diff --git a/CVE-2024/CVE-2024-230xx/CVE-2024-23091.json b/CVE-2024/CVE-2024-230xx/CVE-2024-23091.json index 7c92559eeaf..f9a7952feae 100644 --- a/CVE-2024/CVE-2024-230xx/CVE-2024-23091.json +++ b/CVE-2024/CVE-2024-230xx/CVE-2024-23091.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23091", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-30T14:15:02.730", - "lastModified": "2024-07-31T12:57:02.300", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-23T13:51:03.277", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": " El hash de contrase\u00f1a d\u00e9bil usando MD5 en funzioni.php en HotelDruid anterior a 1.32 permite a un atacante obtener contrase\u00f1as en texto plano a partir de valores hash." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-916" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:digitaldruid:hoteldruid:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3.2", + "matchCriteriaId": "B311D3C9-ED7E-4D43-A67C-CA91E2E9E922" + } + ] + } + ] + } + ], "references": [ { "url": "https://medium.com/%40cnetsec/security-advisory-cve-2024-23091-weak-password-hashing-using-md5-f18a6fe3a473", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.hoteldruid.com/en/download.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41676.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41676.json index 4c33cdde674..9cd97a30e67 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41676.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41676.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41676", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-29T15:15:16.040", - "lastModified": "2024-07-29T16:21:52.517", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-23T13:44:42.487", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,14 +81,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*", + "versionEndExcluding": "20.10.1", + "matchCriteriaId": "574AE399-A76D-4A0D-964E-0C0F6D5567E6" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/OpenMage/magento-lts/commit/484cf8afc550e98bbf2c03fbb29a8450a32e7948", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5vrp-638w-p8m2", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41802.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41802.json index bc95a133c63..2ecf113975b 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41802.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41802.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41802", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-30T16:15:04.400", - "lastModified": "2024-07-31T12:57:02.300", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-23T13:42:50.703", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,18 +81,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xibosignage:xibo:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.1.0", + "versionEndExcluding": "3.3.12", + "matchCriteriaId": "A20B9BFF-DDA4-424F-BC7E-1133A9AB1C2C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xibosignage:xibo:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0.0", + "versionEndExcluding": "4.0.14", + "matchCriteriaId": "8A00D67E-5432-413A-9E64-4635502A945F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/xibosignage/xibo-cms/commit/b7a5899338cd841a39702e3fcaff76aa0ffe4075", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-x4qm-vvhp-g7c2", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://xibosignage.com/blog/security-advisory-2024-07", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41803.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41803.json index 252e2d927e3..4ace12c8411 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41803.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41803.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41803", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-30T16:15:04.643", - "lastModified": "2024-07-31T12:57:02.300", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-23T13:41:58.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,18 +81,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xibosignage:xibo:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.1.0", + "versionEndExcluding": "3.3.12", + "matchCriteriaId": "A20B9BFF-DDA4-424F-BC7E-1133A9AB1C2C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xibosignage:xibo:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0.0", + "versionEndExcluding": "4.0.14", + "matchCriteriaId": "8A00D67E-5432-413A-9E64-4635502A945F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/xibosignage/xibo-cms/commit/39a2fd54b3f08831b0004aa2015bd8a753bc567f.patch", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-hpc5-mxfq-44hv", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://xibosignage.com/blog/security-advisory-2024-07", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41804.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41804.json index d8cb0d73029..c7b9e208b8a 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41804.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41804.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41804", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-30T16:15:04.873", - "lastModified": "2024-07-31T12:57:02.300", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-23T13:39:53.613", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,18 +81,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xibosignage:xibo:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.1.0", + "versionEndExcluding": "3.3.12", + "matchCriteriaId": "A20B9BFF-DDA4-424F-BC7E-1133A9AB1C2C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xibosignage:xibo:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0.0", + "versionEndExcluding": "4.0.14", + "matchCriteriaId": "8A00D67E-5432-413A-9E64-4635502A945F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/xibosignage/xibo-cms/commit/39a2fd54b3f08831b0004aa2015bd8a753bc567f.patch", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-4pp3-4mw7-qfwr", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://xibosignage.com/blog/security-advisory-2024-07", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43883.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43883.json new file mode 100644 index 00000000000..883d1155f8f --- /dev/null +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43883.json @@ -0,0 +1,49 @@ +{ + "id": "CVE-2024-43883", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-08-23T13:15:03.873", + "lastModified": "2024-08-23T13:15:03.873", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: vhci-hcd: Do not drop references before new references are gained\n\nAt a few places the driver carries stale pointers\nto references that can still be used. Make sure that does not happen.\nThis strictly speaking closes ZDI-CAN-22273, though there may be\nsimilar races in the driver." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/128e82e41cf7d74a562726c1587d9d2ede1a0a37", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/4dacdb9720aaab10b6be121eae55820174d97174", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/585e6bc7d0a9bf73a8be3d3fb34e86b90cc61a14", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/5a3c473b28ae1c1f7c4dc129e30cb19ae6e96f89", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/9c3746ce8d8fcb3a2405644fc0eec7fc5312de80", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/afdcfd3d6fcdeca2735ca8d994c5f2d24a368f0a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c3d0857b7fc2c49f68f89128a5440176089a8f54", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e8c1e606dab8c56cf074b43b98d0805de7322ba2", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5502.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5502.json index 3f97c6ced7b..8586425c971 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5502.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5502.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Piotnet Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Image Accordion, Dual Heading, and Vertical Timeline widgets in all versions up to, and including, 2.4.30 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Piotnet Addons For Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de los widgets Image Accordion, Dual Heading y Vertical Timeline del complemento en todas las versiones hasta la 2.4.30 incluida debido a una desinfecci\u00f3n de entrada insuficiente y a un escape de salida en atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6699.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6699.json index 1e756d65834..45df9b46b5c 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6699.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6699.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6699", "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2024-07-30T13:15:10.187", - "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-23T13:55:41.357", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "baseSeverity": "CRITICAL" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -73,10 +95,44 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:mikafon:ma7_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0", + "versionEndExcluding": "3.1", + "matchCriteriaId": "56A7D806-F76D-46B9-8832-9CA600F60378" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mikafon:ma7:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2325F2B-C8C8-41D7-90E7-8740A7343B83" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.usom.gov.tr/bildirim/tr-24-1105", - "source": "iletisim@usom.gov.tr" + "source": "iletisim@usom.gov.tr", + "tags": [ + "Not Applicable" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-69xx/CVE-2024-6916.json b/CVE-2024/CVE-2024-69xx/CVE-2024-6916.json index 423c6f8291d..892d42b29a8 100644 --- a/CVE-2024/CVE-2024-69xx/CVE-2024-6916.json +++ b/CVE-2024/CVE-2024-69xx/CVE-2024-6916.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6916", "sourceIdentifier": "zowe-security@lists.openmainframeproject.org", "published": "2024-07-19T11:15:04.373", - "lastModified": "2024-07-19T13:01:44.567", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-23T13:44:38.453", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "zowe-security@lists.openmainframeproject.org", "type": "Secondary", @@ -39,10 +59,42 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zowe:zowe_cli:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6CAE88D2-8999-4F91-A7D1-C25CA54F7ED2" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/zowe/zowe-cli/packages/imperative", - "source": "zowe-security@lists.openmainframeproject.org" + "source": "zowe-security@lists.openmainframeproject.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7986.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7986.json new file mode 100644 index 00000000000..e1190340c6d --- /dev/null +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7986.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-7986", + "sourceIdentifier": "PSIRT@rockwellautomation.com", + "published": "2024-08-23T12:15:03.920", + "lastModified": "2024-08-23T12:15:03.920", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability exists in the Rockwell Automation\u00a0ThinManager\u00ae ThinServer\u00a0that allows a threat actor to disclose sensitive information. A threat actor can exploit this vulnerability by abusing the ThinServer\u2122 service to read arbitrary files by creating a junction that points to the target directory." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "weaknesses": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + } + ], + "references": [ + { + "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1692.html", + "source": "PSIRT@rockwellautomation.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 27b4f94d9ce..beecfe2da6a 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-08-23T10:00:17.166344+00:00 +2024-08-23T14:00:17.862415+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-08-23T09:15:07.853000+00:00 +2024-08-23T13:55:41.357000+00:00 ``` ### Last Data Feed Release @@ -33,23 +33,29 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -261002 +261004 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `2` -- [CVE-2024-38807](CVE-2024/CVE-2024-388xx/CVE-2024-38807.json) (`2024-08-23T09:15:07.453`) -- [CVE-2024-43105](CVE-2024/CVE-2024-431xx/CVE-2024-43105.json) (`2024-08-23T08:15:04.063`) -- [CVE-2024-5502](CVE-2024/CVE-2024-55xx/CVE-2024-5502.json) (`2024-08-23T09:15:07.853`) +- [CVE-2024-43883](CVE-2024/CVE-2024-438xx/CVE-2024-43883.json) (`2024-08-23T13:15:03.873`) +- [CVE-2024-7986](CVE-2024/CVE-2024-79xx/CVE-2024-7986.json) (`2024-08-23T12:15:03.920`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `8` -- [CVE-2024-24303](CVE-2024/CVE-2024-243xx/CVE-2024-24303.json) (`2024-08-23T08:35:02.017`) +- [CVE-2024-23091](CVE-2024/CVE-2024-230xx/CVE-2024-23091.json) (`2024-08-23T13:51:03.277`) +- [CVE-2024-41676](CVE-2024/CVE-2024-416xx/CVE-2024-41676.json) (`2024-08-23T13:44:42.487`) +- [CVE-2024-41802](CVE-2024/CVE-2024-418xx/CVE-2024-41802.json) (`2024-08-23T13:42:50.703`) +- [CVE-2024-41803](CVE-2024/CVE-2024-418xx/CVE-2024-41803.json) (`2024-08-23T13:41:58.513`) +- [CVE-2024-41804](CVE-2024/CVE-2024-418xx/CVE-2024-41804.json) (`2024-08-23T13:39:53.613`) +- [CVE-2024-5502](CVE-2024/CVE-2024-55xx/CVE-2024-5502.json) (`2024-08-23T09:15:07.853`) +- [CVE-2024-6699](CVE-2024/CVE-2024-66xx/CVE-2024-6699.json) (`2024-08-23T13:55:41.357`) +- [CVE-2024-6916](CVE-2024/CVE-2024-69xx/CVE-2024-6916.json) (`2024-08-23T13:44:38.453`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 2807c2a9b24..387702c28bb 100644 --- a/_state.csv +++ b/_state.csv @@ -244906,7 +244906,7 @@ CVE-2024-23084,0,0,ccaed5be16fc1a52374972400141acaca3aa08f2280ed991e42060e59b806 CVE-2024-23085,0,0,c2d4a833e275adaea75d4721a85180117d94ed467e962dd33323527ca073d13c,2024-08-01T23:15:40.570000 CVE-2024-23086,0,0,89628d19c526ab52b9632a83c3b6f0fe544645afa7ae6ca603f80e9a673376ff,2024-08-01T23:15:40.650000 CVE-2024-2309,0,0,b4bab766083001057d63d861d742eba6fb7b051d100b953adf8a9460cad67846,2024-07-03T01:53:08.927000 -CVE-2024-23091,0,0,df238df795e6d17b705ec9a9e5cb5066f9e7d6d1c218e1461a675acaa6ae1192,2024-07-31T12:57:02.300000 +CVE-2024-23091,0,1,ab4ca5c6cb613dd2c24cfc0192cdd8c808e1bd1836c0fdd97fd042737112bcf0,2024-08-23T13:51:03.277000 CVE-2024-23094,0,0,b3be5d271cf78aadb59fda5aaee79baaaf5b6075dd9f37b3166eb28ef143d682,2024-08-01T13:47:04.610000 CVE-2024-2310,0,0,499b89515ad327ded91d404511ae8dcfd3fae99d14d1816e5fc98cd9421d4da6,2024-07-03T01:53:09.113000 CVE-2024-23105,0,0,b6c7dcc2141f6a5f9b64f4fa2deaa854669f89b7d4c0ddd615de0435e0b10df0,2024-05-23T15:52:39.123000 @@ -245766,7 +245766,7 @@ CVE-2024-2430,0,0,c79cca8eeb2327c37f864866fd920048670109f57492fac8de77c9e62b2349 CVE-2024-24300,0,0,388744db6c38cccadb0f3dab4d8ce8dfab7613b9109ff67770c2e72952f5ecca,2024-08-16T19:35:04.613000 CVE-2024-24301,0,0,09fef4ec6b3f7e08d0238c798debb077539e76e61034c99c0f3a3241209eb436,2024-02-15T06:23:39.303000 CVE-2024-24302,0,0,772bc3946fe7698710ee11197feaab740359b0c096b2ee136ddb7f1dcb856d06,2024-07-03T01:48:15.277000 -CVE-2024-24303,0,1,cd85a5d3f2b2d1dbd56e108e3a3fef9929c977d30264ca372079e7b09a9a8077,2024-08-23T08:35:02.017000 +CVE-2024-24303,0,0,cd85a5d3f2b2d1dbd56e108e3a3fef9929c977d30264ca372079e7b09a9a8077,2024-08-23T08:35:02.017000 CVE-2024-24304,0,0,da2049d6e037296a577319f7d1190adf56def2498ce12560f8feb099b85c1170,2024-02-14T19:54:48.247000 CVE-2024-24307,0,0,2fcf14ca38bab8cba1cdf2b8a636d3012bd525398130d18348b221d8feb4a16b,2024-08-08T19:35:10.177000 CVE-2024-24308,0,0,9ada0d13ba5340544a70c5b14e080090e424c427d0bb515a6aa9cb42f7e5a321,2024-08-19T17:35:09.203000 @@ -255832,7 +255832,7 @@ CVE-2024-3879,0,0,a6db760401fb215a79d8f48992cc838e1a5c23839a86defd39dd342ef1c5f8 CVE-2024-38791,0,0,5a7109970d4cb90cfbe2865705276e5511d9a261f6cba475b72302a204ad6517,2024-08-02T12:59:43.990000 CVE-2024-3880,0,0,6dd5da57a8412b823038a64a32d07af4547e4dfdd637b54b90b4556bfd34431d,2024-06-04T19:20:26 CVE-2024-38806,0,0,aa1ff0885d521aab036aaf6506258a484aa869322b524482869e0e1df3ac4a48,2024-07-19T13:01:44.567000 -CVE-2024-38807,1,1,98504364a5f2e08e7b5482e44fe8cf8becbca547e6d346dca497fb37c38131ed,2024-08-23T09:15:07.453000 +CVE-2024-38807,0,0,98504364a5f2e08e7b5482e44fe8cf8becbca547e6d346dca497fb37c38131ed,2024-08-23T09:15:07.453000 CVE-2024-38808,0,0,53d74bad70081ff05a1300457357e667e449199d0759115b64cb9ca097eeea3f,2024-08-20T15:44:20.567000 CVE-2024-3881,0,0,3699310594a82ce285b52bf9c21755fa8173160a66408c76064512e538b3fcc8,2024-05-17T02:40:10.360000 CVE-2024-38810,0,0,a8d05ba61ad79ab8e573251f3391c7e33071f14ecb67883defa939520cad5b0a,2024-08-20T15:44:20.567000 @@ -257217,7 +257217,7 @@ CVE-2024-41671,0,0,246285a77daa13e5014904fc895b261c0c0cff4d8c9ca9cc03eeeb85acc4b CVE-2024-41672,0,0,22d9ca4e03b108f26bbb384eff42397f3ecb90b1b86b629c7d5509df37cbcfd2,2024-07-25T12:36:39.947000 CVE-2024-41674,0,0,2efc360b62688be6ccef330f160a0fdc2fcd4a58aa8980d70f1862bf900859a3,2024-08-21T16:06:23.153000 CVE-2024-41675,0,0,c552f3fd4715304dafe4a5eed89c59bfbc25d98add0df31c42e0865266e54768,2024-08-21T16:06:23.153000 -CVE-2024-41676,0,0,b56341df25e194e84048e23b9e09a8bb0d4e56dc4a3c6b47ab03c0be3461cedc,2024-07-29T16:21:52.517000 +CVE-2024-41676,0,1,f8c727903895dd3f774fa8fafadf4d13b194d23bd32750d21228bccd7e3862a1,2024-08-23T13:44:42.487000 CVE-2024-41677,0,0,350177b79949244cfbc185c5f18aee412a8902a49d36a53e1d4b50536f1effd5,2024-08-12T18:51:29.497000 CVE-2024-4168,0,0,7f4f833c88738c683a47d814a058bf8a730868170937a9aca799097bc79bf22f,2024-06-04T19:20:31.690000 CVE-2024-41681,0,0,6dfdc16b96a5715c67e93e3b8e76db2de56f823b305a3ba2f49e1e9df8ebee6d,2024-08-14T18:37:06.540000 @@ -257278,9 +257278,9 @@ CVE-2024-41799,0,0,7695f1ee4025235dd7412142131ce8d75a7b17a18d3cf669cff383f93f7db CVE-2024-4180,0,0,89f84993baa10ab5b41ed58678b5b9e31ff190980a67ee18130266156f7434fc,2024-06-04T16:57:41.053000 CVE-2024-41800,0,0,f1f2ac0e2d794dd76a91b381bc2e1b73faaa97bde3397dc82b0d97bdf6379a58,2024-07-26T12:38:41.683000 CVE-2024-41801,0,0,59cef218f2c3f45e1ae5cce35d644d9f081db49696f18040aa3a6645570fd734,2024-07-26T12:38:41.683000 -CVE-2024-41802,0,0,996931b83535a88b71fa46477e38f2a249ed84a357be2097534d4d663d8e4fe5,2024-07-31T12:57:02.300000 -CVE-2024-41803,0,0,c7d5d98c108038c70e0e22f6cdd9a348b8a9cd6951457bdb8677d859fc162104,2024-07-31T12:57:02.300000 -CVE-2024-41804,0,0,1eb20b79a205e234d02bd19bc2ee6fc8b7a374c6f3282ae0ce6727f5dc603d2d,2024-07-31T12:57:02.300000 +CVE-2024-41802,0,1,df3ffc15e60fb253ac9ac92656c06622dbcdd055eb926684babad607b7aa0dd2,2024-08-23T13:42:50.703000 +CVE-2024-41803,0,1,bedbe88ae235698c82b2ad57b2f47c1e5f0c63831ea584b99de3e00e8237d30a,2024-08-23T13:41:58.513000 +CVE-2024-41804,0,1,b21d6ffb32663be9b0ff1bfe4da70b277e09e5007aae50381dad1588e6b47073,2024-08-23T13:39:53.613000 CVE-2024-41805,0,0,d25981eca346da6da343ee3e5d5d95b55972138683a74ea987fda864ae2895de,2024-07-29T14:12:08.783000 CVE-2024-41806,0,0,538c83928617c702a46380612d20226d3b25d01fddbfea7d5ac18a5a8a9114ce,2024-07-26T12:38:41.683000 CVE-2024-41807,0,0,e86c4e0879be0f622b0de12c8fba430b974ce92b24702bd4e14aaf255cc07969,2024-07-26T16:15:03.593000 @@ -257988,7 +257988,7 @@ CVE-2024-4307,0,0,9af1fe76e1dfb80a8368bbb3fc69b1f2cbb4fca53c0870243e2c9aa4c3d839 CVE-2024-4308,0,0,63b73a2fc8e8d5be636a84f19daeea12c1e2d5b3b652e500f77934bf4e894f3b,2024-07-03T02:07:22.320000 CVE-2024-4309,0,0,5b40a8fbb2137dd0d77fe6c4c1c586190f4489f813d005ab45d5553c299b0b73,2024-04-30T13:11:16.690000 CVE-2024-4310,0,0,08f5e8e76073c3640785934b5dbc198d89dde47497c02b1ac3fc670d20c22fd2,2024-04-30T13:11:16.690000 -CVE-2024-43105,1,1,88d2cb86dcf2ab6eeb763847136c2cdad50616c14ef16f7e4be1f1249bef14ee,2024-08-23T08:15:04.063000 +CVE-2024-43105,0,0,88d2cb86dcf2ab6eeb763847136c2cdad50616c14ef16f7e4be1f1249bef14ee,2024-08-23T08:15:04.063000 CVE-2024-43111,0,0,f62efcceb5ca8831b50b8cf6203a83ed8d98a025353eabc40d90f197fefec403,2024-08-07T15:35:08.127000 CVE-2024-43112,0,0,adba1dfd679ff5e6d46afc8c8dcdec70df81430cc85737d48e09fa02ef6ca28a,2024-08-06T16:30:24.547000 CVE-2024-43113,0,0,6573240be25b6af3e51d92f2a835e3694315e36c10003c73af950ce730fbb885,2024-08-06T16:30:24.547000 @@ -258302,6 +258302,7 @@ CVE-2024-4388,0,0,4ca48ea0d089cba19e1c949c534ac5647f38f1d5d242799ab5ca49dfb89ed8 CVE-2024-43880,0,0,620881f474d97ec9d89405e6ef8dfb0deeccc719de94ff3b069983055d50d4fe,2024-08-21T12:30:33.697000 CVE-2024-43881,0,0,a40946e430007d3d83ea6de83f76454a9e9d71f940866bbda51302ab2716b573,2024-08-21T12:30:33.697000 CVE-2024-43882,0,0,d55668215cd6d665e2480e5f531dc425652dbf9b52271fdc563c400a262ed289,2024-08-21T12:30:33.697000 +CVE-2024-43883,1,1,d366ebdb32f2a9ae37f4f499296ecfa2e7c80923bd248724d74de0c2fbfd0bab,2024-08-23T13:15:03.873000 CVE-2024-4389,0,0,ea54671e2f1f297a2bfa11e14d812b86fa7a7f36f3487a0625bc52be81ee66b3,2024-08-14T13:00:37.107000 CVE-2024-4390,0,0,e7e7976abdd60c38776b1ca6e6489a541123a6d22aaefce9d02ee1d97e2bf9c9,2024-07-17T14:10:55.550000 CVE-2024-4391,0,0,3c50ad807a6efe83c676c20cbd033bdfc9a5c436710b6a08536dff480db62e6d,2024-05-16T13:03:05.353000 @@ -259296,7 +259297,7 @@ CVE-2024-5498,0,0,249bc82e919537483fbbd7e36f7610746bc1d1c9ddc202b4c423e6c0b454fd CVE-2024-5499,0,0,35dd9c6b1c2542f41b348af6ab7b219dd2f92d9ae3c52132e0b08b696c15d780,2024-07-03T02:09:01.860000 CVE-2024-5500,0,0,08dbbebab53ed3353be996009fd4c1da58d2bb9845253d44287e5f1fec38cdbb,2024-08-01T13:59:52.040000 CVE-2024-5501,0,0,26070cb64be69726a3e53d21c4a7b37433e6fc5848925edeefa1dca5b1a345a3,2024-06-03T14:46:24.250000 -CVE-2024-5502,1,1,5150516efde7a2bb79164bf5b11f514142f344bde12a510b207d42d0ec2fbe85,2024-08-23T09:15:07.853000 +CVE-2024-5502,0,1,90dce12c88b9d7ec56b40a1832ccea990763b032bf5eb3ce7e0e00c127b7999a,2024-08-23T09:15:07.853000 CVE-2024-5503,0,0,1cb7ec9812df8ec09d21a8b50ab54c8421f9f9a3696399f8cf01057ff5629e64,2024-07-17T13:53:37.643000 CVE-2024-5504,0,0,c9387f8cc727d3178a2e16ac3c8996c4ce5ec1145aa8a5124e81e8cb3cf535a8,2024-07-05T14:46:38.860000 CVE-2024-5505,0,0,1c3992bc63f7227d162e21046bb65e254ca8028b79f3c4549059f0cdf09e2564,2024-06-07T14:56:05.647000 @@ -260202,7 +260203,7 @@ CVE-2024-6692,0,0,e73c083ff98791fbf8d27289c6bf10e57a3b04cffd44cadb1a6c218a8e23e9 CVE-2024-6694,0,0,7d61bbb6e4266a8c90354c9d0cb6da1ede156f667671ed3e7d5507b5e685e063,2024-07-22T13:00:53.287000 CVE-2024-6695,0,0,99ceef595ada6c305df9cf6da95af28747b0bb8e4a9bd8bdcd9193a7cc73001a,2024-08-01T14:00:34.400000 CVE-2024-6698,0,0,89497c4dbd46e9ca69b6c9e20c77840978d4a56c74e425e3a4babf4cd1ed1264,2024-08-01T12:42:36.933000 -CVE-2024-6699,0,0,6ab729a29197bfedee1b1cdd0ebefc0ea7ecb94902c78d3c52c6633bd2c89dbb,2024-07-30T13:32:45.943000 +CVE-2024-6699,0,1,929cadbaac0006065219cd2b58294432166a6b8d9db788d9ac82ec21bf2caeb7,2024-08-23T13:55:41.357000 CVE-2024-6703,0,0,58688b231f5fc6deacad90c54b9ce0876a71daf3ee0061b5562a2bcbb8052bf3,2024-07-29T14:12:08.783000 CVE-2024-6704,0,0,32c1d6f59091f2a85229ee95d1e57c685e7e8aed9f15efe17b9f77a5487e60e3,2024-08-02T12:59:43.990000 CVE-2024-6705,0,0,1e166467558902cf3ff2211f8b1aa347feb308f999c65053186e5a13806e8368,2024-07-18T12:28:43.707000 @@ -260329,7 +260330,7 @@ CVE-2024-6911,0,0,46d89096f6e412b4d1b26c4491b89cca1edef35f1edb197cda4640c904cf98 CVE-2024-6912,0,0,b579ffc43dbaf89f50f93b1659dc012bb7b84a2d36bcb32b984560565416f527,2024-07-24T12:55:13.223000 CVE-2024-6913,0,0,a7b65a58f468735b3782ca0a056db617c72da8825fc6f7975e6b5a68a6fa7e93,2024-07-24T12:55:13.223000 CVE-2024-6915,0,0,414f9ee927dc9f475151b863854f151879a129420ab26b169b33952223f7672f,2024-08-06T16:30:24.547000 -CVE-2024-6916,0,0,07530be58a74756ca63b407a63f3e63926b78ec1f0980442182c2c4ab60c9be4,2024-07-19T13:01:44.567000 +CVE-2024-6916,0,1,c704088f9dee3dcd44639fed9c5b3af47a62dc7a88e4f3c99631e528254d2a2b,2024-08-23T13:44:38.453000 CVE-2024-6917,0,0,4e02075ee95758cd510fbf6b3750273e9262615bb77e37c7873232af68d2c294,2024-08-13T17:14:51.100000 CVE-2024-6918,0,0,32617e74cad1800236a330f5d8fc69f0099009b74ddd0e56ba3042a2ff77c383,2024-08-20T15:44:20.567000 CVE-2024-6922,0,0,06f94107ca0d2a59d9bc293905aa46a216c7a8ead08ee7b0b3a0f5d8d9c7d0a8,2024-07-29T14:12:08.783000 @@ -260976,6 +260977,7 @@ CVE-2024-7978,0,0,67c4229f7235438f3aa7b05e7807f93765050dcc016da021af4e6ebc6fa52e CVE-2024-7979,0,0,078bf6b1178f274a34fc1356c3dbffb7074d9c903c74e589d1b081f58230d3ec,2024-08-22T15:35:16.610000 CVE-2024-7980,0,0,1661097b9193f473ee067de4d4f40312756af353419ed3265d5438cf70d837f5,2024-08-22T15:35:17.610000 CVE-2024-7981,0,0,558a7e30af48c73a27172093229eee673e34b504c9731b910b5af4369614c86c,2024-08-22T17:36:24.803000 +CVE-2024-7986,1,1,4b4be1ce299fc8765807b9f6aae526757339b781b3016894d983f936af089685,2024-08-23T12:15:03.920000 CVE-2024-7998,0,0,8aa3505a1b6ed462573d7b65c55c5633ff88a81168885ae03bec6b1db69a2167,2024-08-21T12:30:33.697000 CVE-2024-8003,0,0,1eb6cc8bd16248d54ed281136e233da0a723cb74879af6e3337c9532a3caf8e1,2024-08-21T15:51:28.397000 CVE-2024-8005,0,0,c059370cb975aea915e5671e32cb80d879151797480dbd5423b1593aeba96675,2024-08-21T15:49:59.470000