Auto-Update: 2024-07-25T22:00:17.296729+00:00

This commit is contained in:
cad-safe-bot 2024-07-25 22:03:13 +00:00
parent 09f6bb108c
commit 355b139696
28 changed files with 1420 additions and 108 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1023",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-03-27T08:15:38.140",
"lastModified": "2024-06-20T06:15:08.910",
"lastModified": "2024-07-25T21:15:10.280",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -76,6 +76,10 @@
"url": "https://access.redhat.com/errata/RHSA-2024:3989",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:4884",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-1023",
"source": "secalert@redhat.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1300",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-04-02T08:15:53.993",
"lastModified": "2024-06-20T06:15:09.693",
"lastModified": "2024-07-25T21:15:10.487",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -80,6 +80,10 @@
"url": "https://access.redhat.com/errata/RHSA-2024:3989",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:4884",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-1300",
"source": "secalert@redhat.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1724",
"sourceIdentifier": "security@ubuntu.com",
"published": "2024-07-25T19:15:09.913",
"lastModified": "2024-07-25T19:15:09.913",
"lastModified": "2024-07-25T20:15:03.800",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,30 @@
"value": "In snapd versions prior to 2.62, when using AppArmor for enforcement of \nsandbox permissions, snapd failed to restrict writes to the $HOME/bin\npath. In Ubuntu, when this path exists, it is automatically added to\nthe users PATH. An attacker who could convince a user to install a\nmalicious snap which used the 'home' plug could use this vulnerability\nto install arbitrary scripts into the users PATH which may then be run\nby the user outside of the expected snap sandbox and hence allow them\nto escape confinement."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "security@ubuntu.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.0,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "security@ubuntu.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-2700",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-04-04T14:15:09.950",
"lastModified": "2024-07-14T22:15:02.527",
"lastModified": "2024-07-25T21:15:10.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -68,6 +68,10 @@
"url": "https://access.redhat.com/errata/RHSA-2024:4028",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:4873",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-2700",
"source": "secalert@redhat.com"

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-29068",
"sourceIdentifier": "security@ubuntu.com",
"published": "2024-07-25T20:15:04.280",
"lastModified": "2024-07-25T20:15:04.280",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In snapd versions prior to 2.62, snapd failed to properly check the file\ntype when extracting a snap. The snap format is a squashfs file-system\nimage and so can contain files that are non-regular files (such as pipes \nor sockets etc). Various file entries within the snap squashfs image\n(such as icons etc) are directly read by snapd when it is extracted. An \nattacker who could convince a user to install a malicious snap which\ncontained non-regular files at these paths could then cause snapd to block\nindefinitely trying to read from such files and cause a denial of service."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@ubuntu.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.6,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security@ubuntu.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://github.com/snapcore/snapd/commit/b66fee81606a1c05f965a876ccbaf44174194063",
"source": "security@ubuntu.com"
},
{
"url": "https://github.com/snapcore/snapd/pull/13682",
"source": "security@ubuntu.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-29069",
"sourceIdentifier": "security@ubuntu.com",
"published": "2024-07-25T20:15:04.483",
"lastModified": "2024-07-25T20:15:04.483",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In snapd versions prior to 2.62, snapd failed to properly check the\ndestination of symbolic links when extracting a snap. The snap format \nis a squashfs file-system image and so can contain symbolic links and\nother file types. Various file entries within the snap squashfs image\n(such as icons and desktop files etc) are directly read by snapd when\nit is extracted. An attacker who could convince a user to install a\nmalicious snap which contained symbolic links at these paths could then \ncause snapd to write out the contents of the symbolic link destination\ninto a world-readable directory. This in-turn could allow an unprivileged\nuser to gain access to privileged information."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@ubuntu.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.3,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security@ubuntu.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-610"
}
]
}
],
"references": [
{
"url": "https://github.com/snapcore/snapd/pull/13682",
"source": "security@ubuntu.com"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-3164",
"sourceIdentifier": "security@dotcms.com",
"published": "2024-04-01T22:15:22.507",
"lastModified": "2024-04-11T01:25:55.603",
"lastModified": "2024-07-25T21:15:11.093",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In dotCMS dashboard, the Tools and Log Files tabs under System \u2192 Maintenance Portlet, which is and always has been an Admin portlet, is accessible to anyone with that portlet and not just to CMS Admins. Users that get site admin but not a system admin, should not have access to the System Maintenance \u2192 Tools portlet. This would share database username and password under Log Files and download DB Dump and other dotCMS Content under Tools. Nothing in the System \u2192 Maintenance should be displayed for users with site admin role. Only system admins must have access to System Maintenance.\n\nOWASP Top 10 - A01) Broken Access Control\n\nOWASP Top 10 - A04) Insecure Design\n\n"
"value": "In dotCMS dashboard, the Tools and Log Files tabs under System \u2192 Maintenance Portlet, which is and always has been an Admin portlet, is accessible to anyone with that portlet and not just to CMS Admins. Users that get site admin but not a system admin, should not have access to the System Maintenance \u2192 Tools portlet. This would share database username and password under Log Files and download DB Dump and other dotCMS Content under Tools. Nothing in the System \u2192 Maintenance should be displayed for users with site admin role. Only system admins must have access to System Maintenance.\n\nOWASP Top 10 - A01) Broken Access Control\n\nOWASP Top 10 - A04) Insecure Design"
},
{
"lang": "es",
@ -53,7 +53,7 @@
],
"references": [
{
"url": "https://auth.dotcms.com/security/SI-69?token=dc1f0241-b697-41dd-8140-154658e90c54",
"url": "https://auth.dotcms.com/security/SI-69",
"source": "security@dotcms.com"
},
{

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-3165",
"sourceIdentifier": "security@dotcms.com",
"published": "2024-04-01T22:15:23.080",
"lastModified": "2024-04-02T12:50:42.233",
"lastModified": "2024-07-25T21:15:11.210",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "System->Maintenance-> Log Files in dotCMS dashboard is providing the username/password for database connections in the log output. Nevertheless, this is a moderate issue as it requires a backend admin as well as that dbs are locked down by environment. \u00a0\n\nOWASP Top 10 - A05) Insecure Design\n\nOWASP Top 10 - A05) Security Misconfiguration\n\nOWASP Top 10 - A09) Security Logging and Monitoring Failure\n\n"
"value": "System->Maintenance-> Log Files in dotCMS dashboard is providing the username/password for database connections in the log output. Nevertheless, this is a moderate issue as it requires a backend admin as well as that dbs are locked down by environment. \u00a0\n\nOWASP Top 10 - A05) Insecure Design\n\nOWASP Top 10 - A05) Security Misconfiguration\n\nOWASP Top 10 - A09) Security Logging and Monitoring Failure"
},
{
"lang": "es",
@ -53,7 +53,7 @@
],
"references": [
{
"url": "https://auth.dotcms.com/security/SI-70?token=563ec927-3190-4478-bd77-0d6f8c6fc676",
"url": "https://auth.dotcms.com/security/SI-70",
"source": "security@dotcms.com"
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37037",
"sourceIdentifier": "cybersecurity@se.com",
"published": "2024-06-12T17:15:50.853",
"lastModified": "2024-06-13T18:36:09.010",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-25T20:25:41.760",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
},
{
"source": "cybersecurity@se.com",
"type": "Secondary",
@ -51,10 +71,69 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:schneider-electric:sage_rtu_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "c3414-500-s02k5_p9",
"matchCriteriaId": "D4DDD3DD-576C-404E-A132-D1357936A610"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:schneider-electric:sage_1410:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02E606BD-92F8-4396-AD13-666D76E1E34D"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:schneider-electric:sage_1430:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97E29CCC-4E21-411E-80DD-545A66E9B042"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:schneider-electric:sage_1450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "66759867-027F-4FA6-ABA6-BFDEE49E8F8D"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:schneider-electric:sage_2400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA561E2A-4787-48D7-ABBB-26D0D7D24E6F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:schneider-electric:sage_3030_magnum:-:*:*:*:*:*:*:*",
"matchCriteriaId": "453696F2-0F4C-4000-A438-F814D0FC3504"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:schneider-electric:sage_4400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6462B366-8F9F-49D6-939A-E73C1D5A707C"
}
]
}
]
}
],
"references": [
{
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-163-05&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-163-05.pdf",
"source": "cybersecurity@se.com"
"source": "cybersecurity@se.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37038",
"sourceIdentifier": "cybersecurity@se.com",
"published": "2024-06-12T17:15:51.080",
"lastModified": "2024-06-13T18:36:09.010",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-25T20:25:10.287",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cybersecurity@se.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
},
{
"source": "cybersecurity@se.com",
"type": "Secondary",
@ -51,10 +81,69 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:schneider-electric:sage_rtu_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "c3414-500-s02k5_p9",
"matchCriteriaId": "D4DDD3DD-576C-404E-A132-D1357936A610"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:schneider-electric:sage_1410:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02E606BD-92F8-4396-AD13-666D76E1E34D"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:schneider-electric:sage_1430:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97E29CCC-4E21-411E-80DD-545A66E9B042"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:schneider-electric:sage_1450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "66759867-027F-4FA6-ABA6-BFDEE49E8F8D"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:schneider-electric:sage_2400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA561E2A-4787-48D7-ABBB-26D0D7D24E6F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:schneider-electric:sage_3030_magnum:-:*:*:*:*:*:*:*",
"matchCriteriaId": "453696F2-0F4C-4000-A438-F814D0FC3504"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:schneider-electric:sage_4400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6462B366-8F9F-49D6-939A-E73C1D5A707C"
}
]
}
]
}
],
"references": [
{
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-163-05&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-163-05.pdf",
"source": "cybersecurity@se.com"
"source": "cybersecurity@se.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37039",
"sourceIdentifier": "cybersecurity@se.com",
"published": "2024-06-12T17:15:51.313",
"lastModified": "2024-06-13T18:36:09.010",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-25T20:21:56.307",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "cybersecurity@se.com",
"type": "Secondary",
@ -51,10 +71,69 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:schneider-electric:sage_rtu_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "c3414-500-s02k5_p9",
"matchCriteriaId": "D4DDD3DD-576C-404E-A132-D1357936A610"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:schneider-electric:sage_1410:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02E606BD-92F8-4396-AD13-666D76E1E34D"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:schneider-electric:sage_1430:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97E29CCC-4E21-411E-80DD-545A66E9B042"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:schneider-electric:sage_1450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "66759867-027F-4FA6-ABA6-BFDEE49E8F8D"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:schneider-electric:sage_2400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA561E2A-4787-48D7-ABBB-26D0D7D24E6F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:schneider-electric:sage_3030_magnum:-:*:*:*:*:*:*:*",
"matchCriteriaId": "453696F2-0F4C-4000-A438-F814D0FC3504"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:schneider-electric:sage_4400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6462B366-8F9F-49D6-939A-E73C1D5A707C"
}
]
}
]
}
],
"references": [
{
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-163-05&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-163-05.pdf",
"source": "cybersecurity@se.com"
"source": "cybersecurity@se.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37040",
"sourceIdentifier": "cybersecurity@se.com",
"published": "2024-06-12T17:15:51.540",
"lastModified": "2024-06-13T18:36:09.010",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-25T20:17:38.113",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
},
{
"source": "cybersecurity@se.com",
"type": "Secondary",
@ -51,10 +71,69 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:schneider-electric:sage_rtu_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "c3414-500-s02k5_p9",
"matchCriteriaId": "D4DDD3DD-576C-404E-A132-D1357936A610"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:schneider-electric:sage_1410:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02E606BD-92F8-4396-AD13-666D76E1E34D"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:schneider-electric:sage_1430:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97E29CCC-4E21-411E-80DD-545A66E9B042"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:schneider-electric:sage_1450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "66759867-027F-4FA6-ABA6-BFDEE49E8F8D"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:schneider-electric:sage_2400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA561E2A-4787-48D7-ABBB-26D0D7D24E6F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:schneider-electric:sage_3030_magnum:-:*:*:*:*:*:*:*",
"matchCriteriaId": "453696F2-0F4C-4000-A438-F814D0FC3504"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:schneider-electric:sage_4400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6462B366-8F9F-49D6-939A-E73C1D5A707C"
}
]
}
]
}
],
"references": [
{
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-163-05&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-163-05.pdf",
"source": "cybersecurity@se.com"
"source": "cybersecurity@se.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37878",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-12T17:15:51.803",
"lastModified": "2024-06-13T18:36:09.010",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-25T20:16:31.443",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,66 @@
"value": "Vulnerabilidad de Cross Site Scripting en TWCMS v.2.0.3 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de /TWCMS-gh-pages/twcms/runtime/twcms_view/default,index.htm.php\" PHP repite directamente la entrada de par\u00e1metros desde fuentes externas"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:twcms:twcms:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "44540F68-9C32-44BB-803C-497215F072AE"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/sylvieverykawaii/243f1756151bee027725c6961d8c1ba9",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-38287",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-25T20:15:04.887",
"lastModified": "2024-07-25T20:15:04.887",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The password-reset mechanism in the Forgot Password functionality in R-HUB TurboMeeting through 8.x allows unauthenticated remote attackers to force the application into resetting the administrator's password to a random insecure 8-digit value."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/google/security-research/security/advisories/GHSA-c84v-4pjw-4mh2",
"source": "cve@mitre.org"
},
{
"url": "https://www.rhubcom.com/v5/manuals.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-38288",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-25T20:15:04.953",
"lastModified": "2024-07-25T20:15:04.953",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A command-injection issue in the Certificate Signing Request (CSR) functionality in R-HUB TurboMeeting through 8.x allows authenticated attackers with administrator privileges to execute arbitrary commands on the underlying server as root."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/google/security-research/security/advisories/GHSA-gx6g-8mvx-3q5c",
"source": "cve@mitre.org"
},
{
"url": "https://www.rhubcom.com/v5/manuals.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-38289",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-25T20:15:05.017",
"lastModified": "2024-07-25T20:15:05.017",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A boolean-based SQL injection issue in the Virtual Meeting Password (VMP) endpoint in R-HUB TurboMeeting through 8.x allows unauthenticated remote attackers to extract hashed passwords from the database, and authenticate to the application, via crafted SQL input."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/google/security-research/security/advisories/GHSA-vx5j-8pgx-v42v",
"source": "cve@mitre.org"
},
{
"url": "https://www.rhubcom.com/v5/manuals.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-40324",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-25T20:15:05.077",
"lastModified": "2024-07-25T20:15:05.077",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A CRLF injection vulnerability in E-Staff v5.1 allows attackers to insert Carriage Return (CR) and Line Feed (LF) characters into input fields, leading to HTTP response splitting and header manipulation."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/aleksey-vi/CVE-2024-40324",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-41808",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-25T20:15:05.153",
"lastModified": "2024-07-25T20:15:05.153",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The OpenObserve open-source observability platform provides the ability to filter logs in a dashboard by the values uploaded in a given log. However, all versions of the platform through 0.9.1 do not sanitize user input in the filter selection menu, which may result in complete account takeover. It has been noted that the front-end uses `DOMPurify` or Vue templating to escape cross-site scripting (XSS) extensively, however certain areas of the front end lack this XSS protection. When combining the missing protection with the insecure authentication handling that the front-end uses, a malicious user may be able to take over any victim's account provided they meet the exploitation steps. As of time of publication, no patched version is available."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/openobserve/openobserve/security/advisories/GHSA-hx23-g7m8-h76j",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-41809",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-25T21:15:11.310",
"lastModified": "2024-07-25T21:15:11.310",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OpenObserve is an open-source observability platform. Starting in version 0.4.4 and prior to version 0.10.0, OpenObserve contains a cross-site scripting vulnerability in line 32 of `openobserve/web/src/views/MemberSubscription.vue`. Version 0.10.0 sanitizes incoming html."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/openobserve/openobserve/blob/v0.5.2/web/src/views/MemberSubscription.vue#L32",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/openobserve/openobserve/commit/2334377ebc8b74beb06ab3e5712dbdb1be1eff02",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/openobserve/openobserve/commit/64587261968217dfb8af4c4f6054d58bbc6d331d",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/openobserve/openobserve/security/advisories/GHSA-rw8w-37p9-mrrp",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5557",
"sourceIdentifier": "cybersecurity@se.com",
"published": "2024-06-12T17:15:51.943",
"lastModified": "2024-06-13T18:36:09.010",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-25T20:00:46.653",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 3.6
},
{
"source": "cybersecurity@se.com",
"type": "Secondary",
@ -51,10 +71,72 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:schneider-electric:spacelogic_as-b_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.0.1",
"matchCriteriaId": "5BD47138-7C8F-4D8B-A669-74395596363D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:schneider-electric:spacelogic_as-b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A50B62A0-A6FB-4AB4-94A0-D054C5ADB015"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:schneider-electric:spacelogic_as-p_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.0.1",
"matchCriteriaId": "CA1ABCFA-8D7D-4288-AA9F-FF1B177DBB4E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:schneider-electric:spacelogic_as-p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E516910C-FC39-46FA-82A5-0BF3546FDF33"
}
]
}
]
}
],
"references": [
{
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-163-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-163-04.pdf",
"source": "cybersecurity@se.com"
"source": "cybersecurity@se.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5558",
"sourceIdentifier": "cybersecurity@se.com",
"published": "2024-06-12T17:15:52.160",
"lastModified": "2024-06-13T18:36:09.010",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-25T20:00:25.773",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.5,
"impactScore": 5.9
},
{
"source": "cybersecurity@se.com",
"type": "Secondary",
@ -51,10 +71,72 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:schneider-electric:spacelogic_as-b_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.0.1",
"matchCriteriaId": "5BD47138-7C8F-4D8B-A669-74395596363D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:schneider-electric:spacelogic_as-b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A50B62A0-A6FB-4AB4-94A0-D054C5ADB015"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:schneider-electric:spacelogic_as-p_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.0.1",
"matchCriteriaId": "CA1ABCFA-8D7D-4288-AA9F-FF1B177DBB4E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:schneider-electric:spacelogic_as-p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E516910C-FC39-46FA-82A5-0BF3546FDF33"
}
]
}
]
}
],
"references": [
{
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-163-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-163-04.pdf",
"source": "cybersecurity@se.com"
"source": "cybersecurity@se.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-5971",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-07-08T21:15:12.480",
"lastModified": "2024-07-09T18:19:14.047",
"lastModified": "2024-07-25T21:15:11.560",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -56,6 +56,10 @@
"url": "https://access.redhat.com/errata/RHSA-2024:4392",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:4884",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-5971",
"source": "secalert@redhat.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-6162",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-06-20T15:15:50.570",
"lastModified": "2024-06-20T16:07:50.417",
"lastModified": "2024-07-25T21:15:11.677",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -52,6 +52,10 @@
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2024:4884",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-6162",
"source": "secalert@redhat.com"

View File

@ -0,0 +1,104 @@
{
"id": "CVE-2024-6558",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-07-25T20:15:05.360",
"lastModified": "2024-07-25T20:15:05.360",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "HMS Industrial Networks\n\nAnybus-CompactCom 30 products are vulnerable to a XSS attack caused by the lack of input sanitation checks. As a consequence, it is possible to insert HTML code into input fields and store the HTML code. The stored HTML code will be embedded in the page and executed by host browser the next time the page is loaded, enabling social engineering attacks."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:H/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "ACTIVE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "HIGH",
"subsequentSystemAvailability": "LOW",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://hmsnetworks.blob.core.windows.net/nlw/docs/default-source/products/cybersecurity/security-advisory/hms-security-advisory-2024-05-17-001---anybus---compactcom-30-xss.pdf",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-193-20",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-7105",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-25T21:15:11.790",
"lastModified": "2024-07-25T21:15:11.790",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in ForIP Tecnologia Administra\u00e7\u00e3o PABX 1.x. Affected is an unknown function of the file /detalheIdUra of the component Lista Ura Page. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-272430 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://docs.google.com/document/d/1Q3kLR-HXSmj1LFpnCAt964YHACWwdckz4O8n4ocgB1I/edit?usp=sharing",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.272430",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.272430",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.376659",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-7106",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-25T21:15:12.090",
"lastModified": "2024-07-25T21:15:12.090",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in Spina CMS 2.18.0. Affected by this vulnerability is an unknown functionality of the file /admin/media_folders. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272431. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://github.com/topsky979/Security-Collections/blob/main/cve3/README.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.272431",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.272431",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.376769",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-07-25T20:00:17.401413+00:00
2024-07-25T22:00:17.296729+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-07-25T19:59:58.017000+00:00
2024-07-25T21:15:12.090000+00:00
```
### Last Data Feed Release
@ -33,46 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
257968
257979
```
### CVEs added in the last Commit
Recently added CVEs: `5`
Recently added CVEs: `11`
- [CVE-2022-32759](CVE-2022/CVE-2022-327xx/CVE-2022-32759.json) (`2024-07-25T18:15:02.917`)
- [CVE-2024-1724](CVE-2024/CVE-2024-17xx/CVE-2024-1724.json) (`2024-07-25T19:15:09.913`)
- [CVE-2024-28772](CVE-2024/CVE-2024-287xx/CVE-2024-28772.json) (`2024-07-25T18:15:03.470`)
- [CVE-2024-40318](CVE-2024/CVE-2024-403xx/CVE-2024-40318.json) (`2024-07-25T19:15:10.230`)
- [CVE-2024-40873](CVE-2024/CVE-2024-408xx/CVE-2024-40873.json) (`2024-07-25T18:15:03.800`)
- [CVE-2024-29068](CVE-2024/CVE-2024-290xx/CVE-2024-29068.json) (`2024-07-25T20:15:04.280`)
- [CVE-2024-29069](CVE-2024/CVE-2024-290xx/CVE-2024-29069.json) (`2024-07-25T20:15:04.483`)
- [CVE-2024-38287](CVE-2024/CVE-2024-382xx/CVE-2024-38287.json) (`2024-07-25T20:15:04.887`)
- [CVE-2024-38288](CVE-2024/CVE-2024-382xx/CVE-2024-38288.json) (`2024-07-25T20:15:04.953`)
- [CVE-2024-38289](CVE-2024/CVE-2024-382xx/CVE-2024-38289.json) (`2024-07-25T20:15:05.017`)
- [CVE-2024-40324](CVE-2024/CVE-2024-403xx/CVE-2024-40324.json) (`2024-07-25T20:15:05.077`)
- [CVE-2024-41808](CVE-2024/CVE-2024-418xx/CVE-2024-41808.json) (`2024-07-25T20:15:05.153`)
- [CVE-2024-41809](CVE-2024/CVE-2024-418xx/CVE-2024-41809.json) (`2024-07-25T21:15:11.310`)
- [CVE-2024-6558](CVE-2024/CVE-2024-65xx/CVE-2024-6558.json) (`2024-07-25T20:15:05.360`)
- [CVE-2024-7105](CVE-2024/CVE-2024-71xx/CVE-2024-7105.json) (`2024-07-25T21:15:11.790`)
- [CVE-2024-7106](CVE-2024/CVE-2024-71xx/CVE-2024-7106.json) (`2024-07-25T21:15:12.090`)
### CVEs modified in the last Commit
Recently modified CVEs: `22`
Recently modified CVEs: `15`
- [CVE-2023-46942](CVE-2023/CVE-2023-469xx/CVE-2023-46942.json) (`2024-07-25T18:15:03.177`)
- [CVE-2023-46943](CVE-2023/CVE-2023-469xx/CVE-2023-46943.json) (`2024-07-25T18:15:03.273`)
- [CVE-2024-37114](CVE-2024/CVE-2024-371xx/CVE-2024-37114.json) (`2024-07-25T19:24:44.897`)
- [CVE-2024-37116](CVE-2024/CVE-2024-371xx/CVE-2024-37116.json) (`2024-07-25T19:25:25.243`)
- [CVE-2024-37117](CVE-2024/CVE-2024-371xx/CVE-2024-37117.json) (`2024-07-25T19:25:44.650`)
- [CVE-2024-37120](CVE-2024/CVE-2024-371xx/CVE-2024-37120.json) (`2024-07-25T19:26:03.773`)
- [CVE-2024-37121](CVE-2024/CVE-2024-371xx/CVE-2024-37121.json) (`2024-07-25T19:27:44.087`)
- [CVE-2024-37122](CVE-2024/CVE-2024-371xx/CVE-2024-37122.json) (`2024-07-25T19:28:05.110`)
- [CVE-2024-37199](CVE-2024/CVE-2024-371xx/CVE-2024-37199.json) (`2024-07-25T19:28:39.857`)
- [CVE-2024-37206](CVE-2024/CVE-2024-372xx/CVE-2024-37206.json) (`2024-07-25T19:29:03.367`)
- [CVE-2024-37211](CVE-2024/CVE-2024-372xx/CVE-2024-37211.json) (`2024-07-25T19:29:34.573`)
- [CVE-2024-37215](CVE-2024/CVE-2024-372xx/CVE-2024-37215.json) (`2024-07-25T19:52:28.650`)
- [CVE-2024-37216](CVE-2024/CVE-2024-372xx/CVE-2024-37216.json) (`2024-07-25T19:52:47.640`)
- [CVE-2024-37217](CVE-2024/CVE-2024-372xx/CVE-2024-37217.json) (`2024-07-25T19:53:13.373`)
- [CVE-2024-37219](CVE-2024/CVE-2024-372xx/CVE-2024-37219.json) (`2024-07-25T19:54:15.207`)
- [CVE-2024-37221](CVE-2024/CVE-2024-372xx/CVE-2024-37221.json) (`2024-07-25T19:54:36.480`)
- [CVE-2024-37223](CVE-2024/CVE-2024-372xx/CVE-2024-37223.json) (`2024-07-25T19:55:36.420`)
- [CVE-2024-37229](CVE-2024/CVE-2024-372xx/CVE-2024-37229.json) (`2024-07-25T19:55:16.460`)
- [CVE-2024-37239](CVE-2024/CVE-2024-372xx/CVE-2024-37239.json) (`2024-07-25T19:55:02.207`)
- [CVE-2024-37244](CVE-2024/CVE-2024-372xx/CVE-2024-37244.json) (`2024-07-25T19:21:25.883`)
- [CVE-2024-37568](CVE-2024/CVE-2024-375xx/CVE-2024-37568.json) (`2024-07-25T18:15:03.717`)
- [CVE-2024-5560](CVE-2024/CVE-2024-55xx/CVE-2024-5560.json) (`2024-07-25T19:59:58.017`)
- [CVE-2024-1023](CVE-2024/CVE-2024-10xx/CVE-2024-1023.json) (`2024-07-25T21:15:10.280`)
- [CVE-2024-1300](CVE-2024/CVE-2024-13xx/CVE-2024-1300.json) (`2024-07-25T21:15:10.487`)
- [CVE-2024-1724](CVE-2024/CVE-2024-17xx/CVE-2024-1724.json) (`2024-07-25T20:15:03.800`)
- [CVE-2024-2700](CVE-2024/CVE-2024-27xx/CVE-2024-2700.json) (`2024-07-25T21:15:10.930`)
- [CVE-2024-3164](CVE-2024/CVE-2024-31xx/CVE-2024-3164.json) (`2024-07-25T21:15:11.093`)
- [CVE-2024-3165](CVE-2024/CVE-2024-31xx/CVE-2024-3165.json) (`2024-07-25T21:15:11.210`)
- [CVE-2024-37037](CVE-2024/CVE-2024-370xx/CVE-2024-37037.json) (`2024-07-25T20:25:41.760`)
- [CVE-2024-37038](CVE-2024/CVE-2024-370xx/CVE-2024-37038.json) (`2024-07-25T20:25:10.287`)
- [CVE-2024-37039](CVE-2024/CVE-2024-370xx/CVE-2024-37039.json) (`2024-07-25T20:21:56.307`)
- [CVE-2024-37040](CVE-2024/CVE-2024-370xx/CVE-2024-37040.json) (`2024-07-25T20:17:38.113`)
- [CVE-2024-37878](CVE-2024/CVE-2024-378xx/CVE-2024-37878.json) (`2024-07-25T20:16:31.443`)
- [CVE-2024-5557](CVE-2024/CVE-2024-55xx/CVE-2024-5557.json) (`2024-07-25T20:00:46.653`)
- [CVE-2024-5558](CVE-2024/CVE-2024-55xx/CVE-2024-5558.json) (`2024-07-25T20:00:25.773`)
- [CVE-2024-5971](CVE-2024/CVE-2024-59xx/CVE-2024-5971.json) (`2024-07-25T21:15:11.560`)
- [CVE-2024-6162](CVE-2024/CVE-2024-61xx/CVE-2024-6162.json) (`2024-07-25T21:15:11.677`)
## Download and Usage

View File

@ -200327,7 +200327,7 @@ CVE-2022-32754,0,0,44528e03efc45cfe6984b30938dfeefe9f2f3000e4be4390d6563e270a7a3
CVE-2022-32755,0,0,5c9065ad5ba4f463ef2c8294ab61778cf6d40d7ae191e56329b7f692499d3faf,2023-10-18T20:13:07.170000
CVE-2022-32756,0,0,743a8d0d4596ff1a14054154ea74f4894628ec85618545d34e7c5bddb488fbfc,2024-04-01T15:30:56.003000
CVE-2022-32757,0,0,3f48010b55a4376fca547ec1829d004335dc20820dcf180c34c5aa41581f917a,2023-06-21T01:22:29.450000
CVE-2022-32759,1,1,2a804c4cf122cda283205d0f5f539d8e9516a1c6a597b56baca7687eaee1e968,2024-07-25T18:15:02.917000
CVE-2022-32759,0,0,2a804c4cf122cda283205d0f5f539d8e9516a1c6a597b56baca7687eaee1e968,2024-07-25T18:15:02.917000
CVE-2022-3276,0,0,dba6a2b85f75145f3da62c07909f0b88e61ea5c062c4750bfa5edd3737c0f52d,2023-06-29T14:57:08.057000
CVE-2022-32760,0,0,c13a4a3993b65f1fe05ee6f03b66e59eb8fb340fbd6e98fffb9b50a173ad876f,2022-10-26T15:45:56.503000
CVE-2022-32761,0,0,8435666afc7b06d38d4b49eac84762933f5a25d122dd56fca49908e51f3036b2,2022-08-26T15:00:03.470000
@ -234841,8 +234841,8 @@ CVE-2023-46931,0,0,781a8bd5cd895abc1ff6648ae00a21e20ed64bb1dfc71076cdfc1ac50b4e3
CVE-2023-46932,0,0,bbfcd1f16105893d89779cc02863ecf7afa9e5520ce05eee5ea61aa8304c52e4,2023-12-12T22:32:26.197000
CVE-2023-46935,0,0,4296492901fd27bb5502c55eff7df59e930d9dcbbdc4b97c010b42ab40c5d45a,2023-11-25T01:22:48.623000
CVE-2023-4694,0,0,4af374561d98d7a571388b06aeba9e13942d2790ea5a987ac4c7923a7f5060f4,2023-12-18T19:03:32.283000
CVE-2023-46942,0,1,08c6a8e886f7fae2bf06aacf692a2d0eed974ee4f1370b18828db7f2c8bda870,2024-07-25T18:15:03.177000
CVE-2023-46943,0,1,3ae067c36d55bbbcd74a1ab1c994e778477a4e4efa0b96242be80940436c30be,2024-07-25T18:15:03.273000
CVE-2023-46942,0,0,08c6a8e886f7fae2bf06aacf692a2d0eed974ee4f1370b18828db7f2c8bda870,2024-07-25T18:15:03.177000
CVE-2023-46943,0,0,3ae067c36d55bbbcd74a1ab1c994e778477a4e4efa0b96242be80940436c30be,2024-07-25T18:15:03.273000
CVE-2023-46944,0,0,cdecfb8ec33e56621b60ab98b450535b2a63b71d0ae32649b6017af3e94bf349,2023-12-04T19:39:27.447000
CVE-2023-46947,0,0,69c22ce145401493ee925255d856f76068fc4e105d8df29e207613a75508c727,2023-11-13T18:50:17.157000
CVE-2023-4695,0,0,4336782c8ea05850b9eeaa8589b146f9074b1ac72d74510c5d547425385f33fc,2023-09-07T19:10:59.810000
@ -241726,7 +241726,7 @@ CVE-2024-1019,0,0,9d34fb91efb6a448073ac765944da7eab7ec7fd07c6fef378639c859599f68
CVE-2024-1020,0,0,d848db5207b830f092dac5463c394c0f65f6423556f55d15e70d177c797c2de1,2024-05-17T02:35:10.867000
CVE-2024-1021,0,0,89180a6ed9705fc79d8d8a15633a1cfe9e27adac2a4a623501249d49427826d0,2024-05-17T02:35:10.970000
CVE-2024-1022,0,0,f42eaa1b302319f7e3148377e0522c31bf6c16d407215c446c1d3f1b55b4debd,2024-05-17T02:35:11.070000
CVE-2024-1023,0,0,5fc106b368d14edab9a21177a406d9af77ccfae7394d2fee1b8455f0042d2734,2024-06-20T06:15:08.910000
CVE-2024-1023,0,1,8d9bd157d13575cb2f7284ebb3a2797f2b531ebc1f530e248b6a4889677c4116,2024-07-25T21:15:10.280000
CVE-2024-1024,0,0,d47b3d3840cd70db883d335219cea52b6b4fa0e3fdfc3f4d41efc4b833dff6a1,2024-05-17T02:35:11.210000
CVE-2024-1026,0,0,e127bb5d00442b36eed0e6ff6513a3a42c45706876a3a5f2167365447fb898e7,2024-05-17T02:35:11.320000
CVE-2024-1027,0,0,7cdd04f65f65ce162dee4b0e860b968e4c1a6b7f21d53e978519c8259363a858,2024-05-17T02:35:11.427000
@ -241983,7 +241983,7 @@ CVE-2024-1296,0,0,cf8635aadac748620898188ca490946b2b5c75731feefb613195ade4e01744
CVE-2024-1297,0,0,99ab590c2d129ba188fde6f8a07a02c34afd396d53204b7be1878740241d5dfb,2024-02-20T19:50:53.960000
CVE-2024-1298,0,0,411af97e2820bfadb11b2eaf3380004504a4d88488591f09c66407ba8874f33d,2024-06-11T04:15:12.513000
CVE-2024-1299,0,0,47b1727e0acd46e63ac49556a737ccf9de95f19131e73e34450b5faaae9b9bfd,2024-03-07T13:52:27.110000
CVE-2024-1300,0,0,7d836abb178d445a3d6e3cd3a5fe384137fec5c90217ce545d3f24e0cc66100a,2024-06-20T06:15:09.693000
CVE-2024-1300,0,1,d4f7e8e6b5ac6bd63760d8d777a219ba0fe706357403260381b501f5799316c3,2024-07-25T21:15:10.487000
CVE-2024-1301,0,0,aa9dff2d1f94038a5640d7365d0f71bbab0e502e1b3edb9e0b65d34a36d4daa7,2024-03-12T17:46:17.273000
CVE-2024-1302,0,0,e9f787047b014f4b6f30daaa3fa30820f8e27de1e4755915987ac5c6f51ec22f,2024-03-12T17:46:17.273000
CVE-2024-1303,0,0,7938284658534aa4f8cce7112905f213924253ddbfc659d61385595a0a46a57b,2024-03-12T17:46:17.273000
@ -242368,7 +242368,7 @@ CVE-2024-1720,0,0,5f5ab364680f73fe36cdeef9e6784cd2a2ccddac9910224dc8b02d12bed9bd
CVE-2024-1721,0,0,eb5f51f53eea8230bc7c9cfdc8a49e9ff2dfc7003ac468e860d0250fb679c030,2024-05-21T16:53:56.550000
CVE-2024-1722,0,0,42b1784fafcdd32cd3de080a0db388e459b3fea8e17fa87d175294bba4e974fc,2024-02-29T13:49:29.390000
CVE-2024-1723,0,0,94af9097193d9313a869e27fb9b3b59f6506dae8c000210c296f13f3a745bbf6,2024-03-13T18:15:58.530000
CVE-2024-1724,1,1,67799baff50adb38f35f53a273424a2f85235f7dfdced4157055c2d061679829,2024-07-25T19:15:09.913000
CVE-2024-1724,0,1,fa0a947287b9dc29fbda5db7ec6cdee88bf657d98e8214ff142d41554a8a99af,2024-07-25T20:15:03.800000
CVE-2024-1725,0,0,0ee3e786fc3a6bde6a8ff18d77d971ec6a662811131e618f86487e4ea98156f8,2024-05-08T02:15:09.067000
CVE-2024-1726,0,0,bc2267887b9a57c4c91a15f093198e5713873bada3d866b94302e1c02f97e158,2024-04-25T17:24:59.967000
CVE-2024-1727,0,0,3ffad474a6b8688c8928b9908a66b725cdd6c054eaeb3d886c89c54b8393df58,2024-04-16T12:15:09.843000
@ -247323,7 +247323,7 @@ CVE-2024-26996,0,0,f13300a99169a38a9b0787aa8393009120551c7b98f04ab9b92ca6acb9849
CVE-2024-26997,0,0,454540311fe5335a43e8980f30eaa156ee7f28db2700fe42f0a36241f9986681,2024-06-27T13:15:57.663000
CVE-2024-26998,0,0,281e6eb4c5d981f1fcef4f88265ed667d32fc924df201ebf7684cb9f100b10a0,2024-05-13T08:15:11.390000
CVE-2024-26999,0,0,746a041d0b57a0dac118a92c96e95bc625975348006bc70154dba37cf11624b7,2024-06-25T23:15:28.903000
CVE-2024-2700,0,0,939b4116d7360e4f5976e5b4845a9d7a1ec7a2b88da8dd8daae9b0d2ddab2008,2024-07-14T22:15:02.527000
CVE-2024-2700,0,1,82a9c51beca27476b54a2bd6859e19dcee4c316356467ebff59d9bbcce1bfea0,2024-07-25T21:15:10.930000
CVE-2024-27000,0,0,a188327baa92543e9233de18ad4a972a4d9ab817448115f3501854ba860d8fd9,2024-06-25T23:15:29.003000
CVE-2024-27001,0,0,183600c577d9122077ec4624ba5f391c6d325c24bd29b2ddb007399d500a2963,2024-06-27T12:15:23.673000
CVE-2024-27002,0,0,996c4b76277c18891f74138faebaa5ccbc6a3dccb26df3f871e3eed2ae04779f,2024-05-13T08:15:11.473000
@ -248503,7 +248503,7 @@ CVE-2024-28761,0,0,1598d9c2eee2b826eb7bc7234a2f0a152b27bbbe0fa8d271b9231b5137410
CVE-2024-28762,0,0,2b74775adf8f2e04577ce01a161565bb2636c8ecd701c9ec612fbff0cd2c152c,2024-06-13T18:36:09.010000
CVE-2024-28764,0,0,5a2a0938bbb4f693f69f0c82b8e2ca758cba68255eb4750803702115444076e3,2024-05-01T19:50:25.633000
CVE-2024-2877,0,0,9c132cce53a6b6a85505c31c6786c7f118915faeb72f4167fb6e574e48e7a4f7,2024-06-14T13:15:51.473000
CVE-2024-28772,1,1,f74a209d80ca868658341bdb3a75f9a0241de3f2ccb0e8ae3b2dbf2a1b9de5da,2024-07-25T18:15:03.470000
CVE-2024-28772,0,0,f74a209d80ca868658341bdb3a75f9a0241de3f2ccb0e8ae3b2dbf2a1b9de5da,2024-07-25T18:15:03.470000
CVE-2024-28775,0,0,5d098c3158c815ea687c86a0d108dbe97ecd2414b63c6d65d0b2d73d855ea222,2024-05-01T19:50:25.633000
CVE-2024-28781,0,0,f5b300769af59f51a24ba73ff3daba91993e83b7b87739d1ca34812908ad959d,2024-05-14T16:13:02.773000
CVE-2024-28782,0,0,d8a4a9212e981889860340b852fcdbe4a2fb4c7a2db3a8e1aaf9c149e6ae0f41,2024-04-03T12:38:04.840000
@ -248730,6 +248730,8 @@ CVE-2024-29062,0,0,fd7e4b3c77dd4d50570502e9a76290b7938f32ddd5cdd5d39cf2ed3ca2452
CVE-2024-29063,0,0,a8033ce9e699f35cb65dc8d63268bfdd99aa16f594ad08413d90e8003a22bf2e,2024-04-10T13:24:00.070000
CVE-2024-29064,0,0,88daf3a7de89b464600feb0ee044529e05b02bc2ba2ebf4683d236ef22e3a252,2024-04-10T13:24:00.070000
CVE-2024-29066,0,0,b57916d53c87b911e1996a4619a92f6e3a854e8931117c8efeb51360c73379e4,2024-04-10T13:24:00.070000
CVE-2024-29068,1,1,9e125f91bac5a4be7be32d099461d1eb38ac8191a4502dfeedca5349a30bbf1f,2024-07-25T20:15:04.280000
CVE-2024-29069,1,1,69616911bddd6cd929e9d8f7c1354809115585b17ed50dc9f1fd8b40d1ffbbe7,2024-07-25T20:15:04.483000
CVE-2024-2907,0,0,bd4e59455721fd47a3f3bf4cc54009a430bac090133efd0393d311456e4d173d,2024-04-25T13:18:13.537000
CVE-2024-29070,0,0,9bb8fc70fcc7f2f8368c3f24ea4c3b75c88f99fe4e019835c530d2dc358d46c3,2024-07-24T12:55:13.223000
CVE-2024-29071,0,0,06a4c013d7966a06671f5afa3de9f823a9a7634e70711b0ea0f16d92c424f917,2024-03-25T13:47:14.087000
@ -250515,10 +250517,10 @@ CVE-2024-31630,0,0,2bd16e3fcef7bda0b7ed937f45148dde60c59ea9d09224ef4dc76dc8aeb1e
CVE-2024-31631,0,0,189299e833a9bdec5625f34c9b7af7b60646f6c7b2cd4586dea999ec400d5e00,2024-06-05T17:15:13.130000
CVE-2024-31634,0,0,cd6336332928e139372eaeb7f2fa7bd12555d147721492304ddeef71595ef37a,2024-04-16T13:24:07.103000
CVE-2024-31636,0,0,5030ab945dd9e3d071b87a4da035a97defc5897507c6002a20e31f1008a32478,2024-07-03T01:55:16.580000
CVE-2024-3164,0,0,3587a4a786aeb0161c3daba01d58625583fc84b6bda12de50efe05343cd3812a,2024-04-11T01:25:55.603000
CVE-2024-3164,0,1,78a15a52bf4f552a7d70fc64367124c5316febc749d2958d692ae8e41e90e236,2024-07-25T21:15:11.093000
CVE-2024-31648,0,0,2922cc98178cad367ce9967a9bb0554e38b9bf3f7eeaabe3324ef2b9c342145f,2024-04-16T13:24:07.103000
CVE-2024-31649,0,0,4e97e11dec1d0224f80d5fc46b087ead4bd3503ddd935380e84b5c378f32db60,2024-04-16T13:24:07.103000
CVE-2024-3165,0,0,1ffb2f42a0618b15fefd6848fc647f4cf061e92a8851761ff8bd69909201e474,2024-04-02T12:50:42.233000
CVE-2024-3165,0,1,5d4125192eb880f8e0f62f3292900a808b3e92403c0986cb3fe4084513fabf17,2024-07-25T21:15:11.210000
CVE-2024-31650,0,0,f91457293ffe9951d31a570db1b9cb5f0c4dfb9ffa5e388dc3d2c34a75979925,2024-07-03T01:55:17.350000
CVE-2024-31651,0,0,2f1b682345eecb1fdf8666f197b953cac229ba6b6b34d2f7c287258788c8508c,2024-04-16T13:24:07.103000
CVE-2024-31652,0,0,2f3d2336fbc8f42d1dec7a1682c8c016320ebabd666e8e526baaf0f45acfa966,2024-04-16T13:24:07.103000
@ -253956,11 +253958,11 @@ CVE-2024-37030,0,0,229fd4bf632e5359976e983ea5a913e4683537817839ea114ee982b3925f6
CVE-2024-37031,0,0,82ddf62a2a657c3d311c62178fe12d95bbdde7904d2439de7382b7f0bb38049e,2024-06-03T14:46:24.250000
CVE-2024-37032,0,0,beeaa82ce4e7adb7aae5c7f769a38fdec94afd87f3fb4ab76e8b43cd58eb538b,2024-07-15T22:15:02.747000
CVE-2024-37036,0,0,2b54af7dc068612b23a8155f4d9bf9df74610908e0974df8f03646c9dd55441d,2024-06-13T18:36:09.010000
CVE-2024-37037,0,0,ad81c54489b367db14b11c8770a1047aa68e69595dfbbadc892fa60da3fad513,2024-06-13T18:36:09.010000
CVE-2024-37038,0,0,eb55264bad89d1476a653fa9309ab4c00f75c2d35f11a32e583267b70c5ef85b,2024-06-13T18:36:09.010000
CVE-2024-37039,0,0,080aae54e7e573f172381f77c00061b816d3a9979d30840283133582280c8a10,2024-06-13T18:36:09.010000
CVE-2024-37037,0,1,2437fc027a38caf4d1fff40b3a10b943bdb8be9b58eab07857b1bc1c0eca008e,2024-07-25T20:25:41.760000
CVE-2024-37038,0,1,b6a592cdbbef388e98cb8a181a98f43993dd04af5a29282f5a8621e285e63d4d,2024-07-25T20:25:10.287000
CVE-2024-37039,0,1,427e29014ccfdee6c0a0efce1d2857c8c66aa8f2c91b25d4776461240ebe8e01,2024-07-25T20:21:56.307000
CVE-2024-3704,0,0,8d8edf31fe712d750bd16cd71638ddaccdd4a68add8e16c5c76ca7518cd53211,2024-07-05T13:15:10.640000
CVE-2024-37040,0,0,68078499ec7e7c3700ba1336ad3c5ce078140d85bfbb684c932c287688b747b7,2024-06-13T18:36:09.010000
CVE-2024-37040,0,1,1bbfae07a817bfde05104c14dbae87acc906b9fb8985fe0f6499e654b7c74082,2024-07-25T20:17:38.113000
CVE-2024-3705,0,0,7ec4cc9508fbe16d598471acb12ef9f10887cd89a6e60f8556987a083d32e53c,2024-07-05T13:15:10.820000
CVE-2024-37051,0,0,3268b708226eb5bd758bffa3ca599641a98a9df6a73ccfb261433e9cd20679e2,2024-07-05T16:15:04.777000
CVE-2024-37052,0,0,8c2ce45e1a917627156fb6f5798d593e2b2d38bf19b709592434b7d7f927dfe3,2024-06-04T16:57:41.053000
@ -254007,14 +254009,14 @@ CVE-2024-37110,0,0,22f8d158d06eab5c827b62e4e01a4e15ed273058bbfba1db2001625565816
CVE-2024-37111,0,0,2257ad3ccadca4c80305b1109feafea1f23c81cf8da2e182d0e85f183c413dd1,2024-06-28T13:15:02.750000
CVE-2024-37112,0,0,906b6afd1221b533b38819c616c93e995b341fa67c658fbfc350c9fd924bc330,2024-07-09T18:19:14.047000
CVE-2024-37113,0,0,37d3d4abcaab1ee13f503423a0fed9458bee73e3912cbad0e423bdb46e50b8dc,2024-07-11T13:05:54.930000
CVE-2024-37114,0,1,d3eae6e23e7e337f09a2aaf03e150a16fa3526f43e4deb6086649d679e7628f4,2024-07-25T19:24:44.897000
CVE-2024-37114,0,0,d3eae6e23e7e337f09a2aaf03e150a16fa3526f43e4deb6086649d679e7628f4,2024-07-25T19:24:44.897000
CVE-2024-37115,0,0,c4756c61d3182bc7983d562b038bd1b97c9dd3293a1a84c5b8fb1495fbe9c68f,2024-07-11T13:05:54.930000
CVE-2024-37116,0,1,ca1b19d39a4bc6b70f51489c38c2a0b8ac4fce9555d79bb6d33e3b3564731292,2024-07-25T19:25:25.243000
CVE-2024-37117,0,1,01ed17acd0a2e0df794ba8c2912eec5f0be16c5be324049f1b5f69b2792ef0eb,2024-07-25T19:25:44.650000
CVE-2024-37116,0,0,ca1b19d39a4bc6b70f51489c38c2a0b8ac4fce9555d79bb6d33e3b3564731292,2024-07-25T19:25:25.243000
CVE-2024-37117,0,0,01ed17acd0a2e0df794ba8c2912eec5f0be16c5be324049f1b5f69b2792ef0eb,2024-07-25T19:25:44.650000
CVE-2024-37118,0,0,639faf33c2a8fb2c740912abc8d53c596f87fe9441b8656fdd69a32898ac5358,2024-06-24T18:55:07.707000
CVE-2024-37120,0,1,e217f7fee1fd744744a6e451bd7bab1af64ac11cf693c5332902861bc57f3a1c,2024-07-25T19:26:03.773000
CVE-2024-37121,0,1,f38dd3795bb34ab592f0837185cc69e5390fe6be6ea0a7f8fed8aebfe54c3ef5,2024-07-25T19:27:44.087000
CVE-2024-37122,0,1,b311939d15bf048863cce658485cfe0a8e332201062bbe989c7fc9c6113ec98e,2024-07-25T19:28:05.110000
CVE-2024-37120,0,0,e217f7fee1fd744744a6e451bd7bab1af64ac11cf693c5332902861bc57f3a1c,2024-07-25T19:26:03.773000
CVE-2024-37121,0,0,f38dd3795bb34ab592f0837185cc69e5390fe6be6ea0a7f8fed8aebfe54c3ef5,2024-07-25T19:27:44.087000
CVE-2024-37122,0,0,b311939d15bf048863cce658485cfe0a8e332201062bbe989c7fc9c6113ec98e,2024-07-25T19:28:05.110000
CVE-2024-37124,0,0,36b2aea5b40210d79bc623ba24647826a1125982402ceccf247fbf8a08ffdaed,2024-07-03T02:04:07.457000
CVE-2024-37126,0,0,1f6046db51cdcb2727f4678a45f9e51ce9aa79ec8b1a1ad373e1661d9aaf1cda,2024-07-03T18:00:57.573000
CVE-2024-37130,0,0,cbd9dfc340def95265d907da6835c0ba032c0f95252bb398ce7a3b8c9a6f4189,2024-06-11T13:54:12.057000
@ -254069,37 +254071,37 @@ CVE-2024-37183,0,0,40759211984c4bbc303ff8d56740c06e4761a951d68b4235158aaff8607d5
CVE-2024-37185,0,0,ce3a2eeaa366e0078438541c31768228f57c06809ab185bd78a5053ce3cc0bd3,2024-07-03T18:02:57.857000
CVE-2024-3719,0,0,e1388f5d62a0fd4143182e88b2e1e453aac0737837b6c91a5acc29cfca670145,2024-06-04T19:20:23.553000
CVE-2024-37198,0,0,bf34a330875867b427d853b7c401fbf1da6acf891d942b32d41eff0d38e81318,2024-06-24T18:55:25.417000
CVE-2024-37199,0,1,e0bc94ff3ffb2d447b176c847adbfd46c016cf032811bab5a07d3d759b2c5626,2024-07-25T19:28:39.857000
CVE-2024-37199,0,0,e0bc94ff3ffb2d447b176c847adbfd46c016cf032811bab5a07d3d759b2c5626,2024-07-25T19:28:39.857000
CVE-2024-3720,0,0,82c3bb173e3de3257d537b2361ecb5114d79232c1cdd8a69a91c00ebc4e15c61,2024-06-04T19:20:23.660000
CVE-2024-37202,0,0,d602ef0ddb16b8e29c81df413412da887af66f3f137715e5f410be87522e0f2b,2024-07-12T16:34:58.687000
CVE-2024-37205,0,0,536e384912a3e40e30cd6e5099a5bb49f28b5542a5391ea994ed78796c432e37,2024-07-11T13:05:54.930000
CVE-2024-37206,0,1,46ac9f4747acb5cf6d0e122662eeaf70d40f95b8f37de2a774873a1f69e6b09e,2024-07-25T19:29:03.367000
CVE-2024-37206,0,0,46ac9f4747acb5cf6d0e122662eeaf70d40f95b8f37de2a774873a1f69e6b09e,2024-07-25T19:29:03.367000
CVE-2024-37208,0,0,88780676ffe1ae9fd897090b91bc042de66f491603ea11b382a3765c84e6e5c8,2024-07-08T15:49:22.437000
CVE-2024-3721,0,0,58ef520bee338b66c67331907f685fbd7c92e0aff6743a2585cf1054b1f5f57c,2024-05-17T02:40:05.290000
CVE-2024-37211,0,1,804dfe5c77920eae215c30d95b5818ba0350c8deeead690be1d9e697dbe2c926,2024-07-25T19:29:34.573000
CVE-2024-37211,0,0,804dfe5c77920eae215c30d95b5818ba0350c8deeead690be1d9e697dbe2c926,2024-07-25T19:29:34.573000
CVE-2024-37212,0,0,1da1545884710cf41d492815f0c054f5d2977dca844bcd810f9fc3aadcdd7172,2024-06-24T18:55:34.983000
CVE-2024-37213,0,0,76ad8bbb2fef0724c442abba2bc1429ee5e0a6713c9dc7102d6ccc47a5af0f2d,2024-07-12T16:34:58.687000
CVE-2024-37215,0,1,7290332384116f158511fbcad0f3f768d5480402606bc52700e73d9a46114359,2024-07-25T19:52:28.650000
CVE-2024-37216,0,1,bd0defd93cf4cb7599ac41da3b3dbb29d5664881bdf7e68849687fffd4d23e8b,2024-07-25T19:52:47.640000
CVE-2024-37217,0,1,d84f58845a226533ef88f91cf51665f892cb6ef69eece77705675de91e238de2,2024-07-25T19:53:13.373000
CVE-2024-37219,0,1,2c7aa3d9d28d409130ff5d5c9044f317e12d5479911f280bc49e4b7347bc39fd,2024-07-25T19:54:15.207000
CVE-2024-37215,0,0,7290332384116f158511fbcad0f3f768d5480402606bc52700e73d9a46114359,2024-07-25T19:52:28.650000
CVE-2024-37216,0,0,bd0defd93cf4cb7599ac41da3b3dbb29d5664881bdf7e68849687fffd4d23e8b,2024-07-25T19:52:47.640000
CVE-2024-37217,0,0,d84f58845a226533ef88f91cf51665f892cb6ef69eece77705675de91e238de2,2024-07-25T19:53:13.373000
CVE-2024-37219,0,0,2c7aa3d9d28d409130ff5d5c9044f317e12d5479911f280bc49e4b7347bc39fd,2024-07-25T19:54:15.207000
CVE-2024-3722,0,0,9dc3cd0859a6ddeaf0632839a465d86a9a29445f6ee77561de6f569ccc572620,2024-05-14T16:11:39.510000
CVE-2024-37221,0,1,766b26a6d803c271d220b490262ae06d61dd1cac4959ca103a3955d50aae4081,2024-07-25T19:54:36.480000
CVE-2024-37221,0,0,766b26a6d803c271d220b490262ae06d61dd1cac4959ca103a3955d50aae4081,2024-07-25T19:54:36.480000
CVE-2024-37222,0,0,635e8498a543c26c1589880d4834a9aa974ef1739df3bbdce179ff0012928442,2024-06-20T16:07:50.417000
CVE-2024-37223,0,1,1b179be7f48ae398eff4c7b9081bfdf2225b8f28307188d3d690d5b4d2479983,2024-07-25T19:55:36.420000
CVE-2024-37223,0,0,1b179be7f48ae398eff4c7b9081bfdf2225b8f28307188d3d690d5b4d2479983,2024-07-25T19:55:36.420000
CVE-2024-37224,0,0,b2f8fad8babf6390a899ffcab59d19933dbf25ebcd20a23724248733d817a051,2024-07-22T11:15:02.487000
CVE-2024-37225,0,0,b946fa00c28eb8caf5a6d5a39788a1e53e2f792b5aaa9a8ceea32cf9cc9477e1,2024-07-09T18:19:14.047000
CVE-2024-37227,0,0,8976611308ba369d49147eef8d8ea5d2a5131539396f1b2753e8184974920298,2024-06-24T18:55:44.513000
CVE-2024-37228,0,0,50dbfc0262e032fcd024e283ea4d2f5dc7a22bd356a2985f5a28238a3bd731e1,2024-06-24T19:26:47.037000
CVE-2024-37229,0,1,d93698612f70a0d6adcd99183027f5f231f7f88f4c04c3f165919775d594874a,2024-07-25T19:55:16.460000
CVE-2024-37229,0,0,d93698612f70a0d6adcd99183027f5f231f7f88f4c04c3f165919775d594874a,2024-07-25T19:55:16.460000
CVE-2024-3723,0,0,a8e51847c0e05dbc58ee135e3d4343a67158cd8e9c477d43225f41c0c8d46584,2024-06-11T13:54:12.057000
CVE-2024-37230,0,0,8d57084619240a2b3f54ba5d96719baa3aef26c1c67da001b7c6bb1de46aca2f,2024-06-24T18:55:55.037000
CVE-2024-37231,0,0,7cedd2f54fa716c699a1c60eb2e9af475e40da1bddd52f14ac45e518038037ee,2024-06-24T19:26:47.037000
CVE-2024-37233,0,0,3d06a561c7c4bf48fe1d918a42317c7306b54bdb3fc391a8195af9e48aea7616,2024-06-24T19:26:47.037000
CVE-2024-37234,0,0,fea6d0a90424156a06bdb00d769e0d960a6f376259af6537661bd5a3b2a1e166,2024-07-08T15:49:22.437000
CVE-2024-37239,0,1,5b727df215b62007b7ee68dcb9c09558ce3936f55a528ebecf8aa0bd9468a8d7,2024-07-25T19:55:02.207000
CVE-2024-37239,0,0,5b727df215b62007b7ee68dcb9c09558ce3936f55a528ebecf8aa0bd9468a8d7,2024-07-25T19:55:02.207000
CVE-2024-3724,0,0,a45515256d1a21ae3fa37b44c62076cfa44f7692bce577ec434a496f38d89c35,2024-05-02T18:00:37.360000
CVE-2024-37244,0,1,5c3a9af6285e37425e1586407421acb587487290d95a8772f5a828844b0bd164,2024-07-25T19:21:25.883000
CVE-2024-37244,0,0,5c3a9af6285e37425e1586407421acb587487290d95a8772f5a828844b0bd164,2024-07-25T19:21:25.883000
CVE-2024-37245,0,0,8626e25882ebd198de3d6126617dae182d8919ea6f8ef7871e0dcb2fe24a154c,2024-07-25T13:57:37.537000
CVE-2024-37246,0,0,f9f8bdafd1958cb5c1daa37efa79cd775cf389b1f9af5ac8e8eb74aad2cdac69,2024-07-25T13:57:08.393000
CVE-2024-37247,0,0,8228dfcf5cae02c0a86d645ad30e042bbfe31c09ad0d308292ed19a0aff45168,2024-06-27T12:47:19.847000
@ -254328,7 +254330,7 @@ CVE-2024-37562,0,0,0b83d786f66e9de9e373226ccd98c836d30e495b18960d2b202d15b8c7cdc
CVE-2024-37563,0,0,8ee59654d68a17208e1e6fb0e234f309fd10e95101fa1fbf47cdd01bc38d29aa,2024-07-22T13:00:31.330000
CVE-2024-37564,0,0,38c1f4f7f0e2a429ae8032228a5d335f02708c3ba71c1f459f9aa282c15bca2b,2024-07-12T16:34:58.687000
CVE-2024-37565,0,0,e464b9f5d1b6751d8f05b2f30904029569bd814d202d52a27f0ddb9877153e7b,2024-07-22T13:00:31.330000
CVE-2024-37568,0,1,10bb742dc66b6b359832e76ba7fcecda00069e1d77b4246d2c5e39d11e77602c,2024-07-25T18:15:03.717000
CVE-2024-37568,0,0,10bb742dc66b6b359832e76ba7fcecda00069e1d77b4246d2c5e39d11e77602c,2024-07-25T18:15:03.717000
CVE-2024-37569,0,0,d72ceb83b037eeec35f3e81abfdf503a49618e4aba004fb3f45e6970df347f2e,2024-07-03T02:04:20.517000
CVE-2024-3757,0,0,d3e75f8205a45aeb6c1cb5b9efd4d99998e027f23a100dabf40ce218744ea3e8,2024-05-07T13:39:32.710000
CVE-2024-37570,0,0,39b1ce5225b0c2648395ac0b0dcc8171e61381f07478d1bc7ddc88ce47507024,2024-06-12T16:32:34.513000
@ -254445,7 +254447,7 @@ CVE-2024-37871,0,0,6e47b0e50b0d49ee0ab3ce3931de2ff879ddb6bce80a9c8a17ef14f992b7b
CVE-2024-37872,0,0,55b4403e334cb9996013bbf0a392a1a97f30dd72376b633dd5dca32256bf5ac9,2024-07-12T16:11:44.030000
CVE-2024-37873,0,0,55d4998aa453b15b9f1f9084f8c693113fcb670dbe4b4a10f682ad8eb96cb8e0,2024-07-11T13:06:13.187000
CVE-2024-37877,0,0,98d87856290ef25573ad2760a197255731eca0e52a46652b56e8c7a7e059ade2,2024-06-13T18:35:19.777000
CVE-2024-37878,0,0,282b497331cb5e0e568eabcf2bb041155bba14f057968afb117714a18e5821df,2024-06-13T18:36:09.010000
CVE-2024-37878,0,1,fa121d6a32fa8cd93ec07420dccbfe683ad3a2717d3c26dc1f429f81b82f82de,2024-07-25T20:16:31.443000
CVE-2024-3788,0,0,6b959b24977bfe93124701dc390076a86010e99d87dbe3186e4044d17a0dbe72,2024-05-14T16:11:39.510000
CVE-2024-37880,0,0,82eff4be44645b4491042424f1f050de41161f24ce7895f2d65362440f2e1175,2024-06-12T16:30:15.053000
CVE-2024-37881,0,0,fafe084cbebf486f837ec15aad94ff51628af0624cdbbaa015b3cc71821530aa,2024-06-20T12:44:01.637000
@ -254652,6 +254654,9 @@ CVE-2024-38282,0,0,0b84325e8423ee1d927b510486c46be47f1c2c84d1f4cca17c487d6f5ea39
CVE-2024-38283,0,0,797ece42e985c33b58c5d43ea734dda88927de464a1a03ca93cecae13e751b09,2024-06-13T18:35:19.777000
CVE-2024-38284,0,0,5cfc5feb3350954f13e8af96dc3b24da21459352d04588b83c72c59d0194580e,2024-06-13T18:35:19.777000
CVE-2024-38285,0,0,7e28442ebee8b34d71e5708e3d778f155bb5ea07375678fa14265f29cc1dda8d,2024-06-13T18:35:19.777000
CVE-2024-38287,1,1,e498edc7b8c17a2517757a5d7a93fcb095282748653adcf2c4252e406413dbe1,2024-07-25T20:15:04.887000
CVE-2024-38288,1,1,cccb88659ba5834bf9cab79657cfc8bde92c4fe28a17a5035c5d10ab16d5238e,2024-07-25T20:15:04.953000
CVE-2024-38289,1,1,c8f52e710827514c48c73e5c4fb3c37e86d553703606858417f21ca21c4258d8,2024-07-25T20:15:05.017000
CVE-2024-3829,0,0,bf09bfac220b5e30500c1e820d1b81945c22904d8e9c5dfde5faaff94c981597,2024-06-03T14:46:24.250000
CVE-2024-38293,0,0,db540509e2b09b1cf976c07d02eb5180e9ce221e532de6476381169b8943dd64,2024-07-03T02:04:54.487000
CVE-2024-38294,0,0,cfe666b9712fab71a124db5665eed08c4872b4737e6668b46d4396d88c0aebaa,2024-06-13T18:36:09.010000
@ -255521,9 +255526,10 @@ CVE-2024-4026,0,0,52171498c993bd60e060ecb310b6ba3adb61d51839677cb6159cb2398bf728
CVE-2024-4029,0,0,07f4a3557bfc1c26259e7db528f531861deb0f132a9070099c7eec2168b5c67e,2024-05-02T18:00:37.360000
CVE-2024-4030,0,0,5921f7a0bad0c927ce4dbb50662fc4a35b1a0000bcf4f0fcdcf8646834ec4372,2024-07-05T16:15:05.520000
CVE-2024-4031,0,0,5f28e8c1b5067aec87f50d97cb32ada2d0e893cae64c0dbc730c44d567aac95b,2024-04-23T12:52:09.397000
CVE-2024-40318,1,1,cb8d835da8ac747b72478a7f280452dd5fc676a31f007346bf8684ae861a8946,2024-07-25T19:15:10.230000
CVE-2024-40318,0,0,cb8d835da8ac747b72478a7f280452dd5fc676a31f007346bf8684ae861a8946,2024-07-25T19:15:10.230000
CVE-2024-4032,0,0,3888c98c0dc9113e1403e75c67bd485cc9805e1b1c4cbd087358208523feaf6e,2024-06-20T12:44:22.977000
CVE-2024-40322,0,0,9e0e5f7f0965d0ebc33e4a2793beba8c7539aefbe8b3463a17519c41c1cd56fe,2024-07-16T18:00:02.110000
CVE-2024-40324,1,1,2cd0b5566e2c85a49c1bb07b2878ba68390f2e9997fcae23c936aaf1c12193f2,2024-07-25T20:15:05.077000
CVE-2024-40328,0,0,1ecb3aeeb912c43ca654a9972851beb0d9eb6ba5a46f3041ea2c2c60432dd8b1,2024-07-11T15:06:20.507000
CVE-2024-40329,0,0,26b60d9602f8b52b720fff41651ef4092fad02f73b2a1ba0d8eaca9598e4c3e0,2024-07-12T16:11:58.887000
CVE-2024-4033,0,0,100a78a446daab2b380bdb2306f7e35c115de46018456d74b097346d037da090,2024-05-02T18:00:37.360000
@ -255686,7 +255692,7 @@ CVE-2024-4085,0,0,7aad6a4056b6c332cceb43166a488ef1c1b3002f44d4bee7dddba365a66e15
CVE-2024-4086,0,0,4591112164bebe25a6e3755e5f7d7b3acd1442e1405281bbc9f49b1286c02b38,2024-05-02T18:00:37.360000
CVE-2024-4087,0,0,559dc8fcb531eb7d96e390fa33463b50a20c5a688e8dbefeb3187bf1d2c5f774,2024-06-03T14:46:24.250000
CVE-2024-40872,0,0,f2809cb57fd2b96503f7a1d210b92f81105355a60a5707cf70672f7e05382fae,2024-07-25T17:15:10.977000
CVE-2024-40873,1,1,6464041a53dae5152fc9c7c2516ca31b2e32b6c821b3bd662ccac1119c2697d8,2024-07-25T18:15:03.800000
CVE-2024-40873,0,0,6464041a53dae5152fc9c7c2516ca31b2e32b6c821b3bd662ccac1119c2697d8,2024-07-25T18:15:03.800000
CVE-2024-4088,0,0,61cc31924b86843bbd20c326ef7465dc1aa394b548458b2e1a9fc62c09ede628,2024-06-11T17:11:30.193000
CVE-2024-40898,0,0,6d797ebcdf9c53e0eade3a2c00a2f7d68b1d101b3405603dd30cc2157b772084,2024-07-18T12:28:43.707000
CVE-2024-40899,0,0,e950acc969e56b6fc4b2198a92989ebcef19e4b4c9a9c8ad08fee90da2bba031,2024-07-12T16:34:58.687000
@ -255939,6 +255945,8 @@ CVE-2024-4180,0,0,89f84993baa10ab5b41ed58678b5b9e31ff190980a67ee18130266156f7434
CVE-2024-41800,0,0,c9aa70b9eaf587ef09690849cfa26ea13534efc3690d1375ef8b5e938dedeaa9,2024-07-25T17:15:11.203000
CVE-2024-41801,0,0,f2a624c3a8302c960ea86b1d706f87c6e20f746155fba94a3068e7373f371bea,2024-07-25T17:15:11.423000
CVE-2024-41806,0,0,fada7d53e3e2199f0b078a325bbd8761b8dad871eaa56e934d7ea42fe2265469,2024-07-25T15:15:11.210000
CVE-2024-41808,1,1,9027fae13f229b5c09a375ce00447e22b4b1cce2554b65768ce09d6e6df6ab50,2024-07-25T20:15:05.153000
CVE-2024-41809,1,1,a775db40f5a4daad58b7afae1c9b7db997ff10e10527f601bde83f66eecd4170,2024-07-25T21:15:11.310000
CVE-2024-4181,0,0,318f7b6282445099b873be7e9b6d90d9a8a899d8ebeb5f7676f33b80d9073c4d,2024-05-16T13:03:05.353000
CVE-2024-4182,0,0,0d8f83951a03e7673897d4b6402c0de2918a0bc9490e2ea7f1f32823e0e2921f,2024-04-26T12:58:17.720000
CVE-2024-41824,0,0,47989ccb6404b62a8cb0e5c16e1a456b7d013ad0bd3667ac206b0f700dc33163,2024-07-24T12:55:13.223000
@ -257123,10 +257131,10 @@ CVE-2024-5552,0,0,7f73b574dd8e83d52dd7f28ecc579b960fbf7de562da98c7e63b5b8e0fd54b
CVE-2024-5553,0,0,c4739ca4bfc71591786473d36aff26ccf561ba778e4c902dca863cedff7bba13,2024-06-13T18:36:09.013000
CVE-2024-5554,0,0,74bc30aa41742477c70b24fe6a1325284ef507b86f8f58abff9cf8ec0fe1023d,2024-07-18T12:28:43.707000
CVE-2024-5555,0,0,04da76d03dc7341c8a138d42367dd78d50c3a88f001073e3ae48b09dec66a0e6,2024-07-18T12:28:43.707000
CVE-2024-5557,0,0,e58f4a9974ae6a6ad512e69202e5dee259550c69c446c060784da606557be50e,2024-06-13T18:36:09.010000
CVE-2024-5558,0,0,f5606f757a3846688e526f8e8c7b353ed841a6a8222c822314196faac2c09cd1,2024-06-13T18:36:09.010000
CVE-2024-5557,0,1,71e19027344115370537e5e9f2ac729a9013865b6ffe7632f9b652113dae4753,2024-07-25T20:00:46.653000
CVE-2024-5558,0,1,d7061155c6f430b38a1e769635e4eca1c24478e5beedfff7ff120ab1f85e7481,2024-07-25T20:00:25.773000
CVE-2024-5559,0,0,0c59604cbf219c2ba1c247f52c304752b12dd0f3c92c8b3c96e21ad233f99b0a,2024-06-13T18:36:09.010000
CVE-2024-5560,0,1,002123ffc16696131d663e9c06724d8fb4501ef3ca4bc4191b4229c106e3346c,2024-07-25T19:59:58.017000
CVE-2024-5560,0,0,002123ffc16696131d663e9c06724d8fb4501ef3ca4bc4191b4229c106e3346c,2024-07-25T19:59:58.017000
CVE-2024-5564,0,0,582ae8d6e013444879054c957a9f974e1fbdab4bea18417275b8c53698226d12,2024-07-19T16:15:03.193000
CVE-2024-5565,0,0,e1d36fa68b4a73d6b78bd8eb39c3f27f14d8d32dc884b4fdfa0f8545d690e8d1,2024-07-03T02:09:05.567000
CVE-2024-5566,0,0,5233947f09c3c6c0de3bbc1356e893f745531db8e2929187d54352e5877fee4e,2024-07-17T13:34:20.520000
@ -257404,7 +257412,7 @@ CVE-2024-5965,0,0,9678cf2eb18ba50e506ac9918028ddeb3c443af1b219027dc9d98541cb8273
CVE-2024-5966,0,0,554ab96b833511e084a1ba15972a76a5727ada41d1caccbee2c2fb11ec3339d5,2024-06-24T20:00:23.970000
CVE-2024-5967,0,0,c675e381b6c54a17455bb64c66cffebfea8bdbd8774aa5359fba110937f85e27,2024-06-20T12:44:01.637000
CVE-2024-5970,0,0,e17a8b7d022fd70a35f0b32d2191e09c5597e5e1c83547c2cb361b6d17360bc1,2024-06-20T12:44:01.637000
CVE-2024-5971,0,0,357987ac7415afbcb31d94ddf79e1610c1e4bcbc7b687b78aa636fbb9a4c84d0,2024-07-09T18:19:14.047000
CVE-2024-5971,0,1,e4f98c6267afcbb4d9afd3329ec44a1a1f7f72e0048e7418d4a554bf5527a469,2024-07-25T21:15:11.560000
CVE-2024-5972,0,0,3700c5b3eb4bcd1d3bafe18b568e7aab0a0471128c3ce92a2f73ba8aa9a9cb4f,2024-06-28T19:15:07.500000
CVE-2024-5973,0,0,2d8084cf190a1aabb2055b961565b9805ce6ba0f851f188224d67d99d834e8cf,2024-07-25T15:18:05.157000
CVE-2024-5974,0,0,7ccf1724194ada1507df11f624ca32c0386136cdfa7ae25f910321f76e1abc40,2024-07-09T18:19:14.047000
@ -257537,7 +257545,7 @@ CVE-2024-6153,0,0,aefe9e23b8ed1d87e58382d973bdf0f329fa76bb8df894b701324ee041e253
CVE-2024-6154,0,0,35ebac2e0d0212d63c52f8322328795df9a4917e7e1439a1c42bcda24384133e,2024-06-21T11:22:01.687000
CVE-2024-6160,0,0,ef1a3b3e7f3366ded429b369db1d335204ba1e5aa345b7b6a0087f8051f2471a,2024-06-24T12:57:36.513000
CVE-2024-6161,0,0,4874ef369326f57ebaead3e865a12df6057ceb7ec30e698c3deb9b52e2b10028,2024-07-09T18:19:14.047000
CVE-2024-6162,0,0,f5d2156bbca4d7bf9c6e06ba6e75479b3156c3c547f548b6a1945ea90ef00a3a,2024-06-20T16:07:50.417000
CVE-2024-6162,0,1,58e77c96a091e21bc4222c97fd6c9956f581d56d70327ff91056071a087926f0,2024-07-25T21:15:11.677000
CVE-2024-6163,0,0,a7111efd9bbca18864edd7eac6469f395d4eb81bc59fa76c3e42cc0c59bc6e2c,2024-07-08T15:49:22.437000
CVE-2024-6164,0,0,614f49d1e735bb6e3edae2e7504c9e172f5564ab53752d92c142ee3a46cadc2e,2024-07-18T12:28:43.707000
CVE-2024-6166,0,0,c93093bf8454afe95675994fb929c06931906789a59088dfba4992e2491ed4c6,2024-07-12T14:23:53.600000
@ -257769,6 +257777,7 @@ CVE-2024-6554,0,0,c39b715167392909a130cc6479af2acca1cb23375ca0bdab5b0fb951f0bce6
CVE-2024-6555,0,0,bf68ef8f1bd3876021fc33b504457daba53832080530806ef27f797ea5536a0b,2024-07-12T12:49:07.030000
CVE-2024-6556,0,0,246920c1b32eb0a0369982110178f9a30464427865e75d42710950bf8d6bff6c,2024-07-11T13:05:54.930000
CVE-2024-6557,0,0,5f8a5c5bf162c69368d24395d90aef2e1a9fd156ec4a6d0f0e02ca54e1438d8b,2024-07-16T13:43:58.773000
CVE-2024-6558,1,1,1c60057281bdb12625fceb4e9f76bf006d596617ef2c63102136f042d62dc6ca,2024-07-25T20:15:05.360000
CVE-2024-6559,0,0,2866b76c45bfa3fcb2a29d8b63ef335520f76c77ee94faa7443c1c34b010c185,2024-07-16T13:43:58.773000
CVE-2024-6560,0,0,131d869035ca470d33b727fd5e6c3ee539b49dab7fe493b3f3155c0a8f2eb339,2024-07-22T13:00:53.287000
CVE-2024-6563,0,0,1b4d88909a8afd884220e1df693026407578c717bcca7ba5cdd4e0bbbf29fb3c,2024-07-09T14:19:19.300000
@ -257967,3 +257976,5 @@ CVE-2024-7080,0,0,0e8be1f5ff49b98f2e12f041d9740e0c98dcb4e55d2c6eaebafa31aadf939e
CVE-2024-7081,0,0,4fe1e74e2e72cdc5207c5caa9565efa26fd09299ada94965c4896e36b361ec5f,2024-07-25T12:36:39.947000
CVE-2024-7091,0,0,e8d0dd8bb435701b961e03b8d58836a663b21eec4a32e53ec9bb349c72e7294b,2024-07-25T12:36:39.947000
CVE-2024-7101,0,0,e38bfce381af474fe5d83b2a017b3d9cde94994938f5c809ee169a4122de7c78,2024-07-25T16:15:04.720000
CVE-2024-7105,1,1,79dd67af39650009390e7b476527237a1b12f53b9ae2bc840f7b6f81f68c2970,2024-07-25T21:15:11.790000
CVE-2024-7106,1,1,5e68ef5aeb0a28231e715ea10bcf9bd287440c3361184536e65db5c8aef6e534,2024-07-25T21:15:12.090000

Can't render this file because it is too large.