,2024-02-29T13:49:47.277000 @@ -245713,7 +245714,7 @@ CVE-2024-24789,0,0,fd6a5b95d991b0dab3309c11b164e4c1e60de61b7d4a99fed36d8b88b927f CVE-2024-2479,0,0,cb8d87b601d3415108e34edcc0a0f20a1a33c04cebcd204ba7867f3afc9f8e4e,2024-05-17T02:38:14.640000 CVE-2024-24790,0,0,af83ae6b0946a22f5ed087cd11baba620114297a30c56195a078e322298023bd,2024-06-18T17:59:12.547000 CVE-2024-24791,0,0,47d95c50753471e151a6eea3dba3db3a2ed137995344fbfddcc8757be9c73f89,2024-07-08T14:17:39.083000 -CVE-2024-24792,0,0,f69bae6aeabc0bd1864687cbecc00a414d65f449f6042a0a0606e99652942d2a,2024-06-27T19:25:12.067000 +CVE-2024-24792,0,1,fc8d65092f6cca5efb8fd01d1ad855c18addacabc045b62e3e589a869025923e,2024-08-01T13:47:30.627000 CVE-2024-24793,0,0,349151d270c21b594bab79bdfa0af81cee9b2c5e85b1f357f09ce5695483cbcc,2024-02-20T19:50:53.960000 CVE-2024-24794,0,0,2ec7aaa5fb034c52f8b00845d9c4c8227ed450c5193d69bd944efff082e59c10,2024-02-20T19:50:53.960000 CVE-2024-24795,0,0,dc695e9a229534fe7c590b5d6d8f49c216ce714dc73837dede8179844d7d09b4,2024-07-30T02:15:04.540000 @@ -245880,7 +245881,7 @@ CVE-2024-24964,0,0,453b708cc71a26e1c2e6a095353d8c5371dcecf82b39d783f4d95f24daf1a CVE-2024-24966,0,0,596d9f70ed531a9ce913b647600f9cfc649827cf292b66c3b67d74e0809d7525,2024-02-14T18:04:45.380000 CVE-2024-2497,0,0,0abba4a60a0501980b979aaaf4b97236170cb15ea02aea63aa677f7cf3690b8f,2024-05-17T02:38:15.830000 CVE-2024-24970,0,0,c5c45405430c7c7f3516e99a92baceaf02c282a485cfc49b45ca53420788a4ec,2024-07-22T13:00:53.287000 -CVE-2024-24974,0,0,58746381295b34b611cdb4edd106ea5da27c78c578480d54a0db25ca5467d003,2024-07-11T14:47:54.920000 +CVE-2024-24974,0,1,cdae5d3bff4e81d4d34b5b1ab313d43a0a37ce5a6a86d19a509669f375102d09,2024-08-01T13:47:31.543000 CVE-2024-24975,0,0,e45e77656a6eb7775bbf17ad859bf5d3a4697e166584b896665ee19b46725872,2024-03-15T12:53:06.423000 CVE-2024-24976,0,0,7e14392294efbbf37c55b7bae98233e6ba32f6560de82ec908c819c3c8f743ff,2024-04-03T17:24:18.150000 CVE-2024-24978,0,0,b182fc4dea5fb8dabebc670a8efcee22aa4dd4621b4f7e4a6eb2d8d06cf5225c,2024-05-01T19:50:25.633000 @@ -245896,7 +245897,7 @@ CVE-2024-24994,0,0,42f2d80bacffedefc75634a19d5bdcf04cc6d212fb826cca85477fe85d061 CVE-2024-24995,0,0,994724640a945c1000fc39c7b0f132e31e20015b4a8b29a9d6a77367cacaaa2d,2024-07-03T01:48:36.090000 CVE-2024-24996,0,0,af6d9584e64c4b3f200ed34f55cf43bb6a19971061ad4dc62adc4044adca391c,2024-04-19T13:10:25.637000 CVE-2024-24997,0,0,96eb4bc98ead652d8a74e40e88af7ac14ac55e90b6d09d12a9e3cbed51dc328f,2024-07-03T01:48:36.903000 -CVE-2024-24998,0,0,d3be67fc1bc915e231ecccad2b2fc654e3eb8d27dbfa07428adf683a9b52985b,2024-04-19T13:10:25.637000 +CVE-2024-24998,0,1,2fa4db7d8c715f8ce1345b33f7f9bb0c4c2f728db1f43537e0f2493c2c737db0,2024-08-01T13:47:31.747000 CVE-2024-24999,0,0,c9900f55e1f00f2949e7c7e8c454bb95b3957fef73e3633271464f0acd65aa92,2024-07-03T01:48:37.637000 CVE-2024-2500,0,0,cdf6d7153434cb19b250732007637f2e159fc25f1df0948dc25762e35cdeb77c,2024-03-22T12:45:36.130000 CVE-2024-25000,0,0,0b40ba851bdb9ea4a2539d08f7cb1357bdb6189c1e99aa8ea8c9ebc4a54a4498,2024-07-03T01:48:38.350000 @@ -245904,7 +245905,7 @@ CVE-2024-25001,0,0,3530edbc78476c75d487bacd2b76dbf04b251cadc2f9ff4ead4c1a2b92dfd CVE-2024-25002,0,0,6178dc19b2e3cbea2b915ab264d98ed9db28d056161d2766b2f94847cf9f2f01,2024-03-25T16:43:06.137000 CVE-2024-25003,0,0,f6c2eafae72b0051e89114af6c6fcddf635670371dbae7c3314ffc77078494ba,2024-02-14T20:15:45.910000 CVE-2024-25004,0,0,b1eaa30b45a2beac602111a556e73283df1fde1d2d56447f15cd2e12b3d43fc3,2024-02-14T20:15:45.980000 -CVE-2024-25006,0,0,5e7cd3be1ac3916c9f9d777a16f017554b0529c5620619255295802930297edc,2024-02-29T13:49:29.390000 +CVE-2024-25006,0,1,5b722f2e87bb2f2cd1327a954681e67bfe99d5442b01159ab458f524449bcffe,2024-08-01T13:47:32.460000 CVE-2024-25007,0,0,8168166db4b2b463b1c077994d5d41f318578553eda571604b31f6006eab6cd4,2024-04-29T19:48:09.017000 CVE-2024-2501,0,0,6ce26352b8e14756a33573972eeb4c8a06096eee07ab0fb0ebb1c9238a943b1a,2024-04-10T13:23:38.787000 CVE-2024-25015,0,0,4c1212c8f769823bd4e7049fb129f848dc20c143fc1cc72b02abca5f7451e069,2024-05-01T19:50:25.633000 @@ -245944,7 +245945,7 @@ CVE-2024-25082,0,0,c4024b086b0d99b44b3d9149e06878bd50b7e82765ae87c23c8e458108c36 CVE-2024-25083,0,0,9d2f407cabf3a12bbd22cd36b42859a90ce2fc840877d4b234c6f6f10f6ee54c,2024-02-16T21:39:50.223000 CVE-2024-25086,0,0,d7f7d87d6cdc4c934f4645f409f9d6ad95bc0b43a7473acdcf85c7b382132abe,2024-07-08T14:17:42.020000 CVE-2024-25087,0,0,c72ecbfe33bc1bedb424c3a8db8ed1e75d362fa6fbd3c127b6373b38910f773d,2024-07-05T17:04:43.917000 -CVE-2024-25088,0,0,9b1375c3c781149325c14c39fa835c2c88a69323c212b1013c4ad4d387aa77de,2024-07-05T17:04:50.340000 +CVE-2024-25088,0,1,50203c63d0e75eec6b30df19b3f3ba45509939426c60ccdf3351d03062178a9d,2024-08-01T13:47:33.673000 CVE-2024-25089,0,0,4d3ddaeeeaf0e005a5320fd57126d38836ae358b9586c6957758efb8e6b78742,2024-02-13T00:38:12.137000 CVE-2024-2509,0,0,e1632462213f3b340d9efadccdf81857ddba6b28ec7154489106797e9e1ad3ed,2024-07-03T01:53:19.050000 CVE-2024-25090,0,0,fe4dfe05b7df4dade0fae9afde244a31ac4436c4195a84dec142976b30aaa959,2024-07-26T12:38:41.683000 @@ -246029,14 +246030,14 @@ CVE-2024-25190,0,0,5e7fcee6e1d49c76382f955314af222553d106a1254553833783057b6c9de CVE-2024-25191,0,0,a79a6f6dac299c349e2de385c864fbf66ec48043f058d11d55221ed1f7cad150,2024-02-15T05:03:05.180000 CVE-2024-25196,0,0,71b1b8c21e9030e7bad7b4e709c1cfc6025ee6669c3270f4efb2777d247006f5,2024-02-20T19:50:53.960000 CVE-2024-25197,0,0,ca56aa502aafa76f9e203f1bfea1c7e7bb5407645a514e5c3184e8ae0b1b850e,2024-02-20T19:50:53.960000 -CVE-2024-25198,0,0,7be758c61b954daefca3d6b58e125613ef448337ad030dd2b2d97f65f39ccaaf,2024-02-20T19:50:53.960000 +CVE-2024-25198,0,1,8aa0d37f4bf223abe553de23cb491c2673e155f232b262f589f7488596dbdbf5,2024-08-01T13:47:35.120000 CVE-2024-25199,0,0,80cf865856345425a1255aaeff9a118b47eca4bf7d8e991fd2be82a76d5447fd,2024-02-20T19:50:53.960000 CVE-2024-2520,0,0,d7b1b472e2762f8919bcba220a7088868d014fda6dad19db1c82e45c5a25eda5,2024-05-17T02:38:16.700000 CVE-2024-25200,0,0,6e1275f391677836e8410ea7e1d31bcd56a07abbf74abd7a7027a7acc45cebc3,2024-02-15T15:22:25.980000 CVE-2024-25201,0,0,4fdcb35250323e572813a693d6853c3ef4ab83f766da9aed4664bbcb27b57505,2024-02-15T15:21:30.993000 -CVE-2024-25202,0,0,ff3337d2f967336c90c083640688ae631a989583b56a8738c35af3266cf6b0cd,2024-03-11T22:15:55.080000 +CVE-2024-25202,0,1,9adfc980042282b2282c5de366e0faab584a67a356cb2bc8d9fefc993344243a,2024-08-01T13:47:35.900000 CVE-2024-25207,0,0,ec83a3d2fdfbcc8587a8c698a4db83963fe7b272fef5e645520fca4923aa1dac,2024-02-15T06:26:56.397000 -CVE-2024-25208,0,0,d6aa4d58a9427fcdd00e470bd4f3d0c31dcfbd116753beddbc55238afd579167,2024-02-15T06:27:02.687000 +CVE-2024-25208,0,1,f36b1a6d7aae28307bb7793a95052fac69e54ce6608a781b44e351b5e3bee7f4,2024-08-01T13:47:36.680000 CVE-2024-25209,0,0,d5a869bb410fd2403b975aa6acf4c48509a1d388c3696e8d5965ba3440b96129,2024-02-14T16:13:16.563000 CVE-2024-2521,0,0,0838497f1916a708252295ddb1e5512e6c3ac757ef93b04ae3f403784c7490e3,2024-05-17T02:38:16.787000 CVE-2024-25210,0,0,dd28b2c6cb9a88a5b91c68f6ad7360de203218fb8e2273a408f42a17c2d3394b,2024-02-14T16:13:16.563000 @@ -246048,7 +246049,7 @@ CVE-2024-25215,0,0,3b37a94df90b65e7417dee74161c3b1b221d93df92a185b49be1c5811fcd7 CVE-2024-25216,0,0,11c4d54de29132b318d8fac4cf2638f23334598861bfc6052b13658ed431e101,2024-02-15T06:27:52.447000 CVE-2024-25217,0,0,52fe646ffd496a2f65172db7d33af9d3eec0a14bd40e1d04a6a9369af2712a81,2024-02-14T16:13:16.563000 CVE-2024-25218,0,0,24ef98e1bccb157a2451c5f9b220886a7fb0241b266eff1652e4e6ac16c1f097,2024-02-16T19:45:37.420000 -CVE-2024-25219,0,0,46dcc6012bac765994e17fdc834c369371d883c922531cc44d22cac3aa95e025,2024-02-16T19:45:28.097000 +CVE-2024-25219,0,1,2b14c2a937dde787f169ebecefb0773ff2a33faa5372ec5d4d94840140008c7f,2024-08-01T13:47:37.463000 CVE-2024-2522,0,0,b1904c746f2168a450105eeee7c6ec024878645f7c80803e5354174d41069fb1,2024-05-17T02:38:16.867000 CVE-2024-25220,0,0,daa59dcd9ece57f6686d3daab3ad1c6bf87173bccf0e7b0d45f22f663c276cc6,2024-02-16T19:34:51.807000 CVE-2024-25221,0,0,836a2ef30482eb3c912fcb2ea8423f311ca51ef1df402038f46280db854b0fca,2024-02-16T19:33:17.330000 @@ -246069,16 +246070,16 @@ CVE-2024-2525,0,0,0cd1ed7faad83b5a9e935ff66736a2f3ef52e3e5ca65ec7de6d2b90849c097 CVE-2024-25250,0,0,090be68f47c80835d24ec3c2cbb5b30c9c5655c9e4ba514f2cf945a0eb748609,2024-03-14T12:52:16.723000 CVE-2024-25251,0,0,a84e7c51427c510fc06f20f3908b18a44c7fbac025449fc8097c89a71d234f03,2024-02-22T19:07:27.197000 CVE-2024-2526,0,0,da44cbcd46359ce613873d7604fc44e9ca075cba9a523edc17aed5804a21af9d,2024-05-17T02:38:17.223000 -CVE-2024-25260,0,0,5722057e95b8ba1da8dcda707321ebafa0288c39b1b49a80a368fed0dc465246,2024-02-20T19:50:53.960000 +CVE-2024-25260,0,1,6fa7a07676f89be99cdfd9160294fea45305c2bf656b7b3f6b3836cc1f08767b,2024-08-01T13:47:38.247000 CVE-2024-25262,0,0,46721c1d6d3a14608859723ca7ec348265a21059b42d512dc392ee0e321b066a,2024-02-29T13:49:29.390000 -CVE-2024-25269,0,0,f13511d72e544679b25f6284d74899e69ebead0f2cd0319abc3dac09020fca94,2024-03-05T13:41:01.900000 +CVE-2024-25269,0,1,cecb054aeb252fd3635e4b5b6f2ee9da6b9765bdfc4680265db28bca7071a614,2024-08-01T13:47:39.020000 CVE-2024-2527,0,0,3595089dfbf7c838cd10907d9475b6f382b61f5d4f125e4851b3ab5c70cb2f91,2024-05-17T02:38:17.313000 CVE-2024-25274,0,0,08bbd944a87379073203caa03548429c52cb88f2e3324503fdb87764ae5cf736,2024-02-20T19:50:53.960000 CVE-2024-2528,0,0,f3ce2742845e3c962e76fc1fc8b85fe99361dde771fc18d0886792da646965aa,2024-05-17T02:38:17.403000 CVE-2024-25288,0,0,ec9a8f6e97e7741142de4cb4c32dde31396457ba8d55d4f5745270d50453dfad,2024-02-22T19:07:27.197000 CVE-2024-2529,0,0,3dcfb18c753ec485cf6ba2b140882ea30783b45e3ebf36f2c06c6d0afef8cf3b,2024-05-17T02:38:17.490000 -CVE-2024-25290,0,0,446cddcb874162c2752e43cccbbdfdf5d1b85a38371a081af77440194f850254,2024-05-02T18:00:37.360000 -CVE-2024-25291,0,0,c7902645419033549477f2f412b13f20d74b7c82fc771a848b7278f46098a9bb,2024-02-29T13:49:29.390000 +CVE-2024-25290,0,1,1ec48026c39efee418c42c9ca18840885fee8443e93218944bef4bd724ec09b7,2024-08-01T13:47:39.797000 +CVE-2024-25291,0,1,3fb4fe8a5c11e3a034eb8eee615e5ca2d89bb2fc5feb0b891e21815184a51204,2024-08-01T13:47:40.580000 CVE-2024-25292,0,0,b90124690bcb75975e3557b1f4c1be97ab9e0cb22b417f071f58b94036944efa,2024-02-29T13:49:29.390000 CVE-2024-25293,0,0,bbaf05e966bfe2eb10b4e5bc9ab73eb8717f6273926001e1f856721dd7d6c969,2024-03-01T14:04:26.010000 CVE-2024-25294,0,0,30df846e6b098131a64958124772998f9f345e19fcf2024fae4e9f9105d55c37,2024-03-21T12:58:51.093000 @@ -246112,7 +246113,7 @@ CVE-2024-2534,0,0,4887af7a0ab37b01ddfa2f72430762a504040b1465853138458422ea16a2da CVE-2024-25343,0,0,cfac06f9939fe5d18570b1e92d9f42a290b261eb4527d5cc619e721907c7fb78,2024-07-08T14:17:43.447000 CVE-2024-25344,0,0,77c129753bad2f4730d1522aa03d90f973e21285eae8310738a34ef02e5beacd,2024-02-26T16:32:25.577000 CVE-2024-2535,0,0,1d4fc1154e21273a7c74f61b7c8874d973288768c48e8247cc99c965af9b7c7f,2024-05-17T02:38:18.023000 -CVE-2024-25350,0,0,8b246a943e7f1c42cba1a3872691663745e5671f13c8120374a0d726f00b5d4a,2024-02-29T13:49:47.277000 +CVE-2024-25350,0,1,3eadafce3b2244ddf5f3884efc711bcacedce55f760934f937927ed6e35502b0,2024-08-01T13:47:41.340000 CVE-2024-25351,0,0,1db6e78a8e83ade6a0799cff5bf85622312e50d4f7de966f9ccf73f222d6bb07,2024-02-29T13:49:47.277000 CVE-2024-25354,0,0,05e4e4b9487522fa174527b30036421abbaaddce9ac4f0c3f7fdb3945144000e,2024-03-28T02:01:13.303000 CVE-2024-25355,0,0,9e4c154c10879aa65df3f836e3d26a161aa9d5b18c5f9f98e84ee39f0e0f3042,2024-07-03T01:48:45.420000 @@ -246128,11 +246129,11 @@ CVE-2024-2538,0,0,9040c900b991e8f6fd3afa80f5869e2f9dbcc85520bbfcec371534f7a5ee52 CVE-2024-25381,0,0,a7f2494426dcfd03638803eefb4663189386d44e34e1d8cefdca6022c601b371,2024-02-22T19:07:27.197000 CVE-2024-25385,0,0,4e6ac49ed38b214c0cadcf5b7d24f80edcf812117f3b947eea7b8836b8926a85,2024-02-23T02:42:54.547000 CVE-2024-25386,0,0,8150946dfcd9aeb8580150c5b420a3c626648a2db1c6d529b93950e8e3ec732d,2024-03-13T04:15:07.960000 -CVE-2024-25388,0,0,64b87c9637f8e141bf83fc1d37552165eccf5fc4f4b82ad716fd29047903a227,2024-05-01T18:15:15.110000 +CVE-2024-25388,0,1,a4fd2e7348bdb39a0284b3ab07f14681f4dbe00912c0f5a31c9cd1eaaaf64a39,2024-08-01T13:47:42.200000 CVE-2024-25389,0,0,300e228567e32929b074f159e6b0c3d280feae8278a6996691035995a5db28e1,2024-07-03T01:48:46.323000 CVE-2024-2539,0,0,e61b24f26184c749ddf56008443c202d469d18246466f0526477f147012e59d6,2024-04-10T13:23:38.787000 -CVE-2024-25390,0,0,68fc6dc5bf71aec447af28bf4d5ace56b5ba808efad6c9eedf13ea54ba81d923,2024-05-01T18:15:15.223000 -CVE-2024-25391,0,0,9c7bbfeee105095dd4443f201ff717ac819c5c0a3dcb6be78739da0908697393,2024-05-01T18:15:15.270000 +CVE-2024-25390,0,1,63baed82e2e9879c1206709290d2b37ce21350411219653506ba97bb1a93c5c2,2024-08-01T13:47:42.977000 +CVE-2024-25391,0,1,f083d5d8cc92a4e93f6f51d3ea7c9f4db1a85aad2a08d21ec44a79a9fc36d60f,2024-08-01T13:47:43.797000 CVE-2024-25392,0,0,a206d17696fcf4904f59efd952331512dcb83b18b402273ed46f576aef4a6d5f,2024-07-03T01:48:47.150000 CVE-2024-25393,0,0,a5db428aad7c170c9baea9d18a6180462a997ce75098c3cb1498156e5372e220,2024-07-03T01:48:47.993000 CVE-2024-25394,0,0,be9935f7dc1f2a9ef5bc4751361c0c48070487f3d65e34adb53e8eab07ac227f,2024-07-03T01:48:48.800000 @@ -246153,7 +246154,7 @@ CVE-2024-25420,0,0,b7197aedfa6378137c3440bcc6246efc020071f580c48fe2540c8cb8c8ad4 CVE-2024-25421,0,0,0bf99a33e3f6a9e37025a1a424ecc029e1509ca9fe7d5958f6f5ec65c86dc334,2024-03-27T12:29:30.307000 CVE-2024-25422,0,0,183c4ec0faabad98f4264a6cd25b9f8acfe9ee005e0931f44bde0815e323c3ef,2024-02-29T13:49:47.277000 CVE-2024-25423,0,0,9c38591521533b12d0d8640f97867e59ae0ba009f0e2d3612c6f7b4eda265498,2024-07-03T01:48:50.347000 -CVE-2024-25428,0,0,9668d0fbaa5831afd87452ebc54122268ba0e86ccd31dbb50b29681bc64bc531,2024-02-22T19:07:37.840000 +CVE-2024-25428,0,1,a1baa90ebade4117b4da7a9052f9f7b7385230216b8f9a62456cca560644c28a,2024-08-01T13:47:44.563000 CVE-2024-2543,0,0,90e05f36a3d2dfc0c0cb0570a48a9a80b8042b66097a9bbd3537fdf34c177bc6,2024-04-10T13:23:38.787000 CVE-2024-25434,0,0,26bac245bd5b6380c1089f8063086eb0c8545596793c0265b0d4261729bfcdb4,2024-03-04T13:58:23.447000 CVE-2024-25435,0,0,b518f964ef14d92ab1a5ca1db15bba6ee80949a3cea6fd366efd019d37dc656f,2024-02-29T13:49:47.277000 @@ -246183,7 +246184,7 @@ CVE-2024-2548,0,0,77bed2cbe868603341c5c4fe00286d759f5ff5a17e6112b21ff9565c6b1c1c CVE-2024-25501,0,0,323095296ad9ad2b7b65354e8dc713fb0ff55c81a387332b25d6d222ed3321f1,2024-03-11T01:32:29.610000 CVE-2024-25502,0,0,ae578fb4220918f5c79c04ddf94a1dcef1514713ad368fe6ddbcf4d062b5a31d,2024-02-16T13:38:00.047000 CVE-2024-25503,0,0,5506eecac1f37ab8170b1a0a6af4a3eab022712554cbaa86ae94867dab0793af,2024-04-04T12:48:41.700000 -CVE-2024-25506,0,0,75b5e1dd98ff00d5c3a030ff6ca8e57e29416043b3b459f25e173eda4b5e521c,2024-03-28T20:53:20.813000 +CVE-2024-25506,0,1,331fc2aa8008abcbe7529c8e1f902eaa8f01961e899bf76c0c02400b4802e463,2024-08-01T13:47:45.357000 CVE-2024-25507,0,0,d01f5e6d07dd4234554e701d042eeba7ebff258fccd1723712b33d5ea82451cc,2024-07-03T01:48:51.430000 CVE-2024-25508,0,0,f0b9a8923b39dfb1081968e642a1fbc093261fcdaa810218576df869326ba3d0,2024-05-07T20:07:58.737000 CVE-2024-25509,0,0,43932d598b677151ec148e2c6fe397dad54fbcf37bcb8324dfd2608c97fcef93,2024-07-03T01:48:52.240000 @@ -246212,7 +246213,7 @@ CVE-2024-25531,0,0,bd85456fb7927acce04fe7a9bc7cdc00ebec612fe72b4d084a7b6d36f2668 CVE-2024-25532,0,0,e49a0b06aa42ebeb681466a026e650a02f7f003c3c52a351a3b30566efcaa78c,2024-07-03T01:49:08.880000 CVE-2024-25533,0,0,2874c2bc34cbfc664239f45f2595adead46a71c8191985e29a283c134de2ce3a,2024-07-03T01:49:09.687000 CVE-2024-2554,0,0,9eb59715f12c2a1293f0f4409bc3bbf7c30d0b86c38c32b03c95f8cea8d2f6d7,2024-05-17T02:38:18.567000 -CVE-2024-25545,0,0,09bdf00a31f8cdce38e6d2ecaa8bb8497fce22c231c9e71ed4fb645c25d0c3b0,2024-04-15T13:15:51.577000 +CVE-2024-25545,0,1,5c174c68d3a64522be2c772250aad4276c5f99af19f77f21aeb724087893fc9e,2024-08-01T13:47:46.123000 CVE-2024-2555,0,0,4f5dbadec3fa86b65c3c692f06ea8fb98fd7e3bac8a3ca552b019731a190c1e4,2024-05-17T02:38:18.663000 CVE-2024-25551,0,0,e4e505b7d7cc48bd35575b7472f59b2e14c461ab85abc93c481eda78f71b33ab,2024-03-04T13:58:23.447000 CVE-2024-25552,0,0,867aee87c0f372836214112b3010e25c557156d7085ee2e3da52100f1e549012,2024-03-01T14:04:26.010000 @@ -246222,7 +246223,7 @@ CVE-2024-25559,0,0,f67fb1ad30e7170d460968d6bc699ae66505cc3ffb5d9a89902007ea9939d CVE-2024-2556,0,0,d03e7f1784653a97f31dc4e2fd10447d6f2db7c14a279d58208c6467bb9e5b88,2024-05-17T02:38:18.760000 CVE-2024-25560,0,0,e7b7bd3b9b2bd4e7d45c7cc73f2078dfc39996dd7babf1c9bfbdcc4206fa2bb7,2024-05-08T17:05:24.083000 CVE-2024-25567,0,0,312765bfd106474db1f5aba6392fe2ea9517594a364566ff599d59e6c885b134,2024-03-22T12:45:36.130000 -CVE-2024-25568,0,0,b498c7c1e9cbb2db935a73c422fbd92cc67c265969ffdc27f9c11900b1d1b288,2024-06-12T01:15:49.033000 +CVE-2024-25568,0,1,1f3b68eecdadc5fc067f1c6a6f3d0aecf716d94021ea1c3d5bfe3c2dbc91ce3d,2024-08-01T13:47:46.990000 CVE-2024-25569,0,0,dea2ee3f4df79c480f034907a060b1ff1648e15e76705f9587fe4b45a7f69cdc,2024-05-05T03:15:07.033000 CVE-2024-2557,0,0,dc8b54b171bbdaa8e41888d89825f630dc10d84a726786b12c4c722ec5ac93e3,2024-05-17T02:38:18.850000 CVE-2024-25572,0,0,a19a9cf36c077c05dc278f38e37ca145a9759fc24272e685a0d3f0ff41385f00,2024-07-03T01:49:10.700000 @@ -246297,7 +246298,7 @@ CVE-2024-25649,0,0,78e924f5d41e5f05e296cc03dc3adfffa64606ad0d931d33e585d324f935d CVE-2024-2565,0,0,343041114de587054fc8697fd61433e361f1d5090f96a5bc5840cfbd0d3fa764,2024-05-17T02:38:19.613000 CVE-2024-25650,0,0,01debd251b64ab98dbfb6f9755755f4a861dcf15301c1f9d4cc42c00838c070f,2024-03-14T12:52:16.723000 CVE-2024-25651,0,0,a546ba0f7fd025d784b6fc0e494427092f33a4e4e0e2d25861f67306b90b8ed4,2024-03-14T12:52:09.877000 -CVE-2024-25652,0,0,a7f6e7864731c12dac2f85b230ee504cc5f34d934feb56d41c014efed1284920,2024-03-14T12:52:09.877000 +CVE-2024-25652,0,1,8c49426ba9ad9fd1e89e8e83a1eeefc3222cdf552830f48a0a9961a99880036c,2024-08-01T13:47:48.337000 CVE-2024-25653,0,0,efdc6e1fd6bc3201845fb807790d436f1b5ea82ec4d74b3ef4678687414457cf,2024-03-14T12:52:09.877000 CVE-2024-25654,0,0,1d8c485b666617bf15e2be3bf3f059ab8542011fba9b3f67352ac0a3b72fec87,2024-03-19T13:26:46 CVE-2024-25655,0,0,e15adc8eac4466bc206ecbf344e823f2dc60c695c8e2b528f93955091c188195,2024-03-19T13:26:46 @@ -246335,15 +246336,15 @@ CVE-2024-25710,0,0,d1e1c2f14ac0fdaa17f43a1220d128117b47331cb5ccaceca080941af7061 CVE-2024-25711,0,0,c4c08c8cc09954759ac01254a6c034bf78d852c0e2f0fb9c387add767b4de561,2024-02-27T14:20:06.637000 CVE-2024-25712,0,0,cd76bf59fa3b149c026f0736470198c42042811b7fa0e2166e37d9fe09aff8b0,2024-02-29T13:49:29.390000 CVE-2024-25713,0,0,35921be59b83d8af2e145b580a5667b3fbf17b7b509666f1c0fba54cc2b0bcc8,2024-04-19T23:15:10.380000 -CVE-2024-25714,0,0,77a6aa5c212ce68cbf4acaa2ce08593890f4149233f176f38e64a13bda6f81b0,2024-02-11T22:29:15.837000 +CVE-2024-25714,0,1,70f54472da145604490960ea7894946414b866256679ffb698af736efe283386,2024-08-01T13:47:49.190000 CVE-2024-25715,0,0,c088d4b977142e9dcb9ad21b32e4f9aa61385e1d7ddbd4c017103ce015b7a37f,2024-02-16T21:35:54.270000 CVE-2024-25718,0,0,cbbbc4a9ecf31ea73cd31d004a047465533ad1bc2326de95eca25cd353aac55b,2024-02-11T22:29:15.837000 CVE-2024-2572,0,0,5b74e34492d90066cf583f89ae3fdf47d4796ec58fbab0c453f87f07a2a5fb4a,2024-05-17T02:38:20.357000 CVE-2024-25722,0,0,162412efe5d98a1545030f95ca1fd98be43647629c949f00cde23ef6637dc76d,2024-02-11T22:29:15.837000 -CVE-2024-25723,0,0,53604f19d2fa15621ecea47c9fcfaf906a2375279baeee7f421b5288a2dad4ef,2024-02-28T14:07:00.563000 +CVE-2024-25723,0,1,8c3612f460be05084d2da9e8693ad88b2c515e61b1e81491f670f8acc6d04fab,2024-08-01T13:47:49.970000 CVE-2024-25724,0,0,6c3ef472ec3fdf4e4f5e27a3bc11b2436df6b7d677ccade72728fd545179cc6f,2024-07-03T01:49:15.880000 CVE-2024-25728,0,0,d5b5366c71853a0a7669d0ff26da971d7bca837f815051872013cca97e2e3882,2024-02-11T22:29:15.837000 -CVE-2024-25729,0,0,0509ab48c40b4be0c09472d6f4780224619a0554dfee2aa5e71c3537d0bc4c84,2024-03-08T14:02:57.420000 +CVE-2024-25729,0,1,79e2b6b94026a2503a323268aa0bb5f8e8bddcf0332d4e9b1c54117590216047,2024-08-01T13:47:50.763000 CVE-2024-2573,0,0,7ee58d60c03479b119e43465c4e2d394fe6aa4d1e8e9be023cebfd24e8bd0be1,2024-05-17T02:38:20.443000 CVE-2024-25730,0,0,647dfa388dba8a416fd85c97d0cddc9a279ee817ae5e9e35100ede40540268c1,2024-02-26T13:42:22.567000 CVE-2024-25731,0,0,b66ecf83a3f22031891274bd77adc2362c09b771f3c2acdf7176838dfa70771a,2024-03-05T13:41:01.900000 @@ -246363,8 +246364,8 @@ CVE-2024-25746,0,0,aff52edf515c4bb2be3d1c40746c76af6ee680ba5675ccdda5ccab353d740 CVE-2024-25748,0,0,9695611fe06c6e9b93fbd1431628cb47d8b27d680e5e9e22412df114dd60e72e,2024-02-23T02:42:54.547000 CVE-2024-2575,0,0,a80d23ced381ef92b364937b2fb4dfbb5da5d71a7483fe8d8649f5052e293551,2024-06-07T20:15:11.520000 CVE-2024-25751,0,0,f0421462e98f659f1769984b83a6c706a4a509a6b143972922469099fa24ac36,2024-02-27T14:20:06.637000 -CVE-2024-25753,0,0,6f500bc4a25ad7752e32d58a9c59b04d08e21588b0bf91967af7bfd7cdf9d183,2024-02-23T02:42:54.547000 -CVE-2024-25756,0,0,cb5af6cacf325c5cd69c80ea714f630fbb2169204933c24d5da0231e6d721ec5,2024-02-23T02:42:54.547000 +CVE-2024-25753,0,1,3303d3f561a201b11986a4546c74260382f6d919781c88643b2fe7778dcd9e8b,2024-08-01T13:47:51.623000 +CVE-2024-25756,0,1,5722ed90ddd6ea44b0d78f4422f1171f91100e701c27eb307eef69402053a071,2024-08-01T13:47:52.407000 CVE-2024-2576,0,0,fdb4f97a9caf3f079cc26ac1dc9f3230cca21d1c295263c699c8006e571cd963,2024-06-21T19:15:30.217000 CVE-2024-25760,0,0,c45a46352a5d67e1141c582ed464c0b6537f04649b66b954625542797a253143,2024-02-27T15:15:07.820000 CVE-2024-25763,0,0,527ce834ff91f364b0013949e6109de63ef1042bc91655a30b46c39de5dada9f,2024-02-26T16:32:25.577000 @@ -246383,7 +246384,7 @@ CVE-2024-2581,0,0,41246128334c0147c39b69b67a7b8a68f9df4e44ae695bfb23a0c0e11cadb9 CVE-2024-25811,0,0,6afbcbbc566fc9d8019e31b6d4a5aedcffb977c19c6aad0499e5667fabad80e8,2024-03-21T12:58:51.093000 CVE-2024-25817,0,0,9751936b38e23682bc0a4e2248c7e3d318b471c4b00ba97b7b3e641f5178af1a,2024-03-06T15:18:08.093000 CVE-2024-25828,0,0,b9208d07acefc5f8bb86b1c0a1d3e2fb74dd5ed4c91b559369b12aa7bea3504d,2024-02-22T19:07:27.197000 -CVE-2024-2583,0,0,fedebb23d58084f6f5e43c745febc2b44a29d549ef09f3921c42967113a4f883,2024-04-15T13:15:31.997000 +CVE-2024-2583,0,1,bad6d25a4e56375c530c1d9887ed4d49edf53513d5bb806a8b8436b2ac73bef6,2024-08-01T13:49:48.777000 CVE-2024-25830,0,0,bac0044490e1e709c15b4ae97f78c483fec5c64b2ded09434a42484853de56a5,2024-02-29T13:49:29.390000 CVE-2024-25831,0,0,865d67a5eaea9aeb6dc34380b2f9339c6f4454b68228f5e0e1f349028c509484,2024-02-29T13:49:29.390000 CVE-2024-25832,0,0,a4448e0b7fded4d69ae19d5a812394b0dfee60300a31f6c0311dd994464f2ea8,2024-02-29T13:49:29.390000 @@ -246397,9 +246398,9 @@ CVE-2024-25843,0,0,b7ce35c602cb66544422a9541b1ca352e3e23db5766bb19933b8ddd232d25 CVE-2024-25844,0,0,1efbddea52e96516cb009d14a44c252f988b870416e9c0cb454ea358f81c127b,2024-03-04T13:58:23.447000 CVE-2024-25845,0,0,951e74ea3ea891e8023acd490009fca43f510ba7102419911edb4e33d96aa8f4,2024-03-08T14:02:57.420000 CVE-2024-25846,0,0,f1629990334a4370d4e99576c944221d6f6d0ee63890f8ef9c099f5169b53262,2024-02-28T14:06:45.783000 -CVE-2024-25847,0,0,72f939ca250646d72cb635f6aec8bc431b614edc043741e3808f1372827eb149,2024-03-04T13:58:23.447000 +CVE-2024-25847,0,1,768589b83f1428c67363b11073f1a1ed8713927725c83f5055ba58a636fde784,2024-08-01T13:47:53.253000 CVE-2024-25848,0,0,6c1bfa77711841ec03ded833f1894e9609b79f14cb4ec6bb43654b13a2cb7b3b,2024-03-08T14:02:57.420000 -CVE-2024-25849,0,0,1fac0f0e29703d0450de8825a143d2ea6af8d9bbac2addd9fb03e22ef778704f,2024-03-08T14:02:57.420000 +CVE-2024-25849,0,1,ff1448816af02e5feb5f816e4bcbbe340dd06d99e43025948714f4eb8f651531,2024-08-01T13:47:54.067000 CVE-2024-2585,0,0,09f7de950868ec14db3e38701fc5881ee82655225ee04ef5941127f736832c98,2024-03-18T19:40:00.173000 CVE-2024-25850,0,0,5af0f934ea484ec3ca1490c96924ef0aab7c5c7572c450b40cf4d9d726414295,2024-02-22T19:07:27.197000 CVE-2024-25851,0,0,d67a62091ab95045024d9c69930163fc6933a08dd0957c710b2d2f48274fafad,2024-03-11T22:15:55.150000 @@ -246408,12 +246409,12 @@ CVE-2024-25854,0,0,17ea666d7172d54584074846a82d44b7b8f164d46f64195f0b1bec22a7304 CVE-2024-25858,0,0,f2d61142ee5b87819cb05bd45baa7574f24c4b82d7f291c2c6a0c87006d3f65f,2024-03-06T15:18:08.093000 CVE-2024-25859,0,0,5d3416d33baad6c5419dcee926eb2da1abee7dd2d03a2d827cc53b262fcccd60,2024-02-29T13:49:47.277000 CVE-2024-2586,0,0,71d47abb08c7e463323230f7e49ea5f345cb538a7006733d07a2afa950cd9ac5,2024-03-18T19:40:00.173000 -CVE-2024-25864,0,0,682c4f3f69c1328c9db2893e3a381dd614ae3e0045be8c14d19b7511df64b708,2024-04-03T12:38:04.840000 +CVE-2024-25864,0,1,2a09b4ab74072b776577b1c00a1bf5c268c139c75079ed692d71dc30af731c65,2024-08-01T13:47:54.857000 CVE-2024-25865,0,0,9dd00ecb01423656380096aa5e060fbe6dfb829859154529d4f81246070dea21,2024-03-04T13:58:23.447000 CVE-2024-25866,0,0,9800d1d73cf4e02f2835e7808c820220d82c6c39d582e9178e2e2aa396a9c576,2024-02-29T13:49:47.277000 CVE-2024-25867,0,0,8e55f36e4f1b56edc96022f211fe880b4aa76b96735d12ae86aa863ef60ef510,2024-02-29T13:49:47.277000 CVE-2024-25868,0,0,79e7e664441558838d5a1bb760dc0511d86ac2459634e03e0e20d259b84c2b90,2024-02-29T13:49:47.277000 -CVE-2024-25869,0,0,1aa39684198a27a89bef6d277e33b6f44d9b53f245d70d56e1b625fd13ea2b04,2024-02-29T13:49:47.277000 +CVE-2024-25869,0,1,748b3f6208379a05bd57fedf558ac81540396f4b22ed44a19829a3ed8cbeb467,2024-08-01T13:47:55.047000 CVE-2024-2587,0,0,e2d83da8cabb60e53d324491ce37ed304b28f02c73e9f44ebaa65b6ebded5337,2024-03-18T19:40:00.173000 CVE-2024-25873,0,0,8a4faa4943ee6e0e03bd7795594e92abaa0f28587f9f5694820c6cc3d79de9cd,2024-02-22T19:07:27.197000 CVE-2024-25874,0,0,6d2389bddde8527bf2136be3df99fb38d1df3f190ca0f8297eea242b1fbad855,2024-02-22T19:07:27.197000 @@ -246424,10 +246425,10 @@ CVE-2024-2589,0,0,c013a892db4b6c9e5083074a6ba63c6dd2462c0f9900a29d5df8d96a9aeef8 CVE-2024-25891,0,0,84cfc5f312c597141ee54b1ce3a081aaaa3c04f515375840db467867fd6cd895,2024-02-22T19:07:27.197000 CVE-2024-25892,0,0,7c92b5c1c0fcd8e7e39a755c0a6d087d09ef888e8a946457c65e5a991f53e3d8,2024-02-22T19:07:27.197000 CVE-2024-25893,0,0,6074afa7b83b45196c5c6ba86bd6a55a5db84fa3d221197e7e610730da7175c7,2024-02-22T19:07:27.197000 -CVE-2024-25894,0,0,9da5eb5b2389fd0453af389876ccdfe1892dd03a335a3970f1f7723708f7dd0e,2024-02-22T19:07:27.197000 +CVE-2024-25894,0,1,110687aa8f80df3297624f90f6f33809d75def9197abe56922d406f86b8dd02c,2024-08-01T13:47:55.813000 CVE-2024-25895,0,0,2ba47c5d5388e14fe3cf07023711e7e1a5f93270bba38897d7644c4993762323,2024-02-22T19:07:27.197000 CVE-2024-25896,0,0,08f878ee14441b76754056ef0405ddf3a84202dc82f048a455b46423ba277c2d,2024-02-22T19:07:27.197000 -CVE-2024-25897,0,0,9082088a4dd3cbcc253eaba4e3466f01516acf0cc9fba7a2ab7578bc5d1a9317,2024-02-22T19:07:27.197000 +CVE-2024-25897,0,1,3213328e6055109c729a79555e408be1167e003093cb1be559eee482ac1df1a8,2024-08-01T13:47:56.570000 CVE-2024-25898,0,0,44c4d18d364691615141c272c666cd64d62bb83c92d766f5a80a7a5cbee93172,2024-02-22T19:07:27.197000 CVE-2024-2590,0,0,0458d80d4b528918fc31cc255ec51af30f455149e8edb89183c141dbf7ba8f0f,2024-03-18T19:40:00.173000 CVE-2024-25902,0,0,b83f36ee038d8696774aca2d68dc8fbbd70d85a4606746048650c8beb472895e,2024-02-28T14:06:45.783000 @@ -246477,8 +246478,8 @@ CVE-2024-25942,0,0,ed9972b2a67908fa134e82ba51db8b6dda164f88a17fdef5830f031dbe673 CVE-2024-25943,0,0,d506e8c730696f4b2f3434da5ff1d66664f3a0f52ba266f85b5b04d36f260146,2024-07-01T12:37:24.220000 CVE-2024-25944,0,0,ab1a6f9559c2c17591ef013078bdc7d1074a6939146b74afdf8354c958a2a210,2024-04-01T01:12:59.077000 CVE-2024-25946,0,0,a113fddf4e672678a1d14cda275154cb9972765501ae2bed1e5e6a531e4a4550,2024-03-28T20:53:20.813000 -CVE-2024-25947,0,0,485470e617d7bd91b0ac4d1200f519b4198e68df5c5f6a749aa66b3078909a80,2024-08-01T07:15:02.140000 -CVE-2024-25948,0,0,b1a8daba18f532e18688c786c199b0f61a9f31e5acabf8fcf1766745102f2aa8,2024-08-01T08:15:02.203000 +CVE-2024-25947,0,1,8172e52be96ed5792e7579b6d78182152b88c138e69a6f281c7bad2709500655,2024-08-01T12:42:36.933000 +CVE-2024-25948,0,1,99c8daae5f05c06926c78d2f8a6326fc5d660ab7757927eecfc547d9c8dd29d7,2024-08-01T12:42:36.933000 CVE-2024-25949,0,0,cf19f3ab0bbae3d1ff74313cc0fe0f90bdd6c260c977bc35c843079a46627a59,2024-06-13T18:36:09.010000 CVE-2024-2595,0,0,e521c63ef6b03578b7bb7372b5bef2fecd2a3eebcba151ea7fc07a4fe787ff2a,2024-03-18T19:40:00.173000 CVE-2024-25951,0,0,3b1032e7dee2277c1cd9087f14c93f6b15f85f0de6dddc7df9693edc271d4b00,2024-03-11T01:32:39.697000 @@ -246506,7 +246507,7 @@ CVE-2024-25970,0,0,f8b7303cc0abe87ee106240dccbd738c35db8e13a2603b08d62839897cd5a CVE-2024-25971,0,0,d03bf655e7e0d5dbf73b6beff3280dcd3ab38f529872aed84cb4a267414cdc66,2024-03-28T20:53:20.813000 CVE-2024-25972,0,0,d95c21ee974d425afbb922b90eb304204c5a0eb3f080624a00ed82488538506f,2024-03-01T14:04:04.827000 CVE-2024-25973,0,0,64b2d7e51fd0c1f6188056368cd8ef177890326c25a57ab938769dde8c643479,2024-02-21T07:15:58.040000 -CVE-2024-25974,0,0,92cf0d8c3a46ccec412f9ed56f92e0a7bca224466a4047adbd252338fc0be387,2024-02-21T07:15:58.427000 +CVE-2024-25974,0,1,12433a6d8e699d155905877ac67441d31fc3219c3906ce3bad9f2bfde8f9f2f4,2024-08-01T13:47:57.737000 CVE-2024-25975,0,0,7575b9d67e4ea045410d7956ad161bd45f31efb1c5194db4cce836637ccacb6a,2024-07-03T01:49:20.510000 CVE-2024-25976,0,0,4895bf665241fbcb964874f8abc59a09c63c78b92e82da9244cb72d605632238,2024-06-10T17:16:22.307000 CVE-2024-25977,0,0,dd2fd1cbaffa3e38b01b98f1da92804de4c66abaf02b340bb064ec17100c5dea,2024-06-10T17:16:22.373000 @@ -246524,7 +246525,7 @@ CVE-2024-25987,0,0,5d28abdc430918377a309de9b4e244a9aaf723c641eb303f0c21384cb03ff CVE-2024-25988,0,0,305db8be25e111152c3b4a21080d626c3f2b89bf725f11251a611b3ce0958177,2024-03-12T12:40:13.500000 CVE-2024-25989,0,0,14738c46f94e94e6b7897446658f285f8e9a188c6fec45e970fce017c50eb02e,2024-03-12T12:40:13.500000 CVE-2024-2599,0,0,448bf984845294b825ad64c45fc7ff6a1a97b88712ab8f0c7b9899ecc5e48ad8,2024-03-18T19:40:00.173000 -CVE-2024-25990,0,0,ad68cfefc98e4bd479e7cb7505b41fec95c9b4fe9464905e80129b1636859404,2024-03-12T12:40:13.500000 +CVE-2024-25990,0,1,05042610d9d9eeed77c351ef8461507e7363f5a24856c830f88125ac3a7bb105,2024-08-01T13:47:57.997000 CVE-2024-25991,0,0,55a93164172a1b22ef8f30a0ed89816155551a2ca968148a5c0da905634180b8,2024-03-12T12:40:13.500000 CVE-2024-25992,0,0,9077f849d4dddde51329fbf2553fb349784d84e4a5aa50feb6dadd6e5e8acf0c,2024-03-12T12:40:13.500000 CVE-2024-25993,0,0,9be19c7e891cbed9482f884ce35870fcaafd6f3102d81a00ac286ece83959326,2024-03-15T20:15:08.167000 @@ -246548,7 +246549,7 @@ CVE-2024-26018,0,0,504335bbc761c181e6e0e6311b5c9a67674f4d2e194452a2b54f2b4e56156 CVE-2024-26019,0,0,c8f3817ebef24fc08c083645b2146c067190c6ce99f258e914d83a748ccfa09f,2024-04-11T12:47:44.137000 CVE-2024-2602,0,0,68545756683921883a71e009514104eaecb0a76db274a20107afd513be41a06e,2024-07-12T16:39:51.080000 CVE-2024-26020,0,0,c3af68fd4e405a95ac1ee216ac5199ad392060554e72b2c1dedcf9e863dfab9a,2024-07-24T12:55:13.223000 -CVE-2024-26023,0,0,670e783dc656d270b96b38e7fba1adff0be56adda08591c41f9bc61ed8e8e6a6,2024-04-15T13:15:31.997000 +CVE-2024-26023,0,1,edcfd807fdc96925d4b0905ae74cd6e42a43795e1d81a6569987258b521eef13,2024-08-01T13:47:58.927000 CVE-2024-26024,0,0,3ab60f6be938f975935e53b7a80711b98fe8d56f189e7148a76008394bc4ac8a,2024-05-29T13:02:09.280000 CVE-2024-26026,0,0,9489dfd8cfaf84cc429afc6dedc0bc5efa9a938711a5b920a49c5eb5da48c8dd,2024-05-08T17:05:24.083000 CVE-2024-26028,0,0,5f8913cd7c0dbd81bba046bb5b12f67c41b2f05945fde5c38d400529f7172145,2024-03-18T19:40:00.173000 @@ -246805,7 +246806,7 @@ CVE-2024-26276,0,0,7406f6551c3634363606a828a01f36a4203616ca4676532db244783183501 CVE-2024-26277,0,0,53da675804208a63e801a731a45b8146add8b1e603e83f9c176483f042fa922f,2024-06-11T12:15:14.273000 CVE-2024-26278,0,0,a4bf5f7d4f5a8cc66cc891c37bd6872984880cd4b8b9e994fb28df36f06ab446,2024-07-19T18:53:12.727000 CVE-2024-26279,0,0,495c848487ea7b68d426f27b99de0402b60520a7c129465843fde2c78b15bbc3,2024-07-19T18:53:34.103000 -CVE-2024-2628,0,0,3eb383942c41e553b12d37d763a3ecf0b59954bbb778306cb6907ca273bdbf0e,2024-04-01T15:23:07.793000 +CVE-2024-2628,0,1,4a7e07d94a35c935cf3c9df1b9171d3e4e2d853591930d306ce78f0193f5dd38,2024-08-01T13:49:49.370000 CVE-2024-26280,0,0,1f3fc8cd8b6e3eb3dd36bd8ce4d8f8a9e24e131da3be579fb8d9bdda224678f9,2024-05-01T18:15:15.537000 CVE-2024-26281,0,0,79880eb9ab547a64badb9469ec54aaf28b8e0e224b4897c69af19cf6a4aea84d,2024-02-22T19:07:27.197000 CVE-2024-26282,0,0,d37608cdb77068bc4d7fbcbe519d1183ae3a668bc9f56893a4cf84761614885b,2024-02-22T19:07:27.197000 @@ -246815,18 +246816,18 @@ CVE-2024-26287,0,0,a6aa5e3005a08ad2bdeb88cca399334d57123c9b3cf8d04b234e0711a3fc2 CVE-2024-26288,0,0,61c22cb74f5eb652fdae79619ebf61a4049c3d7540f280d94d684c77fa4ac9a1,2024-03-12T12:40:13.500000 CVE-2024-26289,0,0,3f2a493d73ae58c7916dcaf22b12fd90f6e2b64fae7ca6d93d1a5861f7ec83f3,2024-05-28T12:39:28.377000 CVE-2024-2629,0,0,78756ea59fbc8bb06acd4a0469af5e1552ad20775ecde60e97fea48861d6232c,2024-04-01T15:23:21.117000 -CVE-2024-26294,0,0,029f8da7350e380bb6a109f5d1b0d9ee6d69623c6ba9b25d71b3835164c0b509,2024-02-28T14:06:45.783000 -CVE-2024-26295,0,0,e24fcab6767b284cdcda6b2b79ec48dd836a103fedeb4de767c4f55458e1268e,2024-02-28T14:06:45.783000 -CVE-2024-26296,0,0,02e0d4e31a6d09d5bd964edf717df0e8e4d9a207feb841a759d0015af77a6a59,2024-02-28T14:06:45.783000 -CVE-2024-26297,0,0,ab81312dbb5967bca76aa434bf6b588a3d95e70fee7fbf27926731c5c247d265,2024-02-28T14:06:45.783000 -CVE-2024-26298,0,0,40898eca71667e22969f2f769130f626137730bfeb651c8c14d1620b48062345,2024-02-28T14:06:45.783000 +CVE-2024-26294,0,1,de48a89091f90dfe2bb925dbcf72ffb9f70a9c2ccdd8aa78b5978620743f9235,2024-08-01T13:48:03.680000 +CVE-2024-26295,0,1,bee0ceea4a2fa9f7b5cd5ca393d32245b0399ff1744d3c1781d7fe4c470553fa,2024-08-01T13:48:04.430000 +CVE-2024-26296,0,1,544e1c2c94ce65e70db959ad46d5372fa189de6687abd994a179048ab80cba75,2024-08-01T13:48:05.123000 +CVE-2024-26297,0,1,af2dff5c494a25db31e51e78048442dd01fa43e7ea7ca9a2aba52748560b0484,2024-08-01T13:48:05.817000 +CVE-2024-26298,0,1,59727460b37052fa0a59faa646f1b3121962ba5c31619135e5630e3a1f8617f0,2024-08-01T13:48:06.523000 CVE-2024-26299,0,0,388de7f3a87ecf2fa8513c69a452c6b2ff267b5ff8f028f7dadd75103abb070e,2024-02-28T14:06:45.783000 CVE-2024-2630,0,0,070bc19de7c6292a3d3a6f1dc36c9928baae384b4f9f22a69378848f649a74b3,2024-04-01T15:23:32.893000 CVE-2024-26300,0,0,1ac1f21ae9a2403844c235609ee04177577ebeaf725b3bb4b2178b26e2a031f5,2024-02-28T14:06:45.783000 CVE-2024-26301,0,0,19f0f94ed5cbffac086b7363ba9897dc486d991fcb04fba1d0f3db89247a8bc8,2024-02-28T14:06:45.783000 CVE-2024-26302,0,0,ff20007eb31c0fa8781cc9c4d6fc8a55c00403a520ce07afbda60fb035b40218,2024-02-28T14:06:45.783000 CVE-2024-26303,0,0,42253e7fd155fa27a59dd26831fcc1e97274fb8a3958cb183405d9c11e6e60fa,2024-03-27T12:29:30.307000 -CVE-2024-26304,0,0,eef218e6a982bf1af55ed489a49512bfd3728e07d5fafbadd6f220e1c11ba189,2024-05-01T19:50:25.633000 +CVE-2024-26304,0,1,52797ad2daf7c8c033c2ee20a483308fa7817a013fd5715d9b9c9caa834835d1,2024-08-01T13:48:07.227000 CVE-2024-26305,0,0,a65ba50eb26a2c8cd8116833b01ccff155f5f99454b54473ac13d25eeaae6554,2024-07-03T01:49:36.833000 CVE-2024-26306,0,0,6d3f178737d5e1183e45dc84ad377810e03e7b672845f96242a627510f5ace17,2024-05-14T16:13:02.773000 CVE-2024-26307,0,0,69e56c1207bd415bbef84f2246a3f4dffa28e9109056e4a053129ad394592e62,2024-07-03T01:49:37.557000 @@ -246847,12 +246848,12 @@ CVE-2024-2633,0,0,5cbc6482108bfabb58a338263ca9ce41f75b102c0fb9b1f68c08206c04598c CVE-2024-26330,0,0,43c5693791b1d02b9d7798238f11c123e60d8efcdc6edf6504f348d47ce89d17,2024-06-14T20:15:10.707000 CVE-2024-26331,0,0,3620ceff48a7a6c47c89fd40c427f62f4833f128be93d4b0463895bd174d7956,2024-04-30T19:35:36.960000 CVE-2024-26333,0,0,b1cea056339002e99d9bf9185df649d82056af2e367b04b31b3cefe428697523,2024-03-05T13:41:01.900000 -CVE-2024-26334,0,0,72c0034e6ed03b4d9412dd2e1ce9540cef968d99cd60c7ec275b3ac2c45a35e7,2024-03-05T13:41:01.900000 +CVE-2024-26334,0,1,c4437261365c34b0c82620f49b29da2640bc282957b56466a05a422e7da76225,2024-08-01T13:48:08.113000 CVE-2024-26335,0,0,2875506bc0b27f814479c6546f230498e9059635d5fba5dacc2e8aca87549ae7,2024-03-05T13:41:01.900000 CVE-2024-26337,0,0,7467ba20b2aeab6e4e0eaef1a28ecf7afdd08548bd8662f66e13c78023ac14dc,2024-03-05T13:41:01.900000 CVE-2024-26339,0,0,659f129ca3648b83156fc6852e92bc46b623e95ccaffb1f0277c9a827934e63d,2024-03-05T13:41:01.900000 CVE-2024-2634,0,0,b276107a08eee80006387cf13ef24049d22c4a68f8d1114f3b56a0ab62e978bf,2024-03-19T13:26:46 -CVE-2024-26342,0,0,e7edbb91880e69bfca04309c34e3a388031a95579a7692589cb18cad40517bd1,2024-02-29T13:49:47.277000 +CVE-2024-26342,0,1,1fb5b71dc664cadb937934d696cf268599cf67098a7df3bd6bdff84ff437a216,2024-08-01T13:48:08.900000 CVE-2024-26349,0,0,7d7013f5e644bfd2a3db6b5c4287bd48821da655a92e55c18fbfeb4a062bb2dc,2024-02-22T19:07:27.197000 CVE-2024-2635,0,0,9f42572f6f59ecbd6de9fb972375344d74523c7a434968abb17bf622312b75c8,2024-03-19T13:26:46 CVE-2024-26350,0,0,a0e074979e9c4a20e1bd435f9f5000a9e3a8ec20a571c377e44a37d685a19d04,2024-02-22T19:07:27.197000 @@ -246861,10 +246862,10 @@ CVE-2024-26352,0,0,2ed6b100bb1cf5a464be6e2b5781a2a53fb9bd85d5a0ac4b1f286aa41b9b9 CVE-2024-2636,0,0,99a69aaffd46cfe65a84b6720d2f35122e16b65656b4791402aef2e645d8d6eb,2024-03-19T13:26:46 CVE-2024-26362,0,0,5faf69da8a67af4816d796fd5b51111ac2c788f77e8e8dd0cf83d9d0e45a369d,2024-07-03T01:49:39.793000 CVE-2024-26367,0,0,527c3fc48df6b7e73e05f006f7179ae46d331d377d9a28bb902941bd60f631f8,2024-05-14T19:18:31.490000 -CVE-2024-26369,0,0,4e945bb0cb53dd9c985b827267bbe66eab38d905bc8372f5233ae3d18c3b659d,2024-03-19T13:26:46 +CVE-2024-26369,0,1,08c9f0525905502b41d2dcc09bd77683ee3501b8b43f7fda43dd5219f9780ed5,2024-08-01T13:48:09.673000 CVE-2024-2637,0,0,721622b64a65f273433032cdde0b2ce3d6c7d3ce5ea1581ad6c33c2a93b72687,2024-05-27T08:15:09.360000 CVE-2024-2639,0,0,1b2fbb8554a3bfbdfb75c8d2c4abee29a55fe420023a4469268f266088d766ca,2024-05-17T02:38:22.540000 -CVE-2024-2640,0,0,4b0825a8d7984405ddecaf2fa151da47dc63210b6edbdf23450335e25309956f,2024-07-24T20:04:48.360000 +CVE-2024-2640,0,1,d67ac0f9a6f6b556e0c1b723f2f31c17146e454f4580301ea55d956e5019b293,2024-08-01T13:49:50.317000 CVE-2024-2641,0,0,9224bc0a65307cb53933c2d7858f8e3abf23dbc7ae542920adafdc9d5bf4c895,2024-05-17T02:38:22.647000 CVE-2024-2642,0,0,f4d5d0409211a54140db72574a0074f769063560d7df04b7b7402f6cc784e4a4,2024-05-17T02:38:22.743000 CVE-2024-2644,0,0,fab6e7415abdc266e0f9914dee035a72adfdb797420e958820a3298690e993b0,2024-06-05T20:15:12.680000 @@ -246893,7 +246894,7 @@ CVE-2024-26476,0,0,836ff70eb7513cdb6044909b365a5df62db57891cc64689ac318dbbb08189 CVE-2024-2648,0,0,6d89ec31c12e1a6e47d90e233556070db2336168660808ad047eea9b6b7f2532,2024-05-17T02:38:23.220000 CVE-2024-26481,0,0,b7ccdd7ef2b775d7683d16f87124e3308865cea2be01483217ab4c015d0eb7ff,2024-03-12T05:15:47.500000 CVE-2024-26482,0,0,75a8d957893cef3b39f989707cbbee3fc15f31eb720450a98ecb9f7c233d8560,2024-05-17T02:37:12.450000 -CVE-2024-26483,0,0,9a2aa2f2d7cf771f9fcfb3597f505b8a8d252013c2181556598fd2e5d8c7f8eb,2024-03-12T05:15:47.610000 +CVE-2024-26483,0,1,b5ec47ce1b513ecf6dbceb8f812429a8fe9ec195f20a1c367fcd9ea7c56801b0,2024-08-01T13:48:10.447000 CVE-2024-26484,0,0,60deef62e17e2ffd9dc15ae141ce6016d0a9d886274ac59404bf11776c19f233,2024-05-17T02:37:12.527000 CVE-2024-26489,0,0,66cfbedf131a53c21ff3313641983aeb0011805244fec1b387ac6a56f1259318,2024-02-22T19:07:27.197000 CVE-2024-2649,0,0,33b94c38d3a45f74f6718ae1eb94103cab8852874cf5ba7ffe3119736f42cfff,2024-05-17T02:38:23.307000 @@ -246925,7 +246926,7 @@ CVE-2024-26574,0,0,e97beed2b27ceabe660eb9fd95cf5205e1fe0e04e7235f562df6841e3faa9 CVE-2024-26577,0,0,a8a9ec970c8df7fa34d7dd9c99c7da2cbb893ec959a3cbb23d61163fa3f7831e,2024-03-27T12:29:30.307000 CVE-2024-26578,0,0,087432b924c75f35d9d093592e9ffddd2b5e78220d6d5f18884ea66bdbc19b91,2024-02-22T19:07:27.197000 CVE-2024-26579,0,0,aa916bffc6068e6b1f48540cee238001fad0c31e3586bc89eba405a56b6cce86,2024-06-10T18:15:27.950000 -CVE-2024-26580,0,0,bb0690315305d618e98c36ff2fccaf34e1a19fe89df763bd29af87eeada1997e,2024-05-01T18:15:15.603000 +CVE-2024-26580,0,1,8627ee85006e9aa997b3d19c22b764dea844587995050e18dc785b406ce29c6e,2024-08-01T13:48:11.393000 CVE-2024-26581,0,0,412e966feec5176dbca62db14c8ddd082acf1cfb2cab8297651bcebdd4a9e67b,2024-06-25T23:15:24.137000 CVE-2024-26582,0,0,df1e6f22a079e3165d5a4ac7c9966a2b20a8f092ab8cd548cfca4ef1dd70be20,2024-03-15T13:56:41.843000 CVE-2024-26583,0,0,ea966c9fc41d50463dd0aa4f9c32931c6aa096e2933975e637fd40f63eae540d,2024-05-25T15:15:08.700000 @@ -247082,7 +247083,7 @@ CVE-2024-2672,0,0,c8d64f7b93993488ba5215c3b2eb1c5f7ca0e18711968330934c30769d9d1d CVE-2024-26720,0,0,0796d3f03354db4b881b215435b033867db943942fb95ad422104cdb227db34a,2024-07-18T12:15:02.847000 CVE-2024-26721,0,0,1855766a0f5812e12b4ec66efc3b6a9afcf0b78271c4c12c6a2911031699c926,2024-04-03T17:24:18.150000 CVE-2024-26722,0,0,678c2174565506cb90dd280f45dd36d61492a163290846ced6bc12ee6690c2b4,2024-06-27T13:15:56.110000 -CVE-2024-26723,0,0,9d8d03d9329ebb342c4e3314808bf5e170cda8d67b6c893375d4b8e8fb328316,2024-04-03T17:24:18.150000 +CVE-2024-26723,0,1,1adebbbe0c1df51f62e04ec69f2b8748b17bc37b6c4d709a161eb246b0d88215,2024-08-01T13:48:12.423000 CVE-2024-26724,0,0,28ba565c53f52bae0b7686dc347d7a909bf2fd59dab779361c6457ef08850b2e,2024-04-03T17:24:18.150000 CVE-2024-26725,0,0,3af074c9f95dfef44f6d0a74ba92f1d001d4c2881fd208366b418ebd1229e318,2024-04-03T17:24:18.150000 CVE-2024-26726,0,0,5f95449f287d49e49d2bb1f87b8c386e0aa835b28cda779d9e6430eb3812b614,2024-04-03T17:24:18.150000 @@ -247163,7 +247164,7 @@ CVE-2024-26793,0,0,92e0c3304d59c20344205466111c61b670abd0c0c9a7331dd9196728aeb65 CVE-2024-26794,0,0,fcc6dfd7822134b198da3d6ddac7dfc3182f661946c2ecaa378d8c74b430dc8c,2024-04-04T14:15:09.843000 CVE-2024-26795,0,0,9c1ba659c36cbbbd3d93c1e3b0e26b049a241331b716a32d5fe3e1d1112a2066,2024-06-25T22:15:22.850000 CVE-2024-26796,0,0,3affdc98728e9ff3dc84c971aaca313eb013d4ca7109a6ece2879e019bf8e643,2024-04-04T12:48:22.650000 -CVE-2024-26797,0,0,5e6d28a428282746bd4bcef7cfc043b9224ed9b7dd9fefb83d99f585a9406189,2024-04-04T12:48:22.650000 +CVE-2024-26797,0,1,4b45cf99e833a07d36f553262c37b3e65b5a8447b2973f4a7792233c43765b6a,2024-08-01T13:48:13.443000 CVE-2024-26798,0,0,a410a243e80cddf148999cb71cddef4fd3f39d52d88b3666cc33d507df82b817,2024-04-04T12:48:22.650000 CVE-2024-26799,0,0,4097805fdaf6a7be4c4eddeec0f16034503966378448b00bf3a86eca14794f0b,2024-04-04T12:48:22.650000 CVE-2024-2680,0,0,342f85e83855bbe14790a9bdd19a131a938f3401b6683beabfa289d2ab686980,2024-05-17T02:38:24.920000 @@ -247274,7 +247275,7 @@ CVE-2024-26894,0,0,be66fe6645dacacddf87a89a0a2e96de8e32c9faf5fc4db2d80ecba371706 CVE-2024-26895,0,0,b9dd891a5343b75d81278d18982d49da18e6241368343883e4b0512359c9b37f,2024-06-25T23:15:27.080000 CVE-2024-26896,0,0,b08f3e33c23ae0b83635aecbc40be8738b6df9560f03215c69e56c9079672600,2024-07-03T01:49:59.133000 CVE-2024-26897,0,0,f7f0ae7a29508e7fbb0b3fdfe5757c59953f0ebfc186579cd1f494f6556c9f6d,2024-06-25T23:15:27.180000 -CVE-2024-26898,0,0,69004665022863463348c9fa0b30d792d4f5c36d489f2b9da619240f871e67e0,2024-06-27T12:15:22.257000 +CVE-2024-26898,0,1,5c848e71ceac727fe8380c07f788b5ef64949613a63232215675828721ea1a2a,2024-08-01T13:48:14.737000 CVE-2024-26899,0,0,1f11bdf1b25a0796c85b132e8320f1f7314f487487b47bfe06c522484011aa5d,2024-04-29T19:34:10.080000 CVE-2024-2690,0,0,8a0e6598609cfaf718bb2c9d66fffc866911f408139789f9b9a729c1ed28fd12,2024-05-17T02:38:25.710000 CVE-2024-26900,0,0,1e35fccd29c92559fa020dd30224cba2ecb271d1f2eac5f4b7287d24e0206148,2024-06-27T14:15:13.237000 @@ -247519,7 +247520,7 @@ CVE-2024-27133,0,0,6574fdde089b4683da8bd06069d4a01e27d182b9361898f9a2a8686337a25 CVE-2024-27135,0,0,8f681cbd0423d5edcf1af419653a19c055e013668588c5e21fc1acd9f7af97d0,2024-05-01T17:15:30.087000 CVE-2024-27136,0,0,95371c097b782a9c3eb2e668bc7e52a3add3a0ca964de3d4fb22468a7d6fe516,2024-06-24T12:57:36.513000 CVE-2024-27138,0,0,1836c82669ad670bb3a94b818c7a2afb34e113da91f7a642ffc52f477f7ea951,2024-05-17T02:37:25.107000 -CVE-2024-27139,0,0,267f11a24a2cf4f0bced9e1704e452b13a7e03a87c492c5fc6b862090589e559,2024-07-25T15:15:10.693000 +CVE-2024-27139,0,1,90ccc5f9b1a4362b43fc17b7cc843b2b5fdef2cb9de9e1cb377b33437fb66898,2024-08-01T13:48:17.100000 CVE-2024-2714,0,0,fd707009e35b2adf97d47fd45e1287d327a5720e922cfb5f98c6896a9e8b6097,2024-05-17T02:38:26.850000 CVE-2024-27140,0,0,2b44ee1fb3d2df9684d9b09c30157caf9db44c6920a8d62ef396ce86eca01036,2024-05-17T02:37:25.260000 CVE-2024-27141,0,0,057b70aa4d3ef54e41334849d6465eb42f0fa3aefe9d620f030d33f3f65261da,2024-07-04T05:15:11.080000 @@ -247583,17 +247584,17 @@ CVE-2024-27199,0,0,b7165fde30d8edec4986915f0c4ca7947c54838852015584a90e5050c5a60 CVE-2024-2720,0,0,85869b201641191d674a3d8cb0449932108d6f33187a3194c3a297f2e914d0b6,2024-05-17T02:38:27.590000 CVE-2024-27201,0,0,f4057db407cc0b2cb15b83d5bfcc727fb8fffbe5df642064a2f39b01d31b3338,2024-04-03T17:24:18.150000 CVE-2024-27202,0,0,dec3b871d77de488d2204727c8b45ba74ac889892271b3051ec433c7b5758780,2024-05-08T17:05:24.083000 -CVE-2024-27204,0,0,ebaa7ac27641e35355dee617516b37507f7fad787f49358e25854be1e40b1856,2024-03-12T12:40:13.500000 +CVE-2024-27204,0,1,21c5c3d644ab35ec9e83742f3138cff8265e6d21b8f7f41fe9d62eba43137806,2024-08-01T13:48:17.703000 CVE-2024-27205,0,0,6c651845ed79bae59e4bc5dfd269c86e5f248589b03155d6d1c21d876f034322,2024-03-15T20:15:08.703000 CVE-2024-27206,0,0,3dbcbfbe90f7ccf1cbfa262db765dc01c5f5c5d064d48875899ccc34bacdeafb,2024-03-15T20:15:08.743000 CVE-2024-27207,0,0,26a3fa32a7d98dee096b0b64b89aceb01f98022322e81d7071faa64c2a5eb8a3,2024-03-15T20:15:08.780000 CVE-2024-27208,0,0,fe92ce35aa96bad489de57160c7a2fca3fa967ec6e1cec1d7b791aa73e9643da,2024-03-15T20:15:08.817000 CVE-2024-27209,0,0,b612b3955c2ff4f0a4005965ed798aa1e7684d6f13f33d83981249f317bba3c3,2024-03-15T20:15:08.860000 CVE-2024-2721,0,0,c7dffe084f91bae26b936c1afd1da9c04f9b37aef98b6753f280b03d8572eb4e,2024-03-20T13:00:16.367000 -CVE-2024-27210,0,0,7255c351216f154fee3bd255ac31db9ec4edf8a09984c30e15f711e690b17b35,2024-03-12T12:40:13.500000 +CVE-2024-27210,0,1,745478bdb4403a82fac13021bc89339c878beb6d9492b165b8482fafb3cfd461,2024-08-01T13:48:18.507000 CVE-2024-27211,0,0,399120e273773b87e25b5726948b373761a08a568df039ccbe6399d0349da8ff,2024-03-12T12:40:13.500000 CVE-2024-27212,0,0,4542230b3b8db890d26ca347c87e449ef2355e140f779178cb911b4a8d90a5c2,2024-03-15T20:15:08.910000 -CVE-2024-27213,0,0,4c9bbc4d5c949f5331cc0d1572cbda1772d6b9d865e8d4983f490f9e2daa57fc,2024-03-12T12:40:13.500000 +CVE-2024-27213,0,1,38bf62e6cca45cb13c31c1b3c1f577caf25772cec3b7bdb3ce04f4d4c6e5cbdf,2024-08-01T13:48:19.280000 CVE-2024-27215,0,0,60ef065eae63cf58718fd9a5d80dfa62c007813e270493517bc98a19fcefe594,2024-02-21T18:15:52.060000 CVE-2024-27217,0,0,cb0dbfe9327fc52a02d056b77105239417a7cff860961ae434eeaf1ef6d2cb33,2024-05-07T13:39:32.710000 CVE-2024-27218,0,0,b2b126ff7fe34ab697f8634bcd6e10d8f03d8a1ff2b55462d7717768f1583a4d,2024-03-15T20:15:08.960000 @@ -247603,7 +247604,7 @@ CVE-2024-27220,0,0,6aa117866566feca4db0bf9d961972fe519fb1f249380c2ccd18e46e235df CVE-2024-27221,0,0,275da2c75e59fe51a6d2607d4b2206bfcadad2f1626d8a1a46fd3353d31e8ed1,2024-03-15T20:15:09.050000 CVE-2024-27222,0,0,ac2f042c0aa536b4d16a0890cc7c0d58676ea7c43764baf23652ed358a0a85aa,2024-03-12T12:40:13.500000 CVE-2024-27223,0,0,cf3a2ced12b4a3bf155534028aaccdd6d95cd0b4d2f10d3ca759d3a4dee62fdb,2024-03-12T12:40:13.500000 -CVE-2024-27224,0,0,f8e5288499831f2b7b48653a60eec0c5ef6733822cc49b96dd7225fd0d2e2a09,2024-03-12T12:40:13.500000 +CVE-2024-27224,0,1,a3ab635f09865455059477937ba40dabd5c75c049ca5d090f69e7a764213aabe,2024-08-01T13:48:20.053000 CVE-2024-27225,0,0,aa18bff66f03b0f275eac87bd5ea1a86e059d41f5a0861894165d74704434328,2024-03-12T12:40:13.500000 CVE-2024-27226,0,0,e1cfebc223a2a016acec348e368166f55ed8afd2c4bfd848ca4c2f61745afbc5,2024-03-15T20:15:09.110000 CVE-2024-27227,0,0,07bb188ed9b66fc7fd965d8a240bed8b19d74680ddaf7fc1bf461b043fbb3889,2024-03-15T20:15:09.153000 @@ -247683,7 +247684,7 @@ CVE-2024-27312,0,0,5679d7053fa0bd24d93903a7d36eae1bf666d1c510eebbb175d9510db4771 CVE-2024-27313,0,0,f9f7791913eb1885e62d83245c35ccba6d007456c7c99efcf6385be05af20927,2024-06-07T09:15:11.917000 CVE-2024-27314,0,0,507bfabf98c061d8de81cbc1d95b3b58842135d25b3a81edb36b7651b27ac69f,2024-07-03T01:50:30.720000 CVE-2024-27315,0,0,e2c8341ce82caf348d52a9896be5ac15e43c9c9ebf18a27eb01146f06cf9a599,2024-02-28T15:15:09.670000 -CVE-2024-27316,0,0,5d92f0145166bebabebcd34814931fc2a9dea27d8144648fed55be0aae539f47,2024-07-30T02:15:04.607000 +CVE-2024-27316,0,1,102105139fcfc876580c7206fba57ae17631b403098c79f616e87bd492a5d28f,2024-08-01T13:48:22.100000 CVE-2024-27317,0,0,c4936bf6b1ea8eb440227e5af31c10ab09a9d8539bf9187002383935723d45e1,2024-05-01T18:15:16.097000 CVE-2024-27318,0,0,bb1e039cfeff54678be2a3d7675b064a42975817bdfb0398be1540195f1fd295,2024-03-30T02:15:08.007000 CVE-2024-27319,0,0,198bfb473ae5c4a00a4bf458aba8771a9487b41224f35d4388056e6f7ba27f15,2024-03-30T02:15:08.090000 @@ -247716,16 +247717,16 @@ CVE-2024-27344,0,0,f44089be578e3c3f48649a645c31f1e56b7af812f6729ae649c4c888c51a0 CVE-2024-27345,0,0,639d5d88d955f31b68d7ac65a92996a1944759655dec4dc8cdc403f6280e1a1d,2024-04-03T17:24:18.150000 CVE-2024-27346,0,0,8179d23e6ef0789d37a1db2f177021069373bc1f8d521305cdf369e9fa46745f,2024-04-03T17:24:18.150000 CVE-2024-27347,0,0,aa6bb96be7bc41dc2b8b854a600f1bcc7744ab20513fb28f41f361c130b3e452,2024-07-03T01:50:32.683000 -CVE-2024-27348,0,0,5bcafc6f605f5ee904b30151869c0a46b0093e15652a832e99ac99c719c42b84,2024-05-01T17:15:30.443000 +CVE-2024-27348,0,1,19a1fc3823345ead5de9b178f23db90fd5b4d62aadcbb9121cf141379ff75cef,2024-08-01T13:48:22.967000 CVE-2024-27349,0,0,88b94935f18791608992594036627e2f38bf8f66250b8863a7cf3ad8bea894c1,2024-07-03T01:50:32.910000 CVE-2024-2735,0,0,f01bcec823b48d788d322e20cf82a4a7470344ba299463eb0cff5623d9be778d,2024-04-10T13:23:38.787000 CVE-2024-27350,0,0,0fb1d64ef379194a46b064cdf7260ff9ff0ea87fdbd1fcde9fffd1770088e5e3,2024-02-26T16:32:25.577000 CVE-2024-27351,0,0,5a36bd6e7f8b98dc30dfca7d22b6d4573152d80044f0f10dfc41d8abe078fc7e,2024-07-03T01:50:33.137000 CVE-2024-27353,0,0,cbcb4ed0cb0d6b5421bdc80855b33d7fe1407fb7f951e4769d290990900afec8,2024-07-03T01:50:33.967000 -CVE-2024-27354,0,0,6669ef56de2629d6bd7a6c54cb75c8f6e454c14fc2065829ff46305d945b1196,2024-03-21T02:52:19.927000 +CVE-2024-27354,0,1,d82002382bb8c882f81f7c5f3df1132e97e156b8b32d6b2112503b29eab24b21,2024-08-01T13:48:23.907000 CVE-2024-27355,0,0,cbfd71f3fb28d8933e5fd0b89a2619127b39a508cc85ac5bc00d2b3fcc2d06dd,2024-03-21T02:52:19.970000 CVE-2024-27356,0,0,749ec2d4b1e51d4aafe83652bc0802a299a54d3561d4847f2c289cb0919b6c2e,2024-02-27T14:20:06.637000 -CVE-2024-27357,0,0,a56d40dbcc06930b546fae3b6f5242db2c9be7a1d9398632446132966ded87c2,2024-07-29T14:12:08.783000 +CVE-2024-27357,0,1,6ee89ff91325c350d71ee2f1e2989c0a7f53dc5f1e7749e13c0b8f7a99e8663e,2024-08-01T13:48:24.737000 CVE-2024-27358,0,0,5e34f9802b6658af7911918b28409df8cc6ee23a8e8f5cc0b36cd181238f67f8,2024-07-29T14:12:08.783000 CVE-2024-27359,0,0,3ef57b8299026e901c7562e8bbf9bafac98cc1976d3917e5c32880417a0a2746,2024-02-26T16:32:25.577000 CVE-2024-2736,0,0,0ddab351a075258184e9da71bec86e9fd25b36338827c4a540a6ed9379b0bd6e,2024-04-10T13:23:38.787000 @@ -247747,8 +247748,8 @@ CVE-2024-2738,0,0,a7fee4844aa4ff2acb90aab32559c9a1bc272ae0ec6a90bd82a5f6f4cc4b67 CVE-2024-27380,0,0,faebc4a3baa432ef5ecb31e1bffac55af4502d0bd3a145e79e126fdf104360dd,2024-06-27T15:52:55.140000 CVE-2024-27381,0,0,ca56a1eacfe1d85ad323f094ca6ce6a781e7b45770dc3b39a1a4a3ad0c28ba97,2024-06-27T15:54:29.327000 CVE-2024-27382,0,0,5cdede5ba0c355d88eed84640c66ff7fece892ae23f7a48063c692f8bc7ac8c7,2024-06-27T15:54:47.727000 -CVE-2024-27385,0,0,a8ff5721869809d86378a35ea14de52f50181997e74bd473ef6acf6bde877c72,2024-07-11T13:06:13.187000 -CVE-2024-27386,0,0,fc4cea0bb829ddabe38318e96ec4ebb778a06573a5710fa4d1426ba9bcb2a344,2024-07-11T13:06:13.187000 +CVE-2024-27385,0,1,003e283023f566a2385aab18dff3e37100c8b762c1c6dc798e412558e0acbc12,2024-08-01T13:48:25.863000 +CVE-2024-27386,0,1,392763fc5ad1ba2fe130e662b117c81c5508cfa52b8d41cd60a9bfd68ddf8e96,2024-08-01T13:48:26.553000 CVE-2024-27388,0,0,8ca5a384d8f8d9a2091e5293e5ac316155597802cc78feac2a6594da98404e69,2024-06-27T13:15:57.940000 CVE-2024-27389,0,0,cc01c74893b07f0b811b8decf7e0d285abe38929fae54a3365d798c7016df82f,2024-05-01T19:50:25.633000 CVE-2024-2739,0,0,f67ee20b2bc2ca284467eaab4487259eaa12927229efc313e4a8f27526c7f5dd,2024-04-15T13:15:31.997000 @@ -247803,7 +247804,7 @@ CVE-2024-27434,0,0,1f6c02e41dec096e8d8a3aad3815eba137d3c6211e0c5dd9dd2a15d8e3179 CVE-2024-27435,0,0,2690a889bc459707c25ab4085b583533db620df0a7e855ff048ee9efb5a3e77a,2024-05-17T18:35:35.070000 CVE-2024-27436,0,0,363b9bf371fc9f8e0b9cdff3112ad39260586cf7dc307ac99f43118fb2dd6b78,2024-06-27T13:15:58.410000 CVE-2024-27437,0,0,6939894503badd1172485a5290ff1b290d8ac3e1f3bbcce78b587d4297c4c626,2024-06-25T21:15:58.870000 -CVE-2024-27438,0,0,e143820a78e5e6ff153651babf0e3da82ad64c1a30623cbfb4d6bd26030c0445,2024-05-01T19:15:22.450000 +CVE-2024-27438,0,1,84f83f5dae675a14c68d7e9e091a476b07ec9d8bffa6e40cc89145e2f8bf3eb5,2024-08-01T13:48:27.240000 CVE-2024-27439,0,0,812b79355c05b1839f0b5adf30fc93a3b50c4e89eeb5494b84c7e9f25e1fc617,2024-05-01T18:15:16.380000 CVE-2024-2744,0,0,188126b761d1adc13d3573db2ecaebf3ad9dc6b00f329483cd98111bb221e3a5,2024-05-17T18:36:05.263000 CVE-2024-27440,0,0,3855bdfe36ebc95be8f3c56052751e0dd20dfc157a2e866f3a72a06ab4b35137,2024-03-13T12:33:51.697000 @@ -247812,7 +247813,7 @@ CVE-2024-27444,0,0,f55d90543cbd828423321f278d6d4e155f531fbc50b1d06938893cf89507b CVE-2024-27447,0,0,c7540c858df5e25898e7875eca460e2aee16d4331ec11a7f535875caecaf33c3,2024-02-26T16:32:25.577000 CVE-2024-27448,0,0,52a4a9605cdc89d83a0f8cb7ff15b885c4717436d90825e54d7ddf3aa92ec7fa,2024-04-29T20:15:08.397000 CVE-2024-2745,0,0,53dee6289a0add6a57362bcf8e9b5c598213205289e0ffc016f07817ba95f396,2024-04-02T12:50:42.233000 -CVE-2024-27453,0,0,474153dcfc4f462a720af78de9b3bdba54d63f43b4a9a6d466433a84cc16cfc0,2024-05-06T12:44:56.377000 +CVE-2024-27453,0,1,9ef05cf790c264dc788e980768a5a6a3cb502900f86edeb2c3cbde013355ceaf,2024-08-01T13:48:27.533000 CVE-2024-27454,0,0,bfbb7d6bb77eee4d143fd962e2f8fb8b22bd433b7fa979ccf80665a746bf490a,2024-02-26T16:32:25.577000 CVE-2024-27455,0,0,2dbb614e04301891635e5f9c95d1cc988fa9573d9f9850fe52adb520b2c26e80,2024-03-26T16:15:12.263000 CVE-2024-27456,0,0,a5aadbef18503d127f08548c15d54e2d6dde05673ed5c83e51eb44e3ac539985,2024-02-26T16:32:25.577000 @@ -247822,14 +247823,14 @@ CVE-2024-27460,0,0,8683af8a542feb170a538bcba55c469e083f9924ef0c1691a92718c202474 CVE-2024-27462,0,0,2177b080bf16597b1d3af90d404590cae7bb441b9367c276a25f840d3e6c7f9f,2024-04-14T23:15:45.830000 CVE-2024-2747,0,0,5387110be360e1fd36f0342bcd8dd7e83bfa4eabd929725feec9963b35cc169c,2024-06-13T18:36:09.010000 CVE-2024-27474,0,0,3f0932161a77385f85ec7fc0004a8008398981e7f75c919376f930b5622a4131,2024-04-10T19:49:51.183000 -CVE-2024-27476,0,0,ee12db45de83cded307f831888a3645bddf15bc01083bf804116fb49347c345a,2024-04-10T19:49:51.183000 +CVE-2024-27476,0,1,7a4663f499ee23e08c2a048515f5b6745ec9423d99e38efec54dd0ceaf59a3fa,2024-08-01T13:48:28.390000 CVE-2024-27477,0,0,e0cd02f233cdafbc91249b5781d33c91da5035c970dc05ec11d6a3134871bf1b,2024-04-10T19:49:51.183000 CVE-2024-2748,0,0,a5981f926316e727f1bb9455ec311db801fabdd6fc8350d94a1fb8a2edb4a89a,2024-03-21T12:58:51.093000 CVE-2024-27488,0,0,6be2a43b71b53f166dfab0e5a48f18012ba860e052bdc0fdded0a51aae424787,2024-04-08T18:48:40.217000 -CVE-2024-27489,0,0,03d9cd4a44d9c0b47d7c6cf7254b6e3accdb10d48851c74798ef1bb4668b49f0,2024-07-22T13:00:53.287000 +CVE-2024-27489,0,1,fae6db07f37367cac095792be5d6f831e097964d9738fbc71b73f8a7056182d5,2024-08-01T13:48:29.187000 CVE-2024-2749,0,0,1d41dd2f9a8ec812d743eb2503d3459b40e5b74ef406549f3f22535f8f1ae124,2024-07-03T01:53:31.040000 CVE-2024-27497,0,0,0a259a174ab84ccb90a6c7661916522a49292b77c0e76cb95a176d9f4412b99e,2024-03-01T15:23:36.177000 -CVE-2024-27499,0,0,2d730ced2ef06c3685db15a9c1c8006eabdbd2f39a30889dd60bb7c576c1753e,2024-03-01T22:22:25.913000 +CVE-2024-27499,0,1,b83d178e9b7191162c5685f1e47e2fd1e5529f49e76aee3b7cd72833d352a7e5,2024-08-01T13:48:29.880000 CVE-2024-2750,0,0,37727f710079f44007aa4b3f740cc1e5c5b0086f375c812c16d7e3bf2db19280,2024-05-02T18:00:37.360000 CVE-2024-27507,0,0,553b05ae6ffd373dfbf2aa3222522f3386658a0a78887ec1a5a87ad22402f8cf,2024-03-23T03:15:11.443000 CVE-2024-27508,0,0,b265a2d0929e770552ce2e0e5af61c90534f4c3dc6d68203c9b14af4a39731ac,2024-02-28T14:07:00.563000 @@ -247844,20 +247845,20 @@ CVE-2024-2753,0,0,af8f0bf6c002c3e1db46c2cc4926e36d1e1afb83468ed827c9e47555532f1b CVE-2024-27536,0,0,c377b0d21fbb5c7de68c4946896ec2f8ec67ef0d39bad02515cbb41c44d1bebd,2024-04-23T22:15:07.037000 CVE-2024-27537,0,0,3cbe9bcef09fe4fba870050d9e0c130363a525b398fa9371487301911d20249d,2024-04-23T22:15:07.087000 CVE-2024-2754,0,0,b524638ab8c26ee5de4a612af59349eaa47dac80099d3c62a685c43527d6353b,2024-05-17T02:38:28.527000 -CVE-2024-27558,0,0,9466e086e9a325c65e9acc2a782a72f7d54daabf990a7f785117e09aa3ed8e4e,2024-03-01T22:22:25.913000 -CVE-2024-27559,0,0,43aa1d4993b94efe8e6133bedb9706feb7336c4804fae54a97b535b950309f04,2024-03-01T22:22:25.913000 +CVE-2024-27558,0,1,cdc5c9bbabb0962055f32c44c3cf1724a18fd3deb45d5a1d5f5e1c6893a2d72c,2024-08-01T13:48:30.653000 +CVE-2024-27559,0,1,e51cb2ad7f7a927a7b9eacf57e9dc02b64201a90b8501b228aa2354a3e2c9bb6,2024-08-01T13:48:31.443000 CVE-2024-2756,0,0,75b6f6197ae09c8882d105c3231ed4371ca476e77e86b0b7a32537424ab828b1,2024-06-10T18:15:30.570000 CVE-2024-27561,0,0,3ca7922e506f2e58b3ab77ea2274792019f8619a9ef563f326589a5993420327,2024-03-05T18:50:18.333000 CVE-2024-27563,0,0,37d316ca473ce8ee235a7a00bc2f1934f40d1081b4a3297e3b4967e39c14854c,2024-03-05T18:50:18.333000 CVE-2024-27564,0,0,5d09b300c57dac7e43356f466af4ab8e7319496cb061b9a3a4a4f4667284eb1c,2024-03-05T18:50:18.333000 CVE-2024-27565,0,0,0edf7f66daaa9b67c047bf93423dd3ee9ca4c410e75873bf1ca657086f339835,2024-03-05T18:50:18.333000 -CVE-2024-27567,0,0,97abd11374c758ffd79f3ee55ad28a29c653e53e7668c95c4538d5ad4b99a9ac,2024-03-01T15:23:36.177000 +CVE-2024-27567,0,1,ba0253b2315b31126919c66203669f237b0b455b097f59970da966ab9d67e865,2024-08-01T13:48:32.200000 CVE-2024-27568,0,0,30a69742845b1488044d187ab76af1144dc7e9904fcf2c872ae36954db40b8a0,2024-03-01T15:23:36.177000 CVE-2024-27569,0,0,cb3b3e668821f421220bddc0f7c6c1e4ec026eeee741b1c1e7670d2f8f11ad64,2024-03-01T15:23:36.177000 CVE-2024-2757,0,0,4c422aba4be6a9a5da2652e2a836599ffe438bdae4eb45bb7067f46f34ffd36e,2024-07-03T01:53:32.100000 CVE-2024-27570,0,0,8d5d62ec43c878f6bf09a9b5316375d908c11d0b5ec079a9674eb8a4339f1ea2,2024-03-01T15:23:36.177000 CVE-2024-27571,0,0,ff0b0bcf3cf1fe0befdff4abfbb2b521b733f994207f9d68707861baf05a3a26,2024-03-01T15:23:36.177000 -CVE-2024-27572,0,0,c7d6f5f06b98342fccef45d4c35daa9668ca458eea9bb8edcd9f06a718297101,2024-03-01T15:23:36.177000 +CVE-2024-27572,0,1,021a88f3c1ae2bf66877708ae71a24ab68a5a10fe16311950a18df580d61c782,2024-08-01T13:48:32.977000 CVE-2024-27574,0,0,3445d7e232fea473b297543f2639b454fd942ac9a4758abe8e2e7d31ea60e498,2024-07-03T01:50:42.303000 CVE-2024-27575,0,0,be8794a9d53d194bc575e7dee32b34180e95b0c9ca647d9bec212ab94e155297,2024-07-03T01:50:43.093000 CVE-2024-2758,0,0,ec71169b8e8ae96bf24d772237af9a9c33e20fd447b06805225d467e622ae7a6,2024-05-01T18:15:19.300000 @@ -247874,29 +247875,29 @@ CVE-2024-27612,0,0,f8c2cd7915293a4c2c09133339b060a4c43cfa10a215c68dc3d525db0ac4d CVE-2024-27613,0,0,e8ddbf6e46995016b86fec11e3a571d06151af83dbfa811d22e9f83bc983a650,2024-03-08T14:02:57.420000 CVE-2024-27619,0,0,42484f890db7f33dc40a053763330bf5edf41786d58e1255275e8329879440a4,2024-04-01T01:12:59.077000 CVE-2024-2762,0,0,99337d978a85b8c23bac30a66dfb740d33cb7f450f707199e5441f5723a8b146,2024-07-22T18:31:03.357000 -CVE-2024-27620,0,0,264b377ed141838b2f7827499a12a45cb5022f86ae6c7ada9476b5347a72b083,2024-04-08T18:48:40.217000 +CVE-2024-27620,0,1,a6cd517087288a476282a828ad06f1425f605eb49a5acbc3c4b9fdfa51cf4c1e,2024-08-01T13:48:33.830000 CVE-2024-27622,0,0,02e027b33e7d5fbbd02ac8ad33d0e6cd6ee335cc72a5cf021b6ecb3a62a8a71d,2024-06-21T22:15:10.647000 CVE-2024-27623,0,0,531529181ab36e3c4537b761d6a9d059b3a8ce769cd0b24a0d3d5253fb64aa85,2024-03-05T14:27:46.090000 CVE-2024-27625,0,0,5a80a79b2cfd5c4ff9f33f1df3098e8fbb1574b439d0275831cc7fabd6a9afa8,2024-03-05T14:27:46.090000 CVE-2024-27626,0,0,d42f7bf679e2faa3033241a817d42e52ff1257b4189b2a9fca5edfcf9dbec463,2024-03-21T12:58:51.093000 CVE-2024-27627,0,0,0df08159bde9d85b354f09b5f06fc09de2b669aa995d266b7f0cdd286affea1e,2024-03-05T14:27:46.090000 CVE-2024-27628,0,0,4ce05c55412fc4c447421f46fe72c28be9e75420f28dfb2af66d8c4d8126c7d2,2024-07-11T15:05:31.010000 -CVE-2024-27629,0,0,2c51e5cbb6b2fd63f16d57c9e8c157423f6e13b1cbb9ef7712517b8bec763776,2024-07-01T12:37:24.220000 +CVE-2024-27629,0,1,ca701c59a502c4787b60da8baa107f0262ef924b3c876e947b7b71c4687e448d,2024-08-01T13:48:34.650000 CVE-2024-2763,0,0,fa0860401e6fc5d5f4cf46ca75d9efd537ac3aaa7b5e2d61b6a29dcaeeced91c,2024-05-17T02:38:28.787000 CVE-2024-27630,0,0,922e67177bd40806e5613f050e0a532e4697f10103ea8efaedd721746ed3021a,2024-04-11T06:15:06.270000 CVE-2024-27631,0,0,0f8d82617ea0ef47c0189b84bb322ae748cad4086019c00bd045700a1d3c6ae1,2024-04-11T06:15:06.560000 CVE-2024-27632,0,0,bcd3e6ba3203da1a38d6b9f63d37487ba914651b83233ea52024874f091bf44f,2024-04-11T06:15:06.860000 CVE-2024-2764,0,0,31aa1e4cc55fa8edb093bc5aa135070b01e8111153eb7b17aab12d3117a8f555,2024-05-17T02:38:28.880000 CVE-2024-2765,0,0,fdf9b012a44b1c7f6607dd1b547bd408571aa1e43b10c68fb7aad7dc812bebe9,2024-05-02T18:00:37.360000 -CVE-2024-27655,0,0,6385d1e02540baf16f105fed0f2b583fe92f8a751625c4a71e90f5a446b3d13b,2024-03-01T14:04:26.010000 -CVE-2024-27656,0,0,9827662a8e372306890382aa2824c62ba8f822efce50ae42f068da585afb61f6,2024-03-01T14:04:26.010000 -CVE-2024-27657,0,0,09a06b378a5ae068401f4b4a80ce9149ee11a8697c87d89881a32248f07cebaf,2024-03-01T14:04:26.010000 -CVE-2024-27658,0,0,5a73d3465f5892a6d8c806eb2938463b30479c553466995d264959b8fc06c64b,2024-03-01T14:04:26.010000 -CVE-2024-27659,0,0,f8a84ea7a3898981c3958bbd95d1d58071ed7df2dca588030a804dae6c6c3698,2024-03-01T14:04:26.010000 +CVE-2024-27655,0,1,646f2abf6043a3e04ac81ad74ff64cd59852dd0c8d88960eef7fc010664ef3d0,2024-08-01T13:48:35.833000 +CVE-2024-27656,0,1,f993682129e35ab1b830c46954d816e228aa6d96e3f8e61f95153f2014a6224d,2024-08-01T13:48:36.973000 +CVE-2024-27657,0,1,c93518e5fadfb692cf239c2ec881ce2aa80c2511fe71253e40bea9b91e9160ec,2024-08-01T13:48:37.967000 +CVE-2024-27658,0,1,cdc8e9c95154cc4fc0dcf6a9a7df8a53baec4be63022910ff41f25eaa3b8415f,2024-08-01T13:48:39.527000 +CVE-2024-27659,0,1,810f3884b775387203cc0c9737fd79f1361cb54260d5e8de11926fbd96deb3be,2024-08-01T13:48:41.040000 CVE-2024-2766,0,0,253c4f77670ea19457bb6185c7ad780025655396a0a5c96473966f895f0c1d25,2024-05-17T02:38:29.013000 CVE-2024-27660,0,0,d10d6f061db1d32eab4aad8eb7eff2c14c3d23b1ccf874ce66515c4322bbbecc,2024-03-01T14:04:26.010000 -CVE-2024-27661,0,0,4a6b2243473cd7c6b87885151dfe98d955f5cb8673ce608fceaa1591a977b172,2024-03-01T14:04:26.010000 -CVE-2024-27662,0,0,b944ae1180af64a6a8a99b8dddbe69a135c20b8a09392907ed6142f172c06a31,2024-03-01T14:04:26.010000 +CVE-2024-27661,0,1,efdbc6c1307466ad822d3b6962d605bc34c8c655681907c675361306c3c1c0a9,2024-08-01T13:48:42.050000 +CVE-2024-27662,0,1,a0d8951b4be123b6e3bc3d7016e30d0b2183cd1001f7eab5c504e3ce0a30b527,2024-08-01T13:48:43.087000 CVE-2024-27665,0,0,3c0376bef74ec104ae9e576bf0056bbfe44e5fa1dfca5250d88c2d80053eda93,2024-04-10T13:23:38.787000 CVE-2024-27668,0,0,83812e5b7351af56910d0d9500cb35178dc5f04a739d638612a766a6dad32723,2024-03-04T15:35:25.673000 CVE-2024-2767,0,0,0bf7785127743211b004b316b19cc2da72c8338b0475b0f75d892aa6611c2d01,2024-05-17T02:38:29.110000 @@ -247909,7 +247910,7 @@ CVE-2024-27684,0,0,7ad8756d24f2571ad9256e43ef045290d6acdd43e24c12c1e3cfdd0dce330 CVE-2024-27689,0,0,11845b441e345ffe2a02d29a5898e538521f40614419a365535fc9204302e936,2024-03-01T22:22:25.913000 CVE-2024-2769,0,0,4ce409110b7519da5af6e8ebe0cc3e53d83319a867f728e76ce04b1f4c62c385,2024-05-17T02:38:29.300000 CVE-2024-27692,0,0,482b2ba8b1ff0d0cb0360c392cb51ab93e1109f90456f6b1fac8e0ba94bfdc36,2024-03-01T17:15:07.617000 -CVE-2024-27694,0,0,c4d4566bb69a8bc10c39f3c2f7e25450cead7bed5704c7ea14bb12d93e808ec9,2024-03-05T13:41:01.900000 +CVE-2024-27694,0,1,ae7bf3b211028d282f997fe080b53d7dbd8277270cbb44dbcd90c920ce9d7df4,2024-08-01T13:48:43.923000 CVE-2024-27698,0,0,d2be8f7c8e71227d00832ec4e65de145e12c9d05abf2103ca0b08b325e7399ca,2024-03-09T23:15:49.403000 CVE-2024-2770,0,0,d26bc8bd1d4451d2ee541c7f447cc9cd2d848db62017303dfc34d573c4443d94,2024-05-17T02:38:29.393000 CVE-2024-27703,0,0,3a3573ff5860638356c3adca622c2c9c4efa92e7fefb084eae2ad570942a8faf,2024-03-14T12:52:16.723000 @@ -247932,7 +247933,7 @@ CVE-2024-2773,0,0,33c85832b0bc105a89445abc4897cecb571d3be80bbcd7cdf96b1db070b9a7 CVE-2024-27733,0,0,f76bf300f1cfa0de74d17f1145877f7fe4a3d69ea3dede66e09a54e795dd7256,2024-03-08T14:02:57.420000 CVE-2024-27734,0,0,bf6aeaba46a01a9b67c56dd711450d0582ae90b1d0bd0418b821f57fcd663b2a,2024-03-01T22:22:25.913000 CVE-2024-2774,0,0,e66d8123d132aac12382a6e2ac593a72a85e469f411c6020b7cc9170c2075820,2024-05-17T02:38:29.590000 -CVE-2024-27743,0,0,8acae91db51ba5d89caf764d07444e3b6f98a2d5443f01c9efceecb9017d3d63,2024-03-13T07:15:36.253000 +CVE-2024-27743,0,1,b2fe2e7ce3a309e376bbb21a5e8eb0f8c98c444e26e52cd761c800a121c2af4d,2024-08-01T13:48:44.883000 CVE-2024-27744,0,0,4e757ce0fe3647ea6f05f08011979a37be799ec10e3981611cdfea238e8d5ca8,2024-03-13T07:15:36.410000 CVE-2024-27746,0,0,25c5d1637666144aa24b9e78e08712d087d46315d29be0eb97ff37efb1a8968b,2024-03-13T07:15:36.470000 CVE-2024-27747,0,0,43ca1ef187762467880e06e47b6be069096be41453e51c48b4193416f6039e25,2024-03-13T07:15:36.523000 @@ -247940,7 +247941,7 @@ CVE-2024-2775,0,0,46caf5afd9e0a541c7aee346d23d915891b1af22a996efec3edfa49253e458 CVE-2024-27752,0,0,b5e0902297e1d9d8f0b79a5fa02c330bc4447f06ee56b81e4776b650e157a62a,2024-07-03T01:50:45.653000 CVE-2024-27756,0,0,cc4191d9388e7bc40c53a294b2506d6a4c6b049cf230486da6f6167cda8674af,2024-03-26T18:15:10.693000 CVE-2024-27757,0,0,cd3b5b6b7fe57179d531119e33f0f74486d4fc8f97f5ac96ca27aa14ec09cd7e,2024-03-18T12:38:25.490000 -CVE-2024-27758,0,0,ec8f3cb01bd9df999481fac8db1e1c1ffe4a29c9f81b886399e364a2fe483f88,2024-03-12T17:46:17.273000 +CVE-2024-27758,0,1,ba2c7d76bfd93e40eb7f7d926c194a5a790033558362c55118c9cf0ef65f7b50,2024-08-01T13:48:45.070000 CVE-2024-2776,0,0,62c920cc6123160df22ca75c69a8df7e03cd4eccbdac81567ba3cd3f226ecbcc,2024-05-17T02:38:29.783000 CVE-2024-27764,0,0,dcb5f4d1c0bf36ea54d48a35b1fb25d36699fcee8f1dae6b9d2e2eb62b497b1c,2024-03-06T15:18:08.093000 CVE-2024-27765,0,0,c1021bc743132e7d195dccaa0bc629b0f9f060b7a3eda2d9633ef14c430a5d52,2024-03-06T15:18:08.093000 @@ -247968,12 +247969,12 @@ CVE-2024-27792,0,0,5345289bd8f4293904ad0762af292089a06622d6b9d4e901e6eb8d83abe37 CVE-2024-27793,0,0,1b6a23c11a935c27256b2d5a9880463f95ce349dd6e5eaa7f6bfd705591d7421,2024-07-03T01:50:49.173000 CVE-2024-27794,0,0,b75d2039b6158a4929ffa606a51b07ea3ce814d9da4d930322d189103f2032cd,2024-07-03T01:50:49.393000 CVE-2024-27796,0,0,4b7279c3feb336e34123ba67ded6045e38a903dedab1f07b2afe52f0d873a234,2024-07-03T01:50:50.207000 -CVE-2024-27798,0,0,7f1e1cf0017ba94564285a0bac210ed24a802980d662643ed998019b752d058f,2024-06-11T08:15:48.807000 +CVE-2024-27798,0,1,82fb7799e96354c0f89159fa55ea2c14e42659da5f82d211634e1e90a7c00835,2024-08-01T13:48:46.017000 CVE-2024-27799,0,0,884ab3b726e34f80c319ede5bd0049a4beba35406e34d8151ad3d9e6a79e3ee6,2024-07-02T13:38:10.830000 CVE-2024-2780,0,0,1a6d8a338dfb8277ea8b5f177cbdd3affd40577bdcba318f65b5c41d0bbf13b4,2024-05-17T02:38:30.160000 CVE-2024-27800,0,0,1195d6c6d3bb4b4cbf9c635f7205b297262d647bbfd1f49970d42c77f812d37b,2024-07-03T01:50:51.033000 CVE-2024-27801,0,0,4f37242e62570444393eedc0e6b0ad8e8ff66a897bd149ce4d1292d83e4fe3ae,2024-07-02T13:36:50.500000 -CVE-2024-27802,0,0,5fa4df8e0fa4e055c45d206bab7fd01f5c4103a30fc3e7d9373406c7aa7c6468,2024-07-02T13:37:19.690000 +CVE-2024-27802,0,1,ed100f18255d7067662dd2d22f07877907e1058db8c94d93d43fd969f4b3e7ae,2024-08-01T13:48:46.507000 CVE-2024-27803,0,0,d8c6c7c35a66fefd164ec7252ba7f65231664b1bd53cefc22f8eab515bc840d4,2024-06-10T18:15:28.727000 CVE-2024-27804,0,0,abde6dc8c8f670f07918eb410baa94c1d5273e42dc5ecc2fec7eeda3af76c2fa,2024-07-30T01:15:12.720000 CVE-2024-27805,0,0,80bf48e5a18746668d82dbc585fcdc5e0dc3f16985a0a47b63c1fdbef2db8980,2024-07-02T13:29:10.397000 @@ -247994,12 +247995,12 @@ CVE-2024-27818,0,0,195e34841c67a6c51f404c6aafece2a89e87db6332c4d32e1ca778a22a5fa CVE-2024-27819,0,0,b01d18af8106a4eb630a10d613bb8fd3a0b60e4d3d78300e68d51ac0725c6ff4,2024-07-03T01:50:58.300000 CVE-2024-2782,0,0,680a3c329ce925b550d110698489929aa37484a831dec13218a370944105b94e,2024-05-20T13:00:34.807000 CVE-2024-27820,0,0,a1605198dcbf5219cf280b9649bff24b5d5f9453251b177f1725c884a033aed8,2024-07-03T01:50:58.540000 -CVE-2024-27821,0,0,997425452e8be4677f15c9b9aaa18f17147699f7e8dfe8b663210b670dcd8496,2024-06-10T18:15:29.097000 +CVE-2024-27821,0,1,859f99fab905ef1166138895d787ba4493c361245367a651e31b7d6ae013da4b,2024-08-01T13:48:48.400000 CVE-2024-27822,0,0,00b8edec8aa3387668b84ecf0596531970e488898abd3e050f82e3809ca5cb58,2024-07-03T01:50:59.383000 CVE-2024-27823,0,0,b4053bdc53525d84d5eade3ee0bc46355e0ec18abfdd66215c33ff62f83d74d8,2024-07-30T13:32:45.943000 -CVE-2024-27824,0,0,79e08efd7f96e8899d7d8541d6c0e1e0a4f8d446eaa36c3c2ce9d69863460387,2024-06-11T08:15:49.830000 +CVE-2024-27824,0,1,cfe0a7920280ea0d9d140a2d290380bd855b41db7ee5997d8431d6aeecb6b082,2024-08-01T13:48:49.263000 CVE-2024-27825,0,0,56d745c63f5923700ccb89bf72b89b53d35743fee3115939c5b740b7e01f6df0,2024-07-03T01:51:00.263000 -CVE-2024-27826,0,0,994a567a862c17acb2ca85f113b0506b55bebdc2878cff014592afa2ed3d5e8b,2024-07-30T13:32:45.943000 +CVE-2024-27826,0,1,468573d9f6d4f3e64c896464447e70aea3125e0a6b505b53e9da444d184f5392,2024-08-01T13:48:49.460000 CVE-2024-27827,0,0,cddbc1abcd04a5361aa0d1e9cd6f7e77fbe95d6c2f77829fa9afe90c486dfc2e,2024-07-03T01:51:01.090000 CVE-2024-27828,0,0,ce24f26049ae95ba26226eb49c194da6cf3360ec68cebf954b176dbdf142d332,2024-07-03T01:51:01.887000 CVE-2024-27829,0,0,29662b914240e4af6a8df4845b3cfc144c064fdea834172457246a33af580145,2024-07-03T01:51:02.723000 @@ -248017,9 +248018,9 @@ CVE-2024-27839,0,0,44768a9799f53b709a38debcdb6746609f44a937015b938a83ae2260c9d6a CVE-2024-2784,0,0,ac18ac10d4d26cbc8cc67c7d846cc7c2e5e5aeca34baa26ce3c69d9886b607fc,2024-05-24T13:03:11.993000 CVE-2024-27840,0,0,c861029ec7979509d3bf8ebb217fb6334f481422c29598e90c453a01f61edeca,2024-07-03T16:27:03.590000 CVE-2024-27841,0,0,c196712b25e7bd8d66323b49a59c084563ec41f23c04da910219b17a17279957,2024-07-03T01:51:10.377000 -CVE-2024-27842,0,0,e19d71a6498743e3269c4156419c8f2f40b60e9ca758fceeefcac60ce7861321,2024-06-10T18:15:29.733000 -CVE-2024-27843,0,0,8ed67dff64e59eafdfe2ae5eea29c3b38c55de205f768a8d0bdbb2949d74ede2,2024-06-11T08:15:50.327000 -CVE-2024-27844,0,0,8f79265f9eb5de27f6c5900ae4d24fa5b6507aa616f44161839128850d49965d,2024-07-03T16:25:29.453000 +CVE-2024-27842,0,1,5fca962b5cbb27a89b4b2c543594552a2015bb444ebd482ec71a122fcca30d56,2024-08-01T13:48:50.723000 +CVE-2024-27843,0,1,7180759563c6839f8bf33225f0280433143a9cc73705081394d36161f3ece137,2024-08-01T13:48:51.490000 +CVE-2024-27844,0,1,f47c820a9af800de343432c38bc9e2d59f37cb68e7684b8e09f702eb76aca737,2024-08-01T13:48:51.670000 CVE-2024-27845,0,0,0d564bfe9e561fcf31182cd0bbc6cacf5e39792be0769beb62d2dc37b802ea42,2024-07-03T16:24:57.930000 CVE-2024-27847,0,0,be6eb9a0d20bc008efd3235440ec5fe6670ad0bd2a6cedf0bc5d5f0b0c4962ca,2024-07-03T01:51:11.167000 CVE-2024-27848,0,0,ee1f57d57993dc2355133c7db4fe16e1b04f171eb2d17aa6e9b6d31c1607026c,2024-07-03T16:16:03.303000 @@ -248028,7 +248029,7 @@ CVE-2024-27850,0,0,f6e043cb321f3091936e7d5f2f1f5aed96502ad82fd54bc04d66b8f060434 CVE-2024-27851,0,0,c183a7efee06e381e2c9ea0fe349e0a169f6a96a6b8ec9dee046a92195e2d536,2024-07-03T16:13:40.273000 CVE-2024-27852,0,0,9c516bed02a09c2aff2aa4b9ea5d528517ae4b8f02f5b13e3e44ea400df8e7a3,2024-06-10T18:15:29.900000 CVE-2024-27853,0,0,2a7624ac2266291d0ad0319ccf695a254531196f8fc67f2908fb8abb19943e31,2024-07-30T13:32:45.943000 -CVE-2024-27855,0,0,88e90c75a89e49c8f0ad6b77cda4945339f0165265fec6e1ae2d913c345f3617,2024-07-03T16:12:55.173000 +CVE-2024-27855,0,1,e4901bc850a7c0f79eade81e1de0a193a7e166d4d71678ff74681ab03b5418a8,2024-08-01T13:48:51.967000 CVE-2024-27857,0,0,b12d57be271aa438e5d4c668c7f18ead13afc3b08569565d9c95a215938e9ba2,2024-07-03T15:43:17.007000 CVE-2024-2786,0,0,8ed89c394db0a4298af6ad355228ba4ef878fdf7e45e835968fbe7eb06ba76d1,2024-04-10T13:23:38.787000 CVE-2024-27862,0,0,65de0bd4583a780fde2b43bb0da73622fb7e9dde06f6dbdc80e0364865c42130,2024-07-30T13:32:45.943000 @@ -248039,16 +248040,16 @@ CVE-2024-27871,0,0,7a86e6b521c78ad99968f28f6f8060412b7e709e712f67d1a9e06e8b99d3f CVE-2024-27872,0,0,09c56e750089a122cfb177aaf60822069d7a4f9c0591359cf8749670cb8f35be,2024-07-30T13:32:45.943000 CVE-2024-27873,0,0,4057acc17b38a4ddb5fcb38b99caf2c5bf2b86aa42bf806a7c08d70d6be8f0ef,2024-07-30T13:32:45.943000 CVE-2024-27877,0,0,02242375c4b1895b3146af321231e5e3fb07f772b0e2961956f35c10bc9d9e51,2024-07-30T13:32:45.943000 -CVE-2024-27878,0,0,8190ad8e67d395c9e28163a31684af7a8d7f1c04427ebd90ac4d84432049bd1d,2024-07-30T13:32:45.943000 +CVE-2024-27878,0,1,9d41f2e6a098f66fa0fd5f33889325bc9c544c2ef8b27ebe9b165d634c5b23d4,2024-08-01T13:48:52.587000 CVE-2024-2788,0,0,fae17eccf9cd9e59e0540a9ad532e11d3f58404c6459f605cc04b4c55f908408,2024-04-10T13:23:38.787000 CVE-2024-27881,0,0,018c592d91f7b2f0ab150727b2e46413d97077c5e890c95b1da27f53d65f92b8,2024-07-30T13:32:45.943000 CVE-2024-27882,0,0,5f6b8c776d129a743847181e673fbc08fa4525f477938bb4131e477f4d230687,2024-07-30T13:32:45.943000 CVE-2024-27883,0,0,a0ddd934b377fc709fb4c9c5999258197501ae8a4c900c5f15b38ef425986e01,2024-07-30T13:32:45.943000 CVE-2024-27884,0,0,c8b7a89e085d35ad0c448e616c336654f520047f390f2d4a8df19df20362a2a2,2024-07-30T13:32:45.943000 CVE-2024-27885,0,0,e3765a253be02afcb43d4bff90a02eb9cc8683032aa7319a1325bda028b43ed5,2024-07-03T15:44:29.397000 -CVE-2024-27886,0,0,99d42e2e6744459baaca588c5115c7fe68a6ce8932cc2128987dee4609d2b52e,2024-07-30T13:32:45.943000 +CVE-2024-27886,0,1,ad31e0740b43310393e342341268d0e92dd59ebc6085cf85f528e58105ea7b83,2024-08-01T13:48:53.140000 CVE-2024-27887,0,0,49944cff28c5dbe42d71ef94df37f3539fad67d7078d6ee4e66ee7c88b5fa544,2024-07-30T13:32:45.943000 -CVE-2024-27888,0,0,de7cdd62a8ccbe12d53c3509db4f9af2eb353d80000275ec512c972d9a22e392,2024-07-30T13:32:45.943000 +CVE-2024-27888,0,1,d03f8a9313606c0d2620cd7f82f60b5166304a45344c6f96cd60a7020c51b7f8,2024-08-01T13:48:54.013000 CVE-2024-27889,0,0,7117aad45d32aeaef1ee1fabf03a8eb1a99ce1846aae926fc9cdd323c7a5b8ea,2024-03-05T13:41:01.900000 CVE-2024-2789,0,0,34742259502804c5b95d3d9e3233d720754fd74f45f9568c62dc8f4e6bc9ffb3,2024-04-10T13:23:38.787000 CVE-2024-27894,0,0,a037a624d2f95391d5ae19191b0926bbf6c393d1d253b2842dc172d91ee0ac42,2024-05-01T17:15:30.557000 @@ -248062,7 +248063,7 @@ CVE-2024-27900,0,0,43289950d0e6981ed8d43d7e3ee8bfbab5814f24d4206124d8ed280e39060 CVE-2024-27901,0,0,7b06fae9467006c18ceee57d1cb054462f92404e00919c92c5179777cfbbb010,2024-04-09T12:48:04.090000 CVE-2024-27902,0,0,cf303beda4f8d4d9a07f999c75e97958c265bcde9b8d48f8f915bd30d541f272,2024-03-12T12:40:13.500000 CVE-2024-27903,0,0,7a16b56caf0aadbdfc143727319a91c26c6417220b554521d1e591b4babb7dec,2024-07-11T14:46:26.300000 -CVE-2024-27905,0,0,004207f94be0d80b2638fe4e9db3dad65e602a5212d2e74a69049b205b4fa9ba,2024-07-25T16:15:04.310000 +CVE-2024-27905,0,1,870afc2ec3f034fe93c9643257569debec4d31dce0bbab01368ae1f24a704a7b,2024-08-01T13:48:54.847000 CVE-2024-27906,0,0,97db0744843f13fb0cf1d6631e7648c6ea2ed51ac2b3c967607a8165c8586d2c,2024-02-29T13:49:29.390000 CVE-2024-27907,0,0,665becf063e38021c77d8567eafb4cfde9012aa9e5f2ff52b45354cada16677a,2024-03-12T12:40:13.500000 CVE-2024-27908,0,0,3241ca39ccff4fff26d10715dd0c806c47f3e26d7e3304c90e96bb32bb0598ea,2024-04-08T18:49:25.863000 @@ -248166,8 +248167,8 @@ CVE-2024-28003,0,0,bcd81510a407f30bd1be1a23c4e2407dda3d4099189594d6f9ca0831debc8 CVE-2024-28004,0,0,a05115199d8f1ff7b0064f6aa8e3f439afd7fffc2c1bc779bc5504e56ac925c5,2024-03-28T12:42:56.150000 CVE-2024-28005,0,0,0bfaa1d1868623f7255331796f075ddf4eaca463b36f0b6bb2b30a4fce4d16b0,2024-04-02T06:15:14.340000 CVE-2024-28006,0,0,feb66becdd1cda32475b872bfc84fcf2e69ba88059d153a169d70d1b0e30dc42,2024-04-02T06:15:14.603000 -CVE-2024-28007,0,0,638cd983afd97f0c568b1b29f5ba7ef9bf686432789dc6bd7ac059842381d0ac,2024-04-02T06:15:14.830000 -CVE-2024-28008,0,0,52b3d8ee1d6296518d4a4a32eb78cf601f7495cc5957a264c312706318c6385b,2024-04-02T06:15:14.930000 +CVE-2024-28007,0,1,ea26a7c241503324ca909200fc76f2274482f1b7552307ee15debbce41041864,2024-08-01T13:48:55.777000 +CVE-2024-28008,0,1,3117087a679a7cf602dde24031e3fd920e6ec713ef66be34d309a7e5aa4134c2,2024-08-01T13:48:56.020000 CVE-2024-28009,0,0,4d7f208e747bab122cb8dbbf72833e86f35f2d21518b60b4299b4371e996b3e6,2024-04-02T06:15:15.013000 CVE-2024-2801,0,0,2d5a22e62bac6729bf195a0f5a42785f93ed95340bd92529d8be5dbcf9a36707,2024-04-12T12:43:46.210000 CVE-2024-28010,0,0,99860cf8bf9189a8fb49a5935a3491edc3fdb8468d4665570b920e86cd7975a4,2024-07-03T01:51:25.390000 @@ -248175,7 +248176,7 @@ CVE-2024-28011,0,0,547b5587c18c244599b906a72484407dbdd5f94fe2a54abeb6db7e0958264 CVE-2024-28012,0,0,fff5a3c5a6489f7f857ce0cb277226928d06e1627967b638ca6a50c2c34a1311,2024-04-02T06:15:15.263000 CVE-2024-28013,0,0,d34d9ab6738c9b6fbbe9252c1e4b38b1c7a0cbc80114ae3f60d1ead782bdf97b,2024-04-02T06:15:15.350000 CVE-2024-28014,0,0,baa237796e504a857089db5ec5b80237d79b2645a24add79eb9cfcbdb3266588,2024-04-02T06:15:15.450000 -CVE-2024-28015,0,0,a6078fb3226d6536e2e23c848929720dea23d7c46b6952470aeb55824a48835c,2024-04-02T06:15:15.527000 +CVE-2024-28015,0,1,ddab8347a9d5b773cb065bee42a10bfd446d895d29f2da6b469440cd52b2e1f0,2024-08-01T13:48:56.427000 CVE-2024-28016,0,0,a98b26e25e4286269fedcc6031733336ad844bd31295954b2cf043a68c799c14,2024-04-02T06:15:15.603000 CVE-2024-2802,0,0,4d7e48fbf79d86b86a336401cd7856f9a2e312e8845717a11d0136644698f700,2024-03-26T15:15:49.677000 CVE-2024-28020,0,0,2375ef98ce8769f1ee6408c6bebcbef990543e738c9849476b7b59656001a147,2024-06-13T18:36:09.013000 @@ -248187,10 +248188,10 @@ CVE-2024-28029,0,0,b95079061ab17fc2818c1925165793c8c13dcc14c8729d51ad302026ac5a1 CVE-2024-2803,0,0,22f2c86ca1c88d78ce00e8d709ea3d268b625d199c05ddcd35d56c7f9860f31d,2024-04-04T12:48:41.700000 CVE-2024-28033,0,0,9097d79379d06337e45747c46f163653696086a3353120c004a13b2aeb6785fb,2024-03-26T12:55:05.010000 CVE-2024-28034,0,0,f4614ae45bd185f6f65bebe331399da15d1a4fc16408dbf0e6a848ca8320cdcb,2024-04-11T01:25:08.517000 -CVE-2024-28039,0,0,64abc22fd3e564beec35ef6a1c01439a61cc9f0687419fcee84526f24f98e207,2024-03-18T12:38:25.490000 +CVE-2024-28039,0,1,3a8376c4c37b22221c3249737981025e902f9cb4913edf8d0bc477677335599e,2024-08-01T13:48:56.840000 CVE-2024-2804,0,0,f94784ce7208522cdb239257db0640b294e390aa5a8ad545b6674bfcf666c26b,2024-04-10T13:23:38.787000 CVE-2024-28040,0,0,21719c3860720b51f714db5e12d335d65a6dfdafe50ecd38637f05a181e13a6d,2024-03-22T12:45:36.130000 -CVE-2024-28041,0,0,7e4d381bb0e5e17d78b62dabb8653e24e31e4e750d268d7774ae38734e3e17b7,2024-03-25T13:47:14.087000 +CVE-2024-28041,0,1,18255e199ce670a7712fae5673bd6b09e216249f0e4f16012bf510423bd30828,2024-08-01T13:48:57.640000 CVE-2024-28042,0,0,8a87c2ac326664af306e94c9d9a299b48667520a30ec346a22ae7c14d78a6d1a,2024-05-28T17:15:10.043000 CVE-2024-28045,0,0,bde3e039013a70b21c912b8e223d5131c889e7d6afc8ba834f2bbb61111aea50,2024-03-22T12:45:36.130000 CVE-2024-28048,0,0,fe53ff6e7af7660686f2bb66124ce9d1cea06b3a7d9f1481d12706c054a7fbbb,2024-03-26T12:55:05.010000 @@ -248202,7 +248203,7 @@ CVE-2024-2806,0,0,d5f508ca75cb9f6fa1405297772fa31ca59b69e9c9f039686470ebea3a3dfe CVE-2024-28060,0,0,749ab409791184ab9b217e9bb8a98b7497dfd8e9ca8e8b87425c211be02834c2,2024-05-29T13:02:09.280000 CVE-2024-28061,0,0,69ae8c16e1b63fd4290855dfe7823169455b79a10f705efce789e14ccfaa8c1b,2024-05-29T13:02:09.280000 CVE-2024-28063,0,0,8b4daa0dfe18458d1d4f0e0079b8409dd79607264a48fce0d64909485ac7a6e2,2024-07-03T01:51:26.370000 -CVE-2024-28064,0,0,48bb01960e0e2eb8cac202d462960e1c91fa8cd78766c3ea895e8c3017473167,2024-05-20T13:00:04.957000 +CVE-2024-28064,0,1,f454583b636a828554dbb6ac6e6f380d26d3ae9df36559678c0289b609fca957,2024-08-01T13:48:58.547000 CVE-2024-28065,0,0,e0f1de1046eacd4012e9d6249d2050e67e395f04094ef510445210074f331722,2024-04-08T18:49:25.863000 CVE-2024-28066,0,0,85b2ab7ba2d9e65bbfe9842581e7e71a43b5d7c51a5dfddd95c5c977ea9d5e9b,2024-04-08T18:48:40.217000 CVE-2024-28067,0,0,87f8f4904932894fbb80fce767ebf619e7e55e28806f6fe43c6dfd5af113cbe6,2024-07-12T14:57:36.897000 @@ -248270,7 +248271,7 @@ CVE-2024-28135,0,0,44950279f211878d18546cb72594ccf842e97d1de202cc0d76746d0c86df9 CVE-2024-28136,0,0,25c47c38449fd42d815c46f0c50334de2afdfb1927beb88be5acef501cb7796c,2024-05-14T19:18:31.490000 CVE-2024-28137,0,0,f2f24b51a74a8d3642520b293e45073f0e22ba51bdc0fe09073528263c0efe9e,2024-05-14T19:18:31.490000 CVE-2024-2814,0,0,0af22515bc5200d8d89f02962f37a9cfdea681f234f2f44087a1e6fae040f0b9,2024-05-17T02:38:31.880000 -CVE-2024-28147,0,0,60bb2e5d78f505333f6547596fcd95aa58d1edbca35214bd9ef5dbd93559060b,2024-06-24T05:15:09.493000 +CVE-2024-28147,0,1,92446155ccb25743782600497133fac38ce47a2ce1dd03eaddcbbd1b7ac3432d,2024-08-01T13:49:00.167000 CVE-2024-28148,0,0,47049d1db8585c3dde29a9470fb6d684b6da98e633a5abddbaaf1450f69bbb4f,2024-05-08T09:15:08.620000 CVE-2024-28149,0,0,d57757f16645c63e0c9502e4711b42f37419d20f304e87c5cfd79696154e2cc2,2024-05-01T18:15:16.697000 CVE-2024-2815,0,0,e870ad3fa73267b9278cf23f6d2369bdda6a88605b4512a729c5f6d6173abc6e,2024-05-17T02:38:31.990000 @@ -248281,7 +248282,7 @@ CVE-2024-28153,0,0,b4d921793a8b7e300347aa593d28cc61e78e4bd1ef14a12f0b164a18aa8c4 CVE-2024-28154,0,0,f3c5e1223674cd4f63e01c3170fae2ae6e1a05a85671857da6a95d10a5850122,2024-05-01T18:15:16.893000 CVE-2024-28155,0,0,fa46fa5813eab2c19fded2a5fcc6d7f577297946cab2c3c8805ebeab5ffeb70f,2024-05-01T18:15:16.933000 CVE-2024-28156,0,0,6694cead9cf2c9c343477c2df62ac2a419f27aa12d022b6fef723dd2d72bf187,2024-05-01T18:15:16.973000 -CVE-2024-28157,0,0,2d730c00922dfdf456ce50552334deef11fb69887d1064b427969e29b2860a1a,2024-05-01T18:15:17.027000 +CVE-2024-28157,0,1,e8195ee7f7e668974cf7d8246dbfcc0b5132119f0f5390c3a7b5d268b5722878,2024-08-01T13:49:00.507000 CVE-2024-28158,0,0,e11a9678e4f2f0242962248a4f5f96e3f4098382c9b4895b78df62a6d496f942,2024-05-01T18:15:17.063000 CVE-2024-28159,0,0,85a55ca304f7a61ac8256cd661ed01dcaa3843e7753771d38808f029852bd63d,2024-05-01T18:15:17.100000 CVE-2024-2816,0,0,1ff2465397674739fa53ccc9486babdbd16fc63821544c8b1e2bf9f4ddfd16ff,2024-05-17T02:38:32.100000 @@ -248370,7 +248371,7 @@ CVE-2024-2826,0,0,1eaaedd13dccddb76dc5a703640573b39f5461bfbad9053e70af360d65f8cd CVE-2024-28269,0,0,b7dba037dfa057d99dedf14ed710d84a658c9775dd875bb28a1c5e4a54714ee3,2024-07-03T01:51:32.517000 CVE-2024-2827,0,0,8a3b8a600b66b6a1d493b06795e5ff420fded15847345b5fd4692002caac1e89,2024-05-17T02:38:33.003000 CVE-2024-28270,0,0,7878b966997aa160a80aaf19fd79313746237372b00b36289ab8f51c64253e31,2024-04-09T12:48:04.090000 -CVE-2024-28275,0,0,03d383370eaf15e91d0ff72ee892c7e55a9fdb2480a31931fdce15e9f3f26ed4,2024-04-03T17:24:18.150000 +CVE-2024-28275,0,1,7f204621f55876799e4a0739675d5f90796a416c553e1fed23a049073a997181,2024-08-01T13:49:02.517000 CVE-2024-28276,0,0,896aecad1efc32d8d7d4be681490a5d3b704ace3d21bddf1f6c90eed4ecf91d2,2024-05-14T16:13:02.773000 CVE-2024-28277,0,0,11d55096db4a6f8daf8d5b5c78d2c8d6c9326505ca094e2c49ca8ad7bf77760d,2024-05-14T16:13:02.773000 CVE-2024-28279,0,0,55b3ccd94f211aef8d797e18d612a2f101844bd7f75e59dedcf73508a0cb187d,2024-07-03T01:51:33.390000 @@ -248410,22 +248411,22 @@ CVE-2024-2836,0,0,36495018f88c8d364876859f0fc3fe350f22bae03ce0e1ddfd2fb6841831ab CVE-2024-2837,0,0,ae302668592d4c18e6ec888a73f75aebb0caf04e9adb103971cba34e16c5520b,2024-07-03T01:53:35.850000 CVE-2024-2838,0,0,2ba7045bc56c4f0b8eeec3a1c405f491d0b059b7012e817a05c68f2e7b490490,2024-04-29T12:42:03.667000 CVE-2024-28383,0,0,4f219d7792abda13457e0e7109dbcec02126c96db4d4d7351ad6ca7dc5eaa2ee,2024-03-14T14:21:20.217000 -CVE-2024-28386,0,0,8911429919a96dc19ff88f25fe7689c2f21e77340ab6be6766ee19b87369d198,2024-03-25T16:43:06.137000 +CVE-2024-28386,0,1,66019518bfc4d7d8b99177df8793b456d0a0650171ffc1d7c8f3433563b85df5,2024-08-01T13:49:03.327000 CVE-2024-28387,0,0,285fdbd1c14aaa77581208972c2e8ecd92ec8b322a9f30440adffbe768809b17,2024-03-25T16:43:06.137000 CVE-2024-28388,0,0,575d4968aa541f7d6ef0da0b573c9a8bb55aa2b590b70d0372139e0de2630184,2024-03-14T12:52:09.877000 CVE-2024-28389,0,0,9eaf1124ddb0a3a3ae80c77d4aefc621f6554d40eb2d1ace25ea97ab3160fa23,2024-03-20T13:00:16.367000 CVE-2024-2839,0,0,ee45053b5ac83eae18c1a71d98f9817e7025bc9d7e049918f01e284843f64c90,2024-04-02T12:50:42.233000 CVE-2024-28390,0,0,8e966fdec021f459642300414ff272480719a8ad797893b6828dff0c5c67b98e,2024-03-14T12:52:09.877000 -CVE-2024-28391,0,0,e4b375bba0bcafa4e8db6701e20f1dd816c2f0fa12f4949160b13d6b605e4ed9,2024-03-14T12:52:09.877000 +CVE-2024-28391,0,1,1612464a5045a9dcbfbed51b4145357f41a0970daedd21315ce2194196825398,2024-08-01T13:49:04.167000 CVE-2024-28392,0,0,5824697cb412e64caabb20f46b93c113a811b02735a0ef2ece011572dc931f0d,2024-03-20T17:18:26.603000 CVE-2024-28393,0,0,04c598367976d9977c43beb15b030d893b4ef27f3405bd598ddf167ac93764fc,2024-03-25T16:43:06.137000 CVE-2024-28394,0,0,7b7c71f70fc86e156ee622c2aab05b674f709564f0b4dba84356298515e5d39a,2024-03-20T13:00:16.367000 -CVE-2024-28395,0,0,450e393563212755ca94eeada3a489d2f9d03e64b597e236d80dc99d860cbbe2,2024-03-20T17:18:26.603000 +CVE-2024-28395,0,1,c28e62d24659dc6a434d69d3338193a64b5b0b3de56e69bcff309324a2e0f17c,2024-08-01T13:49:05.027000 CVE-2024-28396,0,0,e2e5ec394ca570d1a0e7ca873049e09f9ea87c9a858dde784a7ae9cd510f7e8a,2024-03-20T17:18:26.603000 CVE-2024-28397,0,0,8753dce28e32cd8db0feb9191cd053a133c82c9d87d7dd695b0e0743ff864c05,2024-07-03T01:51:40.043000 CVE-2024-2840,0,0,d22529ec081718c114a32dcf5767c6cdef3a269eb91ab5eeb1189d10f2a33e86,2024-05-02T18:00:37.360000 CVE-2024-28401,0,0,f4b5194cb0dd8b5d39958cccf56c345aac334d6aa2a694b4c9032746830c6bf8,2024-03-17T22:38:29.433000 -CVE-2024-28402,0,0,d7b11a790dd0e11c4f55d7cb1b5017242ceb1ecc0bf54bda57b5e8031613bb55,2024-04-11T12:47:44.137000 +CVE-2024-28402,0,1,8b918fe7778ffd63695f4aaf9237bc54f79367b837f43076810ae5bc4db773ed,2024-08-01T13:49:05.850000 CVE-2024-28403,0,0,9ed2d59b660904c80c52b062c1843a5e7e67672be80fc6b62ea5b578c2ef324e,2024-03-15T17:15:08.093000 CVE-2024-28404,0,0,1857c95926c1a6a2437e2ec9e88b4289baa37b462a8f199b88d12f2f405cb539,2024-03-17T22:38:29.433000 CVE-2024-28405,0,0,ac769a9a1ca9d14c98dea9e347a84ef45ffaa2ae8ab21fc7fff3679df0b088d5,2024-04-01T01:12:59.077000 @@ -248435,10 +248436,10 @@ CVE-2024-28418,0,0,a547e7c2904ffc7c315aa13518177bc1d84929cd46462a0678162ae7db3fc CVE-2024-2842,0,0,fb8969f6b6806427a8ba5bfc6ea26b5b1997081ed131de3b61a4fe60370dfde0,2024-03-29T12:45:02.937000 CVE-2024-28421,0,0,3c00d10ea92c47ee3dd360f97007fb22ce897093c291aebd61f59c1d63797ce0,2024-03-26T12:55:05.010000 CVE-2024-28423,0,0,58a1ef7d35f092e50b1e07fd4013c2973ded6a4e76c11332d68829fd34d7c92f,2024-03-14T20:11:36.180000 -CVE-2024-28424,0,0,ecd6a99ae0759c71ad1c7af9ca074920e1fe2279be45e00b413aeaea6bf2f2f8,2024-03-14T20:11:36.180000 +CVE-2024-28424,0,1,e4b4381dc8c2db5b39b021eb19f4307a86761881fd7dd9c90c2430220aa415a4,2024-08-01T13:49:06.680000 CVE-2024-28425,0,0,a141e56038f4e753e81d857ec1e84aae2f8aa855ba4e2973635a5dc63a3d9ae9,2024-03-14T20:11:36.180000 CVE-2024-28429,0,0,d1463630e21be77443b70427954efe3756b4a41822fd121d66c94f7528f881a0,2024-03-13T14:28:45.217000 -CVE-2024-2843,0,0,4895415438190c94406cd89e69182d21ea05ffa00577f1f67fedd6f982ec7a8b,2024-08-01T06:15:02.367000 +CVE-2024-2843,0,1,7e21f24c1ed5c8baee5647386af4ad9cbb138946ff22853165e94dbdc165d9ba,2024-08-01T12:42:36.933000 CVE-2024-28430,0,0,e694b5aca86262438d0540e9c897e671f295f2b82cd8f6ab688d6e70320d9a61,2024-03-13T14:28:45.217000 CVE-2024-28431,0,0,8fa73f38068ed582ca772506eb7716c8cb270f1afc451299119c169e18fc0496,2024-03-13T14:28:45.217000 CVE-2024-28432,0,0,d4feae1a91594686399f8946ac7d18a6f1fe8ae89dec56cc02626608077bbfd0,2024-03-13T14:28:45.217000 @@ -248465,7 +248466,7 @@ CVE-2024-2852,0,0,ce3b26e82372ba3a1ea7a513f638a60f6b521dabbda2b7b15730e3be31569c CVE-2024-28520,0,0,48ea893d713b919b32c4e93e106ee73d6a1d5b2262bfa1fa172722dab28f2f23,2024-04-04T12:48:41.700000 CVE-2024-28521,0,0,3e889be75d13efa28405295dc4871a57c35f44292a958a216db39725fc259f8b,2024-03-22T12:45:36.130000 CVE-2024-2853,0,0,d81bfe0f2e8d27cfb2c79cc8c8a264f27a9770cb3cd0ef6dd08d9ccd4f7731b4,2024-05-17T02:38:34.337000 -CVE-2024-28535,0,0,45f7bffc17be8b64159901c9728b7325b152ab39657bb47f6eb7c0edb04b5b31,2024-03-21T20:58:46.217000 +CVE-2024-28535,0,1,b3d344cd79be8d85dbbdedf90a4aca4a63b5679340011f1e54eaf1af4f8bc64c,2024-08-01T13:49:07.553000 CVE-2024-28537,0,0,a1b289879a7e37eeb256b0155a9bf07c4755d98e64b0810b5b45c7e328ef254b,2024-03-18T19:40:00.173000 CVE-2024-2854,0,0,c1c542fca188c35518ba79a264f89406944bf1f786d85f84048d2cb537d11189,2024-05-17T02:38:34.440000 CVE-2024-28545,0,0,b234bb43a6bdfba980224fc2472196bea7480d971cd29181ffb9a0258bc8b12c,2024-03-27T12:29:30.307000 @@ -248476,8 +248477,8 @@ CVE-2024-28551,0,0,aaca26ff73961cb61fb384152122bc99bef219f52dc1b0ff8ad78bc48e293 CVE-2024-28553,0,0,b9d57a68a744d3ccd5c404d587c9bf7a5b20480c53447cfc05c22ab7aa24ff54,2024-03-21T20:58:52.357000 CVE-2024-28556,0,0,c7a9f11c6c2b705f23220da2e3877bcb36402bff752864a8069f34266c46e417,2024-07-03T01:51:41.963000 CVE-2024-28557,0,0,3093c51b9e2026829f6b99f8c43bf941f51829f68c91cbadd777f1be0a8b9afc,2024-04-16T13:24:07.103000 -CVE-2024-28558,0,0,ae831f39a71ff6fd6feaea6d0a1dff083a1e98e4532559592694b90f3c8875c6,2024-04-16T13:24:07.103000 -CVE-2024-28559,0,0,243c471f6c7e5dbbc5b3d7ee514756b8f0c3c5658492a4fa0fbe1d0ede0aa422,2024-03-22T12:45:36.130000 +CVE-2024-28558,0,1,7b30a622f0a0af74fb84bf56f284f0001ad46af28ee0c7db870ba46879fc3d39,2024-08-01T13:49:08.363000 +CVE-2024-28559,0,1,0ff36322a311ecd97481eb0c815102b811c012cb801e527ac38c14304bf20a6a,2024-08-01T13:49:09.173000 CVE-2024-2856,0,0,f39977c0ee4debb6810e431765ff954034447293df16f96ec47fd46fa1d43579,2024-05-17T02:38:34.693000 CVE-2024-28560,0,0,c5e00d2ea2dbb4570b92a21a90986ef143bba370dd256527f150e45d1af49f7f,2024-03-22T12:45:36.130000 CVE-2024-28562,0,0,aedaf708d3b18197d691f16e4924977de0b5623e261911d3fbbbaf3604c340ef,2024-07-03T01:51:42.723000 @@ -248499,14 +248500,14 @@ CVE-2024-28576,0,0,20c364f37aa41d9306b2fb5928f71ba058292ee4da92be2d79c7fa9bfe442 CVE-2024-28577,0,0,a7994664841f454c6da069e3a8f3f475a40106e0a3c3c256923cc87c69002f45,2024-03-20T13:00:16.367000 CVE-2024-28578,0,0,b7d2532e608ce9f8ab965c018f5e60e9de6073febf01d2307bb3317fb16ed4df,2024-03-20T13:00:16.367000 CVE-2024-28579,0,0,af6d0186d2e4155df93eccd883e89a480f1c8b06604fbf945315f7899b33bb79,2024-03-20T13:00:16.367000 -CVE-2024-2858,0,0,30ff0fd0be08fb0dc8d07b5e40b69c927e94596cc74def31da9e354549cc85ea,2024-04-15T13:15:31.997000 +CVE-2024-2858,0,1,77de78ffe5efb8a5ccda4b7ac1093000021db9681f722435169147a187be6d02,2024-08-01T13:49:55.107000 CVE-2024-28580,0,0,12d3b31a193d04110c191dc64a9e966dcde2286e8b583d117e825b7feb526a59,2024-03-20T13:00:16.367000 CVE-2024-28581,0,0,0da5c13c4b85d9bb8c608869fbe145c4047aa7b262d3dbb32ca42932b0c6573c,2024-03-20T13:00:16.367000 CVE-2024-28582,0,0,c8d9c6f6a1d338659902e37adbb04b12fb77269e6591f5ca5a12aad10c123c1f,2024-03-20T13:00:16.367000 CVE-2024-28583,0,0,7f3ab6d4f4ab97c0265937ef4d115a2fa3e5739f0ab5531555f42d21c39d5f43,2024-03-20T13:00:16.367000 CVE-2024-28584,0,0,7e195d8460271436a238e3083d5d571c24596d55b31fa43f7b5e39a74de45a89,2024-05-01T18:15:17.567000 -CVE-2024-28589,0,0,67c905fbc8c64e491740a29316182c4f946b1c075867156a4002dc3478a3fd76,2024-04-03T12:38:04.840000 -CVE-2024-2859,0,0,72a7d6ca11e412e4429c461747c02493ee938a467d66fda294306f35327992d6,2024-06-28T16:15:04.067000 +CVE-2024-28589,0,1,b66eede795a00f4b0e2e204a9cf88f1852abc341145eb3db72506b72341d3af9,2024-08-01T13:49:10.093000 +CVE-2024-2859,0,1,bafc6fbac9167165f0e9f3436109d788f5070653afb075f2a33513a8544a14d7,2024-08-01T13:49:55.310000 CVE-2024-28593,0,0,7680c93b4b55e0d308e6d773c6a404e20d989719f4a0bd08f261b75743b05261,2024-07-05T18:15:29.753000 CVE-2024-28595,0,0,ef113c40b1e587c7577ee3cf38a094a31c4af04143b7a8e19edb798f98163070,2024-03-20T13:00:16.367000 CVE-2024-2860,0,0,46217b9da2b2fddda54a23d86fd9667171b5afae15a6ec5a04d81b349c2499a5,2024-05-08T13:15:00.690000 @@ -248530,11 +248531,11 @@ CVE-2024-28668,0,0,55eca1e4b94c6de12e2d88ce23c316866a235e28d4d97ccb4751cf08b0017 CVE-2024-28669,0,0,7e7c51ad09a2f0694752bdd394c9ed2f89e1b1247bb99fcc406852b79b139fc6,2024-03-13T18:15:58.530000 CVE-2024-2867,0,0,22ce17bc91c68b182edb0434ac76ac7f869c6c754fce9597b9e7c40c50afa2f7,2024-05-02T18:00:37.360000 CVE-2024-28670,0,0,8304fe18b2d677df60ee2d838546c447b1c5104e8cd119687063ee3b30c1d031,2024-03-13T18:15:58.530000 -CVE-2024-28671,0,0,16ebf50f2356b3fc88df3123aa33c27bf5d7cb5540029b003a0240354d7cdbbc,2024-03-13T18:15:58.530000 +CVE-2024-28671,0,1,9a1d1290de5a4ba6867a05ae1d283c711cdd9d5647299d6bacd992d6df39a6cf,2024-08-01T13:49:10.897000 CVE-2024-28672,0,0,cd39d1fdf90137bb06b7bf130d6e97d1809e7cb18d315c08621547499fb882df,2024-03-13T18:15:58.530000 CVE-2024-28673,0,0,df6a8b54041d3cc998af8dd8e8514ff7a0ca9748ee781e5072323cea5b104987,2024-03-13T18:15:58.530000 CVE-2024-28675,0,0,47daa686e192de357661105a18818185616ee0102bba3d6db17b5fd0974eb2a4,2024-03-13T14:28:45.217000 -CVE-2024-28676,0,0,d00de0c95237357c6a896135573a70f7727410594d9113582a4a5fab03536b85,2024-03-13T18:15:58.530000 +CVE-2024-28676,0,1,63c5e4a02262e2b79dceab3a95058f444bf46b54f5978008708a63245a5f9f99,2024-08-01T13:49:11.717000 CVE-2024-28677,0,0,c212bc6abeb632592f29fbc5fe22ee750468c999ed8be8e2db7f3e23376a076d,2024-03-13T18:15:58.530000 CVE-2024-28678,0,0,e5023173fc11d3622828b4613c2efc53b1e9700f74a309c2cce387d24da005e5,2024-03-13T18:15:58.530000 CVE-2024-28679,0,0,105ed47445b8d9fc8d56f311cb3b3bd3771e3a0f797a39fdf0ae6eee229ff71d,2024-03-13T18:15:58.530000 @@ -248544,27 +248545,27 @@ CVE-2024-28681,0,0,4b7cba0eeeff2f30c6b385de9946c7001ab8d0046bea262780a6c07cbb70d CVE-2024-28682,0,0,02be1c405dc5aebe82585b37c498baa25485b44921e1eb4fbc423effbc8757f7,2024-03-13T18:15:58.530000 CVE-2024-28683,0,0,a4d093be60b3c2d6b460f6a76cb45ebc186bb3e16caaa646235de3d01aeda1d8,2024-03-13T18:15:58.530000 CVE-2024-28684,0,0,dfd73b6865a99ea6334fc6b8649a9d09bd29a09bbb6221cc4e10b05f5c40ada5,2024-03-13T14:28:45.217000 -CVE-2024-28698,0,0,6629faaa6dc4486898bcd56bcd2d9c071f21f9cd7af286acc070a1d3c8580cbd,2024-07-24T12:55:13.223000 +CVE-2024-28698,0,1,396cba3e1e1963c7f40bf85fd9f50e44dce9235019edfebcdaa211dedffb5752,2024-08-01T13:49:12.527000 CVE-2024-28699,0,0,0b9a4e0b313e8b2e6ec1b9d8b9287e8c737e0019e26671b77c33fd8106965c4d,2024-07-03T01:51:45.310000 -CVE-2024-2870,0,0,101cdd5ef34ec78aee7279476042f6231ac50ceb8dcc24da905d675c6dbc10c3,2024-07-15T13:00:34.853000 +CVE-2024-2870,0,1,c7537b0655353d8eeb90f5c17425f30e927a579834f6ada2ebebb0410684ac2c,2024-08-01T13:49:56.253000 CVE-2024-2871,0,0,a7a747cc7e44787061231b304b7fa297ab3e10c5c0c5d67f97a2b8176c2eaee9,2024-04-10T13:23:38.787000 CVE-2024-28713,0,0,683c52f8275705ee96e560652bde14603ddf66171fa872586de4b1b327a40ee2,2024-03-28T20:53:20.813000 -CVE-2024-28714,0,0,08fb99191e192a3bc38b9f60fc274cd82e5a789fd8f516940f5690d375507572,2024-03-29T12:45:02.937000 +CVE-2024-28714,0,1,18b853be5dc2833c618e4ddbd9bb373d963fc65628b928a515e70d080b0e0346,2024-08-01T13:49:13.347000 CVE-2024-28715,0,0,af77246106a78842a7b294f3e28f52ff784cab47ce869925f80951f17109d52a,2024-03-20T13:00:16.367000 CVE-2024-28716,0,0,3f63cfc047c308b332d22713c97a67a2241b00455960cf73e7cb5d9cde33a8f2,2024-07-03T01:51:46.153000 CVE-2024-28717,0,0,68c50e0969fa42fdfa87f41ced9aa5bc718acbfde537527889081e6d8b905cbf,2024-07-03T01:51:46.980000 CVE-2024-28718,0,0,17b78e31f850547b3e404b5336a5f452e3a516e939f6e425ec310b4ed9273277,2024-04-15T13:15:51.577000 -CVE-2024-2872,0,0,7d2c48b0ecdc472ddefeeaae58852037401c96bffa31f58efc16c68407506857,2024-08-01T06:15:02.443000 +CVE-2024-2872,0,1,361739535c34a2f64e5e36c892dfe464d09c9abb31d907d8aa7fe748b73666e3,2024-08-01T12:42:36.933000 CVE-2024-28722,0,0,4d114a5bb3de475df05c084fbb00bf1fb6503998847c685d4d1672b2617054ce,2024-07-03T01:51:47.757000 -CVE-2024-28725,0,0,759d7ace03ce49bd50f051acc14ff68a184bc288c90f7002afe9cdf646d255bc,2024-05-07T13:39:32.710000 +CVE-2024-28725,0,1,76f38f123d93dc5a87b1081a9a46cc5a546425e009751f0bb38d077b83255a95,2024-08-01T13:49:14.173000 CVE-2024-2873,0,0,ed9040959ed5f40d916defffcff03f64da72505082c3b91fe33a6506c19636e1,2024-03-26T12:55:05.010000 CVE-2024-28732,0,0,9851816f66d45de8afdad8c9816c7a6b7919c6a4b7292add9b2b3b84fff0f7f0,2024-04-08T18:48:40.217000 CVE-2024-28734,0,0,1c14934084e1e00ba63d896d0125baa20ca223930e97186ab2fc273c15799ec8,2024-07-03T01:51:48.533000 -CVE-2024-28735,0,0,ca4a2c6a4c745f3f4d9bf895f722eb84c854b1c5826c1e655dccfdd68677c73e,2024-04-25T19:15:49.910000 +CVE-2024-28735,0,1,004afab27d51efc6ac1b999df3e4f3751a9bc81de88a92938e218f69e07ed59d,2024-08-01T13:49:15.007000 CVE-2024-28736,0,0,b18e265ab9079a090b10f2fe5a13acf391230f937283b97c645741a4ee888897,2024-07-03T01:51:49.307000 CVE-2024-2874,0,0,80b110f5e4061aa4b7108ad521bebbe850331343538d6ef70c9be87fbdfcd4cf,2024-05-24T01:15:30.977000 CVE-2024-28741,0,0,3bc89e24ccc97e59e30e4828003cace9f36d1730b364ef896439edd9448aa78f,2024-04-08T18:48:40.217000 -CVE-2024-28744,0,0,3d98a3cf99d474fc07c6276b12f0493a2340c9185438b428410eb1071de38bee,2024-04-08T18:48:40.217000 +CVE-2024-28744,0,1,6de1af81e457c114bae7b1738d6658348e92bf9c2953cae361b0b30d06e054f6,2024-08-01T13:49:15.900000 CVE-2024-28745,0,0,da878c5f5cc0e7f2e4abb5594a05991a98129a08d42ab910eae7e36c68d7e661,2024-03-18T12:38:25.490000 CVE-2024-28746,0,0,28e0f82b5245c8fee772a7fa2b89a2e8a2df0c79bfc4434d8d6d416163396ab6,2024-05-01T19:15:22.510000 CVE-2024-28747,0,0,c78e80f5c4544dc2a8f09b5ef2088da98a86ced007bf2e33d8d4deef0b571d02,2024-07-09T18:19:14.047000 @@ -248573,7 +248574,7 @@ CVE-2024-28749,0,0,7fd406c104be877229c16d54498390b8e7d76b6c8ce02ef56c47da3ad34b9 CVE-2024-2875,0,0,6cdb006d1a6c5034276b51f0b43f593cf2fffd4a38086e818a1876a540999eec,2024-06-14T21:15:51.043000 CVE-2024-28750,0,0,d780513969d95a2a8e4659069a1cd3d6cd97b1c91cdf4b1dec2cf83a7354c7e9,2024-07-09T18:19:14.047000 CVE-2024-28751,0,0,befef9aaad239486418cde9be9e0a53c20b96e9db24dd8e70484385d86fc3d0d,2024-07-09T18:19:14.047000 -CVE-2024-28752,0,0,6db452d915168394d0b2d52769e6a9086adf1f259e90cbdb519344c344898020,2024-06-10T17:16:24.460000 +CVE-2024-28752,0,1,201eab5c3984ec2eeccdd8a718f765ccc577edf4cb5cdd6dc7af0c666b0e95ca,2024-08-01T13:49:17.413000 CVE-2024-28753,0,0,9b7534424fcafcef08233e24d8609288fcd5326b5da35fb8ff9f88b8b46d19e0,2024-03-11T01:32:39.697000 CVE-2024-28754,0,0,b825517ec09be0ea62da6389e64d9784f7fd2758d87d7ecb524c18a858c8d2f8,2024-03-11T01:32:39.697000 CVE-2024-28755,0,0,a971352ccfd1d9312c8fc951387a64198c3d2967458d020bfed491bd6af81566,2024-04-03T12:38:04.840000 @@ -248600,10 +248601,10 @@ CVE-2024-28796,0,0,9309b95ff28ad61ded45c96b0ce61eb28e84237793000fa8c06bf713a7309 CVE-2024-28797,0,0,215c6e5211c115cb8a1dd99529c7ef7d500087d4643915a223453edd582d1174,2024-07-31T18:57:00.313000 CVE-2024-28798,0,0,a6356458c4f4311bbbb434bcb07b82d4a8232904c746806c3a615b0a524813c1,2024-07-31T19:33:56.337000 CVE-2024-2880,0,0,c617aabe27a476530f11dd1aff9d0e70b8bc9314c3647a1cac79a81958f4d9d1,2024-07-12T16:55:30.137000 -CVE-2024-28804,0,0,9df6edf6ae339d680185172e5ed213f302ddf3e3f29618df198f13863aac79c1,2024-07-30T13:33:30.653000 -CVE-2024-28805,0,0,7e8f422d872ff6928ec00a78f178b43022aa22328738d123a1e39a8d5357e6af,2024-07-30T13:33:30.653000 +CVE-2024-28804,0,1,f7e3d6c3e14215e831a96b931ea15f5f72cb16cc7bfabd09d8b34530beca586f,2024-08-01T13:49:18.607000 +CVE-2024-28805,0,1,57ffe0c5396b469d1d6aea3771a149218b95fafbad9b52c6f522fc5113787118,2024-08-01T13:49:19.450000 CVE-2024-28806,0,0,f72e037433a942749a86e9517647a188afd730076342a8bb52aa42d3a923d311,2024-07-30T13:33:30.653000 -CVE-2024-28815,0,0,3ad90fab268b5951a372d84f0f5e070fd25f3b3963fd4b71a1d1f0aa4522308c,2024-04-30T07:15:48.897000 +CVE-2024-28815,0,1,a66a592511ffd5b563fa083295811494fe79ce7c34bc79ae02ae7f38cd9af9c2,2024-08-01T13:49:20.227000 CVE-2024-28816,0,0,6ee14c0c184476ced399e15a2ac6d0162b81cd21899a98e17bebc5eeaa09e33f,2024-03-11T12:47:42.653000 CVE-2024-28818,0,0,553ea080520e3ef7d7c194b1130a084d77d8e937a2b2bb8942609e2870cc98f5,2024-06-27T16:43:48.633000 CVE-2024-2882,0,0,ac3db032a55af245aeee4f2522d2c10c01bd50b8ed58cf00aeea2dd39d0cf75d,2024-06-27T19:25:12.067000 @@ -248661,7 +248662,7 @@ CVE-2024-2889,0,0,28ef4975b1d9f79ab7d0703313acc039b0acfd9d3a75a1a425d92dbe5c73a9 CVE-2024-28890,0,0,75d08f12fbd468307e29dd7cbe4c7c3d5acf11ae18647e40fe18f61a37a2bd23,2024-07-03T01:51:54.973000 CVE-2024-28891,0,0,31c9d1ebf9f51d96b38fd3616c071c476c1bf3bdfafbca895cdab316c5bcd3e3,2024-03-22T12:45:36.130000 CVE-2024-28893,0,0,6bb6e7d4eb5ffccbd865059808a0bb14806c115db17b0c7b58ceaf6722125e36,2024-07-03T01:51:55.153000 -CVE-2024-28894,0,0,43dafa6b2070c13326e7fd610990466bd91d5674e2b573ac2e6cfb15bd812dd4,2024-04-15T13:15:31.997000 +CVE-2024-28894,0,1,52f5c99a2393e8296645b919b77395855b2fbf6ddfb3ce5fad5f6c31f90cae17,2024-08-01T13:49:21.557000 CVE-2024-28895,0,0,7f60c42026f8919d7327f07078b6071429a47272f57bf3ec7d964752af390988,2024-04-01T01:33:21.910000 CVE-2024-28896,0,0,82c8e7dd995d4781c98f0d7c761e7b443ea0ceb397f6b58ed2e6c96c2843e057,2024-04-10T13:24:00.070000 CVE-2024-28897,0,0,f9f596567c4f5a1d1ef0ea2267dd4bdd40c07a7d3f8bde3d914da43c8724226d,2024-04-10T13:24:00.070000 @@ -248734,7 +248735,7 @@ CVE-2024-28969,0,0,9aaf419f4a0f5578c1d360d21c88466bed088175329d02d5a4c08af5237b8 CVE-2024-2897,0,0,cedfc20da5ed85e9f84ef73f96b224aba1a7761f3b26b18165ca182e0276563a,2024-06-04T19:19:19.267000 CVE-2024-28970,0,0,e8f11977500005486cf7671144dacf7215de23ccf91b6c8eb182a0c1c61d7f56,2024-06-13T18:36:09.013000 CVE-2024-28971,0,0,977b1e796a504922885da69c0f7540513ab16cea6a678ad4098d22f0ec570269,2024-05-08T17:05:24.083000 -CVE-2024-28972,0,0,d756f6addda93a7c284b986668a27e56ee364102435016902868a5e7a7d25511,2024-08-01T08:15:02.520000 +CVE-2024-28972,0,1,7e0693eec2b0c555920118b0a637e50a7fe7cc9cd0582523106ae0d013ec397a,2024-08-01T12:42:36.933000 CVE-2024-28973,0,0,c5833936687fc47280c5de84f71bab0362ecad8e5c2b89ba9d836c1b9ea2e1df,2024-06-26T12:44:29.693000 CVE-2024-28974,0,0,9abba18f604ec1e999d11794eb149d52c94c8b05cbfba16cb362e87c9a7f33fd,2024-05-29T19:50:25.303000 CVE-2024-28976,0,0,c0cfcb815492d56170eba26ed04c4ed5dc48c34f8cfcf09f6c5238d2d54ddae0,2024-04-24T13:39:42.883000 @@ -248765,7 +248766,7 @@ CVE-2024-29010,0,0,a9ff9c65174c33f2e792fcb56ee4004994b28661d6208ebb1e88e717582f6 CVE-2024-29011,0,0,eb92887d9a2ecd248daea80b2641ebf2c57344e5f41ce9050910fcddaf740a0c,2024-05-01T19:50:25.633000 CVE-2024-29012,0,0,103f9b3a44d2959aebf7d265216e41c1e2620e9e61731cbb4f6a8a8377428556,2024-06-20T12:43:25.663000 CVE-2024-29013,0,0,2dc9b1696c8642560df9830149c8475a352333f0c87b0c7a57248058bcd65c3c,2024-06-20T12:43:25.663000 -CVE-2024-29014,0,0,86ba026aeeefca15fd7934d3af99781475e0e078fb833d902f37be28eecb4a6f,2024-07-18T17:15:04.240000 +CVE-2024-29014,0,1,727bca255016a056117f183cd0537f37a7ac804396b0c606f5bbb22eb38674ae,2024-08-01T13:49:23.520000 CVE-2024-29018,0,0,0688752b1434844c55e6cd721e2221622ec0094595898dc16074b9d8a9b658da,2024-03-21T12:58:51.093000 CVE-2024-29019,0,0,ad22499f8dda93d004eb62f1b9a36df352f03e492a86d6142b84d27273c03d4d,2024-04-11T12:47:44.137000 CVE-2024-2902,0,0,8f66133d16da6ff672ed0ae058cb886f79d625c60e88da002b56c847ce98f5ef,2024-05-17T02:38:36.520000 @@ -248819,8 +248820,8 @@ CVE-2024-29064,0,0,88daf3a7de89b464600feb0ee044529e05b02bc2ba2ebf4683d236ef22e3a CVE-2024-29066,0,0,b57916d53c87b911e1996a4619a92f6e3a854e8931117c8efeb51360c73379e4,2024-04-10T13:24:00.070000 CVE-2024-29068,0,0,e1dad172506bd4e95fa906ae43c52d8079d3c46d4ec490bee2c31e2d7d0fe25e,2024-07-26T12:38:41.683000 CVE-2024-29069,0,0,1df4f123351673aa60d0db19441304a02c0eca550c10d5fc159c9066c876ecbc,2024-07-26T12:38:41.683000 -CVE-2024-2907,0,0,bd4e59455721fd47a3f3bf4cc54009a430bac090133efd0393d311456e4d173d,2024-04-25T13:18:13.537000 -CVE-2024-29070,0,0,9bb8fc70fcc7f2f8368c3f24ea4c3b75c88f99fe4e019835c530d2dc358d46c3,2024-07-24T12:55:13.223000 +CVE-2024-2907,0,1,d38c3c5afe0996ef7d2afec58183dacb85dd11333a5da96f4ee973a2358a84d8,2024-08-01T13:49:56.797000 +CVE-2024-29070,0,1,7e70b47539b534ac42449ef773f3a05c674c51a40e15b8addbcf7c05c21a85a1,2024-08-01T13:49:24.570000 CVE-2024-29071,0,0,06a4c013d7966a06671f5afa3de9f823a9a7634e70711b0ea0f16d92c424f917,2024-03-25T13:47:14.087000 CVE-2024-29072,0,0,50e2db556663c43fd665c3ae801a5bd36f73f0e7479a230bf4ff9553f9fcd995,2024-06-10T18:15:30.110000 CVE-2024-29073,0,0,edd87d03e74abbe3093f937688b072e38c5d4ed0ca6dad718f63073566a86616,2024-07-24T12:55:13.223000 @@ -248917,7 +248918,7 @@ CVE-2024-29174,0,0,8810eaafac9310c2bc7fa35be0ee59667dfed889d6f0406ec9e8e9a2e84e1 CVE-2024-29175,0,0,9e1c30d68374a67297243430511b61dcb57896195e7592bda865652864e933fb,2024-06-26T12:44:29.693000 CVE-2024-29176,0,0,4481bed72498e83281c3c71f1079bcbb25fd95752a4713e0302f19027e575dfe,2024-06-26T12:44:29.693000 CVE-2024-29177,0,0,c250b8bebc6f69d83485fb761553b3777ab8e096ccd436d863289f72ba5f24cc,2024-06-26T12:44:29.693000 -CVE-2024-29178,0,0,787ce68a2e58d3156baf222d43b0c16532175eab16b3f71d3d40f23af89a1d8e,2024-07-18T14:15:04.453000 +CVE-2024-29178,0,1,76ff8b0a0e24a11bc92ca8b404bc85b01a706fb863e2cd999624f6777b9cad0f,2024-08-01T13:49:25.303000 CVE-2024-29179,0,0,fe840eaf09e7a8e7dd10821c2db25070488ae9547e1cdb2c88feef71c243f949,2024-03-26T12:55:05.010000 CVE-2024-2918,0,0,970042595bd5643e2d862aca742e1125b1b743ac1b05c46b57da300ff31e85eb,2024-04-10T13:23:38.787000 CVE-2024-29180,0,0,868fb8f0af2dabbfadb8670233d0ccacca72ce41e4c728fc488a08eccd08c9c9,2024-03-21T19:47:03.943000 @@ -248958,7 +248959,7 @@ CVE-2024-29215,0,0,c3b478aa1710010c8b99ef1ca4fa2246febf1b61f49cb0a36af3387869a40 CVE-2024-29216,0,0,2aed50ca06d94573fdcea13916b8acc52550da1faf8cd9bfb64a818c7964e9a0,2024-03-25T13:47:14.087000 CVE-2024-29217,0,0,1379e154758970ea220e13f9d29020765e0cdb03091ce67a8deaa8fc55306947,2024-07-03T01:52:20.987000 CVE-2024-29218,0,0,cf4584ad45aa9022ef363367b9662bb95c85c1cf05b783ff3f8b77c49f1740c3,2024-07-03T01:52:21.197000 -CVE-2024-29219,0,0,5bcda58095ddd7f6a899097fe1c29bcb5793d4564572d54de269255ee0dcc7f9,2024-04-15T13:15:31.997000 +CVE-2024-29219,0,1,86ac03067eff02e604d5556f51d379cbd70c979e52278d645b3d67f0eff0f40b,2024-08-01T13:49:26.097000 CVE-2024-2922,0,0,1b25df5c94d7e701f887b0b87f5c79e45d5758d260e847ab76d1189e34495c69,2024-07-24T20:24:59.953000 CVE-2024-29220,0,0,090565567cf3ea33c2963ef780d4a658cb67a0ca860fce6a4b4ca4a5c6e7e50f,2024-04-11T12:47:44.137000 CVE-2024-29221,0,0,caf21d9918383453763db0176447dbbb103b8f57f4b44c5c55842a4c5faa7361,2024-04-05T12:40:52.763000 @@ -248989,13 +248990,13 @@ CVE-2024-2927,0,0,f3bb3c9a30a99b51229870b4966b198934ad11007ef0d3791756757dba92d3 CVE-2024-29271,0,0,b4d3906e78736be6eca15d6469d3358952e211c417b217d384055581eda6bf29,2024-03-22T12:45:36.130000 CVE-2024-29272,0,0,73638a71ca4bf54cf77576d8965f4237e90a05a99a5e92c3f39c75b9dbf249f7,2024-03-22T12:45:36.130000 CVE-2024-29273,0,0,4c07339fa5d18aa28a649c4ec236dc58314e6c0e5cafb23e7bb0325d1434eeb2,2024-03-22T12:45:36.130000 -CVE-2024-29275,0,0,047cac10ca31e2e0549c4f5f6f4a100b8eecb9b34a61dc4c83ba3790abbc3027,2024-03-22T12:45:36.130000 +CVE-2024-29275,0,1,019299934d2875a3343e07edeed968a51219f7dc129478a92947831a4c668c96,2024-08-01T13:49:27.553000 CVE-2024-29276,0,0,fd33b5fb0ca767faf8e9db5f80d97841f83395003d4a98fe75c3e265d0839e4b,2024-04-02T12:50:42.233000 -CVE-2024-29278,0,0,075341e1c15dd547ba8fa6132568d3f486231a7cb41d0507a24106e8af6b8ab3,2024-04-01T01:12:59.077000 +CVE-2024-29278,0,1,1c7d83867b262b09f27588e31bf9841e3af6bdfc0d72746f40dee1d45734adfd,2024-08-01T13:49:28.357000 CVE-2024-2928,0,0,3c94f78fdc9693c8d4fbabf25517e239d8aeb55c719006a8f637d8f4c525f953,2024-06-07T14:56:05.647000 CVE-2024-2929,0,0,513249311f09defaddca00249c92a4d2f3037014552979e20d0e342694062636,2024-03-26T17:09:53.043000 CVE-2024-29291,0,0,0d703378b5cb7b849e8c22cc50b73febed58a80d3feb1ebc89147218489081f9,2024-07-03T01:52:22.557000 -CVE-2024-29296,0,0,b6abe0dfec17a569cee9ae21aa6419ad7bf1c7e57c8d6debc205f3086fc48295,2024-04-10T19:49:51.183000 +CVE-2024-29296,0,1,196ce9fc64e2de40c4aad14cdb78662ded04058e63416a22f9fb231921284e33,2024-08-01T13:49:29.143000 CVE-2024-2930,0,0,2e48243b295a8e93d53a35219b2be0089b750f595ca7624319aaf969e99aaaca,2024-05-17T02:38:37.687000 CVE-2024-29301,0,0,24c6a7f92c000560cbcb7b0e6349dc8cdc9ad0e148f36ce60314762f962fd3ad,2024-03-26T12:55:05.010000 CVE-2024-29302,0,0,cf8fe6f75fdad52e779f97ba910547debbd1a3ca55f73b304852f44788a1216b,2024-03-26T12:55:05.010000 @@ -249012,7 +249013,7 @@ CVE-2024-29338,0,0,90e3b77dd15cfdbfa7b764f271138804375bfb650afa1574014cadd1e2aca CVE-2024-2934,0,0,45a0042779c7d6f34e6fbc62fd386e8f0722656936a5982b81057995fcd91a4c,2024-05-17T02:38:37.907000 CVE-2024-2935,0,0,7d689f5767f4ecf1da00999595f1a425d48847fef9234facd7520ada78d3a34d,2024-05-17T02:38:38.003000 CVE-2024-2936,0,0,ded3e6858b21938cc6332525608363ca633684eee87859a8f9504838347f2c1a,2024-03-29T12:45:02.937000 -CVE-2024-29366,0,0,b0765b0187ce9f7950e3e6997a05ad12e6fdbff7506e04fac853ce5b185253ee,2024-03-22T19:02:10.300000 +CVE-2024-29366,0,1,c6def951532345f5745b43a5275ceff56f9c33aee73b404cffac4524e7e2c006,2024-08-01T13:49:29.947000 CVE-2024-29368,0,0,0901e7b80a5ee0e48b0a83048196418207989c0e792e75fa11268199f70a424c,2024-04-23T14:15:08.440000 CVE-2024-29374,0,0,d2ac5a721d12777649fcd030beb01ff2c11bea2c0dd1a7deea6b2cbbb441b4fa,2024-03-21T19:47:03.943000 CVE-2024-29375,0,0,716fc3c8e0ccb042475d24e7fe2ab7abf1b6955d8021a6ba9e6aecf5e8253511,2024-04-04T12:48:41.700000 @@ -249059,7 +249060,7 @@ CVE-2024-29452,0,0,8e1bfc2abfc91b5ca6aaff5eaf1d9a62e09db612bd6386c944cc6eed8e948 CVE-2024-29454,0,0,1c893aa9fc261c831d35b219df714ee3ff6151f3ab4ae74ce0e7125ab45089bf,2024-05-27T01:15:15.473000 CVE-2024-29455,0,0,c5766b7ace224fe7d010005c23caa8535593f35607a7498893863c39faace774,2024-05-27T01:15:15.573000 CVE-2024-2946,0,0,220fbf3d281fb179dce3b92b2f13da4971e0ad50361a1c155497aeea2ac2f8b3,2024-04-10T13:23:38.787000 -CVE-2024-29460,0,0,4c0710e090d229f3cb989ed344e4f9593c718d3e2b5b85ac72e33a8f8fcf84cf,2024-04-11T12:47:44.137000 +CVE-2024-29460,0,1,f954a0fb0d0ecede72346246898998047378b0ff85ba4078b6d862a1eed2ae65,2024-08-01T13:49:30.940000 CVE-2024-29461,0,0,7435a5125007ae496ee06dfe30d9a23e23411a0a41be62219557118da196f31f,2024-07-11T15:05:34.270000 CVE-2024-29466,0,0,4fa136a9b1a51af6517f939484fb1c8a80e3e0537d7615acddb3c99d86059b49,2024-07-03T01:52:27.797000 CVE-2024-29469,0,0,2079505dc0da5a3cbf2c6e066fddfdad1eb85fcaa078af0bbb19417ca0e16ca0,2024-03-21T12:58:51.093000 @@ -249085,7 +249086,7 @@ CVE-2024-29509,0,0,f9370d95f5a3fe12aa6c2c0bfad9fca876767caae1f313515419f207b3f03 CVE-2024-2951,0,0,f710e6d4245ad6c04fc32de495a410058cbe73872608e5a79d1a40f0d8a1be5d,2024-03-27T12:29:41.530000 CVE-2024-29510,0,0,51d0625dfaf62c75da9e9bb8fd0fc5d3519f674d47bd05e2a65a6c09ad7cf0da,2024-07-08T14:18:07.743000 CVE-2024-29511,0,0,71f40c07ffc6ddcd2ad428aa635a90b1b076d74d8bc5a2a3a20f87b7f6b658a4,2024-07-08T14:18:08.567000 -CVE-2024-29513,0,0,0fb61de208c8c4f14897e2305af6a6534797deb948ca2f79e0e201e7dc6fd4ae,2024-05-14T16:13:02.773000 +CVE-2024-29513,0,1,8cfcc3ee68a773ba517d1f3723d5fc41ae5eef49bbfc2250bce477983b34e599,2024-08-01T13:49:32.137000 CVE-2024-29514,0,0,eb115f41feffccc853e81d533febd8becad8a070e1e7d9f658260b227fc1cfd6,2024-04-02T18:12:16.283000 CVE-2024-29515,0,0,c383707b3cd02f09eb0d30f76485ac637d83f8594b9d209d7b506d7581c691b7,2024-03-26T12:55:05.010000 CVE-2024-2952,0,0,9ca75cd38bb98c444fe6c898c357072e1eb1c9edb6d026f3884b5faa65c0c5c5,2024-04-15T18:15:11.027000 @@ -249108,9 +249109,9 @@ CVE-2024-29650,0,0,21e86e29ed42b0d7d4a9c3f72ceb668bef3a8f9cef4f93c8622d1ab6b4cc8 CVE-2024-29651,0,0,5a1f415b68fc3f46b7185d8ff5ad3871575de5345b87c667d5c59de8fd5ccfce,2024-05-20T19:34:58.277000 CVE-2024-2966,0,0,400ebec10c52dfe133448a888edcb5c95faf833eae277c5e987b3dc9ba62c6f2,2024-04-11T12:47:44.137000 CVE-2024-29660,0,0,92c6a0243a2c1471ce3712ba9ce2ea71347605bcd635b1e9cc6bc9d49c7bb0d5,2024-07-03T01:52:29.550000 -CVE-2024-29661,0,0,d8de2c739b6ce41311a104d43a4ea298a2ddded6cc9dbbf3bc8fde704b31431c,2024-04-22T13:28:34.007000 +CVE-2024-29661,0,1,88ef154f0ac81ededf103463c2b4906b746fd4986090980f76c4c2bc2515ed30,2024-08-01T13:49:32.940000 CVE-2024-29666,0,0,a67e8622ed74011ff249c5e68e53374a60af6cb3676ee7edca6fb573c3e202e4,2024-03-26T12:55:05.010000 -CVE-2024-29667,0,0,a98db1f2026976b3b087e1ac0786d798a1483ad14236c80a2fedf0d7a20926ca,2024-04-01T01:12:59.077000 +CVE-2024-29667,0,1,4118e10082e95e28b5db3ce405eaacc62f74bef151ef94158b87df6d64494dc8,2024-08-01T13:49:33.747000 CVE-2024-2967,0,0,c152c043e13b4423e324e9742145ebebea680255fd320b84aa6fd1c484253799,2024-05-02T18:00:37.360000 CVE-2024-29672,0,0,163254366ca0dd0dd0315f6561f723f9948906fd49ed067098107871444f5c75,2024-04-05T12:40:52.763000 CVE-2024-2968,0,0,45b6ebbb9d99cd3c2205a629e13ac67f3a4bda14dbab27666ba50c91e62a9257,2024-03-29T12:45:02.937000 @@ -249125,8 +249126,8 @@ CVE-2024-29732,0,0,e30fc06180575c1796869bb0b4fa02497c40c6d7939d34aba0362f12c2710 CVE-2024-29733,0,0,0811972ef853088b726fd2b07316244d1d628e55e310910ac8174bd65d097612,2024-07-03T01:52:30.320000 CVE-2024-29734,0,0,65bb1ba04f673142d3081922c5e4533cd4af140db3cdfbbce09ab73848e3b6c3,2024-04-03T12:38:04.840000 CVE-2024-29735,0,0,1c27e1fe9dbb50907062f908fab6fbb55a16239f685d6be40b04c11200e2a361,2024-05-01T19:15:23.573000 -CVE-2024-29736,0,0,65ce30ebff6f5614e79181954ffc3f81ebe5384bbf5a121e47d3bc785029361b,2024-07-19T13:01:44.567000 -CVE-2024-29737,0,0,a77df9c668115e88f32080717a7a08c909bf33e8a8b6486eca536ea661fccb1f,2024-07-19T16:11:25.013000 +CVE-2024-29736,0,1,a29e5ad6d2da9dd2101bffb608f207d24cf828ac3cbdfd7bb52689ac543dddf1,2024-08-01T13:49:34.540000 +CVE-2024-29737,0,1,773c8720c44afb54cbbd0c12354c2f0a043cfa72e5f75a21b0108ef944307c03,2024-08-01T13:49:34.853000 CVE-2024-29738,0,0,1c3e1564461702d87cd213d777f3523814ac3c73b5cc61bff5ae595e06e0fbeb,2024-04-08T18:49:25.863000 CVE-2024-29739,0,0,ff7d8db191ec3bc24b9fd0a0e51d4426e2f32708f8ba1a8e8a840affcd32aeb7,2024-04-08T18:49:25.863000 CVE-2024-2974,0,0,f10703d4490e9d3ed63c6b4abd6c9bf87d6d9b2c11e56d030e360944602d03aa,2024-04-10T13:23:38.787000 @@ -249138,7 +249139,7 @@ CVE-2024-29744,0,0,261c7417210a4d10590c39459d063b6a3382c5fabd76d0ef2ba580fc9b59d CVE-2024-29745,0,0,78004cfb0900810795e61a81e3d7c158941740f11ef378046d506f05ba94e1e8,2024-07-03T01:52:31.423000 CVE-2024-29746,0,0,62704fb4f4d9198efa27e283ffea32d603f5a0869ae4c2ae9b3b9f79f9824e92,2024-04-08T18:49:25.863000 CVE-2024-29747,0,0,a9bb38ddde46ade8292f525e19d236b5bd174a30f99b61fb435143ca6b2dcbce,2024-04-08T18:49:25.863000 -CVE-2024-29748,0,0,8c67873db656f9e668f848f99a60b2a8c686b34868025353086eedb2d6eb7780,2024-04-08T22:52:33.780000 +CVE-2024-29748,0,1,27ac00efbea1d98af850e22547e69eee8b16e3321a33fe33d083e82c61ed1b05,2024-08-01T13:49:35.273000 CVE-2024-29749,0,0,d4538307bc8fda555ee9b1382dc070f5b77c3a03739eaa1d073889360dc0fea6,2024-04-08T18:49:25.863000 CVE-2024-2975,0,0,ce2c1eaa1d0b58261b411dcccccd364c347ae6cf1b55cf3907ef667aa6188f26,2024-07-03T01:53:41.630000 CVE-2024-29750,0,0,ed5228a2a7a791cccf76d4f15271f0b6b95bcf6209db04d15efbe07ac5efe2db,2024-04-08T18:49:25.863000 @@ -249224,7 +249225,7 @@ CVE-2024-29824,0,0,b375dd609ead4d6fa8deffd53d21027aee5b0c970a4280fe54c865911c5d6 CVE-2024-29825,0,0,e1f08e7c77d9316a41574b3f9c50358ca3dcdde2c564abef4272669d8c666180,2024-07-03T01:52:41.840000 CVE-2024-29826,0,0,015b7dc5cecd0e0c7eb7d8f1703674bec978f3ccdbd1be411e52d58ba200b131,2024-07-03T01:52:42.553000 CVE-2024-29827,0,0,29c9069ded6ac01c3dd894b93f19938e882c8194d01f03990ea46638fcde5cd6,2024-07-03T01:52:43.270000 -CVE-2024-29828,0,0,7799cff2be9cd69b1dcda9c4e57767f9777e942612845759315eedc7fa68dcfc,2024-05-31T19:14:47.793000 +CVE-2024-29828,0,1,cf7a11dfb0bacf870956fd60f8fa5514bb20d6de121717190a179ee970816480,2024-08-01T13:49:36.537000 CVE-2024-29829,0,0,2627c3c538089236c07fc9d99ff01f8523c0ad4c659196fc4e8a6a2fbde2ef8b,2024-07-03T01:52:43.970000 CVE-2024-2983,0,0,abc742578b147dd833a35242cc5e48a9d8a95389fdc1a304f0712a489693567d,2024-05-17T02:38:40.503000 CVE-2024-29830,0,0,18395a43d7ad8c4a3ef4b143a126bb1f7f474279d280a4d068388e15b7d7d9c8,2024-07-03T01:52:44.693000 @@ -249334,7 +249335,7 @@ CVE-2024-29935,0,0,2df58335532d2e0910d7fe960733b7807b7534e2adf23696be83fbb2aa39d CVE-2024-29936,0,0,92849cd372884d285333ed69741c55a39f25096328d4160949a4c94f43a34be2,2024-03-27T12:29:30.307000 CVE-2024-29937,0,0,c7f79bb66b1b76e31100663df029b47115e7175f6bf73f0994a3658464c2f875,2024-04-11T12:47:44.137000 CVE-2024-2994,0,0,aaaf2c75d5a02f7deaf00b12c93e19a053ed46c0dbf5e453ed92362aa436eaf9,2024-05-17T02:38:41.503000 -CVE-2024-29941,0,0,15f9f4f251e1fb063722348e529ce95eb6586e0fa69bcfa77a3b5c10dfb03c1b,2024-05-07T13:39:32.710000 +CVE-2024-29941,0,1,5268fd2170dfcdffdb652336d23b2a74b8e628a596ea4475ef9d929015e3feda,2024-08-01T13:49:37.723000 CVE-2024-29943,0,0,3cc9a4f27ca4206af1ebe17ff9153ef72a771a6ec6e7af98df5f1fd8a5d1f08f,2024-05-01T18:15:18.933000 CVE-2024-29944,0,0,3fa6ec384cbcdc2b68322665bb7e7634f0ececbbfbd7ee0e2dbe62e4f2104876,2024-05-01T18:15:18.987000 CVE-2024-29945,0,0,545d8d8a5d454680f75ae96bc2bf76a65720f53d27f04c08caf122c1f6350f1e,2024-04-10T01:15:18.693000 @@ -249570,7 +249571,7 @@ CVE-2024-30209,0,0,c7651164f7ae5b8a1ad3c087ccef52dd980069585c4cb62ace335f9444cd1 CVE-2024-3021,0,0,7a43c9561da29130b5303fa05a38e9044e9c902fed6586556d1f1fafa7292e2a,2024-05-02T18:00:37.360000 CVE-2024-30210,0,0,a4e3e4c4242271077161d2b580120efd2eb393aeb016a0a4841fcee233aac25e,2024-04-15T13:15:51.577000 CVE-2024-30212,0,0,0594691160a4f5b2f1d0bcef9e405d8556ee2dba26e32f8dbf7305af5239bf11,2024-06-11T12:15:14.847000 -CVE-2024-30213,0,0,001ec9524dc220ee85a6f54bb457ea7aa91792bea2d026680b02da84c57b03b7,2024-07-15T13:00:34.853000 +CVE-2024-30213,0,1,299c83d7dc37057a03df1278c6e6c041de5ee0adc4cf81997d1cad2c88816264,2024-08-01T13:50:04.330000 CVE-2024-30214,0,0,cf5accb9e4a3278486a75d6623c8c03abb4ef1fc50fe46650d28f97df932b65b,2024-04-09T12:48:04.090000 CVE-2024-30215,0,0,3576a060ab4a3509fa025a4a09e391456b98e8a3ff1f9ef6a6adfedd520e279a,2024-04-09T12:48:04.090000 CVE-2024-30216,0,0,317fbed0703b9e56e6e6659964629ef86247b3618fd61971d8544005edb73b9f,2024-04-09T12:48:04.090000 @@ -249578,7 +249579,7 @@ CVE-2024-30217,0,0,dc7c143bac3a66c1917b4b2e1e571544199576af15f1c229990a317af3df5 CVE-2024-30218,0,0,8a69e19ff6d45dba2fc3fe9cbec76c5157ffdbe210f0a0375f9b6ca12b157aa5,2024-04-09T12:48:04.090000 CVE-2024-30219,0,0,e6100c0137a699edfb0c15a70af61a917ad38bd0c6227c40710c0573a54e1d6d,2024-07-16T16:15:04.540000 CVE-2024-3022,0,0,5e468669a1bf6780e691c70abcdca6d29e576f4158c740ba44cf88cd33320476,2024-04-04T12:48:41.700000 -CVE-2024-30220,0,0,6b735c577e1d4d78e782730e5ed8271cfad6577774bba882ba5e903510608813,2024-07-16T16:15:04.620000 +CVE-2024-30220,0,1,0c5ab53838d94c0d7e4c5ca4fab9c38fcaf3d4731c2422da4a149c97fbb980f4,2024-08-01T13:50:05.380000 CVE-2024-30221,0,0,60503b0757eb3e6ae5c4a370e2b2aa26e094e331f3f353f6cb76be9c2bb29789,2024-03-28T12:42:56.150000 CVE-2024-30222,0,0,e348d70efcd603a5107aae224c9df0e897e05ce6dc9b3633231967bbb09cc533,2024-03-28T12:42:56.150000 CVE-2024-30223,0,0,4ad429ba9fc162d2613291661ce362092327ff2aac3839cd7bdf7fd11fffaa5a,2024-03-28T12:42:56.150000 @@ -249621,7 +249622,7 @@ CVE-2024-30256,0,0,e75ede031c606ce2d7acc4bf8feac4bfef2318338ca7923c8ab4e53bf9fd6 CVE-2024-30257,0,0,2d2c79320eb6c250ea218b9d65d00438f3ab1d1d66b22bbb47986039a76c7abd,2024-04-18T18:25:55.267000 CVE-2024-30258,0,0,be4f589c49b014055159a05f1829800293febfca8e38460140d450bf4dee3e99,2024-05-14T16:13:02.773000 CVE-2024-30259,0,0,aeeede919b2ae279a309f635ca91bd3e6ced2bddd6e440037e1bd79ca18f797c,2024-05-14T16:13:02.773000 -CVE-2024-3026,0,0,d8648605f96a408a42be3135a2a6422aab4fbcefbe357545ef8a79ba2f2cf22c,2024-07-15T13:00:34.853000 +CVE-2024-3026,0,1,67256e726c278d618f4bad83a0a5e66ac135a19e38cc5b819c5023981102a9c5,2024-08-01T13:56:16.607000 CVE-2024-30260,0,0,d4130271cfcc7874f1662bea57df5c1a7f2253137b955f8b0920fdb6f8477d01,2024-04-19T23:15:11.047000 CVE-2024-30261,0,0,35caec8710f0a2f113e57c18f5aef464bdb17f669f2d2a7adbf2cdcb914bd28f,2024-04-19T23:15:11.137000 CVE-2024-30262,0,0,ab567f2dba8b2c5754e6ed9cfdf366e621e451f0ffe30dcd637b80052818cefe,2024-04-10T13:24:00.070000 @@ -249768,7 +249769,7 @@ CVE-2024-30410,0,0,fca832d5c79373d5d2bc2b14a6fdffe9b6a0e9a638ae62f0c02b9aab71e51 CVE-2024-30413,0,0,db36c2dcdda72981e169f95c485b18e921acb630730d663de43194e7499ac79a,2024-04-08T18:48:40.217000 CVE-2024-30414,0,0,d904a463af7ec8f26d5a2cf9a871b8c069a365f9cfdaf7d965ecc50c1daaf115,2024-04-08T18:48:40.217000 CVE-2024-30415,0,0,f281fed7c3faa7dc041e240ec4e6ac1c46962cc31332fe749fb4d64177e3d2e4,2024-04-08T18:48:40.217000 -CVE-2024-30416,0,0,61a200c51aaca95f08bc0dfe8622529312120fdad7a2c9c6bf1700c3d850a667,2024-04-08T18:48:40.217000 +CVE-2024-30416,0,1,d291744711f1dbb5817510d2d6fc5de3fe8fd84c6a61838c148f9e7cfacc8058,2024-08-01T13:50:07.780000 CVE-2024-30417,0,0,454137694c003758247b4c0acabe990dae4347bce9b044c8ece06c3d4e475793,2024-04-08T18:48:40.217000 CVE-2024-30418,0,0,1df5cc20895f4454a18a9db65101208a879bcf1e74b024a952998a5645fb82f8,2024-04-08T18:48:40.217000 CVE-2024-30419,0,0,2f530b202492e52318032e7619655e6192edb2822beab428ec9cba2b2427cda7,2024-07-03T01:54:04.563000 @@ -249827,7 +249828,7 @@ CVE-2024-30468,0,0,657b19720c7a7f72ce29247c42940126c9b095c85b3af6afa14cec4927288 CVE-2024-30469,0,0,5f60e05589c3ee2464f9657ee501b05ffdf6e5d6a13b3d79ce37326fbe7f6667,2024-04-01T01:12:59.077000 CVE-2024-3047,0,0,b22e2b3bd3f2ea2e1a9b8967138f5d24af468217212d0308948532706a31b398,2024-05-02T18:00:37.360000 CVE-2024-30470,0,0,48e5d66dc273af24da4e4b7519926c3e97f1d38856b041954b60e69533ae4645,2024-06-10T02:52:08.267000 -CVE-2024-30471,0,0,79659bf7d789b82a7e19ed443423e3fa13ec0376dddc72d808cfe63edcab7726,2024-07-25T13:39:17.913000 +CVE-2024-30471,0,1,d2c7175a640d9b74965331cf8285959ab05f361410426a885e08e10d5fad74e2,2024-08-01T13:50:08.403000 CVE-2024-30472,0,0,00bb1b58fdab892a36ea40136ac2fa59e308dd9cc355f92e428b81257afaa77e,2024-06-13T18:35:19.777000 CVE-2024-30473,0,0,cc643ea6610c054923dcda820bdbaeee3470f2fed9befe993862cdd8d56027e3,2024-07-19T13:01:44.567000 CVE-2024-30477,0,0,2a9c94bd63166efd66be5d42497334130f49f4b0acff68b2e8385a53a877c218,2024-04-01T01:12:59.077000 @@ -249923,66 +249924,66 @@ CVE-2024-30560,0,0,29358f4cfba46b880efc18b382f49655b8da1f57de09ea2f3b221ee017e11 CVE-2024-30561,0,0,317571b22962e8d6e5d0cb62ac3952d7d76cb14c6191157ad5ef89ba7149e860,2024-04-01T01:12:59.077000 CVE-2024-30564,0,0,92e98c5dcd641d0673e96635e88dfdb173d7997e6d4761f483834203fe7a9974,2024-04-26T04:15:09.020000 CVE-2024-30565,0,0,3bd2e856e06d3e3fe9f747497d3ea242e07c951fa4c500c8b76a56b8bcb712e0,2024-04-04T12:48:41.700000 -CVE-2024-30567,0,0,f40756995af7f7bd482f11e7e1c35e7285bce58843538b6fa5db758220cedab0,2024-04-16T13:24:07.103000 +CVE-2024-30567,0,1,f2a4d1211b738fa363bb6c48ea72578b3372d81c87f66a2aa1c7f2df3ee8bec0,2024-08-01T13:50:09.870000 CVE-2024-30568,0,0,9a768747587e32a201933390f9d26b02cad0ce3e0c3b3cebafe23870ef05160d,2024-04-03T17:24:18.150000 CVE-2024-30569,0,0,927373a4f296e28220cb38df1137df4e0bb8bd499fda93ec080e07657fccab94,2024-04-03T17:24:18.150000 -CVE-2024-30570,0,0,20afd16d8cb7f8ba356b316c2d1a749b22df0a5ab1bf2762e07c2c185eb8e37b,2024-04-03T17:24:18.150000 +CVE-2024-30570,0,1,f26413ea64888aee7bf2b0a0614d0ba33fe6749eae37d519e7b2003642262e6e,2024-08-01T13:50:10.667000 CVE-2024-30571,0,0,d0b0ce739c22bcaf56190db28e9a8c1e2be7759ce3e5fac8f0fae70b3abe2c6e,2024-04-03T17:24:18.150000 CVE-2024-30572,0,0,04b75791693e289b4034f3fd29a8b35bcf61baa8fe2d36e853f3fe35bb0c8981,2024-04-03T17:24:18.150000 CVE-2024-3058,0,0,5f720c32116b174cb7fa6caebc65ad64bae20a551d5ace61f30cefd538f58d5c,2024-04-26T12:58:17.720000 -CVE-2024-30583,0,0,da1e65d1d086b5435b2831e42051600214421fe4b23a7fe0e22acdbb19a5b37c,2024-03-28T16:07:30.893000 -CVE-2024-30584,0,0,d1ad42c9eb6e88db7e5497c0356cb8484b61d5c69315506c3f34aaaf5316c899,2024-03-28T16:07:30.893000 -CVE-2024-30585,0,0,8c699ef0c1a5826fb546659c6347ad35cdab8c190d049d5a6ed8218011ecb12b,2024-03-28T16:07:30.893000 +CVE-2024-30583,0,1,83e4e63e6b9ab686c570457f3785d5d14cb1cae9d1e0a6f75af68ee13c5368cb,2024-08-01T13:50:11.490000 +CVE-2024-30584,0,1,f701e5fd70d7bcd699c1a3224ca536a57369241ce9d81d5610208a9f0a05164c,2024-08-01T13:50:12.260000 +CVE-2024-30585,0,1,96551bc458d5db42f46061bae1e9919916a14761a04e80e4824fb8b8309c1b5b,2024-08-01T13:50:13.033000 CVE-2024-30586,0,0,8e755ffe70a3dbe961f7eb3bf161914532e2e9da13607d64f0ca9f6645075818,2024-03-28T16:07:30.893000 CVE-2024-30587,0,0,26212ffc265137b5577f89aa78a083bc0658db67b4db407e10f98531cc831f9b,2024-03-28T16:07:30.893000 CVE-2024-30588,0,0,2345f6bc3b620665166964e952efdac6c0109161222a06a8eaa75875da5f9657,2024-03-28T16:07:30.893000 CVE-2024-30589,0,0,eeb0f22edaec08bf5333246d5bd404088aaa0d7942bd367bdf97d9adc8a410cf,2024-03-28T16:07:30.893000 CVE-2024-3059,0,0,efb84c5280bb6d93917140ecb34e4d9d916e8aaa9c3b2370c96c352f4a530300,2024-07-03T02:05:57.660000 -CVE-2024-30590,0,0,128209244c90e311f5f039c2f007be8d4ef1b98aaf5de7a42c413111535fb1c5,2024-03-28T16:07:30.893000 +CVE-2024-30590,0,1,74e13fafb4ea3fa2c3367d4c745d913b8700a9f648c307a3b7eeb10d783ad4d0,2024-08-01T13:50:13.810000 CVE-2024-30591,0,0,e75a0dcfcb07a21c8d312cadcff98d8748de148e045209e07a96a4401e42a2fd,2024-03-28T16:07:30.893000 -CVE-2024-30592,0,0,78675c3775652283281728468704e53263c44db06ce1f01d2ecba24c34103fe3,2024-03-28T16:07:30.893000 -CVE-2024-30593,0,0,6b8ae70254480fad0f537d69eea0da236095c836d110503d8e109e1202c5c7a3,2024-03-28T16:07:30.893000 +CVE-2024-30592,0,1,507c49506de5111d6c96010bf6286cc127ab92c8bc8bbb896558bfe34d4346f9,2024-08-01T13:50:14.590000 +CVE-2024-30593,0,1,408d3bb4f55aa72702260e4a6dec5da795a667370808b6fd57e94ac266b7ab6e,2024-08-01T13:50:15.377000 CVE-2024-30594,0,0,ce4a53a331ecd421eb2fe8279ad75b5c673c19b0e503b5e87f671e4382dc1d2c,2024-03-28T16:07:30.893000 CVE-2024-30595,0,0,4cbe3a1903ff2e8fa29d74cbfe2f90b968c54e4378a49a8e7a552056ca416818,2024-07-08T14:18:21.630000 CVE-2024-30596,0,0,b99268a271e891ed91b1faac1e391fbc00311a41d4ebf80d4427b85cb8e33608,2024-03-28T16:07:30.893000 -CVE-2024-30597,0,0,2e2bf0005cce35194c71f7247bd9905352bb51dfb7f0bf3bdacfb44354137113,2024-03-28T16:07:30.893000 +CVE-2024-30597,0,1,850e4910803a98578d5f042e07a5f96647f12b4e67d43adaef74644382ed2f1a,2024-08-01T13:50:16.157000 CVE-2024-30598,0,0,5522799fef0d78c0e4f9a84a19e85c4ae628d4ef9d72cf9af60f6cc653518431,2024-03-28T16:07:30.893000 -CVE-2024-30599,0,0,d903bd92d545bcddabfae7fbdaad85326dcc7a071824e22e439f31bcc6231845,2024-03-28T16:07:30.893000 +CVE-2024-30599,0,1,a2de538454d934b66527a50625bb2ef5a8d7c80970adc9056aac0bf14f9e96b4,2024-08-01T13:50:16.990000 CVE-2024-3060,0,0,1a2ca1531bb6941b20d9224cca8c4925ba7109cf026646e1258f2bbe2b20e308,2024-07-03T02:05:57.883000 CVE-2024-30600,0,0,fce9a7554c9f0f1b0d9fd07c807d160136a357b6c3f88bd0a420c4dbff802c92,2024-03-28T16:07:30.893000 -CVE-2024-30601,0,0,964fb6c09657205bc79124a52238590db62b715ee0794e2f31acb678530fb045,2024-03-28T16:07:30.893000 -CVE-2024-30602,0,0,fdaaa608e62de9e3869b12f1a60a0739a997089c8b698c3e8c7a99a84ce8972d,2024-03-28T16:07:30.893000 +CVE-2024-30601,0,1,9dfac2db560029d7902d4500ce4b1bb8d72ada7002cb3387b6f0aab6501b5284,2024-08-01T13:50:17.780000 +CVE-2024-30602,0,1,9c40cbab2c38aaca828b52186223e1df82fdb31d9cb7460440b4892a59e5cdd5,2024-08-01T13:50:18.560000 CVE-2024-30603,0,0,b70dc9b9fa85e6cbac54af7fa1a3848a23e38b6e996027654cea5d336dfd84ac,2024-03-28T16:07:30.893000 CVE-2024-30604,0,0,060b968f0ffc4c388f441f2bffef7d326f7c284352f55ad52e5dcef963cc081c,2024-03-28T16:07:30.893000 CVE-2024-30606,0,0,76de4dfc14eb6a90a04553ed0c6c96b418361d792a57179120d50d712b7e4c8c,2024-03-28T16:07:30.893000 -CVE-2024-30607,0,0,87477732c4b7b1c55c171d5b64186f5092543cc4d9b026950432618ccbbfdf64,2024-03-28T16:07:30.893000 +CVE-2024-30607,0,1,3081b4056d2297b344e88d45dd81bdc04741e21824330f0904116519e8c0505f,2024-08-01T13:50:19.340000 CVE-2024-3061,0,0,4efd703c3bf27329551bb8c57b6ec5103d42ea334ef6d9361feb4d292b06b081,2024-03-29T12:45:02.937000 CVE-2024-30612,0,0,8c366cfa1c306b9a9e7f33e1c4dd4ac463bf2fdf63b3697b6fb4062c73a37bd4,2024-03-28T16:07:30.893000 CVE-2024-30613,0,0,56ba7e648badf9a6ca44a03f1383cfd7304bb9db78adddf0d85e71bc9fa51a5c,2024-03-29T13:28:22.880000 CVE-2024-30614,0,0,70864962c71d46c273106725c973080a3fb9295eb2c95d98fdaa16c813277ea2,2024-04-12T12:43:46.210000 -CVE-2024-30620,0,0,92485ad5a8e91fa8f4e58b33144a4fbef1387b6569ce43f09319b5817b7b063b,2024-04-08T22:48:50.340000 +CVE-2024-30620,0,1,cb2dae6c6270bb539b2166cb7fc038684b4c961f4662350232b399db4e69aab4,2024-08-01T13:50:20.133000 CVE-2024-30621,0,0,f1fe1ced472b52b5106f4bb104d36eea881b5ba60acb8d11a8d4b770ef9cd4b9,2024-04-08T22:48:53.950000 CVE-2024-30622,0,0,39f3e190be508e988271a0de2e47f955a00ce78f04194117f88d022070c82f32,2024-03-29T13:28:22.880000 CVE-2024-30623,0,0,068ad85c64fcd7c5771be6968a3fe4899f42b182e4626cc9e0835726390d147d,2024-07-03T01:54:12.180000 CVE-2024-30624,0,0,9f0b6bbb0cdd2fc5e8275cfdf473e348e809449e2b22ebe6778b91e551369404,2024-03-29T13:28:22.880000 -CVE-2024-30625,0,0,97e5787d84ff6705a9a984e7e27331cb3daedab0635e116cce68cb2205963155,2024-03-29T13:28:22.880000 +CVE-2024-30625,0,1,c1d8544845866766a9c20cd1dd31dab57f6c7377e49b11e4618d24aa420ac546,2024-08-01T13:50:20.930000 CVE-2024-30626,0,0,925435eedf5e0aaf58b72dd75ee5a85aebac0837c913b2b11ec6619fafacc6ae,2024-03-29T13:28:22.880000 -CVE-2024-30627,0,0,227c22ba1a84838a47aeb5de92b38337f5fdb2baf0c4d3e86368d45ac7fd6a12,2024-03-29T13:28:22.880000 -CVE-2024-30628,0,0,7b3d6123b3bdd8a92c4a536464d049e45e30c7617d7faf3a7d1a800ebe1ec01c,2024-03-29T13:28:22.880000 +CVE-2024-30627,0,1,b1dca4695abc9495ba7ec29f0112baaeb190e4bfd416384d570f2292f523f60d,2024-08-01T13:50:21.693000 +CVE-2024-30628,0,1,dd5c2dbd465b741a9303d4905928e279a9f9c188a8cfae6b104c76db64b76117,2024-08-01T13:50:22.470000 CVE-2024-30629,0,0,065564e121e3b652e8f433bc4bebac9590da04ba26d95145648a65cf0a32cc7a,2024-03-29T13:28:22.880000 CVE-2024-3063,0,0,e4ccb06d5ff3e906359417688d6094345cf7b0c3520fac98072d600493716bc5,2024-05-30T13:15:41.297000 CVE-2024-30630,0,0,d1f2c24f30d736799fbd9614b05322c8af9640ffb03dab0097ee140dec9fb5dc,2024-03-29T13:28:22.880000 CVE-2024-30631,0,0,8bd07b7cf8d07887aac012eec13f8ad59ce6200df60923106722dfb0abd69c71,2024-03-29T13:28:22.880000 CVE-2024-30632,0,0,83cac55fd4836e72e0e62bb030e60c6b8eec8f95446dacdfd0035ea7c9069b4e,2024-03-29T13:28:22.880000 -CVE-2024-30633,0,0,de611030fa2aa2b6b83c1ef9a949ecdaa96d680e26346bf32c2fda7dd1e34eb6,2024-03-29T13:28:22.880000 -CVE-2024-30634,0,0,fdc94f9f865d8b00f6da54974078ee6f2229d6e95fe2590f2af1e8d6b4559301,2024-04-01T01:12:59.077000 -CVE-2024-30635,0,0,529d14f36ed4b1e4d0da50b0a111ec3225f4d27aefe8cec2bafbfd27249bd0f9,2024-04-01T01:12:59.077000 +CVE-2024-30633,0,1,0e20fbff7533df843343aa1ca8784af549e42237ddf63007c09299ebacdd216c,2024-08-01T13:50:23.153000 +CVE-2024-30634,0,1,9a5935e8c0707d47485f35151f5f78ee198d5683ff7c1df187b9b9e0a14e2e20,2024-08-01T13:50:23.927000 +CVE-2024-30635,0,1,9867b65ad790b03849102a4433871e5822d9883f60fd5996addd4ba7b4f88aa1,2024-08-01T13:50:24.723000 CVE-2024-30636,0,0,7706c251cc6730da406f80ce2a2cf3af8e2faaef16970992a4ea0e2557948f7a,2024-04-01T01:12:59.077000 CVE-2024-30637,0,0,4903be2e34292b70c4fd64a16207b4d414e56da06073b801c097feb452620a21,2024-07-03T01:54:12.967000 CVE-2024-30638,0,0,f08049db5a759cc7009df3a7caa9985db3645ff6dd5bbe596f160b2c7b0dbf69,2024-04-01T01:12:59.077000 CVE-2024-30639,0,0,cd3ec80806ba7186e56079017f52ba70f82561d29b942affd85b213d0a656871,2024-04-01T01:12:59.077000 CVE-2024-3064,0,0,8a36a79ace74b39564c56ff7401e476ffc08c1a4de80ba6f8cd5a5d5cd60f7fb,2024-04-10T13:23:38.787000 -CVE-2024-30645,0,0,5716f39d8e987f1f04ee021e4592a138c7a0622bd6f31d8f4d1e496a5ebb3ffb,2024-04-01T01:12:59.077000 +CVE-2024-30645,0,1,77873f1c56920b575cbc0a26f80968d9589bdd66fb005fe46610787de441aca3,2024-08-01T13:50:25.530000 CVE-2024-3065,0,0,0bda0f080fba1f5572d33c440e40f60c6a3ce2d985dfed057962a87436804b26,2024-05-24T01:15:30.977000 CVE-2024-30656,0,0,2a0fe69d1e3a24b032821f19ada467d83a25099df7b1313f53c857fcc2f0c81c,2024-04-16T13:24:07.103000 CVE-2024-30657,0,0,aafd37252d8cd76cc88d27e5c06a74ee401323bfc2559b7fbd8004e3865b18d4,2024-05-27T00:15:08.743000 @@ -250058,26 +250059,26 @@ CVE-2024-3078,0,0,42b453b3e6a827e37a8a77bcf4c4ca7669e48d95d9df326c975a16f05e6cc7 CVE-2024-3079,0,0,f1f95675216f703c162f7205baecbbd680e7e08a69a3f6cb5ab9f6df26e36eab,2024-06-17T12:43:31.090000 CVE-2024-30799,0,0,d0be2d0f006d2c4f92e204846e2ae37ca4e292273d3e14437b5fe8a98380dd9a,2024-07-03T01:54:13.747000 CVE-2024-3080,0,0,6986301309c9922bc02fa19392bc6067c49e953b2f624eb66756f4ffea7fbe9a,2024-06-17T12:43:31.090000 -CVE-2024-30800,0,0,0821d6c5762542cf57058639b308e934860f4fe6fa29f94737b84029e48a9be3,2024-07-03T01:54:13.930000 +CVE-2024-30800,0,1,c159abf1d20ef9221dca0ce07749c41b848d269f6d72d244107e748c6895169d,2024-08-01T13:50:26.523000 CVE-2024-30801,0,0,b9e13476cd40c68a77fd97380504b5cd75decad73d6599b5a61dc71509c3272a,2024-05-14T16:13:02.773000 CVE-2024-30802,0,0,37683b49f88fa426fcec7397572b9c76113c55e23f5ab472e56f33731e38df96,2024-05-14T16:13:02.773000 CVE-2024-30804,0,0,c8ff423e3540a19b0faa1f1a1a616d5872ea6369d2742217c6f7bd92e390eb83,2024-04-29T12:42:03.667000 CVE-2024-30806,0,0,69d03451e34851319586e66efe84d4aaaa1374f82acfc9b49736cd881cce5ca7,2024-04-02T20:31:58.463000 CVE-2024-30807,0,0,4152651982bff689cfa963c375e94b647d4d42e48408c3cb0b93ed4cc183ecd1,2024-04-02T20:31:58.463000 CVE-2024-30808,0,0,156121cad1cb8b48efeaec8ac2958220fd52aa0ba41912798852a887abc4f701,2024-04-02T20:31:58.463000 -CVE-2024-30809,0,0,58fb0b648306f047aba385a4f82344252b50e4fdecb2dc71da8dfe6f60e19038,2024-04-02T20:31:58.463000 +CVE-2024-30809,0,1,1fcb0fd8f1a39e7f469bccbb27a3f6f436aa5c361167acbe3a36e26117f3ec6d,2024-08-01T13:50:27.443000 CVE-2024-3081,0,0,01dfa9fbad742b3b5c96a84664fd07fad21a9856f0e0dafe766309ca8f119c58,2024-05-17T02:39:42.433000 -CVE-2024-3082,0,0,446c0010a211551a8fc0e9a09bbc18130c8d5e860bd46145e72a42276f26c5f7,2024-07-31T14:15:07.157000 -CVE-2024-3083,0,0,b3007cf9b28e8bf86a8abcf0851cd04e4e6136e293202f75986885c8113e4d2e,2024-07-31T14:15:07.433000 +CVE-2024-3082,0,1,2092f8af38d0dbaaeb2c9de76a4486091f2b5b33e10ac0da20ccc0a918255129,2024-08-01T12:42:36.933000 +CVE-2024-3083,0,1,3b0acd3fd68908e11f3ad066694098b7478a9f1ccccf5339364fce266a8da42d,2024-08-01T12:42:36.933000 CVE-2024-3084,0,0,305df29625577e6dd31738e34631201c5ea39f1d684ffd5f5306069a5e541323,2024-05-17T02:39:42.520000 CVE-2024-30840,0,0,86698626452936acf43a8d936d3a900102fb950ec252f61138428e4da09a69d2,2024-04-16T13:24:07.103000 CVE-2024-30845,0,0,76935f5a808359b33b84594c4799e1bfdd6b3d8771fa4780e8d409785d9dbe54,2024-04-15T13:15:51.577000 -CVE-2024-30848,0,0,bef9ebaa37b2fd1901b24c4f2514899f29796f5728c53a26b96e6effb25a6c50,2024-06-21T11:22:01.687000 -CVE-2024-30849,0,0,4a33638d40768ce5fa91c3f874e9332bbbed727df143091621767c9032700a77,2024-04-05T12:40:52.763000 +CVE-2024-30848,0,1,e520fc03d7d120883158934b80667a2b4d6398e475b39bea0f39a4affc9e9f6e,2024-08-01T13:50:28.210000 +CVE-2024-30849,0,1,4b2a4ccd593d26ef45288147032dbc711b9bbef7de8ea7827855efca75655daa,2024-08-01T13:50:28.983000 CVE-2024-3085,0,0,509209dfddf53f9b46075ed419de44cbb1f67edbb1a1b964fb67c8391adf6753,2024-05-17T02:39:42.607000 CVE-2024-30850,0,0,38a1756acc49f668f5841f513a1e63d34dbb4cec7b0eff4d2738aec5335923b1,2024-04-12T12:43:46.210000 CVE-2024-30851,0,0,50f4be60cfd340e55ad1701da02739f1151719e7af37a9957f274744dd91c34b,2024-05-06T12:44:56.377000 -CVE-2024-30858,0,0,e39b1087d0d8bba032a48a7495f1e90281550b18ecb758c4091a93e2a8055913,2024-04-02T12:50:42.233000 +CVE-2024-30858,0,1,93e0a53927efd0637571ec0f8079f664a09ad42dbc1f395dcf941f97a4b21575,2024-08-01T13:50:29.850000 CVE-2024-30859,0,0,dcc14059b27feeea26d9d009413fcc85de43434a5e7bb7968f49f533aa09bfd5,2024-04-02T12:50:42.233000 CVE-2024-3086,0,0,bf4cb4e0e77596531b4d2ac34fc073ac688bdd0873b18b3978dd0f7954009022,2024-05-17T02:39:42.693000 CVE-2024-30860,0,0,a81c8019ce1e5c73d7919fee5781bc0c6898c400740936747559b9ce95ec009b,2024-04-02T12:50:42.233000 @@ -250088,7 +250089,7 @@ CVE-2024-30864,0,0,e04c733145e51290e0b4b760b29d1c4c2f4d6a6d5789b7b3dce3f78c10b78 CVE-2024-30865,0,0,254c862cd6b795574f44fcd6ed5d7af8cb41f2d7e569e6e109eacda39d99bdce,2024-04-01T15:53:18.060000 CVE-2024-30866,0,0,873896b9e8284b0b50b0c91e1fcdda6fa55ab02ea31746d19e148772dd1bb8ac,2024-04-01T15:53:18.060000 CVE-2024-30867,0,0,fbf3f5ca73df140136450e529bc316e8848d5d3ecfcec233c1b829a9bf6a2c80,2024-04-02T12:50:42.233000 -CVE-2024-30868,0,0,9052dd26db3edca0b0c3b4807c224f7f1431e8b00d8bcf420ca83c7d4f2180ae,2024-04-01T15:53:18.060000 +CVE-2024-30868,0,1,40572fc00d47dcab0a02e3b982268eb31daa0424a9f9ba994981729836c30bef,2024-08-01T13:50:30.630000 CVE-2024-3087,0,0,69d2e87c7c87bdc5c6a0aa1788aa50fe5b44316fc88ba1cd34f51a4a48534d4f,2024-05-17T02:39:42.787000 CVE-2024-30870,0,0,8a66b70d7e08d6e143afbf825f98a6ba6d06ae59b7f91ca0bad528ec96185fb2,2024-04-01T15:53:18.060000 CVE-2024-30871,0,0,1fbf8b12b737ec1098d29db0fb5168d0c982b29796f19ac15f837be235dffd07,2024-04-01T15:53:18.060000 @@ -250096,9 +250097,9 @@ CVE-2024-30872,0,0,f4c68436231336d4dfed85be3bb02cc34ef76405f018ff6a0b0b786c70627 CVE-2024-30878,0,0,21b1e9cb6e80d2eff229006b5f8418d6d6360e70820dbf7044b36f5f56cc5c12,2024-07-09T16:22:30.387000 CVE-2024-30879,0,0,1301a0d53d8ce6102d32b653bb55ca8eae261084329d07814fddadd6bf631c71,2024-04-11T12:47:44.137000 CVE-2024-3088,0,0,51ab9704d15ab90d01da05f05b0237355f0d32494879f94b17ccadec5ea4f6d0,2024-05-17T02:39:42.873000 -CVE-2024-30880,0,0,517402323d55469f9302ff385841b3e7ce09e381bd73ffa1f76b95594803c19f,2024-04-11T12:47:44.137000 +CVE-2024-30880,0,1,96833c6da8b722f149fb59bda052ae3acf51b2dbf7db685f3dd13fb70ea6d96a,2024-08-01T13:50:31.417000 CVE-2024-30883,0,0,797b2441b715707191740c9fa7df6d1b293fbe4a72a5d05afa9b676f71d49814,2024-04-11T12:47:44.137000 -CVE-2024-30884,0,0,a6ce1c5f9f8524f6d79e7be6e91957b404de5ae0d95c05d8ca0d090ad7fd60c8,2024-04-11T12:47:44.137000 +CVE-2024-30884,0,1,453cca54472a26a8ca3d84c4d89a94e0d61ec7afc409128696362f32ae3d409b,2024-08-01T13:50:32.180000 CVE-2024-30885,0,0,825f7aae44feadfc4199050283e8cd02df667be35770719d5832f7a196d5ce12,2024-04-11T12:47:44.137000 CVE-2024-30886,0,0,f2f9cff4b188182c05abf9de78995a4c869608fcb72c28fbeaf336edac8c064a,2024-04-24T13:39:42.883000 CVE-2024-30889,0,0,42fe86ae379e30ddc3bbc82898a87f8f925148622d04de1fff61b07999c16695,2024-06-06T19:09:09.840000 @@ -250109,7 +250110,7 @@ CVE-2024-3090,0,0,ca58ae48ece7b5420c70058bc4ef34d34b72713bd9fb9580ab51af080cd6b6 CVE-2024-3091,0,0,ac47144b8dcc6e68da1982025c8274e4d7559a0b603bbff8eb392c09297cdc97,2024-05-17T02:39:43.130000 CVE-2024-30915,0,0,4a451061f2277273de3f1e30d4e5402fc40c4a77bd4f2be73b5ddc38a083afc5,2024-07-03T01:54:16.067000 CVE-2024-30916,0,0,65b708466921a9d19cc0fec0caa9405effc4152a546ad8c6e2d372d2c090232f,2024-04-11T12:47:44.137000 -CVE-2024-30917,0,0,3f08260b71984d1e1fb515146352a31b6396b5e296312a1577dc745fef28fe51,2024-04-11T12:47:44.137000 +CVE-2024-30917,0,1,518a1127e465700f6e972bd8e63f5337a0f1757190bd9445ee1667e8db87d7d7,2024-08-01T13:50:32.947000 CVE-2024-3092,0,0,58e4c2f42c32b89d77c71a34b852d576a28801e4a89752dc17e73517fbf96095,2024-04-12T12:43:57.400000 CVE-2024-30920,0,0,755e5fd72bb1859fa0ef82051ceaafd42ee2d81708d249e6f1a815457a0034d0,2024-07-03T01:54:16.273000 CVE-2024-30921,0,0,8e85a33db60f73a94dcc7d8613386cc444fa7f9176c5206bdd02bb45585e34b2,2024-07-03T01:54:17.057000 @@ -250137,36 +250138,36 @@ CVE-2024-30965,0,0,4c562abc1070b2e5650b14ad7d5d2a0f4b08c19f7cf7aa86c4dd98678b46b CVE-2024-3097,0,0,03b3e7564267ff07f8cace13ef2c68ecb9fd2e91e4d1ffef233c9c406915f0c8,2024-04-26T15:56:40.820000 CVE-2024-30973,0,0,db33409cb251336dfa2ea63d0601c6e43be1b7f7bb5f1222b94218ef77cf5375,2024-05-07T13:39:32.710000 CVE-2024-30974,0,0,58d798e5f49d558922aa7ff1fef01b969ff326cf30be128717719a7efa0d452a,2024-07-03T01:54:28.233000 -CVE-2024-30977,0,0,33d8f9e60729a395f54cd05950b603d6dc67abfb84249b1e5112e47c873de3fa,2024-04-08T18:49:25.863000 -CVE-2024-30979,0,0,9f80572a68129dcd0f3ecacac2d73be6fa3d0bc5c4f4f82862ece359f2305ecd,2024-04-17T16:51:07.347000 +CVE-2024-30977,0,1,9b376b5c5f8a7d223f02e67924cfe92b95db4973b1a024096b86e14bd3b11f55,2024-08-01T13:50:33.723000 +CVE-2024-30979,0,1,24f82048641520e72e58ea7aed78bf2b0f6627b87f46428b11f3023d9bb8bc03,2024-08-01T13:50:34.503000 CVE-2024-3098,0,0,0e21f9cbe7afa768b789166e91e9a473ccedf7863a96176e7422e53994c073cc,2024-04-10T19:49:51.183000 CVE-2024-30980,0,0,613d9cb17ee541690707a6b0040052c9c3b4aa166d3150319561fdd584ebec6c,2024-04-17T20:08:21.887000 CVE-2024-30981,0,0,81ff6a46243c7a5c52b0937ea3bee82cb4611dbc80eba5e29f640cdeee5e81ee,2024-07-03T01:54:29.020000 CVE-2024-30982,0,0,abb92dcf5227f0de2235f83151bb4c17ac247815f1c0f47d65a9b4e12810b860,2024-07-03T01:54:29.753000 CVE-2024-30983,0,0,2cbc024ca963a2060abcda8a643819af2c23ea3b93fff72c45a96443fcc25e13,2024-07-03T01:54:30.537000 CVE-2024-30985,0,0,b25f3bf5c3a4d3f24a10ceee3cda1fdaa58cf215787fb052566fa8895d17f665,2024-07-03T01:54:31.323000 -CVE-2024-30986,0,0,9e024090c6bd82522513c4f33f5598ef7be250d40e4aa5f8650e7c0d9b0a5a84,2024-04-17T20:08:21.887000 -CVE-2024-30987,0,0,badd0a60b898458625ee0a14e650d264b6facca2bb1a54e630edbcb3bff5399a,2024-04-17T20:08:21.887000 -CVE-2024-30988,0,0,796970f0357d11c2c9be85c4058bbb9107314b990c54ba2bd106cd1234d80914,2024-04-17T20:08:21.887000 +CVE-2024-30986,0,1,50bf73db50b86d4c968284f5c4b0e8d0b6efe4fcd4367f443266d913e675fa5d,2024-08-01T13:50:35.277000 +CVE-2024-30987,0,1,d1d62de096c2c3115b43f8fcf5757229f772e23999bb93b7a966e16e64b7f7a4,2024-08-01T13:50:36.050000 +CVE-2024-30988,0,1,01d0dacd03ce1e26e7a1a12da7c9a8997536bc1daebf62cfd5619e9d35194abd,2024-08-01T13:50:36.877000 CVE-2024-30989,0,0,e9ad3f0fd7b020db169e00582a63ad0d4a4ddd2830c93dde81a132eb7fa9369b,2024-07-03T01:54:32.110000 CVE-2024-3099,0,0,df7fc1fafeab5e6abe2dc41108eea9b5e0baaaf382657013f126d487be466964,2024-06-07T14:56:05.647000 CVE-2024-30990,0,0,75078c15117c3d94d275d45a8f694936bc8470fa4ed9b39cfc5d97a4cf718730,2024-07-03T01:54:32.807000 CVE-2024-30998,0,0,da4b5211250ee31c01d2876d9a181670c4277f656ba5b5cb3c1178d4a3b4b3e8,2024-04-03T12:38:04.840000 CVE-2024-31002,0,0,7f5ec80366933d2a8d8374c6c5487fd6c9116c6b3582b5408d061002d49ccb1d,2024-04-02T12:50:42.233000 -CVE-2024-31003,0,0,67edddbe74f7e1b0b2b755a1c021d4424e65eb0dfbd8dc9b2b0aa3da84759ef9,2024-04-02T12:50:42.233000 +CVE-2024-31003,0,1,4468ff6139dffd902d54dba282442b03643ad92e636b3ecc84e56f5157573f49,2024-08-01T13:50:37.813000 CVE-2024-31004,0,0,4704ee13f9f534d8c7bace10a79d7d4280ca43ae0178f7a716eda9d0db56ea6c,2024-04-02T12:50:42.233000 CVE-2024-31005,0,0,045b5d5570cfb671aba58425d476f29fa3e750f6d99363d9b536e986ebd3831d,2024-07-03T01:54:33.603000 -CVE-2024-31008,0,0,09a922cf78898457fce69b82c02964d8302ed2e340eca7805f77fd23d97de531,2024-04-03T12:38:04.840000 -CVE-2024-31009,0,0,659e1ba8ce03e40a6819ba2f93919c5e5a0c0f0b4b3d4f58b9a27c8f09449dd8,2024-04-03T12:38:04.840000 +CVE-2024-31008,0,1,a974f67fc051176587797d68bd7b8f7fe117012e84496a743cd76182b8fe18e1,2024-08-01T13:50:38.620000 +CVE-2024-31009,0,1,3077bfb383403641b21b3b69eff09950c4c56bae68058cba13568ddd6189034f,2024-08-01T13:50:39.423000 CVE-2024-3101,0,0,1fd5146e9cab2be40be9d13d1b212c0046155814cf3f9775411d080d25406f87,2024-04-10T19:49:51.183000 CVE-2024-31010,0,0,de46ff7a8243a7d0efcdf0f1cff832f2828b94d6a134c86cfab6131973a06bc8,2024-04-03T12:38:04.840000 CVE-2024-31011,0,0,c52737aeca85c35c7482037cc2da41eee9878f5e3873fa6e176e7a4d19947059,2024-04-03T12:38:04.840000 CVE-2024-31012,0,0,ad29bbd0b94faf76dc619f91628d5426bf4af8e806ebef2aed88b1cbb982c08f,2024-07-03T01:54:33.790000 -CVE-2024-31013,0,0,b100b20e07604f6d2f46a651c4190fef519b08a2da8824b0808ce6b8f66af131,2024-04-03T12:38:04.840000 +CVE-2024-31013,0,1,bb000ff328032a4f208d94fb503825f394fb805157b8cf8e3eb34f87d47ca3d9,2024-08-01T13:50:40.203000 CVE-2024-3102,0,0,b23588dfddb3d82632a71207907da6ef98bd35bc4bfa522f8686e7f4473229c0,2024-06-07T14:56:05.647000 -CVE-2024-31022,0,0,0a9fe836c271a87e036156d2c4bf149a84dad98d9581343b51a4296c552b1761,2024-04-08T18:48:40.217000 +CVE-2024-31022,0,1,c7e2196fc2144529ae779b7c6081e3f8d64391691f708665471ce7a0ce765e5a,2024-08-01T13:50:40.970000 CVE-2024-31025,0,0,f6815681c00034cb26fb1b993f08da7051c7712a081b04f3f2c6c1b167cd8d92,2024-04-04T12:48:41.700000 -CVE-2024-31030,0,0,7e8d8a160bc699d1874ea295777a7c4648c10ffddfab87bc399bdd44c8b8a662,2024-05-31T19:14:47.793000 +CVE-2024-31030,0,1,55e23e64b3707eab4de6e94c5df81025e4c96cb6796b4cba9a4e287691f568e8,2024-08-01T13:50:41.730000 CVE-2024-31031,0,0,22dbfc8ddbe94926f4450ce3680a694e3a6be4ac1b04af44fb2aad33642532ec,2024-07-03T01:54:34.620000 CVE-2024-31032,0,0,144966e50c1158b9000567e4c8a86d47234af0a2fb3b9449e4059bdb91d1715f,2024-04-24T03:15:05.933000 CVE-2024-31033,0,0,4ea0954a86e030c9e1a78dee34fda25d826ccd6d65237331411336d276f3225d,2024-05-17T02:38:58.313000 @@ -250174,19 +250175,19 @@ CVE-2024-31036,0,0,c1dc30371cbc232c45ce2a1ab5b75a9f53a1a706550cc27b167d070e5b7d7 CVE-2024-3104,0,0,e1dbcea3b82583c3a8bb219203e646c341fcc97755b89e1c83328a1d4d36d637,2024-06-07T14:56:05.647000 CVE-2024-31040,0,0,8cff83beadb4c661eae93230dc1b40189dfecbc2297bd60a6380f76952c5534c,2024-07-03T01:54:37.220000 CVE-2024-31041,0,0,1e28d1e3e8a1eb79805e190c840f78679beeca32a1e22fcb2bfe1394de19057b,2024-04-17T20:08:21.887000 -CVE-2024-31047,0,0,5a1d6e41fe0c5fa5115432ea709f356df4201381be6e7fd04b1b3be4544b8b86,2024-04-09T12:48:04.090000 +CVE-2024-31047,0,1,af5d8fcf98f981a9f813cc3db6d53189749ea7407eeff6f344af923836b4a452,2024-08-01T13:50:42.517000 CVE-2024-3105,0,0,d1365c4198fb5e36e8becbc41dad6d35b33f14f8f23909f9ba45f9f9d5508f57,2024-06-17T12:42:04.623000 -CVE-2024-31061,0,0,d2c1df81b6c9a2c0f1ea7e09c17490dbadc5b62ec49db113547eacc8def512a1,2024-03-28T20:53:20.813000 +CVE-2024-31061,0,1,66c585c6dcfe88f6d4ed833c4b2082d6859ef1b946fb15da1a412618a9ebff85,2024-08-01T13:50:43.283000 CVE-2024-31062,0,0,b5a9a4cbd113d85932da23971f519edde410a6db59033e4ad09ce76acba6508c,2024-07-03T01:54:38.023000 CVE-2024-31063,0,0,817f4808a125dae72f43a9bef3cbcdbe51ae973171c724a1dd6836c93fa99030,2024-03-28T20:53:20.813000 CVE-2024-31064,0,0,09fc7c8df13203efb1ca9057b678e29517d4a825c266b7d99eb7440ce2a3e41b,2024-03-28T20:53:20.813000 -CVE-2024-31065,0,0,7a59dbe54933bf84c1cc682e8d045b6969f111bdbc4c97f8279c44771dded5df,2024-03-28T20:53:20.813000 +CVE-2024-31065,0,1,937ed835ef092f0b01f28500bfeb9fa9746544f25976e145c8c22dad96d9bed1,2024-08-01T13:50:44.083000 CVE-2024-31069,0,0,36481f1718994048a20a15ed67941e1a51f806f748a1e21efe82cd82687004ae,2024-04-15T13:15:51.577000 CVE-2024-3107,0,0,26336691309b77f9b9ed1d01af8da80f39f18aa81e7e280fa98e64adbe096bda,2024-05-02T18:00:37.360000 -CVE-2024-31070,0,0,321e07006c4ebd9a5e6255a5e8f9f58233c3645139d406748fee429ed81f7187,2024-07-17T13:34:20.520000 +CVE-2024-31070,0,1,83ce75ce5a3282751f351bb86ca268e67ae6669b9bcff8157168323d2790e0b8,2024-08-01T13:50:44.860000 CVE-2024-31071,0,0,38e67c605bc28fae8948bdb29e4e1fea108746bc02f8e7ba298a38c41a90d442,2024-07-03T18:01:57.697000 CVE-2024-31076,0,0,b516579659528296f384d5fc2847472b67a1e9cb8089efce1b81514ba7455edc,2024-07-15T07:15:03.810000 -CVE-2024-31077,0,0,2f0093d39cf5c7659611f858795c8621f6dfa183946b9e96395aae4eaaeca6eb,2024-04-23T12:52:09.397000 +CVE-2024-31077,0,1,4ee4934fb388f0c6aecae8ff57d029bcb5098c8db84cc409e7cf47f67893eb97,2024-08-01T13:50:46.110000 CVE-2024-31078,0,0,b0bbe41ef9db9ceb087fcafc0c2efaa7f33c48976a0bab70d091b39f8b940d0d,2024-05-07T13:39:32.710000 CVE-2024-31079,0,0,7b022d1b68d2e4d6083918cd5bedebc752ca3a191d73bb4a1d52466186b516fb,2024-06-10T18:15:31.023000 CVE-2024-3108,0,0,da90f8f46c09bcb2198c43fdf0f557ced476d6d11a9810f11a2eca18dace7b1f,2024-05-03T14:17:53.690000 @@ -250204,8 +250205,8 @@ CVE-2024-31090,0,0,f5f1cc42021331fcb3056c42d4645da47a50a44bbb59b476f9ac00aa57148 CVE-2024-31091,0,0,f9ae78969dd891aaceb0ab6cc032d54f89ad3c4ea965e783ce321e79f7463b54,2024-04-01T01:12:59.077000 CVE-2024-31092,0,0,77fcd7cf8a3934a69caaaab2b322ac89579594d4132e2689edafc19cfb39891f,2024-04-01T01:12:59.077000 CVE-2024-31093,0,0,1d9f70c7ab49bf4c0f8b00b6ea8e46402b147e7550e9cc9813a5673ad780c0b5,2024-04-15T13:15:31.997000 -CVE-2024-31094,0,0,c6e81e2a55f06cd018acd849d10b3fdabffe2d91408dd20cda49d7d90946a804,2024-04-01T01:12:59.077000 -CVE-2024-31095,0,0,dee831192f849412127584cc1486d9685e142f396bd38c3cb2928e539bd6f4ea,2024-04-01T01:12:59.077000 +CVE-2024-31094,0,1,96018b384dee14c4167dc62fa0fce59c729622c883102393ed22db19b370a6f4,2024-08-01T13:50:47.140000 +CVE-2024-31095,0,1,31ed0388a12281d5a7978ac66f06a17c76e0891ba943bbf86daf64b5ed1eba59,2024-08-01T13:50:47.373000 CVE-2024-31096,0,0,4270e5e66128cdab91811a0ce591a6eb33a08f957387696602f581ae0ed51dae,2024-04-01T01:12:59.077000 CVE-2024-31097,0,0,af09d47b9da9890511e00b9cb33e81e18545423fcf604be15b4f56a0320067e6,2024-04-01T01:12:59.077000 CVE-2024-31098,0,0,069857b9ebfa140408fe73576ee0f944a0a293e7fcbf6b12b5f1bb1184bb6048,2024-06-10T02:52:08.267000 @@ -250221,7 +250222,7 @@ CVE-2024-31106,0,0,63690a161055f2d4481256c2810969250c747953cede36fe5d66cff7b08cc CVE-2024-31107,0,0,cbaefe4ebc96caee367fcd8b500880c9ec05971bab8d85697b7641024b51f0b3,2024-04-01T01:12:59.077000 CVE-2024-31108,0,0,0d057b13c28051cf79dae84e332befebcf6312930e92dbe594f9a1cf359f8861,2024-04-01T01:12:59.077000 CVE-2024-31109,0,0,95c2aaec37cb2953849f1caf67e05e5c70b3d128d84589a7c2cc911320e588ca,2024-04-02T20:31:58.463000 -CVE-2024-3111,0,0,43fa46c4777800770b9731316a994178f92237840028aec31c35f1e2eb709766,2024-06-28T13:28:47.937000 +CVE-2024-3111,0,1,bb452f339e17e48120fffe4dc9eb25304cb934908a4939e78efde4ce9b4161cc,2024-08-01T13:56:17.710000 CVE-2024-31110,0,0,79c94d1263e026a1b680106a20f83ea15fa7e6835514a3915ccea326ed793f4c,2024-04-01T01:12:59.077000 CVE-2024-31111,0,0,f433c9483b13e2945a40ff73551080d14b0e22c5e4e44cd5bd3386cdbfeee2f3,2024-06-25T18:50:42.040000 CVE-2024-31112,0,0,86a7fb5fd1306728944116f6e0c22cde368bf544a113a7dbe159da2bc45dc7f3,2024-04-01T01:12:59.077000 @@ -250230,12 +250231,12 @@ CVE-2024-31114,0,0,afabe7c7448d9849b7ad855b1db31c9bdfaf7bad3c2b6ecbd003487773717 CVE-2024-31115,0,0,bd884230ee55b50a8c577e8a27042fabe2c77f3f6e0420b7ead26c21104e693b,2024-05-08T13:15:07.937000 CVE-2024-31116,0,0,35d48a57bb7d1a38e86578dd26df8c4786385c3d5fbddc136583c0de35a20e99,2024-04-01T01:12:59.077000 CVE-2024-31117,0,0,17808fcdd2b80afe972f5e0d2cdeeba3d1ad46fbe650b4c1e2b74d98a6fd12a0,2024-04-01T01:12:59.077000 -CVE-2024-3112,0,0,f9e622a7f8593e7928edb5efe463624dce62954b25c2f3759f1e4d2e91376bec,2024-07-24T20:03:22.417000 +CVE-2024-3112,0,1,cb72deffc5e85242531348967710101173c1e699dbbd209095181389efeb3c1e,2024-08-01T13:56:17.910000 CVE-2024-31120,0,0,2905bfd8b8aa056c6c1fecc5c95746ce3aa103eec58c361f159a34f59556bfab,2024-04-01T01:12:59.077000 CVE-2024-31121,0,0,43f3a78be41b0fe7a8d76bc9574b1b11bd8f69ccdd607ace1c58f4c381191fa3,2024-04-01T01:12:59.077000 CVE-2024-31122,0,0,c4e14ba7004b2cf2b151bf3132b2165fc437583f598287125f4d98c6a273d82e,2024-04-01T01:12:59.077000 CVE-2024-31123,0,0,f20fc67a2fee91c8978a5bcb9d4415d2b8d2a544eca0031434fc9c6861c2d332,2024-04-01T01:12:59.077000 -CVE-2024-3113,0,0,dc21eaa87a888ed0277f2481f0455f5fd0252d49fa9b7be58a273effad69bc86,2024-07-30T13:32:45.943000 +CVE-2024-3113,0,1,253853956fcda1430f2230ed621c6b7ce5a5bf7cac49bd9b59f6bc45a5135799,2024-08-01T13:56:18.230000 CVE-2024-31134,0,0,d8b2660354a47ff5d57524fb2454441ef5617ce0d4a19440e82ae14e22bd7dec,2024-03-28T16:07:30.893000 CVE-2024-31135,0,0,be23cdb06ca9fb56cf767d95aa395ad9500588039c11b7b093f03a09c2fed9d4,2024-04-08T22:39:48.067000 CVE-2024-31136,0,0,fc3cbe768e48d4625e33825c87e8160fa75cbd797dbb2249521e32101603588e,2024-03-28T16:07:30.893000 @@ -250256,12 +250257,12 @@ CVE-2024-31163,0,0,4c747f1ff7fba8b05c1cafd42ad5f820c8955e2e4c4106c43c9e7bc300a75 CVE-2024-3117,0,0,35e12b7e221f89a241b3455a68aa778ef5d3a027d9a06e657b81a15f70aaf730,2024-05-17T02:39:43.503000 CVE-2024-3118,0,0,b601d08053b91d1b775fc21940190bf1fa2c378ab81a4eb84232fb172e159127,2024-05-17T02:39:43.597000 CVE-2024-3119,0,0,16d9b0b62041b85fa76fcca7b5e07a91c83d46800d8aa92445727479f196ac02,2024-04-10T13:23:38.787000 -CVE-2024-31199,0,0,629ad35b2bf02d8ff9b61930bc57fb82e65ed32c4c93f058add463497ae15dfd,2024-07-31T14:15:03.420000 +CVE-2024-31199,0,1,5184741487dde751b9883b5ebfacc5d5f36ea6cc6e80ff091c41884a33c4b0d1,2024-08-01T12:42:36.933000 CVE-2024-3120,0,0,d7f7bfc68dc8954b2db64a2bd8494c9672b3ed1aa5b73de4b1ce504de0f2d9cd,2024-04-10T13:23:38.787000 -CVE-2024-31200,0,0,b49d766c8d13c65865ebc176581ec64c1d00fbeb2fb2da5afdbaae17c3171cc0,2024-07-31T14:15:03.823000 -CVE-2024-31201,0,0,3423dfcf066240faea019c6648494561feb635cb8fa896f18c2a481158c84c6e,2024-07-31T14:15:04.430000 -CVE-2024-31202,0,0,5750f923cc0fd11230ce3bb4e6df579564e1a7712f9232055e03da5dedb6bff9,2024-07-31T14:15:05.127000 -CVE-2024-31203,0,0,242d44ee0c7901f970b76d2afec71ec06cceab9cd4d56ecd71234c6e66a63b06,2024-07-31T14:15:05.760000 +CVE-2024-31200,0,1,a725ebc0406d7494945ca0b9f2eebb46cb8084af1f18d4497f54dcdf72a14e6d,2024-08-01T12:42:36.933000 +CVE-2024-31201,0,1,5462dabb4e1b175801c911e48ffec5d4017ce6b414bed20fca3bbe07019214f2,2024-08-01T12:42:36.933000 +CVE-2024-31202,0,1,2dfabcc289203892fb6a1ba100c47b61c2a6bd0da6c0b1977b0dc751f63d3f9a,2024-08-01T12:42:36.933000 +CVE-2024-31203,0,1,f5c18026eae77e53c6527c913c1cb7651e1559a6357892646eda782677ca2fff,2024-08-01T12:42:36.933000 CVE-2024-31204,0,0,0c2a3c505ae0850e947d758b18dc636095933b24d8a064505ce740f4cd47511f,2024-04-05T12:40:52.763000 CVE-2024-31205,0,0,8ee406c15331a2b7fb6924640608e3f9e6bdd36a95bd392fbee6658513096921,2024-04-08T18:48:40.217000 CVE-2024-31206,0,0,41949bb5f0c1bb5a03bd675fb7a934fe92393be2a48c12943c92c5612ae97e2d,2024-04-05T12:40:52.763000 @@ -250375,28 +250376,28 @@ CVE-2024-31307,0,0,2d6e060289b3008a1e418b6eb280724b777b09f9b6617ba46e545a2950202 CVE-2024-31308,0,0,8606ad4cae26aa1286e03fe0d008d3f9130be2161e208c576d36c6c7ac675659,2024-04-08T18:48:40.217000 CVE-2024-31309,0,0,ca12cd2686364246003ec4c4d38c5113be1d9d0085fddb7dc5f385b2b6a92468,2024-05-01T18:15:23.233000 CVE-2024-3131,0,0,c105af314f6cd2a67026a981250eb1886cf285c372d5dbe1b84a99c03d0161a7,2024-05-17T02:39:44.143000 -CVE-2024-31310,0,0,39c8b5f3047a90424057280556e039d7fcd0c87d4c13a730727031fa30d92c6d,2024-07-11T13:06:13.187000 +CVE-2024-31310,0,1,18d1418ec38f7c8ff17788048da0079aa6b632f7675bd0da4820aeaa7280cd83,2024-08-01T13:50:49.710000 CVE-2024-31311,0,0,bc87f5eff00ede1d1c04389c216e60b2a2a407288e31ea28ec5028c636a65054,2024-07-11T15:05:38.153000 CVE-2024-31312,0,0,3e59aee3cfa2f94cb0ef2f4dd0a4353f30db5e3e79096083a0ada05027297595,2024-07-11T13:06:13.187000 -CVE-2024-31313,0,0,0fa1a93bf76d2578fececf6790601468789f9798bc4a9d3c04594cde67bd0b37,2024-07-11T13:06:13.187000 +CVE-2024-31313,0,1,ceb2987f383004ca75547566ea31a4a0eedc5e53d834a176eb55faa006ac3bd7,2024-08-01T13:50:49.893000 CVE-2024-31314,0,0,f79a503fa2b5e6b0ca89cfce664066f03d71aa556965c71aeebf162d04cdcf57,2024-07-11T13:06:13.187000 CVE-2024-31315,0,0,285e9341c5dea2df00bd2c416691a1faeb9d23f21a318a12574fefeadc97541f,2024-07-11T15:05:39.143000 CVE-2024-31316,0,0,32fc8a7b1b224122566c3d79a73274ea9359c3c71dbd47a6b8920e485bc01265,2024-07-11T15:05:39.377000 CVE-2024-31317,0,0,800d561c71c022ae12380b47f0bffa09b01b8580803da3962bc9386025c4d930,2024-07-11T15:05:39.587000 -CVE-2024-31318,0,0,0d84f6fe565a6fef6c3462da1416e29e0311757f0491192516023b784222f940,2024-07-11T13:05:54.930000 +CVE-2024-31318,0,1,3d9f3767d927d6877f5e49c8a89eeac7648967b57b8a8c725827eb56ff919f03,2024-08-01T13:50:50.663000 CVE-2024-31319,0,0,d41ae1811fb17be3402aca9fb66a61e1e621553392c008a9cf5ba40560e4879b,2024-07-12T16:11:31.317000 CVE-2024-31320,0,0,969b526fe8cbb340c24f0551cba18ff8fd52f90e02be7e7500f3a5e670f897c0,2024-07-12T16:11:32.230000 CVE-2024-31322,0,0,d20c4b5ba34b42a0392eed2de4ecf00db6c97fef76cc64c816a4b4ded912e267,2024-07-11T15:05:40.467000 CVE-2024-31323,0,0,9037ab145a8eaf22356dc2d8d32c3f7b97b37d0518a06cda16b86aed0b6e3425,2024-07-12T16:11:33.047000 CVE-2024-31324,0,0,97d477007c60c4e7e015994eba22a07898b7757a6832226ecfcf605a078ce0fe,2024-07-11T15:05:41.280000 -CVE-2024-31325,0,0,80e33a4833f6237bc4765f36ccc9a7e3eece55e1504b9aeb71a9c9792949a23e,2024-07-11T13:05:54.930000 +CVE-2024-31325,0,1,a9bcdbd792a6ed8c686901e49872aa0bea6152484f11f86c22b43dfd437d3917,2024-08-01T13:50:51.583000 CVE-2024-31326,0,0,284eae06442124a693f10717424ff9de135112a9a37355db24d271d9f53a0149,2024-07-11T13:05:54.930000 CVE-2024-31327,0,0,6cb945d11f8664a0277f1157bd8eac8d374886bfe8f127c66f41c26468520cf9,2024-07-11T15:05:41.523000 CVE-2024-3133,0,0,a5199a1ff93b7f0b9b2c8f7c4014dbfb416c9e59a9d9caab3f26a064ce40a24e,2024-06-07T19:15:24.213000 CVE-2024-31331,0,0,d63ee06c884fadbebb4e0ffd30f7de42c6d5483b78b8ccdaba35e5ffeb309e42,2024-07-12T16:11:33.867000 CVE-2024-31332,0,0,fe533958eb1f5014a983744e26d4dc56008592fb4b2dc96ebd425a317d9ee5f4,2024-07-11T15:05:41.733000 CVE-2024-31334,0,0,69828e729ce39e0f18173fda19e01cf9f4d39333d7345a58dacf94a302bbacd6,2024-07-11T15:05:41.960000 -CVE-2024-31335,0,0,7b94e1c7e2fff90cd056259c618020e41ea9dda128606e5b08242f9be882f42e,2024-07-11T13:05:54.930000 +CVE-2024-31335,0,1,3a5c3c43b9344b158e79d76d5bd0e2d36d3e7822b50bec9afc211045c26c9812,2024-08-01T13:50:52.347000 CVE-2024-31339,0,0,cd4c96aade7176a5aa7427f1e13d7eb03c1e703de2eb92c3c6c97472cece1e5c,2024-07-12T16:11:34.910000 CVE-2024-3134,0,0,29c3b545a5da0a472480af2af3f9f3acedbe4b841a8f6f121606a369bcd8fa7c,2024-05-17T18:36:05.263000 CVE-2024-31340,0,0,69d2a170836208f6faad46a647a02e1d14f5dbc15c6da296b85bfb3a229fe567,2024-07-03T01:54:45.633000 @@ -250460,7 +250461,7 @@ CVE-2024-31392,0,0,90f870aad60adbb29615bf323ba755be311794e0c6e96b2025908a4ce7431 CVE-2024-31393,0,0,675d7cbb5105173b3ddbf8a5a8c43270ec3504343013c71755eb5691c8dc2cb2,2024-04-03T17:24:18.150000 CVE-2024-31394,0,0,057a59cfe49b19144d2e3f8a03ac1db28c62eb3e70e92a240bc4577876d0a78c,2024-05-22T12:46:53.887000 CVE-2024-31395,0,0,84ffe8279d5fc146d1e75e38d339843647ddbe44b201c68383044efb99b4ee60,2024-05-22T12:46:53.887000 -CVE-2024-31396,0,0,1adae79ce01b26b2e02ccae42d87741a20b6bed3c3475f85276af0e9a45af2d2,2024-05-22T12:46:53.887000 +CVE-2024-31396,0,1,3459f305b0a80cfe56958d75d2dbcac63c337a642c0a699b6a99c0cfafa2b0c8,2024-08-01T13:50:53.827000 CVE-2024-31397,0,0,84e5539fe288f7e4c3b9dc6907e828a79fd1c0ce0682e8ac0d31f1740d4dafd1,2024-07-03T01:54:48.070000 CVE-2024-31398,0,0,b156fde340b89da93d374e79e7b71d01ab113051610ab9c2e057464460bfda6f,2024-06-11T13:54:12.057000 CVE-2024-31399,0,0,1680f486e96a14043d1a63525cc1c03f62df58c7382b5ac587fb5d91e25f5f35,2024-06-11T13:54:12.057000 @@ -250474,8 +250475,8 @@ CVE-2024-31406,0,0,50456975bcaa7f8217ed5d32434dc8fe15a49c6e53ad431c822a1405fa86b CVE-2024-31409,0,0,09ade636686018d011934a2d430e86d633c432ebce6a25dfdd22659ad619bb0a,2024-05-16T13:03:05.353000 CVE-2024-3141,0,0,f613ac942cd4fe27f02940a465f775f9bffd5aa44eaf65a9fb94b5d68958c63e,2024-05-17T02:39:44.593000 CVE-2024-31410,0,0,23155e757f76d6df45e3314d3045af8745f87c8b7ddeb1d4a8dad059bea073da,2024-05-16T13:03:05.353000 -CVE-2024-31411,0,0,12adb9d8e0e94494017821bae3034ef9ac83fd3301593ab63392e26a387c6a09,2024-07-17T13:34:20.520000 -CVE-2024-31412,0,0,1f8255c8b1551d259011046df3547e21794c5575271508a20d4938f675726b7d,2024-05-01T19:50:25.633000 +CVE-2024-31411,0,1,825e1b84f8b1b768e292f27f196285d9ac70286d0de1b0e473d4ad782faed11f,2024-08-01T13:50:54.623000 +CVE-2024-31412,0,1,91783357bf64a7c6a8a8fc4dd61d86515f3c43b87fd5026db89b258496a563c2,2024-08-01T13:50:54.890000 CVE-2024-31413,0,0,bb1445e4de4fe6231d24b5144c9534a3d5daec05348443646de7635aa924272f,2024-07-03T01:54:50.813000 CVE-2024-31419,0,0,d12cf9d3a6a9056d09543372e3ec9556904c7fd0922004ef5361ecc4fb1ba007,2024-04-03T17:24:18.150000 CVE-2024-3142,0,0,983e14121dea75c617117997ac50797df98bf192fa8cfa7597e476b17cc231ee,2024-05-17T02:39:44.690000 @@ -250558,7 +250559,7 @@ CVE-2024-31502,0,0,48eff8d0e1056f4d498c02b25fa6f36fe79ddc405bd5236ddde6ae6266b87 CVE-2024-31503,0,0,453b8b98d65a011386a1105ea39618d955bc56858a00d05311380e4785f957e5,2024-04-17T12:48:07.510000 CVE-2024-31504,0,0,ff5e6de58bbe8f153bd36ad8b71b66ea5d63fceb3d05f083e0fcf1527f2e563c,2024-07-11T16:23:42.943000 CVE-2024-31506,0,0,eb9d067c38ce54e37842aafb28e6ee16ef90a41330c8823e136a3a103ed0b925,2024-04-10T13:24:00.070000 -CVE-2024-31507,0,0,7cf4489425b2c984822547ea8ebee8bf3781ffee0ed5b4fdbde72d1be4eb7fe1,2024-04-10T13:24:00.070000 +CVE-2024-31507,0,1,11838ac73f4b8ea141494dda45bb54b02e15aae2460bddcbc7e30ae4080ffa17,2024-08-01T13:50:56.497000 CVE-2024-3151,0,0,fc3a1e9307fa41cbb3a17517dc43b84b5831b8d6ca8f41e4ebe4bed1f34c8048,2024-05-17T02:39:45.290000 CVE-2024-31510,0,0,2ab08923e55b765ff03b9ec06ce50479208e1bb469f6adf849509f8193855a50,2024-07-03T01:55:05.800000 CVE-2024-3152,0,0,d2b4599c6af8d31eb382b97662107a83ad159f77d5188696950d6fb31b3dd36c,2024-06-07T14:56:05.647000 @@ -250569,37 +250570,37 @@ CVE-2024-31545,0,0,990dd1804a5ee198d0f0887e154e925827e322f01f4e785463356ec825b7f CVE-2024-31546,0,0,8e9514693e08d741612c9e2a09da9e87fa9f3e20f214aad0d330555f52918683,2024-07-03T01:55:08.090000 CVE-2024-31547,0,0,22bd63034759209e253c932abeed783b0fd6c0ca9cadb92359cea5df0d575dd3,2024-07-03T01:55:08.870000 CVE-2024-3155,0,0,38f0efe3ccba0caed22d4a909875226c39355a958d32e7328413c7ea5d0febb4,2024-05-21T12:37:59.687000 -CVE-2024-31551,0,0,155f9453ba5be5b50bab59a10bab1c25d0dba3545bbf425930b788e328eda3ac,2024-04-29T12:42:03.667000 +CVE-2024-31551,0,1,1ea4b8fac3010c4b4e46cbcc463feb0e212c6ddeb2e2836aa9af182f2494dd95,2024-08-01T13:50:57.340000 CVE-2024-31552,0,0,0858b0a24a58ed1b7ceca30a28b8a4da432490c7becdeaa833c16bdd5d9db760,2024-07-03T01:55:09.627000 CVE-2024-31556,0,0,284801355e37e5d2bb66f70abf65c157c874bd86154c46b8086826ccbf00b836,2024-07-03T01:55:10.450000 -CVE-2024-3156,0,0,a431b74a5e572f5812dcc42791bdd196526c1558cc272165b2086121e51d513c,2024-04-26T16:00:34.653000 +CVE-2024-3156,0,1,51decfaeced6eef599bb2d824f817b3e8faaceb41748738897303b173f7baed8,2024-08-01T13:56:20.987000 CVE-2024-3157,0,0,60480b33efb0aa6d09d95f483f38fea3bacba0ec338d2c533afa6497c687e787,2024-07-03T02:06:02.227000 CVE-2024-31574,0,0,9d49c3d810249e7fdec3d7ec5acd27e5dbf702e0786215525f0f8c041faf71ea,2024-04-25T17:24:59.967000 CVE-2024-31576,0,0,5516a552c9c9455eff9be85911cca0846e5ef96c3e87d0189e8480595497f956,2024-04-15T16:15:07.270000 CVE-2024-31578,0,0,6e50b0fb4096fdf1e9e4bd343bba1497d28778deb9cd70cc171baa5af3c65f3a,2024-07-03T01:55:11.213000 CVE-2024-3158,0,0,8c0df3030fba0de4aa2ae2d7990adff2ae9764437d291bf6e80bf8d1917f3ff5,2024-04-26T16:00:15.540000 CVE-2024-31580,0,0,9892d534a6b740bd9f70a36f106331aeef11930b2acb708df4b7495ede87ec8f,2024-07-03T01:55:11.977000 -CVE-2024-31581,0,0,3305dfdf672f5bc3ffecc193df537c2c08ede3247b808cb92d095746d9a93b9c,2024-06-10T18:15:31.323000 -CVE-2024-31582,0,0,f2a2bc7794abc9d0564ff68768ba88bc5b9d3736bd751f3d99c190fd94ff4038,2024-06-10T18:15:31.387000 +CVE-2024-31581,0,1,a8f654e30b255f2c44b72bd4501be7afaa5ed440cafc9227701cc50788da121a,2024-08-01T13:50:58.110000 +CVE-2024-31582,0,1,fdfb7c4e9d820ba8ae8e65d5d2f5939d0226d0aa41883a69840636f401c88641,2024-08-01T13:50:58.913000 CVE-2024-31583,0,0,5718d662ef0fc7a2030b838f396484569e04f36192be74d5dc7dbf12e0d69994,2024-07-03T01:55:12.663000 CVE-2024-31584,0,0,b7635e33f3da4b67c08efe7ab25558c0ee24a2c8974cfc1133472b04b1184049,2024-07-03T01:55:13.417000 CVE-2024-31585,0,0,6cb0e410fe678bb190acc80b7af7851c70055ef5ae189fefbfb679e0627f584d,2024-06-10T18:15:31.457000 CVE-2024-31586,0,0,cc046b8727829f9f83874539c422d0e794e65c7e2b07e31c08215bcda9684cd0,2024-07-03T01:55:14.213000 -CVE-2024-31587,0,0,90a1338c1f76165de1222b4b740df6c29681e05d6cde55481032d7ba642d2a75,2024-04-19T16:19:49.043000 +CVE-2024-31587,0,1,e3e3d5f1d6645953ce4a8fb52a078b6a9a5bbeded18553c7535d616e20fdfaf1,2024-08-01T13:50:59.700000 CVE-2024-3159,0,0,735e10f02a072f5f58961d071d622cba36c3062fe253c73fecebdca829a10483,2024-04-26T15:59:59.020000 CVE-2024-3160,0,0,acce82f6607ccf901a26cdf6f8b2d163d54ecb8d28b677ab5c8de2d154fdf0c1,2024-05-17T02:39:45.510000 -CVE-2024-31601,0,0,601e60fa31121d35b2f8904eee008cbe74a7f1c39639b7485a7577f247b321a4,2024-04-29T12:42:03.667000 -CVE-2024-31609,0,0,a0ac2592bcd4614118ba57194546055aa22acd268fcdf6ff8c3edd9e66ffff13,2024-04-26T12:58:17.720000 +CVE-2024-31601,0,1,2ecfeeb206954a268db2f5b2e562c9815f588a2044ba1904266c145bee62eabe,2024-08-01T13:51:00.487000 +CVE-2024-31609,0,1,fae7dc20cbed60c4a9ac4dc64e5b7d82da62be1a3c274018ad6ee2763de928dd,2024-08-01T13:51:01.270000 CVE-2024-3161,0,0,cb1d741ba2940c183ffb95823cf44b340276dacb5b80290f88304f9e200c7a69,2024-05-02T18:00:37.360000 CVE-2024-31610,0,0,7e150f787445b25f112068bc71b671af16bbf8dbb09fe942ca8b605e6bc05f28,2024-04-26T12:58:17.720000 -CVE-2024-31611,0,0,b3d1046a8c1324d52589e78cb41538bb68e30dce54f2847fee771d66ed4d9960,2024-06-12T17:44:20.730000 +CVE-2024-31611,0,1,922c068e1b8fa15f4d68c71058c16061c333a9f74f3b60f54aa9aaeaee657115,2024-08-01T13:51:02.050000 CVE-2024-31612,0,0,15c2e47d08cf4c3040b81a039dadf1f4f0af6413e9d788fcdb817dc6998b4789,2024-06-12T18:10:30.587000 CVE-2024-31613,0,0,b0b5b8479d0a02bfd478dd615b1866827cfc5a7cd6faf8622773f7f73500ac9b,2024-06-10T18:06:22.600000 CVE-2024-31615,0,0,d368b7afcddf8004edd5887f0583685e84be26fc0d3934bf749ef04013bb7fc3,2024-07-03T01:55:14.960000 CVE-2024-31616,0,0,1084c6c3d6d8aa5c511ab3dfa4028831dd239a202d2424f408608d0ae03fc34e,2024-07-03T01:55:15.753000 CVE-2024-31617,0,0,9711caaddce592eb420340c15062e32230529bacc3e145994358760fe387bd5a,2024-05-22T18:59:20.240000 CVE-2024-3162,0,0,3e7f66649168580d392a3fb46c7ee7a96684035e106cd1b348efef813ec92f13,2024-04-03T12:38:04.840000 -CVE-2024-31621,0,0,2195b4b03486154b6956389505efcf9bb250e58a3978b2e57a6d01ddc3c817be,2024-04-30T13:11:16.690000 +CVE-2024-31621,0,1,2776499dd839a5f8af2f1a45cc3999696933a39c7fd80896ea803a98040f00f2,2024-08-01T13:51:02.777000 CVE-2024-31622,0,0,82a150679cb2e6aa18ce1c93441bf5438a3fa3ecf8dcd9f9d21f44c6655c4d69,2024-06-05T17:15:12.400000 CVE-2024-31623,0,0,2a7b23b063ff92a0f5ba44b11b8dd92d49aa1e1d3ce6dc0ea729e6c096ae1393,2024-06-05T17:15:12.510000 CVE-2024-31624,0,0,7f3386cf2109b16fc393365e9ed48e3b255ef03d0b4c2c043ec07526e1cf83be,2024-06-05T17:15:12.587000 @@ -250614,7 +250615,7 @@ CVE-2024-31634,0,0,cd6336332928e139372eaeb7f2fa7bd12555d147721492304ddeef71595ef CVE-2024-31636,0,0,5030ab945dd9e3d071b87a4da035a97defc5897507c6002a20e31f1008a32478,2024-07-03T01:55:16.580000 CVE-2024-3164,0,0,38bea5ea29fb4ffa7766bbe0beb8807abf0c8d405294ac50c0e82ba1bd904579,2024-07-26T14:15:02.560000 CVE-2024-31648,0,0,2922cc98178cad367ce9967a9bb0554e38b9bf3f7eeaabe3324ef2b9c342145f,2024-04-16T13:24:07.103000 -CVE-2024-31649,0,0,4e97e11dec1d0224f80d5fc46b087ead4bd3503ddd935380e84b5c378f32db60,2024-04-16T13:24:07.103000 +CVE-2024-31649,0,1,8b247291638ecff50896f2aca79dadb1b9c9aa19002fdb0afc961b73616ecbcc,2024-08-01T13:51:03.573000 CVE-2024-3165,0,0,80972bb4e4cfe5922196180e44e15963a79521816e646014cac03ba5f7adab4e,2024-07-26T14:15:02.690000 CVE-2024-31650,0,0,f91457293ffe9951d31a570db1b9cb5f0c4dfb9ffa5e388dc3d2c34a75979925,2024-07-03T01:55:17.350000 CVE-2024-31651,0,0,2f1b682345eecb1fdf8666f197b953cac229ba6b6b34d2f7c287258788c8508c,2024-04-16T13:24:07.103000 @@ -250623,63 +250624,63 @@ CVE-2024-3166,0,0,2118d9d21001c971cc655ae0425738c34bcbaa36794043093e86cc4003bdc2 CVE-2024-31666,0,0,253643df7e9c7fc7c94316b23bbda0edfbf28e84ffeb8510af634fd8ae7e9fc0,2024-04-22T19:24:06.727000 CVE-2024-3167,0,0,0e0e401d957a36adf31f389f0d7fa47f7901c0598b7b2fd42d4c75bdbdd76e80,2024-04-26T15:55:58.810000 CVE-2024-31673,0,0,f08fb9f910c3a1076d50c31d40d404a72ee29f978665ed5faea697632994477c,2024-05-06T12:44:56.377000 -CVE-2024-31678,0,0,a039b430a4b65e0b97046276b6ed1c632f765fc4e4053aa5427aeefb4dac3d98,2024-04-12T12:44:04.930000 -CVE-2024-3168,0,0,1ec3737493fc3921401acce4dd6cdaf4843a7c7b01b4b9af8fa2c172a8f9fd71,2024-07-19T13:25:11.660000 +CVE-2024-31678,0,1,45c8b2607673d8af8b3ec231962e66bcea8064211e1867ed0addb4c93b773839,2024-08-01T13:51:04.350000 +CVE-2024-3168,0,1,e53f03656f19e0e47c6622c3da3e06f5dd93aaeae623b38784e05f0c565a375b,2024-08-01T13:56:21.960000 CVE-2024-31680,0,0,7e1908b87f42141dc482d017d5b62a6782bb8342605d50fe2c839034d8e94921,2024-04-17T12:48:07.510000 -CVE-2024-31682,0,0,42ea6293b90227c97d91195ff4d0e78cbfa746fc21aebe2add0640f7549a80aa,2024-06-04T16:57:41.057000 +CVE-2024-31682,0,1,80a6fa070deb0370560504b4fbd6eefe7a627d5dbcf4ad67176d2e92301ec450,2024-08-01T13:51:05.133000 CVE-2024-31684,0,0,ad75a69893dade6ac7e684ae6347f5d7476c0bca032591c2e980bc01013d54f5,2024-06-03T19:23:17.807000 -CVE-2024-3169,0,0,d7b1415d8a31a5e1c6093ce8ac7dbac2e148bf41fec7619fab20863604b5192c,2024-07-19T13:24:56.617000 -CVE-2024-3170,0,0,5e7358dc9ec4715298a5a689fbebf23a3d7543995cc630ed65af1176171581df,2024-07-18T15:04:35.447000 +CVE-2024-3169,0,1,b6d2ffb09103c8b8a3976e1d11af5d86787ae2ffc33eb4178c248279d95ed274,2024-08-01T13:56:22.240000 +CVE-2024-3170,0,1,e5d3e527beb338f17b4d7e88e470a76429efa4bde538f57bcfe45fe38f4493ae,2024-08-01T13:56:23.270000 CVE-2024-31705,0,0,1e094636fab25f55fd2bbe89fbc416ff598664e06b0094a270ee264d1d302370,2024-04-30T13:11:16.690000 -CVE-2024-3171,0,0,05e23f6e21a479cfe13415837a6ca80b006bcab87b0d88c28d88a1c1c5d48fb0,2024-07-18T15:03:07.550000 +CVE-2024-3171,0,1,7ac04b89850dd4c13fd178af0a23f600897d741bf0b6409f6d9c0faa5fbe4cd3,2024-08-01T13:56:24.363000 CVE-2024-31714,0,0,e2cbcd04e6551aaebab596d7137808760f8842fa97ced3f3a7a7709d1ffb887c,2024-07-03T01:55:18.240000 CVE-2024-3172,0,0,05dc82f6f22e88fbd8d06dbea6edbb204f6f1a0b12363688b71e4a27893b8a6f,2024-07-18T15:02:46.477000 -CVE-2024-3173,0,0,cf7e70773f4f5f67fc6f47d960dfedbf9a849264411399d2cb409b7103dc0644,2024-07-18T15:02:26.407000 -CVE-2024-3174,0,0,232a678334a3ae055d5dc2681ac3f891bc9ea6220cb4959cf1b125a5caa6e850,2024-07-18T15:05:16.670000 -CVE-2024-31741,0,0,7647d7bdb9bddda70e2be7506667542b0e94ea57064111bb2b5dc39f7dbf58d9,2024-04-29T12:42:03.667000 +CVE-2024-3173,0,1,0a00fa791c0beedd2224ddcaad68b63d69d779d7d822291cdbf8a4dfac758ac8,2024-08-01T13:56:25.427000 +CVE-2024-3174,0,1,cc93afb1fba4ed5cb1d1b58e07131fbee1642590e2326d02f843f51030b35ac2,2024-08-01T13:56:26.347000 +CVE-2024-31741,0,1,f78c52375cd180ef5690711784580d11ad07d5a273b816fcd715c6a8fa7113c2,2024-08-01T13:51:06.003000 CVE-2024-31744,0,0,fb9aa7a38c780f352284188ba5594185fd9278eb672cdcc53bb5f1def8b1306f,2024-07-03T01:55:18.993000 CVE-2024-31745,0,0,1d2bc6dbb22666ca6fd7636d86e091f5aeff674e8f5352a220c9cbb705a7eb7c,2024-04-25T16:15:11.227000 CVE-2024-31747,0,0,9e923843304f2199cb691a558a210fd6981c69363d19b38d078cfd1ec801e120,2024-04-30T13:11:16.690000 -CVE-2024-3175,0,0,0f4868c8c65635468b5a446c3a1bb5e42871ec8d9f83eb0fd75c9790fd6f19ea,2024-07-18T15:05:29.593000 +CVE-2024-3175,0,1,e1a78d7c87de5412e17091578d745df9c9852450742733cfce5d89ae459bf460,2024-08-01T13:56:26.597000 CVE-2024-31750,0,0,1a15dee129c540f50ba0b22addd9273e209e8744c01daff655aada30a84ff874,2024-07-03T01:55:19.837000 CVE-2024-31755,0,0,3bd12cf4853126d6f31d6cbd32f6b5b02770582813fa897bd2c19a22d945bc42,2024-07-03T01:55:20.690000 CVE-2024-31756,0,0,b265a44ac5576ee6d5c0a18978b0e66ae2e3119d6151f744407705cbd0d8e888,2024-05-22T12:46:53.887000 CVE-2024-31757,0,0,640246057d9af431a856f7069b3a4b0176cede6dd1a0ca84cccb72f8b2351ce2,2024-05-22T12:46:53.887000 CVE-2024-31759,0,0,5ca30fe161f942476fedc4c1a25392d9f6bd5f838b11978a0afee068f1ffa3e9,2024-04-17T12:48:07.510000 CVE-2024-3176,0,0,b581b35f96c3e71f6864e9ec04e922ca6011a2abb5dc1a155976a5a31d9d63e9,2024-07-18T14:47:38.093000 -CVE-2024-31760,0,0,81ca95db94aadc8beeb6bad1b6227dc560dbfcc9ba60a7ead6f3acf512f008f5,2024-04-17T12:48:07.510000 +CVE-2024-31760,0,1,f16f02679dd1d653421cfa1b377c9d22a632b6c4fccebc3d14af855ae5a31d71,2024-08-01T13:51:06.777000 CVE-2024-3177,0,0,572d97d46eb0c253ee03c3934b9d649f7fc7d88b4a672b4edb358cf1ed9c5fcc,2024-05-01T19:15:27.480000 CVE-2024-31771,0,0,76e19bcea468daefd8080dca781bac1083b068d292b9de16777cde5001b0299b,2024-05-14T16:12:23.490000 CVE-2024-31777,0,0,ef9296c289f84fbcdb21b0dd4c346ef8f49d1c2a11212e62a5ece22535a4ac6c,2024-06-17T12:43:31.090000 CVE-2024-3178,0,0,724b5b9b62dd4e92f1f229f9f28fcb0bddf71f92c79c0b94c18fdb2af7074b09,2024-04-04T12:48:41.700000 CVE-2024-31783,0,0,dea8534fc1b6933b26cda6217a1982520e5d50556b9ff7b4e3fbbb8c80f4a35b,2024-04-16T13:24:07.103000 -CVE-2024-31784,0,0,6e4add219f250c57d5203f4ac3439af7737d55077f1d61b5f2828f219b0b4d3d,2024-04-16T13:24:07.103000 +CVE-2024-31784,0,1,872beb17d1c68d7ed92a4188cf9514602c2aada50c10052ecdc3a0e44dff88ee,2024-08-01T13:51:07.627000 CVE-2024-3179,0,0,464d285bc972fdb5e95f8aa4a77b96bdfaeed1940a229e7762cb456353d6a4b4,2024-04-04T12:48:41.700000 CVE-2024-3180,0,0,a00f1e9c0c961bfe4f5d9bc0c89218e810bdec4720fe175e0a11a11dd8540d68,2024-04-04T12:48:41.700000 CVE-2024-31801,0,0,167787a1907cdf000af60fbe9b5f7402195ddc6d583a2566e586e08b836488bc,2024-07-03T01:55:21.550000 CVE-2024-31802,0,0,dd0b491f4b4a8abc2eb95691f4e0d78bda6718f8c1d907d0d856648428006edd,2024-06-28T10:27:00.920000 -CVE-2024-31803,0,0,626e9fa4897ec4f2a54926ae8c814e9dfdd79d1e3eb35e53b15d48873eb860fa,2024-05-14T16:12:23.490000 +CVE-2024-31803,0,1,c10736ae7840b016061b5af4491c529b00b1b223c27ecb8bbf60562274c0f243,2024-08-01T13:51:08.687000 CVE-2024-31804,0,0,98ebf6123ba640ba12fc884ba3b75b6a9171ce60bb03787ca27a89dc86a8de4b,2024-07-03T01:55:22.410000 CVE-2024-31805,0,0,4b7b61f3abeb4068501d3afa621c8120c12d0bdb6f8c1629f0f6ba829ac02f8f,2024-04-08T18:48:40.217000 -CVE-2024-31806,0,0,c23d8afa0866b6eb6daf511da2b950386db2d217b30aaed5ed10103f23791940,2024-04-08T18:48:40.217000 +CVE-2024-31806,0,1,0d23d3a16c910921a17f301055f98f9b17ff477b46facd9fbf2663ed7a6ab3c1,2024-08-01T13:51:09.630000 CVE-2024-31807,0,0,ea04fa5dc5969cf90a606fd0ba3180cd04c064ccb96f864a8d73af8533d6a049,2024-04-08T18:48:40.217000 -CVE-2024-31808,0,0,0d0b5f53f5c90fadaac2b7c4fe1d34f8651ceeb25f047814a70407e6e3b106eb,2024-04-08T18:48:40.217000 -CVE-2024-31809,0,0,d38731fa0a3e3ec444782d7e13d262d1de429410186c22892e258f2dc07115ae,2024-04-08T18:48:40.217000 +CVE-2024-31808,0,1,4ca3797160f40a508a2f1647ee565c7f4dfaebc9f383eaea19fce840eda829f7,2024-08-01T13:51:09.823000 +CVE-2024-31809,0,1,e4cdf5792005cb2f9dfbd37d300dd109766c0a4513cca5e9d46f263f8d455de2,2024-08-01T13:51:10.623000 CVE-2024-3181,0,0,6b9f7aefd2f6d55b0cd7164186830f2507ec3f62ff8140326ea78f2d9a673378,2024-04-04T12:48:41.700000 CVE-2024-31810,0,0,26fe393e9644e5bd4e624b86eb0f71b590d6fd459475e3a5579f903609e5f639,2024-07-03T01:55:23.187000 CVE-2024-31811,0,0,9a549fec1d4f685a8303569c470c6ebd4d0bdca04ae38e3919c878ee4a54ea27,2024-04-08T18:48:40.217000 -CVE-2024-31812,0,0,6f1346f10621d51903b2d7edf3816b2e3f17cc4256d6ab41d5e6a7e9b61e0cec,2024-04-08T18:48:40.217000 +CVE-2024-31812,0,1,e59d4fa5975f0119da4cfd4900343a38d484d0506f79ca6ee0996d32731f70d0,2024-08-01T13:51:11.397000 CVE-2024-31813,0,0,29e23c3e48f06162164aa0d6475a9681cc76184b2c7d19a6059995c0e6dd7e35,2024-04-08T18:48:40.217000 -CVE-2024-31814,0,0,ac1b6db03bdbb13d3a15b76828382bb5481baf274d23d4cde988e4b5885e46f7,2024-04-08T18:48:40.217000 +CVE-2024-31814,0,1,9e4411c92895e7b973cb8cdaa5d063ce91670d843374d0de8b17a9f579b1c377,2024-08-01T13:51:12.177000 CVE-2024-31815,0,0,8501dbf13670162ee9e62c04c6f24ff4278cfe737c0630585c7a86ac8fbb7b10,2024-04-08T18:48:40.217000 CVE-2024-31816,0,0,33735f2f3e7145412c9c8db59ac82d3337fcf5e8bb659d1629fb070a372b30d7,2024-04-08T18:48:40.217000 -CVE-2024-31817,0,0,9676285c33f9cde580626062fcd80878dbbeeef13da79c209899a0efe4195bd0,2024-04-08T18:48:40.217000 +CVE-2024-31817,0,1,24b4e557f7af935e7754f7b85cb41f724f58a7b4e914343cc50d4eac0b54d001,2024-08-01T13:51:12.960000 CVE-2024-31818,0,0,eee16737d75f73f8b945462c1dcd4c5cb19514639603d213fd1ee2d8a446805c,2024-07-03T01:55:23.933000 CVE-2024-31819,0,0,4c17599099dc08aeb493ec31eb828cd358a289cc73a85088c37e9c52e7886635,2024-04-11T12:47:44.137000 CVE-2024-3182,0,0,fed42d01abe608ccd11a4b361061a53271bdb2540de95961bda16d0700fe3a8c,2024-05-15T18:35:11.453000 -CVE-2024-31820,0,0,759518a7e5fd2151b6797b55d7ec1b1e6ea372bea11ad61ffac6c02891b11deb,2024-04-30T13:11:16.690000 +CVE-2024-31820,0,1,c45ae4d9cf96e998a8e3836a25349d6dbd49df94bb64d18020aab9488babbb10,2024-08-01T13:51:13.733000 CVE-2024-31821,0,0,7ffbf5610a7d2af61b143191111032e3581481a662d8ad2f16b1a632dc4600a8,2024-07-03T01:55:24.693000 -CVE-2024-31822,0,0,b0a2d56f1cc32093ea967cff9b9b475a4493df63221a8a1d82d99cc670d58ada,2024-04-30T13:11:16.690000 +CVE-2024-31822,0,1,f5a60a4c5bebe79b36a24a50e6b8d88f76d622645863bbbdd8c3e989dd18102d,2024-08-01T13:51:14.517000 CVE-2024-31823,0,0,9d12c900b5aea261a617c0c45db69af06e76753d660b696289c6db95f54b5297,2024-07-03T01:55:25.480000 CVE-2024-31828,0,0,abbd4faafd1830e19da09ba99cc549c95f576d3b26460d61eb3b11d4f3cf3073,2024-07-03T01:55:26.250000 CVE-2024-3183,0,0,c23fa86047e2a9cfc0e658e5d74d50acd44e3f7588f87ba4b526ce93cd5f83dc,2024-06-27T03:15:50.447000 @@ -250705,7 +250706,7 @@ CVE-2024-31860,0,0,0c85f33d3dadfb2fd0d5a6f2d0ed9d9d75da9aaa685f77a3492d74d36fbf9 CVE-2024-31861,0,0,7e520905222b40b184cd37e76ba3749bb6aceca828ca7e9efda91954bb808b66,2024-06-21T10:15:11.757000 CVE-2024-31862,0,0,0a2700ec34edd8e041d32eb4af9d465364f9e3b477ea7dbe83664617a18669ba,2024-05-01T19:15:26.803000 CVE-2024-31863,0,0,ed4c144936af1b4a59f1909b6583a47816b126762b8a6687e75286af1f26a27c,2024-05-01T18:15:23.507000 -CVE-2024-31864,0,0,9409afe4f7cace162dd7fac3fdf00ae268e6184dad4ddae8bec8527c85ffd695,2024-05-01T18:15:23.563000 +CVE-2024-31864,0,1,dd401fd2f9c38e157d115772d6fe233b1887a6b2c7d0eb5183b48c430298b69f,2024-08-01T13:51:15.603000 CVE-2024-31865,0,0,02a2ba0d6bb162e0849bdf7568c167d76e92f64cab3447bcb8f0f65f613886ef,2024-07-03T01:55:31.473000 CVE-2024-31866,0,0,7d271220c314311621218c80ac0fd4c294fa7a80dde5d0408c4358b3894c573b,2024-05-01T18:15:23.683000 CVE-2024-31867,0,0,7c90191082994197ce09c1b6019992176f2d76072856e8d65beb1a7b6ded7916,2024-05-01T18:15:23.740000 @@ -250780,7 +250781,7 @@ CVE-2024-31954,0,0,75cb48abade3eb19dfa6628441b7fbf62791ae48f745250b97879749047ee CVE-2024-31956,0,0,9c56384997ee12995d0e30a7f8f0ab04e153069838f415bd0e5a559ec646d264,2024-07-16T16:27:59.690000 CVE-2024-31957,0,0,52e3fc3f2f752e45a27580270575f061b25dbef0b821774e0c078c02042898e2,2024-07-12T14:53:30.260000 CVE-2024-31958,0,0,416fc9a4d3e4a5d3047ec5c2778da02b0620ad75afe0364bc50bb13dddbd55a8,2024-06-07T19:24:09.243000 -CVE-2024-31959,0,0,b561d9ab7b434846ce36157dc161dff1fb3f3bff2b806173cb86994e27300e03,2024-06-07T19:24:09.243000 +CVE-2024-31959,0,1,0e7916914eb676533e3ce17ff90db00a77b463066e7818d1b2ebfe4e56b6ecb1,2024-08-01T13:51:16.797000 CVE-2024-3196,0,0,0f543f16f346b107528fe7e208edf9b8c7b4cb02986f3b597e9cf2f5b191ce1d,2024-06-04T19:20:17.433000 CVE-2024-31961,0,0,8693e8165d9cdba44092b3dc0a2cbcef973a8cdf8c9f695519261f49865d4db3,2024-07-03T01:55:36.730000 CVE-2024-31963,0,0,ba90c05a8c9e5dbd1f07d8d76d1b3e91d5e43d418493615f1ef67d7be6576eae,2024-07-03T01:55:37.503000 @@ -250789,12 +250790,12 @@ CVE-2024-31965,0,0,c4b61ad2f9eef097e0954fa70290fdb78da64c708fb57d0eafd0380254742 CVE-2024-31966,0,0,e813fbcff3c742b22ff3620e22028114e0bd0dc18f84922743926ac1c55086d9,2024-07-03T01:55:39.753000 CVE-2024-31967,0,0,d11e85355b08311754a29e0c672ae95e7ac529a4f49e30497f6cb09093fb91b0,2024-07-03T01:55:40.527000 CVE-2024-3197,0,0,324c7a8dc9ccea612ec0432519a90414016d01b55429c0b6dc09fc2cc5af230b,2024-05-02T18:00:37.360000 -CVE-2024-31970,0,0,5764540fffb5f4198d9563dc759cc9536ee6e21e65b44ecc6b5da322a5d9492c,2024-07-25T17:46:25.310000 +CVE-2024-31970,0,1,cdfadc658cf34cd0c60187405449ccd6e7412e46533fef705dd31fa91e804484,2024-08-01T13:51:17.520000 CVE-2024-31971,0,0,387ba33829419cec82187319e9faa2fa937d66440c18184b3edb83bc28249b00,2024-07-26T21:15:12.610000 CVE-2024-31974,0,0,eb64c7f63099840683d53752791541217d3c4d0792dfc9b0d9b46ea3d72b30e4,2024-07-03T01:55:41.323000 -CVE-2024-31977,0,0,284e1a72ebe2c6ede11a6f3e2d57ab0c2b852ca8c8dff3429b5ab43205490427,2024-07-26T13:15:58.687000 +CVE-2024-31977,0,1,62af537bd3fe70510986572ca054dcf99daa1f748ae204c6616a4bee74c8d3cc,2024-08-01T13:51:18.420000 CVE-2024-31978,0,0,e4cc4367e420e8dcd4ef937e3967f9710a2baec19b8785bc53e2d6ca59645c6f,2024-04-09T12:48:04.090000 -CVE-2024-31979,0,0,e93fa35c4ec6bcda67006b59383a9c622c442c60b97962ab4ca126b51f4ba81e,2024-07-25T13:38:56.897000 +CVE-2024-31979,0,1,f097e05504ac9e9ee25949ce03f6b7581ce42735e92ea4d2772041b31a214c2d,2024-08-01T13:51:19.213000 CVE-2024-3198,0,0,1f0d31c07f6270b253d2bb83c7332c7bc9f718736230fc6377e93749d92894d3,2024-05-22T12:46:53.887000 CVE-2024-31980,0,0,8ab930dfc3ea6340441974ba1513ac76de68c0a2890d2d81a8d5be8805e25064,2024-05-14T19:18:31.490000 CVE-2024-31981,0,0,f2d3a632894e526ffc79a652f25d3a7da1db8610794379510e264c8e37958abd,2024-04-11T12:47:44.137000 @@ -250823,7 +250824,7 @@ CVE-2024-32002,0,0,8b152fa71cb7888d307cedcb6036ff42410fe299ac886c8397e8f14b70468 CVE-2024-32003,0,0,31311e12a1795761553a56c6af2bf7b204ba79f18fac5a0250a8b13fef254e1b,2024-04-15T13:15:31.997000 CVE-2024-32004,0,0,46c6e95c184179de4512a1da85cf6fbcce6fe2ac4189ff7da433e0234267bb88,2024-06-26T10:15:12.050000 CVE-2024-32005,0,0,d156f3f94a9502713f64771d89d9d58b72987fd70cae51625e32aa2c9e6ee96e,2024-04-15T13:15:31.997000 -CVE-2024-32007,0,0,364fb3c9014eb730ecbaa089896b50071f4f2d0c9919caeafca6db94dc92887d,2024-07-19T20:22:53.447000 +CVE-2024-32007,0,1,dac6e800b17b27260fecd9bce96903f007f5eec2446ab0ae841fc54dc30923d0,2024-08-01T13:51:19.560000 CVE-2024-3201,0,0,9d746fb1c422de83f85c51388b2057631f70f2332b71bf082d5fbeff58a4ab1e,2024-05-24T01:15:30.977000 CVE-2024-32017,0,0,4171151be280ba186c662a4712cd0108f86c659cb0491f443a14bc31a4f95a77,2024-06-10T18:15:31.880000 CVE-2024-32018,0,0,a57cd84bbc4228dbc73979371818ba4496491d8c8d7ae0852269ca74ca3485fd,2024-06-10T18:15:31.980000 @@ -250942,17 +250943,17 @@ CVE-2024-3215,0,0,e5fb2a5f0603876a47fbaf0581a5b0a27f3e787377440e3d933b055fa12467 CVE-2024-32152,0,0,a8965bd98aaf555e9ed23e2749d018dcc788d77b05f790c2a8051b506ebc5a9c,2024-07-24T12:55:13.223000 CVE-2024-3216,0,0,36d9056f12425336af262dd787bf04647621823ca6d005690ab6601a9ec48458,2024-04-08T18:49:25.863000 CVE-2024-32161,0,0,aa486a10e1c1e1d4ce96087862c0685a8206cb453d4b368274ea4d3fc4398d92,2024-07-03T01:55:49.600000 -CVE-2024-32162,0,0,25479e1427613088330b7423836da6b673acaf22cdb31bae36970ab530a99a28,2024-04-17T20:08:21.887000 +CVE-2024-32162,0,1,79bb256c753e86717e2b344f028c2567dd019ed62cdd4e35ab62a9b68c306261,2024-08-01T13:51:21.033000 CVE-2024-32163,0,0,fc2eed4a9bb29bcfa67551b883d7bb89c5c9af4a13eff5016cb1daac622a783d,2024-07-03T01:55:50.383000 -CVE-2024-32166,0,0,0d336fd2663f53ad5073af796b0f13018ac3836e84a93337db7f44ece472cdfb,2024-04-19T16:19:49.043000 -CVE-2024-32167,0,0,4748c69f7eec35b2beddc2dc94362f1e2e767018d85482f9559e46e4a468fd84,2024-06-12T18:00:30.120000 +CVE-2024-32166,0,1,e117f1f1473eb5a0781f79a5d43c653abcb8b2fa988a11cd3340ec0a690c09cc,2024-08-01T13:51:21.837000 +CVE-2024-32167,0,1,915de4b0debb285120767f5ee79a021decbe9afbb3817337a80cac9f827f0a60,2024-08-01T13:51:22.630000 CVE-2024-3217,0,0,dc86fb8c3829a8b9d2e0fd455ded6f7df193be42ecbfecd0ffd8ac89ef8aedfe,2024-04-05T12:40:52.763000 CVE-2024-3218,0,0,cca321349f887cdf01c9c59558600fd5914c251177129598df483266ec0d6bf2,2024-05-17T02:39:47.357000 CVE-2024-3219,0,0,0fe5b02a5df14735fa570570e95df72692231b22e79a0b8cc12918d2074cdb56,2024-07-30T13:32:45.943000 CVE-2024-32205,0,0,b515c22daf534e23184b3e43b254269995ffc71b09793c9a7a083a2ff7d807bb,2024-04-22T20:15:07.210000 CVE-2024-32206,0,0,8cd9c34ce9f7db79af05faf1c051a80ce3416b7ab823e5294fc2704f3b904424,2024-07-03T01:55:51.200000 CVE-2024-3221,0,0,bc74600907433c2d1f49c74b0b5cb8ca05b39c0ecdd1932ffaf2a011380efa9f,2024-05-17T02:39:47.450000 -CVE-2024-32210,0,0,ee82760ccb48e7fea26bdd9963d6d7ec55260822e2b2f7185a40a29a19d75b43,2024-05-01T19:50:25.633000 +CVE-2024-32210,0,1,3e183c290a7a863cff98e9adea9bcd14a8de15a40933b2aaf5b4f479fa7592bc,2024-08-01T13:51:22.850000 CVE-2024-32211,0,0,84e4b5826602163d039517450331f03278990516e0626af786de559d752b5412,2024-07-03T01:55:51.973000 CVE-2024-32212,0,0,f6aba6b5a0388dc6cc8b07b61804546c09da8a05399de65b74351bf95fbbbb88,2024-07-03T01:55:52.740000 CVE-2024-32213,0,0,41eb62ef3b9a2dab94a557aba3b39a317eb9e5981c9ad6e215d6c756107a42bd,2024-07-03T01:55:53.503000 @@ -250974,27 +250975,27 @@ CVE-2024-32269,0,0,87999e215a4c10f78a5a7d4d8471034bcfca9abe37085e0acad5eb9834137 CVE-2024-3227,0,0,be4e38a7bb6280447d7ff753841210d73248c8711719159edb408b234fc6c3a6,2024-05-17T02:39:47.993000 CVE-2024-3228,0,0,dce4384c833defaea7e1d21ab7017924fe48fb24bc7d5e9f5a6e7749a761869d,2024-07-09T18:19:14.047000 CVE-2024-32281,0,0,2089769d5a8dd576a3c4cba2a6d21b0b986a7a5b7c0a620f0513ace1e68a0f46,2024-07-03T01:55:57.420000 -CVE-2024-32282,0,0,78d3447cb30a63caec98d10674e0fb033f14f5c1594ee8487757be7e1ff03f13,2024-04-17T15:31:50.160000 +CVE-2024-32282,0,1,643e4b9de6b86730118a9854bcd19cfc42c613c79fb4335a0a79f4c595ca1f48,2024-08-01T13:51:24.047000 CVE-2024-32283,0,0,c72ca6989168ee21133166c85a18b30a403543bd2802d4602b360f26e8ac9c38,2024-07-03T01:55:58.170000 -CVE-2024-32285,0,0,1c9576ed4dac96ca0348ed319457b8e9e0888b7577c4266668b9e710fa66ebc9,2024-04-17T15:31:50.160000 +CVE-2024-32285,0,1,26a90aae98bf009c1cc0ed27f6e4157872c7ccd590e843e6831096733dd28188,2024-08-01T13:51:24.843000 CVE-2024-32286,0,0,1db83aa9b55edb8231744756cf042cd8c4416ff23dccabd1d06f4f496f58980c,2024-07-03T01:55:58.927000 CVE-2024-32287,0,0,932347149029d6eabd46a68bc6a82fe6d2945f3ac8f01e10c1833424637fa873,2024-07-03T01:55:59.670000 -CVE-2024-32288,0,0,b15640b71081079de4e32c153d8a6c9fce8905371890f6201b415867bad308d0,2024-04-17T15:31:50.160000 +CVE-2024-32288,0,1,7055160525b404850576c1742924748c1165c5d71099b65aab18ff60fdfe9b17,2024-08-01T13:51:25.653000 CVE-2024-3229,0,0,a686f59b7de8883a045334c433d61077a26800fc92a6d32c4cec468053294836,2024-06-20T12:44:01.637000 CVE-2024-32290,0,0,ea7d12f24bd3a870d72d4f02beed12c0208289688c835eea6e908dc2b165b6cd,2024-07-03T01:56:00.430000 CVE-2024-32291,0,0,6162d71e0c50cfd80b8166ccbdeaa2e4adf839d03127a1a5b034d5446628089a,2024-07-03T01:56:01.233000 CVE-2024-32292,0,0,7d196aa8ee2ad410c3e453bbba317943102958b600dd9e6a6c1d957762e0ecb9,2024-07-03T01:56:01.983000 -CVE-2024-32293,0,0,9fe53ffca2b60e3b1627e5d28c5c98b18b1ff542d63b81bf149fbeaf2f7ca345,2024-04-17T15:31:50.160000 +CVE-2024-32293,0,1,61cbc01dc494d7da31f3709d1c0e3e6ca7041194baefdcbd78260ef3c407b59f,2024-08-01T13:51:26.453000 CVE-2024-32299,0,0,d0a23aa31c0a2313e06327805357771e661b42ede7c77d86066b4cb57786b994,2024-07-03T01:56:02.733000 CVE-2024-3230,0,0,eecee83995bffa0c7057e3fda1f43ad336332e5244900dd85e5490610f2a522d,2024-06-04T16:57:41.053000 CVE-2024-32301,0,0,4d4519a12ab144b213a6b233124e45a37b5f8337a2689aea47ff3693c4ac9546,2024-07-03T01:56:03.403000 -CVE-2024-32302,0,0,9cb6d188cf01632f9ba55eac50d8000c14e3d029dcee55e7080bd790909d370c,2024-04-17T15:31:50.160000 -CVE-2024-32303,0,0,0211e50f7a4915e783a6e11a2fd154dbf523750ec938e0a76a67eadc9f21f343,2024-04-17T16:51:07.347000 +CVE-2024-32302,0,1,bd1ac90688cfcc6be84f8824a7ca0d43ddb624d319b101804bb272446e0e3b78,2024-08-01T13:51:27.897000 +CVE-2024-32303,0,1,f0bc1654c3d620aa1be591d810cc4b864298fb65d4403b208969a299da948b54,2024-08-01T13:51:28.717000 CVE-2024-32305,0,0,54019115d1050a8e7a6d5cd1d49afa66fdb4c41b3a834537b9695d1e6b1d3b78,2024-07-03T01:56:04.160000 CVE-2024-32306,0,0,3216c07ec117e1fbeaffcf62eac6a3e3d7a0764d75335094f2ef3b1b39747031,2024-07-03T01:56:04.840000 CVE-2024-32307,0,0,a0ec48cb4d82bcb4c775e66aa6ae222384a8c9091d177924d3544562641dcebc,2024-04-17T15:31:50.160000 CVE-2024-3231,0,0,3511a6a7488625c2f4a97dbe34eef1ca4f8a0580ca0395f7e856f22a73e9af38,2024-05-17T18:36:05.263000 -CVE-2024-32310,0,0,8f210acc9e0809ae33fd7038f2527229bbafa094eae95f9f02d0b4699140c87e,2024-04-17T15:31:50.160000 +CVE-2024-32310,0,1,a0709c2800acb9e751ede7ba3cd488172de75efe82b0caf38f4891399f643c0e,2024-08-01T13:51:29.533000 CVE-2024-32311,0,0,a7536302fbabb4b529b5593329bec7f2cf36802ec4f1587ed01bada9d7c32320,2024-07-03T01:56:05.617000 CVE-2024-32312,0,0,fb39c38437b7e403d4bca9d564b66acec8787221ff0788e5fad32029133a3052,2024-07-03T01:56:06.373000 CVE-2024-32313,0,0,b116247e5c00d5184493232455f468609fa393d89b579971585285365b8441db,2024-07-03T01:56:07.130000 @@ -251005,12 +251006,12 @@ CVE-2024-32317,0,0,e88627744c10e0bd88f2e1a9f6219d66fa8db0e356bff9f0744b0ba14323e CVE-2024-32318,0,0,ecff3438c4feb6e3e34e68eac1bc15ad0ca3b72da87c9841a9aa73abbe7e81f6,2024-07-03T01:56:09.407000 CVE-2024-3232,0,0,c59a906ca6c3b26e020d4b33cc77d57f43a342f5b3c4ac255f8439d838cfaba1,2024-07-16T18:00:02.110000 CVE-2024-32320,0,0,ff00070c0799b87b8918f3636a7d891bdc3943256f60475437c9b0e24ed27cf0,2024-07-03T01:56:10.160000 -CVE-2024-32324,0,0,9dd4098505788229cebc9845d07ada398f99cee6e2c88eb4d31da4c17dc946bc,2024-04-26T12:58:17.720000 +CVE-2024-32324,0,1,4c68a65f0a6987915de4cab41c0af552fb2e42feb88fe6fd471eea9b078987fa,2024-08-01T13:51:30.347000 CVE-2024-32325,0,0,e571ce4c9c23cfa0415d1b6bab7055e53f7d8f4096b96dcccf19e795da707a69,2024-07-03T01:56:10.923000 CVE-2024-32326,0,0,352e299308e53d7cab4ce30fdcac6ce9709918093eb2935d0146d3c8aaa13cb2,2024-07-03T01:56:11.760000 CVE-2024-32327,0,0,f9ad5f85fd968b4c25755f74bae71baf13607a4e7af0f43bcd9f778540d1517c,2024-07-03T01:56:12.527000 CVE-2024-3233,0,0,75a726c2d285bd50e981e92173c1be8aeb406378b92469aa7f049afad4ff7147,2024-05-02T18:00:37.360000 -CVE-2024-32332,0,0,d77a388070db4c433fabd42a1360b5419492d7f2223e8d7845cb9b22b5204877,2024-04-18T18:25:55.267000 +CVE-2024-32332,0,1,51317b4c7fc2c1d996643a17c1578db394a30c98df11f8f4f350af7a8a6ecb0a,2024-08-01T13:51:31.147000 CVE-2024-32333,0,0,5ea24f41febeedf6644810ff6c1c9911aaed47e6e3b7e6c8023de11405f771bc,2024-07-03T01:56:13.287000 CVE-2024-32334,0,0,6996ffd498862ffa6ee12c5727ff00fad0e747fd1eeddd88f3108594110a0e18,2024-07-03T01:56:14.057000 CVE-2024-32335,0,0,27b22302a22439219b05b87399163da322c2f17e7edfa76b1fbc93b9ad8d165a,2024-07-03T01:56:14.820000 @@ -251050,7 +251051,7 @@ CVE-2024-32404,0,0,eb80f6787a363279634a5db4d277d494ac5dc1f2539325374b050a4c28b7d CVE-2024-32405,0,0,bc9991f960c5c51d23d0756dabed902418fdca4bc0036a9a8f03079b2256af7b,2024-07-03T01:56:31.770000 CVE-2024-32406,0,0,73ac1f19b303163472b3c975415e4f499599d5740977837d587aebd96ab50699,2024-07-03T01:56:32.550000 CVE-2024-32407,0,0,fbfaf7068ca597095592e38589ff8309655659ac5408bc5050ead219b55bbfea,2024-07-03T01:56:33.310000 -CVE-2024-32409,0,0,cdbdcb7de47ba32c82cee0bb38b83e5519f96f658f96608562f1e326a9e11332,2024-07-03T01:56:34.063000 +CVE-2024-32409,0,1,6ab92e40fc5e6ae8f6002eb3cc0277e6ffae2eb1ca20e07c184697681f83d11f,2024-08-01T13:51:32.040000 CVE-2024-3241,0,0,30b752b6ef5f38382b5d572e3de76b73f3f6fe3c9ee69699b564850e70a0c6b3,2024-05-14T19:17:55.627000 CVE-2024-32418,0,0,8172cdb05b747b2afd259a179cd5212ac2debbeaf77726c784f5b816cfdb0abc,2024-07-03T01:56:34.817000 CVE-2024-3242,0,0,0753c592a4141511b7b3f4c81254cd267743cc6b5e9ea8c66b642642aec73f3f,2024-07-19T16:24:02.483000 @@ -251235,7 +251236,7 @@ CVE-2024-32605,0,0,de9c05a78c9964678d3bb18ce0c8aa64d771273179cdd76262e7bc3689e14 CVE-2024-32606,0,0,a3bb52a9f7db8524bc0f64398e8a4bbdbe62f2aa330bc775d2b1822f7f4c3268,2024-05-14T16:12:23.490000 CVE-2024-32607,0,0,01051eb3e082c3438d23481476f9a985d555e9a0f80b0e1feb0cf3db1ee2a690,2024-05-14T16:12:23.490000 CVE-2024-32609,0,0,e9c7de90afd0cbd1681b9959652a6da4e9f88c281b35d47dfe050d5fb7f03f3f,2024-05-14T16:12:23.490000 -CVE-2024-3261,0,0,f7e12e9a27140f65190b8d72170b04523427520bc97162032b7d7751e4da192e,2024-04-24T13:39:42.883000 +CVE-2024-3261,0,1,5a564cf24105216fca1fdc9c03d186979decb6a34306dfcf795295396bd14e90,2024-08-01T13:56:29.727000 CVE-2024-32610,0,0,5100dd5cbf5b46cbb7cc886ebc012d3ebb66cde81cb5143cf02dc17bf6f8b899,2024-05-14T16:12:23.490000 CVE-2024-32611,0,0,2310031ef5af96912f44f0f7e5319f735ea5afde954f456c8fb33e30d583bb91,2024-05-14T16:12:23.490000 CVE-2024-32612,0,0,fa0d8cb7dacac717a406d4aabafa79934264f1b91f48d6d8c4723fee6286bb46,2024-07-03T01:56:45.670000 @@ -251504,10 +251505,10 @@ CVE-2024-32901,0,0,a3552a7ee6d0836f928936581a297ba1f653d939cb18fc905df3f090c2fd1 CVE-2024-32902,0,0,1fbd0dd08d9bd5e977338d384aea2714e29c13de9c12a031106e742a6a47a2bf,2024-07-16T14:57:42.527000 CVE-2024-32903,0,0,aaeb38f7d3b59ab9144fa4e43bf721b3198a6bd2ece544fac74a73168645b438,2024-07-11T15:15:02.090000 CVE-2024-32904,0,0,3961c2a580b4e2b2979bdb22f632f77b910e660ceef5325c42d6a6fa26d552d7,2024-07-11T15:14:41.203000 -CVE-2024-32905,0,0,2eb41f0e9cf9f3f2b219d556555b371f4f2bedea99fc9e25c35c0e862b4a23e1,2024-07-11T15:13:21.467000 +CVE-2024-32905,0,1,4460b80af340c6f668b7232b3aebc59e6f35de40c0e49ba7c976380d5f0f46f5,2024-08-01T13:51:38.530000 CVE-2024-32906,0,0,09fc4e5210ea82962a397f90475a93836b6dc6161443f25a2b71164b58f1e099,2024-07-11T15:13:02.713000 CVE-2024-32907,0,0,14dfd1aaa25a46fea5214540e8b9086c0e794eff9e7591e8b296e1769fd633c5,2024-07-11T15:10:44.407000 -CVE-2024-32908,0,0,312c1682636aeea08a2f2a9045f0fc01526c00f32557a30c9ee32dc9a3e3ada2,2024-07-11T15:07:31.087000 +CVE-2024-32908,0,1,f22243bdf03341c4f49fe8c95d52c9746f5d3123ec78466cf58d8b7d93534350,2024-08-01T13:51:39.347000 CVE-2024-32909,0,0,1747a0b48751800c2e7098eeab32f86aca7912a949dd3414617c820a86f62b03,2024-07-11T15:05:52.807000 CVE-2024-3291,0,0,1fc26be05fd4e8c0c75776f8dbce085d67ae03152f1c480f017ccf6b064046b2,2024-05-17T18:35:35.070000 CVE-2024-32910,0,0,96fa2d9d7d031cd1f9c1fc15158945931873ec9256f8a9c2c7692b992096082b,2024-07-16T14:56:46.903000 @@ -251519,7 +251520,7 @@ CVE-2024-32915,0,0,ce3c0f63e7c4b15b4980a52ade118f9c0799ed8303c4569ce9e259a0da82e CVE-2024-32916,0,0,b886661caf70d7fd3c261e90c0f590c6eca5af4ee25ade8b0972d2baebb2ff9c,2024-06-17T12:43:31.090000 CVE-2024-32917,0,0,08f391494a3376dda1649b3bc4f3af1d617f4eefee77b1afb26b1c79958a698a,2024-06-17T12:43:31.090000 CVE-2024-32918,0,0,2a2c8a8c7d4b363845694cbf190176d55749936bbf41bcb406340187abded385,2024-06-17T12:43:31.090000 -CVE-2024-32919,0,0,3cbb884c2c2245d431d9a29201f27ee447e0eb2367a14ee73117872b3e04e7f5,2024-06-17T12:43:31.090000 +CVE-2024-32919,0,1,f0aa26802459bcc1e57c74adfaef7d72c48e702e9fd1db0d49dae70c6bb3b2a9,2024-08-01T13:51:40.153000 CVE-2024-3292,0,0,07318f8f2185b7ffadc020ce54f4218255ee206d16b74c44d805183e4ce99eaf,2024-05-17T18:35:35.070000 CVE-2024-32920,0,0,884af5f47808b4ceffd2a4bd9b80204f75cce16bd0848479c6a369a24d34e09f,2024-06-17T12:43:31.090000 CVE-2024-32921,0,0,5b79cb1f66f33adcf5c8a2b378cf67e85df19e642d129d69c81d721f92ef6349,2024-06-17T12:43:31.090000 @@ -251603,7 +251604,7 @@ CVE-2024-33009,0,0,9fffec5852b09af7f1bb1b07b45ef4425c32b244f8874f3a8215a7b60c259 CVE-2024-3301,0,0,62e3552bd5d039bd1b4bc4d9d5f850a4c05820a2e0120004396cbe097f692068,2024-05-30T18:18:58.870000 CVE-2024-3302,0,0,10a0a5360346a347e0e1404168c46ba9e22d839c53347c2b379db8443b59f174,2024-07-03T02:06:08.953000 CVE-2024-3307,0,0,de2078d32c9fd66ca1e329712579640346be35f0240807faa106038aa71fb05f,2024-05-02T18:00:37.360000 -CVE-2024-33078,0,0,2795b9ab5d15d0212311b86803e7b3e256dd94020b5cd80e16e05278d46aa093,2024-05-01T19:50:25.633000 +CVE-2024-33078,0,1,32899b4391f10b7cbfcaee5abff907eff95c8894218149b7342d82053a7e337b,2024-08-01T13:51:41.723000 CVE-2024-3308,0,0,b12c3c7359268120e478241aac0d965ee4975d5f2a92382c8de950e6d75610fc,2024-05-02T18:00:37.360000 CVE-2024-3309,0,0,86d23734c08e91abb9c54fe3adc839130d817cf111a237c0656262c25ce176f0,2024-04-29T12:42:03.667000 CVE-2024-33101,0,0,02c41b74667ba4c6c855c7f8be761695b1033ca3ebd54d33f4c74ffe5c076663,2024-07-03T01:57:25.600000 @@ -251615,14 +251616,14 @@ CVE-2024-33111,0,0,b6aa79d7fa96972383b596dcb7f242edbb816eac6eafb7be06fed5f14d30b CVE-2024-33112,0,0,61726a155e2bdcc74c8368ea556d026cd4407025cc57866c1e39e33d575c63e1,2024-05-06T16:00:59.253000 CVE-2024-33113,0,0,52de5588a6b1c2d4dca0e59f9ff40c57f764cd0549cbca52bafec015292d66c1,2024-07-03T01:57:27.973000 CVE-2024-33117,0,0,89b99cb61c3401206c5aab035682d0d5c4ac5feff32be6ae815cd54d3d22b834,2024-05-07T13:39:32.710000 -CVE-2024-33118,0,0,5b537b54e5faf6d8e95b8da9360afe5d06ca1b907bee6560632717b8dcccbae6,2024-05-07T13:39:32.710000 +CVE-2024-33118,0,1,fdfeba73d45dd865522ccbe98999cf8ae6924684fc43f95712321a5205f8a5f4,2024-08-01T13:51:42.520000 CVE-2024-3312,0,0,673a4b52be90bb8d519b4025d66c49eb1b0d8998a4b5a08bcade92339077cac5,2024-05-02T18:00:37.360000 CVE-2024-33120,0,0,75be799cb77913de5b744b592fc9f1d7bb2b4160e45ac741918319e80f040406,2024-07-03T01:57:28.817000 CVE-2024-33121,0,0,edf7460f7f7adab8e228b5ff796261e79f522c43247c3404f31f8d8daf19d480,2024-07-03T01:57:29.587000 CVE-2024-33122,0,0,6ced59feebf7e4717ee62f69cd1020411fcc3e253935444639c596b9f4dac84e,2024-05-07T20:07:58.737000 CVE-2024-33124,0,0,61d65caffa6a7c09f37b7d9aaeb31ffc0225bf90c60a22ae5f347bc3de14de18,2024-07-03T01:57:30.343000 CVE-2024-3313,0,0,19e4efc82b91be54c613b4af1cdecff5d3a025a1e33138f2779ab8c054b3e34c,2024-05-28T17:15:11.210000 -CVE-2024-33139,0,0,70dce87f9f6aa3e2306373c45e31fd32e22566387a11134b0477b9514bf1a30a,2024-05-07T20:07:58.737000 +CVE-2024-33139,0,1,4dc296ec40d742774c8325154323233da513fffbd0c23d14d8c7c604164457bf,2024-08-01T13:51:43.317000 CVE-2024-3314,0,0,2a6089b9715ccbb2944e67e64444ce430371716aa66690df6a523f92fa13c530,2024-05-17T02:39:50.393000 CVE-2024-33144,0,0,7ce66848bdfdad6c7661c7606415e2d330de485bc612c3cf999a55dbe1be4b18,2024-07-03T01:57:31.107000 CVE-2024-33146,0,0,4baefebe2977ba4ed48c0fb4dc2805a0ffd790dd812293e2b72426874933d1a5,2024-07-03T01:57:31.870000 @@ -251637,9 +251638,9 @@ CVE-2024-33161,0,0,7c862270cd8db5129099f6546f3d477eb1434dd611bb5f19fdd029c5b8f8a CVE-2024-33164,0,0,c1a8c6145de610892a7bb74e83180ec7a64a9f7db7bc45d4e35a23e8ebd4b541,2024-07-03T01:57:35.293000 CVE-2024-3317,0,0,15025142ba0ff8fc3f744db50ac9158b6bcb9b6d5a57142218ea92afecce54a1,2024-05-15T16:40:19.330000 CVE-2024-3318,0,0,71502ae7f4475eb417a0f66428af131ecf9e20dfbae9cc78fb40285e74c55810,2024-05-15T16:40:19.330000 -CVE-2024-33180,0,0,be009f10bcebf1e98910a8635d0e84bddf7114d6da1db43077d57e11c3875055,2024-07-19T18:56:27.127000 -CVE-2024-33181,0,0,77250253d08a3feb8fbbde7865e83c75f042d3ca6fd20c862b5cca96419dc488,2024-07-17T13:34:20.520000 -CVE-2024-33182,0,0,5c7ef37a480fd030990cd949b2c37482b68e7bad26bc93f18c84eca3078bea91,2024-07-19T18:56:50.050000 +CVE-2024-33180,0,1,7143cd6c9ae742d835796e137ba7151af367770b1dea0fe456c6afd2e747d492,2024-08-01T13:51:44.097000 +CVE-2024-33181,0,1,050373cfb1c1e53ba8267dbc3fabd7fa63ef5d1b950dbe9c6f1ffa2007dbea01,2024-08-01T13:51:44.900000 +CVE-2024-33182,0,1,85cf52b790aabe853226358e7739617cb8f2d818ce16c35309a03355724b6ba5,2024-08-01T13:51:45.673000 CVE-2024-3319,0,0,3b63602fbf088f6ff76602ae3f5143e8ab646a9d9d32adce3daded5265d3ba0c,2024-05-15T16:40:19.330000 CVE-2024-3320,0,0,00dd140c669ed55b9724819953be5e5ab674983ce3dcac0f7cca51e60d13bb6e,2024-05-17T02:39:50.797000 CVE-2024-3321,0,0,c2a87eddc88d30331563f9d17a640b75164460d2c5dacd42388be73c643c2230,2024-05-17T02:39:50.900000 @@ -251649,12 +251650,12 @@ CVE-2024-33213,0,0,535ed6b61a2defaf607542370541a34cb9da6a875bd2f52f1cf422d4fb6cc CVE-2024-33214,0,0,8e181eaf2c411bd8942ecfd3d2eed2d851824edcd9b22698bc6806bfcacc1394,2024-07-03T01:57:37.013000 CVE-2024-33215,0,0,f9635f87bc059511c8393decbd9afdfc8c1adc67d76d6bf1ee0f441704979663,2024-07-03T01:57:37.763000 CVE-2024-33217,0,0,354b5a23f558e92d050327d30690d4d0cf33b1813371b833ea7a1242e58a76ef,2024-04-24T13:39:42.883000 -CVE-2024-33218,0,0,4c14ae3f4d4eeb65e68768c0e4de2eac11d8170e832eaf1ce62bda21a8586f66,2024-05-22T18:59:20.240000 +CVE-2024-33218,0,1,ee7d69983b37f9c6bf7e7a7a1874f78caedf9c878645e11206579f136a2c86ea,2024-08-01T13:51:46.453000 CVE-2024-33219,0,0,2dfa02749f2dc3cae0573cb558653331cc8a76159ec20cf26150e2c7103356aa,2024-05-22T18:59:20.240000 CVE-2024-3322,0,0,e55b514365f4edfd08d32461dca85dba678afa08e3277cfa12a38dc6ce7e86b6,2024-06-07T14:56:05.647000 CVE-2024-33220,0,0,4c042634f5eec83f599df9e164edf362eff9644cfe22377788ce1325222774ae,2024-05-22T18:59:20.240000 -CVE-2024-33221,0,0,79403868a21cac0608b766e5cab8ddb6a244f7a26833836881a7264f37b7df07,2024-05-22T18:59:20.240000 -CVE-2024-33222,0,0,6398364f32987a3da03bd8968f9f2a717b29723ee5b451fdc24c5b4895947d0d,2024-05-22T18:59:20.240000 +CVE-2024-33221,0,1,4c13ec1b720b7ec2ce94f445e942c2447ba67f3bae626d7dba251fb8b3437798,2024-08-01T13:51:47.243000 +CVE-2024-33222,0,1,826b88c0df0010107f0595e8bf718ff48038d9c2823c40b87f1e329d93d630c8,2024-08-01T13:51:48.023000 CVE-2024-33223,0,0,bd16de328c282f1aa1b7015361c590473a5b6bf3caa6b0c34867ec1e542d4f9a,2024-05-22T18:59:20.240000 CVE-2024-33224,0,0,ea562c47166b9ccee59aa37caec5e01025be0e30460cf86b89874eb41ddf1200,2024-05-22T18:59:20.240000 CVE-2024-33225,0,0,20ea8cc6ddfb6cfd8258351119e0796feeaade6c50f1b0404fcf51caf0bfa6d3,2024-05-22T18:59:20.240000 @@ -251665,19 +251666,19 @@ CVE-2024-3323,0,0,35a6027c28bfec2d03f21e8dc2fb44053ba20d6734735309aeaba44e533a00 CVE-2024-33247,0,0,40a5fef5b7dc3488c3170d87b3d0b3fdeccf50a4efd249dd8f1c8814c02594a3,2024-04-25T13:18:02.660000 CVE-2024-3325,0,0,eba92195eac782e585c88625ca97b48ddac98c797259bb726a1fc19af0b8d9a8,2024-07-12T16:11:57.460000 CVE-2024-33250,0,0,7e5b6f3a85f4022ac55d312b9edfd716dfb136ba70130e20ba2a5d9afde63c5b,2024-05-14T16:12:23.490000 -CVE-2024-33253,0,0,6da624893261e1f07cd12f856cbad7f8d4b16aefb1251c88be902a8c138b1f18,2024-06-17T12:43:31.090000 -CVE-2024-33255,0,0,7f9fcc1676c45a46e5b25a035aa4b91584c1cf008eb8c7271741d0a47bfbd60f,2024-04-26T15:32:22.523000 +CVE-2024-33253,0,1,93bbe21178b7e649bc422924ee38189db43f8c8428f94afa4332d6b18f0a2e6b,2024-08-01T13:51:48.870000 +CVE-2024-33255,0,1,54ccbf647ee08668a3dc875c5b8137fefbed9eccd9d092b45b5f75cf76ec3635,2024-08-01T13:51:50.153000 CVE-2024-33258,0,0,beac851ef20f5a54afe94881fcb789cf6f226fede1c4d12518afab051f313fbb,2024-04-26T15:32:22.523000 CVE-2024-33259,0,0,b9cfacc7381c863d79548660b191f9ab569132aff57640e20db67cfe7e276a28,2024-07-03T01:57:38.597000 CVE-2024-33260,0,0,55a867adfd5e0f6edfcce33a55bd36bba0efe48c958963841545b9ad37a0e4be,2024-07-03T01:57:39.373000 -CVE-2024-33263,0,0,ff37d80c56f99dbf8e640b580f355a3c53f64d83af81edc9385525f46571d507,2024-05-14T16:12:23.490000 +CVE-2024-33263,0,1,80eb3b62a1a99d429b5cd86ff59029416be1ec71954765e3a6b768ff59769032,2024-08-01T13:51:50.933000 CVE-2024-33266,0,0,8da9550e664ffb01c93e13a2976627dbca56b208babf06ddb3497b2ad2a2f186,2024-04-30T13:11:16.690000 CVE-2024-33267,0,0,7eba67054759f1c32ed4311ab6657f5b98d023948e910b24b95ed0e60d9c6b1a,2024-07-03T01:57:40.120000 -CVE-2024-33268,0,0,735b54291c4060e1561568be7a3af3e43843a16d7de67b121a9c060c2cdf51fb,2024-04-30T13:11:16.690000 +CVE-2024-33268,0,1,cfc13407cdc4340296c6ae0ad33800c62279ca3859856aec1f9cdfd54e3f76ed,2024-08-01T13:51:51.127000 CVE-2024-33269,0,0,ff7344a3e782883ff05ffe243216e31d8ec317b81fe485e6183631084242f561,2024-07-03T01:57:40.893000 CVE-2024-33270,0,0,cdc7e08877fbcc460cc7c70973f5bbe2473a1535e015688721efa7ffe2cd01bc,2024-04-30T17:52:35.057000 CVE-2024-33271,0,0,ff4b503681588c5b252c4b59d9973b0db308ba4cd89028bb833a97a24a35af36,2024-07-03T01:57:41.730000 -CVE-2024-33272,0,0,5d6eac763ee84428350b25bfa489e5d6fa1fb76260106019c2c886deffd831cd,2024-04-30T13:11:16.690000 +CVE-2024-33272,0,1,12b9a14d6c54cdd18e2a7a3f94be409906c0b2fdb925d84ba498200b385d3f58,2024-08-01T13:51:51.900000 CVE-2024-33273,0,0,386d524e890775529049cee7dfa9e3e570dfc8632102ed86e91a6c8f3e643b0d,2024-04-30T17:52:35.057000 CVE-2024-33274,0,0,bdb6b1593a60cc15e72244586d9ffc42c759eb326240c00c21e5dcd1d341c3db,2024-04-30T17:52:35.057000 CVE-2024-33275,0,0,4251729a2acffecc6a6671231470090228a04965d2bd2942e3c8151bda563e34,2024-07-03T01:57:42.480000 @@ -251685,7 +251686,7 @@ CVE-2024-33276,0,0,1fe1410ec422bac109498ece274211e156abcca47b7c8479c6d7de8507635 CVE-2024-33278,0,0,66b076915372ac75eed52c103d009ceb4804813177b3c017eb8a608d0a388063,2024-07-03T01:57:44.047000 CVE-2024-33292,0,0,c3ceabb00f3a3025e64af61f5190512ed104ea5315c3e330d81a0229db92ebd4,2024-07-03T01:57:44.807000 CVE-2024-33294,0,0,17541a6765e44ea06a20248c9ca673778968fec1e4c8bcb2e45ac885e55d6596,2024-07-03T01:57:45.580000 -CVE-2024-3330,0,0,7317c8a40c023fa02147d9260d414b333002f9adc554e326df85cc827e44b374,2024-06-27T19:25:12.067000 +CVE-2024-3330,0,1,3a5e0f87331244b84398cbf92b1547e53f86e6204209f01de67779fcb9dd72fd,2024-08-01T13:56:30.807000 CVE-2024-33300,0,0,fa87abfdcbfd1e8c97c25122ede65d7d482f76e3289e99cabd18dd015de96144,2024-07-03T01:57:46.330000 CVE-2024-33302,0,0,16226248dff503a810cb34493ca6df179d8a427e800a21d419cc2490b51d59e7,2024-07-03T01:57:47.117000 CVE-2024-33303,0,0,3d6207cf61eaa0c4b222d2868df52f9c415342494118f3616c907664ad0775a3,2024-07-03T01:57:47.943000 @@ -251712,12 +251713,12 @@ CVE-2024-33343,0,0,0403ccc83281b5ef39242fa2607cb174a7fbc97f1fc5833b8133765daf81f CVE-2024-33344,0,0,d3440b7441a8ba175b025336c345037d972b6caba49539eb2fcd5ae07cc7e54c,2024-07-03T01:57:55.620000 CVE-2024-33345,0,0,5fb5f74cbe8d9322d0f3b29fb4588f6cf198e3debc3830c92870acdd420c4824,2024-07-03T01:57:56.393000 CVE-2024-33350,0,0,4da55935e9588517cc2dba9e7ca9c451d32fef61d990ac2b7f8d39773dafe4a2,2024-07-03T01:57:57.207000 -CVE-2024-33365,0,0,738be1d68a3cd5595b1cd9d28550ab823211dfe67cc620328b5afd508bdd721e,2024-07-30T13:33:30.653000 +CVE-2024-33365,0,1,753a357764251688c2c58169a412ba47dbb205dad7d51ffa0d9b46ec5f577645,2024-08-01T13:51:53.400000 CVE-2024-3337,0,0,61d2bfcc2d7fd47838831dec2e0c7db020f3b69cc3626c76d24aae7640ac48f8,2024-05-02T18:00:37.360000 -CVE-2024-33371,0,0,fbbb55d3797ee006ae501706ab47c7fd5dd77cd4bb3fa6559e57a7b8d161d5bf,2024-05-01T13:02:20.750000 +CVE-2024-33371,0,1,e62923a0247293e9f796432d7299bfd32c3f9d7f0037d1c3b023058b5d67d80f,2024-08-01T13:51:54.193000 CVE-2024-33373,0,0,1310aa8488d26ba93bc57409318880dd75ff8c9ca32bcabb44ee33f3844ee015,2024-06-17T18:15:15.920000 CVE-2024-33374,0,0,243e9f210ed37aee6e82391955d78875fcc399a2a4a1c88574efbf4fc6f1f077,2024-07-03T01:57:58.047000 -CVE-2024-33375,0,0,2304060aee73f8f45bee4f805165fb692fc7eb9db70b9f99eb3ba5cedfac65a5,2024-06-17T19:15:58.107000 +CVE-2024-33375,0,1,3c42a38ae5f04141c6649ba31f40f64a0c3f80d6e11b222e09f0acf2cb15621f,2024-08-01T13:51:54.967000 CVE-2024-33377,0,0,6251b0a1a5395fb43785352f146ee3a108da78ac236988b83117c2dea94d739f,2024-06-17T18:15:16.107000 CVE-2024-3338,0,0,b2327c11e1d762220f8764f83498076a393d83520a65cf1a3ec9854d72e0d01a,2024-05-02T18:00:37.360000 CVE-2024-33382,0,0,dc1b896c815bbb6d05d98ce7170409486d331681fef4f2caee5818b69d11fbd6,2024-05-09T13:05:45.620000 @@ -251749,23 +251750,23 @@ CVE-2024-33429,0,0,6250a357badd662aab990ce6b0b26247ba646ef32396387c4f5d15eb6a9b3 CVE-2024-3343,0,0,41be5cd5231f68ee559938e920884374e97abbfd9fe9580d315328693b586d19,2024-04-11T12:47:44.137000 CVE-2024-33430,0,0,993b3294050392fefcb9816964b718ba74e359b0ac7b5293f058fa179eaf350f,2024-07-03T01:58:11.383000 CVE-2024-33431,0,0,a7c1a6301976b2d2e09da72a5c3e2e07719bfa5d761e3b3a064294c09c4ed2c9,2024-07-03T01:58:12.147000 -CVE-2024-33433,0,0,a09d4f48a49db5c049dbd18c27519fe87d8391c8af290606e85293647c4a3f5f,2024-05-14T16:12:23.490000 +CVE-2024-33433,0,1,b4b08946166643db9bdcfcb770422f0edd7ddc1d1c62c51f687c1bc821d2bde4,2024-08-01T13:51:56.190000 CVE-2024-33434,0,0,d3d9dd7556d381ed0616d5fd402213526363d7fa50ea2db29323c7c72d416248,2024-07-03T01:58:12.927000 CVE-2024-33435,0,0,7db2665c6496dae0749e042f8d814063672abd8fcceac696d209fd93a501e9a4,2024-07-03T01:58:13.733000 CVE-2024-33436,0,0,4b7aad63b1a9d18447e5bf42251db2f590710ce8a67d312a75dbe09e1f3c4107,2024-05-01T13:02:20.750000 -CVE-2024-33437,0,0,3c1caf224cc75e9fb2dbbb4363b12654dd5d0982d82456c4bb268484c4e78c74,2024-05-01T13:02:20.750000 -CVE-2024-33438,0,0,645167648e81f2262cc42f0430c4a4665530d445c3338c55a2416cda865a0213,2024-04-30T13:11:16.690000 +CVE-2024-33437,0,1,98a2b6e10245b112bb331b45bcb3f30a0dabc9110f63c643d94fcc31a61289bb,2024-08-01T13:51:56.957000 +CVE-2024-33438,0,1,5149b18a46d53268b7670d8b6f23e45b58f0f7e28bd1fbf2d1e49eff1651e3a5,2024-08-01T13:51:57.143000 CVE-2024-3344,0,0,70bfed73bbd8c0224afca425b004f1e6ab3832350ac16bb40ba0f3295e2c6f92,2024-04-11T12:47:44.137000 CVE-2024-33442,0,0,3bf0c7079aa4cdea0cf4fc3dc62abf7d3d6d92d11b677d6553e5342d569d6775,2024-07-03T01:58:14.593000 CVE-2024-33443,0,0,35242e2b0082b15f0bb5de03b6dc07c30701907ec01624317337d782f850f813,2024-07-03T01:58:15.370000 CVE-2024-33444,0,0,3ef8405d0701f5475dc75b10aec72e2f6b5a70303f405f10387e1aa41ce1da12,2024-07-03T01:58:15.583000 CVE-2024-33445,0,0,6e7e4efc8ec4c00f5a4d8586fbcb92cabc92474cc1d9f3d59cf859cedc450f3b,2024-07-03T01:58:16.350000 -CVE-2024-33449,0,0,1658bd735d437f89ffe39b61254576941e46a93fa407c9a24ab9e3b0337d7743,2024-04-30T13:11:16.690000 +CVE-2024-33449,0,1,65f31ebf7cac3fd744da219853727b760d519b14a5a3f0dabbd6197ba25b1997,2024-08-01T13:51:58.900000 CVE-2024-3345,0,0,636931b54021c23b6b8befb749ba186f8411eca702348865e4d3d050c16c6125,2024-05-21T12:37:59.687000 CVE-2024-33450,0,0,4e09c623b6101225f314d1df53358088e879f8d91a1a16fa51d690b1bfa25901,2024-05-29T13:02:09.280000 CVE-2024-33454,0,0,74b0a1930570ffdd0fe139f1c45084400e123a1a6e46097c3427b727b87e14aa,2024-07-03T01:58:17.097000 CVE-2024-3346,0,0,5fe2388e7081d85802d7eeef70ad8fdaa632fc14126ef86b4921587d73e76418,2024-06-04T19:20:19.553000 -CVE-2024-33465,0,0,24312656ff6e78df1a9f2dcd1ffcaab1ec9967401adad63e45e257e572208c88,2024-04-30T17:52:35.057000 +CVE-2024-33465,0,1,7dc8798fe71a3f778010ed5d146c9c87c91ee3709364cd2f1c6196073e9c2579,2024-08-01T13:51:59.690000 CVE-2024-3347,0,0,9b199e7d34c12b794e3fcb3e483a1e015cb7f912cd5ad3bc6b26d3e5c6f61a14,2024-05-17T02:39:51.303000 CVE-2024-33470,0,0,74ee6003704963e018fc544b677d802faaae50cddeeafa5159cc7c156096ab01,2024-05-24T18:09:20.027000 CVE-2024-33471,0,0,9cda120795d2cb05432987cf2342b219933f08e34a97af932899d7da68c284f6,2024-05-28T12:39:42.673000 @@ -251789,21 +251790,21 @@ CVE-2024-33509,0,0,d15148c734ba292a0a6a960942e9e080fbf6de2e79ebccd29df0038ddbe10 CVE-2024-3351,0,0,2d444d04a071c972bf019c9f444260881949f9b31576f665a6e90d6ec68f63c1,2024-05-17T02:39:51.683000 CVE-2024-33511,0,0,fc70fe6b0a596d6a09769f1b8403860f36c39e5f9d265f34a0625ad60ef9eda2,2024-07-03T01:58:19.517000 CVE-2024-33512,0,0,ed3fd30b2c7f54d5b77a7a17b80f11ae07a7c55c7ea654de4b6fe924d93e8a85,2024-07-03T01:58:20.207000 -CVE-2024-33513,0,0,9c20c2a1df7f9aef87f42ca5b5e1f373a326fbb0cd04a029a0444d0d17ed883a,2024-07-03T01:58:20.920000 +CVE-2024-33513,0,1,85ad3015e89a3a26e3466fad66308dcf32b20fde6d6456d47acbefc0ee4cc405,2024-08-01T13:52:00.640000 CVE-2024-33514,0,0,4aab893018a6a2404daaafa33312b00ab60231c8a7baeb1e63689eb6f4e7dcd6,2024-07-03T01:58:21.100000 CVE-2024-33515,0,0,0a29698b566d1ce96badc6c9dd3f9a2648c522eb6b37724b52074d909a3a4bed,2024-07-03T01:58:21.780000 CVE-2024-33516,0,0,2a125f75033a85309256af5b7bcbd9cab289bd0eb807ee2035c6ab7d5101ea26,2024-07-03T01:58:22.457000 -CVE-2024-33517,0,0,825ccd60c40de640bc82816af8a7f66687631cc679103ccdd5ad49c6ebb772ea,2024-05-01T19:50:25.633000 +CVE-2024-33517,0,1,42029aa36f58603a881b2ef5ac508acb053c336f576b36c7ddef281848432d41,2024-08-01T13:52:01.677000 CVE-2024-33518,0,0,84ccf326440e53cdc178e6fa27177ba3577a132315b02d47fe46572cfd6ace26,2024-07-03T01:58:23.150000 -CVE-2024-33519,0,0,86d18b40e7d1f2c92220604a563554d4b10a6e2bc42a41b8752ef4493cf23fbe,2024-07-25T12:36:39.947000 +CVE-2024-33519,0,1,612d2dfa9aabe85b61b91235e6067bc166bfc0a82bfda3dac3deb3fbce085f0c,2024-08-01T13:52:02.460000 CVE-2024-3352,0,0,be8f28061e5ae4d9d9b2e6a11ede257adb292cc79dc8c4235b725fe02c0776ab,2024-05-17T02:39:51.777000 CVE-2024-33522,0,0,99fcc369cb1d7d030860e4a6a89738f8fddd8cc3ac74b8b631e1a59fe3215895,2024-04-30T13:11:16.690000 CVE-2024-33525,0,0,2e71eaad279c374a12f668d097a9cb7bb1826ead20d625216f803275f1d12777,2024-07-03T01:58:23.960000 -CVE-2024-33526,0,0,ea1631dee93e6a3059d146ee79b161fac008207c715cd94ec095728aaf2939bf,2024-05-23T17:15:29.020000 +CVE-2024-33526,0,1,d9fbb2bf90f7562deb9562daceb1447ff20e85e1306478b1fbaa885f49f02b18,2024-08-01T13:52:03.173000 CVE-2024-33527,0,0,c58cd3ff1861491b9e0aa8bd55b935a0ffef7224152b2ec75ba8d15461542ccb,2024-05-23T17:15:29.103000 CVE-2024-33528,0,0,bd8e62823b19e08579fd691ac970898928cb9497618db630c36d8b639e2f1c92,2024-05-23T17:15:29.213000 CVE-2024-33529,0,0,91064aa32d9fedf772ab62f032798d695b5cf92350be4cf38e5a4910e6c665d5,2024-07-03T01:58:24.870000 -CVE-2024-3353,0,0,5518d68bb22edf58a844d9a538ef4f03c55b7b264a7735e106c23aef87da732d,2024-05-17T02:39:51.867000 +CVE-2024-3353,0,1,ce0bc328455f80cf14b93a65517c4acf833c7c445bb8d7418f958bb30757f2de,2024-08-01T13:56:31.790000 CVE-2024-33530,0,0,06dbd90020910883fd649aabf3091f4012b6024bee39b35744993f4679188732,2024-07-03T01:58:25.043000 CVE-2024-33531,0,0,b4f686a17b522487db106a979e75b685d2e11fa9abe95f79b3890bf766d3a008,2024-07-03T01:58:25.220000 CVE-2024-33537,0,0,998984db2770bafec92fa3ab30e5515c9a54bccbc523df8841567287c8cc6075,2024-04-29T12:42:03.667000 @@ -251920,7 +251921,7 @@ CVE-2024-33654,0,0,0892ef25c45719b53efeedb9f6ebabbe65a8f1a2df54c2a179e8dc18f8e5c CVE-2024-33655,0,0,5b78877100297f0da919505636ca4a0c13bc834698615142818e1b1740a1898b,2024-06-10T18:15:34.520000 CVE-2024-3366,0,0,a2c419b6dceb854c8524f6fea56c90f31e3f9047e1890ead74a66fe52a9e4023,2024-05-17T02:39:53.090000 CVE-2024-33661,0,0,1fe83f392b56cfa5102f5ff20013157b18140b66b95ef00cb93915789153e2d5,2024-07-03T01:58:33.073000 -CVE-2024-33663,0,0,fe3b8025ef3d5a7a14bbb35049d5c8aa25fa708561bd00f1844b08816d018bb5,2024-04-26T12:58:17.720000 +CVE-2024-33663,0,1,db8b0a89295da87b904c35495b8dabe0be3c83ae5d78acd0b06dd2958ec2a318,2024-08-01T13:52:05.147000 CVE-2024-33664,0,0,1f14ba646cb36da5782e5139ec1440df7d961dfff9661ec48b405e932c0090e6,2024-04-26T12:58:17.720000 CVE-2024-33665,0,0,9829794db8bdde871cc24b610272626c5df45bd7db37521cd118611d72f158fe,2024-05-17T02:39:27.117000 CVE-2024-33666,0,0,8e982c6a0c03f8b5d1cbd58e6d45d8ee40f43b5fb9ebc6cbaefdef7cc6467b9d,2024-07-03T01:58:33.837000 @@ -251979,7 +251980,7 @@ CVE-2024-33780,0,0,c16faa38fa2e3cb315427d6e5330ce2610c63349f4a81ec54bc650473e873 CVE-2024-33781,0,0,f92b3d1e80a012680436fd49e5bab657fd2a9b945e08254832c1c45257ab0ec0,2024-07-03T01:58:45.220000 CVE-2024-33782,0,0,d54261586afd08a5185da8c98a333efe96e77b0a86120ba9d5a8acb87e82f8b3,2024-07-03T01:58:46.057000 CVE-2024-33783,0,0,ab3a37415f38062c8c0433a787e71d9de7161e1a21f1c7c7424bb11f9e8ff724,2024-07-03T01:58:46.247000 -CVE-2024-33786,0,0,63d43b6580450a8d6e9308534ebd0dd2e3ee4391b349f0dbbcb687d48124fa2b,2024-05-03T14:17:53.690000 +CVE-2024-33786,0,1,4c34eaaeb6404bd11728362ca0ccaf1f06d8896bfaa0a8e30f5a7055f9db9f9d,2024-08-01T13:52:06.273000 CVE-2024-33787,0,0,e7cc09c9a270ae17cb000970f996a17b61d199ad3336b214cdde603fe73a0562,2024-05-03T14:17:53.690000 CVE-2024-33788,0,0,db496e414e9eacb69df835d7ad8cccbd3f6da6b6998f07eaab69cafc694fe336,2024-07-03T01:58:47 CVE-2024-33789,0,0,1b705f261bdfdb3c7c0384a6685c74908e5e41969953d5575683a1d41efd63d5,2024-07-03T01:58:47.770000 @@ -251990,7 +251991,7 @@ CVE-2024-33799,0,0,bdd9f09a7e12636314e6c3f2a347985a0a99e4b2447b14defb0b973670e27 CVE-2024-3380,0,0,2dff51ddbee3af980b9cfb6cf09776d99cf02d06821df7efa0940e1572fc0531,2024-06-07T17:15:51.487000 CVE-2024-33800,0,0,201356ff7d99d67e9b23318eb81347b8e0acce7c8616f8f0b16bc1aecb8d2a62,2024-05-28T17:11:47.007000 CVE-2024-33801,0,0,383edbe255017d36a3f80e7a95d80ea991a96b279313ea8f636ba2617e7f4948,2024-07-03T01:58:50.903000 -CVE-2024-33802,0,0,ac8434744a5016c50acfb414f5952290f271f3871d769ccd559f411a0337f4ae,2024-05-28T17:11:47.007000 +CVE-2024-33802,0,1,f7e8f11f0f50e76cb80d887fcc8efc43ff16481323dfc06befaf6248f46261e7,2024-08-01T13:52:07.557000 CVE-2024-33803,0,0,3903110335c3f4a5555b9c75678d77501a3d508f001cfefe41ceb0fe3e59d047,2024-05-28T17:11:47.007000 CVE-2024-33804,0,0,6621966fba27f3dd0da67323c048a53a2b132469f199bc736e2057ed57961b5d,2024-07-03T01:58:51.660000 CVE-2024-33805,0,0,58af49a7c74149ca9f823d30f922778154c6ecf6b330b510d828d2d1dcc56f01,2024-07-03T01:58:52.423000 @@ -252000,7 +252001,7 @@ CVE-2024-33808,0,0,6f39d1fde083a58a3dbbe3e92427a29caed98b799e7f73c14d761c305227b CVE-2024-33809,0,0,edff1298649e2a5ae7152f9d6f3a259aa8604676595abb8c1afc89471f835fa2,2024-05-24T18:09:20.027000 CVE-2024-3381,0,0,54f1490359f84b37b9085d1c2a64f460d8cc1a4d213b5755f1dd6de7bae13285,2024-05-27T13:15:08.490000 CVE-2024-33818,0,0,09590c05be714d2e78655420fb883ba6c19696eace5483ceacf82d9bf4f638f6,2024-05-14T16:12:23.490000 -CVE-2024-33819,0,0,3ae74f903358a61d8448a6b1ae99790bd2aed081cde49802e9f9ef1244284f9e,2024-05-14T16:12:23.490000 +CVE-2024-33819,0,1,19b18444fa7bef054ed44e8de2b65426fb809ecbd1d9e5fc73fb4cdf20d623c7,2024-08-01T13:52:08.333000 CVE-2024-3382,0,0,25fab866f7d41fa7f3333e3c12ab26d2310ad4bfdd8a7474e8bad2594b14ae74,2024-04-10T19:49:51.183000 CVE-2024-33820,0,0,1f4676a068bf8eef81b801f6edfe98ebc1889872789d97021fd443221fe898b4,2024-07-03T01:58:53.933000 CVE-2024-33829,0,0,82376f1bb7b84688541c346599e7ab08e78978ce19e0fd4a8bd452996459b714,2024-07-03T01:58:54.750000 @@ -252013,7 +252014,7 @@ CVE-2024-33836,0,0,ca4e61dbd315156f846a9cf4e6ecb006bd948e7b0e0ba1558760fe0d5dd05 CVE-2024-3384,0,0,e40494f4cc79f184423be7640904e779411ddd60482c02e316992b67bcd78eae,2024-04-10T19:49:51.183000 CVE-2024-33844,0,0,437324bc3fb95bc3edde402597b08f2d23d6855a92f3f5d5f79ef919926ec791,2024-06-10T18:45:09.903000 CVE-2024-33847,0,0,ae667fdb2032f21fdd40b0d89c1bf951a08b3c40e1bf80331cebce5a8e5c826d,2024-06-24T19:26:47.037000 -CVE-2024-33849,0,0,4224083aa6c83c450534cb7931fafa5bf50c12cd14529aaeadc2085977b6df96,2024-05-28T17:11:47.007000 +CVE-2024-33849,0,1,711285af88da51034d770e4f7dba4f259d947b941ed83e4d1af2a2b96823faae,2024-08-01T13:52:09.410000 CVE-2024-3385,0,0,327b76cedb073b60c4f8c3e90737eb0ba35715647736f9323adf15afbb307026,2024-04-10T19:49:51.183000 CVE-2024-33850,0,0,95f27d9d9e057348262bcab0b02347c6a14020e669eb08e0851a75b104d83e3c,2024-06-11T13:54:12.057000 CVE-2024-33851,0,0,6fe0c9fc7bc19efc32ba623306eecc7b17efe8e6591ad62c2645cb513a9705c0,2024-04-29T12:42:03.667000 @@ -252040,16 +252041,16 @@ CVE-2024-33875,0,0,961d0a6c6b6d4c52575d84274296f310505d580e4184903458febffa26176 CVE-2024-33876,0,0,a3d9f2af701b9fefafa7b2161278e52edc6d2a1278c90424e3c359f2aed0dd44,2024-05-14T16:12:23.490000 CVE-2024-33877,0,0,b4f1b95444f84dfcef907af7774009cf66d9af779662daf465f9739beafd3f6d,2024-07-03T01:59:06.870000 CVE-2024-33878,0,0,feb8ae1feff70622d1e1a8722fc435816940bd9a5d61c3251757968e032c5925,2024-05-14T15:38:10.657000 -CVE-2024-33879,0,0,bdf5d481eb0f7fa33320fc0929d9b7ea85898860eefd9a4efa720fc13242f4e7,2024-06-26T14:40:53.927000 +CVE-2024-33879,0,1,a2e90836d222ca0b4ef7793d35cdf806e54f0108df2e23c18454cd2727a93dd8,2024-08-01T13:52:10.267000 CVE-2024-3388,0,0,f9348ead8a3a762ea5fd0f8418a8f813f393ecc8879c92bbb9d8bf44e11787c1,2024-04-10T19:49:51.183000 CVE-2024-33880,0,0,bcb151ac36e10d12c5d5d00d4ca8fc6bf0944d42e8b79463d3142d311e3127f8,2024-06-26T14:42:00.533000 CVE-2024-33881,0,0,e4d10f61fc565fc8bb5fef52d9f0697958357e8d77d4357eec47a5d0b1ff7b9d,2024-07-03T01:59:07.727000 -CVE-2024-33883,0,0,f0aa2d73a422bbdf0349ee505ba603781aa0cb2192f4d578d676d870d81b2313,2024-06-10T17:16:28.217000 +CVE-2024-33883,0,1,17dc0e905e19f7ba35c55f2bf6a3e6826331627411f3c0ad10d5ffc69e46f693,2024-08-01T13:52:11.050000 CVE-2024-33891,0,0,1989e665b70cca966ca59362172b98f189cf8e652408c4337ef1f2abce15995f,2024-07-03T01:59:08.507000 -CVE-2024-33898,0,0,d6695d3ccd92f52391ad90d65a3e841923695096543d5d9ab620656abbd894ba,2024-06-25T12:24:17.873000 +CVE-2024-33898,0,1,d8c3e8424b1aff6ae8a0fcc91c86b5228f2623afdea66b8b7db25938bc363225,2024-08-01T13:52:11.823000 CVE-2024-33899,0,0,215d012a0aeed617e9223e785f340f85e2514c39cf4a2326738c4b3613b1edd0,2024-07-03T01:59:09.200000 CVE-2024-33900,0,0,03828701299297702ee936c4723ae70794f1d4664c7ca2f0322872e9a7b4d7d4,2024-07-03T01:59:09.967000 -CVE-2024-33901,0,0,9827d4735b2592145eef3cf8dae1b0bd249439d4eeb4bd26158617553ad4a519,2024-07-29T15:15:10.533000 +CVE-2024-33901,0,1,df6aeadf255430ec28fcb21a8d2b63392b154720b69f745cf215f737e17a5b88,2024-08-01T13:52:12.590000 CVE-2024-33903,0,0,66fa6f18457541069e9742d7224c491d6b0a223ce231b54f3cf8ba6c6e111733,2024-04-29T12:42:03.667000 CVE-2024-33904,0,0,649f4e21e4e6e1bd169137db7a1546844fc67399c9649d4ffcd3b89ea6d1e17d,2024-04-29T12:42:03.667000 CVE-2024-33905,0,0,8733ae06a94637e7c1c0ff0f997c7e4ea1263aeaf349b0ccb59c2d115d8380be,2024-07-03T01:59:10.763000 @@ -252111,7 +252112,7 @@ CVE-2024-34001,0,0,f47716837d9d4b12395545e21b0b97bd8f96773591892a37286f525df4cfa CVE-2024-34002,0,0,1a8e0ed63a6d5bac8f51173886959f82edd25f2fbb0197f2a8cff9de5363baa7,2024-06-03T14:46:24.250000 CVE-2024-34003,0,0,90a6a853bacd211ad5804ef76935f128bcaaaf61c4c03698fbfba711ec694089,2024-07-03T01:59:15.440000 CVE-2024-34004,0,0,24178f5485fdf0519088f22aa01cad458eacee6bf779a59579fc437dca127b5c,2024-06-03T14:46:24.250000 -CVE-2024-34005,0,0,20479d15c576a0c916744a1d9d3bc1602eb86eed108eb2c02f40d786ec2f728a,2024-06-03T14:46:24.250000 +CVE-2024-34005,0,1,3cc41e8d5cf47efd2659de94be11f3633627e887af28aa45c65ebef356741180,2024-08-01T13:52:13.690000 CVE-2024-34006,0,0,395648fff5e3bb9db979037721cab37ad30235177e6b8c53ee620b321ccc7d74,2024-07-03T01:59:15.730000 CVE-2024-34007,0,0,b193bd3933e880da74a203387cfe44d08196c4dc5fd2306355cb180bcdb9cbcb,2024-06-03T14:46:24.250000 CVE-2024-34008,0,0,12468a64ece54d2177f4be3e63a53a42505149e2cd5b611cb491f1103f12dc16,2024-07-18T16:41:31.227000 @@ -252122,7 +252123,7 @@ CVE-2024-34012,0,0,04f4534da5173cfce7ebae120e48f12f9b737be7b5131e98dd79deccdc3d7 CVE-2024-34013,0,0,31f555436f56628c9b80feda54af6c121f0002b6c021c0928728c76ed328d68f,2024-07-19T13:01:44.567000 CVE-2024-3402,0,0,860d32d94b28d3118ff3553c4f964ad26b3d56a8c45fca055d79619e6385e5e0,2024-06-07T14:56:05.647000 CVE-2024-34020,0,0,c4663f98778b76c33582b9d015039d06540b400c550bf7c9ee3e5b98d9ff425a,2024-07-03T01:59:16.227000 -CVE-2024-34021,0,0,3f2cfd64aa27207afc31a6cf68d5b45a2216292b387df955a0c6dac88d2017bf,2024-08-01T02:15:01.873000 +CVE-2024-34021,0,1,fe5dc36f3802a3372c58fe5107bec4d8d776171161d014133118b60e972ae413,2024-08-01T12:42:36.933000 CVE-2024-34024,0,0,0a0d832c0db4d58a70ccecce54b6344b3f181daaf3ed5285ed66313a40334a22,2024-06-20T12:44:01.637000 CVE-2024-34025,0,0,edd2792f368696b38d90328f1c1ccaaade65bc2e70f896834331ba779fb27dd0,2024-05-16T13:03:05.353000 CVE-2024-34027,0,0,a46473315ff7fae435c2b21f290e2c9550c38dfa46dbd2afc2165efc005d2aa6,2024-06-24T19:26:47.037000 @@ -252133,7 +252134,7 @@ CVE-2024-34031,0,0,c7bada09b19f8c37559c202400621a17c8242fcd677fc6de8c1b6d08af421 CVE-2024-34032,0,0,f382d8e9e535c3e35473773ca93bbe1fa995e376c547e3ef1cae2ee436ce2c09,2024-05-03T12:50:34.250000 CVE-2024-34033,0,0,e74c4015073921eba0b380055240c50d190f0b5a639f065734e866639ffc0d74,2024-05-03T12:50:34.250000 CVE-2024-3404,0,0,6185ec73c94377cf834d08053d9d01d55f1811b5822cf01b6cf793cc7a6d736c,2024-06-07T14:56:05.647000 -CVE-2024-34043,0,0,17a4a04f341ae674aded089fb018a71d4450540a5a62458e735932df0cf209db,2024-04-30T13:11:16.690000 +CVE-2024-34043,0,1,53746d879667589cb2311df11a4aae652da57dcc560b773c0549055163d481d1,2024-08-01T13:52:14.133000 CVE-2024-34044,0,0,3bf550daebff9661b99c320a41c6714394baf6dc397c76dfc83e0b8999ac3eeb,2024-04-30T13:11:16.690000 CVE-2024-34045,0,0,79bd65de67c0efbec24a2f08a1536c9cc87b90b692934d062800de780d7b669e,2024-07-03T01:59:18.230000 CVE-2024-34046,0,0,f73242f7ce8897c5bbd98d195e89132a4762c31a89e2f72113a0de4a94d57e81,2024-04-30T13:11:16.690000 @@ -252141,7 +252142,7 @@ CVE-2024-34047,0,0,d278045b22ae0bde5d9e46eaff17ca66b76275ec6418fad33318eafc0f70a CVE-2024-34048,0,0,5fdb0aadcfd2345c28ca76f2c72105e56ae063efaadd4534c5385e9621502ce3,2024-04-30T13:11:16.690000 CVE-2024-34049,0,0,c04366559bae9125ea75e0a33bf4eb3928926dd8c97dbd8ad15b34c838089d33,2024-04-30T13:11:16.690000 CVE-2024-3405,0,0,1a36e7936640d8ee3b950dcf5e1524049898a441fb6f4e16f7e747a8431e73fe,2024-05-15T16:40:19.330000 -CVE-2024-34050,0,0,e8d09a1afe26d6d663f803a8610f33ddd0c7c84811ba6c9b21692259da3e65a4,2024-04-30T13:11:16.690000 +CVE-2024-34050,0,1,44c48f4071fada74be495a02e6832030ef2b56f478d8d3c41b6b32ec804128b6,2024-08-01T13:52:14.410000 CVE-2024-34051,0,0,f7a0156fbd7f007c01970eec17557a972b4ba8fae703c5438ce3316d8a18f638,2024-06-04T16:57:41.057000 CVE-2024-34055,0,0,7427a319dd0c198f833560a21a2edb42d0df57c5ad7676dbca6086efaa896fb1,2024-06-14T06:15:11.650000 CVE-2024-34058,0,0,cfbb8590d55f48cefc143414c8f3d439d56763f898de84d852e391cab57a6cc6,2024-07-03T01:59:19.210000 @@ -252223,7 +252224,7 @@ CVE-2024-34145,0,0,38c44993a1dc70421d8e9284263c594effe0d087a5df7c7a4b3ac5e8c821f CVE-2024-34146,0,0,787b7a8aac402effb291b025d8f2aec84609a236cac974fe09cd7845739a936f,2024-07-03T01:59:27.270000 CVE-2024-34147,0,0,d9d77d8f0db4502f689561e9042a311ab3573d6b584b25af82549f0ad3fc4dcb,2024-07-03T01:59:28.043000 CVE-2024-34148,0,0,39bc79113db1a4cb24c1e032d2832991ff9777a6aea1f2d179dc9afdce78b080,2024-07-03T01:59:28.797000 -CVE-2024-34149,0,0,d0dde56f430ade77d5830f322a2f39f31b9f49bf08d957a11e37c1a667050da8,2024-07-30T16:15:03.927000 +CVE-2024-34149,0,1,b842f529338429deecd934919ab80babecc0155746ef85aa17f1abe41c5a988c,2024-08-01T13:52:15.683000 CVE-2024-3415,0,0,34ccb97766fc5acac460b5429af5d66fea7f850526947b377f986615d31afcf6,2024-05-17T02:39:54.247000 CVE-2024-34152,0,0,2436c8a621b0d09dd7154ff9aa9ad8e75fea3818a8a19b6b0802746c78436018,2024-05-28T12:39:28.377000 CVE-2024-3416,0,0,a081ed6eeab1f8c610822f30cf17aa2151f535dbb3c22c142c8cc9d4a77c8f63,2024-05-17T02:39:54.337000 @@ -252234,14 +252235,14 @@ CVE-2024-3418,0,0,502fc54d23469afbe964523306f6a78a43aa4bbda684d42d8a15714665a919 CVE-2024-3419,0,0,55e9e939cce7031c82bff2b248ad3247eb5f6b71fadfe890fcd9e67ed87233e2,2024-05-17T02:39:54.607000 CVE-2024-34191,0,0,dbd580573375fd2d1820adc0049af00ef94f1f54fcce834415d344bda1271c56,2024-05-14T19:17:55.627000 CVE-2024-34193,0,0,001a9af6af4a066c69d0539418b6580b3e6d54a33e58c9729bb8e9f56780642d,2024-05-20T19:34:58.277000 -CVE-2024-34196,0,0,7bc2269769758cfa204e6b7413c1a32cde658833956c2a648cd8e46b3b17b04a,2024-05-14T16:12:23.490000 +CVE-2024-34196,0,1,fa10f060dde56de72ad527f194a43f50d5d3befcfd4eea3294712a1774de38b0,2024-08-01T13:52:15.947000 CVE-2024-34199,0,0,27f51e6e9a085d1edb0a1380e0bfff4433e52f8f9e25d5bec96a743b9a9ffd85,2024-07-03T01:59:29.647000 CVE-2024-3420,0,0,4a79874e63037882cf5f1fcd7dd6a1cad0c790500da420cf829e4ec3a26df5fc,2024-05-17T02:39:54.717000 CVE-2024-34200,0,0,233f6ce04f4e95f03eaabab680c92f73f949e711725c4041d58add8301c7e04e,2024-07-03T01:59:30.427000 CVE-2024-34201,0,0,331c15ea4d8678817fc4a039b90628979e4d12ceb52da635433fde95bd8259d3,2024-07-03T01:59:31.177000 CVE-2024-34202,0,0,10e2af653aecf5939b67ff5397946eb97268ba48cfc20999e9653a29203a02fa,2024-07-03T01:59:31.937000 CVE-2024-34203,0,0,7c4fea643e6e97753f9c8250ce54a3db82e8ad36a97a2537629259caa2f68d04,2024-07-03T01:59:32.703000 -CVE-2024-34204,0,0,3967e05f415982a8c4d3c402591aad91a63ae0fd22911b22dde06644410c67f3,2024-05-14T16:12:23.490000 +CVE-2024-34204,0,1,8c3a766ba6d418066e6235fac6d57a4c9976cf3ca35aae4d34005c5286e47927,2024-08-01T13:52:16.747000 CVE-2024-34205,0,0,5e6ec1f83f8df2b44ee77e87d09f991b3d26ad92e17843fda65dc4a06a8d8d48,2024-07-03T01:59:33.503000 CVE-2024-34206,0,0,bf2b14d36cc1c2097afe17c99c0cac4b916ae816d9a6bfbf97f078b15fc27e67,2024-07-03T01:59:34.333000 CVE-2024-34207,0,0,f60bfe69552bac2b2619a8ee3276da0018a05e7f94a9d34a583f5e8a5e9a82bf,2024-05-14T16:12:23.490000 @@ -252265,7 +252266,7 @@ CVE-2024-34225,0,0,e08a9ad45b2661eed67570a87cb42ad712c6fe6e9c128f00e0736869ea473 CVE-2024-34226,0,0,ee0bf03dfbb7276f0e585da87dd55a8f54aaadf529a97ab40343d543468cb68c,2024-05-14T16:12:23.490000 CVE-2024-3423,0,0,5df33203eaf14342db1ae141cfe06e52884cff2f7dfa5b3fcca2ff4c13d5eebb,2024-05-17T02:39:54.990000 CVE-2024-34230,0,0,fd5204c1861dff4dda042be017a0c119fb7cd76dbdfed3865e1a91afa4cda6b2,2024-05-14T16:12:23.490000 -CVE-2024-34231,0,0,a940212c9de262f39cde7d044a10e7607fe5de435e6604b8c1b9a337e652ecee,2024-05-14T16:12:23.490000 +CVE-2024-34231,0,1,bc89f3c9bb61baf29d2d35dc13499882fd5aa1b8a06439e514ae7d635339b6f7,2024-08-01T13:52:18.070000 CVE-2024-3424,0,0,c4f58681c753d20af997e7344afbac06ec6a3371ca686fb7c9b49ad5c93b94a2,2024-05-17T02:39:55.073000 CVE-2024-34240,0,0,0bd91146d8fc729ed5df9e4184632c68ef13b96fc0c02f7c671568de44e3b0a0,2024-05-22T12:46:53.887000 CVE-2024-34241,0,0,dfcf8e51cf99490944ad55b4d7efbac771f91027fe853fbf51050e455e0ec2d6,2024-07-03T01:59:43.687000 @@ -252283,7 +252284,7 @@ CVE-2024-34256,0,0,6220269db052ab81edb92c6f9acb6971b653bd049f7e6b4252582ddd7f8f1 CVE-2024-34257,0,0,1ed595111fb59011125b38c3d9f6c51e0ab66d31c1586e12b1d3ef01e781f80c,2024-05-21T19:15:10.090000 CVE-2024-3426,0,0,c70229bae29bfe2214728165d6de71940f4f5fe371b846a50cfdda5286468f15,2024-05-17T02:39:55.250000 CVE-2024-3427,0,0,04d120d0d57c1b307c564812a2a90dbdd8ac5486efff94685b4ef4670606055a,2024-05-17T02:39:55.333000 -CVE-2024-34273,0,0,910a59f548a0afbe5de96be842f07173c693eb7e379b1a87c5c81dddcc9e3eb5,2024-05-17T18:36:31.297000 +CVE-2024-34273,0,1,4c0c9834fc4b51c4a9b9199849839d68fcd657ddede4c1f2ac2a03c81dfcc2ae,2024-08-01T13:52:18.903000 CVE-2024-34274,0,0,04cf77661d40b20b86001188951fe9b60cb45ce0a3967bd1c023b7bfcd657c79,2024-07-03T01:59:50.460000 CVE-2024-3428,0,0,14a86e039ac8cb265b9d604c5dfa68dc90fd322057a6dfd51fe11334090fcad8,2024-05-17T02:39:55.420000 CVE-2024-3429,0,0,cc1ad92440e554fd4aa756a3c0a3a14bd96da877c8810e8b4e09effb2690f738,2024-06-07T14:56:05.647000 @@ -252291,12 +252292,12 @@ CVE-2024-3430,0,0,a941a2bdaed6734132b4bed8d998008948b76c9a3932a595684037246d0032 CVE-2024-34308,0,0,5c6830d7ba39b77cbaffad44e790f498af6b587a6f9837b67570228055e4e3d7,2024-07-03T01:59:51.267000 CVE-2024-3431,0,0,5fc2c93ae5310a51e046f84945a2a838f604d6025e1cecd0f4843d0687905336,2024-05-17T02:39:55.597000 CVE-2024-34310,0,0,eec98a80baf7dabcd95632f08b3aaea83d6020ef7be3a232837a6c521a96dc62,2024-05-14T16:12:23.490000 -CVE-2024-34312,0,0,e8e87c7d1515dd64c4b6a6c34bd316fdfacae27042b671870947a9d89e3b0127,2024-06-25T12:24:17.873000 +CVE-2024-34312,0,1,d20cc99ee79df3701ecb99ce538b9b7c2fdaea2fe12ebc42475a8760d3b7ca22,2024-08-01T13:52:19.707000 CVE-2024-34313,0,0,5e7685d85b9be01539c2df2509259cab02217b4b071e1347f30175d5b9d70a40,2024-07-03T01:59:52.040000 CVE-2024-34314,0,0,229621e4389765698bde4ee87838cb1f181d4467573c64759d3cb34848f22f9d,2024-05-07T20:07:58.737000 CVE-2024-34315,0,0,2da9a3f01679d1f45f0bab05fdfd699ff25c9ffa82f02a145c0a3654a4071435,2024-07-03T01:59:52.883000 CVE-2024-3432,0,0,e551b49681f8859ae36cb659ecb1c23b498009c34da11d9120924e791a83c404,2024-05-17T02:39:55.693000 -CVE-2024-34329,0,0,55e441069bbbc6aee815994671546edad2f026f6f85fc0fafecd140bdb4cb47a,2024-07-24T12:55:13.223000 +CVE-2024-34329,0,1,5172a316043ee9e75055b2f826441189fde5eb6a90f1810a0be2672c1d7dbfd2,2024-08-01T13:52:19.990000 CVE-2024-3433,0,0,edcd29ee74449d6852e66c4b5448756dccce5e71a9bad9a5025cf08aebadb09b,2024-05-17T02:39:55.780000 CVE-2024-34332,0,0,8f6c683335644bc93205234e59c96ea37a2e6389fa2dea8d8666173975a538e9,2024-07-03T01:59:53.650000 CVE-2024-34338,0,0,0b7082b91aa78856b4b16b824fb5642c1377f61ea50b332ded8dd5ce396d2aa9,2024-07-03T01:59:54.407000 @@ -252355,7 +252356,7 @@ CVE-2024-34389,0,0,ea067096e4443a8a7348aa8a6eb36101658eac805d9c1f3009370b3c7433b CVE-2024-3439,0,0,5b40d6c21ac80c27430bcddd2a6b9ce0cab93a68b2c6525020183da820d58678,2024-05-17T02:39:56.277000 CVE-2024-34390,0,0,d226b418ae0ac66205b75d2061f00f86434d2d8398035e5837e56e870303b11e,2024-05-06T19:53:38.797000 CVE-2024-34391,0,0,d52383acc541514336474ee4151cc22266a800a7849eac687820f82af9f750e8,2024-05-03T12:50:34.250000 -CVE-2024-34392,0,0,a8229a2af18726ec75c63b7a91e9499a23c49c6f8d239aa1bb5edf24ed08c611,2024-05-03T12:50:34.250000 +CVE-2024-34392,0,1,95f700dedff586182f66d1ca5e7da764d337c16226845e0ee1ec7b84b40d651f,2024-08-01T13:52:21.033000 CVE-2024-34393,0,0,9d61a4306d036e5052fc5d8b364b63a626c2cc9af434ed24e38ecec71df608d5,2024-05-03T12:50:34.250000 CVE-2024-34394,0,0,9d971c1ec9518d2a1ce0c68b603eddff6cf55abad02bc9ebdbbffcbdf77796e3,2024-05-03T12:50:34.250000 CVE-2024-34397,0,0,16b5c41784e4f3ba325a2b1735509d7fce68bb2c9a1b2765d2c61257921c1fa2,2024-06-10T18:15:34.863000 @@ -252406,7 +252407,7 @@ CVE-2024-34442,0,0,6264f8491ee5d12e5a5f408e8abeaf7f3129b325a31afb66300d05700c7a7 CVE-2024-34443,0,0,c8f11408ade1f322bcf59e1e6ccdfab5f9f2536b164a74975bd7ede92d5e3984,2024-07-31T14:20:21.527000 CVE-2024-34444,0,0,83cf0e146347d288c8ea9da6587c65a2fffe6e87f7db1a1dc5a19fc6768087d7,2024-07-31T19:59:02.343000 CVE-2024-34445,0,0,3b07364d9bdbad0e17fe82bd2b8457170020621f36717725efd6e85a1ffc3713,2024-05-14T16:12:23.490000 -CVE-2024-34446,0,0,5f8d83ca96b0bb057e12975bf469965ab37fc737acea8dd912eb1a08f5464c53,2024-05-03T15:32:19.637000 +CVE-2024-34446,0,1,68f9188bf36aad2f70220cc711acfc3ccb449247a95be439275ef3b6e766a48d,2024-08-01T13:52:21.980000 CVE-2024-34447,0,0,6bea4a391aa6348494cdd2d2934d51e86f6805261afa24a43d6930eff057ed1d,2024-06-14T13:15:51.950000 CVE-2024-34448,0,0,e0f0b2bc3f18968a8b759c9f20c601cd44f38f22b0c6fd0c1caa21efb916dc57,2024-05-22T18:59:20.240000 CVE-2024-34449,0,0,bf81e9b7a514443d7d01b6fe534401c9d8e91383983830af6175625ea00e2519,2024-06-04T19:20:00.563000 @@ -252425,21 +252426,21 @@ CVE-2024-34462,0,0,8a88747aa45fa0ff08468c03145b77f14c23a2c5a801117a3645ac9e35ca3 CVE-2024-34466,0,0,dd736f9a85d19253650a199739cba2301673ec6ec2adc5e7de09970e86411685,2024-05-06T15:15:24.473000 CVE-2024-34467,0,0,13fc7ab404104db786a77ce2c39cc6d997ed7b50a4062631d11bed292bce7c24,2024-06-12T15:15:52.083000 CVE-2024-34468,0,0,b164ab2b609bf8b9d79a88576e6595ba967431973eb7a086f2ba71149d9690e8,2024-05-06T12:44:56.377000 -CVE-2024-34469,0,0,ccd5366dbb9748dd1da593b67868fd7ed3950318bb127878dd73b67cd8bfdb66,2024-05-06T12:44:56.377000 +CVE-2024-34469,0,1,c68e04abdf928312d44ac341a209cf5378ddee40d6b8b27a9211f964972de340,2024-08-01T13:52:22.830000 CVE-2024-34470,0,0,c26a3e4e103c3a39ccd71f6b73acf5c04b4f366cb36f58bea718bc4b8f16af48,2024-07-03T02:00:10.887000 CVE-2024-34471,0,0,532d16184865828974b7b8bfccacf00acd1cea4229675a661e47fbd9ede966c2,2024-07-03T02:00:12.450000 CVE-2024-34472,0,0,849451fca1b199d715cc88e41dff8ac49cd790dbac58f51bec15328bb61654e2,2024-07-03T02:00:13.630000 CVE-2024-34473,0,0,43374aed676f28dde9bbbef2a52ca305b9ed3cc132864c1fcb62c3381af2a62a,2024-05-06T12:44:56.377000 CVE-2024-34474,0,0,af6bfd7b3c0524f90298af09605d739b460150f45bc5b4634b5aac256384cc1a,2024-05-06T12:44:56.377000 CVE-2024-34475,0,0,3c160241762503df55acb87d7d14b9c9456523cbc048b20e9117848219522386,2024-07-03T02:00:14.950000 -CVE-2024-34476,0,0,0ef1ad12532d76af6c060a61cfe78abfb81537b8aaebb5626428aa9a487be949,2024-05-06T12:44:56.377000 +CVE-2024-34476,0,1,0e840da90ac72a5275cc1cab81863ba6c9d8f821141193be8bf66abb3acfdeaf,2024-08-01T13:52:23.687000 CVE-2024-34477,0,0,5d1de91fef7cafecd3b029f0bcee8de7cabdae801a9f3bc40e1b3eaf6a48cb39,2024-06-07T14:15:10.293000 CVE-2024-34478,0,0,341538580186fa4ec1cf60048d279885728a9942104d09603c03238e921c51d7,2024-05-06T12:44:56.377000 CVE-2024-3448,0,0,c82b147a40506a777755d14476bf2e6fcdd10273ee4086f8cdaaaac6db9939f8,2024-04-10T19:49:51.183000 CVE-2024-34481,0,0,e2a3e65c4103fe32da9193eb433184ea87fbd297993203e84b18d9ad821efc72,2024-07-09T16:22:36.033000 CVE-2024-34483,0,0,6f3bfc57c4ac08b52bc633ea80c521be2c99b03f22d863fb736d441dc611c592,2024-07-03T02:00:16.293000 CVE-2024-34484,0,0,1f03b9dcfd21c2d1e1e4109b895d9faab7d5dde86fb48f1db146804d6f2ea32a,2024-05-06T12:44:56.377000 -CVE-2024-34486,0,0,dba20ff35a6f63bcfad1cc80106249ab0834b53649f8fa6ed4fc20966853596b,2024-05-06T12:44:56.377000 +CVE-2024-34486,0,1,f93c0e2186ca66e0dc95b1ea19ad0932973e939f81793a6d44ba3fea5b8487f5,2024-08-01T13:52:24.443000 CVE-2024-34487,0,0,b7a87b83db311954746c44c337769c914868432d37c4805fcdfe8c5bb6239462,2024-05-06T12:44:56.377000 CVE-2024-34488,0,0,bd1886e792bd0f0be5174d43785b1ee8c3d2805a0b92328a691bf28c3b9e55ad,2024-07-03T02:00:17.670000 CVE-2024-34489,0,0,98fc4bbdad28e1f470f6bbf8edfd27b4d57977594296e589fe4b4857cec1a304,2024-07-03T02:00:18.727000 @@ -252575,7 +252576,7 @@ CVE-2024-34721,0,0,f71307059aeed2acc9a5b096fe278629e1ab4f96dc0c7de77c8899892fd1b CVE-2024-34722,0,0,cf8aa681488fcb61e6053338c1005fbdb8a07b1c3e2be30881c9597f7f06ab3b,2024-07-12T16:11:37.803000 CVE-2024-34723,0,0,9ee1e9ea0079333d8123e1479d0c1b548d28a892d3601137f6e64ded9880a7ff,2024-07-12T16:11:38.633000 CVE-2024-34724,0,0,0452aa45e04971f6e547ee694d42ca35f85625c1031b931eba0ca8059efefaef,2024-07-12T16:11:39.470000 -CVE-2024-34725,0,0,98e9d37a940b2073d776990c8ea0e21b460d0fca7f102ef542f0502f179475c7,2024-07-11T13:05:54.930000 +CVE-2024-34725,0,1,71c51510eb6c519ede5c0bd5b935ecb821799239014d1b6c0035512d0bff6cbf,2024-08-01T13:52:25.887000 CVE-2024-34726,0,0,148667699b7fd62da52cb8a62c1c3c6fd756ca900c40298f1823e1d94f76998b,2024-07-11T15:05:45.340000 CVE-2024-3473,0,0,174ffd5ba26767424b634a780ad377f8ae33849c44036babd665d0b98ce27738,2024-05-02T18:00:37.360000 CVE-2024-3474,0,0,f8fe69ded09f8f3335cb0a291c0ff93be246183a89b6f2a9db60adabf1ff9a0d,2024-05-02T13:27:25.103000 @@ -252678,17 +252679,17 @@ CVE-2024-34921,0,0,258d6bc4ff16be25947117b994a7b2305574dc7e88be47c1d8439dffb3fb7 CVE-2024-34923,0,0,4eb062fc2943c9703c6ce714643657218ce1e4ab0248f4efc1ef62aa6ab9477d,2024-05-28T12:39:28.377000 CVE-2024-34927,0,0,65b6f1073e9034477a827eae4f8e1e96da2dcd8b6b7a4dd6a353ea18c54c97c4,2024-07-03T02:00:55.873000 CVE-2024-34928,0,0,06617cab0c322a427612e8f6d6917cd063878ec94ca850683c68470a1a2c8d7a,2024-07-03T02:00:56.653000 -CVE-2024-34929,0,0,d4b48714684824920a32c958eddb03145c1ed61840747ffa7e3a2fed34d4f405,2024-05-24T01:15:30.977000 +CVE-2024-34929,0,1,80902861c56fffe184d43b652e5b65da73fb217bc0c681573f8c1d15948cf18e,2024-08-01T13:52:26.657000 CVE-2024-3493,0,0,066f7bdb112b4eb90ab428a4a7b97610f00d49e6eb62b740b5f6b8c5b5b2b054,2024-04-16T13:24:07.103000 CVE-2024-34930,0,0,9fb3b8964b5cccf698fe1af2c09b9ebbf2bbb61e30f2dd6c2b71de12b8d3c46b,2024-07-03T02:00:57.490000 CVE-2024-34931,0,0,6450b229b3dcc76dd273a176e1d510aa697ab04ac79bf201d0e27ca4c52bc840,2024-05-24T01:15:30.977000 CVE-2024-34932,0,0,b6b50cffd902136cf64d7ca4507205d651e9df6e7dcd5eead3801eac200721c8,2024-05-24T01:15:30.977000 CVE-2024-34933,0,0,c3dbf950f435984b9b33f4f97b61de10305ed6619e3cc02c8a837894fcd24d4d,2024-07-03T02:00:58.450000 CVE-2024-34934,0,0,91033aed47bbfeafba36473be7fc14422234407fdb57dacebb401b976b43b78e,2024-05-24T01:15:30.977000 -CVE-2024-34935,0,0,7b416f5e05f64757c5e0607d9d41c4b96a52dbe75270843ec05d2b46bd375b2c,2024-05-24T01:15:30.977000 +CVE-2024-34935,0,1,42663e6f26362b7ff61277b99a542a862a8644dcdaf267511fb39a33d8f4245c,2024-08-01T13:52:27.497000 CVE-2024-34936,0,0,ef26d47e53ea5d4cceedc6823b8a9c4c39c8a9014bf9d62c358c5624e3622a2e,2024-05-24T01:15:30.977000 CVE-2024-3494,0,0,18f9b9bd36d8a43e8f4c6da36d532e779d9d98429c42e261e00b97ab82c89568,2024-05-08T13:15:00.690000 -CVE-2024-34942,0,0,63f87e24e9716876135a1f41ca51e33bfe9f8451c79ddc752499f5bef03e2765,2024-05-14T16:12:23.490000 +CVE-2024-34942,0,1,c49dd24762e84a77fd533acb36e8b66632ca6d8510ce64e6f0a0bef34b144d2a,2024-08-01T13:52:28.260000 CVE-2024-34943,0,0,27f223f9ebdd1c5e044a9b8c3ea5e878cc25ed59e01266545a6073517a2a7075,2024-07-03T02:00:59.257000 CVE-2024-34944,0,0,0cc726bd49c90758e4019a5ee8cf9a19958a1674ce4cf71d03ff6a2346878893,2024-05-14T16:12:23.490000 CVE-2024-34945,0,0,bd887865baa11222c5471f83f64ee50937d3f1c1cfa2d234bd4834ddeb94df5d,2024-07-03T02:01:00.147000 @@ -252709,15 +252710,15 @@ CVE-2024-3496,0,0,bef13f538775198780ddc65a6f3a5a754b7e93a7523db13d7bd4c988bca651 CVE-2024-3497,0,0,7d099a902008f089d528b5135b45cb3cd9096ecc424d31781cee90aaac2e8bc3,2024-06-17T12:42:04.623000 CVE-2024-34974,0,0,db93d6fc06c8e4d6ed75b4accd8acf59e9b9a04d41397a160c53843993ce1d4a,2024-07-03T02:01:06.613000 CVE-2024-3498,0,0,1bc889e2e4668da9efb5b9dc009d274763e07092723971fbb26429901567412c,2024-06-17T12:42:04.623000 -CVE-2024-34982,0,0,3ae95021fec9c60bd9bf6a1bd08ebdc9bbc583c39779a54c5f1ab5095dae88b0,2024-05-17T18:35:35.070000 +CVE-2024-34982,0,1,f411980c41fd405ef054f005411d2e1bcd318bde8c4ea15ac24cbc2eaadfce67,2024-08-01T13:52:29.093000 CVE-2024-34987,0,0,5d49818499fa690b993dc59af467cade3f5ab7e09988107cc9da38a9f55820b3,2024-06-18T19:15:59.873000 CVE-2024-34988,0,0,6474dbdbaa4ebcb8d8eec04dee908e1ee08255976e596a42dde1361f42bfc7ea,2024-07-03T02:01:07.437000 CVE-2024-34989,0,0,c0f737f83c65230e74658db3038decf49406b8bd85e57531cd1168cd2bc8ccef,2024-07-03T02:01:08.240000 CVE-2024-3499,0,0,5b60cf690aebcdd9fb3f07e2270ad43781b07a61eed72e6052c6e7d78e780f58,2024-05-02T18:00:37.360000 -CVE-2024-34990,0,0,e749fa09df74b6cb6dae817464d70b55be8ab029111298e06eafff1b46f420cf,2024-06-20T12:43:25.663000 +CVE-2024-34990,0,1,83269b65b4ae649e8d1880af5b4240e393a255e0543eceb9e3b394433d991345,2024-08-01T13:52:30.057000 CVE-2024-34991,0,0,305a0f5c327fb4efa27f1c49708e6dba8d2ab257c8b12c44573d21730be45637,2024-07-03T02:01:09.030000 CVE-2024-34992,0,0,9a2f44bcac614c82fb508eea2c914f5d30212ef74c3e81eaf50515aa083ed010,2024-07-03T02:01:09.800000 -CVE-2024-34993,0,0,53a5a03b8e46d3139a1828ef4b1e2eb90b5063406c63b2bca9270f22798e02c0,2024-06-20T12:43:25.663000 +CVE-2024-34993,0,1,81b5a85cd601330e9d221818372d97d425a5f614838f1e2bea50164df4a9376a,2024-08-01T13:52:30.833000 CVE-2024-34994,0,0,2a57fa5a48b91cfc9175994b09415b4e2c46f84fdbe6aceded93bada909a8bfe,2024-07-03T02:01:10.570000 CVE-2024-34995,0,0,c5ae887edb3d68f5b17625c821aa1f4eef9c82bfd086996cef9a6f896adaeedd,2024-07-03T02:01:11.353000 CVE-2024-34997,0,0,4d53c1e37ff0e0c66d3631d275affa26d6ee7a665351d7e96a8e7e2c843cbac2,2024-06-17T14:15:09.950000 @@ -252732,7 +252733,7 @@ CVE-2024-35048,0,0,7d2e40c430e02cb68d065988844aba370a92c807c6984a33499abbf4ef502 CVE-2024-35049,0,0,7f4be420d91d9a8f87262bac46be64324b444d7ac3ac1587575b0d32b81ff685,2024-07-03T02:01:14.393000 CVE-2024-3505,0,0,07b0949681fcc5ca8054aa7f9f47a8f95432c3a4c9c46506fc21cb30ad4bc3b4,2024-04-15T13:15:31.997000 CVE-2024-35050,0,0,b0236daac2c3966aba94745c646c21ffa4a26fe8fffa2e95528779869a71d061,2024-07-03T02:01:15.190000 -CVE-2024-35056,0,0,8565a05e21722b6468100569afab64d032af5dd0d84afa306557ca3914cda2b4,2024-07-17T17:15:15.263000 +CVE-2024-35056,0,1,507b1f5d3b04ca2b67880aaf39ca16e0c980df047603aef4ddff0e60c7948d1e,2024-08-01T13:52:31.603000 CVE-2024-35057,0,0,d8b1391320f9fe3f708b665b55b5674c28a9f0e4154226e928eddc897ac177b6,2024-07-17T16:15:04.577000 CVE-2024-35058,0,0,04c708d4f2b869ae5964d1930cfec2987e068cdd18122deca793d922c4c5f892,2024-07-17T16:15:04.673000 CVE-2024-35059,0,0,dfcf8d668815ccc0d32854da2c20a083e119b7332e8581c76bd10f4eac9a5fc5,2024-07-17T16:15:04.743000 @@ -252770,7 +252771,7 @@ CVE-2024-35154,0,0,7c994b7a6d7158efefd5e2d9a1e0bdd18fbe7152cacfbfaf67e2a7f91ec12 CVE-2024-35155,0,0,c326cd4166d9cbfa34efa54fd988e1d407d8925369f9983f14750e709112308a,2024-07-01T12:37:24.220000 CVE-2024-35156,0,0,e6fb36f1f810f4a246d710cbf82055f27ccde015fb0476ace50a7457c7ac5ea7,2024-07-01T12:37:24.220000 CVE-2024-3516,0,0,61323fc04733960d047e16de47c6d5cda2ae2931ba7c42276f6e75842f73a295,2024-07-03T02:06:20.027000 -CVE-2024-35161,0,0,aa4246ab87ee2366d3ac07f753ad34f4a3c98b90a89ec910fcd4f0be857b3d0c,2024-07-26T12:38:41.683000 +CVE-2024-35161,0,1,5b1f2647531a5d5b0f838168c4e1e46772cc2bf936ac72086e3c013a91970dfd,2024-08-01T13:52:33.223000 CVE-2024-35162,0,0,898115932dab71d396aafa3d3e8a79f10b6e8ca121500758707a59e848faab9f,2024-05-22T12:46:53.887000 CVE-2024-35165,0,0,a5a2ced0aefc202025ce7b223ffafe3ffc4109906dfd07a5a8a0577e3f72ac5b,2024-05-14T16:11:39.510000 CVE-2024-35166,0,0,288535809aded0d0429463b3203e908304fa856ed04133053a9493366e89b509,2024-05-14T16:11:39.510000 @@ -252899,16 +252900,16 @@ CVE-2024-35328,0,0,fb4ef24959ef3b86e1d1e2a626668146540c0ab6d259d48f6d635a7a92dd5 CVE-2024-35329,0,0,4292102d3fac0226e3e155445f438715ce7df9eb09ed90a898e6b306574b942f,2024-06-12T22:15:18.400000 CVE-2024-3533,0,0,488bd266f4041c85454e2052fe9f29a33b96935dc189b43a270de9d8362e90d3,2024-05-17T02:39:59.617000 CVE-2024-35333,0,0,a56b2cbb1d825bab243b29d0e8302efa743a6d64a0ad5ee6a14e21ffdd4302cd,2024-05-29T19:50:25.303000 -CVE-2024-35338,0,0,41104e352664b04e28e033aa02c5869f3a89a42461e39bce966f727fb8f2d51d,2024-07-19T18:58:08.977000 +CVE-2024-35338,0,1,e107c4747b0de9e551ea11a4d2e69bae2aea4d6b20bec204b7a0c7504a17ed7c,2024-08-01T13:52:35.817000 CVE-2024-35339,0,0,bda26dbfd7448a5a1d77a8cc49c3bca16a6f7dd67b8f4622c92179451c9d0982,2024-05-24T18:09:20.027000 CVE-2024-3534,0,0,a24b539c4ddbcbbbcd76a0a70e496243d7203c000aa2dbf195c274be99bd3f1c,2024-05-17T02:39:59.703000 CVE-2024-35340,0,0,208fd1528799a390da0274829910466a1b7fd43365d7d44eef3241578a979281,2024-05-24T18:09:20.027000 -CVE-2024-35341,0,0,69798502bf076188c6efd504dced2f90b8b02830c56cdf84951a78f72e84c81e,2024-05-29T13:02:09.280000 +CVE-2024-35341,0,1,2394ba36fcc9e849f9840edb2ba384b36eee4d7eebd73846ccbdccf118ee1563,2024-08-01T13:52:36.597000 CVE-2024-35342,0,0,a4f7369f8f0a6de9d16902cacb7a44f46ba0a7d7f218612f1259029d70c7f06e,2024-05-29T13:02:09.280000 -CVE-2024-35343,0,0,843d5547413c058e918d78a665c280babe2d31bd3435b5e665636bdb03972d79,2024-05-29T13:02:09.280000 +CVE-2024-35343,0,1,afbb68674236a89009facceb114c5d242ad657f17e86d5d8fbbfd0cec8107edb,2024-08-01T13:52:37.563000 CVE-2024-35344,0,0,bc74dd675a5dce7f00a3f726cd43afdec09d5a821ebe8ae8c283145b225cfc80,2024-05-29T13:02:09.280000 CVE-2024-35345,0,0,74c7d120c89723274869edd9891ae8c3c0000f6f86215392a40c153d1fade2e4,2024-05-30T18:19:11.743000 -CVE-2024-35349,0,0,104009f7fa6d8902e86dab21aac9cdf7600ae2715afba2a32e74f2334efd9723,2024-07-18T16:50:12.123000 +CVE-2024-35349,0,1,11658c700be6076291828420e77d9bdb67d68c65b2a15cfc033913a7e5b5639c,2024-08-01T13:52:38.343000 CVE-2024-3535,0,0,73d791a5850d78576003eae31f8a489c9a6c4b90f35033ec73a578c9367a898c,2024-05-17T02:39:59.803000 CVE-2024-35350,0,0,e596350b63af6a3fd5a9ea71cc091d69ecc8ca9756da6b52fb081734d570d495,2024-07-03T02:01:34.357000 CVE-2024-35351,0,0,f15ca955c03ac0c00b104ba129c1beb4d32d316803785ffd7151d3b367cf6862,2024-07-03T02:01:35.133000 @@ -252928,7 +252929,7 @@ CVE-2024-35373,0,0,91b3eb7485cd766ab8c363f1f6697a3fd29cf35f3241c95a139434108968f CVE-2024-35374,0,0,71bf5143a935358076633b16ef6d586d6b493af4d13be33b4867bf136b6a604a,2024-05-28T17:15:10.937000 CVE-2024-35375,0,0,ed34ddd9d512918cc00e937f04fcc44b2e98fec270008373eac869e7c2125c2d,2024-05-24T01:15:30.977000 CVE-2024-3538,0,0,9615e321c043201a8d062641e6113a127ad070f2c61985bcd402bdf4990165ec,2024-05-17T02:40:00.087000 -CVE-2024-35384,0,0,27135a99ed853517c81add3cda67e46ba3de6cce0b6fd1f528a59b072df03452,2024-05-21T16:54:26.047000 +CVE-2024-35384,0,1,80c459d6b8b92f35efd27c83c865d17dc86005bdbc1e6e04541d28ddd40786f0,2024-08-01T13:52:39.203000 CVE-2024-35385,0,0,398a0815629caee79e0ed577c05dcef42bd37c568d9a41ae8597fc88574b3380,2024-07-03T02:01:39.520000 CVE-2024-35386,0,0,0d71ba29986ccea865e900a0b900b22bba600b21e14a5ae1918159d6fb15df4c,2024-05-21T16:54:26.047000 CVE-2024-35387,0,0,c15fdfd7d84f50c783e9e09361abe37993b474b133a90ed661a9f7fadb59afd8,2024-07-03T02:01:40.300000 @@ -252938,7 +252939,7 @@ CVE-2024-35395,0,0,354e9e37e0ce75bb53ff93ce47bf40c126f587275536a8cd511f6253a52ab CVE-2024-35396,0,0,827fe50b50a04cab962dbec8c945133243cb4b7963621cce923073eaec840529,2024-07-03T02:01:42.667000 CVE-2024-35397,0,0,bfe3a0e6c9c0ff85466d9ecbff915be54a32feb5f00f1cd77c63706811ddbcfa,2024-05-28T17:11:55.903000 CVE-2024-35398,0,0,a491584c9df6e11fdb2efbaa9a24ed323ffdfc3c73ef67e6f6aad4d4001efd05,2024-07-03T02:01:43.440000 -CVE-2024-35399,0,0,175d5488f085135c031fc721327930178851b7a9bf4b308e26f038e442d4607b,2024-05-28T17:11:55.903000 +CVE-2024-35399,0,1,2798c646f651db550053d76944a2539fc365c03ae0c3f02c62b58f01dbc5e617,2024-08-01T13:52:39.410000 CVE-2024-3540,0,0,186925567bcf9baf46d3085185099882e7fa1b9d0d70f71c95c65e0aa39f03d3,2024-05-17T02:40:00.280000 CVE-2024-35400,0,0,99f66df5ed6c7fc0ac7ebda8ce86e4f32af2422cba938b231e49eaec8c41244f,2024-05-28T17:11:55.903000 CVE-2024-35401,0,0,e20c7deeda0300f83b1078cc4b3716ac7ed24c4deff40921468ca6f87181fae3,2024-05-29T13:02:09.280000 @@ -252947,10 +252948,10 @@ CVE-2024-35409,0,0,304d708bfe4184b7d6ca360533ea99ab73a36ee47eb2efd3c699d72ff19f5 CVE-2024-3541,0,0,14abae851d976e531eb89e36d00e68f1b4222a58cf78e09467f8f13cc823ff73,2024-05-17T02:40:00.373000 CVE-2024-3542,0,0,5a8537177eac38ffc4c0459430c529ffd4234d4390bfe331be843583f4e31e36,2024-06-26T18:15:15.750000 CVE-2024-35428,0,0,3c09284a2d1421b49e443adf71c33cb44461617fe2c22ed9a85a4142b030cc7e,2024-07-18T16:52:56.760000 -CVE-2024-35429,0,0,349f5c7efd7a25d90e7a46afe966f25bc376c37615950eb8f5c00e165a45c9c2,2024-07-18T16:45:32.443000 +CVE-2024-35429,0,1,330b233a9d961e5ab60bb84ab073545ccf41085088e749b133fee4692c3b4424,2024-08-01T13:52:40.290000 CVE-2024-3543,0,0,14aebe52440b6c29accdfa7acf400fe951e7d7441b56210ed47a5a2c1e52128f,2024-05-02T18:00:37.360000 CVE-2024-35430,0,0,56e6241f029678a052009701d49bb56dd50fb27b414c4e76330cb64eb76c9db6,2024-07-03T02:01:45.150000 -CVE-2024-35431,0,0,dfdbb18b054c098412b5f3d47c1a66ab805231bc59162697d7bc2900fe6f77fb,2024-05-30T18:18:58.870000 +CVE-2024-35431,0,1,0a35dffe7e6c93066fa509053c839d3a8bc16edf2b77120799090f4882a8d3ea,2024-08-01T13:52:41.087000 CVE-2024-35432,0,0,3311c747ad82bdd6bdba2df7e2c344e7216b5782d0ebafa18a6d7633f507f841,2024-05-30T18:19:11.743000 CVE-2024-35433,0,0,0b3687e6d05fd0aabce2f6753ab48622a6daecb670483272307382dbb941306d,2024-05-30T18:18:58.870000 CVE-2024-35434,0,0,55e035c2a162134710b80f5640b923747de7468a0790da753e41ecb6e33217f6,2024-05-29T19:50:25.303000 @@ -252983,7 +252984,7 @@ CVE-2024-3555,0,0,70e8594716c631628b2245556d17090b4d4ee8454e4dfa9b7f7905554c7aad CVE-2024-35550,0,0,05fa994c1241a8921998965363066f0edcaed893df5a9977f6fe3011cbc78fa8,2024-05-22T14:30:41.953000 CVE-2024-35551,0,0,992575a49edb7ff405cf9bf6bf5989df98166aa9907815a4de443d6fb9bf6774,2024-07-03T02:01:48.753000 CVE-2024-35552,0,0,5da61d30cefec62b02eeadba1c669aedac74de537006f3b95f682d1b1a646a60,2024-05-22T14:30:41.953000 -CVE-2024-35553,0,0,78857ea01596cedca27625c2ee485479cfe2b4a0d15fcc027abd91d697fc5be4,2024-05-22T14:30:41.953000 +CVE-2024-35553,0,1,c857d68352282158466678f96b1c496200ed8ff2848f3d43568e03a13031f686,2024-08-01T13:52:41.867000 CVE-2024-35554,0,0,59e9b71b9bc9c32e32fdf267c50239bbb5cfe71a605af00d13cb11c63fed59dc,2024-07-03T02:01:49.550000 CVE-2024-35555,0,0,53add4f9a2ccd19a2ac12920308039f42bc69f18f4655c871d756b3733167823,2024-07-03T02:01:50.260000 CVE-2024-35556,0,0,45c3d6306738bca44a3b8a088647241d3d6cf0e3f5777d545aac86e652a1c86a,2024-05-22T14:30:41.953000 @@ -252998,13 +252999,13 @@ CVE-2024-3557,0,0,9b81ae4b28f3d03624006d648ce1a0a6ebabae2aa06c1a39550ab506cbe475 CVE-2024-35570,0,0,117a724a498932850802f3f22448be111c00fb8192d78e6cc7cb1dda478483d7,2024-05-24T01:15:30.977000 CVE-2024-35571,0,0,737c2a7f64c2812d810288ac20005c00d1a957dbded3b4f543f336361b86f200,2024-07-03T02:01:53.540000 CVE-2024-35576,0,0,4cf028a111dcdddf7b60054ad17a0fe8aad691fef93220823224c4163d503b71,2024-07-03T02:01:54.333000 -CVE-2024-35578,0,0,fbc2a519999c249ff2273380fd085efe8ff998b290a86355196d27feaea4e205,2024-05-20T19:34:58.277000 +CVE-2024-35578,0,1,fd79be27425584c76cc2d4b545495b232268e5d494b2fd2516c8d9eaac2f6939,2024-08-01T13:52:42.763000 CVE-2024-35579,0,0,d96f71655f227cfd7d7c861b5b3dac1bb76a4391798a9546a9cc66e707c33233,2024-05-20T19:34:58.277000 CVE-2024-3558,0,0,f9fa909e69165819ae496c8acd1ccdd67c7ef5aa9a5c6af8d01fcec23b3946f3,2024-07-11T02:52:17.780000 CVE-2024-35580,0,0,0387db6917a36212f88347cae7a6aab7914a4db72f7693d46d262f85e8b4bfe1,2024-05-20T19:34:58.277000 CVE-2024-35581,0,0,f44263214f42e721dd7c3dc00efbb15dd18e867b1fcd80955bdfd7a6cc44bd29,2024-07-03T02:01:55.113000 CVE-2024-35582,0,0,c8e7a41bc458b4e3122cbc97591153cfd49fcf7d308574391f7c29ac17ee542b,2024-05-29T13:02:09.280000 -CVE-2024-35583,0,0,c7e8ad1181961f61a2775c84b4a75210aad1d02af39ecf60fb5948646052c90d,2024-05-29T13:02:09.280000 +CVE-2024-35583,0,1,b5c80f126e7aedb5091bd213ec23d58eb7894ac75a15e7c2f39695f5e3fa2ab6,2024-08-01T13:52:43.587000 CVE-2024-3559,0,0,6795a97a10669b581ec15fc558119e6f23b6f2221caf66e80800086dfa7b2bd5,2024-06-13T18:36:09.013000 CVE-2024-35591,0,0,297164a1c967b7eddb21902c9581f5e4cbc525ca943cad4b4c59d356124146c5,2024-05-24T18:09:20.027000 CVE-2024-35592,0,0,72c678ca31e4ec93bf22d8a1535979b48daec0d6d17d31e168e052fbb672759f,2024-05-24T18:09:20.027000 @@ -253061,7 +253062,7 @@ CVE-2024-35667,0,0,c32fdbccccc90d44083bd3cba19fae84edd3cb0342751cb4029eff2079dc1 CVE-2024-35668,0,0,de18d8120b6f95c99a8f2f97c12feacf43a4f3fb09be59bc33140eb046e17239,2024-06-05T19:55:05.997000 CVE-2024-35669,0,0,20efb437d66c1878fd59888d419c698eccea67ad6491e02d87d867ff4b2f6a6c,2024-06-10T02:52:08.267000 CVE-2024-3567,0,0,46438f6ba8ccb224e08abd25ef147809187d2726401fa8ce52eb0ec2d0d324c4,2024-06-10T18:39:52.067000 -CVE-2024-35670,0,0,34d495c1d8f518b50b0d61ea8a479ba1c55b3db640d800f0ee8ba86fab00726f,2024-06-11T14:32:50.147000 +CVE-2024-35670,0,1,51723aef74fe3b42251da8d8a3c5d9d4b5ca7558b70cc7d63f887d024b81fa64,2024-08-01T13:52:44.810000 CVE-2024-35671,0,0,e00f3b28df1eb2ebdbe7b98d11b1367a4f04f004d2127c62df45fa3f6219a7f6,2024-06-13T18:36:45.417000 CVE-2024-35672,0,0,36402c609c6f10c2c4ab99769d453a53c0ccdb977852c177a10eab32a78fbc3e,2024-07-11T15:15:11.733000 CVE-2024-35673,0,0,2f270c6035644b9260f71b761f7d2f2998a3b01861af54be2ec71a85b718e5d0,2024-06-14T18:14:49.347000 @@ -253476,7 +253477,7 @@ CVE-2024-3607,0,0,bb41f416bf193e789c6c3a3e947ee7231c896c3b9ba6bc5f3e43284359c7ea CVE-2024-36070,0,0,beb228b364090611e3dd2a48abbf51047e75d9810a4335130915a1f3e879cf31,2024-05-20T13:00:04.957000 CVE-2024-36071,0,0,1cf2d6d0e0350fe3ce54f2fd88bd10faece00caba8178bec17a18cc8abef5c43,2024-07-03T02:02:44.693000 CVE-2024-36072,0,0,157f1d582ebbe2db7f85438ce94b5746e14ebc22da4fa97747a1222230086687,2024-07-09T16:22:39.417000 -CVE-2024-36073,0,0,b85a8cbc4072c6888190c6a1c7397609f1dfb1bd5884d90abfae3bcff7a61dc4,2024-06-28T10:27:00.920000 +CVE-2024-36073,0,1,c3d60253d6037e53a4057b8f0e27cae926a8f2bf193995ff4f32386f826b8cd9,2024-08-01T13:52:46.217000 CVE-2024-36074,0,0,9d5d4e5359c8d5e6667066f4c7f1575571ce00f843dca95005f4e14555159a8f,2024-07-12T16:11:40.723000 CVE-2024-36075,0,0,552ff6b500ffd77937539cdbbf1913236727ad42b7eb03fee9fccc739ae3dcf6,2024-07-09T20:15:11.580000 CVE-2024-36076,0,0,095e5a8223ddf00346b27a38d3816d5070afb43ba53217d9f4c5235422924fd9,2024-07-03T02:02:46.290000 @@ -253659,7 +253660,7 @@ CVE-2024-36305,0,0,e0280595514bfbb7f3f15347ff97ece344c7b914981829e66c5f0371fefcf CVE-2024-36306,0,0,2992c9d3dee00635a098da7a31d93968fe2ea44dae6af41b3d56ab6f08264468,2024-06-11T13:54:12.057000 CVE-2024-36307,0,0,a7967d17a652c5cbc0d13d93e7f7b355b3ac34f8807bd56af098c714342692d4,2024-07-03T02:03:05.420000 CVE-2024-3631,0,0,2d02e6433eb5754f41661766194384a96e84152255ba4510c23359c3175c973c,2024-05-15T16:40:19.330000 -CVE-2024-3632,0,0,a30e0458749fa93817eac3ce167e4ad47bd23a68a6c45b46ba3f7e9f86bbb082,2024-07-15T13:00:34.853000 +CVE-2024-3632,0,1,b5152c6f3734461efaf203a246eaafe8ef0e2600523c2de907e61dd2f01c5bfc,2024-08-01T13:56:37.647000 CVE-2024-3633,0,0,56839b289684cefae86bb3dbba78c89cd0cc4141e4ff321380a2afe97575b1d3,2024-07-03T02:06:26 CVE-2024-3634,0,0,5d02e3f893ea5650c3ad2b96f123134b624618fa357ff3bdcb3a7b4c93242ece,2024-05-15T16:40:19.330000 CVE-2024-36358,0,0,af47b72fb8afb1752f05b722e59135646af27eabe6a52a7a346d1b2f983dd9bc,2024-06-11T13:54:12.057000 @@ -253729,20 +253730,20 @@ CVE-2024-36426,0,0,081cbabfe1f165d2e60c6bf5434c4cea5a1c1465246b1d9713d429b0a41c1 CVE-2024-36427,0,0,10c5dade9c11af5e52239a7a8c18438909a8ea6a201617061be6b7626f49e18c,2024-07-03T02:03:12.033000 CVE-2024-36428,0,0,73719b2d94fccf2eff624fbf36dc51c2fc48c0dc66be598a72cd1ff64aaf434d,2024-05-28T12:39:28.377000 CVE-2024-3643,0,0,af0c2404bd4ab34bcd75932174ab1b00c5ac556e20d57f0445020a0c94c96fe2,2024-05-16T13:03:05.353000 -CVE-2024-36432,0,0,7f8fcce4f3e4325df04484696deddc7621d50f72e68d3d371a821b2030960f1b,2024-07-16T13:43:58.773000 -CVE-2024-36433,0,0,d957457d15c36a00497db13e124bd86771c5c1cb40ed0c5c7a84083bdae0e928,2024-07-16T13:43:58.773000 -CVE-2024-36434,0,0,bcbc7e12a5dee801465a701e7552df0a4c1b119d58888baf5cab2e46025d5e67,2024-07-16T13:43:58.773000 -CVE-2024-36435,0,0,d5db9c80751c95bdb9d7c8677b360e81635e7c29402d5e581205685bb84d0c00,2024-07-12T12:49:11.340000 -CVE-2024-36438,0,0,d225510fd6dfdc84cee32469d19214250c0068c3a01089e37a173b8ba39f6236,2024-07-16T13:43:58.773000 +CVE-2024-36432,0,1,895a265ff42669ad3221f2038a917555b3971e37a0a09c0a293a796c0338c882,2024-08-01T13:52:48.333000 +CVE-2024-36433,0,1,2d18270b463db9b276375797189132982b3093c59a94a1ba3c26d6b6e8046073,2024-08-01T13:52:49.060000 +CVE-2024-36434,0,1,8fba84c9c20ed6e9e38e371f6a7314cc80d9ab38ed1fc3ffdc1e7c8b52186a69,2024-08-01T13:52:49.800000 +CVE-2024-36435,0,1,42aa941ee425d333c537ed403b5f168d15cf55caec805a299bb4c45521e1c947,2024-08-01T13:52:50.527000 +CVE-2024-36438,0,1,fcbe2e02dbfe7753ae10ee196c2c3d66e08c15fdea4edc31b3da8e63f435a898,2024-08-01T13:52:51.240000 CVE-2024-3644,0,0,e904dffa636a621d1f1644a68a8bb26342dbf717ae684f12b60a37d102e4d87d,2024-05-16T13:03:05.353000 CVE-2024-3645,0,0,ea45063aa3cff8d7bb517959f0685ad339f1e48c249e10e3851af9fbba289420,2024-04-22T19:24:12.920000 CVE-2024-36450,0,0,700527b7e7e1ebac8a4794e042f6b829b1a1f942eb0939907744fde9a0923a2e,2024-07-31T14:47:05.423000 CVE-2024-36451,0,0,0282b5798612593892f8b22f51a38ce8164272f8754ea7af1c514e9b953ab154,2024-07-11T15:05:47.857000 CVE-2024-36452,0,0,de0ddf9ec46c34a45ea45b28170f7953241f05d2c2c229b8d849dbb88c728f2a,2024-07-11T13:05:54.930000 CVE-2024-36453,0,0,4f2b528f0e3096ddd2a4aee4fe033e97d4113146188596ed5c407d648083f582,2024-07-11T15:05:48.797000 -CVE-2024-36454,0,0,5b374ccad198b16fd2e0c55594aa9dcc7e607d40489a04021b269edc22253aa5,2024-06-13T18:36:09.013000 -CVE-2024-36455,0,0,c08cae2f41cb90d57d81267b76482dc2184b29bb2aa41de962018aa836b4354b,2024-07-16T13:43:58.773000 -CVE-2024-36456,0,0,6ab2d77145772a26f6ea161fe7021789e892fe395b7530be692d807542dbc55b,2024-07-16T13:43:58.773000 +CVE-2024-36454,0,1,816c415a87f617604c488d901c0fc2b8393ca69168077c58a5065524582c3a9b,2024-08-01T13:52:52.033000 +CVE-2024-36455,0,1,a4f757c32c6a48191e26edfd50be9dbe6a08fe7d25f45a8d5e490b5e7653d1ea,2024-08-01T13:52:52.813000 +CVE-2024-36456,0,1,48da099fd740150d38c29e88de4be636b5045c8ca1374d249af99d549e9607be,2024-08-01T13:52:53.540000 CVE-2024-36457,0,0,72760e3039fa35b5fe26ddad9fdef8608f653e7f7685e05328a58a9de033d19e,2024-07-16T13:43:58.773000 CVE-2024-36458,0,0,8cc25938d2d5cd1d323ce70bc7a8d0cc38a394cde01025dc622780ae5428e886,2024-07-16T13:43:58.773000 CVE-2024-36459,0,0,474bfa332c926d073eec1319c6b0bf17fa1f15902b9a2385d1d4aa60eeefb843,2024-07-03T02:03:12.833000 @@ -253752,17 +253753,17 @@ CVE-2024-36470,0,0,05049c8242b38f083734214f212efa24bf0b8e7684b3d943061a8cbb7c06a CVE-2024-36471,0,0,6e10c8a6f7211dd42a1163cc28818f3c443a2860a609ca58841954b595f68033,2024-07-03T02:03:13.647000 CVE-2024-36472,0,0,2535bb51ccaa28f537e77e0ccd5fbdc4d19f82667f3e7465a3e9bc19e2a787a8,2024-05-28T17:11:47.007000 CVE-2024-36473,0,0,aa04ebf30531a2d8b8fe44f55c5d2b24e6cb3b712da23e42c688962416c1c553,2024-06-11T13:54:12.057000 -CVE-2024-36475,0,0,e58e8daec2c4b8e6592bad89c33ac9a3655ae225084a9417738bcee54b18c2e9,2024-07-17T13:34:20.520000 +CVE-2024-36475,0,1,2465dfa9659668f06e1b676c0e00f6d6b4f7878f87cfabd4f14433b070155540,2024-08-01T13:52:54.403000 CVE-2024-36477,0,0,1d17ae62300b2d07c5941459ecfc6e574f91510a7910b453c64417a36e5b6766,2024-06-24T18:38:40.737000 CVE-2024-36478,0,0,3d7ccc3e5e506ff24ae4133973c4756e3313941d8345b88b77b0a392d064c726,2024-06-21T11:22:01.687000 CVE-2024-36479,0,0,dee4352def0751c2293c7f9148494e529c22ac95426bcab70e58c8c955d6c7c4,2024-06-24T19:26:47.037000 CVE-2024-3648,0,0,8ea394456a868f5cb440700cb4f3d40035b05f4bd668cd1adcf2b942f06e8067,2024-05-24T01:15:30.977000 -CVE-2024-36480,0,0,467634cd317ccf32154f72ed3d837c9ab87c9927c3f4f2a0848f910fa3a76e62,2024-06-20T12:44:01.637000 +CVE-2024-36480,0,1,8cfe7316f6ef17d7594f0f48ea5faff4d266af61040753ef41d7dc8fbca2c04f,2024-08-01T13:52:55.747000 CVE-2024-36481,0,0,c20069fe9216cf7ae5e42e62fc886e320b7997d027cb5be79eafe3b725910b77,2024-06-24T18:35:33.157000 CVE-2024-36484,0,0,d90e8addbe4310fb59424c1e2209c39c8eeed0a72f79133301d102644feba769,2024-07-29T07:15:03.447000 CVE-2024-36489,0,0,dc2f7108dc3678f1fb36a70c7ba7637636e10430721a5dfcf0db7d3d728d6d70,2024-06-21T11:22:01.687000 CVE-2024-3649,0,0,9d2e0b18ffe30ccf7cbc0e74a77daf1869af9483d0413cb80580942eae7d40a2,2024-05-02T18:00:37.360000 -CVE-2024-36491,0,0,c6dd1ef3c6745f768d62d62ea4add65925f5aec7ffd7e126f15c9ed745598bc0,2024-07-17T13:34:20.520000 +CVE-2024-36491,0,1,6efdbfe92fd7b110a7468fc85fb00858571ab2d21b32164f2daefb371e4e6cf2,2024-08-01T13:52:56.787000 CVE-2024-36495,0,0,10404a83be52d267985f87debff962346c26dcdc9e1b293bd8df22829bd96214,2024-07-08T14:18:38.843000 CVE-2024-36496,0,0,9b0852e2079a2b8f81e66f1c652acdc8b58764ac010cd86aadd442eb8de70d88,2024-07-03T02:03:14.090000 CVE-2024-36497,0,0,55716469f26311eaa7b551ebbfe7eab2676d8944c191b597609bbd8dff1f73b6,2024-07-03T02:03:14.280000 @@ -253774,25 +253775,25 @@ CVE-2024-36502,0,0,ce6106b712ac934aa3d46433d1d90bd69a47142ad6fe94c097ce1ae7a55cb CVE-2024-36503,0,0,cf0c7df8eb5d0563a3adb9382b90b37caa70a1002731797c28a41bd8794b11f6,2024-07-16T15:19:45.557000 CVE-2024-3651,0,0,3337eb59719c2f9e59e57f7ed588f3375e47160773d149a8aeb60c1398d8674e,2024-07-11T14:58:01.803000 CVE-2024-3652,0,0,df71e97982cfb8bbdea2c8b53979ee8792aae4a73aef6703ec1b621d3f12e772,2024-05-01T17:15:37.793000 -CVE-2024-36522,0,0,d57956622a6134e454c8f4898ff492a9df15ff945ff709ede5d9eef1a16d2f06,2024-07-12T16:34:58.687000 +CVE-2024-36522,0,1,86674e42114231d1026f4ff35fe6fe6affeea594b7c00b1a81ef4e17dc0fe83d,2024-08-01T13:52:58.033000 CVE-2024-36523,0,0,3016893dc57dcd62edd08208dde4ce2567742ed11633d9956e63ba6b508801fd,2024-06-13T18:36:09.010000 -CVE-2024-36526,0,0,3350b4f4d591f45a4fdc32600db8741aa002bb90db68247db22079d3d42c7a86,2024-07-09T18:18:38.713000 +CVE-2024-36526,0,1,1ddb30b565e6d7a152e00264224393d020c0bb948b7f968c326e2d1f8170cd41,2024-08-01T13:52:58.227000 CVE-2024-36527,0,0,5a4da781a91464af6910d804126691f30125cf5f5ae9e52379cc70e43ae0f627,2024-07-03T02:03:14.827000 CVE-2024-36528,0,0,2720657851e73513f2a766ff74bcbf76f8ccd5ffff5f964570f2d3734bd169d5,2024-06-10T18:06:22.600000 CVE-2024-3653,0,0,2ce001c8a2558fa4f76ef87c21e8ceeb7eaae4cf2cb26c9cd78a019c19336759,2024-07-09T18:19:14.047000 -CVE-2024-36531,0,0,309244ba7df6e757b847511595184db51193505c4bbceece7db96d568b889d7a,2024-06-10T18:06:22.600000 +CVE-2024-36531,0,1,a4158d6a8860f8c9c37cc090a05d54c5f8fca61c7fff205691822d02cbdf6215,2024-08-01T13:52:59.007000 CVE-2024-36532,0,0,b051ad55854f4bc888db3a53610f7bcd9ed49e35c5868005d5e65395b423f5e4,2024-07-03T02:03:15.647000 -CVE-2024-36533,0,0,8bcab62e33c5ba6b5bab63a15d7858cef04c9eefc50b0ac1dc0940c39b5fc501,2024-07-25T12:36:39.947000 +CVE-2024-36533,0,1,6d6a58ccbd9862b12d84a535bbe7b9936ca5202878de14518d14e5cbc520ef59,2024-08-01T13:52:59.810000 CVE-2024-36534,0,0,4cf4e73bff5af3456448d2ddc43e34a4c1854f7181f8604174b54828d17a56aa,2024-07-25T12:36:39.947000 -CVE-2024-36535,0,0,f9758e99945f5813e975debf7d5f75b3cb1a611718aee5b2ab7136d570146578,2024-07-25T12:36:39.947000 -CVE-2024-36536,0,0,155a55a00787407cff466433ab2374d1bf98e0f74a3553c1a6aa32ca572f9dd6,2024-07-25T12:36:39.947000 -CVE-2024-36537,0,0,2fb47323e45552763a78dbe36878dbc8fbc14e41edc0f5937ae1ea55221f92bd,2024-07-25T12:36:39.947000 -CVE-2024-36538,0,0,92b97a02c9b7e49bcc4b71e9e233926e9712e76beeaa5bfad75de9987283280f,2024-07-25T12:36:39.947000 -CVE-2024-36539,0,0,c655de6760a3c1e7630edb0b952d92ebb8fc0a7920123885921c7d35366d8fb0,2024-07-25T12:36:39.947000 +CVE-2024-36535,0,1,e206f42fd7fd3ad062268d9ff79d9c1d6468065164542cd5cd3ce85c7b0f654f,2024-08-01T13:53:00.610000 +CVE-2024-36536,0,1,18bc7dac250d2e682a6850976fb889f2457977f5567d869e205c26c591cea55b,2024-08-01T13:53:01.390000 +CVE-2024-36537,0,1,5f930f9ed55795838127e0e3777c1d69912524f2615f541a92461ae3dca81aff,2024-08-01T13:53:02.180000 +CVE-2024-36538,0,1,2c2f89c6add65eaa7fe73370f2b6ea6e66fa3976602a2c3fae08fdc086d59130,2024-08-01T13:53:02.957000 +CVE-2024-36539,0,1,4a0be599c84b4fdc4a373e9fea743448da6ea5dfc7c56ce644077bbc1d54be9e,2024-08-01T13:53:03.723000 CVE-2024-3654,0,0,a7708e7e436d988a91abde36ee9f26c2df705dde9b78c457b8712b905cf4dc6a,2024-04-19T16:19:49.043000 -CVE-2024-36540,0,0,6ac1fcb6c5a9410d183a9feaa7585049dc2133e41b5c59bebd586c6fcf2321d3,2024-07-25T12:36:39.947000 -CVE-2024-36541,0,0,bdb1d894c40ec37016ffd76ec875dbbf0f0f4ac2f2b1dc739e3f5e535a97047e,2024-07-25T17:44:25.170000 -CVE-2024-36542,0,0,4a11c289267e627edea24d82856a0153c539244024e49528b9e757fe3b150bcc,2024-07-26T12:38:41.683000 +CVE-2024-36540,0,1,3e3503c7f79b3195337d8b0f1e38320534b7157865481ac23c232b4e96a5cb95,2024-08-01T13:53:04.590000 +CVE-2024-36541,0,1,b5291ecad28b9af4ed1704c2ed0f9af422de7d38da1fbc69723e312c6c52ab9c,2024-08-01T13:53:05.347000 +CVE-2024-36542,0,1,4df09cc2abdf3caca422217226bc2f709ae2db68bdb5b96a0a920b5965caf0bc,2024-08-01T13:53:06.130000 CVE-2024-36543,0,0,dbb1c819537d5d2e6ccb57b6fa0d1307530721c713dab080cb8c7f78417a5f63,2024-07-03T02:03:16.430000 CVE-2024-36547,0,0,63fa93ba07106c565a1033909cd3b8147be168386a42b3286a8bfe46cc4ab092,2024-06-06T15:16:11.897000 CVE-2024-36548,0,0,aff0414515c8e648334d6ef2a1bf413e6b70804d4ac2887710c25a232cc52bfc,2024-06-06T15:24:02.577000 @@ -253801,25 +253802,25 @@ CVE-2024-36550,0,0,91adae745b223f9735fdb21a15339bb26034752e595063e3f9b20141d647e CVE-2024-36568,0,0,c947aedd82bb9149f6d5ed733e385977abac9a86db57bbcbe31097874b0b1009,2024-07-03T02:03:17.227000 CVE-2024-36569,0,0,360f77d552cdb048cab439a5bee7725cd5b340a5088e797dd6c6cd06c49b10f6,2024-07-03T02:03:18.013000 CVE-2024-3657,0,0,ee35636c80343c35c9d7ec01515342fe2ebdf7b3a803cae60aab4ad80a6b3995,2024-07-18T16:15:07.693000 -CVE-2024-36572,0,0,6698ae54626b1907bb0ff16c15623b68e128ea90df700a219a5e5713888e5f21,2024-07-31T12:57:02.300000 -CVE-2024-36573,0,0,210f4a464aed5ca882857e08b7ab319b20ba6825802f28036ac835f0b3498a8d,2024-06-20T12:44:22.977000 +CVE-2024-36572,0,1,20098f3e4d09af5262a4daf356c004396dde9562d4b3915e598efd5df3f1277c,2024-08-01T13:53:06.967000 +CVE-2024-36573,0,1,9ceb16a2acc670182f357db64f06ef9a672381f951b2f58ee1e425755272a679,2024-08-01T13:53:08.237000 CVE-2024-36574,0,0,5919b4ca2d0f287d5f7cfcf83fdb2db228de9c4db571b73cd23f7f08bae7fb33,2024-07-03T02:03:18.790000 CVE-2024-36575,0,0,b117fb4e52d0f8b4cc58a403a03ce56bde8486e8cc8deaf2edb246c707092c4a,2024-07-03T02:03:19.590000 CVE-2024-36577,0,0,576812aeee52a5f7c1a1906492595372da454d658eef342066e241ac365be3f2,2024-07-03T02:03:20.433000 CVE-2024-36578,0,0,31bf2da1d72ccc586cf7c2601482054c25f91d07cda12037e2c9b6f157363a1c,2024-07-03T02:03:21.253000 CVE-2024-3658,0,0,a8a6b79dfd0c32467a1ed9fb3702397672f9a3e041e004bbddb8214a3aee78d6,2024-05-28T15:15:09.703000 CVE-2024-36580,0,0,4e1be53a2f39c0a80b55fee3f7dc36a6db304045cdf599ebdf8f8db467e32f50,2024-06-20T12:44:22.977000 -CVE-2024-36581,0,0,9cf767c0b0102e33a8b2be8659294b30f25937d75eee1ead06bb93c27744f26e,2024-06-20T12:44:22.977000 +CVE-2024-36581,0,1,48b3b841e1a97b73bb9fb2b7b5331df839757f8bbf0337d9846097c4be400d00,2024-08-01T13:53:09.057000 CVE-2024-36582,0,0,9e5b29c3e19ce364b3bbd93e8f8645ec5389aadb93845235cbe43b753a249355,2024-06-20T12:44:22.977000 CVE-2024-36583,0,0,ddd27123c3646f7a3fa3b735f22a6a85d1a122401d7d1a0d660277bbd83fa9d8,2024-07-03T02:03:22.067000 CVE-2024-36586,0,0,4099f0afde3003a22e36cee4a4d1bf00ae6ce9b2ce9c60b9b6a1b88a3ec1aacc,2024-07-03T02:03:22.850000 -CVE-2024-36587,0,0,190b60075bc69df962b1254cdb40fb6c2bccb096a2c6e35cd53fcac0fbec7df6,2024-06-17T12:43:31.090000 +CVE-2024-36587,0,1,bf71d7e5e004f256f035927236d4ac896369318476be83b9c18caf685fe047c0,2024-08-01T13:53:10.050000 CVE-2024-36588,0,0,c219e8a7875d89e66958dab0789f7691c4be3c0c05f3a68bfc6f3a9b60c1ba97,2024-06-17T12:43:31.090000 CVE-2024-36589,0,0,7d8241af3cf4fd123efae48d04ebf204edc6e9689a6c5e93ab29d83bac6ea2c1,2024-06-17T12:43:31.090000 CVE-2024-36597,0,0,98c2dc3423defc3b8028c6c9b71ffc307577eb360e61d0feea8867a8ccf6c346,2024-06-17T12:42:04.623000 CVE-2024-36598,0,0,00d0a8090fa16fe89aa3866d79b98c53443431993afed273e14298b9e0b2a6a8,2024-07-03T02:03:23.817000 CVE-2024-36599,0,0,383598a308864a29067306ab85cc923e902abb3939ef47bab14d89f231ab95c9,2024-06-17T12:42:04.623000 -CVE-2024-3660,0,0,c93fcbd0fff6d95a3049bb1d79ace75a00827c96d77b254debd22f61561ba8c6,2024-04-17T12:48:31.863000 +CVE-2024-3660,0,1,c3c1c3312c8a9566bf9feedf7d8876d18d19f4aa50138300852d5ac195117ed2,2024-08-01T13:56:38.227000 CVE-2024-36600,0,0,e7eab002c297c7d5ce5dd570ac3b60c68bd283d5ad8a781f4e7d7381b748121c,2024-07-03T02:03:24.687000 CVE-2024-36604,0,0,b44aeaf7b94b65a7ce57f51f40d1910c22ef4733aa03870060a8ea45611821e3,2024-06-11T14:24:17.413000 CVE-2024-3661,0,0,c42cca3fa75d9e1e2e62908451948484a5d5cca5f29f392158a6d0b59eb829bd,2024-07-01T15:15:17.187000 @@ -253837,7 +253838,7 @@ CVE-2024-36669,0,0,21ebfea04a574adc536db624cc5e52aafb726d7a078d0665f89bcc84a00a2 CVE-2024-3667,0,0,67c8386bf84232df2260001ef819e9d91b62f19cfb2a953cb76f444117b56973,2024-06-06T14:07:44.473000 CVE-2024-36670,0,0,98051372c03c4f8daf963a6b52983fb8a9582924dc9f1a3de21e1b0831613748,2024-07-03T02:03:27.853000 CVE-2024-36673,0,0,aea444302aaef9810d7018f5b865b2350174d0e64a7fc1a87d65b1a1469f2a0a,2024-06-11T18:27:20.950000 -CVE-2024-36674,0,0,f691d9164794f42465ff8d216871825d1736cf381e0c0aac14d8c5f902a3866e,2024-06-03T19:23:17.807000 +CVE-2024-36674,0,1,596db0f4764134086c028a91606ddd737131283bc4cd84cec3a5aabc9728f98e,2024-08-01T13:53:10.830000 CVE-2024-36675,0,0,0db5fa1ab82b2e97328c6f2032396d4de5a6bce3bed4d1bccdefe8e0a70ae3fb,2024-06-11T16:49:10.457000 CVE-2024-36676,0,0,a6f2730c67158cf77e7177475d528da2c111a9270c55f8edde3fbb0f8476e94d,2024-07-11T15:05:49.017000 CVE-2024-36677,0,0,37e2fcc4931a46171864bd8fa8a49d4adfcd7e64692130c14ffe6332f9c6da02,2024-07-03T02:03:28.667000 @@ -253846,10 +253847,10 @@ CVE-2024-36679,0,0,9fb435ed750a69ba9d61d741b1b9ae3031a1114fcc5a6ebd4804673d1f8b0 CVE-2024-3668,0,0,760723957a03bd3e6e8f8da9bf14a37cb962a55f21654d65bee4d6a13a6bb613,2024-07-23T19:39:25.253000 CVE-2024-36680,0,0,12a9cd305d4b5b8b70c51b6cca94004d4c8d12385813b2e0157ea675419f28d2,2024-07-03T02:03:31.083000 CVE-2024-36681,0,0,91ab5a39355fb60d1e0e5e355644e5363b5d880ec14684cab5ae1016626028b9,2024-07-03T02:03:31.853000 -CVE-2024-36682,0,0,edc123e03827ea6814bb07a9757c17a0cf5703769c42695b1ae6f58aee11929e,2024-06-25T12:24:17.873000 +CVE-2024-36682,0,1,607667f3d3fa1e7539487ebcdf60477393019c86221af3075a4b31a59983923e,2024-08-01T13:53:12.263000 CVE-2024-36683,0,0,18a76ea23a5695131ac0a1a1cae26aee3d1ea92ed38cb283b784e28da9cb3b8c,2024-06-25T12:24:17.873000 -CVE-2024-36684,0,0,1ce5fb0cc7c8519edbfb220ffcf03bdce18fbc872672e6010db16693eec6458c,2024-06-20T12:43:25.663000 -CVE-2024-3669,0,0,13ec2fd6f278f26119b11d63fda8c02d8dd76168b9f7546e233f9f24beac43ab,2024-07-30T13:32:45.943000 +CVE-2024-36684,0,1,46cde669020b4adee4a3c38dfab2f5ae8aba838dcea159d2669f3c5e52bc3a8a,2024-08-01T13:53:13.027000 +CVE-2024-3669,0,1,adf9cc4d7b16c7513726b84fd5b10bd94ac2985d9cd2d264bea2883110b227ce,2024-08-01T13:56:38.537000 CVE-2024-36691,0,0,eb4ea08bf79d1a6ac1d98f330c6ba45260957add9ca280d2ec95e1cc61898b85,2024-06-13T18:36:09.010000 CVE-2024-36699,0,0,f519eb157e638490c5e16aa33d3cf222cb0f0828212475d05c477400a1f8b777,2024-06-14T15:15:50.967000 CVE-2024-3670,0,0,77ac11a62196ad685da1366e218d9d33cb33f8c42dea24a7d4be6249347cd9dc,2024-05-02T18:00:37.360000 @@ -253859,18 +253860,18 @@ CVE-2024-3672,0,0,3f4375d3f925965eedd3021149cf89991af4643d3a1e99168ddd0533ac28ff CVE-2024-36728,0,0,685c6307c04e58fb91aa1cd3d8196094b317c76e0e4421d5d65d9f3c42021678,2024-07-03T02:03:33.547000 CVE-2024-36729,0,0,d45877829f45f72a36efe808f4ab30639504f5ee409a1f4bbca4482bbbc7cd52,2024-07-03T02:03:34.353000 CVE-2024-36730,0,0,64a3dffa7bbe9fe7e69b7699e79bca595a078505b7c29c8334f44bb856a96c39,2024-06-07T14:56:05.647000 -CVE-2024-36732,0,0,9c4dde05ceb00358e037aa1f5106f334ea743a19687c0f0fe007b1980acb3b64,2024-06-07T14:56:05.647000 +CVE-2024-36732,0,1,89ef79acf914e7fa79f0997bbb77dd27a533cae855c7319e0da9cc89d060d11c,2024-08-01T13:53:14.287000 CVE-2024-36734,0,0,78caa628b70b20027e0747c6b2f4bbff04deed4a29e98a2858424a546bd5fde8,2024-06-07T14:56:05.647000 CVE-2024-36735,0,0,77219f23e41303fab14d55459858c38b6f21ffff484d41fa2056fc07bdcb508f,2024-06-07T14:56:05.647000 CVE-2024-36736,0,0,b20d2ef797aa6fbbca71cb0c7c6886935927b9ada97126f8e3cbe4efcdbdd655,2024-06-07T14:56:05.647000 CVE-2024-36737,0,0,4cf60f234f52f5b0202bd739dcb99ce837f78d7b1128c09622cdd4eeba9630dc,2024-06-07T14:56:05.647000 CVE-2024-3674,0,0,03b7d2663970c659e666aededf211d9dc4cf0601da686d1d01e4f2350a35269d,2024-05-02T18:00:37.360000 CVE-2024-36740,0,0,2119901e17f2acabf72e64a543d2aa59166a4d04cef9ebec63b859fb8418a1d5,2024-06-07T14:56:05.647000 -CVE-2024-36742,0,0,58520d05d58efd9489802cd1efa202768220ca15712cae9f9e7462c2aef95d0a,2024-06-07T14:56:05.647000 +CVE-2024-36742,0,1,acb38f1b43ab4e7383495b3e1f06f162c75f285b1ef8caa005f6865ae9c13ef1,2024-08-01T13:53:15.053000 CVE-2024-36743,0,0,918adf8ca0ed469017b9c6faa54a88497274ae724212583479f2aa193c53be72,2024-07-03T02:03:35.050000 CVE-2024-36745,0,0,1c12c7bcc24ae5bb6a1ae8c5c800342ca4dc4e184f12e2bbc75666cd5cf9fdfd,2024-06-07T14:56:05.647000 CVE-2024-3675,0,0,e972ca8977b016371ea00bb70d419fc74d4c9e67fe4972a9be0bec45043510c2,2024-05-02T18:00:37.360000 -CVE-2024-36755,0,0,9e99d581157eb6425a2068d7ce2847d6978296a7b279aa13cc483251da2452a5,2024-06-28T10:27:00.920000 +CVE-2024-36755,0,1,3b099aa75ed922e8a97936dd1b72e1389b63debead504feb9a9ceec21772665e,2024-08-01T13:53:15.830000 CVE-2024-3676,0,0,8dc193c8609917b35ba91a632e73de4e92ed46289774a677f06060a8b04aac98,2024-05-14T19:17:55.627000 CVE-2024-36760,0,0,841ebe4cb8fe3bd81c22749215bf86b89aa9ddd323f20136f04010af75de3413,2024-07-03T02:03:35.990000 CVE-2024-36761,0,0,2def433fa1c84a9e275856e3918a20f7afbf72e8563d9face0a26c843d2d46da,2024-06-13T18:36:09.010000 @@ -253881,8 +253882,8 @@ CVE-2024-36775,0,0,f07b67642f75fd9d913fa22115fe66980fe2b4386b82775fae07bc9d05d87 CVE-2024-36779,0,0,cbdcbb610a290cef8ce7db7946b1f724a8463efffc3803220bde1cec1a06e7af,2024-06-11T18:14:35.890000 CVE-2024-3678,0,0,469a9707bf4a10787b83dfdbba79cfb824cfe86b743e31553512cd5fa81bcd6d,2024-04-26T12:58:17.720000 CVE-2024-36782,0,0,a26ba637b3d65bc93f6cef8eab2e486cb22e0f173ff0b09ffa5f5054e7e91e9a,2024-07-03T02:03:36.797000 -CVE-2024-36783,0,0,9e033e81820171bbc29edd99f3ecebe9abff99d63db0276bef9e31afd9316951,2024-06-04T16:57:41.057000 -CVE-2024-36787,0,0,9cb27496c0a83c0f2a2a42d1da3f4d21b6e607fe8a5d017df22e983f5ba9f675,2024-06-07T19:24:09.243000 +CVE-2024-36783,0,1,dbc11dc9218015de97a73e96cb005d8a036c1d720a02ae2fb7f59dd28b9e4117,2024-08-01T13:53:16.600000 +CVE-2024-36787,0,1,26b242769047937307c486de3dde435edbd1d09662a165684d61f83fd541fbdd,2024-08-01T13:53:17.367000 CVE-2024-36788,0,0,ce421f00af3050883a12bce11fefd1ad9628128d70c1a012c0032b203b9673fd,2024-06-07T19:24:09.243000 CVE-2024-36789,0,0,66680e480c24497cf5e272fd39ed9d33d6d18494e9620da29843a2ce28fa6be8,2024-06-07T19:24:09.243000 CVE-2024-36790,0,0,cb4ec7b669a8792b6facfab8d7708d38fd59840ed3ecf1568af2e5663e9eff73,2024-06-07T19:24:09.243000 @@ -253896,7 +253897,7 @@ CVE-2024-3681,0,0,447617aa0ff72974414a3f009efb09a39cced1c45f643ef6f3cd3ded49aa79 CVE-2024-36811,0,0,f90db255bac241fb3eb4c4274fa7aa4f43fe1ecaa498e979225312b15e44df61,2024-06-07T19:24:09.243000 CVE-2024-36819,0,0,b06c755f900c06f50434f89b91de559393300344dda01bbc662266b5fc611e52,2024-06-26T12:44:29.693000 CVE-2024-3682,0,0,aebee2feda89d709e11e9bec3e1c17ca0ae10ff39719e7f62be10e1e27b06dc2,2024-04-26T12:58:17.720000 -CVE-2024-36821,0,0,5e462aab41e8d2f0d8e05e9a2f469afef2cf6552b312b413ad0162ce90ac2bb9,2024-06-17T21:15:50.960000 +CVE-2024-36821,0,1,a101d59bf6e24c907bc18edaa02c1eaea1af6aad6d551ff1aa91ecf54c6663ec,2024-08-01T13:53:17.693000 CVE-2024-36823,0,0,73764c9f34abc877735e2a683a3be5f7a3435e84b5edb7f300e1e086f31dcd65,2024-07-17T14:41:44.227000 CVE-2024-36827,0,0,d5b65af3d7b9322aad3b5478f72ede9b79c676edb352f8fbc888d8aac5e59f92,2024-06-07T19:24:09.243000 CVE-2024-36829,0,0,28d6b2d4311b85588cbd36851085bf0d595d08bf8e4f0076b3a54116663e3c85,2024-06-27T12:47:19.847000 @@ -253956,7 +253957,7 @@ CVE-2024-36916,0,0,36d478152b8897415c4b118bf935e513132999146096a1b52b71ec1c2fb67 CVE-2024-36917,0,0,d221fb6047cf04d67c32f2b77b4eebe93f83abf692c9a6770ca0dcb646399bd3,2024-05-30T18:18:58.870000 CVE-2024-36918,0,0,f4c8fb45e44d9a145b3470164e7534e29337de61bbd3b9ef12d7c79463c4d087,2024-05-30T18:18:58.870000 CVE-2024-36919,0,0,99baaae9ef063c605b7a2ccf732530270475d8e1a1554e496c616adb6d6ac4e2,2024-06-27T14:15:14.533000 -CVE-2024-3692,0,0,2f79116a19c2205bb4bc0404685baa68df98df554e639e7d5713db6a040cd369,2024-05-03T12:48:41.067000 +CVE-2024-3692,0,1,c87bb1437d7652f08ed7402d038573c505ad958722d15258ea4aff9491886a26,2024-08-01T13:56:38.743000 CVE-2024-36920,0,0,a9b624cb0ced8427391b509f1fdaa6beb8f29d18d1032c260994227836f577b0,2024-05-30T18:18:58.870000 CVE-2024-36921,0,0,5549fd88753f44da1835c8eea9dd3ebabdbb67abb7cd1d3366c43705121c2189,2024-05-30T18:18:58.870000 CVE-2024-36922,0,0,5ce833045fba0b3994bee31a3108ca1f953e04d92972f4182560619a4434fa5c,2024-05-30T18:18:58.870000 @@ -254047,9 +254048,9 @@ CVE-2024-37004,0,0,eb821b24aec40cee5d3a4d83d3182056a26abdd06091705aaacecddd90b33 CVE-2024-37005,0,0,6346c3768c56adc2bd0ec197af628ad214cd9981413f2d5df7e8d7f1bc79c5d6,2024-07-03T02:04:00.877000 CVE-2024-37006,0,0,ce197589ee3e9b9abc62e5ee278117c11ae961db1cdfe5fd87c2da96a0f55f85,2024-07-03T02:04:01.090000 CVE-2024-37007,0,0,0fc601714096f5d925a9dbadf52718e2d07645aad03229b4044d058f28f4c32f,2024-07-03T02:04:01.303000 -CVE-2024-3701,0,0,b97bf02f501ce8bb46bbbea962bd508392417999afee815d0c2fcfb239983cc7,2024-04-15T13:15:31.997000 +CVE-2024-3701,0,1,9482cb82bbb13bb95a868bc6f96d983af9346a976a51739385a5b2bb2124b309,2024-08-01T13:56:39.127000 CVE-2024-37014,0,0,4d8eebb55f92fd637819ddb88e1adc8dcc510ce2876a7f33ecffd1498dc89404,2024-07-03T02:04:01.523000 -CVE-2024-37016,0,0,bd44c64466d02adebb06371d5bb69da4aa66465a79f7f6a21fb0b2857add6231,2024-07-16T13:43:58.773000 +CVE-2024-37016,0,1,071a19c5647d911f2366d429fe972b4b01f1c39b8cafdce75a7928d7f84ec6d5,2024-08-01T13:53:20.103000 CVE-2024-37017,0,0,bcf42a4afa4161d494ebe5be7e7f4777ee139dad62148a87a3f3aec02cb4dc1b,2024-07-03T02:04:02.337000 CVE-2024-37018,0,0,702b0048025811920f5478aca500fdf16e8badcce077fd8d6d40cb1d8cc37861,2024-05-31T13:01:46.727000 CVE-2024-37019,0,0,c34529539f4c6ff793225ec64e29909e2614ce1bc964c3c63810b9219791c5ca,2024-07-03T02:04:03.153000 @@ -254094,8 +254095,8 @@ CVE-2024-3708,0,0,d5d3127cf1ebbe4d1277dc91ebc9f2ee01faea98cb7a29c27942fe94c97d6c CVE-2024-37080,0,0,f0a9bd7effb46ac30e1d20f1d1aa7a7b386c0ee7e62089b4e1cc310e9f341fd9,2024-06-20T12:44:01.637000 CVE-2024-37081,0,0,1657c2c6215fa861c8bf708a3b65df9501dd8a14588c6f7d5718007f5ce77c8d,2024-07-03T02:04:05.970000 CVE-2024-37082,0,0,cdf7ab7ec235a04ab3547ac9302ea8fb37a25e6b12903e2e739c3b31068e7382,2024-07-12T17:15:10.220000 -CVE-2024-37084,0,0,e9cc68d2ce3ebc0a933179ff99eae650b65ccc7062c7a060f7c4643d495d9122,2024-07-25T12:36:39.947000 -CVE-2024-37085,0,0,df18af66b395bcab893584a274653a151adbc0b7938bf0e30e05392f4ea1ca68,2024-07-31T14:46:29.270000 +CVE-2024-37084,0,1,80550735d6bb4a6e286021e9f22257f5e538827d4cf62f5ba780a83b5b57849d,2024-08-01T13:53:22.230000 +CVE-2024-37085,0,1,5ecc916a597d8be62fb1947ef153bdb89e9ab6b898f6f416b7bc6b77a93b26c5,2024-08-01T13:53:23.320000 CVE-2024-37086,0,0,9068529bdb3d555265b7f816c31a19ade60e24d8cc46d6bccf0934fca43600dd,2024-06-25T18:50:42.040000 CVE-2024-37087,0,0,cd5f38dea6878f55617a1348143830ab9f44bbdb4a44091efb0c0832c07fcba2,2024-06-25T18:50:42.040000 CVE-2024-37089,0,0,9e292fe1dd11fba75d82973b2e1db6879968f554c93ecd19be42fbc3a656ef4b,2024-06-24T12:57:36.513000 @@ -254104,7 +254105,7 @@ CVE-2024-37091,0,0,bdffca687390d689c2b3b4cf27976482d76dbc010ca113e595b71c1c0f090 CVE-2024-37092,0,0,4f832f426d4e20df2ade16ea7f95884ead700f0032ad8127b2362adeff7b3a6b,2024-06-24T19:26:54.367000 CVE-2024-37097,0,0,2ff654ed870e28098ff61d9863b817bf82788553fa15e646afcc390727bd15fb,2024-07-26T12:56:05.293000 CVE-2024-37098,0,0,206a1546b741bc07a86d9ba244975f767c816d0e758aea47c5cb3f103694aa58,2024-06-26T12:44:29.693000 -CVE-2024-3710,0,0,11f8b032846e97ecdf9206fd4f5a2cf7a7723a72083208561fccf1e37f2e1a30,2024-07-15T13:00:34.853000 +CVE-2024-3710,0,1,b54f7b8999ad064535445b5fd4766a137ffc70ceb349f28f8c5f7d65dfa1d3ae,2024-08-01T13:56:40.053000 CVE-2024-37100,0,0,d946d37139e082d7c1d3fa3022addee77f7079a31af1d75bfaf38f9c67f66b78,2024-07-26T13:27:50.583000 CVE-2024-37101,0,0,97e2e32c34ae252be2daf95c15efc1d10b3c02ed553eff869e9373b422ad3f71,2024-07-26T13:28:35.413000 CVE-2024-37107,0,0,c34eb9423d2914f17496f972157edf5a13b8aac9d9952229863732abed2c8ebc,2024-06-28T13:15:02.503000 @@ -254131,7 +254132,7 @@ CVE-2024-37131,0,0,1b53fe6698cfc8662ae4f6c0ed3f87f760fe2128440fb0619b7f263375326 CVE-2024-37132,0,0,32a23a7a93e12576e3cef44acbc1e26d96ab3673ab3a48bd46dd4729adbaca95,2024-07-03T18:01:07.500000 CVE-2024-37133,0,0,00b1139f9174975ec5c3de34a64ed678ba7d69bbdd2f853dfe982f25e03c56e7,2024-07-03T18:01:19.487000 CVE-2024-37134,0,0,8ed9324b0e419d00f56c9177e18aa3c394712dc2a31ec456c168c8f73d2e83d7,2024-07-03T18:01:30.463000 -CVE-2024-37135,0,0,b14e718dbd1aaa8dcfb0ab54377c59b4ec4e6ec491f74db1dc3a9dca9ec3f48e,2024-07-31T14:15:06.373000 +CVE-2024-37135,0,1,1825f0bbd6a3644a5defcb06610c875a4d62a2c01b0edfc19cfb2bb9d9e24173,2024-08-01T12:42:36.933000 CVE-2024-37137,0,0,015bdbe57b75c18c5c9568a3702d89c1497d9ae0c088b4ae375896212249bae1,2024-06-28T10:27:00.920000 CVE-2024-37138,0,0,0a1a2faf5915443beb4b9b146b70944e6a09572b5304f90b5e8531aa017e41a8,2024-06-26T12:44:29.693000 CVE-2024-37139,0,0,8bcc51f0578107c550f57eda3e8f8169088ed87cca1e5fda916b143e22a12acf,2024-06-26T12:44:29.693000 @@ -254315,11 +254316,11 @@ CVE-2024-37370,0,0,8a7076b3e8e134b661d21db6f90c7a50b93b1e481cf692861b0a2c3450767 CVE-2024-37371,0,0,70d55bf05c2eee0a9f3b94ddc604e302a9c39f7d842ab9266b20a4c2d600c9ba,2024-07-01T12:37:24.220000 CVE-2024-3738,0,0,cebdf6c67207ccd8240919e9596b8485c51e6607a12a8dcdfff13f6ddbdbfe32,2024-05-17T02:40:05.977000 CVE-2024-37380,0,0,4ce1330fb679655262ab3b818cd133f9eef1b7c4341268f445fa1434d34f9951,2024-07-24T12:55:13.223000 -CVE-2024-37381,0,0,eb91c8ef2677fdc20583be45eb54d07c84181c898fa3479e8f2af52959e90f62,2024-07-29T14:12:08.783000 +CVE-2024-37381,0,1,9fe6fde53d8260503255e878e5a3cad14d0e0ad42f178326952eb9a7c509519f,2024-08-01T13:53:31.757000 CVE-2024-37383,0,0,3a9597c771ab199850aaeee94068cbc0182ff2bfcefd23d631ce0d7808f3745f,2024-07-03T02:04:16.250000 CVE-2024-37384,0,0,4ede7c4b4e1e1de259445d49ca3b43a6d0a75b7dcaf1ea245b8f6306c1e67bb9,2024-07-03T02:04:17.060000 -CVE-2024-37385,0,0,1af5dbf4fe496116fcfe8797458a2e9292fd2ddec99a563e5137c9d207fb12bc,2024-06-07T14:56:05.647000 -CVE-2024-37386,0,0,11096fb093cb31a975b6d4a2f60faa537dc9b7d88674a570ecbb06ffc3cba3f5,2024-07-24T16:15:06.970000 +CVE-2024-37385,0,1,5f654dacc6b54aa57eac57d975e30bca933785ac3cff88e1e1d552468bd97c34,2024-08-01T13:53:32.450000 +CVE-2024-37386,0,1,e26fe4180478658f5d7116e982a44893b27c0547f48ec9e4efebd50f599527d1,2024-08-01T13:53:36.410000 CVE-2024-37387,0,0,fe2e0e702592a3b950e5c7ffa6cd887e6a1ea8123fb6a269a45db83eafdcfbbc,2024-07-03T02:04:17.790000 CVE-2024-37388,0,0,3169d306b45a011b46c4d3fe95463302fc94255a3e5bff07d58cd00bed7bba75,2024-06-07T19:24:09.243000 CVE-2024-37389,0,0,27f7927000cd6a2429ab617761c45ffb27c2f3c3199f49f01b1eda02927e348e,2024-07-11T14:48:32.300000 @@ -254327,7 +254328,7 @@ CVE-2024-3739,0,0,ba8b07349fdcbf4927f1d53be7924c0ba58d0f09900d65fe34757229d7b34b CVE-2024-37391,0,0,e99f92be626b4b841a6b299b2728912f45fefbd409010bfee05135471d62af01,2024-07-31T18:33:47.383000 CVE-2024-37393,0,0,b93d796f3c4283b87dfd22c20f36a8116f582a381c44650f39c5ea43e6b806f2,2024-07-03T02:04:18.707000 CVE-2024-3740,0,0,cf4cd6bcfe639a4f771a19ddc36f820864da86f0d9d9f91c68694d8633fab251,2024-05-17T02:40:06.170000 -CVE-2024-37405,0,0,ff056e1e6b71205230bf39333b4a3618e5032f8631acafb990972570435f5468,2024-07-12T16:34:58.687000 +CVE-2024-37405,0,1,a7f42023569aa18cbb4863def372451bd6a310533c03fc36f82684a5a0e2908a,2024-08-01T13:53:37.273000 CVE-2024-37407,0,0,b2071e78ac73cfcd8ee3f67daccfb5fa834666925d4b4867e66acc10a01216e8,2024-07-17T20:16:52.400000 CVE-2024-37408,0,0,e00a5fd20a343f830165fada57edc3309bf676a65be9bc8c730b63052d77f6ec,2024-06-14T21:15:51.160000 CVE-2024-37409,0,0,82c50e49bf5ddfbe2b556ca4db6eaf6873d58da7b8ce0001c708890dc09405da,2024-07-24T02:51:28.287000 @@ -254396,7 +254397,7 @@ CVE-2024-37502,0,0,d47167ecc1dd174282378f6124abb3b4511994970b4449ae0fee9b8869d0d CVE-2024-37504,0,0,2a3faccc5709d6d76660e0c6665b85f6d694f97e133b19d81d3b770a0ec3dd08,2024-07-11T13:05:54.930000 CVE-2024-37507,0,0,4e09e288241de45505be5c9a204dc926ba463ec216fa96f5e2157f7702b5635d,2024-07-22T13:00:31.330000 CVE-2024-37509,0,0,dc88a6cc688b80a3d03a097d55abdc7d4cad7d3b7b2c546a1ea91a8173ea195a,2024-07-22T13:00:31.330000 -CVE-2024-3751,0,0,bf6b7a6b324c5665ab742f64d608fcb1d1c082126b8295162670eaae3251f2ee,2024-07-15T13:00:34.853000 +CVE-2024-3751,0,1,ba887ac321a2bfaf7155c820936f84a156f9ef9329c91d46297abdea58a2350b,2024-08-01T13:56:40.890000 CVE-2024-37512,0,0,b154a0241cfb0d8ca130eab910ec84648220c774892017c20117684126ece261,2024-07-22T13:00:31.330000 CVE-2024-37513,0,0,e811a8cbb83a50013ae492297e624e70f7b7970b13bdb777a08ac96df33bf424,2024-07-09T18:19:14.047000 CVE-2024-37514,0,0,dc98e25e8fd49b90b1755d1a17af64cf14cc9a477edf02d5fac5f9675efa01ce,2024-07-22T13:00:31.330000 @@ -254408,7 +254409,7 @@ CVE-2024-37521,0,0,e9aebf31c63791ab4f95255134c2db65267eec1085288684d0f21a4a1118f CVE-2024-37522,0,0,8d0ca9ac1272094da7900aa5aa9c5ded401dd6ca5f585f197834c48735f10240,2024-07-22T13:00:31.330000 CVE-2024-37523,0,0,13bb725e58e999cc176a750d097aad585b673654b57d0f90da08bbd8099664ec,2024-07-22T13:00:31.330000 CVE-2024-37528,0,0,9c6980ff0d1442c5b7fd4f5e3f8ba4ae579879f3db1ec83280b9bd21a4726381,2024-07-11T14:49:28.177000 -CVE-2024-3753,0,0,7ec7e7ddead92833cf7c33f0b6871feebee71d63726e8d778e9efc350bba07de,2024-07-15T13:00:34.853000 +CVE-2024-3753,0,1,84eff4df8db1a00368e62ddb5ee92a92d75f6c87384a685b642620e2007cf84f,2024-08-01T13:56:41.100000 CVE-2024-37532,0,0,aa877fbc00f03a99fc2b9d43fb935fba6551700aac862f95f49a54cca4d5d3d2,2024-06-20T16:07:50.417000 CVE-2024-37533,0,0,d82586c3abd351c16093df491355c34e8750e635410a84408441a8e9ff8b85a0,2024-07-25T12:36:39.947000 CVE-2024-37535,0,0,062f7ebb43bb6d2a8ccb3332e5242404947b076c7894d1777e030e1c8e622113,2024-07-03T02:04:19.710000 @@ -254446,15 +254447,15 @@ CVE-2024-37565,0,0,e464b9f5d1b6751d8f05b2f30904029569bd814d202d52a27f0ddb9877153 CVE-2024-37568,0,0,10bb742dc66b6b359832e76ba7fcecda00069e1d77b4246d2c5e39d11e77602c,2024-07-25T18:15:03.717000 CVE-2024-37569,0,0,d72ceb83b037eeec35f3e81abfdf503a49618e4aba004fb3f45e6970df347f2e,2024-07-03T02:04:20.517000 CVE-2024-3757,0,0,d3e75f8205a45aeb6c1cb5b9efd4d99998e027f23a100dabf40ce218744ea3e8,2024-05-07T13:39:32.710000 -CVE-2024-37570,0,0,39b1ce5225b0c2648395ac0b0dcc8171e61381f07478d1bc7ddc88ce47507024,2024-06-12T16:32:34.513000 +CVE-2024-37570,0,1,c193fee7dc1a9f16da69c8e0950cd823d6e1aa62ce8d8888b2d1531f1f227667,2024-08-01T13:53:45.687000 CVE-2024-37571,0,0,67e7b2412f8af956bea28aab4c57aae5f7e196be8f9b19162aa5c75b5cf90c89,2024-06-27T12:47:19.847000 CVE-2024-3758,0,0,9133e9ab6c91a5523f7a6c3075b39d739f115990ca9d090ea03db032b6c7f7e8,2024-05-07T13:39:32.710000 CVE-2024-3759,0,0,228c14dd97b4dcf6507c1901dec59f930e3b9b578ef9455bb0b7881e5199f2f8,2024-05-07T13:39:32.710000 CVE-2024-3761,0,0,bcb7ea1ac08a49551e80d8143adffef9f2599014e2b4d32b190639643f083116,2024-05-20T13:00:04.957000 -CVE-2024-37619,0,0,712185e7c0aec6b11e4dfb6e22ab60eb74d749169360a03418f06679991aeed0,2024-07-18T20:58:38.730000 +CVE-2024-37619,0,1,09797faff2df8b72db2a2f262ebdfd130817b6ee60286e6aa7311eb834d19b77,2024-08-01T13:54:07.797000 CVE-2024-3762,0,0,40d3f55de3ecbf79b02b0c0e4b35c8d9284b268357e297bc7035406e1948919a,2024-05-17T02:40:06.647000 CVE-2024-37620,0,0,ebe226737997b7888b817551438c1e37a2c38e7acb5d8d30d877d05c52f4a505,2024-06-20T12:44:22.977000 -CVE-2024-37621,0,0,37abfe596be66e67499e9ef1bbe6334faed403178b97f6321d109b48d572b232,2024-06-20T12:44:22.977000 +CVE-2024-37621,0,1,9e4834b0a2259fe7beed8d6218339ef0ddeb82537e0bc99d7623e8e4a86ce3ca,2024-08-01T13:54:08.677000 CVE-2024-37622,0,0,72464291a01f93964414bd967586f0dc8e108583f1668f09fd2b19a23b93be4b,2024-07-03T02:04:21.550000 CVE-2024-37623,0,0,b515ba49cdad646a6e4424a0af8caad03b3eeb5dcc7461835b4fa847ff81d1a5,2024-07-03T02:04:22.347000 CVE-2024-37624,0,0,c8b41555fa1b5545381823af8d22868fb77fdcda0648f938a956fe7589aa93b7,2024-07-18T20:58:16.307000 @@ -254464,7 +254465,7 @@ CVE-2024-37629,0,0,c452ca69266bafb149b8a8c25dc755c132605c57e188dcb250482aa14f3f8 CVE-2024-3763,0,0,cd55c084ec54d3c0946f7ee5493c1963824aa0176b48aa87ed4ff8f27854003d,2024-06-05T20:15:13.530000 CVE-2024-37630,0,0,dee490b16555575e984fef6b53d7765fc875bc84b7dc261110f314722879b3fc,2024-06-13T18:35:19.777000 CVE-2024-37631,0,0,a5cd8ddcd7ce699acdac9f3f2fda8f6d11cc509e6dadfd80153c488cb1c74926,2024-07-03T02:04:24.127000 -CVE-2024-37632,0,0,4c918fae9ed9bc7d0372810c0c4c0408aef9fcf41acb543dc5687b28ebc6db0c,2024-06-17T12:43:31.090000 +CVE-2024-37632,0,1,9cdd55cb05ea6a8853a3da90df6c3ae48b6998b3a3519250ef0cbdaa308a2bd7,2024-08-01T13:54:09.520000 CVE-2024-37633,0,0,99956c5373735a5feafab5f8f91db462df7c04d480ce88e052b279d716c258f7,2024-07-03T02:04:24.930000 CVE-2024-37634,0,0,6e16f0f95dfcf255097e7dd652ce7848499c89be47e371aaa754251b1b9e9021,2024-07-03T02:04:25.770000 CVE-2024-37635,0,0,8375ffdc8fa2b93bd8f9cd95b8fde7329093cc9bcd706b96b08a7f0ce706831b,2024-06-17T12:43:31.090000 @@ -254482,8 +254483,8 @@ CVE-2024-37654,0,0,7407bd364d22c8dcd819097303b9dde5a80019ad44dcc6e140b90521c8753 CVE-2024-3766,0,0,0b2c4eb9631c7021b81225c2fb00e637faa5f43f79bca7f1f91ab6ad96dfad12,2024-06-20T16:15:14.380000 CVE-2024-37661,0,0,6db168d2f3ae431d826f69a05b16f3210dc133b79cd809abcdc976904db6eec2,2024-07-03T02:04:33.177000 CVE-2024-37662,0,0,7dbe5204bea9a6226b41d95fb9d74c698dc7ef944309e7a195004aa36b8d6041,2024-06-20T12:44:22.977000 -CVE-2024-37663,0,0,efc6a5040d4747fdbbecc95d9221ab8b4e7eef93aced1d5213adaf19f7131192,2024-06-20T12:44:22.977000 -CVE-2024-37664,0,0,06e31e5099b8818537474d299b09751af47b5a9fbeb1b9193fe368853033ac8b,2024-06-20T12:44:22.977000 +CVE-2024-37663,0,1,01b3999a296dc990f7de7601c48f66af39da90c049c2b0eec4443d6e5080ce32,2024-08-01T13:54:09.780000 +CVE-2024-37664,0,1,262d89efd9586f8d9685582ca4f4936d4d0dff4dc96c611162b38556aa6e87b4,2024-08-01T13:54:10.727000 CVE-2024-37665,0,0,34b31d50498a9270be52029967105ad27951b8a417772ac97499ac6ded830671,2024-06-13T18:36:09.010000 CVE-2024-3767,0,0,08d0f73c70b60c9cc34c72fa6999a3dafb3f22e13fea95b60c4494502c1111a5,2024-06-05T20:15:13.643000 CVE-2024-37671,0,0,c934aded8f9e7bb093bc4da68f3a137f8fa901c17bffce2acdd8e11067ab06ca,2024-06-24T19:40:48.993000 @@ -254491,20 +254492,20 @@ CVE-2024-37672,0,0,d5eb81d1e21bc7cef637f401e4be37019646f03f037f89409f28522c97a44 CVE-2024-37673,0,0,2c7bc32512258fae221e5aab88f709b80ebb331af0ece52f2cbe4428a42038ed,2024-07-03T02:04:34.020000 CVE-2024-37674,0,0,995a0f9ec101b814b742bfc971f0346488f53226a84592555889cc608dd7d2f3,2024-07-03T02:04:34.857000 CVE-2024-37675,0,0,66417554e507c5f0d802e7ef805656396ce42264cbabf575200c1aab7670dbfb,2024-06-24T19:41:31.713000 -CVE-2024-37676,0,0,6ad8fad417258eaeed295e3f1a6b5e0c3c6a74f03ac9d56176a4f958490ee584,2024-06-21T11:22:01.687000 +CVE-2024-37676,0,1,b1bb9af4ccad794d647b41af04c70e8010069af42b04afcc9543573c4ee9b0ab,2024-08-01T13:54:11.730000 CVE-2024-37677,0,0,5a3d710b80c82f02ba319a70df287c39fb486869f56126fd4a5509c1adbddf16,2024-07-03T02:04:35.833000 CVE-2024-37678,0,0,b53cf5e5c141313af786935fd493df7a78799a2dc77ec1659050d0d5bd21f5f1,2024-07-03T02:04:36.657000 CVE-2024-37679,0,0,89d4b481b4eeda09e3de57b5ce5fac803deedba18cfe07a1aafdd3872dcfad15,2024-07-03T02:04:37.457000 CVE-2024-3768,0,0,d5ff2a05d14354be14cd5fd5e8a000f35406d8c28f3d36a50929ee183340c26f,2024-07-28T08:15:01.760000 CVE-2024-37680,0,0,251f8a25b0a9450d71379f12a2d545c394553c2edc47dd2498070a81216f31b0,2024-07-03T02:04:38.277000 -CVE-2024-37681,0,0,50c17c13eb6020a45cca0ec4c8bbeb71579ac7d2bcb6d4f24737f1abc179ccb9,2024-06-25T12:24:17.873000 +CVE-2024-37681,0,1,17ba691f541edc675bc06a1db2f8f5584e1a384a785a7cca7e30898a2120bb17,2024-08-01T13:54:12.510000 CVE-2024-3769,0,0,2784cad665d7ef60d8d7cccd7ae3d6fd92b2c63c26e72dea02fd9f98262ae0e9,2024-05-17T02:40:07.297000 CVE-2024-37694,0,0,89e02bd2a8359a540751416780ecdbd616d178c6fb0200e85f94f7a2f51e6f89,2024-06-27T20:15:21.913000 -CVE-2024-37699,0,0,cd09b58bd8a0540e980fd3583778e3c32b2189c6cf8080bbfa62df6a46db1cdb,2024-06-21T11:22:01.687000 +CVE-2024-37699,0,1,232b9ac66bba5208298287f99a4e38de0dde1903371c46f286430afec82df0db,2024-08-01T13:54:13.280000 CVE-2024-3770,0,0,fa4beea78617deed554c70cf304b7e2f927660a5dd6add7de1e76f7fc1d644db,2024-05-17T02:40:07.387000 CVE-2024-3771,0,0,1646ed765465efbfe9b2c4ddd2884445b41a894fc37412177344b47d5bf8f677,2024-05-17T02:40:07.477000 CVE-2024-3772,0,0,e9317cbebb79e9be22e844c8c1723d1676d09eadc1e2aeffc34a2fcfe946260f,2024-04-26T02:15:06.983000 -CVE-2024-37726,0,0,9961a78f7a73a4a80fa9a9fd6b7951ab412ccbc1b60f3ff267be7199fc0241e9,2024-07-05T12:55:51.367000 +CVE-2024-37726,0,1,a5107b068d66c3570343545c901feb79b0c7fc6600c054d9141acb4f14ca7b1a,2024-08-01T13:54:14.057000 CVE-2024-37732,0,0,8bcaa977ac18e5833de4fd0520da90883ea1f9cf5405317587bb381c54de852f,2024-07-03T02:04:38.513000 CVE-2024-37734,0,0,0e5d8052c40ece19eb47666a762eea5411abf63f936921b36baec3d43e53baa8,2024-07-03T02:04:39.343000 CVE-2024-3774,0,0,593479bdd908b3498d235d74677575dd1f3896886cab276c51a981ed2e66af92,2024-04-15T13:15:31.997000 @@ -254516,10 +254517,10 @@ CVE-2024-3776,0,0,5922bebf01d008693e127ff3a5039fdad8dc9d22a230cf3268767563dfe95a CVE-2024-37762,0,0,cd5f303513eb0960063d0e2c99c901a56ff1296cae29c33693c5d7fa45ee86e8,2024-07-09T16:22:43.123000 CVE-2024-37763,0,0,75542f98a1a2f20544c469cfb3e348386a1de1558c9804033733b99d26509708,2024-07-02T12:09:16.907000 CVE-2024-37764,0,0,bfe8048822739aebe754250a3774cdfd451761171493fc8c02a0e45a49f5a4e6,2024-07-03T02:04:42.317000 -CVE-2024-37765,0,0,f31f1f7818ee7f8090baf8e373c09fbd5bca9e31a6ae9c032a065c1fa2b18c1b,2024-07-02T12:09:16.907000 +CVE-2024-37765,0,1,746df602d2e258f449976f05b63742f035e40ff54b364ebcd32658a0b67b7135,2024-08-01T13:54:14.823000 CVE-2024-37767,0,0,7877c2515670214a904346d470123e251242a9f2784362e3de48ee06ec75e5c5,2024-07-08T15:49:22.437000 CVE-2024-37768,0,0,870c2e3ce3bd390df1e2f6d00c0b12856feb7e2e88c5200a479a671bc34243b0,2024-07-08T16:41:23.650000 -CVE-2024-37769,0,0,0dd3289504de1965084308bd25d0eda77c1cd774bf0e49f4dc5febf221f8f325,2024-07-08T16:37:28.323000 +CVE-2024-37769,0,1,5d562468fe4e62bf5aa053de70325d9517e92227326a41659856d8da2dd29323,2024-08-01T13:54:15.670000 CVE-2024-3777,0,0,0856ef763b1edbec0747809f2f5f1e269fdce9f6160541c599d8c16e527540d3,2024-04-15T13:15:31.997000 CVE-2024-37770,0,0,4e93402ad3ed64140e35d7a96007b07c29c5c8b6e92be0f25f51076d1a6ceeef,2024-07-11T15:05:53.090000 CVE-2024-3778,0,0,2b5fc9c77ae2f993ef971da35cf3870af6c405ab91c786afef1cf6cf11c368d8,2024-04-15T13:15:31.997000 @@ -254528,14 +254529,14 @@ CVE-2024-37790,0,0,f03d38fcd39f9fc913c999134089e43d5d97a0d5c9124acb1959f0950b818 CVE-2024-37791,0,0,5b4a77640e01b5f5901f77da4cf3e217016c11878e7475119bb550241e2deb0e,2024-06-20T12:44:01.637000 CVE-2024-37794,0,0,0173114c4850547998c4a3719d0197d2f797f34c9e250dbc5cfe23ea2cc8953b,2024-07-03T02:04:43.130000 CVE-2024-37795,0,0,48c1e40188ca43abeb8c259db9a0e5c208932bb0487d0ab98eaa7cd6c293d43c,2024-07-03T02:04:43.927000 -CVE-2024-37798,0,0,bc04f57588d0fb28785b030c799331a26805968021d11fbacde42d13b680368a,2024-06-20T12:44:22.977000 +CVE-2024-37798,0,1,f531421bc986b0686574a67d9b16c2ac31eecb8628ac00c5c2b83f1d099424a8,2024-08-01T13:54:16.443000 CVE-2024-37799,0,0,7daf228a97dd80358d70cc4a662e5369bebd266eafdf0efd1951071a509a7505,2024-07-03T02:04:44.730000 CVE-2024-3780,0,0,83484fb5b744efc24cdea9908844170c52624d067b8e01e5b8f34f841ba67ba1,2024-04-15T13:15:31.997000 CVE-2024-37800,0,0,3aebd2faaeb84484cc68215ff2c27d755488c237f64ba208bea923e908662dd8,2024-07-05T14:11:13.163000 CVE-2024-37802,0,0,d144fe0e12cc92285cf5a45a291aa1263aaf8f5127240eb000b3aa69fb216783,2024-07-19T14:52:41.287000 CVE-2024-37803,0,0,e775e15ae57e6d87a1c3eae9b2633b6fb5e2150047d8db37ba8a0df6bf917fcb,2024-07-15T16:46:21.273000 CVE-2024-3781,0,0,0166ef6fe2c7d229a771ed8a3459c0974e3bc1428bfcd1abf209c8c2e778a8e5,2024-04-15T19:12:25.887000 -CVE-2024-37818,0,0,5cb7934ffaf0f9273124a6e156c7f80c8bbf67e7edc77dc4c583d4fc2d7c2bcb,2024-06-21T11:22:01.687000 +CVE-2024-37818,0,1,4a638303f5514155400a4d902e53b86bf8010e31518d1eabf343cc26f0b97343,2024-08-01T13:54:17.330000 CVE-2024-3782,0,0,b45b8920e0157c6199f5ffbbbc446d8fb5e1a40daf0ca4b703a9dc70f6839c9b,2024-04-15T19:12:25.887000 CVE-2024-37820,0,0,fa0bbe561377b7b439a8d7f261288bdc816d9d647e91a5782129fd4223c1afcd,2024-07-15T22:15:02.850000 CVE-2024-37821,0,0,dad227ff1e39e1e08a617033ca30de21cc87f5062f829537e300bad0e33ab0a8,2024-07-03T02:04:48.313000 @@ -254543,31 +254544,31 @@ CVE-2024-37825,0,0,a074512a3706a5e0b66f32acac0d9da7bd1ebc518866e75f394400d27da10 CVE-2024-37828,0,0,653e42606d609f163a3b5d705ea81e99ecfb2b567f39d5f12626fb6af9b936ba,2024-06-20T12:44:22.977000 CVE-2024-37829,0,0,1e83f5827db2aebd4e043417419d588d621c3e555f2d66c999e782ce41670452,2024-07-11T15:05:54.680000 CVE-2024-3783,0,0,a6e56ec812c297facd52c1a6c05ed03a057924506051c9c8d60002ff023e1b00,2024-04-15T19:12:25.887000 -CVE-2024-37830,0,0,426272c75f87f80b97615270a7fa16d106a4ae5d773a51c55e9541bb36d99023,2024-07-11T13:06:13.187000 -CVE-2024-37831,0,0,dd81b6f858235d5d174850c3a09cd3119f2c9ef6775cb735f933a9db7d0b2fca,2024-06-17T12:42:04.623000 +CVE-2024-37830,0,1,3588f75d47d86ee804225cf775bcc0955390d4f6fa911d0a51e1c0854c4106e2,2024-08-01T13:54:18.747000 +CVE-2024-37831,0,1,d19abc6881904e87bdc2949e69bc6ef71812cc9d928a2ecc3420773301a4f28b,2024-08-01T13:54:20.343000 CVE-2024-3784,0,0,f0c80c77a0788aa17bf80578f54749ae490fe23c5161f7f9c165d9871caa60a2,2024-04-15T19:12:25.887000 CVE-2024-37840,0,0,1ea05f0cae39cea91919dabf259bc43d4d53a339aa6352e9633c1155c24e02e9,2024-07-03T02:04:49.190000 -CVE-2024-37843,0,0,50fea0e4f3bac899fad47ec99906b1fa57df0775a56839eb833074fee5a84870,2024-07-19T18:37:07.720000 +CVE-2024-37843,0,1,b2b97625cfd8538b070daf88e20efea752488fb698343ba1b69e8a5a31a226a9,2024-08-01T13:54:21.843000 CVE-2024-37848,0,0,b9654691620e5501baad2d1771338ac2aedaf89f42fcedfa6b269a2de242ad76,2024-07-03T02:04:49.977000 CVE-2024-37849,0,0,9b696b08134cd774805917aaa2c22ec2c2a13e405bf5a2fb774d0e2c85bbf1d1,2024-06-13T18:35:19.777000 CVE-2024-3785,0,0,e84209989b24c941d7c6f3eae4d5a1283a6975747744d670fcd7c761c7276a68,2024-04-15T19:12:25.887000 CVE-2024-37855,0,0,f1f3ecfbab7ca802e055151d5420d5f7ca02cdfc7b7912208150b9a33ddd284c,2024-07-03T02:04:50.817000 CVE-2024-37856,0,0,3b2c5fbeccee511c1f982fae5c819d203e5df06806ae143d685413cbae07336d,2024-07-30T13:33:30.653000 -CVE-2024-37857,0,0,d0412d9aecca2896dc6f4256110a9e0a753486c5040853ad365ad15b4ef175ae,2024-07-30T13:33:30.653000 -CVE-2024-37858,0,0,b1eae8059ae9b7e4a20f668729097f05dd355dbd74c75bf5c5bd3d4b7203b2c1,2024-07-30T13:33:30.653000 -CVE-2024-37859,0,0,b53f306701d76d1c5715496bd8ecb2066441597b78d073ac3499046a63ef0ecd,2024-07-30T13:33:30.653000 +CVE-2024-37857,0,1,bbbf66c5ae4e5b03452facf52d12302119ab17f8211a271346d66e2be4704782,2024-08-01T13:54:22.703000 +CVE-2024-37858,0,1,145fe3af0cfa4378739729061c766f5fc42f47de0fdaa3c5429a9c029f707705,2024-08-01T13:54:23.510000 +CVE-2024-37859,0,1,f5d379e1ba1283dae4ab2dc1c57e5283f78e28f480e0128f7f21d0c8376c4bed,2024-08-01T13:54:24.283000 CVE-2024-3786,0,0,4e788c6650291fce6792bebd52bbfbd08750707e2d49b3b096feb2a70af98d9a,2024-04-15T19:12:25.887000 CVE-2024-37865,0,0,ebc8795890657e10863cf75a6464596be49477df19341ffc856d243a554ff984,2024-07-11T13:05:54.930000 CVE-2024-3787,0,0,16d897c29df45bf9f73a4bd002bc7eea0d72ab3b3dbb59ad223b0df4efe6ffe0,2024-05-14T16:11:39.510000 CVE-2024-37870,0,0,772a013d8759c44c7162d64aad2242e25e051eef92d0bd7d864cf0f711026841,2024-07-12T16:11:43.197000 CVE-2024-37871,0,0,6e47b0e50b0d49ee0ab3ce3931de2ff879ddb6bce80a9c8a17ef14f992b7b317,2024-07-11T15:05:55.507000 CVE-2024-37872,0,0,55b4403e334cb9996013bbf0a392a1a97f30dd72376b633dd5dca32256bf5ac9,2024-07-12T16:11:44.030000 -CVE-2024-37873,0,0,55d4998aa453b15b9f1f9084f8c693113fcb670dbe4b4a10f682ad8eb96cb8e0,2024-07-11T13:06:13.187000 -CVE-2024-37877,0,0,98d87856290ef25573ad2760a197255731eca0e52a46652b56e8c7a7e059ade2,2024-06-13T18:35:19.777000 +CVE-2024-37873,0,1,f3ebf4fd85401376558f842761d10c82616342383d4c85c4252b2826f0fc6658,2024-08-01T13:54:25.740000 +CVE-2024-37877,0,1,aef35370bb5ae23c2e0f62768f7f45b5e27572d5a86524e1cc57e3046ffb0441,2024-08-01T13:54:27.070000 CVE-2024-37878,0,0,fa121d6a32fa8cd93ec07420dccbfe683ad3a2717d3c26dc1f429f81b82f82de,2024-07-25T20:16:31.443000 CVE-2024-3788,0,0,6b959b24977bfe93124701dc390076a86010e99d87dbe3186e4044d17a0dbe72,2024-05-14T16:11:39.510000 -CVE-2024-37880,0,0,82eff4be44645b4491042424f1f050de41161f24ce7895f2d65362440f2e1175,2024-06-12T16:30:15.053000 -CVE-2024-37881,0,0,fafe084cbebf486f837ec15aad94ff51628af0624cdbbaa015b3cc71821530aa,2024-06-20T12:44:01.637000 +CVE-2024-37880,0,1,e6a073a13f4d5d80acb782a97b27605fba3820cc74e70d67b997f08c66f11a31,2024-08-01T13:54:27.953000 +CVE-2024-37881,0,1,e093bcdbd16679bd51273f21b0d2d0887a3da8aeb5e0bdca0911ec7d57d9cff9,2024-08-01T13:54:28.750000 CVE-2024-37882,0,0,1684452fe9676caabbe7e5f6ee8e47e99d5ba41bf75f3c683dc771f8ab16d9ee,2024-07-19T14:57:28.583000 CVE-2024-37883,0,0,c77acb00c6918b88f907a34f95c6331dd8026d26d9df45c23ee0d7fedcbaf4bb,2024-06-17T12:42:04.623000 CVE-2024-37884,0,0,952c4e8fbd193a9545d9e09eebd8595200777ddf3410e4c7d9e4c780747d8c23,2024-06-17T12:42:04.623000 @@ -254584,11 +254585,11 @@ CVE-2024-37894,0,0,5c3e1c011e44e5c8bcf6a6398118ad2efcba003a19994815d77c769e906a4 CVE-2024-37895,0,0,83fc999b914f31ef5377ea2f4739df1f86727e09c7234e6711ade849e83102e2,2024-06-20T12:44:22.977000 CVE-2024-37896,0,0,accc5cd71320f643f30fd3c58fb4ef952e3edd98e66520b2d1ebf95954392e5e,2024-06-20T12:44:22.977000 CVE-2024-37897,0,0,eb358c8b4bf1d804a542a3de3cc644f3b57f51c972b900353c845858b20c9acf,2024-06-21T11:22:01.687000 -CVE-2024-37898,0,0,df8ee1bb6b8f38bec566205021b717cd3931cf46a7ea3164f933443691ac1951,2024-07-31T16:15:03.197000 +CVE-2024-37898,0,1,3bf7972c6c5905e3708d949db6ee55205fe3e83314a6851a4409b540ce1d6a24,2024-08-01T12:42:36.933000 CVE-2024-37899,0,0,b15b2f0659684c15abe8d3b9fc90e954532acfe6178361a33640834566aa7b12,2024-06-21T11:22:01.687000 CVE-2024-3790,0,0,54ff85acf33b27347b60794a0d91a04db9e5fdd7b0bb2899aaf68ff18e5328b6,2024-05-14T16:11:39.510000 -CVE-2024-37900,0,0,f5ca223df015165b0c48c89fd3f42aae78fe8d6e486be5ea6df8ba7e27436f71,2024-07-31T16:15:03.440000 -CVE-2024-37901,0,0,f816d9d41260a0e179f7f8535b53a1453a926dc3bdd6077d085153bc07aa1662,2024-07-31T16:15:03.683000 +CVE-2024-37900,0,1,283789c53d01177f20c7cf47238b58f48ab52032b4b95feff516d4ee659a9408,2024-08-01T12:42:36.933000 +CVE-2024-37901,0,1,dadae80e8a5111becdce370bbf6e7361531d0812b3f29f2d7616ee7026fa24a0,2024-08-01T12:42:36.933000 CVE-2024-37902,0,0,914ec46cc1273d7c21c7b2dab73f39d6c3f01e86944529e46279ac98efc57a11,2024-06-20T12:44:22.977000 CVE-2024-37903,0,0,886576036d4d085b682af52548aacb4c341112369e14bf61e8ca80c2c202d58c,2024-07-08T15:49:22.437000 CVE-2024-37904,0,0,4a1838bfa872e93babcec91edc2a58b1f777ff60512a3a43aa04f02c821270dc,2024-06-20T12:44:01.637000 @@ -254627,7 +254628,7 @@ CVE-2024-37952,0,0,a42ae02cde7acc2c17b18980a336bd673da5e081c077858b2219f5525fc6f CVE-2024-37953,0,0,4eb5938cacccd7a29bd6421c7b9d4f160d359c8ce01d9b3d6865ffcc482f476e,2024-07-22T13:00:31.330000 CVE-2024-37954,0,0,5da244531959717aea2bcb37c065da0b6b4234d99344e5c53987029f66f4ac92,2024-07-22T13:00:31.330000 CVE-2024-37955,0,0,0546cd1263e2bde71eb6a609e1ed7b710b22deaf856a78cfe13cb35decc79042,2024-07-22T13:00:31.330000 -CVE-2024-37956,0,0,c03cad7e2080649754f56d40293dbbcef63ac8b982952b2b11dfdc29abd23586,2024-07-22T13:00:31.330000 +CVE-2024-37956,0,1,5f66e06fced66697c8dd42dc6ba4042113614ce499cc127002b050863d307618,2024-08-01T13:15:10.750000 CVE-2024-37957,0,0,675b217ad56affa2884e85d3b0deb25785c89c650a678cff87048993c692151e,2024-07-22T13:00:31.330000 CVE-2024-37958,0,0,bc287f5f20457f05c8d3137e84685755cf9e9acda7ed8c8b8e1d2674983eb6e8,2024-07-22T13:00:31.330000 CVE-2024-37959,0,0,0a89e2045c7690120907a9b888ad211603cf619468902002241d7d50995a3d3b,2024-07-22T13:00:31.330000 @@ -254747,12 +254748,12 @@ CVE-2024-3813,0,0,2622a1bc43fa56818d71b362915d1c16dfb3278e28384a7b177fdc2e44c5bd CVE-2024-3814,0,0,4b11a7d4126e6e627365a6c09d49c5b79c42112fff3bef28a2dbbe621feb8e3e,2024-07-26T13:36:51.523000 CVE-2024-3815,0,0,55e2d42c0e61accee69ffa342efcde0fddef3a4ea430c0440620925be3cd147a,2024-07-26T13:36:59.737000 CVE-2024-38156,0,0,b24436c85d01ced9aa10bffdcc3048064061e2106e9f06caaac14532dc6e9f6d,2024-07-19T13:01:44.567000 -CVE-2024-3816,0,0,ca9c8b3746ea2ebbbc383e9aa135dd99550dbafdbe5ff9c69dbe15b33a0feabf,2024-07-03T14:37:07.750000 +CVE-2024-3816,0,1,75ffa648a8fdfd5e75d27a5c1f7d2535fe4ef8b6da1bbd82db22ae48c443785a,2024-08-01T13:56:42.403000 CVE-2024-38164,0,0,dbbf6a7a3aa497240e03a96db137088266505739eccc385d88cf5929688ebf43,2024-07-31T23:15:13.353000 CVE-2024-3817,0,0,4cefb34eb15d4ef81a2470a00ac0f43601ef6263c0fd4425e7542c27d02dfa54,2024-04-18T13:04:28.900000 CVE-2024-38176,0,0,c7ddf7d66b3b168ce1d4e9a4b5793de22db23f0bea8ed4891a425bf92139e6ab,2024-07-31T23:15:13.460000 CVE-2024-3818,0,0,b4c982a18364880791124fa7ba25840b7eb37a53aa1551fa23324d948b6ddd3f,2024-04-19T13:10:25.637000 -CVE-2024-38182,0,0,f94c850452ac835f3d908202db3dd12a2af4c9b2a482af3a029a90d4f705e531,2024-07-31T23:15:13.560000 +CVE-2024-38182,0,1,12ef1cac03871a298c944f060efe76f0020de2ef9d842a34b40ca517fed5a570,2024-08-01T12:42:36.933000 CVE-2024-3819,0,0,c25bdc543ba06fd05ac51b0b8912467c3fc6d8848be54d697bfdb5995b1a7e51,2024-05-02T18:00:37.360000 CVE-2024-3820,0,0,8985e7d1e7aecc5fe081b43705d723ec0ca067093ca4a65f30dd280cab84082f,2024-06-03T14:46:24.250000 CVE-2024-3821,0,0,3ffbadbdaf34f564e9c498f1baa8fe758531e73989a1bbb861692bcbfdfc262c,2024-06-03T14:46:24.250000 @@ -254777,13 +254778,13 @@ CVE-2024-38282,0,0,0b84325e8423ee1d927b510486c46be47f1c2c84d1f4cca17c487d6f5ea39 CVE-2024-38283,0,0,797ece42e985c33b58c5d43ea734dda88927de464a1a03ca93cecae13e751b09,2024-06-13T18:35:19.777000 CVE-2024-38284,0,0,165d8c293dff7206e2957622c811a8e8219577c81f47e9f75916b28f253c3103,2024-06-13T18:35:19.777000 CVE-2024-38285,0,0,7e28442ebee8b34d71e5708e3d778f155bb5ea07375678fa14265f29cc1dda8d,2024-06-13T18:35:19.777000 -CVE-2024-38287,0,0,7ca9b82510a09fe673ffee74586e5df907ae888ca0be3d64fce5de2a1d7237ff,2024-07-26T12:38:41.683000 -CVE-2024-38288,0,0,fb4b6914d9d14e934b4500a698e6b8e3f31ca4a1a4d4422dbfa08da9f42f1fc3,2024-07-26T12:38:41.683000 -CVE-2024-38289,0,0,a9597f360818da144d20d09e5ddcf59b2c0b3e9dd7a631adf487e80b537f7003,2024-07-26T12:38:41.683000 +CVE-2024-38287,0,1,c56d0a2660a4f3a372d8da5a7a25d3c46cb5eb317c2a4033c255e73569f18e06,2024-08-01T13:54:42.590000 +CVE-2024-38288,0,1,982567e1c84f4c01aac8434951f1b851805f778df50653f79162e1cc6bd277bf,2024-08-01T13:54:43.867000 +CVE-2024-38289,0,1,e381f6582cf8fddc83d915cf084693fc8af0f6afc363eb70f132035f326565d3,2024-08-01T13:54:45.130000 CVE-2024-3829,0,0,bf09bfac220b5e30500c1e820d1b81945c22904d8e9c5dfde5faaff94c981597,2024-06-03T14:46:24.250000 -CVE-2024-38293,0,0,db540509e2b09b1cf976c07d02eb5180e9ce221e532de6476381169b8943dd64,2024-07-03T02:04:54.487000 -CVE-2024-38294,0,0,c9098aa0e6263f11d114c8fded8ede417686e8e362ea3fddf4fe8a666f871bbb,2024-06-13T18:36:09.010000 -CVE-2024-38295,0,0,8e76310253501edc4bd54ad38452a363d1a6d7979ae42afd8929ecbb333b241e,2024-06-13T18:36:09.010000 +CVE-2024-38293,0,1,2af5660de21ea537f089380c69d608dd10ea2321053bca42c4352602d7ee9678,2024-08-01T13:54:46.393000 +CVE-2024-38294,0,1,463179bf792a6ea1bcc112432b1ed3cf3b0808a7498f4b38b228bafab6d85bf5,2024-08-01T13:54:47.250000 +CVE-2024-38295,0,1,c1d3d2b86c350b167c4041527f3fe35a08d804a21414565e744bbdd15d26c86b,2024-08-01T13:54:47.520000 CVE-2024-38301,0,0,334450ca56bd1074e744d5e2e9a9bf04f668e867ead0d50886a3b74cbc9c3832,2024-07-11T13:05:54.930000 CVE-2024-38302,0,0,e77ca3bd1f42a6aa7992c70d7c2a8c98c0238a3f11a590553b92597fb717d1f6,2024-07-19T13:01:44.567000 CVE-2024-38306,0,0,302c251894cd8175c95dcaa248535d0e8a6962400e46ca01099390440f888d26,2024-06-25T18:50:42.040000 @@ -254794,13 +254795,13 @@ CVE-2024-38319,0,0,baca4c6dd463198ff6e83e4d1d026e029418f6c2a504c13c76e1be823b804 CVE-2024-3832,0,0,6ecd5aa860c46e319de2a6d27c0fc04ebd364294784d8c73db3364d5164d8af5,2024-04-23T18:15:15.187000 CVE-2024-38322,0,0,2ad94da74065acba3b226c62072e2f5047b092e831ca2ac4223b96f7198e87ca,2024-07-01T12:37:24.220000 CVE-2024-38329,0,0,b0234e445aee01f1f4832150293c45b7a3d7f14a4f32c7a982dc11ddc317f599,2024-06-20T12:44:01.637000 -CVE-2024-3833,0,0,c138e410fe87fc38ffb4ec1fc06ba4c62fba8d7079621e43ab97d82228df9713,2024-05-03T03:16:28.940000 +CVE-2024-3833,0,1,d8bd7ba32ab0c5df93ed1bc71c84eca78bd804cb628236293c000739d365ad50,2024-08-01T13:56:42.740000 CVE-2024-38330,0,0,33b4b1d171beda816ad627337fb5495a328e7dcd46af2bf62178f6a78527c9e7,2024-07-11T14:53:16.417000 CVE-2024-3834,0,0,a26b5bbbf7ca8a185b9797b4c7859f6535301f1ab4b8908e1c720ae8be2c469e,2024-07-03T02:06:36.447000 CVE-2024-38344,0,0,9ab5a9367a4478293ac2379112f78ca200a2cb316c550e5b0a6b06a397872c02,2024-07-05T12:55:51.367000 CVE-2024-38345,0,0,52f2293d17b88d6e356144e0e15c86a25194f7d79ea68829ed7fb7a553e8b4d2,2024-07-09T16:22:44.523000 CVE-2024-38346,0,0,689d401df5aa75c70def7483ddda9de7aa5563e129adce9d2b51b58b0f05d227,2024-07-08T15:48:17.710000 -CVE-2024-38347,0,0,5765bd81529938cb4f4fd2014b4f526c5c45b5ac2280b7f219f3c1913944d905,2024-07-11T02:51:11.043000 +CVE-2024-38347,0,1,0d1068ef932ec6d98ae8718125de6f9e1999f5db75d75126f90312b4a6428d62,2024-08-01T13:54:48 CVE-2024-38348,0,0,d76ac40595953765ae6aa7072c9f7b614003a66a456cd40d15acbc09f7e58829,2024-07-11T02:50:33.110000 CVE-2024-38351,0,0,aaba7fc1ee76a182696aae0d74ae2a9df7cc50ae99868ceebc0a7900d3128075,2024-06-20T12:44:01.637000 CVE-2024-38352,0,0,7f53bae2899f27af7757d718c996f6001cd5095044ca01f36a87e887235b42f5,2024-06-19T18:15:11.507000 @@ -254858,13 +254859,13 @@ CVE-2024-38440,0,0,6eeed0e96f15416f894572035c480d139cdee0086e466e03019ce412c35c7 CVE-2024-38441,0,0,a973f5143c6734e984ff9aea01be1b9a40b4154f243a146a34adc1cd56beda46,2024-07-03T02:05:01.423000 CVE-2024-38443,0,0,f13f48a0a21a67520512a3ec2ab6e073a68af4c8b774478a4c1ef20277a5f7ac,2024-07-03T02:05:02.417000 CVE-2024-38446,0,0,bcbc8806462503026d7b2e3469fa747e31484a5cd7b81cc43c13603d1dfcefc9,2024-07-18T12:28:43.707000 -CVE-2024-38447,0,0,66960d65b63deb207847c82c2a755519b242a7348d2503f6de84f2b53d9d0e93,2024-07-18T12:28:43.707000 +CVE-2024-38447,0,1,dc0c3b62165311852f5f4a13a21078e5dfd8bc2d9ee81f1ecc9e29b0cca300ce,2024-08-01T13:54:50.470000 CVE-2024-38448,0,0,ba1871b7e0fa187923744d63be4c60396badf8afd9c3275c2e47e89175ed02ba,2024-07-03T02:05:03.433000 CVE-2024-38449,0,0,8da6f80ac88bb7ae3e1140e6ee8382a2d6cd1d0a7f86d02f23b41c1048f2d2ac,2024-06-20T12:44:22.977000 CVE-2024-3845,0,0,a979e2b537f528e4ac50f6006d078d735fa62fe4b7376a25443b79e4c194cadd,2024-07-03T02:06:42.887000 CVE-2024-38453,0,0,08958525d96155b2873daad7721dd5cb57bde45d4e8e94a2b3e4a3f3b7e8c89f,2024-07-09T16:22:44.900000 CVE-2024-38454,0,0,72d14562f500903ed20ecf4e44aff777a96cc5f26825831fa62629cb8dc6e476,2024-07-26T14:11:13.043000 -CVE-2024-38457,0,0,c127438be2d611d9181e4bd46ca453fc6b636f1c9865c6edf3c5d09f27c2b35b,2024-07-26T13:29:10.210000 +CVE-2024-38457,0,1,ac67632609b8fd7c3fbda3f9db3be7abc7196581c8bf10f0e9bce6b0ade96067,2024-08-01T13:54:51.367000 CVE-2024-38458,0,0,1c123d9196e3f5ffac1cc5622b10f7cfbc43618017fed6ddd121a084f078cd6f,2024-07-26T13:27:56.937000 CVE-2024-38459,0,0,4ef78a4d5c93482a3188b8be60d5fc2896531e30b015b11c8a864501b9d2680f,2024-07-03T02:05:04.377000 CVE-2024-3846,0,0,0870f232696d74977451a2a3214c388694b50eb565f2d8dd146f9e698c4155f9,2024-07-03T02:06:43.703000 @@ -254880,21 +254881,21 @@ CVE-2024-3847,0,0,95f9ad8fbf5c3c80550e0a325ff7f48c02be2f78865a75992b282f70c630bc CVE-2024-38470,0,0,e532fc2610ce0ba05d395b2565b3921da00db5c8c8ee1a62b50a319ed8de746e,2024-07-03T02:05:07.477000 CVE-2024-38471,0,0,3da065067273e795c22a9430ea2650425c29da7d06ad6ab18b550114c797a95a,2024-07-08T14:18:45.747000 CVE-2024-38472,0,0,0483e32b4907ebc7f547fb87caf5b24bef6a9183e30ea4e30b4ad6dc0faa92cd,2024-07-12T14:15:15.043000 -CVE-2024-38473,0,0,245312e7d7d612318428b6f6fd5684a8209079166a2fe62e2b2041929b5a3f74,2024-07-12T14:15:15.133000 +CVE-2024-38473,0,1,36c5b6d67728da1356289c3874d586ffc56f76a7fbb2f457e14a9e4a12de691d,2024-08-01T13:54:52.397000 CVE-2024-38474,0,0,8beb2e175a9bc559fef9a6900cd3fa063a7ab70cfb348bc0537e77ddd5eeb3f1,2024-07-12T14:15:15.203000 CVE-2024-38475,0,0,4434bbc9e26235e103b2ea8722d70e74e682dd306d9d4b03d295c12ec512ff31,2024-07-12T14:15:15.277000 CVE-2024-38476,0,0,b3d9539bc16644d562156587edde82f59f7e5b8caca519713a03097d766f34a6,2024-07-12T14:15:15.360000 CVE-2024-38477,0,0,4e865b7fff5c5346863d587e484df8d5b457292ae17a1b95a338aa934a1871cd,2024-07-12T14:15:15.430000 CVE-2024-3848,0,0,3a1e7dbb50cc54ecdbcc89881c429869965f00f9d2e1eb9f088acc297fe8920f,2024-05-16T13:03:05.353000 CVE-2024-38480,0,0,04c4f9e75ecb94da8a57533882d0899c4c9616c45f6d4f0fa40fb0af2c036f64,2024-07-01T12:37:24.220000 -CVE-2024-38481,0,0,bb72467f4e9afb2c4aa8a39e9674a8464de905722f00f950bfbff293f40ed790,2024-08-01T08:15:02.767000 -CVE-2024-38489,0,0,69ac789f31c4f03380ba303a395be773598cc5e427669db419e4462c13ad5bde,2024-08-01T08:15:02.980000 +CVE-2024-38481,0,1,08bca32c152a64ffe934630afc548d1ac772aae7d4c4998a589fe1909781659e,2024-08-01T12:42:36.933000 +CVE-2024-38489,0,1,7b4d7899b6c74d141bef268bf61cc9ebe4a099626582f45112e8c3bef4b3ef1c,2024-08-01T12:42:36.933000 CVE-2024-3849,0,0,5306fee696144db88733a07d80a07ecf85ac2a8ec15f60e756615ae8c2f2566c,2024-05-02T18:00:37.360000 -CVE-2024-38490,0,0,da01ec7368c210ec9846fa69a0c396245ebbd3f153dbc63b210c9af31363abbc,2024-08-01T08:15:03.187000 +CVE-2024-38490,0,1,649c3bdba527fbaccfb406b404473d1f96ef893a40e0e1b3e7dc2cdfcbe0d5c0,2024-08-01T12:42:36.933000 CVE-2024-38491,0,0,45eb77a065b351e283c19fca52dbc0c415810a9854c6f93524e9a875f4b79ec5,2024-07-16T13:43:58.773000 -CVE-2024-38492,0,0,2fff266f3514c7b21683e88c34d78fd98dc9ab17c356d1ffe5e976b9d4dacf92,2024-07-16T13:43:58.773000 +CVE-2024-38492,0,1,c16677aadc081311e0e1e91d0375fcc95bd79bb96f874c00db030ff80ceeac26,2024-08-01T13:54:53.013000 CVE-2024-38493,0,0,7dab0c3b3c94bc494d9811e28eb01ed63c0107f6df03b64859d1b0c9c94817ec,2024-07-16T13:43:58.773000 -CVE-2024-38494,0,0,0b20737b411e64f5f564d7cb806b8e7adb78c4f833960557c6fcae7932fde8fe,2024-07-16T13:43:58.773000 +CVE-2024-38494,0,1,414fbd6d2851a15a9d78e377321cacdd692320d773acbcbc218c1cbcdf7a31d9,2024-08-01T13:54:53.837000 CVE-2024-38495,0,0,fea4dcb4fc2311116e216f5501bdcce029e8616b236558b22d9cb3670ca9e419,2024-07-16T13:43:58.773000 CVE-2024-38496,0,0,6e423c176a887ed5895ae7351498e6b63c7505283576ed5f43b90da3d939aeaf,2024-07-16T13:43:58.773000 CVE-2024-3850,0,0,2382357c8e4d6adda4f3540070cc5ea125c45aed93070563af82a0d626955695,2024-06-12T18:12:56.413000 @@ -255044,7 +255045,7 @@ CVE-2024-38634,0,0,bec98b18b15889257ee89513176d8e05ba97babf973b3d3f662ac7d581762 CVE-2024-38635,0,0,82c05d5461024536a7eca544742658a15aca67670d5473d3ab28fcdf85287e7e,2024-06-21T11:22:01.687000 CVE-2024-38636,0,0,39fe2743512ad3bce5f80041cae8719a346f16bdf419751542e29e8318105523,2024-06-21T11:22:01.687000 CVE-2024-38637,0,0,73dfe838ab3a4a3bdef26c72205f7e2908e62b38c42443b0d3887f952bc61af5,2024-07-15T07:15:14.093000 -CVE-2024-3864,0,0,3818cc06386df015c38b8f5b2ebeaba4c5b773f66c78853e907939e1844fabf7,2024-04-24T10:15:07.597000 +CVE-2024-3864,0,1,8fd62607b800e3850e7accd3791f04c3b2a9d6599c14b359c8ab016e8255b650,2024-08-01T13:56:44.317000 CVE-2024-3865,0,0,d6f5dd3766d85f1a043ebf5d3172442b73d2c19e5b446b7220941e0632bb3f23,2024-04-17T12:48:31.863000 CVE-2024-38659,0,0,7f018343721f0a1816fbc1d0de6ee38bcc05d21743970bb8a1218031b26bafff,2024-07-15T07:15:14.163000 CVE-2024-38661,0,0,b032ab35a3535059aadbe94298691231b9c402b611efa81b633478c3528450c0,2024-06-25T18:50:42.040000 @@ -255157,12 +255158,12 @@ CVE-2024-38897,0,0,d5624b84699009a260fe1a98237ae1687fc4d1ba5c6044d2e051c4d97cd50 CVE-2024-3890,0,0,e12639d0080d409836c0239fc937b27c8c64796cc206deb32f0595f7d19e1777,2024-04-26T12:58:17.720000 CVE-2024-38902,0,0,ac988b882df018ca92e12c5877e77cfd875299a6f04c2e568bccd90f65b2e946,2024-07-03T02:05:26.170000 CVE-2024-38903,0,0,2b94b77610c8a043c9d0ea06696528fdc7d9d24aef31329270a0121bf4f56367,2024-07-03T02:05:26.943000 -CVE-2024-38909,0,0,d48534496328b9db69c3deca64d19b38449d8c017166476b6a4f4941b2f8cf59,2024-07-31T12:57:02.300000 +CVE-2024-38909,0,1,f29175e3e286d20a69ae84e0dcf87435063b2a199fee90e548d4dde17b39c0f0,2024-08-01T13:55:08.623000 CVE-2024-3891,0,0,f9d0b3848969a1acfea7b9a20331b02cfc9759078e69f46c5576c9e3267f4690,2024-05-02T18:00:37.360000 CVE-2024-3892,0,0,635a0a9dff99d68a800a0815fade3930f3dac436f84c87dcff7c11db25dc6686,2024-05-15T18:35:11.453000 CVE-2024-3893,0,0,8eb90c61219540666d23479f74a65575eaf5c1a0dbea88b697d9ac7cb634e024,2024-07-03T02:06:50.403000 CVE-2024-3894,0,0,ca8cdba6c6957ab6848a65692183a74921d9acddfe51bc85133b173556c88ac8,2024-06-20T12:44:01.637000 -CVE-2024-38944,0,0,948f3b1f9a16710c91801dcf50c7cb2e7491ae3c4a3615beac505b631b576a8f,2024-07-24T12:55:13.223000 +CVE-2024-38944,0,1,dc817973495a511f5a7cee16ff0ad58704d237754057f4e6272671315289d41f,2024-08-01T13:55:09.433000 CVE-2024-38949,0,0,f1b76a5b198d8cd8e7622b115a8855a4de307f59cefd5215d45fde9cfa0e8235,2024-07-08T14:18:46.730000 CVE-2024-3895,0,0,f1c1a204b725be702c93f4b9fc036bb365050aae2160c5f507be071f13b94669,2024-05-02T18:00:37.360000 CVE-2024-38950,0,0,22d7d74f3fd2a34d71ced28539afa875128a0351336aca0ca02490a642cb6f36,2024-06-27T12:47:19.847000 @@ -255171,14 +255172,14 @@ CVE-2024-38952,0,0,f3ef3fd79d2aa5fbb6eac9aa4ae095adbf433e668b0d02d175100cd59627c CVE-2024-38953,0,0,dbde02c3cebb008392d98c40885c4b018b5aa478839fb4271aaec02242524f62,2024-07-01T16:37:39.040000 CVE-2024-38959,0,0,cfec0ef25838165e6aeb5c8d3c664ec76927671369d600966c63c52c96a40800,2024-07-11T15:06:03.203000 CVE-2024-3896,0,0,f3d4ad57a1cf51c4743b52edc7b019af4ec979be4adfcc4256aae23d08f6902b,2024-07-26T12:40:58.473000 -CVE-2024-38963,0,0,d6810e29d19f952e1613d829958cfc344b3c3660b4b5f6561b4ad90c435b0dfd,2024-07-11T13:05:54.930000 +CVE-2024-38963,0,1,d919d9d308426b636be55ca100e53822e276f721bd65a6d6c4d8ce665dba3767,2024-08-01T13:55:10.347000 CVE-2024-3897,0,0,5a8068a855e86bb89a1451de196d4bad1fbc355f1787f3259631c60aae1e07ca,2024-05-02T18:00:37.360000 CVE-2024-38970,0,0,eb04e06c9fbc74e88c4fcf5d6eeffbd442cec39d7eaf1361f68ecba935eabe9c,2024-07-12T14:51:48.070000 CVE-2024-38971,0,0,46979c6cce7787051e40b62dba0207d3f5f20f29a3ce299a21265249d3eebf4c,2024-07-12T14:50:45.817000 CVE-2024-38972,0,0,266b969944e47c34c5065969d4aa9af417e70cd96f058167cecf53341667f408,2024-07-11T15:06:04.187000 -CVE-2024-38983,0,0,65639f4f130bc9f48580d983e3301059215fbd2380f6ad6ae2ff3b69d823c331,2024-07-31T12:57:02.300000 -CVE-2024-38984,0,0,330999598f4bfb965029c321ec31909d0ca47eabdd48aa196f4aa509b0275ffc,2024-07-31T12:57:02.300000 -CVE-2024-38986,0,0,607e9c16c77949b76cb98838f8430c076743dcf2272b644bc0352d02ea2c8220,2024-07-31T12:57:02.300000 +CVE-2024-38983,0,1,a5442b1984e0d0de26c8eca3180d57b550588c3c5f3a863ee99288d39dd8ef1b,2024-08-01T13:55:11.147000 +CVE-2024-38984,0,1,7bcc8b86e146f67837a8ed887841cfa296e4ad0addf7783bc6340007d6dd2381,2024-08-01T13:55:12.530000 +CVE-2024-38986,0,1,7fc0e0968bd6d64c26cb3a9fe1b3810c84d7529fc5008249a7c3069e057d06f0,2024-08-01T13:55:13.857000 CVE-2024-38987,0,0,0c71f898711274c7ac1489fe714f2d31dbe2fc7f130139d062fe917d9ea47c74,2024-07-11T15:06:05.027000 CVE-2024-38990,0,0,501931c40b72ca4a3b10df5757210e9290217859750e859ab66984c960fc5bf4,2024-07-03T02:05:27.837000 CVE-2024-38991,0,0,94e3c94b29575f02c48116cf5f4eea434bedd332518d74450337fdc7b51e049b,2024-07-03T02:05:28.670000 @@ -255192,11 +255193,11 @@ CVE-2024-38999,0,0,9b50bc5436037bd68caf4dfd664d8e190d38dffb5c1ff1f9ba9cfb924ccd2 CVE-2024-3900,0,0,0dae3ee77b7737dd7dc98eac4a82d471604ab0211f1ae6f2407cfeb20b2f5f33,2024-04-17T20:08:21.887000 CVE-2024-39000,0,0,32efdb5372127bd496fcf75bbda16a003e610532bd5eb87d5181962cfafa1b6c,2024-07-03T02:05:34.347000 CVE-2024-39001,0,0,4a910b75869faff6116d62c4b16aa9d6512985c5f7163a2ecfe1d35727f84b9f,2024-07-11T15:06:05.870000 -CVE-2024-39002,0,0,c3d97f4ddfdf5113f1cf208674920a9bfb5660b5a18aa674db16cd39625f22d8,2024-07-01T16:37:39.040000 +CVE-2024-39002,0,1,5ae3119071c777fe1c3c088ebb594ee3244ed1b22187ea0a59fbd4bdb0225ef6,2024-08-01T13:55:15.163000 CVE-2024-39003,0,0,d490537b0b54e3dfe39c3bcd39a1799aa62df41a8d32db0a7f000717be4b18c5,2024-07-03T02:05:35.153000 CVE-2024-39008,0,0,d8f19e5215777652d65d1787e2b99d3c75e4a232be174ccdef7b4b42d5758271,2024-07-09T16:22:47.440000 -CVE-2024-39010,0,0,909ed49a911cd74d8563adf82dd816575ed74196ee968fd158bec1af99b5bc1b,2024-07-31T12:57:02.300000 -CVE-2024-39011,0,0,dff7cd349238306f62dfb1bcbfc2eb406966ccf1b37117a02899b0ab80cf651d,2024-07-31T12:57:02.300000 +CVE-2024-39010,0,1,4c94df6804eafaf9c3ee5cacc1ad97c2787df1718bdba676c4e479f8d823e31a,2024-08-01T13:55:15.990000 +CVE-2024-39011,0,1,17a9e864b621adb009a5d3c69a8fd33aa43e980d90d710e83744b5caf249d269,2024-08-01T13:55:17.323000 CVE-2024-39012,0,0,9b9717c519767ffa98a063e60c83229b286490968d8d218db057fccb3e56ef75,2024-07-31T12:57:02.300000 CVE-2024-39013,0,0,a4c20ecb3bde21856044d9eb2da0ec8e02acc3f9684d1a5bf6185d1fb2e7bba0,2024-07-01T16:37:39.040000 CVE-2024-39014,0,0,9a0097bf0bd9a3cc47cff0cc484a6f4c909bfad413f77f22d65f886eb0aa8457,2024-07-01T16:37:39.040000 @@ -255207,30 +255208,30 @@ CVE-2024-39018,0,0,487d2d2021a1fc3e6565cf47ccad7b4f66c1ad362659f92eecb24e6b9790a CVE-2024-39019,0,0,49f6923e7308cc94a507864c15bf4235170455a2d5e0ce49f075b9ff7427c130,2024-07-09T16:22:48.323000 CVE-2024-39020,0,0,f3dad96d08cf85365c782d609ec6f6e7c042df2976c73457f6a2464976a50377,2024-07-09T16:22:49.137000 CVE-2024-39021,0,0,1738b6fec91bfd00d0237390d12ea763f1a28b36e28c39eec9a265e784512e4c,2024-07-09T17:15:48.083000 -CVE-2024-39022,0,0,afaf748649b1db169d83f7a69696dd09c6197d4b5b460917351e14e19d519efa,2024-07-08T15:49:22.437000 +CVE-2024-39022,0,1,4892e8c438fa7f66ddd59914775cbc9dbde11acf99905f9a0489141c3183b297,2024-08-01T13:55:18.953000 CVE-2024-39023,0,0,973861fba318ff13a4dd340336454548bbd625a4637128153f1ed9fe03662477,2024-07-09T16:22:49.943000 CVE-2024-39027,0,0,9f73e18bd924a22ea308a0e3f3aba42dd8cadda957e02d96adc8536dc59ded1c,2024-07-08T15:48:01 -CVE-2024-39028,0,0,a2641222edcef12e310d06c15f66d85419ac0430d888fa7eecd56f4af8dd2579,2024-07-08T15:47:26.720000 -CVE-2024-3903,0,0,e1c6da3858ae6e8352eea69425b877e7a9386bde1a277b8207c331dc00d06d7a,2024-05-14T16:11:39.510000 +CVE-2024-39028,0,1,9687db509e67ca899b7283535a6c24eebf7f6784e1a1f28baae3172078bffed5,2024-08-01T13:55:19.873000 +CVE-2024-3903,0,1,1173acb865ab00a4b856055c98dd70060d7f57d01c944a25db26e0ac92cb735f,2024-08-01T13:56:45.143000 CVE-2024-39031,0,0,d24f6f8147beeb7e9c2d09f46b9b50d67c2b9ac54ebfd67e20353ba96152db2b,2024-07-25T22:15:08.837000 CVE-2024-39036,0,0,8b0e3b7a757c7630c97609bf5affb9bafa3162d1af04d1ccd31492e6e46f7c28,2024-07-17T13:34:20.520000 CVE-2024-3904,0,0,b47d95974559a4f3b756535a5502c34ce174362aa3e2f750b6b7a9a829cd5533,2024-07-23T01:15:09.063000 CVE-2024-3905,0,0,67966257112781442fc6e512d6c151edda862eaaff35815fcc6adec0f7a08ca4,2024-06-04T19:20:26.357000 CVE-2024-3906,0,0,a3b427119bdbbda357983f8fdd52a145484ad89b344f08b8387b1c5f33e2d6f6,2024-06-04T19:20:26.463000 -CVE-2024-39063,0,0,c1e0ac7f9481d76fe7fdb16a6eaacaab5e66b9b0a0a18edcff2fd308e8920150,2024-07-11T13:06:13.187000 -CVE-2024-39069,0,0,1b9a692823854c9e7b388ef3d138bfa20ebe2a96df75dd2813f998599aa58897,2024-07-11T13:05:54.930000 +CVE-2024-39063,0,1,2742e3162d1a14461760eb07e798c2d0c4b686234fef5639f84447d1e1f008e4,2024-08-01T13:55:20.867000 +CVE-2024-39069,0,1,a4c8756dfcc68f15d0c2a21ad1bc7bc81c1fdb855920e24c4d737766fda062e6,2024-08-01T13:55:21.670000 CVE-2024-3907,0,0,60bf8190dbda2edec5350cbb8e8b6403fcf0516c947d67022ad2b560cf30b650,2024-06-04T19:20:26.563000 CVE-2024-39071,0,0,195ebf652ba5fdec3966b79507d582422df3145f15e690eeba2499c0a1d26f77,2024-07-11T15:06:07.560000 -CVE-2024-39072,0,0,31b7b2f8b8e84ff26cbb01ff0fdf400f7d970c8f96ac4f5eabe40a5bf0f78dad,2024-07-11T13:05:54.930000 +CVE-2024-39072,0,1,59efd5c73004670f8c574450bf52f5ef6a3e1b857b7881899bb9399c029104b4,2024-08-01T13:55:22.510000 CVE-2024-3908,0,0,42c7c9b2b31f61816d945d69672e5e24b20e282cc849fd87286a4170779d810f,2024-06-04T19:20:26.660000 CVE-2024-3909,0,0,ea272c17ff869087d9799ba3efa606456d1ea78a711f72e5984479fd9f006e55,2024-06-04T19:20:26.763000 -CVE-2024-39090,0,0,0d32ce4acc0048b7409fcf710f16d81b2ac7b3f9a846a81af31a5670d016f555,2024-07-19T13:01:44.567000 +CVE-2024-39090,0,1,4ea45c01dc94b6a5905ea4f25d30b677051f8a6abd6f770805bb3d0f6dca7071,2024-08-01T13:55:23.317000 CVE-2024-3910,0,0,5517b92ffa84ce0352fdc1fcc785da8fc488f0a213ee6670945494d32f02de6a,2024-06-04T19:20:26.870000 CVE-2024-3911,0,0,554ab1929819d1eb25e95db5b6b72b7d88b66260392eaf976b13306fbbfd7fd3,2024-07-03T02:06:52.050000 CVE-2024-39118,0,0,c73221ddf1d7aabf1cde04e3cc8495d2b93ac9b8498b2f760ce56c4f1b9d2289,2024-07-11T18:30:13.010000 CVE-2024-39119,0,0,335f0358240af17c362e55e8a97871d20387542a8ff60c6e91f13df6b4480ed8,2024-07-11T15:06:08.390000 CVE-2024-3912,0,0,039ece273f1483faaa0f8be913ee60b27e57016f6ef1d8ef33b60eb0f1f7f14a,2024-06-17T12:42:04.623000 -CVE-2024-39123,0,0,9f454b6dcdc47adea69d5804c21a88ce1af63ae7ddcf8a6120e3f83635527646,2024-07-22T13:00:53.287000 +CVE-2024-39123,0,1,69647bcd5c9a9bb1028a507ccc536681102728e6264830a34311834e26072257,2024-08-01T13:55:24.107000 CVE-2024-39124,0,0,4fe7663d40d1aae481128589ee998bc5addb6da2a2af45eb47dfa2373a8cc8dd,2024-07-18T12:28:43.707000 CVE-2024-39125,0,0,d2abdd9bdf1fea6bf3cd5c2afccfb8d0920421dca4e9ac0511f833b335509c47,2024-07-18T12:28:43.707000 CVE-2024-39126,0,0,ccf6b2b0c164879c88c5e1df59c0021a7e319f49656a465e9a6faf26d4c496b4,2024-07-18T12:28:43.707000 @@ -255246,28 +255247,28 @@ CVE-2024-39150,0,0,2aeb3a72d2298607936219fe132279dd91c043749dc32cd079c86ae8b7e55 CVE-2024-39152,0,0,0fd1d13d45fa07b57e918fb6ab1233243318239aba2106a0e70a3a44b557aeb7,2024-07-18T19:15:12.330000 CVE-2024-39153,0,0,dcec1c4ae1798ea788d66ec52e054244cacc5771986472ce6b18b0b79017ed7c,2024-07-03T02:05:40.930000 CVE-2024-39154,0,0,b379ceff4c24890e9b9644f02b7f59c0c9376ca4640a0cf8d94011517a86b7ea,2024-07-08T14:18:48.860000 -CVE-2024-39155,0,0,aea13cc38ffc0dc9db0a2f78c2234a7fd81c320d04cb457460521b2ef1f5ab71,2024-06-27T17:11:52.390000 +CVE-2024-39155,0,1,479b75f1ef577bd6c1a9efea8c5181f547994ab4e405a16540cca599ceaafef8,2024-08-01T13:55:25.313000 CVE-2024-39156,0,0,77ee55fa44e5b5a1aee8c345b1d4424c08513568738373a9ed7a7016b20f5f6b,2024-07-03T02:05:41.750000 CVE-2024-39157,0,0,7034c13893105630c126aaeda1d41a6cc977f264ae0a5560b4322987c45914a9,2024-07-03T02:05:42.557000 CVE-2024-39158,0,0,091dd6577566331b292b9ff42f55d324c6a1c79d9cfcaa09b71afbf864219638,2024-06-27T17:11:52.390000 CVE-2024-3916,0,0,f95518a402c56c15214d8c7d6dfe42604495d4bb38ccc0f52b32e4da2a1f88ce,2024-05-14T16:11:39.510000 -CVE-2024-39165,0,0,73505f78c1b9aaeee94abeacaf375a0ada22d254c42d8c2b004bd82562025a88,2024-07-05T12:55:51.367000 +CVE-2024-39165,0,1,865aa0107f3f6748d69255a4f99cc73813afe8f9fc3ab112adbd557bcb0e49d1,2024-08-01T13:55:29.123000 CVE-2024-3917,0,0,87493362103f61e3758851588aca1cc3facb0cf1f97ad5b068e06e988e9b2161,2024-07-03T02:06:53.877000 CVE-2024-39171,0,0,979bc13509f362c564b7984548b10a6ed307c7ff17f59734c1b5aba694dfcb6e,2024-07-12T17:15:38.200000 -CVE-2024-39173,0,0,4a92644ed2652b9bb3da2843df35fed8ae84e8e0843ed6c47d90979d53a77858,2024-07-19T13:01:44.567000 +CVE-2024-39173,0,1,7e7488e695a5a0a1cc2cbfd222ab57477e2c94cef7c8b0522ab4aeea25b8c823,2024-08-01T13:55:45 CVE-2024-39174,0,0,e23d16c301dd77bcbf0c998cdb1fd9e2250ff32896205d07ec7d2fbcb29c498f,2024-07-08T15:49:22.437000 CVE-2024-39178,0,0,941809397cc55551932a6950a6f2b95c443b08d8ccb5b2192a192df3dfe41968,2024-07-09T16:22:51.013000 CVE-2024-3918,0,0,476a46be6ec9c148a29f5d8b4706a927d6b38a7387c9465eb6003c281a1d7618,2024-05-24T01:15:30.977000 CVE-2024-39181,0,0,6d0605e6817c6f93a8fbfbf6a2ec1902596f3fb21fee78811ca51bbb181e7fbb,2024-07-11T13:05:54.930000 CVE-2024-39182,0,0,c4d16c6176ca0269b7678f6ff1967039bace8922a5879d34ffe12e1dd73c8773,2024-07-08T15:49:22.437000 -CVE-2024-3919,0,0,a7423741ea3b54999d6dce7118ede9537758eefd2b9032b5f13e527738f9bbf0,2024-07-15T13:00:34.853000 +CVE-2024-3919,0,1,33e13c5d81820af884522cd57579a7a0b812a530b82c07df6884548b544ce3e6,2024-08-01T13:56:45.767000 CVE-2024-3920,0,0,0491b769da3fcc1d713428de93228065f2895f5f96d5fbedd163ec53b9c646c0,2024-05-24T01:15:30.977000 -CVE-2024-39202,0,0,f670ff06733dd4c6d5c11488fabc4a1bb063378e53783f2f50ddc1a245b1d647,2024-07-11T16:13:13.487000 +CVE-2024-39202,0,1,348a7ae5d8dd5240a11e31748e08097038b5b43463791ad3f8bbf301dcb39ab4,2024-08-01T13:55:45.870000 CVE-2024-39203,0,0,18c47ac3dccac84f7f75ab68882aa989c3675ff79ff1b24a1d72e6e148699036,2024-07-09T15:00:49.997000 CVE-2024-39206,0,0,ff238c7a799bd8156023ed396579b78ee6764c0b74ea4e700d568262004d102c,2024-07-08T14:18:50.487000 CVE-2024-39207,0,0,036923690cb1c7219bdbc37921ba10b53c63e774f7f4be50452133314f36f1c4,2024-06-28T10:27:00.920000 CVE-2024-39208,0,0,bfca919135cb16c924d14a3e46a90c36fb45e8d6f50651e543c7c3b74462722a,2024-07-03T02:05:43.393000 -CVE-2024-39209,0,0,fcf396bb16875d2908cd8a8c3ba6c71dddf95a383d2fdbb19d46c310380e5beb,2024-06-28T10:27:00.920000 +CVE-2024-39209,0,1,7ae48942b6b741e327b80a7d619fe2cbf17f09140a290b1dc29277309cf5b1dc,2024-08-01T13:55:46.647000 CVE-2024-3921,0,0,f9b35a011463fac05161b44b4bbb78735e9f8e429c630b2c06404df472b05f31,2024-05-29T13:02:09.280000 CVE-2024-39210,0,0,dd879bfabd368ac43fd934d5b04f30b9ae3fd52a7294467957738dbf1ac41744,2024-07-09T16:22:51.927000 CVE-2024-39211,0,0,2097c1c66ba59a15383c9353c96916ab9a5680eac99b1f2a60f6c4879ed468b9,2024-07-05T12:55:51.367000 @@ -255283,7 +255284,7 @@ CVE-2024-39243,0,0,fee8e511adb87ecb7b795183c7c37e3d0b9c7f991b9b5a9484f2b183016c2 CVE-2024-39248,0,0,7a563316fd3453bbdb2eea83c64c484bfa847d40ebdeede8de43d451f8cafde1,2024-07-05T12:55:51.367000 CVE-2024-39249,0,0,a8f23e36f9dec7b6dd0c3ed6214de893182dd9a10ec50f4f0f0e7c02e4cdf075,2024-07-09T06:15:01.913000 CVE-2024-3925,0,0,7eee90dddbc89d587d2add5ec583b68109d8e96ea070cac853f0344fab97474f,2024-06-13T18:36:09.010000 -CVE-2024-39250,0,0,206c1c0772f8b7974ecbc9b8c1cc32aa375c8a841d74a38d55059a2612fc1bb2,2024-07-24T12:55:13.223000 +CVE-2024-39250,0,1,57928bd3b6fed5e7ca24bfa49026f1317017d625b7d77802180f56e1fd67fb2c,2024-08-01T13:55:47.607000 CVE-2024-39251,0,0,9df7da1e1e27461254efbb4f14985199d1f5c3e4c1c9dbcd995558e03e5bb519,2024-07-11T15:06:10.633000 CVE-2024-3926,0,0,5b04461367e6759c792ebfb9ad8f25b57b29be658a49f3088676d8721c7c2f63,2024-05-22T18:59:20.240000 CVE-2024-3927,0,0,c053c5f2098184ebda7812ad9ad17f8e9bcb0fa48f3cf62ccbd3c0beff2bc975,2024-05-22T12:46:53.887000 @@ -255313,7 +255314,7 @@ CVE-2024-39314,0,0,f08a68c1585aac53ed3340b30b7ca1fee7f99b287e34df66dd62620bc6eee CVE-2024-39315,0,0,a63beff0a6cc21a12673e8ba65716d45b6c52abc54b22460a729ebfe04cdda63,2024-07-03T12:53:24.977000 CVE-2024-39316,0,0,0330ee1f4f66ad5c4fc8d75b41d6a1a5d4b46137b39514674c0311e081ce6ff7,2024-07-02T17:44:45.700000 CVE-2024-39317,0,0,50f7a469519b62eca16220b475bffdb7e1e0158b2b6611386cb9bf3353e1272e,2024-07-11T18:09:58.777000 -CVE-2024-39318,0,0,041b9fe4c97fe2a4483ab787ec857052185dbfddfdb7cee525f6d72ff96a9375,2024-07-31T16:15:03.937000 +CVE-2024-39318,0,1,d84809b5481c68217d59c341f89a33a753d6db4b36e662db9d71acc330a074f7,2024-08-01T12:42:36.933000 CVE-2024-3932,0,0,d78b7c01d3f6b397349c50b0cef81a61649a3d63b8878b7ded7786d99bb82db6,2024-06-06T20:15:14.030000 CVE-2024-39320,0,0,6f7ce6a5bce29c3b54d4c4199d5683e1993d85cda15758fd22b24998859b20cb,2024-07-31T12:57:02.300000 CVE-2024-39321,0,0,25b62962ce26575b135148ce4bc78df297e90148993ee6065a33a42f83d7ebff,2024-07-08T15:49:22.437000 @@ -255329,8 +255330,8 @@ CVE-2024-39331,0,0,e27921e016dec51173f86ad420de9e9174de4baa540da3f53e6e1157ef72a CVE-2024-39334,0,0,94cae5ba65ec50bed6d17b2b54650000947aeee42b8249838d1ebdc24642a191,2024-06-24T12:57:36.513000 CVE-2024-39337,0,0,ae96e6e5658ac679eff4c9acfa518814cd5ee8874dd941939a565173aee28094,2024-06-24T12:57:36.513000 CVE-2024-3934,0,0,3e23cb8746110c86130adc40e1a1911de8a168d18836a34bacdc1437f4453cac,2024-07-22T13:00:53.287000 -CVE-2024-39340,0,0,8a19ea0d82baf517391d74de09fe55b24d4bbbe3d357c771c961dd3f6f9df19c,2024-07-15T22:15:02.910000 -CVE-2024-39345,0,0,9c7d8b80031d61b67b70cce625fa2de1881b2a32980271282817241d7fd87bc2,2024-07-25T17:48:18.550000 +CVE-2024-39340,0,1,5ebdab5b5b68a92db4ff353d7a08162224794f82acef11835fd7731e9f604ef2,2024-08-01T13:55:49.473000 +CVE-2024-39345,0,1,a7fe401efcbb2b3728b6e10777ee0a9c04a224d785c5c0839b1d13cfea4ecde8,2024-08-01T13:55:50.247000 CVE-2024-39347,0,0,f05ffc50868d752b16aba36bcf98397a1a823dcf709e914fdceefc955d8df28b,2024-06-28T10:27:00.920000 CVE-2024-39348,0,0,798f996b4382b8a6e782460918b5005c42ce376a9b87c3209ffaa4789fe2c24c,2024-06-28T10:27:00.920000 CVE-2024-39349,0,0,d94bdd4e2f366e0736711898b6f6670e30f7a98126cdfe514679d42f61eff674,2024-06-28T10:27:00.920000 @@ -255347,7 +255348,7 @@ CVE-2024-39373,0,0,e03c6c4e4265087cfa8c4bbe8fccd5576189838192e80bd89272e600b85fa CVE-2024-39374,0,0,ceb09b5bb4e8be416a15f13560d443b1e635d211ece43c085341bae7ef26131f,2024-06-27T17:11:52.390000 CVE-2024-39375,0,0,7f7f7a9309aed2a09a305dfdf1e1d93b0589de917a3b11ae3ae79eb9d410a9e7,2024-06-27T17:11:52.390000 CVE-2024-39376,0,0,ff38615940f53b46258a81c8b3ac7c33f4e18906965f9bf4f05657720710f5f6,2024-06-27T17:11:52.390000 -CVE-2024-39379,0,0,cded5c6f297d1cdadcf2dcc525c469fa47f81ab936bdf50910368395c744ac06,2024-07-31T13:15:10.253000 +CVE-2024-39379,0,1,eea4124c5ea93e0750c53c7242ccfa255eb0eb94ed4c7c3ac1070e74f2655db4,2024-08-01T12:42:36.933000 CVE-2024-3938,0,0,8887ed8e5799b16c10955230ab5dda27b9f755d2347bb21346f025730ab845b2,2024-07-26T14:15:02.773000 CVE-2024-3939,0,0,946bcd2da6cf8e6d3629d51459f4ff005d5f6fd111c61e8b42a0b8395ce78a5e,2024-05-28T12:39:28.377000 CVE-2024-3940,0,0,9b4f68dc6c260883aad4ea511cde5305f79b78a30a9cc16969c94330d4b864d9,2024-05-14T16:11:39.510000 @@ -255484,12 +255485,12 @@ CVE-2024-39598,0,0,565f2774e84c891d5996cf36fa669402a223a2e5a490f549b69365c6075a4 CVE-2024-39599,0,0,71c6e22ff50e3a1f14090d5ce5359c041b1ab088b8ff29fe36a33f35ff802136,2024-07-09T18:19:14.047000 CVE-2024-39600,0,0,3f218b3b2797556a97f50f1b3db443b951be2a33b8f95e3d04ecb200803e8aaa,2024-07-09T18:19:14.047000 CVE-2024-39601,0,0,7691c6b30f5986c79e8398298f8afaed5e766d08eb3fdbaa17ee23cfa6227202,2024-07-24T12:55:13.223000 -CVE-2024-39607,0,0,7d351fe5f1ab66522df339e7523a4db2286eba2e04f75ef235070b9e70434e42,2024-08-01T02:15:01.950000 +CVE-2024-39607,0,1,8ea73d595b75dadeb256de2957dd9706a047024a9bcc41a702a3f8c2647ca0a7,2024-08-01T12:42:36.933000 CVE-2024-3961,0,0,7859b6a2f8e5a01656e72fd209a53f5adaf23f278f08a55d207894f918e1fda9,2024-07-17T13:32:37.647000 -CVE-2024-39614,0,0,26b2dcc9a6a6be274ddfdc54c9957bec272862e2ee62a7b674c4947a1cc7966c,2024-07-11T13:05:54.930000 +CVE-2024-39614,0,1,80fda44b15f74076f020f7bfc25c89db880e93067c83790f059fc3bf750e00f8,2024-08-01T13:55:55.837000 CVE-2024-3962,0,0,48687fe56cf9bd40f5a5971493143104fa6812806c2dc18cc2c914079c1544b9,2024-04-26T12:58:17.720000 -CVE-2024-3963,0,0,22a9d7040d72db88d65fa4a5e43cfe7c84c7522ba3ba50e9ee83354901151cdc,2024-07-15T13:00:34.853000 -CVE-2024-3964,0,0,772b7775d62a6c0375062c778dbb9e238f127b1d5f317dca08751976877ef5e6,2024-07-15T13:00:34.853000 +CVE-2024-3963,0,1,51376b7b644c18cc44faec2c04d1e94caccf8dc59a8984cdfb5fb430015f77f8,2024-08-01T13:56:47.180000 +CVE-2024-3964,0,1,9f7a9dcb99a6b1dda9d890f7e0a024c114babf4cc61dfd04fd66f31288d98320,2024-08-01T13:56:47.440000 CVE-2024-3965,0,0,ca98c8c8f38859cd31112b30cbcab1577d0379601171e9b943854dcc0ce8c1f6,2024-07-03T02:06:56.690000 CVE-2024-3966,0,0,f4286335c18162e5dbc573cbc605017489ac12efad77a1ff38ff47be3739d726,2024-07-29T16:52:33.533000 CVE-2024-39669,0,0,56d6b274e749be30b1ff4d12ff6c858882279f47b773d710e8ac61d1e37bcfa3,2024-07-03T02:05:50.580000 @@ -255518,7 +255519,7 @@ CVE-2024-39689,0,0,86295f6760848f0b510226e65028fed1b62502a931685ba6acf948103d5d2 CVE-2024-3969,0,0,017089a8e0e25cc18c41dde22c453ecf92ec4c4a53bf3304535dbfbcbb40fc3d,2024-05-28T17:11:55.903000 CVE-2024-39691,0,0,5b1b13e200d826d3f40f75a75371b183af197da1146b1c1721e666feddcea9c6,2024-07-08T15:49:22.437000 CVE-2024-39693,0,0,3aed4b78b258f1f000b7104a802f9a4117c3d840404e28cf8e3ca8b4234aedba,2024-07-11T13:05:54.930000 -CVE-2024-39694,0,0,32086b4cca70a0ef4cedf08973c8c937efd407611ccfab6531f938f08ce75052,2024-07-31T16:15:04.207000 +CVE-2024-39694,0,1,381b8ab296ca7ac884a99d2ccce1d7cd1ffc3e5e3c8e60b132c7b247508328e4,2024-08-01T12:42:36.933000 CVE-2024-39695,0,0,fbaaa4e185fc8d8718a1bd681584149a106333fea090ef242205e9fceffe21eb,2024-07-09T14:47:19.767000 CVE-2024-39696,0,0,48bfab7e50339e1ca25125b7d36bfdf66ca4035d9f4c1ba7b967c71b544827af,2024-07-08T15:49:22.437000 CVE-2024-39697,0,0,beaa1d3d138b1c8f4d915594365efac05629e956228fed35abbf7934793c82f2,2024-07-09T18:19:14.047000 @@ -255532,7 +255533,7 @@ CVE-2024-39704,0,0,1d59c065d69d465eb86bf6114b5299aaf44c728f69d6748df6b6bd65077d4 CVE-2024-39705,0,0,91d39f33d5bd2d9618d124407e406b5aefb3921b0f0d526c128476a4653583c8,2024-07-03T02:05:51.507000 CVE-2024-39708,0,0,000cfabacce752db3861ff9f8f3b1c505cd90f739471d05927bcaf43cab3bb6e,2024-06-28T10:27:00.920000 CVE-2024-3971,0,0,232de18e9e74ddfe0c81af44fc47161b6db81bcc698685ef24ea3f7084d9ef87,2024-07-29T16:51:34.570000 -CVE-2024-3972,0,0,b73c31eeea2f0198e73c62648faecaf579ef64e08f498fb9316d56789297b24a,2024-07-29T16:51:05.463000 +CVE-2024-3972,0,1,0caddd7b34d493c3554c875afe72275890f23d83038241874e85ef811a9076b6,2024-08-01T13:56:47.637000 CVE-2024-39723,0,0,003097d794792a3e1194202f71608927b35e402887d5f5ddf07d35b5dd183916,2024-07-11T14:54:10.243000 CVE-2024-39728,0,0,fba26233ce0c4692619efffa132c45bfb836485ad2132e6f2e6d7ce0ec6f97d0,2024-07-16T13:57:37.203000 CVE-2024-39729,0,0,bfb0ee29aaef980e2b91ef648868f4c0e36729a7e019c3fc9d2073fdf0f8ba3f,2024-07-16T14:02:53.577000 @@ -255550,8 +255551,8 @@ CVE-2024-39741,0,0,829c9dc10ec61ebda2ab0b49cc6a9c5e79410be7630ee14de90c815909616 CVE-2024-39742,0,0,72b0792276cc76bab7fb041a3bdd0407bdbbf55dba99879aeb0e420b1c80fbbf,2024-07-08T15:49:22.437000 CVE-2024-39743,0,0,56ba3c78f140f47d5ebd80a82e98c5cbfee01c52fb9fdf85fab2837f5a9797dd,2024-07-12T14:15:16.487000 CVE-2024-39767,0,0,3e2d929a0dec960247b2d08752313be7fe5d03de12cbd71addbfff64b71f8489,2024-07-16T18:04:02.993000 -CVE-2024-3977,0,0,00f889afec0a6010d1bfeb0c540e260d7fa0ce3b3f359047fd36af5f75246d84,2024-07-29T16:43:10.197000 -CVE-2024-3978,0,0,eafc3ca35bd2ec21e0fe79c6866e242579183d606a0c8689434fddea8a36c967,2024-07-29T16:42:44.887000 +CVE-2024-3977,0,1,e9ddc667440c6dcbe059212d85a4e046d10d5ad7b4b151b497bb4963c631de68,2024-08-01T13:56:47.833000 +CVE-2024-3978,0,1,264c95fabf2474878692eedd3d0ccd0dbcfac72fb894e9f86052802e2ea09747,2024-08-01T13:56:48.040000 CVE-2024-3979,0,0,e9e7991f3b86f818ec400b9ec60245e440b2d51744d0b7d3598ed5add4c2b631,2024-06-06T20:15:14.127000 CVE-2024-39807,0,0,ba2c368fe4cdf413290b5bff8a949eddf35bb4de98ed47f43e524e6cb747e010,2024-07-05T17:07:47.090000 CVE-2024-39819,0,0,c8db5421a3ae027faff5d4d06e3d8592e32e290e4092ae4f0fac52eb30d3f58b,2024-07-16T13:43:58.773000 @@ -255560,7 +255561,7 @@ CVE-2024-39821,0,0,3d8221c440f8b1dbd5c98d43cf97f16f597a43c5d93725a475fc98495ffe9 CVE-2024-39826,0,0,afc70f78da14ad22cac1b695b7ec211098e49242f19223081d17abce3c71095c,2024-07-16T13:43:58.773000 CVE-2024-39827,0,0,caf86200bd002a6aa70c894d1a6cc5e050d2263ea7091a801896c357b955cd82,2024-07-16T13:43:58.773000 CVE-2024-39828,0,0,37815ac0cb1d59603d10017e1de409a6a7cef6f58ba5d0ea15f1cc9c3c9f34b5,2024-07-11T15:06:13.953000 -CVE-2024-3983,0,0,1f8df5f31240f1196d1c9d779c3b56a448b2e17cf205ce30df1742c82acb0ded,2024-08-01T06:15:02.517000 +CVE-2024-3983,0,1,531d2a377e090c1c47014d1d9cee0a9d0d8a8618e2fae79ab38e14d875175483,2024-08-01T12:42:36.933000 CVE-2024-39830,0,0,fa16449dc31377b10db0f6c8fa3cd2e73175dcab5134adbfb18592dc79a4a80c,2024-07-05T17:08:50.197000 CVE-2024-3984,0,0,9fd51fca8e9cb62e411ab69c310516342152a8240e3126272f1618181a2d89aa,2024-06-20T12:44:01.637000 CVE-2024-39840,0,0,5d7e4142131887a411bdbeea93ed887c2e0abb0654faa364c29fef4ac994d185,2024-07-03T02:05:52.307000 @@ -255570,7 +255571,7 @@ CVE-2024-39848,0,0,8178bbb2814e5fa60c3351f00827b86e4d6b7b334f71560f5ea323ec84986 CVE-2024-3985,0,0,ceb8b898ec23867d1efcc4d7f7a630f584432f67007c6b07d5fd8199e1841622,2024-05-02T18:00:37.360000 CVE-2024-39853,0,0,0a0a7ef09f69a0d0504c74e5034409e9f17837e69e722a4f1f3c2adcfb998667,2024-07-03T02:05:53.353000 CVE-2024-3986,0,0,e9f2986e18af1d4e118a98af0e36d9f72472200df95435e3f3769680eb9144f2,2024-07-30T13:32:45.943000 -CVE-2024-39863,0,0,0ebe9832973da51eb33019729ee2559060b8a5a553a2f86aa87ee1da77a1589d,2024-07-22T09:15:11.180000 +CVE-2024-39863,0,1,c951398f9fd72a9dfacd7010e5dd70d2523f65e226c113ed4d14cefbbdbc7a2c,2024-08-01T13:55:59.780000 CVE-2024-39864,0,0,d53cf864986adcf58f762cd7c857169d0cf77d7c01b84f977b101e751257847c,2024-07-08T15:47:10.990000 CVE-2024-39865,0,0,1431947f48c63c3f2f289bcb05288d0cda08dff5370e915fbcca9f419224f5d7,2024-07-09T18:19:14.047000 CVE-2024-39866,0,0,4ed5613c5836c63f5d6549bcb87208902b3beb2ec94b1529e5dacfcf651468b3,2024-07-09T18:19:14.047000 @@ -255585,7 +255586,7 @@ CVE-2024-39873,0,0,1a658b8037abfbe3e91b7510442ac4e5e9ef0d1495c2ad87b92c1ad50704c CVE-2024-39874,0,0,14f6ca6c361900eb9cffe6fab1a9a6cec695e772018ab46292846bfaeafee4e4,2024-07-09T18:19:14.047000 CVE-2024-39875,0,0,7360bfd27b057e62564bd92359532fb7ec6b0e60daa411b44b0868522210c380,2024-07-09T18:19:14.047000 CVE-2024-39876,0,0,b618a8de6e7bfd8c90ec2968f20d226ce35ab815fa49f40d9bc6faad3fe37973,2024-07-09T18:19:14.047000 -CVE-2024-39877,0,0,6700bf0d65ab8e68f72101ebd7eced49b767ebe26614d7171c2aa65b5fa09310,2024-07-19T16:04:04.003000 +CVE-2024-39877,0,1,c77d04cd34c34f80c2f57f96e1d07b46b656b0a0c6825dfb1bb5b67677624ace,2024-08-01T13:56:00.307000 CVE-2024-39878,0,0,038c252a5df59aef0ff494dd466e8c23160164cb5ac894aeb1a33e06001b79d4,2024-07-02T12:09:16.907000 CVE-2024-39879,0,0,1b030ce3798bca0bad33a3937cca95b776786d7918bf02f25bff668e667acaa0,2024-07-02T12:09:16.907000 CVE-2024-3988,0,0,517f8158b252993c28722d017d1da97b60c9d30d3cb2f421d187823784125569,2024-04-25T13:18:13.537000 @@ -255626,7 +255627,7 @@ CVE-2024-39918,0,0,a01d13ae0b603735ac5bf07d7a2e68692283e08ddeecd7e6f7dcec848231b CVE-2024-39919,0,0,ef22e6bc228ea2cf3764fb5e5dab9f5aabfb0f60858f62004efb01879ab42cf0,2024-07-16T13:43:58.773000 CVE-2024-3992,0,0,985b07fd1be0a54ceb6e03ad5d71bca82824d88ee777cd1191549df54f31c8e6,2024-06-17T12:42:04.623000 CVE-2024-39920,0,0,8281f1288058876e172a78a04b7e10123b671826d2c29ba249d059d614d38347,2024-07-03T12:53:24.977000 -CVE-2024-39927,0,0,98e497d093ac214e1059a0be9e6a17e44ab8fd11c901f329cf8cd36c5ebfff18,2024-07-11T13:05:54.930000 +CVE-2024-39927,0,1,717dcd9b351ff5b040ab1ae7299ad64aae73108f68a03a8e01e420f58c1fcdd4,2024-08-01T13:56:03.057000 CVE-2024-39929,0,0,a101bb24f7d63f090f20192946a102f9a39a1df49f06f499eb77157966db47ea,2024-07-09T16:22:58.760000 CVE-2024-3993,0,0,a2f94f13d02cfe8603a71433706e6cc2c5ad0c0e3e2fd5d51c299cf3fc301a73,2024-07-03T02:06:58.160000 CVE-2024-39930,0,0,17eb00e73f46631dbd6316a3ab19a74b1e7ba74e9179cfe94efb0d39751660c6,2024-07-05T12:55:51.367000 @@ -255639,25 +255640,25 @@ CVE-2024-39936,0,0,151737d9121a39faad5d145bce74b1ef3d7584b31944fb5416c69ce5b04a8 CVE-2024-39937,0,0,1f82f5b58ad230c732d9cc7b90ed7f292cb38d4f538cd1c141ede474ebd9d95b,2024-07-09T16:23:00.340000 CVE-2024-3994,0,0,1a9bed43f4b2f43f8d685322cd3b5005094af7345fc065cd7144b7703ac2b568,2024-04-25T13:18:02.660000 CVE-2024-39943,0,0,3de3703190bb81e39ee7c36efe8f307ccc0155c112a035e437cb302295eb462f,2024-07-08T16:42:25.603000 -CVE-2024-39944,0,0,7df6e3a769a43ca6499233dd07b14047966f9813ce578003db4090e4c62d205c,2024-07-31T12:57:02.300000 +CVE-2024-39944,0,1,de1f44b506a595a6662499e7d94a511b6d5121e7efdfcadd96a746e1beabe750,2024-08-01T13:56:03.993000 CVE-2024-39945,0,0,a5ab3325f057882799f6f16c8783707e22aa212f95926c9733b88f6653a4d4b5,2024-07-31T12:57:02.300000 CVE-2024-39946,0,0,2f179373246697dd329234473867196653449d635e59d77de98b0eaf26d2939e,2024-07-31T12:57:02.300000 CVE-2024-39947,0,0,1d84caa87e18e75fae5c517d138058f673719f4f25d3cf943368dabe7c105b88,2024-07-31T12:57:02.300000 -CVE-2024-39948,0,0,b5216fa5fe04fc59d10fe3b394c1a2d24c2121cb7e1af68881df9b2018bea316,2024-07-31T12:57:02.300000 +CVE-2024-39948,0,1,ee424b189b0cfbdde47c11058cfacdc178076b71067d33cd2bbe727742314ac4,2024-08-01T13:56:05.350000 CVE-2024-39949,0,0,ef3662ee89c4eeae5cdd99aec0f4ea4943d7af6b224a072a5602dd5d440a4453,2024-07-31T12:57:02.300000 CVE-2024-3995,0,0,a7fe690817691037765b680c602849c2a36e767bb2849159693fe5a7864f46cb,2024-07-01T14:15:05.680000 -CVE-2024-39950,0,0,640f810784edeb978d70ac518a430163a3bd231ea7e092fc22b5104f794ec26c,2024-07-31T12:57:02.300000 -CVE-2024-39962,0,0,6c21d52cd5422abdec57eada0bf64df074fa32bd83d25f0a4b4a139e98aea2bf,2024-07-22T13:00:53.287000 -CVE-2024-39963,0,0,2cbb774d772bfe5ed8747fc2c2ce742df6fff01c26c72409fc57e064c4f57179,2024-07-22T13:00:53.287000 +CVE-2024-39950,0,1,0a5af814b405869cb4bc1326a5d163c966c476b51ac00ace4bb3ecf06791ecff,2024-08-01T13:56:11.127000 +CVE-2024-39962,0,1,88f72130b2e330c20b5ac0702cd6d158cd0cb6e08e9ed8a9d4ac60ee5a0c3f4d,2024-08-01T13:56:13.933000 +CVE-2024-39963,0,1,1997a2314271fe57eb41207372bb6a5b6d64581c5e6f0763f5bbf0ba4916f0ef,2024-08-01T13:56:15.110000 CVE-2024-3997,0,0,1f2576b07f1c26f802b0f1e551eeeee57100d1eaa419296265017e09a1456b97,2024-05-24T01:15:30.977000 CVE-2024-3999,0,0,4248dd2372447004bc43614b1896e27a040049c0dba411de9512ee0e6f816fb7,2024-07-03T15:44:56.130000 CVE-2024-4000,0,0,7c8c2f5334fecf0f2ab22d97b46108b7e41243cb0a54444d2343bca0b6a11052,2024-05-02T18:00:37.360000 CVE-2024-4001,0,0,e4615d75e04f4d27b9b19fee2d8e1d5957aea8692a6a32e57d41a2be5a0dead2,2024-06-11T17:27:53.637000 CVE-2024-4003,0,0,3612c401b34dfda79e0e5a832f936e1c099c1133cc3bc362b099cd16e5a15860,2024-05-02T18:00:37.360000 -CVE-2024-40034,0,0,9b215874c62c99e2516238422fd3d8b4590bb8b295a3e7d3c78203f48a585b60,2024-07-22T20:10:03.787000 +CVE-2024-40034,0,1,62e93ed8e2f8b39eeda72708718a3093256ea46e9ec7ff72e58cb731f8e78887,2024-08-01T13:56:48.430000 CVE-2024-40035,0,0,08afa9ac3de4546260e7d7e9807069bfe04d3f04c382ea1bbbe122e2cf535d36,2024-07-11T15:06:18.003000 CVE-2024-40036,0,0,6571820d2e1a1dc301c44df53b57ff0785351c2dfcb2d72964621db254f59f05,2024-07-11T15:06:18.893000 -CVE-2024-40037,0,0,a1e4fa50992969a69ef78238be5cac21afb6cd0a6f24b8f0651228dd966ce554,2024-07-22T20:02:15.483000 +CVE-2024-40037,0,1,2d899b3fa53128c3e0828bae5405b00736eb922f939f2e370cb4ad0c7f6bd239,2024-08-01T13:56:49.230000 CVE-2024-40038,0,0,ecdf63429f82782f035ce89230520009ed797d648fa3a25bb6b29a0e8623d9cb,2024-07-11T15:06:19.697000 CVE-2024-40039,0,0,e210b5ff95f4cbe50930111bbfa1727a53319595db825c61fbcbca8d251a4c44,2024-07-22T20:03:06.900000 CVE-2024-4005,0,0,c6431725b361c692c2081e15add247d989dabd0c1a3e21944208c69fc167e5bf,2024-07-29T16:35:52.363000 @@ -255671,14 +255672,14 @@ CVE-2024-4009,0,0,26a6ec4a10b164e2f280e8681d4c21dd6301b3a45dfa2578f28e720f7416c2 CVE-2024-40094,0,0,5d1ab4fa5a1484beb0714ef3fcebe3147b446e4d722942df6d84c0a1bd2dd7f2,2024-07-30T13:32:45.943000 CVE-2024-4010,0,0,6f96a951ba4d658f2d216c10726beef3ec3f9c518875bc1c492ed89999ff3fc2,2024-05-15T16:40:19.330000 CVE-2024-4011,0,0,3791d0b8fb3f4c8257f00293727675eba680b52984c90b375af59f25fe8844d5,2024-06-28T13:21:27.280000 -CVE-2024-40110,0,0,418f673a852b7bdb4f78ad41a2b0b3f2ec6f2c18daedda80c4124681891eaca1,2024-07-12T19:04:57.907000 -CVE-2024-40116,0,0,0c7e7b0568affa3e4410b322c8eab606e8c4772c0e0ee71e9f4e3c64679d6b62,2024-07-29T14:12:08.783000 -CVE-2024-40117,0,0,6cdc5881a232d9fa2e01bff9809c9f6c9461863f050c9260fd506d39de8b6dae,2024-07-29T14:12:08.783000 -CVE-2024-40119,0,0,aa3f22f2b45cca59856fa60c50a815719d2780bf42b0db28717c574ce736ba97,2024-07-18T12:28:43.707000 -CVE-2024-40129,0,0,ff07d2c16c2d7f391b26147b4d490409bfa9117fc71e9ac1a4c2f99b87b4353c,2024-07-17T13:34:20.520000 +CVE-2024-40110,0,1,68d861d5d10a023f1915f02afcd75d8882ae33a201769ba967017148b1a5c0b1,2024-08-01T13:56:50.340000 +CVE-2024-40116,0,1,eb70c9a9b1b545c9ad476d8d1542c9445241ad3bd4f0dd5767e3b25e7e8e8497,2024-08-01T13:56:51.153000 +CVE-2024-40117,0,1,c995513fc31f8c8ab9b7343003983d62c093f801640bdaede808c210dab8c1f8,2024-08-01T13:56:51.860000 +CVE-2024-40119,0,1,684af900644d0baaaf3eeabc10aa1cf28b30369a49ccf90f61c5cecb4e42879b,2024-08-01T13:56:52.650000 +CVE-2024-40129,0,1,19145442d841f5fed93fa84d0b1dc7354c8e13623cff777e7d85508bf432819c,2024-08-01T13:56:53.610000 CVE-2024-4013,0,0,3586550d51b92b0f462ebc695cf4afe7e9f245d08490f98716812b60f3625af2,2024-06-07T14:56:05.647000 -CVE-2024-40130,0,0,e8c5d76bc1438487e9c98dcf68a804e04354d33532c30674477455ae2e09b468,2024-07-17T13:34:20.520000 -CVE-2024-40137,0,0,523b0c1709c59f95d34433c7a849144509142e36af1cee2b6b49fe19ccff9a9b,2024-07-25T12:36:39.947000 +CVE-2024-40130,0,1,f66a8829c405966d3d38c7789744136f333e7f71665ee80940842ffce3fa5547,2024-08-01T13:56:59.047000 +CVE-2024-40137,0,1,4158bade34f096859f58d84cfe190a8d5559ddcf08eebfd1ce97260b054d79c0,2024-08-01T13:57:00.547000 CVE-2024-4014,0,0,b3b1290aefb4c494a91b06e73308720019bcbbd573300060d0dbb0155cbc5507,2024-04-22T13:28:43.747000 CVE-2024-4017,0,0,80bc2cfe2c053bce72096cd358a992628c3c16de9493da95b29bf0e4f3e1b16f,2024-04-22T13:28:50.310000 CVE-2024-4018,0,0,74eaff707843a7b5f103084c6ce08054e0cc1b873b7afe3ef59eb208a28e4429,2024-04-22T13:28:50.310000 @@ -255691,90 +255692,90 @@ CVE-2024-4026,0,0,52171498c993bd60e060ecb310b6ba3adb61d51839677cb6159cb2398bf728 CVE-2024-4029,0,0,07f4a3557bfc1c26259e7db528f531861deb0f132a9070099c7eec2168b5c67e,2024-05-02T18:00:37.360000 CVE-2024-4030,0,0,5921f7a0bad0c927ce4dbb50662fc4a35b1a0000bcf4f0fcdcf8646834ec4372,2024-07-05T16:15:05.520000 CVE-2024-4031,0,0,5f28e8c1b5067aec87f50d97cb32ada2d0e893cae64c0dbc730c44d567aac95b,2024-04-23T12:52:09.397000 -CVE-2024-40318,0,0,76064a0f8effb6d4b5e055e7ecef1c72c0b9ff1e125f96aea44f1996f0e67824,2024-07-26T12:38:41.683000 +CVE-2024-40318,0,1,707e2278ed76999501b0ebe41731bc6c7ce3d362b11b135857b22a4598f749d4,2024-08-01T13:57:01.373000 CVE-2024-4032,0,0,3096efec5a4aac10abf7764e78ac4ae4cb7cabc4d2a57ccc635113d230119926,2024-07-28T14:15:10.783000 -CVE-2024-40322,0,0,9e0e5f7f0965d0ebc33e4a2793beba8c7539aefbe8b3463a17519c41c1cd56fe,2024-07-16T18:00:02.110000 -CVE-2024-40324,0,0,42ba2e9c480b101fd6baf201acbd20948dbfb546f5560ac981356a7b4da905aa,2024-07-26T12:38:41.683000 +CVE-2024-40322,0,1,a76c81072306141a0711326d388940047b2c092bb95977e3631e0053e1780293,2024-08-01T13:57:02.697000 +CVE-2024-40324,0,1,800cbefc1e1a0f1674df7427e869d5b9b9ba12466acb5c50fa044c1ecb6cdfeb,2024-08-01T13:57:04.970000 CVE-2024-40328,0,0,1ecb3aeeb912c43ca654a9972851beb0d9eb6ba5a46f3041ea2c2c60432dd8b1,2024-07-11T15:06:20.507000 CVE-2024-40329,0,0,26b60d9602f8b52b720fff41651ef4092fad02f73b2a1ba0d8eaca9598e4c3e0,2024-07-12T16:11:58.887000 CVE-2024-4033,0,0,100a78a446daab2b380bdb2306f7e35c115de46018456d74b097346d037da090,2024-05-02T18:00:37.360000 CVE-2024-40331,0,0,a7e1077e622b76fb46adc2ebef3eac8337a90cea4e47e0edde2ba336f3b4112b,2024-07-12T16:11:59.747000 -CVE-2024-40332,0,0,cf9209723491a1ebf78408f8fac075af49c787fcd121a7749269bd25ca56cf22,2024-07-31T14:13:02.353000 +CVE-2024-40332,0,1,3469f713de9d5aeaac64a7e7ed3fed59c15cf2d86b8f673108465d3b92e122b0,2024-08-01T13:57:07.730000 CVE-2024-40333,0,0,7e3d2c86e913650fda83b9ed457908dd220d08dc6d50420a52a17a80ec44e7fd,2024-07-11T15:06:21.320000 -CVE-2024-40334,0,0,f45304949c88913a7deaa6ae7a2e79d51d08e4eee95f08d36ce7ec4510c1471c,2024-07-31T14:08:39.863000 +CVE-2024-40334,0,1,7c5139eedfaa7c790c86aa9490dc20d97f552a9ba2b8fc27c6c10365859ea652,2024-08-01T13:57:11.203000 CVE-2024-40336,0,0,a5b75245e4db87e4fc3263aabb369a58a472f30d7c4ce491654a7dc1d23a1d6f,2024-07-11T15:06:22.143000 CVE-2024-4034,0,0,b39ca2e444e8e083e595bb1c45cab5e2a41d75405ee52855e2d6dbb02a011da0,2024-05-02T18:00:37.360000 CVE-2024-40347,0,0,a0e1ab7ebd1605317c59e0767be0fc2f9b4038796f9f62de544553567c87cd93,2024-07-22T13:00:53.287000 -CVE-2024-40348,0,0,e357555384842f864a8fd5da1be4cab7317cd0344625d12f6bd3f7e2d0dc1934,2024-07-22T13:00:53.287000 +CVE-2024-40348,0,1,6f13fda773d8e13c984cf3b16a2d645e0294f8f1764ff4caaca1e99b49b9dc8a,2024-08-01T13:57:13.270000 CVE-2024-4035,0,0,3bb15040ac0c3c22ceadcf3607ee680ed3a99c29170715a5693bcfb82b999cb6,2024-04-25T13:18:02.660000 CVE-2024-4036,0,0,faef85b8ea4d3772643857800ca53857ac0bd4e8c893e27c61e628dc7852637c,2024-05-02T18:00:37.360000 CVE-2024-4037,0,0,835f7b633520c38dc69c5473ca883b788d7739f8c5278809ab72b10ff3489faf,2024-05-24T13:03:05.093000 CVE-2024-4038,0,0,9199a5f679fdf6d4f05942a1d329990ffc0905f3bf6de7561a7af327688cdab4,2024-05-14T16:11:39.510000 CVE-2024-4039,0,0,b18b8aac4336f296c5655f645710463e48a4544089b8c4c20638e847b5c74634,2024-05-14T16:11:39.510000 -CVE-2024-40392,0,0,24aff9cfa4b3c4d20ed420b107a0e9e4a1c46fd98a294b11a12a988b54b034b6,2024-07-17T13:34:20.520000 +CVE-2024-40392,0,1,4fca88dff401a8138459da84bc3f01447997dddad0d6609e6db41057956be98a,2024-08-01T13:57:14.083000 CVE-2024-40393,0,0,9a9cff313cd70f992ba5494f376cc0670f6ad08ca64711bf1142f1c34830e20a,2024-07-17T13:34:20.520000 -CVE-2024-40394,0,0,17c458164baf1b329619113e6ff542879ba6819d1fa6a5d27ed04ca607ebcdcf,2024-07-17T13:34:20.520000 +CVE-2024-40394,0,1,6a6373d6840a53222337e137dc03e4cb2a60579893b62069f0f6025fffca56b3,2024-08-01T13:57:15.033000 CVE-2024-4040,0,0,4c2ad1f11d479d0071ddbaeb3523edde6a0cd9c4e74c065c69d4bb5c9b1ac029,2024-04-26T15:25:47.270000 -CVE-2024-40400,0,0,07057a1f7b768701494a5cbef375b9474ad5cebd94179b17d007f7a5e047ae00,2024-07-22T13:00:53.287000 -CVE-2024-40402,0,0,ea107e33c479f886c634a214935ebe7cdf707506e77c26fcea709812bfb0a8f8,2024-07-18T12:28:43.707000 +CVE-2024-40400,0,1,aec60b9f9f600363c457f651ff723a62cac6ef548b5399a3264322f4567e7220,2024-08-01T13:57:15.850000 +CVE-2024-40402,0,1,8f3b56ab0ece8779de55d2a1e01ca402786b5a92667e8e6ee5b5e922914d1480,2024-08-01T13:57:16.643000 CVE-2024-4041,0,0,bd71d95aba274d30d448ad146bc23c848b8a3b9576dc252f709372f143cb7780,2024-05-14T16:11:39.510000 -CVE-2024-40412,0,0,ee1648a619ace402a2695f357644480cca061a0b71a8c8619f0a343e150121f2,2024-07-15T17:15:02.723000 -CVE-2024-40414,0,0,7114e1eb0309c6239b0d5605233b8fb4e39c03b1b18c8d7010cafeaeb7098b3c,2024-07-16T13:43:58.773000 -CVE-2024-40415,0,0,0348c52dcefb7dc8ccca954766ea8c7cccb77d53827e06fd1ea1a862c8baeb59,2024-07-16T13:43:58.773000 -CVE-2024-40416,0,0,4386d4d60055cd92871a615d38dfc23f49e6e5c935619bdd12bcf3831c2f4785,2024-07-16T13:43:58.773000 -CVE-2024-40417,0,0,298c0304c38ce2a49f170de68fce3e8c26e10c42ce4acaa74e6360f44eab21ad,2024-07-11T13:05:54.930000 +CVE-2024-40412,0,1,6bec7f774fa3844522b88a2194ef0a518564be0031f950daee4cc3a1d2af5bc7,2024-08-01T13:57:17.453000 +CVE-2024-40414,0,1,fcdc956c36814e226b57883ccf81202d4688189c01bf7b34df102e38dbaa7b72,2024-08-01T13:57:18.247000 +CVE-2024-40415,0,1,a0c47364d6486a16147b3432e05d72b198d3cf21f886c1ae4cd9ef0fb9d5cf8b,2024-08-01T13:57:19.517000 +CVE-2024-40416,0,1,e799573b70b14444d8a530d913865c3626e60f2495f8e51f6d842d8c67bf0eff,2024-08-01T13:57:20.773000 +CVE-2024-40417,0,1,9a05e07745aca476d50c027811873493c486a943589d9724ddd22a3e447fb146,2024-08-01T13:57:22.967000 CVE-2024-4042,0,0,96d4041426aa53c8eaed5efb2fa5542195ac0f31740a6b227c0436d63b09d34b,2024-07-18T16:07:41.967000 -CVE-2024-40420,0,0,6e460149a3e6ef0d0e6e77ad5f5ac9ffef80b9a3e82ab52e80f4b03f5aaffd87,2024-07-18T12:28:43.707000 +CVE-2024-40420,0,1,2ce672bf945ade05e673c5c264fcacfa4fe1eb34f378043084ad8fcedfc785b9,2024-08-01T13:57:24.680000 CVE-2024-40422,0,0,2d37092e7db5890d901e271290eadd50cf476f59ec1269ebf05fef9ee8430c08,2024-07-25T17:42:19.727000 -CVE-2024-40425,0,0,ed5ea69d78e69de5a03f2dea647d2c038f05f8f6ff89f420995c2c0d1881d668,2024-07-17T13:34:20.520000 +CVE-2024-40425,0,1,00190f9170b077ba334795fc09138437ec577bc0e167bbe92fc8ad126823e729,2024-08-01T13:57:26.300000 CVE-2024-4043,0,0,50e67cd87d2761034ee2e0514a61b1574f18a654fe271a8568be1eaa53e96b2e,2024-05-24T01:15:30.977000 -CVE-2024-40430,0,0,2231630011786db526cffeb1bf642976df3ff8b02e8160d192fdb7e1106e72ec,2024-07-31T20:15:05.960000 -CVE-2024-40433,0,0,929e905496c7cfc529332d7965d7951189bb169a9a0f47b7e1666248b72bbd4e,2024-07-29T14:12:08.783000 +CVE-2024-40430,0,1,eedecb20be205ec4a87f184af79cc59903e2977c5c4328ba23db8434224d29e2,2024-08-01T13:57:27.417000 +CVE-2024-40433,0,1,e7a4ec9affcd5459ba2865b747a3c21f3af0ec6afc5f3d7573785ee38941782a,2024-08-01T13:57:28.500000 CVE-2024-4044,0,0,e5bbe7519a57f32e10b3da751a3cb9112f45a7270ca309aa6997e34b1ffc6b95,2024-05-14T16:11:39.510000 CVE-2024-4045,0,0,2ae0d8f233b2cc7f6d27d9d81b74b74fd6cc2876f88a425dbeb60d35e4802b53,2024-05-28T12:39:42.673000 -CVE-2024-40455,0,0,31e25278556a7a569f6d48ca8afce7491b76507f09027ad01ea2eacbbf9dde95,2024-07-17T13:34:20.520000 -CVE-2024-40456,0,0,b69676c819bae5d36b3537137bd74debeb1a273fb95e8271fb39d39294f7a466,2024-07-17T13:34:20.520000 +CVE-2024-40455,0,1,2b4af03841b1088e106e2c8470bdfc3454c77a8d4b576f687e8da463b4385ab7,2024-08-01T13:57:29.287000 +CVE-2024-40456,0,1,f1acaf3e46ce38cdd4b72320186132bab37cc38f6f4c796e31eaece0545a5e4c,2024-08-01T13:57:29.487000 CVE-2024-4046,0,0,b162bb54ae31ac06a54238ce430265f513a39f78ee0aa36d5d6ff941168dcdb1,2024-05-14T16:11:39.510000 -CVE-2024-40464,0,0,02d11f89c492e5a76c91a536ba8576e65f499bcdd6a7cbe4f2b24b17de29549b,2024-07-31T21:15:17.640000 -CVE-2024-40465,0,0,32be606c15138b8da85fab8fcbe9462e0fa9a96e145e742db3973b246f06668b,2024-07-31T21:15:17.733000 -CVE-2024-40492,0,0,18603dc677df2f037c3e12bbfcb2354793a3ae9660f3df13b65361dfae39cba9,2024-07-18T12:28:43.707000 -CVE-2024-40495,0,0,6456bfd8d6421111432080f01a619fb5bc5b123a35feabb7a11047ebe3c8edda,2024-07-25T12:36:39.947000 -CVE-2024-40502,0,0,80ad739d30245682b2de314d0692efbae6d0a48cd212ab5565e45a2b6c762b58,2024-07-24T12:55:13.223000 -CVE-2024-40503,0,0,b7b74c3ecc2e3dadce6e3ea76ca2bffcfa4a5e02454bb102e0ec56df0b252cc5,2024-07-17T13:34:20.520000 -CVE-2024-40505,0,0,a786b0d0057f0bbe60b81b592bc5adaae8e017b897b7a005a6c8b1ead930e40f,2024-07-17T13:34:20.520000 -CVE-2024-40515,0,0,aa3af036b6952485bf51fdea15dd678b9b42e4cd0dbbfc73284a7100fad8108a,2024-07-17T13:34:20.520000 -CVE-2024-40516,0,0,33929a2ad2d7026f88314a07f62c32647bbf331a7f7016bb2d76e35f807f6e36,2024-07-17T13:34:20.520000 -CVE-2024-40518,0,0,3a21dbb8196f42ce91600e4072c40ddd279090879561b0355fdd16e16c83c442,2024-07-12T18:45:07.223000 +CVE-2024-40464,0,1,b8422db4e982f0469c67bbba6a962444b3b39327ca8ac025396b7630f763c990,2024-08-01T12:42:36.933000 +CVE-2024-40465,0,1,d569b954c46eadfec617b8af5521a6d6d0b1d3748fd4901e05799d979ced2c67,2024-08-01T12:42:36.933000 +CVE-2024-40492,0,1,887baeb8c822fbf96c83ae7c8317e551b9d380e125d5f646dfb0a8c0719647ab,2024-08-01T13:57:30.260000 +CVE-2024-40495,0,1,0c92b9527f5126e4b4bbf0d1f0a16c194305be9e806244080172bf727ded6b6a,2024-08-01T13:57:31.037000 +CVE-2024-40502,0,1,a7c6a31e5b7af110c861ba07a7795fbcc41db378deead021f902ae7acee4ed3f,2024-08-01T13:57:31.240000 +CVE-2024-40503,0,1,1b06db37464d646561a96f96e7332cfde7dc7941dce27a6167d21314639debe2,2024-08-01T13:57:32.010000 +CVE-2024-40505,0,1,7ece9bf9b6c0e4a275d20059391eb5add095153a9e53affa19425b4d1ec16355,2024-08-01T13:57:32.800000 +CVE-2024-40515,0,1,d91b9531ef5ed5978894d52371df8275215aaf629121566b57a4e661954c33e9,2024-08-01T13:57:33.567000 +CVE-2024-40516,0,1,aed239a0d38ccfd87fd9b80e3f289cfeb35e1a0ac4b960ecd30c2aa738783f2c,2024-08-01T13:57:34.333000 +CVE-2024-40518,0,1,bbc8a85aaa975d14f5cd2cd0045fd3aa844f2bf8933730369940256a4cf29a05,2024-08-01T13:57:35.120000 CVE-2024-40519,0,0,4805aeee8dfd501d943ff50914e99303bf0efec5158d76dccd082d28686dc0ec,2024-07-12T18:44:58.780000 -CVE-2024-40520,0,0,420b09dea00bb9122a10269caf6f94e220da9ebf0c667c3f32e9f2886953a579,2024-07-12T18:44:51.213000 +CVE-2024-40520,0,1,a2ac37b5fe4993386ad0c401ff27a90a4ee5d292a95a31b8ec4196b4a064366b,2024-08-01T13:57:36.063000 CVE-2024-40521,0,0,f750523e60dcc32f0bb9bfafb3982029c7dd27cd5b8886a7de1a46e73ce196a6,2024-07-12T18:44:41.670000 -CVE-2024-40522,0,0,579f766524b419f056c31199a196e117b36a5b319463931fa6ec13f219ef3d56,2024-07-12T18:44:30.100000 -CVE-2024-40524,0,0,6da30a76679ecbcabc1bfe3631b732c1a3051aa64cca509428eb9df73258b440,2024-07-16T13:43:58.773000 +CVE-2024-40522,0,1,8a677ab9989e362511bec3e6f4edb768c909d11d73452c70e9694007bb6c7499,2024-08-01T13:57:36.927000 +CVE-2024-40524,0,1,90f7431206b5ecbb9d18d5d6f346e266df059fa6fac9c7463be67ad7414064c8,2024-08-01T13:57:37.610000 CVE-2024-40535,0,0,4a5d9d0c87f6ae400c205afdbc4f766e452e750a075595a5321b8d7d810f01d1,2024-07-17T13:34:20.520000 CVE-2024-40536,0,0,8e08633375577085d9df665f2d62466b3b6eb1ecb2618a56ac5894fb283b7f3f,2024-07-17T13:34:20.520000 -CVE-2024-40539,0,0,080d97090d0459ec38614d28584348325bf093afa3c6e8c42f1a87faa2576977,2024-07-12T18:43:42.057000 -CVE-2024-40540,0,0,ae96e98af88e0c1ea0d554faeaa2405aac2b6bd18a57b9ad9d4a2d4c80bbfdc6,2024-07-12T18:43:31.003000 -CVE-2024-40541,0,0,eadf8722e21f1651dba0d3e955324388b0c095f2adc44880ac7387e079c2ad3f,2024-07-12T18:43:21.387000 -CVE-2024-40542,0,0,48f50d86855f2b69be5dfa364635fc1a0c369f8540df4395da88b828e7a22927,2024-07-12T18:43:04.377000 -CVE-2024-40543,0,0,930d94032db33c0a5f4fe3bfa4dab56f0df9547c64efff1f120642a6fe131835,2024-07-12T18:42:28.807000 +CVE-2024-40539,0,1,8ebc42c1390ef84ac367ae8d1ba0b0ce9ac095f50c081e4e40b961f1bf0b144d,2024-08-01T13:57:39.077000 +CVE-2024-40540,0,1,812067b26dd7cd753b1d3089300f8704ff38af643d689f8a41629c2d3fffe24f,2024-08-01T13:57:39.867000 +CVE-2024-40541,0,1,0924005bfa6b18955b5d1c308609e405d49e28adff6225e84bba57c602cb3d9b,2024-08-01T13:57:40.763000 +CVE-2024-40542,0,1,5a24ed3623cc3089540df9b4efeff3ddaf2b961a6c731c8074b0155dc9596192,2024-08-01T13:57:41.593000 +CVE-2024-40543,0,1,6de56548e9539fd35ddbcf94ebf696c5eedaaf66bd63dffa72fef47d790c1061,2024-08-01T13:57:42.377000 CVE-2024-40544,0,0,b11c6821abda503696cbef158892a40d6a025bf2029173a7f5b57d1ba3a691ee,2024-07-12T18:42:17.233000 -CVE-2024-40545,0,0,2c0620ce2a075b8fb7b8ed93b625a79dc05a1f81a3486057971ca93863e47ef6,2024-07-12T18:41:43.840000 -CVE-2024-40546,0,0,22327b5ea70b5683dcc2f94f64089084580577d8bdd8b11284c85c7e0abea8c6,2024-07-12T18:41:36.303000 -CVE-2024-40547,0,0,73bf2237f4f923f3054b440b8f81143572653f0a2ed7d3faa197a5928ba6b910,2024-07-12T18:41:18.863000 -CVE-2024-40548,0,0,f762ecee1dd5d8aca31537d239cdf7e3ddee2a39a74e71a4aa321a4bbfad5729,2024-07-12T18:40:53.650000 +CVE-2024-40545,0,1,e7bfa14bde51adc2a97fae11ee7c522957391f979b1403603214908e43fd1749,2024-08-01T13:57:43.260000 +CVE-2024-40546,0,1,a6aff4ccbc5fed58ae362d0ab58160065aa90c1af6384b6ff4230705afc107ca,2024-08-01T13:57:44.057000 +CVE-2024-40547,0,1,22defb160e4c7f12274a24ddf2e70cebc1de112a0c8e178447f698dbbfaff267,2024-08-01T13:57:44.873000 +CVE-2024-40548,0,1,6689ef24c68d7973f97293037ef47aeceac94b372d0a2800eac53ea69b780a87,2024-08-01T13:57:45.097000 CVE-2024-40549,0,0,233222f50e2021cc234ca123579de34b5febd57939b2cfc60f2ae5b89fd9561f,2024-07-12T18:40:33.630000 -CVE-2024-40550,0,0,732a35dff2ccdc3be5e6e8ea83d17c9cac8552621b6cd11e66e2cabe28cf79e2,2024-07-12T18:40:22.040000 -CVE-2024-40551,0,0,da84ba50095934d5f48bd2e600bc08c74774a3740af2cc424af8f71818715a97,2024-07-12T18:40:13.010000 +CVE-2024-40550,0,1,986b262337f3bd79a6dd8832c7988d2da54a080ec5e520979bfc87bc1d9c655a,2024-08-01T13:57:46.093000 +CVE-2024-40551,0,1,ee8d8f0462811b39b8a5ba8157b2ff390f039c6be823449ced570af25f04af79,2024-08-01T13:57:47.573000 CVE-2024-40552,0,0,fac624d1f04b0b98a9cd8524a5d840a9493e340fa09f6b996187a7068b4af462,2024-07-12T18:39:59.150000 -CVE-2024-40553,0,0,f67401182ea2921240a44fee96d7bf60959bbd3ae495f8da74fc2fa4a024ec2e,2024-07-16T13:43:58.773000 +CVE-2024-40553,0,1,afa9cc8ba585f97833ebbbc1af6f978f08034d2ad22bbf83af5e0d8b4f6f6e5f,2024-08-01T13:57:48.930000 CVE-2024-40554,0,0,7f408d6c976ca63a09e947608aac53dcf47e4427189b7fbb0dba2ee7bd325b2c,2024-07-16T13:43:58.773000 CVE-2024-40555,0,0,44ce04ab9d418b7756770fd44203b58128b20e8dfc6428e77d2706cc77d9f460,2024-07-16T13:43:58.773000 CVE-2024-4056,0,0,b8d993c32e0d1df4fc3c3b0df01e5b9a4366d92d1a2ad184a020d404aa44587a,2024-04-26T12:58:17.720000 -CVE-2024-40560,0,0,885c8c46bcc9d242b11ff00568640d31e8526b7b94eab8b6f84ddb49fcdedf5c,2024-07-16T13:43:58.773000 +CVE-2024-40560,0,1,08dc0b5066047c5e119a09d69ea20c085f8549859adcaecbbf38995d7d2e2e54,2024-08-01T13:57:50.440000 CVE-2024-4057,0,0,26b46aa52b04f4ef8890033772544e5e99ad730f84e9e0e97b479cd36cf89ace,2024-07-03T02:07:02.197000 CVE-2024-40575,0,0,267280fd6d1dce9620611aeb1f0d6276db3825fa55e9f5e7fc538f4804a7f026,2024-07-25T17:35:28.913000 -CVE-2024-40576,0,0,f14faefbfbb62dfc67aebb8ee257ac2569928093461cd89df284779e44ef3d22,2024-07-30T22:15:02.417000 -CVE-2024-4058,0,0,e20d454336ea887bbb54d47433e5560889db558189699560ce98773941e9b99e,2024-06-07T15:40:49.707000 +CVE-2024-40576,0,1,8423823b913f3d1284aae2224b689bfefe0b7a1b018e49f904fd4948fdba6a99,2024-08-01T13:57:51.520000 +CVE-2024-4058,0,1,517dff31dd649a4fc97ec9b0700bafce6dc3cd3c4729ffb175a77bfe0097ad6e,2024-08-01T13:59:23.240000 CVE-2024-4059,0,0,c49986e07be30ca2c850f4613369c1702dff21e7018832f61c83284c95e0cc00,2024-05-03T03:16:29.430000 CVE-2024-40594,0,0,5f8b4e7b3001e206c4db42bfb10b66a5767bd1e5041c1bca9998a882526a992d,2024-07-08T15:49:22.437000 CVE-2024-40596,0,0,eba237165708995f6d88799cc22362156aa815eb2255f3ea66a6ad9f417cfe2d,2024-07-09T16:45:08.760000 @@ -255812,7 +255813,7 @@ CVE-2024-40640,0,0,7e1f28a17873c57850e387e604bc4923eccdf39126e84bd67e6dd03b6e2f6 CVE-2024-40641,0,0,522a4579f3ed40c8409e84cbd3831ae35d4e964d4b63997db7ecee22d7238032,2024-07-18T12:28:43.707000 CVE-2024-40642,0,0,52188ba83c5687a42ca6bf3b40cbb605fd36febbce87a10af01b131e81625f9d,2024-07-19T13:01:44.567000 CVE-2024-40644,0,0,8d0ece2aba41191aa8cffc7ae7308207db8244882c164f6563e6a939c3d6015e,2024-07-19T13:01:44.567000 -CVE-2024-40645,0,0,e92df399af3217106cd72ce7f7f4170d4ce648762e85c7848f5e01db4f052a9c,2024-07-31T19:15:11.870000 +CVE-2024-40645,0,1,91dbd6b4d5c8b714c3697263d3de268166c48fc20477a94801ca44bff83f4fff,2024-08-01T12:42:36.933000 CVE-2024-40647,0,0,20e5e587d0777d0bcce77df9be17d322be6b8b310278f85b131c82750480c300,2024-07-19T13:01:44.567000 CVE-2024-40648,0,0,e2349aa5f69c8421d1802e501ed70a5d9670cb28532fa26d74d83879e98ba750,2024-07-19T13:01:44.567000 CVE-2024-4065,0,0,e9243298c32ccba8ab1ac6d427150517ee98217790d2dec0b1b5ec685d8cbc83,2024-06-04T19:20:29.227000 @@ -255825,45 +255826,45 @@ CVE-2024-40690,0,0,288f59aa1afbad71e8a264760a25606f0765322027457660d06b06f122057 CVE-2024-4070,0,0,f50441c69b27e00682c793729b411e41b0ab8839510e28fbeccbd72a35bcaeb5,2024-06-04T19:20:29.567000 CVE-2024-4071,0,0,5f6b5ae6c8e3d6e0ce3e89718b14a6bb17b22a46ae9131966ebec62404b12da9,2024-05-17T02:40:14.747000 CVE-2024-4072,0,0,5325ee2ea26a58f6ec285799bb6ee6c62eeadace5f641482183f3a76d39bf009,2024-05-17T02:40:14.847000 -CVE-2024-40724,0,0,fb90fd9c4085264307b0c993ae2f02cb6fbcc4df6db0c65a6343c3bba2949cb5,2024-07-19T13:01:44.567000 +CVE-2024-40724,0,1,09cacd48ee026a87d6e859ad9d37ad64030a7ce90c870855cdb1fc60a150db71,2024-08-01T13:57:55.270000 CVE-2024-40725,0,0,27ddf61295cd28078b1f9de55f307855293b185f22be05b7367bb4d1ccd08bdd,2024-07-18T12:28:43.707000 CVE-2024-40726,0,0,763881d353b2a872c395d06db8ff47aa2480183ffa56c57536446e062ec43bc5,2024-07-11T15:06:22.967000 CVE-2024-40727,0,0,b9db12f74fa9e60fafdd87d2e3b118721f9da9edf52efc272fb39aa64e4cd584,2024-07-11T15:06:23.850000 -CVE-2024-40728,0,0,d97174880a17752231869c0d95676d772e9b6b0c723f3642cbcef679b7e80f73,2024-07-11T02:59:17.007000 -CVE-2024-40729,0,0,ab9a5f69d2218c381a3d8eb0951f2534776cc72de1841bef50510a4cdbfd408e,2024-07-11T02:59:25.527000 +CVE-2024-40728,0,1,5d2cc4c2d64f07952d89d5ed2b4fa506494bbe43569a964ec30192faf719601b,2024-08-01T13:57:55.770000 +CVE-2024-40729,0,1,30929222ed30a14a1edecbc757d6415c2c4d2181e5ef9da4188d811d67ca8069,2024-08-01T13:57:56.627000 CVE-2024-4073,0,0,c0170a03a635cbc7f2a9d5d26bef9416512b65c3c5b57abb06f8bc6998a6c186,2024-06-20T16:15:14.530000 CVE-2024-40730,0,0,1cc14fb59c6f7d6e2445fb5fa075eb77949d56b0440370270ca4661f8666658c,2024-07-11T15:06:24.660000 CVE-2024-40731,0,0,02c409bee09a11ef6564d0a63d02e90c06f87384bd64c832db96f277238b93c4,2024-07-11T15:06:25.460000 -CVE-2024-40732,0,0,aaac9956c124a2027f493d570ac5f5afb108a8f4e40df7a87b1b5a06d59072c2,2024-07-11T02:57:54.827000 +CVE-2024-40732,0,1,8aa28d39c09f82a7faa4ceab9333933ca15c4239266c5b0e1a7e8364c480dc84,2024-08-01T13:57:57.473000 CVE-2024-40733,0,0,147846d2d1ec183c3c33913a13b1ff875e12029279acc49c2c08b0a482f3df0f,2024-07-12T16:12:00.857000 CVE-2024-40734,0,0,ae67754d2aa8ab2bb99bd190fad26bf8602a907bf15e5ce8d99620aba36af08f,2024-07-11T15:06:26.257000 CVE-2024-40735,0,0,c0e8abbd2165e486ea716f6888f141faa83a5857bfe2e1f37bee6a172e0666c7,2024-07-11T15:06:27.070000 CVE-2024-40736,0,0,f1b462fba073bceb74e6eb24d562b30eda97cf61ccc374bf8b6f02058019995f,2024-07-11T15:06:27.890000 CVE-2024-40737,0,0,5c25c9eed7ed75db9fdc73701f207d2b594740be8aaddbb777a3a080641bcac9,2024-07-11T02:56:03.807000 -CVE-2024-40738,0,0,258771ceb39ad9b08ba5b176b0c2d1e36f1197008ad4f753eaeb7b39c3a5688e,2024-07-11T02:57:13.407000 +CVE-2024-40738,0,1,7e822fe1b46c7ff66063ffc9da9b1840c66f000cde91dada28281857fa6f5172,2024-08-01T13:57:58.327000 CVE-2024-40739,0,0,4b2f3d973ba2f00f373d83ccd1e53a9697f5a21e12783d6291446f254a7898b9,2024-07-11T15:06:28.767000 CVE-2024-4074,0,0,e0d606c18d1f193dcf25e2a451ef5a2bdfc69d8e090f30f7431f35132ae93ac5,2024-05-17T02:40:15.077000 CVE-2024-40740,0,0,b418443d865eec432c82a04de65de6e9b39f235788ff127206843cf6bdb7c8c5,2024-07-12T16:12:01.927000 -CVE-2024-40741,0,0,ddd0ff9476ed1ff47a6c6ea90383139e3fceeb76685fa77b077d9f9786ebe979,2024-07-11T02:54:30.653000 +CVE-2024-40741,0,1,d8d483a0abb3b7648774c6f8d0ea3345aaa4bf40cdd21fdc9df2fcbe837ed8fa,2024-08-01T13:57:59.147000 CVE-2024-40742,0,0,a7b4d8a63cd84bbed8ae36225a2d630607182f2ae3b73228fc1ab3090889f783,2024-07-11T15:06:29.580000 CVE-2024-4075,0,0,29d19ea935c989efa2e770180ba61eb06fe49f0b181d6d812a7498d3145b983a,2024-05-17T02:40:15.170000 CVE-2024-40750,0,0,123c568c4a271c6bb023f9091df0f00fec1f937f3d0585148d7948581d7b9455,2024-07-11T13:06:13.187000 -CVE-2024-4076,0,0,7ee64f09b0da2fe01bba17812fee380056ceda0bf0dd466bf53e03ddfbefda7a,2024-07-31T11:15:10.657000 -CVE-2024-40764,0,0,31190fa168623fbefe72005739844174b20afc4fdab83062110ac517be35c6d0,2024-07-18T12:28:43.707000 +CVE-2024-4076,0,1,3600a7160ba6cb63d73da78d982aeb737757fd1783e0b44697873d9ae49c2d36,2024-08-01T13:59:24.073000 +CVE-2024-40764,0,1,ab85577e2cb5d9a786ef6b191ba8264da7952ad06ab8f1b0e070c99f55710d56,2024-08-01T13:58:00.227000 CVE-2024-40767,0,0,0f0f227d49db4f76a18af060eeadd57ea0ca5da0ccc7bd26ef12905f9453740a,2024-07-30T19:19:40.767000 CVE-2024-4077,0,0,d4f08c4fa42913c8d00f3fecbe96233f1448e9383bf97ebcbeca4cc0f2c8ae2b,2024-04-25T13:18:02.660000 CVE-2024-40774,0,0,f362e44a6513e9a7ad670a01f69c050dc7028489484160824ab1f96f580e42a0,2024-07-30T13:32:45.943000 CVE-2024-40775,0,0,1fdbbe2b554a0166a3b8a0cf31bf852c33e7d8e5242e045fa4d346d0613760b8,2024-07-30T13:32:45.943000 CVE-2024-40776,0,0,fe6350c3b602fe0ddaec428eb9486c5a0abab3145ca6e8b9d06012f2e0f122a7,2024-07-30T13:32:45.943000 -CVE-2024-40777,0,0,f43e59ce93e4fe6c02d4e6e3c90e16332e6ddacf23ec4d2320a1c70a5ee94f68,2024-07-30T13:32:45.943000 +CVE-2024-40777,0,1,cd5278d926d6f988af1dac03f9f51dab9fbf246f9272703e05ee69de8d4e128d,2024-08-01T13:58:01.910000 CVE-2024-40778,0,0,35c17d775b6ae280af3874176f7cf5db440e83e10601c08aee1f4c8e9ab8f216,2024-07-30T13:32:45.943000 CVE-2024-40779,0,0,301c32dc0356a897f3b483a796871246ec04c6946de993df96ed1084affffb32,2024-07-30T13:32:45.943000 CVE-2024-4078,0,0,4f6a573d2d42430a81000704c37318a2f1d7afadf71bcba45d97fec5f925233f,2024-05-16T13:03:05.353000 CVE-2024-40780,0,0,88ccb236d4612b730bba81a246e29c492df839d8f1307be20813fde30010016e,2024-07-30T13:32:45.943000 -CVE-2024-40781,0,0,6c7e5d6b2d578dafa15c0046a380898a623dc251592da0190cadae86d1a7da0f,2024-07-30T13:32:45.943000 -CVE-2024-40782,0,0,0d84d1e9b4cfe93ce7e64dfa66fe95de9a6d507c640c27e602ef53afdc46553a,2024-07-30T13:32:45.943000 -CVE-2024-40783,0,0,06ccda80d3e072821eb06f995fecc86a81e6d5eca70026be9a89e6faaf47c040,2024-07-30T13:32:45.943000 -CVE-2024-40784,0,0,4abf7413a55473e07c7e24dba44811d9467a032d549af8f78af47b1ea2661c75,2024-07-30T13:32:45.943000 +CVE-2024-40781,0,1,cb4f84ce4eadebc47da0b5f5ff07124e4bd80d915060c4c1ff718dd6931fbb24,2024-08-01T13:58:02.880000 +CVE-2024-40782,0,1,df7481defca05955ddebd7ba4fd4f7f033a3cb7779bd31bccd946af5c5220707,2024-08-01T13:58:03.853000 +CVE-2024-40783,0,1,86941936464a3149700244bf744f0d053d8d3ebfb9735c38cfcf426fbad2f6d0,2024-08-01T13:58:04.677000 +CVE-2024-40784,0,1,e38e594a43f301e87ed53b54d6dd79f7976dcdfa626e2977c4678a10ad43a530,2024-08-01T13:58:05.490000 CVE-2024-40785,0,0,a6d92402de4b62b6873214265eb669cc66b99d4fc63ca5fd3609e5d40050a834,2024-07-30T13:32:45.943000 CVE-2024-40786,0,0,2c7f6dba8f18bc43f1ed48a096a2193e90e25fdfa83e9b15e92fb8dcce8b88b9,2024-07-30T13:32:45.943000 CVE-2024-40787,0,0,5fb33d089922e96d0a9f5b028cf20ac8d3e2ca70e7c2ce76064a53e614698def,2024-07-30T13:32:45.943000 @@ -255877,37 +255878,37 @@ CVE-2024-40796,0,0,c23a1544284e1771e366b37ca293d1300a934749161f7b3a0b60a4e49358a CVE-2024-40798,0,0,43fae78b645b01076d8db1dcac0ed8ac018b359532fd4dfd64b640547b38e6d8,2024-07-30T13:32:45.943000 CVE-2024-40799,0,0,01f25f118d6f4f1cfe575e9ec13649b9af5cbed580fba6e50c659efdcf9e0046,2024-07-30T13:32:45.943000 CVE-2024-4080,0,0,6e71df6568bf77146867d1944749c9d0835b7b19c10d04222a53e49f387410f0,2024-07-24T12:55:13.223000 -CVE-2024-40800,0,0,59f27b0ab7803a05f5530f9f14cfef94520ecb9ddc1a7812419a8a3cd03e0683,2024-07-30T15:15:12.693000 -CVE-2024-40802,0,0,67e5b4957ec82f27f15d02eec65643b0d147c36d4aacbed0003784cd6c04b4be,2024-07-30T13:32:45.943000 +CVE-2024-40800,0,1,8982c6397894b1dc7853d99d7f7ed84917fd2baa65d0f955e452134c8e783d29,2024-08-01T13:58:06.780000 +CVE-2024-40802,0,1,2f077053b399c3f7f7833d620863c41648e3e5560dfd43fbc619d567c4540b58,2024-08-01T13:58:07.597000 CVE-2024-40803,0,0,ec6169a8b95e6ddba5b83cef53d59be8e47d612bd153bd8bc2439c4bb67fde37,2024-07-30T13:32:45.943000 CVE-2024-40804,0,0,c588b30d20a2e2021d6911b2c11e2a43eb9e49336357922d2d9441fbaf401dce,2024-07-30T13:32:45.943000 -CVE-2024-40805,0,0,4b264e5ee0f4c049f517b27b96cae5e77c3cc27e7da29931cbb99f70b4d1de2f,2024-07-30T13:32:45.943000 +CVE-2024-40805,0,1,4c83496c1a4cb9a07935586f696b204e1383baaded642bf1ae2b05e48dccd547,2024-08-01T13:58:08.603000 CVE-2024-40806,0,0,cee6c70e2e64610c0680c94d7989f2f85adbaf8a9c5c3baed4039dc5941afe66,2024-07-30T13:32:45.943000 CVE-2024-40807,0,0,5aef189dcb1cabf84707e18643b463121be9beaf274c8762520853076e9cf238,2024-07-30T13:32:45.943000 CVE-2024-40809,0,0,03bbed09a3d4f7b984718adc8bdbb2365a807b7df03d91286ecc5d65b4fb67a6,2024-07-30T13:32:45.943000 CVE-2024-4081,0,0,ec57e0133e64417322d14482f588518f8d5e70bfac2335ec1d22f99346ae0a79,2024-07-24T12:55:13.223000 -CVE-2024-40811,0,0,5761971049a8a1ab041d7fa37aee0f50f67d4d76f78849f2273aeab73202ac93,2024-07-30T13:32:45.943000 +CVE-2024-40811,0,1,58a2466a72dd67097326f2c18b9b99f24e15edfadd201715f3a11dc5fe430f0a,2024-08-01T13:58:09.693000 CVE-2024-40812,0,0,7d329a3036e7c4083349d8e81e3e74e7078d1adfbe1917380813c087ee96bd07,2024-07-30T13:32:45.943000 CVE-2024-40813,0,0,da8a22a1dbc1fe389e6ce3e1f16ddd1cc96f0b70a19396e98754ec581a49847f,2024-07-30T13:32:45.943000 -CVE-2024-40814,0,0,a87d0fe64b0bced18b57a592a25134727ebe5947214b1291f747eb6e2a9c3ad6,2024-07-30T13:32:45.943000 +CVE-2024-40814,0,1,c126f0b9e8e8796d75df680c2e8b06823cba6fa6a03437fea71610eb89801a14,2024-08-01T13:58:10.717000 CVE-2024-40815,0,0,27f7fb67d3f78d38247d08ba5c05aaadf05cc266a3647ad96a64335b9458acb6,2024-07-30T13:32:45.943000 CVE-2024-40816,0,0,96104bac416295c026b71f0dd9f7387a03bec8143c23a25c1e4cb9951f4715ef,2024-07-30T13:32:45.943000 CVE-2024-40817,0,0,29d29aa671094c30851655cd03d9441a3d927e01f2fcb7e20dda4b0089e1f9da,2024-07-30T13:32:45.943000 CVE-2024-40818,0,0,f216f1bc6dad7ff419b41dd87bd7e9308d9e8c4f28ccf6ece61a3f72c52c65e2,2024-07-30T13:32:45.943000 CVE-2024-4082,0,0,02264cef46dbd3bc30b90eb0e358643df5f32c233cd928965c67d2a95fa3306a,2024-05-14T16:11:39.510000 -CVE-2024-40821,0,0,82a79482e204c0bc7a25325bf5f4e34482503d111803210e3f6ec56a75e8c91e,2024-07-30T13:32:45.943000 +CVE-2024-40821,0,1,487abc636b37954dfecb8c888cfc309cb83072f61f6b16a4997ec310f327007f,2024-08-01T13:58:11.907000 CVE-2024-40822,0,0,59d21235b1931165aaad97b436358f0b8058fe6d815884188cf7ad85ca2a9488,2024-07-30T13:32:45.943000 CVE-2024-40823,0,0,4c3873eb01ed37c3e7304b9ae3a64b9f875f953cec32797d1e64a7cde60efef7,2024-07-30T13:32:45.943000 -CVE-2024-40824,0,0,1f003e7da516b85c102f05666cb3ac3f509a5183d28836c9b2b07c8b8653eb5d,2024-07-30T13:32:45.943000 +CVE-2024-40824,0,1,f7238499f6070a1c6bcd15f8bf3e89f1de8d2d27cbbecc98c8a027de77cf1ec1,2024-08-01T13:58:12.907000 CVE-2024-40827,0,0,d332d5a33249856370c0defb2f65802c9bcf97ce0f4d821fddc849357ea19b3a,2024-07-30T13:32:45.943000 -CVE-2024-40828,0,0,ec562a59b4b8b8c49397ab2527ff9563dffa5d7fae6ac8e8441661c612bd4f63,2024-07-30T13:32:45.943000 -CVE-2024-40829,0,0,d5e5de31e185d9faa29a1e09cf1d411f7b29e66b2e9f77eb3dfdb2faa6c65c91,2024-07-30T13:32:45.943000 +CVE-2024-40828,0,1,fb7cd21b5df82c55cfc24f9118f5ae0e27252cbbe3373763d0e4e9ed672ae982,2024-08-01T13:58:13.833000 +CVE-2024-40829,0,1,c1ac2731b87d00e7ad818e3a3bfad11d13fdebdc78388d402863b6006e9d6596,2024-08-01T13:58:14.633000 CVE-2024-4083,0,0,1cd1c6384007aa9a5a8af9731386deec2b0818df508019e87115186ced7033b5,2024-05-02T18:00:37.360000 CVE-2024-40832,0,0,1d8927779687b5067c95f4e7661fbae42aabc32fc532ee44057a2d0818e7be5a,2024-07-30T13:32:45.943000 CVE-2024-40833,0,0,7f5c2e7bdde56a93b9d9b63452e4915b4f0341e04cf0c9e88b27e12802f77dd0,2024-07-30T13:32:45.943000 CVE-2024-40834,0,0,26cb8039d495b0bf720f8adff3eed50604cb929b074bf486731741fd093af784,2024-07-30T13:32:45.943000 CVE-2024-40835,0,0,1fda13e98f1d88b6b6416ce1a9092b46049cd9124935d5fa61742f27038a2518,2024-07-30T13:32:45.943000 -CVE-2024-40836,0,0,f1b11bb007f874ed8b6b727e74373bee4ada8045fd6a53ad75e4061d47fd1663,2024-07-30T13:32:45.943000 +CVE-2024-40836,0,1,3f8d294ac16d143cb335a801addaeae273151ae88e0d093a406c7dfedffe62dd,2024-08-01T13:58:15.220000 CVE-2024-4084,0,0,aed2355093521159d48a9084a5a18f34499717e2daefb72a4c03148c5f7b9d24,2024-06-11T16:44:49.090000 CVE-2024-4085,0,0,7aad6a4056b6c332cceb43166a488ef1c1b3002f44d4bee7dddba365a66e15ea,2024-05-02T18:00:37.360000 CVE-2024-4086,0,0,4591112164bebe25a6e3755e5f7d7b3acd1442e1405281bbc9f49b1286c02b38,2024-05-02T18:00:37.360000 @@ -255915,12 +255916,12 @@ CVE-2024-4087,0,0,559dc8fcb531eb7d96e390fa33463b50a20c5a688e8dbefeb3187bf1d2c5f7 CVE-2024-40872,0,0,61b6054f8d04261e92c08a44feec16dc1d8422a97543a2162e5dea5f0a6c8f9d,2024-07-26T12:38:41.683000 CVE-2024-40873,0,0,16fd81fc79820f32ad2e7940b90409fc2d2f9351443634159d6f5e89b93d7b04,2024-07-26T12:38:41.683000 CVE-2024-4088,0,0,61cc31924b86843bbd20c326ef7465dc1aa394b548458b2e1a9fc62c09ede628,2024-06-11T17:11:30.193000 -CVE-2024-40883,0,0,61859aa6fab414abad65f9dc85c1dcac4befa9f30ceca38d208a52e8b953f455,2024-08-01T02:15:02.023000 -CVE-2024-40895,0,0,28ffbfad907ecd6e6665d2dbecd78214d48d230f78fe3bf5c93e6b599c909051,2024-07-30T13:32:45.943000 -CVE-2024-40897,0,0,6abf47f4a62ea89c178f137de2c06b0ad3aa344f78325532ce36c2ccb3219895,2024-07-28T14:15:10.533000 -CVE-2024-40898,0,0,6d797ebcdf9c53e0eade3a2c00a2f7d68b1d101b3405603dd30cc2157b772084,2024-07-18T12:28:43.707000 +CVE-2024-40883,0,1,0a6160f0ee76225af5bb4f01e1f39e69b18667f9149ce3e532d575bbbbc22eb8,2024-08-01T12:42:36.933000 +CVE-2024-40895,0,1,8c1e79c4f9b4c4aa0a454566e9355d762509535d530511413d5b712e02da1fc1,2024-08-01T13:58:15.617000 +CVE-2024-40897,0,1,961e760bbf75aa3c22f4f2524dda55f63ec78f0f1d7997b53bd7e0a1a9dddcac,2024-08-01T13:58:16.503000 +CVE-2024-40898,0,1,d1dec81302f4e54a600dae87bee8bfb9655cc572e1020953c947841130b121a3,2024-08-01T13:58:17.817000 CVE-2024-40899,0,0,e950acc969e56b6fc4b2198a92989ebcef19e4b4c9a9c8ad08fee90da2bba031,2024-07-12T16:34:58.687000 -CVE-2024-4090,0,0,855074d3c79710ef5f4103aa21317adbfbba962b40309ff8b9c00edd41ef92e8,2024-08-01T06:15:02.587000 +CVE-2024-4090,0,1,4fbc3cb59e32c897ee5a0982e197b734d4f1bc3b2aff2257241bf3d3bb27081c,2024-08-01T12:42:36.933000 CVE-2024-40900,0,0,d5b683c8350615b20febf47a29bbffae93edd0a350147e3cd873aa7a5a37926c,2024-07-12T16:34:58.687000 CVE-2024-40901,0,0,e26097fb6f292c0ef621a3948768a962501ab86f3daa859d54d1945bd865aa16,2024-07-12T16:34:58.687000 CVE-2024-40902,0,0,2f7d4ca94747f48550a0025dcb58bda474d1a7adef8eacd89e2d7ec7535468d0,2024-07-24T18:52:23.540000 @@ -255985,7 +255986,7 @@ CVE-2024-40956,0,0,01fdb45f44f8095c8f9389fef0857cd7ac1f55e504ec60f396a8f9e5482a8 CVE-2024-40957,0,0,ba43e6ddc634305a816231c000c7b443548485728739cecf3ba6005f6c02b2f3,2024-07-12T16:34:58.687000 CVE-2024-40958,0,0,c4b20d9cb20e4970bb454dd1d6fa22674e8409df2a8f77cff22e9737b19836ab,2024-07-12T16:34:58.687000 CVE-2024-40959,0,0,e7c156318badfedaa056792bcbefa34231e67bdbb7ed04e052f8e0abfa80614c,2024-07-12T16:34:58.687000 -CVE-2024-4096,0,0,98249a8becfd3e27c8620607799c5baa6c137ada61311c03a31125b73dc16395,2024-07-30T13:32:45.943000 +CVE-2024-4096,0,1,50bdcb96d8146d46d54f79639093726453baeacacf83f329111a9e971fb9861d,2024-08-01T13:59:25.313000 CVE-2024-40960,0,0,751160d4b33ebba5233733016652a802223721da4cc034328232de6ddedfbed0,2024-07-12T16:34:58.687000 CVE-2024-40961,0,0,5ef199da94468b156b51f0574884d9506a4848926b3a11893fee68de8bbf44e4,2024-07-12T16:34:58.687000 CVE-2024-40962,0,0,3d1366142cae87f99bee1d01922e9c3346fad92689b81dead457f2b7f460d17c,2024-07-12T16:34:58.687000 @@ -256134,8 +256135,8 @@ CVE-2024-41095,0,0,f82e882224859de1abafc255576e15c44e6b152c694c24f47569edd94e5f4 CVE-2024-41096,0,0,d489857270af65a71c8869e16e9156c6c6f8ddab5a965ff4723a5cbb7166dae5,2024-07-29T16:21:52.517000 CVE-2024-41097,0,0,58268fc72f08d01bcbeee285e07076a5aa3a451cc1f952059328faf3b59a18ce,2024-07-29T16:21:52.517000 CVE-2024-41098,0,0,0e3bb06817924b091ecd502db6e8d6b8dfedc58f44996ff13dc833ea0ac51b2f,2024-07-29T16:21:52.517000 -CVE-2024-41107,0,0,8900de25677c2ad7075ce083b915bd87b6a95be071804b0852c57c05697761e4,2024-07-19T14:15:06.080000 -CVE-2024-41108,0,0,34cc93314582487bd18b36eb65cc773b14b52de92bdf6f93b4d81494cfbf0427,2024-07-31T19:15:12.110000 +CVE-2024-41107,0,1,915f86d966f5052f8f4738594970b5192d92a928e05127ecefed6fd25d76d731,2024-08-01T13:58:18.103000 +CVE-2024-41108,0,1,85ed787d5fdb79d2575b436efc8870a4af131f715ca3b5b9c0cb8e5676b18e70,2024-08-01T12:42:36.933000 CVE-2024-41109,0,0,6e64213670db8f08136c5da3a157b68e75923efed5e9eb7ffeadc18fa0a3ced8,2024-07-31T12:57:02.300000 CVE-2024-4111,0,0,a3e4bcb39778569b3be84e8d38a6497dbc2fc6b5a3693d9cc21532b8df994ada,2024-06-04T19:20:29.827000 CVE-2024-41110,0,0,73fe8c24dc51cc9ae0d0f228bfd2d081609568fbc3ab82eb1b26156020a860c9,2024-07-30T20:15:04.567000 @@ -256158,21 +256159,21 @@ CVE-2024-4113,0,0,e0d06b1b449a5e3093ad238184a1fc3bb7c021d3199342ed4f77b544765313 CVE-2024-41130,0,0,3261a584e7edf3f3595234f8eb2bc4cb2240cd20df8deb4c9a02d301bb600580,2024-07-24T12:55:13.223000 CVE-2024-41131,0,0,a469b327dab2c70b64323f08923a0a3cc6492c0286887e2f02007c413d21dc21,2024-07-24T12:55:13.223000 CVE-2024-41132,0,0,059caff7cce7231a7c76b300becd4e4b27d779e1effce439666ebf7a5ba8a7a0,2024-07-24T12:55:13.223000 -CVE-2024-41133,0,0,a5a4a3159caddd26c0f915a077a27191a1bfb56c31d18d6814d32ccb9198ea3a,2024-07-25T12:36:39.947000 -CVE-2024-41134,0,0,8fa2334156a39d1ebf7e99e45685034ae3d6b02c155d7c1f1ec7acc21744b79d,2024-07-25T12:36:39.947000 -CVE-2024-41135,0,0,66c622d4a15bea76906fc51ad68d43d1d4fd2725282204f137e1bed500fb2fb7,2024-07-25T12:36:39.947000 -CVE-2024-41136,0,0,020b11b93feff063252b1869b912101e066c5fabc26a5328aa1d1ff14a3e25e0,2024-07-26T13:22:02.033000 -CVE-2024-41139,0,0,c2a251a2d8ce013de552afd9007b026ec32daefafa4c07e9fa41357e3f6a71e5,2024-07-29T14:12:08.783000 +CVE-2024-41133,0,1,ce3ead38014ece3bef261615973570bdead6b2e89f32aae85d89404455f064be,2024-08-01T13:58:20.157000 +CVE-2024-41134,0,1,b774b6f72061ac4c9c311c4197da1e4a9f1d4ccf563d392e6d3a5642539d27f6,2024-08-01T13:58:20.873000 +CVE-2024-41135,0,1,ab6562ed5444edf91b52483668091e684a5544a948bbbda66cdb2112f2157db0,2024-08-01T13:58:21.583000 +CVE-2024-41136,0,1,8f446ea9871083b3a95029887a8da843c2a4ca88057378bb01d114fc26c12217,2024-08-01T13:58:22.270000 +CVE-2024-41139,0,1,bdbde1cdec8d54982e9a23b2fe9e10007aefb60cb58693a874090f6e5b97533d,2024-08-01T13:58:22.960000 CVE-2024-4114,0,0,387f9ca6df27ba000d0f44d990ccd6bb074258bb946c87938379db9652dc0a14,2024-05-17T02:40:15.917000 CVE-2024-41141,0,0,66e666e17c3fd137fec7c9da37ae1ceec042d1fec499bcfa85959d0b047331a3,2024-07-30T13:32:45.943000 CVE-2024-41143,0,0,86895945f47e1361478000a71a2798af8709b921e75a70b1e72755ffb197a147,2024-07-29T14:12:08.783000 CVE-2024-4115,0,0,89bc89df66a101d446d6568b359dec67345256fa579984420e2e2fe7ea4994ac,2024-06-04T19:20:29.937000 CVE-2024-4116,0,0,6ee64e85b69f8f11f599040da371bf02d3a94742e1ecd0f467d9a48f26243458,2024-05-17T02:40:16.110000 CVE-2024-4117,0,0,439d2da59fd01a25f254df6698027149837f261eb1a16ba5752d7e62667d1bfc,2024-06-04T19:20:30.043000 -CVE-2024-41172,0,0,0992db658aeec6cc556517a4a0ea5e994ada7bd8efa2d18a641187fac4b886ba,2024-07-19T13:01:44.567000 -CVE-2024-41178,0,0,eb51e130885af676333dba0cb4c99b4a91672c03f3463e8d2a02df03e636c643,2024-07-24T12:55:13.223000 +CVE-2024-41172,0,1,0087aeb6889d25bdcd58d5c13e74686715f9e0c8b30a01b7278dbe7dddf3fdaf,2024-08-01T13:58:23.907000 +CVE-2024-41178,0,1,5da27e6bd4cfecb3274c0413ac77a628456bf2e70cb97b3347c2830cb191bae8,2024-08-01T13:58:24.173000 CVE-2024-4118,0,0,261b7c2db2db4c5bd0863007ba022afd6141eeb3c40d43094e801a457a5edb93,2024-06-04T19:20:30.147000 -CVE-2024-41184,0,0,5632ca1fe6b4d580f96d1889964128d406f3b607849d31bde6a0492547023118,2024-07-18T14:15:05.137000 +CVE-2024-41184,0,1,fa4c5a6080e5f19b2ed7f8e6a517530efd6b61f0e7f44ef4b7e4a854855a6b91,2024-08-01T13:58:24.370000 CVE-2024-4119,0,0,1787463dab796293e9249fc34f7a40843b12d1d129a7d5ccdb513e5ec2672067,2024-06-04T19:20:30.247000 CVE-2024-4120,0,0,820754c86895fc4e7f3a6d10baae3c2abd537610acf37474f492c12f46cc8b59,2024-06-04T19:20:30.353000 CVE-2024-4121,0,0,62ca255cdda2e26a7a0224389681466727634cf0831afab2f14e58a1cb5bd920,2024-06-04T19:20:30.460000 @@ -256180,99 +256181,99 @@ CVE-2024-4122,0,0,3d81c7d42348f56045cc538515e4a2e136e243adec928773370fb697e11bd2 CVE-2024-4123,0,0,b9879b7d0937c162f61c7aeebe9319c3ee0d2290b23cb569d74c82da57c569d5,2024-06-04T19:20:30.660000 CVE-2024-4124,0,0,a8707e0967c681f9085483c77f4dbcbac39e7eb8e57f061d5b5c7f920dc545dd,2024-06-04T19:20:30.760000 CVE-2024-4125,0,0,16553edd1211e1aa2542535f3455b94ede37886029935c5af09bcd7638ededbf,2024-05-17T02:40:16.937000 -CVE-2024-41253,0,0,ad42f3b2983ab90858c2bd599f2fbd11632f4445ad8fe5685f525a9d19198f7b,2024-07-31T21:15:17.847000 -CVE-2024-41254,0,0,3d18ea7e06a96765debfe59668a3c792fa42a1838e25cddfc87a71ed260e55a1,2024-07-31T21:15:17.940000 -CVE-2024-41255,0,0,4a89030e72b0c007b3c1931622b82c09cf5b3bacda492c4e75dbee34788e1458,2024-07-31T21:15:18.030000 -CVE-2024-41256,0,0,7e35a1caa198ba3d5fbbfcaef95bf7d870c5fe1b716ea9b7ae2ada78462ecffc,2024-07-31T21:15:18.117000 -CVE-2024-41258,0,0,eaad9b5dfb7b73d37bbd886e16ec2afdbeda1d4cfa58c26ce1208e218518f9bf,2024-07-31T21:15:18.200000 +CVE-2024-41253,0,1,1d15e693bee8ec7e0d17946828828bb61ca6ab7c564466339f09f66ca369a555,2024-08-01T13:58:25.153000 +CVE-2024-41254,0,1,36c275048345aafd4967cc99060f3515232aeb1f10e6cea5973173274ac0f1a7,2024-08-01T12:42:36.933000 +CVE-2024-41255,0,1,72d975f0b32f492e5aa2bce9b8d75e7f226418cd097c812655a91c788b7306db,2024-08-01T12:42:36.933000 +CVE-2024-41256,0,1,c34f16195b4d4bb3545971d91a4c69ca4931fba52d2eed97c0ec81a098482150,2024-08-01T12:42:36.933000 +CVE-2024-41258,0,1,96da6905de4964d9057f780018205ee750e98d2e9f0f4e3ec876179acd2f6de3,2024-08-01T12:42:36.933000 CVE-2024-4126,0,0,eeea001e03fa6fec03fbd996718e983ff172445a96f3b74ca8247477394c3911,2024-06-04T19:20:30.860000 -CVE-2024-41262,0,0,ce738faaad1cf4fe3a46b684cb267621394c5324b0241a99ca6d44938f9c0c25,2024-07-31T22:15:02.427000 +CVE-2024-41262,0,1,b0125c90adebb419349391c6ab39d23b656dbb83a694c73a3af619c0173a0ec4,2024-08-01T12:42:36.933000 CVE-2024-4127,0,0,13aabefe1ea17c857d1bb509e28f374ee8245c3658c3b51912d597c1f898ece0,2024-06-04T19:20:30.957000 CVE-2024-4128,0,0,68bc0506eec8fccf6c4228f6f90915fa5b089633c8bc20338b2c6bd4b4236a0b,2024-05-02T18:00:37.360000 -CVE-2024-41281,0,0,67d3a54ff6c69e817d1c4d3304511fe0d1b87ffa7ae182f6c630038b3326bf87,2024-07-22T13:00:53.287000 +CVE-2024-41281,0,1,acd5274a5314a460f4482234d2c8af8da53f6324e375946a6feb8a82983d1186,2024-08-01T13:58:25.943000 CVE-2024-4129,0,0,f2fba94e29dd925b8a56a23f2711717731ea628ca4457222b442fc21c3f8c80a,2024-05-14T16:11:39.510000 CVE-2024-41304,0,0,50eb5d3ccf87bf5dc8e8d40b784bffa46248caaebc645a20bf8eaeddf45f3d43,2024-07-31T12:57:02.300000 -CVE-2024-41305,0,0,5a08c4878b7723cf073e2642459923c4a02b71707aca452d82622bc7b8e3259d,2024-07-31T12:57:02.300000 -CVE-2024-41314,0,0,b51b0e3a4e5d4ef00805134d9c64392d4de8d2322e969183a3b6dc33816f9694,2024-07-24T12:55:13.223000 -CVE-2024-41315,0,0,a68e90aec55f0c153342e794139e84a95b20ef3a1a126ec70584092245e39d47,2024-07-24T12:55:13.223000 -CVE-2024-41316,0,0,c9274bb79d4ba765ad537ccc2706ac76777f5e15d362d310fbcad6af2fafb632,2024-07-24T12:55:13.223000 -CVE-2024-41317,0,0,5f2fa7a3fdee051d8d33c14a57cfa0a14785eb3306635111cfe4d986a4c4b209,2024-07-24T12:55:13.223000 -CVE-2024-41318,0,0,43716bdb586662299e765abf70504c39aeb4e8f84836a086e46d45893e9363c9,2024-07-24T12:55:13.223000 -CVE-2024-41319,0,0,bfb437b42963b0793282d02b7344fad2f16d4a046fba71ec7cf9211564769c72,2024-07-25T17:49:23.857000 -CVE-2024-41320,0,0,c5a875fc50e40098ff2c260c87b7011f6622e714e9083a176560d9c8c9a46cbe,2024-07-24T12:55:13.223000 +CVE-2024-41305,0,1,bbe07ff21c6aa1b3abb394151065d3ba602ed2314d342f1701045f6693566864,2024-08-01T13:58:26.800000 +CVE-2024-41314,0,1,db53d1cfc39af554879f83e26dbe36479a0a26172379fc4a043735d6cb186ac0,2024-08-01T13:58:28.057000 +CVE-2024-41315,0,1,2d4182edc23b3ca5f23da4066941e10349788ef80e0dc9d84cb1c30a4edf0d37,2024-08-01T13:58:28.840000 +CVE-2024-41316,0,1,fdd83ec8e5f08975a0e0f1c308e905edc7588e4137c92360541a6835aa02f708,2024-08-01T13:58:29.627000 +CVE-2024-41317,0,1,52395d4b73d1f3333bd86d331ce69b48cfe0221d866f68e6f5d1a7dd650e810d,2024-08-01T13:58:30.410000 +CVE-2024-41318,0,1,9b1c1d0472f281a532ac7cd9f50c0be0ec0f55b0327046bb10ee1709062e9e40,2024-08-01T13:58:31.180000 +CVE-2024-41319,0,1,1899a3684e8a27d8d6402d107bc11ca910ee14276fc605936dd401557907d526,2024-08-01T13:58:31.957000 +CVE-2024-41320,0,1,6629b2c1bbc9cd1b160b7b0f9c935334633b6b47708e3a65ad0ff69abde9e8ce,2024-08-01T13:58:32.723000 CVE-2024-4133,0,0,809a3aebbf4e63405fb2f0740c9908f3dfcf1d711b93379e5d465ea9e56d3cba,2024-05-02T18:00:37.360000 CVE-2024-4135,0,0,3adddfced77f8fc8630aec5e175734a40783e3f6b247cb0614a312485a8097a3,2024-05-08T13:15:00.690000 -CVE-2024-41353,0,0,eb28485e99fc04c940295b4bbc852576f9e5b9cd8b7cacb16c2b69bd16f209c0,2024-07-29T14:12:08.783000 -CVE-2024-41354,0,0,8c1d8828f857362251a5e5a1d0b683ebba2175ebb66cf07329c7de322e1a91cf,2024-07-29T14:12:08.783000 -CVE-2024-41355,0,0,83cb7382de994257ef8bc2bfb010ee73a48daad00fc6a92ec3bd1c6d060bdae2,2024-07-29T14:12:08.783000 -CVE-2024-41356,0,0,19e5d44532aafd45c3cb4bb559cee31000e13301c37bdbd2c3dc980b4d3e621a,2024-07-29T14:12:08.783000 -CVE-2024-41357,0,0,aea6306ad814dad0c7c98e65f37f3102e87c9d8a2d0b0aa98b9f8ccbc56ed967,2024-07-29T14:12:08.783000 -CVE-2024-41373,0,0,faba6aa181e7ed28d6a9264bd5a1c1775023d9c378dfa5b14af5c928feb087ae,2024-07-29T14:12:08.783000 -CVE-2024-41374,0,0,e48c8bb89e17d7481c67f090fac5cec4d814126e32711b1af36e5042c2423e25,2024-07-29T14:12:08.783000 -CVE-2024-41375,0,0,45db50c4764ed49f024ef600eb42e768f30974d4baa4dd8003d1aefff1e58c37,2024-07-29T14:12:08.783000 +CVE-2024-41353,0,1,283f710ae1d74e1c389a6d83c71bf34f8cb957eca1e713efb25da5fc972611a3,2024-08-01T13:58:33.490000 +CVE-2024-41354,0,1,6f441613a698798917b5e857f890766e0d2b7679cbcf5bdceb5fbd991d62b2f2,2024-08-01T13:58:34.267000 +CVE-2024-41355,0,1,767668ff7ebdee8b739a5a908dea06e5bc0b0c20c93aa5d0d74d6f0af3b47f96,2024-08-01T13:58:35.033000 +CVE-2024-41356,0,1,d47682e9106c793d1fcf2a2f339a3fd1e5f827ed311819123df3924448767650,2024-08-01T13:58:35.803000 +CVE-2024-41357,0,1,0e1eb56990d81b0e95b5da12b2577b60f5c4a370d94ba23fe25086e49a9417c2,2024-08-01T13:58:36.627000 +CVE-2024-41373,0,1,529d42be06af1c8cedd9a8d606fcdb9f3c484729e69057461e74c09cda6cdb4d,2024-08-01T13:58:37.403000 +CVE-2024-41374,0,1,9bef11df38a244f32a4572e98232b7466fb732ad8e92ed12a90e2f30a0970836,2024-08-01T13:58:38.380000 +CVE-2024-41375,0,1,454a14cadb578cd2f6f20f7a0316c6f62edc522562d34d42ff53a951c64bda15,2024-08-01T13:58:39.487000 CVE-2024-4138,0,0,0f7c3171dd014e7915cab9bf533b57ef231d5c30c6ae20f761b745c0767014ec,2024-05-14T19:17:55.627000 CVE-2024-4139,0,0,d53d7324701315788576d545d1c201804fb102fe113eecb6f188d5966156345d,2024-05-14T19:17:55.627000 CVE-2024-4140,0,0,1a159a4a143aac5301b6b2c31977a1ba9c685fc606596154a85964b944248c74,2024-06-10T18:15:36.313000 CVE-2024-4141,0,0,6345d107b3806446cb477db17841c2bd741df862ff110a2cbbd3d3a9945eb29d,2024-04-24T19:58:40.710000 CVE-2024-4142,0,0,15f953d52654601c03ad89c9ea21867b549a2aa12635e109fbf9627466e8a212,2024-05-02T13:27:25.103000 -CVE-2024-4143,0,0,e6d56e099b9443f818cba12ec6584b2ae78b4e2e6fa1554ff08fbd2e8dc736a0,2024-07-16T13:43:58.773000 +CVE-2024-4143,0,1,3e703fdfd0a07e589cb7985eb968c1c228e0bf41a25245c7c0c730d1481e87d2,2024-08-01T13:59:25.697000 CVE-2024-41437,0,0,e389b50aa4d5a29958eacacc1cf1faf0204fd6cb11cd0999a5af2bb030d46651,2024-07-31T12:57:02.300000 -CVE-2024-41438,0,0,2b53264c16e6e69084c6926e9985e685fcf38ad235a7680584b177e9362b7090,2024-07-31T12:57:02.300000 +CVE-2024-41438,0,1,996a6cc02fa9447bba099c45bfb4b15a572a20ecb18cd6121c0e71f3f9fd5f1a,2024-08-01T13:58:40.670000 CVE-2024-41439,0,0,43b59c8356f4d1c8bf3b4e415610ae4cbbf5c49a8a4d0218f2cf89083ef134a7,2024-07-31T12:57:02.300000 CVE-2024-4144,0,0,f950a1b03316faa802a71776ce4e62cc15162cc9cec7d4c30c76255605b1c1fc,2024-05-14T19:17:55.627000 -CVE-2024-41440,0,0,23212d7bbc571cacd61fcb160320f57d1479c39c6a45c0cfe7610dd88a7e9f02,2024-07-31T12:57:02.300000 +CVE-2024-41440,0,1,0bba27cb4081a14b1798eb2cddc147a76c07aeb5aeb07d5a7917e7317d9973b7,2024-08-01T13:58:41.773000 CVE-2024-41443,0,0,1be6f511e21ef9a107685136f15f3c2750b611a333337ffc199f4824cee060ab,2024-07-31T12:57:02.300000 CVE-2024-4145,0,0,704254773246494130c81e0600984df247a970411736d475449e315ca595ee9b,2024-07-03T02:07:08.133000 -CVE-2024-41459,0,0,27333ea1f8bbfaac7382ac7849477df0d4e7f0cb54570d7d12028ddbda3304d0,2024-07-26T13:21:21.527000 +CVE-2024-41459,0,1,9640a7afe79b79343a3929c52d836dc236bb14f56157fc3a97eeb523f4182cdc,2024-08-01T13:58:42.827000 CVE-2024-4146,0,0,5bcf92f96755106fd9c198be9e70039e9dbd3f86c15b09e938b03dc5a47e5822,2024-07-19T19:03:00.867000 -CVE-2024-41460,0,0,7b41e015126ea84f96add826ffa11d2bf1edbc7cb161a45faa6eda73665550a5,2024-07-26T13:21:12.487000 -CVE-2024-41461,0,0,b8725f36253bdd87d0a6a27b57492a378ba649232ef08f006051bdbab4753c3e,2024-07-26T13:20:59.047000 -CVE-2024-41462,0,0,5cca13fdb777bef9bcc139a6e4bee85e08eb0fe48f34f8cb672294fbb958a5c3,2024-07-26T13:20:13.453000 -CVE-2024-41463,0,0,5ffed01bee0c2f16e1d285517975523b75b0c41c4c2186cf8e6da26c9a56d2d5,2024-07-26T13:20:00.773000 -CVE-2024-41464,0,0,8763b45981fcf5bb3307d9a65d29c0caef500a8495888458ef7d374f15a4fb59,2024-07-26T13:19:24.927000 -CVE-2024-41465,0,0,f1729d9571b46cfb92e0b5b1b2cd9349ce7bd128f72038d42b32593d5375a087,2024-07-26T13:19:42.807000 -CVE-2024-41466,0,0,acccfeaaaeb856c0b90b16408c477d1f722e4c1e5f5a41c8d6901002e96c51f9,2024-07-26T13:19:11.667000 -CVE-2024-41468,0,0,5de362a201fddac17cefe80acef84c1465684dba9583c0cff7981fa921f42a78,2024-07-26T12:38:41.683000 -CVE-2024-41473,0,0,121f673f65f22784771db844bb0e3b8ad9df94b56963b09d29db472d26b57daf,2024-07-26T12:38:41.683000 +CVE-2024-41460,0,1,c083c888decef1f6a25386395c954e7130328fe40eb807fb48aeb706487a4b23,2024-08-01T13:58:43.920000 +CVE-2024-41461,0,1,29e4ea2e6c0449f9c564b466527c20a02d07c4c6d50d9f1be0a40101bb5592e5,2024-08-01T13:58:44.983000 +CVE-2024-41462,0,1,7dbe5aff525bed125a538ee4652d679dba96e46bb328711bc0224d78949e0a92,2024-08-01T13:58:45.997000 +CVE-2024-41463,0,1,a153f77c3b8e8afae6003ca7f5efd2bc999f5bab94d5319580e03183eccf746b,2024-08-01T13:58:46.833000 +CVE-2024-41464,0,1,fb783471109de1fb41b0e999af63416fe9b60360e3d7ca49fc0b68889080f79c,2024-08-01T13:58:47.627000 +CVE-2024-41465,0,1,f323d3ff7dfebe22b9a686e1b54d79f6e139e7ff43c0da4ee794ccc9ea3058bf,2024-08-01T13:58:48.403000 +CVE-2024-41466,0,1,cab2b0ce626d04e7a0d17b559b41b44cbb63464fd58881e5118e54554df587f2,2024-08-01T13:58:49.187000 +CVE-2024-41468,0,1,21f0d6618404bc4b8ecb466daaeec6866ebdf1c7e4e1ef8ea2e562b6a8c8ab02,2024-08-01T13:58:49.970000 +CVE-2024-41473,0,1,7784a577032db4ff431c324e6d8ed7cddab0215d710776b25bc49d149ce340a9,2024-08-01T13:58:51.243000 CVE-2024-4148,0,0,71d4cc4cd9749254e9c2938609496cfae5673c1a094b971881b54b705d48028f,2024-06-03T14:46:24.250000 CVE-2024-4149,0,0,28fd6853c4bd2a7bfb26cdd043f9abfc9e17f0ae1c9764bac61fec52fa0d04ad,2024-07-02T14:44:29.993000 -CVE-2024-41492,0,0,99c2077a213e0f65a294335ccdb0c65c6a250420405be03860c1fbd393c7f4a6,2024-07-22T13:00:53.287000 +CVE-2024-41492,0,1,b1335de0436b7c8900c341d1fdd3cf687e177ea6dd90614e9aac145917e5dee5,2024-08-01T13:58:52.487000 CVE-2024-4150,0,0,6620986a45cd70dd6d417a583c6a5ddd7d1307e119d46c0f4cd76fea931ab7e8,2024-05-14T16:11:39.510000 CVE-2024-4151,0,0,184358b81eb9acee20577f584c8b5e1a6db85454c76256d1b84c36d7ab6c85e5,2024-05-20T15:17:54.513000 CVE-2024-4152,0,0,36a0d7cfd7ae4093c14018eeecb901f1be03f5ffbcf2f6180fccbe34da83a1ec,2024-06-07T17:15:51.580000 CVE-2024-4153,0,0,3fae78b221751422ac040502ea12520d7ce5149857852489782ffbd186ca2e2d,2024-06-07T17:15:51.640000 CVE-2024-4154,0,0,84badb779862aa9714be3b2e958a85563e0b4bd20cc10469a3787dcbbdfc4755,2024-05-22T12:46:53.887000 CVE-2024-4155,0,0,9d1d3f06be4be4f0b611f0b92aa6b48510c05900efdf1b1c24851d7c9581a867,2024-06-11T10:15:13.260000 -CVE-2024-41550,0,0,73faa23d7e9f61ee6d14afcb10e161f1023e371d2565e40e531122de495b55c5,2024-07-25T12:36:39.947000 -CVE-2024-41551,0,0,5cb88400ce94284a770aba9bfce07dc8052041bc333d9aa395311a557860d35c,2024-07-26T13:22:53.920000 +CVE-2024-41550,0,1,6726e0c6849e70c536d9bf6936241acc920718305f74521a185836b6b51898fb,2024-08-01T13:58:53.253000 +CVE-2024-41551,0,1,a47b3d6d1401636bd7731728d6fcb9c38717d9cec4c98b37b50c290693f43ad0,2024-08-01T13:58:54.023000 CVE-2024-4156,0,0,31cc9500838d0dc99d5959700d84ebbac93048893a2eb67f37ed77d13093550c,2024-05-02T18:00:37.360000 CVE-2024-4157,0,0,ac5ec2e690c76b81403cfa49bc63d1a8caa2fb9d97d28a1055398849720db727,2024-05-22T12:46:53.887000 CVE-2024-4158,0,0,9bd0a38e47c5b6d26f1e587737a0ffeb7c251278f38061995fc29ba309646aa6,2024-05-14T16:11:39.510000 CVE-2024-4159,0,0,72a4ec46db1a22f62474bfa22a14f37a28a6ceba3042de92b905fca6cc58c082,2024-04-25T23:15:47.087000 -CVE-2024-41597,0,0,eb9def577bcc4b6ecf02acfc416decd053e8f5ae7063c3b78731aa0cc59ab420,2024-07-22T13:00:53.287000 +CVE-2024-41597,0,1,7bc1c683ecc7754ef9a4accb42f1f9f659f54572a438343a1c4fabae2a9dfaf6,2024-08-01T13:58:54.793000 CVE-2024-41599,0,0,52d9f4b1f84cdbd87aa4f03cf25826582c07238a7b945fcb5013d3d0c82fa936,2024-07-22T13:00:53.287000 CVE-2024-4160,0,0,02cbb5178621697de395e5bf97f83709ae910ce21eba24af27e6bc1b3971ae89,2024-05-31T13:01:46.727000 CVE-2024-41600,0,0,cc0e6e793ee7a69f8fd73fe8ecb147448342f32afe6f179485c22854a24778bf,2024-07-22T13:00:53.287000 -CVE-2024-41601,0,0,0a4c46a9e0b7ae10b4c49205927577ced484b2b5ff2c73162e53448b05b83339,2024-07-22T13:00:53.287000 -CVE-2024-41602,0,0,1008bf55cc85541b699d3ce61768b1dcbe9f1fa0beeed1f78306ea877ed05853,2024-07-22T13:00:53.287000 -CVE-2024-41603,0,0,fea24b2a4f5edef8eed4f92099c55619421eb840f7c5615d183c1e7fc6737204,2024-07-22T13:00:53.287000 +CVE-2024-41601,0,1,bbe6fd3c72d7dad8c522d892fc1c0f9bacbb178b64f66555395886f778d90253,2024-08-01T13:58:55.750000 +CVE-2024-41602,0,1,3aaf8bd0d1359c5ef86792c331ff3b330f01dba788f9b1812b99e2f11e997bba,2024-08-01T13:58:56.507000 +CVE-2024-41603,0,1,274738d202695ad4f9eeac726dd842b3cdc47fbabba17edb5ee76c87292d7f32,2024-08-01T13:58:57.330000 CVE-2024-4161,0,0,818606f25cf93cd94814d58a9247fa25de635b9142e537f83382fb857b8b71ef,2024-04-25T13:18:13.537000 -CVE-2024-41610,0,0,e4d26d9726a27af1232149120aa4519fe9e6ef7658576aa91577c5b2def7516f,2024-07-31T12:57:02.300000 -CVE-2024-41611,0,0,a22b90d4d2b0ec15c5d8caa784408f47189735f1ef6c902a27ba3f996d107a26,2024-07-31T12:57:02.300000 +CVE-2024-41610,0,1,26e6066451c8a71988f997449d51b2538a9517f154afbfa7718a4bd3d7e1adb9,2024-08-01T13:58:58.120000 +CVE-2024-41611,0,1,8ae08bbc5635b26df3869144a2b3bde07b8fa7e9c586a9249f8dfa55a99d468a,2024-08-01T13:58:58.890000 CVE-2024-4162,0,0,1a4f39929c1df6d420ff35b2d8de51a57c5e5378a57b6e7a1a35abc1b5a3dc57,2024-05-08T13:15:00.690000 CVE-2024-41624,0,0,27591d721b6b93bb72ed8c8d8df31fac89dd525c92ee99de3b5ca8f07694b2d0,2024-07-29T16:21:52.517000 -CVE-2024-41628,0,0,5ec8768921bad03bab84b09fc8dfe73d891754e0ae7735ac3fc375a877076401,2024-07-29T14:12:08.783000 +CVE-2024-41628,0,1,d775534a368e8c28faf8473aa0e044dfb71629f7abbcf66e63d176e1f11c5ce7,2024-08-01T13:58:59.747000 CVE-2024-4163,0,0,69022c7df60536fa7bdfb20d2705efebe8d2d6c2c39bf59b2dcb5940921dba2c,2024-07-03T02:07:10.047000 -CVE-2024-41630,0,0,57269ac3ec0c80a5608c74057c3b590e8925efc910a08eb413c32d8f08927c0e,2024-07-31T19:15:12.390000 -CVE-2024-41631,0,0,556c3cf2668f94cda2183cc9edbabc5831345bf61d77fd5cca10bada84a3cde5,2024-07-29T16:21:52.517000 -CVE-2024-41637,0,0,914ac1a2919f9b0b050b2a6e5abe0136c4e506ec6e973a1399ad1331b2ca31d8,2024-07-29T14:12:08.783000 +CVE-2024-41630,0,1,1f68238b8090ad7d80fcdde7844c7b581ff0ac481c35df52ee6c6fce21a269d8,2024-08-01T12:42:36.933000 +CVE-2024-41631,0,1,64089e0a0fdbef62a9df919d7f8440afb5a1d3b3a0dc3fcc6c457b7b45e40639,2024-08-01T13:59:00.513000 +CVE-2024-41637,0,1,55c2ebf6d4e1b5a52e76380fb54fc17a20ca604f4f925dc181c059611f7f9e00,2024-08-01T13:59:00.710000 CVE-2024-4164,0,0,5c582c5408e712b207393008a4bc438580820bad61af8c831d6d320440184b2c,2024-05-17T02:40:17.710000 -CVE-2024-41640,0,0,fed3eaf3690c551e27d7b9f235f7f389febab07cfcd0634e9d386f7f5a990062,2024-07-29T16:21:52.517000 +CVE-2024-41640,0,1,e47a891501f4a329b23b2dbd7c116fd0a7d1e20a1507ac69c43fc4a30ce697d7,2024-08-01T13:59:01.527000 CVE-2024-4165,0,0,1335796556da8c6a778d77814a8f1d84d8c2dc18b70d9de88815783ed1aa0d77,2024-06-04T19:20:31.500000 CVE-2024-41655,0,0,ef3400d9e58c2cde6c539334829c8042d5ee995783a74a46bd16638786b0b6db,2024-07-24T12:55:13.223000 CVE-2024-41656,0,0,d1b3325a39b6b3bcc8a959c5c8544c45c6c0440a0b7279ac0753d809322ad5fb,2024-07-24T12:55:13.223000 CVE-2024-4166,0,0,f698286bcd13839c3e713fc944a2d68390d9d1f07ea9696da7a343bdead6335d,2024-05-17T02:40:17.900000 -CVE-2024-41660,0,0,ed19adf6ac12f56b594e60caf10c4e9fc1206d3955fc7fb91203609c92cfeaa9,2024-07-31T20:15:06.147000 +CVE-2024-41660,0,1,4c084a0db17b15ec343b2b75da4e6745a4156a9dd9381d5cdd96e60eb80314c7,2024-08-01T12:42:36.933000 CVE-2024-41661,0,0,9bb4ba38de23abec768fb88c25fd9926dc19ebbf46e995b3d88e74cabbdda1a3,2024-07-24T12:55:13.223000 CVE-2024-41662,0,0,68f4e8a0a66dc0c20eaffcb6118b9599feda5ec4199c2ca2c10150644161578e,2024-07-25T12:36:39.947000 CVE-2024-41663,0,0,2b5ce53141b2de9b74a60e92e3f30deaac3830f3d557479059cba8f6054aac58,2024-07-24T12:55:13.223000 @@ -256304,15 +256305,15 @@ CVE-2024-41696,0,0,35f7b98c6839466c4d2a4eebac08206f0700aa8aa3101c5b590c4468fe7a3 CVE-2024-4170,0,0,62435f89f96f29247c44c5e589e7b97688efd61a202de53db89b1fe5fd4975dc,2024-06-04T19:20:31.883000 CVE-2024-41701,0,0,dd24aefcbab2e7aed118f6b42dbe2e651c1bc0fc56ceb2d95afa6932def1c843,2024-07-30T13:32:45.943000 CVE-2024-41702,0,0,cdaf376956d976cad8d3300425370c07ba735cd90e9544051b990f59715bdf4d,2024-07-30T13:32:45.943000 -CVE-2024-41703,0,0,a85362978996c7d236f30e97fa16c337a7f9d6be679ddc12fca950c1a606cca0,2024-07-25T16:55:48.747000 -CVE-2024-41704,0,0,da6c19dec91a04b61d02ede6a13562fab5099a10133c7133c2bc4c7b7733b093,2024-07-25T16:55:24.307000 -CVE-2024-41705,0,0,5b6b550b5a007db9c8980f79f04b711a2eae005d4e12fa7f45cc500b763dac47,2024-07-30T20:33:08.920000 -CVE-2024-41706,0,0,57cd8a1a8e4969563144dfc7d6c6c2ead751097b77dd114b3f95f143eff0b546,2024-07-30T20:32:18.270000 +CVE-2024-41703,0,1,41c5e0de4e6f71abb99bf65b9b9d8795b6450a23d530f3b9308a194d3b5a310a,2024-08-01T13:59:05.890000 +CVE-2024-41704,0,1,859a0932f984f671cffc12a925924b508ad9d462f16bdea412375c597ddcb036,2024-08-01T13:59:06.900000 +CVE-2024-41705,0,1,1186e60c4c15e6e9e0b15aecd586260e87327f5da15827cf4d98592a0e7276c8,2024-08-01T13:59:07.983000 +CVE-2024-41706,0,1,eb9574b35e7aa157073ca1f400bb0d0353b8ac2c3e5aea70509848a41f08765e,2024-08-01T13:59:08.790000 CVE-2024-41707,0,0,46c44c2d7564627600555fe5a9d2b2412759a5e55f6187d39d18a309c54891ee,2024-07-30T20:31:59.030000 CVE-2024-41709,0,0,6713bfc73e81c65bc7923627db30413fcbe413ec587fff89449c3abd86e7e93b,2024-07-25T15:22:06.140000 CVE-2024-4171,0,0,87597e8caa4479ab69c883527c35fc22af72d614757313d16953f50dcfa107c2,2024-06-04T19:20:31.980000 CVE-2024-4172,0,0,ae5cefdd41ee745a5f3463347f20f3f77110439c81ed1ad285dedf4b40da1c57,2024-06-04T19:20:32.077000 -CVE-2024-41726,0,0,5d203df137df5c7c028d2640b26e1cb7c09317e0ef803e0b5d0b471759719cc9,2024-07-29T14:12:08.783000 +CVE-2024-41726,0,1,e325c72cd77b10fa79a0c73cd0bce9d67f9472d40dd3ab04f6437f9f2b06b815,2024-08-01T13:59:09.707000 CVE-2024-4173,0,0,47f39f3e8e603eac743ed4815cd724decf015716a2f0d9c17daf4d8fa3affc2d,2024-04-25T23:15:47.240000 CVE-2024-4174,0,0,e168dfb28a2573f66b3120de326c0954bda564c12e3831aed75de7f1338d3089,2024-04-25T13:18:02.660000 CVE-2024-4175,0,0,2f40401bb337bcc37138495e1928fb4d762f69fc829f768d707a278e8a423e1a,2024-04-25T13:18:02.660000 @@ -256350,46 +256351,46 @@ CVE-2024-41836,0,0,447eeb0d32c0b3fbb708b5b9d75636c09225896b7443055b6e14477ceb9e8 CVE-2024-41839,0,0,5fe8ccf2e82b1dbd1e8f5be23a4b35f149d0ed119de3feeae98a9459138645a8,2024-07-24T12:55:13.223000 CVE-2024-4185,0,0,2ebb1e96affd30f65338d1aa453a686ffeaefddcc6c26d6c3c25de17e937fc18,2024-04-30T13:11:16.690000 CVE-2024-4186,0,0,c07cd0df6ca0a9d2dc3c3ba29e1f05004c0a2ac49601b699a13f07e112f9c5ca,2024-05-07T13:39:32.710000 -CVE-2024-4187,0,0,dea5e8e3b95bf669c5bcd679d9eedf1288628cab4edc897488fb57ffbba31c18,2024-07-31T21:15:18.320000 +CVE-2024-4187,0,1,8b8a35fca782012f11c31cffff7d95d2e2a6bd697f135f955d6b79a5a54c5ff3,2024-08-01T12:42:36.933000 CVE-2024-4188,0,0,5459733739e7d5773814c2ce2922cf5b8b26c5398a641d72cfafdd22a4667489,2024-07-31T12:57:02.300000 -CVE-2024-41880,0,0,2045bc24fb104b692bbe32c5951eb01a25f3639f665062ea76ff47318e893861,2024-07-24T12:55:13.223000 -CVE-2024-41881,0,0,dacb56705bd13075a5fc0ecd78dfcda97507df1ba74d6be3b08ddb74fce33a82,2024-07-29T14:12:08.783000 +CVE-2024-41880,0,1,fb22214cf23b63ecac791ad54f65d75460df9fd80fc112c0736bcd80f342f363,2024-08-01T13:59:12.507000 +CVE-2024-41881,0,1,649cc07cf7de21549ce70eef1f2f35714a84b1ff95e773c0e75090d3c6d27c2e,2024-08-01T13:59:13.313000 CVE-2024-4190,0,0,937461468fcd73b26e47070e7d0620ac3009210ef2f47e2156f0b87dd1c21bc4,2024-06-13T18:36:09.013000 -CVE-2024-41914,0,0,3890dc2e9dfadd1c89a9c37c2efa6249276e0e28c3236b40dae7af311b3a8be5,2024-07-25T17:47:35.247000 -CVE-2024-41915,0,0,8a641fe858c485bb296991ad4c80cbb00a19d915010ce8049045ebfd17a28076,2024-07-31T12:57:02.300000 +CVE-2024-41914,0,1,cbc550b915270d7e2f2879c2f4d0216e7f6bd6d1cd3a3c180c2f13327702487c,2024-08-01T13:59:14.250000 +CVE-2024-41915,0,1,79e27d81a466e27de33128fccf775ada519c090b73b4d198c18c4a0be866e968,2024-08-01T13:59:14.947000 CVE-2024-41916,0,0,a0fecd8d5dfc5244c3f03c29349b89d02348a331ee6a39e9fbc76610f4f83ad0,2024-07-31T12:57:02.300000 CVE-2024-4192,0,0,0768e429bccaed861e82d220deefd437e5feb26a94e95c7a121626318970662c,2024-05-01T13:02:20.750000 -CVE-2024-41924,0,0,24158a49c3742b0541bdd3409c983b7d59bb552b3c444ac190659070a374a298,2024-07-30T13:32:45.943000 +CVE-2024-41924,0,1,06cc2d8c551d8fd39f4e2ff31447bb4070ddde2d992cf8f0c8cb1b0035280973,2024-08-01T13:59:15.743000 CVE-2024-4193,0,0,4d4f4fcde78b01b33e30a077c434c1714d01a9ac9cd58d916bc86b963b6ddbd7,2024-05-14T16:11:39.510000 CVE-2024-4194,0,0,cb2c64b568e3bd7c78c9d4f736651c66722818abe246f3bc5aedd70e3521cb96,2024-06-06T14:17:35.017000 CVE-2024-41943,0,0,e9522f5ef1fc490dfac21cbf940a07ce3841f4fb783f1339fe71b8d4141a64db,2024-07-31T12:57:02.300000 CVE-2024-41944,0,0,135d3dced80bc39762656a548dac91a6dee89920c44affdb521ffafdd868d70c,2024-07-31T12:57:02.300000 CVE-2024-41945,0,0,58045736441484d7b962c82a633dc9fabe3d1461c0f6ea954d229d59ebf06f9d,2024-07-31T12:57:02.300000 -CVE-2024-41947,0,0,6b3eda40d039bee05566ead3c841671ae6812b2990bb83f04bb0897dedd43617,2024-07-31T16:15:04.540000 +CVE-2024-41947,0,1,489889ea045ed7e83ddaa8e74cc5bef9c95d6933aa19a93d66e14365f9a47770,2024-08-01T12:42:36.933000 CVE-2024-4195,0,0,1b874e811f63a88fe0e5040c0bc90d160eaa072aa139296a2fc692655a3d77a9,2024-04-26T12:58:17.720000 -CVE-2024-41950,0,0,b5bdcf1e1bca4821b773ae66dee1550bc42a8780157ecff9615d501851a742a8,2024-07-31T16:15:04.797000 -CVE-2024-41951,0,0,4dba82c116beb2a1b335ee516e2f8e90d61944f6cece58aff189233eb35600b4,2024-07-31T20:15:06.357000 -CVE-2024-41952,0,0,6f7523908481a663b4179f664f52c21eaa97674300e8215372125a23ca967e8d,2024-07-31T17:15:10.597000 -CVE-2024-41953,0,0,4ebafda2210f36bf39d39417db17657a6d3368731c96f25439fa25aace4ae549,2024-07-31T17:15:10.850000 -CVE-2024-41954,0,0,25276f34bb342233bde0a75078a3462c93402e493f79056ce1987be88b7da916,2024-07-31T20:15:06.587000 -CVE-2024-41955,0,0,6a9a108bd55b106a79030426b573dbb7f4bdbc624de8cce0d0787f0c42ec11fd,2024-07-31T20:15:06.793000 +CVE-2024-41950,0,1,cb384ef22df022e960189f7f7e44ba5570748379fe4c550a69c77cdcfc6aec43,2024-08-01T12:42:36.933000 +CVE-2024-41951,0,1,910c7c4704e08c3f5b0d889d255d1be4f852c58d3205446fe8bb45ac562a1a8e,2024-08-01T12:42:36.933000 +CVE-2024-41952,0,1,a2a2d5c0bd3ad0150caa88e61ff72fdc96306c7692a8efbe895ab20341c07bae,2024-08-01T12:42:36.933000 +CVE-2024-41953,0,1,3ffcc67e099bb316ff94f5a9cc1845c210666241b20cca92f52aec30809b8fe6,2024-08-01T12:42:36.933000 +CVE-2024-41954,0,1,7e1c97c50037701afdb107f0bb75f0db274cbe7f87c9535fe2f1a7188b860ff2,2024-08-01T12:42:36.933000 +CVE-2024-41955,0,1,205a6735d12138019ffdd3553fd1e252eadb16e3a5329794c0b97ccb4d1299f3,2024-08-01T12:42:36.933000 CVE-2024-4196,0,0,2bee927395e72028cfccdf65300c6a2b8979e20b943a96185278ab936245f10e,2024-06-25T12:24:17.873000 CVE-2024-4197,0,0,45da0b07f911473fe59b939894a184bd20b4010bb74cc514ccd6533e9d15c77b,2024-06-25T12:24:17.873000 CVE-2024-4198,0,0,10694c0c68dfe4c7db6b33a26dfbe4eb44c2b4223bfed9be5285208f068f86b9,2024-04-26T12:58:17.720000 CVE-2024-4199,0,0,fcf36265d6a610d83a178901804339aadd89406ac8a1349d6da6f71c3e13bfe9,2024-05-15T16:40:19.330000 CVE-2024-4200,0,0,4cd240b08c44457e11ab7d0e46f05e7d4edddbc268bf54e61982ff7b6b50f3a4,2024-05-15T18:35:11.453000 -CVE-2024-42007,0,0,aa1494bfd1dd62ef9f320f58e0527e42ae21b7449fffe491126b4c2e2bb9b7d8,2024-07-29T14:12:08.783000 +CVE-2024-42007,0,1,e1546757cdc0e5c84d17bb4943631a838464f4ec8f81323b11df4d863b67b3f8,2024-08-01T13:59:16.630000 CVE-2024-4201,0,0,ee0badf63a3e9c653031fb01c45e3bab9160ffb251dc5a875d128957347bb089,2024-07-18T19:39:50.667000 CVE-2024-4202,0,0,614a40ef1052d861451b397b9533024f5e9aecccff7f20e945fab06926a9f188,2024-05-15T18:35:11.453000 -CVE-2024-42029,0,0,29931b636c2ae66b75600148a5e85bac780c147d1383d5e9d6291c676ad4714a,2024-07-29T14:12:08.783000 +CVE-2024-42029,0,1,b7c83a25bc8a9601f6f3c6ebb603ce94146556b10d1f548176b0b38619ce3b21,2024-08-01T13:59:17.407000 CVE-2024-4203,0,0,52cf8a9be62388459acdc9c8c655685172127a00eca72ac9344c4d8920cfc78f,2024-05-02T18:00:37.360000 CVE-2024-4204,0,0,862cae0d91d079678d989fc30b77e9abff361be6cebd83fcf5dbeecd5c0be203,2024-05-17T18:36:05.263000 -CVE-2024-42049,0,0,7eba2f57d3a276dbf00d87cabc57490646283a84de730e8212d061f3235507c4,2024-07-29T14:12:08.783000 +CVE-2024-42049,0,1,9abf5139ab1afe8d55de5e333c97afa73e09c57ae34abc37f55eb8e975c40df6,2024-08-01T13:59:18.253000 CVE-2024-4205,0,0,3bc679c8856618cb4acfda15e793a18c79adc1e7d27d459136a04f77802a5775,2024-05-31T13:01:46.727000 -CVE-2024-42050,0,0,e16fa6d86de2afc9c09f11895649f7cdcdb7693311bb0d40535896269772cdea,2024-07-29T14:12:08.783000 -CVE-2024-42051,0,0,6223ecbf39e4fcec26e73924d18524fb7507b9d732ddd03108c7cbcfe845770a,2024-07-29T14:12:08.783000 +CVE-2024-42050,0,1,d2a1e67e449aa6326dde0504a879c37570d5ac7e2fe0ffc282ef9a9581af71d3,2024-08-01T13:59:19.083000 +CVE-2024-42051,0,1,75e587ee0cff42a999d58db08aff4f9b0ae6525c9c63a31065f6cf983080e257,2024-08-01T13:59:19.940000 CVE-2024-42052,0,0,af8a8292a6e99512114005b6f9d58ed4fc7c685aefbfc72a703623fe552843f2,2024-07-29T14:12:08.783000 -CVE-2024-42053,0,0,0bd51b2c81d047743bcedc230e7fe8bd32740f85edae45184d65ed8fbe5d905b,2024-07-29T14:12:08.783000 +CVE-2024-42053,0,1,a6062e6a4bcd11b760655238c4a48736a58caa8e1af15eed073e37dfa30638ab,2024-08-01T13:59:21.227000 CVE-2024-42054,0,0,7cefcb5df710c5d52c7b44743e7320cbb773b7864f3adff97191d41734299500,2024-07-29T14:12:08.783000 CVE-2024-42055,0,0,38832abf63aaabdc907feb9726d6725f630aba764b55549d89c565bd77d3378b,2024-07-29T14:12:08.783000 CVE-2024-4206,0,0,094d5b07d12006961f56a1900b69d613595338528ec5cf7d408eb10d270cfa9f,2024-06-11T10:15:13.553000 @@ -256485,7 +256486,7 @@ CVE-2024-42146,0,0,5965ab1472d6386a707c678e04edf7b1fc9b55dd002222344e4b70614b23a CVE-2024-42147,0,0,e2fd4695f400d20f040989dbb1fd9b7b08c61afb65d2c6bfd95fc31d8cbb9fd3,2024-07-30T13:32:45.943000 CVE-2024-42148,0,0,13cdcddb2ea129df068d9b06b785f1e0644e94c99e0171d7d45e772af79f82c0,2024-07-30T13:32:45.943000 CVE-2024-42149,0,0,649ede760b2b7270506bd2e8f6e94a8f5d04fb5a4016b73e8b26514807ad0c08,2024-07-30T13:32:45.943000 -CVE-2024-4215,0,0,e1516bffde121cdd72b9d60979ed7fe6f59f5c9dab0667f7e28a1d0bcbef7063,2024-06-10T18:15:36.443000 +CVE-2024-4215,0,1,9e7e3a04514a4f3c8325efbee683d76ee50f1989bb723741735a5cc60f766fa9,2024-08-01T13:59:27.703000 CVE-2024-42150,0,0,b0367ccbbd7e8c81c36eb7016e076190b057ac84efe63dcc25d8aac079dad32d,2024-07-30T13:32:45.943000 CVE-2024-42151,0,0,fdb3fba7028cbe28580e674b99b9030e1b9e9a62c2e7f59da9e900cf53455fd9,2024-07-30T13:32:45.943000 CVE-2024-42152,0,0,c163a59ce677eb32db9641351d1f6f413c4ffb92aea153eb86185ed0d6ce326a,2024-07-30T13:32:45.943000 @@ -256500,7 +256501,7 @@ CVE-2024-4216,0,0,fba12328dbaabec1dc61fd9a4f006fbf116bfe15b54035daf7cebf0a0d91ce CVE-2024-42160,0,0,661c7f3a2baad2b64cc75ebd9774f195103bf6df864e3003c6042ff07cc7c2af,2024-07-30T13:32:45.943000 CVE-2024-42161,0,0,9fcf740171f87f28186bab23327bb17213289dd63e15061d3ffa98bf7d337652,2024-07-30T13:32:45.943000 CVE-2024-42162,0,0,262dd2df259e037f321ec8a8f04347f229615a9b174bd5f9a755bea1d4b8e483,2024-07-30T13:32:45.943000 -CVE-2024-4217,0,0,9979c68675bcac680eb1a9ec0bfd6c467888186b775eb69528325e0624ef9dea,2024-07-15T13:00:34.853000 +CVE-2024-4217,0,1,b697d32a81a44314e31fbbbd491d72bf1d83730c215f0b4ac0b5c272bbd60693,2024-08-01T13:59:28.453000 CVE-2024-4218,0,0,dff7b6ef5b1eda10e25547a7c58ff59e7141627798ff1eb390bbb04c101af4a9,2024-05-30T13:15:41.297000 CVE-2024-4219,0,0,e67747b1814e30f9a57aa2d5fada7a64c70b8e2f4229bf1bd72194f6b14072cc,2024-06-11T17:06:50.963000 CVE-2024-4220,0,0,046e30c2acea51afb217826bab01d9bc8062f3ae27d0f03889e044f9dcbfad10,2024-06-11T17:05:35.203000 @@ -256515,11 +256516,11 @@ CVE-2024-42229,0,0,36cc6538a49438424165de83459803117419e403bec726ebc7859e65ec89d CVE-2024-4223,0,0,a9cdfeab1a1d35d41a694125f4f4f3203fe0cd94da938f50193ff10f6450cc4d,2024-05-16T13:03:05.353000 CVE-2024-42230,0,0,489de0c942b162ae04db8d65286f120a7fa8b9f22ca14fe8139d983112a4bb74,2024-07-30T19:32:51.137000 CVE-2024-42231,0,0,10724278b1403d9010315b9b102a7133e512f19dc0258e17964781455ceff0fb,2024-07-30T19:30:52.427000 -CVE-2024-4224,0,0,1072ade5e61d4673e4fde8d68c377ed60a4f449367391001c4ccc215a9b54b17,2024-07-16T13:43:58.773000 +CVE-2024-4224,0,1,e1cf2ae7cdc88422eca01167991edf26a4949e3c9b9aa4ed5e8cc28f6acda13c,2024-08-01T13:59:28.640000 CVE-2024-4225,0,0,91f68c0336340065fb4af26f099ffa4f82ba2dd159bb3bc13f7cb1abcd1de276,2024-04-30T13:11:16.690000 CVE-2024-4226,0,0,5a1ca6b12b6f72b0f4206f29fce66dc2868959ed888bfbcbc74131b5725a94eb,2024-04-30T13:11:16.690000 CVE-2024-4228,0,0,22331e972270e81a8a4d9238da77e1f1eab8644e20c13e517da1e3ed609f3be8,2024-06-27T12:47:19.847000 -CVE-2024-4231,0,0,9e85261a0473315903a17e88cb6b28ea1ba375a8351986b0c96a3e1bfd0bd0b4,2024-06-05T13:15:12.980000 +CVE-2024-4231,0,1,c87a42b4dfede9046d13b34e260c0c7ec4e51f68f0fbfb8755010b78e39f405d,2024-08-01T13:59:28.843000 CVE-2024-4232,0,0,d86181ca34c980ccca9d603012d25d1fd9d02a5c899c7483f16d67878d54942c,2024-07-03T02:07:15.740000 CVE-2024-4233,0,0,e3336c43dd885f8db6271cd8e49f7796169d1b724e733d53d39e8dcd56cab238,2024-05-08T17:05:24.083000 CVE-2024-4234,0,0,18c98986f4d0c323ca7a76881b57d07f11d740fced15b647da44016411c790ed,2024-04-26T15:32:22.523000 @@ -256527,7 +256528,7 @@ CVE-2024-4235,0,0,f578447debade3af3e230e69e9dbc9d9ff3e97fecc115950bd6af5b863fac2 CVE-2024-4236,0,0,e2cdfe0d631cec0094aabd9e613a58fc530f718522481021cb8970e2da56a2c3,2024-06-04T19:20:32.960000 CVE-2024-4237,0,0,c38818d0c288b1eec57a9be9e655b05254cb3f3487787a1ecd91e69d9c20b38c,2024-05-17T02:40:19.580000 CVE-2024-4238,0,0,188cceccdce16b8df034bef32fee010a6dd0f801c6690e1589421c7cadfb521c,2024-06-04T19:20:33.063000 -CVE-2024-42381,0,0,67929a318886658939025fe30015f8740d962559d324d0f43654dab024358ddf,2024-07-31T12:57:02.300000 +CVE-2024-42381,0,1,a5fa1277b5fe346d1dd5469d0c93ac780c7d0547ab1d06a7617c27606bb89aa8,2024-08-01T13:59:22.207000 CVE-2024-4239,0,0,cecc2be82896f12bf6cdae75a3b125d58c075d387f3da865cfaf565a2c454897,2024-06-04T19:20:33.163000 CVE-2024-4240,0,0,c278b752586c1bf53091999087140c7ddb924945ab9e2c19f82d090171b2b4e6,2024-06-04T19:20:33.263000 CVE-2024-4241,0,0,1e8cfaace7e8ae3194846b1351a77e14aef6cd3a07b429e780198fa55ccad7c3,2024-05-17T02:40:19.957000 @@ -256548,7 +256549,7 @@ CVE-2024-4255,0,0,35fd058a4cc0a80e19d25400a3e944345c636d8ef400085f905d7b019af7ed CVE-2024-4256,0,0,2885dad709315de5112b738946979afcb06c4d717b1b754bf7bfd87477f08c3d,2024-06-04T19:20:34.517000 CVE-2024-4257,0,0,e0d599f1bfc48408556261adebbc05066e8b6b86cdfabfa8d99484b6710fdc92,2024-05-17T02:40:21.330000 CVE-2024-4258,0,0,cedc452cf08b1d582601f74b54055702e4527b179d19ae6d21e1fa7a35e392d8,2024-06-17T12:42:04.623000 -CVE-2024-4260,0,0,f504c88df229dc577663728ede510f6bee2dbfbf4e978429e1f1b8f63d1071c2,2024-07-24T12:55:13.223000 +CVE-2024-4260,0,1,16d46a0b5bcb66a093fc7ed1472e8a955d65f29368360dc29eff1d3d84145b9b,2024-08-01T13:59:29.547000 CVE-2024-4261,0,0,cad163d5402c8383e323c083e324c4342bcfec07494a0960d776456fb2ab221b,2024-05-22T14:30:41.953000 CVE-2024-4262,0,0,eb43fbaec8efb92a09683be8d89079c39bc088d0014f0d5047c7a435bf15c8e4,2024-05-22T12:46:53.887000 CVE-2024-4263,0,0,ca3576d1d67e220dba5bd29258a281021ffe39453fa0c4f20e91ad0ccbfbb40c,2024-05-16T13:03:05.353000 @@ -256557,10 +256558,10 @@ CVE-2024-4265,0,0,674cb78ce8c95e07c05495b52772b5d4a079c608362a6e67c2dfb567e6b851 CVE-2024-4266,0,0,4e57f554a9a502210e7298e86f8a93b4c9fd8085f966eca22533475a40566a21,2024-06-11T13:54:12.057000 CVE-2024-4267,0,0,b21b1be134b642d147ee55ecb619e0382fab4366c661a291e53904c7941658dd,2024-05-24T01:15:30.977000 CVE-2024-4268,0,0,ed1b7008ff1a2549bc2f685279352d3a8f5b6d435592b2f29fd10fa9328ca71d,2024-07-02T18:08:17.817000 -CVE-2024-4269,0,0,73e6041cf4a57310e0f04dcfcf91795f5ff7b72f95c2da984372d47b5105ce94,2024-07-15T13:00:34.853000 +CVE-2024-4269,0,1,3a0e07c5dbf72b66f7c37e018ba2f8991c2e2b5c26c8f2d595b33767cdbe4e7e,2024-08-01T13:59:29.737000 CVE-2024-4270,0,0,17133812b9c812b17ff2909d738c8b5ae6f8cc2b39eef016edec8cd05359b195,2024-07-29T16:31:09.117000 CVE-2024-4271,0,0,264c116f07aa10a920ca78d5e9c58bba0fe1e2b31cb4f2cfd0a7a609be29751f,2024-07-03T02:07:19.577000 -CVE-2024-4272,0,0,ce3ca6df72e5fcfa2813c6cc0c351ea5c64ae351112c26159db9dbc45c6913e9,2024-07-15T13:00:34.853000 +CVE-2024-4272,0,1,c6d51ebaf4553eb5c8964297a8a6646c1c8e34e58f8be34bef185e25a27d5cec,2024-08-01T13:59:29.913000 CVE-2024-4273,0,0,5b125871d487c3efbe3e6c153d4b19bf711348e838f76308254a9b0be85a18c9,2024-06-04T16:57:41.053000 CVE-2024-4274,0,0,75b03607f21ad1e6106012193c68fc94ebbedd9ebdaa49b327f299429c0ef078,2024-06-04T16:57:41.053000 CVE-2024-4275,0,0,c229bc373f94c5248df137d0b0d9ca9d61bf79f845040a419335cc081cba5e27,2024-05-14T16:11:39.510000 @@ -256573,7 +256574,7 @@ CVE-2024-4286,0,0,4b983e074dfcf6df9bba7e92a07b4865c0022e26c41bba4144154cfeae541d CVE-2024-4287,0,0,e4eaa9cc0eedd48e962bf47bbdeb2988e2d50ccd6011525ef3609c758b0c263c,2024-05-20T15:17:54.513000 CVE-2024-4288,0,0,98dba4b61502f5abd6b75fde706ee82a9bae31a5b0be7db458ed8cfdf0d8bfc6,2024-05-16T13:03:05.353000 CVE-2024-4289,0,0,00867bfd0f1ec036543766f70ad029cfafef69b68de16bba7569db7276222c78,2024-05-21T12:37:59.687000 -CVE-2024-4290,0,0,a0f1d337ecc8fd8ba6c08422a48bee4e2c6d31f440620eeab81c74d2e64b47c5,2024-05-21T12:37:59.687000 +CVE-2024-4290,0,1,96468cd9b26f589eaa99a2991d568962f6532fbc65b02b2950965134d65bb1ac,2024-08-01T13:59:30.177000 CVE-2024-4291,0,0,3555454673f17bb302e51e81ea2fe7cd049aabde203c094d5792666ddbcea9c8,2024-07-03T02:07:20.773000 CVE-2024-4292,0,0,3da8afef6eac3f0e74c17cae2760dab77b8f6d77627214b0783fc9bf5f2f59b0,2024-06-04T19:20:35.097000 CVE-2024-4293,0,0,32ea35cbc5ba91cf83ff71be9c2b19347dd1b3b0949ec88573415a66fabe3aec,2024-06-04T19:20:35.203000 @@ -256588,7 +256589,7 @@ CVE-2024-4301,0,0,218172685a71d9dc14b7de60ac62731c757d7801c2c506799e72286e245e5c CVE-2024-4302,0,0,3989b291497fea424d341ee8d50afc238ccc795cfb4606a4430491f615d9ea6b,2024-04-29T12:42:03.667000 CVE-2024-4303,0,0,83a712aebf2d4281174fc319c5a3b5ed1f6b2a8b7c1590974611c884faeb0657,2024-04-29T12:42:03.667000 CVE-2024-4304,0,0,cc036c021f3a6e70e19e6533fc0c5b7e8e9615d68f40d67450c876ce97ebcd8f,2024-04-29T12:42:03.667000 -CVE-2024-4305,0,0,db9656f4418d0c5d2f5e3bd36036b3ff07b429da2ae4e65e160f2a2b980e6144,2024-06-17T12:42:04.623000 +CVE-2024-4305,0,1,3d3b1d1c5c813e5fa60e1eff1163926298ea6a7612f6966e2cad8be591d14008,2024-08-01T13:59:30.377000 CVE-2024-4306,0,0,a2edc9b105cc4a694942681b57dff61f9e5285cc8aec37eba8bdc15814541dcc,2024-04-29T12:42:03.667000 CVE-2024-4307,0,0,9af1fe76e1dfb80a8368bbb3fc69b1f2cbb4fca53c0870243e2c9aa4c3d8390b,2024-04-30T13:11:16.690000 CVE-2024-4308,0,0,63b73a2fc8e8d5be636a84f19daeea12c1e2d5b3b652e500f77934bf4e894f3b,2024-07-03T02:07:22.320000 @@ -256740,7 +256741,7 @@ CVE-2024-4479,0,0,19a5d52fe32f562c79c648f88a021706b773334e3193aa8af739d9d0094fe3 CVE-2024-4480,0,0,f67562e05d6ec09870268aa7f7fb2c1f10d5ffdcd82e1a66baa51eee0cc1551d,2024-06-17T12:42:04.623000 CVE-2024-4481,0,0,c2852db732c7c65c13524ea22e5406663429c55dff3bfe0d5bbffa299f48bbd3,2024-05-14T16:11:39.510000 CVE-2024-4482,0,0,30c719bdf44110f5d77595f668147507c21a010645f412257434e159bd101a38,2024-07-03T18:24:41.627000 -CVE-2024-4483,0,0,7c2f2f414f7785b59ac2c01771e2c432fe1adcacb11caa595e00fa7cf63e85b2,2024-07-29T14:12:08.783000 +CVE-2024-4483,0,1,d9fadea227cf106e149715592d31bb2d237147d959617b97c9049a0f6f95d28f,2024-08-01T13:59:31.397000 CVE-2024-4484,0,0,f8c7c7a90ad9fb2504d28a2d6c05b973f8e6ce86f54104c89b314d37b71fcc46,2024-05-24T13:03:05.093000 CVE-2024-4485,0,0,a27e77eb6786137f1ff33a4e5e44b17657a4b120ca60b51b6c6a25a52d6e7411,2024-05-24T13:03:05.093000 CVE-2024-4486,0,0,ae6967e9ce7769ae98c2cf87c0bc0fbb14e19b3005ed8a961bec51e7089d074a,2024-05-24T01:15:30.977000 @@ -256853,7 +256854,7 @@ CVE-2024-4597,0,0,098adbd2826136caa11e67cd45a2f45f6208425bc1c84711667f353f70d7a2 CVE-2024-4599,0,0,97a585846a1cde14c82c7df8029410945eada1b1651bcc856b8e29367f63ecca,2024-05-07T13:39:32.710000 CVE-2024-4600,0,0,078ff1a3ce0c016ebe4abdef878e85c422e5d3e27f924ee561699d3a699695bb,2024-05-07T13:39:32.710000 CVE-2024-4601,0,0,f0cf92b01a71b6ce5239836875c0fea83fe5cefcc9c9a95787d845c600418862,2024-05-07T13:39:32.710000 -CVE-2024-4602,0,0,ecd22cb78f218c513f9fefdb8d739dc3203d715488f06f81ba0b6e76e450aefe,2024-07-15T13:00:34.853000 +CVE-2024-4602,0,1,2d8504f508e1d4f718d8c666850c307b85c9596de2a8b2f0ab0bc138c9da4ca4,2024-08-01T13:59:32.233000 CVE-2024-4603,0,0,7bca9f2dadfec866e13d2cb237a0cdfb3e7733f93330ed987bf2cce70155b7d1,2024-06-21T19:15:30.783000 CVE-2024-4604,0,0,a39c956f080c616b17936b03ed62fbdee5080806b0deef5fc7741779c0bf0ec7,2024-06-27T12:47:19.847000 CVE-2024-4605,0,0,cc5939dfa5bb0891c69db66e562cc6696594a6a88efe746332f5ec8ead5152ae,2024-05-14T16:11:39.510000 @@ -256898,12 +256899,12 @@ CVE-2024-4651,0,0,745218d04b1207995e3df340bed9abda2dd0952b7a1b22fcaaa17a8ad8b7b0 CVE-2024-4652,0,0,8fd7af949b4c89aa1e5f9f8bc7784e47292323116a1f6a56ecb880f3c410a541,2024-06-04T19:20:44.873000 CVE-2024-4653,0,0,7b6d5c0913690c5b51d844fc9718b4208eaa5f352f244fd41eee7be1add5e3bc,2024-06-04T19:20:44.990000 CVE-2024-4654,0,0,0088d34096b2578204ff98fe71c1f702e4c8866653411407f72fe940a56448df,2024-06-04T19:20:45.100000 -CVE-2024-4655,0,0,9454002d0366291d475d10609592d473b6abd7d2f3e4501568fea4a2c6ce7b89,2024-07-12T16:59:06.710000 +CVE-2024-4655,0,1,95970f39f135367edf16c40c69bbdd98999f38726ef0802da749dedbafaa6dbb,2024-08-01T13:59:32.490000 CVE-2024-4656,0,0,32c9d7e0c2f1168ca7d7381e4fab827ca08fdbd964272924da1671d43db7cf43,2024-05-15T16:40:19.330000 CVE-2024-4661,0,0,f19406aac3e0e4dd229494d2c7f4a9ae6fd94c8256be755b3955222db7d3bf70,2024-06-10T02:52:08.267000 CVE-2024-4662,0,0,42d3ec88d759fc9bf88fc92972e0c9891830916b90a0cdbb0331ad5486f420dd,2024-05-24T01:15:30.977000 CVE-2024-4663,0,0,26abfae0d13c9db7079b41941554710f5ceae1c12961c27d4c50148758e145c4,2024-06-20T12:44:01.637000 -CVE-2024-4664,0,0,4d4aeec2b9d4ae73905aa066e928be5011f1ff91cc6ef5979d75af441c67cdbb,2024-06-28T13:28:06.347000 +CVE-2024-4664,0,1,b622a884dca6c94dd91f571bd68ec3e5e60df69c2ec441187a6010b0dbb54f4f,2024-08-01T13:59:32.680000 CVE-2024-4666,0,0,574e789fc18a09e540199055631026983551e2de180e4487a378ddd991d469a5,2024-05-15T16:40:19.330000 CVE-2024-4667,0,0,5f6a087811f370dc89d31ef88ad63586b7ea4db405d3be18d05609409a87488f,2024-07-12T14:25:13.923000 CVE-2024-4668,0,0,ecbe5c3985983203e802de76c9f88e6fca1078853835be834d70b53a54cc9e61,2024-05-30T13:15:41.297000 @@ -256980,14 +256981,14 @@ CVE-2024-4745,0,0,54a19ac018881ab94cc09206a38557755449249c459a354d473ddea48bafd7 CVE-2024-4746,0,0,764da2d2faf52d5d8b005efc01764a8e4bfb42f0a65f0b328618a43b312322fb,2024-06-12T16:17:42.223000 CVE-2024-4747,0,0,071c88b133efa29a5bceaf4f1781edaa635d35ede69008d4aad9361c37e95f56,2024-05-14T16:11:39.510000 CVE-2024-4748,0,0,dc500bd2c271d3e2932961c6c29606d3774e3a53e6aec567d01cebdb2996b974,2024-06-26T14:07:47.567000 -CVE-2024-4749,0,0,247ef47fe14e2f3c30261b0797a6006095cb7721478ad0f0b62ea1bc828e91a0,2024-06-04T16:57:41.053000 +CVE-2024-4749,0,1,21df5bc0093c94425462a6e59e75544f486b5326a781fcb494e0f25aa2f7ef93,2024-08-01T13:59:33.520000 CVE-2024-4750,0,0,e7d885dbb56d4f9fc74f5666b8e26860ce8baddd6593d5428816201f1663fb5f,2024-06-04T16:57:41.053000 CVE-2024-4751,0,0,5f1e2db972de130f486d048fa3eab5c2507f3622220fae0e4ab8270ea84f4bd1,2024-06-17T12:42:04.623000 -CVE-2024-4752,0,0,f168ba945180fbe043a32a258fdb26c4bd817ecdcef6ee3e8dbf46da0da37e29,2024-07-15T13:00:34.853000 -CVE-2024-4753,0,0,5d474e8f687e7d7ee7f353935d9c97b0087984d14674fcf222b18c206cddfb8a,2024-07-24T19:53:04.617000 +CVE-2024-4752,0,1,6bc9a9ea56288a6bdc9797f778ecc1371bb94f8257819cae6e07cdc5634a3ca3,2024-08-01T13:59:33.713000 +CVE-2024-4753,0,1,9e12d2c068502550c7c14176439a96816e2b604b1703bdae766fcb5d094be144,2024-08-01T13:59:33.903000 CVE-2024-4754,0,0,43efa3a5287d05b500ecfcf4503ad62e1b41a22939150352bf102c1b98a3511a,2024-06-24T12:57:36.513000 CVE-2024-4755,0,0,ca5306e45de4985a027d64d4740785092288eb6abbd1ab6d1fda3377d88d4e7e,2024-07-03T02:08:01.477000 -CVE-2024-4756,0,0,7a7c7dcea53f33130a6f4216bf6b7732e387a0fe149eab2e03fbdb018a1713e2,2024-06-07T14:56:05.647000 +CVE-2024-4756,0,1,56f5675f964fc18dbd2235a67dc0431c0553314b21f097091d5942b6bc7c2044,2024-08-01T13:59:34.090000 CVE-2024-4757,0,0,8697ca9e70d5ba37736a0a67620900f7a3da7cbcb97e29086de20de73cd3bfef,2024-07-03T02:08:02.463000 CVE-2024-4758,0,0,725af37997323245576176c0490558b45926193602683436c3054da734872332,2024-07-03T02:08:02.707000 CVE-2024-4759,0,0,88e594c7c898a4e82a1a8532a1f049d1a9fe25baf60278988c21dabe64f2896b,2024-07-03T02:08:02.923000 @@ -256999,10 +257000,10 @@ CVE-2024-4766,0,0,2055f7e2ec48f00fc79991c0efa64507537f075393b9abe23a04ed1e0c3039 CVE-2024-4767,0,0,ac8fd08be8bf5dfebff2c5bd3958a6b91cd60ea11215d2f819ca56e82a8bdf8b,2024-07-03T02:08:05.290000 CVE-2024-4768,0,0,eca965b33b3bb965dbc6e4fa576e2b459dc24fb57cb15a91596443aba7e291e4,2024-06-10T17:16:33.883000 CVE-2024-4769,0,0,27e569a8d015b1733830e438c3e7532f74e5dc1a595d9d72a9cda524aaf6545e,2024-07-03T02:08:05.617000 -CVE-2024-4770,0,0,d3600e4c84f1649f68ed0810a492763ec6a347290f158881694c68927b072e29,2024-06-10T17:16:34.013000 +CVE-2024-4770,0,1,9501f8bb52643b4bcadd7b11da17e463cda395ec382733177c6b60e7ef1c0b7b,2024-08-01T13:59:34.293000 CVE-2024-4771,0,0,65ecb44d66f4d1dbe0ceedf41bce3009ee95c66c5cee70725cf485ae8cc22e85,2024-07-03T02:08:06.447000 CVE-2024-4772,0,0,49f0c7fc95339e6e98a7cbd8d8849904a773b2a05345b7622006e8647831f13b,2024-05-14T19:17:55.627000 -CVE-2024-4773,0,0,bb49f1ce6cbeec2187c106ad51ce6d8b27eb341507357b83b32fffd3f1790fbc,2024-05-14T19:17:55.627000 +CVE-2024-4773,0,1,451efafbcecc3ef1a9913dd6e3fbbf39d79f9aa10bbe1841409a244ef36a044e,2024-08-01T13:59:35.080000 CVE-2024-4774,0,0,a30e3c0a9681e5745664b5a7d21e43f4931cba5ae0f7ac5d13f7a53db899f70a,2024-05-14T19:17:55.627000 CVE-2024-4775,0,0,e28694f3b8983e1ffd74471dfd44709d0dccce69f1a573f2d66ebeb202246c51,2024-07-03T02:08:07.390000 CVE-2024-4776,0,0,8d62a3fb449cd595ed01f29a43c4395459263028a3240838c3f471dfed40e010,2024-07-03T02:08:08.187000 @@ -257142,7 +257143,7 @@ CVE-2024-4930,0,0,af679b04f9fd8769c21afbd06a19763f2fe78e9326434dadfeea44855b5d14 CVE-2024-4931,0,0,ef61357c988a5b6da4dc964c43221d8effae72407ee13fdf99bc1e0e52699bd9,2024-06-04T19:20:54.543000 CVE-2024-4932,0,0,c4279e0e81804cf3f06e3c52edfd706c295877ccc3771ef54ad83261fb500b37,2024-05-17T02:40:43.357000 CVE-2024-4933,0,0,4d4c0ec531cab6a4561c767f5a9082d29f26ceefaadcc74bb08507bf05ca5d17,2024-06-04T19:20:54.643000 -CVE-2024-4934,0,0,f52144af553eb515dced795070f99e99d77931d910da0436f916f26c1830041a,2024-07-01T12:37:24.220000 +CVE-2024-4934,0,1,fd5d4b9709dde517f56a9aae7369c165c45ceba9bcf88bee680213c2fc56b62f,2024-08-01T13:59:37.220000 CVE-2024-4936,0,0,57d98cc7bad6a70ee7a0bd1071d9387b5f72ac3640a3e6c7a80bb468d65b27c2,2024-06-17T12:42:04.623000 CVE-2024-4939,0,0,02ebdbdecbb04fb797cb0e62af7790a7212959b717e5fa68d9d371341b4150c3,2024-06-11T17:08:33.350000 CVE-2024-4940,0,0,4accffc853c801fe14d0f801549945291e8d9583e559383dea39b767fc7e6ff0,2024-06-24T12:57:36.513000 @@ -257177,7 +257178,7 @@ CVE-2024-4973,0,0,c8cb9b832f42f8b36963a1241c53cb5d648196ebedc5ede632c88d17792d2e CVE-2024-4974,0,0,29381f582adec4042105cf6b841ea7b6d4575f99995b9ea6ba695d777207b6ba,2024-06-04T19:20:56.237000 CVE-2024-4975,0,0,d684ecfff12b84901405d8ee54394b9595e6fb8a06328936509cd0d9c152070c,2024-06-04T19:20:56.337000 CVE-2024-4976,0,0,fc4df77a0f9a74699614d42497ce42eb6f6db7897f4ce74b0071ab4cbdb2d9cf,2024-05-16T13:03:05.353000 -CVE-2024-4977,0,0,6e31181bed7859521b5d24c43841f20e7e1d98c2d18342c3f8f5e654717b6cbe,2024-07-15T13:00:34.853000 +CVE-2024-4977,0,1,f1472b15d6219c627718fd70559881283845ced10173940d62dfa6e1d38696a9,2024-08-01T13:59:37.487000 CVE-2024-4978,0,0,5928c3b846f5437fa931d5f8f8094b6c99b5e796eec27a2a5602f4b07774db40,2024-05-31T16:03:52.247000 CVE-2024-4980,0,0,1d2b61808b4cae121d6a29c34adc83b7ce102dcc100d7578fef807794b8506ae,2024-05-22T12:46:53.887000 CVE-2024-4983,0,0,47e5eccd768078063df4e275a1ffdcd617ddbc2b7b8451c89e2e261cf23ec523,2024-06-27T12:47:19.847000 @@ -257192,9 +257193,9 @@ CVE-2024-4998,0,0,fe1bc994ac10ee97dd90e00ffa3b2211d68ef77cdb160f8aaa68bd1eee2d92 CVE-2024-4999,0,0,b4eb381faf94a34214b2224241fcf2183ad19cc1b2b10e88fb63132439185b3e,2024-05-16T15:44:44.683000 CVE-2024-5000,0,0,78aa4b3aa9bab8131501fa8740489ecb0fe42637a1055cb7cfa2d7935a7c9e42,2024-06-04T16:57:41.053000 CVE-2024-5001,0,0,d13fccabd833b06301db98a96a793d9305ac650b09885bcad3ab7a5e90e7be86,2024-07-23T20:32:50.207000 -CVE-2024-5002,0,0,f7860d79f0c4960d9f9f9b184eddce2d975db46219a58cb625ab73e627c58cc7,2024-07-15T13:00:34.853000 +CVE-2024-5002,0,1,28b740bd033d1abfd76c98a370fcc8a1a0efc6df8c7198f0eedf875190207207,2024-08-01T13:59:37.720000 CVE-2024-5003,0,0,657f01af6ae4ffebd5508957e0a4ee664437c9c42d64fc0c4eaff54aefed6593,2024-07-18T16:18:33.020000 -CVE-2024-5004,0,0,8ad61405010c77384afe101cfdad8fb69bea7d143ef0303370d5103f820274bf,2024-07-25T15:21:18.437000 +CVE-2024-5004,0,1,dbb46916d3eaa00ba190ac36848b4f73f0fcf9ebf3415c8f81f52119cf8e2d54,2024-08-01T13:59:37.913000 CVE-2024-5006,0,0,275a7db4a7750ed7acf4e95109b09b599d0f03c3ae61db2773b61bbc80a38eed,2024-06-11T17:36:24 CVE-2024-5008,0,0,f3aaf1b56a85696455021e99c44b023e10f5e30320f1c5f1ff29548a21b19bae,2024-06-26T12:44:29.693000 CVE-2024-5009,0,0,e5007830320ec10d10aee0ad37c5a929e2247f2929e9cd3c875dca917cc302ee,2024-06-26T12:44:29.693000 @@ -257212,11 +257213,11 @@ CVE-2024-5021,0,0,38505cbaa011793e28d7950a2ea2daf96aac6ed3db846bcaf517334c4dc7fa CVE-2024-5022,0,0,0ed043d616e9fb9347e4abec6b2a3f19c9cd15ea7715d52174611d64d6e50bde,2024-05-20T13:00:34.807000 CVE-2024-5023,0,0,63ebd4218020d01998ceddb622d35154b9496df68f9db12eb6b4711fe09e7d24,2024-05-17T18:36:31.297000 CVE-2024-5025,0,0,5975a4de967bb092ff1a32c8663c734972c139617eb709a92a7c0cc78b284359,2024-05-22T12:46:53.887000 -CVE-2024-5028,0,0,2434e547ff880e5f4d1440f985bfa31001a18577150e93f894f006e11a1cbd54,2024-07-15T13:00:34.853000 +CVE-2024-5028,0,1,6e4747168a055d3478d0389157f1378a0e5efd7245fc9814fa65e0cf7f805db7,2024-08-01T13:59:38.360000 CVE-2024-5031,0,0,5b0fce1eabb88a37a871d927606cb4ca5166c3808ddca60f777848c692bab12e,2024-05-22T12:46:53.887000 -CVE-2024-5032,0,0,2a95b54bef1edd7dfe2c89e4d0c6cc67ca2232060fab200153538d83e47571c3,2024-07-15T13:00:34.853000 -CVE-2024-5033,0,0,c4ed23b4dca3b506656a5ef099d7b8a100d6cb5539f8aab89959b7bc021c6825,2024-07-15T13:00:34.853000 -CVE-2024-5034,0,0,0d4a8359031d086b11823b589f4e442de7bc398d57d6f500531606468b6a3900,2024-07-15T13:00:34.853000 +CVE-2024-5032,0,1,e2dd01f18d9397a3c892e6f9436384b2c9baea7d6f6081290ca836f05f0fc527,2024-08-01T13:59:38.540000 +CVE-2024-5033,0,1,34cd1f889798bbfeb338d8d711a920994993596df17d9daf9b428477bffed7c1,2024-08-01T13:59:38.730000 +CVE-2024-5034,0,1,ecc1ebd0e8a7a2aea01c9ce5ac07669525947175e7e55790f4a8e8a0b317bae8,2024-08-01T13:59:38.920000 CVE-2024-5035,0,0,592ce94ebba91d65c9cac29085dbc465d14be23d13ac08f1e0101f9ce552a856,2024-05-29T05:16:08.793000 CVE-2024-5036,0,0,e97b40bd40cf208c311323e6564cb1ded96d8cc433059436a8705289f1e02a66,2024-06-20T12:43:25.663000 CVE-2024-5037,0,0,83be7d9e40d474e00522a019660e08f36a5a987b9afd708e006787b06f405f23,2024-07-17T05:15:10.567000 @@ -257250,12 +257251,12 @@ CVE-2024-5069,0,0,9472ccb93cc67e368452ccbd7690fcdac2e9c6bf3a0a4c1febdda7b23dc05b CVE-2024-5071,0,0,785631f9585d5c4be650f1d6b68cd50ecc66584beb25a8693cb2019c0e550973,2024-06-26T12:44:29.693000 CVE-2024-5072,0,0,b208332fdeb0349d564f3ae12700e597664b77bbcd409305187f03a8e1be9ee8,2024-05-17T18:35:35.070000 CVE-2024-5073,0,0,84e84c9e85d38ba2ba8fcac94cd632adf73ebd62caf103a5afc104149a6ce671,2024-05-30T13:15:41.297000 -CVE-2024-5074,0,0,5802e9724eb7b9d81b02d2ccb6e64b34861d36b96cbd5e801230bdefb07c7e66,2024-07-15T13:00:34.853000 -CVE-2024-5075,0,0,b3041a73661beb75349966d6692d67e3c108a9afd397e6ef23ad2c7542c5b9df,2024-07-15T13:00:34.853000 -CVE-2024-5076,0,0,de500664b85830a99762c361ee42e0dafcd27a97d527daba96518ab3f706848b,2024-07-15T13:00:34.853000 -CVE-2024-5077,0,0,d82e85da4baf27e19518a40c5d8b25fa39278558fadb2dc40aeb9bb865d12bab,2024-07-15T13:00:34.853000 -CVE-2024-5079,0,0,1ed3e0bf8c36514858baa41d24357a34aba700910531c24d7fce43aded664b25,2024-07-15T13:00:34.853000 -CVE-2024-5080,0,0,04d4f2e8e71a583300ae241d169039e3612a143c25f17bada5d3ddecebba3027,2024-07-15T13:00:34.853000 +CVE-2024-5074,0,1,323ff3e4be9a1a01795a645c087210e0124e3c1100808fef1bff4cc986dff48b,2024-08-01T13:59:39.780000 +CVE-2024-5075,0,1,3a68f5400be3fd65933ca2b54d2fe1b2cd42ebfc5586417b08ab71b3ebef46c2,2024-08-01T13:59:39.960000 +CVE-2024-5076,0,1,de640e02cf3b45a3c273aa587ea62260b6bf3eea8d977ac9f3e7280d3f5d4b40,2024-08-01T13:59:40.143000 +CVE-2024-5077,0,1,58d61679dec16d0807ee3c6d8f70abda23dd3b8ef542c3a47286601f3d544039,2024-08-01T13:59:40.333000 +CVE-2024-5079,0,1,03cab751fae6538cdd3ee0f9a467090b1b9dca8ded972c9a24812d90a2b62ab7,2024-08-01T13:59:40.517000 +CVE-2024-5080,0,1,88ae00b43e12b64ab9ecc2d4c4ea1fe4d89b86d4c131aa05e4a989c5a4e3b207,2024-08-01T13:59:40.707000 CVE-2024-5084,0,0,79705ce3d53f6e7c72da00fccc935c6da44be9bf4354c31cd8528afb5e0a643e,2024-05-24T01:15:30.977000 CVE-2024-5085,0,0,6942e3068671e85a9578eddbb7240c8706dd53cd6ec5670c5d4ddd91c950a30a,2024-05-24T01:15:30.977000 CVE-2024-5086,0,0,cace1182cf9be3136b0c613ecdabc086a9a0b40661f04ebd6e230acc3565cbb0,2024-05-29T13:02:09.280000 @@ -257318,7 +257319,7 @@ CVE-2024-5145,0,0,e9d5b011678068f9e46540aba9b4c166c9546581cf81cda6f6984ec899d8b7 CVE-2024-5147,0,0,67fd758fa3d69d8e32fe541a58ba746107ffb7370fa9ddd99ec9988f56fe738f,2024-05-22T12:46:53.887000 CVE-2024-5149,0,0,35aba13432990695b4ab26ada33d31578be519ff456b8edf807a15027d0b18f5,2024-06-06T14:15:01.960000 CVE-2024-5150,0,0,af277f2642e60b6f0769d64573990279b6b64286b8d76d1359b09a52e223643b,2024-05-29T13:02:09.280000 -CVE-2024-5151,0,0,ad1fc500121b870dcb89d61dc389b45e74c596af15ff84262d6f22aae7a67508,2024-07-15T13:00:34.853000 +CVE-2024-5151,0,1,b696148b4b4d31279fb07ba468cbee496fd48b395a603a703c253d2f424d78b8,2024-08-01T13:59:41.310000 CVE-2024-5152,0,0,0dea7afcd89dc9073df22774961d2668d67dbdb8f03e5c77bf50a81dbd6b306f,2024-07-24T17:58:12.617000 CVE-2024-5153,0,0,5f2ff3d02c80ca958142f9e7cc43ade832c59a768b74da69d608dbd2c4a4a2d6,2024-07-24T17:56:55.923000 CVE-2024-5154,0,0,c37a1c166e2341b63fc43ba0c7b0c57b683b1792a775d103939216c8339749a9,2024-07-17T05:15:10.880000 @@ -257333,9 +257334,9 @@ CVE-2024-5162,0,0,b916c521cfe3c1fb21956086b784f2a8541eeb514496e084206ecc726f921e CVE-2024-5163,0,0,bdc81db4ac58629f980356520760931bcc42aa23cfccd4fdeb3934ec7b891de9,2024-07-03T02:08:37.670000 CVE-2024-5165,0,0,2b7469c3d25cc1e03e7fcca1607bc78daf489d82c018a0fbc4f3b815c328cf85,2024-05-24T01:15:30.977000 CVE-2024-5166,0,0,5c544eab21844e01fabd3874ed7776a55145987bd3a510311ad16f12f33bd2bc,2024-05-22T18:59:20.240000 -CVE-2024-5167,0,0,e70ccfbabc01b8de97ba44009da8fa7086c745b9505b331232e05a93bb886495,2024-07-15T13:00:34.853000 +CVE-2024-5167,0,1,a26d674346a63d8730649864e3fcc22e33fb8b5877ed990bcd49874aef8d8c48,2024-08-01T13:59:41.660000 CVE-2024-5168,0,0,cbe1b6c96aef7b506dd526cf00951c936dfc5233fd9563b4af0bf7fdab7a5899,2024-05-24T01:15:30.977000 -CVE-2024-5169,0,0,c36d8b7f6407d02d652d0c522f83fa9a338fa23e1e1cad8525fa99c95c42571d,2024-06-26T12:44:29.693000 +CVE-2024-5169,0,1,e94c3642004dab2308f178e6d440f07abfcde6589df040d858615c6c86133ac2,2024-08-01T13:59:41.847000 CVE-2024-5171,0,0,dd574bf92e93c62d270c5e3b0cb384556e01dba1d43a5b9db2a02845fa564cb4,2024-07-23T18:09:56.753000 CVE-2024-5172,0,0,b469524ff2309ced9aec08b056578c23e8b8b5248adb8fcea2b38cb214c81275,2024-07-05T14:05:48.213000 CVE-2024-5173,0,0,e808cbd0ff507575dfa32503bcc3a2123c9461298f1a4a4ef8cd294367da6464,2024-06-26T12:44:29.693000 @@ -257435,14 +257436,14 @@ CVE-2024-5276,0,0,b98c8bf623aeff1994feca32cb34066ea8ef6a81fb35099972c112f59613dd CVE-2024-5277,0,0,290f6887dc0b7a5cb6634ba516b540acf0e27f0b1f08e29f3325fcd19c01494d,2024-06-07T14:56:05.647000 CVE-2024-5278,0,0,070492ef57b88214566344e89a28a1f0ef4d4f18184d616c40ab3876a3b57140,2024-06-07T14:56:05.647000 CVE-2024-5279,0,0,2c6d1e53ece85fba55c2b83835d7abf75ca4da167ddbecc0aa984e59d469dd0e,2024-06-04T19:21:04.240000 -CVE-2024-5280,0,0,2c434e69f2189493b6c207c459c071fd464266eb561f5b97487e91b65df05ae3,2024-07-15T13:00:34.853000 -CVE-2024-5281,0,0,060b06867a1a1c8ae3c49fd1bf435135d5f31c9df63d2fac2402a303dd1dcaaf,2024-07-15T13:00:34.853000 -CVE-2024-5282,0,0,0e38a64d94c307cdd25aa8c70504121a3cc6e789cf8bf74fef94d0d9b37394df,2024-07-15T13:00:34.853000 -CVE-2024-5283,0,0,158766c6fc63e1521af07a024c96b4a9ea5b7a8f36231f7ef52200c9bb9d7eae,2024-07-15T13:00:34.853000 -CVE-2024-5284,0,0,4bfe0f5610c04cde5b0cb2c3dc3ab239b1848149dd6bfd8b564acd2ee160cb2a,2024-07-15T13:00:34.853000 -CVE-2024-5285,0,0,55fd3b70b1842834adcee0f33651e06dab8ba1655e35fd2291826710e3112270,2024-07-29T14:12:08.783000 -CVE-2024-5286,0,0,fc7b78be4389acfb6eeeebdbd1c2b2010558b9a0f60282696859e3db27abfc46,2024-07-15T13:00:34.853000 -CVE-2024-5287,0,0,d91964abcbe9a10e4df96379d6411e36555098088be8c568765ee25103481fbe,2024-07-15T13:00:34.853000 +CVE-2024-5280,0,1,86594c27d113c80fe7aa0a775d64720f8f3d823c49f62206ae5f1ae12a324b16,2024-08-01T13:59:43.187000 +CVE-2024-5281,0,1,d8e0f0c592f3cfcf36fc66f961b905d6afba3d53af3789e65e13042755c0a3cb,2024-08-01T13:59:43.367000 +CVE-2024-5282,0,1,d02e51c4b0ee276cbc37162ff12b0d5f63d5cb6622dea90c00e2302f02b5f264,2024-08-01T13:59:43.553000 +CVE-2024-5283,0,1,b38d3b6d84c245f47c02c6b1221c64126cc1590c1b6b303a3d39721ab1dfca67,2024-08-01T13:59:43.747000 +CVE-2024-5284,0,1,a632d154686ad4201398091156d5b5851cc181b1b36b426c7e50520edad6a7e5,2024-08-01T13:59:43.927000 +CVE-2024-5285,0,1,f5fe057b3eff57d7472395b5cf3577db89e74c15c7e806cbb99af18bbf9a648f,2024-08-01T13:59:44.103000 +CVE-2024-5286,0,1,e962fadcb8b0d0d0a4155e18c685e9afa8633703c8403a48cdc3bee697298672,2024-08-01T13:59:44.950000 +CVE-2024-5287,0,1,13c5ee44df7955897b1f2b3c68a920faa26439fbe1c9c489df67cb947fa427e4,2024-08-01T13:59:45.123000 CVE-2024-5289,0,0,a02da373ddf627c39a88f09ba37230dcf191b29c84a32613f97fcb834cd9c524,2024-06-28T13:13:36.980000 CVE-2024-5291,0,0,a73212295ca40d57df3fe276c935be7cf4995dc49a26ea7361780508749e211f,2024-05-24T01:15:30.977000 CVE-2024-5292,0,0,46d8600092b67d78419e8396a0475f44ad2d697d614c735fcdb066f1cf0c44cc,2024-05-24T01:15:30.977000 @@ -257476,8 +257477,8 @@ CVE-2024-5326,0,0,2be4cbe8832da29a051a88af0386c312f2db765fd88a5b2a911937a61354bc CVE-2024-5327,0,0,4827791dbb34368c55d6cd06e5ae60d7938f5b7d8da35d37ecd04c9478388419,2024-05-30T13:15:41.297000 CVE-2024-5328,0,0,389f7ef980e9d16941bc44acc7d327871d53fb707d54ba8870eb280f34f36d8b,2024-07-23T19:41:49.540000 CVE-2024-5329,0,0,de038a5f353969046987a50080542fc21e5e9831f920643fcbf4110d57688954,2024-06-11T17:42:26.677000 -CVE-2024-5330,0,0,aa8b20eb4eca56a764c854b8fd469cf90539949cd0655af41122a9ffc25771b9,2024-08-01T07:15:02.520000 -CVE-2024-5331,0,0,59e680925298e50577f0d849de545a2b68ff077838b33f095a86e2637a604947,2024-08-01T07:15:02.783000 +CVE-2024-5330,0,1,d052f676e850b1a7538b470735e7fe5f7dfb3046b39fa2778831cd7f8fdd99b2,2024-08-01T12:42:36.933000 +CVE-2024-5331,0,1,f05fb229c386046dcd65cdaa4c35f1d7d27dbf88e27984042e1518b076a10077,2024-08-01T12:42:36.933000 CVE-2024-5332,0,0,b929b6d33cd728a86a1419cab1a953f1c1e8520fdf1d886c7808fd1a5444df6e,2024-06-26T12:44:29.693000 CVE-2024-5334,0,0,24408ed0ac6ef1e7a34f70a35a6cc670103055f984541012ab7ae541f1637158,2024-07-12T08:15:11.130000 CVE-2024-5336,0,0,2f884d9a8acdce925dfd5f3bbb7e4d857b44070abc5058c1ed58328cd4186515,2024-06-04T19:21:04.947000 @@ -257577,13 +257578,13 @@ CVE-2024-5437,0,0,b00058f5764b16d4661c63f1983ab9dae77d46bb23d9cbf0d57b3c9fafbd7a CVE-2024-5438,0,0,beb1b61cb3794f25e50aa4c7911116dbbb532eaf0bf3366ce9bd52ca79f18ec6,2024-06-11T18:26:45.147000 CVE-2024-5439,0,0,e5ab091899f87682491464426dccc0d01925c42909ac499a5c8786d55427396d,2024-06-11T17:35:43.313000 CVE-2024-5441,0,0,cd7b1b15236c7a2c2414b795b6ffce4b233942605e4b788f9b1cefb9a565eca2,2024-07-15T13:39:20.267000 -CVE-2024-5442,0,0,34914be0a30c7b71d2568f0cd14a15a5872c0256c9eaac36eaf3e6e263d79b5c,2024-07-15T13:00:34.853000 +CVE-2024-5442,0,1,f0344b30188ce4a2cc91890b56972762cdbd29ec292a7ecf6018b5a0f024916a,2024-08-01T13:59:46.210000 CVE-2024-5443,0,0,5355e7ea1610df75dc467c6771933fd6a627b9eafa985364872ccc88c9e02e01,2024-06-24T12:57:36.513000 CVE-2024-5444,0,0,7a2603f1e6478613a17365e974ef612aa2f89724976e490873c8e2e39efd0067,2024-07-15T13:41:20.447000 CVE-2024-5447,0,0,3cca7aa92fc6065f540e9581ce89048750b9301e8e5f09fe0c757aeff208842b,2024-07-03T02:08:56.630000 CVE-2024-5448,0,0,3b8c50d4d9750a6fd624a54dda421d4d7914d50ce40345ec2ba734a9201fe3ae,2024-07-03T02:08:56.850000 CVE-2024-5449,0,0,c1e6c0786c1e275f994246efd4bba7bddfb8ded5af596514af2741d165623e37,2024-07-24T17:47:44.637000 -CVE-2024-5450,0,0,80002c52fa004acd100f77f277a6657bbab887f4ecf21032f57c390f6fb18acb,2024-07-15T13:00:34.853000 +CVE-2024-5450,0,1,ba91201206f4a01e8e7a35ee2afdc8918b7d2b1fa73a9e73f31dd44f37e43122,2024-08-01T13:59:46.483000 CVE-2024-5451,0,0,2896975541f1deb7d32c27fb696c9ed10757c5f40f89d620628d7346403ef637,2024-06-25T18:50:42.040000 CVE-2024-5452,0,0,78c116a6a9dc3570ee7c04955c3fdb947d6a087a3e839a7cc2b81e0409d936d8,2024-06-07T14:56:05.647000 CVE-2024-5453,0,0,b20a0834ca5689b452f6b7173de63ab33385cf72d5d8c59a0cf15e703dd6a33b,2024-06-11T17:34:52.263000 @@ -257600,7 +257601,7 @@ CVE-2024-5468,0,0,a9b6881473aab66cd93b6151044b19528c011d8001f0e2556b425e826958e7 CVE-2024-5469,0,0,5ac6e5bbb985b1f56a24d83448848a6f9d47ec5d1570dbff766b29523f5e59ca,2024-06-17T12:42:04.623000 CVE-2024-5470,0,0,6ad8fffdbc9fc3c2ca94bc381d3be223e310676e26148212c497e243b6c17473,2024-07-12T16:52:52.883000 CVE-2024-5471,0,0,b5058f52e9634b68f4d4000cb97858db03cd2fac3d75cd140cb047a19da1c69c,2024-07-18T14:09:17.740000 -CVE-2024-5472,0,0,5266d0242327561f219784f0c46dd50d182936ab4a103ea249459b5dcb746156,2024-07-15T13:00:34.853000 +CVE-2024-5472,0,1,cbeafb08776655e35d6e47fe8a75d08cb39135639adca55be0cfb4cff69e0ec6,2024-08-01T13:59:47.140000 CVE-2024-5473,0,0,7a9289264d1a834c0b8e9151c353ddcb7a22a22f6b7d360897c02053aaaeb88c,2024-07-03T02:08:57.860000 CVE-2024-5475,0,0,e09a66bd4d026df38a62a9d0642b82f2a5b9bf49c6a2d9e0e1e141414790fdd3,2024-07-03T02:08:58.050000 CVE-2024-5478,0,0,c601a39452cb705e9035daa72131a8a960693dee4deccdae668f9ad5d8466d4f,2024-07-19T18:29:50.137000 @@ -257615,15 +257616,15 @@ CVE-2024-5486,0,0,f91d9d4f8dd33400d578f70c776b5213e5c4514fd91351556f80643703e916 CVE-2024-5488,0,0,1ba8afad84fb064b3094b3beeaef45abdf0d0012417462bce1916c1780ec0647,2024-07-11T15:06:31.120000 CVE-2024-5489,0,0,855f98d82c4255d7a1decf5a548f61d8944b9bffb6e3f6a5299c190e758f26a4,2024-06-11T18:15:01.617000 CVE-2024-5491,0,0,c9a62638dd7b2098d22ccc85d55914e20b3d8c19adc41e6518825648965a51ba,2024-07-11T13:05:54.930000 -CVE-2024-5492,0,0,ef9d60420cc278300dad8633c6d5a4d9cec47839ae67a5efd349eac4679c005a,2024-07-11T13:05:54.930000 +CVE-2024-5492,0,1,c1b752674fdbd97871ded2471e93cce68a0c42e212cdcca0b70fc8b5a2b6c4b2,2024-08-01T13:59:48.837000 CVE-2024-5493,0,0,6197d264f9043f6827bed7540062d250b0374cc18469d389f548454d0f106bc1,2024-07-03T02:08:58.650000 CVE-2024-5494,0,0,873b32b5a8631a7cfafda5ef05f4cca30f0a687443c321eec260009bcbcc903d,2024-07-03T02:08:59.420000 -CVE-2024-5495,0,0,97784ea104f337e1e508f2a00eba50e04a8f0626aa6df0602f56ee62cdbb6391,2024-06-10T17:16:34.740000 +CVE-2024-5495,0,1,f56c48f5bcd456da60fe32b92184eb68647a5d9733dc6b79e3edcb3de5d2dbfe,2024-08-01T13:59:50.400000 CVE-2024-5496,0,0,df1432449d01998c3afe7dd375c469d734075268fe0daa88ef4698d508149d6e,2024-07-03T02:09:00.193000 CVE-2024-5497,0,0,f8911b8845bbbfa95a7832f1617866f45a83c965f344f6e4c9cf922533c51dcb,2024-07-03T02:09:01.003000 CVE-2024-5498,0,0,249bc82e919537483fbbd7e36f7610746bc1d1c9ddc202b4c423e6c0b454fd61,2024-06-10T17:16:34.980000 CVE-2024-5499,0,0,35dd9c6b1c2542f41b348af6ab7b219dd2f92d9ae3c52132e0b08b696c15d780,2024-07-03T02:09:01.860000 -CVE-2024-5500,0,0,391b02eb9afd9652678768a0101bd403f0e6eabe724548b6be04d17b2e092140,2024-07-18T14:47:24.677000 +CVE-2024-5500,0,1,08dbbebab53ed3353be996009fd4c1da58d2bb9845253d44287e5f1fec38cdbb,2024-08-01T13:59:52.040000 CVE-2024-5501,0,0,26070cb64be69726a3e53d21c4a7b37433e6fc5848925edeefa1dca5b1a345a3,2024-06-03T14:46:24.250000 CVE-2024-5503,0,0,1cb7ec9812df8ec09d21a8b50ab54c8421f9f9a3696399f8cf01057ff5629e64,2024-07-17T13:53:37.643000 CVE-2024-5504,0,0,c9387f8cc727d3178a2e16ac3c8996c4ce5ec1145aa8a5124e81e8cb3cf535a8,2024-07-05T14:46:38.860000 @@ -257677,9 +257678,9 @@ CVE-2024-5566,0,0,5233947f09c3c6c0de3bbc1356e893f745531db8e2929187d54352e5877fee CVE-2024-5569,0,0,b9fd3bed59b5f668c54b0264622201b8600e789b08e0f56eae05ce6b6e8c76ce,2024-07-09T18:19:14.047000 CVE-2024-5570,0,0,752c5aec7899d5cf3a8e3335b609e2b612878d2e224e641cf0205f3f8bec404d,2024-07-09T16:23:05.823000 CVE-2024-5571,0,0,c5656d92123399f657b6e24b44e300308aef779837a4ed7761c4afb3c16bfae8,2024-06-11T17:29:03.277000 -CVE-2024-5573,0,0,250942dd398584b07af081969c90c51eb870e472776aa0a5f143054241cd8aa3,2024-06-26T12:44:29.693000 +CVE-2024-5573,0,1,7ceea6b12b7d23aaf8833561ef8c88372a72278f234f087262af664b087eec6c,2024-08-01T13:59:54.013000 CVE-2024-5574,0,0,e718295307eca06b04fb56f70dfb8daf0ce4b10163936e86fc3b21a6f71a4423,2024-06-20T12:44:01.637000 -CVE-2024-5575,0,0,0d0faeec0f613a9625ccc8cb2724627ce688cebf183de5add4fa7e9fd84a3054,2024-07-15T13:00:34.853000 +CVE-2024-5575,0,1,1d8c4bc7bfefa9359f03236311a531b02997d0972adc424dea9dbc344e7a3ded,2024-08-01T13:59:54.197000 CVE-2024-5577,0,0,5dd16baf94f18e7abae39f40d89c75af3dba9492f2b1af50e3d8516c5413b1e4,2024-06-17T12:42:04.623000 CVE-2024-5582,0,0,3868d6c914880d2428453bd960a7aeb89cb5bb99f0fc09b9de444e14a34c6012,2024-07-19T16:05:10.290000 CVE-2024-5584,0,0,7705ff7ae1b4fd1342d12756cedf379ac85bb5a3b8398b6b986f5e220e43afde,2024-06-11T13:54:12.057000 @@ -257695,7 +257696,7 @@ CVE-2024-5599,0,0,e2a52dc8fb81a6d016503d8fbd621cff191add725c15ae779eff77632921d4 CVE-2024-5600,0,0,cbb44154b53a9ff19bb9b8607051bff7897a220aae51af46369a9f79546fe419,2024-07-09T18:19:14.047000 CVE-2024-5601,0,0,e22064ef868b7763ab6a035a66dc94fbf47f776f059b7b471d5873c49e582f7a,2024-06-28T13:25:40.677000 CVE-2024-5602,0,0,c64891ac2cd85f56d91d08925d6ceddbdd889440170bfa961976b5a31d8fb155,2024-07-24T12:55:13.223000 -CVE-2024-5604,0,0,3fc5f4822707c10b93ac858cb809bfd200b008140e07ef20d84f7ed8208c8435,2024-07-19T13:01:44.567000 +CVE-2024-5604,0,1,027d101e3d13ee1355c5d00a90e628c742a0d98d010571ef0346cd7c4d888687,2024-08-01T13:59:54.710000 CVE-2024-5605,0,0,e4ab13f44aee681834db0b09d11c486a794d1d811bed7db97810cd3bad2b3e86,2024-07-17T14:02:16.537000 CVE-2024-5606,0,0,954b2855130670426569975aef75e63a345bb5d86a76ecc86734db71e762262f,2024-07-08T14:19:15.450000 CVE-2024-5607,0,0,ae3ce9023a2ae1c6b37a7951db185bd6eb638714bf41f7bd2c0952a16523527d,2024-06-07T14:56:05.647000 @@ -257710,10 +257711,10 @@ CVE-2024-5618,0,0,ebe36b14a25a2ade3e64c60f6c84014fea87ffe3e6c056e2ec2d4c12a7dbd5 CVE-2024-5619,0,0,1dd4749b6be6d7e6dc7272136e2a3e724b171183a64961a248fdb4990b57a472,2024-07-19T13:01:44.567000 CVE-2024-5620,0,0,e414f2b903fd835e5fe0db0e605e2aee6c78620744a7541756005a422222af46,2024-07-19T13:01:44.567000 CVE-2024-5625,0,0,2e44049535f78135e500a8f8d54d8f4d59ba5936e80e3b134df5c51262f22971,2024-07-19T13:01:44.567000 -CVE-2024-5626,0,0,4d44d16ebb40f7dcbdd8f966d6064f08980c676d5cdd8597fffcc24e77ebd509,2024-07-24T19:52:09.273000 +CVE-2024-5626,0,1,3116199e86dacfa5c8c4bfcae9231b5a383289e4e0bd8acb32e36f957ab44c86,2024-08-01T13:59:55.383000 CVE-2024-5627,0,0,b223ea977e14432dc305de4592ca7e0252873a120062584093cd834d6b6d0c82,2024-07-15T13:00:34.853000 CVE-2024-5629,0,0,7b249822418cf5aa1c707605ba6baf660f2f435a4da7f400697e48d05f897bc1,2024-06-18T18:31:05.663000 -CVE-2024-5630,0,0,f9c6a42aee5daa3d50f3d4f8a05899c87348bb902884a0d46ccac4fec00f266e,2024-07-16T18:10:17.693000 +CVE-2024-5630,0,1,b423cbbfe930ee92b838e29f77793f2e7fb28fa122fa6868ec504c922282a541,2024-08-01T13:59:55.667000 CVE-2024-5631,0,0,25836c7f267b9208b846f73ed3ce84976cc46a5e11e6627f730b2265da803c8d,2024-07-09T21:15:15.520000 CVE-2024-5632,0,0,18c64f64f8d77f06a181388a24f5be7d454b8919234aa93ebe8fa802fed4ac14,2024-07-10T17:15:12.517000 CVE-2024-5633,0,0,170bfadc0f2c2c5a9d793826d3ecd8b6db1b109076f41bde8833e3f86a8f0001,2024-07-09T18:19:14.047000 @@ -257726,7 +257727,7 @@ CVE-2024-5639,0,0,492ad0d47d56549888d5f48237edc279d0d32d853604c73193623cce2eae07 CVE-2024-5640,0,0,9b7c1b85267a9cc2caf72f61af05d24f2e85f909270110c050e922f8e0836e8a,2024-06-07T14:56:05.647000 CVE-2024-5641,0,0,1f23612877686d6e5143238f62dc02125c3d0a0d8a2499e0ec524473edb424e6,2024-07-05T17:14:44.840000 CVE-2024-5642,0,0,bf58acd5f015124d4fa0c6ffb75779edb6afb99b41961d291eb7083813f4952e,2024-07-28T14:15:11.220000 -CVE-2024-5644,0,0,bd94085a240294e1c5f68d1f90c69c4fad395903cecf449c34955bd87fe371a3,2024-07-15T13:00:34.853000 +CVE-2024-5644,0,1,35f5cce546de98cfce88cd6571a328f218696f426033c4c0d2e31a431c078a61,2024-08-01T13:59:56.260000 CVE-2024-5645,0,0,81ee0a48f8169b5fa6535595d6aeb783fba06dd48c6af38e338fa98641a45635,2024-06-11T17:57:47.197000 CVE-2024-5646,0,0,54dff546debf316c7620aa15614b89fe6dc050f45cfaa67554d377c50ceda179,2024-06-13T18:36:09.013000 CVE-2024-5648,0,0,015c05f38e8cff192a455edd246e167c4bc53044f1d944054e7ecfcb7dfdfccb,2024-07-09T18:19:14.047000 @@ -257755,7 +257756,7 @@ CVE-2024-5674,0,0,19a588e59b6b0a5cd86582f1d6ecebdb5fae3e091de3e9e5a8f682eaf8708c CVE-2024-5675,0,0,c94a13a2a4b4b541f4d9019f3017bff689f5579f32759b7a87deb8cdfe0fb73d,2024-06-11T18:14:02.017000 CVE-2024-5676,0,0,ac70690e5e5a82915ea8b21175c3316ecbf6493d45f7e6ea6d37cbb46bb6c2ce,2024-06-24T05:15:09.600000 CVE-2024-5677,0,0,e2511915c83441842f7c8a6e8aecd9d8b3c471bd0e1157bcb520b0c0755a9041,2024-07-11T13:05:54.930000 -CVE-2024-5678,0,0,ec0eebbcae34fc7e7afbf6baa7acc0bf570b67cb5cd152170a8fdac0025f5fbe,2024-08-01T07:15:03.053000 +CVE-2024-5678,0,1,1843499696c38aaf8a58eb9f22406221758fc40ab9831e6b3a121bed4a7efe29,2024-08-01T12:42:36.933000 CVE-2024-5679,0,0,0839965cde25fea3aa350fa717eb81302bb5423efd743b60fd44dbd620732a01,2024-07-12T16:38:44.027000 CVE-2024-5680,0,0,4b89f5f26e3b07478091cc4705b6bf03eb5b6d7ef8a454176f219f6262119e02,2024-07-12T16:38:49.670000 CVE-2024-5681,0,0,ba69ac569d7576d195fd1b6967a53d4cc4e5811e9ef97dab1bfc2916a4020575,2024-07-12T16:37:40.303000 @@ -257768,11 +257769,11 @@ CVE-2024-5688,0,0,378fe065c1c96c80f8fcd92ad9e23dd5031fac1fb881139af57f2ca0f8af6f CVE-2024-5689,0,0,4a110f75db5aeecb8ba897daed59c54700fc78a15415c63a015a6e971aa1956d,2024-06-11T13:54:12.057000 CVE-2024-5690,0,0,5341a5334e9828e87ad80103505a771701551948a0ea3be6901f13152b7bc56e,2024-06-19T10:15:11.210000 CVE-2024-5691,0,0,48afec26d6506c59677ec0a7d4e63413cc5741e7dd0feb6f92e5e5c2dbab4cba,2024-06-19T10:15:11.280000 -CVE-2024-5692,0,0,038a6f9e0e7ff731831de1c7cd335d2dd55cfc73b1b9696426a71cffa1b32385,2024-06-13T23:15:50.707000 +CVE-2024-5692,0,1,da86a3e71defc1a5762f0a215e21c8d6ad0bb48702dddd9796e84e537e21cbce,2024-08-01T13:59:56.967000 CVE-2024-5693,0,0,0c0efe07ae7eccba3dbeb9fe7241e864745aeb8b41f02dc5d33a8371321e7469,2024-07-03T02:09:11.353000 CVE-2024-5694,0,0,275b578189d93f8e1ff5fb24ee08b4deeac272512e00405f2d220d413d57023d,2024-06-11T13:54:12.057000 CVE-2024-5695,0,0,5c1c35f0ec6580e07f73e1a07a8ae630ee78fe7f1d5e3c7dbc856e78693a01eb,2024-06-11T13:54:12.057000 -CVE-2024-5696,0,0,77018e40acaad3f267549dd84f95466e2ae8a31a7ba50c1e1b402440e61caffd,2024-06-19T10:15:11.430000 +CVE-2024-5696,0,1,fa7fca85e8582886b101603c50bdb44ca98f1e5885ef874b4a6ee74a96bce0a1,2024-08-01T13:59:57.203000 CVE-2024-5697,0,0,13d9f820840a5434e14f725e7a86822acf56a29e59c1458e96d88cc5081d444b,2024-06-11T13:54:12.057000 CVE-2024-5698,0,0,7b035eab35337a10a3a90e094f802065b8fb799d8adb7d69ea85d4ceee7a9c8e,2024-06-11T13:54:12.057000 CVE-2024-5699,0,0,c6a42ec507c58416dc30ca6ed956f1ded247800b2c9b3cf1e9a175eb88ff9b13,2024-06-11T13:54:12.057000 @@ -257784,9 +257785,9 @@ CVE-2024-5704,0,0,be55689131fc57547da71e8726572a7a1a86cf57932558d33666ec0b15eef9 CVE-2024-5710,0,0,bbba5caf4cb4f465fb2a1f44424b7af778bd56d5f1b17eb3b38248b8a0397322,2024-07-01T10:15:30.183000 CVE-2024-5711,0,0,463604f6d6d272196433a5bb7494f0542e749e8811ac98ab1c08049581f8b425,2024-07-11T21:15:12.787000 CVE-2024-5712,0,0,6fe769ed08d1c07fa399695b2a73ebe92703dd256409ae365a8a0674e8c2dce4,2024-07-12T08:15:11.477000 -CVE-2024-5713,0,0,1544207c70e43a58ced03b4a71037ccf4b06ea5a079eac8d061df9a923a30cef,2024-07-15T13:00:34.853000 +CVE-2024-5713,0,1,c0a70264e1ea76a973535ad7aa9bd75dbe3a56d9da197243643e4b409d2a1e15,2024-08-01T13:59:58.300000 CVE-2024-5714,0,0,3bed7ab990351d2edaae16abe4fb599113cf539749761008bcee140b1f61ca68,2024-06-27T19:25:12.067000 -CVE-2024-5715,0,0,c9423d03a33781e2585ea9b937e9fb4eec5b8598cb405fdeaf60688f27175a8c,2024-07-15T13:00:34.853000 +CVE-2024-5715,0,1,e1e04cb06aeff3910b9cd4da61fdba66eb5c18b86c8c893f8fd4f024cb9da509,2024-08-01T13:59:58.493000 CVE-2024-5724,0,0,3391a03a6fc6b37b75d837daa3b10d87c66a795ba851dae08769008c862d269a,2024-06-20T12:44:01.637000 CVE-2024-5726,0,0,b4cd5dca5a477cdada0b4f3d32b95ed3a167d5579651d0457c156d64e550155f,2024-07-18T12:28:43.707000 CVE-2024-5727,0,0,040bfa497be860fd1871f63cb27032a120406323d19a196c7488cb84bed8cd86,2024-07-03T02:09:13.520000 @@ -257803,7 +257804,7 @@ CVE-2024-5737,0,0,d0320412366343a8bfdfa83f09ec33ad8bab76c39c727d4c2240c621c15a4f CVE-2024-5739,0,0,607ae99ef991c260ab7d753d294117f20a4326531a649cb8963e8228c76ca454,2024-06-13T18:36:09.013000 CVE-2024-5741,0,0,598ae2049072e1c2a3df1e983119a3b149c1d2d0666eb71ab5fdb900f4e38254,2024-06-17T12:42:04.623000 CVE-2024-5742,0,0,fb1a8c1252ee22cc610fe8ff09c119041e84ac15850fc2d3efcf49cef978035c,2024-06-17T12:15:49.850000 -CVE-2024-5744,0,0,e3737fe4f172ad8183946894682042eed7a28dff51d6726bdf81e342ea27bf6f,2024-07-15T13:00:34.853000 +CVE-2024-5744,0,1,fa6836e3173f8cf048b3a987cfb64279b64d7f456da598f49d9aa4b85f5c51d9,2024-08-01T13:59:58.940000 CVE-2024-5745,0,0,dff05d6623c183c983d17145ccb68bed448b0bc79462e5e5f54dc4238cbb2935,2024-06-08T04:15:10.027000 CVE-2024-5746,0,0,08e42433314420a93bea44176cf4cc0a169742251a575020722ab2e02c28ff80,2024-06-21T11:22:01.687000 CVE-2024-5750,0,0,476ad6c00a3180d456740d0beb63c2959ea56c746a3fc254c90c1eef52867b01,2024-06-18T14:15:11.383000 @@ -257815,7 +257816,7 @@ CVE-2024-5757,0,0,5cb8c18a619114307d2634441346064118b79a7aeac4723897e195eaa5132d CVE-2024-5758,0,0,c078716fbf80b259c8ceac06415d3d039d4ef773f8ae701649c6b0b1483ee99e,2024-06-13T21:15:57.543000 CVE-2024-5759,0,0,63cf4f5f11600a3e2abf833e3aff1a738015e39c1ce27037c94f84f83452efea,2024-07-19T18:40:53.863000 CVE-2024-5761,0,0,1fdad964c86313b412878f67fac5999c9a1ea015b844614bc58b000414661a53,2024-06-07T19:15:24.467000 -CVE-2024-5765,0,0,7777c9dace4629e9c2251ba824db8d523ad415dcf28bcc659aeeb2079655934a,2024-07-30T13:32:45.943000 +CVE-2024-5765,0,1,79117abfade54ce3ab13d72bbbbedb2fc58ed3797b29d0ebf953e2abb4b24073,2024-08-01T13:59:59.193000 CVE-2024-5766,0,0,1263d0917882c36f131e194bb6b44630da06ab1a17b9faa93d76c1b934e8029c,2024-06-10T02:52:08.267000 CVE-2024-5767,0,0,946a7a6edb6231f843cc8c36568eec07c01ffe4bb17f732fe05d02ccf6a0e4bc,2024-07-09T16:23:07.280000 CVE-2024-5768,0,0,8a490ed493d8c155ddaf62bd42a8c332a10ab098da1f8113e24f2cfb8a80f0bb,2024-06-20T12:44:01.637000 @@ -257848,11 +257849,11 @@ CVE-2024-5802,0,0,71daebe4bec626c1d71de5756a51cb35bdbb0ec81769b121e428d7e1cc0f83 CVE-2024-5804,0,0,944c60e3868cb88abd10c74562e980fee4d055c47351e0f84fb7de6b37f889be,2024-07-22T13:00:53.287000 CVE-2024-5805,0,0,f734cfbda04e521c3e66e4ddc2a1025a96de47f7633c45b189fcc72ae4a4191a,2024-06-25T18:50:42.040000 CVE-2024-5806,0,0,91588fb1cdb8115c3da665d3d031e599ad42ef712f85a57d764591dd0370421d,2024-06-26T00:15:11.293000 -CVE-2024-5807,0,0,3d3f92d0699f9677c442ce63cc62584ae1fdc238e19bdd78765f09e22e64a7e1,2024-07-30T13:32:45.943000 -CVE-2024-5808,0,0,31a4fac5b18676052aec1b33672f80aa55e6e2b2a8fe351402d36913172c4612,2024-07-30T13:32:45.943000 -CVE-2024-5809,0,0,0dcd0bac53fbc7eff321bc0c2b7ced48c5ab02da7f5a6b98da129925ceb560ed,2024-07-30T13:32:45.943000 +CVE-2024-5807,0,1,cbdacfcc550f188a645ebbcc0d5bed8a3afa99180c6adb698350c513e3814548,2024-08-01T13:59:59.787000 +CVE-2024-5808,0,1,01bdb59c1a81eab4bdadd0e0da37734e46325f1f6405fb5bc4ad137cd56c547f,2024-08-01T13:59:59.967000 +CVE-2024-5809,0,1,15d67823b1ae01c1fa199f4f6c7d9dafbc364ff7514ea7bb963a0eabbb4f80fa,2024-08-01T14:00:00.230000 CVE-2024-5810,0,0,246ea4a74a1b10a6c799aa82916b249e6dd3093a23af41d24ba222ed5e8773fa,2024-07-09T18:19:14.047000 -CVE-2024-5811,0,0,ed199cd1888a7a079b0f8dda911181091f221cb3baa9309d375439b25d6f23c2,2024-07-24T19:41:17.503000 +CVE-2024-5811,0,1,da48fd72e5de418e87b54290fe68d41aecce53c1cabdd1300feebd9e1c56b865,2024-08-01T14:00:00.527000 CVE-2024-5812,0,0,05caee51ca8afdeadb9e9ce4e5c443d53c88017db3fdf90c8036b6c5139928b3,2024-06-13T18:36:45.417000 CVE-2024-5813,0,0,2236ff95e00a2589bc00dc67452394d14ab32423646c535c5a19397b653232d2,2024-06-13T18:36:45.417000 CVE-2024-5815,0,0,9c0e5d25f32c2dbefca23815fc2b16e88ce81dd54b9a22e21c721a2b2a9cb1cc,2024-07-17T13:34:20.520000 @@ -257874,11 +257875,11 @@ CVE-2024-5832,0,0,fcc8d912e6c8c38175ccea7150b16b62e2ce7eae3dd1539b01b9bf831f40b8 CVE-2024-5833,0,0,a74d6cce3a1790ef74d3836450506e9a7e306cd07532907e8300bc8d9a8bd7ba,2024-07-03T02:09:19.737000 CVE-2024-5834,0,0,3eaebe678be109cf432cf27c742c2b9362970e430c21bfb473c7c2fbeada267f,2024-07-03T02:09:20.643000 CVE-2024-5835,0,0,3e524b82e8ed0b84d2c482cdc0cfce05ebf5d76c695278d4bcb9110adcb244b7,2024-07-03T02:09:21.673000 -CVE-2024-5836,0,0,fb0c18b9bd51deadf9ab038475ddc8e6d392560b5f82fc0027dae45f4d75c5ff,2024-06-20T15:08:33.157000 +CVE-2024-5836,0,1,2f98f47f48e7e5263684bded9a2beb714e548c5c355a03358e37a18e2fe16ed7,2024-08-01T14:00:02.493000 CVE-2024-5837,0,0,a3430952c8e48f90bf943b78b484234954723d493f275584419eeb04849b7796,2024-07-03T02:09:22.720000 CVE-2024-5838,0,0,7c76efe71220708ee702a73816746926766b357630940d525e4a60a2a76d2e61,2024-07-03T02:09:23.820000 CVE-2024-5839,0,0,9130876cb95f097dbdaed8649c52744f55bb9ad261dd630433bc625ccdf7d124,2024-07-03T02:09:24.927000 -CVE-2024-5840,0,0,ea7c7e80b3f28f6b76bde676dee2acb624eb281ebe7a47bbad857dd9a94201a1,2024-06-20T14:55:25.307000 +CVE-2024-5840,0,1,f6e7106430cd018a9134eecb282511017c72909e5bf775861faec1ea5b86ec0b,2024-08-01T14:00:03.987000 CVE-2024-5841,0,0,26dfc9020def48a067369079e9f08c5acadbc01c7414dfddae4ab481694ac207,2024-07-03T02:09:26.067000 CVE-2024-5842,0,0,6a52ae3fb9ce80746e3b566216cd68eeb4bb9c4079b51c304411e79436a32911,2024-07-03T02:09:27.080000 CVE-2024-5843,0,0,bdd7342e5f3782a90d254322dc95ab51ed0b5ca6e5098e14744d8c61723a99bf,2024-07-03T02:09:28.160000 @@ -257904,8 +257905,8 @@ CVE-2024-5868,0,0,9a8536b47a27c25b7062405f8aad2263147d3121835e9d2d4eb9b37e61c344 CVE-2024-5871,0,0,bfc23a1063e8c2c3d98988ddd8df8ea7002d8802bf04bd4c0c941cb9250f6a3f,2024-06-17T12:42:04.623000 CVE-2024-5873,0,0,5735eb2853c46a5b255fc10b814ec1b6c4f29d136a3521fa8f4d7be256150249,2024-06-12T08:15:51.550000 CVE-2024-5881,0,0,3ae006c5e782ce634c6c6fd24fda313894dca095797874331692050dc97499bf,2024-07-09T18:19:14.047000 -CVE-2024-5882,0,0,8641497bf3f53e4fba22647265bcf802425247f58cfb7432f44e6bccecc341d5,2024-07-29T14:12:08.783000 -CVE-2024-5883,0,0,6e7a429019d4490ec53539ed9b38a9e0a0428c20d5bb57e358795897567ecef2,2024-07-29T14:12:08.783000 +CVE-2024-5882,0,1,9790fb22da231882b81afb2259612f6848f747553cc5560caa274dd01996ad4d,2024-08-01T14:00:04.947000 +CVE-2024-5883,0,1,d6a370f6079b934cdc983b97c847b09fbc2fd364cbab75a4154dad04b870dbf6,2024-08-01T14:00:05.160000 CVE-2024-5885,0,0,4946e96abf9096ba44688feaf0b247be9bc7227d3f0040d31298fc7792a9ccc3,2024-06-27T19:25:12.067000 CVE-2024-5886,0,0,c6e7cb024adb68ffe24a326928e4d7c782b39c0023921bf84bad462101dad3b7,2024-06-20T11:15:56.580000 CVE-2024-5887,0,0,9566859cf83ab696aed1d992c858295b1ee73a5dd4c0fa67df0787b71b1dba0d,2024-07-17T12:15:02.013000 @@ -257961,7 +257962,7 @@ CVE-2024-5969,0,0,54d46cadd04c8b436788a5c40941c4acf03c3675c749089b56e7845a318ca3 CVE-2024-5970,0,0,e17a8b7d022fd70a35f0b32d2191e09c5597e5e1c83547c2cb361b6d17360bc1,2024-06-20T12:44:01.637000 CVE-2024-5971,0,0,e4f98c6267afcbb4d9afd3329ec44a1a1f7f72e0048e7418d4a554bf5527a469,2024-07-25T21:15:11.560000 CVE-2024-5972,0,0,3700c5b3eb4bcd1d3bafe18b568e7aab0a0471128c3ce92a2f73ba8aa9a9cb4f,2024-06-28T19:15:07.500000 -CVE-2024-5973,0,0,2d8084cf190a1aabb2055b961565b9805ce6ba0f851f188224d67d99d834e8cf,2024-07-25T15:18:05.157000 +CVE-2024-5973,0,1,149a91603c9d83724ac65f413ff97fc2f66dbcbaf98a063fb82f82fbdd67043a,2024-08-01T14:00:06.420000 CVE-2024-5974,0,0,7ccf1724194ada1507df11f624ca32c0386136cdfa7ae25f910321f76e1abc40,2024-07-09T18:19:14.047000 CVE-2024-5975,0,0,8d74d3af72c87940fadeee632ef4107b8154d499ccaa86042a3f85e6fc5aa06e,2024-07-30T13:32:45.943000 CVE-2024-5976,0,0,0d4a23e2583616de98536e1ad4d7b2a882021b32cad502d23a934bbf343ef666,2024-06-17T12:43:31.090000 @@ -258125,14 +258126,14 @@ CVE-2024-6189,0,0,2355a57183440873745a58c5ee4255e73d48e3621df08442512d4d5de5154b CVE-2024-6190,0,0,93b00ddbb08aa0f67c76c17594afa01da9990f6bd21725b8f9039b95b52fe264,2024-06-20T16:07:50.417000 CVE-2024-6191,0,0,97e62f49bbf59d417e17e1c185a719d026dd666b9cea29cbaf2df8f078cf498d,2024-06-20T16:07:50.417000 CVE-2024-6192,0,0,f3fb71ab4261b9f1fe9614be4c3aca69249da1a29d73f44d5548ddecce138315,2024-06-20T18:15:13.337000 -CVE-2024-6193,0,0,b82b78a8f0b0abd9dbf907881a56edbe91ff1bcae119dfebe58f7d291676b1e1,2024-06-21T11:22:01.687000 -CVE-2024-6194,0,0,cbb53de753977bddc1c6fd3146b9b6d65c14f66a338491b280a33b5d07fbadc9,2024-06-21T11:22:01.687000 -CVE-2024-6195,0,0,b1d77fa6be277c3616f62918a46cdc7b429307799e9566e241abfd6e6cd23ff4,2024-06-21T11:22:01.687000 -CVE-2024-6196,0,0,f970ec3af7f84385c947e04bd6fbef8afb9b5cec3c8a97053c91b93d7d7b0b97,2024-06-21T17:15:11.350000 +CVE-2024-6193,0,1,476b924f51226d24001327f060e7c65bf0fd7643e073512f604e9ac2113d6939,2024-08-01T13:52:16.463000 +CVE-2024-6194,0,1,f00a226f70ff49a057b84fcaca304b983b6bd1564bd5a99084e1dc1658dc9a5e,2024-08-01T13:52:05.673000 +CVE-2024-6195,0,1,d35dc776097027653d4328476e596f9f167a82473590f04576da829da4609970,2024-08-01T13:51:26.273000 +CVE-2024-6196,0,1,347e5d0fbb342c4d3dd5d440e2946d6924b36395364c1557d43d309fd11da3db,2024-08-01T13:49:15.767000 CVE-2024-6197,0,0,af056768bbe553bef9df302af46fde1ac508532548f9c530a24c99688c50579d,2024-07-24T21:15:12.600000 CVE-2024-6205,0,0,113d559849ca9c5bf761a83fad7d31b96491373e555c09e3fa45e37c92251187,2024-07-19T20:23:18.960000 CVE-2024-6206,0,0,7ae31b087265fa68705a3f153945ecef18a4fdd89eba1b0f5f6a9be630fb6cf5,2024-06-26T12:44:29.693000 -CVE-2024-6208,0,0,83f2eb1877d0823b82352568edf7e9dd4df755a7b9cf84d4b5d4ebdd2ed01a5a,2024-07-31T13:15:10.600000 +CVE-2024-6208,0,1,b702d385d6dc69624ae253d69a727703b76fa8f218fc0fa3e0a52d494810eb10,2024-08-01T12:42:36.933000 CVE-2024-6209,0,0,dde817e69ddab612402867a39af366fc36713e43c4758f0a34432256fd885f93,2024-07-08T15:35:25.837000 CVE-2024-6210,0,0,d08d160d43811c5bb8dcf64fef0c280a0a7b1e98d094babc485e09ce9fa86125,2024-07-11T13:05:54.930000 CVE-2024-6212,0,0,88ec49d2c928534d89fe27eda6cf31c3bdd1fe8db0b2d3f31b9f799a55beb699,2024-06-21T15:15:16.313000 @@ -258234,7 +258235,7 @@ CVE-2024-6340,0,0,fd12f25a45d92fefbb8c0ec47428250f4f56bb9c686a12a52e54d86e24fec1 CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdcaf5,2024-07-02T18:15:03.900000 CVE-2024-6344,0,0,ddc89c494afe0b7b80a518e0bed96070c096d29b8a0f403bdd242f60ce193de2,2024-06-27T00:15:13.360000 CVE-2024-6345,0,0,fc166d5e44485020c9b016f580b4f1c78befbdae01a9e6ec8b7e6b8d01a2e1ea,2024-07-15T13:00:34.853000 -CVE-2024-6346,1,1,3a32bedc62b8908a4934b7e728edad074fe342446d680bd6ebcf19547f3026e6,2024-08-01T10:15:02.023000 +CVE-2024-6346,0,1,dd2451b3228a249be11318435f5e384b8c60f44f7f9b400e6ba532a21de9b77f,2024-08-01T12:42:36.933000 CVE-2024-6349,0,0,427eeb1c49748085f9d6a97a6add4281bc215342d4df9759ae2f609f0d24cf9a,2024-06-26T15:15:20.690000 CVE-2024-6353,0,0,3e7ee1ed054bc0661b7c1f2f3de9fe2ed8be61a7a777eee50734c66af6748302,2024-07-12T12:49:07.030000 CVE-2024-6354,0,0,c9410e2fdcd521ee7fa5aea0abe57bbff6ce1153eea9fc9c27ad647524c61c5c,2024-07-03T02:09:53.917000 @@ -258320,7 +258321,7 @@ CVE-2024-6490,0,0,8a5877d317a0eed7b1ae7b123dbc62aa28ad8c8fd8f1b2bd14476905cfed0a CVE-2024-6491,0,0,777eb845cac0fc56ad6345347b6b7dff4d99542463073dd5b5752a23e8a26dec,2024-07-22T13:00:53.287000 CVE-2024-6492,0,0,82f79625038ad5debf137137104e45e1e353947b9c4b14df742baece7a047a71,2024-07-17T13:34:20.520000 CVE-2024-6495,0,0,b5144ce6ead337054723bddaa938cbde5875226dc2ad6f1282d875ef6548d915,2024-07-12T16:34:58.687000 -CVE-2024-6496,0,0,43f5bc899f7b576e992b610d27fb07beccb54a6935873953b6f84243b1c8c315,2024-08-01T06:15:02.660000 +CVE-2024-6496,0,1,8c7ace6ba6091a8a9449590bffe08be6241cd20c9dcc7f5b963a0a269c8deaf3,2024-08-01T12:42:36.933000 CVE-2024-6497,0,0,b980a8afca3367d307f1b8ae084c1de1478e48fcb0a6d42a16be67c3823c34b0,2024-07-22T13:00:31.330000 CVE-2024-6501,0,0,45d58d6fcd90c3b83531e796541078a549af17f7a81eb1fbfe7d6944aa2bc8ac,2024-07-11T13:06:13.187000 CVE-2024-6504,0,0,8b12236aeea36b8f50ca52878af23b200b8eec2ab40fe418832b1f4c4c6b95f9,2024-07-18T12:28:43.707000 @@ -258338,7 +258339,7 @@ CVE-2024-6525,0,0,2f0f70f02d7062f0146f492a65f00de0208bb8c01fafafd0c2d5a6e3d243b9 CVE-2024-6526,0,0,0395771cb83da3c31d3258df800a7adc493a41c6b23cd6248bbb973fb8ab4b56,2024-07-08T15:39:08.840000 CVE-2024-6527,0,0,4cbacb620d5954abb73dae2b3bfdb2a8824258a4de25ce8e7c75649e12d818a5,2024-07-09T18:19:14.047000 CVE-2024-6528,0,0,568c43fb32d79fc097335d9307aebc42d71a690423942e01ce8dbade6b5bedb0,2024-07-12T16:37:20.283000 -CVE-2024-6529,0,0,7d9ecbacb802f6a5ce3e4ab0c48539ed1c07a408b68bf91ec20a6b99341e19f6,2024-08-01T06:15:02.737000 +CVE-2024-6529,0,1,97d0956d951ec41b21daa289efebcb0db696f9a703a5843befda4084fdbd5c08,2024-08-01T12:42:36.933000 CVE-2024-6531,0,0,1125a21608be8cb0502ea86867294670584ed16918c5bd752fdbbd37969404b8,2024-07-12T12:49:11.340000 CVE-2024-6535,0,0,d515bd0c9a2788945f1c070eede854437b7a1c58e6a79916f8d2b46233d5b6de,2024-07-25T16:15:04.583000 CVE-2024-6536,0,0,db3a8f54349ce01fbebd842277117fe6b2369b9af6752930ef3e5c8ea43f79f4,2024-07-30T13:32:45.943000 @@ -258429,11 +258430,11 @@ CVE-2024-6677,0,0,d8004a1441e952f05633a34727a4f9223ac5077c2123fd1507a1955287de18 CVE-2024-6679,0,0,193698b3a519c2de1af0fd23f7e404e2d54c730e4704d97d0092b63ef1c81272,2024-07-11T18:09:58.777000 CVE-2024-6680,0,0,131299d0989a76f846afb0c8ae15f4692f1a0fdd9931fad30c165660cd1232fc,2024-07-11T18:09:58.777000 CVE-2024-6681,0,0,fd87484dafd740c0f788720b14149eb40f6b6d8ce371416d0e039ce9acf82071,2024-07-11T18:09:58.777000 -CVE-2024-6687,0,0,8da08526b23d42202f04689532c9fc543d8d2a947afc7d51db690c4ccd57faa9,2024-08-01T02:15:02.087000 +CVE-2024-6687,0,1,ff47b1397711b8cc3d93cfe454be390cc9012eec28a4b5d25b3eacdb0bcb37ed,2024-08-01T12:42:36.933000 CVE-2024-6689,0,0,d40d4a6e022419e83ed34bb3a74eb0d24556e6d76f7b0a592f90775a9d52873c,2024-07-16T13:43:58.773000 CVE-2024-6694,0,0,7d61bbb6e4266a8c90354c9d0cb6da1ede156f667671ed3e7d5507b5e685e063,2024-07-22T13:00:53.287000 CVE-2024-6695,0,0,b8b8eb834b1b9a9af206e3d65440d92cd68142fa9e3d4c45cc66092e8f4a1c06,2024-07-31T12:57:02.300000 -CVE-2024-6698,0,0,8b174c79c18bb7bae6c8548720caba4acaef081cf5267f9263f38e3446291c69,2024-08-01T04:15:04.767000 +CVE-2024-6698,0,1,89497c4dbd46e9ca69b6c9e20c77840978d4a56c74e425e3a4babf4cd1ed1264,2024-08-01T12:42:36.933000 CVE-2024-6699,0,0,6e43517d823543b1bfe29f11155aa061b1b3007e0c0d0141333897dcac3700cf,2024-07-30T13:32:45.943000 CVE-2024-6703,0,0,58688b231f5fc6deacad90c54b9ce0876a71daf3ee0061b5562a2bcbb8052bf3,2024-07-29T14:12:08.783000 CVE-2024-6705,0,0,1e166467558902cf3ff2211f8b1aa347feb308f999c65053186e5a13806e8368,2024-07-18T12:28:43.707000 @@ -258563,11 +258564,11 @@ CVE-2024-6968,0,0,57675d10d151b515d8654e4a2d23336a097aabe29c179fc0cfbb72272365b2 CVE-2024-6969,0,0,2345a97b06e5d388bdf778f25c67289987f0f6d0622466c7c196f2cd07649113,2024-07-25T15:38:51.787000 CVE-2024-6970,0,0,4194a84f3c5724b9bace97395e0f8e6456cd70a8d0cf3d46afccc165b27983cb,2024-07-25T15:36:44.567000 CVE-2024-6972,0,0,136930c91bb85ebbdb27bc99dae627302f90363fa18ab987405ebabe27d12e99,2024-07-25T12:36:39.947000 -CVE-2024-6973,0,0,76295ec3ebe0bf6ab46ddfd52badda08304b88e18a3d20fac7cbdb819136f0e1,2024-07-31T20:15:07.293000 -CVE-2024-6974,0,0,7ef6b4f17e4d77510d507310e8365d24dcc0e8cace8ef658dfe2a033fdd6390d,2024-07-31T20:15:07.513000 -CVE-2024-6975,0,0,1b3bb18e08f814d7b2cc57908ec6de8ca6a8253cf52b1302675be3c13edfb1b5,2024-08-01T09:15:03.097000 -CVE-2024-6977,0,0,3121777bd0a52ccf3540d69bf9a48fe1c1b7f86ef36c5a72b5a200933b1d9fe6,2024-07-31T17:15:11.860000 -CVE-2024-6978,0,0,e2bc736f85bea0c52e162540a00648045c9f82e172db71c285eab8cf5b35db1f,2024-07-31T20:15:07.717000 +CVE-2024-6973,0,1,8ba1445bd6bcbb81a330fc54c10a6187171fce4f119db0bcdcb3d48928b716c4,2024-08-01T12:42:36.933000 +CVE-2024-6974,0,1,3e28c2bf031103b4e8efe0285caaf742c1a147966c38427e618e0fcac5f6e907,2024-08-01T12:42:36.933000 +CVE-2024-6975,0,1,71ef57164cbd1cefa8e97c2640842f587dea0e157fc8339c8b95332c952efea6,2024-08-01T12:42:36.933000 +CVE-2024-6977,0,1,581c8cdfdfeb82af68c8689432d86b8be0c3f45442112c85b954569b41cd04b5,2024-08-01T12:42:36.933000 +CVE-2024-6978,0,1,aa71215d41abe7b7e6f6bff5080b4c986f22761adf5de92aeb36f54acec24a60,2024-08-01T12:42:36.933000 CVE-2024-6980,0,0,f6625eb84b24e1b38c56cc3bb53a8be195d62bb4e9db2a7b8e6feb6123dc7610,2024-07-31T12:57:02.300000 CVE-2024-6984,0,0,5e471e68c1f9c8af4cd4126a693da97e089cde1a0fe72eca9e017c53446a32dc,2024-07-29T16:21:52.517000 CVE-2024-7007,0,0,d661b80f381c5e5a20762050cd26d7cdbc7442dd5816d04953c75c3bb9a2e0ae,2024-07-26T12:38:41.683000 @@ -258698,7 +258699,7 @@ CVE-2024-7290,0,0,e8c96d989cb70bd87ad54653beaf9542c2c74968268c5634e080d16dd0ba2b CVE-2024-7297,0,0,cb4ca8684118dc46d1f9724d628f899c3458badae695854f058e1eba8efe7ce6,2024-07-31T12:57:02.300000 CVE-2024-7299,0,0,18b86413af481c73d022a0c4ed8ac3628863652a0dcfb13bf199bbb5e4db4366,2024-07-31T16:15:05.217000 CVE-2024-7300,0,0,a2e066ea38ffd4d283558ac9c550384947d588019ed19b0e0b6c2becc0799ae9,2024-07-31T14:15:08.080000 -CVE-2024-7302,0,0,eb848575f59647066e1f15d90b3f2f1e5ea9438ae4b28a66c4f233e32054cb49,2024-08-01T07:15:03.300000 +CVE-2024-7302,0,1,3e3978a555cf8f7617492d06d41673a59c5323c552cb9b37b079247ec7c0af88,2024-08-01T12:42:36.933000 CVE-2024-7303,0,0,d7f72dd61499e6619ce7f5b3ddfad21cf84d8b933f5b61aad0d5acbabf0695d7,2024-07-31T12:57:02.300000 CVE-2024-7306,0,0,41d2dc73352be3adbe3da1c5ddee86e5aba159cd2a5da8e89aabb430dec59115,2024-07-31T12:57:02.300000 CVE-2024-7307,0,0,880aa0ea5c84e56fdc3b5eb36854e1998bc80835f78667a7a6ad57104577d4f7,2024-07-31T12:57:02.300000 @@ -258708,22 +258709,23 @@ CVE-2024-7310,0,0,f41dfd90546a9735111808103c67b19c822dfd89b37a542d36f1a7128ca8fa CVE-2024-7311,0,0,992c6b7ceb1c9a4d719c68d0c71706858cdee857ab750e2dc0c4b13c55655029,2024-07-31T12:57:02.300000 CVE-2024-7320,0,0,33e9dcaae6c93434ade67bd8a073d2b7f1fbc81482e595b40c21856a0fa46ae6,2024-07-31T12:57:02.300000 CVE-2024-7321,0,0,7c3abae321c1c206df72b5645aa4b7f08ab908ecabfe1d2acbc6472a1b295bbf,2024-07-31T12:57:02.300000 -CVE-2024-7324,0,0,1e2ca05d2a54a8e20a65dafbea055b83788ac7fbff6de5e226983904da67ce08,2024-07-31T18:15:13.037000 -CVE-2024-7325,0,0,f8bbc15794dd5703238123f98b81da3bd159faf05724f6da7b67566f050685bc,2024-07-31T20:15:07.817000 -CVE-2024-7326,0,0,a5633e33c2a02d16e1af1e072da8fcba0a0a399f571fb68ca112102c143d392c,2024-07-31T21:15:19.190000 -CVE-2024-7327,0,0,510528affde5acd43eb35c63eb5d902602feae67d44ba5b56e6db447c84da7be,2024-07-31T22:15:02.520000 -CVE-2024-7328,0,0,be7182a894a8e66f01544f620c1db2fc584f80c3fdfe225824388e187bc79987,2024-07-31T23:15:13.787000 -CVE-2024-7329,0,0,647011e77f0a714e815e8381fc994d93728c4132bc26ac724dbc1603ac898070,2024-07-31T23:15:14.063000 -CVE-2024-7330,0,0,5bf5173338f50020395f31daa98d4e5268ee0c334bf7bc2b63dcd97ca1cac54d,2024-08-01T00:15:02.480000 -CVE-2024-7331,0,0,422506cc594da25bdbe818831361a21a2e0829762b0d1a1720237ffae15a8cb0,2024-08-01T00:15:02.770000 -CVE-2024-7332,0,0,ef2ff829409aed53fc5b7bd78181a4259375247ae472718669fa3749f64cef0b,2024-08-01T01:15:09.663000 -CVE-2024-7333,0,0,ab5b1eb89096d632fd0d3e24d267111879cdc5d9d5442a3d01b83ef574cac67c,2024-08-01T02:15:02.317000 -CVE-2024-7334,0,0,f6436d883d35ac14c8fd706811d0faed09a47eddb9b3a278251585eebdf4961a,2024-08-01T02:15:02.617000 -CVE-2024-7335,0,0,a8ca3ff100d2550a49bfae7a68b6f2b3f03844acfea91fd620bb94479ff0f69a,2024-08-01T02:15:02.900000 -CVE-2024-7336,0,0,98cf8001247af131404ed726a56cdfaacc3fdaabc0ae9ad0f26633ec52cc05a2,2024-08-01T03:15:01.717000 -CVE-2024-7337,0,0,5c858aa4e8d61610786b879cb485d1cfae507d8e6ee88f3cf4437d95bb969bf6,2024-08-01T03:15:01.987000 -CVE-2024-7338,0,0,5ca436c675332615d8472ada164111a0c43f4d26f7f9e9473b555222c97b3f65,2024-08-01T04:15:05.017000 -CVE-2024-7339,0,0,3ecc5f2b99e2c4d942d5c82dec227718fe6729e0e2181213034de3ecaba6e767,2024-08-01T04:15:05.320000 -CVE-2024-7340,0,0,fce15548fae9b804b40d57548bf30df09df1870e3bdee4ca04fd99c2c05c0232,2024-07-31T15:15:11.203000 -CVE-2024-7342,0,0,31e5c18f200a0e6bbc2bdf008f370d297be6b78b5cdba87cb4106aea8591d9aa,2024-08-01T05:15:10.303000 -CVE-2024-7343,0,0,a231ea27c24a1aa191b64a77a4557c9c0c06ff509504e00395df5f3a25945b8b,2024-08-01T05:15:10.573000 +CVE-2024-7324,0,1,095fe191ca170a7ec3aafa46faf9007b467b7e450c1bcd7d0af0a45c400bd246,2024-08-01T12:42:36.933000 +CVE-2024-7325,0,1,a6bde1ed410a10749d44bba07a55a46b87addce8acb914516046e9ef7fd987c8,2024-08-01T12:42:36.933000 +CVE-2024-7326,0,1,e4fe5d72b3f720e88066c7bf40d2778eb52d0e5e4aaa7ab2ee68780546e20939,2024-08-01T12:42:36.933000 +CVE-2024-7327,0,1,fe3d1ed38fdcbe26e7c4f19481629a7cea987c971b77e5704a37efab8356ba68,2024-08-01T12:42:36.933000 +CVE-2024-7328,0,1,2741567ee42748d59f252daefa57fb417e53fa2eac4698fc44657e5e7da1a98c,2024-08-01T12:42:36.933000 +CVE-2024-7329,0,1,7144e8cdcb46eab920fe5de8630867a88e3a00ef411c2d17720e845745aadc9e,2024-08-01T12:42:36.933000 +CVE-2024-7330,0,1,1e3fccb13fc5c6d56713c5eea41817a54c12be6a0c13c4e45cd85401565fe586,2024-08-01T12:42:36.933000 +CVE-2024-7331,0,1,f596913febf8757943ef886197cfc60893a9022688826b28e520dd7bef03167f,2024-08-01T12:42:36.933000 +CVE-2024-7332,0,1,fe9a2a9bc3d553a706eaa2f08749bb9b15a6ef17e04c8c48db1ad7505c2ba120,2024-08-01T12:42:36.933000 +CVE-2024-7333,0,1,c3a5011bfb5eec54c654dd8d356ddde5a6bfaa85a23259d2c194704ac1cdc233,2024-08-01T12:42:36.933000 +CVE-2024-7334,0,1,19177a6fd60d0db100f20d17e83c37a08eb9c6922ec4abb29b21dd8862fb0ac2,2024-08-01T12:42:36.933000 +CVE-2024-7335,0,1,a05ac42f5fdbb3229fb9b9974bc01e0eb59f8a21259223f45c625ea0aa891a8c,2024-08-01T12:42:36.933000 +CVE-2024-7336,0,1,6b999c7ba5a34b9be4966aa95415b63dcf55afa08607062a69f340eac0d653a4,2024-08-01T12:42:36.933000 +CVE-2024-7337,0,1,e958ed6747e03c8a2ca1c242b94c85738e8d31d5df2bb2e9e89a97ba7b147825,2024-08-01T12:42:36.933000 +CVE-2024-7338,0,1,900487bade652abeffed8d740657af80643a0645713b0752d7dde8b898a5b8a0,2024-08-01T12:42:36.933000 +CVE-2024-7339,0,1,b22bc8c3b0525a6c98a03e6df13c491f10ced24284b84aa3889a1e52c55f16a5,2024-08-01T12:42:36.933000 +CVE-2024-7340,0,1,552684ec6fa9b6c180e62361c914ca8a1c479efd308ec86bd5a33882d0dc054d,2024-08-01T12:42:36.933000 +CVE-2024-7342,0,1,b2aae5a9033c72e024dcd6167950e24730a1a54d1040d58948e1e0708313f38d,2024-08-01T12:42:36.933000 +CVE-2024-7343,0,1,81acd094d4fc0681dfbdfb7143ed5e48e10c433b5dcce0c0a370d97e4141e1d6,2024-08-01T12:42:36.933000 +CVE-2024-7357,1,1,65a3ea2c7469e5d0959ec89b27e20b9c23b23e895be12b1cbfdc7432df6a21cb,2024-08-01T13:15:10.950000