mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 03:27:17 +00:00
Auto-Update: 2024-08-13T06:00:17.899409+00:00
This commit is contained in:
parent
fe19800ef2
commit
27003173b6
60
CVE-2024/CVE-2024-281xx/CVE-2024-28166.json
Normal file
60
CVE-2024/CVE-2024-281xx/CVE-2024-28166.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-28166",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-08-13T04:15:06.867",
|
||||
"lastModified": "2024-08-13T04:15:06.867",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP BusinessObjects Business Intelligence\n Platform allows an authenticated attacker to upload malicious code over the\n network, that could be executed by the application. On successful\n exploitation, the attacker can cause a low impact on the Integrity of the\n application."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.7,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://me.sap.com/notes/3433545",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
"url": "https://url.sap/sapsecuritypatchday",
|
||||
"source": "cna@sap.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-330xx/CVE-2024-33003.json
Normal file
60
CVE-2024/CVE-2024-330xx/CVE-2024-33003.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-33003",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-08-13T04:15:07.380",
|
||||
"lastModified": "2024-08-13T04:15:07.380",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Some OCC API endpoints in SAP Commerce Cloud\nallows Personally Identifiable Information (PII) data, such as passwords, email\naddresses, mobile numbers, coupon codes, and voucher codes, to be included in\nthe request URL as query or path parameters. On successful exploitation, this\ncould lead to a High impact on confidentiality and integrity of the\napplication."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://me.sap.com/notes/3459935",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
"url": "https://url.sap/sapsecuritypatchday",
|
||||
"source": "cna@sap.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-330xx/CVE-2024-33005.json
Normal file
60
CVE-2024/CVE-2024-330xx/CVE-2024-33005.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-33005",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-08-13T04:15:07.740",
|
||||
"lastModified": "2024-08-13T04:15:07.740",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Due to the missing authorization checks in the\nlocal systems, the admin users of SAP Web Dispatcher, SAP NetWeaver Application\nServer (ABAP and Java), and SAP Content Server can impersonate other users and\nmay perform some unintended actions. This could lead to a low impact on\nconfidentiality and a high impact on the integrity and availability of the\napplications."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://me.sap.com/notes/3438085",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
"url": "https://url.sap/sapsecuritypatchday",
|
||||
"source": "cna@sap.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-395xx/CVE-2024-39591.json
Normal file
60
CVE-2024/CVE-2024-395xx/CVE-2024-39591.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-39591",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-08-13T05:15:13.347",
|
||||
"lastModified": "2024-08-13T05:15:13.347",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP Document Builder does not perform necessary authorization checks for one of the function modules resulting in escalation of privileges causing low impact on confidentiality of the application."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://me.sap.com/notes/3477423",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
"url": "https://url.sap/sapsecuritypatchday",
|
||||
"source": "cna@sap.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-417xx/CVE-2024-41730.json
Normal file
60
CVE-2024/CVE-2024-417xx/CVE-2024-41730.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-41730",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-08-13T04:15:08.050",
|
||||
"lastModified": "2024-08-13T04:15:08.050",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In SAP BusinessObjects Business Intelligence\nPlatform, if Single Signed On is enabled on Enterprise authentication, an\nunauthorized user can get a logon token using a REST endpoint. The attacker can\nfully compromise the system resulting in High impact on confidentiality,\nintegrity and availability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://me.sap.com/notes/3479478",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
"url": "https://url.sap/sapsecuritypatchday",
|
||||
"source": "cna@sap.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-417xx/CVE-2024-41731.json
Normal file
60
CVE-2024/CVE-2024-417xx/CVE-2024-41731.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-41731",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-08-13T04:15:08.330",
|
||||
"lastModified": "2024-08-13T04:15:08.330",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP BusinessObjects Business Intelligence\nPlatform allows an authenticated attacker to upload malicious code over the\nnetwork, that could be executed by the application. On successful exploitation,\nthe attacker can cause a low impact on the Integrity of the application."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.1,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://me.sap.com/notes/3433545",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
"url": "https://url.sap/sapsecuritypatchday",
|
||||
"source": "cna@sap.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-417xx/CVE-2024-41732.json
Normal file
60
CVE-2024/CVE-2024-417xx/CVE-2024-41732.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-41732",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-08-13T04:15:08.637",
|
||||
"lastModified": "2024-08-13T04:15:08.637",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP NetWeaver Application Server ABAP allows\n an unauthenticated attacker to craft a URL link that could bypass allowlist\n controls. Depending on the web applications provided by this server, the\n attacker might inject CSS code or links into the web application that could\n allow the attacker to read or modify information. There is no impact on\n availability of application."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://me.sap.com/notes/3468102",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
"url": "https://url.sap/sapsecuritypatchday",
|
||||
"source": "cna@sap.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-417xx/CVE-2024-41733.json
Normal file
60
CVE-2024/CVE-2024-417xx/CVE-2024-41733.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-41733",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-08-13T04:15:08.987",
|
||||
"lastModified": "2024-08-13T04:15:08.987",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In SAP Commerce, valid user accounts can be\nidentified during the customer registration and login processes. This allows a\npotential attacker to learn if a given e-mail is used for an account, but does\nnot grant access to any customer data beyond this knowledge. The attacker must\nalready know the e-mail that they wish to test for. The impact on\nconfidentiality therefore is low and no impact to integrity or availability"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://me.sap.com/notes/3471450",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
"url": "https://url.sap/sapsecuritypatchday",
|
||||
"source": "cna@sap.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-417xx/CVE-2024-41734.json
Normal file
60
CVE-2024/CVE-2024-417xx/CVE-2024-41734.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-41734",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-08-13T05:15:13.587",
|
||||
"lastModified": "2024-08-13T05:15:13.587",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Due to missing authorization check in SAP NetWeaver Application Server ABAP and ABAP Platform, an authenticated attacker could call an underlying transaction, which leads to disclosure of user related information. There is no impact on integrity or availability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://me.sap.com/notes/3494349",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
"url": "https://url.sap/sapsecuritypatchday",
|
||||
"source": "cna@sap.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-417xx/CVE-2024-41735.json
Normal file
60
CVE-2024/CVE-2024-417xx/CVE-2024-41735.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-41735",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-08-13T04:15:09.323",
|
||||
"lastModified": "2024-08-13T04:15:09.323",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP Commerce Backoffice does not sufficiently\nencode user-controlled inputs, resulting in Cross-Site Scripting (XSS)\nvulnerability causing low impact on confidentiality and integrity of the\napplication."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://me.sap.com/notes/3483256",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
"url": "https://url.sap/sapsecuritypatchday",
|
||||
"source": "cna@sap.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-417xx/CVE-2024-41736.json
Normal file
60
CVE-2024/CVE-2024-417xx/CVE-2024-41736.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-41736",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-08-13T04:15:09.607",
|
||||
"lastModified": "2024-08-13T04:15:09.607",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Under certain conditions SAP Permit to Work\nallows an authenticated attacker to access information which would otherwise be\nrestricted causing low impact on the confidentiality of the application."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://me.sap.com/notes/3475427",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
"url": "https://url.sap/sapsecuritypatchday",
|
||||
"source": "cna@sap.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-417xx/CVE-2024-41737.json
Normal file
60
CVE-2024/CVE-2024-417xx/CVE-2024-41737.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-41737",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-08-13T04:15:10.003",
|
||||
"lastModified": "2024-08-13T04:15:10.003",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP CRM ABAP (Insights\nManagement) allows an authenticated attacker to enumerate HTTP endpoints in the\ninternal network by specially crafting HTTP requests. On successful\nexploitation this can result in information disclosure. It has no impact on\nintegrity and availability of the application."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://me.sap.com/notes/3487537",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
"url": "https://url.sap/sapsecuritypatchday",
|
||||
"source": "cna@sap.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-423xx/CVE-2024-42373.json
Normal file
60
CVE-2024/CVE-2024-423xx/CVE-2024-42373.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-42373",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-08-13T05:15:13.800",
|
||||
"lastModified": "2024-08-13T05:15:13.800",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP Student Life Cycle Management (SLcM) fails to conduct proper authorization checks for authenticated users, leading to the potential escalation of privileges. On successful exploitation it could allow an attacker to delete non-sensitive report variants that are typically restricted, causing minimal impact on the integrity of the application."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://me.sap.com/notes/3479293",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
"url": "https://url.sap/sapsecuritypatchday",
|
||||
"source": "cna@sap.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-423xx/CVE-2024-42374.json
Normal file
60
CVE-2024/CVE-2024-423xx/CVE-2024-42374.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-42374",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-08-13T04:15:10.283",
|
||||
"lastModified": "2024-08-13T04:15:10.283",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "BEx Web Java Runtime Export Web Service does not\nsufficiently validate an XML document accepted from an untrusted source. An\nattacker can retrieve information from the SAP ADS system and exhaust the\nnumber of XMLForm service which makes the SAP ADS rendering (PDF creation)\nunavailable. This affects the confidentiality and availability of the\napplication."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-91"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://me.sap.com/notes/3485284",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
"url": "https://url.sap/sapsecuritypatchday",
|
||||
"source": "cna@sap.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-423xx/CVE-2024-42375.json
Normal file
60
CVE-2024/CVE-2024-423xx/CVE-2024-42375.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-42375",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-08-13T04:15:10.567",
|
||||
"lastModified": "2024-08-13T04:15:10.567",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP BusinessObjects Business Intelligence\n Platform allows an authenticated attacker to upload malicious code over the\n network, that could be executed by the application. On successful exploitation,\n the attacker can cause a low impact on the Integrity of the application."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://me.sap.com/notes/3433545",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
"url": "https://url.sap/sapsecuritypatchday",
|
||||
"source": "cna@sap.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-423xx/CVE-2024-42376.json
Normal file
60
CVE-2024/CVE-2024-423xx/CVE-2024-42376.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-42376",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-08-13T04:15:10.837",
|
||||
"lastModified": "2024-08-13T04:15:10.837",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP Shared Service Framework does not perform necessary\nauthorization check for an authenticated user, resulting in escalation of\nprivileges. On successful exploitation, an attacker can cause a high impact on\nconfidentiality of the application."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://me.sap.com/notes/3474590",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
"url": "https://url.sap/sapsecuritypatchday",
|
||||
"source": "cna@sap.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-423xx/CVE-2024-42377.json
Normal file
60
CVE-2024/CVE-2024-423xx/CVE-2024-42377.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-42377",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-08-13T04:15:11.290",
|
||||
"lastModified": "2024-08-13T04:15:11.290",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP shared service framework allows an\nauthenticated non-administrative user to call a remote-enabled function, which\nwill allow them to insert value entries into a non-sensitive table, causing low\nimpact on integrity of the application"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://me.sap.com/notes/3474590",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
"url": "https://url.sap/sapsecuritypatchday",
|
||||
"source": "cna@sap.com"
|
||||
}
|
||||
]
|
||||
}
|
76
CVE-2024/CVE-2024-70xx/CVE-2024-7092.json
Normal file
76
CVE-2024/CVE-2024-70xx/CVE-2024-7092.json
Normal file
@ -0,0 +1,76 @@
|
||||
{
|
||||
"id": "CVE-2024-7092",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-13T05:15:14.027",
|
||||
"lastModified": "2024-08-13T05:15:14.027",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Essential Addons for Elementor \u2013 Best Elementor Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018no_more_items_text\u2019 parameter in all versions up to, and including, 5.9.27 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://essential-addons.com/changelog/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/essential-addons-for-elementor-lite/trunk/includes/Elements/Filterable_Gallery.php#L3879",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/essential-addons-for-elementor-lite/trunk/includes/Elements/Filterable_Gallery.php#L3900",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3134194/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/essential-addons-for-elementor-lite/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/718c60c1-6117-4959-a907-d0ef457f7185?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
29
README.md
29
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-08-13T04:00:16.999199+00:00
|
||||
2024-08-13T06:00:17.899409+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-08-13T03:15:04.667000+00:00
|
||||
2024-08-13T05:15:14.027000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,16 +33,31 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
259645
|
||||
259663
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `3`
|
||||
Recently added CVEs: `18`
|
||||
|
||||
- [CVE-2022-38382](CVE-2022/CVE-2022-383xx/CVE-2022-38382.json) (`2024-08-13T02:15:04.730`)
|
||||
- [CVE-2024-7094](CVE-2024/CVE-2024-70xx/CVE-2024-7094.json) (`2024-08-13T03:15:04.400`)
|
||||
- [CVE-2024-7388](CVE-2024/CVE-2024-73xx/CVE-2024-7388.json) (`2024-08-13T03:15:04.667`)
|
||||
- [CVE-2024-28166](CVE-2024/CVE-2024-281xx/CVE-2024-28166.json) (`2024-08-13T04:15:06.867`)
|
||||
- [CVE-2024-33003](CVE-2024/CVE-2024-330xx/CVE-2024-33003.json) (`2024-08-13T04:15:07.380`)
|
||||
- [CVE-2024-33005](CVE-2024/CVE-2024-330xx/CVE-2024-33005.json) (`2024-08-13T04:15:07.740`)
|
||||
- [CVE-2024-39591](CVE-2024/CVE-2024-395xx/CVE-2024-39591.json) (`2024-08-13T05:15:13.347`)
|
||||
- [CVE-2024-41730](CVE-2024/CVE-2024-417xx/CVE-2024-41730.json) (`2024-08-13T04:15:08.050`)
|
||||
- [CVE-2024-41731](CVE-2024/CVE-2024-417xx/CVE-2024-41731.json) (`2024-08-13T04:15:08.330`)
|
||||
- [CVE-2024-41732](CVE-2024/CVE-2024-417xx/CVE-2024-41732.json) (`2024-08-13T04:15:08.637`)
|
||||
- [CVE-2024-41733](CVE-2024/CVE-2024-417xx/CVE-2024-41733.json) (`2024-08-13T04:15:08.987`)
|
||||
- [CVE-2024-41734](CVE-2024/CVE-2024-417xx/CVE-2024-41734.json) (`2024-08-13T05:15:13.587`)
|
||||
- [CVE-2024-41735](CVE-2024/CVE-2024-417xx/CVE-2024-41735.json) (`2024-08-13T04:15:09.323`)
|
||||
- [CVE-2024-41736](CVE-2024/CVE-2024-417xx/CVE-2024-41736.json) (`2024-08-13T04:15:09.607`)
|
||||
- [CVE-2024-41737](CVE-2024/CVE-2024-417xx/CVE-2024-41737.json) (`2024-08-13T04:15:10.003`)
|
||||
- [CVE-2024-42373](CVE-2024/CVE-2024-423xx/CVE-2024-42373.json) (`2024-08-13T05:15:13.800`)
|
||||
- [CVE-2024-42374](CVE-2024/CVE-2024-423xx/CVE-2024-42374.json) (`2024-08-13T04:15:10.283`)
|
||||
- [CVE-2024-42375](CVE-2024/CVE-2024-423xx/CVE-2024-42375.json) (`2024-08-13T04:15:10.567`)
|
||||
- [CVE-2024-42376](CVE-2024/CVE-2024-423xx/CVE-2024-42376.json) (`2024-08-13T04:15:10.837`)
|
||||
- [CVE-2024-42377](CVE-2024/CVE-2024-423xx/CVE-2024-42377.json) (`2024-08-13T04:15:11.290`)
|
||||
- [CVE-2024-7092](CVE-2024/CVE-2024-70xx/CVE-2024-7092.json) (`2024-08-13T05:15:14.027`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
24
_state.csv
24
_state.csv
@ -204727,7 +204727,7 @@ CVE-2022-38379,0,0,9eb70de0c72565c49201ab1fc48e6de31cbb23bd0ef17c431d4cd96f5e78e
|
||||
CVE-2022-3838,0,0,b6c87f6371b3c42529104fa7683905834b7f4d26db23a4d8470e1e7da69bdcdb,2023-11-07T03:51:51.887000
|
||||
CVE-2022-38380,0,0,bd883f9c774317159de2534f7103c0f6276317266728ea8b96d8dc126654e307,2022-11-04T14:56:46.817000
|
||||
CVE-2022-38381,0,0,33ab62a56155391eb2d41b3ba9666f38dda60cd0a3cd9ef1e728baa24c1b8bac,2022-11-04T15:03:40.800000
|
||||
CVE-2022-38382,1,1,b370cc1c22ab225188feb01b0cbeedcabefa204d81b24f631bd36698ce389c1e,2024-08-13T02:15:04.730000
|
||||
CVE-2022-38382,0,0,b370cc1c22ab225188feb01b0cbeedcabefa204d81b24f631bd36698ce389c1e,2024-08-13T02:15:04.730000
|
||||
CVE-2022-38383,0,0,c6f707ee147e1c14c9059720db840b81389d2405c75180fb0f2c0e4d4d08569f,2024-08-01T17:57:30.093000
|
||||
CVE-2022-38385,0,0,e5ce73aa67e344471446b9267cebeab2bedbacce8ae377f39c844e85d6dedb4e,2023-11-07T03:50:07.243000
|
||||
CVE-2022-38386,0,0,cd5b6a6598df693531015e8583f683aad3b24e500fbcaa6ba22ce0152abd819c,2024-05-01T19:50:25.633000
|
||||
@ -248371,6 +248371,7 @@ CVE-2024-28162,0,0,1ec7e71177e25cd293cbbf1e2069c505933e30b0255293c8f25c76750a7bd
|
||||
CVE-2024-28163,0,0,2ab950e2f7c3eb99ef2d44d7cd9af8946dbe397a4a6d73bb020329a22bfd44bc,2024-03-12T12:40:13.500000
|
||||
CVE-2024-28164,0,0,ad548c66e5661c4e8af5a7b236b78552ef27421cd91cd0f63f8c805acf9b4cbb,2024-08-06T16:40:49.433000
|
||||
CVE-2024-28165,0,0,46715a30feb276737abc87d7ed511464bf9b4ab74c972d46bf629bd896d4f942,2024-05-14T19:18:31.490000
|
||||
CVE-2024-28166,1,1,7561ba9adc211a54ff550cf61f548d2df6c3d29c89ba4aad56553fc7158d805c,2024-08-13T04:15:06.867000
|
||||
CVE-2024-28167,0,0,1d78d7f4b9ae6d1ce7ebcfb3fbb052b019794bf39b0c5c69579e1b351fc0d30f,2024-04-09T12:48:04.090000
|
||||
CVE-2024-2817,0,0,c674fcdba74ce38976cc24fe7d55a331a6fbc3ee70971f1cbb43b1b952ff96f8,2024-05-17T02:38:32.210000
|
||||
CVE-2024-28171,0,0,33886fb8942146c369bad25646a1251c19953189c1ff16eea603f4d0cd1b835d,2024-03-22T12:45:36.130000
|
||||
@ -251698,7 +251699,9 @@ CVE-2024-3300,0,0,5ed420ceec7dd67c7a8c90e2661f4216c9dcb91251ff120ca64b2c4babcfd8
|
||||
CVE-2024-33000,0,0,4fa8fb2595c0457675d86cac50d60385335480588f2754c16c92238c89528578,2024-05-14T19:17:55.627000
|
||||
CVE-2024-33001,0,0,e89dbc37b1bbada386268abb25bbfd26ba11d29f63337f64d12b9c9ded295629,2024-08-09T19:36:18.637000
|
||||
CVE-2024-33002,0,0,bbd8f2f002227dcd69fa7ae031c0a1ecfe37f7776553c4961a527a6eaa21d480,2024-05-14T19:17:55.627000
|
||||
CVE-2024-33003,1,1,1602f1eee39755514cf50c32ab624620abb60d77d0069d1eb8bb4d10e7f6d86b,2024-08-13T04:15:07.380000
|
||||
CVE-2024-33004,0,0,fd3947efc9f6a79b80c112947403a2b0a9c6fdaf32bf5c0bd7b38f5115845055,2024-07-03T01:57:23.963000
|
||||
CVE-2024-33005,1,1,75a50d0d6a57563982befa31a2e9e5eacdf5e969935fcb1a171c87f62269c1e6,2024-08-13T04:15:07.740000
|
||||
CVE-2024-33006,0,0,36d8448e64529b3242e1d14d3223c50e6fc2fd869abf9e54a01bde3e4dc1ca08,2024-05-14T19:17:55.627000
|
||||
CVE-2024-33007,0,0,8e38d5b6d2b9eb1b80b7c4b68a0aa966535c1221f485493f9e187b5af17c2ba9,2024-07-03T01:57:24.730000
|
||||
CVE-2024-33008,0,0,0bcdb3b7e19679fd6080e0c5f4ecdde63f1bf333ca492bd35c2d1bf34e5150a9,2024-05-14T19:17:55.627000
|
||||
@ -255753,6 +255756,7 @@ CVE-2024-39571,0,0,5f5a00a374a36754f81b606fe5b7617af673280667e3ded939b747c7e23ff
|
||||
CVE-2024-39573,0,0,66fc7feceb0e35a8b2e536fb0fe145ff47c70fa679791c05a2dafe67c9ad9e6e,2024-07-12T14:15:16.400000
|
||||
CVE-2024-3958,0,0,6a863b448c805f7bc2ecb55496071d989e4d5758f7f91c3bce9d94ca75a26261,2024-08-08T13:04:18.753000
|
||||
CVE-2024-3959,0,0,1ce1302f5c536ae0ba1596a30e53c3274b88d91eb780326b1103788329e8cf86,2024-06-28T13:21:52.223000
|
||||
CVE-2024-39591,1,1,47b8fbd24f262bf31363d8c62eae4af35dd97966fd65d2ffb9a2d93516dc83d8,2024-08-13T05:15:13.347000
|
||||
CVE-2024-39592,0,0,092a544949de7319ae89291bc739a96163c6c0d37a46e6cc9f12df6e56b452d2,2024-07-09T18:19:14.047000
|
||||
CVE-2024-39593,0,0,51f4661ccbaba7452aac7223f24d0b1eb585ba800f6962a627249fa8658c86e6,2024-07-09T18:19:14.047000
|
||||
CVE-2024-39594,0,0,637cf3efe25f76e3f7049bdd8fb7c900c50753635b8417f794e35a21a4031116,2024-07-09T18:19:14.047000
|
||||
@ -256712,6 +256716,14 @@ CVE-2024-4172,0,0,ae5cefdd41ee745a5f3463347f20f3f77110439c81ed1ad285dedf4b40da1c
|
||||
CVE-2024-41720,0,0,51d8d22362ddab17d5ebf589fc7956caae3f208813d6f6c5afe48ee9de7d866c,2024-08-05T12:41:45.957000
|
||||
CVE-2024-41726,0,0,e325c72cd77b10fa79a0c73cd0bce9d67f9472d40dd3ab04f6437f9f2b06b815,2024-08-01T13:59:09.707000
|
||||
CVE-2024-4173,0,0,47f39f3e8e603eac743ed4815cd724decf015716a2f0d9c17daf4d8fa3affc2d,2024-04-25T23:15:47.240000
|
||||
CVE-2024-41730,1,1,e17bf734c943b6202bbfa811dcc6a7236ac6ce5c1c0f693c29ef095ec38b00b8,2024-08-13T04:15:08.050000
|
||||
CVE-2024-41731,1,1,455f8a77ca54850f0d8dda84bfc39499d031631c937c80555a015fc961a5f029,2024-08-13T04:15:08.330000
|
||||
CVE-2024-41732,1,1,50da8c0b315ea9fd7548dda5a7cf64e03c1820450f60d9df33a5e039bf3fcfac,2024-08-13T04:15:08.637000
|
||||
CVE-2024-41733,1,1,a1c4a714e7b1fde25db1437d340968bdca08ddd7580730ef8cffb3479028a039,2024-08-13T04:15:08.987000
|
||||
CVE-2024-41734,1,1,60c2a737e28852ce1c0ae950a2bf3192eabf1787dfa51b4c5b646f34b52a9292,2024-08-13T05:15:13.587000
|
||||
CVE-2024-41735,1,1,64465d3a78bd983d9984c0482f5581488c06987c94a936c9318947b31b86e104,2024-08-13T04:15:09.323000
|
||||
CVE-2024-41736,1,1,d6fc4b89e5670a772dfb18d393fc0625c1347b587fb15bff596ab120a5a1a548,2024-08-13T04:15:09.607000
|
||||
CVE-2024-41737,1,1,0bdfb2dd7deafee9a43dbb34847bceaee8248377819c5049ea82baf0bf49fb5e,2024-08-13T04:15:10.003000
|
||||
CVE-2024-4174,0,0,e168dfb28a2573f66b3120de326c0954bda564c12e3831aed75de7f1338d3089,2024-04-25T13:18:02.660000
|
||||
CVE-2024-4175,0,0,2f40401bb337bcc37138495e1928fb4d762f69fc829f768d707a278e8a423e1a,2024-04-25T13:18:02.660000
|
||||
CVE-2024-4176,0,0,2a1e283cc95c7d3d47b09f457f96512613ab4fb1878e9b333c02ce78f75d8385,2024-07-15T16:43:04.163000
|
||||
@ -257019,6 +257031,11 @@ CVE-2024-42366,0,0,26d79ce86c657c865adda744afaa0f4e93052091893cacc16340b64f87dbe
|
||||
CVE-2024-42367,0,0,e076a02bf03f8a97e18817904e3d95718772a1dffa8b800d6df36352b8b88cb0,2024-08-12T13:41:36.517000
|
||||
CVE-2024-4237,0,0,c38818d0c288b1eec57a9be9e655b05254cb3f3487787a1ecd91e69d9c20b38c,2024-05-17T02:40:19.580000
|
||||
CVE-2024-42370,0,0,bc0a8d588f536f34911e68724023599a65528bc23b4d4f6cda3f1a23005982af,2024-08-12T13:41:36.517000
|
||||
CVE-2024-42373,1,1,268e0cf5636ad1593dd2f3bc44571d6f21506a7ab18d4661356804bd79de6260,2024-08-13T05:15:13.800000
|
||||
CVE-2024-42374,1,1,3c9c8180947ca8ac780222a47604e8f8872ffd6769aa2151e9d00dede7d623e1,2024-08-13T04:15:10.283000
|
||||
CVE-2024-42375,1,1,6065461be6bc5e18d7c3a47d5705a7300766beef5cd778d5692a794a88ed9446,2024-08-13T04:15:10.567000
|
||||
CVE-2024-42376,1,1,89b8fa3dfa8d7405706484d0c53242159303a3d7305c907084b14e4b217a89c2,2024-08-13T04:15:10.837000
|
||||
CVE-2024-42377,1,1,6d5101c542ad0c42fa99c43c1ce885fa8c19ec270a032faca7aa5391949c8e41,2024-08-13T04:15:11.290000
|
||||
CVE-2024-4238,0,0,188cceccdce16b8df034bef32fee010a6dd0f801c6690e1589421c7cadfb521c,2024-06-04T19:20:33.063000
|
||||
CVE-2024-42381,0,0,a5fa1277b5fe346d1dd5469d0c93ac780c7d0547ab1d06a7617c27606bb89aa8,2024-08-01T13:59:22.207000
|
||||
CVE-2024-4239,0,0,cecc2be82896f12bf6cdae75a3b125d58c075d387f3da865cfaf565a2c454897,2024-06-04T19:20:33.163000
|
||||
@ -259287,8 +259304,9 @@ CVE-2024-7081,0,0,6a139e489a9ff084a663269dd9c842c08d77e29c45f0c2d71d596839a517bb
|
||||
CVE-2024-7082,0,0,7f537cf9e56a23a456a2abd974bf40cbc8fb8378373545e42b0269e937581d9d,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7084,0,0,3a2aa9dec6c248febe470c8d1edface773b4a9804761de6b43694a8997eff852,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7091,0,0,ea018e26f872aadaa59f554aafa24269e38ad2d18885b5619000c0f610b93be1,2024-07-25T12:36:39.947000
|
||||
CVE-2024-7092,1,1,986c4c3c4a813ce8dd4153a922394c95340e640d4a6ba35a28e2272d3b23bcb1,2024-08-13T05:15:14.027000
|
||||
CVE-2024-7093,0,0,2af97c55d7ffe283d233de8149da5391663d6c7f2b6f21acff51e16815034b7f,2024-08-02T12:59:43.990000
|
||||
CVE-2024-7094,1,1,0a12253c503447778becc90c2babebb7883c1cb4f527863731d0138cb4fc555f,2024-08-13T03:15:04.400000
|
||||
CVE-2024-7094,0,0,0a12253c503447778becc90c2babebb7883c1cb4f527863731d0138cb4fc555f,2024-08-13T03:15:04.400000
|
||||
CVE-2024-7100,0,0,dcfec02e0ae4a6f64f97ae0297c66dfbc0aebe11e663bfc596e9b5b147ad741e,2024-07-30T13:32:45.943000
|
||||
CVE-2024-7101,0,0,5454c1208509de59c11b3527ed3914e0b9b453785a2425c8a2e412da33d0d539,2024-07-26T12:38:41.683000
|
||||
CVE-2024-7105,0,0,a997b2c0e4e91d96626adcc721c978e22c9883ba6b9b8f61b29dff1a03ad516f,2024-07-26T12:38:41.683000
|
||||
@ -259477,7 +259495,7 @@ CVE-2024-7377,0,0,36e56aac53023f827b914b5a997e5857db515082cb379daae4b49f84fe230f
|
||||
CVE-2024-7378,0,0,4660382211ec1d3019061588c841e586a94d2ce616261678ca4d8a3644da536e,2024-08-09T11:19:25.363000
|
||||
CVE-2024-7382,0,0,01c5212f4fa00121002fa8baa527f3a77d1bda25dc068526094d170157a300b3,2024-08-12T13:41:36.517000
|
||||
CVE-2024-7383,0,0,e9e41ebbc97601346bb675225ba79de921d0c65e55a076ffc6c52d62374e6a9a,2024-08-06T16:31:05.780000
|
||||
CVE-2024-7388,1,1,f4e3375c116ac65ee57cd9d7e45f09e024d7fbeda8d5d0fefb24fa46a91a3e45,2024-08-13T03:15:04.667000
|
||||
CVE-2024-7388,0,0,f4e3375c116ac65ee57cd9d7e45f09e024d7fbeda8d5d0fefb24fa46a91a3e45,2024-08-13T03:15:04.667000
|
||||
CVE-2024-7389,0,0,a5776290ae762be985431158def3f2d002b265ca6a95ce830d8f46206854f21a,2024-08-02T12:59:43.990000
|
||||
CVE-2024-7394,0,0,29459446676ebb07a97678c0a588cd4da58f4cf687ed192aec71d6f9cff45400,2024-08-08T18:55:19.180000
|
||||
CVE-2024-7395,0,0,6b93b6db07480e26c0ae715f45aa50cef676fc9c19ea641f155805eb4429ff3f,2024-08-06T16:31:05.780000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user