From 44c903429fc6292f28c9248692b45947be0211dc Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 3 Jul 2024 02:03:28 +0000 Subject: [PATCH] Auto-Update: 2024-07-03T02:00:33.205262+00:00 --- CVE-2007/CVE-2007-34xx/CVE-2007-3484.json | 32 +- CVE-2010/CVE-2010-51xx/CVE-2010-5153.json | 42 +- CVE-2010/CVE-2010-51xx/CVE-2010-5160.json | 42 +- CVE-2010/CVE-2010-51xx/CVE-2010-5164.json | 42 +- CVE-2010/CVE-2010-51xx/CVE-2010-5175.json | 42 +- CVE-2011/CVE-2011-06xx/CVE-2011-0611.json | 35 +- CVE-2011/CVE-2011-07xx/CVE-2011-0737.json | 42 +- CVE-2012/CVE-2012-53xx/CVE-2012-5380.json | 42 +- CVE-2012/CVE-2012-66xx/CVE-2012-6664.json | 40 +- CVE-2013/CVE-2013-32xx/CVE-2013-3245.json | 46 +- CVE-2014/CVE-2014-08xx/CVE-2014-0808.json | 35 +- CVE-2014/CVE-2014-54xx/CVE-2014-5470.json | 40 +- CVE-2015/CVE-2015-20xx/CVE-2015-2051.json | 35 +- CVE-2016/CVE-2016-100xx/CVE-2016-10072.json | 42 +- CVE-2016/CVE-2016-37xx/CVE-2016-3721.json | 25 +- CVE-2016/CVE-2016-65xx/CVE-2016-6531.json | 32 +- CVE-2017/CVE-2017-145xx/CVE-2017-14522.json | 32 +- CVE-2017/CVE-2017-175xx/CVE-2017-17514.json | 42 +- CVE-2017/CVE-2017-179xx/CVE-2017-17919.json | 42 +- CVE-2017/CVE-2017-179xx/CVE-2017-17973.json | 32 +- CVE-2017/CVE-2017-35xx/CVE-2017-3506.json | 35 +- CVE-2017/CVE-2017-73xx/CVE-2017-7305.json | 42 +- CVE-2017/CVE-2017-79xx/CVE-2017-7938.json | 25 +- CVE-2017/CVE-2017-79xx/CVE-2017-7961.json | 32 +- CVE-2017/CVE-2017-84xx/CVE-2017-8459.json | 32 +- CVE-2017/CVE-2017-92xx/CVE-2017-9230.json | 42 +- CVE-2017/CVE-2017-98xx/CVE-2017-9855.json | 42 +- CVE-2017/CVE-2017-98xx/CVE-2017-9856.json | 42 +- CVE-2018/CVE-2018-107xx/CVE-2018-10726.json | 42 +- CVE-2018/CVE-2018-111xx/CVE-2018-11116.json | 42 +- CVE-2018/CVE-2018-116xx/CVE-2018-11681.json | 42 +- CVE-2018/CVE-2018-116xx/CVE-2018-11682.json | 42 +- CVE-2018/CVE-2018-117xx/CVE-2018-11727.json | 46 +- CVE-2018/CVE-2018-163xx/CVE-2018-16310.json | 32 +- CVE-2018/CVE-2018-180xx/CVE-2018-18014.json | 32 +- CVE-2018/CVE-2018-190xx/CVE-2018-19093.json | 42 +- CVE-2018/CVE-2018-204xx/CVE-2018-20437.json | 32 +- CVE-2018/CVE-2018-251xx/CVE-2018-25103.json | 28 +- CVE-2018/CVE-2018-42xx/CVE-2018-4233.json | 35 +- CVE-2018/CVE-2018-44xx/CVE-2018-4404.json | 35 +- CVE-2018/CVE-2018-52xx/CVE-2018-5278.json | 32 +- .../CVE-2019-10100xx/CVE-2019-1010023.json | 32 +- CVE-2019/CVE-2019-10xx/CVE-2019-1057.json | 13 +- CVE-2019/CVE-2019-11xx/CVE-2019-1150.json | 13 +- CVE-2019/CVE-2019-11xx/CVE-2019-1157.json | 13 +- CVE-2019/CVE-2019-11xx/CVE-2019-1162.json | 13 +- CVE-2019/CVE-2019-11xx/CVE-2019-1174.json | 13 +- CVE-2019/CVE-2019-11xx/CVE-2019-1175.json | 13 +- CVE-2019/CVE-2019-11xx/CVE-2019-1177.json | 13 +- CVE-2019/CVE-2019-11xx/CVE-2019-1185.json | 35 +- CVE-2019/CVE-2019-11xx/CVE-2019-1188.json | 13 +- CVE-2019/CVE-2019-11xx/CVE-2019-1193.json | 13 +- CVE-2019/CVE-2019-11xx/CVE-2019-1194.json | 13 +- CVE-2019/CVE-2019-127xx/CVE-2019-12760.json | 32 +- CVE-2019/CVE-2019-12xx/CVE-2019-1205.json | 25 +- CVE-2019/CVE-2019-12xx/CVE-2019-1227.json | 13 +- CVE-2019/CVE-2019-12xx/CVE-2019-1228.json | 13 +- CVE-2019/CVE-2019-136xx/CVE-2019-13644.json | 32 +- CVE-2019/CVE-2019-142xx/CVE-2019-14232.json | 35 +- CVE-2019/CVE-2019-195xx/CVE-2019-19589.json | 40 +- CVE-2019/CVE-2019-197xx/CVE-2019-19750.json | 33 +- CVE-2019/CVE-2019-197xx/CVE-2019-19751.json | 15 +- CVE-2019/CVE-2019-197xx/CVE-2019-19754.json | 15 +- CVE-2019/CVE-2019-72xx/CVE-2019-7256.json | 35 +- CVE-2020/CVE-2020-106xx/CVE-2020-10672.json | 33 +- CVE-2020/CVE-2020-106xx/CVE-2020-10673.json | 33 +- CVE-2020/CVE-2020-109xx/CVE-2020-10968.json | 33 +- CVE-2020/CVE-2020-109xx/CVE-2020-10969.json | 33 +- CVE-2020/CVE-2020-111xx/CVE-2020-11111.json | 33 +- CVE-2020/CVE-2020-111xx/CVE-2020-11112.json | 33 +- CVE-2020/CVE-2020-111xx/CVE-2020-11113.json | 33 +- CVE-2020/CVE-2020-118xx/CVE-2020-11876.json | 40 +- CVE-2020/CVE-2020-126xx/CVE-2020-12667.json | 33 +- CVE-2020/CVE-2020-136xx/CVE-2020-13654.json | 33 +- CVE-2020/CVE-2020-139xx/CVE-2020-13965.json | 35 +- CVE-2020/CVE-2020-143xx/CVE-2020-14318.json | 33 +- CVE-2020/CVE-2020-143xx/CVE-2020-14323.json | 23 +- CVE-2020/CVE-2020-14xx/CVE-2020-1493.json | 33 +- CVE-2020/CVE-2020-157xx/CVE-2020-15778.json | 40 +- CVE-2020/CVE-2020-175xx/CVE-2020-17519.json | 25 +- CVE-2020/CVE-2020-183xx/CVE-2020-18305.json | 40 +- CVE-2020/CVE-2020-189xx/CVE-2020-18900.json | 40 +- CVE-2020/CVE-2020-255xx/CVE-2020-25575.json | 40 +- CVE-2020/CVE-2020-279xx/CVE-2020-27986.json | 44 +- CVE-2020/CVE-2020-282xx/CVE-2020-28246.json | 40 +- CVE-2020/CVE-2020-355xx/CVE-2020-35587.json | 20 +- CVE-2020/CVE-2020-361xx/CVE-2020-36179.json | 33 +- CVE-2020/CVE-2020-361xx/CVE-2020-36180.json | 35 +- CVE-2020/CVE-2020-361xx/CVE-2020-36181.json | 35 +- CVE-2020/CVE-2020-361xx/CVE-2020-36182.json | 35 +- CVE-2020/CVE-2020-361xx/CVE-2020-36184.json | 35 +- CVE-2021/CVE-2021-253xx/CVE-2021-25310.json | 20 +- CVE-2021/CVE-2021-269xx/CVE-2021-26918.json | 40 +- CVE-2021/CVE-2021-269xx/CVE-2021-26928.json | 40 +- CVE-2021/CVE-2021-282xx/CVE-2021-28246.json | 40 +- CVE-2021/CVE-2021-282xx/CVE-2021-28248.json | 40 +- CVE-2021/CVE-2021-304xx/CVE-2021-30496.json | 40 +- CVE-2021/CVE-2021-319xx/CVE-2021-31954.json | 13 +- CVE-2021/CVE-2021-319xx/CVE-2021-31955.json | 13 +- CVE-2021/CVE-2021-319xx/CVE-2021-31970.json | 13 +- CVE-2021/CVE-2021-331xx/CVE-2021-33145.json | 13 +- CVE-2021/CVE-2021-331xx/CVE-2021-33146.json | 13 +- CVE-2021/CVE-2021-331xx/CVE-2021-33161.json | 13 +- CVE-2021/CVE-2021-349xx/CVE-2021-34983.json | 13 +- CVE-2021/CVE-2021-355xx/CVE-2021-35559.json | 13 +- CVE-2021/CVE-2021-360xx/CVE-2021-36088.json | 33 +- CVE-2021/CVE-2021-363xx/CVE-2021-36367.json | 33 +- CVE-2021/CVE-2021-363xx/CVE-2021-36380.json | 35 +- CVE-2021/CVE-2021-363xx/CVE-2021-36387.json | 33 +- CVE-2021/CVE-2021-380xx/CVE-2021-38000.json | 33 +- CVE-2021/CVE-2021-406xx/CVE-2021-40655.json | 35 +- CVE-2021/CVE-2021-413xx/CVE-2021-41345.json | 13 +- CVE-2021/CVE-2021-417xx/CVE-2021-41732.json | 40 +- CVE-2021/CVE-2021-417xx/CVE-2021-41780.json | 35 +- CVE-2021/CVE-2021-445xx/CVE-2021-44529.json | 25 +- CVE-2021/CVE-2021-445xx/CVE-2021-44534.json | 40 +- CVE-2021/CVE-2021-44xx/CVE-2021-4440.json | 44 +- CVE-2021/CVE-2021-457xx/CVE-2021-45785.json | 35 +- CVE-2021/CVE-2021-472xx/CVE-2021-47230.json | 40 +- CVE-2021/CVE-2021-472xx/CVE-2021-47232.json | 40 +- CVE-2021/CVE-2021-472xx/CVE-2021-47238.json | 40 +- CVE-2021/CVE-2021-472xx/CVE-2021-47241.json | 40 +- CVE-2021/CVE-2021-472xx/CVE-2021-47242.json | 40 +- CVE-2021/CVE-2021-472xx/CVE-2021-47259.json | 40 +- CVE-2021/CVE-2021-472xx/CVE-2021-47274.json | 40 +- CVE-2021/CVE-2021-472xx/CVE-2021-47284.json | 40 +- CVE-2021/CVE-2021-472xx/CVE-2021-47295.json | 40 +- CVE-2021/CVE-2021-473xx/CVE-2021-47313.json | 40 +- CVE-2021/CVE-2021-473xx/CVE-2021-47323.json | 40 +- CVE-2021/CVE-2021-473xx/CVE-2021-47324.json | 40 +- CVE-2021/CVE-2021-473xx/CVE-2021-47327.json | 40 +- CVE-2021/CVE-2021-473xx/CVE-2021-47329.json | 40 +- CVE-2021/CVE-2021-473xx/CVE-2021-47348.json | 40 +- CVE-2021/CVE-2021-473xx/CVE-2021-47354.json | 40 +- CVE-2021/CVE-2021-473xx/CVE-2021-47356.json | 40 +- CVE-2021/CVE-2021-473xx/CVE-2021-47367.json | 40 +- CVE-2021/CVE-2021-473xx/CVE-2021-47368.json | 40 +- CVE-2021/CVE-2021-473xx/CVE-2021-47369.json | 40 +- CVE-2021/CVE-2021-473xx/CVE-2021-47371.json | 40 +- CVE-2021/CVE-2021-473xx/CVE-2021-47378.json | 40 +- CVE-2021/CVE-2021-473xx/CVE-2021-47389.json | 40 +- CVE-2021/CVE-2021-474xx/CVE-2021-47403.json | 40 +- CVE-2021/CVE-2021-474xx/CVE-2021-47441.json | 40 +- CVE-2021/CVE-2021-474xx/CVE-2021-47456.json | 44 +- CVE-2021/CVE-2021-474xx/CVE-2021-47464.json | 40 +- CVE-2021/CVE-2021-474xx/CVE-2021-47476.json | 15 +- CVE-2021/CVE-2021-474xx/CVE-2021-47482.json | 40 +- CVE-2021/CVE-2021-474xx/CVE-2021-47486.json | 40 +- CVE-2021/CVE-2021-475xx/CVE-2021-47503.json | 40 +- CVE-2021/CVE-2021-475xx/CVE-2021-47519.json | 35 +- CVE-2021/CVE-2021-475xx/CVE-2021-47548.json | 40 +- CVE-2021/CVE-2021-475xx/CVE-2021-47551.json | 28 +- CVE-2021/CVE-2021-475xx/CVE-2021-47586.json | 15 +- CVE-2022/CVE-2022-05xx/CVE-2022-0555.json | 40 +- CVE-2022/CVE-2022-254xx/CVE-2022-25481.json | 40 +- CVE-2022/CVE-2022-261xx/CVE-2022-26125.json | 23 +- CVE-2022/CVE-2022-261xx/CVE-2022-26129.json | 23 +- CVE-2022/CVE-2022-265xx/CVE-2022-26580.json | 33 +- CVE-2022/CVE-2022-265xx/CVE-2022-26581.json | 23 +- CVE-2022/CVE-2022-265xx/CVE-2022-26582.json | 37 +- CVE-2022/CVE-2022-279xx/CVE-2022-27948.json | 20 +- CVE-2022/CVE-2022-286xx/CVE-2022-28657.json | 35 +- CVE-2022/CVE-2022-303xx/CVE-2022-30332.json | 35 +- CVE-2022/CVE-2022-30xx/CVE-2022-3038.json | 34 +- CVE-2022/CVE-2022-30xx/CVE-2022-3080.json | 13 +- CVE-2022/CVE-2022-318xx/CVE-2022-31814.json | 33 +- CVE-2022/CVE-2022-322xx/CVE-2022-32275.json | 40 +- CVE-2022/CVE-2022-325xx/CVE-2022-32502.json | 40 +- CVE-2022/CVE-2022-325xx/CVE-2022-32503.json | 40 +- CVE-2022/CVE-2022-325xx/CVE-2022-32504.json | 40 +- CVE-2022/CVE-2022-325xx/CVE-2022-32508.json | 40 +- CVE-2022/CVE-2022-327xx/CVE-2022-32742.json | 23 +- CVE-2022/CVE-2022-328xx/CVE-2022-32897.json | 35 +- CVE-2022/CVE-2022-332xx/CVE-2022-33246.json | 33 +- CVE-2022/CVE-2022-345xx/CVE-2022-34561.json | 40 +- CVE-2022/CVE-2022-355xx/CVE-2022-35503.json | 44 +- CVE-2022/CVE-2022-370xx/CVE-2022-37019.json | 28 +- CVE-2022/CVE-2022-374xx/CVE-2022-37410.json | 13 +- CVE-2022/CVE-2022-381xx/CVE-2022-38164.json | 13 +- CVE-2022/CVE-2022-387xx/CVE-2022-38710.json | 23 +- CVE-2022/CVE-2022-408xx/CVE-2022-40824.json | 40 +- CVE-2022/CVE-2022-408xx/CVE-2022-40826.json | 40 +- CVE-2022/CVE-2022-429xx/CVE-2022-42974.json | 40 +- CVE-2022/CVE-2022-432xx/CVE-2022-43272.json | 22 +- CVE-2022/CVE-2022-432xx/CVE-2022-43279.json | 33 +- CVE-2022/CVE-2022-453xx/CVE-2022-45378.json | 30 +- CVE-2022/CVE-2022-459xx/CVE-2022-45929.json | 40 +- CVE-2022/CVE-2022-463xx/CVE-2022-46366.json | 30 +- CVE-2022/CVE-2022-468xx/CVE-2022-46897.json | 40 +- CVE-2022/CVE-2022-469xx/CVE-2022-46966.json | 33 +- CVE-2022/CVE-2022-470xx/CVE-2022-47065.json | 40 +- CVE-2022/CVE-2022-486xx/CVE-2022-48618.json | 35 +- CVE-2022/CVE-2022-486xx/CVE-2022-48635.json | 40 +- CVE-2022/CVE-2022-486xx/CVE-2022-48637.json | 15 +- CVE-2022/CVE-2022-486xx/CVE-2022-48651.json | 40 +- CVE-2022/CVE-2022-486xx/CVE-2022-48655.json | 33 +- CVE-2022/CVE-2022-486xx/CVE-2022-48666.json | 40 +- CVE-2022/CVE-2022-486xx/CVE-2022-48670.json | 35 +- CVE-2022/CVE-2022-486xx/CVE-2022-48684.json | 19 +- CVE-2022/CVE-2022-486xx/CVE-2022-48685.json | 15 +- CVE-2022/CVE-2022-487xx/CVE-2022-48716.json | 40 +- CVE-2022/CVE-2022-487xx/CVE-2022-48747.json | 44 +- CVE-2022/CVE-2022-487xx/CVE-2022-48748.json | 44 +- CVE-2022/CVE-2022-487xx/CVE-2022-48754.json | 44 +- CVE-2023/CVE-2023-205xx/CVE-2023-20598.json | 35 +- CVE-2023/CVE-2023-209xx/CVE-2023-20938.json | 35 +- CVE-2023/CVE-2023-212xx/CVE-2023-21267.json | 13 +- CVE-2023/CVE-2023-225xx/CVE-2023-22527.json | 15 +- CVE-2023/CVE-2023-226xx/CVE-2023-22656.json | 13 +- CVE-2023/CVE-2023-229xx/CVE-2023-22934.json | 13 +- CVE-2023/CVE-2023-230xx/CVE-2023-23019.json | 40 +- CVE-2023/CVE-2023-239xx/CVE-2023-23923.json | 15 +- CVE-2023/CVE-2023-240xx/CVE-2023-24069.json | 20 +- CVE-2023/CVE-2023-253xx/CVE-2023-25399.json | 40 +- CVE-2023/CVE-2023-261xx/CVE-2023-26130.json | 13 +- CVE-2023/CVE-2023-265xx/CVE-2023-26566.json | 40 +- CVE-2023/CVE-2023-266xx/CVE-2023-26603.json | 40 +- CVE-2023/CVE-2023-267xx/CVE-2023-26793.json | 40 +- CVE-2023/CVE-2023-271xx/CVE-2023-27198.json | 33 +- CVE-2023/CVE-2023-275xx/CVE-2023-27561.json | 33 +- CVE-2023/CVE-2023-283xx/CVE-2023-28329.json | 23 +- CVE-2023/CVE-2023-283xx/CVE-2023-28330.json | 23 +- CVE-2023/CVE-2023-283xx/CVE-2023-28333.json | 23 +- CVE-2023/CVE-2023-283xx/CVE-2023-28334.json | 23 +- CVE-2023/CVE-2023-283xx/CVE-2023-28383.json | 13 +- CVE-2023/CVE-2023-288xx/CVE-2023-28863.json | 33 +- CVE-2023/CVE-2023-303xx/CVE-2023-30394.json | 33 +- CVE-2023/CVE-2023-318xx/CVE-2023-31889.json | 40 +- CVE-2023/CVE-2023-319xx/CVE-2023-31973.json | 44 +- CVE-2023/CVE-2023-327xx/CVE-2023-32712.json | 13 +- CVE-2023/CVE-2023-328xx/CVE-2023-32890.json | 33 +- CVE-2023/CVE-2023-33xx/CVE-2023-3347.json | 13 +- CVE-2023/CVE-2023-340xx/CVE-2023-34048.json | 15 +- CVE-2023/CVE-2023-343xx/CVE-2023-34362.json | 35 +- CVE-2023/CVE-2023-357xx/CVE-2023-35701.json | 28 +- CVE-2023/CVE-2023-358xx/CVE-2023-35858.json | 40 +- CVE-2023/CVE-2023-360xx/CVE-2023-36053.json | 33 +- CVE-2023/CVE-2023-362xx/CVE-2023-36268.json | 28 +- CVE-2023/CVE-2023-370xx/CVE-2023-37057.json | 40 +- CVE-2023/CVE-2023-375xx/CVE-2023-37526.json | 15 +- CVE-2023/CVE-2023-382xx/CVE-2023-38290.json | 40 +- CVE-2023/CVE-2023-382xx/CVE-2023-38292.json | 40 +- CVE-2023/CVE-2023-382xx/CVE-2023-38293.json | 40 +- CVE-2023/CVE-2023-382xx/CVE-2023-38295.json | 40 +- CVE-2023/CVE-2023-382xx/CVE-2023-38296.json | 48 +- CVE-2023/CVE-2023-382xx/CVE-2023-38297.json | 40 +- CVE-2023/CVE-2023-382xx/CVE-2023-38298.json | 48 +- CVE-2023/CVE-2023-383xx/CVE-2023-38300.json | 40 +- CVE-2023/CVE-2023-383xx/CVE-2023-38301.json | 40 +- CVE-2023/CVE-2023-384xx/CVE-2023-38407.json | 23 +- CVE-2023/CVE-2023-384xx/CVE-2023-38420.json | 13 +- CVE-2023/CVE-2023-385xx/CVE-2023-38581.json | 13 +- CVE-2023/CVE-2023-388xx/CVE-2023-38831.json | 35 +- CVE-2023/CVE-2023-398xx/CVE-2023-39852.json | 40 +- CVE-2023/CVE-2023-39xx/CVE-2023-3972.json | 15 +- CVE-2023/CVE-2023-400xx/CVE-2023-40070.json | 13 +- CVE-2023/CVE-2023-401xx/CVE-2023-40155.json | 17 +- CVE-2023/CVE-2023-402xx/CVE-2023-40297.json | 40 +- CVE-2023/CVE-2023-40xx/CVE-2023-4065.json | 13 +- CVE-2023/CVE-2023-411xx/CVE-2023-41102.json | 33 +- CVE-2023/CVE-2023-419xx/CVE-2023-41993.json | 25 +- CVE-2023/CVE-2023-41xx/CVE-2023-4132.json | 13 +- CVE-2023/CVE-2023-424xx/CVE-2023-42427.json | 40 +- CVE-2023/CVE-2023-427xx/CVE-2023-42757.json | 28 +- CVE-2023/CVE-2023-427xx/CVE-2023-42773.json | 13 +- CVE-2023/CVE-2023-429xx/CVE-2023-42916.json | 35 +- CVE-2023/CVE-2023-429xx/CVE-2023-42931.json | 35 +- CVE-2023/CVE-2023-429xx/CVE-2023-42955.json | 40 +- CVE-2023/CVE-2023-42xx/CVE-2023-4233.json | 13 +- CVE-2023/CVE-2023-42xx/CVE-2023-4234.json | 13 +- CVE-2023/CVE-2023-430xx/CVE-2023-43090.json | 15 +- CVE-2023/CVE-2023-432xx/CVE-2023-43208.json | 35 +- CVE-2023/CVE-2023-437xx/CVE-2023-43745.json | 13 +- CVE-2023/CVE-2023-437xx/CVE-2023-43770.json | 35 +- CVE-2023/CVE-2023-438xx/CVE-2023-43845.json | 40 +- CVE-2023/CVE-2023-448xx/CVE-2023-44857.json | 40 +- CVE-2023/CVE-2023-452xx/CVE-2023-45217.json | 13 +- CVE-2023/CVE-2023-453xx/CVE-2023-45315.json | 13 +- CVE-2023/CVE-2023-453xx/CVE-2023-45320.json | 17 +- CVE-2023/CVE-2023-453xx/CVE-2023-45360.json | 33 +- CVE-2023/CVE-2023-453xx/CVE-2023-45385.json | 40 +- CVE-2023/CVE-2023-457xx/CVE-2023-45707.json | 15 +- CVE-2023/CVE-2023-458xx/CVE-2023-45846.json | 13 +- CVE-2023/CVE-2023-459xx/CVE-2023-45924.json | 43 +- CVE-2023/CVE-2023-459xx/CVE-2023-45925.json | 22 +- CVE-2023/CVE-2023-460xx/CVE-2023-46012.json | 28 +- CVE-2023/CVE-2023-460xx/CVE-2023-46060.json | 28 +- CVE-2023/CVE-2023-462xx/CVE-2023-46295.json | 40 +- CVE-2023/CVE-2023-463xx/CVE-2023-46304.json | 40 +- CVE-2023/CVE-2023-463xx/CVE-2023-46316.json | 33 +- CVE-2023/CVE-2023-463xx/CVE-2023-46360.json | 35 +- CVE-2023/CVE-2023-465xx/CVE-2023-46566.json | 40 +- CVE-2023/CVE-2023-466xx/CVE-2023-46689.json | 13 +- CVE-2023/CVE-2023-466xx/CVE-2023-46691.json | 13 +- CVE-2023/CVE-2023-466xx/CVE-2023-46694.json | 40 +- CVE-2023/CVE-2023-468xx/CVE-2023-46806.json | 15 +- CVE-2023/CVE-2023-468xx/CVE-2023-46807.json | 15 +- CVE-2023/CVE-2023-471xx/CVE-2023-47169.json | 13 +- CVE-2023/CVE-2023-472xx/CVE-2023-47210.json | 13 +- CVE-2023/CVE-2023-472xx/CVE-2023-47235.json | 23 +- CVE-2023/CVE-2023-472xx/CVE-2023-47282.json | 13 +- CVE-2023/CVE-2023-474xx/CVE-2023-47435.json | 40 +- CVE-2023/CVE-2023-476xx/CVE-2023-47678.json | 20 +- CVE-2023/CVE-2023-47xx/CVE-2023-4762.json | 35 +- CVE-2023/CVE-2023-480xx/CVE-2023-48022.json | 40 +- CVE-2023/CVE-2023-481xx/CVE-2023-48183.json | 40 +- CVE-2023/CVE-2023-481xx/CVE-2023-48184.json | 40 +- CVE-2023/CVE-2023-483xx/CVE-2023-48368.json | 13 +- CVE-2023/CVE-2023-487xx/CVE-2023-48727.json | 13 +- CVE-2023/CVE-2023-487xx/CVE-2023-48792.json | 15 +- CVE-2023/CVE-2023-487xx/CVE-2023-48793.json | 15 +- CVE-2023/CVE-2023-488xx/CVE-2023-48865.json | 40 +- CVE-2023/CVE-2023-491xx/CVE-2023-49110.json | 28 +- CVE-2023/CVE-2023-491xx/CVE-2023-49111.json | 28 +- CVE-2023/CVE-2023-491xx/CVE-2023-49112.json | 40 +- CVE-2023/CVE-2023-491xx/CVE-2023-49113.json | 28 +- CVE-2023/CVE-2023-492xx/CVE-2023-49224.json | 40 +- CVE-2023/CVE-2023-493xx/CVE-2023-49330.json | 15 +- CVE-2023/CVE-2023-493xx/CVE-2023-49331.json | 15 +- CVE-2023/CVE-2023-493xx/CVE-2023-49332.json | 15 +- CVE-2023/CVE-2023-493xx/CVE-2023-49333.json | 15 +- CVE-2023/CVE-2023-493xx/CVE-2023-49334.json | 15 +- CVE-2023/CVE-2023-493xx/CVE-2023-49335.json | 15 +- CVE-2023/CVE-2023-494xx/CVE-2023-49473.json | 40 +- CVE-2023/CVE-2023-495xx/CVE-2023-49501.json | 40 +- CVE-2023/CVE-2023-495xx/CVE-2023-49502.json | 40 +- CVE-2023/CVE-2023-495xx/CVE-2023-49515.json | 35 +- CVE-2023/CVE-2023-495xx/CVE-2023-49528.json | 40 +- CVE-2023/CVE-2023-496xx/CVE-2023-49614.json | 13 +- CVE-2023/CVE-2023-500xx/CVE-2023-50007.json | 40 +- CVE-2023/CVE-2023-500xx/CVE-2023-50009.json | 40 +- CVE-2023/CVE-2023-500xx/CVE-2023-50010.json | 40 +- CVE-2023/CVE-2023-500xx/CVE-2023-50029.json | 40 +- CVE-2023/CVE-2023-504xx/CVE-2023-50445.json | 33 +- CVE-2023/CVE-2023-509xx/CVE-2023-50915.json | 28 +- CVE-2023/CVE-2023-512xx/CVE-2023-51258.json | 35 +- CVE-2023/CVE-2023-514xx/CVE-2023-51436.json | 28 +- CVE-2023/CVE-2023-517xx/CVE-2023-51710.json | 40 +- CVE-2023/CVE-2023-517xx/CVE-2023-51750.json | 20 +- CVE-2023/CVE-2023-517xx/CVE-2023-51791.json | 40 +- CVE-2023/CVE-2023-517xx/CVE-2023-51792.json | 40 +- CVE-2023/CVE-2023-517xx/CVE-2023-51793.json | 40 +- CVE-2023/CVE-2023-517xx/CVE-2023-51795.json | 40 +- CVE-2023/CVE-2023-517xx/CVE-2023-51796.json | 40 +- CVE-2023/CVE-2023-517xx/CVE-2023-51797.json | 40 +- CVE-2023/CVE-2023-517xx/CVE-2023-51798.json | 40 +- CVE-2023/CVE-2023-518xx/CVE-2023-51847.json | 40 +- CVE-2023/CVE-2023-520xx/CVE-2023-52080.json | 40 +- CVE-2023/CVE-2023-521xx/CVE-2023-52162.json | 40 +- CVE-2023/CVE-2023-523xx/CVE-2023-52338.json | 35 +- CVE-2023/CVE-2023-523xx/CVE-2023-52367.json | 40 +- CVE-2023/CVE-2023-526xx/CVE-2023-52670.json | 40 +- CVE-2023/CVE-2023-526xx/CVE-2023-52672.json | 40 +- CVE-2023/CVE-2023-526xx/CVE-2023-52696.json | 40 +- CVE-2023/CVE-2023-527xx/CVE-2023-52723.json | 40 +- CVE-2023/CVE-2023-527xx/CVE-2023-52725.json | 40 +- CVE-2023/CVE-2023-527xx/CVE-2023-52726.json | 40 +- CVE-2023/CVE-2023-527xx/CVE-2023-52733.json | 40 +- CVE-2023/CVE-2023-527xx/CVE-2023-52735.json | 40 +- CVE-2023/CVE-2023-527xx/CVE-2023-52752.json | 35 +- CVE-2023/CVE-2023-527xx/CVE-2023-52765.json | 40 +- CVE-2023/CVE-2023-528xx/CVE-2023-52801.json | 40 +- CVE-2023/CVE-2023-528xx/CVE-2023-52810.json | 40 +- CVE-2023/CVE-2023-528xx/CVE-2023-52814.json | 35 +- CVE-2023/CVE-2023-528xx/CVE-2023-52832.json | 40 +- CVE-2023/CVE-2023-528xx/CVE-2023-52844.json | 40 +- CVE-2023/CVE-2023-528xx/CVE-2023-52858.json | 40 +- CVE-2023/CVE-2023-528xx/CVE-2023-52861.json | 40 +- CVE-2023/CVE-2023-528xx/CVE-2023-52869.json | 40 +- CVE-2023/CVE-2023-528xx/CVE-2023-52883.json | 40 +- CVE-2023/CVE-2023-52xx/CVE-2023-5249.json | 25 +- CVE-2023/CVE-2023-54xx/CVE-2023-5405.json | 13 +- CVE-2023/CVE-2023-55xx/CVE-2023-5545.json | 15 +- CVE-2023/CVE-2023-56xx/CVE-2023-5675.json | 13 +- CVE-2023/CVE-2023-60xx/CVE-2023-6082.json | 28 +- CVE-2023/CVE-2023-65xx/CVE-2023-6516.json | 15 +- CVE-2023/CVE-2023-67xx/CVE-2023-6787.json | 13 +- CVE-2023/CVE-2023-71xx/CVE-2023-7101.json | 25 +- CVE-2023/CVE-2023-71xx/CVE-2023-7164.json | 28 +- CVE-2023/CVE-2023-72xx/CVE-2023-7252.json | 28 +- CVE-2023/CVE-2023-72xx/CVE-2023-7253.json | 28 +- CVE-2023/CVE-2023-72xx/CVE-2023-7261.json | 40 +- CVE-2024/CVE-2024-00xx/CVE-2024-0024.json | 40 +- CVE-2024/CVE-2024-00xx/CVE-2024-0026.json | 40 +- CVE-2024/CVE-2024-00xx/CVE-2024-0042.json | 40 +- CVE-2024/CVE-2024-00xx/CVE-2024-0043.json | 28 +- CVE-2024/CVE-2024-00xx/CVE-2024-0044.json | 40 +- CVE-2024/CVE-2024-01xx/CVE-2024-0153.json | 27 +- CVE-2024/CVE-2024-02xx/CVE-2024-0253.json | 13 +- CVE-2024/CVE-2024-02xx/CVE-2024-0269.json | 13 +- CVE-2024/CVE-2024-03xx/CVE-2024-0397.json | 40 +- CVE-2024/CVE-2024-04xx/CVE-2024-0427.json | 28 +- CVE-2024/CVE-2024-05xx/CVE-2024-0518.json | 35 +- CVE-2024/CVE-2024-05xx/CVE-2024-0519.json | 39 +- CVE-2024/CVE-2024-06xx/CVE-2024-0671.json | 38 +- CVE-2024/CVE-2024-06xx/CVE-2024-0672.json | 28 +- CVE-2024/CVE-2024-09xx/CVE-2024-0980.json | 28 +- CVE-2024/CVE-2024-10xx/CVE-2024-1065.json | 28 +- CVE-2024/CVE-2024-10xx/CVE-2024-1077.json | 25 +- CVE-2024/CVE-2024-11xx/CVE-2024-1100.json | 72 +- CVE-2024/CVE-2024-11xx/CVE-2024-1102.json | 15 +- CVE-2024/CVE-2024-11xx/CVE-2024-1132.json | 13 +- CVE-2024/CVE-2024-12xx/CVE-2024-1204.json | 28 +- CVE-2024/CVE-2024-12xx/CVE-2024-1219.json | 40 +- CVE-2024/CVE-2024-13xx/CVE-2024-1356.json | 15 +- CVE-2024/CVE-2024-13xx/CVE-2024-1395.json | 28 +- CVE-2024/CVE-2024-15xx/CVE-2024-1598.json | 15 +- CVE-2024/CVE-2024-16xx/CVE-2024-1608.json | 15 +- CVE-2024/CVE-2024-17xx/CVE-2024-1739.json | 25 +- CVE-2024/CVE-2024-17xx/CVE-2024-1743.json | 40 +- CVE-2024/CVE-2024-18xx/CVE-2024-1849.json | 28 +- CVE-2024/CVE-2024-200xx/CVE-2024-20003.json | 35 +- CVE-2024/CVE-2024-200xx/CVE-2024-20004.json | 35 +- CVE-2024/CVE-2024-200xx/CVE-2024-20006.json | 35 +- CVE-2024/CVE-2024-200xx/CVE-2024-20015.json | 35 +- CVE-2024/CVE-2024-200xx/CVE-2024-20016.json | 35 +- CVE-2024/CVE-2024-200xx/CVE-2024-20021.json | 28 +- CVE-2024/CVE-2024-200xx/CVE-2024-20024.json | 40 +- CVE-2024/CVE-2024-200xx/CVE-2024-20028.json | 40 +- CVE-2024/CVE-2024-200xx/CVE-2024-20034.json | 40 +- CVE-2024/CVE-2024-200xx/CVE-2024-20041.json | 40 +- CVE-2024/CVE-2024-200xx/CVE-2024-20042.json | 40 +- CVE-2024/CVE-2024-200xx/CVE-2024-20044.json | 40 +- CVE-2024/CVE-2024-200xx/CVE-2024-20046.json | 40 +- CVE-2024/CVE-2024-200xx/CVE-2024-20048.json | 40 +- CVE-2024/CVE-2024-200xx/CVE-2024-20053.json | 40 +- CVE-2024/CVE-2024-200xx/CVE-2024-20054.json | 40 +- CVE-2024/CVE-2024-200xx/CVE-2024-20058.json | 28 +- CVE-2024/CVE-2024-200xx/CVE-2024-20067.json | 38 +- CVE-2024/CVE-2024-200xx/CVE-2024-20071.json | 28 +- CVE-2024/CVE-2024-200xx/CVE-2024-20072.json | 28 +- CVE-2024/CVE-2024-200xx/CVE-2024-20073.json | 28 +- CVE-2024/CVE-2024-200xx/CVE-2024-20074.json | 28 +- CVE-2024/CVE-2024-200xx/CVE-2024-20076.json | 27 +- CVE-2024/CVE-2024-200xx/CVE-2024-20077.json | 27 +- CVE-2024/CVE-2024-200xx/CVE-2024-20078.json | 27 +- CVE-2024/CVE-2024-202xx/CVE-2024-20258.json | 13 +- CVE-2024/CVE-2024-203xx/CVE-2024-20326.json | 13 +- CVE-2024/CVE-2024-203xx/CVE-2024-20363.json | 13 +- CVE-2024/CVE-2024-203xx/CVE-2024-20399.json | 6 +- CVE-2024/CVE-2024-209xx/CVE-2024-20998.json | 15 +- CVE-2024/CVE-2024-20xx/CVE-2024-2004.json | 28 +- CVE-2024/CVE-2024-210xx/CVE-2024-21030.json | 15 +- CVE-2024/CVE-2024-210xx/CVE-2024-21040.json | 15 +- CVE-2024/CVE-2024-210xx/CVE-2024-21053.json | 15 +- CVE-2024/CVE-2024-210xx/CVE-2024-21054.json | 15 +- CVE-2024/CVE-2024-210xx/CVE-2024-21057.json | 15 +- CVE-2024/CVE-2024-210xx/CVE-2024-21064.json | 15 +- CVE-2024/CVE-2024-210xx/CVE-2024-21084.json | 15 +- CVE-2024/CVE-2024-210xx/CVE-2024-21091.json | 15 +- CVE-2024/CVE-2024-210xx/CVE-2024-21094.json | 15 +- CVE-2024/CVE-2024-210xx/CVE-2024-21095.json | 15 +- CVE-2024/CVE-2024-215xx/CVE-2024-21503.json | 13 +- CVE-2024/CVE-2024-215xx/CVE-2024-21516.json | 15 +- CVE-2024/CVE-2024-215xx/CVE-2024-21518.json | 19 +- CVE-2024/CVE-2024-216xx/CVE-2024-21683.json | 23 +- CVE-2024/CVE-2024-217xx/CVE-2024-21741.json | 40 +- CVE-2024/CVE-2024-217xx/CVE-2024-21791.json | 13 +- CVE-2024/CVE-2024-218xx/CVE-2024-21813.json | 13 +- CVE-2024/CVE-2024-218xx/CVE-2024-21828.json | 13 +- CVE-2024/CVE-2024-218xx/CVE-2024-21831.json | 13 +- CVE-2024/CVE-2024-218xx/CVE-2024-21843.json | 13 +- CVE-2024/CVE-2024-218xx/CVE-2024-21864.json | 13 +- CVE-2024/CVE-2024-218xx/CVE-2024-21885.json | 13 +- CVE-2024/CVE-2024-218xx/CVE-2024-21893.json | 15 +- CVE-2024/CVE-2024-218xx/CVE-2024-21894.json | 15 +- CVE-2024/CVE-2024-21xx/CVE-2024-2101.json | 28 +- CVE-2024/CVE-2024-21xx/CVE-2024-2118.json | 28 +- CVE-2024/CVE-2024-21xx/CVE-2024-2173.json | 28 +- CVE-2024/CVE-2024-220xx/CVE-2024-22002.json | 40 +- CVE-2024/CVE-2024-220xx/CVE-2024-22015.json | 13 +- CVE-2024/CVE-2024-220xx/CVE-2024-22023.json | 15 +- CVE-2024/CVE-2024-220xx/CVE-2024-22053.json | 15 +- CVE-2024/CVE-2024-220xx/CVE-2024-22059.json | 15 +- CVE-2024/CVE-2024-220xx/CVE-2024-22061.json | 15 +- CVE-2024/CVE-2024-220xx/CVE-2024-22095.json | 13 +- CVE-2024/CVE-2024-221xx/CVE-2024-22103.json | 39 +- CVE-2024/CVE-2024-221xx/CVE-2024-22106.json | 39 +- CVE-2024/CVE-2024-221xx/CVE-2024-22151.json | 23 +- CVE-2024/CVE-2024-222xx/CVE-2024-22246.json | 15 +- CVE-2024/CVE-2024-222xx/CVE-2024-22247.json | 15 +- CVE-2024/CVE-2024-222xx/CVE-2024-22259.json | 15 +- CVE-2024/CVE-2024-222xx/CVE-2024-22263.json | 15 +- CVE-2024/CVE-2024-222xx/CVE-2024-22269.json | 15 +- CVE-2024/CVE-2024-222xx/CVE-2024-22274.json | 15 +- CVE-2024/CVE-2024-223xx/CVE-2024-22390.json | 13 +- CVE-2024/CVE-2024-223xx/CVE-2024-22396.json | 28 +- CVE-2024/CVE-2024-225xx/CVE-2024-22546.json | 40 +- CVE-2024/CVE-2024-226xx/CVE-2024-22640.json | 40 +- CVE-2024/CVE-2024-227xx/CVE-2024-22722.json | 40 +- CVE-2024/CVE-2024-227xx/CVE-2024-22774.json | 40 +- CVE-2024/CVE-2024-227xx/CVE-2024-22779.json | 15 +- CVE-2024/CVE-2024-228xx/CVE-2024-22807.json | 40 +- CVE-2024/CVE-2024-228xx/CVE-2024-22808.json | 40 +- CVE-2024/CVE-2024-228xx/CVE-2024-22809.json | 40 +- CVE-2024/CVE-2024-228xx/CVE-2024-22811.json | 40 +- CVE-2024/CVE-2024-228xx/CVE-2024-22813.json | 40 +- CVE-2024/CVE-2024-228xx/CVE-2024-22815.json | 40 +- CVE-2024/CVE-2024-228xx/CVE-2024-22830.json | 40 +- CVE-2024/CVE-2024-228xx/CVE-2024-22856.json | 40 +- CVE-2024/CVE-2024-229xx/CVE-2024-22905.json | 40 +- CVE-2024/CVE-2024-22xx/CVE-2024-2218.json | 28 +- CVE-2024/CVE-2024-22xx/CVE-2024-2220.json | 28 +- CVE-2024/CVE-2024-22xx/CVE-2024-2257.json | 28 +- CVE-2024/CVE-2024-230xx/CVE-2024-23054.json | 35 +- CVE-2024/CVE-2024-231xx/CVE-2024-23140.json | 28 +- CVE-2024/CVE-2024-231xx/CVE-2024-23141.json | 28 +- CVE-2024/CVE-2024-231xx/CVE-2024-23142.json | 28 +- CVE-2024/CVE-2024-231xx/CVE-2024-23143.json | 28 +- CVE-2024/CVE-2024-231xx/CVE-2024-23144.json | 28 +- CVE-2024/CVE-2024-231xx/CVE-2024-23145.json | 28 +- CVE-2024/CVE-2024-231xx/CVE-2024-23146.json | 28 +- CVE-2024/CVE-2024-231xx/CVE-2024-23147.json | 28 +- CVE-2024/CVE-2024-231xx/CVE-2024-23148.json | 28 +- CVE-2024/CVE-2024-231xx/CVE-2024-23150.json | 28 +- CVE-2024/CVE-2024-231xx/CVE-2024-23153.json | 28 +- CVE-2024/CVE-2024-231xx/CVE-2024-23154.json | 28 +- CVE-2024/CVE-2024-231xx/CVE-2024-23156.json | 28 +- CVE-2024/CVE-2024-231xx/CVE-2024-23157.json | 28 +- CVE-2024/CVE-2024-231xx/CVE-2024-23158.json | 28 +- CVE-2024/CVE-2024-231xx/CVE-2024-23159.json | 28 +- CVE-2024/CVE-2024-231xx/CVE-2024-23188.json | 13 +- CVE-2024/CVE-2024-232xx/CVE-2024-23225.json | 35 +- CVE-2024/CVE-2024-232xx/CVE-2024-23228.json | 40 +- CVE-2024/CVE-2024-232xx/CVE-2024-23236.json | 28 +- CVE-2024/CVE-2024-232xx/CVE-2024-23246.json | 40 +- CVE-2024/CVE-2024-232xx/CVE-2024-23251.json | 35 +- CVE-2024/CVE-2024-232xx/CVE-2024-23263.json | 40 +- CVE-2024/CVE-2024-232xx/CVE-2024-23271.json | 40 +- CVE-2024/CVE-2024-232xx/CVE-2024-23296.json | 33 +- CVE-2024/CVE-2024-235xx/CVE-2024-23526.json | 15 +- CVE-2024/CVE-2024-235xx/CVE-2024-23528.json | 15 +- CVE-2024/CVE-2024-235xx/CVE-2024-23529.json | 15 +- CVE-2024/CVE-2024-235xx/CVE-2024-23530.json | 15 +- CVE-2024/CVE-2024-235xx/CVE-2024-23531.json | 15 +- CVE-2024/CVE-2024-235xx/CVE-2024-23532.json | 15 +- CVE-2024/CVE-2024-235xx/CVE-2024-23533.json | 15 +- CVE-2024/CVE-2024-235xx/CVE-2024-23534.json | 15 +- CVE-2024/CVE-2024-235xx/CVE-2024-23535.json | 15 +- CVE-2024/CVE-2024-235xx/CVE-2024-23579.json | 15 +- CVE-2024/CVE-2024-235xx/CVE-2024-23580.json | 15 +- CVE-2024/CVE-2024-235xx/CVE-2024-23597.json | 40 +- CVE-2024/CVE-2024-237xx/CVE-2024-23704.json | 40 +- CVE-2024/CVE-2024-237xx/CVE-2024-23705.json | 40 +- CVE-2024/CVE-2024-237xx/CVE-2024-23706.json | 40 +- CVE-2024/CVE-2024-237xx/CVE-2024-23707.json | 40 +- CVE-2024/CVE-2024-237xx/CVE-2024-23708.json | 40 +- CVE-2024/CVE-2024-237xx/CVE-2024-23709.json | 40 +- CVE-2024/CVE-2024-237xx/CVE-2024-23710.json | 28 +- CVE-2024/CVE-2024-237xx/CVE-2024-23712.json | 28 +- CVE-2024/CVE-2024-237xx/CVE-2024-23713.json | 40 +- CVE-2024/CVE-2024-237xx/CVE-2024-23766.json | 40 +- CVE-2024/CVE-2024-237xx/CVE-2024-23773.json | 40 +- CVE-2024/CVE-2024-237xx/CVE-2024-23774.json | 40 +- CVE-2024/CVE-2024-238xx/CVE-2024-23847.json | 40 +- CVE-2024/CVE-2024-239xx/CVE-2024-23911.json | 40 +- CVE-2024/CVE-2024-23xx/CVE-2024-2309.json | 28 +- CVE-2024/CVE-2024-23xx/CVE-2024-2310.json | 28 +- CVE-2024/CVE-2024-23xx/CVE-2024-2398.json | 28 +- CVE-2024/CVE-2024-241xx/CVE-2024-24130.json | 35 +- CVE-2024/CVE-2024-241xx/CVE-2024-24157.json | 15 +- CVE-2024/CVE-2024-242xx/CVE-2024-24294.json | 40 +- CVE-2024/CVE-2024-243xx/CVE-2024-24302.json | 40 +- CVE-2024/CVE-2024-243xx/CVE-2024-24312.json | 40 +- CVE-2024/CVE-2024-243xx/CVE-2024-24313.json | 40 +- CVE-2024/CVE-2024-244xx/CVE-2024-24487.json | 40 +- CVE-2024/CVE-2024-245xx/CVE-2024-24520.json | 40 +- CVE-2024/CVE-2024-245xx/CVE-2024-24524.json | 35 +- CVE-2024/CVE-2024-245xx/CVE-2024-24548.json | 35 +- CVE-2024/CVE-2024-247xx/CVE-2024-24787.json | 28 +- CVE-2024/CVE-2024-247xx/CVE-2024-24789.json | 23 +- CVE-2024/CVE-2024-249xx/CVE-2024-24910.json | 28 +- CVE-2024/CVE-2024-249xx/CVE-2024-24912.json | 28 +- CVE-2024/CVE-2024-249xx/CVE-2024-24981.json | 13 +- CVE-2024/CVE-2024-249xx/CVE-2024-24991.json | 15 +- CVE-2024/CVE-2024-249xx/CVE-2024-24992.json | 15 +- CVE-2024/CVE-2024-249xx/CVE-2024-24993.json | 15 +- CVE-2024/CVE-2024-249xx/CVE-2024-24994.json | 15 +- CVE-2024/CVE-2024-249xx/CVE-2024-24995.json | 15 +- CVE-2024/CVE-2024-249xx/CVE-2024-24997.json | 15 +- CVE-2024/CVE-2024-249xx/CVE-2024-24999.json | 15 +- CVE-2024/CVE-2024-24xx/CVE-2024-2405.json | 28 +- CVE-2024/CVE-2024-250xx/CVE-2024-25000.json | 15 +- CVE-2024/CVE-2024-250xx/CVE-2024-25078.json | 40 +- CVE-2024/CVE-2024-250xx/CVE-2024-25079.json | 40 +- CVE-2024/CVE-2024-252xx/CVE-2024-25297.json | 35 +- CVE-2024/CVE-2024-253xx/CVE-2024-25355.json | 40 +- CVE-2024/CVE-2024-253xx/CVE-2024-25389.json | 40 +- CVE-2024/CVE-2024-253xx/CVE-2024-25392.json | 40 +- CVE-2024/CVE-2024-253xx/CVE-2024-25393.json | 40 +- CVE-2024/CVE-2024-253xx/CVE-2024-25394.json | 15 +- CVE-2024/CVE-2024-253xx/CVE-2024-25395.json | 40 +- CVE-2024/CVE-2024-254xx/CVE-2024-25423.json | 40 +- CVE-2024/CVE-2024-255xx/CVE-2024-25507.json | 40 +- CVE-2024/CVE-2024-255xx/CVE-2024-25509.json | 40 +- CVE-2024/CVE-2024-255xx/CVE-2024-25510.json | 40 +- CVE-2024/CVE-2024-255xx/CVE-2024-25511.json | 40 +- CVE-2024/CVE-2024-255xx/CVE-2024-25512.json | 40 +- CVE-2024/CVE-2024-255xx/CVE-2024-25513.json | 40 +- CVE-2024/CVE-2024-255xx/CVE-2024-25514.json | 40 +- CVE-2024/CVE-2024-255xx/CVE-2024-25515.json | 40 +- CVE-2024/CVE-2024-255xx/CVE-2024-25517.json | 40 +- CVE-2024/CVE-2024-255xx/CVE-2024-25518.json | 40 +- CVE-2024/CVE-2024-255xx/CVE-2024-25519.json | 40 +- CVE-2024/CVE-2024-255xx/CVE-2024-25520.json | 40 +- CVE-2024/CVE-2024-255xx/CVE-2024-25521.json | 40 +- CVE-2024/CVE-2024-255xx/CVE-2024-25522.json | 40 +- CVE-2024/CVE-2024-255xx/CVE-2024-25523.json | 40 +- CVE-2024/CVE-2024-255xx/CVE-2024-25524.json | 40 +- CVE-2024/CVE-2024-255xx/CVE-2024-25525.json | 40 +- CVE-2024/CVE-2024-255xx/CVE-2024-25526.json | 40 +- CVE-2024/CVE-2024-255xx/CVE-2024-25528.json | 40 +- CVE-2024/CVE-2024-255xx/CVE-2024-25530.json | 40 +- CVE-2024/CVE-2024-255xx/CVE-2024-25531.json | 40 +- CVE-2024/CVE-2024-255xx/CVE-2024-25532.json | 40 +- CVE-2024/CVE-2024-255xx/CVE-2024-25533.json | 40 +- CVE-2024/CVE-2024-255xx/CVE-2024-25572.json | 28 +- CVE-2024/CVE-2024-256xx/CVE-2024-25611.json | 15 +- CVE-2024/CVE-2024-256xx/CVE-2024-25612.json | 15 +- CVE-2024/CVE-2024-256xx/CVE-2024-25613.json | 15 +- CVE-2024/CVE-2024-257xx/CVE-2024-25724.json | 35 +- CVE-2024/CVE-2024-259xx/CVE-2024-25975.json | 28 +- CVE-2024/CVE-2024-25xx/CVE-2024-2505.json | 28 +- CVE-2024/CVE-2024-25xx/CVE-2024-2509.json | 28 +- CVE-2024/CVE-2024-262xx/CVE-2024-26258.json | 40 +- CVE-2024/CVE-2024-263xx/CVE-2024-26305.json | 15 +- CVE-2024/CVE-2024-263xx/CVE-2024-26307.json | 28 +- CVE-2024/CVE-2024-263xx/CVE-2024-26312.json | 40 +- CVE-2024/CVE-2024-263xx/CVE-2024-26327.json | 40 +- CVE-2024/CVE-2024-263xx/CVE-2024-26362.json | 40 +- CVE-2024/CVE-2024-265xx/CVE-2024-26504.json | 40 +- CVE-2024/CVE-2024-265xx/CVE-2024-26507.json | 40 +- CVE-2024/CVE-2024-268xx/CVE-2024-26854.json | 40 +- CVE-2024/CVE-2024-268xx/CVE-2024-26864.json | 40 +- CVE-2024/CVE-2024-268xx/CVE-2024-26896.json | 15 +- CVE-2024/CVE-2024-269xx/CVE-2024-26924.json | 40 +- CVE-2024/CVE-2024-269xx/CVE-2024-26927.json | 40 +- CVE-2024/CVE-2024-269xx/CVE-2024-26932.json | 35 +- CVE-2024/CVE-2024-269xx/CVE-2024-26939.json | 15 +- CVE-2024/CVE-2024-269xx/CVE-2024-26942.json | 35 +- CVE-2024/CVE-2024-269xx/CVE-2024-26945.json | 40 +- CVE-2024/CVE-2024-269xx/CVE-2024-26952.json | 33 +- CVE-2024/CVE-2024-269xx/CVE-2024-26957.json | 15 +- CVE-2024/CVE-2024-269xx/CVE-2024-26960.json | 40 +- CVE-2024/CVE-2024-269xx/CVE-2024-26970.json | 40 +- CVE-2024/CVE-2024-269xx/CVE-2024-26976.json | 40 +- CVE-2024/CVE-2024-269xx/CVE-2024-26978.json | 13 +- CVE-2024/CVE-2024-269xx/CVE-2024-26984.json | 40 +- CVE-2024/CVE-2024-26xx/CVE-2024-2603.json | 28 +- CVE-2024/CVE-2024-26xx/CVE-2024-2608.json | 15 +- CVE-2024/CVE-2024-26xx/CVE-2024-2617.json | 15 +- CVE-2024/CVE-2024-26xx/CVE-2024-2697.json | 40 +- CVE-2024/CVE-2024-270xx/CVE-2024-27037.json | 15 +- CVE-2024/CVE-2024-270xx/CVE-2024-27050.json | 40 +- CVE-2024/CVE-2024-270xx/CVE-2024-27052.json | 40 +- CVE-2024/CVE-2024-270xx/CVE-2024-27053.json | 40 +- CVE-2024/CVE-2024-271xx/CVE-2024-27124.json | 13 +- CVE-2024/CVE-2024-272xx/CVE-2024-27264.json | 23 +- CVE-2024/CVE-2024-272xx/CVE-2024-27280.json | 40 +- CVE-2024/CVE-2024-273xx/CVE-2024-27314.json | 13 +- CVE-2024/CVE-2024-273xx/CVE-2024-27347.json | 28 +- CVE-2024/CVE-2024-273xx/CVE-2024-27349.json | 28 +- CVE-2024/CVE-2024-273xx/CVE-2024-27351.json | 40 +- CVE-2024/CVE-2024-273xx/CVE-2024-27353.json | 40 +- CVE-2024/CVE-2024-273xx/CVE-2024-27374.json | 15 +- CVE-2024/CVE-2024-273xx/CVE-2024-27394.json | 40 +- CVE-2024/CVE-2024-274xx/CVE-2024-27405.json | 40 +- CVE-2024/CVE-2024-274xx/CVE-2024-27407.json | 40 +- CVE-2024/CVE-2024-274xx/CVE-2024-27431.json | 40 +- CVE-2024/CVE-2024-275xx/CVE-2024-27516.json | 40 +- CVE-2024/CVE-2024-275xx/CVE-2024-27574.json | 40 +- CVE-2024/CVE-2024-275xx/CVE-2024-27575.json | 40 +- CVE-2024/CVE-2024-275xx/CVE-2024-27593.json | 40 +- CVE-2024/CVE-2024-277xx/CVE-2024-27752.json | 40 +- CVE-2024/CVE-2024-277xx/CVE-2024-27790.json | 40 +- CVE-2024/CVE-2024-277xx/CVE-2024-27791.json | 40 +- CVE-2024/CVE-2024-277xx/CVE-2024-27793.json | 28 +- CVE-2024/CVE-2024-277xx/CVE-2024-27794.json | 40 +- CVE-2024/CVE-2024-277xx/CVE-2024-27796.json | 40 +- CVE-2024/CVE-2024-278xx/CVE-2024-27800.json | 34 +- CVE-2024/CVE-2024-278xx/CVE-2024-27804.json | 40 +- CVE-2024/CVE-2024-278xx/CVE-2024-27808.json | 34 +- CVE-2024/CVE-2024-278xx/CVE-2024-27810.json | 40 +- CVE-2024/CVE-2024-278xx/CVE-2024-27811.json | 34 +- CVE-2024/CVE-2024-278xx/CVE-2024-27812.json | 34 +- CVE-2024/CVE-2024-278xx/CVE-2024-27813.json | 28 +- CVE-2024/CVE-2024-278xx/CVE-2024-27814.json | 24 +- CVE-2024/CVE-2024-278xx/CVE-2024-27815.json | 34 +- CVE-2024/CVE-2024-278xx/CVE-2024-27817.json | 15 +- CVE-2024/CVE-2024-278xx/CVE-2024-27819.json | 25 +- CVE-2024/CVE-2024-278xx/CVE-2024-27820.json | 35 +- CVE-2024/CVE-2024-278xx/CVE-2024-27822.json | 40 +- CVE-2024/CVE-2024-278xx/CVE-2024-27825.json | 40 +- CVE-2024/CVE-2024-278xx/CVE-2024-27827.json | 40 +- CVE-2024/CVE-2024-278xx/CVE-2024-27828.json | 39 +- CVE-2024/CVE-2024-278xx/CVE-2024-27829.json | 40 +- CVE-2024/CVE-2024-278xx/CVE-2024-27831.json | 35 +- CVE-2024/CVE-2024-278xx/CVE-2024-27832.json | 35 +- CVE-2024/CVE-2024-278xx/CVE-2024-27833.json | 35 +- CVE-2024/CVE-2024-278xx/CVE-2024-27834.json | 40 +- CVE-2024/CVE-2024-278xx/CVE-2024-27836.json | 40 +- CVE-2024/CVE-2024-278xx/CVE-2024-27837.json | 40 +- CVE-2024/CVE-2024-278xx/CVE-2024-27840.json | 40 +- CVE-2024/CVE-2024-278xx/CVE-2024-27841.json | 40 +- CVE-2024/CVE-2024-278xx/CVE-2024-27847.json | 40 +- CVE-2024/CVE-2024-278xx/CVE-2024-27848.json | 40 +- CVE-2024/CVE-2024-278xx/CVE-2024-27851.json | 40 +- CVE-2024/CVE-2024-278xx/CVE-2024-27857.json | 40 +- CVE-2024/CVE-2024-279xx/CVE-2024-27975.json | 15 +- CVE-2024/CVE-2024-279xx/CVE-2024-27976.json | 15 +- CVE-2024/CVE-2024-279xx/CVE-2024-27977.json | 15 +- CVE-2024/CVE-2024-279xx/CVE-2024-27978.json | 15 +- CVE-2024/CVE-2024-279xx/CVE-2024-27984.json | 15 +- CVE-2024/CVE-2024-27xx/CVE-2024-2729.json | 28 +- CVE-2024/CVE-2024-27xx/CVE-2024-2749.json | 40 +- CVE-2024/CVE-2024-27xx/CVE-2024-2757.json | 15 +- CVE-2024/CVE-2024-27xx/CVE-2024-2761.json | 28 +- CVE-2024/CVE-2024-280xx/CVE-2024-28010.json | 28 +- CVE-2024/CVE-2024-280xx/CVE-2024-28063.json | 40 +- CVE-2024/CVE-2024-282xx/CVE-2024-28269.json | 40 +- CVE-2024/CVE-2024-282xx/CVE-2024-28279.json | 40 +- CVE-2024/CVE-2024-282xx/CVE-2024-28294.json | 40 +- CVE-2024/CVE-2024-283xx/CVE-2024-28320.json | 40 +- CVE-2024/CVE-2024-283xx/CVE-2024-28322.json | 40 +- CVE-2024/CVE-2024-283xx/CVE-2024-28325.json | 44 +- CVE-2024/CVE-2024-283xx/CVE-2024-28326.json | 40 +- CVE-2024/CVE-2024-283xx/CVE-2024-28328.json | 40 +- CVE-2024/CVE-2024-283xx/CVE-2024-28344.json | 40 +- CVE-2024/CVE-2024-283xx/CVE-2024-28397.json | 40 +- CVE-2024/CVE-2024-284xx/CVE-2024-28417.json | 40 +- CVE-2024/CVE-2024-285xx/CVE-2024-28556.json | 40 +- CVE-2024/CVE-2024-285xx/CVE-2024-28562.json | 40 +- CVE-2024/CVE-2024-285xx/CVE-2024-28563.json | 40 +- CVE-2024/CVE-2024-286xx/CVE-2024-28627.json | 44 +- CVE-2024/CVE-2024-286xx/CVE-2024-28699.json | 40 +- CVE-2024/CVE-2024-287xx/CVE-2024-28716.json | 40 +- CVE-2024/CVE-2024-287xx/CVE-2024-28717.json | 40 +- CVE-2024/CVE-2024-287xx/CVE-2024-28722.json | 40 +- CVE-2024/CVE-2024-287xx/CVE-2024-28734.json | 40 +- CVE-2024/CVE-2024-287xx/CVE-2024-28736.json | 40 +- CVE-2024/CVE-2024-288xx/CVE-2024-28820.json | 44 +- CVE-2024/CVE-2024-288xx/CVE-2024-28880.json | 40 +- CVE-2024/CVE-2024-288xx/CVE-2024-28886.json | 40 +- CVE-2024/CVE-2024-288xx/CVE-2024-28890.json | 28 +- CVE-2024/CVE-2024-288xx/CVE-2024-28893.json | 28 +- CVE-2024/CVE-2024-289xx/CVE-2024-28960.json | 40 +- CVE-2024/CVE-2024-28xx/CVE-2024-2836.json | 28 +- CVE-2024/CVE-2024-28xx/CVE-2024-2837.json | 28 +- CVE-2024/CVE-2024-28xx/CVE-2024-2883.json | 28 +- CVE-2024/CVE-2024-28xx/CVE-2024-2885.json | 28 +- CVE-2024/CVE-2024-28xx/CVE-2024-2886.json | 28 +- CVE-2024/CVE-2024-28xx/CVE-2024-2887.json | 28 +- CVE-2024/CVE-2024-291xx/CVE-2024-29149.json | 40 +- CVE-2024/CVE-2024-291xx/CVE-2024-29150.json | 40 +- CVE-2024/CVE-2024-291xx/CVE-2024-29158.json | 40 +- CVE-2024/CVE-2024-291xx/CVE-2024-29160.json | 40 +- CVE-2024/CVE-2024-291xx/CVE-2024-29161.json | 40 +- CVE-2024/CVE-2024-291xx/CVE-2024-29162.json | 40 +- CVE-2024/CVE-2024-291xx/CVE-2024-29163.json | 40 +- CVE-2024/CVE-2024-291xx/CVE-2024-29164.json | 40 +- CVE-2024/CVE-2024-291xx/CVE-2024-29165.json | 40 +- CVE-2024/CVE-2024-291xx/CVE-2024-29169.json | 23 +- CVE-2024/CVE-2024-292xx/CVE-2024-29204.json | 15 +- CVE-2024/CVE-2024-292xx/CVE-2024-29205.json | 15 +- CVE-2024/CVE-2024-292xx/CVE-2024-29206.json | 15 +- CVE-2024/CVE-2024-292xx/CVE-2024-29207.json | 15 +- CVE-2024/CVE-2024-292xx/CVE-2024-29208.json | 15 +- CVE-2024/CVE-2024-292xx/CVE-2024-29210.json | 15 +- CVE-2024/CVE-2024-292xx/CVE-2024-29212.json | 15 +- CVE-2024/CVE-2024-292xx/CVE-2024-29217.json | 28 +- CVE-2024/CVE-2024-292xx/CVE-2024-29218.json | 40 +- CVE-2024/CVE-2024-292xx/CVE-2024-29291.json | 22 +- CVE-2024/CVE-2024-293xx/CVE-2024-29320.json | 40 +- CVE-2024/CVE-2024-293xx/CVE-2024-29376.json | 40 +- CVE-2024/CVE-2024-293xx/CVE-2024-29384.json | 40 +- CVE-2024/CVE-2024-293xx/CVE-2024-29390.json | 28 +- CVE-2024/CVE-2024-294xx/CVE-2024-29400.json | 40 +- CVE-2024/CVE-2024-294xx/CVE-2024-29417.json | 40 +- CVE-2024/CVE-2024-294xx/CVE-2024-29466.json | 15 +- CVE-2024/CVE-2024-294xx/CVE-2024-29499.json | 40 +- CVE-2024/CVE-2024-296xx/CVE-2024-29660.json | 40 +- CVE-2024/CVE-2024-297xx/CVE-2024-29733.json | 28 +- CVE-2024/CVE-2024-297xx/CVE-2024-29740.json | 40 +- CVE-2024/CVE-2024-297xx/CVE-2024-29745.json | 35 +- CVE-2024/CVE-2024-297xx/CVE-2024-29784.json | 40 +- CVE-2024/CVE-2024-297xx/CVE-2024-29786.json | 40 +- CVE-2024/CVE-2024-297xx/CVE-2024-29787.json | 40 +- CVE-2024/CVE-2024-298xx/CVE-2024-29822.json | 15 +- CVE-2024/CVE-2024-298xx/CVE-2024-29823.json | 15 +- CVE-2024/CVE-2024-298xx/CVE-2024-29824.json | 15 +- CVE-2024/CVE-2024-298xx/CVE-2024-29825.json | 15 +- CVE-2024/CVE-2024-298xx/CVE-2024-29826.json | 15 +- CVE-2024/CVE-2024-298xx/CVE-2024-29827.json | 15 +- CVE-2024/CVE-2024-298xx/CVE-2024-29829.json | 15 +- CVE-2024/CVE-2024-298xx/CVE-2024-29830.json | 15 +- CVE-2024/CVE-2024-298xx/CVE-2024-29846.json | 15 +- CVE-2024/CVE-2024-298xx/CVE-2024-29848.json | 15 +- CVE-2024/CVE-2024-298xx/CVE-2024-29849.json | 15 +- CVE-2024/CVE-2024-298xx/CVE-2024-29850.json | 15 +- CVE-2024/CVE-2024-298xx/CVE-2024-29852.json | 15 +- CVE-2024/CVE-2024-298xx/CVE-2024-29853.json | 15 +- CVE-2024/CVE-2024-298xx/CVE-2024-29868.json | 32 +- CVE-2024/CVE-2024-299xx/CVE-2024-29916.json | 40 +- CVE-2024/CVE-2024-299xx/CVE-2024-29987.json | 13 +- CVE-2024/CVE-2024-29xx/CVE-2024-2908.json | 28 +- CVE-2024/CVE-2024-29xx/CVE-2024-2961.json | 28 +- CVE-2024/CVE-2024-29xx/CVE-2024-2975.json | 15 +- CVE-2024/CVE-2024-300xx/CVE-2024-30058.json | 13 +- CVE-2024/CVE-2024-301xx/CVE-2024-30107.json | 15 +- CVE-2024/CVE-2024-301xx/CVE-2024-30119.json | 13 +- CVE-2024/CVE-2024-301xx/CVE-2024-30162.json | 40 +- CVE-2024/CVE-2024-301xx/CVE-2024-30164.json | 40 +- CVE-2024/CVE-2024-301xx/CVE-2024-30165.json | 40 +- CVE-2024/CVE-2024-304xx/CVE-2024-30419.json | 40 +- CVE-2024/CVE-2024-306xx/CVE-2024-30623.json | 40 +- CVE-2024/CVE-2024-306xx/CVE-2024-30637.json | 40 +- CVE-2024/CVE-2024-307xx/CVE-2024-30799.json | 28 +- CVE-2024/CVE-2024-308xx/CVE-2024-30800.json | 28 +- CVE-2024/CVE-2024-308xx/CVE-2024-30862.json | 40 +- CVE-2024/CVE-2024-308xx/CVE-2024-30890.json | 15 +- CVE-2024/CVE-2024-309xx/CVE-2024-30915.json | 28 +- CVE-2024/CVE-2024-309xx/CVE-2024-30920.json | 40 +- CVE-2024/CVE-2024-309xx/CVE-2024-30921.json | 40 +- CVE-2024/CVE-2024-309xx/CVE-2024-30922.json | 40 +- CVE-2024/CVE-2024-309xx/CVE-2024-30924.json | 40 +- CVE-2024/CVE-2024-309xx/CVE-2024-30925.json | 40 +- CVE-2024/CVE-2024-309xx/CVE-2024-30926.json | 40 +- CVE-2024/CVE-2024-309xx/CVE-2024-30927.json | 40 +- CVE-2024/CVE-2024-309xx/CVE-2024-30928.json | 40 +- CVE-2024/CVE-2024-309xx/CVE-2024-30929.json | 40 +- CVE-2024/CVE-2024-309xx/CVE-2024-30931.json | 40 +- CVE-2024/CVE-2024-309xx/CVE-2024-30938.json | 40 +- CVE-2024/CVE-2024-309xx/CVE-2024-30946.json | 40 +- CVE-2024/CVE-2024-309xx/CVE-2024-30950.json | 40 +- CVE-2024/CVE-2024-309xx/CVE-2024-30951.json | 40 +- CVE-2024/CVE-2024-309xx/CVE-2024-30953.json | 40 +- CVE-2024/CVE-2024-309xx/CVE-2024-30974.json | 40 +- CVE-2024/CVE-2024-309xx/CVE-2024-30981.json | 15 +- CVE-2024/CVE-2024-309xx/CVE-2024-30982.json | 40 +- CVE-2024/CVE-2024-309xx/CVE-2024-30983.json | 40 +- CVE-2024/CVE-2024-309xx/CVE-2024-30985.json | 40 +- CVE-2024/CVE-2024-309xx/CVE-2024-30989.json | 15 +- CVE-2024/CVE-2024-309xx/CVE-2024-30990.json | 40 +- CVE-2024/CVE-2024-310xx/CVE-2024-31005.json | 28 +- CVE-2024/CVE-2024-310xx/CVE-2024-31012.json | 40 +- CVE-2024/CVE-2024-310xx/CVE-2024-31031.json | 40 +- CVE-2024/CVE-2024-310xx/CVE-2024-31036.json | 40 +- CVE-2024/CVE-2024-310xx/CVE-2024-31040.json | 40 +- CVE-2024/CVE-2024-310xx/CVE-2024-31062.json | 40 +- CVE-2024/CVE-2024-313xx/CVE-2024-31340.json | 28 +- CVE-2024/CVE-2024-313xx/CVE-2024-31397.json | 40 +- CVE-2024/CVE-2024-314xx/CVE-2024-31401.json | 40 +- CVE-2024/CVE-2024-314xx/CVE-2024-31403.json | 40 +- CVE-2024/CVE-2024-314xx/CVE-2024-31413.json | 28 +- CVE-2024/CVE-2024-314xx/CVE-2024-31466.json | 15 +- CVE-2024/CVE-2024-314xx/CVE-2024-31467.json | 15 +- CVE-2024/CVE-2024-314xx/CVE-2024-31468.json | 15 +- CVE-2024/CVE-2024-314xx/CVE-2024-31469.json | 15 +- CVE-2024/CVE-2024-314xx/CVE-2024-31470.json | 15 +- CVE-2024/CVE-2024-314xx/CVE-2024-31471.json | 15 +- CVE-2024/CVE-2024-314xx/CVE-2024-31472.json | 15 +- CVE-2024/CVE-2024-314xx/CVE-2024-31474.json | 15 +- CVE-2024/CVE-2024-314xx/CVE-2024-31475.json | 15 +- CVE-2024/CVE-2024-314xx/CVE-2024-31476.json | 15 +- CVE-2024/CVE-2024-314xx/CVE-2024-31477.json | 15 +- CVE-2024/CVE-2024-314xx/CVE-2024-31478.json | 15 +- CVE-2024/CVE-2024-314xx/CVE-2024-31479.json | 15 +- CVE-2024/CVE-2024-314xx/CVE-2024-31480.json | 15 +- CVE-2024/CVE-2024-314xx/CVE-2024-31481.json | 15 +- CVE-2024/CVE-2024-314xx/CVE-2024-31482.json | 15 +- CVE-2024/CVE-2024-315xx/CVE-2024-31502.json | 40 +- CVE-2024/CVE-2024-315xx/CVE-2024-31510.json | 44 +- CVE-2024/CVE-2024-315xx/CVE-2024-31544.json | 40 +- CVE-2024/CVE-2024-315xx/CVE-2024-31545.json | 40 +- CVE-2024/CVE-2024-315xx/CVE-2024-31546.json | 40 +- CVE-2024/CVE-2024-315xx/CVE-2024-31547.json | 40 +- CVE-2024/CVE-2024-315xx/CVE-2024-31552.json | 40 +- CVE-2024/CVE-2024-315xx/CVE-2024-31556.json | 40 +- CVE-2024/CVE-2024-315xx/CVE-2024-31578.json | 40 +- CVE-2024/CVE-2024-315xx/CVE-2024-31580.json | 15 +- CVE-2024/CVE-2024-315xx/CVE-2024-31583.json | 40 +- CVE-2024/CVE-2024-315xx/CVE-2024-31584.json | 40 +- CVE-2024/CVE-2024-315xx/CVE-2024-31586.json | 40 +- CVE-2024/CVE-2024-316xx/CVE-2024-31615.json | 40 +- CVE-2024/CVE-2024-316xx/CVE-2024-31616.json | 40 +- CVE-2024/CVE-2024-316xx/CVE-2024-31636.json | 40 +- CVE-2024/CVE-2024-316xx/CVE-2024-31650.json | 40 +- CVE-2024/CVE-2024-317xx/CVE-2024-31714.json | 40 +- CVE-2024/CVE-2024-317xx/CVE-2024-31744.json | 40 +- CVE-2024/CVE-2024-317xx/CVE-2024-31750.json | 40 +- CVE-2024/CVE-2024-317xx/CVE-2024-31755.json | 40 +- CVE-2024/CVE-2024-318xx/CVE-2024-31801.json | 40 +- CVE-2024/CVE-2024-318xx/CVE-2024-31804.json | 40 +- CVE-2024/CVE-2024-318xx/CVE-2024-31810.json | 15 +- CVE-2024/CVE-2024-318xx/CVE-2024-31818.json | 40 +- CVE-2024/CVE-2024-318xx/CVE-2024-31821.json | 40 +- CVE-2024/CVE-2024-318xx/CVE-2024-31823.json | 40 +- CVE-2024/CVE-2024-318xx/CVE-2024-31828.json | 40 +- CVE-2024/CVE-2024-318xx/CVE-2024-31841.json | 40 +- CVE-2024/CVE-2024-318xx/CVE-2024-31843.json | 40 +- CVE-2024/CVE-2024-318xx/CVE-2024-31845.json | 40 +- CVE-2024/CVE-2024-318xx/CVE-2024-31846.json | 40 +- CVE-2024/CVE-2024-318xx/CVE-2024-31857.json | 40 +- CVE-2024/CVE-2024-318xx/CVE-2024-31860.json | 28 +- CVE-2024/CVE-2024-318xx/CVE-2024-31865.json | 28 +- CVE-2024/CVE-2024-319xx/CVE-2024-31948.json | 40 +- CVE-2024/CVE-2024-319xx/CVE-2024-31953.json | 15 +- CVE-2024/CVE-2024-319xx/CVE-2024-31954.json | 15 +- CVE-2024/CVE-2024-319xx/CVE-2024-31961.json | 40 +- CVE-2024/CVE-2024-319xx/CVE-2024-31963.json | 40 +- CVE-2024/CVE-2024-319xx/CVE-2024-31964.json | 40 +- CVE-2024/CVE-2024-319xx/CVE-2024-31965.json | 44 +- CVE-2024/CVE-2024-319xx/CVE-2024-31966.json | 40 +- CVE-2024/CVE-2024-319xx/CVE-2024-31967.json | 40 +- CVE-2024/CVE-2024-319xx/CVE-2024-31974.json | 40 +- CVE-2024/CVE-2024-320xx/CVE-2024-32025.json | 33 +- CVE-2024/CVE-2024-320xx/CVE-2024-32051.json | 44 +- CVE-2024/CVE-2024-321xx/CVE-2024-32161.json | 40 +- CVE-2024/CVE-2024-321xx/CVE-2024-32163.json | 40 +- CVE-2024/CVE-2024-322xx/CVE-2024-32206.json | 40 +- CVE-2024/CVE-2024-322xx/CVE-2024-32211.json | 40 +- CVE-2024/CVE-2024-322xx/CVE-2024-32212.json | 40 +- CVE-2024/CVE-2024-322xx/CVE-2024-32213.json | 40 +- CVE-2024/CVE-2024-322xx/CVE-2024-32228.json | 43 +- CVE-2024/CVE-2024-322xx/CVE-2024-32236.json | 40 +- CVE-2024/CVE-2024-322xx/CVE-2024-32238.json | 40 +- CVE-2024/CVE-2024-322xx/CVE-2024-32258.json | 40 +- CVE-2024/CVE-2024-322xx/CVE-2024-32281.json | 40 +- CVE-2024/CVE-2024-322xx/CVE-2024-32283.json | 40 +- CVE-2024/CVE-2024-322xx/CVE-2024-32286.json | 40 +- CVE-2024/CVE-2024-322xx/CVE-2024-32287.json | 40 +- CVE-2024/CVE-2024-322xx/CVE-2024-32290.json | 40 +- CVE-2024/CVE-2024-322xx/CVE-2024-32291.json | 40 +- CVE-2024/CVE-2024-322xx/CVE-2024-32292.json | 40 +- CVE-2024/CVE-2024-322xx/CVE-2024-32299.json | 15 +- CVE-2024/CVE-2024-323xx/CVE-2024-32301.json | 40 +- CVE-2024/CVE-2024-323xx/CVE-2024-32305.json | 15 +- CVE-2024/CVE-2024-323xx/CVE-2024-32306.json | 40 +- CVE-2024/CVE-2024-323xx/CVE-2024-32311.json | 40 +- CVE-2024/CVE-2024-323xx/CVE-2024-32312.json | 40 +- CVE-2024/CVE-2024-323xx/CVE-2024-32313.json | 40 +- CVE-2024/CVE-2024-323xx/CVE-2024-32314.json | 40 +- CVE-2024/CVE-2024-323xx/CVE-2024-32315.json | 40 +- CVE-2024/CVE-2024-323xx/CVE-2024-32318.json | 40 +- CVE-2024/CVE-2024-323xx/CVE-2024-32320.json | 40 +- CVE-2024/CVE-2024-323xx/CVE-2024-32325.json | 40 +- CVE-2024/CVE-2024-323xx/CVE-2024-32326.json | 40 +- CVE-2024/CVE-2024-323xx/CVE-2024-32327.json | 40 +- CVE-2024/CVE-2024-323xx/CVE-2024-32333.json | 40 +- CVE-2024/CVE-2024-323xx/CVE-2024-32334.json | 40 +- CVE-2024/CVE-2024-323xx/CVE-2024-32335.json | 40 +- CVE-2024/CVE-2024-323xx/CVE-2024-32337.json | 40 +- CVE-2024/CVE-2024-323xx/CVE-2024-32338.json | 40 +- CVE-2024/CVE-2024-323xx/CVE-2024-32339.json | 40 +- CVE-2024/CVE-2024-323xx/CVE-2024-32342.json | 40 +- CVE-2024/CVE-2024-323xx/CVE-2024-32343.json | 40 +- CVE-2024/CVE-2024-323xx/CVE-2024-32344.json | 40 +- CVE-2024/CVE-2024-323xx/CVE-2024-32345.json | 40 +- CVE-2024/CVE-2024-323xx/CVE-2024-32349.json | 40 +- CVE-2024/CVE-2024-323xx/CVE-2024-32352.json | 40 +- CVE-2024/CVE-2024-323xx/CVE-2024-32353.json | 40 +- CVE-2024/CVE-2024-323xx/CVE-2024-32354.json | 40 +- CVE-2024/CVE-2024-323xx/CVE-2024-32355.json | 40 +- CVE-2024/CVE-2024-323xx/CVE-2024-32359.json | 40 +- CVE-2024/CVE-2024-323xx/CVE-2024-32368.json | 40 +- CVE-2024/CVE-2024-323xx/CVE-2024-32369.json | 40 +- CVE-2024/CVE-2024-323xx/CVE-2024-32370.json | 40 +- CVE-2024/CVE-2024-323xx/CVE-2024-32371.json | 40 +- CVE-2024/CVE-2024-323xx/CVE-2024-32391.json | 40 +- CVE-2024/CVE-2024-323xx/CVE-2024-32392.json | 40 +- CVE-2024/CVE-2024-323xx/CVE-2024-32394.json | 28 +- CVE-2024/CVE-2024-323xx/CVE-2024-32399.json | 40 +- CVE-2024/CVE-2024-324xx/CVE-2024-32404.json | 40 +- CVE-2024/CVE-2024-324xx/CVE-2024-32405.json | 40 +- CVE-2024/CVE-2024-324xx/CVE-2024-32406.json | 40 +- CVE-2024/CVE-2024-324xx/CVE-2024-32407.json | 40 +- CVE-2024/CVE-2024-324xx/CVE-2024-32409.json | 40 +- CVE-2024/CVE-2024-324xx/CVE-2024-32418.json | 44 +- CVE-2024/CVE-2024-324xx/CVE-2024-32491.json | 40 +- CVE-2024/CVE-2024-324xx/CVE-2024-32492.json | 40 +- CVE-2024/CVE-2024-324xx/CVE-2024-32493.json | 40 +- CVE-2024/CVE-2024-326xx/CVE-2024-32605.json | 40 +- CVE-2024/CVE-2024-326xx/CVE-2024-32612.json | 40 +- CVE-2024/CVE-2024-326xx/CVE-2024-32613.json | 40 +- CVE-2024/CVE-2024-326xx/CVE-2024-32614.json | 40 +- CVE-2024/CVE-2024-326xx/CVE-2024-32615.json | 40 +- CVE-2024/CVE-2024-326xx/CVE-2024-32616.json | 40 +- CVE-2024/CVE-2024-326xx/CVE-2024-32618.json | 40 +- CVE-2024/CVE-2024-326xx/CVE-2024-32619.json | 40 +- CVE-2024/CVE-2024-326xx/CVE-2024-32620.json | 40 +- CVE-2024/CVE-2024-326xx/CVE-2024-32623.json | 40 +- CVE-2024/CVE-2024-326xx/CVE-2024-32638.json | 38 +- CVE-2024/CVE-2024-326xx/CVE-2024-32674.json | 40 +- CVE-2024/CVE-2024-327xx/CVE-2024-32715.json | 28 +- CVE-2024/CVE-2024-327xx/CVE-2024-32735.json | 15 +- CVE-2024/CVE-2024-327xx/CVE-2024-32737.json | 15 +- CVE-2024/CVE-2024-327xx/CVE-2024-32738.json | 15 +- CVE-2024/CVE-2024-327xx/CVE-2024-32743.json | 40 +- CVE-2024/CVE-2024-327xx/CVE-2024-32744.json | 40 +- CVE-2024/CVE-2024-327xx/CVE-2024-32745.json | 40 +- CVE-2024/CVE-2024-327xx/CVE-2024-32746.json | 40 +- CVE-2024/CVE-2024-327xx/CVE-2024-32752.json | 72 +- CVE-2024/CVE-2024-328xx/CVE-2024-32849.json | 15 +- CVE-2024/CVE-2024-328xx/CVE-2024-32850.json | 40 +- CVE-2024/CVE-2024-328xx/CVE-2024-32891.json | 40 +- CVE-2024/CVE-2024-328xx/CVE-2024-32893.json | 40 +- CVE-2024/CVE-2024-328xx/CVE-2024-32896.json | 35 +- CVE-2024/CVE-2024-329xx/CVE-2024-32907.json | 40 +- CVE-2024/CVE-2024-329xx/CVE-2024-32909.json | 40 +- CVE-2024/CVE-2024-329xx/CVE-2024-32925.json | 40 +- CVE-2024/CVE-2024-329xx/CVE-2024-32926.json | 28 +- CVE-2024/CVE-2024-329xx/CVE-2024-32929.json | 40 +- CVE-2024/CVE-2024-329xx/CVE-2024-32930.json | 28 +- CVE-2024/CVE-2024-329xx/CVE-2024-32988.json | 40 +- CVE-2024/CVE-2024-330xx/CVE-2024-33004.json | 15 +- CVE-2024/CVE-2024-330xx/CVE-2024-33007.json | 15 +- CVE-2024/CVE-2024-331xx/CVE-2024-33101.json | 40 +- CVE-2024/CVE-2024-331xx/CVE-2024-33102.json | 40 +- CVE-2024/CVE-2024-331xx/CVE-2024-33110.json | 40 +- CVE-2024/CVE-2024-331xx/CVE-2024-33113.json | 44 +- CVE-2024/CVE-2024-331xx/CVE-2024-33120.json | 40 +- CVE-2024/CVE-2024-331xx/CVE-2024-33121.json | 15 +- CVE-2024/CVE-2024-331xx/CVE-2024-33124.json | 40 +- CVE-2024/CVE-2024-331xx/CVE-2024-33144.json | 40 +- CVE-2024/CVE-2024-331xx/CVE-2024-33146.json | 28 +- CVE-2024/CVE-2024-331xx/CVE-2024-33149.json | 40 +- CVE-2024/CVE-2024-331xx/CVE-2024-33153.json | 40 +- CVE-2024/CVE-2024-331xx/CVE-2024-33155.json | 40 +- CVE-2024/CVE-2024-331xx/CVE-2024-33161.json | 40 +- CVE-2024/CVE-2024-331xx/CVE-2024-33164.json | 28 +- CVE-2024/CVE-2024-332xx/CVE-2024-33211.json | 40 +- CVE-2024/CVE-2024-332xx/CVE-2024-33213.json | 40 +- CVE-2024/CVE-2024-332xx/CVE-2024-33214.json | 40 +- CVE-2024/CVE-2024-332xx/CVE-2024-33215.json | 40 +- CVE-2024/CVE-2024-332xx/CVE-2024-33259.json | 40 +- CVE-2024/CVE-2024-332xx/CVE-2024-33260.json | 40 +- CVE-2024/CVE-2024-332xx/CVE-2024-33267.json | 40 +- CVE-2024/CVE-2024-332xx/CVE-2024-33269.json | 40 +- CVE-2024/CVE-2024-332xx/CVE-2024-33271.json | 40 +- CVE-2024/CVE-2024-332xx/CVE-2024-33275.json | 40 +- CVE-2024/CVE-2024-332xx/CVE-2024-33276.json | 40 +- CVE-2024/CVE-2024-332xx/CVE-2024-33278.json | 44 +- CVE-2024/CVE-2024-332xx/CVE-2024-33292.json | 40 +- CVE-2024/CVE-2024-332xx/CVE-2024-33294.json | 40 +- CVE-2024/CVE-2024-333xx/CVE-2024-33300.json | 40 +- CVE-2024/CVE-2024-333xx/CVE-2024-33302.json | 40 +- CVE-2024/CVE-2024-333xx/CVE-2024-33303.json | 40 +- CVE-2024/CVE-2024-333xx/CVE-2024-33304.json | 40 +- CVE-2024/CVE-2024-333xx/CVE-2024-33305.json | 15 +- CVE-2024/CVE-2024-333xx/CVE-2024-33306.json | 40 +- CVE-2024/CVE-2024-333xx/CVE-2024-33327.json | 40 +- CVE-2024/CVE-2024-333xx/CVE-2024-33329.json | 15 +- CVE-2024/CVE-2024-333xx/CVE-2024-33332.json | 15 +- CVE-2024/CVE-2024-333xx/CVE-2024-33335.json | 40 +- CVE-2024/CVE-2024-333xx/CVE-2024-33342.json | 40 +- CVE-2024/CVE-2024-333xx/CVE-2024-33343.json | 40 +- CVE-2024/CVE-2024-333xx/CVE-2024-33344.json | 40 +- CVE-2024/CVE-2024-333xx/CVE-2024-33345.json | 40 +- CVE-2024/CVE-2024-333xx/CVE-2024-33350.json | 40 +- CVE-2024/CVE-2024-333xx/CVE-2024-33374.json | 40 +- CVE-2024/CVE-2024-333xx/CVE-2024-33383.json | 40 +- CVE-2024/CVE-2024-333xx/CVE-2024-33393.json | 44 +- CVE-2024/CVE-2024-333xx/CVE-2024-33394.json | 40 +- CVE-2024/CVE-2024-333xx/CVE-2024-33396.json | 40 +- CVE-2024/CVE-2024-333xx/CVE-2024-33398.json | 40 +- CVE-2024/CVE-2024-334xx/CVE-2024-33401.json | 15 +- CVE-2024/CVE-2024-334xx/CVE-2024-33402.json | 40 +- CVE-2024/CVE-2024-334xx/CVE-2024-33404.json | 40 +- CVE-2024/CVE-2024-334xx/CVE-2024-33405.json | 40 +- CVE-2024/CVE-2024-334xx/CVE-2024-33406.json | 40 +- CVE-2024/CVE-2024-334xx/CVE-2024-33407.json | 40 +- CVE-2024/CVE-2024-334xx/CVE-2024-33410.json | 40 +- CVE-2024/CVE-2024-334xx/CVE-2024-33411.json | 40 +- CVE-2024/CVE-2024-334xx/CVE-2024-33423.json | 40 +- CVE-2024/CVE-2024-334xx/CVE-2024-33424.json | 40 +- CVE-2024/CVE-2024-334xx/CVE-2024-33429.json | 40 +- CVE-2024/CVE-2024-334xx/CVE-2024-33430.json | 44 +- CVE-2024/CVE-2024-334xx/CVE-2024-33431.json | 40 +- CVE-2024/CVE-2024-334xx/CVE-2024-33434.json | 40 +- CVE-2024/CVE-2024-334xx/CVE-2024-33435.json | 40 +- CVE-2024/CVE-2024-334xx/CVE-2024-33442.json | 40 +- CVE-2024/CVE-2024-334xx/CVE-2024-33443.json | 28 +- CVE-2024/CVE-2024-334xx/CVE-2024-33444.json | 40 +- CVE-2024/CVE-2024-334xx/CVE-2024-33445.json | 40 +- CVE-2024/CVE-2024-334xx/CVE-2024-33454.json | 40 +- CVE-2024/CVE-2024-334xx/CVE-2024-33485.json | 40 +- CVE-2024/CVE-2024-335xx/CVE-2024-33511.json | 15 +- CVE-2024/CVE-2024-335xx/CVE-2024-33512.json | 15 +- CVE-2024/CVE-2024-335xx/CVE-2024-33513.json | 23 +- CVE-2024/CVE-2024-335xx/CVE-2024-33514.json | 15 +- CVE-2024/CVE-2024-335xx/CVE-2024-33515.json | 15 +- CVE-2024/CVE-2024-335xx/CVE-2024-33516.json | 15 +- CVE-2024/CVE-2024-335xx/CVE-2024-33518.json | 15 +- CVE-2024/CVE-2024-335xx/CVE-2024-33525.json | 40 +- CVE-2024/CVE-2024-335xx/CVE-2024-33529.json | 28 +- CVE-2024/CVE-2024-335xx/CVE-2024-33530.json | 28 +- CVE-2024/CVE-2024-335xx/CVE-2024-33531.json | 40 +- CVE-2024/CVE-2024-336xx/CVE-2024-33601.json | 27 +- CVE-2024/CVE-2024-336xx/CVE-2024-33602.json | 27 +- CVE-2024/CVE-2024-336xx/CVE-2024-33631.json | 33 +- CVE-2024/CVE-2024-336xx/CVE-2024-33661.json | 40 +- CVE-2024/CVE-2024-336xx/CVE-2024-33666.json | 40 +- CVE-2024/CVE-2024-336xx/CVE-2024-33668.json | 40 +- CVE-2024/CVE-2024-336xx/CVE-2024-33669.json | 15 +- CVE-2024/CVE-2024-336xx/CVE-2024-33670.json | 15 +- CVE-2024/CVE-2024-336xx/CVE-2024-33672.json | 15 +- CVE-2024/CVE-2024-337xx/CVE-2024-33748.json | 40 +- CVE-2024/CVE-2024-337xx/CVE-2024-33752.json | 40 +- CVE-2024/CVE-2024-337xx/CVE-2024-33753.json | 40 +- CVE-2024/CVE-2024-337xx/CVE-2024-33763.json | 40 +- CVE-2024/CVE-2024-337xx/CVE-2024-33768.json | 40 +- CVE-2024/CVE-2024-337xx/CVE-2024-33772.json | 40 +- CVE-2024/CVE-2024-337xx/CVE-2024-33775.json | 40 +- CVE-2024/CVE-2024-337xx/CVE-2024-33780.json | 40 +- CVE-2024/CVE-2024-337xx/CVE-2024-33781.json | 40 +- CVE-2024/CVE-2024-337xx/CVE-2024-33782.json | 28 +- CVE-2024/CVE-2024-337xx/CVE-2024-33783.json | 40 +- CVE-2024/CVE-2024-337xx/CVE-2024-33788.json | 40 +- CVE-2024/CVE-2024-337xx/CVE-2024-33789.json | 40 +- CVE-2024/CVE-2024-337xx/CVE-2024-33791.json | 40 +- CVE-2024/CVE-2024-337xx/CVE-2024-33792.json | 40 +- CVE-2024/CVE-2024-337xx/CVE-2024-33793.json | 40 +- CVE-2024/CVE-2024-338xx/CVE-2024-33801.json | 40 +- CVE-2024/CVE-2024-338xx/CVE-2024-33804.json | 40 +- CVE-2024/CVE-2024-338xx/CVE-2024-33805.json | 40 +- CVE-2024/CVE-2024-338xx/CVE-2024-33807.json | 40 +- CVE-2024/CVE-2024-338xx/CVE-2024-33820.json | 40 +- CVE-2024/CVE-2024-338xx/CVE-2024-33829.json | 40 +- CVE-2024/CVE-2024-338xx/CVE-2024-33830.json | 40 +- CVE-2024/CVE-2024-338xx/CVE-2024-33831.json | 40 +- CVE-2024/CVE-2024-338xx/CVE-2024-33832.json | 40 +- CVE-2024/CVE-2024-338xx/CVE-2024-33835.json | 40 +- CVE-2024/CVE-2024-338xx/CVE-2024-33836.json | 40 +- CVE-2024/CVE-2024-338xx/CVE-2024-33856.json | 40 +- CVE-2024/CVE-2024-338xx/CVE-2024-33857.json | 40 +- CVE-2024/CVE-2024-338xx/CVE-2024-33860.json | 40 +- CVE-2024/CVE-2024-338xx/CVE-2024-33863.json | 40 +- CVE-2024/CVE-2024-338xx/CVE-2024-33864.json | 40 +- CVE-2024/CVE-2024-338xx/CVE-2024-33867.json | 40 +- CVE-2024/CVE-2024-338xx/CVE-2024-33868.json | 40 +- CVE-2024/CVE-2024-338xx/CVE-2024-33873.json | 40 +- CVE-2024/CVE-2024-338xx/CVE-2024-33874.json | 40 +- CVE-2024/CVE-2024-338xx/CVE-2024-33877.json | 40 +- CVE-2024/CVE-2024-338xx/CVE-2024-33881.json | 35 +- CVE-2024/CVE-2024-338xx/CVE-2024-33891.json | 15 +- CVE-2024/CVE-2024-338xx/CVE-2024-33899.json | 40 +- CVE-2024/CVE-2024-339xx/CVE-2024-33900.json | 47 +- CVE-2024/CVE-2024-339xx/CVE-2024-33905.json | 40 +- CVE-2024/CVE-2024-339xx/CVE-2024-33996.json | 28 +- CVE-2024/CVE-2024-340xx/CVE-2024-34001.json | 28 +- CVE-2024/CVE-2024-340xx/CVE-2024-34003.json | 28 +- CVE-2024/CVE-2024-340xx/CVE-2024-34006.json | 28 +- CVE-2024/CVE-2024-340xx/CVE-2024-34020.json | 40 +- CVE-2024/CVE-2024-340xx/CVE-2024-34030.json | 19 +- CVE-2024/CVE-2024-340xx/CVE-2024-34045.json | 40 +- CVE-2024/CVE-2024-340xx/CVE-2024-34058.json | 40 +- CVE-2024/CVE-2024-340xx/CVE-2024-34091.json | 15 +- CVE-2024/CVE-2024-340xx/CVE-2024-34093.json | 15 +- CVE-2024/CVE-2024-341xx/CVE-2024-34144.json | 40 +- CVE-2024/CVE-2024-341xx/CVE-2024-34145.json | 40 +- CVE-2024/CVE-2024-341xx/CVE-2024-34146.json | 48 +- CVE-2024/CVE-2024-341xx/CVE-2024-34147.json | 40 +- CVE-2024/CVE-2024-341xx/CVE-2024-34148.json | 40 +- CVE-2024/CVE-2024-341xx/CVE-2024-34199.json | 40 +- CVE-2024/CVE-2024-342xx/CVE-2024-34200.json | 40 +- CVE-2024/CVE-2024-342xx/CVE-2024-34201.json | 40 +- CVE-2024/CVE-2024-342xx/CVE-2024-34202.json | 40 +- CVE-2024/CVE-2024-342xx/CVE-2024-34203.json | 40 +- CVE-2024/CVE-2024-342xx/CVE-2024-34205.json | 40 +- CVE-2024/CVE-2024-342xx/CVE-2024-34206.json | 40 +- CVE-2024/CVE-2024-342xx/CVE-2024-34209.json | 40 +- CVE-2024/CVE-2024-342xx/CVE-2024-34210.json | 40 +- CVE-2024/CVE-2024-342xx/CVE-2024-34212.json | 40 +- CVE-2024/CVE-2024-342xx/CVE-2024-34213.json | 40 +- CVE-2024/CVE-2024-342xx/CVE-2024-34215.json | 40 +- CVE-2024/CVE-2024-342xx/CVE-2024-34218.json | 40 +- CVE-2024/CVE-2024-342xx/CVE-2024-34220.json | 40 +- CVE-2024/CVE-2024-342xx/CVE-2024-34221.json | 40 +- CVE-2024/CVE-2024-342xx/CVE-2024-34222.json | 40 +- CVE-2024/CVE-2024-342xx/CVE-2024-34225.json | 40 +- CVE-2024/CVE-2024-342xx/CVE-2024-34241.json | 40 +- CVE-2024/CVE-2024-342xx/CVE-2024-34244.json | 44 +- CVE-2024/CVE-2024-342xx/CVE-2024-34246.json | 40 +- CVE-2024/CVE-2024-342xx/CVE-2024-34249.json | 40 +- CVE-2024/CVE-2024-342xx/CVE-2024-34250.json | 40 +- CVE-2024/CVE-2024-342xx/CVE-2024-34251.json | 40 +- CVE-2024/CVE-2024-342xx/CVE-2024-34255.json | 40 +- CVE-2024/CVE-2024-342xx/CVE-2024-34256.json | 40 +- CVE-2024/CVE-2024-342xx/CVE-2024-34274.json | 40 +- CVE-2024/CVE-2024-343xx/CVE-2024-34308.json | 40 +- CVE-2024/CVE-2024-343xx/CVE-2024-34313.json | 40 +- CVE-2024/CVE-2024-343xx/CVE-2024-34315.json | 40 +- CVE-2024/CVE-2024-343xx/CVE-2024-34332.json | 40 +- CVE-2024/CVE-2024-343xx/CVE-2024-34338.json | 40 +- CVE-2024/CVE-2024-344xx/CVE-2024-34402.json | 40 +- CVE-2024/CVE-2024-344xx/CVE-2024-34403.json | 40 +- CVE-2024/CVE-2024-344xx/CVE-2024-34405.json | 40 +- CVE-2024/CVE-2024-344xx/CVE-2024-34408.json | 40 +- CVE-2024/CVE-2024-344xx/CVE-2024-34453.json | 40 +- CVE-2024/CVE-2024-344xx/CVE-2024-34454.json | 40 +- CVE-2024/CVE-2024-344xx/CVE-2024-34455.json | 40 +- CVE-2024/CVE-2024-44xx/CVE-2024-4467.json | 14 +- CVE-2024/CVE-2024-50xx/CVE-2024-5037.json | 9 +- README.md | 43 +- _state.csv | 2422 ++++++++--------- 1205 files changed, 38247 insertions(+), 3264 deletions(-) diff --git a/CVE-2007/CVE-2007-34xx/CVE-2007-3484.json b/CVE-2007/CVE-2007-34xx/CVE-2007-3484.json index 6b0a1b2d000..be71643964c 100644 --- a/CVE-2007/CVE-2007-34xx/CVE-2007-3484.json +++ b/CVE-2007/CVE-2007-34xx/CVE-2007-3484.json @@ -2,8 +2,16 @@ "id": "CVE-2007-3484", "sourceIdentifier": "cve@mitre.org", "published": "2007-06-28T20:30:00.000", - "lastModified": "2024-06-04T19:16:52.743", + "lastModified": "2024-07-03T01:35:02.900", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -15,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", diff --git a/CVE-2010/CVE-2010-51xx/CVE-2010-5153.json b/CVE-2010/CVE-2010-51xx/CVE-2010-5153.json index 443d30350d0..f65ef9c412a 100644 --- a/CVE-2010/CVE-2010-51xx/CVE-2010-5153.json +++ b/CVE-2010/CVE-2010-51xx/CVE-2010-5153.json @@ -2,8 +2,16 @@ "id": "CVE-2010-5153", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-25T21:55:02.413", - "lastModified": "2024-06-26T19:15:12.027", + "lastModified": "2024-07-03T01:35:04.330", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -15,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -51,6 +81,16 @@ "value": "CWE-362" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2010/CVE-2010-51xx/CVE-2010-5160.json b/CVE-2010/CVE-2010-51xx/CVE-2010-5160.json index 3ffc986e3ac..e9e6d464c96 100644 --- a/CVE-2010/CVE-2010-51xx/CVE-2010-5160.json +++ b/CVE-2010/CVE-2010-51xx/CVE-2010-5160.json @@ -2,8 +2,16 @@ "id": "CVE-2010-5160", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-25T21:55:02.820", - "lastModified": "2024-06-04T19:16:53.120", + "lastModified": "2024-07-03T01:35:06.877", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -15,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.4 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -51,6 +81,16 @@ "value": "CWE-362" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] } ], "configurations": [ diff --git a/CVE-2010/CVE-2010-51xx/CVE-2010-5164.json b/CVE-2010/CVE-2010-51xx/CVE-2010-5164.json index 2a41211fe38..70f1f9e3059 100644 --- a/CVE-2010/CVE-2010-51xx/CVE-2010-5164.json +++ b/CVE-2010/CVE-2010-51xx/CVE-2010-5164.json @@ -2,8 +2,16 @@ "id": "CVE-2010-5164", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-25T21:55:03.007", - "lastModified": "2024-06-26T19:15:12.250", + "lastModified": "2024-07-03T01:35:07.733", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -15,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -51,6 +81,16 @@ "value": "CWE-362" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2010/CVE-2010-51xx/CVE-2010-5175.json b/CVE-2010/CVE-2010-51xx/CVE-2010-5175.json index c85ee67506c..6d80a6ee33d 100644 --- a/CVE-2010/CVE-2010-51xx/CVE-2010-5175.json +++ b/CVE-2010/CVE-2010-51xx/CVE-2010-5175.json @@ -2,8 +2,16 @@ "id": "CVE-2010-5175", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-25T21:55:03.540", - "lastModified": "2024-06-26T19:15:12.430", + "lastModified": "2024-07-03T01:35:08.560", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -15,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.3, + "impactScore": 3.4 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -51,6 +81,16 @@ "value": "CWE-362" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] } ], "configurations": [ diff --git a/CVE-2011/CVE-2011-06xx/CVE-2011-0611.json b/CVE-2011/CVE-2011-06xx/CVE-2011-0611.json index d1ce22d46e5..7131b00057b 100644 --- a/CVE-2011/CVE-2011-06xx/CVE-2011-0611.json +++ b/CVE-2011/CVE-2011-06xx/CVE-2011-0611.json @@ -2,8 +2,9 @@ "id": "CVE-2011-0611", "sourceIdentifier": "psirt@adobe.com", "published": "2011-04-13T14:55:01.217", - "lastModified": "2024-02-02T02:39:19.227", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:35:09.403", + "vulnStatus": "Modified", + "cveTags": [], "cisaExploitAdd": "2022-03-03", "cisaActionDue": "2022-03-24", "cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.", @@ -39,6 +40,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -77,6 +98,16 @@ "value": "CWE-843" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] } ], "configurations": [ diff --git a/CVE-2011/CVE-2011-07xx/CVE-2011-0737.json b/CVE-2011/CVE-2011-07xx/CVE-2011-0737.json index c887d44ca3b..5dabd58a052 100644 --- a/CVE-2011/CVE-2011-07xx/CVE-2011-0737.json +++ b/CVE-2011/CVE-2011-07xx/CVE-2011-0737.json @@ -2,8 +2,16 @@ "id": "CVE-2011-0737", "sourceIdentifier": "cve@mitre.org", "published": "2011-02-01T18:00:04.017", - "lastModified": "2024-06-04T19:16:53.317", + "lastModified": "2024-07-03T01:35:10.423", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -15,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -51,6 +81,16 @@ "value": "CWE-200" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2012/CVE-2012-53xx/CVE-2012-5380.json b/CVE-2012/CVE-2012-53xx/CVE-2012-5380.json index 8fcc931d6d5..c7de5eede94 100644 --- a/CVE-2012/CVE-2012-53xx/CVE-2012-5380.json +++ b/CVE-2012/CVE-2012-53xx/CVE-2012-5380.json @@ -2,8 +2,16 @@ "id": "CVE-2012-5380", "sourceIdentifier": "cve@mitre.org", "published": "2012-10-11T10:51:57.500", - "lastModified": "2024-06-04T19:16:53.463", + "lastModified": "2024-07-03T01:35:11.640", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html 'CWE-426 Untrusted Search Path'\r\n\r\n", "descriptions": [ { @@ -16,6 +24,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -52,6 +82,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2012/CVE-2012-66xx/CVE-2012-6664.json b/CVE-2012/CVE-2012-66xx/CVE-2012-6664.json index 54ac81ab79c..4be05830aa2 100644 --- a/CVE-2012/CVE-2012-66xx/CVE-2012-6664.json +++ b/CVE-2012/CVE-2012-66xx/CVE-2012-6664.json @@ -2,8 +2,9 @@ "id": "CVE-2012-6664", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-21T22:15:09.767", - "lastModified": "2024-06-24T12:57:36.513", + "lastModified": "2024-07-03T01:35:12.607", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "M\u00faltiples vulnerabilidades de directory traversal en el servidor TFTP en Distinct Intranet Servers 3.10 y anteriores permiten a atacantes remotos leer o escribir archivos de su elecci\u00f3n mediante un .. (punto punto) en los comandos (1) get o (2) put." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://www.exploit-db.com/exploits/41714", diff --git a/CVE-2013/CVE-2013-32xx/CVE-2013-3245.json b/CVE-2013/CVE-2013-32xx/CVE-2013-3245.json index 787c64aa042..2d5bc4dc92e 100644 --- a/CVE-2013/CVE-2013-32xx/CVE-2013-3245.json +++ b/CVE-2013/CVE-2013-32xx/CVE-2013-3245.json @@ -2,8 +2,16 @@ "id": "CVE-2013-3245", "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "published": "2013-07-10T19:55:04.797", - "lastModified": "2024-06-04T19:16:53.593", + "lastModified": "2024-07-03T01:35:13.413", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -15,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -51,6 +81,20 @@ "value": "CWE-119" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + }, + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2014/CVE-2014-08xx/CVE-2014-0808.json b/CVE-2014/CVE-2014-08xx/CVE-2014-0808.json index 01759920eeb..015a41363fb 100644 --- a/CVE-2014/CVE-2014-08xx/CVE-2014-0808.json +++ b/CVE-2014/CVE-2014-08xx/CVE-2014-0808.json @@ -2,8 +2,9 @@ "id": "CVE-2014-0808", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-01-22T21:55:03.717", - "lastModified": "2024-06-11T06:15:08.923", + "lastModified": "2024-07-03T01:35:14.373", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -51,6 +74,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-566" + } + ] } ], "configurations": [ diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5470.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5470.json index 9dc4ba0e714..99b9ddc7464 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5470.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5470.json @@ -2,8 +2,9 @@ "id": "CVE-2014-5470", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-21T22:15:10.417", - "lastModified": "2024-06-24T12:57:36.513", + "lastModified": "2024-07-03T01:35:15.277", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Actual Analyzer hasta el 29 de agosto de 2014 permite la ejecuci\u00f3n de c\u00f3digo a trav\u00e9s de metacaracteres del shell porque se utilizan entradas que no son de confianza para parte de los datos de entrada pasados a una operaci\u00f3n de evaluaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://vulmon.com/exploitdetails?qidtp=exploitdb&qid=35549", diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2051.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2051.json index 51b4865f35f..f6ab76f9b28 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2051.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2051.json @@ -2,8 +2,9 @@ "id": "CVE-2015-2051", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-23T17:59:08.320", - "lastModified": "2023-04-26T19:27:52.350", + "lastModified": "2024-07-03T01:35:16.440", "vulnStatus": "Modified", + "cveTags": [], "cisaExploitAdd": "2022-02-10", "cisaActionDue": "2022-08-10", "cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.", @@ -19,6 +20,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -55,6 +78,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2016/CVE-2016-100xx/CVE-2016-10072.json b/CVE-2016/CVE-2016-100xx/CVE-2016-10072.json index dec8d7d0539..4afb327c272 100644 --- a/CVE-2016/CVE-2016-100xx/CVE-2016-10072.json +++ b/CVE-2016/CVE-2016-100xx/CVE-2016-10072.json @@ -2,8 +2,16 @@ "id": "CVE-2016-10072", "sourceIdentifier": "cve@mitre.org", "published": "2016-12-27T07:59:00.197", - "lastModified": "2024-06-26T19:15:12.660", + "lastModified": "2024-07-03T01:35:17.340", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -15,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -73,6 +103,16 @@ "value": "CWE-264" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2016/CVE-2016-37xx/CVE-2016-3721.json b/CVE-2016/CVE-2016-37xx/CVE-2016-3721.json index 12e16643825..9fbe6723d15 100644 --- a/CVE-2016/CVE-2016-37xx/CVE-2016-3721.json +++ b/CVE-2016/CVE-2016-37xx/CVE-2016-3721.json @@ -2,8 +2,9 @@ "id": "CVE-2016-3721", "sourceIdentifier": "secalert@redhat.com", "published": "2016-05-17T14:08:05.593", - "lastModified": "2024-05-02T14:15:09.123", + "lastModified": "2024-07-03T01:35:18.193", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", diff --git a/CVE-2016/CVE-2016-65xx/CVE-2016-6531.json b/CVE-2016/CVE-2016-65xx/CVE-2016-6531.json index d9c5cfc8bd9..d0f1958d033 100644 --- a/CVE-2016/CVE-2016-65xx/CVE-2016-6531.json +++ b/CVE-2016/CVE-2016-65xx/CVE-2016-6531.json @@ -2,8 +2,16 @@ "id": "CVE-2016-6531", "sourceIdentifier": "cret@cert.org", "published": "2016-09-24T10:59:03.650", - "lastModified": "2024-06-04T19:16:53.970", + "lastModified": "2024-07-03T01:35:18.510", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cret@cert.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -15,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", diff --git a/CVE-2017/CVE-2017-145xx/CVE-2017-14522.json b/CVE-2017/CVE-2017-145xx/CVE-2017-14522.json index bd9adc5cc84..f8326fca5ae 100644 --- a/CVE-2017/CVE-2017-145xx/CVE-2017-14522.json +++ b/CVE-2017/CVE-2017-145xx/CVE-2017-14522.json @@ -2,8 +2,16 @@ "id": "CVE-2017-14522", "sourceIdentifier": "cve@mitre.org", "published": "2018-01-26T20:29:00.847", - "lastModified": "2024-06-04T19:16:54.113", + "lastModified": "2024-07-03T01:35:18.887", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -15,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", diff --git a/CVE-2017/CVE-2017-175xx/CVE-2017-17514.json b/CVE-2017/CVE-2017-175xx/CVE-2017-17514.json index 46ea776a56a..0b10f334de2 100644 --- a/CVE-2017/CVE-2017-175xx/CVE-2017-17514.json +++ b/CVE-2017/CVE-2017-175xx/CVE-2017-17514.json @@ -2,8 +2,16 @@ "id": "CVE-2017-17514", "sourceIdentifier": "cve@mitre.org", "published": "2017-12-14T16:29:00.370", - "lastModified": "2024-06-04T19:16:54.240", + "lastModified": "2024-07-03T01:35:19.223", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -15,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -73,6 +103,16 @@ "value": "CWE-74" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] } ], "configurations": [ diff --git a/CVE-2017/CVE-2017-179xx/CVE-2017-17919.json b/CVE-2017/CVE-2017-179xx/CVE-2017-17919.json index 576eb05fa8c..73a27afc7b4 100644 --- a/CVE-2017/CVE-2017-179xx/CVE-2017-17919.json +++ b/CVE-2017/CVE-2017-179xx/CVE-2017-17919.json @@ -2,8 +2,16 @@ "id": "CVE-2017-17919", "sourceIdentifier": "cve@mitre.org", "published": "2017-12-29T16:29:00.297", - "lastModified": "2024-06-04T19:16:54.370", + "lastModified": "2024-07-03T01:35:20.180", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -15,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -73,6 +103,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2017/CVE-2017-179xx/CVE-2017-17973.json b/CVE-2017/CVE-2017-179xx/CVE-2017-17973.json index 0cd38678dac..f72c7eb7c06 100644 --- a/CVE-2017/CVE-2017-179xx/CVE-2017-17973.json +++ b/CVE-2017/CVE-2017-179xx/CVE-2017-17973.json @@ -2,8 +2,16 @@ "id": "CVE-2017-17973", "sourceIdentifier": "cve@mitre.org", "published": "2017-12-29T21:29:00.190", - "lastModified": "2024-06-04T19:16:54.477", + "lastModified": "2024-07-03T01:35:21.047", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -15,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", diff --git a/CVE-2017/CVE-2017-35xx/CVE-2017-3506.json b/CVE-2017/CVE-2017-35xx/CVE-2017-3506.json index f1864263fd1..ec9caf8dcd9 100644 --- a/CVE-2017/CVE-2017-35xx/CVE-2017-3506.json +++ b/CVE-2017/CVE-2017-35xx/CVE-2017-3506.json @@ -2,8 +2,9 @@ "id": "CVE-2017-3506", "sourceIdentifier": "secalert_us@oracle.com", "published": "2017-04-24T19:59:03.037", - "lastModified": "2024-06-07T13:22:32.107", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:35:21.677", + "vulnStatus": "Modified", + "cveTags": [], "cisaExploitAdd": "2024-06-03", "cisaActionDue": "2024-06-24", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", @@ -39,6 +40,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.2 } ], "cvssMetricV2": [ @@ -77,6 +98,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2017/CVE-2017-73xx/CVE-2017-7305.json b/CVE-2017/CVE-2017-73xx/CVE-2017-7305.json index eb5dbddb023..f148d5b4dab 100644 --- a/CVE-2017/CVE-2017-73xx/CVE-2017-7305.json +++ b/CVE-2017/CVE-2017-73xx/CVE-2017-7305.json @@ -2,8 +2,16 @@ "id": "CVE-2017-7305", "sourceIdentifier": "cve@mitre.org", "published": "2017-04-04T16:59:00.237", - "lastModified": "2024-06-04T19:16:54.933", + "lastModified": "2024-07-03T01:35:22.590", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -15,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -73,6 +103,16 @@ "value": "CWE-521" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-521" + } + ] } ], "configurations": [ diff --git a/CVE-2017/CVE-2017-79xx/CVE-2017-7938.json b/CVE-2017/CVE-2017-79xx/CVE-2017-7938.json index c0fbced78d1..72c1c9502b5 100644 --- a/CVE-2017/CVE-2017-79xx/CVE-2017-7938.json +++ b/CVE-2017/CVE-2017-79xx/CVE-2017-7938.json @@ -2,8 +2,9 @@ "id": "CVE-2017-7938", "sourceIdentifier": "cve@mitre.org", "published": "2017-04-20T14:59:00.223", - "lastModified": "2024-04-30T07:15:48.343", + "lastModified": "2024-07-03T01:35:23.457", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.7 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", diff --git a/CVE-2017/CVE-2017-79xx/CVE-2017-7961.json b/CVE-2017/CVE-2017-79xx/CVE-2017-7961.json index 4075e34df0c..4234418c3fa 100644 --- a/CVE-2017/CVE-2017-79xx/CVE-2017-7961.json +++ b/CVE-2017/CVE-2017-79xx/CVE-2017-7961.json @@ -2,8 +2,16 @@ "id": "CVE-2017-7961", "sourceIdentifier": "cve@mitre.org", "published": "2017-04-19T15:59:00.210", - "lastModified": "2024-06-04T19:16:55.123", + "lastModified": "2024-07-03T01:35:23.737", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -15,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", diff --git a/CVE-2017/CVE-2017-84xx/CVE-2017-8459.json b/CVE-2017/CVE-2017-84xx/CVE-2017-8459.json index f5cd2829eca..939daa17921 100644 --- a/CVE-2017/CVE-2017-84xx/CVE-2017-8459.json +++ b/CVE-2017/CVE-2017-84xx/CVE-2017-8459.json @@ -2,8 +2,16 @@ "id": "CVE-2017-8459", "sourceIdentifier": "cve@mitre.org", "published": "2017-05-03T14:59:00.240", - "lastModified": "2024-06-26T20:15:12.373", + "lastModified": "2024-07-03T01:35:24.003", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -15,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", diff --git a/CVE-2017/CVE-2017-92xx/CVE-2017-9230.json b/CVE-2017/CVE-2017-92xx/CVE-2017-9230.json index 53168c263d8..125b3d71680 100644 --- a/CVE-2017/CVE-2017-92xx/CVE-2017-9230.json +++ b/CVE-2017/CVE-2017-92xx/CVE-2017-9230.json @@ -2,8 +2,16 @@ "id": "CVE-2017-9230", "sourceIdentifier": "cve@mitre.org", "published": "2017-05-24T16:29:00.180", - "lastModified": "2024-06-04T19:16:55.253", + "lastModified": "2024-07-03T01:35:24.270", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -15,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -73,6 +103,16 @@ "value": "CWE-338" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-338" + } + ] } ], "configurations": [ diff --git a/CVE-2017/CVE-2017-98xx/CVE-2017-9855.json b/CVE-2017/CVE-2017-98xx/CVE-2017-9855.json index 53d79619303..9b46c67bdd5 100644 --- a/CVE-2017/CVE-2017-98xx/CVE-2017-9855.json +++ b/CVE-2017/CVE-2017-98xx/CVE-2017-9855.json @@ -2,8 +2,16 @@ "id": "CVE-2017-9855", "sourceIdentifier": "cve@mitre.org", "published": "2017-08-05T17:29:00.553", - "lastModified": "2024-06-04T19:16:55.507", + "lastModified": "2024-07-03T01:35:25.410", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -15,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -73,6 +103,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2017/CVE-2017-98xx/CVE-2017-9856.json b/CVE-2017/CVE-2017-98xx/CVE-2017-9856.json index 377b4421151..05bc7aab503 100644 --- a/CVE-2017/CVE-2017-98xx/CVE-2017-9856.json +++ b/CVE-2017/CVE-2017-98xx/CVE-2017-9856.json @@ -2,8 +2,16 @@ "id": "CVE-2017-9856", "sourceIdentifier": "cve@mitre.org", "published": "2017-08-05T17:29:00.583", - "lastModified": "2024-06-04T19:16:55.747", + "lastModified": "2024-07-03T01:35:26.443", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -15,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.4, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -73,6 +103,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-256" + } + ] } ], "configurations": [ diff --git a/CVE-2018/CVE-2018-107xx/CVE-2018-10726.json b/CVE-2018/CVE-2018-107xx/CVE-2018-10726.json index 52266a7b92d..614580c6006 100644 --- a/CVE-2018/CVE-2018-107xx/CVE-2018-10726.json +++ b/CVE-2018/CVE-2018-107xx/CVE-2018-10726.json @@ -2,8 +2,16 @@ "id": "CVE-2018-10726", "sourceIdentifier": "cve@mitre.org", "published": "2018-05-04T15:29:00.483", - "lastModified": "2024-06-04T19:16:56.023", + "lastModified": "2024-07-03T01:35:27.627", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -15,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -73,6 +103,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2018/CVE-2018-111xx/CVE-2018-11116.json b/CVE-2018/CVE-2018-111xx/CVE-2018-11116.json index 1f2337d7b59..789f42fda3b 100644 --- a/CVE-2018/CVE-2018-111xx/CVE-2018-11116.json +++ b/CVE-2018/CVE-2018-111xx/CVE-2018-11116.json @@ -2,8 +2,16 @@ "id": "CVE-2018-11116", "sourceIdentifier": "cve@mitre.org", "published": "2018-06-19T21:29:00.333", - "lastModified": "2024-06-04T19:16:56.150", + "lastModified": "2024-07-03T01:35:28.467", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -15,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -73,6 +103,16 @@ "value": "CWE-732" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] } ], "configurations": [ diff --git a/CVE-2018/CVE-2018-116xx/CVE-2018-11681.json b/CVE-2018/CVE-2018-116xx/CVE-2018-11681.json index f4cb9687b4d..fe163e101ba 100644 --- a/CVE-2018/CVE-2018-116xx/CVE-2018-11681.json +++ b/CVE-2018/CVE-2018-116xx/CVE-2018-11681.json @@ -2,8 +2,16 @@ "id": "CVE-2018-11681", "sourceIdentifier": "cve@mitre.org", "published": "2018-06-02T13:29:00.277", - "lastModified": "2024-06-04T19:16:56.400", + "lastModified": "2024-07-03T01:35:29.537", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -15,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -73,6 +103,16 @@ "value": "CWE-798" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] } ], "configurations": [ diff --git a/CVE-2018/CVE-2018-116xx/CVE-2018-11682.json b/CVE-2018/CVE-2018-116xx/CVE-2018-11682.json index e6e258ff858..930c8df47c7 100644 --- a/CVE-2018/CVE-2018-116xx/CVE-2018-11682.json +++ b/CVE-2018/CVE-2018-116xx/CVE-2018-11682.json @@ -2,8 +2,16 @@ "id": "CVE-2018-11682", "sourceIdentifier": "cve@mitre.org", "published": "2018-06-02T13:29:00.323", - "lastModified": "2024-06-10T18:15:18.183", + "lastModified": "2024-07-03T01:35:30.440", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -15,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -73,6 +103,16 @@ "value": "CWE-798" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] } ], "configurations": [ diff --git a/CVE-2018/CVE-2018-117xx/CVE-2018-11727.json b/CVE-2018/CVE-2018-117xx/CVE-2018-11727.json index dad735795c6..486ab9f02c8 100644 --- a/CVE-2018/CVE-2018-117xx/CVE-2018-11727.json +++ b/CVE-2018/CVE-2018-117xx/CVE-2018-11727.json @@ -2,8 +2,16 @@ "id": "CVE-2018-11727", "sourceIdentifier": "cve@mitre.org", "published": "2018-06-19T21:29:00.567", - "lastModified": "2024-06-04T19:16:56.537", + "lastModified": "2024-07-03T01:35:31.443", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -22,6 +30,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -84,6 +114,20 @@ "value": "CWE-200" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + }, + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2018/CVE-2018-163xx/CVE-2018-16310.json b/CVE-2018/CVE-2018-163xx/CVE-2018-16310.json index d8ac243e231..38252f281ab 100644 --- a/CVE-2018/CVE-2018-163xx/CVE-2018-16310.json +++ b/CVE-2018/CVE-2018-163xx/CVE-2018-16310.json @@ -2,8 +2,16 @@ "id": "CVE-2018-16310", "sourceIdentifier": "cve@mitre.org", "published": "2018-09-06T23:29:01.350", - "lastModified": "2024-06-10T21:15:48.783", + "lastModified": "2024-07-03T01:35:33.430", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -15,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", diff --git a/CVE-2018/CVE-2018-180xx/CVE-2018-18014.json b/CVE-2018/CVE-2018-180xx/CVE-2018-18014.json index 66ebd0d838c..69dd47d8507 100644 --- a/CVE-2018/CVE-2018-180xx/CVE-2018-18014.json +++ b/CVE-2018/CVE-2018-180xx/CVE-2018-18014.json @@ -2,8 +2,16 @@ "id": "CVE-2018-18014", "sourceIdentifier": "cve@mitre.org", "published": "2018-10-24T21:29:00.750", - "lastModified": "2024-06-26T20:15:12.740", + "lastModified": "2024-07-03T01:35:33.810", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -15,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.3, + "impactScore": 3.4 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", diff --git a/CVE-2018/CVE-2018-190xx/CVE-2018-19093.json b/CVE-2018/CVE-2018-190xx/CVE-2018-19093.json index ce3ba145c65..f4579647806 100644 --- a/CVE-2018/CVE-2018-190xx/CVE-2018-19093.json +++ b/CVE-2018/CVE-2018-190xx/CVE-2018-19093.json @@ -2,8 +2,16 @@ "id": "CVE-2018-19093", "sourceIdentifier": "cve@mitre.org", "published": "2018-11-07T19:29:00.637", - "lastModified": "2024-06-04T19:16:56.793", + "lastModified": "2024-07-03T01:35:34.453", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -15,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -73,6 +103,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] } ], "configurations": [ diff --git a/CVE-2018/CVE-2018-204xx/CVE-2018-20437.json b/CVE-2018/CVE-2018-204xx/CVE-2018-20437.json index 5a24f882840..8528ccca17b 100644 --- a/CVE-2018/CVE-2018-204xx/CVE-2018-20437.json +++ b/CVE-2018/CVE-2018-204xx/CVE-2018-20437.json @@ -2,8 +2,16 @@ "id": "CVE-2018-20437", "sourceIdentifier": "cve@mitre.org", "published": "2018-12-25T15:29:00.240", - "lastModified": "2024-06-04T19:16:56.930", + "lastModified": "2024-07-03T01:35:35.440", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -15,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", diff --git a/CVE-2018/CVE-2018-251xx/CVE-2018-25103.json b/CVE-2018/CVE-2018-251xx/CVE-2018-25103.json index 11490447071..25e6c0f15d3 100644 --- a/CVE-2018/CVE-2018-251xx/CVE-2018-25103.json +++ b/CVE-2018/CVE-2018-251xx/CVE-2018-25103.json @@ -2,8 +2,9 @@ "id": "CVE-2018-25103", "sourceIdentifier": "cret@cert.org", "published": "2024-06-17T18:15:12.650", - "lastModified": "2024-06-20T12:44:22.977", + "lastModified": "2024-07-03T01:35:36.127", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Existe una vulnerabilidad de use-after-free en lighttpd <= 1.4.50 que puede permitir el acceso para realizar una comparaci\u00f3n que no distinga entre may\u00fasculas y min\u00fasculas con el puntero reutilizado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://blogvdoo.wordpress.com/2018/11/06/giving-back-securing-open-source-iot-projects/#more-736", diff --git a/CVE-2018/CVE-2018-42xx/CVE-2018-4233.json b/CVE-2018/CVE-2018-42xx/CVE-2018-4233.json index 2e26c13cd8b..a89cf8fa877 100644 --- a/CVE-2018/CVE-2018-42xx/CVE-2018-4233.json +++ b/CVE-2018/CVE-2018-42xx/CVE-2018-4233.json @@ -2,8 +2,9 @@ "id": "CVE-2018-4233", "sourceIdentifier": "product-security@apple.com", "published": "2018-06-08T18:29:02.057", - "lastModified": "2019-06-02T17:29:00.610", + "lastModified": "2024-07-03T01:35:36.460", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -73,6 +96,16 @@ "value": "CWE-119" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "configurations": [ diff --git a/CVE-2018/CVE-2018-44xx/CVE-2018-4404.json b/CVE-2018/CVE-2018-44xx/CVE-2018-4404.json index 46c2462ce61..db4a81e875f 100644 --- a/CVE-2018/CVE-2018-44xx/CVE-2018-4404.json +++ b/CVE-2018/CVE-2018-44xx/CVE-2018-4404.json @@ -2,8 +2,9 @@ "id": "CVE-2018-4404", "sourceIdentifier": "product-security@apple.com", "published": "2019-01-11T18:29:03.140", - "lastModified": "2023-11-07T02:58:24.420", + "lastModified": "2024-07-03T01:35:37.820", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -73,6 +96,16 @@ "value": "CWE-119" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "configurations": [ diff --git a/CVE-2018/CVE-2018-52xx/CVE-2018-5278.json b/CVE-2018/CVE-2018-52xx/CVE-2018-5278.json index 2871207eae9..a26e24bd9f4 100644 --- a/CVE-2018/CVE-2018-52xx/CVE-2018-5278.json +++ b/CVE-2018/CVE-2018-52xx/CVE-2018-5278.json @@ -2,8 +2,16 @@ "id": "CVE-2018-5278", "sourceIdentifier": "cve@mitre.org", "published": "2018-01-08T05:29:00.697", - "lastModified": "2024-06-11T19:16:04.457", + "lastModified": "2024-07-03T01:35:39.040", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -15,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", diff --git a/CVE-2019/CVE-2019-10100xx/CVE-2019-1010023.json b/CVE-2019/CVE-2019-10100xx/CVE-2019-1010023.json index 4c6b345ed5e..0efea89a583 100644 --- a/CVE-2019/CVE-2019-10100xx/CVE-2019-1010023.json +++ b/CVE-2019/CVE-2019-10100xx/CVE-2019-1010023.json @@ -2,8 +2,16 @@ "id": "CVE-2019-1010023", "sourceIdentifier": "josh@bress.net", "published": "2019-07-15T04:15:13.397", - "lastModified": "2024-06-11T19:16:04.713", + "lastModified": "2024-07-03T01:35:40.327", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "josh@bress.net", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -15,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", diff --git a/CVE-2019/CVE-2019-10xx/CVE-2019-1057.json b/CVE-2019/CVE-2019-10xx/CVE-2019-1057.json index 3409528e0cd..d0a01014db7 100644 --- a/CVE-2019/CVE-2019-10xx/CVE-2019-1057.json +++ b/CVE-2019/CVE-2019-10xx/CVE-2019-1057.json @@ -2,8 +2,9 @@ "id": "CVE-2019-1057", "sourceIdentifier": "secure@microsoft.com", "published": "2019-08-14T21:15:13.860", - "lastModified": "2024-05-29T17:15:56.280", + "lastModified": "2024-07-03T01:35:49.753", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -73,6 +74,16 @@ "value": "CWE-611" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-11xx/CVE-2019-1150.json b/CVE-2019/CVE-2019-11xx/CVE-2019-1150.json index 0f1963dc682..1a84e5754dc 100644 --- a/CVE-2019/CVE-2019-11xx/CVE-2019-1150.json +++ b/CVE-2019/CVE-2019-11xx/CVE-2019-1150.json @@ -2,8 +2,9 @@ "id": "CVE-2019-1150", "sourceIdentifier": "secure@microsoft.com", "published": "2019-08-14T21:15:14.877", - "lastModified": "2024-05-29T17:16:01.677", + "lastModified": "2024-07-03T01:35:51.453", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -73,6 +74,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-11xx/CVE-2019-1157.json b/CVE-2019/CVE-2019-11xx/CVE-2019-1157.json index 6830471a585..55f35e7bae4 100644 --- a/CVE-2019/CVE-2019-11xx/CVE-2019-1157.json +++ b/CVE-2019/CVE-2019-11xx/CVE-2019-1157.json @@ -2,8 +2,9 @@ "id": "CVE-2019-1157", "sourceIdentifier": "secure@microsoft.com", "published": "2019-08-14T21:15:15.377", - "lastModified": "2024-05-29T17:16:03.650", + "lastModified": "2024-07-03T01:35:52.550", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -73,6 +74,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-11xx/CVE-2019-1162.json b/CVE-2019/CVE-2019-11xx/CVE-2019-1162.json index 91bbed6e3bc..391acc4e515 100644 --- a/CVE-2019/CVE-2019-11xx/CVE-2019-1162.json +++ b/CVE-2019/CVE-2019-11xx/CVE-2019-1162.json @@ -2,8 +2,9 @@ "id": "CVE-2019-1162", "sourceIdentifier": "secure@microsoft.com", "published": "2019-08-14T21:15:15.657", - "lastModified": "2024-05-29T17:16:04.553", + "lastModified": "2024-07-03T01:35:53.940", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -73,6 +74,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-11xx/CVE-2019-1174.json b/CVE-2019/CVE-2019-11xx/CVE-2019-1174.json index edd06db03be..f28ec7fb0bf 100644 --- a/CVE-2019/CVE-2019-11xx/CVE-2019-1174.json +++ b/CVE-2019/CVE-2019-11xx/CVE-2019-1174.json @@ -2,8 +2,9 @@ "id": "CVE-2019-1174", "sourceIdentifier": "secure@microsoft.com", "published": "2019-08-14T21:15:16.283", - "lastModified": "2024-05-29T17:16:06.970", + "lastModified": "2024-07-03T01:35:55.440", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -73,6 +74,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1257" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-11xx/CVE-2019-1175.json b/CVE-2019/CVE-2019-11xx/CVE-2019-1175.json index 6be5c837be2..535e6aa8ebf 100644 --- a/CVE-2019/CVE-2019-11xx/CVE-2019-1175.json +++ b/CVE-2019/CVE-2019-11xx/CVE-2019-1175.json @@ -2,8 +2,9 @@ "id": "CVE-2019-1175", "sourceIdentifier": "secure@microsoft.com", "published": "2019-08-14T21:15:16.347", - "lastModified": "2024-05-29T17:16:07.200", + "lastModified": "2024-07-03T01:35:56.507", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -73,6 +74,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-11xx/CVE-2019-1177.json b/CVE-2019/CVE-2019-11xx/CVE-2019-1177.json index cd7dcc423d4..14ba84cf80c 100644 --- a/CVE-2019/CVE-2019-11xx/CVE-2019-1177.json +++ b/CVE-2019/CVE-2019-11xx/CVE-2019-1177.json @@ -2,8 +2,9 @@ "id": "CVE-2019-1177", "sourceIdentifier": "secure@microsoft.com", "published": "2019-08-14T21:15:16.453", - "lastModified": "2024-05-29T17:16:07.710", + "lastModified": "2024-07-03T01:35:57.300", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -73,6 +74,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-11xx/CVE-2019-1185.json b/CVE-2019/CVE-2019-11xx/CVE-2019-1185.json index 6db5e54e887..75cfc31117a 100644 --- a/CVE-2019/CVE-2019-11xx/CVE-2019-1185.json +++ b/CVE-2019/CVE-2019-11xx/CVE-2019-1185.json @@ -2,8 +2,9 @@ "id": "CVE-2019-1185", "sourceIdentifier": "secure@microsoft.com", "published": "2019-08-14T21:15:17.047", - "lastModified": "2024-05-29T17:16:09.763", + "lastModified": "2024-07-03T01:35:58.330", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -73,6 +96,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-11xx/CVE-2019-1188.json b/CVE-2019/CVE-2019-11xx/CVE-2019-1188.json index 8c96db121b1..36be8457fe2 100644 --- a/CVE-2019/CVE-2019-11xx/CVE-2019-1188.json +++ b/CVE-2019/CVE-2019-11xx/CVE-2019-1188.json @@ -2,8 +2,9 @@ "id": "CVE-2019-1188", "sourceIdentifier": "secure@microsoft.com", "published": "2019-08-14T21:15:17.237", - "lastModified": "2024-05-29T17:16:10.430", + "lastModified": "2024-07-03T01:35:59.260", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -73,6 +74,16 @@ "value": "CWE-59" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-11xx/CVE-2019-1193.json b/CVE-2019/CVE-2019-11xx/CVE-2019-1193.json index df2dbb14f49..87c04d82c6d 100644 --- a/CVE-2019/CVE-2019-11xx/CVE-2019-1193.json +++ b/CVE-2019/CVE-2019-11xx/CVE-2019-1193.json @@ -2,8 +2,9 @@ "id": "CVE-2019-1193", "sourceIdentifier": "secure@microsoft.com", "published": "2019-08-14T21:15:17.440", - "lastModified": "2024-05-29T17:16:11.180", + "lastModified": "2024-07-03T01:36:00.023", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -73,6 +74,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-11xx/CVE-2019-1194.json b/CVE-2019/CVE-2019-11xx/CVE-2019-1194.json index 0c0d5f681ed..17cbb7747c5 100644 --- a/CVE-2019/CVE-2019-11xx/CVE-2019-1194.json +++ b/CVE-2019/CVE-2019-11xx/CVE-2019-1194.json @@ -2,8 +2,9 @@ "id": "CVE-2019-1194", "sourceIdentifier": "secure@microsoft.com", "published": "2019-08-14T21:15:17.517", - "lastModified": "2024-05-29T17:16:11.437", + "lastModified": "2024-07-03T01:36:00.767", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -73,6 +74,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-127xx/CVE-2019-12760.json b/CVE-2019/CVE-2019-127xx/CVE-2019-12760.json index 52f4e58db2c..8f6112cf390 100644 --- a/CVE-2019/CVE-2019-127xx/CVE-2019-12760.json +++ b/CVE-2019/CVE-2019-127xx/CVE-2019-12760.json @@ -2,8 +2,16 @@ "id": "CVE-2019-12760", "sourceIdentifier": "cve@mitre.org", "published": "2019-06-06T19:29:00.500", - "lastModified": "2024-06-11T21:15:51.900", + "lastModified": "2024-07-03T01:35:41.783", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -15,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.7, + "impactScore": 2.5 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", diff --git a/CVE-2019/CVE-2019-12xx/CVE-2019-1205.json b/CVE-2019/CVE-2019-12xx/CVE-2019-1205.json index b4799b77498..78a47d3a4ac 100644 --- a/CVE-2019/CVE-2019-12xx/CVE-2019-1205.json +++ b/CVE-2019/CVE-2019-12xx/CVE-2019-1205.json @@ -2,8 +2,9 @@ "id": "CVE-2019-1205", "sourceIdentifier": "secure@microsoft.com", "published": "2019-08-14T21:15:18.220", - "lastModified": "2024-05-29T17:16:13.340", + "lastModified": "2024-07-03T01:36:01.620", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", diff --git a/CVE-2019/CVE-2019-12xx/CVE-2019-1227.json b/CVE-2019/CVE-2019-12xx/CVE-2019-1227.json index ce2dd6005d2..e3a687516f8 100644 --- a/CVE-2019/CVE-2019-12xx/CVE-2019-1227.json +++ b/CVE-2019/CVE-2019-12xx/CVE-2019-1227.json @@ -2,8 +2,9 @@ "id": "CVE-2019-1227", "sourceIdentifier": "secure@microsoft.com", "published": "2019-08-14T21:15:18.953", - "lastModified": "2024-05-29T17:16:15.713", + "lastModified": "2024-07-03T01:36:02.340", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -73,6 +74,16 @@ "value": "CWE-200" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-12xx/CVE-2019-1228.json b/CVE-2019/CVE-2019-12xx/CVE-2019-1228.json index c35f3b1e9aa..e39a5a9c2e4 100644 --- a/CVE-2019/CVE-2019-12xx/CVE-2019-1228.json +++ b/CVE-2019/CVE-2019-12xx/CVE-2019-1228.json @@ -2,8 +2,9 @@ "id": "CVE-2019-1228", "sourceIdentifier": "secure@microsoft.com", "published": "2019-08-14T21:15:19.033", - "lastModified": "2024-05-29T17:16:15.987", + "lastModified": "2024-07-03T01:36:03.077", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -73,6 +74,16 @@ "value": "CWE-200" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-136xx/CVE-2019-13644.json b/CVE-2019/CVE-2019-136xx/CVE-2019-13644.json index de6b7363c37..bda2f1118fd 100644 --- a/CVE-2019/CVE-2019-136xx/CVE-2019-13644.json +++ b/CVE-2019/CVE-2019-136xx/CVE-2019-13644.json @@ -2,8 +2,16 @@ "id": "CVE-2019-13644", "sourceIdentifier": "cve@mitre.org", "published": "2019-07-18T03:15:10.310", - "lastModified": "2024-06-04T19:16:57.510", + "lastModified": "2024-07-03T01:35:42.100", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -15,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", diff --git a/CVE-2019/CVE-2019-142xx/CVE-2019-14232.json b/CVE-2019/CVE-2019-142xx/CVE-2019-14232.json index bdbfc102559..ea318b4fdb0 100644 --- a/CVE-2019/CVE-2019-142xx/CVE-2019-14232.json +++ b/CVE-2019/CVE-2019-142xx/CVE-2019-14232.json @@ -2,8 +2,9 @@ "id": "CVE-2019-14232", "sourceIdentifier": "cve@mitre.org", "published": "2019-08-02T15:15:11.880", - "lastModified": "2024-05-01T17:15:23.913", + "lastModified": "2024-07-03T01:35:42.547", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -73,6 +96,16 @@ "value": "CWE-400" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-195xx/CVE-2019-19589.json b/CVE-2019/CVE-2019-195xx/CVE-2019-19589.json index e93bc3e5893..6730b9ab9f1 100644 --- a/CVE-2019/CVE-2019-195xx/CVE-2019-19589.json +++ b/CVE-2019/CVE-2019-195xx/CVE-2019-19589.json @@ -2,8 +2,16 @@ "id": "CVE-2019-19589", "sourceIdentifier": "cve@mitre.org", "published": "2019-12-05T04:15:11.677", - "lastModified": "2024-06-04T19:16:58.127", + "lastModified": "2024-07-03T01:35:45.240", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -35,6 +43,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -73,6 +101,16 @@ "value": "CWE-436" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-436" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-197xx/CVE-2019-19750.json b/CVE-2019/CVE-2019-197xx/CVE-2019-19750.json index 59473218df7..9bce341e030 100644 --- a/CVE-2019/CVE-2019-197xx/CVE-2019-19750.json +++ b/CVE-2019/CVE-2019-197xx/CVE-2019-19750.json @@ -2,8 +2,9 @@ "id": "CVE-2019-19750", "sourceIdentifier": "cve@mitre.org", "published": "2019-12-12T18:15:13.930", - "lastModified": "2024-04-30T18:15:19.217", + "lastModified": "2024-07-03T01:35:46.357", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -73,6 +94,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-321" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-197xx/CVE-2019-19751.json b/CVE-2019/CVE-2019-197xx/CVE-2019-19751.json index 949ddc4b895..aaa76b07c1a 100644 --- a/CVE-2019/CVE-2019-197xx/CVE-2019-19751.json +++ b/CVE-2019/CVE-2019-197xx/CVE-2019-19751.json @@ -2,8 +2,9 @@ "id": "CVE-2019-19751", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T18:15:19.323", - "lastModified": "2024-04-30T19:35:36.960", + "lastModified": "2024-07-03T01:35:47.590", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-300" + } + ] + } + ], "references": [ { "url": "https://blog.easymine.io", diff --git a/CVE-2019/CVE-2019-197xx/CVE-2019-19754.json b/CVE-2019/CVE-2019-197xx/CVE-2019-19754.json index 02a84beee42..2d6dada79e8 100644 --- a/CVE-2019/CVE-2019-197xx/CVE-2019-19754.json +++ b/CVE-2019/CVE-2019-197xx/CVE-2019-19754.json @@ -2,8 +2,9 @@ "id": "CVE-2019-19754", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T18:15:19.507", - "lastModified": "2024-04-30T19:35:36.960", + "lastModified": "2024-07-03T01:35:48.790", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-321" + } + ] + } + ], "references": [ { "url": "https://hiveos.farm/changelog/", diff --git a/CVE-2019/CVE-2019-72xx/CVE-2019-7256.json b/CVE-2019/CVE-2019-72xx/CVE-2019-7256.json index 68df0ae293f..fdcc34e3cbb 100644 --- a/CVE-2019/CVE-2019-72xx/CVE-2019-7256.json +++ b/CVE-2019/CVE-2019-72xx/CVE-2019-7256.json @@ -2,8 +2,9 @@ "id": "CVE-2019-7256", "sourceIdentifier": "cve@mitre.org", "published": "2019-07-02T19:15:11.147", - "lastModified": "2024-05-23T17:58:01.130", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:36:04.380", + "vulnStatus": "Modified", + "cveTags": [], "cisaExploitAdd": "2024-03-25", "cisaActionDue": "2024-04-15", "cisaRequiredAction": "Contact the vendor for guidance on remediating firmware, per their advisory.", @@ -39,6 +40,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -77,6 +98,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-106xx/CVE-2020-10672.json b/CVE-2020/CVE-2020-106xx/CVE-2020-10672.json index 2b3fecfc022..7663b88312c 100644 --- a/CVE-2020/CVE-2020-106xx/CVE-2020-10672.json +++ b/CVE-2020/CVE-2020-106xx/CVE-2020-10672.json @@ -2,8 +2,9 @@ "id": "CVE-2020-10672", "sourceIdentifier": "cve@mitre.org", "published": "2020-03-18T22:15:12.313", - "lastModified": "2023-11-07T03:14:11.640", + "lastModified": "2024-07-03T01:36:05.477", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -73,6 +94,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-106xx/CVE-2020-10673.json b/CVE-2020/CVE-2020-106xx/CVE-2020-10673.json index ea53e0748f7..ef676554536 100644 --- a/CVE-2020/CVE-2020-106xx/CVE-2020-10673.json +++ b/CVE-2020/CVE-2020-106xx/CVE-2020-10673.json @@ -2,8 +2,9 @@ "id": "CVE-2020-10673", "sourceIdentifier": "cve@mitre.org", "published": "2020-03-18T22:15:12.407", - "lastModified": "2023-11-07T03:14:11.723", + "lastModified": "2024-07-03T01:36:08.040", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -73,6 +94,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-109xx/CVE-2020-10968.json b/CVE-2020/CVE-2020-109xx/CVE-2020-10968.json index 4f7cb740fd0..159e8d25d1f 100644 --- a/CVE-2020/CVE-2020-109xx/CVE-2020-10968.json +++ b/CVE-2020/CVE-2020-109xx/CVE-2020-10968.json @@ -2,8 +2,9 @@ "id": "CVE-2020-10968", "sourceIdentifier": "cve@mitre.org", "published": "2020-03-26T13:15:12.970", - "lastModified": "2023-11-07T03:14:26.457", + "lastModified": "2024-07-03T01:36:08.923", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -73,6 +94,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-109xx/CVE-2020-10969.json b/CVE-2020/CVE-2020-109xx/CVE-2020-10969.json index a61f67d07fd..7dcc1dbdd81 100644 --- a/CVE-2020/CVE-2020-109xx/CVE-2020-10969.json +++ b/CVE-2020/CVE-2020-109xx/CVE-2020-10969.json @@ -2,8 +2,9 @@ "id": "CVE-2020-10969", "sourceIdentifier": "cve@mitre.org", "published": "2020-03-26T13:15:13.077", - "lastModified": "2023-11-07T03:14:26.560", + "lastModified": "2024-07-03T01:36:09.833", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -73,6 +94,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-111xx/CVE-2020-11111.json b/CVE-2020/CVE-2020-111xx/CVE-2020-11111.json index 6362bc72d1a..9a035dd3dbb 100644 --- a/CVE-2020/CVE-2020-111xx/CVE-2020-11111.json +++ b/CVE-2020/CVE-2020-111xx/CVE-2020-11111.json @@ -2,8 +2,9 @@ "id": "CVE-2020-11111", "sourceIdentifier": "cve@mitre.org", "published": "2020-03-31T05:15:13.007", - "lastModified": "2023-11-07T03:14:30.317", + "lastModified": "2024-07-03T01:36:10.713", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -73,6 +94,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-111xx/CVE-2020-11112.json b/CVE-2020/CVE-2020-111xx/CVE-2020-11112.json index cbd18183645..8819a58f520 100644 --- a/CVE-2020/CVE-2020-111xx/CVE-2020-11112.json +++ b/CVE-2020/CVE-2020-111xx/CVE-2020-11112.json @@ -2,8 +2,9 @@ "id": "CVE-2020-11112", "sourceIdentifier": "cve@mitre.org", "published": "2020-03-31T05:15:13.070", - "lastModified": "2023-11-07T03:14:30.397", + "lastModified": "2024-07-03T01:36:11.610", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -73,6 +94,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-111xx/CVE-2020-11113.json b/CVE-2020/CVE-2020-111xx/CVE-2020-11113.json index 230d037795e..67e10854860 100644 --- a/CVE-2020/CVE-2020-111xx/CVE-2020-11113.json +++ b/CVE-2020/CVE-2020-111xx/CVE-2020-11113.json @@ -2,8 +2,9 @@ "id": "CVE-2020-11113", "sourceIdentifier": "cve@mitre.org", "published": "2020-03-31T05:15:13.117", - "lastModified": "2023-11-07T03:14:30.480", + "lastModified": "2024-07-03T01:36:12.463", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -73,6 +94,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-118xx/CVE-2020-11876.json b/CVE-2020/CVE-2020-118xx/CVE-2020-11876.json index b4858e3a4b1..c3a980665ea 100644 --- a/CVE-2020/CVE-2020-118xx/CVE-2020-11876.json +++ b/CVE-2020/CVE-2020-118xx/CVE-2020-11876.json @@ -2,8 +2,16 @@ "id": "CVE-2020-11876", "sourceIdentifier": "cve@mitre.org", "published": "2020-04-17T16:15:13.977", - "lastModified": "2024-06-04T19:17:00.030", + "lastModified": "2024-07-03T01:36:13.627", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -35,6 +43,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -73,6 +101,16 @@ "value": "CWE-327" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-327" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-126xx/CVE-2020-12667.json b/CVE-2020/CVE-2020-126xx/CVE-2020-12667.json index 78b96184858..c497c16753d 100644 --- a/CVE-2020/CVE-2020-126xx/CVE-2020-12667.json +++ b/CVE-2020/CVE-2020-126xx/CVE-2020-12667.json @@ -2,8 +2,9 @@ "id": "CVE-2020-12667", "sourceIdentifier": "cve@mitre.org", "published": "2020-05-19T13:15:11.763", - "lastModified": "2024-04-26T07:15:47.467", + "lastModified": "2024-07-03T01:36:14.667", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -73,6 +94,16 @@ "value": "CWE-400" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-136xx/CVE-2020-13654.json b/CVE-2020/CVE-2020-136xx/CVE-2020-13654.json index 02df1c8e832..b799d958639 100644 --- a/CVE-2020/CVE-2020-136xx/CVE-2020-13654.json +++ b/CVE-2020/CVE-2020-136xx/CVE-2020-13654.json @@ -2,8 +2,9 @@ "id": "CVE-2020-13654", "sourceIdentifier": "cve@mitre.org", "published": "2020-12-31T01:15:12.600", - "lastModified": "2024-05-02T17:15:07.590", + "lastModified": "2024-07-03T01:36:15.643", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -73,6 +94,16 @@ "value": "CWE-116" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-116" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-139xx/CVE-2020-13965.json b/CVE-2020/CVE-2020-139xx/CVE-2020-13965.json index 2080a904de3..8248229f192 100644 --- a/CVE-2020/CVE-2020-139xx/CVE-2020-13965.json +++ b/CVE-2020/CVE-2020-139xx/CVE-2020-13965.json @@ -2,8 +2,9 @@ "id": "CVE-2020-13965", "sourceIdentifier": "cve@mitre.org", "published": "2020-06-09T03:15:11.250", - "lastModified": "2024-06-27T18:06:30.240", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:36:16.497", + "vulnStatus": "Modified", + "cveTags": [], "cisaExploitAdd": "2024-06-26", "cisaActionDue": "2024-07-17", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", @@ -39,6 +40,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 } ], "cvssMetricV2": [ @@ -77,6 +98,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-143xx/CVE-2020-14318.json b/CVE-2020/CVE-2020-143xx/CVE-2020-14318.json index 97459166f95..fd8ea323e6f 100644 --- a/CVE-2020/CVE-2020-143xx/CVE-2020-14318.json +++ b/CVE-2020/CVE-2020-143xx/CVE-2020-14318.json @@ -2,8 +2,9 @@ "id": "CVE-2020-14318", "sourceIdentifier": "secalert@redhat.com", "published": "2020-12-03T16:15:12.077", - "lastModified": "2024-04-22T16:15:11.597", + "lastModified": "2024-07-03T01:36:17.507", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ], "cvssMetricV2": [ @@ -83,6 +104,16 @@ "value": "CWE-269" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-143xx/CVE-2020-14323.json b/CVE-2020/CVE-2020-143xx/CVE-2020-14323.json index 82e42290d1c..692fb1c1a10 100644 --- a/CVE-2020/CVE-2020-143xx/CVE-2020-14323.json +++ b/CVE-2020/CVE-2020-143xx/CVE-2020-14323.json @@ -2,8 +2,9 @@ "id": "CVE-2020-14323", "sourceIdentifier": "secalert@redhat.com", "published": "2020-10-29T20:15:17.117", - "lastModified": "2024-04-22T16:15:11.780", + "lastModified": "2024-07-03T01:36:18.413", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ], "cvssMetricV2": [ diff --git a/CVE-2020/CVE-2020-14xx/CVE-2020-1493.json b/CVE-2020/CVE-2020-14xx/CVE-2020-1493.json index ff34d5d08de..1d2aab10e68 100644 --- a/CVE-2020/CVE-2020-14xx/CVE-2020-1493.json +++ b/CVE-2020/CVE-2020-14xx/CVE-2020-1493.json @@ -2,8 +2,9 @@ "id": "CVE-2020-1493", "sourceIdentifier": "secure@microsoft.com", "published": "2020-08-17T19:15:16.210", - "lastModified": "2024-01-19T00:15:12.853", + "lastModified": "2024-07-03T01:36:22.230", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -73,6 +94,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-157xx/CVE-2020-15778.json b/CVE-2020/CVE-2020-157xx/CVE-2020-15778.json index 67cdc9375a8..e9cd4eddad3 100644 --- a/CVE-2020/CVE-2020-157xx/CVE-2020-15778.json +++ b/CVE-2020/CVE-2020-157xx/CVE-2020-15778.json @@ -2,8 +2,16 @@ "id": "CVE-2020-15778", "sourceIdentifier": "cve@mitre.org", "published": "2020-07-24T14:15:12.450", - "lastModified": "2024-06-04T19:17:00.783", + "lastModified": "2024-07-03T01:36:18.793", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -35,6 +43,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -73,6 +101,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-175xx/CVE-2020-17519.json b/CVE-2020/CVE-2020-175xx/CVE-2020-17519.json index f7e50bf6a0c..28494e4cce5 100644 --- a/CVE-2020/CVE-2020-175xx/CVE-2020-17519.json +++ b/CVE-2020/CVE-2020-175xx/CVE-2020-17519.json @@ -2,8 +2,9 @@ "id": "CVE-2020-17519", "sourceIdentifier": "security@apache.org", "published": "2021-01-05T12:15:12.680", - "lastModified": "2024-06-10T15:23:11.997", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:36:20.030", + "vulnStatus": "Modified", + "cveTags": [], "cisaExploitAdd": "2024-05-23", "cisaActionDue": "2024-06-13", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", @@ -39,6 +40,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ], "cvssMetricV2": [ diff --git a/CVE-2020/CVE-2020-183xx/CVE-2020-18305.json b/CVE-2020/CVE-2020-183xx/CVE-2020-18305.json index 07b4669e986..d3522d5f5d4 100644 --- a/CVE-2020/CVE-2020-183xx/CVE-2020-18305.json +++ b/CVE-2020/CVE-2020-183xx/CVE-2020-18305.json @@ -2,8 +2,9 @@ "id": "CVE-2020-18305", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T06:36:01.630", - "lastModified": "2024-05-14T16:13:02.773", + "lastModified": "2024-07-03T01:36:20.330", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que Extreme Networks EXOS anteriores a v.22.7 y anteriores a v.30.2 conten\u00eda un problema en su GUI web que no restringe el acceso a la URL, lo que permite a los atacantes acceder a informaci\u00f3n confidencial o escalar privilegios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/yasinyilmaz/1fe3fe58dd275edb77dcbe890fce2f2c", diff --git a/CVE-2020/CVE-2020-189xx/CVE-2020-18900.json b/CVE-2020/CVE-2020-189xx/CVE-2020-18900.json index 257c9b9a9e5..ac62a66d98c 100644 --- a/CVE-2020/CVE-2020-189xx/CVE-2020-18900.json +++ b/CVE-2020/CVE-2020-189xx/CVE-2020-18900.json @@ -2,8 +2,16 @@ "id": "CVE-2020-18900", "sourceIdentifier": "cve@mitre.org", "published": "2021-08-19T22:15:07.373", - "lastModified": "2024-06-04T19:17:01.007", + "lastModified": "2024-07-03T01:36:21.130", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -35,6 +43,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 } ], "cvssMetricV2": [ @@ -73,6 +101,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-255xx/CVE-2020-25575.json b/CVE-2020/CVE-2020-255xx/CVE-2020-25575.json index 5a99cb5eb0a..89f08aa4cce 100644 --- a/CVE-2020/CVE-2020-255xx/CVE-2020-25575.json +++ b/CVE-2020/CVE-2020-255xx/CVE-2020-25575.json @@ -2,8 +2,16 @@ "id": "CVE-2020-25575", "sourceIdentifier": "cve@mitre.org", "published": "2020-09-14T19:15:11.397", - "lastModified": "2024-06-04T19:17:01.203", + "lastModified": "2024-07-03T01:36:23.557", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "unsupported-when-assigned" + ] + } + ], "descriptions": [ { "lang": "en", @@ -35,6 +43,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -73,6 +101,16 @@ "value": "CWE-843" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-279xx/CVE-2020-27986.json b/CVE-2020/CVE-2020-279xx/CVE-2020-27986.json index cadd8f07a8a..63c5dd81f90 100644 --- a/CVE-2020/CVE-2020-279xx/CVE-2020-27986.json +++ b/CVE-2020/CVE-2020-279xx/CVE-2020-27986.json @@ -2,8 +2,16 @@ "id": "CVE-2020-27986", "sourceIdentifier": "cve@mitre.org", "published": "2020-10-28T23:15:12.410", - "lastModified": "2024-06-04T19:17:01.417", + "lastModified": "2024-07-03T01:36:24.937", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -35,6 +43,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -77,6 +105,20 @@ "value": "CWE-312" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + }, + { + "lang": "en", + "value": "CWE-312" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-282xx/CVE-2020-28246.json b/CVE-2020/CVE-2020-282xx/CVE-2020-28246.json index a955fa59562..27ae250f77a 100644 --- a/CVE-2020/CVE-2020-282xx/CVE-2020-28246.json +++ b/CVE-2020/CVE-2020-282xx/CVE-2020-28246.json @@ -2,8 +2,16 @@ "id": "CVE-2020-28246", "sourceIdentifier": "cve@mitre.org", "published": "2022-06-02T14:15:26.700", - "lastModified": "2024-06-04T19:17:01.543", + "lastModified": "2024-07-03T01:36:25.867", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -35,6 +43,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -73,6 +101,16 @@ "value": "CWE-74" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-355xx/CVE-2020-35587.json b/CVE-2020/CVE-2020-355xx/CVE-2020-35587.json index 9d0af956cae..8a162c82c67 100644 --- a/CVE-2020/CVE-2020-355xx/CVE-2020-35587.json +++ b/CVE-2020/CVE-2020-355xx/CVE-2020-35587.json @@ -2,8 +2,16 @@ "id": "CVE-2020-35587", "sourceIdentifier": "cve@mitre.org", "published": "2020-12-23T16:15:12.950", - "lastModified": "2024-06-04T19:17:01.813", + "lastModified": "2024-07-03T01:36:27.170", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -73,6 +81,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-311" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-361xx/CVE-2020-36179.json b/CVE-2020/CVE-2020-361xx/CVE-2020-36179.json index 6151ecedc40..e74eb9e429a 100644 --- a/CVE-2020/CVE-2020-361xx/CVE-2020-36179.json +++ b/CVE-2020/CVE-2020-361xx/CVE-2020-36179.json @@ -2,8 +2,9 @@ "id": "CVE-2020-36179", "sourceIdentifier": "cve@mitre.org", "published": "2021-01-07T00:15:14.850", - "lastModified": "2023-11-07T03:22:06.623", + "lastModified": "2024-07-03T01:36:28.273", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -73,6 +94,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-361xx/CVE-2020-36180.json b/CVE-2020/CVE-2020-361xx/CVE-2020-36180.json index a2ccda86f4c..50087203158 100644 --- a/CVE-2020/CVE-2020-361xx/CVE-2020-36180.json +++ b/CVE-2020/CVE-2020-361xx/CVE-2020-36180.json @@ -2,8 +2,9 @@ "id": "CVE-2020-36180", "sourceIdentifier": "cve@mitre.org", "published": "2021-01-07T00:15:14.913", - "lastModified": "2023-09-13T14:56:32.590", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:36:30.047", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -73,6 +94,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-361xx/CVE-2020-36181.json b/CVE-2020/CVE-2020-361xx/CVE-2020-36181.json index 3cc368bc8ac..e09cd41cd4c 100644 --- a/CVE-2020/CVE-2020-361xx/CVE-2020-36181.json +++ b/CVE-2020/CVE-2020-361xx/CVE-2020-36181.json @@ -2,8 +2,9 @@ "id": "CVE-2020-36181", "sourceIdentifier": "cve@mitre.org", "published": "2021-01-06T23:15:12.957", - "lastModified": "2023-09-13T14:56:39.930", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:36:30.900", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -73,6 +94,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-361xx/CVE-2020-36182.json b/CVE-2020/CVE-2020-361xx/CVE-2020-36182.json index 3e47ada33d1..c6cdafde8f7 100644 --- a/CVE-2020/CVE-2020-361xx/CVE-2020-36182.json +++ b/CVE-2020/CVE-2020-361xx/CVE-2020-36182.json @@ -2,8 +2,9 @@ "id": "CVE-2020-36182", "sourceIdentifier": "cve@mitre.org", "published": "2021-01-07T00:15:14.960", - "lastModified": "2023-09-13T14:56:46.657", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:36:31.760", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -73,6 +94,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-361xx/CVE-2020-36184.json b/CVE-2020/CVE-2020-361xx/CVE-2020-36184.json index 94ff600fd3d..b9cf5e27e4a 100644 --- a/CVE-2020/CVE-2020-361xx/CVE-2020-36184.json +++ b/CVE-2020/CVE-2020-361xx/CVE-2020-36184.json @@ -2,8 +2,9 @@ "id": "CVE-2020-36184", "sourceIdentifier": "cve@mitre.org", "published": "2021-01-06T23:15:13.017", - "lastModified": "2023-09-13T14:57:10.147", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:36:32.620", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -73,6 +94,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-253xx/CVE-2021-25310.json b/CVE-2021/CVE-2021-253xx/CVE-2021-25310.json index 0658345377f..144087be319 100644 --- a/CVE-2021/CVE-2021-253xx/CVE-2021-25310.json +++ b/CVE-2021/CVE-2021-253xx/CVE-2021-25310.json @@ -2,8 +2,16 @@ "id": "CVE-2021-25310", "sourceIdentifier": "cve@mitre.org", "published": "2021-02-02T15:15:16.840", - "lastModified": "2024-06-04T19:17:02.997", + "lastModified": "2024-07-03T01:36:36.343", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "unsupported-when-assigned" + ] + } + ], "descriptions": [ { "lang": "en", @@ -73,6 +81,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-150" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-269xx/CVE-2021-26918.json b/CVE-2021/CVE-2021-269xx/CVE-2021-26918.json index d195c38d509..c55ac6e4ff1 100644 --- a/CVE-2021/CVE-2021-269xx/CVE-2021-26918.json +++ b/CVE-2021/CVE-2021-269xx/CVE-2021-26918.json @@ -2,8 +2,16 @@ "id": "CVE-2021-26918", "sourceIdentifier": "cve@mitre.org", "published": "2021-02-09T03:15:12.850", - "lastModified": "2024-06-04T19:17:03.393", + "lastModified": "2024-07-03T01:36:37.450", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -35,6 +43,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -73,6 +101,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-269xx/CVE-2021-26928.json b/CVE-2021/CVE-2021-269xx/CVE-2021-26928.json index 0e9446b1f69..3f1e348091f 100644 --- a/CVE-2021/CVE-2021-269xx/CVE-2021-26928.json +++ b/CVE-2021/CVE-2021-269xx/CVE-2021-26928.json @@ -2,8 +2,16 @@ "id": "CVE-2021-26928", "sourceIdentifier": "cve@mitre.org", "published": "2021-06-04T21:15:07.433", - "lastModified": "2024-06-04T19:17:03.527", + "lastModified": "2024-07-03T01:36:38.313", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -35,6 +43,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.2 } ], "cvssMetricV2": [ @@ -73,6 +101,16 @@ "value": "CWE-306" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-282xx/CVE-2021-28246.json b/CVE-2021/CVE-2021-282xx/CVE-2021-28246.json index 6614db226e4..93bfda659dd 100644 --- a/CVE-2021/CVE-2021-282xx/CVE-2021-28246.json +++ b/CVE-2021/CVE-2021-282xx/CVE-2021-28246.json @@ -2,8 +2,16 @@ "id": "CVE-2021-28246", "sourceIdentifier": "cve@mitre.org", "published": "2021-03-26T08:15:12.730", - "lastModified": "2024-06-18T19:15:55.260", + "lastModified": "2024-07-03T01:36:39.333", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "unsupported-when-assigned" + ] + } + ], "descriptions": [ { "lang": "en", @@ -35,6 +43,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -73,6 +101,16 @@ "value": "CWE-426" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-426" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-282xx/CVE-2021-28248.json b/CVE-2021/CVE-2021-282xx/CVE-2021-28248.json index f09d9d6f8ae..6cc4b8dcb7c 100644 --- a/CVE-2021/CVE-2021-282xx/CVE-2021-28248.json +++ b/CVE-2021/CVE-2021-282xx/CVE-2021-28248.json @@ -2,8 +2,16 @@ "id": "CVE-2021-28248", "sourceIdentifier": "cve@mitre.org", "published": "2021-03-26T08:15:13.103", - "lastModified": "2024-06-04T19:17:03.980", + "lastModified": "2024-07-03T01:36:40.460", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "unsupported-when-assigned" + ] + } + ], "descriptions": [ { "lang": "en", @@ -35,6 +43,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -73,6 +101,16 @@ "value": "CWE-307" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-307" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-304xx/CVE-2021-30496.json b/CVE-2021/CVE-2021-304xx/CVE-2021-30496.json index 3e0efb252d1..d805901fb68 100644 --- a/CVE-2021/CVE-2021-304xx/CVE-2021-30496.json +++ b/CVE-2021/CVE-2021-304xx/CVE-2021-30496.json @@ -2,8 +2,16 @@ "id": "CVE-2021-30496", "sourceIdentifier": "cve@mitre.org", "published": "2021-04-20T16:15:10.590", - "lastModified": "2024-06-04T19:17:04.460", + "lastModified": "2024-07-03T01:36:41.530", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -35,6 +43,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -73,6 +101,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-319xx/CVE-2021-31954.json b/CVE-2021/CVE-2021-319xx/CVE-2021-31954.json index f5b1bea9a71..d2eef4a6e48 100644 --- a/CVE-2021/CVE-2021-319xx/CVE-2021-31954.json +++ b/CVE-2021/CVE-2021-319xx/CVE-2021-31954.json @@ -2,8 +2,9 @@ "id": "CVE-2021-31954", "sourceIdentifier": "secure@microsoft.com", "published": "2021-06-08T23:15:08.793", - "lastModified": "2023-08-01T23:15:13.470", + "lastModified": "2024-07-03T01:36:42.700", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -93,6 +94,16 @@ "value": "CWE-269" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-319xx/CVE-2021-31955.json b/CVE-2021/CVE-2021-319xx/CVE-2021-31955.json index 3bfb396a20c..04e852fd439 100644 --- a/CVE-2021/CVE-2021-319xx/CVE-2021-31955.json +++ b/CVE-2021/CVE-2021-319xx/CVE-2021-31955.json @@ -2,8 +2,9 @@ "id": "CVE-2021-31955", "sourceIdentifier": "secure@microsoft.com", "published": "2021-06-08T23:15:08.817", - "lastModified": "2023-08-01T23:15:13.570", + "lastModified": "2024-07-03T01:36:43.470", "vulnStatus": "Modified", + "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -97,6 +98,16 @@ "value": "CWE-200" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-497" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-319xx/CVE-2021-31970.json b/CVE-2021/CVE-2021-319xx/CVE-2021-31970.json index 9fb947ba295..193020c0f42 100644 --- a/CVE-2021/CVE-2021-319xx/CVE-2021-31970.json +++ b/CVE-2021/CVE-2021-319xx/CVE-2021-31970.json @@ -2,8 +2,9 @@ "id": "CVE-2021-31970", "sourceIdentifier": "secure@microsoft.com", "published": "2021-06-08T23:15:09.183", - "lastModified": "2023-08-01T23:15:14.843", + "lastModified": "2024-07-03T01:36:44.367", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -93,6 +94,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33145.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33145.json index cf36451e3e0..b7df78d8778 100644 --- a/CVE-2021/CVE-2021-331xx/CVE-2021-33145.json +++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33145.json @@ -2,8 +2,9 @@ "id": "CVE-2021-33145", "sourceIdentifier": "secure@intel.com", "published": "2024-02-23T21:15:09.410", - "lastModified": "2024-05-17T18:36:31.297", + "lastModified": "2024-07-03T01:36:45.387", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-248" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-248" + } + ] } ], "references": [ diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33146.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33146.json index f936f21ef2f..e6089e8f987 100644 --- a/CVE-2021/CVE-2021-331xx/CVE-2021-33146.json +++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33146.json @@ -2,8 +2,9 @@ "id": "CVE-2021-33146", "sourceIdentifier": "secure@intel.com", "published": "2024-02-23T21:15:09.443", - "lastModified": "2024-05-17T18:36:31.297", + "lastModified": "2024-07-03T01:36:46.133", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "references": [ diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33161.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33161.json index f50f645a6a9..98237fb7c9e 100644 --- a/CVE-2021/CVE-2021-331xx/CVE-2021-33161.json +++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33161.json @@ -2,8 +2,9 @@ "id": "CVE-2021-33161", "sourceIdentifier": "secure@intel.com", "published": "2024-02-23T21:15:09.837", - "lastModified": "2024-05-17T18:36:31.297", + "lastModified": "2024-07-03T01:36:47.010", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "references": [ diff --git a/CVE-2021/CVE-2021-349xx/CVE-2021-34983.json b/CVE-2021/CVE-2021-349xx/CVE-2021-34983.json index 01f81a622c9..acaad1ae838 100644 --- a/CVE-2021/CVE-2021-349xx/CVE-2021-34983.json +++ b/CVE-2021/CVE-2021-349xx/CVE-2021-34983.json @@ -2,8 +2,9 @@ "id": "CVE-2021-34983", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-07T23:15:13.573", - "lastModified": "2024-05-08T13:15:00.690", + "lastModified": "2024-07-03T01:36:50.850", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-306" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "references": [ diff --git a/CVE-2021/CVE-2021-355xx/CVE-2021-35559.json b/CVE-2021/CVE-2021-355xx/CVE-2021-35559.json index 906f728923a..6a3242febe6 100644 --- a/CVE-2021/CVE-2021-355xx/CVE-2021-35559.json +++ b/CVE-2021/CVE-2021-355xx/CVE-2021-35559.json @@ -2,8 +2,9 @@ "id": "CVE-2021-35559", "sourceIdentifier": "secalert_us@oracle.com", "published": "2021-10-20T11:16:34.807", - "lastModified": "2024-06-21T19:15:18.470", + "lastModified": "2024-07-03T01:36:51.900", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -93,6 +94,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-360xx/CVE-2021-36088.json b/CVE-2021/CVE-2021-360xx/CVE-2021-36088.json index 7d2511ecb77..f3d15fbef81 100644 --- a/CVE-2021/CVE-2021-360xx/CVE-2021-36088.json +++ b/CVE-2021/CVE-2021-360xx/CVE-2021-36088.json @@ -2,8 +2,9 @@ "id": "CVE-2021-36088", "sourceIdentifier": "cve@mitre.org", "published": "2021-07-01T03:15:08.847", - "lastModified": "2024-05-23T16:15:08.583", + "lastModified": "2024-07-03T01:36:52.800", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -73,6 +94,16 @@ "value": "CWE-415" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-363xx/CVE-2021-36367.json b/CVE-2021/CVE-2021-363xx/CVE-2021-36367.json index 660c2583690..aeb50505448 100644 --- a/CVE-2021/CVE-2021-363xx/CVE-2021-36367.json +++ b/CVE-2021/CVE-2021-363xx/CVE-2021-36367.json @@ -2,8 +2,9 @@ "id": "CVE-2021-36367", "sourceIdentifier": "cve@mitre.org", "published": "2021-07-09T21:15:08.540", - "lastModified": "2024-04-25T22:15:07.883", + "lastModified": "2024-07-03T01:36:53.610", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ], "cvssMetricV2": [ @@ -73,6 +94,16 @@ "value": "CWE-345" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-345" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-363xx/CVE-2021-36380.json b/CVE-2021/CVE-2021-363xx/CVE-2021-36380.json index 5b0f191870f..4d7f657ded8 100644 --- a/CVE-2021/CVE-2021-363xx/CVE-2021-36380.json +++ b/CVE-2021/CVE-2021-363xx/CVE-2021-36380.json @@ -2,8 +2,9 @@ "id": "CVE-2021-36380", "sourceIdentifier": "cve@mitre.org", "published": "2021-08-13T16:15:07.607", - "lastModified": "2024-03-06T02:00:02.077", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:36:54.480", + "vulnStatus": "Modified", + "cveTags": [], "cisaExploitAdd": "2024-03-05", "cisaActionDue": "2024-03-26", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", @@ -39,6 +40,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -77,6 +98,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-363xx/CVE-2021-36387.json b/CVE-2021/CVE-2021-363xx/CVE-2021-36387.json index 1c032492039..99dc0825174 100644 --- a/CVE-2021/CVE-2021-363xx/CVE-2021-36387.json +++ b/CVE-2021/CVE-2021-363xx/CVE-2021-36387.json @@ -2,8 +2,9 @@ "id": "CVE-2021-36387", "sourceIdentifier": "cve@mitre.org", "published": "2021-10-14T19:15:09.180", - "lastModified": "2024-05-14T21:15:11.260", + "lastModified": "2024-07-03T01:36:55.290", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -73,6 +94,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-380xx/CVE-2021-38000.json b/CVE-2021/CVE-2021-380xx/CVE-2021-38000.json index 74c05f3d80b..38343a5b78e 100644 --- a/CVE-2021/CVE-2021-380xx/CVE-2021-38000.json +++ b/CVE-2021/CVE-2021-380xx/CVE-2021-38000.json @@ -2,8 +2,9 @@ "id": "CVE-2021-38000", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2021-11-23T22:15:07.807", - "lastModified": "2024-02-15T02:00:01.650", + "lastModified": "2024-07-03T01:36:56.643", "vulnStatus": "Modified", + "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -39,6 +40,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -77,6 +98,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-406xx/CVE-2021-40655.json b/CVE-2021/CVE-2021-406xx/CVE-2021-40655.json index 84c96185750..a0b684dde59 100644 --- a/CVE-2021/CVE-2021-406xx/CVE-2021-40655.json +++ b/CVE-2021/CVE-2021-406xx/CVE-2021-40655.json @@ -2,8 +2,9 @@ "id": "CVE-2021-40655", "sourceIdentifier": "cve@mitre.org", "published": "2021-09-24T21:15:07.310", - "lastModified": "2024-05-18T01:00:01.417", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:36:58.373", + "vulnStatus": "Modified", + "cveTags": [], "cisaExploitAdd": "2024-05-16", "cisaActionDue": "2024-06-06", "cisaRequiredAction": "This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions.", @@ -39,6 +40,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -77,6 +98,16 @@ "value": "CWE-863" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-413xx/CVE-2021-41345.json b/CVE-2021/CVE-2021-413xx/CVE-2021-41345.json index 482fd3d7235..c7cec2544f3 100644 --- a/CVE-2021/CVE-2021-413xx/CVE-2021-41345.json +++ b/CVE-2021/CVE-2021-413xx/CVE-2021-41345.json @@ -2,8 +2,9 @@ "id": "CVE-2021-41345", "sourceIdentifier": "secure@microsoft.com", "published": "2021-10-13T01:15:13.323", - "lastModified": "2023-08-01T23:15:24.847", + "lastModified": "2024-07-03T01:36:59.773", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -93,6 +94,16 @@ "value": "CWE-269" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-417xx/CVE-2021-41732.json b/CVE-2021/CVE-2021-417xx/CVE-2021-41732.json index 0bca38da58b..d679c1aefae 100644 --- a/CVE-2021/CVE-2021-417xx/CVE-2021-41732.json +++ b/CVE-2021/CVE-2021-417xx/CVE-2021-41732.json @@ -2,8 +2,16 @@ "id": "CVE-2021-41732", "sourceIdentifier": "cve@mitre.org", "published": "2021-09-29T19:15:07.917", - "lastModified": "2024-06-04T19:17:06.807", + "lastModified": "2024-07-03T01:37:00.860", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -35,6 +43,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 } ], "cvssMetricV2": [ @@ -73,6 +101,16 @@ "value": "CWE-444" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-444" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-417xx/CVE-2021-41780.json b/CVE-2021/CVE-2021-417xx/CVE-2021-41780.json index 6037aeae745..dedd2cbc986 100644 --- a/CVE-2021/CVE-2021-417xx/CVE-2021-41780.json +++ b/CVE-2021/CVE-2021-417xx/CVE-2021-41780.json @@ -2,8 +2,9 @@ "id": "CVE-2021-41780", "sourceIdentifier": "cve@mitre.org", "published": "2022-08-29T05:15:07.850", - "lastModified": "2022-09-02T13:04:32.863", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:37:01.927", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-445xx/CVE-2021-44529.json b/CVE-2021/CVE-2021-445xx/CVE-2021-44529.json index 271f5cd8b43..e2345d8a16d 100644 --- a/CVE-2021/CVE-2021-445xx/CVE-2021-44529.json +++ b/CVE-2021/CVE-2021-445xx/CVE-2021-44529.json @@ -2,8 +2,9 @@ "id": "CVE-2021-44529", "sourceIdentifier": "support@hackerone.com", "published": "2021-12-08T22:15:10.163", - "lastModified": "2024-03-26T01:00:02.003", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:37:04.553", + "vulnStatus": "Modified", + "cveTags": [], "cisaExploitAdd": "2024-03-25", "cisaActionDue": "2024-04-15", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", @@ -39,6 +40,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ diff --git a/CVE-2021/CVE-2021-445xx/CVE-2021-44534.json b/CVE-2021/CVE-2021-445xx/CVE-2021-44534.json index 25b5f11c826..4677742cddd 100644 --- a/CVE-2021/CVE-2021-445xx/CVE-2021-44534.json +++ b/CVE-2021/CVE-2021-445xx/CVE-2021-44534.json @@ -2,8 +2,9 @@ "id": "CVE-2021-44534", "sourceIdentifier": "support@hackerone.com", "published": "2024-05-31T18:15:09.040", - "lastModified": "2024-05-31T19:14:47.793", + "lastModified": "2024-07-03T01:37:04.873", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un filtrado insuficiente de las entradas del usuario provoca la lectura arbitraria de archivos por parte de un atacante no autenticado, lo que da lugar a la divulgaci\u00f3n de informaci\u00f3n confidencial." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://hackerone.com/reports/1096043", diff --git a/CVE-2021/CVE-2021-44xx/CVE-2021-4440.json b/CVE-2021/CVE-2021-44xx/CVE-2021-4440.json index a8fee638147..4ffcf0df696 100644 --- a/CVE-2021/CVE-2021-44xx/CVE-2021-4440.json +++ b/CVE-2021/CVE-2021-44xx/CVE-2021-4440.json @@ -2,15 +2,55 @@ "id": "CVE-2021-4440", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-25T15:15:11.137", - "lastModified": "2024-06-25T18:50:42.040", + "lastModified": "2024-07-03T01:38:13.980", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/xen: Drop USERGS_SYSRET64 paravirt call\n\ncommit afd30525a659ac0ae0904f0cb4a2ca75522c3123 upstream.\n\nUSERGS_SYSRET64 is used to return from a syscall via SYSRET, but\na Xen PV guest will nevertheless use the IRET hypercall, as there\nis no sysret PV hypercall defined.\n\nSo instead of testing all the prerequisites for doing a sysret and\nthen mangling the stack for Xen PV again for doing an iret just use\nthe iret exit from the beginning.\n\nThis can easily be done via an ALTERNATIVE like it is done for the\nsysenter compat case already.\n\nIt should be noted that this drops the optimization in Xen for not\nrestoring a few registers when returning to user mode, but it seems\nas if the saved instructions in the kernel more than compensate for\nthis drop (a kernel build in a Xen PV guest was slightly faster with\nthis patch applied).\n\nWhile at it remove the stale sysret32 remnants.\n\n [ pawan: Brad Spengler and Salvatore Bonaccorso \n\t reported a problem with the 5.10 backport commit edc702b4a820\n\t (\"x86/entry_64: Add VERW just before userspace transition\").\n\n\t When CONFIG_PARAVIRT_XXL=y, CLEAR_CPU_BUFFERS is not executed in\n\t syscall_return_via_sysret path as USERGS_SYSRET64 is runtime\n\t patched to:\n\n\t.cpu_usergs_sysret64 = { 0x0f, 0x01, 0xf8,\n\t\t\t\t 0x48, 0x0f, 0x07 }, // swapgs; sysretq\n\n\t which is missing CLEAR_CPU_BUFFERS. It turns out dropping\n\t USERGS_SYSRET64 simplifies the code, allowing CLEAR_CPU_BUFFERS\n\t to be explicitly added to syscall_return_via_sysret path. Below\n\t is with CONFIG_PARAVIRT_XXL=y and this patch applied:\n\n\t syscall_return_via_sysret:\n\t ...\n\t <+342>: swapgs\n\t <+345>: xchg %ax,%ax\n\t <+347>: verw -0x1a2(%rip) <------\n\t <+354>: sysretq\n ]" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: x86/xen: elimine el commit de llamada paravirt USERGS_SYSRET64 afd30525a659ac0ae0904f0cb4a2ca75522c3123 en sentido ascendente. USERGS_SYSRET64 se usa para regresar de una llamada al sistema a trav\u00e9s de SYSRET, pero un invitado Xen PV usar\u00e1 la hiperllamada IRET, ya que no hay ninguna hiperllamada PV sysret definida. Entonces, en lugar de probar todos los requisitos previos para hacer un sysret y luego alterar la pila para Xen PV nuevamente para hacer un iret, simplemente use la salida iret desde el principio. Esto se puede hacer f\u00e1cilmente a trav\u00e9s de una ALTERNATIVA como ya se hace para el caso de compatibilidad con sysenter. Cabe se\u00f1alar que esto reduce la optimizaci\u00f3n en Xen para no restaurar algunos registros al regresar al modo de usuario, pero parece que las instrucciones guardadas en el kernel compensan con creces esta ca\u00edda (una compilaci\u00f3n del kernel en un invitado Xen PV fue un poco m\u00e1s r\u00e1pido con este parche aplicado). Mientras lo hace, elimine los restos obsoletos de sysret32. [pawan: Brad Spengler y Salvatore Bonaccorso informaron de un problema con el commit del backport 5.10 edc702b4a820 (\"x86/entry_64: Agregar VERW justo antes de la transici\u00f3n del espacio de usuario\"). Cuando CONFIG_PARAVIRT_XXL=y, CLEAR_CPU_BUFFERS no se ejecuta en la ruta syscall_return_via_sysret ya que USERGS_SYSRET64 est\u00e1 parcheado en tiempo de ejecuci\u00f3n para: .cpu_usergs_sysret64 = { 0x0f, 0x01, 0xf8, 0x48, 0x0f, 0x07 }, // swapgs; sysretq al que le falta CLEAR_CPU_BUFFERS. Resulta que eliminar USERGS_SYSRET64 simplifica el c\u00f3digo, permitiendo que CLEAR_CPU_BUFFERS se agregue expl\u00edcitamente a la ruta syscall_return_via_sysret. A continuaci\u00f3n se muestra CONFIG_PARAVIRT_XXL=y y se aplic\u00f3 este parche: syscall_return_via_sysret: ... <+342>: swapgs <+345>: xchg %ax,%ax <+347>: verw -0x1a2(%rip) <---- -- <+354>: sysretq ]" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/1424ab4bb386df9cc590c73afa55f13e9b00dea2", diff --git a/CVE-2021/CVE-2021-457xx/CVE-2021-45785.json b/CVE-2021/CVE-2021-457xx/CVE-2021-45785.json index f548e8190dc..2e9cab24b9e 100644 --- a/CVE-2021/CVE-2021-457xx/CVE-2021-45785.json +++ b/CVE-2021/CVE-2021-457xx/CVE-2021-45785.json @@ -2,8 +2,9 @@ "id": "CVE-2021-45785", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-24T19:15:11.700", - "lastModified": "2024-06-26T17:42:23.627", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:37:05.873", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47230.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47230.json index 93e963eeba2..7eab9c7ec98 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47230.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47230.json @@ -2,8 +2,9 @@ "id": "CVE-2021-47230", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:12.400", - "lastModified": "2024-05-21T16:54:26.047", + "lastModified": "2024-07-03T01:37:24.797", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: KVM: x86: restablece inmediatamente el contexto de MMU cuando se borra el indicador SMM Restablece inmediatamente el contexto de MMU cuando se borra el indicador SMM de la vCPU para que el indicador SMM en la funci\u00f3n MMU est\u00e9 siempre sincronizado con el indicador de la vCPU. Si RSM falla (que no se emula correctamente), KVM se retirar\u00e1 sin llamar a post_leave_smm() y dejar\u00e1 la MMU en mal estado. La funci\u00f3n incorrecta de MMU puede provocar una desreferencia del puntero NULL al tomar el rmap de una p\u00e1gina oculta para una falla de p\u00e1gina, ya que las b\u00fasquedas iniciales para gfn se realizar\u00e1n con el indicador SMM de la vCPU (=0), mientras que la b\u00fasqueda de rmap utilizar\u00e1 el SMM de la p\u00e1gina oculta. bandera, que proviene de la MMU (=1). SMM tiene un conjunto de ranuras de memoria completamente diferente, por lo que la b\u00fasqueda inicial puede encontrar una ranura de memoria (SMM=0) y luego explotar en la b\u00fasqueda de ranura de memoria de rmap (SMM=1). falla de protecci\u00f3n general, probablemente para direcci\u00f3n no can\u00f3nica 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref en rango [0x0000000000000000-0x00000000000000007] CPU: 1 PID: 8410 Comm: No contaminado 5.13.0 -rc5-syzkaller #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__gfn_to_rmap arch/x86/kvm/mmu/mmu.c:935 [en l\u00ednea] RIP: 0010: gfn_to_rmap+0x2b0/0x4d0 arch/x86/kvm/mmu/mmu.c:947 C\u00f3digo: <42> 80 3c 20 00 74 08 4c 89 ff e8 f1 79 a9 00 4c 89 fb 4d 8b 37 44 RSP:ffffc90000ffe f98 EFLAGS : 00010246 RAX: 0000000000000000 RBX: ffff888015b9f414 RCX: ffff888019669c40 RDX: 00000000000000000 RSI: 0000000000000001 RDI: 00000000000 00001 RBP: 0000000000000001 R08: ffffffff811d9cdb R09: ffffed10065a6002 R10: ffffed10065a6002 R11: 00000000000000000 R12: dffffc0000000000 R13: 0000000000003 R14: 0000000000000001 R15: 0000000000000000 FS: 000000000124b300 (0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 8e31000 CR4: 00000000001526e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffe0ff0 DR7: 0000000000000400 Seguimiento de llamadas: rmap_add arch/x86/kvm/mmu/mmu.c:965 [en l\u00ednea] mmu_set_spte+0x862/0xe60 arch/x86/kvm/mmu/mmu.c:2604 __direct_map arch/x86/kvm/mmu/mmu. c:2862 [en l\u00ednea] direct_page_fault+0x1f74/0x2b70 arch/x86/kvm/mmu/mmu.c:3769 kvm_mmu_do_page_fault arch/x86/kvm/mmu.h:124 [en l\u00ednea] kvm_mmu_page_fault+0x199/0x1440 arch/x86/kvm/ mmu/mmu.c:5065 vmx_handle_exit+0x26/0x160 arch/x86/kvm/vmx/vmx.c:6122 vcpu_enter_guest+0x3bdd/0x9630 arch/x86/kvm/x86.c:9428 vcpu_run+0x416/0xc20 arch/x86/ kvm/x86.c:9494 kvm_arch_vcpu_ioctl_run+0x4e8/0xa40 arch/x86/kvm/x86.c:9722 kvm_vcpu_ioctl+0x70f/0xbb0 arch/x86/kvm/../../../virt/kvm/kvm_main.c :3460 vfs_ioctl fs/ioctl.c:51 [en l\u00ednea] __do_sys_ioctl fs/ioctl.c:1069 [en l\u00ednea] __se_sys_ioctl+0xfb/0x170 fs/ioctl.c:1055 do_syscall_64+0x3f/0xb0 arch/x86/entry/common.c :47 entrada_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x440ce9" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/669a8866e468fd020d34eb00e08cb41d3774b71b", diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47232.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47232.json index 9962b6cd844..774d6a75305 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47232.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47232.json @@ -2,8 +2,9 @@ "id": "CVE-2021-47232", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:12.557", - "lastModified": "2024-05-21T16:54:26.047", + "lastModified": "2024-07-03T01:37:25.720", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: can: j1939: corrige Use-after-Free, mantenga presionada la referencia skb mientras est\u00e1 en uso. Este parche corrige un Use-after-Free encontrado por syzbot. El problema es que se toma un skb de la cola de skb por sesi\u00f3n, sin incrementar el recuento de referencias. Esto conduce a un use after free si el skb se toma simult\u00e1neamente de la cola de sesi\u00f3n debido a un CTS." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1071065eeb33d32b7d98c2ce7591881ae7381705", diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47238.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47238.json index ba6b84e11a1..22e2259b217 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47238.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47238.json @@ -2,8 +2,9 @@ "id": "CVE-2021-47238", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:13.017", - "lastModified": "2024-05-21T16:54:26.047", + "lastModified": "2024-07-03T01:37:26.920", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: ipv4: corrige la p\u00e9rdida de memoria en ip_mc_add1_src. BUG: p\u00e9rdida de memoria objeto sin referencia 0xffff888101bc4c00 (tama\u00f1o 32): comm \"syz-executor527\", pid 360, jiffies 4294807421 (edad 19.329s) volcado hexadecimal (primeros 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 01 00 00 00 00 00 00 00 ac 14 14 bb 00 00 02 00 ................ backtrace: [<00000000f17c5244>] kmalloc include/linux/slab.h:558 [en l\u00ednea] [<00000000f17c5244>] kzalloc include/ linux/slab.h:688 [en l\u00ednea] [<00000000f17c5244>] ip_mc_add1_src net/ipv4/igmp.c:1971 [en l\u00ednea] [<00000000f17c5244>] ip_mc_add_src+0x95f/0xdb0 net/ipv4/igmp.c:2095 <000000001cb99709 >] ip_mc_source+0x84c/0xea0 net/ipv4/igmp.c:2416 [<0000000052cf19ed>] do_ip_setsockopt net/ipv4/ip_sockglue.c:1294 [en l\u00ednea] [<0000000052cf19ed>] 0net/ipv4/ip_sockglue. c:1423 [<00000000477edfbc>] raw_setsockopt+0x13d/0x170 net/ipv4/raw.c:857 [<00000000e75ca9bb>] __sys_setsockopt+0x158/0x270 net/socket.c:2117 [<00000000bdb993 a8>] __do_sys_setsockopt net/socket.c :2128 [en l\u00ednea] [<00000000bdb993a8>] __se_sys_setsockopt net/socket.c:2125 [en l\u00ednea] [<00000000bdb993a8>] __x64_sys_setsockopt+0xba/0x150 net/socket.c:2125 [<000000006a 1ffdbd>] do_syscall_64+0x40/0x80 arch/ x86/entry/common.c:47 [<00000000b11467c4>] Entry_SYSCALL_64_after_hwframe+0x44/0xae En la confirmaci\u00f3n 24803f38a5c0 (\"igmp: no eliminar la informaci\u00f3n de la lista de fuentes de igmp cuando se establece el enlace\"), se elimin\u00f3 ip_mc_clear_src() en ip_mc_destroy_dev() , porque tambi\u00e9n fue llamado en igmpv3_clear_delrec(). Gr\u00e1fico de llamada aproximado: inetdev_destroy -> ip_mc_destroy_dev -> igmpv3_clear_delrec -> ip_mc_clear_src -> RCU_INIT_POINTER(dev->ip_ptr, NULL) Sin embargo, ip_mc_clear_src() llamado en igmpv3_clear_delrec() no libera in_dev->mc_list->sources. Y RCU_INIT_POINTER() asigna NULL a dev->ip_ptr. Como resultado, in_dev no se puede obtener a trav\u00e9s de inetdev_by_index() y luego in_dev->mc_list->sources no se puede liberar mediante ip_mc_del1_src() en sock_close. La secuencia de llamada aproximada es as\u00ed: sock_close -> __sock_release -> inet_release -> ip_mc_drop_socket -> inetdev_by_index -> ip_mc_leave_src -> ip_mc_del_src -> ip_mc_del1_src Entonces todav\u00eda necesitamos llamar a ip_mc_clear_src() en ip_mc_destroy_dev() para liberar in_dev->mc_list ->fuentes ." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0dc13e75507faa17ac9f7562b4ef7bf8fcd78422", diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47241.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47241.json index 5bd1ad5dc05..da37147d595 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47241.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47241.json @@ -2,8 +2,9 @@ "id": "CVE-2021-47241", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:13.250", - "lastModified": "2024-05-21T16:54:26.047", + "lastModified": "2024-07-03T01:37:27.850", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ethtool: strset: correcci\u00f3n del c\u00e1lculo de la longitud del mensaje. No se tiene en cuenta el nido externo para ETHTOOL_A_STRSET_STRINGSETS. Esto puede provocar que ETHTOOL_MSG_STRSET_GET produzca una advertencia como: la longitud calculada de el payload del mensaje (684) no es suficiente ADVERTENCIA: CPU: 0 PID: 30967 en net/ethtool/netlink.c:369 ethnl_default_doit+0x87a/0xa20 y un s\u00edmbolo. Como suele ocurrir con este tipo de advertencias, se deben cumplir tres condiciones para que se active la advertencia: - no debe haber ning\u00fan tama\u00f1o de skb redondeado hacia arriba (por ejemplo, tama\u00f1o_respuesta de 684); - el conjunto de cadenas debe ser por dispositivo (para que se complete el encabezado); - el nombre del dispositivo debe tener al menos 12 caracteres. Con todo, con el espacio de usuario actual, parece que leer indicadores privados es el \u00fanico lugar donde esto podr\u00eda suceder. O con syzbot :)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/cfc7f0e70d649e6d2233fba0d9390b525677d971", diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47242.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47242.json index b801ac04d8b..f090be7d10e 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47242.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47242.json @@ -2,8 +2,9 @@ "id": "CVE-2021-47242", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:13.327", - "lastModified": "2024-05-21T16:54:26.047", + "lastModified": "2024-07-03T01:37:28.667", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: mptcp: corrige una b\u00fasqueda suave en subflow_error_report(). Maxim inform\u00f3 una b\u00fasqueda suave en subflow_error_report(): vigilancia: ERROR: bloqueo suave - \u00a1CPU#0 bloqueada durante 22 segundos! [swapper/0:0] RIP: 0010:native_queued_spin_lock_slowpath RSP: 0018:ffffa859c0003bc0 EFLAGS: 00000202 RAX: 0000000000000101 RBX: 0000000000000001 RCX: 000000000 0000000 RDX: ffff9195c2772d88 RSI: 0000000000000000 RDI: ffff9195c2772d88 RBP: ffff9195c2772d00 R08: 00000000000067b0 R09: c6e31da9eb1e44f4 :ffff9195ef379700 R11: ffff9195edb50710 R12: ffff9195c2772d88 R13: ffff9195f500e3d0 R14: ffff9195ef379700 R15: ffff9195ef379700 FS: 0000000000000000(0000) 1961f400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000c000407000 CR3: 0000000002988000 00000000000006f0 Seguimiento de llamadas: _raw_spin_lock_bh subflow_error_report mptcp_subflow_data_available __mptcp_move_skbs_from_subflow mptcp_data_ready tcp_data_queue tcp_rcv_establecido tcp_v4_do_rcv tcp_v4_rcv liver_rcu ip_local_deliver_finish __netif_receive_skb_one_core netif_receive_skb rtl8139_poll 8139too __napi_poll net_rx_action __do_softirq __irq_exit_rcu common_interrupt La funci\u00f3n de llamada, mptcp_subflow_data_available(), se puede invocar desde diferentes contextos: - enchufe ssk lock - bloqueo de socket ssk + mptcp_data_lock - bloqueo de socket ssk + mptcp_data_lock + bloqueo de socket msk. Dado que subflow_error_report() intenta adquirir mptcp_data_lock, las dos \u00faltimas cadenas de llamadas provocar\u00e1n una b\u00fasqueda suave. Este cambio soluciona el problema de mover la llamada de informe de errores a funciones externas, donde se conoce la lista de bloqueos retenidos y solo podemos adquirir el que necesitamos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1281" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/27ef25c72373222aaa5fe7b5cd890ae9cfb89a8d", diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47259.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47259.json index e85dbed92ab..4875f8025d4 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47259.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47259.json @@ -2,8 +2,9 @@ "id": "CVE-2021-47259", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:14.610", - "lastModified": "2024-05-21T16:54:26.047", + "lastModified": "2024-07-03T01:37:30.730", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: core: corrige el manejo de errores de scsi_host_alloc(). Despu\u00e9s de que el dispositivo se inicializa mediante device_initialize(), o su nombre se establece mediante dev_set_name(), el dispositivo debe liberarse mediante put_device (). De lo contrario, se filtrar\u00e1 el nombre del dispositivo porque se asigna din\u00e1micamente en dev_set_name(). Solucione la fuga reemplazando kfree() con put_device(). Dado que scsi_host_dev_release() maneja adecuadamente la eliminaci\u00f3n de IDA y kthread, elimine tambi\u00e9n estas may\u00fasculas y min\u00fasculas especiales del manejo de errores." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3e3c7ebbfac152d08be75c92802a64a1f6471a15", diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47274.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47274.json index a116b55ded4..a16a31af5e4 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47274.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47274.json @@ -2,8 +2,9 @@ "id": "CVE-2021-47274", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:15.830", - "lastModified": "2024-05-21T16:54:26.047", + "lastModified": "2024-07-03T01:37:32.447", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: rastreo: corrija la verificaci\u00f3n de longitud que causa corrupci\u00f3n de la memoria. Hemos sufrido fallos graves del kernel debido a la corrupci\u00f3n de la memoria en nuestro entorno de producci\u00f3n, como Call Trace: [1640542.554277] fallo de protecci\u00f3n general. : 0000 [#1] SMP PTI [1640542.554856] CPU: 17 PID: 26996 Comm: python Kdump: cargado Contaminado:G [1640542.556629] RIP: 0010:kmem_cache_alloc+0x90/0x190 [1640542.559074] : 0018:ffffb16faa597df8 EFLAGS: 00010286 [ 1640542.559587] RAX: 0000000000000000 RBX: 0000000000400200 RCX: 0000000006e931bf [1640542.560323] RDX: 0000000006e931be RSI: 0000400200 RDI: ffff9a45ff004300 [1640542.560996] RBP: 0000000000400200 R08: 0000000000023420 R09: 0000000000000000 [1640542.561670] : 0000000000000000 R11: 0000000000000000 R12: ffffffff9a20608d [1640542.562366] R13: ffff9a45ff004300 R14: ffff9a45ff004300 R15: 696c662f65636976 [1640542.563128] FS: 00007f45d7c6f740(0000) GS:ffff9a45ff840000(0000) GS:0000000000000000 [1640542.563937] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [1640542.564557] CR2: 00007f45d71311a0 CR3: 000000189d63e004 CR4: 00000000003606e0 [1640542.565279] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [1640542.5 66069] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [1640542.566742] Seguimiento de llamadas: [1640542.567009] anon_vma_clone+0x5d/0x170 2.567417] __split_vma+0x91/0x1a0 [1640542.567777] do_munmap+0x2c6/0x320 [1640542.568128] vm_munmap+0x54/0x70 [1640542.569990] __x64_sys_munmap+0x22/0x30 [1640542.572005] _64+0x5b/0x1b0 [1640542.573724] entrada_SYSCALL_64_after_hwframe+0x44/0xa9 [1640542.575642] RIP: 0033:0x7f45d6e61e27 James Wang lo ha reproducido de forma estable en la \u00faltima versi\u00f3n 4.19 LTS. Despu\u00e9s de algunas depuraciones, finalmente demostramos que se debe al acceso fuera de los l\u00edmites al b\u00fafer ftrace usando una herramienta de depuraci\u00f3n de la siguiente manera: [86.775200] ERROR: Escritura fuera de los l\u00edmites en la direcci\u00f3n 0xffff88aefe8b7000 [86.780806] no_context+0xdf/0x3c0 [86.784327 ] __do_page_fault+0x252/0x470 [ 86.788367] do_page_fault+0x32/0x140 [ 86.792145] page_fault+0x1e/0x30 [ 86.795576] strncpy_from_unsafe+0x66/0xb0 [ 86.799789] ry_string+0x25/0x40 [ 86.804002] fetch_deref_string+0x51/0x60 [ 86.808134] kprobe_trace_func +0x32d/0x3a0 [ 86.812347] kprobe_dispatcher+0x45/0x50 [ 86.816385] kprobe_ftrace_handler+0x90/0xf0 [ 86.820779] ftrace_ops_assist_func+0xa1/0x140 [ 86.825340] ffffc00750bf [ 86.828603] do_sys_open+0x5/0x1f0 [ 86.832124] do_syscall_64+0x5b/0x1b0 [ 86.835900 ] Entry_SYSCALL_64_after_hwframe+0x44/0xa9 commit b220c049d519 (\"rastreo: verificar la longitud antes de entregar el b\u00fafer de filtro\") agrega verificaci\u00f3n de longitud para proteger el desbordamiento de datos de seguimiento introducido en 0fc1b09ff1ff, parece que esta soluci\u00f3n no puede evitar el desbordamiento por completo, la verificaci\u00f3n de longitud tambi\u00e9n deber\u00eda tenga en cuenta el tama\u00f1o de la entrada->matriz[0], ya que esta matriz[0] ocupa toda la longitud de los datos de seguimiento y ocupa espacio adicional y corre el riesgo de desbordarse." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2d598902799886d67947406f26ee8e5fd2ca097f", diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47284.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47284.json index e9c1d7b6737..11bf32adced 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47284.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47284.json @@ -2,8 +2,9 @@ "id": "CVE-2021-47284", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:16.577", - "lastModified": "2024-05-21T16:54:26.047", + "lastModified": "2024-07-03T01:37:33.787", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: isdn: mISDN: netjet: Soluciona fallo en nj_probe: 'nj_setup' en netjet.c puede fallar con -EIO y en este caso 'card->irq' est\u00e1 inicializado y es m\u00e1s grande que cero. Una llamada posterior a 'nj_release' liberar\u00e1 el irq que no ha sido solicitado. Corrija este error eliminando la asignaci\u00f3n anterior a 'card->irq' y simplemente mantenga la asignaci\u00f3n antes de 'request_irq'. El registro de KASAN lo revela: [3.354615] ADVERTENCIA: CPU: 0 PID: 1 en kernel/irq/manage.c:1826 free_irq+0x100/0x480 [3.355112] M\u00f3dulos vinculados en: [3.355310] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 5.13.0-rc1-00144-g25a1298726e #13 [ 3.355816 ] Nombre del hardware: PC est\u00e1ndar QEMU (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04 /01/2014 [ 3.356552 ] RIP: 0010:free_irq+0x100/0x480 [ 3.356820 ] C\u00f3digo: 6e 08 74 6f 4d 89 f4 e8 5e ac 09 00 4d 8b 74 24 18 4d 85 f6 75 e3 e8 f ac 09 00 8b 75 c8 48 c7 c7 78 c1 2e 85 e8 e0 cf f5 ff <0f> 0b 48 8b 75 c0 4c 89 ff e8 72 33 0b 03 48 8b 43 40 4c 8b a0 80 [ 3.358012 ] RSP: 17b48 EFLAGS: 00010082 [ 3.358357 ] RAX: 0000000000000000 RBX: ffff888104dc8000 RCX: 0000000000000000 [ 3.358814 ] RDX: ffff8881003c8000 RSI: ffffffff8124a9e6 RDI: 00000000ffffff ff [ 3.359272 ] RBP: ffffc90000017b88 R08: 0000000000000000 R09: 0000000000000000 [ 3.359732 ] R10: ffffc900000179f0 R11: 0000000000001d0 4 R12: 0000000000000000 [ 3.360195 ] R13 : ffff888107dc6000 R14: ffff888107dc6928 R15: ffff888104dc80a8 [ 3.360652 ] FS: 0000000000000000(0000) GS:ffff88817bc00000(0000) 00000000000 [ 3.361170 ] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3.361538 ] CR2: 00000000000000000 CR3: 000000000582e000 CR4: 00000000000006f0 [ 3.362003 ] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 3.362175 ] DR3: 000000000000000 0 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 3.362175 ] Seguimiento de llamadas: [ 3.362175 ] nj_release+0x51/0x1e0 [ 3.362175 ] nj_probe+0x450/0x950 [ 3,362175 ] ? pci_device_remove+0x110/0x110 [ 3.362175 ] local_pci_probe+0x45/0xa0 [ 3.362175 ] pci_device_probe+0x12b/0x1d0 [ 3.362175 ] really_probe+0x2a9/0x610 [ 3.362175 ]driver_probe_device+0x90/0x1d0 [3.362175]? mutex_lock_nested+0x1b/0x20 [3.362175] device_driver_attach+0x68/0x70 [3.362175] __driver_attach+0x124/0x1b0 [3.362175]? device_driver_attach+0x70/0x70 [3.362175] bus_for_each_dev+0xbb/0x110 [3.362175]? rdinit_setup+0x45/0x45 [ 3.362175 ] driver_attach+0x27/0x30 [ 3.362175 ] bus_add_driver+0x1eb/0x2a0 [ 3.362175 ] driver_register+0xa9/0x180 [ 3.362175 ] x82/0x90 [3.362175]? w6692_init+0x38/0x38 [3.362175] nj_init+0x36/0x38 [3.362175] do_one_initcall+0x7f/0x3d0 [3.362175]? rdinit_setup+0x45/0x45 [3.362175]? rcu_read_lock_sched_held+0x4f/0x80 [3.362175] kernel_init_freeable+0x2aa/0x301 [3.362175]? rest_init+0x2c0/0x2c0 [3.362175] kernel_init+0x18/0x190 [3.362175]? rest_init+0x2c0/0x2c0 [3.362175]? rest_init+0x2c0/0x2c0 [3.362175] ret_from_fork+0x1f/0x30 [3.362175] P\u00e1nico del kernel - no sincronizado: panic_on_warn establecido... [3.362175] CPU: 0 PID: 1 Comm: swapper/0 No contaminado 5.13.0-rc1-00144 -g25a1298726e #13 [ 3.362175 ] Nombre del hardware: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 01/04/2014 [ 3.362175 ] Seguimiento de llamadas: [ 3.362175 ] dump_stack+0xba/0xf5 [3.362175]? free_irq+0x100/0x480 [3.362175] p\u00e1nico+0x15a/0x3f2 [3.362175]? __advertir+0xf2/0x150 [3.362175]? free_irq+0x100/0x480 [3.362175] __warn+0x108/0x150 [3.362175]? free_irq+0x100/0x480 [ 3.362175 ] report_bug+0x119/0x1c0 [ 3.362175 ] handle_bug+0x3b/0x80 [ 3.362175 ] exc_invalid_op+0x18/0x70 [ 3.362175 ] x12/0x20 [3.362175] RIP: 0010:free_irq+0x100 --- truncado---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/143fc7220961220eecc04669e5909af8847bf8c8", diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47295.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47295.json index 13c7aed40ac..be78ddd6a7f 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47295.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47295.json @@ -2,8 +2,9 @@ "id": "CVE-2021-47295", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:17.400", - "lastModified": "2024-05-21T16:54:26.047", + "lastModified": "2024-07-03T01:37:35.127", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: net: sched: corrige la p\u00e9rdida de memoria en tcindex_partial_destroy_work Syzbot inform\u00f3 una p\u00e9rdida de memoria en tcindex_set_parms(). El problema estaba en el hash perfecto no liberado en tcindex_partial_destroy_work(). En tcindex_set_parms() se asigna un nuevo tcindex_data y algunos campos del anterior se copian al nuevo, pero no el hash perfecto. Dado que tcindex_partial_destroy_work() es la funci\u00f3n de destrucci\u00f3n del antiguo tcindex_data, necesitamos liberar un hash perfecto para evitar p\u00e9rdidas de memoria." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/8d7924ce85bae64e7a67c366c7c50840f49f3a62", diff --git a/CVE-2021/CVE-2021-473xx/CVE-2021-47313.json b/CVE-2021/CVE-2021-473xx/CVE-2021-47313.json index 723d233a9f3..09946ef2ba5 100644 --- a/CVE-2021/CVE-2021-473xx/CVE-2021-47313.json +++ b/CVE-2021/CVE-2021-473xx/CVE-2021-47313.json @@ -2,8 +2,9 @@ "id": "CVE-2021-47313", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:18.727", - "lastModified": "2024-05-21T16:54:26.047", + "lastModified": "2024-07-03T01:37:36.997", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: cpufreq: CPPC: arregla potencial memleak en cppc_cpufreq_cpu_init Es un ejemplo cl\u00e1sico de memleak, asignamos algo, fallamos y nunca liberamos los recursos. Aseg\u00farese de liberar todos los recursos en fallos de pol\u00edtica ->init()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/b775383355755885b19d2acef977f1ca132e80a3", diff --git a/CVE-2021/CVE-2021-473xx/CVE-2021-47323.json b/CVE-2021/CVE-2021-473xx/CVE-2021-47323.json index 0913f7f1813..ff246bf6bd9 100644 --- a/CVE-2021/CVE-2021-473xx/CVE-2021-47323.json +++ b/CVE-2021/CVE-2021-473xx/CVE-2021-47323.json @@ -2,8 +2,9 @@ "id": "CVE-2021-47323", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:19.467", - "lastModified": "2024-05-21T16:54:26.047", + "lastModified": "2024-07-03T01:37:38.240", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: watchdog: sc520_wdt: corrige posible use after free en wdt_turnoff(). La ruta de eliminaci\u00f3n de este m\u00f3dulo llama a del_timer(). Sin embargo, esa funci\u00f3n no espera hasta que finalice el controlador del temporizador. Esto significa que es posible que el controlador del temporizador a\u00fan est\u00e9 ejecut\u00e1ndose despu\u00e9s de que haya finalizado la funci\u00f3n de eliminaci\u00f3n del controlador, lo que dar\u00eda como resultado un use after free. Para solucionarlo, llame a del_timer_sync(), lo que garantiza que el controlador del temporizador haya finalizado y no pueda reprogramarse." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0015581a79bbf8e521f85dddb7d3e4a66b9f51d4", diff --git a/CVE-2021/CVE-2021-473xx/CVE-2021-47324.json b/CVE-2021/CVE-2021-473xx/CVE-2021-47324.json index 5a55ae755bd..f5ffd10e897 100644 --- a/CVE-2021/CVE-2021-473xx/CVE-2021-47324.json +++ b/CVE-2021/CVE-2021-473xx/CVE-2021-47324.json @@ -2,8 +2,9 @@ "id": "CVE-2021-47324", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:19.543", - "lastModified": "2024-05-21T16:54:26.047", + "lastModified": "2024-07-03T01:37:39.060", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: perro guardi\u00e1n: soluciona el posible use after free en wdt_startup(). La ruta de eliminaci\u00f3n de este m\u00f3dulo llama a del_timer(). Sin embargo, esa funci\u00f3n no espera hasta que finalice el controlador del temporizador. Esto significa que es posible que el controlador del temporizador a\u00fan est\u00e9 ejecut\u00e1ndose despu\u00e9s de que haya finalizado la funci\u00f3n de eliminaci\u00f3n del controlador, lo que dar\u00eda como resultado un use after free. Para solucionarlo, llame a del_timer_sync(), lo que garantiza que el controlador del temporizador haya finalizado y no pueda reprogramarse." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0ac50a76cf3cd63db000648b3b19f3f98b8aaa76", diff --git a/CVE-2021/CVE-2021-473xx/CVE-2021-47327.json b/CVE-2021/CVE-2021-473xx/CVE-2021-47327.json index 8afb1abbdbf..53fe4053b13 100644 --- a/CVE-2021/CVE-2021-473xx/CVE-2021-47327.json +++ b/CVE-2021/CVE-2021-473xx/CVE-2021-47327.json @@ -2,8 +2,9 @@ "id": "CVE-2021-47327", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:19.757", - "lastModified": "2024-05-21T16:54:26.047", + "lastModified": "2024-07-03T01:37:39.993", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iommu/arm-smmu: corrige la fuga de refcount de arm_smmu_device cuando falla arm_smmu_rpm_get arm_smmu_rpm_get() invoca pm_runtime_get_sync(), lo que aumenta el refcount de \"smmu\" aunque el valor de retorno sea menor que 0. El problema del conteo de referencias ocurre en algunas rutas de manejo de errores de arm_smmu_rpm_get() en sus funciones de llamada. Cuando arm_smmu_rpm_get() falla, las funciones de la persona que llama se olvidan de disminuir el recuento de \"smmu\" aumentado en arm_smmu_rpm_get(), lo que provoca una fuga de recuento. Solucione este problema llamando a pm_runtime_resume_and_get() en lugar de pm_runtime_get_sync() en arm_smmu_rpm_get(), lo que puede mantener el recuento equilibrado en caso de fallo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-911" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1adf30f198c26539a62d761e45af72cde570413d", diff --git a/CVE-2021/CVE-2021-473xx/CVE-2021-47329.json b/CVE-2021/CVE-2021-473xx/CVE-2021-47329.json index 0a4a6f146b9..7a271b2c832 100644 --- a/CVE-2021/CVE-2021-473xx/CVE-2021-47329.json +++ b/CVE-2021/CVE-2021-473xx/CVE-2021-47329.json @@ -2,8 +2,9 @@ "id": "CVE-2021-47329", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:19.910", - "lastModified": "2024-05-21T16:54:26.047", + "lastModified": "2024-07-03T01:37:40.793", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: megaraid_sas: corrige la fuga de recursos en caso de fallo de la sonda El controlador no limpia todos los recursos asignados correctamente cuando la funci\u00f3n scsi_add_host(), megasas_start_aen() falla durante el dispositivo PCI Investigacion. Limpia todos esos recursos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/04b6b9ea80906e3b41ff120b45db31768947cf72", diff --git a/CVE-2021/CVE-2021-473xx/CVE-2021-47348.json b/CVE-2021/CVE-2021-473xx/CVE-2021-47348.json index 8c36553a68d..ca5e31d033a 100644 --- a/CVE-2021/CVE-2021-473xx/CVE-2021-47348.json +++ b/CVE-2021/CVE-2021-473xx/CVE-2021-47348.json @@ -2,8 +2,9 @@ "id": "CVE-2021-47348", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:21.350", - "lastModified": "2024-05-21T16:54:26.047", + "lastModified": "2024-07-03T01:37:42.580", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/amd/display: evita la sobrelectura y la corrupci\u00f3n de HDCP. En lugar de leer los 5 bytes deseados del campo de destino real, el c\u00f3digo le\u00eda 8. Esto podr\u00eda resultar en un archivo da\u00f1ado. valor si los 3 bytes finales fueran distintos de cero, por lo tanto, utilice un b\u00fafer de rebote de tama\u00f1o adecuado e inicializado en cero, y lea solo 5 bytes antes de convertir a u64." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/06888d571b513cbfc0b41949948def6cb81021b2", diff --git a/CVE-2021/CVE-2021-473xx/CVE-2021-47354.json b/CVE-2021/CVE-2021-473xx/CVE-2021-47354.json index 6f8a89ecde9..7a022b512c3 100644 --- a/CVE-2021/CVE-2021-473xx/CVE-2021-47354.json +++ b/CVE-2021/CVE-2021-473xx/CVE-2021-47354.json @@ -2,8 +2,9 @@ "id": "CVE-2021-47354", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:21.767", - "lastModified": "2024-05-21T16:54:26.047", + "lastModified": "2024-07-03T01:37:43.623", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/sched: evite la corrupci\u00f3n de datos. Espere a que se completen todas las dependencias de un trabajo antes de eliminarlo para evitar la corrupci\u00f3n de datos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0687411e2a8858262de2fc4a1d576016fd77292e", diff --git a/CVE-2021/CVE-2021-473xx/CVE-2021-47356.json b/CVE-2021/CVE-2021-473xx/CVE-2021-47356.json index a54ac793459..4b158285426 100644 --- a/CVE-2021/CVE-2021-473xx/CVE-2021-47356.json +++ b/CVE-2021/CVE-2021-473xx/CVE-2021-47356.json @@ -2,8 +2,9 @@ "id": "CVE-2021-47356", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:21.920", - "lastModified": "2024-05-21T16:54:26.047", + "lastModified": "2024-07-03T01:37:44.487", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mISDN: corrige posible use after free en HFC_cleanup(). La ruta de eliminaci\u00f3n de este m\u00f3dulo llama a del_timer(). Sin embargo, esa funci\u00f3n no espera hasta que finalice el controlador del temporizador. Esto significa que es posible que el controlador del temporizador a\u00fan est\u00e9 ejecut\u00e1ndose despu\u00e9s de que haya finalizado la funci\u00f3n de eliminaci\u00f3n del controlador, lo que dar\u00eda como resultado un use after free. Para solucionarlo, llame a del_timer_sync(), lo que garantiza que el controlador del temporizador haya finalizado y no pueda reprogramarse." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/009fc857c5f6fda81f2f7dd851b2d54193a8e733", diff --git a/CVE-2021/CVE-2021-473xx/CVE-2021-47367.json b/CVE-2021/CVE-2021-473xx/CVE-2021-47367.json index 4f1c2146c09..595ce94a973 100644 --- a/CVE-2021/CVE-2021-473xx/CVE-2021-47367.json +++ b/CVE-2021/CVE-2021-473xx/CVE-2021-47367.json @@ -2,8 +2,9 @@ "id": "CVE-2021-47367", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:22.700", - "lastModified": "2024-05-21T16:54:26.047", + "lastModified": "2024-07-03T01:37:45.997", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: virtio-net: corrige p\u00e1ginas con fugas al compilar skb en modo grande. Intentamos usar build_skb() si tuvi\u00e9ramos suficiente espacio de adaptaci\u00f3n. Pero nos olvidamos de liberar las p\u00e1ginas no utilizadas encadenadas v\u00eda privada en modo grande, lo que filtrar\u00e1 p\u00e1ginas. Para solucionar este problema, libere las p\u00e1ginas despu\u00e9s de compilar el skb en modo grande." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/afd92d82c9d715fb97565408755acad81573591a", diff --git a/CVE-2021/CVE-2021-473xx/CVE-2021-47368.json b/CVE-2021/CVE-2021-473xx/CVE-2021-47368.json index 145407b58e5..7a4474b8586 100644 --- a/CVE-2021/CVE-2021-473xx/CVE-2021-47368.json +++ b/CVE-2021/CVE-2021-473xx/CVE-2021-47368.json @@ -2,8 +2,9 @@ "id": "CVE-2021-47368", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:22.773", - "lastModified": "2024-05-21T16:54:26.047", + "lastModified": "2024-07-03T01:37:46.787", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: enetc: corrige el acceso ilegal al leer affinity_hint irq_set_affinity_hit() almacena una referencia al par\u00e1metro cpumask_t en el descriptor irq, y se puede acceder a esa referencia m\u00e1s tarde desde irq_affinity_hint_proc_show(). Dado que el par\u00e1metro cpu_mask pasado a irq_set_affinity_hit() solo tiene almacenamiento temporal (est\u00e1 en la memoria de la pila), los accesos posteriores a \u00e9l son ilegales. Por lo tanto, las lecturas del archivo procfs affinity_hint correspondiente pueden dar como resultado una solicitud de paginaci\u00f3n. El problema lo soluciona el asistente get_cpu_mask(), que proporciona un almacenamiento permanente para el par\u00e1metro cpumask_t." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/4c4c3052911b577920353a7646e4883d5da40c28", diff --git a/CVE-2021/CVE-2021-473xx/CVE-2021-47369.json b/CVE-2021/CVE-2021-473xx/CVE-2021-47369.json index b1463f68829..8dbfc0c0fac 100644 --- a/CVE-2021/CVE-2021-473xx/CVE-2021-47369.json +++ b/CVE-2021/CVE-2021-473xx/CVE-2021-47369.json @@ -2,8 +2,9 @@ "id": "CVE-2021-47369", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:22.853", - "lastModified": "2024-05-21T16:54:26.047", + "lastModified": "2024-07-03T01:37:47.597", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: s390/qeth: corrige NULL deref en qeth_clear_working_pool_list(). Cuando qeth_set_online() llama a qeth_clear_working_pool_list() para retroceder despu\u00e9s de una salida de error de qeth_hardsetup_card(), corremos el riesgo de acceder a la tarjeta ->qdio.in_q antes de que qeth_alloc_qdio_queues() lo asignara mediante qeth_mpc_initialize(). qeth_clear_working_pool_list() luego elimina la referencia a NULL y, al escribir en queue->bufs[i].pool_entry garabatea por todo el n\u00facleo bajo de la CPU. Lo que resulta en un bloqueo cuando esas \u00e1reas de n\u00facleo bajo se usan a continuaci\u00f3n (por ejemplo, en la siguiente interrupci\u00f3n de verificaci\u00f3n de la m\u00e1quina). Este escenario suele ocurrir cuando el dispositivo se configura en l\u00ednea por primera vez y sus colas a\u00fan no est\u00e1n asignadas. Un error de IO temprano o ciertas configuraciones err\u00f3neas (por ejemplo, modo de transporte no coincidente, n\u00famero de puerto incorrecto) hacen que salgamos del error qeth_hardsetup_card() con card->qdio.in_q todav\u00eda siendo NULL. Solucionarlo comprobando que el puntero sea NULL antes de acceder a \u00e9l. Tenga en cuenta que tambi\u00e9n tenemos rutas (raras) dentro de qeth_mpc_initialize() donde un cambio de configuraci\u00f3n puede hacer que liberemos las colas existentes, esperando que el c\u00f3digo posterior las asigne nuevamente. Si luego cometemos un error antes de que ocurra la reasignaci\u00f3n, ocurre el mismo error. Analizado por: Heiko Carstens " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/248f064af222a1f97ee02c84a98013dfbccad386", diff --git a/CVE-2021/CVE-2021-473xx/CVE-2021-47371.json b/CVE-2021/CVE-2021-473xx/CVE-2021-47371.json index 0557dfbae9f..94e6e9dfee2 100644 --- a/CVE-2021/CVE-2021-473xx/CVE-2021-47371.json +++ b/CVE-2021/CVE-2021-473xx/CVE-2021-47371.json @@ -2,8 +2,9 @@ "id": "CVE-2021-47371", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:23.000", - "lastModified": "2024-05-21T16:54:26.047", + "lastModified": "2024-07-03T01:37:48.470", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nexthop: corrige p\u00e9rdidas de memoria en los oyentes de la cadena de notificaciones de nexthop syzkaller descubri\u00f3 p\u00e9rdidas de memoria [1] que se pueden reducir a los siguientes comandos: # ip nexthop add id 1 blackhole # devlink dev reload pci /0000:06:00.0 Como parte del flujo de recarga, mlxsw cancelar\u00e1 el registro de sus netdevs y luego cancelar\u00e1 el registro de la cadena de notificaci\u00f3n de nexthop. Antes de cancelar el registro de la cadena de notificaciones, mlxsw recibir\u00e1 notificaciones de eliminaci\u00f3n de objetos de nexthop utilizando netdevs registrados por mlxsw o sus superiores. mlxsw no recibir\u00e1 notificaciones de nexthops que utilicen netdevs que no est\u00e9n desmantelados como parte del flujo de recarga. Por ejemplo, el blackhole nexthop anterior que utiliza internamente el loopback netdev como su dispositivo nexthop. Una forma de solucionar este problema es hacer que los oyentes vac\u00eden sus tablas de nexthop despu\u00e9s de darse de baja de la cadena de notificaciones. Esto es propenso a errores, como lo demuestra este parche, y tampoco es sim\u00e9trico con la ruta de registro donde un oyente recibe un volcado de todos los nexthops existentes. Por lo tanto, solucione este problema reproduciendo las notificaciones de eliminaci\u00f3n del oyente que se est\u00e1 cancelando el registro. Esto es sim\u00e9trico a la ruta de registro y tambi\u00e9n consistente con la cadena de notificaci\u00f3n de netdev. Lo anterior significa que unregister_nexthop_notifier(), al igual que Register_nexthop_notifier(), tendr\u00e1 que tomar RTNL para poder iterar sobre los nexthops existentes y que cualquier persona que llame a la funci\u00f3n no puede mantener RTNL. Esto es cierto para mlxsw y netdevsim, pero no para el controlador VXLAN. Para evitar un punto muerto, cambie este \u00faltimo para cancelar el registro de su oyente nexthop sin mantener presionado RTNL, haci\u00e9ndolo sim\u00e9trico a la ruta de registro. [1] objeto sin referencia 0xffff88806173d600 (tama\u00f1o 512): comm \"syz-executor.0\", pid 1290, jiffies 4295583142 (edad 143.507s) volcado hexadecimal (primeros 32 bytes): 41 9d 1e 60 80 88 ff ff 08 d6 73 1 80 88 ff ff A..`......sa.... 08 d6 73 61 80 88 ff ff 01 00 00 00 00 00 00 00 ..sa............ backtrace: [] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [en l\u00ednea] [] slab_post_alloc_hook+0x96/0x490 mm/slab.h:522 [] mm/slub.c:3206 [en l\u00ednea] [] slab_alloc mm/slub.c:3214 [en l\u00ednea] [] kmem_cache_alloc_trace+0x163/0x370 mm/slub.c:3231 [] kmalloc include/linux/slab.h: 591 [en l\u00ednea] [] kzalloc include/linux/slab.h:721 [en l\u00ednea] [] mlxsw_sp_nexthop_obj_group_create drivers/net/ethernet/mellanox/mlxsw/spectrum_router.c:4918 [ ] mlxsw_sp_nexthop_obj_new drivers/net/ethernet/mellanox/mlxsw/spectrum_router.c:5054 [en l\u00ednea] [] mlxsw_sp_nexthop_obj_event+0x59a/0x2910 drivers/net/ethernet/mellanox/mlxsw/spectrum_router.c:523 9 [] notifier_call_chain+0xbd/0x210 kernel/notifier.c:83 [] blocking_notifier_call_chain kernel/notifier.c:318 [en l\u00ednea] [] blocking_notifier_call_chain+0x72/0xa0 kernel/notifier.c:306 [] call_nexthop_notifiers+0x156/0x310 net/ipv4/nexthop.c:244 [] insert_nexthop net/ipv4/nexthop.c:2336 [en l\u00ednea] [] nexthop_add net/ipv4/nexthop.c:2644 [en l\u00ednea] [] rtm_new_nexthop+0x14e8/0x4d10 net/ipv4/nexthop.c:2913 [] rtnetlink_rcv_msg+0x448/0xbf0 net/core/rtnetlink.c:5572 [ ] netlink_rcv_skb+0x173/0x480 neto/ netlink/af_netlink.c: 2504 [] rtnetlink_rcv+0x22/0x30 net/core/rtnetlink.c: 5590 [] netlink_unicast_kernel net/netlink/af_fffffff.c: 1314 [faff. 6069de>] netlink_unicast +0x5ae/0x7f0 net/netlink/af_netlink.c:1340 [] --- truncado--" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3106a0847525befe3e22fc723909d1b21eb0d520", diff --git a/CVE-2021/CVE-2021-473xx/CVE-2021-47378.json b/CVE-2021/CVE-2021-473xx/CVE-2021-47378.json index 2c9d8e1eec3..80c87b59ef6 100644 --- a/CVE-2021/CVE-2021-473xx/CVE-2021-47378.json +++ b/CVE-2021/CVE-2021-473xx/CVE-2021-47378.json @@ -2,8 +2,9 @@ "id": "CVE-2021-47378", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:23.527", - "lastModified": "2024-05-21T16:54:26.047", + "lastModified": "2024-07-03T01:37:49.463", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nvme-rdma: destruye cm id antes de destruir qp para evitar su use after free. Siempre debemos destruir cm_id antes de destruir qp para evitar que se produzca un evento cma despu\u00e9s de que se destruya qp, lo que puede llevar a use after free. En el flujo de error de establecimiento de conexi\u00f3n RDMA, no destruya qp en el controlador de eventos cm. Simplemente informe cm_error al nivel superior, qp se destruir\u00e1 en nvme_rdma_alloc_queue() despu\u00e9s de destruir cm id." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/9817d763dbe15327b9b3ff4404fa6f27f927e744", diff --git a/CVE-2021/CVE-2021-473xx/CVE-2021-47389.json b/CVE-2021/CVE-2021-473xx/CVE-2021-47389.json index e21ca791781..615efc59397 100644 --- a/CVE-2021/CVE-2021-473xx/CVE-2021-47389.json +++ b/CVE-2021/CVE-2021-473xx/CVE-2021-47389.json @@ -2,8 +2,9 @@ "id": "CVE-2021-47389", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:24.330", - "lastModified": "2024-05-21T16:54:26.047", + "lastModified": "2024-07-03T01:37:51.067", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: KVM: SVM: corrige la falta de sev_decommission en sev_receive_start DESCOMMISSION el contexto SEV actual si falla la vinculaci\u00f3n de un ASID despu\u00e9s de RECEIVE_START. Seg\u00fan la API SEV de AMD, RECEIVE_START genera un nuevo contexto de invitado y, por lo tanto, debe combinarse con DECOMMISSION: el comando RECEIVE_START es el \u00fanico comando, adem\u00e1s del comando LAUNCH_START, que genera un nuevo contexto de invitado y un identificador de invitado. La DESCOMISI\u00d3N faltante puede provocar fallas de inicio de SEV posteriores, ya que el firmware pierde memoria y es posible que no pueda asignar m\u00e1s contextos de invitados de SEV en el futuro. Tenga en cuenta que LAUNCH_START sufri\u00f3 el mismo error, pero se solucion\u00f3 previamente mediante la confirmaci\u00f3n 934002cd660b (\"KVM: SVM: llame a SEV Guest Decommission si falla el enlace ASID\")." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/efd7866e114dcb44f86d151e843f8276b7efbc67", diff --git a/CVE-2021/CVE-2021-474xx/CVE-2021-47403.json b/CVE-2021/CVE-2021-474xx/CVE-2021-47403.json index b8029822132..1f1caa81a66 100644 --- a/CVE-2021/CVE-2021-474xx/CVE-2021-47403.json +++ b/CVE-2021/CVE-2021-474xx/CVE-2021-47403.json @@ -2,8 +2,9 @@ "id": "CVE-2021-47403", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:25.803", - "lastModified": "2024-05-21T16:54:26.047", + "lastModified": "2024-07-03T01:37:52.627", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ipack: ipoctal: reparar fuga de referencia del m\u00f3dulo. Se tom\u00f3 una referencia al m\u00f3dulo portador en cada apertura, pero solo se public\u00f3 una vez cuando se elimin\u00f3 la referencia final a la estructura tty. Solucione este problema tomando la referencia del m\u00f3dulo e inicializando los datos del controlador tty al instalar el tty." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/31398849b84ebae0d43a1cf379cb9895597f221a", diff --git a/CVE-2021/CVE-2021-474xx/CVE-2021-47441.json b/CVE-2021/CVE-2021-474xx/CVE-2021-47441.json index 398e89a2668..d35015c21bf 100644 --- a/CVE-2021/CVE-2021-474xx/CVE-2021-47441.json +++ b/CVE-2021/CVE-2021-474xx/CVE-2021-47441.json @@ -2,8 +2,9 @@ "id": "CVE-2021-47441", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-22T07:15:09.340", - "lastModified": "2024-05-22T12:46:53.887", + "lastModified": "2024-07-03T01:37:55.917", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mlxsw: Thermal: corrige accesos a memoria fuera de los l\u00edmites Actualmente, mlxsw permite establecer estados de enfriamiento por encima del estado de enfriamiento m\u00e1ximo admitido por el controlador: # cat /sys/class/ Thermal/thermal_zone2/cdev0/type mlxsw_fan # cat /sys/class/thermal/thermal_zone2/cdev0/max_state 10 # echo 18 > /sys/class/thermal/thermal_zone2/cdev0/cur_state # echo $? 0 Esto da como resultado accesos a la memoria fuera de los l\u00edmites cuando las estad\u00edsticas de transici\u00f3n de estado t\u00e9rmico est\u00e1n habilitadas (CONFIG_THERMAL_STATISTICS=y), ya que se accede a la tabla de transici\u00f3n con un \u00edndice (estado) demasiado grande [1]. Seg\u00fan el mantenedor t\u00e9rmico, es responsabilidad del conductor rechazar este tipo de operaciones [2]. Por lo tanto, devolver\u00e1 un error cuando el estado que se establecer\u00e1 exceda el estado de enfriamiento m\u00e1ximo admitido por el controlador. Para evitar el c\u00f3digo inactivo, como lo sugiere el mantenedor t\u00e9rmico [3], revierta parcialmente el commit a421ce088ac8 (\"mlxsw: core: Extend Cooling Device with Cooling Levels\") que intent\u00f3 interpretar estos estados de enfriamiento no v\u00e1lidos (por encima del m\u00e1ximo) de una manera especial. . La matriz de niveles de enfriamiento no se elimina para evitar que los ventiladores bajen del 20 % de PWM, lo que provocar\u00eda que se atasquen en el 0 % de PWM. [1] ERROR: KASAN: losa fuera de los l\u00edmites en Thermal_cooling_device_stats_update+0x271/0x290 Lectura de tama\u00f1o 4 en la direcci\u00f3n ffff8881052f7bf8 por tarea kworker/0:0/5 CPU: 0 PID: 5 Comm: kworker/0:0 Not tainted 5.15.0-rc3-custom-45935-gce1adf704b14 #122 Nombre del hardware: Mellanox Technologies Ltd. \"MSN2410-CB2FO\"/\"SA000874\", BIOS 4.6.5 08/03/2016 Cola de trabajo: events_freezable_power_ Thermal_zone_device_check Seguimiento de llamadas: dump_stack_lvl+0x8b /0xb3 print_address_description.constprop.0+0x1f/0x140 kasan_report.cold+0x7f/0x11b Thermal_cooling_device_stats_update+0x271/0x290 __thermal_cdev_update+0x15e/0x4e0 Thermal_cdev_update+0x9f/0xe0 70/0xee0 actualizaci\u00f3n_dispositivo_zona_termal+0x3f6/0xdf0 proceso_one_work+0xa42/0x1770 hilo_trabajador+ 0x62f/0x13e0 kthread+0x3ee/0x4e0 ret_from_fork+0x1f/0x30 Asignado por tarea 1: kasan_save_stack+0x1b/0x40 __kasan_kmalloc+0x7c/0x90 Thermal_cooling_device_setup_sysfs+0x153/0x2c0 _device_register.part.0+0x25b/0x9c0 Thermal_cooling_device_register+0xb3/0x100 mlxsw_thermal_init+0x5c5 /0x7e0 __mlxsw_core_bus_device_register+0xcb3/0x19c0 mlxsw_core_bus_device_register+0x56/0xb0 mlxsw_pci_probe+0x54f/0x710 local_pci_probe+0xc6/0x170 pci_device_probe+0x2b2/0x4d0 very_probe+ 0x293/0xd10 __driver_probe_device+0x2af/0x440 driver_probe_device+0x51/0x1e0 __driver_attach+0x21b/0x530 bus_for_each_dev+0x14c /0x1d0 bus_add_driver+0x3ac/0x650 driver_register+0x241/0x3d0 mlxsw_sp_module_init+0xa2/0x174 do_one_initcall+0xee/0x5f0 kernel_init_freeable+0x45a/0x4de kernel_init+0x1f/0x210 f/0x30 La direcci\u00f3n con errores pertenece al objeto en ffff8881052f7800 que pertenece al cach\u00e9 kmalloc-1k de tama\u00f1o 1024 La direcci\u00f3n con errores se encuentra 1016 bytes dentro de la regi\u00f3n de 1024 bytes [ffff8881052f7800, ffff8881052f7c00) La direcci\u00f3n con errores pertenece a la p\u00e1gina: p\u00e1gina:0000000052355272 refcount:1 mapcount:0 mapeo:0000000000000000 \u00edndice :0x0 pfn: 0x1052f0 cabeza:0000000052355272 orden:3 compuesto_mapcount:0 compuesto_pincount:0 banderas: 0x200000000010200(slab|head|node=0|zone=2) raw: 0200000000010200 ffffea0005034800 00000003000 00003 ffff888100041dc0 raw: 0000000000000000 0000000000100010 00000001ffffffff 00000000000000000 p\u00e1gina volcada porque: kasan: se detect\u00f3 mal acceso Estado de la memoria alrededor de la direcci\u00f3n del error: ffff8881052f7a80: 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc fc ffff8881052f7b00: fc fc fc fc fc fc fc fc fc fc fc fc >ffff8881052f7 b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ^ ffff8881052f7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ---truncado---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/332fdf951df8b870e3da86b122ae304e2aabe88c", diff --git a/CVE-2021/CVE-2021-474xx/CVE-2021-47456.json b/CVE-2021/CVE-2021-474xx/CVE-2021-47456.json index c0cc8bac09e..356b75f22fa 100644 --- a/CVE-2021/CVE-2021-474xx/CVE-2021-47456.json +++ b/CVE-2021/CVE-2021-474xx/CVE-2021-47456.json @@ -2,8 +2,9 @@ "id": "CVE-2021-47456", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-22T07:15:10.627", - "lastModified": "2024-05-22T12:46:53.887", + "lastModified": "2024-07-03T01:37:57.757", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,46 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: can: pico_pci: pico_pci_remove(): arreglar UAF Cuando se elimina el m\u00f3dulo peek_pci, hacer referencia a 'chan' nuevamente despu\u00e9s de liberar 'dev' causar\u00e1 UAF. Solucione este problema lanzando 'dev' m\u00e1s tarde. El siguiente registro lo revela: [35.961814] ERROR: KASAN: uso despu\u00e9s de liberar en pico_pci_remove+0x16f/0x270 [peak_pci] [35.963414] Lectura de tama\u00f1o 8 en addr ffff888136998ee8 por tarea modprobe/5537 [35.965513] Seguimiento de llamadas: [3 5.965718 ] dump_stack_lvl+0xa8/0xd1 [35.966028] print_address_description+0x87/0x3b0 [35.966420] kasan_report+0x172/0x1c0 [35.966725]? pico_pci_remove+0x16f/0x270 [pico_pci] [35.967137]? trace_irq_enable_rcuidle+0x10/0x170 [35.967529]? pico_pci_remove+0x16f/0x270 [pico_pci] [ 35.967945 ] __asan_report_load8_noabort+0x14/0x20 [ 35.968346 ] pico_pci_remove+0x16f/0x270 [pico_pci] [ 35.968752 ] ve+0xa9/0x250" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + }, + { + "lang": "en", + "value": "CWE-467" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0e5afdc2315b0737edcf55bede4ee1640d2d464d", diff --git a/CVE-2021/CVE-2021-474xx/CVE-2021-47464.json b/CVE-2021/CVE-2021-474xx/CVE-2021-47464.json index 82efc2d0280..2abd2f0daeb 100644 --- a/CVE-2021/CVE-2021-474xx/CVE-2021-47464.json +++ b/CVE-2021/CVE-2021-474xx/CVE-2021-47464.json @@ -2,8 +2,9 @@ "id": "CVE-2021-47464", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-22T07:15:11.287", - "lastModified": "2024-05-22T12:46:53.887", + "lastModified": "2024-07-03T01:37:59.053", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: auditor\u00eda: corrige una posible desreferencia de puntero nulo en audit_filter_rules. Corrige una posible desreferencia de puntero nulo en audit_filter_rules. Error audit_filter_rules(): previamente asumimos que 'ctx' podr\u00eda ser nulo" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/16802fa4c33eb1a8efb23f1e93365190e4047d05", diff --git a/CVE-2021/CVE-2021-474xx/CVE-2021-47476.json b/CVE-2021/CVE-2021-474xx/CVE-2021-47476.json index 2897bbcecb5..b18e6dd8c05 100644 --- a/CVE-2021/CVE-2021-474xx/CVE-2021-47476.json +++ b/CVE-2021/CVE-2021-474xx/CVE-2021-47476.json @@ -2,8 +2,9 @@ "id": "CVE-2021-47476", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-22T09:15:09.470", - "lastModified": "2024-05-22T12:46:53.887", + "lastModified": "2024-07-03T01:38:00.540", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/4a9d43cb5d5f39fa39fc1da438517004cc95f7ea", diff --git a/CVE-2021/CVE-2021-474xx/CVE-2021-47482.json b/CVE-2021/CVE-2021-474xx/CVE-2021-47482.json index 5eed2bed374..3bac0a01050 100644 --- a/CVE-2021/CVE-2021-474xx/CVE-2021-47482.json +++ b/CVE-2021/CVE-2021-474xx/CVE-2021-47482.json @@ -2,8 +2,9 @@ "id": "CVE-2021-47482", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-22T09:15:10.150", - "lastModified": "2024-05-22T12:46:53.887", + "lastModified": "2024-07-03T01:38:01.587", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: batman-adv: correcci\u00f3n de manejo de errores Syzbot inform\u00f3 advertencia ODEBUG en batadv_nc_mesh_free(). El problema estaba en el manejo incorrecto de errores en batadv_mesh_init(). Antes de este parche, batadv_mesh_init() llamaba a batadv_mesh_free() en caso de que fallara alguna llamada a batadv_*_init(). Este enfoque puede funcionar bien cuando hay alg\u00fan tipo de indicador que puede indicar qu\u00e9 partes de batadv est\u00e1n inicializadas; pero no hay ninguno. Todo lo escrito anteriormente conduce a la sanitizaci\u00f3n de campos no inicializados. Incluso si ocultamos la advertencia ODEBUG inicializando bat_priv->nc.work, syzbot pudo presionar GPF en batadv_nc_purge_paths(), porque el puntero hash todav\u00eda es NULL. [1] Para corregir estos errores podemos desenredar las llamadas batadv_*_init() una por una. Es un buen enfoque por 2 razones: 1) Corrige errores en la ruta de manejo de errores 2) Mejora el rendimiento, ya que no llamaremos a funciones batadv_*_free() innecesarias. Entonces, este parche hace que batadv_*_init() limpie toda la memoria asignada antes de regresar con un error de no llamada correspondiente a batadv_*_free() y c\u00f3digos abiertos batadv_mesh_free() con el orden adecuado para evitar tocar campos no inicializados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-544" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/07533f1a673ce1126d0a72ef1e4b5eaaa3dd6d20", diff --git a/CVE-2021/CVE-2021-474xx/CVE-2021-47486.json b/CVE-2021/CVE-2021-474xx/CVE-2021-47486.json index 8a3dcbdd0e3..c8a71426c01 100644 --- a/CVE-2021/CVE-2021-474xx/CVE-2021-47486.json +++ b/CVE-2021/CVE-2021-474xx/CVE-2021-47486.json @@ -2,8 +2,9 @@ "id": "CVE-2021-47486", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-22T09:15:10.573", - "lastModified": "2024-05-22T12:46:53.887", + "lastModified": "2024-07-03T01:38:02.550", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: riscv, bpf: corrige una posible desreferencia NULL La funci\u00f3n bpf_jit_binary_free() requiere un argumento que no sea NULL. Cuando el JIT BPF de RISC-V no logra converger en los pasos NR_JIT_ITERATION, jit_data->header ser\u00e1 NULL, lo que desencadena una desreferencia NULL. Evite esto verificando el argumento antes de llamar a la funci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/27de809a3d83a6199664479ebb19712533d6fd9b", diff --git a/CVE-2021/CVE-2021-475xx/CVE-2021-47503.json b/CVE-2021/CVE-2021-475xx/CVE-2021-47503.json index c0f0c6af7f9..09c9ca98a32 100644 --- a/CVE-2021/CVE-2021-475xx/CVE-2021-47503.json +++ b/CVE-2021/CVE-2021-475xx/CVE-2021-47503.json @@ -2,8 +2,9 @@ "id": "CVE-2021-47503", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-24T15:15:10.567", - "lastModified": "2024-05-24T18:09:20.027", + "lastModified": "2024-07-03T01:38:04.253", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: pm80xx: No llamar a scsi_remove_host() en pm8001_alloc() Llamar a scsi_remove_host() antes de scsi_add_host() produce un bloqueo: ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 00000000000000108 RIP : 0010:device_del+0x63/0x440 Seguimiento de llamadas: device_unregister+0x17/0x60 scsi_remove_host+0xee/0x2a0 pm8001_pci_probe+0x6ef/0x1b90 [pm80xx] local_pci_probe+0x3f/0x90 No podemos llamar a scsi_remove_host() en pm8001_ alloc() porque scsi_add_host() no lo ha hecho sido llamado todav\u00eda en ese momento. \u00c1rbol de llamadas a funciones: pm8001_pci_probe() | `- pm8001_pci_alloc() | | | `- pm8001_alloc() | | | `- scsi_remove_host() | `- scsi_add_host()" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1e434d2687e8bc0b3cdc9dd093c0e9047c0b4add", diff --git a/CVE-2021/CVE-2021-475xx/CVE-2021-47519.json b/CVE-2021/CVE-2021-475xx/CVE-2021-47519.json index 894c0ee4ab2..876cd52a58e 100644 --- a/CVE-2021/CVE-2021-475xx/CVE-2021-47519.json +++ b/CVE-2021/CVE-2021-475xx/CVE-2021-47519.json @@ -2,8 +2,9 @@ "id": "CVE-2021-47519", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-24T15:15:13.783", - "lastModified": "2024-06-10T18:43:26.763", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:38:05.877", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-401" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-475xx/CVE-2021-47548.json b/CVE-2021/CVE-2021-475xx/CVE-2021-47548.json index 058d6987928..a37dc819f7e 100644 --- a/CVE-2021/CVE-2021-475xx/CVE-2021-47548.json +++ b/CVE-2021/CVE-2021-475xx/CVE-2021-47548.json @@ -2,8 +2,9 @@ "id": "CVE-2021-47548", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-24T15:15:19.693", - "lastModified": "2024-05-24T18:09:20.027", + "lastModified": "2024-07-03T01:38:08.723", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: ethernet: hisilicon: hns: hns_dsaf_misc: corrige un posible desbordamiento de matriz en hns_dsaf_ge_srst_by_port() La sentencia if: if (port >= DSAF_GE_NUM) return; limita el valor del puerto a menos de DSAF_GE_NUM (es decir, 8). Sin embargo, si el valor del puerto es 6 o 7, podr\u00eda producirse un desbordamiento de la matriz: port_rst_off = dsaf_dev->mac_cb[port]->port_rst_off; porque la longitud de dsaf_dev->mac_cb es DSAF_MAX_PORT_NUM (es decir, 6). Para solucionar este posible desbordamiento de la matriz, primero verificamos el puerto y si es mayor o igual a DSAF_MAX_PORT_NUM, la funci\u00f3n regresa." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/22519eff7df2d88adcc2568d86046ce1e2b52803", diff --git a/CVE-2021/CVE-2021-475xx/CVE-2021-47551.json b/CVE-2021/CVE-2021-475xx/CVE-2021-47551.json index 687a6b43c4a..9924f92f4a0 100644 --- a/CVE-2021/CVE-2021-475xx/CVE-2021-47551.json +++ b/CVE-2021/CVE-2021-475xx/CVE-2021-47551.json @@ -2,8 +2,9 @@ "id": "CVE-2021-47551", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-24T15:15:19.927", - "lastModified": "2024-05-24T18:09:20.027", + "lastModified": "2024-07-03T01:38:09.747", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/amd/amdkfd: corrige el p\u00e1nico del kernel cuando el reinicio falla y se activa nuevamente. En la configuraci\u00f3n SRIOV, el reinicio puede no lograr que asic vuelva a la normalidad, pero ya se ha llamado a detener cpsch, el No se llamar\u00e1 a start_cpsch ya que en este caso no hay ning\u00fan curr\u00edculum. Cuando el reinicio se activa nuevamente, el controlador debe evitar realizar la desinicializaci\u00f3n nuevamente." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.0, + "impactScore": 4.0 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/06c6f8f86ec243b89e52f0c3dc7062bcb9de74df", diff --git a/CVE-2021/CVE-2021-475xx/CVE-2021-47586.json b/CVE-2021/CVE-2021-475xx/CVE-2021-47586.json index 5b63dec7746..7b525879ac7 100644 --- a/CVE-2021/CVE-2021-475xx/CVE-2021-47586.json +++ b/CVE-2021/CVE-2021-475xx/CVE-2021-47586.json @@ -2,8 +2,9 @@ "id": "CVE-2021-47586", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T15:15:53.160", - "lastModified": "2024-06-20T12:43:25.663", + "lastModified": "2024-07-03T01:38:11.913", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0546b224cc7717cc8a2db076b0bb069a9c430794", diff --git a/CVE-2022/CVE-2022-05xx/CVE-2022-0555.json b/CVE-2022/CVE-2022-05xx/CVE-2022-0555.json index d49aed601fa..00b7cc6c0ea 100644 --- a/CVE-2022/CVE-2022-05xx/CVE-2022-0555.json +++ b/CVE-2022/CVE-2022-05xx/CVE-2022-0555.json @@ -2,8 +2,9 @@ "id": "CVE-2022-0555", "sourceIdentifier": "security@ubuntu.com", "published": "2024-06-03T19:15:09.063", - "lastModified": "2024-06-03T19:23:17.807", + "lastModified": "2024-07-03T01:38:14.863", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Subiquity muestra una frase de contrase\u00f1a de almacenamiento guiada en texto plano con permisos de lectura total" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-256" + } + ] + } + ], "references": [ { "url": "https://bugs.launchpad.net/subiquity/+bug/1960162", diff --git a/CVE-2022/CVE-2022-254xx/CVE-2022-25481.json b/CVE-2022/CVE-2022-254xx/CVE-2022-25481.json index 424b7eef2ec..8b460ce5f72 100644 --- a/CVE-2022/CVE-2022-254xx/CVE-2022-25481.json +++ b/CVE-2022/CVE-2022-254xx/CVE-2022-25481.json @@ -2,8 +2,16 @@ "id": "CVE-2022-25481", "sourceIdentifier": "cve@mitre.org", "published": "2022-03-21T00:15:07.713", - "lastModified": "2024-06-04T19:17:14.633", + "lastModified": "2024-07-03T01:38:19.293", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -35,6 +43,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 1.4 } ], "cvssMetricV2": [ @@ -73,6 +101,16 @@ "value": "CWE-668" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-261xx/CVE-2022-26125.json b/CVE-2022/CVE-2022-261xx/CVE-2022-26125.json index 3a38d1a02f7..7b01dadaa38 100644 --- a/CVE-2022/CVE-2022-261xx/CVE-2022-26125.json +++ b/CVE-2022/CVE-2022-261xx/CVE-2022-26125.json @@ -2,8 +2,9 @@ "id": "CVE-2022-26125", "sourceIdentifier": "secalert@redhat.com", "published": "2022-03-03T18:15:08.090", - "lastModified": "2024-04-28T07:15:06.517", + "lastModified": "2024-07-03T01:38:21.020", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ diff --git a/CVE-2022/CVE-2022-261xx/CVE-2022-26129.json b/CVE-2022/CVE-2022-261xx/CVE-2022-26129.json index 979ad468901..bbe652a5656 100644 --- a/CVE-2022/CVE-2022-261xx/CVE-2022-26129.json +++ b/CVE-2022/CVE-2022-261xx/CVE-2022-26129.json @@ -2,8 +2,9 @@ "id": "CVE-2022-26129", "sourceIdentifier": "secalert@redhat.com", "published": "2022-03-03T18:15:08.287", - "lastModified": "2024-04-28T07:15:08.080", + "lastModified": "2024-07-03T01:38:21.390", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ diff --git a/CVE-2022/CVE-2022-265xx/CVE-2022-26580.json b/CVE-2022/CVE-2022-265xx/CVE-2022-26580.json index b8bc3862d50..41fbda89f7e 100644 --- a/CVE-2022/CVE-2022-265xx/CVE-2022-26580.json +++ b/CVE-2022/CVE-2022-265xx/CVE-2022-26580.json @@ -2,8 +2,9 @@ "id": "CVE-2022-26580", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-16T22:15:08.873", - "lastModified": "2024-04-23T14:15:07.720", + "lastModified": "2024-07-03T01:38:21.617", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.4 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-265xx/CVE-2022-26581.json b/CVE-2022/CVE-2022-265xx/CVE-2022-26581.json index 1031317f03d..b19f7203f44 100644 --- a/CVE-2022/CVE-2022-265xx/CVE-2022-26581.json +++ b/CVE-2022/CVE-2022-265xx/CVE-2022-26581.json @@ -2,8 +2,9 @@ "id": "CVE-2022-26581", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-16T22:15:08.923", - "lastModified": "2024-04-23T14:15:07.827", + "lastModified": "2024-07-03T01:38:22.477", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:L", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 5.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.5, + "impactScore": 4.7 } ] }, diff --git a/CVE-2022/CVE-2022-265xx/CVE-2022-26582.json b/CVE-2022/CVE-2022-265xx/CVE-2022-26582.json index cd455c6273f..2ef76f8d2b2 100644 --- a/CVE-2022/CVE-2022-265xx/CVE-2022-26582.json +++ b/CVE-2022/CVE-2022-265xx/CVE-2022-26582.json @@ -2,8 +2,9 @@ "id": "CVE-2022-26582", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-16T22:15:08.973", - "lastModified": "2024-04-23T14:15:07.933", + "lastModified": "2024-07-03T01:38:22.713", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -52,6 +73,20 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + }, + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-279xx/CVE-2022-27948.json b/CVE-2022/CVE-2022-279xx/CVE-2022-27948.json index f75bcc09989..f602a1df8a8 100644 --- a/CVE-2022/CVE-2022-279xx/CVE-2022-27948.json +++ b/CVE-2022/CVE-2022-279xx/CVE-2022-27948.json @@ -2,8 +2,16 @@ "id": "CVE-2022-27948", "sourceIdentifier": "cve@mitre.org", "published": "2022-03-27T13:15:13.573", - "lastModified": "2024-06-04T19:17:15.463", + "lastModified": "2024-07-03T01:38:25.163", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -93,6 +101,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-286xx/CVE-2022-28657.json b/CVE-2022/CVE-2022-286xx/CVE-2022-28657.json index 8849b2b50ac..5898b79734f 100644 --- a/CVE-2022/CVE-2022-286xx/CVE-2022-28657.json +++ b/CVE-2022/CVE-2022-286xx/CVE-2022-28657.json @@ -2,8 +2,9 @@ "id": "CVE-2022-28657", "sourceIdentifier": "security@ubuntu.com", "published": "2024-06-04T22:15:10.087", - "lastModified": "2024-06-11T17:02:05.497", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:38:25.937", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-303xx/CVE-2022-30332.json b/CVE-2022/CVE-2022-303xx/CVE-2022-30332.json index 406db7911e8..7859c333676 100644 --- a/CVE-2022/CVE-2022-303xx/CVE-2022-30332.json +++ b/CVE-2022/CVE-2022-303xx/CVE-2022-30332.json @@ -2,8 +2,9 @@ "id": "CVE-2022-30332", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-10T21:15:11.520", - "lastModified": "2024-06-18T14:01:34.683", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:38:27.583", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -36,6 +37,26 @@ "exploitabilityScore": 3.9, "impactScore": 1.4 }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "cve@mitre.org", "type": "Secondary", @@ -68,6 +89,16 @@ "value": "CWE-203" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-30xx/CVE-2022-3038.json b/CVE-2022/CVE-2022-30xx/CVE-2022-3038.json index 19c1dc51063..b115f572fde 100644 --- a/CVE-2022/CVE-2022-30xx/CVE-2022-3038.json +++ b/CVE-2022/CVE-2022-30xx/CVE-2022-3038.json @@ -2,8 +2,8 @@ "id": "CVE-2022-3038", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2022-09-26T16:15:11.793", - "lastModified": "2024-06-28T13:40:50.297", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:38:43.383", + "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2023-03-30", "cisaActionDue": "2023-04-20", @@ -40,6 +40,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -53,6 +73,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-30xx/CVE-2022-3080.json b/CVE-2022/CVE-2022-30xx/CVE-2022-3080.json index 07c954a127a..a2cd37f8b4a 100644 --- a/CVE-2022/CVE-2022-30xx/CVE-2022-3080.json +++ b/CVE-2022/CVE-2022-30xx/CVE-2022-3080.json @@ -2,8 +2,9 @@ "id": "CVE-2022-3080", "sourceIdentifier": "security-officer@isc.org", "published": "2022-09-21T11:15:09.787", - "lastModified": "2024-06-21T19:15:23.630", + "lastModified": "2024-07-03T01:38:44.257", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -68,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-613" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-318xx/CVE-2022-31814.json b/CVE-2022/CVE-2022-318xx/CVE-2022-31814.json index 8aba67e4861..cfce9133bab 100644 --- a/CVE-2022/CVE-2022-318xx/CVE-2022-31814.json +++ b/CVE-2022/CVE-2022-318xx/CVE-2022-31814.json @@ -2,8 +2,9 @@ "id": "CVE-2022-31814", "sourceIdentifier": "cve@mitre.org", "published": "2022-09-05T16:15:08.500", - "lastModified": "2024-05-14T10:41:30.723", + "lastModified": "2024-07-03T01:38:28.430", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-322xx/CVE-2022-32275.json b/CVE-2022/CVE-2022-322xx/CVE-2022-32275.json index 49f1f1b7930..53d5a81b981 100644 --- a/CVE-2022/CVE-2022-322xx/CVE-2022-32275.json +++ b/CVE-2022/CVE-2022-322xx/CVE-2022-32275.json @@ -2,8 +2,16 @@ "id": "CVE-2022-32275", "sourceIdentifier": "cve@mitre.org", "published": "2022-06-06T19:15:09.813", - "lastModified": "2024-06-04T19:17:15.757", + "lastModified": "2024-07-03T01:38:29.250", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -35,6 +43,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -73,6 +101,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-325xx/CVE-2022-32502.json b/CVE-2022/CVE-2022-325xx/CVE-2022-32502.json index 2099b53e150..228c2f281d1 100644 --- a/CVE-2022/CVE-2022-325xx/CVE-2022-32502.json +++ b/CVE-2022/CVE-2022-325xx/CVE-2022-32502.json @@ -2,8 +2,9 @@ "id": "CVE-2022-32502", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T10:43:40.783", - "lastModified": "2024-05-14T16:13:02.773", + "lastModified": "2024-07-03T01:38:30.257", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se ha descubierto un problema en determinados dispositivos de Nuki Home Solutions. Hay un desbordamiento del b\u00fafer sobre la l\u00f3gica de an\u00e1lisis del token cifrado en el servicio HTTP que permite la ejecuci\u00f3n remota de c\u00f3digo. Esto afecta a Nuki Bridge v1 anterior a 1.22.0 y v2 anterior a 2.13.2." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://latesthackingnews.com/2022/07/28/multiple-security-flaws-found-in-nuki-smart-locks/", diff --git a/CVE-2022/CVE-2022-325xx/CVE-2022-32503.json b/CVE-2022/CVE-2022-325xx/CVE-2022-32503.json index 13f4c8fabdd..82c3b664b95 100644 --- a/CVE-2022/CVE-2022-325xx/CVE-2022-32503.json +++ b/CVE-2022/CVE-2022-325xx/CVE-2022-32503.json @@ -2,8 +2,9 @@ "id": "CVE-2022-32503", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T10:43:41.040", - "lastModified": "2024-05-14T16:13:02.773", + "lastModified": "2024-07-03T01:38:31.060", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se ha descubierto un problema en determinados dispositivos de Nuki Home Solutions. Un atacante con acceso f\u00edsico a este puerto JTAG puede conectarse al dispositivo y eludir las protecciones de seguridad de hardware y software. Esto afecta a Nuki Keypad anterior a 1.9.2 y a Nuki Fob anterior a 1.8.1." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-288" + } + ] + } + ], "references": [ { "url": "https://latesthackingnews.com/2022/07/28/multiple-security-flaws-found-in-nuki-smart-locks/", diff --git a/CVE-2022/CVE-2022-325xx/CVE-2022-32504.json b/CVE-2022/CVE-2022-325xx/CVE-2022-32504.json index fb018d06ed6..36ddca6d86e 100644 --- a/CVE-2022/CVE-2022-325xx/CVE-2022-32504.json +++ b/CVE-2022/CVE-2022-325xx/CVE-2022-32504.json @@ -2,8 +2,9 @@ "id": "CVE-2022-32504", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T10:43:41.203", - "lastModified": "2024-05-14T16:13:02.773", + "lastModified": "2024-07-03T01:38:31.860", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se ha descubierto un problema en determinados dispositivos de Nuki Home Solutions. El c\u00f3digo utilizado para analizar los objetos JSON recibidos del servicio WebSocket proporcionado por el dispositivo provoca un desbordamiento del b\u00fafer de pila. Un atacante podr\u00eda aprovechar esto para obtener la ejecuci\u00f3n de c\u00f3digo arbitrario en un dispositivo KeyTurner. Esto afecta a Nuki Smart Lock 3.0 anterior a 3.3.5 y 2.0 anterior a 2.12.4, as\u00ed como a Nuki Bridge v1 anterior a 1.22.0 y v2 anterior a 2.13.2." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://latesthackingnews.com/2022/07/28/multiple-security-flaws-found-in-nuki-smart-locks/", diff --git a/CVE-2022/CVE-2022-325xx/CVE-2022-32508.json b/CVE-2022/CVE-2022-325xx/CVE-2022-32508.json index b4c3d4b6ce5..8655220c8d7 100644 --- a/CVE-2022/CVE-2022-325xx/CVE-2022-32508.json +++ b/CVE-2022/CVE-2022-325xx/CVE-2022-32508.json @@ -2,8 +2,9 @@ "id": "CVE-2022-32508", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T10:43:41.967", - "lastModified": "2024-05-14T16:13:02.773", + "lastModified": "2024-07-03T01:38:32.660", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se ha descubierto un problema en determinados dispositivos de Nuki Home Solutions. Al enviar un verbo HTTP con formato incorrecto, es posible forzar el reinicio del dispositivo. Esto afecta a Nuki Bridge v1 anterior a 1.22.0 y v2 anterior a 2.13.2." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://latesthackingnews.com/2022/07/28/multiple-security-flaws-found-in-nuki-smart-locks/", diff --git a/CVE-2022/CVE-2022-327xx/CVE-2022-32742.json b/CVE-2022/CVE-2022-327xx/CVE-2022-32742.json index 90c5437de2f..161491ff98d 100644 --- a/CVE-2022/CVE-2022-327xx/CVE-2022-32742.json +++ b/CVE-2022/CVE-2022-327xx/CVE-2022-32742.json @@ -2,8 +2,9 @@ "id": "CVE-2022-32742", "sourceIdentifier": "secalert@redhat.com", "published": "2022-08-25T18:15:10.430", - "lastModified": "2024-04-22T16:15:12.257", + "lastModified": "2024-07-03T01:38:33.443", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, diff --git a/CVE-2022/CVE-2022-328xx/CVE-2022-32897.json b/CVE-2022/CVE-2022-328xx/CVE-2022-32897.json index a89d4ab9037..339656dbd04 100644 --- a/CVE-2022/CVE-2022-328xx/CVE-2022-32897.json +++ b/CVE-2022/CVE-2022-328xx/CVE-2022-32897.json @@ -2,8 +2,9 @@ "id": "CVE-2022-32897", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T20:15:12.440", - "lastModified": "2024-06-12T18:08:05.860", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:38:33.783", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33246.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33246.json index 54f66899510..3edd15c34e8 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33246.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33246.json @@ -2,8 +2,9 @@ "id": "CVE-2022-33246", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-02-12T04:15:14.283", - "lastModified": "2024-04-12T17:16:10.150", + "lastModified": "2024-07-03T01:38:35.110", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -51,6 +52,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -74,6 +95,16 @@ "value": "CWE-823" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-823" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-345xx/CVE-2022-34561.json b/CVE-2022/CVE-2022-345xx/CVE-2022-34561.json index c6155819e19..9e96d502b95 100644 --- a/CVE-2022/CVE-2022-345xx/CVE-2022-34561.json +++ b/CVE-2022/CVE-2022-345xx/CVE-2022-34561.json @@ -2,8 +2,9 @@ "id": "CVE-2022-34561", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T15:15:46.490", - "lastModified": "2024-04-22T19:24:12.920", + "lastModified": "2024-07-03T01:38:38.140", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de Cross Site Scripting (XSS) en PHPFox v4.8.9 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro de descripci\u00f3n del video." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://mohammedshine.github.io/vulnresearch.html", diff --git a/CVE-2022/CVE-2022-355xx/CVE-2022-35503.json b/CVE-2022/CVE-2022-355xx/CVE-2022-35503.json index dbf39f07cf8..c4e190f7cb7 100644 --- a/CVE-2022/CVE-2022-355xx/CVE-2022-35503.json +++ b/CVE-2022/CVE-2022-355xx/CVE-2022-35503.json @@ -2,8 +2,9 @@ "id": "CVE-2022-35503", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T15:15:46.590", - "lastModified": "2024-05-02T16:15:07.667", + "lastModified": "2024-07-03T01:38:39.057", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,46 @@ "value": "La verificaci\u00f3n inadecuada de una entrada de usuario en Open Source MANO v7-v12 permite que un atacante autenticado ejecute c\u00f3digo arbitrario dentro del contenedor del m\u00f3dulo LCM a trav\u00e9s de un descriptor de funci\u00f3n de red virtual (VNF). Un atacante puede ejecutar c\u00f3digo para cambiar la ejecuci\u00f3n normal de los componentes de OSM, recuperar informaci\u00f3n confidencial u obtener acceso a otras partes de la infraestructura de un operador de telecomunicaciones distintas del propio OSM." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-286" + }, + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://osm.etsi.org/", diff --git a/CVE-2022/CVE-2022-370xx/CVE-2022-37019.json b/CVE-2022/CVE-2022-370xx/CVE-2022-37019.json index aa1cf29b6bc..87e2d2cef23 100644 --- a/CVE-2022/CVE-2022-370xx/CVE-2022-37019.json +++ b/CVE-2022/CVE-2022-370xx/CVE-2022-37019.json @@ -2,8 +2,9 @@ "id": "CVE-2022-37019", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2024-06-10T23:15:49.413", - "lastModified": "2024-06-11T13:54:12.057", + "lastModified": "2024-07-03T01:38:40.297", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Se han identificado posibles vulnerabilidades en el BIOS del sistema para ciertos productos de PC HP que pueden permitir la escalada de privilegios y la ejecuci\u00f3n de c\u00f3digo. HP est\u00e1 lanzando actualizaciones de firmware para mitigar las posibles vulnerabilidades." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 4.2 + } + ] + }, "references": [ { "url": "https://support.hp.com/us-en/document/ish_10737430-10737454-16/hpsbhf03943", diff --git a/CVE-2022/CVE-2022-374xx/CVE-2022-37410.json b/CVE-2022/CVE-2022-374xx/CVE-2022-37410.json index f5456e24be3..12bf020408d 100644 --- a/CVE-2022/CVE-2022-374xx/CVE-2022-37410.json +++ b/CVE-2022/CVE-2022-374xx/CVE-2022-37410.json @@ -2,8 +2,9 @@ "id": "CVE-2022-37410", "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:15:49.967", - "lastModified": "2024-05-17T18:36:31.297", + "lastModified": "2024-07-03T01:38:40.667", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-284" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "references": [ diff --git a/CVE-2022/CVE-2022-381xx/CVE-2022-38164.json b/CVE-2022/CVE-2022-381xx/CVE-2022-38164.json index f7e1643939d..5b3c8c7faf3 100644 --- a/CVE-2022/CVE-2022-381xx/CVE-2022-38164.json +++ b/CVE-2022/CVE-2022-381xx/CVE-2022-38164.json @@ -2,8 +2,9 @@ "id": "CVE-2022-38164", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-07T19:15:10.003", - "lastModified": "2024-05-14T11:15:06.580", + "lastModified": "2024-07-03T01:38:42.007", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-387xx/CVE-2022-38710.json b/CVE-2022/CVE-2022-387xx/CVE-2022-38710.json index f4ea9bac567..dc636bdaf37 100644 --- a/CVE-2022/CVE-2022-387xx/CVE-2022-38710.json +++ b/CVE-2022/CVE-2022-387xx/CVE-2022-38710.json @@ -2,8 +2,9 @@ "id": "CVE-2022-38710", "sourceIdentifier": "psirt@us.ibm.com", "published": "2022-11-03T20:15:29.553", - "lastModified": "2024-04-18T04:15:08.367", + "lastModified": "2024-07-03T01:38:43.047", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, diff --git a/CVE-2022/CVE-2022-408xx/CVE-2022-40824.json b/CVE-2022/CVE-2022-408xx/CVE-2022-40824.json index 0f4e6280d5c..f8668698b9c 100644 --- a/CVE-2022/CVE-2022-408xx/CVE-2022-40824.json +++ b/CVE-2022/CVE-2022-408xx/CVE-2022-40824.json @@ -2,8 +2,16 @@ "id": "CVE-2022-40824", "sourceIdentifier": "cve@mitre.org", "published": "2022-10-07T11:15:10.797", - "lastModified": "2024-06-05T20:15:10.583", + "lastModified": "2024-07-03T01:38:46.790", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -35,6 +43,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -48,6 +76,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-408xx/CVE-2022-40826.json b/CVE-2022/CVE-2022-408xx/CVE-2022-40826.json index b0794d6bb16..7bfa5e6ba82 100644 --- a/CVE-2022/CVE-2022-408xx/CVE-2022-40826.json +++ b/CVE-2022/CVE-2022-408xx/CVE-2022-40826.json @@ -2,8 +2,16 @@ "id": "CVE-2022-40826", "sourceIdentifier": "cve@mitre.org", "published": "2022-10-07T11:15:11.083", - "lastModified": "2024-06-05T20:15:10.707", + "lastModified": "2024-07-03T01:38:47.693", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -35,6 +43,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -48,6 +76,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-429xx/CVE-2022-42974.json b/CVE-2022/CVE-2022-429xx/CVE-2022-42974.json index 2b93d0f916f..60c8cce40af 100644 --- a/CVE-2022/CVE-2022-429xx/CVE-2022-42974.json +++ b/CVE-2022/CVE-2022-429xx/CVE-2022-42974.json @@ -2,8 +2,9 @@ "id": "CVE-2022-42974", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-21T22:15:10.557", - "lastModified": "2024-06-24T12:57:36.513", + "lastModified": "2024-07-03T01:38:49.800", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En Kostal PIKO 1.5-1 MP plus HMI OEM p 1.0.1, la aplicaci\u00f3n web para el panel solar es vulnerable a un ataque de Cross-Site Scripting Almacenado (XSS) en /file.bootloader.upload.html. La aplicaci\u00f3n no puede sanitizar el nombre del archivo del par\u00e1metro, en una solicitud POST a /file.bootloader.upload.html para una actualizaci\u00f3n del sistema, lo que permite inyectar HTML y/o JavaScript en la p\u00e1gina que luego ser\u00e1 procesada y almacenada por la aplicaci\u00f3n. Cualquier solicitud posterior a p\u00e1ginas que recuperen contenido malicioso explotar\u00e1 autom\u00e1ticamente la vulnerabilidad en el navegador de la v\u00edctima. Esto tambi\u00e9n sucede porque la etiqueta se carga en la funci\u00f3n InnerHTML en la p\u00e1gina HTML." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.3, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://medium.com/%40daviddepaulasantos/how-we-got-a-cve-for-a-dom-based-stored-xss-on-a-solar-panel-917b9d7b2545", diff --git a/CVE-2022/CVE-2022-432xx/CVE-2022-43272.json b/CVE-2022/CVE-2022-432xx/CVE-2022-43272.json index 3b819c6122d..31e3c7e2dc2 100644 --- a/CVE-2022/CVE-2022-432xx/CVE-2022-43272.json +++ b/CVE-2022/CVE-2022-432xx/CVE-2022-43272.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43272", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-02T16:15:09.230", - "lastModified": "2024-06-28T19:15:03.977", + "lastModified": "2024-07-03T01:38:50.747", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-432xx/CVE-2022-43279.json b/CVE-2022/CVE-2022-432xx/CVE-2022-43279.json index 3e00c797b95..c93bc77ec95 100644 --- a/CVE-2022/CVE-2022-432xx/CVE-2022-43279.json +++ b/CVE-2022/CVE-2022-432xx/CVE-2022-43279.json @@ -2,8 +2,9 @@ "id": "CVE-2022-43279", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-15T21:15:38.757", - "lastModified": "2024-05-14T11:35:52.330", + "lastModified": "2024-07-03T01:38:51.027", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45378.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45378.json index 13f716b4a52..7b4d779ca04 100644 --- a/CVE-2022/CVE-2022-453xx/CVE-2022-45378.json +++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45378.json @@ -2,8 +2,16 @@ "id": "CVE-2022-45378", "sourceIdentifier": "security@apache.org", "published": "2022-11-14T14:15:10.200", - "lastModified": "2024-06-04T19:17:18.987", + "lastModified": "2024-07-03T01:38:54.307", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "security@apache.org", + "tags": [ + "unsupported-when-assigned" + ] + } + ], "descriptions": [ { "lang": "en", @@ -35,6 +43,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-459xx/CVE-2022-45929.json b/CVE-2022/CVE-2022-459xx/CVE-2022-45929.json index 6bd594d8279..4f7aff89036 100644 --- a/CVE-2022/CVE-2022-459xx/CVE-2022-45929.json +++ b/CVE-2022/CVE-2022-459xx/CVE-2022-45929.json @@ -2,8 +2,9 @@ "id": "CVE-2022-45929", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-20T17:15:50.127", - "lastModified": "2024-06-21T11:22:01.687", + "lastModified": "2024-07-03T01:38:55.120", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Northern.tech Mender 3.3.x anterior a 3.3.2, 3.5.x anterior a 3.5.0 y 3.6.x anterior a 3.6.0 tiene un control de acceso incorrecto y permite a los usuarios cambiar sus roles y podr\u00eda permitir una escalada de privilegios desde una lectura con pocos privilegios solo usuario a un usuario con altos privilegios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://mender.io/blog/cve-2022-45929-cve-2022-41324-improper-access-control-for-low-privileged-users", diff --git a/CVE-2022/CVE-2022-463xx/CVE-2022-46366.json b/CVE-2022/CVE-2022-463xx/CVE-2022-46366.json index d012e004717..740a28a03a7 100644 --- a/CVE-2022/CVE-2022-463xx/CVE-2022-46366.json +++ b/CVE-2022/CVE-2022-463xx/CVE-2022-46366.json @@ -2,8 +2,16 @@ "id": "CVE-2022-46366", "sourceIdentifier": "security@apache.org", "published": "2022-12-02T14:15:10.223", - "lastModified": "2024-06-04T19:17:19.320", + "lastModified": "2024-07-03T01:38:56.220", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "security@apache.org", + "tags": [ + "unsupported-when-assigned" + ] + } + ], "descriptions": [ { "lang": "en", @@ -35,6 +43,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-468xx/CVE-2022-46897.json b/CVE-2022/CVE-2022-468xx/CVE-2022-46897.json index 47784ca7463..067cb1ea8ab 100644 --- a/CVE-2022/CVE-2022-468xx/CVE-2022-46897.json +++ b/CVE-2022/CVE-2022-468xx/CVE-2022-46897.json @@ -2,8 +2,9 @@ "id": "CVE-2022-46897", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T18:15:07.803", - "lastModified": "2024-04-22T19:24:06.727", + "lastModified": "2024-07-03T01:38:56.470", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en Insyde InsydeH2O con los kernels 5.0 a 5.5. El controlador CapsuleIFWUSmm no verifica el valor de retorno de un m\u00e9todo o funci\u00f3n. Esto puede evitar que detecte estados y condiciones inesperados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-252" + } + ] + } + ], "references": [ { "url": "https://www.insyde.com/security-pledge", diff --git a/CVE-2022/CVE-2022-469xx/CVE-2022-46966.json b/CVE-2022/CVE-2022-469xx/CVE-2022-46966.json index 2371f174168..7882e5d2e8c 100644 --- a/CVE-2022/CVE-2022-469xx/CVE-2022-46966.json +++ b/CVE-2022/CVE-2022-469xx/CVE-2022-46966.json @@ -2,8 +2,9 @@ "id": "CVE-2022-46966", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-26T23:15:10.000", - "lastModified": "2024-04-23T14:15:08.030", + "lastModified": "2024-07-03T01:38:57.337", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-470xx/CVE-2022-47065.json b/CVE-2022/CVE-2022-470xx/CVE-2022-47065.json index ed39a7cbb82..9a98bbb463d 100644 --- a/CVE-2022/CVE-2022-470xx/CVE-2022-47065.json +++ b/CVE-2022/CVE-2022-470xx/CVE-2022-47065.json @@ -2,8 +2,16 @@ "id": "CVE-2022-47065", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-23T15:15:14.000", - "lastModified": "2024-06-04T19:17:19.530", + "lastModified": "2024-07-03T01:38:58.160", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "unsupported-when-assigned" + ] + } + ], "descriptions": [ { "lang": "en", @@ -35,6 +43,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -48,6 +76,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48618.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48618.json index 7c2112efda1..d8348af20fe 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48618.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48618.json @@ -2,8 +2,9 @@ "id": "CVE-2022-48618", "sourceIdentifier": "product-security@apple.com", "published": "2024-01-09T18:15:45.120", - "lastModified": "2024-04-11T12:48:39.987", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:38:59.610", + "vulnStatus": "Modified", + "cveTags": [], "cisaExploitAdd": "2024-01-31", "cisaActionDue": "2024-02-21", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", @@ -39,6 +40,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 } ] }, @@ -52,6 +73,16 @@ "value": "CWE-367" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48635.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48635.json index e95cdbfb55e..a1b63c86b69 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48635.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48635.json @@ -2,8 +2,9 @@ "id": "CVE-2022-48635", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-28T13:15:06.663", - "lastModified": "2024-04-29T12:42:03.667", + "lastModified": "2024-07-03T01:39:01.047", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: fsdax: Reparar bucle infinito en dax_iomap_rw() Obtuve un bucle infinito y un informe de ADVERTENCIA al ejecutar un comando tail en virtiofs. ADVERTENCIA: CPU: 10 PID: 964 en fs/iomap/iter.c:34 iomap_iter+0x3a2/0x3d0 M\u00f3dulos vinculados en: CPU: 10 PID: 964 Comm: tail No contaminado 5.19.0-rc7 Seguimiento de llamadas: dax_iomap_rw +0xea/0x620 ? __this_cpu_preempt_check+0x13/0x20 fuse_dax_read_iter+0x47/0x80 fuse_file_read_iter+0xae/0xd0 new_sync_read+0xfe/0x180 ? 0xffffffff81000000 vfs_read+0x14d/0x1a0 ksys_read+0x6d/0xf0 __x64_sys_read+0x1a/0x20 do_syscall_64+0x3b/0x90 Entry_SYSCALL_64_after_hwframe+0x63/0xcd El comando tail llamar\u00e1 a read() con un recuento de 0. En este caso, iomap_iter() informar\u00e1 esto ADVERTENCIA, y siempre devuelve 1, lo que provoca el bucle infinito en dax_iomap_rw(). Arreglando verificando el recuento si es 0 en dax_iomap_rw()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/17d9c15c9b9e7fb285f7ac5367dfb5f00ff575e3", diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48637.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48637.json index b06887a6212..f94dcb2aeb1 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48637.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48637.json @@ -2,8 +2,9 @@ "id": "CVE-2022-48637", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-28T13:15:06.763", - "lastModified": "2024-04-29T12:42:03.667", + "lastModified": "2024-07-03T01:39:01.937", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/08483e4c0c83b221b8891434a04cec405dee94a6", diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48651.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48651.json index 1ddebf98d3f..b0e9f5cc92e 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48651.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48651.json @@ -2,8 +2,9 @@ "id": "CVE-2022-48651", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-28T13:15:07.423", - "lastModified": "2024-04-29T12:42:03.667", + "lastModified": "2024-07-03T01:39:03.180", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ipvlan: corrige errores fuera de los l\u00edmites causados por skb->mac_header no configurado si se usa un socket AF_PACKET para enviar paquetes a trav\u00e9s de ipvlan y se cambia la funci\u00f3n xmit predeterminada del socket AF_PACKET desde dev_queue_xmit() a paquete_direct_xmit() a trav\u00e9s de setsockopt() con el nombre de opci\u00f3n PACKET_QDISC_BYPASS, es posible que skb->mac_header no se restablezca y permanezca en el valor inicial de 65535, esto puede desencadenar errores de losa fuera de los l\u00edmites como se muestra a continuaci\u00f3n : =================================================== ================ UG: KASAN: losa fuera de los l\u00edmites en ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan] PU: 2 PID: 1768 Comm: raw_send Kdump: cargado No contaminado 6.0.0-rc4+ #6 nombre de hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33 todo Seguimiento: print_address_description.constprop.0+0x1d/0x160 print_report.cold+0x4f/0x112 kasan_report+ 0xa3/0x130 ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan] ipvlan_start_xmit+0x29/0xa0 [ipvlan] __dev_direct_xmit+0x2e2/0x380 paquete_direct_xmit+0x22/0x60 paquete_snd+0x7c9/0xc40 0x9a/0xa0 __sys_sendto+0x18a/0x230 __x64_sys_sendto+0x74/0x90 do_syscall_64 +0x3b/0x90 Entry_SYSCALL_64_after_hwframe+0x63/0xcd La causa principal es: 1. paquete_snd() solo restablece skb->mac_header cuando sock->tipo es SOCK_RAW y skb->protocolo no se especifica como en paquete_parse_headers() 2. paquete_direct_xmit() no restablece skb->mac_header como dev_queue_xmit() En este caso, skb->mac_header es 65535 cuando se llama a ipvlan_xmit_mode_l2(). Entonces, cuando ipvlan_xmit_mode_l2() obtiene el encabezado mac con eth_hdr() que usa \"skb->head + skb->mac_header\", se produce un acceso fuera de los l\u00edmites. Este parche reemplaza eth_hdr() con skb_eth_hdr() en ipvlan_xmit_mode_l2() y restablece el encabezado de mac en multidifusi\u00f3n para resolver este error fuera de los l\u00edmites." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/25efdbe5fe542c3063d1948cc4e98abcb57621ca", diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48655.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48655.json index a3578e63dd0..c6687ae7c13 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48655.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48655.json @@ -2,8 +2,9 @@ "id": "CVE-2022-48655", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-28T13:15:07.623", - "lastModified": "2024-06-27T14:15:12.480", + "lastModified": "2024-07-03T01:39:04.060", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-119" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48666.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48666.json index 75b0d8be8f8..188c17303df 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48666.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48666.json @@ -2,8 +2,9 @@ "id": "CVE-2022-48666", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-28T13:15:08.113", - "lastModified": "2024-04-29T12:42:03.667", + "lastModified": "2024-07-03T01:39:05.427", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: core: corrige un use-after-free Hay dos implementaciones de .exit_cmd_priv. Ambas implementaciones utilizan recursos asociados con el host SCSI. Aseg\u00farese de que estos recursos todav\u00eda est\u00e9n disponibles cuando se llame a .exit_cmd_priv esperando dentro de scsi_remove_host() hasta que se haya liberado el conjunto de etiquetas. Esta confirmaci\u00f3n corrige el siguiente use-after-free: ======================================== =========================== ERROR: KASAN: use-after-free en srp_exit_cmd_priv+0x27/0xd0 [ib_srp] Lectura de tama\u00f1o 8 en addr ffff888100337000 por tarea multipathd/16727 Rastreo de llamadas: dump_stack_lvl+0x34/0x44 print_report.cold+0x5e/0x5db kasan_report+0xab/0x120 srp_exit_cmd_priv+0x27/0xd0 [ib_srp] +0x4d/0x70 blk_mq_free_rqs+0x143/0x410 __blk_mq_free_map_and_rqs+ 0x6e/0x100 blk_mq_free_tag_set+0x2b/0x160 scsi_host_dev_release+0xf3/0x1a0 dispositivo_release+0x54/0xe0 kobject_put+0xa5/0x120 dispositivo_release+0x54/0xe0 kobject_put+0xa5/0x120 +0x4c1/0x4e0 ejecutar_en_contexto_de_proceso+0x23/0x90 liberaci\u00f3n_de_dispositivo+0x54/0xe0 kobject_put+ 0xa5/0x120 scsi_disk_release+0x3f/0x50 dispositivo_liberaci\u00f3n+0x54/0xe0 kobject_put+0xa5/0x120 disk_release+0x17f/0x1b0 dispositivo_liberaci\u00f3n+0x54/0xe0 kobject_put+0xa5/0x120 dm_put_table_device+0xa3/0x160 [dm_mod] dm_put_device+0xd0/0x140 [dm_mod] grupo_prioridad_libre +0xd8/0x110 [dm_multipath] free_multipath+0x94/0xe0 [dm_multipath] dm_table_destroy+0xa2/0x1e0 [dm_mod] __dm_destroy+0x196/0x350 [dm_mod] dev_remove+0x10c/0x160 [dm_mod] 2c2/0x590 [dm_mod] dm_ctl_ioctl+0x5 /0x10 [dm_mod] __x64_sys_ioctl+0xb4/0xf0 dm_ctl_ioctl+0x5/0x10 [dm_mod] __x64_sys_ioctl+0xb4/0xf0 do_syscall_64+0x3b/0x90 entrada_SYSCALL_64_after_hwframe+0x46/0xb 0" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2e7eb4c1e8af8385de22775bd0be552f59b28c9a", diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48670.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48670.json index 9d69a86b846..e6a5b5c9adc 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48670.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48670.json @@ -2,8 +2,9 @@ "id": "CVE-2022-48670", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-03T15:15:07.377", - "lastModified": "2024-05-23T20:26:26.033", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:39:06.507", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48684.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48684.json index f093316ef59..b51e79b5abe 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48684.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48684.json @@ -2,8 +2,9 @@ "id": "CVE-2022-48684", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-27T23:15:06.110", - "lastModified": "2024-04-29T12:42:03.667", + "lastModified": "2024-07-03T01:39:07.940", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,22 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1336" + }, + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://servicedesk.logpoint.com/hc/en-us/articles/7201134201885-Template-injection-in-Search-Template", diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48685.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48685.json index e5538324ed0..79da17499b7 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48685.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48685.json @@ -2,8 +2,9 @@ "id": "CVE-2022-48685", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-27T23:15:06.290", - "lastModified": "2024-04-29T12:42:03.667", + "lastModified": "2024-07-03T01:39:08.670", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://servicedesk.logpoint.com/hc/en-us/articles/7997112373277-Privilege-Escalation-Through-Cronjob", diff --git a/CVE-2022/CVE-2022-487xx/CVE-2022-48716.json b/CVE-2022/CVE-2022-487xx/CVE-2022-48716.json index 32b7595da28..014c4799870 100644 --- a/CVE-2022/CVE-2022-487xx/CVE-2022-48716.json +++ b/CVE-2022/CVE-2022-487xx/CVE-2022-48716.json @@ -2,8 +2,9 @@ "id": "CVE-2022-48716", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-20T11:15:55.207", - "lastModified": "2024-06-20T12:43:25.663", + "lastModified": "2024-07-03T01:39:11.570", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ASoC: c\u00f3decs: wcd938x: corrige el uso incorrecto del puerto Los controles del mezclador tienen la identificaci\u00f3n del canal en mezclador->reg, que no es la misma que la identificaci\u00f3n del puerto. La identificaci\u00f3n del puerto debe derivarse de la matriz chan_info. Entonces arregla esto. Sin esto, es posible que podamos da\u00f1ar la estructura wcd938x_sdw_priv accediendo a la matriz port_map fuera del rango con la identificaci\u00f3n del canal en lugar de la identificaci\u00f3n del puerto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/9167f2712dc8c24964840a4d1e2ebf130e846b95", diff --git a/CVE-2022/CVE-2022-487xx/CVE-2022-48747.json b/CVE-2022/CVE-2022-487xx/CVE-2022-48747.json index ea6099153eb..13e2285040a 100644 --- a/CVE-2022/CVE-2022-487xx/CVE-2022-48747.json +++ b/CVE-2022/CVE-2022-487xx/CVE-2022-48747.json @@ -2,15 +2,55 @@ "id": "CVE-2022-48747", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-20T12:15:12.960", - "lastModified": "2024-06-20T12:43:25.663", + "lastModified": "2024-07-03T01:39:13.487", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock: Fix wrong offset in bio_truncate()\n\nbio_truncate() clears the buffer outside of last block of bdev, however\ncurrent bio_truncate() is using the wrong offset of page. So it can\nreturn the uninitialized data.\n\nThis happened when both of truncated/corrupted FS and userspace (via\nbdev) are trying to read the last of bdev." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: bloque: corrige el desplazamiento incorrecto en bio_truncate() bio_truncate() borra el b\u00fafer fuera del \u00faltimo bloque de bdev, sin embargo, el bio_truncate() actual est\u00e1 usando el desplazamiento de p\u00e1gina incorrecto. Entonces puede devolver los datos no inicializados. Esto sucedi\u00f3 cuando tanto el FS truncado/corrupto como el espacio de usuario (a trav\u00e9s de bdev) intentaban leer lo \u00faltimo de bdev." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/3ee859e384d453d6ac68bfd5971f630d9fa46ad3", diff --git a/CVE-2022/CVE-2022-487xx/CVE-2022-48748.json b/CVE-2022/CVE-2022-487xx/CVE-2022-48748.json index 9d4f2dc78c7..991973af9f6 100644 --- a/CVE-2022/CVE-2022-487xx/CVE-2022-48748.json +++ b/CVE-2022/CVE-2022-487xx/CVE-2022-48748.json @@ -2,15 +2,55 @@ "id": "CVE-2022-48748", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-20T12:15:13.047", - "lastModified": "2024-06-20T12:43:25.663", + "lastModified": "2024-07-03T01:39:14.287", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: bridge: vlan: fix memory leak in __allowed_ingress\n\nWhen using per-vlan state, if vlan snooping and stats are disabled,\nuntagged or priority-tagged ingress frame will go to check pvid state.\nIf the port state is forwarding and the pvid state is not\nlearning/forwarding, untagged or priority-tagged frame will be dropped\nbut skb memory is not freed.\nShould free skb when __allowed_ingress returns false." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: net: bridge: vlan: corrige la p\u00e9rdida de memoria en __allowed_ingress Cuando se usa el estado por VLAN, si la vigilancia de VLAN y las estad\u00edsticas est\u00e1n deshabilitadas, el marco de ingreso sin etiquetar o con etiqueta de prioridad ir\u00e1 a verificar pvid estado. Si el estado del puerto est\u00e1 reenviando y el estado del pvid no est\u00e1 aprendiendo/reenviando, se descartar\u00e1 la trama sin etiquetar o con etiqueta de prioridad, pero no se liberar\u00e1 la memoria skb. Deber\u00eda liberar skb cuando __allowed_ingress devuelva falso." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/14be8d448fca6fe7b2a413831eedd55aef6c6511", diff --git a/CVE-2022/CVE-2022-487xx/CVE-2022-48754.json b/CVE-2022/CVE-2022-487xx/CVE-2022-48754.json index bbea47c64c6..a6a3b597a98 100644 --- a/CVE-2022/CVE-2022-487xx/CVE-2022-48754.json +++ b/CVE-2022/CVE-2022-487xx/CVE-2022-48754.json @@ -2,15 +2,55 @@ "id": "CVE-2022-48754", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-20T12:15:13.563", - "lastModified": "2024-06-20T12:43:25.663", + "lastModified": "2024-07-03T01:39:15.380", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nphylib: fix potential use-after-free\n\nCommit bafbdd527d56 (\"phylib: Add device reset GPIO support\") added call\nto phy_device_reset(phydev) after the put_device() call in phy_detach().\n\nThe comment before the put_device() call says that the phydev might go\naway with put_device().\n\nFix potential use-after-free by calling phy_device_reset() before\nput_device()." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: phylib: corrige el posible use-after-free. Commit bafbdd527d56 (\"phylib: agregue soporte GPIO para restablecer el dispositivo\") se agreg\u00f3 una llamada a phy_device_reset(phydev) despu\u00e9s de la llamada put_device() en phy_detach( ). El comentario antes de la llamada put_device() dice que phydev podr\u00eda desaparecer con put_device(). Solucione el posible use-after-free llamando a phy_device_reset() antes de put_device()." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/67d271760b037ce0806d687ee6057edc8afd4205", diff --git a/CVE-2023/CVE-2023-205xx/CVE-2023-20598.json b/CVE-2023/CVE-2023-205xx/CVE-2023-20598.json index 4ad8e66e820..2eed7657358 100644 --- a/CVE-2023/CVE-2023-205xx/CVE-2023-20598.json +++ b/CVE-2023/CVE-2023-205xx/CVE-2023-20598.json @@ -2,8 +2,9 @@ "id": "CVE-2023-20598", "sourceIdentifier": "psirt@amd.com", "published": "2023-10-17T14:15:09.813", - "lastModified": "2023-10-28T03:31:07.843", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:39:18.680", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-209xx/CVE-2023-20938.json b/CVE-2023/CVE-2023-209xx/CVE-2023-20938.json index 50d565fef80..4daa1cfb4ed 100644 --- a/CVE-2023/CVE-2023-209xx/CVE-2023-20938.json +++ b/CVE-2023/CVE-2023-209xx/CVE-2023-20938.json @@ -2,8 +2,9 @@ "id": "CVE-2023-20938", "sourceIdentifier": "security@android.com", "published": "2023-02-28T17:15:10.723", - "lastModified": "2023-03-06T19:32:27.957", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:39:19.567", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -31,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 } ] }, @@ -44,6 +65,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-212xx/CVE-2023-21267.json b/CVE-2023/CVE-2023-212xx/CVE-2023-21267.json index 43e2f864b52..eccf8fae9fd 100644 --- a/CVE-2023/CVE-2023-212xx/CVE-2023-21267.json +++ b/CVE-2023/CVE-2023-212xx/CVE-2023-21267.json @@ -2,8 +2,9 @@ "id": "CVE-2023-21267", "sourceIdentifier": "security@android.com", "published": "2023-08-14T21:15:12.243", - "lastModified": "2024-05-07T21:15:07.873", + "lastModified": "2024-07-03T01:39:20.417", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -44,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-225xx/CVE-2023-22527.json b/CVE-2023/CVE-2023-225xx/CVE-2023-22527.json index 2b0dc84a3d5..c6af0a3d29b 100644 --- a/CVE-2023/CVE-2023-225xx/CVE-2023-22527.json +++ b/CVE-2023/CVE-2023-225xx/CVE-2023-22527.json @@ -2,8 +2,9 @@ "id": "CVE-2023-22527", "sourceIdentifier": "security@atlassian.com", "published": "2024-01-16T05:15:08.290", - "lastModified": "2024-06-10T16:10:53.183", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:39:25.327", + "vulnStatus": "Modified", + "cveTags": [], "cisaExploitAdd": "2024-01-24", "cisaActionDue": "2024-02-14", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", @@ -74,6 +75,16 @@ "value": "CWE-74" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-226xx/CVE-2023-22656.json b/CVE-2023/CVE-2023-226xx/CVE-2023-22656.json index 0acca57f8cc..47fb407f9c9 100644 --- a/CVE-2023/CVE-2023-226xx/CVE-2023-22656.json +++ b/CVE-2023/CVE-2023-226xx/CVE-2023-22656.json @@ -2,8 +2,9 @@ "id": "CVE-2023-22656", "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:15:50.353", - "lastModified": "2024-05-17T18:36:31.297", + "lastModified": "2024-07-03T01:39:26.087", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "references": [ diff --git a/CVE-2023/CVE-2023-229xx/CVE-2023-22934.json b/CVE-2023/CVE-2023-229xx/CVE-2023-22934.json index cc015d49bdf..9f2c7e595ad 100644 --- a/CVE-2023/CVE-2023-229xx/CVE-2023-22934.json +++ b/CVE-2023/CVE-2023-229xx/CVE-2023-22934.json @@ -2,8 +2,9 @@ "id": "CVE-2023-22934", "sourceIdentifier": "prodsec@splunk.com", "published": "2023-02-14T18:15:12.297", - "lastModified": "2024-04-10T01:15:11.233", + "lastModified": "2024-07-03T01:39:27.173", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -74,6 +75,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-108" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-230xx/CVE-2023-23019.json b/CVE-2023/CVE-2023-230xx/CVE-2023-23019.json index 644226ef42e..346d8c10431 100644 --- a/CVE-2023/CVE-2023-230xx/CVE-2023-23019.json +++ b/CVE-2023/CVE-2023-230xx/CVE-2023-23019.json @@ -2,8 +2,9 @@ "id": "CVE-2023-23019", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T19:15:20.963", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-07-03T01:39:28.063", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de Cross Site Scripting (XSS) en el archivo main.php en sourcecodester oretnom23 Blog Site 1.0 a trav\u00e9s del nombre y los par\u00e1metros de correo electr\u00f3nico para funcionar user_add.\\" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/enferas/fc3a1b4b3826d0e10cc4a021e5ec1822", diff --git a/CVE-2023/CVE-2023-239xx/CVE-2023-23923.json b/CVE-2023/CVE-2023-239xx/CVE-2023-23923.json index 1e3dc36a3b0..782da5109d8 100644 --- a/CVE-2023/CVE-2023-239xx/CVE-2023-23923.json +++ b/CVE-2023/CVE-2023-239xx/CVE-2023-23923.json @@ -2,8 +2,9 @@ "id": "CVE-2023-23923", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2023-02-17T20:15:11.940", - "lastModified": "2023-02-28T19:17:27.487", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:39:31.063", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -54,6 +55,16 @@ "value": "CWE-284" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-240xx/CVE-2023-24069.json b/CVE-2023/CVE-2023-240xx/CVE-2023-24069.json index 411e9d4a22b..5638872449f 100644 --- a/CVE-2023/CVE-2023-240xx/CVE-2023-24069.json +++ b/CVE-2023/CVE-2023-240xx/CVE-2023-24069.json @@ -2,8 +2,16 @@ "id": "CVE-2023-24069", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-23T07:15:11.137", - "lastModified": "2024-06-04T19:17:23.460", + "lastModified": "2024-07-03T01:39:32.413", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -48,6 +56,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-253xx/CVE-2023-25399.json b/CVE-2023/CVE-2023-253xx/CVE-2023-25399.json index 12000db35f6..b6cf9670600 100644 --- a/CVE-2023/CVE-2023-253xx/CVE-2023-25399.json +++ b/CVE-2023/CVE-2023-253xx/CVE-2023-25399.json @@ -2,8 +2,16 @@ "id": "CVE-2023-25399", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-05T17:15:09.320", - "lastModified": "2024-06-04T19:17:24.313", + "lastModified": "2024-07-03T01:39:35.733", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -31,6 +39,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -44,6 +72,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-261xx/CVE-2023-26130.json b/CVE-2023/CVE-2023-261xx/CVE-2023-26130.json index cd1c09c00a1..03789817379 100644 --- a/CVE-2023/CVE-2023-261xx/CVE-2023-26130.json +++ b/CVE-2023/CVE-2023-261xx/CVE-2023-26130.json @@ -2,8 +2,9 @@ "id": "CVE-2023-26130", "sourceIdentifier": "report@snyk.io", "published": "2023-05-30T05:15:10.640", - "lastModified": "2024-05-02T03:15:14.767", + "lastModified": "2024-07-03T01:39:37.680", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -74,6 +75,16 @@ "value": "CWE-93" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-93" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26566.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26566.json index 3b5173bbdd0..f65efe0a9ee 100644 --- a/CVE-2023/CVE-2023-265xx/CVE-2023-26566.json +++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26566.json @@ -2,8 +2,9 @@ "id": "CVE-2023-26566", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T12:39:11.817", - "lastModified": "2024-05-14T16:13:02.773", + "lastModified": "2024-07-03T01:39:39.010", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Sangoma FreePBX 1805 a 2203 en Linux contiene credenciales codificadas para la interfaz REST de Asterisk (ARI), que permite a atacantes remotos reconfigurar Asterisk y realizar llamadas externas e internas a trav\u00e9s de solicitudes HTTP y WebSocket enviadas a la API." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], "references": [ { "url": "https://qsecure.com.cy/resources/advisories/sangoma-freepbx-linux-hardcoded-credentials", diff --git a/CVE-2023/CVE-2023-266xx/CVE-2023-26603.json b/CVE-2023/CVE-2023-266xx/CVE-2023-26603.json index 9c55da9f170..ccffed77bef 100644 --- a/CVE-2023/CVE-2023-266xx/CVE-2023-26603.json +++ b/CVE-2023/CVE-2023-266xx/CVE-2023-26603.json @@ -2,8 +2,9 @@ "id": "CVE-2023-26603", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-26T20:15:07.230", - "lastModified": "2024-04-29T12:42:03.667", + "lastModified": "2024-07-03T01:39:39.820", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "JumpCloud Agent anterior a 1.178.0 crea un archivo temporal en un directorio con permisos inseguros. Esto permite escalar privilegios al SYSTEM mediante una acci\u00f3n de reparaci\u00f3n en el instalador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-378" + } + ] + } + ], "references": [ { "url": "https://community.jumpcloud.com/t5/jumpcloud-product-news/bd-p/releases", diff --git a/CVE-2023/CVE-2023-267xx/CVE-2023-26793.json b/CVE-2023/CVE-2023-267xx/CVE-2023-26793.json index fced5767ea1..1131aa2c4dd 100644 --- a/CVE-2023/CVE-2023-267xx/CVE-2023-26793.json +++ b/CVE-2023/CVE-2023-267xx/CVE-2023-26793.json @@ -2,8 +2,9 @@ "id": "CVE-2023-26793", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T19:15:21.123", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-07-03T01:39:40.663", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "libmodbus v3.1.10 tiene una vulnerabilidad de desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en la funci\u00f3n read_io_status en src/modbus.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://github.com/stephane/libmodbus/issues/683", diff --git a/CVE-2023/CVE-2023-271xx/CVE-2023-27198.json b/CVE-2023/CVE-2023-271xx/CVE-2023-27198.json index 77ef1fa7fc8..4f62d6c4aee 100644 --- a/CVE-2023/CVE-2023-271xx/CVE-2023-27198.json +++ b/CVE-2023/CVE-2023-271xx/CVE-2023-27198.json @@ -2,8 +2,9 @@ "id": "CVE-2023-27198", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-05T20:15:10.073", - "lastModified": "2024-04-23T14:15:08.220", + "lastModified": "2024-07-03T01:39:41.580", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -31,6 +32,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 } ] }, @@ -44,6 +65,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27561.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27561.json index 74af3029c4c..efe13bd875d 100644 --- a/CVE-2023/CVE-2023-275xx/CVE-2023-27561.json +++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27561.json @@ -2,8 +2,9 @@ "id": "CVE-2023-27561", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-03T19:15:11.330", - "lastModified": "2023-11-07T04:09:59.443", + "lastModified": "2024-07-03T01:39:46.513", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -31,6 +32,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 } ] }, @@ -44,6 +65,16 @@ "value": "CWE-706" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-706" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28329.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28329.json index d449dee3680..0851df34a91 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28329.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28329.json @@ -2,8 +2,9 @@ "id": "CVE-2023-28329", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2023-03-23T21:15:19.857", - "lastModified": "2024-04-19T14:15:08.937", + "lastModified": "2024-07-03T01:39:49.640", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -31,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 } ] }, diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28330.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28330.json index 61171b9a8e9..09f5e061300 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28330.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28330.json @@ -2,8 +2,9 @@ "id": "CVE-2023-28330", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2023-03-23T21:15:19.927", - "lastModified": "2024-04-19T14:15:09.017", + "lastModified": "2024-07-03T01:39:49.903", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -31,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28333.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28333.json index 4a8c56c861f..948e5bf4a31 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28333.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28333.json @@ -2,8 +2,9 @@ "id": "CVE-2023-28333", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2023-03-23T21:15:20.127", - "lastModified": "2024-04-19T14:15:09.250", + "lastModified": "2024-07-03T01:39:50.127", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -31,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28334.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28334.json index 4b394852ae8..fb4bd6d4d70 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28334.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28334.json @@ -2,8 +2,9 @@ "id": "CVE-2023-28334", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2023-03-23T21:15:20.193", - "lastModified": "2024-04-19T14:15:09.330", + "lastModified": "2024-07-03T01:39:50.350", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -31,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 0.0, + "baseSeverity": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 0.0 } ] }, diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28383.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28383.json index e00027161db..6b113e343e8 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28383.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28383.json @@ -2,8 +2,9 @@ "id": "CVE-2023-28383", "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:15:51.563", - "lastModified": "2024-05-17T18:36:31.297", + "lastModified": "2024-07-03T01:39:50.563", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-92" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "references": [ diff --git a/CVE-2023/CVE-2023-288xx/CVE-2023-28863.json b/CVE-2023/CVE-2023-288xx/CVE-2023-28863.json index 926c8d50e4b..2e88b4af7dc 100644 --- a/CVE-2023/CVE-2023-288xx/CVE-2023-28863.json +++ b/CVE-2023/CVE-2023-288xx/CVE-2023-28863.json @@ -2,8 +2,9 @@ "id": "CVE-2023-28863", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-18T14:15:07.383", - "lastModified": "2024-04-30T19:15:22.867", + "lastModified": "2024-07-03T01:39:52.190", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -31,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, @@ -44,6 +65,16 @@ "value": "CWE-345" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-345" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-303xx/CVE-2023-30394.json b/CVE-2023/CVE-2023-303xx/CVE-2023-30394.json index 3d3298ae181..94d3f271cc1 100644 --- a/CVE-2023/CVE-2023-303xx/CVE-2023-30394.json +++ b/CVE-2023/CVE-2023-303xx/CVE-2023-30394.json @@ -2,8 +2,9 @@ "id": "CVE-2023-30394", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-11T19:15:09.497", - "lastModified": "2024-05-24T17:15:45.210", + "lastModified": "2024-07-03T01:39:54.553", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -31,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -44,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-318xx/CVE-2023-31889.json b/CVE-2023/CVE-2023-318xx/CVE-2023-31889.json index d1c9342b763..070c65760c7 100644 --- a/CVE-2023/CVE-2023-318xx/CVE-2023-31889.json +++ b/CVE-2023/CVE-2023-318xx/CVE-2023-31889.json @@ -2,8 +2,9 @@ "id": "CVE-2023-31889", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T21:15:47.420", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-07-03T01:39:56.557", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema descubierto en httpd en ASUS RT-AC51U con una versi\u00f3n de firmware hasta 3.0.0.4.380.8591 incluida permite a atacantes locales provocar una denegaci\u00f3n de servicio mediante una solicitud GET manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://gitlab.com/donnm/cves/-/blob/master/dos_rtac51u_httpd.md", diff --git a/CVE-2023/CVE-2023-319xx/CVE-2023-31973.json b/CVE-2023/CVE-2023-319xx/CVE-2023-31973.json index 7152c40f03a..4960d99ac68 100644 --- a/CVE-2023/CVE-2023-319xx/CVE-2023-31973.json +++ b/CVE-2023/CVE-2023-319xx/CVE-2023-31973.json @@ -2,8 +2,16 @@ "id": "CVE-2023-31973", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-09T14:15:13.737", - "lastModified": "2024-06-04T19:17:27.633", + "lastModified": "2024-07-03T01:39:57.370", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -31,6 +39,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -44,6 +72,20 @@ "value": "CWE-401" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + }, + { + "lang": "en", + "value": "CWE-590" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-327xx/CVE-2023-32712.json b/CVE-2023/CVE-2023-327xx/CVE-2023-32712.json index 4f70a607b80..3fc8c18957b 100644 --- a/CVE-2023/CVE-2023-327xx/CVE-2023-32712.json +++ b/CVE-2023/CVE-2023-327xx/CVE-2023-32712.json @@ -2,8 +2,9 @@ "id": "CVE-2023-32712", "sourceIdentifier": "prodsec@splunk.com", "published": "2023-06-01T17:15:10.397", - "lastModified": "2024-04-10T01:15:14.110", + "lastModified": "2024-07-03T01:40:03.950", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -74,6 +75,16 @@ "value": "CWE-117" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-117" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-328xx/CVE-2023-32890.json b/CVE-2023/CVE-2023-328xx/CVE-2023-32890.json index fca1670b39c..ce82b2e40ed 100644 --- a/CVE-2023/CVE-2023-328xx/CVE-2023-32890.json +++ b/CVE-2023/CVE-2023-328xx/CVE-2023-32890.json @@ -2,8 +2,9 @@ "id": "CVE-2023-32890", "sourceIdentifier": "security@mediatek.com", "published": "2024-01-02T03:15:08.587", - "lastModified": "2024-04-01T03:15:07.630", + "lastModified": "2024-07-03T01:40:05.030", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3347.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3347.json index ba1ecef097a..4cb78a1a56c 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3347.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3347.json @@ -2,8 +2,9 @@ "id": "CVE-2023-3347", "sourceIdentifier": "secalert@redhat.com", "published": "2023-07-20T15:15:11.940", - "lastModified": "2023-08-15T04:15:11.833", + "lastModified": "2024-07-03T01:41:00.823", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -64,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-924" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-340xx/CVE-2023-34048.json b/CVE-2023/CVE-2023-340xx/CVE-2023-34048.json index 1282295bfe5..5fd3678cb08 100644 --- a/CVE-2023/CVE-2023-340xx/CVE-2023-34048.json +++ b/CVE-2023/CVE-2023-340xx/CVE-2023-34048.json @@ -2,8 +2,9 @@ "id": "CVE-2023-34048", "sourceIdentifier": "security@vmware.com", "published": "2023-10-25T18:17:27.897", - "lastModified": "2024-01-23T02:00:01.253", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:40:09.093", + "vulnStatus": "Modified", + "cveTags": [], "cisaExploitAdd": "2024-01-22", "cisaActionDue": "2024-02-12", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", @@ -72,6 +73,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-343xx/CVE-2023-34362.json b/CVE-2023/CVE-2023-343xx/CVE-2023-34362.json index 11272d788a4..6a18d5cfc03 100644 --- a/CVE-2023/CVE-2023-343xx/CVE-2023-34362.json +++ b/CVE-2023/CVE-2023-343xx/CVE-2023-34362.json @@ -2,8 +2,9 @@ "id": "CVE-2023-34362", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-02T14:15:09.487", - "lastModified": "2024-06-27T19:15:29.160", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:40:13.847", + "vulnStatus": "Modified", + "cveTags": [], "cisaExploitAdd": "2023-06-02", "cisaActionDue": "2023-06-23", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-357xx/CVE-2023-35701.json b/CVE-2023/CVE-2023-357xx/CVE-2023-35701.json index 62e863772a0..108c846c01a 100644 --- a/CVE-2023/CVE-2023-357xx/CVE-2023-35701.json +++ b/CVE-2023/CVE-2023-357xx/CVE-2023-35701.json @@ -2,8 +2,9 @@ "id": "CVE-2023-35701", "sourceIdentifier": "security@apache.org", "published": "2024-05-03T09:15:07.587", - "lastModified": "2024-05-03T12:48:41.067", + "lastModified": "2024-07-03T01:40:17.900", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Vulnerabilidad de control inadecuado de generaci\u00f3n de c\u00f3digo (\"inyecci\u00f3n de c\u00f3digo\") en Apache Hive. La vulnerabilidad afecta al componente del controlador JDBC de Hive y potencialmente puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en la m\u00e1quina/endpoint que ejecuta el controlador JDBC (cliente). El usuario malintencionado debe tener permisos suficientes para especificar/editar URL de JDBC en un endpoint que dependa del controlador Hive JDBC y el proceso del cliente JDBC debe ejecutarse con un usuario privilegiado para explotar completamente la vulnerabilidad. El atacante puede configurar un servidor HTTP malicioso y especificar una URL JDBC que apunte hacia este servidor. Cuando se intenta una conexi\u00f3n JDBC, el servidor HTTP malicioso puede proporcionar una respuesta especial con un payload personalizado que puede desencadenar la ejecuci\u00f3n de ciertos comandos en el cliente JDBC. Este problema afecta a Apache Hive: desde 4.0.0-alpha-1 antes de 4.0.0. Se recomienda a los usuarios actualizar a la versi\u00f3n 4.0.0, que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35858.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35858.json index af8adbbb93d..a0a2b1746f9 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35858.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35858.json @@ -2,8 +2,9 @@ "id": "CVE-2023-35858", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-13T16:15:10.180", - "lastModified": "2024-06-13T18:35:19.777", + "lastModified": "2024-07-03T01:40:22.063", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Las vulnerabilidades de inyecci\u00f3n XPath en el blog y las funciones RSS de Modern Campus - Omni CMS 2023.1 permiten que un atacante remoto no autenticado obtenga informaci\u00f3n de la aplicaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-91" + } + ] + } + ], "references": [ { "url": "https://lp.constantcontactpages.com/cu/c2nSB5D/moderncampuscve", diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36053.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36053.json index 3703cbafb68..74a5338cdf6 100644 --- a/CVE-2023/CVE-2023-360xx/CVE-2023-36053.json +++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36053.json @@ -2,8 +2,9 @@ "id": "CVE-2023-36053", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-03T13:15:09.737", - "lastModified": "2024-04-20T03:15:06.487", + "lastModified": "2024-07-03T01:40:24.413", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -31,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -44,6 +65,16 @@ "value": "CWE-1333" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1333" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-362xx/CVE-2023-36268.json b/CVE-2023/CVE-2023-362xx/CVE-2023-36268.json index 75c44696c6a..cc4a9b7ff32 100644 --- a/CVE-2023/CVE-2023-362xx/CVE-2023-36268.json +++ b/CVE-2023/CVE-2023-362xx/CVE-2023-36268.json @@ -2,8 +2,9 @@ "id": "CVE-2023-36268", "sourceIdentifier": "security@documentfoundation.org", "published": "2024-04-30T18:15:19.730", - "lastModified": "2024-05-31T18:15:09.157", + "lastModified": "2024-07-03T01:40:25.423", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Un problema en The Document Foundation Libreoffice v.7.4.7 permite que un atacante remoto provoque una denegaci\u00f3n de servicio a trav\u00e9s de un archivo .ppt manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@documentfoundation.org", diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37057.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37057.json index a5ef97a56f7..3c2acd7f2b5 100644 --- a/CVE-2023/CVE-2023-370xx/CVE-2023-37057.json +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37057.json @@ -2,8 +2,9 @@ "id": "CVE-2023-37057", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-17T21:15:50.380", - "lastModified": "2024-06-20T12:44:22.977", + "lastModified": "2024-07-03T01:40:30.133", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en JLINK Unionman Technology Co. Ltd. Jlink AX1800 v.1.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del mecanismo de autenticaci\u00f3n del enrutador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-288" + } + ] + } + ], "references": [ { "url": "http://jlink.com", diff --git a/CVE-2023/CVE-2023-375xx/CVE-2023-37526.json b/CVE-2023/CVE-2023-375xx/CVE-2023-37526.json index 640ee4ec556..cab41ec38b2 100644 --- a/CVE-2023/CVE-2023-375xx/CVE-2023-37526.json +++ b/CVE-2023/CVE-2023-375xx/CVE-2023-37526.json @@ -2,8 +2,9 @@ "id": "CVE-2023-37526", "sourceIdentifier": "psirt@hcl.com", "published": "2024-05-14T13:20:18.717", - "lastModified": "2024-05-14T16:13:02.773", + "lastModified": "2024-07-03T01:40:35.700", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-942" + } + ] + } + ], "references": [ { "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0113032", diff --git a/CVE-2023/CVE-2023-382xx/CVE-2023-38290.json b/CVE-2023/CVE-2023-382xx/CVE-2023-38290.json index a91fa40440d..90d926c4cbf 100644 --- a/CVE-2023/CVE-2023-382xx/CVE-2023-38290.json +++ b/CVE-2023/CVE-2023-382xx/CVE-2023-38290.json @@ -2,8 +2,9 @@ "id": "CVE-2023-38290", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T15:15:46.657", - "lastModified": "2024-04-22T19:24:06.727", + "lastModified": "2024-07-03T01:40:42.817", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Ciertas versiones de software para los dispositivos Android BLU View 2 y Sharp Rouvo V contienen una aplicaci\u00f3n preinstalada vulnerable con un nombre de paquete com.evenwell.fqc (versionCode='9020801', versionName='9.0208.01'; versionCode='9020913 ', versionName='9.0209.13' ; versionCode='9021203', versionName='9.0212.03') que permite que aplicaciones locales de terceros ejecuten comandos de shell arbitrarios en su contexto (usuario del sistema) debido a un control de acceso inadecuado. No se necesitan permisos ni privilegios especiales para explotar la vulnerabilidad en la aplicaci\u00f3n com.evenwell.fqc. No se requiere ninguna interacci\u00f3n del usuario m\u00e1s all\u00e1 de instalar y ejecutar una aplicaci\u00f3n de terceros. La vulnerabilidad permite que las aplicaciones locales accedan a funciones confidenciales que generalmente est\u00e1n restringidas a aplicaciones preinstaladas, como realizar mediante programaci\u00f3n las siguientes acciones: otorgar permisos arbitrarios (que pueden usarse para obtener datos confidenciales del usuario), instalar aplicaciones arbitrarias, grabar videos de la pantalla, borrar el dispositivo (eliminar las aplicaciones y los datos del usuario), inyectar eventos de entrada arbitrarios, llamar a n\u00fameros de tel\u00e9fono de emergencia, deshabilitar aplicaciones, acceder a notificaciones y mucho m\u00e1s. Las huellas digitales de compilaci\u00f3n de software para cada dispositivo vulnerable confirmado son las siguientes: BLU View 2 (BLU/B131DL/B130DL:11/RP1A.200720.011/1672046950:user/release-keys, BLU/B131DL/B130DL:11/RP1A.200720.011/1663816427:user/release-keys, BLU/B131DL/B130DL:11/RP1A.200720.011/1656476696:user/release-keys, BLU/B131DL/B130DL:11/RP1A.200720.011/1647856638:user/release-keys) y Sharp Rouvo V (SHARP/VZW_STTM21VAPP/STTM21VAPP:12/SP1A.210812.016/1KN0_0_460:user/release-keys and SHARP/VZW_STTM21VAPP/STTM21VAPP:12/SP1A.210812.016/1KN0_0_530:user/release-keys). Esta aplicaci\u00f3n maliciosa inicia una actividad exportada llamada com.evenwell.fqc/.activity.ClickTest, bloquea la aplicaci\u00f3n com.evenwell.fqc enviando un Intent vac\u00edo (es decir, sin extras) al receptor com.evenwell.fqc/.FQCBroadcastReceiver componente, y luego env\u00eda comandos de shell arbitrarios al componente de servicio com.evenwell.fqc/.FQCService que los ejecuta con privilegios de \"sistema\"." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1263" + } + ] + } + ], "references": [ { "url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf", diff --git a/CVE-2023/CVE-2023-382xx/CVE-2023-38292.json b/CVE-2023/CVE-2023-382xx/CVE-2023-38292.json index 688e1f8524d..f1164c07ccf 100644 --- a/CVE-2023/CVE-2023-382xx/CVE-2023-38292.json +++ b/CVE-2023/CVE-2023-382xx/CVE-2023-38292.json @@ -2,8 +2,9 @@ "id": "CVE-2023-38292", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T15:15:46.763", - "lastModified": "2024-04-22T19:24:06.727", + "lastModified": "2024-07-03T01:40:43.677", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Ciertas versiones de software para el dispositivo Android TCL 20XE contienen una aplicaci\u00f3n vulnerable preinstalada con un nombre de paquete com.tct.gcs.hiddenmenuproxy (versionCode='2', versionName='v11.0.1.0.0201.0') que permite aplicaciones locales de terceros para realizar mediante programaci\u00f3n un restablecimiento de f\u00e1brica debido a un control de acceso inadecuado. No se necesitan permisos ni privilegios especiales para explotar la vulnerabilidad en la aplicaci\u00f3n com.tct.gcs.hiddenmenuproxy. No se requiere ninguna interacci\u00f3n del usuario m\u00e1s all\u00e1 de instalar y ejecutar una aplicaci\u00f3n de terceros. Las huellas digitales de compilaci\u00f3n de software para cada compilaci\u00f3n vulnerable confirmada son las siguientes: TCL/5087Z_BO/Doha_TMO:11/RP1A.200720.011/PB7I-0:user/release-keys and TCL/5087Z_BO/Doha_TMO:11/RP1A.200720.011/PB83-0:user/release-keys. Esta aplicaci\u00f3n maliciosa env\u00eda una intenci\u00f3n de transmisi\u00f3n al componente receptor exportado com.tct.gcs.hiddenmenuproxy/.rtn.FactoryResetReceiver, que inicia un restablecimiento de f\u00e1brica program\u00e1tico." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf", diff --git a/CVE-2023/CVE-2023-382xx/CVE-2023-38293.json b/CVE-2023/CVE-2023-382xx/CVE-2023-38293.json index d89352cc2ea..f76fa6769af 100644 --- a/CVE-2023/CVE-2023-382xx/CVE-2023-38293.json +++ b/CVE-2023/CVE-2023-382xx/CVE-2023-38293.json @@ -2,8 +2,9 @@ "id": "CVE-2023-38293", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T15:15:46.820", - "lastModified": "2024-04-22T19:24:06.727", + "lastModified": "2024-07-03T01:40:44.480", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Ciertas versiones de software para los dispositivos Android Nokia C200 y Nokia C100 contienen una aplicaci\u00f3n vulnerable preinstalada con un nombre de paquete de com.tracfone.tfstatus (versionCode='31', versionName='12') que permite aplicaciones locales de terceros. ejecutar comandos AT arbitrarios en su contexto (usuario de radio) mediante la inyecci\u00f3n de comandos AT debido a un control de acceso inadecuado y un filtrado de entrada inadecuado. No se necesitan permisos ni privilegios especiales para explotar la vulnerabilidad en la aplicaci\u00f3n com.tracfone.tfstatus. No se requiere ninguna interacci\u00f3n del usuario m\u00e1s all\u00e1 de instalar y ejecutar una aplicaci\u00f3n de terceros. Las huellas digitales de compilaci\u00f3n de software para cada dispositivo vulnerable confirmado son las siguientes: Nokia C200 (Nokia/Drake_02US/DRK:12/SP1A.210812.016/02US_1_080:user/release-keys and Nokia/Drake_02US/DRK:12/SP1A.210812.016/02US_1_040:user/release-keys) and Nokia C100 (Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_270:user/release-keys, Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_190:user/release-keys, Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_130:user/release-keys, Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_110:user/release-keys, Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_080:user/release-keys, and Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_050:user/release-keys). Esta aplicaci\u00f3n maliciosa env\u00eda una intenci\u00f3n de transmisi\u00f3n al componente receptor llamado com.tracfone.tfstatus/.TFStatus. Este receptor de transmisi\u00f3n extrae una cadena del Intent y la usa como extra cuando inicia el componente de actividad com.tracfone.tfstatus/.TFStatusActivity que usa la cadena controlada externamente como entrada para ejecutar un comando AT. Existen dos t\u00e9cnicas de inyecci\u00f3n diferentes para inyectar con \u00e9xito comandos AT arbitrarios para ejecutar." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf", diff --git a/CVE-2023/CVE-2023-382xx/CVE-2023-38295.json b/CVE-2023/CVE-2023-382xx/CVE-2023-38295.json index e82755456e9..f89244fbd58 100644 --- a/CVE-2023/CVE-2023-382xx/CVE-2023-38295.json +++ b/CVE-2023/CVE-2023-382xx/CVE-2023-38295.json @@ -2,8 +2,9 @@ "id": "CVE-2023-38295", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T15:15:46.937", - "lastModified": "2024-04-22T19:24:06.727", + "lastModified": "2024-07-03T01:40:45.300", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Ciertas versiones de software para los dispositivos Android TCL 30Z y TCL 10 contienen una aplicaci\u00f3n vulnerable preinstalada que depende de un permiso faltante que no proporciona protecci\u00f3n en tiempo de ejecuci\u00f3n. El permiso que falta es necesario como permiso de acceso para los componentes de varias aplicaciones preinstaladas. En el dispositivo TCL 30Z, la aplicaci\u00f3n vulnerable tiene un nombre de paquete de com.tcl.screenrecorder (versionCode='1221092802', versionName='v5.2120.02.12008.1.T'; versionCode='1221092805', versionName='v5.2120.02 .12008.2.T'). En el dispositivo TCL 10L, la aplicaci\u00f3n vulnerable tiene un nombre de paquete de com.tcl.sos (versionCode='2020102827', versionName='v3.2014.12.1012.B'). Cuando una aplicaci\u00f3n de terceros declara y solicita el permiso faltante, puede interactuar con ciertos componentes de servicio en las aplicaciones antes mencionadas (que se ejecutan con privilegios de \"sistema\") para realizar lecturas/escrituras de archivos arbitrarios en su contexto. Una aplicaci\u00f3n que aproveche esta vulnerabilidad solo necesita declarar y solicitar el \u00fanico permiso que falta y no se requiere ninguna interacci\u00f3n del usuario m\u00e1s all\u00e1 de instalar y ejecutar una aplicaci\u00f3n de terceros. Las huellas digitales de compilaci\u00f3n de software para cada dispositivo vulnerable confirmado son las siguientes: TCL 10L (TCL/T770B/T1_LITE:11/RKQ1.210107.001/8BIC:user/release-keys) and TCL 30Z (TCL/4188R/Jetta_ATT:12/SP1A.210812.016/LV8E:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU5P:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU61:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU66:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU68:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU6P:user/release-keys, and TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU6X:user/release-keys). Esta aplicaci\u00f3n maliciosa declara el permiso faltante denominado com.tct.smart.switchphone.permission.SWITCH_DATA como un permiso normal, solicita el permiso faltante y lo utiliza para interactuar con el componente de servicio com.tct.smart.switchdata.DataService que est\u00e1 declarado. en aplicaciones vulnerables que se ejecutan con privilegios de \"sistema\" para realizar lecturas/escrituras de archivos arbitrarios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf", diff --git a/CVE-2023/CVE-2023-382xx/CVE-2023-38296.json b/CVE-2023/CVE-2023-382xx/CVE-2023-38296.json index 6744ddd0765..47cb80ca8cd 100644 --- a/CVE-2023/CVE-2023-382xx/CVE-2023-38296.json +++ b/CVE-2023/CVE-2023-382xx/CVE-2023-38296.json @@ -2,8 +2,9 @@ "id": "CVE-2023-38296", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T15:15:46.990", - "lastModified": "2024-04-22T19:24:06.727", + "lastModified": "2024-07-03T01:40:46.110", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,50 @@ "value": "Varias compilaciones de software para los siguientes dispositivos TCL 30Z y TCL A3X filtran el ICCID a una propiedad del sistema a la que puede acceder cualquier aplicaci\u00f3n local en el dispositivo sin permisos ni privilegios especiales. Google restringi\u00f3 que las aplicaciones de terceros obtengan directamente identificadores de dispositivos no reiniciables en Android 10 y versiones posteriores, pero en estos casos se filtran mediante un proceso de alto privilegio y se pueden obtener indirectamente. Las huellas digitales de compilaci\u00f3n de software para cada dispositivo vulnerable confirmado son las siguientes: TCL 30Z (TCL/4188R/Jetta_ATT:12/SP1A.210812.016/LV8E:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU5P:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU61:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU66:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU68:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU6P:user/release-keys, and TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU6X:user/release-keys) and TCL A3X (TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vAAZ:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vAB3:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vAB7:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vABA:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vABM:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vABP:user/release-keys, and TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vABS:user/release-keys). Esta aplicaci\u00f3n maliciosa lee la propiedad del sistema \"persist.sys.tctPowerIccid\" para obtener indirectamente el ICCID." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + }, + { + "lang": "en", + "value": "CWE-266" + }, + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf", diff --git a/CVE-2023/CVE-2023-382xx/CVE-2023-38297.json b/CVE-2023/CVE-2023-382xx/CVE-2023-38297.json index 125435ad232..824b4c4e396 100644 --- a/CVE-2023/CVE-2023-382xx/CVE-2023-38297.json +++ b/CVE-2023/CVE-2023-382xx/CVE-2023-38297.json @@ -2,8 +2,9 @@ "id": "CVE-2023-38297", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T15:15:47.043", - "lastModified": "2024-04-22T19:24:06.727", + "lastModified": "2024-07-03T01:40:46.927", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en un componente com.factory.mmigroup de terceros, incluido en dispositivos de varios fabricantes. Ciertas versiones de software para varios dispositivos Android contienen una aplicaci\u00f3n preinstalada vulnerable con un nombre de paquete de com.factory.mmigroup (versionCode='3', versionName='2.1) que permite que las aplicaciones locales de terceros realicen diversas acciones, debido a control de acceso inadecuado, en su contexto (usuario del sistema), pero las funcionalidades expuestas dependen del dispositivo espec\u00edfico. Las siguientes capacidades est\u00e1n expuestas a aplicaciones de terceros sin permiso en los siguientes dispositivos: ejecuci\u00f3n de comandos AT arbitrarios mediante inyecci\u00f3n de comandos AT (T-Mobile Revvl 6 Pro 5G, T-Mobile Revvl V+ 5G y Boost Mobile Celero 5G); restablecimiento de f\u00e1brica program\u00e1tico (Samsung Galaxy A03S, T-Mobile Revvl 6 Pro 5G, T-Mobile Revvl V+ 5G, Boost Mobile Celero, Realme C25Y y Lenovo Tab M8 HD), fuga de IMEI (Samsung Galaxy A03S, T-Mobile Revvl 6 Pro 5G, T-Mobile Revvl V+ 5G, Boost Mobile Celero y Realme C25Y); n\u00famero de serie filtrado (Samsung Galaxy A03s, T-Mobile Revvl 6 Pro 5G, T-Mobile Revvl V+ 5G, Boost Mobile Celero, Realme C25Y y Lenovo Tab M8 HD); apagar el dispositivo (Realme C25Y, Samsung Galaxy A03S y T-Mobile Revvl 6 Pro 5G); y habilitar/deshabilitar mediante programaci\u00f3n el modo avi\u00f3n (Samsung Galaxy A03S, T-Mobile Revvl 6 Pro 5G, T-Mobile Revvl V+ 5G, Boost Mobile Celero y Realme C25Y); y habilitar Wi-Fi, Bluetooth y GPS (Samsung Galaxy A03S, T-Mobile Revvl 6 Pro 5G, T-Mobile Revvl V+ 5G, Boost Mobile Celero y Realme C25Y). No se necesitan permisos ni privilegios especiales para explotar las vulnerabilidades de la aplicaci\u00f3n com.factory.mmigroup. No se requiere ninguna interacci\u00f3n del usuario m\u00e1s all\u00e1 de instalar y ejecutar una aplicaci\u00f3n de terceros. Las huellas digitales de compilaci\u00f3n de software para cada dispositivo vulnerable confirmado son las siguientes: Boost Mobile Celero 5G (Celero5G/Jupiter/Jupiter:11/RP1A.200720.011/SW_S98119AA1_V067:user/release-keys, Celero5G/Jupiter/Jupiter:11/RP1A.200720.011/SW_S98119AA1_V064:user/release-keys, Celero5G/Jupiter/Jupiter:11/RP1A.200720.011/SW_S98119AA1_V061:user/release-keys, and Celero5G/Jupiter/Jupiter:11/RP1A.200720.011/SW_S98119AA1_V052:user/release-keys); Samsung Galaxy A03S (samsung/a03sutfn/a03su:13/TP1A.220624.014/S134DLUDU6CWB6:user/release-keys and samsung/a03sutfn/a03su:12/SP1A.210812.016/S134DLUDS5BWA1:user/release-keys); Lenovo Tab M8 HD (Lenovo/LenovoTB-8505F/8505F:10/QP1A.190711.020/S300637_220706_BMP:user/release-keys and Lenovo/LenovoTB-8505F/8505F:10/QP1A.190711.020/S300448_220114_BMP:user/release-keys); T-Mobile Revvl 6 Pro 5G (T-Mobile/Augusta/Augusta:12/SP1A.210812.016/SW_S98121AA1_V070:user/release-keys and T-Mobile/Augusta/Augusta:12/SP1A.210812.016/SW_S98121AA1_V066:user/release-keys); T-Mobile Revvl V+ 5G (T-Mobile/Sprout/Sprout:11/RP1A.200720.011/SW_S98115AA1_V077:user/release-keys and T-Mobile/Sprout/Sprout:11/RP1A.200720.011/SW_S98115AA1_V060:user/release-keys); and Realme C25Y (realme/RMX3269/RED8F6:11/RP1A.201005.001/1675861640000:user/release-keys, realme/RMX3269/RED8F6:11/RP1A.201005.001/1664031768000:user/release-keys, realme/RMX3269/RED8F6:11/RP1A.201005.001/1652814687000:user/release-keys, and realme/RMX3269/RED8F6:11/RP1A.201005.001/1635785712000:user/release-keys). Esta aplicaci\u00f3n maliciosa env\u00eda una intenci\u00f3n de transmisi\u00f3n a com.factory.mmigroup/.MMIGroupReceiver. Esto hace que la aplicaci\u00f3n com.factory.mmigroup se registre din\u00e1micamente para varias cadenas de acci\u00f3n. Luego, la aplicaci\u00f3n maliciosa puede enviar estas cadenas, lo que le permite realizar diversos comportamientos que expone la aplicaci\u00f3n com.factory.mmigroup. Los comportamientos reales expuestos por la aplicaci\u00f3n com.factory.mmigroup dependen del modelo del dispositivo y del chipset. La aplicaci\u00f3n com.factory.mmigroup se ejecuta como usuario del \"sistema\", lo que le permite interactuar con el procesador de banda base y realizar otras acciones sensibles." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf", diff --git a/CVE-2023/CVE-2023-382xx/CVE-2023-38298.json b/CVE-2023/CVE-2023-382xx/CVE-2023-38298.json index 4c500512f30..65a8d9111f0 100644 --- a/CVE-2023/CVE-2023-382xx/CVE-2023-38298.json +++ b/CVE-2023/CVE-2023-382xx/CVE-2023-38298.json @@ -2,8 +2,9 @@ "id": "CVE-2023-38298", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T15:15:47.100", - "lastModified": "2024-04-22T19:24:06.727", + "lastModified": "2024-07-03T01:40:47.743", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,50 @@ "value": "Varias compilaciones de software para los siguientes dispositivos TCL (30Z, A3X, 20XE, 10L) filtran el IMEI del dispositivo a una propiedad del sistema a la que puede acceder cualquier aplicaci\u00f3n local en el dispositivo sin permisos ni privilegios especiales. Google restringi\u00f3 que las aplicaciones de terceros obtengan directamente identificadores de dispositivos no reiniciables en Android 10 y versiones posteriores, pero en estos casos se filtran mediante un proceso de alto privilegio y se pueden obtener indirectamente. Las huellas digitales de compilaci\u00f3n de software para cada dispositivo vulnerable confirmado son las siguientes: TCL 30Z (TCL/4188R/Jetta_ATT:12/SP1A.210812.016/LV8E:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU5P:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU61:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU66:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU68:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU6P:user/release-keys, and TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU6X:user/release-keys); TCL A3X (TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vAAZ:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vAB3:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vAB7:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vABA:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vABM:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vABP:user/release-keys, and TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vABS:user/release-keys); TCL 20XE (TCL/5087Z_BO/Doha_TMO:11/RP1A.200720.011/PB7I-0:user/release-keys and TCL/5087Z_BO/Doha_TMO:11/RP1A.200720.011/PB83-0:user/release-keys); and TCL 10L (TCL/T770B/T1_LITE:10/QKQ1.200329.002/3CJ0:user/release-keys and TCL/T770B/T1_LITE:11/RKQ1.210107.001/8BIC:user/release-keys). Esta aplicaci\u00f3n maliciosa lee la propiedad del sistema \"gsm.device.imei0\" para obtener indirectamente el IMEI del dispositivo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + }, + { + "lang": "en", + "value": "CWE-280" + }, + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf", diff --git a/CVE-2023/CVE-2023-383xx/CVE-2023-38300.json b/CVE-2023/CVE-2023-383xx/CVE-2023-38300.json index 978e1f4dd74..725f06cb2dc 100644 --- a/CVE-2023/CVE-2023-383xx/CVE-2023-38300.json +++ b/CVE-2023/CVE-2023-383xx/CVE-2023-38300.json @@ -2,8 +2,9 @@ "id": "CVE-2023-38300", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T15:15:47.210", - "lastModified": "2024-04-22T19:24:06.727", + "lastModified": "2024-07-03T01:40:48.550", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Cierta compilaci\u00f3n de software para el dispositivo Orbic Maui (Orbic/RC545L/RC545L:10/ORB545L_V1.4.2_BVZPP/230106:user/release-keys) filtra el IMEI y el ICCID a las propiedades del sistema a las que puede acceder cualquier aplicaci\u00f3n local en el dispositivo sin ning\u00fan permiso o privilegio especial. Google restringi\u00f3 que las aplicaciones de terceros obtengan directamente identificadores de dispositivos no reiniciables en Android 10 y versiones posteriores, pero en este caso se filtran mediante un proceso de alto privilegio y se pueden obtener indirectamente. Esta aplicaci\u00f3n maliciosa lee la propiedad del sistema \"persist.sys.verizon_test_plan_imei\" para obtener indirectamente el IMEI y lee la propiedad del sistema \"persist.sys.verizon_test_plan_iccid\" para obtener el ICCID." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf", diff --git a/CVE-2023/CVE-2023-383xx/CVE-2023-38301.json b/CVE-2023/CVE-2023-383xx/CVE-2023-38301.json index 19ef68ff44c..f1ae5baa532 100644 --- a/CVE-2023/CVE-2023-383xx/CVE-2023-38301.json +++ b/CVE-2023/CVE-2023-383xx/CVE-2023-38301.json @@ -2,8 +2,9 @@ "id": "CVE-2023-38301", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T15:15:47.257", - "lastModified": "2024-04-22T19:24:06.727", + "lastModified": "2024-07-03T01:40:49.340", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en un componente de terceros relacionado con seller.gsm.serial, incluido en dispositivos de varios fabricantes. Varias compilaciones de software para los dispositivos BLU View 2, Boost Mobile Celero 5G, Sharp Rouvo V, Motorola Moto G Pure, Motorola Moto G Power, T-Mobile Revvl 6 Pro 5G y T-Mobile Revvl V+ 5G filtran el n\u00famero de serie del dispositivo a una propiedad del sistema a la que puede acceder cualquier aplicaci\u00f3n local en el dispositivo sin ning\u00fan permiso ni privilegio especial. Google restringi\u00f3 que las aplicaciones de terceros obtengan directamente identificadores de dispositivos no reiniciables en Android 10 y versiones posteriores, pero en estos casos se filtran mediante un proceso de alto privilegio y se pueden obtener indirectamente. Las huellas digitales de compilaci\u00f3n de software para cada dispositivo vulnerable confirmado son las siguientes: BLU View 2 (BLU/B131DL/B130DL:11/RP1A.200720.011/1672046950:user/release-keys); Boost Mobile Celero 5G (Celero5G/Jupiter/Jupiter:11/RP1A.200720.011/SW_S98119AA1_V067:user/release-keys); Sharp Rouvo V (SHARP/VZW_STTM21VAPP/STTM21VAPP:12/SP1A.210812.016/1KN0_0_530:user/release-keys); Motorola Moto G Pure (motorola/ellis_trac/ellis:11/RRHS31.Q3-46-110-2/74844:user/release-keys, motorola/ellis_trac/ellis:11/RRHS31.Q3-46-110-7/5cde8:user/release-keys, motorola/ellis_trac/ellis:11/RRHS31.Q3-46-110-10/d67faa:user/release-keys, motorola/ellis_trac/ellis:11/RRHS31.Q3-46-110-13/b4a29:user/release-keys, motorola/ellis_trac/ellis:12/S3RH32.20-42-10/1c2540:user/release-keys, motorola/ellis_trac/ellis:12/S3RHS32.20-42-13-2-1/6368dd:user/release-keys, motorola/ellis_a/ellis:11/RRH31.Q3-46-50-2/20fec:user/release-keys, motorola/ellis_vzw/ellis:11/RRH31.Q3-46-138/103bd:user/release-keys, motorola/ellis_vzw/ellis:11/RRHS31.Q3-46-138-2/e5502:user/release-keys, and motorola/ellis_vzw/ellis:12/S3RHS32.20-42-10-14-2/5e0b0:user/release-keys); Motorola Moto G Power (motorola/tonga_g/tonga:11/RRQ31.Q3-68-16-2/e5877:user/release-keys and motorola/tonga_g/tonga:12/S3RQS32.20-42-10-6/f876d3:user/release-keys); T-Mobile Revvl 6 Pro 5G (T-Mobile/Augusta/Augusta:12/SP1A.210812.016/SW_S98121AA1_V070:user/release-keys); and T-Mobile Revvl V+ 5G (T-Mobile/Sprout/Sprout:11/RP1A.200720.011/SW_S98115AA1_V077:user/release-keys). Esta aplicaci\u00f3n maliciosa lee la propiedad del sistema \"vendor.gsm.serial\" para obtener indirectamente el n\u00famero de serie del dispositivo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.4, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf", diff --git a/CVE-2023/CVE-2023-384xx/CVE-2023-38407.json b/CVE-2023/CVE-2023-384xx/CVE-2023-38407.json index 76a2abd269d..758961ab868 100644 --- a/CVE-2023/CVE-2023-384xx/CVE-2023-38407.json +++ b/CVE-2023/CVE-2023-384xx/CVE-2023-38407.json @@ -2,8 +2,9 @@ "id": "CVE-2023-38407", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-06T06:15:40.907", - "lastModified": "2024-04-28T07:15:08.463", + "lastModified": "2024-07-03T01:40:51.010", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-384xx/CVE-2023-38420.json b/CVE-2023/CVE-2023-384xx/CVE-2023-38420.json index 7ba2cc1ac99..cb0f31652a9 100644 --- a/CVE-2023/CVE-2023-384xx/CVE-2023-38420.json +++ b/CVE-2023/CVE-2023-384xx/CVE-2023-38420.json @@ -2,8 +2,9 @@ "id": "CVE-2023-38420", "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:15:52.510", - "lastModified": "2024-05-17T18:36:31.297", + "lastModified": "2024-07-03T01:40:51.333", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-754" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-703" + } + ] } ], "references": [ diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38581.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38581.json index 2c7c7cc9d8c..944049aeb9e 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38581.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38581.json @@ -2,8 +2,9 @@ "id": "CVE-2023-38581", "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:15:52.717", - "lastModified": "2024-05-17T18:36:05.263", + "lastModified": "2024-07-03T01:40:52.577", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "references": [ diff --git a/CVE-2023/CVE-2023-388xx/CVE-2023-38831.json b/CVE-2023/CVE-2023-388xx/CVE-2023-38831.json index b86d5616c13..b8ad229fd18 100644 --- a/CVE-2023/CVE-2023-388xx/CVE-2023-38831.json +++ b/CVE-2023/CVE-2023-388xx/CVE-2023-38831.json @@ -2,8 +2,9 @@ "id": "CVE-2023-38831", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-23T17:15:43.863", - "lastModified": "2024-06-27T18:47:24.473", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:40:53.693", + "vulnStatus": "Modified", + "cveTags": [], "cisaExploitAdd": "2023-08-24", "cisaActionDue": "2023-09-14", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-351" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-398xx/CVE-2023-39852.json b/CVE-2023/CVE-2023-398xx/CVE-2023-39852.json index 1b258c0d914..7659adc5309 100644 --- a/CVE-2023/CVE-2023-398xx/CVE-2023-39852.json +++ b/CVE-2023/CVE-2023-398xx/CVE-2023-39852.json @@ -2,8 +2,16 @@ "id": "CVE-2023-39852", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-15T21:15:09.907", - "lastModified": "2024-06-04T19:17:37.793", + "lastModified": "2024-07-03T01:40:59.320", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -35,6 +43,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -48,6 +76,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3972.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3972.json index 9861e132e08..320a6a22165 100644 --- a/CVE-2023/CVE-2023-39xx/CVE-2023-3972.json +++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3972.json @@ -2,8 +2,9 @@ "id": "CVE-2023-3972", "sourceIdentifier": "secalert@redhat.com", "published": "2023-11-01T16:15:08.517", - "lastModified": "2023-11-09T19:40:56.750", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:41:02.753", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -78,6 +79,16 @@ "value": "CWE-379" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-379" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-400xx/CVE-2023-40070.json b/CVE-2023/CVE-2023-400xx/CVE-2023-40070.json index fb90e151d90..39a2e9ddafc 100644 --- a/CVE-2023/CVE-2023-400xx/CVE-2023-40070.json +++ b/CVE-2023/CVE-2023-400xx/CVE-2023-40070.json @@ -2,8 +2,9 @@ "id": "CVE-2023-40070", "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:15:53.633", - "lastModified": "2024-05-17T18:36:05.263", + "lastModified": "2024-07-03T01:41:03.770", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-284" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1220" + } + ] } ], "references": [ diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40155.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40155.json index ead343679c3..0f18476ec1e 100644 --- a/CVE-2023/CVE-2023-401xx/CVE-2023-40155.json +++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40155.json @@ -2,8 +2,9 @@ "id": "CVE-2023-40155", "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:15:54.060", - "lastModified": "2024-05-17T18:36:05.263", + "lastModified": "2024-07-03T01:41:05.087", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,20 @@ "value": "CWE-427" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + }, + { + "lang": "en", + "value": "CWE-427" + } + ] } ], "references": [ diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40297.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40297.json index 431a98b8b1f..a496879ab47 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40297.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40297.json @@ -2,8 +2,9 @@ "id": "CVE-2023-40297", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-15T20:15:08.767", - "lastModified": "2024-05-16T13:03:05.353", + "lastModified": "2024-07-03T01:41:05.987", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Stakater Forecastle 1.0.139 y anteriores permite el directory traversal %5C../ en el componente del sitio web." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://github.com/sahar042/CVE-2023-40297", diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4065.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4065.json index b7150e43b70..e13a5082df5 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4065.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4065.json @@ -2,8 +2,9 @@ "id": "CVE-2023-4065", "sourceIdentifier": "secalert@redhat.com", "published": "2023-09-27T15:19:39.947", - "lastModified": "2023-11-07T04:22:04.953", + "lastModified": "2024-07-03T01:42:41.460", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -78,6 +79,16 @@ "value": "CWE-117" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-117" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-411xx/CVE-2023-41102.json b/CVE-2023/CVE-2023-411xx/CVE-2023-41102.json index e31af845442..238a28c27dc 100644 --- a/CVE-2023/CVE-2023-411xx/CVE-2023-41102.json +++ b/CVE-2023/CVE-2023-411xx/CVE-2023-41102.json @@ -2,8 +2,9 @@ "id": "CVE-2023-41102", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-17T06:15:34.180", - "lastModified": "2024-06-20T18:15:11.333", + "lastModified": "2024-07-03T01:41:11.897", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-401" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41993.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41993.json index c4c3cce6fe8..3f7ff7663ab 100644 --- a/CVE-2023/CVE-2023-419xx/CVE-2023-41993.json +++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41993.json @@ -2,8 +2,9 @@ "id": "CVE-2023-41993", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-21T19:15:11.660", - "lastModified": "2024-05-23T17:51:57.663", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:41:20.690", + "vulnStatus": "Modified", + "cveTags": [], "cisaExploitAdd": "2023-09-25", "cisaActionDue": "2023-10-16", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", @@ -39,6 +40,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4132.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4132.json index 11965c6c46b..18c8e1f0330 100644 --- a/CVE-2023/CVE-2023-41xx/CVE-2023-4132.json +++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4132.json @@ -2,8 +2,9 @@ "id": "CVE-2023-4132", "sourceIdentifier": "secalert@redhat.com", "published": "2023-08-03T15:15:32.833", - "lastModified": "2024-02-07T22:15:08.790", + "lastModified": "2024-07-03T01:42:42.327", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -74,6 +75,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-424xx/CVE-2023-42427.json b/CVE-2023/CVE-2023-424xx/CVE-2023-42427.json index 27074ad74ad..66b87c26cf5 100644 --- a/CVE-2023/CVE-2023-424xx/CVE-2023-42427.json +++ b/CVE-2023/CVE-2023-424xx/CVE-2023-42427.json @@ -2,8 +2,9 @@ "id": "CVE-2023-42427", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-06-03T04:15:08.830", - "lastModified": "2024-06-03T14:46:24.250", + "lastModified": "2024-07-03T01:41:29.597", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Existe una vulnerabilidad de cross-site scripting en UNIVERSAL PASSPORT RX versiones 1.0.0 a 1.0.7, que puede permitir que un atacante remoto autenticado ejecute un script arbitrario en el navegador web del usuario que est\u00e1 utilizando el producto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/jp/JVN43215077/", diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42757.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42757.json index 02f9f8c2c3e..3b2ba6607ce 100644 --- a/CVE-2023/CVE-2023-427xx/CVE-2023-42757.json +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42757.json @@ -2,8 +2,9 @@ "id": "CVE-2023-42757", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T18:15:08.033", - "lastModified": "2024-05-07T20:07:58.737", + "lastModified": "2024-07-03T01:41:30.683", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Process Explorer anterior a 17.04 permite a los atacantes hacerlo funcionalmente no disponible (una denegaci\u00f3n de servicio para an\u00e1lisis) cambiando el nombre de un archivo ejecutable a un nuevo nombre sin extensi\u00f3n de 255 caracteres y ejecut\u00e1ndolo con NtCreateUserProcess. Esto puede ocurrir debido a un problema en el manejo de errores de wcscat_s." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.6, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://github.com/SafeBreach-Labs/MagicDot", diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42773.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42773.json index eddbbe99307..e2dae19fb2d 100644 --- a/CVE-2023/CVE-2023-427xx/CVE-2023-42773.json +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42773.json @@ -2,8 +2,9 @@ "id": "CVE-2023-42773", "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:15:55.723", - "lastModified": "2024-05-17T18:36:05.263", + "lastModified": "2024-07-03T01:41:31.007", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-707" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-707" + } + ] } ], "references": [ diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42916.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42916.json index 06513700a61..2f1d096a2f1 100644 --- a/CVE-2023/CVE-2023-429xx/CVE-2023-42916.json +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42916.json @@ -2,8 +2,9 @@ "id": "CVE-2023-42916", "sourceIdentifier": "product-security@apple.com", "published": "2023-11-30T23:15:07.223", - "lastModified": "2024-06-26T20:00:49.967", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:41:31.913", + "vulnStatus": "Modified", + "cveTags": [], "cisaExploitAdd": "2023-12-04", "cisaActionDue": "2023-12-25", "cisaRequiredAction": "Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.", @@ -39,6 +40,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -52,6 +73,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42931.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42931.json index ae566bb264e..c04b4e3f4b4 100644 --- a/CVE-2023/CVE-2023-429xx/CVE-2023-42931.json +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42931.json @@ -2,8 +2,9 @@ "id": "CVE-2023-42931", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-28T16:15:08.153", - "lastModified": "2024-04-08T22:47:13.533", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:41:32.827", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 8.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.5 } ] }, @@ -48,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-280" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42955.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42955.json index 0a988342cfb..19ca9a2447f 100644 --- a/CVE-2023/CVE-2023-429xx/CVE-2023-42955.json +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42955.json @@ -2,8 +2,9 @@ "id": "CVE-2023-42955", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T13:46:21.790", - "lastModified": "2024-05-14T16:13:02.773", + "lastModified": "2024-07-03T01:41:33.800", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Claris International ha resuelto con \u00e9xito un problema de exposici\u00f3n potencial de la informaci\u00f3n de la contrase\u00f1a a sitios web de front-end al iniciar sesi\u00f3n en la Consola de administraci\u00f3n con una funci\u00f3n de administrador. Este problema se solucion\u00f3 en FileMaker Server 20.3.1 eliminando el env\u00edo de contrase\u00f1as de la funci\u00f3n de administrador en el socket de Node.js." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.6, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-257" + } + ] + } + ], "references": [ { "url": "https://support.claris.com/s/article/Administrator-role-passwords-being-exposed-when-logged-into-the-Admin-Console?language=en_US", diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4233.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4233.json index 853d720c958..c4c3bac4b38 100644 --- a/CVE-2023/CVE-2023-42xx/CVE-2023-4233.json +++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4233.json @@ -2,8 +2,9 @@ "id": "CVE-2023-4233", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-04-17T23:15:07.163", - "lastModified": "2024-04-18T13:04:28.900", + "lastModified": "2024-07-03T01:42:43.300", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-119" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "references": [ diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4234.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4234.json index c7489dda14c..13930e28f34 100644 --- a/CVE-2023/CVE-2023-42xx/CVE-2023-4234.json +++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4234.json @@ -2,8 +2,9 @@ "id": "CVE-2023-4234", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-04-17T23:15:07.330", - "lastModified": "2024-04-18T13:04:28.900", + "lastModified": "2024-07-03T01:42:44.060", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-119" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "references": [ diff --git a/CVE-2023/CVE-2023-430xx/CVE-2023-43090.json b/CVE-2023/CVE-2023-430xx/CVE-2023-43090.json index 845db95194c..d9bde845fcc 100644 --- a/CVE-2023/CVE-2023-430xx/CVE-2023-43090.json +++ b/CVE-2023/CVE-2023-430xx/CVE-2023-43090.json @@ -2,8 +2,9 @@ "id": "CVE-2023-43090", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2023-09-22T06:15:09.810", - "lastModified": "2023-09-26T13:10:22.500", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:41:35.037", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -68,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-432xx/CVE-2023-43208.json b/CVE-2023/CVE-2023-432xx/CVE-2023-43208.json index affd42fc0b9..9f59b10a179 100644 --- a/CVE-2023/CVE-2023-432xx/CVE-2023-43208.json +++ b/CVE-2023/CVE-2023-432xx/CVE-2023-43208.json @@ -2,8 +2,9 @@ "id": "CVE-2023-43208", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-26T17:15:09.033", - "lastModified": "2024-05-23T19:54:02.490", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:41:35.797", + "vulnStatus": "Modified", + "cveTags": [], "cisaExploitAdd": "2024-05-20", "cisaActionDue": "2024-06-10", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", @@ -39,6 +40,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -52,6 +73,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43745.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43745.json index 7ac812165a3..e0627c727ad 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43745.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43745.json @@ -2,8 +2,9 @@ "id": "CVE-2023-43745", "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:15:56.363", - "lastModified": "2024-05-17T18:36:05.263", + "lastModified": "2024-07-03T01:41:38.710", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "references": [ diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43770.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43770.json index 22153eb7454..d933ed93ebf 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43770.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43770.json @@ -2,8 +2,9 @@ "id": "CVE-2023-43770", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-22T06:15:10.090", - "lastModified": "2024-02-13T02:00:01.627", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:41:39.790", + "vulnStatus": "Modified", + "cveTags": [], "cisaExploitAdd": "2024-02-12", "cisaActionDue": "2024-03-04", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", @@ -39,6 +40,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -52,6 +73,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-438xx/CVE-2023-43845.json b/CVE-2023/CVE-2023-438xx/CVE-2023-43845.json index ff2a866ee4a..57112c1a8cf 100644 --- a/CVE-2023/CVE-2023-438xx/CVE-2023-43845.json +++ b/CVE-2023/CVE-2023-438xx/CVE-2023-43845.json @@ -2,8 +2,9 @@ "id": "CVE-2023-43845", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T19:15:09.403", - "lastModified": "2024-05-29T13:02:09.280", + "lastModified": "2024-07-03T01:41:41.020", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Aten PE6208 2.3.228 y 2.4.232 tienen credenciales predeterminadas para la cuenta telnet privilegiada. No se solicita al usuario que cambie las credenciales despu\u00e9s de iniciar sesi\u00f3n por primera vez. Si no se modifica, los atacantes pueden iniciar sesi\u00f3n en la consola telnet y obtener privilegios de administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://github.com/setersora/pe6208", diff --git a/CVE-2023/CVE-2023-448xx/CVE-2023-44857.json b/CVE-2023/CVE-2023-448xx/CVE-2023-44857.json index 65d76ca54a5..a34b5d7cb9d 100644 --- a/CVE-2023/CVE-2023-448xx/CVE-2023-44857.json +++ b/CVE-2023/CVE-2023-448xx/CVE-2023-44857.json @@ -2,8 +2,9 @@ "id": "CVE-2023-44857", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-12T04:15:09.060", - "lastModified": "2024-04-12T12:43:46.210", + "lastModified": "2024-07-03T01:41:47.663", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en Cobham SAILOR VSAT Ku v.164B019 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado para la funci\u00f3n sub_21D24 en el componente acu_web." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://pine-amphibian-9b9.notion.site/SAILOR-Ku-Software-RCE-and-Privilege-Escalation-Statistics-report-b8e953249468429d9f60b89ff653847a", diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45217.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45217.json index 4c5178ee0fd..4ee27dbd7d5 100644 --- a/CVE-2023/CVE-2023-452xx/CVE-2023-45217.json +++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45217.json @@ -2,8 +2,9 @@ "id": "CVE-2023-45217", "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:15:56.987", - "lastModified": "2024-05-17T18:36:05.263", + "lastModified": "2024-07-03T01:41:49.660", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-284" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1220" + } + ] } ], "references": [ diff --git a/CVE-2023/CVE-2023-453xx/CVE-2023-45315.json b/CVE-2023/CVE-2023-453xx/CVE-2023-45315.json index 4e824020a30..162db1caf02 100644 --- a/CVE-2023/CVE-2023-453xx/CVE-2023-45315.json +++ b/CVE-2023/CVE-2023-453xx/CVE-2023-45315.json @@ -2,8 +2,9 @@ "id": "CVE-2023-45315", "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:15:57.413", - "lastModified": "2024-05-17T18:36:05.263", + "lastModified": "2024-07-03T01:41:50.760", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-665" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-707" + } + ] } ], "references": [ diff --git a/CVE-2023/CVE-2023-453xx/CVE-2023-45320.json b/CVE-2023/CVE-2023-453xx/CVE-2023-45320.json index 753b8bc5a4d..b2236f828ef 100644 --- a/CVE-2023/CVE-2023-453xx/CVE-2023-45320.json +++ b/CVE-2023/CVE-2023-453xx/CVE-2023-45320.json @@ -2,8 +2,9 @@ "id": "CVE-2023-45320", "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:15:57.637", - "lastModified": "2024-05-17T18:36:05.263", + "lastModified": "2024-07-03T01:41:51.467", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,20 @@ "value": "CWE-427" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + }, + { + "lang": "en", + "value": "CWE-427" + } + ] } ], "references": [ diff --git a/CVE-2023/CVE-2023-453xx/CVE-2023-45360.json b/CVE-2023/CVE-2023-453xx/CVE-2023-45360.json index eac808596fd..692a6b0a40b 100644 --- a/CVE-2023/CVE-2023-453xx/CVE-2023-45360.json +++ b/CVE-2023/CVE-2023-453xx/CVE-2023-45360.json @@ -2,8 +2,9 @@ "id": "CVE-2023-45360", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-03T05:15:30.730", - "lastModified": "2024-06-10T17:16:13.783", + "lastModified": "2024-07-03T01:41:52.177", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-453xx/CVE-2023-45385.json b/CVE-2023/CVE-2023-453xx/CVE-2023-45385.json index 33b8d251e6d..18ba0d1b965 100644 --- a/CVE-2023/CVE-2023-453xx/CVE-2023-45385.json +++ b/CVE-2023/CVE-2023-453xx/CVE-2023-45385.json @@ -2,8 +2,9 @@ "id": "CVE-2023-45385", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T15:15:51.270", - "lastModified": "2024-04-30T17:52:35.057", + "lastModified": "2024-07-03T01:41:53.003", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "ProQuality pqprintshippinglabels anterior a v.4.15.0 es vulnerable a Directory Traversal a trav\u00e9s del m\u00f3dulo pqprintshippinglabels." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://addons.prestashop.com/en/preparation-shipping/16885-print-shipping-labels-pro-address-direct-print.html#overview_description", diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45707.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45707.json index adeb3bd4061..e733f256b02 100644 --- a/CVE-2023/CVE-2023-457xx/CVE-2023-45707.json +++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45707.json @@ -2,8 +2,9 @@ "id": "CVE-2023-45707", "sourceIdentifier": "psirt@hcl.com", "published": "2024-06-08T15:15:49.680", - "lastModified": "2024-06-10T02:52:08.267", + "lastModified": "2024-07-03T01:41:54.823", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0108427", diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45846.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45846.json index a9b0de28820..996476e4e5d 100644 --- a/CVE-2023/CVE-2023-458xx/CVE-2023-45846.json +++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45846.json @@ -2,8 +2,9 @@ "id": "CVE-2023-45846", "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:15:58.930", - "lastModified": "2024-05-17T18:36:05.263", + "lastModified": "2024-07-03T01:41:56.303", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-459" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-459" + } + ] } ], "references": [ diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45924.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45924.json index bae2561a424..65ba1323fcf 100644 --- a/CVE-2023/CVE-2023-459xx/CVE-2023-45924.json +++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45924.json @@ -2,7 +2,7 @@ "id": "CVE-2023-45924", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-27T05:15:47.263", - "lastModified": "2024-07-02T04:15:02.707", + "lastModified": "2024-07-03T01:41:57.447", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -22,7 +22,46 @@ "value": "Se descubri\u00f3 que libglxproto.c en OpenGL libglvnd bb06db5a conten\u00eda una infracci\u00f3n de segmentaci\u00f3n a trav\u00e9s de la funci\u00f3n glXGetDrawableScreen(). NOTA: esto est\u00e1 en disputa porque no hay situaciones comunes en las que los usuarios requieran una operaci\u00f3n ininterrumpida con un servidor controlador de atacante." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + }, + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jan/52", diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45925.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45925.json index 48048b3175e..da931ca7d24 100644 --- a/CVE-2023/CVE-2023-459xx/CVE-2023-45925.json +++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45925.json @@ -2,8 +2,16 @@ "id": "CVE-2023-45925", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-27T05:15:47.320", - "lastModified": "2024-06-04T19:17:49.370", + "lastModified": "2024-07-03T01:41:58.250", "vulnStatus": "Awaiting Analysis", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -15,6 +23,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jan/53", diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46012.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46012.json index c25cdae6207..9f8140bfd50 100644 --- a/CVE-2023/CVE-2023-460xx/CVE-2023-46012.json +++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46012.json @@ -2,8 +2,9 @@ "id": "CVE-2023-46012", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T14:15:10.003", - "lastModified": "2024-05-07T20:07:58.737", + "lastModified": "2024-07-03T01:41:58.970", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Vulnerabilidad de desbordamiento de b\u00fafer LINKSYS EA7500 3.0.1.207964 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud HTTP al IGD UPnP." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://github.com/dest-3/CVE-2023-46012/tree/main", diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46060.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46060.json index 65363a048f4..ab0261f3b0b 100644 --- a/CVE-2023/CVE-2023-460xx/CVE-2023-46060.json +++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46060.json @@ -2,8 +2,9 @@ "id": "CVE-2023-46060", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T16:15:07.333", - "lastModified": "2024-04-17T16:51:07.347", + "lastModified": "2024-07-03T01:41:59.363", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Una vulnerabilidad de desbordamiento de b\u00fafer en Tenda AC500 v.2.0.1.9 permite a un atacante remoto provocar una denegaci\u00f3n de servicio a trav\u00e9s del par\u00e1metro de puerto en el componente goform/setVlanInfo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://github.com/peris-navince/founded-0-days/blob/main/Tenda/ac500/fromSetVlanInfo/1.md", diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46295.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46295.json index a5a65823421..1d10c6b6487 100644 --- a/CVE-2023/CVE-2023-462xx/CVE-2023-46295.json +++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46295.json @@ -2,8 +2,9 @@ "id": "CVE-2023-46295", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T20:15:12.330", - "lastModified": "2024-05-02T13:27:25.103", + "lastModified": "2024-07-03T01:42:00.680", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en Teledyne FLIR M300 2.00-19. Puede ocurrir una ejecuci\u00f3n remota de c\u00f3digo no autenticado en el servidor web. Un atacante puede aprovechar esto enviando una solicitud POST a la p\u00e1gina PHP vulnerable. Un atacante puede elevar los permisos a root con Sudo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], "references": [ { "url": "https://gitlab.com/loudmouth-security/vulnerability-disclosures/cve-2023-46295", diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46304.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46304.json index 9b30fa4116d..66cf2c99d72 100644 --- a/CVE-2023/CVE-2023-463xx/CVE-2023-46304.json +++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46304.json @@ -2,8 +2,9 @@ "id": "CVE-2023-46304", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T13:15:46.763", - "lastModified": "2024-04-30T17:52:35.057", + "lastModified": "2024-07-03T01:42:01.507", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "module/Users/models/Module.php en Vtiger CRM 7.5.0 permite que un atacante remoto autenticado ejecute c\u00f3digo PHP arbitrario porque un endpoint desprotegido le permite escribir este c\u00f3digo en el archivo config.inc.php (ejecutado en cada carga de p\u00e1gina) ." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] + } + ], "references": [ { "url": "https://code.vtiger.com/vtiger/vtigercrm/-/blob/master/modules/Users/models/Module.php", diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46316.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46316.json index 74daec2a7e5..f215e88e6cb 100644 --- a/CVE-2023/CVE-2023-463xx/CVE-2023-46316.json +++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46316.json @@ -2,8 +2,9 @@ "id": "CVE-2023-46316", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T18:17:37.610", - "lastModified": "2024-01-22T17:15:08.997", + "lastModified": "2024-07-03T01:42:02.420", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -48,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-234" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46360.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46360.json index 2e2174668dd..160481d4c91 100644 --- a/CVE-2023/CVE-2023-463xx/CVE-2023-46360.json +++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46360.json @@ -2,8 +2,9 @@ "id": "CVE-2023-46360", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-06T01:15:07.930", - "lastModified": "2024-02-13T18:13:03.937", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:42:03.253", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-250" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46566.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46566.json index 06cdce14eb5..894f8e4aa3b 100644 --- a/CVE-2023/CVE-2023-465xx/CVE-2023-46566.json +++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46566.json @@ -2,8 +2,9 @@ "id": "CVE-2023-46566", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T21:15:47.483", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-07-03T01:42:04.097", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de desbordamiento de b\u00fafer en el commit tftpy de msoulier 467017b844bf6e31745138a30e2509145b0c529c permite a un atacante remoto provocar una denegaci\u00f3n de servicio a trav\u00e9s de la funci\u00f3n de an\u00e1lisis en la clase TftpPacketFactory." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/msoulier/tftpy/issues/140", diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46689.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46689.json index 2732238ed46..be1bc10df37 100644 --- a/CVE-2023/CVE-2023-466xx/CVE-2023-46689.json +++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46689.json @@ -2,8 +2,9 @@ "id": "CVE-2023-46689", "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:15:59.353", - "lastModified": "2024-05-17T18:36:05.263", + "lastModified": "2024-07-03T01:42:05.130", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-707" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-707" + } + ] } ], "references": [ diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46691.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46691.json index a86e5979441..8e045c589d9 100644 --- a/CVE-2023/CVE-2023-466xx/CVE-2023-46691.json +++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46691.json @@ -2,8 +2,9 @@ "id": "CVE-2023-46691", "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:15:59.590", - "lastModified": "2024-05-17T18:36:05.263", + "lastModified": "2024-07-03T01:42:05.847", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "references": [ diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46694.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46694.json index 959459daead..e607f1ffe83 100644 --- a/CVE-2023/CVE-2023-466xx/CVE-2023-46694.json +++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46694.json @@ -2,8 +2,9 @@ "id": "CVE-2023-46694", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T20:16:20.743", - "lastModified": "2024-05-29T13:02:09.280", + "lastModified": "2024-07-03T01:42:06.570", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vtenext 21.02 permite a un atacante autenticado cargar archivos arbitrarios, lo que potencialmente le permite ejecutar comandos remotos. Esta falla existe debido a que la aplicaci\u00f3n no aplica los controles de autenticaci\u00f3n adecuados al acceder a la funcionalidad del administrador de archivos de Ckeditor." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://github.com/invisiblebyte/CVE-2023-46694", diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46806.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46806.json index d5fae409e06..c0aee84ac33 100644 --- a/CVE-2023/CVE-2023-468xx/CVE-2023-46806.json +++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46806.json @@ -2,8 +2,9 @@ "id": "CVE-2023-46806", "sourceIdentifier": "support@hackerone.com", "published": "2024-05-22T23:15:08.050", - "lastModified": "2024-05-24T01:15:30.977", + "lastModified": "2024-07-03T01:42:07.793", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-EPMM-May-2024?language=en_US", diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46807.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46807.json index 1f73e246533..7a270e74609 100644 --- a/CVE-2023/CVE-2023-468xx/CVE-2023-46807.json +++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46807.json @@ -2,8 +2,9 @@ "id": "CVE-2023-46807", "sourceIdentifier": "support@hackerone.com", "published": "2024-05-22T23:15:08.340", - "lastModified": "2024-05-24T01:15:30.977", + "lastModified": "2024-07-03T01:42:08.520", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-EPMM-May-2024?language=en_US", diff --git a/CVE-2023/CVE-2023-471xx/CVE-2023-47169.json b/CVE-2023/CVE-2023-471xx/CVE-2023-47169.json index 283c08b4d1d..aed45f84f21 100644 --- a/CVE-2023/CVE-2023-471xx/CVE-2023-47169.json +++ b/CVE-2023/CVE-2023-471xx/CVE-2023-47169.json @@ -2,8 +2,9 @@ "id": "CVE-2023-47169", "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:16:00.010", - "lastModified": "2024-05-17T18:36:05.263", + "lastModified": "2024-07-03T01:42:09.907", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-92" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "references": [ diff --git a/CVE-2023/CVE-2023-472xx/CVE-2023-47210.json b/CVE-2023/CVE-2023-472xx/CVE-2023-47210.json index 4a4112c87e4..ee1db409d8a 100644 --- a/CVE-2023/CVE-2023-472xx/CVE-2023-47210.json +++ b/CVE-2023/CVE-2023-472xx/CVE-2023-47210.json @@ -2,8 +2,9 @@ "id": "CVE-2023-47210", "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:16:00.223", - "lastModified": "2024-05-17T18:36:05.263", + "lastModified": "2024-07-03T01:42:10.710", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "references": [ diff --git a/CVE-2023/CVE-2023-472xx/CVE-2023-47235.json b/CVE-2023/CVE-2023-472xx/CVE-2023-47235.json index 499197f7a49..4e38e1a298e 100644 --- a/CVE-2023/CVE-2023-472xx/CVE-2023-47235.json +++ b/CVE-2023/CVE-2023-472xx/CVE-2023-47235.json @@ -2,8 +2,9 @@ "id": "CVE-2023-47235", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-03T21:15:17.470", - "lastModified": "2024-04-28T07:15:08.770", + "lastModified": "2024-07-03T01:42:11.777", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 4.7 } ] }, diff --git a/CVE-2023/CVE-2023-472xx/CVE-2023-47282.json b/CVE-2023/CVE-2023-472xx/CVE-2023-47282.json index 7403a4189d5..c4b5ff91957 100644 --- a/CVE-2023/CVE-2023-472xx/CVE-2023-47282.json +++ b/CVE-2023/CVE-2023-472xx/CVE-2023-47282.json @@ -2,8 +2,9 @@ "id": "CVE-2023-47282", "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:16:00.423", - "lastModified": "2024-05-17T18:36:05.263", + "lastModified": "2024-07-03T01:42:12.093", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "references": [ diff --git a/CVE-2023/CVE-2023-474xx/CVE-2023-47435.json b/CVE-2023/CVE-2023-474xx/CVE-2023-47435.json index 896ca071d27..31f826ca764 100644 --- a/CVE-2023/CVE-2023-474xx/CVE-2023-47435.json +++ b/CVE-2023/CVE-2023-474xx/CVE-2023-47435.json @@ -2,8 +2,9 @@ "id": "CVE-2023-47435", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T18:15:08.817", - "lastModified": "2024-04-19T18:29:53.040", + "lastModified": "2024-07-03T01:42:12.810", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en la funci\u00f3n verificarPassword de hexo-theme-matery v2.0.0 permite a los atacantes eludir la autenticaci\u00f3n y acceder a p\u00e1ginas protegidas con contrase\u00f1a." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-294" + } + ] + } + ], "references": [ { "url": "https://github.com/blinkfox/hexo-theme-matery/issues/897", diff --git a/CVE-2023/CVE-2023-476xx/CVE-2023-47678.json b/CVE-2023/CVE-2023-476xx/CVE-2023-47678.json index ab946639236..6b7dc9c0f00 100644 --- a/CVE-2023/CVE-2023-476xx/CVE-2023-47678.json +++ b/CVE-2023/CVE-2023-476xx/CVE-2023-47678.json @@ -2,8 +2,16 @@ "id": "CVE-2023-47678", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-11-15T02:15:06.800", - "lastModified": "2024-06-04T19:17:51.097", + "lastModified": "2024-07-03T01:42:14.340", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "vultures@jpcert.or.jp", + "tags": [ + "unsupported-when-assigned" + ] + } + ], "descriptions": [ { "lang": "en", @@ -48,6 +56,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4762.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4762.json index 5d16adbfcee..b6e33160a14 100644 --- a/CVE-2023/CVE-2023-47xx/CVE-2023-4762.json +++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4762.json @@ -2,8 +2,9 @@ "id": "CVE-2023-4762", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-09-05T22:15:09.677", - "lastModified": "2024-06-10T16:13:42.487", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:42:46.600", + "vulnStatus": "Modified", + "cveTags": [], "cisaExploitAdd": "2024-02-06", "cisaActionDue": "2024-02-27", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", @@ -39,6 +40,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -52,6 +73,16 @@ "value": "CWE-843" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-480xx/CVE-2023-48022.json b/CVE-2023/CVE-2023-480xx/CVE-2023-48022.json index 563f306c423..26129eac943 100644 --- a/CVE-2023/CVE-2023-480xx/CVE-2023-48022.json +++ b/CVE-2023/CVE-2023-480xx/CVE-2023-48022.json @@ -2,8 +2,16 @@ "id": "CVE-2023-48022", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-28T08:15:06.910", - "lastModified": "2024-06-12T21:15:49.817", + "lastModified": "2024-07-03T01:42:17.167", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -35,6 +43,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -48,6 +76,16 @@ "value": "CWE-918" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-481xx/CVE-2023-48183.json b/CVE-2023/CVE-2023-481xx/CVE-2023-48183.json index 830e049bbc6..8aeb6198138 100644 --- a/CVE-2023/CVE-2023-481xx/CVE-2023-48183.json +++ b/CVE-2023/CVE-2023-481xx/CVE-2023-48183.json @@ -2,8 +2,9 @@ "id": "CVE-2023-48183", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-23T07:15:42.730", - "lastModified": "2024-04-23T12:52:09.397", + "lastModified": "2024-07-03T01:42:18.010", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "QuickJS anterior a c4cdd61 tiene una desreferencia de puntero NULL build_for_in_iterator debido a un alcance l\u00e9xico err\u00f3neo de \"this\" con eval." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://github.com/bellard/quickjs/commit/c4cdd61a3ed284cd760faf6b00bbf0cb908da077", diff --git a/CVE-2023/CVE-2023-481xx/CVE-2023-48184.json b/CVE-2023/CVE-2023-481xx/CVE-2023-48184.json index 4df727ca292..10de7523283 100644 --- a/CVE-2023/CVE-2023-481xx/CVE-2023-48184.json +++ b/CVE-2023/CVE-2023-481xx/CVE-2023-48184.json @@ -2,8 +2,9 @@ "id": "CVE-2023-48184", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-23T07:15:42.840", - "lastModified": "2024-04-23T12:52:09.397", + "lastModified": "2024-07-03T01:42:18.813", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "QuickJS anterior a 7414e5f tiene un use-after-free de Quickjs.h JS_FreeValueRT debido a una recolecci\u00f3n de basura incorrecta de funciones as\u00edncronas con cierres." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 3.9, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.5, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://github.com/bellard/quickjs/issues/198", diff --git a/CVE-2023/CVE-2023-483xx/CVE-2023-48368.json b/CVE-2023/CVE-2023-483xx/CVE-2023-48368.json index 53ab006f917..8ec08f257f8 100644 --- a/CVE-2023/CVE-2023-483xx/CVE-2023-48368.json +++ b/CVE-2023/CVE-2023-483xx/CVE-2023-48368.json @@ -2,8 +2,9 @@ "id": "CVE-2023-48368", "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:16:01.077", - "lastModified": "2024-05-17T18:36:05.263", + "lastModified": "2024-07-03T01:42:20.450", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "references": [ diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48727.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48727.json index 7196fe50fc7..975597f34bc 100644 --- a/CVE-2023/CVE-2023-487xx/CVE-2023-48727.json +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48727.json @@ -2,8 +2,9 @@ "id": "CVE-2023-48727", "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:16:01.433", - "lastModified": "2024-05-17T18:36:05.263", + "lastModified": "2024-07-03T01:42:22.043", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-395" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-395" + } + ] } ], "references": [ diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48792.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48792.json index deb7b2d0c1f..139d4f740f5 100644 --- a/CVE-2023/CVE-2023-487xx/CVE-2023-48792.json +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48792.json @@ -2,8 +2,9 @@ "id": "CVE-2023-48792", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-02T02:15:16.590", - "lastModified": "2024-02-09T19:41:33.093", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:42:23.563", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48793.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48793.json index 7ec071c76ea..ecc0c085fda 100644 --- a/CVE-2023/CVE-2023-487xx/CVE-2023-48793.json +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48793.json @@ -2,8 +2,9 @@ "id": "CVE-2023-48793", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-02T02:15:16.637", - "lastModified": "2024-02-09T19:40:42.787", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:42:24.367", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-488xx/CVE-2023-48865.json b/CVE-2023/CVE-2023-488xx/CVE-2023-48865.json index 994523de1a4..78839e11bc3 100644 --- a/CVE-2023/CVE-2023-488xx/CVE-2023-48865.json +++ b/CVE-2023/CVE-2023-488xx/CVE-2023-48865.json @@ -2,8 +2,9 @@ "id": "CVE-2023-48865", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-11T22:15:13.687", - "lastModified": "2024-04-12T12:43:57.400", + "lastModified": "2024-07-03T01:42:25.237", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema descubierto en Reportico Till 8.1.0 permite a los atacantes obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro enable_mode de la URL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/aashiqahamedn/39383cfbc639cbdc3e1a7d74b977aeae", diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49110.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49110.json index 10ac0857ae3..cc23e2f902b 100644 --- a/CVE-2023/CVE-2023-491xx/CVE-2023-49110.json +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49110.json @@ -2,8 +2,9 @@ "id": "CVE-2023-49110", "sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf", "published": "2024-06-20T13:15:49.250", - "lastModified": "2024-06-20T16:07:50.417", + "lastModified": "2024-07-03T01:42:26.413", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Cuando Kiuwan Local Analyzer carga los resultados del escaneo en la aplicaci\u00f3n web Kiuwan SAST (ya sea local o en la nube/soluci\u00f3n SaaS), los datos transmitidos constan de un archivo ZIP que contiene varios archivos, algunos de ellos en formato de archivo XML. Durante el procesamiento del lado del servidor de estos archivos XML por parte de Kiuwan, resuelve entidades XML externas, lo que resulta en un ataque de inyecci\u00f3n de entidades externas XML. Un atacante con privilegios para escanear el c\u00f3digo fuente dentro del m\u00f3dulo \"C\u00f3digo de seguridad\" puede extraer cualquier archivo del sistema operativo con los derechos del usuario del servidor de aplicaciones y potencialmente puede obtener archivos confidenciales, como configuraci\u00f3n y contrase\u00f1as. Adem\u00e1s, esta vulnerabilidad tambi\u00e9n permite a un atacante iniciar conexiones a sistemas internos, por ejemplo, para escanear puertos o acceder a otras funciones/aplicaciones internas, como la consola de administraci\u00f3n Wildfly de Kiuwan. Este problema afecta a Kiuwan SAST: " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "551230f0-3615-47bd-b7cc-93e92e730bbf", diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49111.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49111.json index f41f00d2e61..0b41063d144 100644 --- a/CVE-2023/CVE-2023-491xx/CVE-2023-49111.json +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49111.json @@ -2,8 +2,9 @@ "id": "CVE-2023-49111", "sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf", "published": "2024-06-20T13:15:49.380", - "lastModified": "2024-06-20T16:07:50.417", + "lastModified": "2024-07-03T01:42:26.627", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Para las instalaciones de Kiuwan con SSO (inicio de sesi\u00f3n \u00fanico) habilitado, se puede realizar un ataque de Cross Site Scripting reflejado no autenticado en la p\u00e1gina de inicio de sesi\u00f3n \"login.html\". Esto es posible debido a que los valores de \"mensaje\" del par\u00e1metro de solicitud se incluyen directamente en un bloque de JavaScript en la respuesta. Esto es especialmente cr\u00edtico en entornos empresariales que utilizan autenticaci\u00f3n AD SSO, por ejemplo, a trav\u00e9s de ADFS, donde los atacantes podr\u00edan potencialmente robar contrase\u00f1as de AD. Este problema afecta a Kiuwan SAST: " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "551230f0-3615-47bd-b7cc-93e92e730bbf", diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49112.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49112.json index 44ee4634549..74fd3f3940a 100644 --- a/CVE-2023/CVE-2023-491xx/CVE-2023-49112.json +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49112.json @@ -2,8 +2,9 @@ "id": "CVE-2023-49112", "sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf", "published": "2024-06-20T13:15:49.480", - "lastModified": "2024-06-20T16:07:50.417", + "lastModified": "2024-07-03T01:42:26.830", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Kiuwan proporciona un endpoint API /saas/rest/v1/info/application para obtener informaci\u00f3n sobre cualquier aplicaci\u00f3n, proporcionando solo su nombre a trav\u00e9s del par\u00e1metro \"application\". Este endpoint carece de mecanismos de control de acceso adecuados, lo que permite a otros usuarios autenticados leer informaci\u00f3n sobre las aplicaciones, aunque no se les hayan otorgado los derechos necesarios para hacerlo. Este problema afecta a Kiuwan SAST: " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], "references": [ { "url": "https://r.sec-consult.com/kiuwan", diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49113.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49113.json index c8e514b0034..17dc22ef4f1 100644 --- a/CVE-2023/CVE-2023-491xx/CVE-2023-49113.json +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49113.json @@ -2,8 +2,9 @@ "id": "CVE-2023-49113", "sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf", "published": "2024-06-20T13:15:49.560", - "lastModified": "2024-06-20T16:07:50.417", + "lastModified": "2024-07-03T01:42:27.633", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "La aplicaci\u00f3n de escaneo Java Kiuwan Local Analyzer (KLA) contiene varios secretos codificados en formato de texto plano. En algunos casos, esto puede comprometer potencialmente la confidencialidad de los resultados del an\u00e1lisis. Se encontraron varias credenciales en los archivos JAR del Kiuwan Local Analyzer. El archivo JAR \"lib.engine/insight/optimyth-insight.jar\" contiene el archivo \"InsightServicesConfig.properties\", que tiene los tokens de configuraci\u00f3n \"insight.github.user\" y \"insight.github.password\" precargados con credenciales. . Al menos el nombre de usuario especificado corresponde a una cuenta de GitHub v\u00e1lida. El archivo JAR \"lib.engine/insight/optimyth-insight.jar\" tambi\u00e9n contiene el archivo \"es/als/security/Encryptor.properties\", en el que se encuentra la clave utilizada para cifrar los resultados de cualquier an\u00e1lisis realizado. Este problema afecta a Kiuwan SAST: " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "551230f0-3615-47bd-b7cc-93e92e730bbf", diff --git a/CVE-2023/CVE-2023-492xx/CVE-2023-49224.json b/CVE-2023/CVE-2023-492xx/CVE-2023-49224.json index 585dd2ffb61..c101d4898a1 100644 --- a/CVE-2023/CVE-2023-492xx/CVE-2023-49224.json +++ b/CVE-2023/CVE-2023-492xx/CVE-2023-49224.json @@ -2,8 +2,9 @@ "id": "CVE-2023-49224", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-07T20:15:10.747", - "lastModified": "2024-06-10T02:52:08.267", + "lastModified": "2024-07-03T01:42:28.180", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La consola con pantalla t\u00e1ctil P62, P80 y P82 de Precor contiene una clave p\u00fablica SSH predeterminada en el archivo authorized_keys. Un atacante remoto podr\u00eda utilizar esta clave para obtener privilegios de root." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://securityintelligence.com/x-force/internet-connected-treadmill-vulnerabilities-discovered/", diff --git a/CVE-2023/CVE-2023-493xx/CVE-2023-49330.json b/CVE-2023/CVE-2023-493xx/CVE-2023-49330.json index bdc4d87d609..8179e6eab36 100644 --- a/CVE-2023/CVE-2023-493xx/CVE-2023-49330.json +++ b/CVE-2023/CVE-2023-493xx/CVE-2023-49330.json @@ -2,8 +2,9 @@ "id": "CVE-2023-49330", "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", "published": "2024-05-20T13:15:23.483", - "lastModified": "2024-05-20T18:15:09.137", + "lastModified": "2024-07-03T01:42:29.057", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://www.manageengine.com/products/active-directory-audit/sqlfix-7271.html", diff --git a/CVE-2023/CVE-2023-493xx/CVE-2023-49331.json b/CVE-2023/CVE-2023-493xx/CVE-2023-49331.json index 282f5e75e9e..b3468fd0b79 100644 --- a/CVE-2023/CVE-2023-493xx/CVE-2023-49331.json +++ b/CVE-2023/CVE-2023-493xx/CVE-2023-49331.json @@ -2,8 +2,9 @@ "id": "CVE-2023-49331", "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", "published": "2024-05-20T18:15:09.237", - "lastModified": "2024-05-20T19:34:58.277", + "lastModified": "2024-07-03T01:42:29.803", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://www.manageengine.com/products/active-directory-audit/sqlfix-7271.html", diff --git a/CVE-2023/CVE-2023-493xx/CVE-2023-49332.json b/CVE-2023/CVE-2023-493xx/CVE-2023-49332.json index dceb14b41a8..99d7af3266d 100644 --- a/CVE-2023/CVE-2023-493xx/CVE-2023-49332.json +++ b/CVE-2023/CVE-2023-493xx/CVE-2023-49332.json @@ -2,8 +2,9 @@ "id": "CVE-2023-49332", "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", "published": "2024-05-20T18:15:09.440", - "lastModified": "2024-05-20T19:34:58.277", + "lastModified": "2024-07-03T01:42:30.520", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://www.manageengine.com/products/active-directory-audit/sqlfix-7271.html", diff --git a/CVE-2023/CVE-2023-493xx/CVE-2023-49333.json b/CVE-2023/CVE-2023-493xx/CVE-2023-49333.json index 5fa8aeff166..bb79648ceef 100644 --- a/CVE-2023/CVE-2023-493xx/CVE-2023-49333.json +++ b/CVE-2023/CVE-2023-493xx/CVE-2023-49333.json @@ -2,8 +2,9 @@ "id": "CVE-2023-49333", "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", "published": "2024-05-20T18:15:09.630", - "lastModified": "2024-05-20T19:34:58.277", + "lastModified": "2024-07-03T01:42:31.230", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://www.manageengine.com/products/active-directory-audit/sqlfix-7271.html", diff --git a/CVE-2023/CVE-2023-493xx/CVE-2023-49334.json b/CVE-2023/CVE-2023-493xx/CVE-2023-49334.json index 06f0744a55e..ec43e4bd8ee 100644 --- a/CVE-2023/CVE-2023-493xx/CVE-2023-49334.json +++ b/CVE-2023/CVE-2023-493xx/CVE-2023-49334.json @@ -2,8 +2,9 @@ "id": "CVE-2023-49334", "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", "published": "2024-05-20T18:15:09.827", - "lastModified": "2024-05-20T19:34:58.277", + "lastModified": "2024-07-03T01:42:31.940", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://www.manageengine.com/products/active-directory-audit/sqlfix-7271.html", diff --git a/CVE-2023/CVE-2023-493xx/CVE-2023-49335.json b/CVE-2023/CVE-2023-493xx/CVE-2023-49335.json index 35cee49b007..113c18ab5c7 100644 --- a/CVE-2023/CVE-2023-493xx/CVE-2023-49335.json +++ b/CVE-2023/CVE-2023-493xx/CVE-2023-49335.json @@ -2,8 +2,9 @@ "id": "CVE-2023-49335", "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", "published": "2024-05-20T18:15:10.017", - "lastModified": "2024-05-20T19:34:58.277", + "lastModified": "2024-07-03T01:42:32.677", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://www.manageengine.com/products/active-directory-audit/sqlfix-7271.html", diff --git a/CVE-2023/CVE-2023-494xx/CVE-2023-49473.json b/CVE-2023/CVE-2023-494xx/CVE-2023-49473.json index 6b86c2f2ee9..585a9cdc3e3 100644 --- a/CVE-2023/CVE-2023-494xx/CVE-2023-49473.json +++ b/CVE-2023/CVE-2023-494xx/CVE-2023-49473.json @@ -2,8 +2,9 @@ "id": "CVE-2023-49473", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T19:15:22.980", - "lastModified": "2024-04-30T19:35:36.960", + "lastModified": "2024-07-03T01:42:33.563", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La versi\u00f3n de firmware V1.2.0 de Shenzhen JF6000 Cloud Media Collaboration Processing Platform V2.0.0 compilaci\u00f3n 6245 son vulnerables a un control de acceso incorrecto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://github.com/Hack404-007/cves-info/blob/main/JF6000-exp", diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49501.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49501.json index 73789d8e8d4..e52766f3f65 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49501.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49501.json @@ -2,8 +2,9 @@ "id": "CVE-2023-49501", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T17:15:51.787", - "lastModified": "2024-06-10T18:15:23.307", + "lastModified": "2024-07-03T01:42:34.367", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de desbordamiento de b\u00fafer en Ffmpeg v.n6.1-3-g466799d4f5 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n config_eq_output en el componente libavfilter/asrc_afirsrc.c:495:30." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://github.com/FFmpeg/FFmpeg", diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49502.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49502.json index 75a2ac040c1..9e0ce434551 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49502.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49502.json @@ -2,8 +2,9 @@ "id": "CVE-2023-49502", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T17:15:51.850", - "lastModified": "2024-06-10T18:15:23.440", + "lastModified": "2024-07-03T01:42:35.263", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de desbordamiento de b\u00fafer en Ffmpeg v.n6.1-3-g466799d4f5 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n ff_bwdif_filter_intra_c en el componente libavfilter/bwdifdsp.c:125:5." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/FFmpeg/FFmpeg", diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49515.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49515.json index 13060bd74a1..a7e79aa2eb6 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49515.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49515.json @@ -2,8 +2,9 @@ "id": "CVE-2023-49515", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-17T02:15:06.957", - "lastModified": "2024-01-24T16:48:09.680", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:42:36.150", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 } ] }, @@ -48,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49528.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49528.json index c6d13f5abcf..cb114664dc0 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49528.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49528.json @@ -2,8 +2,9 @@ "id": "CVE-2023-49528", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-12T06:15:06.320", - "lastModified": "2024-06-10T18:15:23.510", + "lastModified": "2024-07-03T01:42:36.973", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de desbordamiento de b\u00fafer en FFmpeg versi\u00f3n n6.1-3-g466799d4f5, permite a un atacante local ejecutar c\u00f3digo arbitrario y provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de af_dialoguenhance.c:261:5 en el componente de_stereo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/", diff --git a/CVE-2023/CVE-2023-496xx/CVE-2023-49614.json b/CVE-2023/CVE-2023-496xx/CVE-2023-49614.json index c124225cc5b..10cc94c22ff 100644 --- a/CVE-2023/CVE-2023-496xx/CVE-2023-49614.json +++ b/CVE-2023/CVE-2023-496xx/CVE-2023-49614.json @@ -2,8 +2,9 @@ "id": "CVE-2023-49614", "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:16:01.647", - "lastModified": "2024-05-17T18:36:05.263", + "lastModified": "2024-07-03T01:42:38.460", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "references": [ diff --git a/CVE-2023/CVE-2023-500xx/CVE-2023-50007.json b/CVE-2023/CVE-2023-500xx/CVE-2023-50007.json index 5aef65e73f4..97746ffbbe2 100644 --- a/CVE-2023/CVE-2023-500xx/CVE-2023-50007.json +++ b/CVE-2023/CVE-2023-500xx/CVE-2023-50007.json @@ -2,8 +2,9 @@ "id": "CVE-2023-50007", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T17:15:51.957", - "lastModified": "2024-06-10T18:15:23.583", + "lastModified": "2024-07-03T01:42:48.353", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de desbordamiento de b\u00fafer en Ffmpeg v.n6.1-3-g466799d4f5 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n av_samples_set_silence en el componente libavutil/samplefmt.c:260:9." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/FFmpeg/FFmpeg/commit/b1942734c7cbcdc9034034373abcc9ecb9644c47", diff --git a/CVE-2023/CVE-2023-500xx/CVE-2023-50009.json b/CVE-2023/CVE-2023-500xx/CVE-2023-50009.json index a2cfcdc1d37..b37f803f5da 100644 --- a/CVE-2023/CVE-2023-500xx/CVE-2023-50009.json +++ b/CVE-2023/CVE-2023-500xx/CVE-2023-50009.json @@ -2,8 +2,9 @@ "id": "CVE-2023-50009", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T17:15:52.070", - "lastModified": "2024-06-10T18:15:23.723", + "lastModified": "2024-07-03T01:42:49.137", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de desbordamiento de b\u00fafer en Ffmpeg v.n6.1-3-g466799d4f5 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n ff_gaussian_blur_8 en el componente libavfilter/edge_template.c:116:5." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://ffmpeg.org/", diff --git a/CVE-2023/CVE-2023-500xx/CVE-2023-50010.json b/CVE-2023/CVE-2023-500xx/CVE-2023-50010.json index eec3c01dbe6..bdbb85b9da7 100644 --- a/CVE-2023/CVE-2023-500xx/CVE-2023-50010.json +++ b/CVE-2023/CVE-2023-500xx/CVE-2023-50010.json @@ -2,8 +2,9 @@ "id": "CVE-2023-50010", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T17:15:52.127", - "lastModified": "2024-06-10T18:15:23.783", + "lastModified": "2024-07-03T01:42:49.940", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de desbordamiento de b\u00fafer en Ffmpeg v.n6.1-3-g466799d4f5 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n set_encoder_id en el componente /fftools/ffmpeg_enc.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://ffmpeg.org/", diff --git a/CVE-2023/CVE-2023-500xx/CVE-2023-50029.json b/CVE-2023/CVE-2023-500xx/CVE-2023-50029.json index 6c0e6fb6111..9723b35ad16 100644 --- a/CVE-2023/CVE-2023-500xx/CVE-2023-50029.json +++ b/CVE-2023/CVE-2023-500xx/CVE-2023-50029.json @@ -2,8 +2,9 @@ "id": "CVE-2023-50029", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-24T23:15:10.157", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T01:42:50.713", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n de PHP en el m\u00f3dulo \"M4 PDF Extensions\" (m4pdf) hasta la versi\u00f3n 3.3.2 de PrestaAddons para PrestaShop permite a los atacantes ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s del m\u00e9todo M4PDF::saveTemplate()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 10.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://security.friendsofpresta.org/modules/2024/06/20/m4pdf.html", diff --git a/CVE-2023/CVE-2023-504xx/CVE-2023-50445.json b/CVE-2023/CVE-2023-504xx/CVE-2023-50445.json index 9737b07c02a..ed7b44f06bf 100644 --- a/CVE-2023/CVE-2023-504xx/CVE-2023-50445.json +++ b/CVE-2023/CVE-2023-504xx/CVE-2023-50445.json @@ -2,8 +2,9 @@ "id": "CVE-2023-50445", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-28T05:15:08.427", - "lastModified": "2024-01-24T16:15:08.313", + "lastModified": "2024-07-03T01:42:57.717", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50915.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50915.json index fbbea1baef0..bec6bffec92 100644 --- a/CVE-2023/CVE-2023-509xx/CVE-2023-50915.json +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50915.json @@ -2,8 +2,9 @@ "id": "CVE-2023-50915", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T14:15:10.887", - "lastModified": "2024-04-30T17:52:35.057", + "lastModified": "2024-07-03T01:42:59.473", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Existe un problema en GalaxyClientService.exe en GOG Galaxy (Beta) 2.0.67.2 a 2.0.71.2 que podr\u00eda permitir a los usuarios autenticados sobrescribir y da\u00f1ar archivos cr\u00edticos del sistema a trav\u00e9s de una combinaci\u00f3n de una uni\u00f3n NTFS y un enlace simb\u00f3lico del Administrador de objetos RPC y podr\u00eda resultar en una denegaci\u00f3n de servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://github.com/anvilsecure/gog-galaxy-app-research", diff --git a/CVE-2023/CVE-2023-512xx/CVE-2023-51258.json b/CVE-2023/CVE-2023-512xx/CVE-2023-51258.json index 2eb7c31b84e..fce521629b2 100644 --- a/CVE-2023/CVE-2023-512xx/CVE-2023-51258.json +++ b/CVE-2023/CVE-2023-512xx/CVE-2023-51258.json @@ -2,8 +2,9 @@ "id": "CVE-2023-51258", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-18T21:15:08.293", - "lastModified": "2024-01-25T01:58:44.797", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:43:00.690", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-401" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-514xx/CVE-2023-51436.json b/CVE-2023/CVE-2023-514xx/CVE-2023-51436.json index b54f71afea6..1f9016b2f26 100644 --- a/CVE-2023/CVE-2023-514xx/CVE-2023-51436.json +++ b/CVE-2023/CVE-2023-514xx/CVE-2023-51436.json @@ -2,8 +2,9 @@ "id": "CVE-2023-51436", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-06-03T04:15:09.287", - "lastModified": "2024-06-03T14:46:24.250", + "lastModified": "2024-07-03T01:43:03.210", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Existe una vulnerabilidad de cross-site scripting en las versiones 1.0.0 a 1.0.8 de UNIVERSAL PASSPORT RX, que puede permitir que un atacante remoto autenticado con privilegios administrativos ejecute un script arbitrario en el navegador web del usuario que est\u00e1 utilizando el producto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://jvn.jp/en/jp/JVN43215077/", diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51710.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51710.json index 10b2966bb60..fe611ffac09 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51710.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51710.json @@ -2,8 +2,9 @@ "id": "CVE-2023-51710", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T19:15:19.663", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-07-03T01:43:17.330", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "EMS SQL Manager 3.6.2 (compilaci\u00f3n 55333) para Oracle permite el secuestro de DLL: un usuario puede desencadenar la ejecuci\u00f3n de c\u00f3digo arbitrario cada vez que se ejecuta el producto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], "references": [ { "url": "https://excellium-services.com/cert-xlm-advisory/CVE-2023-51710", diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51750.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51750.json index d79eb0fe296..c51311e60ed 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51750.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51750.json @@ -2,8 +2,16 @@ "id": "CVE-2023-51750", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-11T14:15:44.230", - "lastModified": "2024-06-12T20:15:10.907", + "lastModified": "2024-07-03T01:43:18.250", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -48,6 +56,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-286" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51791.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51791.json index e967c74237c..3cca0440a75 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51791.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51791.json @@ -2,8 +2,9 @@ "id": "CVE-2023-51791", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T17:15:52.183", - "lastModified": "2024-06-10T18:15:24.107", + "lastModified": "2024-07-03T01:43:19.107", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La vulnerabilidad de desbordamiento de b\u00fafer en Ffmpeg v.N113007-g8d24a28d06 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de libavcodec/jpegxl_parser.c en gen_alias_map." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://ffmpeg.org/", diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51792.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51792.json index f970f46ef9b..0fc30eb35b0 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51792.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51792.json @@ -2,8 +2,9 @@ "id": "CVE-2023-51792", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T17:15:52.240", - "lastModified": "2024-06-10T18:15:24.167", + "lastModified": "2024-07-03T01:43:19.913", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La vulnerabilidad de desbordamiento de b\u00fafer en libde265 v1.0.12 permite que un atacante local provoque una denegaci\u00f3n de servicio a trav\u00e9s de un tama\u00f1o de asignaci\u00f3n que excede el tama\u00f1o m\u00e1ximo admitido de 0x10000000000." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/strukturag/libde265", diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51793.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51793.json index 0a188b2238d..2c139a466be 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51793.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51793.json @@ -2,8 +2,9 @@ "id": "CVE-2023-51793", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T17:15:52.297", - "lastModified": "2024-06-10T18:15:24.273", + "lastModified": "2024-07-03T01:43:20.733", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de desbordamiento de b\u00fafer en Ffmpeg v.N113007-g8d24a28d06 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de libavutil/imgutils.c:353:9 en image_copy_plane." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://ffmpeg.org/", diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51795.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51795.json index 3f6b4605aa0..03febbf8296 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51795.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51795.json @@ -2,8 +2,9 @@ "id": "CVE-2023-51795", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T17:15:52.350", - "lastModified": "2024-06-10T18:15:24.363", + "lastModified": "2024-07-03T01:43:21.537", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de desbordamiento de b\u00fafer en Ffmpeg v.N113007-g8d24a28d06 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente libavfilter/avf_showspectrum.c:1789:52 en showspectrumpic_request_frame" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://ffmpeg.org/", diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51796.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51796.json index ae39e186b32..1fdf78ca07b 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51796.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51796.json @@ -2,8 +2,9 @@ "id": "CVE-2023-51796", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T17:15:52.407", - "lastModified": "2024-06-10T18:15:24.427", + "lastModified": "2024-07-03T01:43:22.343", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de desbordamiento de b\u00fafer en Ffmpeg v.N113007-g8d24a28d06 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de libavfilter/f_reverse.c:269:26 en areverse_request_frame." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.6, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.0, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://ffmpeg.org/", diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51797.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51797.json index 982b1a989d2..0623889cd51 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51797.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51797.json @@ -2,8 +2,9 @@ "id": "CVE-2023-51797", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T17:15:52.463", - "lastModified": "2024-06-10T18:15:24.487", + "lastModified": "2024-07-03T01:43:23.157", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de desbordamiento de b\u00fafer en Ffmpeg v.N113007-g8d24a28d06 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de libavfilter/avf_showwaves.c:722:24 en showwaves_filter_frame" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://ffmpeg.org/", diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51798.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51798.json index 6f4760947f8..ab6cdf6dd52 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51798.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51798.json @@ -2,8 +2,9 @@ "id": "CVE-2023-51798", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T17:15:52.527", - "lastModified": "2024-06-10T18:15:24.550", + "lastModified": "2024-07-03T01:43:23.963", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de desbordamiento de b\u00fafer en Ffmpeg v.N113007-g8d24a28d06 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de un error de excepci\u00f3n de punto flotante (FPE) en libavfilter/vf_minterpolate.c:1078:60 en interpolaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://ffmpeg.org/", diff --git a/CVE-2023/CVE-2023-518xx/CVE-2023-51847.json b/CVE-2023/CVE-2023-518xx/CVE-2023-51847.json index c3da7d911ae..6b0e6ea7bf7 100644 --- a/CVE-2023/CVE-2023-518xx/CVE-2023-51847.json +++ b/CVE-2023/CVE-2023-518xx/CVE-2023-51847.json @@ -2,8 +2,9 @@ "id": "CVE-2023-51847", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-06T22:15:09.950", - "lastModified": "2024-06-07T14:56:05.647", + "lastModified": "2024-07-03T01:43:24.980", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en obgm y Libcoap v.a3ed466 permite a un atacante remoto provocar una denegaci\u00f3n de servicio a trav\u00e9s de la funci\u00f3n coap_context_t en el componente src/coap_threadsafe.c:297:3." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://github.com/obgm/libcoap/issues/1302", diff --git a/CVE-2023/CVE-2023-520xx/CVE-2023-52080.json b/CVE-2023/CVE-2023-520xx/CVE-2023-52080.json index a012f699045..dc20227d84d 100644 --- a/CVE-2023/CVE-2023-520xx/CVE-2023-52080.json +++ b/CVE-2023/CVE-2023-520xx/CVE-2023-52080.json @@ -2,8 +2,9 @@ "id": "CVE-2023-52080", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T18:15:07.493", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-07-03T01:43:25.923", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El firmware IEIT NF5280M6 UEFI hasta la versi\u00f3n 8.4 tiene una vulnerabilidad de desbordamiento del grupo, causada por el uso inadecuado de la funci\u00f3n gRT->GetVariable(). Los atacantes con acceso a variables NVRAM locales pueden aprovechar esto modificando estas variables en SPI Flash, lo que resulta en la manipulaci\u00f3n de los datos de la memoria. Cuando se manipulan datos cr\u00edticos en la memoria, puede ocurrir un bloqueo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://ieisystem.com", diff --git a/CVE-2023/CVE-2023-521xx/CVE-2023-52162.json b/CVE-2023/CVE-2023-521xx/CVE-2023-52162.json index f3e8679fb0a..74b3d70a6bd 100644 --- a/CVE-2023/CVE-2023-521xx/CVE-2023-52162.json +++ b/CVE-2023/CVE-2023-521xx/CVE-2023-52162.json @@ -2,8 +2,9 @@ "id": "CVE-2023-52162", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-03T20:15:08.920", - "lastModified": "2024-06-04T16:57:41.057", + "lastModified": "2024-07-03T01:43:27.207", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Mercusys MW325R EU V3 (Firmware MW325R(EU)_V3_1.11.0 Build 221019) es vulnerable a un desbordamiento del b\u00fafer basado en pila, lo que podr\u00eda permitir a un atacante ejecutar c\u00f3digo arbitrario. Explotar la vulnerabilidad requiere autenticaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://k4m1ll0.com/cve-2023-52162.html", diff --git a/CVE-2023/CVE-2023-523xx/CVE-2023-52338.json b/CVE-2023/CVE-2023-523xx/CVE-2023-52338.json index d26ea80b652..4ef952b6148 100644 --- a/CVE-2023/CVE-2023-523xx/CVE-2023-52338.json +++ b/CVE-2023/CVE-2023-523xx/CVE-2023-52338.json @@ -2,8 +2,9 @@ "id": "CVE-2023-52338", "sourceIdentifier": "security@trendmicro.com", "published": "2024-01-23T21:15:09.717", - "lastModified": "2024-01-31T14:38:35.867", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:43:29.373", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-59" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-523xx/CVE-2023-52367.json b/CVE-2023/CVE-2023-523xx/CVE-2023-52367.json index 27495d20200..bfed41e1c59 100644 --- a/CVE-2023/CVE-2023-523xx/CVE-2023-52367.json +++ b/CVE-2023/CVE-2023-523xx/CVE-2023-52367.json @@ -2,8 +2,9 @@ "id": "CVE-2023-52367", "sourceIdentifier": "psirt@huawei.com", "published": "2024-02-18T04:15:07.647", - "lastModified": "2024-02-20T19:50:53.960", + "lastModified": "2024-07-03T01:43:31.290", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de control de acceso inadecuado en el m\u00f3dulo de librer\u00eda multimedia. La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la disponibilidad e integridad del servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/", diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52670.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52670.json index ab02eaa112f..4a302300ebd 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52670.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52670.json @@ -2,8 +2,9 @@ "id": "CVE-2023-52670", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T14:15:10.057", - "lastModified": "2024-06-27T13:15:53.823", + "lastModified": "2024-07-03T01:43:43.890", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: rpmsg: virtio: Free driver_overridecuando rpmsg_remove() Free driver_override cuando rpmsg_remove(); de lo contrario, se producir\u00e1 la siguiente p\u00e9rdida de memoria: objeto sin referencia 0xffff0000d55d7080 (tama\u00f1o 128): comm \"kworker/u8 :2\", pid 56, santiam\u00e9n 4294893188 (edad 214.272s) volcado hexadecimal (primeros 32 bytes): 72 70 6d 73 67 5f 6e 73 00 00 00 00 00 00 00 00 rpmsg_ns........ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ retroceso: [<000000009c94c9c1>] __kmem_cache_alloc_node+0x1f8/0x320 [<000000002300d89b>] +0x44/ 0x70 [<00000000228a60c3>] kstrndup+0x4c/0x90 [<0000000077158695>] driver_set_override+0xd0/0x164 [<000000003e9c4ea5>] rpmsg_register_device_override+0x98/0x170 0000001c0c89a8>] rpmsg_ns_register_device+0x24/0x30 [<000000008bbf8fa2>] rpmsg_probe+0x2e0/ 0x3ec [<00000000e65a68df>] virtio_dev_probe+0x1c0/0x280 [<00000000443331cc>] very_probe+0xbc/0x2dc [<00000000391064b1>] __driver_probe_device+0x78/0xe0 [<00 000000a41c9a5b>] driver_probe_device+0xd8/0x160 [<000000009c3bd5df>] __device_attach_driver+0xb8/ 0x140 [<0000000043cd7614>] bus_for_each_drv+0x7c/0xd4 [<000000003b929a36>] __device_attach+0x9c/0x19c [<00000000a94e0ba8>] dispositivo_initial_probe+0x14/0x20 [<000 000003c999637>] bus_probe_device+0xa0/0xac" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/229ce47cbfdc7d3a9415eb676abbfb77d676cb08", diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52672.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52672.json index efa49cc73dc..5235706ced7 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52672.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52672.json @@ -2,8 +2,9 @@ "id": "CVE-2023-52672", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T14:15:10.527", - "lastModified": "2024-06-25T22:15:16.900", + "lastModified": "2024-07-03T01:43:44.910", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: tuber\u00eda: despertar wr_wait despu\u00e9s de configurar max_usage Confirmar c73be61cede5 (\"tuber\u00eda: Agregar soporte de cola de notificaciones generales\") se introdujo una regresi\u00f3n que bloquear\u00eda las tuber\u00edas redimensionadas bajo ciertas condiciones. Ver el reproductor en [1]. La confirmaci\u00f3n de cambio de tama\u00f1o del anillo de tuber\u00eda se movi\u00f3 a una funci\u00f3n diferente, lo que movi\u00f3 la activaci\u00f3n de pipe->wr_wait antes de aumentar pipe->max_usage. Si una tuber\u00eda estaba llena antes de que ocurriera el cambio de tama\u00f1o, la reactivaci\u00f3n nunca activar\u00eda pipe_write. Configure @max_usage y @nr_accounted antes de despertar a los escritores si no se trata de una cola de vigilancia. [Christian Brauner : reescribir en la cuenta para las colas de visualizaci\u00f3n]" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/162ae0e78bdabf84ef10c1293c4ed7865cb7d3c8", diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52696.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52696.json index 5846878114f..00ef110cab9 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52696.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52696.json @@ -2,8 +2,9 @@ "id": "CVE-2023-52696", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T15:15:20.507", - "lastModified": "2024-06-25T21:15:54.993", + "lastModified": "2024-07-03T01:43:47.200", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: powerpc/powernv: agregue una verificaci\u00f3n de puntero null en opal_powercap_init() kasprintf() devuelve un puntero a la memoria asignada din\u00e1micamente que puede ser NULL en caso de fallo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/69f95c5e9220f77ce7c540686b056c2b49e9a664", diff --git a/CVE-2023/CVE-2023-527xx/CVE-2023-52723.json b/CVE-2023/CVE-2023-527xx/CVE-2023-52723.json index 01482c555f4..a4ba39163cf 100644 --- a/CVE-2023/CVE-2023-527xx/CVE-2023-52723.json +++ b/CVE-2023/CVE-2023-527xx/CVE-2023-52723.json @@ -2,8 +2,9 @@ "id": "CVE-2023-52723", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T06:15:06.983", - "lastModified": "2024-05-05T22:15:07.487", + "lastModified": "2024-07-03T01:43:49.597", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En KDE libksieve anterior al 23.03.80, kmanagesieve/session.cpp coloca una contrase\u00f1a de texto plano en los registros del servidor porque a una variable de nombre de usuario se le asigna accidentalmente un valor de contrase\u00f1a." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/04/30/1", diff --git a/CVE-2023/CVE-2023-527xx/CVE-2023-52725.json b/CVE-2023/CVE-2023-527xx/CVE-2023-52725.json index c926fc575b5..17ef75b2374 100644 --- a/CVE-2023/CVE-2023-527xx/CVE-2023-52725.json +++ b/CVE-2023/CVE-2023-527xx/CVE-2023-52725.json @@ -2,8 +2,9 @@ "id": "CVE-2023-52725", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T00:15:07.350", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-07-03T01:43:50.417", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Open Networking Foundation SD-RAN ONOS onos-kpimon 0.4.7 permite bloquear el canal errCh dentro de la funci\u00f3n Inicio del paquete de monitoreo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://github.com/onosproject/onos-kpimon/pull/120", diff --git a/CVE-2023/CVE-2023-527xx/CVE-2023-52726.json b/CVE-2023/CVE-2023-527xx/CVE-2023-52726.json index c0a1b4b3a45..d4061419aeb 100644 --- a/CVE-2023/CVE-2023-527xx/CVE-2023-52726.json +++ b/CVE-2023/CVE-2023-527xx/CVE-2023-52726.json @@ -2,8 +2,9 @@ "id": "CVE-2023-52726", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T00:15:07.400", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-07-03T01:43:51.233", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Open Networking Foundation SD-RAN ONOS onos-ric-sdk-go 0.8.12 permite la repetici\u00f3n infinita del procesamiento de un error (en la implementaci\u00f3n de la funci\u00f3n de suscripci\u00f3n para el flujo de indicaci\u00f3n de suscripci\u00f3n)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] + } + ], "references": [ { "url": "https://github.com/onosproject/onos-ric-sdk-go/issues/133", diff --git a/CVE-2023/CVE-2023-527xx/CVE-2023-52733.json b/CVE-2023/CVE-2023-527xx/CVE-2023-52733.json index 82f3637253c..ff8cb12a50c 100644 --- a/CVE-2023/CVE-2023-527xx/CVE-2023-52733.json +++ b/CVE-2023/CVE-2023-527xx/CVE-2023-52733.json @@ -2,8 +2,9 @@ "id": "CVE-2023-52733", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T16:15:13.380", - "lastModified": "2024-05-21T16:53:56.550", + "lastModified": "2024-07-03T01:43:52.120", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: s390/decompressor: especifique __decompress() buf len para evitar el desbordamiento. Hist\u00f3ricamente, las llamadas a __decompress() no especificaban el par\u00e1metro \"out_len\" en muchas arquitecturas, incluido s390, esperando que no se escribieran m\u00e1s all\u00e1 Se realizan im\u00e1genes del kernel sin comprimir. Esto ha cambiado desde la confirmaci\u00f3n 2aa14b1ab2c4 (\"zstd: import usptream v1.5.2\") que incluye la confirmaci\u00f3n de la biblioteca zstd 6a7ede3dfccb (\"Reducir el tama\u00f1o de dctx reutilizando el b\u00fafer dst (#2751)\"). Ahora el c\u00f3digo de descompresi\u00f3n zstd podr\u00eda almacenar un b\u00fafer literal en la parte no escrita del b\u00fafer de destino. Dado que \"out_len\" no est\u00e1 configurado, se considera ilimitado y, por lo tanto, de uso gratuito para las necesidades de optimizaci\u00f3n. En s390, esto podr\u00eda da\u00f1ar el informe initrd o ipl que a menudo se coloca justo despu\u00e9s del buffer del descompresor. Afortunadamente, el descompresor ya conoce el tama\u00f1o de la imagen del kernel sin comprimir, por lo que para evitar el problema simplemente especif\u00edquelo en el par\u00e1metro \"out_len\"." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/16409f7d9ca5bb8220e1049ea9aae0d3c94d2dfb", diff --git a/CVE-2023/CVE-2023-527xx/CVE-2023-52735.json b/CVE-2023/CVE-2023-527xx/CVE-2023-52735.json index 55141a758ba..ffcf1598bc5 100644 --- a/CVE-2023/CVE-2023-527xx/CVE-2023-52735.json +++ b/CVE-2023/CVE-2023-527xx/CVE-2023-52735.json @@ -2,8 +2,9 @@ "id": "CVE-2023-52735", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T16:15:13.523", - "lastModified": "2024-05-21T16:53:56.550", + "lastModified": "2024-07-03T01:43:52.910", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf, sockmap: no permita que sock_map_{close,destroy,unhash} se llame a s\u00ed mismo. Las devoluciones de llamada del proto sock_map nunca deber\u00edan llamarse a s\u00ed mismas por dise\u00f1o. Prot\u00e9jase contra bugs como [1] y salga del bucle recursivo para evitar un desbordamiento de la pila que favorezca una fuga de recursos. [1] https://lore.kernel.org/all/00000000000073b14905ef2e7401@google.com/" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/5b4a79ba65a1ab479903fff2e604865d229b70a9", diff --git a/CVE-2023/CVE-2023-527xx/CVE-2023-52752.json b/CVE-2023/CVE-2023-527xx/CVE-2023-52752.json index d5467cdaf4e..defd50f9fef 100644 --- a/CVE-2023/CVE-2023-527xx/CVE-2023-52752.json +++ b/CVE-2023/CVE-2023-527xx/CVE-2023-52752.json @@ -2,8 +2,9 @@ "id": "CVE-2023-52752", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T16:15:14.833", - "lastModified": "2024-05-24T01:12:36.930", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:43:54.420", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-527xx/CVE-2023-52765.json b/CVE-2023/CVE-2023-527xx/CVE-2023-52765.json index 4975ef463a1..09c0fcba9ca 100644 --- a/CVE-2023/CVE-2023-527xx/CVE-2023-52765.json +++ b/CVE-2023/CVE-2023-527xx/CVE-2023-52765.json @@ -2,8 +2,9 @@ "id": "CVE-2023-52765", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T16:15:15.777", - "lastModified": "2024-05-21T16:53:56.550", + "lastModified": "2024-07-03T01:43:55.870", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: mfd: qcom-spmi-pmic: reparaci\u00f3n de la implementaci\u00f3n revid. La implementaci\u00f3n revid de Qualcomm SPMI PMIC est\u00e1 rota de varias maneras. En primer lugar, se supone que el hecho de que el dispositivo base hermano se haya registrado significa que tambi\u00e9n est\u00e1 vinculado a un controlador, lo que puede no ser el caso (por ejemplo, debido a un aplazamiento de la sonda o una sonda asincr\u00f3nica). Esto podr\u00eda desencadenar una desreferencia del puntero NULL al intentar acceder a los datos del controlador del dispositivo independiente. En segundo lugar, accede a los datos del controlador de un dispositivo hermano directamente y sin ning\u00fan bloqueo, lo que significa que los datos del controlador pueden liberarse mientras se accede a ellos (por ejemplo, al desvincular el controlador). En tercer lugar, filtra una referencia de dispositivo de estructura al dispositivo hermano que se busca usando spmi_device_from_of() cada vez que un dispositivo de funci\u00f3n (secundario) llama a la funci\u00f3n revid (por ejemplo, en la sonda). Solucione este problema volviendo a implementar la b\u00fasqueda revid para que se realice solo en la sonda del dispositivo PMIC; el dispositivo base obtiene la informaci\u00f3n revid del hardware, mientras que cualquier dispositivo SPMI secundario obtiene la informaci\u00f3n del dispositivo base y la almacena en cach\u00e9 para que sus hijos puedan acceder a ella de forma segura. Si el dispositivo base a\u00fan no ha sido sondeado, se pospone la sonda de un dispositivo secundario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/4ce77b023d42a9f1062eecf438df1af4b4072eb2", diff --git a/CVE-2023/CVE-2023-528xx/CVE-2023-52801.json b/CVE-2023/CVE-2023-528xx/CVE-2023-52801.json index f163008ec5a..a81076d7752 100644 --- a/CVE-2023/CVE-2023-528xx/CVE-2023-52801.json +++ b/CVE-2023/CVE-2023-528xx/CVE-2023-52801.json @@ -2,8 +2,9 @@ "id": "CVE-2023-52801", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T16:15:18.603", - "lastModified": "2024-05-21T16:53:56.550", + "lastModified": "2024-07-03T01:43:59.217", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: iommufd: corrige la actualizaci\u00f3n faltante de domains_itree despu\u00e9s de dividir iopt_area. En iopt_area_split(), si el iopt_area original ha llenado un dominio y est\u00e1 vinculado a domains_itree, los pages_nodes deben reinsertarse correctamente. De lo contrario, domains_itree se corrompe y usaremos UAF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/836db2e7e4565d8218923b3552304a1637e2f28d", diff --git a/CVE-2023/CVE-2023-528xx/CVE-2023-52810.json b/CVE-2023/CVE-2023-528xx/CVE-2023-52810.json index c0d0989dacd..f341575cf11 100644 --- a/CVE-2023/CVE-2023-528xx/CVE-2023-52810.json +++ b/CVE-2023/CVE-2023-528xx/CVE-2023-52810.json @@ -2,8 +2,9 @@ "id": "CVE-2023-52810", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T16:15:19.270", - "lastModified": "2024-05-21T16:53:56.550", + "lastModified": "2024-07-03T01:44:00.357", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: fs/jfs: agregue verificaci\u00f3n para db_l2nbperpage negativo, l2nbperpage es log2 (n\u00famero de bloques por p\u00e1gina) y el valor m\u00ednimo legal debe ser 0, no negativo. En el caso de que l2nbperpage sea negativo, se producir\u00e1 un error cuando se utilice posteriormente como exponente de desplazamiento. Syzbot inform\u00f3 este error: UBSAN: desplazamiento fuera de los l\u00edmites en fs/jfs/jfs_dmap.c:799:12 el exponente de desplazamiento -16777216 es negativo" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1335" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0cb567e727339a192f9fd0db00781d73a91d15a6", diff --git a/CVE-2023/CVE-2023-528xx/CVE-2023-52814.json b/CVE-2023/CVE-2023-528xx/CVE-2023-52814.json index 51fe5b4975e..00dc302f33b 100644 --- a/CVE-2023/CVE-2023-528xx/CVE-2023-52814.json +++ b/CVE-2023/CVE-2023-528xx/CVE-2023-52814.json @@ -2,8 +2,9 @@ "id": "CVE-2023-52814", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T16:15:19.547", - "lastModified": "2024-05-24T01:14:26.427", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:44:01.383", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-476" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-528xx/CVE-2023-52832.json b/CVE-2023/CVE-2023-528xx/CVE-2023-52832.json index e984dd52ed5..3cd17915aca 100644 --- a/CVE-2023/CVE-2023-528xx/CVE-2023-52832.json +++ b/CVE-2023/CVE-2023-528xx/CVE-2023-52832.json @@ -2,8 +2,9 @@ "id": "CVE-2023-52832", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T16:15:20.813", - "lastModified": "2024-05-21T16:53:56.550", + "lastModified": "2024-07-03T01:44:03.033", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: mac80211: no devolver energ\u00eda no configurada en ieee80211_get_tx_power(). Podemos obtener una advertencia de UBSAN si ieee80211_get_tx_power() devuelve el valor INT_MIN que mac80211 usa internamente para \"nivel de energ\u00eda no configurada\". UBSAN: desbordamiento de entero con signo en net/wireless/nl80211.c:3816:5 -2147483648 * 100 no se puede representar en el tipo 'int' CPU: 0 PID: 20433 Comm: insmod Contaminado: G WC OE Call Trace: dump_stack+ 0x74/0x92 ubsan_epilogue+0x9/0x50 handle_overflow+0x8d/0xd0 __ubsan_handle_mul_overflow+0xe/0x10 nl80211_send_iface+0x688/0x6b0 [cfg80211] [...] cfg80211_register_wdev+0x78/0xb0 cfg80211] cfg80211_netdev_notifier_call+0x200/0x620 [cfg80211] [.. .] ieee80211_if_add+0x60e/0x8f0 [mac80211] ieee80211_register_hw+0xda5/0x1170 [mac80211] En este caso, simplemente devuelva un error para indicar que no hay datos disponibles." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-920" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1571120c44dbe5757aee1612c5b6097cdc42710f", diff --git a/CVE-2023/CVE-2023-528xx/CVE-2023-52844.json b/CVE-2023/CVE-2023-528xx/CVE-2023-52844.json index 1146ae716a1..00b1a6fe3c1 100644 --- a/CVE-2023/CVE-2023-528xx/CVE-2023-52844.json +++ b/CVE-2023/CVE-2023-528xx/CVE-2023-52844.json @@ -2,8 +2,9 @@ "id": "CVE-2023-52844", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T16:15:21.653", - "lastModified": "2024-05-21T16:53:56.550", + "lastModified": "2024-07-03T01:44:04.703", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: vidtv: psi: Agregar verificaci\u00f3n para kstrdup. Agregue verificaci\u00f3n para el valor de retorno de kstrdup() y devuelva el error si falla para evitar la desreferencia al puntero NULL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3387490c89b10aeb4e71d78b65dbc9ba4b2385b9", diff --git a/CVE-2023/CVE-2023-528xx/CVE-2023-52858.json b/CVE-2023/CVE-2023-528xx/CVE-2023-52858.json index 44ed8836062..d3668a1cc49 100644 --- a/CVE-2023/CVE-2023-528xx/CVE-2023-52858.json +++ b/CVE-2023/CVE-2023-528xx/CVE-2023-52858.json @@ -2,8 +2,9 @@ "id": "CVE-2023-52858", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T16:15:22.867", - "lastModified": "2024-05-21T16:53:56.550", + "lastModified": "2024-07-03T01:44:06.567", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: clk: mediatek: clk-mt7629: Agregar verificaci\u00f3n para mtk_alloc_clk_data. Agregue la verificaci\u00f3n para el valor de retorno de mtk_alloc_clk_data() para evitar la desreferencia al puntero NULL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1d89430fc3158f872d492f1b88d07262f48290c0", diff --git a/CVE-2023/CVE-2023-528xx/CVE-2023-52861.json b/CVE-2023/CVE-2023-528xx/CVE-2023-52861.json index aef0141c8f1..8a54c787262 100644 --- a/CVE-2023/CVE-2023-528xx/CVE-2023-52861.json +++ b/CVE-2023/CVE-2023-528xx/CVE-2023-52861.json @@ -2,8 +2,9 @@ "id": "CVE-2023-52861", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T16:15:23.073", - "lastModified": "2024-05-21T16:53:56.550", + "lastModified": "2024-07-03T01:44:07.527", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm: bridge: it66121: Corrige la desreferencia del conector no v\u00e1lido. Corrige la desreferencia del puntero NULL cuando no hay ning\u00fan monitor conectado y la tarjeta de sonido se abre desde el espacio de usuario. En su lugar, devuelva un b\u00fafer vac\u00edo (de ceros) como informaci\u00f3n EDID al sistema de sonido si no hay ning\u00fan conector conectado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1374561a7cbc9a000b77bb0473bb2c19daf18d86", diff --git a/CVE-2023/CVE-2023-528xx/CVE-2023-52869.json b/CVE-2023/CVE-2023-528xx/CVE-2023-52869.json index 8bd48acdc40..54b1369ce68 100644 --- a/CVE-2023/CVE-2023-528xx/CVE-2023-52869.json +++ b/CVE-2023/CVE-2023-528xx/CVE-2023-52869.json @@ -2,8 +2,9 @@ "id": "CVE-2023-52869", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T16:15:23.750", - "lastModified": "2024-05-21T16:53:56.550", + "lastModified": "2024-07-03T01:44:08.950", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: pstore/platform: Agregar verificaci\u00f3n para kstrdup. Agregue verificaci\u00f3n para el valor de retorno de kstrdup() y devuelva el error si falla para evitar la desreferencia del puntero NULL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1c426da79f9fc7b761021b5eb44185ba119cd44a", diff --git a/CVE-2023/CVE-2023-528xx/CVE-2023-52883.json b/CVE-2023/CVE-2023-528xx/CVE-2023-52883.json index 012ddc6a989..05337b05837 100644 --- a/CVE-2023/CVE-2023-528xx/CVE-2023-52883.json +++ b/CVE-2023/CVE-2023-528xx/CVE-2023-52883.json @@ -2,8 +2,9 @@ "id": "CVE-2023-52883", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-20T12:15:15.140", - "lastModified": "2024-06-20T12:43:25.663", + "lastModified": "2024-07-03T01:44:10.627", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/amdgpu: se corrigi\u00f3 la posible desreferencia del puntero nulo abo->tbo.resource puede ser NULL en amdgpu_vm_bo_update." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/51b79f33817544e3b4df838d86e8e8e4388ff684", diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5249.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5249.json index b305aad0794..d1469aa3fd8 100644 --- a/CVE-2023/CVE-2023-52xx/CVE-2023-5249.json +++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5249.json @@ -2,8 +2,9 @@ "id": "CVE-2023-5249", "sourceIdentifier": "arm-security@arm.com", "published": "2024-02-05T10:15:08.310", - "lastModified": "2024-02-13T00:37:35.327", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:44:12.613", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-54xx/CVE-2023-5405.json b/CVE-2023/CVE-2023-54xx/CVE-2023-5405.json index 6a5fb78c72a..c344124b2c0 100644 --- a/CVE-2023/CVE-2023-54xx/CVE-2023-5405.json +++ b/CVE-2023/CVE-2023-54xx/CVE-2023-5405.json @@ -2,8 +2,9 @@ "id": "CVE-2023-5405", "sourceIdentifier": "psirt@honeywell.com", "published": "2024-04-17T17:15:14.300", - "lastModified": "2024-04-17T20:08:21.887", + "lastModified": "2024-07-03T01:44:14.093", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "references": [ diff --git a/CVE-2023/CVE-2023-55xx/CVE-2023-5545.json b/CVE-2023/CVE-2023-55xx/CVE-2023-5545.json index 2c82a658095..36e65f661da 100644 --- a/CVE-2023/CVE-2023-55xx/CVE-2023-5545.json +++ b/CVE-2023/CVE-2023-55xx/CVE-2023-5545.json @@ -2,8 +2,9 @@ "id": "CVE-2023-5545", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2023-11-09T20:15:09.850", - "lastModified": "2023-11-16T19:05:39.550", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:44:15.480", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -78,6 +79,16 @@ "value": "CWE-200" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5675.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5675.json index c08d32b9ae1..7b8e96b4fdc 100644 --- a/CVE-2023/CVE-2023-56xx/CVE-2023-5675.json +++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5675.json @@ -2,8 +2,9 @@ "id": "CVE-2023-5675", "sourceIdentifier": "secalert@redhat.com", "published": "2024-04-25T16:15:08.570", - "lastModified": "2024-04-25T17:25:05.903", + "lastModified": "2024-07-03T01:44:16.897", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-285" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "references": [ diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6082.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6082.json index a5451cb80d8..b5cc85110d6 100644 --- a/CVE-2023/CVE-2023-60xx/CVE-2023-6082.json +++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6082.json @@ -2,8 +2,9 @@ "id": "CVE-2023-6082", "sourceIdentifier": "contact@wpscan.com", "published": "2024-02-12T16:15:08.120", - "lastModified": "2024-02-12T17:31:21.670", + "lastModified": "2024-07-03T01:44:19.650", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento chartjs de WordPress hasta 2023.2 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://lynk.nl/", diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6516.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6516.json index acc930ff353..1d9966b5c09 100644 --- a/CVE-2023/CVE-2023-65xx/CVE-2023-6516.json +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6516.json @@ -2,8 +2,9 @@ "id": "CVE-2023-6516", "sourceIdentifier": "security-officer@isc.org", "published": "2024-02-13T14:15:46.030", - "lastModified": "2024-05-03T13:15:21.250", + "lastModified": "2024-07-03T01:44:22.620", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-789" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/02/13/1", diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6787.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6787.json index 85e75a583df..bb5386606a6 100644 --- a/CVE-2023/CVE-2023-67xx/CVE-2023-6787.json +++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6787.json @@ -2,8 +2,9 @@ "id": "CVE-2023-6787", "sourceIdentifier": "secalert@redhat.com", "published": "2024-04-25T16:15:10.867", - "lastModified": "2024-04-25T17:24:59.967", + "lastModified": "2024-07-03T01:44:24.660", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-287" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "references": [ diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7101.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7101.json index dbfe3de962e..82de53e0c15 100644 --- a/CVE-2023/CVE-2023-71xx/CVE-2023-7101.json +++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7101.json @@ -2,8 +2,9 @@ "id": "CVE-2023-7101", "sourceIdentifier": "mandiant-cve@google.com", "published": "2023-12-24T22:15:07.983", - "lastModified": "2024-06-10T16:27:23.950", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:44:28.913", + "vulnStatus": "Modified", + "cveTags": [], "cisaExploitAdd": "2024-01-02", "cisaActionDue": "2024-01-23", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", @@ -39,6 +40,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7164.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7164.json index cd2cbfede02..2235121cf4a 100644 --- a/CVE-2023/CVE-2023-71xx/CVE-2023-7164.json +++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7164.json @@ -2,8 +2,9 @@ "id": "CVE-2023-7164", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-08T18:15:08.287", - "lastModified": "2024-04-08T18:48:40.217", + "lastModified": "2024-07-03T01:44:29.277", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento BackWPup de WordPress anterior a 4.0.4 no impide que los visitantes filtren informaci\u00f3n clave sobre las copias de seguridad en curso, lo que permite a atacantes no autenticados descargar copias de seguridad de la base de datos de un sitio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/79b07f37-2c6b-4846-bb28-91a1e5bf112e/", diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7252.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7252.json index 9ea05395ed7..99172d86559 100644 --- a/CVE-2023/CVE-2023-72xx/CVE-2023-7252.json +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7252.json @@ -2,8 +2,9 @@ "id": "CVE-2023-7252", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-22T05:15:07.310", - "lastModified": "2024-04-22T13:28:43.747", + "lastModified": "2024-07-03T01:44:29.993", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento Tickera WordPress anterior a 3.5.2.5 no impide que los usuarios filtren los tickets de otros usuarios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 0.0, + "baseSeverity": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 0.0 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/c452c5da-05a6-4a14-994d-e5049996d496/", diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7253.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7253.json index 13451378dcc..ef2d35d1121 100644 --- a/CVE-2023/CVE-2023-72xx/CVE-2023-7253.json +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7253.json @@ -2,8 +2,9 @@ "id": "CVE-2023-7253", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-24T05:15:46.863", - "lastModified": "2024-04-24T13:39:42.883", + "lastModified": "2024-07-03T01:44:30.193", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento Import WP WordPress anterior a 2.13.1 no impide que los usuarios con funci\u00f3n de administrador hagan ping al realizar ataques SSRF, lo que puede ser un problema en configuraciones multisitio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.2 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/aeefcc01-bbbf-4d86-9cfd-ea0f9a85e1a5/", diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7261.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7261.json index 75191d0db91..d38c9acfa8b 100644 --- a/CVE-2023/CVE-2023-72xx/CVE-2023-7261.json +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7261.json @@ -2,8 +2,9 @@ "id": "CVE-2023-7261", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-06-07T20:15:10.887", - "lastModified": "2024-06-10T02:52:08.267", + "lastModified": "2024-07-03T01:44:30.563", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La implementaci\u00f3n inadecuada en Google Updatetor anterior a la versi\u00f3n 1.3.36.351 en Google Chrome permiti\u00f3 a un atacante local realizar una escalada de privilegios a trav\u00e9s de un archivo malicioso. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-233" + } + ] + } + ], "references": [ { "url": "https://issues.chromium.org/issues/40064602", diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0024.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0024.json index deb19457dab..5509fb5eb8d 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0024.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0024.json @@ -2,8 +2,9 @@ "id": "CVE-2024-0024", "sourceIdentifier": "security@android.com", "published": "2024-05-07T21:15:08.367", - "lastModified": "2024-05-08T13:15:00.690", + "lastModified": "2024-07-03T01:44:32.010", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En varios m\u00e9todos de UserManagerService.java, existe la posibilidad de que no se persistan o no se apliquen restricciones de usuario debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/6a9250ec7fc9801a883cedd7860076f42fb518ac", diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0026.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0026.json index 57ca9a939b9..5c6d3acdefa 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0026.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0026.json @@ -2,8 +2,9 @@ "id": "CVE-2024-0026", "sourceIdentifier": "security@android.com", "published": "2024-05-07T21:15:08.460", - "lastModified": "2024-05-08T13:15:00.690", + "lastModified": "2024-07-03T01:44:32.803", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En m\u00faltiples funciones de SnoozeHelper.java, existe una posible denegaci\u00f3n de servicio persistente debido al agotamiento de los recursos. Esto podr\u00eda provocar una denegaci\u00f3n de servicio local sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/a8fb9fe93efdebc4145e00934f42c91742f328de", diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0042.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0042.json index a5ed9a913ee..4aa6b4563cc 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0042.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0042.json @@ -2,8 +2,9 @@ "id": "CVE-2024-0042", "sourceIdentifier": "security@android.com", "published": "2024-05-07T21:15:08.540", - "lastModified": "2024-05-08T13:15:00.690", + "lastModified": "2024-07-03T01:44:33.743", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En TBD de TBD, existe una posible confusi\u00f3n entre los certificados OEM y DRM debido a un uso incorrecto de las criptomonedas. Esto podr\u00eda provocar una omisi\u00f3n local de la protecci\u00f3n de contenido DRM sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2024-04-01", diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0043.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0043.json index b81a9e76781..25064e1b173 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0043.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0043.json @@ -2,8 +2,9 @@ "id": "CVE-2024-0043", "sourceIdentifier": "security@android.com", "published": "2024-05-07T21:15:08.583", - "lastModified": "2024-05-08T13:15:00.690", + "lastModified": "2024-07-03T01:44:34.530", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "En varias ubicaciones, existe una posible concesi\u00f3n de escucha de notificaciones a una aplicaci\u00f3n que se ejecuta en el perfil de trabajo debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://android.googlesource.com/platform/packages/modules/Permission/+/8141e8f4dd77b9f8fb485e23ddf028c57fcd4fca", diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0044.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0044.json index 97f290b6494..16a48149c9f 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0044.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0044.json @@ -2,8 +2,9 @@ "id": "CVE-2024-0044", "sourceIdentifier": "security@android.com", "published": "2024-03-11T17:15:45.450", - "lastModified": "2024-03-12T20:15:07.633", + "lastModified": "2024-07-03T01:44:34.730", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En createSessionInternal de PackageInstallerService.java, existe una posible ejecuci\u00f3n como cualquier aplicaci\u00f3n debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-75" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/65bd134b0a82c51a143b89821d5cdd00ddc31792", diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0153.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0153.json index fbf11ae11a7..1ab0ac6aac1 100644 --- a/CVE-2024/CVE-2024-01xx/CVE-2024-0153.json +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0153.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0153", "sourceIdentifier": "arm-security@arm.com", "published": "2024-07-01T09:15:06.343", - "lastModified": "2024-07-01T12:37:24.220", + "lastModified": "2024-07-03T01:44:37.677", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Vulnerabilidad de restricci\u00f3n inadecuada de operaciones dentro de los l\u00edmites de un b\u00fafer de memoria en Arm Ltd Valhall GPU Firmware, Arm Ltd Arm 5th Gen GPU Architecture Firmware permite a un usuario local sin privilegios realizar operaciones de procesamiento de GPU inadecuadas para acceder a una cantidad limitada fuera de los l\u00edmites del b\u00fafer. Si las operaciones se preparan cuidadosamente, esto a su vez podr\u00eda darles acceso a toda la memoria del sistema. Este problema afecta al firmware de la GPU Valhall: desde r29p0 hasta r46p0; Firmware de arquitectura de GPU Arm de quinta generaci\u00f3n: desde r41p0 hasta r46p0." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "arm-security@arm.com", diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0253.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0253.json index 1264f40843f..10fc41083d6 100644 --- a/CVE-2024/CVE-2024-02xx/CVE-2024-0253.json +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0253.json @@ -2,8 +2,9 @@ "id": "CVE-2024-0253", "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", "published": "2024-02-02T13:15:09.700", - "lastModified": "2024-06-07T09:15:09.830", + "lastModified": "2024-07-03T01:44:39.010", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -78,6 +79,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0269.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0269.json index 4827f5538da..4252141db99 100644 --- a/CVE-2024/CVE-2024-02xx/CVE-2024-0269.json +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0269.json @@ -2,8 +2,9 @@ "id": "CVE-2024-0269", "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", "published": "2024-02-02T13:15:09.880", - "lastModified": "2024-06-07T09:15:10.160", + "lastModified": "2024-07-03T01:44:39.930", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -78,6 +79,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0397.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0397.json index 5257f561923..7c4df4b8cd8 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0397.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0397.json @@ -2,8 +2,9 @@ "id": "CVE-2024-0397", "sourceIdentifier": "cna@python.org", "published": "2024-06-17T16:15:10.217", - "lastModified": "2024-06-20T12:44:22.977", + "lastModified": "2024-07-03T01:44:41.987", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un defecto en el m\u00f3dulo \u201cssl\u201d de Python donde existe una condici\u00f3n de ejecuci\u00f3n de memoria con los m\u00e9todos ssl.SSLContext \u201ccert_store_stats()\u201d y \u201cget_ca_certs()\u201d. La condici\u00f3n de ejecuci\u00f3n se puede desencadenar si los m\u00e9todos se llaman al mismo tiempo que se cargan los certificados en SSLContext, como durante el protocolo de enlace TLS con un directorio de certificados configurado. Este problema se solucion\u00f3 en CPython 3.10.14, 3.11.9, 3.12.3 y 3.13.0a5." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/06/17/2", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0427.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0427.json index a8eff05ba10..04ea56356f0 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0427.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0427.json @@ -2,8 +2,9 @@ "id": "CVE-2024-0427", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-12T06:15:08.903", - "lastModified": "2024-06-13T18:36:09.013", + "lastModified": "2024-07-03T01:44:43.070", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento ARForms - Premium WordPress Form Builder Plugin de WordPress anterior a 6.4.1 no escapa correctamente a la entrada controlada por el usuario cuando se refleja en algunas de sus acciones AJAX." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/1806fef3-d774-46e0-aa48-7a101495f4eb/", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0518.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0518.json index 68f6ecfa5da..99b42b98aff 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0518.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0518.json @@ -2,8 +2,9 @@ "id": "CVE-2024-0518", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-01-16T22:15:37.710", - "lastModified": "2024-01-22T19:53:24.690", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:44:45.150", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-843" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0519.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0519.json index 7f7aedbebd5..4975447602d 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0519.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0519.json @@ -2,8 +2,9 @@ "id": "CVE-2024-0519", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-01-16T22:15:37.753", - "lastModified": "2024-01-22T19:53:33.937", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:44:45.993", + "vulnStatus": "Modified", + "cveTags": [], "cisaExploitAdd": "2024-01-17", "cisaActionDue": "2024-02-07", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", @@ -39,6 +40,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -52,6 +73,20 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + }, + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0671.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0671.json index 7a0e6947d3c..04a229daa51 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0671.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0671.json @@ -2,8 +2,9 @@ "id": "CVE-2024-0671", "sourceIdentifier": "arm-security@arm.com", "published": "2024-04-19T09:15:46.130", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:44:49.547", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Vulnerabilidad de Use After Free en Arm Ltd Midgard GPU Kernel Driver, Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver permite a un usuario local sin privilegios realizar operaciones de procesamiento de memoria GPU inadecuadas para obtener acceso a la memoria ya liberada. Este problema afecta al controlador del kernel de GPU Midgard: desde r19p0 hasta r32p0; Controlador del kernel de GPU Bifrost: desde r7p0 hasta r48p0; Controlador del kernel de GPU Valhall: desde r19p0 hasta r48p0; Controlador del kernel de arquitectura de GPU Arm de quinta generaci\u00f3n: desde r41p0 hasta r48p0." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 4.2 + } + ] + }, "weaknesses": [ { "source": "arm-security@arm.com", @@ -25,6 +49,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0672.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0672.json index 06d376eb3d0..5017fa06b1d 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0672.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0672.json @@ -2,8 +2,9 @@ "id": "CVE-2024-0672", "sourceIdentifier": "contact@wpscan.com", "published": "2024-03-28T05:15:49.693", - "lastModified": "2024-03-28T12:42:56.150", + "lastModified": "2024-07-03T01:44:50.407", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento Pz-LinkCard de WordPress hasta la versi\u00f3n 2.5.1 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera una cross-site scripting reflejado que podr\u00eda usarse contra usuarios con privilegios elevados, como el administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/eceb6585-5969-4aa6-9908-b6bfb578190a/", diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0980.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0980.json index 4e8e8d53803..59dcaecce18 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0980.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0980.json @@ -2,8 +2,9 @@ "id": "CVE-2024-0980", "sourceIdentifier": "psirt@okta.com", "published": "2024-03-28T00:15:07.867", - "lastModified": "2024-03-28T02:01:13.303", + "lastModified": "2024-07-03T01:44:56.397", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El servicio de actualizaci\u00f3n autom\u00e1tica de Okta Verify para Windows es vulnerable a dos fallas que, en combinaci\u00f3n, podr\u00edan usarse para ejecutar c\u00f3digo arbitrario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@okta.com", diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1065.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1065.json index a59d8b851cc..e00c50de51f 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1065.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1065.json @@ -2,8 +2,9 @@ "id": "CVE-2024-1065", "sourceIdentifier": "arm-security@arm.com", "published": "2024-04-19T09:15:46.307", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:44:57.727", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Vulnerabilidad de Use After Free en Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver permite a un usuario local sin privilegios realizar operaciones inadecuadas de procesamiento de memoria de GPU para obtener acceso a la memoria ya liberada. Este problema afecta al controlador del kernel de GPU Bifrost: desde r45p0 hasta r48p0; Controlador del kernel de GPU Valhall: desde r45p0 hasta r48p0; Controlador de kernel de arquitectura de GPU Arm de quinta generaci\u00f3n: desde r45p0 hasta r48p0." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, "weaknesses": [ { "source": "arm-security@arm.com", diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1077.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1077.json index dd7e93fe08a..20a5cc70d09 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1077.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1077.json @@ -2,8 +2,9 @@ "id": "CVE-2024-1077", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-01-30T22:15:53.090", - "lastModified": "2024-02-05T20:49:00.927", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:44:58.330", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1100.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1100.json index f2f31ff12e1..94fd3329067 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1100.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1100.json @@ -2,8 +2,9 @@ "id": "CVE-2024-1100", "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2024-05-30T12:15:10.340", - "lastModified": "2024-05-30T13:15:41.297", + "lastModified": "2024-07-03T01:44:59.517", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,74 @@ "value": "Neutralizaci\u00f3n inadecuada de elementos especiales utilizados en una vulnerabilidad de comando SQL (\"Inyecci\u00f3n SQL\") en Vadi Corporate Information Systems DIGIKENT GIS permite la inyecci\u00f3n SQL. Este problema afecta a DIGIKENT GIS: hasta 2.23.5." } ], - "metrics": {}, + "metrics": { + "cvssMetricV40": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 10.0, + "baseSeverity": "CRITICAL" + } + } + ], + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "iletisim@usom.gov.tr", diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1102.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1102.json index f4a108016bb..67ad6365106 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1102.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1102.json @@ -2,8 +2,9 @@ "id": "CVE-2024-1102", "sourceIdentifier": "secalert@redhat.com", "published": "2024-04-25T17:15:47.457", - "lastModified": "2024-06-04T17:15:47.410", + "lastModified": "2024-07-03T01:44:59.757", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/errata/RHSA-2024:3580", diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1132.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1132.json index 2399d6ddad6..e8cf0061881 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1132.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1132.json @@ -2,8 +2,9 @@ "id": "CVE-2024-1132", "sourceIdentifier": "secalert@redhat.com", "published": "2024-04-17T14:15:07.953", - "lastModified": "2024-06-20T06:15:09.397", + "lastModified": "2024-07-03T01:45:01.507", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1204.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1204.json index 05a6f1397f6..f2f7a5dfbd6 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1204.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1204.json @@ -2,8 +2,9 @@ "id": "CVE-2024-1204", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-15T05:15:14.723", - "lastModified": "2024-04-15T13:15:31.997", + "lastModified": "2024-07-03T01:45:05.337", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento Meta Box de WordPress anterior a 5.9.4 no impide que los usuarios con al menos el rol de colaborador accedan a campos personalizados arbitrarios asignados a las publicaciones de otros usuarios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/03191b00-0b05-42db-9ce2-fc525981b6c9/", diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1219.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1219.json index f485213c265..bd630b22354 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1219.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1219.json @@ -2,8 +2,9 @@ "id": "CVE-2024-1219", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-17T05:15:48.540", - "lastModified": "2024-04-17T12:48:07.510", + "lastModified": "2024-07-03T01:45:05.720", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El complemento Easy Social Feed de WordPress anterior a 6.5.6 no valida ni escapa algunos de sus atributos de c\u00f3digo corto antes de devolverlos a la p\u00e1gina, lo que podr\u00eda permitir a los usuarios con un rol tan bajo como colaborador realizar ataques de Cross-Site Scripting Almacenado que podr\u00edan ser utilizado contra usuarios con privilegios elevados, como el administrador" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/ce4ac9c4-d293-4464-b6a0-82ddf8d4860b/", diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1356.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1356.json index 1e11fd371cf..b0bcd921217 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1356.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1356.json @@ -2,8 +2,9 @@ "id": "CVE-2024-1356", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-03-05T21:15:07.593", - "lastModified": "2024-03-06T15:18:08.093", + "lastModified": "2024-07-03T01:45:11.987", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-002.txt", diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1395.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1395.json index 92aa570570a..42d6bc82d53 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1395.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1395.json @@ -2,8 +2,9 @@ "id": "CVE-2024-1395", "sourceIdentifier": "arm-security@arm.com", "published": "2024-05-03T14:15:10.883", - "lastModified": "2024-05-03T14:17:53.690", + "lastModified": "2024-07-03T01:45:14.570", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Vulnerabilidad de Use After Free en Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver permite a un usuario local sin privilegios realizar operaciones de procesamiento de memoria de GPU incorrectas. Si el usuario prepara cuidadosamente la memoria del sistema, esto a su vez podr\u00eda darle acceso a la memoria ya liberada. Este problema afecta al controlador del kernel de arquitectura de GPU Arm de quinta generaci\u00f3n: desde r41p0 hasta r47p0." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.2 + } + ] + }, "weaknesses": [ { "source": "arm-security@arm.com", diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1598.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1598.json index 399a1b94280..44872109ea2 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1598.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1598.json @@ -2,8 +2,9 @@ "id": "CVE-2024-1598", "sourceIdentifier": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de", "published": "2024-05-14T16:15:59.443", - "lastModified": "2024-05-14T19:18:31.490", + "lastModified": "2024-07-03T01:45:24.367", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://www.phoenix.com/security-notifications/cve-2024-1598/", diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1608.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1608.json index 2a291c16f3e..c9fbbb54a4d 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1608.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1608.json @@ -2,8 +2,9 @@ "id": "CVE-2024-1608", "sourceIdentifier": "security@oppo.com", "published": "2024-02-20T09:15:08.877", - "lastModified": "2024-02-20T19:50:53.960", + "lastModified": "2024-07-03T01:45:25.227", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-280" + } + ] + } + ], "references": [ { "url": "https://security.oppo.com/en/noticeDetail?notice_only_key=NOTICE-1759867611954552832", diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1739.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1739.json index 4b890ccb9fa..486988c5ca4 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1739.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1739.json @@ -2,8 +2,9 @@ "id": "CVE-2024-1739", "sourceIdentifier": "security@huntr.dev", "published": "2024-04-16T00:15:10.697", - "lastModified": "2024-04-16T13:24:07.103", + "lastModified": "2024-07-03T01:45:31.133", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1743.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1743.json index 59605be4770..70c661c6730 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1743.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1743.json @@ -2,8 +2,9 @@ "id": "CVE-2024-1743", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-24T05:15:46.977", - "lastModified": "2024-04-24T13:39:42.883", + "lastModified": "2024-07-03T01:45:31.390", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El complemento de WordPress WooCommerce Customers Manager anterior a la versi\u00f3n 29.8 no sanitiza ni escapa de varios par\u00e1metros antes de devolverlos a p\u00e1ginas y atributos, lo que genera Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con privilegios elevados, como administradores." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/3cb1f707-6093-42a7-a778-2b296bdf1735/", diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1849.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1849.json index aa3b16ed0f9..3bb0970310c 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1849.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1849.json @@ -2,8 +2,9 @@ "id": "CVE-2024-1849", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-15T05:15:15.170", - "lastModified": "2024-04-15T13:15:31.997", + "lastModified": "2024-07-03T01:45:36.280", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento WP Customer Reviews de WordPress anterior a 3.7.1 no valida un par\u00e1metro que permite a los contribuyentes y usuarios superiores redirigir una p\u00e1gina a una URL maliciosa" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/e6d9fe28-def6-4f25-9967-a77f91899bfe/", diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20003.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20003.json index b2c18154832..bfb7aa07092 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20003.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20003.json @@ -2,8 +2,9 @@ "id": "CVE-2024-20003", "sourceIdentifier": "security@mediatek.com", "published": "2024-02-05T06:15:47.130", - "lastModified": "2024-02-09T02:01:04.183", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:45:42.740", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20004.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20004.json index cc4d10c7c89..e79af32bca6 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20004.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20004.json @@ -2,8 +2,9 @@ "id": "CVE-2024-20004", "sourceIdentifier": "security@mediatek.com", "published": "2024-02-05T06:15:47.190", - "lastModified": "2024-02-09T02:04:19.843", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:45:43.630", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20006.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20006.json index 0754b737f4f..e18b104164a 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20006.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20006.json @@ -2,8 +2,9 @@ "id": "CVE-2024-20006", "sourceIdentifier": "security@mediatek.com", "published": "2024-02-05T06:15:47.233", - "lastModified": "2024-02-09T02:04:52.490", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:45:44.467", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20015.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20015.json index ed75d96d593..618c6c7354e 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20015.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20015.json @@ -2,8 +2,9 @@ "id": "CVE-2024-20015", "sourceIdentifier": "security@mediatek.com", "published": "2024-02-05T06:15:47.580", - "lastModified": "2024-02-09T02:06:59.953", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:45:45.330", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-305" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20016.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20016.json index 91defe21dad..dd5341330c3 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20016.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20016.json @@ -2,8 +2,9 @@ "id": "CVE-2024-20016", "sourceIdentifier": "security@mediatek.com", "published": "2024-02-05T06:15:47.627", - "lastModified": "2024-02-09T02:07:50.523", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:45:46.207", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-190" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20021.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20021.json index 2d581a0257d..72f31e6c012 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20021.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20021.json @@ -2,8 +2,9 @@ "id": "CVE-2024-20021", "sourceIdentifier": "security@mediatek.com", "published": "2024-05-06T03:15:09.477", - "lastModified": "2024-05-06T12:44:56.377", + "lastModified": "2024-07-03T01:45:47.187", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "En atf spm, existe una forma posible de reasignar la memoria f\u00edsica a la memoria virtual debido a un error l\u00f3gico. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08584568; ID del problema: MSV-1249." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@mediatek.com", diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20024.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20024.json index acb116ef1f9..907f7251edf 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20024.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20024.json @@ -2,8 +2,9 @@ "id": "CVE-2024-20024", "sourceIdentifier": "security@mediatek.com", "published": "2024-03-04T03:15:07.237", - "lastModified": "2024-03-04T13:58:23.447", + "lastModified": "2024-07-03T01:45:47.463", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En flashc, existe una posible escritura fuera de los l\u00edmites debido a la falta de valoraci\u00f3n. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08541635; ID del problema: ALPS08541635." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/March-2024", diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20028.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20028.json index b0b9f407eb5..5abf4cee8b2 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20028.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20028.json @@ -2,8 +2,9 @@ "id": "CVE-2024-20028", "sourceIdentifier": "security@mediatek.com", "published": "2024-03-04T03:15:07.403", - "lastModified": "2024-03-04T13:58:23.447", + "lastModified": "2024-07-03T01:45:48.410", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En da, existe una posible escritura fuera de los l\u00edmites por falta de valoraci\u00f3n. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08541632; ID del problema: ALPS08541687." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/March-2024", diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20034.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20034.json index f34d79cab2f..be4f74ba997 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20034.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20034.json @@ -2,8 +2,9 @@ "id": "CVE-2024-20034", "sourceIdentifier": "security@mediatek.com", "published": "2024-03-04T03:15:07.673", - "lastModified": "2024-03-04T13:58:23.447", + "lastModified": "2024-07-03T01:45:49.510", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En la bater\u00eda, existe una posible escalada de privilegios debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08488849; ID del problema: ALPS08488849." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/March-2024", diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20041.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20041.json index 18baa042706..1159fdcaf10 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20041.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20041.json @@ -2,8 +2,9 @@ "id": "CVE-2024-20041", "sourceIdentifier": "security@mediatek.com", "published": "2024-04-01T03:15:07.897", - "lastModified": "2024-04-01T12:49:09.583", + "lastModified": "2024-07-03T01:45:50.520", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En da, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08541746; ID del problema: ALPS08541746." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20042.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20042.json index b9315cdbbe5..91548c1222d 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20042.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20042.json @@ -2,8 +2,9 @@ "id": "CVE-2024-20042", "sourceIdentifier": "security@mediatek.com", "published": "2024-04-01T03:15:07.953", - "lastModified": "2024-04-01T12:49:09.583", + "lastModified": "2024-07-03T01:45:51.343", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En da, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08541784; ID del problema: ALPS08541784." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20044.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20044.json index aa50ac5b72f..479223b9965 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20044.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20044.json @@ -2,8 +2,9 @@ "id": "CVE-2024-20044", "sourceIdentifier": "security@mediatek.com", "published": "2024-04-01T03:15:08.053", - "lastModified": "2024-04-01T12:49:09.583", + "lastModified": "2024-07-03T01:45:52.167", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En da, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08541784; ID del problema: ALPS08541784." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20046.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20046.json index 1bda560517d..914157ef1d7 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20046.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20046.json @@ -2,8 +2,9 @@ "id": "CVE-2024-20046", "sourceIdentifier": "security@mediatek.com", "published": "2024-04-01T03:15:08.177", - "lastModified": "2024-04-01T12:49:09.583", + "lastModified": "2024-07-03T01:45:53.103", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En bater\u00eda, existe una posible escalada de privilegios debido a un desbordamiento de enteros. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08485622; ID del problema: ALPS08485622." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20048.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20048.json index 5ddf652eb24..68caa7416ea 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20048.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20048.json @@ -2,8 +2,9 @@ "id": "CVE-2024-20048", "sourceIdentifier": "security@mediatek.com", "published": "2024-04-01T03:15:08.280", - "lastModified": "2024-04-01T12:49:00.877", + "lastModified": "2024-07-03T01:45:54.020", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En flashc, existe una posible divulgaci\u00f3n de informaci\u00f3n debido a una excepci\u00f3n no detectada. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08541757; ID del problema: ALPS08541757." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-248" + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20053.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20053.json index e01e7784c84..37b65ae7259 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20053.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20053.json @@ -2,8 +2,9 @@ "id": "CVE-2024-20053", "sourceIdentifier": "security@mediatek.com", "published": "2024-04-01T03:15:08.537", - "lastModified": "2024-04-01T12:49:00.877", + "lastModified": "2024-07-03T01:45:55.163", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En flashc, existe una posible escritura fuera de los l\u00edmites debido a una excepci\u00f3n no detectada. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08541757; ID del problema: ALPS08541764." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20054.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20054.json index fbc6ac36115..83529edb527 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20054.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20054.json @@ -2,8 +2,9 @@ "id": "CVE-2024-20054", "sourceIdentifier": "security@mediatek.com", "published": "2024-04-01T03:15:08.590", - "lastModified": "2024-04-01T12:49:00.877", + "lastModified": "2024-07-03T01:45:55.993", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En gnss, existe una posible escalada de privilegios debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08580200; ID del problema: ALPS08580200." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20058.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20058.json index a330cf205f6..598d2e917fc 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20058.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20058.json @@ -2,8 +2,9 @@ "id": "CVE-2024-20058", "sourceIdentifier": "security@mediatek.com", "published": "2024-05-06T03:15:09.710", - "lastModified": "2024-05-06T12:44:56.377", + "lastModified": "2024-07-03T01:45:57.120", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "En keyInstall, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08580204; ID del problema: ALPS08580204." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@mediatek.com", diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20067.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20067.json index 845b83b6c1c..a20c1737a22 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20067.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20067.json @@ -2,8 +2,9 @@ "id": "CVE-2024-20067", "sourceIdentifier": "security@mediatek.com", "published": "2024-06-03T02:15:08.770", - "lastModified": "2024-06-03T14:46:24.250", + "lastModified": "2024-07-03T01:45:57.883", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "En el m\u00f3dem, existe una posible escritura fuera de los l\u00edmites debido a una invalidaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar una denegaci\u00f3n remota de servicio sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: MOLY01267285; ID del problema: MSV-1462." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@mediatek.com", @@ -25,6 +49,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20071.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20071.json index fb4f3c4295e..16902dbf12b 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20071.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20071.json @@ -2,8 +2,9 @@ "id": "CVE-2024-20071", "sourceIdentifier": "security@mediatek.com", "published": "2024-06-03T02:15:09.220", - "lastModified": "2024-06-03T14:46:24.250", + "lastModified": "2024-07-03T01:45:58.913", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "En el controlador WLAN, existe una posible lectura fuera de los l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: WCNCR00364733; ID del problema: MSV-1331." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@mediatek.com", diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20072.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20072.json index e6ffebe6710..5211f9a2b87 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20072.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20072.json @@ -2,8 +2,9 @@ "id": "CVE-2024-20072", "sourceIdentifier": "security@mediatek.com", "published": "2024-06-03T02:15:09.320", - "lastModified": "2024-06-03T14:46:24.250", + "lastModified": "2024-07-03T01:45:59.183", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "En el controlador WLAN, existe una posible escritura fuera de los l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: WCNCR00364732; ID del problema: MSV-1332." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@mediatek.com", diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20073.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20073.json index 28e2f9e3a33..6aa27b38a67 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20073.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20073.json @@ -2,8 +2,9 @@ "id": "CVE-2024-20073", "sourceIdentifier": "security@mediatek.com", "published": "2024-06-03T02:15:09.420", - "lastModified": "2024-06-03T14:46:24.250", + "lastModified": "2024-07-03T01:45:59.423", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "En el servicio WLAN, existe una posible escritura fuera de los l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: WCNCR00367704; ID del problema: MSV-1411." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@mediatek.com", diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20074.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20074.json index 368f8e03e73..230f3237064 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20074.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20074.json @@ -2,8 +2,9 @@ "id": "CVE-2024-20074", "sourceIdentifier": "security@mediatek.com", "published": "2024-06-03T02:15:09.520", - "lastModified": "2024-06-03T14:46:24.250", + "lastModified": "2024-07-03T01:45:59.657", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "En dmc, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08668110; ID del problema: MSV-1333." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@mediatek.com", diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20076.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20076.json index f1f1f54ddd6..8bb3d7ec24b 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20076.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20076.json @@ -2,7 +2,7 @@ "id": "CVE-2024-20076", "sourceIdentifier": "security@mediatek.com", "published": "2024-07-01T05:15:03.957", - "lastModified": "2024-07-01T12:37:24.220", + "lastModified": "2024-07-03T01:46:00.000", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En Modem, existe una posible falla del sistema debido a un manejo incorrecto de errores. Esto podr\u00eda provocar una denegaci\u00f3n remota de servicio sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: MOLY01297806; ID del problema: MSV-1481." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@mediatek.com", diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20077.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20077.json index 1ca7cc0059c..4d5de262dff 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20077.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20077.json @@ -2,7 +2,7 @@ "id": "CVE-2024-20077", "sourceIdentifier": "security@mediatek.com", "published": "2024-07-01T05:15:04.133", - "lastModified": "2024-07-01T12:37:24.220", + "lastModified": "2024-07-03T01:46:00.247", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En Modem, existe una posible falla del sistema debido a un manejo incorrecto de errores. Esto podr\u00eda provocar una denegaci\u00f3n remota de servicio sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: MOLY01297807; ID del problema: MSV-1482." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@mediatek.com", diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20078.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20078.json index 86cfbf8d781..4429c8bb759 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20078.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20078.json @@ -2,7 +2,7 @@ "id": "CVE-2024-20078", "sourceIdentifier": "security@mediatek.com", "published": "2024-07-01T05:15:04.227", - "lastModified": "2024-07-01T12:37:24.220", + "lastModified": "2024-07-03T01:46:00.490", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En venc, existe una posible escritura fuera de los l\u00edmites debido a una confusi\u00f3n de tipos. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08737250; ID del problema: MSV-1452." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@mediatek.com", diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20258.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20258.json index fa1938b3b34..2396f557cf3 100644 --- a/CVE-2024/CVE-2024-202xx/CVE-2024-20258.json +++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20258.json @@ -2,8 +2,9 @@ "id": "CVE-2024-20258", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-05-15T18:15:09.193", - "lastModified": "2024-05-15T18:35:11.453", + "lastModified": "2024-07-03T01:46:01.017", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20326.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20326.json index 1ab714ef6fa..28a9cc0a5ee 100644 --- a/CVE-2024/CVE-2024-203xx/CVE-2024-20326.json +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20326.json @@ -2,8 +2,9 @@ "id": "CVE-2024-20326", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-05-16T14:15:08.420", - "lastModified": "2024-05-16T15:44:44.683", + "lastModified": "2024-07-03T01:46:03.803", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -44,6 +45,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20363.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20363.json index 2e4be87dca2..65c3a2b4614 100644 --- a/CVE-2024/CVE-2024-203xx/CVE-2024-20363.json +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20363.json @@ -2,8 +2,9 @@ "id": "CVE-2024-20363", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-05-22T17:16:13.950", - "lastModified": "2024-05-22T18:59:20.240", + "lastModified": "2024-07-03T01:46:06.070", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-290" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20399.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20399.json index 4cc3c9bf790..16c962b2c07 100644 --- a/CVE-2024/CVE-2024-203xx/CVE-2024-20399.json +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20399.json @@ -2,9 +2,13 @@ "id": "CVE-2024-20399", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-07-01T17:15:04.383", - "lastModified": "2024-07-02T12:09:16.907", + "lastModified": "2024-07-03T01:00:01.810", "vulnStatus": "Awaiting Analysis", "cveTags": [], + "cisaExploitAdd": "2024-07-02", + "cisaActionDue": "2024-07-23", + "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", + "cisaVulnerabilityName": "Cisco NX-OS Command Injection Vulnerability", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-209xx/CVE-2024-20998.json b/CVE-2024/CVE-2024-209xx/CVE-2024-20998.json index 41282075ef3..ee5cb6ecc49 100644 --- a/CVE-2024/CVE-2024-209xx/CVE-2024-20998.json +++ b/CVE-2024/CVE-2024-209xx/CVE-2024-20998.json @@ -2,8 +2,9 @@ "id": "CVE-2024-20998", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:13.140", - "lastModified": "2024-04-26T09:15:09.567", + "lastModified": "2024-07-03T01:46:21.563", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://security.netapp.com/advisory/ntap-20240426-0013/", diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2004.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2004.json index 7b0079643e3..d5996a7ab79 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2004.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2004.json @@ -2,8 +2,9 @@ "id": "CVE-2024-2004", "sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9", "published": "2024-03-27T08:15:41.173", - "lastModified": "2024-06-10T17:16:24.980", + "lastModified": "2024-07-03T01:52:57.560", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Cuando una opci\u00f3n de par\u00e1metro de selecci\u00f3n de protocolo deshabilita todos los protocolos sin agregar ninguno, el conjunto predeterminado de protocolos permanecer\u00eda en el conjunto permitido debido a un error en la l\u00f3gica para eliminar protocolos. El siguiente comando realizar\u00eda una solicitud a curl.se con un protocolo de texto plano que ha sido expl\u00edcitamente deshabilitado. curl --proto -all,-http http://curl.se La falla solo est\u00e1 presente si el conjunto de protocolos seleccionados desactiva todo el conjunto de protocolos disponibles, lo que en s\u00ed mismo es un comando sin uso pr\u00e1ctico y, por lo tanto, es poco probable que se encuentre en situaciones reales. Por lo tanto, el equipo de seguridad de curl ha evaluado que se trata de un error de baja gravedad." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/03/27/1", diff --git a/CVE-2024/CVE-2024-210xx/CVE-2024-21030.json b/CVE-2024/CVE-2024-210xx/CVE-2024-21030.json index 4e3672b9fd8..d8e2b77b46e 100644 --- a/CVE-2024/CVE-2024-210xx/CVE-2024-21030.json +++ b/CVE-2024/CVE-2024-210xx/CVE-2024-21030.json @@ -2,8 +2,9 @@ "id": "CVE-2024-21030", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:18.693", - "lastModified": "2024-04-19T17:33:22.030", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:46:23.853", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-210xx/CVE-2024-21040.json b/CVE-2024/CVE-2024-210xx/CVE-2024-21040.json index 01e2124804c..8db68fb6ad4 100644 --- a/CVE-2024/CVE-2024-210xx/CVE-2024-21040.json +++ b/CVE-2024/CVE-2024-210xx/CVE-2024-21040.json @@ -2,8 +2,9 @@ "id": "CVE-2024-21040", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:20.427", - "lastModified": "2024-04-17T12:48:31.863", + "lastModified": "2024-07-03T01:46:25.020", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuapr2024.html", diff --git a/CVE-2024/CVE-2024-210xx/CVE-2024-21053.json b/CVE-2024/CVE-2024-210xx/CVE-2024-21053.json index fd088ceb05a..dd6bb378f36 100644 --- a/CVE-2024/CVE-2024-210xx/CVE-2024-21053.json +++ b/CVE-2024/CVE-2024-210xx/CVE-2024-21053.json @@ -2,8 +2,9 @@ "id": "CVE-2024-21053", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:22.673", - "lastModified": "2024-04-26T09:15:10.830", + "lastModified": "2024-07-03T01:46:26.233", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://security.netapp.com/advisory/ntap-20240426-0012/", diff --git a/CVE-2024/CVE-2024-210xx/CVE-2024-21054.json b/CVE-2024/CVE-2024-210xx/CVE-2024-21054.json index 2e77c12b27a..f67192cdd16 100644 --- a/CVE-2024/CVE-2024-210xx/CVE-2024-21054.json +++ b/CVE-2024/CVE-2024-210xx/CVE-2024-21054.json @@ -2,8 +2,9 @@ "id": "CVE-2024-21054", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:22.840", - "lastModified": "2024-04-26T09:15:10.893", + "lastModified": "2024-07-03T01:46:26.957", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://security.netapp.com/advisory/ntap-20240426-0013/", diff --git a/CVE-2024/CVE-2024-210xx/CVE-2024-21057.json b/CVE-2024/CVE-2024-210xx/CVE-2024-21057.json index b5ed203b0c2..50e3ab60f73 100644 --- a/CVE-2024/CVE-2024-210xx/CVE-2024-21057.json +++ b/CVE-2024/CVE-2024-210xx/CVE-2024-21057.json @@ -2,8 +2,9 @@ "id": "CVE-2024-21057", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:23.350", - "lastModified": "2024-04-17T12:48:31.863", + "lastModified": "2024-07-03T01:46:27.783", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuapr2024.html", diff --git a/CVE-2024/CVE-2024-210xx/CVE-2024-21064.json b/CVE-2024/CVE-2024-210xx/CVE-2024-21064.json index 376417580fa..47e0bc5f1e8 100644 --- a/CVE-2024/CVE-2024-210xx/CVE-2024-21064.json +++ b/CVE-2024/CVE-2024-210xx/CVE-2024-21064.json @@ -2,8 +2,9 @@ "id": "CVE-2024-21064", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:24.607", - "lastModified": "2024-04-17T12:48:31.863", + "lastModified": "2024-07-03T01:46:28.883", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuapr2024.html", diff --git a/CVE-2024/CVE-2024-210xx/CVE-2024-21084.json b/CVE-2024/CVE-2024-210xx/CVE-2024-21084.json index 08b03b404c2..de242d9a7c2 100644 --- a/CVE-2024/CVE-2024-210xx/CVE-2024-21084.json +++ b/CVE-2024/CVE-2024-210xx/CVE-2024-21084.json @@ -2,8 +2,9 @@ "id": "CVE-2024-21084", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:28.120", - "lastModified": "2024-04-17T12:48:31.863", + "lastModified": "2024-07-03T01:46:30.583", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuapr2024.html", diff --git a/CVE-2024/CVE-2024-210xx/CVE-2024-21091.json b/CVE-2024/CVE-2024-210xx/CVE-2024-21091.json index 0c548fefd0e..1637095d252 100644 --- a/CVE-2024/CVE-2024-210xx/CVE-2024-21091.json +++ b/CVE-2024/CVE-2024-210xx/CVE-2024-21091.json @@ -2,8 +2,9 @@ "id": "CVE-2024-21091", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:29.330", - "lastModified": "2024-04-17T12:48:31.863", + "lastModified": "2024-07-03T01:46:31.737", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuapr2024.html", diff --git a/CVE-2024/CVE-2024-210xx/CVE-2024-21094.json b/CVE-2024/CVE-2024-210xx/CVE-2024-21094.json index 43e11b0e4cd..caff2afa1e5 100644 --- a/CVE-2024/CVE-2024-210xx/CVE-2024-21094.json +++ b/CVE-2024/CVE-2024-210xx/CVE-2024-21094.json @@ -2,8 +2,9 @@ "id": "CVE-2024-21094", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:29.857", - "lastModified": "2024-04-26T09:15:11.613", + "lastModified": "2024-07-03T01:46:32.570", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-349" + } + ] + } + ], "references": [ { "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html", diff --git a/CVE-2024/CVE-2024-210xx/CVE-2024-21095.json b/CVE-2024/CVE-2024-210xx/CVE-2024-21095.json index 3c6d2dba552..2a75e5da6e8 100644 --- a/CVE-2024/CVE-2024-210xx/CVE-2024-21095.json +++ b/CVE-2024/CVE-2024-210xx/CVE-2024-21095.json @@ -2,8 +2,9 @@ "id": "CVE-2024-21095", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:30.040", - "lastModified": "2024-04-17T12:48:31.863", + "lastModified": "2024-07-03T01:46:33.287", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuapr2024.html", diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21503.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21503.json index d345fde5268..dec6727d838 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21503.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21503.json @@ -2,8 +2,9 @@ "id": "CVE-2024-21503", "sourceIdentifier": "report@snyk.io", "published": "2024-03-19T05:15:09.447", - "lastModified": "2024-03-19T13:26:46.000", + "lastModified": "2024-07-03T01:46:41.680", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-1333" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-75" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21516.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21516.json index 950eead7a72..3171779eead 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21516.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21516.json @@ -2,8 +2,9 @@ "id": "CVE-2024-21516", "sourceIdentifier": "report@snyk.io", "published": "2024-06-22T05:15:10.967", - "lastModified": "2024-06-24T19:57:38.197", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:46:42.813", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -78,6 +79,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21518.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21518.json index cf970c5f5ef..88783c3636b 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21518.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21518.json @@ -2,8 +2,9 @@ "id": "CVE-2024-21518", "sourceIdentifier": "report@snyk.io", "published": "2024-06-22T05:15:11.403", - "lastModified": "2024-06-24T19:56:14.723", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:46:43.670", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -78,6 +79,20 @@ "value": "CWE-29" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + }, + { + "lang": "en", + "value": "CWE-290" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21683.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21683.json index 6b5e191c875..fe4951c36b0 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21683.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21683.json @@ -2,8 +2,9 @@ "id": "CVE-2024-21683", "sourceIdentifier": "security@atlassian.com", "published": "2024-05-21T23:15:07.923", - "lastModified": "2024-06-10T18:15:25.363", + "lastModified": "2024-07-03T01:46:45.440", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21741.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21741.json index 2885d3a1d94..e8127f04058 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21741.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21741.json @@ -2,8 +2,9 @@ "id": "CVE-2024-21741", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-25T21:15:57.357", - "lastModified": "2024-06-26T12:44:29.693", + "lastModified": "2024-07-03T01:46:46.537", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Los dispositivos GigaDevice GD32E103C8T6 tienen un control de acceso incorrecto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://tches.iacr.org/index.php/TCHES/article/view/11422/10927", diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21791.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21791.json index 60c1045b864..39658449acd 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21791.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21791.json @@ -2,8 +2,9 @@ "id": "CVE-2024-21791", "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", "published": "2024-05-22T18:15:09.740", - "lastModified": "2024-06-07T09:15:10.820", + "lastModified": "2024-07-03T01:46:48.367", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21813.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21813.json index 1dac301f0fd..0bb96105be7 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21813.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21813.json @@ -2,8 +2,9 @@ "id": "CVE-2024-21813", "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:16:03.203", - "lastModified": "2024-05-17T18:36:05.263", + "lastModified": "2024-07-03T01:46:49.307", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-668" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21828.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21828.json index 5bb6f3156db..7a8ba0172ff 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21828.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21828.json @@ -2,8 +2,9 @@ "id": "CVE-2024-21828", "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:16:04.083", - "lastModified": "2024-05-17T18:36:05.263", + "lastModified": "2024-07-03T01:46:50.690", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-284" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21831.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21831.json index d49432a6b8a..89ac70b89fc 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21831.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21831.json @@ -2,8 +2,9 @@ "id": "CVE-2024-21831", "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:16:04.280", - "lastModified": "2024-05-17T18:36:05.263", + "lastModified": "2024-07-03T01:46:51.433", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-427" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21843.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21843.json index 06c9824b8c8..4ed252496d7 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21843.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21843.json @@ -2,8 +2,9 @@ "id": "CVE-2024-21843", "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:16:05.117", - "lastModified": "2024-05-17T18:36:05.263", + "lastModified": "2024-07-03T01:46:52.670", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-427" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21864.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21864.json index 8f70fdd3c19..ac9c4e91388 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21864.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21864.json @@ -2,8 +2,9 @@ "id": "CVE-2024-21864", "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:16:05.867", - "lastModified": "2024-05-17T18:36:05.263", + "lastModified": "2024-07-03T01:46:53.603", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-86" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-707" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21885.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21885.json index c7c1e70b7c8..b6f39be75ae 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21885.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21885.json @@ -2,8 +2,9 @@ "id": "CVE-2024-21885", "sourceIdentifier": "secalert@redhat.com", "published": "2024-02-28T13:15:08.197", - "lastModified": "2024-05-22T17:16:14.187", + "lastModified": "2024-07-03T01:46:54.537", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-122" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21893.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21893.json index ca619db7945..dbada56f02f 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21893.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21893.json @@ -2,8 +2,9 @@ "id": "CVE-2024-21893", "sourceIdentifier": "support@hackerone.com", "published": "2024-01-31T18:15:47.437", - "lastModified": "2024-02-01T02:00:01.187", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:46:55.640", + "vulnStatus": "Modified", + "cveTags": [], "cisaExploitAdd": "2024-01-31", "cisaActionDue": "2024-02-02", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", @@ -74,6 +75,16 @@ "value": "CWE-918" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21894.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21894.json index 5c875e89ca3..bc1600098c0 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21894.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21894.json @@ -2,8 +2,9 @@ "id": "CVE-2024-21894", "sourceIdentifier": "support@hackerone.com", "published": "2024-04-04T23:15:15.640", - "lastModified": "2024-04-08T22:53:09.773", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:46:56.430", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -70,6 +71,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2101.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2101.json index 1a9c98877d0..a8d7053178c 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2101.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2101.json @@ -2,8 +2,9 @@ "id": "CVE-2024-2101", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-17T05:15:48.597", - "lastModified": "2024-04-17T12:48:07.510", + "lastModified": "2024-07-03T01:53:00.530", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento Salon booking system de WordPress anterior a 9.6.3 no sanitiza adecuadamente ni escapa del campo \"Tel\u00e9fono m\u00f3vil\" al reservar una cita, lo que permite a los clientes realizar ataques de Cross-Site Scripting Almacenado. El payload se activa cuando un administrador visita la p\u00e1gina \"Clientes\" y el script malicioso se ejecuta en el contexto del administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/b3a0bb3f-50b2-4dcb-b23c-b08480363a4a/", diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2118.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2118.json index cebc62ac1ff..2ec549287c2 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2118.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2118.json @@ -2,8 +2,9 @@ "id": "CVE-2024-2118", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-17T05:15:48.693", - "lastModified": "2024-04-17T12:48:07.510", + "lastModified": "2024-07-03T01:53:01.593", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento Social Media Share Buttons & Social Sharing Icons de WordPress anterior a 2.8.9 no desinfecta ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con altos privilegios, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida ( por ejemplo en configuraci\u00f3n multisitio)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 0.0, + "baseSeverity": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 0.0 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/e9d53cb9-a5cb-49f5-bcba-295ae6fa44c3/", diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2173.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2173.json index 8bb9d365067..8f9e2f0789e 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2173.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2173.json @@ -2,8 +2,9 @@ "id": "CVE-2024-2173", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-03-06T19:15:08.973", - "lastModified": "2024-03-23T03:15:12.133", + "lastModified": "2024-07-03T01:53:03.693", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El acceso a memoria fuera de los l\u00edmites en V8 en Google Chrome anterior a 122.0.6261.111 permit\u00eda a un atacante remoto realizar un acceso a la memoria fuera de los l\u00edmites a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.2 + } + ] + }, "references": [ { "url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop.html", diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22002.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22002.json index 29ea6574198..2bb2a13447f 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22002.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22002.json @@ -2,8 +2,9 @@ "id": "CVE-2024-22002", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-18T19:15:59.397", - "lastModified": "2024-06-20T12:44:01.637", + "lastModified": "2024-07-03T01:46:58.073", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "CORSAIR iCUE 5.9.105 con iCUE Murals en Windows permite a usuarios sin privilegios insertar archivos DLL en el subdirectorio cuepkg-1.2.6 del directorio de instalaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://github.com/0xkickit/iCUE_DllHijack_LPE-CVE-2024-22002", diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22015.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22015.json index a55fb2e2825..116700a145e 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22015.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22015.json @@ -2,8 +2,9 @@ "id": "CVE-2024-22015", "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:16:06.097", - "lastModified": "2024-05-17T18:36:05.263", + "lastModified": "2024-07-03T01:46:59.010", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22023.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22023.json index d8aeedd68d3..a85d3fa8f58 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22023.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22023.json @@ -2,8 +2,9 @@ "id": "CVE-2024-22023", "sourceIdentifier": "support@hackerone.com", "published": "2024-04-04T20:15:08.130", - "lastModified": "2024-04-08T22:51:43.003", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:46:59.843", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -70,6 +71,16 @@ "value": "CWE-476" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22053.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22053.json index 3441bd30496..88c406a4f51 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22053.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22053.json @@ -2,8 +2,9 @@ "id": "CVE-2024-22053", "sourceIdentifier": "support@hackerone.com", "published": "2024-04-04T20:15:08.500", - "lastModified": "2024-04-08T22:53:03.443", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:47:01.167", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -70,6 +71,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22059.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22059.json index e5246f8e384..c25b245fcf9 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22059.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22059.json @@ -2,8 +2,9 @@ "id": "CVE-2024-22059", "sourceIdentifier": "support@hackerone.com", "published": "2024-05-31T18:15:10.493", - "lastModified": "2024-05-31T19:14:47.793", + "lastModified": "2024-07-03T01:47:02.030", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22061.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22061.json index 392db12a83f..b7172b5e6a9 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22061.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22061.json @@ -2,8 +2,9 @@ "id": "CVE-2024-22061", "sourceIdentifier": "support@hackerone.com", "published": "2024-04-19T02:15:06.737", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:47:02.763", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US", diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22095.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22095.json index 697c6fa4e99..410ce5359b6 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22095.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22095.json @@ -2,8 +2,9 @@ "id": "CVE-2024-22095", "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:16:06.320", - "lastModified": "2024-05-17T18:36:05.263", + "lastModified": "2024-07-03T01:47:03.793", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22103.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22103.json index 3fbe34a7b6f..d18891312e7 100644 --- a/CVE-2024/CVE-2024-221xx/CVE-2024-22103.json +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22103.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22103", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-02T15:15:11.150", - "lastModified": "2024-07-02T17:44:45.700", + "lastModified": "2024-07-03T01:47:04.630", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Out-of-Bounds Write vulnerability in Jungo WinDriver before 12.6.0 allows local attackers to cause a Windows blue screen error and Denial of Service (DoS)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://jungo.com/windriver/versions/", diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22106.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22106.json index cae9c617868..11040eb8595 100644 --- a/CVE-2024/CVE-2024-221xx/CVE-2024-22106.json +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22106.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22106", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-02T16:15:03.980", - "lastModified": "2024-07-02T17:44:45.700", + "lastModified": "2024-07-03T01:47:05.580", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Improper privilege management in Jungo WinDriver before 12.5.1 allows local attackers to escalate privileges, execute arbitrary code, or cause a Denial of Service (DoS)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://jungo.com/windriver/versions/", diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22151.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22151.json index 674819aff5a..e2264a092fc 100644 --- a/CVE-2024/CVE-2024-221xx/CVE-2024-22151.json +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22151.json @@ -2,8 +2,9 @@ "id": "CVE-2024-22151", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-08T17:15:42.420", - "lastModified": "2024-06-10T02:52:08.267", + "lastModified": "2024-07-03T01:47:07.170", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22246.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22246.json index d495e0a8645..c4885b6ba92 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22246.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22246.json @@ -2,8 +2,9 @@ "id": "CVE-2024-22246", "sourceIdentifier": "security@vmware.com", "published": "2024-04-02T16:15:07.573", - "lastModified": "2024-04-02T18:12:16.283", + "lastModified": "2024-07-03T01:47:08.260", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://www.vmware.com/security/advisories/VMSA-2024-0008.html", diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22247.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22247.json index 34852b3e864..04c745bd740 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22247.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22247.json @@ -2,8 +2,9 @@ "id": "CVE-2024-22247", "sourceIdentifier": "security@vmware.com", "published": "2024-04-02T16:15:07.833", - "lastModified": "2024-04-02T18:12:16.283", + "lastModified": "2024-07-03T01:47:08.997", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], "references": [ { "url": "https://www.vmware.com/security/advisories/VMSA-2024-0008.html", diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22259.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22259.json index 470fc12f39d..15c71a4f99b 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22259.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22259.json @@ -2,8 +2,9 @@ "id": "CVE-2024-22259", "sourceIdentifier": "security@vmware.com", "published": "2024-03-16T05:15:20.830", - "lastModified": "2024-06-10T18:15:25.853", + "lastModified": "2024-07-03T01:47:10.080", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], "references": [ { "url": "https://security.netapp.com/advisory/ntap-20240524-0002/", diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22263.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22263.json index 2fde484d11f..efbbce07e60 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22263.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22263.json @@ -2,8 +2,9 @@ "id": "CVE-2024-22263", "sourceIdentifier": "security@vmware.com", "published": "2024-06-19T15:15:58.327", - "lastModified": "2024-06-20T12:43:25.663", + "lastModified": "2024-07-03T01:47:11.083", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://spring.io/security/cve-2024-22263", diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22269.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22269.json index 5a09b987805..083a46d05d4 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22269.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22269.json @@ -2,8 +2,9 @@ "id": "CVE-2024-22269", "sourceIdentifier": "security@vmware.com", "published": "2024-05-14T16:16:10.117", - "lastModified": "2024-05-14T19:18:31.490", + "lastModified": "2024-07-03T01:47:12.157", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24280", diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22274.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22274.json index f516c02094f..f6b5f221c83 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22274.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22274.json @@ -2,8 +2,9 @@ "id": "CVE-2024-22274", "sourceIdentifier": "security@vmware.com", "published": "2024-05-21T18:15:09.190", - "lastModified": "2024-05-22T12:46:53.887", + "lastModified": "2024-07-03T01:47:13.067", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24308", diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22390.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22390.json index d4b76fdfedd..72043728a9d 100644 --- a/CVE-2024/CVE-2024-223xx/CVE-2024-22390.json +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22390.json @@ -2,8 +2,9 @@ "id": "CVE-2024-22390", "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:16:07.150", - "lastModified": "2024-05-17T18:36:05.263", + "lastModified": "2024-07-03T01:47:16.433", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22396.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22396.json index 7e6022d7f2c..bf6c997a49a 100644 --- a/CVE-2024/CVE-2024-223xx/CVE-2024-22396.json +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22396.json @@ -2,8 +2,9 @@ "id": "CVE-2024-22396", "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2024-03-14T04:15:09.080", - "lastModified": "2024-03-14T12:52:09.877", + "lastModified": "2024-07-03T01:47:17.270", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Una vulnerabilidad de desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en SonicOS a trav\u00e9s de IPSec permite que un atacante remoto en condiciones espec\u00edficas cause Denegaci\u00f3n de Servicio (DoS) y potencialmente ejecute c\u00f3digo arbitrario enviando un payload IKEv2 especialmente manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "PSIRT@sonicwall.com", diff --git a/CVE-2024/CVE-2024-225xx/CVE-2024-22546.json b/CVE-2024/CVE-2024-225xx/CVE-2024-22546.json index 58b52bb713c..db9348552b8 100644 --- a/CVE-2024/CVE-2024-225xx/CVE-2024-22546.json +++ b/CVE-2024/CVE-2024-225xx/CVE-2024-22546.json @@ -2,8 +2,9 @@ "id": "CVE-2024-22546", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T19:15:23.147", - "lastModified": "2024-04-30T19:35:36.960", + "lastModified": "2024-07-03T01:47:18.977", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "TRENDnet TEW-815DAP 1.0.2.0 es vulnerable a la inyecci\u00f3n de comandos a trav\u00e9s de la funci\u00f3n do_setNTP. Un atacante autenticado con privilegios de administrador puede aprovechar esta vulnerabilidad en la red mediante una solicitud POST maliciosa." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://warp-desk-89d.notion.site/TEW-815DAP-94a631c20dee4f399268dbcc880f1f4c", diff --git a/CVE-2024/CVE-2024-226xx/CVE-2024-22640.json b/CVE-2024/CVE-2024-226xx/CVE-2024-22640.json index 7a49aa231e0..5b57f67e133 100644 --- a/CVE-2024/CVE-2024-226xx/CVE-2024-22640.json +++ b/CVE-2024/CVE-2024-226xx/CVE-2024-22640.json @@ -2,8 +2,9 @@ "id": "CVE-2024-22640", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T16:15:09.630", - "lastModified": "2024-05-02T03:15:14.890", + "lastModified": "2024-07-03T01:47:19.810", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La versi\u00f3n de TCPDF <= 6.6.5 es vulnerable a ReDoS (denegaci\u00f3n de servicio de expresi\u00f3n regular) si se analiza una p\u00e1gina HTML que no es de confianza con un color manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1333" + } + ] + } + ], "references": [ { "url": "https://github.com/tecnickcom/TCPDF", diff --git a/CVE-2024/CVE-2024-227xx/CVE-2024-22722.json b/CVE-2024/CVE-2024-227xx/CVE-2024-22722.json index 8f892f673e1..7b2d1ccd7fb 100644 --- a/CVE-2024/CVE-2024-227xx/CVE-2024-22722.json +++ b/CVE-2024/CVE-2024-227xx/CVE-2024-22722.json @@ -2,8 +2,9 @@ "id": "CVE-2024-22722", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-11T20:15:33.417", - "lastModified": "2024-04-12T12:43:57.400", + "lastModified": "2024-07-03T01:47:20.897", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de Server Side Template Injection (SSTI) en Form Tools 3.1.1 permite a los atacantes ejecutar comandos arbitrarios a trav\u00e9s del campo Nombre de grupo en la secci\u00f3n Agregar formularios de la aplicaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://hakaisecurity.io/error-404-your-security-not-found-tales-of-web-vulnerabilities/", diff --git a/CVE-2024/CVE-2024-227xx/CVE-2024-22774.json b/CVE-2024/CVE-2024-227xx/CVE-2024-22774.json index 01da8402ddd..34c4cff7dfe 100644 --- a/CVE-2024/CVE-2024-227xx/CVE-2024-22774.json +++ b/CVE-2024/CVE-2024-227xx/CVE-2024-22774.json @@ -2,8 +2,9 @@ "id": "CVE-2024-22774", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T14:58:21.420", - "lastModified": "2024-05-19T05:15:06.337", + "lastModified": "2024-07-03T01:47:21.717", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en Panoramic Corporation Digital Imaging Software v.9.1.2.7600 permite a un atacante local escalar privilegios a trav\u00e9s del componente ccsservice.exe." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://blueteamalpha.com/blog/new-vulnerability-discovered-in-panoramic-x-ray-software/", diff --git a/CVE-2024/CVE-2024-227xx/CVE-2024-22779.json b/CVE-2024/CVE-2024-227xx/CVE-2024-22779.json index b5c3802e46f..797b8996259 100644 --- a/CVE-2024/CVE-2024-227xx/CVE-2024-22779.json +++ b/CVE-2024/CVE-2024-227xx/CVE-2024-22779.json @@ -2,8 +2,9 @@ "id": "CVE-2024-22779", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-02T02:15:17.890", - "lastModified": "2024-02-10T04:10:09.100", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:47:22.543", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -68,6 +69,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-228xx/CVE-2024-22807.json b/CVE-2024/CVE-2024-228xx/CVE-2024-22807.json index adaddd5bdd4..1eeab4deeaa 100644 --- a/CVE-2024/CVE-2024-228xx/CVE-2024-22807.json +++ b/CVE-2024/CVE-2024-228xx/CVE-2024-22807.json @@ -2,8 +2,9 @@ "id": "CVE-2024-22807", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T12:15:07.240", - "lastModified": "2024-04-22T13:28:34.007", + "lastModified": "2024-07-03T01:47:23.287", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en Tormach xsTECH CNC Router, PathPilot Controller v2.9.6 permite a los atacantes borrar un sector cr\u00edtico de la memoria flash, lo que hace que la m\u00e1quina pierda conectividad de red y sufra da\u00f1os en el firmware." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/VcuCyber/51075894d1728db07fc2df286c003df9", diff --git a/CVE-2024/CVE-2024-228xx/CVE-2024-22808.json b/CVE-2024/CVE-2024-228xx/CVE-2024-22808.json index 6e97e9cfd19..8db2dfff101 100644 --- a/CVE-2024/CVE-2024-228xx/CVE-2024-22808.json +++ b/CVE-2024/CVE-2024-228xx/CVE-2024-22808.json @@ -2,8 +2,9 @@ "id": "CVE-2024-22808", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T12:15:07.313", - "lastModified": "2024-04-22T13:28:34.007", + "lastModified": "2024-07-03T01:47:24.097", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en Tormach xsTECH CNC Router, PathPilot Controller v2.9.6 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) al interrumpir la comunicaci\u00f3n entre el controlador PathPilot y el enrutador CNC sobrescribiendo el nombre de la tarjeta en la memoria del dispositivo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/VcuCyber/51075894d1728db07fc2df286c003df9", diff --git a/CVE-2024/CVE-2024-228xx/CVE-2024-22809.json b/CVE-2024/CVE-2024-228xx/CVE-2024-22809.json index 7453ea9c1f2..2482d8e567c 100644 --- a/CVE-2024/CVE-2024-228xx/CVE-2024-22809.json +++ b/CVE-2024/CVE-2024-228xx/CVE-2024-22809.json @@ -2,8 +2,9 @@ "id": "CVE-2024-22809", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T12:15:07.370", - "lastModified": "2024-04-22T13:28:34.007", + "lastModified": "2024-07-03T01:47:24.930", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Control de acceso incorrecto en Tormach xsTECH CNC Router, PathPilot Controller v2.9.6 permite a los atacantes acceder a la carpeta compartida del c\u00f3digo G y ver informaci\u00f3n confidencial." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-228" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/VcuCyber/51075894d1728db07fc2df286c003df9", diff --git a/CVE-2024/CVE-2024-228xx/CVE-2024-22811.json b/CVE-2024/CVE-2024-228xx/CVE-2024-22811.json index d866d5183e7..525ea28711a 100644 --- a/CVE-2024/CVE-2024-228xx/CVE-2024-22811.json +++ b/CVE-2024/CVE-2024-228xx/CVE-2024-22811.json @@ -2,8 +2,9 @@ "id": "CVE-2024-22811", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T12:15:07.427", - "lastModified": "2024-04-22T13:28:34.007", + "lastModified": "2024-07-03T01:47:25.797", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en Tormach xsTECH CNC Router, PathPilot Controller v2.9.6 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) al interrumpir la comunicaci\u00f3n entre el controlador PathPilot y el enrutador CNC sobrescribiendo la cookie de configuraci\u00f3n Hostmot2 en la memoria del dispositivo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/VcuCyber/51075894d1728db07fc2df286c003df9", diff --git a/CVE-2024/CVE-2024-228xx/CVE-2024-22813.json b/CVE-2024/CVE-2024-228xx/CVE-2024-22813.json index a0f30d81035..54756c3146b 100644 --- a/CVE-2024/CVE-2024-228xx/CVE-2024-22813.json +++ b/CVE-2024/CVE-2024-228xx/CVE-2024-22813.json @@ -2,8 +2,9 @@ "id": "CVE-2024-22813", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T12:15:07.497", - "lastModified": "2024-04-22T13:28:34.007", + "lastModified": "2024-07-03T01:47:26.623", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en Tormach xsTECH CNC Router, PathPilot Controller v2.9.6 permite a los atacantes sobrescribir la direcci\u00f3n IP codificada en la memoria del dispositivo, interrumpiendo la conectividad de red entre el enrutador y el controlador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/VcuCyber/51075894d1728db07fc2df286c003df9", diff --git a/CVE-2024/CVE-2024-228xx/CVE-2024-22815.json b/CVE-2024/CVE-2024-228xx/CVE-2024-22815.json index db76b004641..7853ff7bc3f 100644 --- a/CVE-2024/CVE-2024-228xx/CVE-2024-22815.json +++ b/CVE-2024/CVE-2024-228xx/CVE-2024-22815.json @@ -2,8 +2,9 @@ "id": "CVE-2024-22815", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T12:15:07.550", - "lastModified": "2024-04-22T13:28:34.007", + "lastModified": "2024-07-03T01:47:27.470", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en el protocolo de comunicaci\u00f3n de Tormach xsTECH CNC Router, PathPilot Controller v2.9.6, permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante comandos manipulados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-228" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/VcuCyber/51075894d1728db07fc2df286c003df9", diff --git a/CVE-2024/CVE-2024-228xx/CVE-2024-22830.json b/CVE-2024/CVE-2024-228xx/CVE-2024-22830.json index 43a66c2eeef..25f0113b516 100644 --- a/CVE-2024/CVE-2024-228xx/CVE-2024-22830.json +++ b/CVE-2024/CVE-2024-228xx/CVE-2024-22830.json @@ -2,8 +2,9 @@ "id": "CVE-2024-22830", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T19:15:22.030", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-07-03T01:47:28.283", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El m\u00f3dulo del kernel de Windows de Anti-Cheat Expert \"ACE-BASE.sys\" versi\u00f3n 1.0.2202.6217 no realiza un control de acceso adecuado cuando maneja los recursos del sistema. Esto permite a un atacante local escalar privilegios desde el nivel de usuario normal al nivel de Sistema o PPL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "http://anti-cheat.com", diff --git a/CVE-2024/CVE-2024-228xx/CVE-2024-22856.json b/CVE-2024/CVE-2024-228xx/CVE-2024-22856.json index 27d4e3ebacd..502355be48b 100644 --- a/CVE-2024/CVE-2024-228xx/CVE-2024-22856.json +++ b/CVE-2024/CVE-2024-228xx/CVE-2024-22856.json @@ -2,8 +2,9 @@ "id": "CVE-2024-22856", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T12:15:07.610", - "lastModified": "2024-04-22T13:28:34.007", + "lastModified": "2024-07-03T01:47:29.290", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s de la funci\u00f3n Guardar b\u00fasqueda favorita en Axefinance Ax Credit Portal >= v.3.0 permite a atacantes autenticados ejecutar consultas no deseadas y revelar informaci\u00f3n confidencial de tablas de base de datos a trav\u00e9s de solicitudes manipuladas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 0.0, + "baseSeverity": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 0.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://www.4rth4s.xyz/2024/04/cve-2024-22856-authenticated-blind-sql.html", diff --git a/CVE-2024/CVE-2024-229xx/CVE-2024-22905.json b/CVE-2024/CVE-2024-229xx/CVE-2024-22905.json index 84f16770f40..251b61d2f0a 100644 --- a/CVE-2024/CVE-2024-229xx/CVE-2024-22905.json +++ b/CVE-2024/CVE-2024-229xx/CVE-2024-22905.json @@ -2,8 +2,9 @@ "id": "CVE-2024-22905", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T21:15:07.960", - "lastModified": "2024-04-22T13:28:50.310", + "lastModified": "2024-07-03T01:47:30.227", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de desbordamiento de b\u00fafer en ARM mbed-os v.6.17.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado para la funci\u00f3n hciTrSerialRxIncoming." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/ARMmbed/mbed-os/blob/7c7d20da6527885237094d9d50ce099404414201/connectivity/FEATURE_BLE/source/cordio/stack_adaptation/hci_tr.c#L125", diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2218.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2218.json index f1c5b1869ec..f049d9907d3 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2218.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2218.json @@ -2,8 +2,9 @@ "id": "CVE-2024-2218", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-14T06:15:11.570", - "lastModified": "2024-06-17T12:42:04.623", + "lastModified": "2024-07-03T01:53:05.340", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento LuckyWP Table of Contents de WordPress hasta la versi\u00f3n 2.1.4 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/ecd615f7-946e-45af-a610-0654a243b1dc/", diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2220.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2220.json index 86893026de7..ac4508a76d9 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2220.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2220.json @@ -2,8 +2,9 @@ "id": "CVE-2024-2220", "sourceIdentifier": "contact@wpscan.com", "published": "2024-05-23T06:15:08.730", - "lastModified": "2024-05-24T01:15:30.977", + "lastModified": "2024-07-03T01:53:05.537", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento Button Contact VR de WordPress hasta la versi\u00f3n 4.7 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/fe8c001e-8880-4570-b010-a41fc8ee0c58/", diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2257.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2257.json index 2e6796be313..b24a512d914 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2257.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2257.json @@ -2,8 +2,9 @@ "id": "CVE-2024-2257", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-05-14T15:18:35.380", - "lastModified": "2024-06-05T13:15:12.557", + "lastModified": "2024-07-03T01:53:07.027", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Esta vulnerabilidad existe en Digisol Router (DG-GR1321: versi\u00f3n de hardware 3.7L; versi\u00f3n de firmware: v3.2.02) debido a una implementaci\u00f3n incorrecta de las pol\u00edticas de contrase\u00f1a. Un atacante con acceso f\u00edsico podr\u00eda aprovechar esto creando una contrase\u00f1a que no cumpla con los est\u00e1ndares/pol\u00edticas de seguridad definidos en el sistema vulnerable. La explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda permitir al atacante exponer el enrutador a posibles amenazas a la seguridad." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, "weaknesses": [ { "source": "vdisclose@cert-in.org.in", diff --git a/CVE-2024/CVE-2024-230xx/CVE-2024-23054.json b/CVE-2024/CVE-2024-230xx/CVE-2024-23054.json index 907c5ac8294..74edb032861 100644 --- a/CVE-2024/CVE-2024-230xx/CVE-2024-23054.json +++ b/CVE-2024/CVE-2024-230xx/CVE-2024-23054.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23054", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-05T16:15:55.437", - "lastModified": "2024-02-13T18:27:16.557", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:47:31.317", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-427" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23140.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23140.json index 681cdbe3753..4c2747084d2 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23140.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23140.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23140", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-06-25T02:15:10.940", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T01:47:32.750", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Un archivo 3DM y MODEL creado con fines malintencionados, cuando se analiza en opennurbs.dll y atf_api.dll mediante aplicaciones de Autodesk, puede forzar una lectura fuera de los l\u00edmites. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, leer datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23141.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23141.json index 1fda8255d87..b24f736127f 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23141.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23141.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23141", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-06-25T02:15:11.030", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T01:47:33.010", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Un archivo MODEL creado con fines malintencionados, cuando se analiza en libodxdll a trav\u00e9s de aplicaciones de Autodesk, puede provocar una doble liberaci\u00f3n. Esta vulnerabilidad, junto con otras vulnerabilidades, puede provocar la ejecuci\u00f3n de c\u00f3digo en el proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23142.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23142.json index 597d9a6452d..6ccc0d037ec 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23142.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23142.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23142", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-06-25T02:15:11.123", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T01:47:33.247", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Un archivo CATPART, STP y MODEL creado con fines malintencionados, cuando se analiza en atf_dwg_consumer.dll, rose_x64_vc15.dll y libodxdll a trav\u00e9s de aplicaciones de Autodesk, puede provocar una vulnerabilidad de use-after-free. Esta vulnerabilidad, junto con otras vulnerabilidades, puede provocar la ejecuci\u00f3n de c\u00f3digo en el proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23143.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23143.json index 2dd12d5b1dd..9c285b45c68 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23143.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23143.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23143", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-06-25T02:15:11.203", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T01:47:33.480", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Un archivo 3DM, MODEL y X_B creado con fines malintencionados, cuando se analiza en ASMkern229A.dll y ASMBASE229A.dll a trav\u00e9s de aplicaciones de Autodesk, puede forzar una lectura fuera de los l\u00edmites y/o una escritura fuera de los l\u00edmites. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, leer datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23144.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23144.json index 2307f07a790..1df6dc5d353 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23144.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23144.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23144", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-06-25T02:15:11.293", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T01:47:33.713", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Un archivo CATPART creado con fines malintencionados, cuando se analiza en CC5Dll.dll y ASMBASE228A.dll mediante aplicaciones de Autodesk, puede forzar una escritura fuera de los l\u00edmites. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, leer datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23145.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23145.json index e1b2f864456..9592efc9a9c 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23145.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23145.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23145", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-06-25T03:15:10.000", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T01:47:33.940", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Un archivo PRT creado con fines malintencionados, cuando se analiza en opennurbs.dll a trav\u00e9s de aplicaciones de Autodesk, puede forzar una lectura fuera de los l\u00edmites. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, leer datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23146.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23146.json index 0403a1c109b..96a5ee11b92 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23146.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23146.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23146", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-06-25T03:15:10.093", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T01:47:34.180", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Un archivo X_B y X_T creado con fines malintencionados, cuando se analiza en pskernel.DLL a trav\u00e9s de aplicaciones de Autodesk, puede forzar una escritura fuera de los l\u00edmites. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, leer datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23147.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23147.json index 65fdcc4421e..3522bc27272 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23147.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23147.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23147", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-06-25T03:15:10.190", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T01:47:34.407", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Un CATPART, X_B y STEP creados con fines malintencionados, cuando se analizan en ASMKERN228A.dll y ASMKERN229A.dll a trav\u00e9s de aplicaciones de Autodesk, pueden provocar una vulnerabilidad de corrupci\u00f3n de memoria por infracci\u00f3n de acceso de escritura. Esta vulnerabilidad, junto con otras vulnerabilidades, puede provocar la ejecuci\u00f3n de c\u00f3digo en el contexto del proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23148.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23148.json index 1acfc7175bf..941861eff10 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23148.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23148.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23148", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-06-25T03:15:10.283", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T01:47:34.640", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Un archivo CATPRODUCT creado con fines malintencionados, cuando se analiza en CC5Dll.dll a trav\u00e9s de aplicaciones de Autodesk, puede provocar una vulnerabilidad de corrupci\u00f3n de memoria por infracci\u00f3n de acceso de escritura. Esta vulnerabilidad, junto con otras vulnerabilidades, puede provocar la ejecuci\u00f3n de c\u00f3digo en el contexto del proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23150.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23150.json index 478e3413912..5927a6c0a1a 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23150.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23150.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23150", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-06-25T04:15:11.803", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T01:47:35.010", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Un archivo PRT creado con fines malintencionados, cuando se analiza en odxug_dll.dll a trav\u00e9s de aplicaciones de Autodesk, puede forzar una escritura fuera de los l\u00edmites. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, leer datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23153.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23153.json index c5826b87454..98b62e7abe2 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23153.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23153.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23153", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-06-25T04:15:12.953", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T01:47:35.377", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Un archivo MODEL creado con fines malintencionados, cuando se analiza en libodx.dll a trav\u00e9s de aplicaciones de Autodesk, puede forzar una lectura fuera de los l\u00edmites. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, leer datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23154.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23154.json index efe4ec881b9..3bbe9c57719 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23154.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23154.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23154", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-06-25T04:15:13.153", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T01:47:35.613", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Un archivo SLDPRT creado con fines malintencionados, cuando se analiza en ODXSW_DLL.dll a trav\u00e9s de aplicaciones de Autodesk, se puede utilizar para provocar un desbordamiento basado en mont\u00f3n. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, leer datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23156.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23156.json index 0ac8b9d155e..4caee7b4eb7 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23156.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23156.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23156", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-06-25T04:15:13.450", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T01:47:35.950", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Un archivo 3DM creado con fines malintencionados, cuando se analiza en opennurbs.dll y ASMkern229A.dll a trav\u00e9s de aplicaciones de Autodesk, puede provocar una vulnerabilidad de corrupci\u00f3n de memoria por infracci\u00f3n de acceso de escritura. Esta vulnerabilidad, junto con otras vulnerabilidades, puede provocar la ejecuci\u00f3n de c\u00f3digo en el proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23157.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23157.json index b6b4058d9e1..bead9b93f25 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23157.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23157.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23157", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-06-25T04:15:13.723", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T01:47:36.180", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Un archivo SLDASM o SLDPRT creado con fines malintencionados, cuando se analiza en ODXSW_DLL.dll a trav\u00e9s de aplicaciones de Autodesk, puede provocar una vulnerabilidad de corrupci\u00f3n de memoria por infracci\u00f3n de acceso de escritura. Esta vulnerabilidad, junto con otras vulnerabilidades, puede provocar la ejecuci\u00f3n de c\u00f3digo en el proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23158.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23158.json index c8472ba4e54..b877074c9c5 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23158.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23158.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23158", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-06-25T04:15:14.007", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T01:47:36.407", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Un archivo IGES creado con fines malintencionados, cuando se analiza en ASMImport229A.dll a trav\u00e9s de aplicaciones de Autodesk, puede usarse para provocar una vulnerabilidad de use-after-free. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 2.5 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23159.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23159.json index a6902ecf635..735fc059696 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23159.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23159.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23159", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-06-25T04:15:14.203", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T01:47:36.637", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Un archivo STP creado con fines malintencionados, cuando se analiza en stp_aim_x64_vc15d.dll a trav\u00e9s de aplicaciones de Autodesk, se puede utilizar para variables no inicializadas. Esta vulnerabilidad, junto con otras vulnerabilidades, puede provocar la ejecuci\u00f3n de c\u00f3digo en el proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23188.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23188.json index ce1e554a3a8..5d562cdf117 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23188.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23188.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23188", "sourceIdentifier": "security@open-xchange.com", "published": "2024-05-06T07:15:07.137", - "lastModified": "2024-05-07T01:15:06.413", + "lastModified": "2024-07-03T01:47:37.067", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23225.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23225.json index d33a17c17e2..efa592d98a1 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23225.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23225.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23225", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-05T20:16:01.370", - "lastModified": "2024-05-23T17:57:40.620", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:47:38.013", + "vulnStatus": "Modified", + "cveTags": [], "cisaExploitAdd": "2024-03-06", "cisaActionDue": "2024-03-27", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", @@ -39,6 +40,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -52,6 +73,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23228.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23228.json index 3198994af4c..87e748aa2c3 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23228.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23228.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23228", "sourceIdentifier": "product-security@apple.com", "published": "2024-04-24T17:15:47.073", - "lastModified": "2024-04-24T17:16:50.397", + "lastModified": "2024-07-03T01:47:38.910", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Esta cuesti\u00f3n se abord\u00f3 mediante una mejor gesti\u00f3n de estado. Este problema se solucion\u00f3 en iOS 17.3 y iPadOS 17.3. Es posible que el contenido de Notas bloqueado se haya desbloqueado inesperadamente." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/HT214059", diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23236.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23236.json index 8648cd6f6ad..9603fbd3a6f 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23236.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23236.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23236", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T14:58:48.170", - "lastModified": "2024-06-10T18:15:26.030", + "lastModified": "2024-07-03T01:47:39.753", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Se solucion\u00f3 un problema de correcci\u00f3n con controles mejorados. Este problema se solucion\u00f3 en macOS Sonoma 14.5. Es posible que una aplicaci\u00f3n pueda leer archivos arbitrarios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "http://seclists.org/fulldisclosure/2024/May/12", diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23246.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23246.json index c9ef15cbe3e..30f11a80cbd 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23246.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23246.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23246", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-08T02:15:48.337", - "lastModified": "2024-03-13T23:15:46.563", + "lastModified": "2024-07-03T01:47:40.097", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Este problema se solucion\u00f3 eliminando el c\u00f3digo vulnerable. Este problema se solucion\u00f3 en macOS Sonoma 14.4, visionOS 1.1, iOS 17.4 y iPadOS 17.4, watchOS 10.4, iOS 16.7.6 y iPadOS 16.7.6, tvOS 17.4. Es posible que una aplicaci\u00f3n pueda salir de su zona de pruebas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23251.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23251.json index 58a16f455fe..6737dff44a6 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23251.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23251.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23251", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:49.430", - "lastModified": "2024-06-27T14:53:47.067", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:47:41.057", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 } ] }, @@ -48,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23263.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23263.json index ffefcd60211..1e7ac88a2be 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23263.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23263.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23263", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-08T02:15:48.980", - "lastModified": "2024-05-07T06:15:07.993", + "lastModified": "2024-07-03T01:47:42.140", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se abord\u00f3 un problema de l\u00f3gica con una validaci\u00f3n mejorada. Este problema se solucion\u00f3 en tvOS 17.4, macOS Sonoma 14.4, visionOS 1.1, iOS 17.4 y iPadOS 17.4, watchOS 10.4, iOS 16.7.6 y iPadOS 16.7.6, Safari 17.4. El procesamiento de contenido web creado con fines malintencionados puede impedir que se aplique la Pol\u00edtica de seguridad de contenido." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Mar/20", diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23271.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23271.json index 9babc65db49..f984a14889a 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23271.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23271.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23271", "sourceIdentifier": "product-security@apple.com", "published": "2024-04-24T17:15:47.127", - "lastModified": "2024-06-12T10:15:30.320", + "lastModified": "2024-07-03T01:47:42.990", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se solucion\u00f3 un problema de l\u00f3gica con controles mejorados. Este problema se solucion\u00f3 en iOS 17.3 y iPadOS 17.3, Safari 17.3, tvOS 17.3, macOS Sonoma 14.3, watchOS 10.3. Un sitio web malicioso puede provocar un comportamiento inesperado entre or\u00edgenes." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/HT214055", diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23296.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23296.json index 09e56b108c6..af19a3d36a0 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23296.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23296.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23296", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-05T20:16:01.553", - "lastModified": "2024-06-10T18:15:26.090", + "lastModified": "2024-07-03T01:47:43.840", "vulnStatus": "Modified", + "cveTags": [], "cisaExploitAdd": "2024-03-06", "cisaActionDue": "2024-03-27", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", @@ -39,6 +40,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -52,6 +73,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-235xx/CVE-2024-23526.json b/CVE-2024/CVE-2024-235xx/CVE-2024-23526.json index 3bc8b84e576..0a6632ce512 100644 --- a/CVE-2024/CVE-2024-235xx/CVE-2024-23526.json +++ b/CVE-2024/CVE-2024-235xx/CVE-2024-23526.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23526", "sourceIdentifier": "support@hackerone.com", "published": "2024-04-19T02:15:07.040", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:47:48.580", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US", diff --git a/CVE-2024/CVE-2024-235xx/CVE-2024-23528.json b/CVE-2024/CVE-2024-235xx/CVE-2024-23528.json index 1455132a1e5..f3dc00796ef 100644 --- a/CVE-2024/CVE-2024-235xx/CVE-2024-23528.json +++ b/CVE-2024/CVE-2024-235xx/CVE-2024-23528.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23528", "sourceIdentifier": "support@hackerone.com", "published": "2024-04-19T02:15:07.207", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:47:49.403", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US", diff --git a/CVE-2024/CVE-2024-235xx/CVE-2024-23529.json b/CVE-2024/CVE-2024-235xx/CVE-2024-23529.json index 879e3dab961..501abb4c312 100644 --- a/CVE-2024/CVE-2024-235xx/CVE-2024-23529.json +++ b/CVE-2024/CVE-2024-235xx/CVE-2024-23529.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23529", "sourceIdentifier": "support@hackerone.com", "published": "2024-04-19T02:15:07.360", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:47:50.133", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US", diff --git a/CVE-2024/CVE-2024-235xx/CVE-2024-23530.json b/CVE-2024/CVE-2024-235xx/CVE-2024-23530.json index 514d7e7eece..f3bed7bedb2 100644 --- a/CVE-2024/CVE-2024-235xx/CVE-2024-23530.json +++ b/CVE-2024/CVE-2024-235xx/CVE-2024-23530.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23530", "sourceIdentifier": "support@hackerone.com", "published": "2024-04-19T02:15:07.520", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:47:50.867", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US", diff --git a/CVE-2024/CVE-2024-235xx/CVE-2024-23531.json b/CVE-2024/CVE-2024-235xx/CVE-2024-23531.json index 3b533d4696e..853f382536c 100644 --- a/CVE-2024/CVE-2024-235xx/CVE-2024-23531.json +++ b/CVE-2024/CVE-2024-235xx/CVE-2024-23531.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23531", "sourceIdentifier": "support@hackerone.com", "published": "2024-04-19T02:15:07.670", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:47:51.630", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US", diff --git a/CVE-2024/CVE-2024-235xx/CVE-2024-23532.json b/CVE-2024/CVE-2024-235xx/CVE-2024-23532.json index 372635a9afd..94021265403 100644 --- a/CVE-2024/CVE-2024-235xx/CVE-2024-23532.json +++ b/CVE-2024/CVE-2024-235xx/CVE-2024-23532.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23532", "sourceIdentifier": "support@hackerone.com", "published": "2024-04-19T02:15:07.823", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:47:52.387", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US", diff --git a/CVE-2024/CVE-2024-235xx/CVE-2024-23533.json b/CVE-2024/CVE-2024-235xx/CVE-2024-23533.json index e119dde7dd8..8de367e3160 100644 --- a/CVE-2024/CVE-2024-235xx/CVE-2024-23533.json +++ b/CVE-2024/CVE-2024-235xx/CVE-2024-23533.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23533", "sourceIdentifier": "support@hackerone.com", "published": "2024-04-19T02:15:07.980", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:47:53.110", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US", diff --git a/CVE-2024/CVE-2024-235xx/CVE-2024-23534.json b/CVE-2024/CVE-2024-235xx/CVE-2024-23534.json index 0de85f7fc58..77ba9e26f62 100644 --- a/CVE-2024/CVE-2024-235xx/CVE-2024-23534.json +++ b/CVE-2024/CVE-2024-235xx/CVE-2024-23534.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23534", "sourceIdentifier": "support@hackerone.com", "published": "2024-04-19T02:15:08.137", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:47:53.810", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US", diff --git a/CVE-2024/CVE-2024-235xx/CVE-2024-23535.json b/CVE-2024/CVE-2024-235xx/CVE-2024-23535.json index 2dc148ed23c..345966a7203 100644 --- a/CVE-2024/CVE-2024-235xx/CVE-2024-23535.json +++ b/CVE-2024/CVE-2024-235xx/CVE-2024-23535.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23535", "sourceIdentifier": "support@hackerone.com", "published": "2024-04-19T02:15:08.300", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:47:54.527", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US", diff --git a/CVE-2024/CVE-2024-235xx/CVE-2024-23579.json b/CVE-2024/CVE-2024-235xx/CVE-2024-23579.json index 2b9c9eb6884..18d5e91eeb4 100644 --- a/CVE-2024/CVE-2024-235xx/CVE-2024-23579.json +++ b/CVE-2024/CVE-2024-235xx/CVE-2024-23579.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23579", "sourceIdentifier": "psirt@hcl.com", "published": "2024-05-28T22:15:11.650", - "lastModified": "2024-05-29T13:02:09.280", + "lastModified": "2024-07-03T01:47:55.687", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-326" + } + ] + } + ], "references": [ { "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0113496", diff --git a/CVE-2024/CVE-2024-235xx/CVE-2024-23580.json b/CVE-2024/CVE-2024-235xx/CVE-2024-23580.json index f7a58fd2abc..b2073b7dbf4 100644 --- a/CVE-2024/CVE-2024-235xx/CVE-2024-23580.json +++ b/CVE-2024/CVE-2024-235xx/CVE-2024-23580.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23580", "sourceIdentifier": "psirt@hcl.com", "published": "2024-05-28T22:15:11.840", - "lastModified": "2024-05-29T13:02:09.280", + "lastModified": "2024-07-03T01:47:56.403", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-326" + } + ] + } + ], "references": [ { "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0113496", diff --git a/CVE-2024/CVE-2024-235xx/CVE-2024-23597.json b/CVE-2024/CVE-2024-235xx/CVE-2024-23597.json index b8b5486ab7f..48182a4d37c 100644 --- a/CVE-2024/CVE-2024-235xx/CVE-2024-23597.json +++ b/CVE-2024/CVE-2024-235xx/CVE-2024-23597.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23597", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-05-01T13:15:48.693", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-07-03T01:47:57.317", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Existe una vulnerabilidad de Cross-Site Request Forgery (CSRF) en TvRock 0.9t8a. Si un usuario de TVRock que ha iniciado sesi\u00f3n accede a una p\u00e1gina especialmente manipulada, se pueden realizar operaciones no deseadas. Tenga en cuenta que el desarrollador era inalcanzable, por lo tanto, los usuarios deber\u00edan considerar dejar de usar TvRock 0.9t8a." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/jp/JVN24683352/", diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23704.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23704.json index 02cba3b314f..723645340e6 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23704.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23704.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23704", "sourceIdentifier": "security@android.com", "published": "2024-05-07T21:15:08.630", - "lastModified": "2024-05-08T13:15:00.690", + "lastModified": "2024-07-03T01:47:59.750", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En onCreate de WifiDialogActivity.java, existe una forma posible de evitar la restricci\u00f3n DISALLOW_ADD_WIFI_CONFIG debido a una falta de verificaci\u00f3n de permiso. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-280" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/packages/apps/Settings/+/2e90322bab7de1deaf3c82e207bf4404b92743d7", diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23705.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23705.json index 6b7f334ec14..6e6fe92bf0c 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23705.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23705.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23705", "sourceIdentifier": "security@android.com", "published": "2024-05-07T21:15:08.680", - "lastModified": "2024-05-08T13:15:00.690", + "lastModified": "2024-07-03T01:48:00.597", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En varias ubicaciones, es posible que no se persistan o no se apliquen restricciones de usuario debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/032bee6dc118ce1cc3fde92463b2954c1450f2e8", diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23706.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23706.json index fd305a1d9f4..4de8fe0b7bc 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23706.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23706.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23706", "sourceIdentifier": "security@android.com", "published": "2024-05-07T21:15:08.737", - "lastModified": "2024-05-08T13:15:00.690", + "lastModified": "2024-07-03T01:48:01.407", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En varias ubicaciones, existe una posible omisi\u00f3n de los permisos de datos de salud debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/packages/modules/HealthFitness/+/6e6896c3fd8139779ff8d51a99ee06667e849d87", diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23707.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23707.json index 23cfb7536b9..f8b14d9f5c3 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23707.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23707.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23707", "sourceIdentifier": "security@android.com", "published": "2024-05-07T21:15:08.787", - "lastModified": "2024-05-08T13:15:00.690", + "lastModified": "2024-07-03T01:48:02.287", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En varias ubicaciones, existe una posible omisi\u00f3n de permisos debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/packages/apps/Settings/+/f1d0079c91734168c150f839168544f407b17b06", diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23708.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23708.json index 9600588deb5..54845acd5ad 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23708.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23708.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23708", "sourceIdentifier": "security@android.com", "published": "2024-05-07T21:15:08.830", - "lastModified": "2024-05-08T13:15:00.690", + "lastModified": "2024-07-03T01:48:03.097", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En m\u00faltiples funciones de NotificationManagerService.java, existe una manera posible de no mostrar un mensaje de brindis cuando se ha accedido a un mensaje del portapapeles. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-451" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/0c095c365ede36257e829769194f9596a598e560", diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23709.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23709.json index 7037f363191..c649d8534db 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23709.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23709.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23709", "sourceIdentifier": "security@android.com", "published": "2024-05-07T21:15:08.877", - "lastModified": "2024-05-08T13:15:00.690", + "lastModified": "2024-07-03T01:48:03.920", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En varias ubicaciones, existe una posible escritura fuera de los l\u00edmites debido a un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico. Esto podr\u00eda conducir a la divulgaci\u00f3n remota de informaci\u00f3n sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/external/sonivox/+/3f798575d2d39cd190797427d13471d6e7ceae4c", diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23710.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23710.json index 79856dc4016..44e91a1f86e 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23710.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23710.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23710", "sourceIdentifier": "security@android.com", "published": "2024-05-07T21:15:08.930", - "lastModified": "2024-05-08T13:15:00.690", + "lastModified": "2024-07-03T01:48:04.733", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "En afirmarPackageWithSharedUserIdIsPrivileged de InstallPackageHelper.java, existe una posible ejecuci\u00f3n de c\u00f3digo de aplicaci\u00f3n arbitrario como una aplicaci\u00f3n privilegiada debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/c7c1193ca7554fc3182ca9ab0f711bd118bdeef2", diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23712.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23712.json index ccc0137a525..4d3439bfa05 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23712.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23712.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23712", "sourceIdentifier": "security@android.com", "published": "2024-05-07T21:15:08.977", - "lastModified": "2024-05-08T13:15:00.690", + "lastModified": "2024-07-03T01:48:04.970", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "En m\u00faltiples funciones de AppOpsService.java, existe una forma posible de saturar el contenido de /data/system/appops_accesses.xml debido al agotamiento de los recursos. Esto podr\u00eda provocar una denegaci\u00f3n de servicio local sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/6beb68ca17d1220f3f09a53cf0a0c541db4ead62", diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23713.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23713.json index 6badb670476..e3b80b83935 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23713.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23713.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23713", "sourceIdentifier": "security@android.com", "published": "2024-05-07T21:15:09.017", - "lastModified": "2024-05-08T13:15:00.690", + "lastModified": "2024-07-03T01:48:05.220", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En migrarNotificationFilter de NotificationManagerService.java, existe una posible falla al persistir la configuraci\u00f3n de notificaciones debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/ffd616dc3b919fe7705dbc7a25868483ae45466b", diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23766.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23766.json index d01027358be..899ac0dcb0e 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23766.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23766.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23766", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-26T21:15:12.977", - "lastModified": "2024-06-27T12:47:19.847", + "lastModified": "2024-07-03T01:48:06.303", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " Se descubri\u00f3 un problema en los dispositivos HMS Anybus X-Gateway AB7832-F 3. La puerta de enlace expone una interfaz web en el puerto 80. Una solicitud GET no autenticada a una URL espec\u00edfica desencadena el reinicio de la puerta de enlace Anybus (o al menos de la mayor\u00eda de sus m\u00f3dulos). Un atacante puede utilizar esta funci\u00f3n para llevar a cabo un ataque de denegaci\u00f3n de servicio enviando continuamente solicitudes GET a esa URL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-598" + } + ] + } + ], "references": [ { "url": "https://sensepost.com/blog/2024/targeting-an-industrial-protocol-gateway/", diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23773.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23773.json index 3569d0177a8..43a423f866a 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23773.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23773.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23773", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T14:15:15.040", - "lastModified": "2024-04-30T17:52:35.057", + "lastModified": "2024-07-03T01:48:07.100", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en Quest KACE Agent para Windows 12.0.38 y 13.1.23.0. Existe una vulnerabilidad de eliminaci\u00f3n arbitraria de archivos en el componente KSchedulerSvc.exe. Los atacantes locales pueden eliminar cualquier archivo de su elecci\u00f3n con privilegios NT Authority\\SYSTEM." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://support.quest.com/kb/4375402/quest-response-to-kace-sma-agent-vulnerabilities-cve-2024-23772-cve-2024-23773-cve-2024-23774", diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23774.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23774.json index 75980f84df5..22bc2267b1e 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23774.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23774.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23774", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T14:15:15.103", - "lastModified": "2024-04-30T17:52:35.057", + "lastModified": "2024-07-03T01:48:07.913", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en Quest KACE Agent para Windows 12.0.38 y 13.1.23.0. Existe una vulnerabilidad de ruta de b\u00fasqueda de Windows sin comillas en los componentes KSchedulerSvc.exe y AMPTools.exe. Esto permite a los atacantes locales ejecutar c\u00f3digo de su elecci\u00f3n con privilegios NT Authority\\SYSTEM." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://support.quest.com/kb/4375402/quest-response-to-kace-sma-agent-vulnerabilities-cve-2024-23772-cve-2024-23773-cve-2024-23774", diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23847.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23847.json index d1a146ec6c5..2bd7ff2c289 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23847.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23847.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23847", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-05-31T06:15:10.070", - "lastModified": "2024-05-31T13:01:46.727", + "lastModified": "2024-07-03T01:48:09.197", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Existe un problema de permisos predeterminados incorrectos en Unifier y Unifier Cast versi\u00f3n 5.0 o posterior, y el parche \"20240527\" no se aplic\u00f3. Si se explota esta vulnerabilidad, se puede ejecutar c\u00f3digo arbitrario con privilegios LocalSystem. Como resultado, se puede instalar un programa malicioso y se pueden modificar o eliminar datos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/jp/JVN17680667/", diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23911.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23911.json index 7e361411d31..2956b95380e 100644 --- a/CVE-2024/CVE-2024-239xx/CVE-2024-23911.json +++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23911.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23911", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-04-15T11:15:08.227", - "lastModified": "2024-04-15T13:15:31.997", + "lastModified": "2024-07-03T01:48:10.000", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Existe una vulnerabilidad de lectura fuera de los l\u00edmites causada por una verificaci\u00f3n incorrecta de los valores de longitud de las opciones en los paquetes IPv6 NDP en la serie de redes TCP/IP del middleware Cente, lo que puede permitir que un atacante no autenticado detenga las operaciones del dispositivo enviando un paquete especialmente manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/vu/JVNVU94016877/", diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2309.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2309.json index 53184a2d628..8a65ca4bbe0 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2309.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2309.json @@ -2,8 +2,9 @@ "id": "CVE-2024-2309", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-17T05:15:48.740", - "lastModified": "2024-04-17T12:48:07.510", + "lastModified": "2024-07-03T01:53:08.927", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento WP STAGING WordPress Backup Plugin de WordPress anterior a 3.4.0, el complemento de WordPress wp-staging-pro anterior a 5.4.0 no desinfecta ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en configuraci\u00f3n multisitio)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/a4152818-1e07-46a7-aec4-70f1a1b579a6/", diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2310.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2310.json index 224245f2d53..fae9dbc6c08 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2310.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2310.json @@ -2,8 +2,9 @@ "id": "CVE-2024-2310", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-26T05:15:50.040", - "lastModified": "2024-04-26T12:58:17.720", + "lastModified": "2024-07-03T01:53:09.113", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento WP Google Review Slider de WordPress anterior a 13.6 no desinfecta ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/7a2c173c-19e3-4f48-b3af-14790b5b8e94/", diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2398.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2398.json index 4e1e1934ea3..7fee10d1504 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2398.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2398.json @@ -2,8 +2,9 @@ "id": "CVE-2024-2398", "sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9", "published": "2024-03-27T08:15:41.283", - "lastModified": "2024-05-03T13:15:21.640", + "lastModified": "2024-07-03T01:53:12.523", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Cuando una aplicaci\u00f3n le dice a libcurl que quiere permitir la inserci\u00f3n del servidor HTTP/2 y la cantidad de encabezados recibidos para la inserci\u00f3n supera el l\u00edmite m\u00e1ximo permitido (1000), libcurl cancela la inserci\u00f3n del servidor. Al cancelar, libcurl inadvertidamente no libera todos los encabezados previamente asignados y, en cambio, pierde memoria. Adem\u00e1s, esta condici\u00f3n de error falla silenciosamente y, por lo tanto, una aplicaci\u00f3n no la detecta f\u00e1cilmente." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/03/27/3", diff --git a/CVE-2024/CVE-2024-241xx/CVE-2024-24130.json b/CVE-2024/CVE-2024-241xx/CVE-2024-24130.json index 41972f9b757..051c874360e 100644 --- a/CVE-2024/CVE-2024-241xx/CVE-2024-24130.json +++ b/CVE-2024/CVE-2024-241xx/CVE-2024-24130.json @@ -2,8 +2,9 @@ "id": "CVE-2024-24130", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-07T14:15:52.720", - "lastModified": "2024-02-14T20:38:39.543", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:48:12.487", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-241xx/CVE-2024-24157.json b/CVE-2024/CVE-2024-241xx/CVE-2024-24157.json index f28d245eb59..b3d6a36521d 100644 --- a/CVE-2024/CVE-2024-241xx/CVE-2024-24157.json +++ b/CVE-2024/CVE-2024-241xx/CVE-2024-24157.json @@ -2,8 +2,9 @@ "id": "CVE-2024-24157", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:01:53.100", - "lastModified": "2024-05-14T16:13:02.773", + "lastModified": "2024-07-03T01:48:13.313", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/gnuboard/g6/issues/314", diff --git a/CVE-2024/CVE-2024-242xx/CVE-2024-24294.json b/CVE-2024/CVE-2024-242xx/CVE-2024-24294.json index d27787e7612..915279cf3bc 100644 --- a/CVE-2024/CVE-2024-242xx/CVE-2024-24294.json +++ b/CVE-2024/CVE-2024-242xx/CVE-2024-24294.json @@ -2,8 +2,9 @@ "id": "CVE-2024-24294", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-20T17:15:09.470", - "lastModified": "2024-05-20T19:34:58.277", + "lastModified": "2024-07-03T01:48:14.450", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " Un problema de contaminaci\u00f3n de prototipos en Blackprint @blackprint/engine v.0.9.0 permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n _utils.setDeepProperty de Engine.min.js." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/mestrtee/d1eb6e1f7c6dd60d8838c3e56cab634d", diff --git a/CVE-2024/CVE-2024-243xx/CVE-2024-24302.json b/CVE-2024/CVE-2024-243xx/CVE-2024-24302.json index c711d8024ba..5a516968577 100644 --- a/CVE-2024/CVE-2024-243xx/CVE-2024-24302.json +++ b/CVE-2024/CVE-2024-243xx/CVE-2024-24302.json @@ -2,8 +2,9 @@ "id": "CVE-2024-24302", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-03T09:15:06.100", - "lastModified": "2024-03-04T13:58:23.447", + "lastModified": "2024-07-03T01:48:15.277", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en el m\u00f3dulo \"Product Designer\" (productdesigner) de Tunis Soft para PrestaShop anterior a la versi\u00f3n 1.178.36, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s del m\u00e9todo postProcess()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], "references": [ { "url": "https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2024-02-29-productdesigner-502.md", diff --git a/CVE-2024/CVE-2024-243xx/CVE-2024-24312.json b/CVE-2024/CVE-2024-243xx/CVE-2024-24312.json index 43192174a84..dbf72d51a1e 100644 --- a/CVE-2024/CVE-2024-243xx/CVE-2024-24312.json +++ b/CVE-2024/CVE-2024-243xx/CVE-2024-24312.json @@ -2,8 +2,9 @@ "id": "CVE-2024-24312", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T19:15:22.087", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-07-03T01:48:16.113", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en Vaales Technologies V_QRS v.2024-01-17 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del componente Models/UserModel.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], "references": [ { "url": "https://www2.deloitte.com/xe/en/pages/about-deloitte/articles/sustainable-strategies/unveiling-vulnerabilities-in-cybersecurity.html", diff --git a/CVE-2024/CVE-2024-243xx/CVE-2024-24313.json b/CVE-2024/CVE-2024-243xx/CVE-2024-24313.json index d133a56e5c9..66753050ef1 100644 --- a/CVE-2024/CVE-2024-243xx/CVE-2024-24313.json +++ b/CVE-2024/CVE-2024-243xx/CVE-2024-24313.json @@ -2,8 +2,9 @@ "id": "CVE-2024-24313", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T19:15:22.140", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-07-03T01:48:16.943", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en Vaales Technologies V_QRS v.2024-01-17 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del componente Models/FormModel.php y QRModel.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://www2.deloitte.com/xe/en/pages/about-deloitte/articles/sustainable-strategies/unveiling-vulnerabilities-in-cybersecurity.html", diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24487.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24487.json index fc869e94ba5..78d40ea9d40 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24487.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24487.json @@ -2,8 +2,9 @@ "id": "CVE-2024-24487", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-15T19:15:09.830", - "lastModified": "2024-04-16T13:24:07.103", + "lastModified": "2024-07-03T01:48:18.013", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema descubierto en silex technology DS-600 Firmware v.1.4.1, permite que un atacante remoto provoque una denegaci\u00f3n de servicio a trav\u00e9s de paquetes UDP manipulados utilizando el comando EXEC REBOOT SYSTEM." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://raw.githubusercontent.com/MostafaSoliman/Security-Advisories/master/CVE-2024-24487", diff --git a/CVE-2024/CVE-2024-245xx/CVE-2024-24520.json b/CVE-2024/CVE-2024-245xx/CVE-2024-24520.json index cc968985842..9cb49cf5bb1 100644 --- a/CVE-2024/CVE-2024-245xx/CVE-2024-24520.json +++ b/CVE-2024/CVE-2024-245xx/CVE-2024-24520.json @@ -2,8 +2,9 @@ "id": "CVE-2024-24520", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-21T02:52:10.787", - "lastModified": "2024-06-07T15:15:49.760", + "lastModified": "2024-07-03T01:48:18.843", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en Lepton CMS v.7.0.0 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s del archivo update.php en el lugar del idioma." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "http://lepton.com", diff --git a/CVE-2024/CVE-2024-245xx/CVE-2024-24524.json b/CVE-2024/CVE-2024-245xx/CVE-2024-24524.json index c73055a9851..1eadce997e5 100644 --- a/CVE-2024/CVE-2024-245xx/CVE-2024-24524.json +++ b/CVE-2024/CVE-2024-245xx/CVE-2024-24524.json @@ -2,8 +2,9 @@ "id": "CVE-2024-24524", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-02T08:15:46.270", - "lastModified": "2024-02-09T16:30:43.830", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:48:19.690", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-245xx/CVE-2024-24548.json b/CVE-2024/CVE-2024-245xx/CVE-2024-24548.json index a47fcbad6d4..c7ffdb314e7 100644 --- a/CVE-2024/CVE-2024-245xx/CVE-2024-24548.json +++ b/CVE-2024/CVE-2024-245xx/CVE-2024-24548.json @@ -2,8 +2,9 @@ "id": "CVE-2024-24548", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-02-01T07:15:09.040", - "lastModified": "2024-02-08T18:53:14.107", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:48:20.620", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -48,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24787.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24787.json index 0dca8867237..7188822b560 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24787.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24787.json @@ -2,8 +2,9 @@ "id": "CVE-2024-24787", "sourceIdentifier": "security@golang.org", "published": "2024-05-08T16:15:08.183", - "lastModified": "2024-06-10T17:16:20.237", + "lastModified": "2024-07-03T01:48:25.213", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "En Darwin, crear un m\u00f3dulo Go que contenga CGO puede desencadenar la ejecuci\u00f3n de c\u00f3digo arbitrario cuando se usa la versi\u00f3n Apple de ld, debido al uso del indicador -lto_library en una directiva \"#cgo LDFLAGS\"." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/05/08/3", diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24789.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24789.json index c70231891a3..bd0fc8e19e4 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24789.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24789.json @@ -2,8 +2,9 @@ "id": "CVE-2024-24789", "sourceIdentifier": "security@golang.org", "published": "2024-06-05T16:15:10.470", - "lastModified": "2024-06-19T03:15:09.183", + "lastModified": "2024-07-03T01:48:25.510", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 } ] }, diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24910.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24910.json index 7689596abc2..36f46e69862 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24910.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24910.json @@ -2,8 +2,9 @@ "id": "CVE-2024-24910", "sourceIdentifier": "cve@checkpoint.com", "published": "2024-04-18T18:15:09.197", - "lastModified": "2024-04-18T18:25:55.267", + "lastModified": "2024-07-03T01:48:29.673", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Un atacante local puede escalar privilegios en Check Point ZoneAlarm Extreme Security NextGen, Identity Agent para Windows y Identity Agent para Windows Terminal Server afectados. Para aprovechar esta vulnerabilidad, un atacante primero debe obtener la capacidad de ejecutar c\u00f3digo privilegiado local en el sistema de destino." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "cve@checkpoint.com", diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24912.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24912.json index d1ca44dd87e..247c7c25ab4 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24912.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24912.json @@ -2,8 +2,9 @@ "id": "CVE-2024-24912", "sourceIdentifier": "cve@checkpoint.com", "published": "2024-05-01T14:15:06.323", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-07-03T01:48:29.930", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Se ha identificado una vulnerabilidad de escalada de privilegios local en Harmony Endpoint Security Client para las versiones E88.10 y anteriores de Windows. Para aprovechar esta vulnerabilidad, un atacante primero debe obtener la capacidad de ejecutar c\u00f3digo privilegiado local en el sistema de destino." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "cve@checkpoint.com", diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24981.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24981.json index 587546acdf7..d156ab85b68 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24981.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24981.json @@ -2,8 +2,9 @@ "id": "CVE-2024-24981", "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:16:07.970", - "lastModified": "2024-05-17T18:36:05.263", + "lastModified": "2024-07-03T01:48:32.340", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24991.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24991.json index be9e11ce7ee..d30e6baaeda 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24991.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24991.json @@ -2,8 +2,9 @@ "id": "CVE-2024-24991", "sourceIdentifier": "support@hackerone.com", "published": "2024-04-19T02:15:08.460", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:48:33.167", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US", diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24992.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24992.json index f6a61995167..26d4398ff1c 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24992.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24992.json @@ -2,8 +2,9 @@ "id": "CVE-2024-24992", "sourceIdentifier": "support@hackerone.com", "published": "2024-04-19T02:15:08.613", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:48:33.900", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "ZDI-CAN-22854https://forums.ivanti.com/s/article/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US", diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24993.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24993.json index 8de40efc3fa..b448a56f9ba 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24993.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24993.json @@ -2,8 +2,9 @@ "id": "CVE-2024-24993", "sourceIdentifier": "support@hackerone.com", "published": "2024-04-19T02:15:08.770", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:48:34.617", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US", diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24994.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24994.json index 249ed7eac9a..f57110b43e3 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24994.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24994.json @@ -2,8 +2,9 @@ "id": "CVE-2024-24994", "sourceIdentifier": "support@hackerone.com", "published": "2024-04-19T02:15:08.923", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:48:35.360", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US", diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24995.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24995.json index 53c61df56fd..a8a823d0f7d 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24995.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24995.json @@ -2,8 +2,9 @@ "id": "CVE-2024-24995", "sourceIdentifier": "support@hackerone.com", "published": "2024-04-19T02:15:09.083", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:48:36.090", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US", diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24997.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24997.json index b0f0cb5ad6a..e39e61572d5 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24997.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24997.json @@ -2,8 +2,9 @@ "id": "CVE-2024-24997", "sourceIdentifier": "support@hackerone.com", "published": "2024-04-19T02:15:09.393", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:48:36.903", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US", diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24999.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24999.json index 3a21a77356f..65f24f3dfaf 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24999.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24999.json @@ -2,8 +2,9 @@ "id": "CVE-2024-24999", "sourceIdentifier": "support@hackerone.com", "published": "2024-04-19T02:15:09.690", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:48:37.637", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US", diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2405.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2405.json index 40103b44aec..778077b1a29 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2405.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2405.json @@ -2,8 +2,9 @@ "id": "CVE-2024-2405", "sourceIdentifier": "contact@wpscan.com", "published": "2024-05-02T06:15:49.947", - "lastModified": "2024-05-02T13:27:25.103", + "lastModified": "2024-07-03T01:53:13.110", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento Float menu de WordPress anterior a 6.0.1 no tiene verificaci\u00f3n CSRF en sus acciones masivas, lo que podr\u00eda permitir a los atacantes hacer que el administrador registrado elimine un men\u00fa arbitrario a trav\u00e9s de un ataque CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 4.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/c42ffa15-6ebe-4c70-9e51-b95bd05ea04d/", diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25000.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25000.json index cc5abb53b0c..07d9ec5cfc0 100644 --- a/CVE-2024/CVE-2024-250xx/CVE-2024-25000.json +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25000.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25000", "sourceIdentifier": "support@hackerone.com", "published": "2024-04-19T02:15:09.853", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:48:38.350", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US", diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25078.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25078.json index fb0f890ca83..e810fd5f7f2 100644 --- a/CVE-2024/CVE-2024-250xx/CVE-2024-25078.json +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25078.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25078", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-15T14:15:08.250", - "lastModified": "2024-05-15T16:40:19.330", + "lastModified": "2024-07-03T01:48:39.997", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de corrupci\u00f3n de memoria en StorageSecurityCommandDxe en Insyde InsydeH2O antes del kernel 5.2: IB19130163 en 05.29.07, kernel 5.3: IB19130163 en 05.38.07, kernel 5.4: IB19130163 en 05.46.07, kernel IB191301 63 en 05.54.07 y kernel 5.6: IB19130163 del 61.05.07 podr\u00eda provocar un aumento de privilegios en SMM." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:L", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-822" + } + ] + } + ], "references": [ { "url": "https://www.insyde.com/security-pledge", diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25079.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25079.json index 2794f234d40..054ac2f15e1 100644 --- a/CVE-2024/CVE-2024-250xx/CVE-2024-25079.json +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25079.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25079", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-15T15:15:07.930", - "lastModified": "2024-05-15T16:40:19.330", + "lastModified": "2024-07-03T01:48:40.830", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de corrupci\u00f3n de memoria en HddPassword en Insyde InsydeH2O kernel 5.2 anterior al 29.05.09, kernel 5.3 anterior al 38.05.09, kernel 5.4 anterior al 05.46.09, kernel 5.5 anterior al 05.54.09 y kernel 5.6 anterior al 05.61.09 podr\u00eda llevar a una escalada de privilegios en SMM." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:L", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-822" + } + ] + } + ], "references": [ { "url": "https://www.insyde.com/security-pledge", diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25297.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25297.json index 17230f18a11..729e9e3ca49 100644 --- a/CVE-2024/CVE-2024-252xx/CVE-2024-25297.json +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25297.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25297", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-17T06:15:53.653", - "lastModified": "2024-04-11T14:02:41.473", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:48:44.367", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-253xx/CVE-2024-25355.json b/CVE-2024/CVE-2024-253xx/CVE-2024-25355.json index 8be73d70900..abb4527433b 100644 --- a/CVE-2024/CVE-2024-253xx/CVE-2024-25355.json +++ b/CVE-2024/CVE-2024-253xx/CVE-2024-25355.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25355", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T19:15:22.283", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-07-03T01:48:45.420", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "s3-url-parser 1.0.3 es vulnerable a la denegaci\u00f3n de servicio a trav\u00e9s del componente de expresiones regulares." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/6en6ar/a4977866c59cbcfc716f0f2717b812bf", diff --git a/CVE-2024/CVE-2024-253xx/CVE-2024-25389.json b/CVE-2024/CVE-2024-253xx/CVE-2024-25389.json index 6c112ea31ca..7dcffd6e9fe 100644 --- a/CVE-2024/CVE-2024-253xx/CVE-2024-25389.json +++ b/CVE-2024/CVE-2024-253xx/CVE-2024-25389.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25389", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-27T03:15:11.460", - "lastModified": "2024-05-01T18:15:15.173", + "lastModified": "2024-07-03T01:48:46.323", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "RT-Thread hasta 5.0.2 genera n\u00fameros aleatorios con un algoritmo d\u00e9bil de \"seed = 214013L * seed + 2531011L; return (seed >> 16) & 0x7FFF;\" en calc_random en drivers/misc/rt_random.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-338" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/03/05/1", diff --git a/CVE-2024/CVE-2024-253xx/CVE-2024-25392.json b/CVE-2024/CVE-2024-253xx/CVE-2024-25392.json index f19274f4fc2..647baffec13 100644 --- a/CVE-2024/CVE-2024-253xx/CVE-2024-25392.json +++ b/CVE-2024/CVE-2024-253xx/CVE-2024-25392.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25392", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-27T03:15:11.667", - "lastModified": "2024-05-01T18:15:15.317", + "lastModified": "2024-07-03T01:48:47.150", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se produce un acceso fuera de los l\u00edmites en utilidades/var_export/var_export.c en RT-Thread hasta 5.0.2." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/03/05/1", diff --git a/CVE-2024/CVE-2024-253xx/CVE-2024-25393.json b/CVE-2024/CVE-2024-253xx/CVE-2024-25393.json index 1aad49df9f1..f45cb6f80f3 100644 --- a/CVE-2024/CVE-2024-253xx/CVE-2024-25393.json +++ b/CVE-2024/CVE-2024-253xx/CVE-2024-25393.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25393", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-27T03:15:11.730", - "lastModified": "2024-05-01T18:15:15.370", + "lastModified": "2024-07-03T01:48:47.993", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se produce un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en net/at/src/at_server.c en RT-Thread hasta 5.0.2." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/03/05/1", diff --git a/CVE-2024/CVE-2024-253xx/CVE-2024-25394.json b/CVE-2024/CVE-2024-253xx/CVE-2024-25394.json index c3dab507c0b..49f4ce0a798 100644 --- a/CVE-2024/CVE-2024-253xx/CVE-2024-25394.json +++ b/CVE-2024/CVE-2024-253xx/CVE-2024-25394.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25394", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-27T03:15:11.830", - "lastModified": "2024-05-01T18:15:15.427", + "lastModified": "2024-07-03T01:48:48.800", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/03/05/1", diff --git a/CVE-2024/CVE-2024-253xx/CVE-2024-25395.json b/CVE-2024/CVE-2024-253xx/CVE-2024-25395.json index 589ffb1520f..ef7eeb7e090 100644 --- a/CVE-2024/CVE-2024-253xx/CVE-2024-25395.json +++ b/CVE-2024/CVE-2024-253xx/CVE-2024-25395.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25395", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-27T03:15:11.927", - "lastModified": "2024-05-01T18:15:15.483", + "lastModified": "2024-07-03T01:48:49.520", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se produce un desbordamiento del b\u00fafer en utilities/rt-link/src/rtlink.c en RT-Thread hasta 5.0.2." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/03/05/1", diff --git a/CVE-2024/CVE-2024-254xx/CVE-2024-25423.json b/CVE-2024/CVE-2024-254xx/CVE-2024-25423.json index 94a4eb5f678..1d66155d0b2 100644 --- a/CVE-2024/CVE-2024-254xx/CVE-2024-25423.json +++ b/CVE-2024/CVE-2024-254xx/CVE-2024-25423.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25423", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-22T01:15:08.123", - "lastModified": "2024-02-22T19:07:27.197", + "lastModified": "2024-07-03T01:48:50.347", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en MAXON CINEMA 4D R2024.2.0 permite que un atacante local ejecute c\u00f3digo arbitrario a trav\u00e9s de un archivo c4d_base.xdl64 manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "http://cinema.com", diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25507.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25507.json index 260985d2bf3..ea615ffa74b 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25507.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25507.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25507", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T18:15:08.110", - "lastModified": "2024-05-07T20:07:58.737", + "lastModified": "2024-07-03T01:48:51.430", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que RuvarOA v6.01 y v12.01 conten\u00edan una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro email_attach_id en /LHMail/AttachDown.aspx." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 9.4, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#plan_template_previewaspx", diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25509.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25509.json index 3d39f6cb88f..7e8269f45d1 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25509.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25509.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25509", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T19:15:08.077", - "lastModified": "2024-05-07T20:07:58.737", + "lastModified": "2024-07-03T01:48:52.240", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que RuvarOA v6.01 y v12.01 conten\u00edan una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro sys_file_storage_id en /WorkFlow/wf_file_download.aspx." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 9.4, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_file_downloadaspx", diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25510.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25510.json index 56945be32cf..637b4ad9318 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25510.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25510.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25510", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T19:15:08.140", - "lastModified": "2024-05-07T20:07:58.737", + "lastModified": "2024-07-03T01:48:53.193", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que RuvarOA v6.01 y v12.01 conten\u00edan una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro id en /AddressBook/address_public_show.aspx." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#address_public_showaspx", diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25511.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25511.json index b8f402eb5af..a7b06a80c0a 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25511.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25511.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25511", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T19:15:08.200", - "lastModified": "2024-05-07T20:07:58.737", + "lastModified": "2024-07-03T01:48:53.997", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que RuvarOA v6.01 y v12.01 conten\u00edan una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro id en /AddressBook/address_public_new.aspx." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 9.4, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#address_public_newaspx", diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25512.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25512.json index 9d6af4a8050..25c47d5eb26 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25512.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25512.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25512", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T18:15:08.230", - "lastModified": "2024-05-07T20:07:58.737", + "lastModified": "2024-07-03T01:48:54.810", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que RuvarOA v6.01 y v12.01 conten\u00edan una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro attach_id en /Bulletin/AttachDownLoad.aspx." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#attachdownloadaspx", diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25513.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25513.json index 1e4cb577692..2900f718647 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25513.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25513.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25513", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T19:15:08.263", - "lastModified": "2024-05-07T20:07:58.737", + "lastModified": "2024-07-03T01:48:55.660", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que RuvarOA v6.01 y v12.01 conten\u00edan una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro file_id en /CorporateCulture/kaizen_download.aspx." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#kaizen_downloadaspx", diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25514.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25514.json index 2a10e254410..53929c263e7 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25514.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25514.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25514", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T19:15:08.333", - "lastModified": "2024-05-07T20:07:58.737", + "lastModified": "2024-07-03T01:48:56.460", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que RuvarOA v6.01 y v12.01 conten\u00edan una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro template_id en /SysManage/wf_template_child_field_list.aspx." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 9.4, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_template_child_field_listaspx", diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25515.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25515.json index 2fd4abd3224..0f19d21d6b6 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25515.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25515.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25515", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-08T15:15:07.780", - "lastModified": "2024-05-08T17:05:24.083", + "lastModified": "2024-07-03T01:48:57.273", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que RuvarOA v6.01 y v12.01 conten\u00edan una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro sys_file_storage_id en /WorkFlow/wf_work_finish_file_down.aspx." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_finish_file_downaspx", diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25517.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25517.json index 862f71883f2..d6c81bf47d5 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25517.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25517.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25517", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-08T15:15:07.843", - "lastModified": "2024-05-08T17:05:24.083", + "lastModified": "2024-07-03T01:48:58.093", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que RuvarOA v6.01 y v12.01 conten\u00edan una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del argumento tbTable en /WebUtility/MF.aspx." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#mfaspx", diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25518.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25518.json index bb9718e182d..fa902e92df9 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25518.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25518.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25518", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-08T15:15:07.903", - "lastModified": "2024-05-08T17:05:24.083", + "lastModified": "2024-07-03T01:48:58.917", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que RuvarOA v6.01 y v12.01 conten\u00edan una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro template_id en /WorkFlow/wf_get_fields_approve.aspx." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 9.4, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_get_fields_approveaspx", diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25519.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25519.json index aced4ece1ed..91e4423b0ec 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25519.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25519.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25519", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-08T15:15:07.960", - "lastModified": "2024-05-08T17:05:24.083", + "lastModified": "2024-07-03T01:48:59.717", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que RuvarOA v6.01 y v12.01 conten\u00edan una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro idlist en /WorkFlow/wf_work_print.aspx." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_printaspx", diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25520.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25520.json index 66476629e76..3b42edfdaeb 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25520.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25520.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25520", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-08T15:15:08.017", - "lastModified": "2024-05-08T17:05:24.083", + "lastModified": "2024-07-03T01:49:00.550", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que RuvarOA v6.01 y v12.01 conten\u00edan una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro id en /SysManage/sys_blogtemplate_new.aspx." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#sys_blogtemplate_newaspx", diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25521.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25521.json index 91fe87a1dd9..b0490bf8149 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25521.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25521.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25521", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-08T15:15:08.073", - "lastModified": "2024-05-08T17:05:24.083", + "lastModified": "2024-07-03T01:49:01.367", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que RuvarOA v6.01 y v12.01 conten\u00edan una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro txt_keyword en get_company.aspx." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 9.4, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#get_companyaspx", diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25522.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25522.json index c1627580664..82211e95e47 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25522.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25522.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25522", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-08T15:15:08.130", - "lastModified": "2024-05-08T17:05:24.083", + "lastModified": "2024-07-03T01:49:02.173", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que RuvarOA v6.01 y v12.01 conten\u00edan una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro office_missive_id en /WorkFlow/wf_work_form_save.aspx." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 9.4, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_form_saveaspx", diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25523.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25523.json index a40d2b88945..2d4ecee3011 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25523.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25523.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25523", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-08T15:15:08.183", - "lastModified": "2024-05-08T17:05:24.083", + "lastModified": "2024-07-03T01:49:03.080", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que RuvarOA v6.01 y v12.01 conten\u00edan una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro file_id en /filemanage/file_memo.aspx." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#file_memoaspx", diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25524.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25524.json index cf7fe739c60..9b3f027840a 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25524.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25524.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25524", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-08T15:15:08.253", - "lastModified": "2024-05-08T17:05:24.083", + "lastModified": "2024-07-03T01:49:03.920", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que RuvarOA v6.01 y v12.01 conten\u00edan una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro sys_file_storage_id en /WorkPlan/WorkPlanAttachDownLoad.aspx." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 9.4, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#workplanattachdownloadaspx", diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25525.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25525.json index eeb459ed9f6..24eb3c894ee 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25525.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25525.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25525", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-08T15:15:08.310", - "lastModified": "2024-05-08T17:05:24.083", + "lastModified": "2024-07-03T01:49:04.777", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que RuvarOA v6.01 y v12.01 conten\u00edan una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro de nombre de archivo en /WorkFlow/OfficeFileDownload.aspx." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#officefiledownloadaspx", diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25526.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25526.json index cfd8ee9bf4a..c999018c0ca 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25526.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25526.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25526", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-08T15:15:08.367", - "lastModified": "2024-05-08T17:05:24.083", + "lastModified": "2024-07-03T01:49:05.593", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que RuvarOA v6.01 y v12.01 conten\u00edan una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro project_id en /ProjectManage/pm_gatt_inc.aspx." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#pm_gatt_incaspx", diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25528.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25528.json index 4ca102e6de4..80e4e1ca50a 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25528.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25528.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25528", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-08T17:15:07.513", - "lastModified": "2024-05-09T13:05:45.620", + "lastModified": "2024-07-03T01:49:06.467", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que RuvarOA v6.01 y v12.01 conten\u00edan una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro id en /PersonalAffair/worklog_template_show.aspx." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_stat_settingaspx", diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25530.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25530.json index b96ec63076d..d5ffd463dee 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25530.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25530.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25530", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-08T16:15:08.623", - "lastModified": "2024-05-08T17:05:24.083", + "lastModified": "2024-07-03T01:49:07.270", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que RuvarOA v6.01 y v12.01 conten\u00edan una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro PageID en /WebUtility/get_find_condiction.aspx." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#get_find_condictionaspx", diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25531.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25531.json index b6773e70512..2a167a13e54 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25531.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25531.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25531", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-08T16:15:08.680", - "lastModified": "2024-05-08T17:05:24.083", + "lastModified": "2024-07-03T01:49:08.077", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que RuvarOA v6.01 y v12.01 conten\u00edan una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro PageID en /WebUtility/SearchCondiction.aspx." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#searchcondictionaspx", diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25532.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25532.json index 869d307a01d..1985177fdc0 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25532.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25532.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25532", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-08T17:15:07.567", - "lastModified": "2024-05-09T13:05:45.620", + "lastModified": "2024-07-03T01:49:08.880", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que RuvarOA v6.01 y v12.01 conten\u00edan una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro bt_id en /include/get_dict.aspx." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#get_dictaspx", diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25533.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25533.json index 1b340d2bf6e..2f1f9ef5f78 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25533.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25533.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25533", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-08T17:15:07.620", - "lastModified": "2024-05-09T13:05:45.620", + "lastModified": "2024-07-03T01:49:09.687", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que los mensajes de error en RuvarOA v6.01 y v12.01 filtraban la ruta f\u00edsica del sitio web (/WorkFlow/OfficeFileUpdate.aspx). Esta vulnerabilidad puede permitir a los atacantes escribir archivos en el servidor o ejecutar comandos arbitrarios mediante declaraciones SQL manipuladas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 9.4, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#information-leakage-and-unauthorized-access-to-sensitive-data", diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25572.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25572.json index 4876d6a9b44..75989a8536e 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25572.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25572.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25572", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-04-11T03:15:09.693", - "lastModified": "2024-04-11T12:47:44.137", + "lastModified": "2024-07-03T01:49:10.700", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Vulnerabilidad de Cross-site request forgery (CSRF) existe en Ninja Forms antes de la versi\u00f3n 3.4.31. Si un administrador de un sitio web ve una p\u00e1gina maliciosa mientras inicia sesi\u00f3n, se pueden realizar operaciones no deseadas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://jvn.jp/en/jp/JVN50361500/", diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25611.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25611.json index d57d0e16d4e..546a5815ff7 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25611.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25611.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25611", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-03-05T21:15:07.887", - "lastModified": "2024-03-06T15:18:08.093", + "lastModified": "2024-07-03T01:49:12.103", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-002.txt", diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25612.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25612.json index c2b6a512f8f..cba534fedf7 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25612.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25612.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25612", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-03-05T21:15:08.133", - "lastModified": "2024-03-06T15:18:08.093", + "lastModified": "2024-07-03T01:49:12.820", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-002.txt", diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25613.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25613.json index 2c844b06c10..34d5a6e15bb 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25613.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25613.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25613", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-03-05T21:15:08.307", - "lastModified": "2024-03-06T15:18:08.093", + "lastModified": "2024-07-03T01:49:13.593", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-002.txt", diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25724.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25724.json index 3d6512c09b0..0a65c2bc67b 100644 --- a/CVE-2024/CVE-2024-257xx/CVE-2024-25724.json +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25724.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25724", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-21T19:15:09.557", - "lastModified": "2024-05-22T12:46:53.887", + "lastModified": "2024-07-03T01:49:15.880", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,9 +36,41 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.5 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.5 } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://community.rti.com/static/documentation/connext-dds/current/doc/vulnerabilities/index.html#cve-2024-25724", diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25975.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25975.json index 7a9824264fd..c11a4eeeefc 100644 --- a/CVE-2024/CVE-2024-259xx/CVE-2024-25975.json +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25975.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25975", "sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf", "published": "2024-05-29T14:15:21.793", - "lastModified": "2024-06-10T17:16:22.227", + "lastModified": "2024-07-03T01:49:20.510", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "La aplicaci\u00f3n implementa una funci\u00f3n de votaci\u00f3n a favor y en contra que altera un valor dentro de un archivo JSON. Los par\u00e1metros POST no se filtran correctamente y, por lo tanto, se puede sobrescribir un archivo arbitrario. El archivo puede ser controlado por un atacante autenticado, el contenido no puede ser controlado. Es posible sobrescribir todos los archivos para los que el servidor web tiene acceso de escritura. Es necesario proporcionar una ruta relativa (path traversa)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "551230f0-3615-47bd-b7cc-93e92e730bbf", diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2505.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2505.json index 72c9e751588..a41f294b8de 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2505.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2505.json @@ -2,8 +2,9 @@ "id": "CVE-2024-2505", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-29T06:15:07.937", - "lastModified": "2024-04-29T12:42:03.667", + "lastModified": "2024-07-03T01:53:18.567", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El mecanismo de control de acceso del complemento GamiPress WordPress anterior a 6.8.9 no restringe adecuadamente el acceso a su configuraci\u00f3n, lo que permite a los autores manipular solicitudes y extender el acceso a usuarios con privilegios m\u00e1s bajos, como suscriptores, a pesar de que la configuraci\u00f3n inicial proh\u00edbe dicho acceso. Esta vulnerabilidad se asemeja a un control de acceso roto, lo que permite a usuarios no autorizados modificar el complemento cr\u00edtico de GamiPress WordPress antes de las configuraciones 6.8.9." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/9b3d6148-ecee-4e59-84a4-3b3e9898473b/", diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2509.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2509.json index 628e1e2a408..f45a9deae08 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2509.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2509.json @@ -2,8 +2,9 @@ "id": "CVE-2024-2509", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-05T05:15:07.463", - "lastModified": "2024-04-08T18:15:08.580", + "lastModified": "2024-07-03T01:53:19.050", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento Gutenberg Blocks by Kadence Blocks de WordPress anterior a 3.2.26 no valida ni escapa algunas de sus opciones de bloqueo antes de devolverlas a una p\u00e1gina/publicaci\u00f3n donde est\u00e1 incrustado el bloque, lo que podr\u00eda permitir a los usuarios con el rol de colaborador y superior realiza ataques de Cross-Site Scripting Almacenado" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, "references": [ { "url": "https://research.cleantalk.org/cve-2024-2509/", diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26258.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26258.json index 699234e3b8f..ebe72678acf 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26258.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26258.json @@ -2,8 +2,9 @@ "id": "CVE-2024-26258", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-04-04T00:15:07.047", - "lastModified": "2024-04-04T12:48:41.700", + "lastModified": "2024-07-03T01:49:34.870", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en WRC-X3200GST3-B v1.25 y anteriores, y WRC-G01-W v1.24 y anteriores permite que un atacante adyacente a la red con credenciales ejecute comandos arbitrarios del sistema operativo enviando una solicitud especialmente manipulada al producto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/vu/JVNVU95381465/", diff --git a/CVE-2024/CVE-2024-263xx/CVE-2024-26305.json b/CVE-2024/CVE-2024-263xx/CVE-2024-26305.json index 79bab3ea74c..a9b078a2f3e 100644 --- a/CVE-2024/CVE-2024-263xx/CVE-2024-26305.json +++ b/CVE-2024/CVE-2024-263xx/CVE-2024-26305.json @@ -2,8 +2,9 @@ "id": "CVE-2024-26305", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-05-01T15:15:14.863", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-07-03T01:49:36.833", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-004.txt", diff --git a/CVE-2024/CVE-2024-263xx/CVE-2024-26307.json b/CVE-2024/CVE-2024-263xx/CVE-2024-26307.json index 6efd5784982..6c5e87055ee 100644 --- a/CVE-2024/CVE-2024-263xx/CVE-2024-26307.json +++ b/CVE-2024/CVE-2024-263xx/CVE-2024-26307.json @@ -2,8 +2,9 @@ "id": "CVE-2024-26307", "sourceIdentifier": "security@apache.org", "published": "2024-03-21T10:15:07.527", - "lastModified": "2024-05-01T17:15:30.020", + "lastModified": "2024-07-03T01:49:37.557", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Posible vulnerabilidad de condici\u00f3n de ejecuci\u00f3n en Apache Doris. Parte del c\u00f3digo que utiliza el m\u00e9todo `chmod()`. Este m\u00e9todo corre el riesgo de que alguien cambie el nombre del archivo por debajo del usuario y modifique el archivo incorrecto. En teor\u00eda, esto podr\u00eda suceder, pero el impacto ser\u00eda m\u00ednimo. Este problema afecta a Apache Doris: antes de 1.2.8, antes de 2.0.4. Se recomienda a los usuarios actualizar a la versi\u00f3n 2.0.4, que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-263xx/CVE-2024-26312.json b/CVE-2024/CVE-2024-263xx/CVE-2024-26312.json index 48e8e23f11b..0ccd91e1e14 100644 --- a/CVE-2024/CVE-2024-263xx/CVE-2024-26312.json +++ b/CVE-2024/CVE-2024-263xx/CVE-2024-26312.json @@ -2,8 +2,9 @@ "id": "CVE-2024-26312", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T16:15:13.180", - "lastModified": "2024-05-06T19:53:38.797", + "lastModified": "2024-07-03T01:49:37.810", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Archer Platform 6 anterior a 2024.03 contiene una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n confidencial. Un atacante autenticado podr\u00eda potencialmente obtener acceso a informaci\u00f3n confidencial a trav\u00e9s de un mensaje de advertencia emergente." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://archerirm.com", diff --git a/CVE-2024/CVE-2024-263xx/CVE-2024-26327.json b/CVE-2024/CVE-2024-263xx/CVE-2024-26327.json index 10b22859873..75eeda9078e 100644 --- a/CVE-2024/CVE-2024-263xx/CVE-2024-26327.json +++ b/CVE-2024/CVE-2024-263xx/CVE-2024-26327.json @@ -2,8 +2,9 @@ "id": "CVE-2024-26327", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-19T05:15:22.527", - "lastModified": "2024-04-19T07:15:09.703", + "lastModified": "2024-07-03T01:49:38.810", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en QEMU 7.1.0 a 8.2.1. Register_vfs en hw/pci/pcie_sriov.c maneja mal la situaci\u00f3n en la que un invitado escribe NumVF mayores que TotalVF, lo que provoca un desbordamiento del b\u00fafer en las implementaciones de VF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://lore.kernel.org/all/20240214-reuse-v4-5-89ad093a07f4%40daynix.com/", diff --git a/CVE-2024/CVE-2024-263xx/CVE-2024-26362.json b/CVE-2024/CVE-2024-263xx/CVE-2024-26362.json index 859f546f490..7faf01c84d9 100644 --- a/CVE-2024/CVE-2024-263xx/CVE-2024-26362.json +++ b/CVE-2024/CVE-2024-263xx/CVE-2024-26362.json @@ -2,8 +2,9 @@ "id": "CVE-2024-26362", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-10T21:15:06.533", - "lastModified": "2024-04-11T12:47:44.137", + "lastModified": "2024-07-03T01:49:39.793", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n de HTML en Enpass Password Manager Desktop Client 6.9.2 para Windows y Linux permite a los atacantes ejecutar c\u00f3digo HTML arbitrario mediante la creaci\u00f3n de una nota manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://packetstormsecurity.com/files/177075/Enpass-Desktop-Application-6.9.2-HTML-Injection.html", diff --git a/CVE-2024/CVE-2024-265xx/CVE-2024-26504.json b/CVE-2024/CVE-2024-265xx/CVE-2024-26504.json index 49d19eff435..123ac6e4cf6 100644 --- a/CVE-2024/CVE-2024-265xx/CVE-2024-26504.json +++ b/CVE-2024/CVE-2024-265xx/CVE-2024-26504.json @@ -2,8 +2,9 @@ "id": "CVE-2024-26504", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T19:15:22.390", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-07-03T01:49:41.007", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en Wifire Hotspot v.4.5.3 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado en el par\u00e1metro dst." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], "references": [ { "url": "https://cwe.mitre.org/data/definitions/601.html", diff --git a/CVE-2024/CVE-2024-265xx/CVE-2024-26507.json b/CVE-2024/CVE-2024-265xx/CVE-2024-26507.json index 9fb9fb9bc5d..d28c66362b9 100644 --- a/CVE-2024/CVE-2024-265xx/CVE-2024-26507.json +++ b/CVE-2024/CVE-2024-265xx/CVE-2024-26507.json @@ -2,8 +2,9 @@ "id": "CVE-2024-26507", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-10T16:15:12.353", - "lastModified": "2024-06-10T18:06:22.600", + "lastModified": "2024-07-03T01:49:41.820", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en FinalWire AIRDA Extreme, AIDA64 Engineer, AIDA64 Business, AIDA64 Network Audit v.7.00.6700 y anteriores permite a un atacante local escalar privilegios a trav\u00e9s de la llamada DeviceIoControl asociada con los componentes MmMapIoSpace, IoAllocateMdl, MmBuildMdlForNonPaggedPool o MmMapLockedPages." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1286" + } + ] + } + ], "references": [ { "url": "https://belong2yourself.github.io/vulnerabilities/docs/AIDA/Elevation-of-Privileges/readme/", diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26854.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26854.json index 10ced18ab0f..f869cbbb464 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26854.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26854.json @@ -2,8 +2,9 @@ "id": "CVE-2024-26854", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:08.637", - "lastModified": "2024-04-17T12:48:07.510", + "lastModified": "2024-07-03T01:49:55.907", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ice: corrige el uso del mutex dplls no inicializado El mutex pf->dplls.lock se inicializa demasiado tarde, despu\u00e9s de su primer uso. Mu\u00e9valo a la parte superior de ice_dpll_init. Tenga en cuenta que la ruta de error \"err_exit\" destruye el mutex. Y el mutex es lo \u00faltimo que se destruye en ice_dpll_deinit. Esto corrige la siguiente advertencia con CONFIG_DEBUG_MUTEXES: ice 0000:10:00.0: El paquete DDP se carg\u00f3 correctamente: Paquete predeterminado de ICE OS versi\u00f3n 1.3.36.0 ice 0000:10:00.0: Ancho de banda PCIe disponible de 252,048 Gb/s (PCIe de 16,0 GT/s enlace x16) ice 0000:10:00.0: inicio de PTP exitoso ------------[ cortar aqu\u00ed ]------------ DEBUG_LOCKS_WARN_ON(lock->magic != lock ) Advertencia: CPU: 0 PID: 410 AT KERNEL/Locking/Mutex.C: 587 __mutex_lock+0x773/0xd40 M\u00f3dulos vinculados en: CRCT10DIF_PCLMUL CRC32_PCLMUL CRC32C_Tel Polyval_clmulni Polyval_Gener KWorker/ 0:4 No contaminado 6.8.0-rc5+ #3 Nombre del hardware: HPE ProLiant DL110 Gen10 Plus/ProLiant DL110 Gen10 Plus, BIOS U56 19/10/2023 Cola de trabajo: eventos work_for_cpu_fn RIP: 0010:__mutex_lock+0x773/0xd40 C\u00f3digo: c0 0f 84 1d f9 ff ff 44 8b 35 0d 9c 69 01 45 85 f6 0f 85 0d f9 ff ff 48 c7 c6 12 a2 a9 85 48 c7 c7 12 f1 a> RSP: 0018:ff7eb1a3417a7ae0 EFLAGS: X: 0000000000000000 RBX: 0000000000000002 RCX : 0000000000000000 RDX: 0000000000000002 RSI: ffffffff85ac2bff RDI: 00000000ffffffff RBP: ff7eb1a3417a7b80 R08: 0000000000000000 R09: 00000000ffffb fff R10: ff7eb1a3417a7978 R11: ff32b80f7fd2e568 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: ff32b7f02c50e0d8 FS: 0000000000000000(0000) GS:ff32b80efe800000(0000) KNLGS: 00000000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 000000000080050033 CR2: 000055B5852CC000 00 DR3: 000000000000000000 DR6: 0000000000FFFE0FF0 DR7: 000000000000000400 PKRU: 555555554 Trace de llamadas: ? __advertir+0x84/0x170 ? __mutex_lock+0x773/0xd40? report_bug+0x1c7/0x1d0? prb_read_valid+0x1b/0x30? handle_bug+0x42/0x70? exc_invalid_op+0x18/0x70? asm_exc_invalid_op+0x1a/0x20? __mutex_lock+0x773/0xd40? rcu_is_watching+0x11/0x50? __kmalloc_node_track_caller+0x346/0x490 ? ice_dpll_lock_status_get+0x28/0x50 [hielo]? __pfx_ice_dpll_lock_status_get+0x10/0x10 [hielo]? ice_dpll_lock_status_get+0x28/0x50 [ice] ice_dpll_lock_status_get+0x28/0x50 [ice] dpll_device_get_one+0x14f/0x2e0 dpll_device_event_send+0x7d/0x150 dpll_device_register+0x124/0x180 init_dpll+0x7b/0xd0 [hielo] ice_dpll_init+0x224/0xa40 [hielo] ? _dev_info+0x70/0x90 ice_load+0x468/0x690 [hielo] ice_probe+0x75b/0xa10 [hielo] ? _raw_spin_unlock_irqrestore+0x4f/0x80 ? Process_one_work+0x1a3/0x500 local_pci_probe+0x47/0xa0 work_for_cpu_fn+0x17/0x30 Process_one_work+0x20d/0x500 trabajador_thread+0x1df/0x3e0 ? __pfx_worker_thread+0x10/0x10 kthread+0x103/0x140 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x31/0x50 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1b/0x30 sello de evento irq: 125197 hardirqs habilitado por \u00faltima vez en (125197): [] Finish_task_switch.isra.0+0x12d/0x3d0 hardirqs deshabilitado por \u00faltima vez en (1251 96): [ ] __schedule+0xea4/0x19f0 softirqs habilitado por \u00faltima vez en (105334): [] napi_get_frags_check+0x1a/0x60 softirqs deshabilitado por \u00faltima vez en (105332): [] x1a/0x60 ---[ fin traza 0000000000000000 ]---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/9224fc86f1776193650a33a275cac628952f80a9", diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26864.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26864.json index 5b55c40f700..9f56797650a 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26864.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26864.json @@ -2,8 +2,9 @@ "id": "CVE-2024-26864", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:09.153", - "lastModified": "2024-04-17T12:48:07.510", + "lastModified": "2024-07-03T01:49:57.117", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: corrige el manejo de refcnt en __inet_hash_connect(). syzbot inform\u00f3 una advertencia en sk_nulls_del_node_init_rcu(). La confirmaci\u00f3n 66b60b0c8c4a (\"dccp/tcp: Unhash sk de ehash para falla de asignaci\u00f3n de tb2 despu\u00e9s de check_estalblished().\") intent\u00f3 solucionar un problema por el cual un socket no conectado ocupa una entrada de ehash cuando falla la asignaci\u00f3n de bhash2. En tal caso, necesitamos revertir los cambios realizados por check_establecido(), que no retiene refcnt al insertar el socket en ehash. Entonces, para revertir el cambio, necesitamos __sk_nulls_add_node_rcu() en lugar de sk_nulls_add_node_rcu(). De lo contrario, sock_put() provocar\u00e1 un desbordamiento insuficiente y filtrar\u00e1 el socket. [0]: ADVERTENCIA: CPU: 0 PID: 23948 en include/net/sock.h:799 sk_nulls_del_node_init_rcu+0x166/0x1a0 include/net/sock.h:799 M\u00f3dulos vinculados en: CPU: 0 PID: 23948 Comm: syz- executor.2 No contaminado 6.8.0-rc6-syzkaller-00159-gc055fc00c07b #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 25/01/2024 RIP: 0010:sk_nulls_del_node_init_rcu+0x166/0x1a0 include/net/ calcet\u00edn.h:799 C\u00f3digo: e8 7f 71 c6 f7 83 fb 02 7c 25 e8 35 6d c6 f7 4d 85 f6 0f 95 c0 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc e8 1b 6d c6 f7 90 < 0f> 0b 90 eb b2 e8 10 6d c6 f7 4c 89 e7 be 04 00 00 00 e8 63 e7 d2 RSP: 0018:ffffc900032d7848 EFLAGS: 00010246 RAX: ffffffff89cd0035 RBX: 00001 RCX: 0000000000040000 RDX: ffffc90004de1000 RSI: 000000000003ffff RDI: 0000000000040000 RBP : 1ffff1100439ac26 R08: ffffffff89ccffe3 R09: 1ffff1100439ac28 R10: dffffc0000000000 R11: ffffed100439ac29 R12: ffff888021cd6140 R13: dffffc0000000000 ff ff88802a9bf5c0 R15: ffff888021cd6130 FS: 00007f3b823f16c0(0000) GS:ffff8880b9400000(0000) knlGS:00000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f3b823f0ff8 CR3: 000000004674a000 CR4: 00000000003506f0 DR0: 00000000000000000 DR1: 0000000000000000 DR2: 000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Seguimiento de llamadas: __inet_hash_connect+0x140f/0x20b0 net/ipv4/inet_hashtables.c:1139 dccp_v6_connect+0xcb9/0x1480 net/dccp/ipv6.c:956 __inet_stream_connect+0x262/0xf30 net/ipv4/af_inet.c:678 inet_stream_connect+0x65/0xa0 net/ipv4/af_inet.c:749 __sys_connect_file net/socket.c:2048 [en l\u00ednea] __sys_connect+0x2df/0x310 net/socket.c:2065 __do_sys_connect net/socket.c:2075 [en l\u00ednea] __se_sys_connect net/socket.c:2072 [en l\u00ednea] __x64_sys_connect+0x7a/0x90 net/socket.c:2072 +0xf9/0x240 Entry_SYSCALL_64_after_hwframe+0x6f/0x77 RIP: 0033:0x7f3b8167dda9 C\u00f3digo: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 4 8 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f3b823f10c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002a RAX: ffffffffffffffda RBX: 00007f3b817abf80 RCX : 00007f3b8167dda9 RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000003 RBP: 00007f3b823f1120 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 R13: 0000000000000000b R14: 00007f3b817abf80 00007ffd3beb57b8 " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/04d9d1fc428ac9f581d55118d67e0cb546701feb", diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26896.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26896.json index a5a4bc58587..27ea9f75043 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26896.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26896.json @@ -2,8 +2,9 @@ "id": "CVE-2024-26896", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:10.727", - "lastModified": "2024-04-17T12:48:07.510", + "lastModified": "2024-07-03T01:49:59.133", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/12f00a367b2b62756e0396f14b54c2c15524e1c3", diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26924.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26924.json index c5cf3951015..d380ab15461 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26924.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26924.json @@ -2,8 +2,9 @@ "id": "CVE-2024-26924", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-25T06:15:57.407", - "lastModified": "2024-06-25T22:15:26.257", + "lastModified": "2024-07-03T01:50:00.957", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: nft_set_pipapo: no liberar elemento activo Pablo informa un bloqueo con grandes lotes de elementos con un patr\u00f3n de agregar/eliminar consecutivos. Citando a Pablo: add_elem(\"00000000\") timeout 100 ms ... add_elem(\"0000000X\") timeout 100 ms del_elem(\"0000000X\") <---------------- elimina uno que se acaba de agregar... add_elem(\"00005000\") tiempo de espera 100 ms 1) nft_pipapo_remove() elimina el elemento 0000000X Luego, KASAN muestra un s\u00edmbolo. Al observar la funci\u00f3n de eliminaci\u00f3n, existe la posibilidad de que eliminemos una regla que se asigne a un elemento no desactivado. La eliminaci\u00f3n se realiza en dos pasos: primero buscamos la clave k, devolvemos el elemento que se va a eliminar y lo marcamos como inactivo en la pr\u00f3xima generaci\u00f3n. Luego, en un segundo paso, el elemento se elimina del conjunto/mapa. La funci\u00f3n _remove no funciona correctamente si tenemos m\u00e1s de un elemento que comparte la misma clave. Esto puede suceder si insertamos un elemento en un conjunto cuando el conjunto ya contiene un elemento con la misma clave, pero la asignaci\u00f3n del elemento a la clave existente ha expirado o no est\u00e1 activa en la pr\u00f3xima generaci\u00f3n. En tal caso, es posible que la eliminaci\u00f3n desasigne el elemento incorrecto. Si esto sucede, filtraremos el elemento no desactivado, se vuelve inalcanzable. El elemento que se desactiv\u00f3 (y se liberar\u00e1 m\u00e1s adelante) permanecer\u00e1 accesible en la estructura de datos establecida, lo que puede provocar un bloqueo cuando dicho elemento se recupere durante la b\u00fasqueda (puntero obsoleto). Agregue una verificaci\u00f3n de que la clave que coincide completamente de hecho se asigna al elemento que hemos marcado como inactivo en el paso de desactivaci\u00f3n. Si no, debemos seguir buscando. Agregue tambi\u00e9n una trampa de error/advertencia al final de la funci\u00f3n; la funci\u00f3n de eliminaci\u00f3n nunca debe llamarse con un elemento invisible/inalcanzable/inexistente. v2: evitar variables temporales innecesarias (Stefano)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/14b001ba221136c15f894577253e8db535b99487", diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26927.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26927.json index 1930dd948d9..77531f61fe1 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26927.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26927.json @@ -2,8 +2,9 @@ "id": "CVE-2024-26927", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-28T12:15:21.063", - "lastModified": "2024-04-29T12:42:03.667", + "lastModified": "2024-07-03T01:50:01.863", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ASoC: SOF: agregue algunas comprobaciones de los l\u00edmites a los datos del firmware. Smatch se queja de que \"head->full_size - head->header_size\" puede desbordarse. Hasta cierto punto, siempre vamos a tener que confiar un poco en el firmware. Sin embargo, es bastante f\u00e1cil agregar una verificaci\u00f3n de negativos y agreguemos tambi\u00e9n una verificaci\u00f3n de los l\u00edmites superiores." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/044e220667157fb9d59320341badec59cf45ba48", diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26932.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26932.json index 07c0150b9e9..027ea3fb5cc 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26932.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26932.json @@ -2,8 +2,9 @@ "id": "CVE-2024-26932", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:07.810", - "lastModified": "2024-05-23T19:12:39.257", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:50:02.753", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-415" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26939.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26939.json index 868794faeee..2e3612bc8f1 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26939.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26939.json @@ -2,8 +2,9 @@ "id": "CVE-2024-26939", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:09.193", - "lastModified": "2024-05-01T13:02:20.750", + "lastModified": "2024-07-03T01:50:03.663", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0e45882ca829b26b915162e8e86dbb1095768e9e", diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26942.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26942.json index 5ee4c5870e6..ac1d92d3aac 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26942.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26942.json @@ -2,8 +2,9 @@ "id": "CVE-2024-26942", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:09.633", - "lastModified": "2024-05-23T19:13:50.467", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:50:04.523", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-476" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26945.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26945.json index 274b12485ea..446430df87d 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26945.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26945.json @@ -2,8 +2,9 @@ "id": "CVE-2024-26945", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:10.177", - "lastModified": "2024-05-01T13:02:20.750", + "lastModified": "2024-07-03T01:50:05.433", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: crypto: iaa - Corrige el caso nr_cpus < nr_iaa Si nr_cpus < nr_iaa, el cpus_per_iaa calculado ser\u00e1 0, lo que provoca una divisi\u00f3n por 0 en rebalance_wq_table(). Aseg\u00farese de que cpus_per_iaa sea 1 en ese caso, y tambi\u00e9n en el caso de nr_iaa == 0, aunque cpus_per_iaa nunca se use si nr_iaa == 0, para paranoia." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-369" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/5a7e89d3315d1be86aff8a8bf849023cda6547f7", diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26952.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26952.json index a0e773b9281..7a920debc24 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26952.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26952.json @@ -2,8 +2,9 @@ "id": "CVE-2024-26952", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:11.350", - "lastModified": "2024-05-25T15:15:08.950", + "lastModified": "2024-07-03T01:50:06.420", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26957.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26957.json index 8a79297949b..80ce4aa939d 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26957.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26957.json @@ -2,8 +2,9 @@ "id": "CVE-2024-26957", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:11.953", - "lastModified": "2024-06-25T22:15:26.860", + "lastModified": "2024-07-03T01:50:07.493", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/394b6d8bbdf9ddee6d5bcf3e1f3e9f23eecd6484", diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26960.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26960.json index d0f50efd343..39a0aad7467 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26960.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26960.json @@ -2,8 +2,9 @@ "id": "CVE-2024-26960", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:12.323", - "lastModified": "2024-06-25T23:15:28.093", + "lastModified": "2024-07-03T01:50:08.270", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm: swap: corrige la ejecuci\u00f3n entre free_swap_and_cache() y swapoff() Anteriormente exist\u00eda una ventana te\u00f3rica donde swapoff() pod\u00eda ejecutar y desmantelar un swap_info_struct mientras se realizaba una llamada a free_swap_and_cache(). corriendo en otro hilo. Esto podr\u00eda causar, entre otras malas posibilidades, que swap_page_trans_huge_swapped() (llamado por free_swap_and_cache()) acceda a la memoria liberada para swap_map. Este es un problema te\u00f3rico y no he podido provocarlo a partir de un caso de prueba. Pero ha habido un acuerdo basado en la revisi\u00f3n del c\u00f3digo de que esto es posible (ver enlace a continuaci\u00f3n). Solucionarlo usando get_swap_device()/put_swap_device(), lo que detendr\u00e1 swapoff(). Hubo una verificaci\u00f3n adicional en _swap_info_get() para confirmar que la entrada de intercambio no era gratuita. Esto no est\u00e1 presente en get_swap_device() porque en general no tiene sentido debido a la ejecuci\u00f3n entre obtener la referencia y el intercambio. As\u00ed que agregu\u00e9 una verificaci\u00f3n equivalente directamente en free_swap_and_cache(). Detalles de c\u00f3mo provocar un posible problema (gracias a David Hildenbrand por derivar esto): --8<----- __swap_entry_free() podr\u00eda ser el \u00faltimo usuario y dar como resultado \"count == SWAP_HAS_CACHE\". swapoff->try_to_unuse() se detendr\u00e1 tan pronto como si->inuse_pages==0. Entonces la pregunta es: \u00bfalguien podr\u00eda reclamar la publicaci\u00f3n y activar si->inuse_pages==0, antes de que completemos swap_page_trans_huge_swapped()? Imagine lo siguiente: folio de 2 MiB en el swapcache. S\u00f3lo 2 subp\u00e1ginas siguen siendo referencias mediante entradas de intercambio. El proceso 1 todav\u00eda hace referencia a la subp\u00e1gina 0 mediante la entrada de intercambio. El proceso 2 todav\u00eda hace referencia a la subp\u00e1gina 1 mediante la entrada de intercambio. El proceso 1 se cierra. Llama a free_swap_and_cache(). -> count == SWAP_HAS_CACHE [luego, adelantado en el hipervisor, etc.] El proceso 2 se cierra. Llama a free_swap_and_cache(). -> count == SWAP_HAS_CACHE El proceso 2 contin\u00faa, pasa swap_page_trans_huge_swapped() y llama a __try_to_reclaim_swap(). __try_to_reclaim_swap()->folio_free_swap()->delete_from_swap_cache()-> put_swap_folio()->free_swap_slot()->swapcache_free_entries()-> swap_entry_free()->swap_range_free()-> ... WRITE_ONCE(si->inuse_pages, si->inuse_pages - nr_entries); \u00bfQu\u00e9 impide que el intercambio tenga \u00e9xito despu\u00e9s de que el proceso 2 recuper\u00f3 el cach\u00e9 de intercambio pero antes de que el proceso 1 terminara su llamada a swap_page_trans_huge_swapped()? --8<-----" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0f98f6d2fb5fad00f8299b84b85b6bc1b6d7d19a", diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26970.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26970.json index b6a55497e4d..e0c16514402 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26970.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26970.json @@ -2,8 +2,9 @@ "id": "CVE-2024-26970", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:13.320", - "lastModified": "2024-06-25T22:15:27.303", + "lastModified": "2024-07-03T01:50:09.343", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: clk: qcom: gcc-ipq6018: correcci\u00f3n de terminaci\u00f3n de matrices de tablas de frecuencia Se supone que las matrices de tablas de frecuencia terminan con un elemento vac\u00edo. Agregue dicha entrada al final de las matrices donde falta para evitar un posible acceso fuera de los l\u00edmites cuando la tabla es atravesada por funciones como qcom_find_freq() o qcom_find_freq_floor(). Solo compilar probado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/421b135aceace99789c982f6a77ce9476564fb52", diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26976.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26976.json index 921faa8bd0e..40f7ebd35e5 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26976.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26976.json @@ -2,8 +2,9 @@ "id": "CVE-2024-26976", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:14.667", - "lastModified": "2024-06-27T12:15:23.370", + "lastModified": "2024-07-03T01:50:10.377", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: KVM: siempre vac\u00ede la cola de trabajo as\u00edncrona #PF cuando se destruya la vCPU. Siempre vac\u00ede la cola de trabajo as\u00edncrona #PF por vCPU cuando una vCPU est\u00e9 limpiando su cola de finalizaci\u00f3n, por ejemplo, cuando una VM y todo sus vCPU est\u00e1n siendo destruidas. KVM debe asegurarse de que ninguna de sus devoluciones de llamada de la cola de trabajo se est\u00e9 ejecutando cuando se coloca la \u00faltima referencia al _m\u00f3dulo_ KVM. Regalar una referencia a la VM asociada evita que la devoluci\u00f3n de llamada de la cola de trabajo elimine la referencia a la memoria de vCPU/VM liberada, pero no evita que el m\u00f3dulo KVM se descargue antes de que se complete la devoluci\u00f3n de llamada. Elimine el regalo de recuento de VM equivocado, ya que llamar a kvm_put_kvm() desde async_pf_execute() si kvm_put_kvm() vac\u00eda la cola de trabajo as\u00edncrona #PF resultar\u00e1 en un punto muerto. async_pf_execute() no puede regresar hasta que finalice kvm_put_kvm(), y kvm_put_kvm() no puede regresar hasta que finalice async_pf_execute(): ADVERTENCIA: CPU: 8 PID: 251 en virt/kvm/kvm_main.c:1435 kvm_put_kvm+0x2d/0x320 [kvm] M\u00f3dulos vinculados en: vhost_net vhost vhost_iotlb tap kvm_intel kvm irqbypass CPU: 8 PID: 251 Comm: kworker/8:1 Tainted: GW 6.6.0-rc1-e7af8d17224a-x86/gmem-vm #119 Nombre de hardware: Est\u00e1ndar QEMU PC (Q35 + ICH9, 2009), BIOS 0.0.0 06/02/2015 Cola de trabajo: eventos async_pf_execute [kvm] RIP: 0010:kvm_put_kvm+0x2d/0x320 [kvm] Seguimiento de llamadas: async_pf_execute+0x198/0x260 [kvm ] Process_one_work+0x145/0x2d0 work_thread+0x27e/0x3a0 kthread+0xba/0xe0 ret_from_fork+0x2d/0x50 ret_from_fork_asm+0x11/0x20 ---[ end trace 0000000000000000 ]--- INFORMACI\u00d3N: tarea kworker /8:1: 251 bloqueado durante m\u00e1s de 120 segundos. Contaminado: GW 6.6.0-rc1-e7af8d17224a-x86/gmem-vm #119 \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" desactiva este mensaje. tarea:kworker/8:1 estado:D pila:0 pid:251 ppid:2 banderas:0x00004000 Cola de trabajo: eventos async_pf_execute [kvm] Seguimiento de llamadas: __schedule+0x33f/0xa40 Schedule+0x53/0xc0 Schedule_timeout+0x12a/0x140 __wait_for_common+0x8d/0x1d0 __flush_work.isra.0+0x19f/0x2c0 kvm_clear_async_pf_completion_queue+0x129/0x190 [kvm] kvm_arch_destroy_vm+0x78/0x1b0 [kvm] x320 [kvm] async_pf_execute+0x198/0x260 [kvm] proceso_one_work+0x145/ 0x2d0 trabajador_thread+0x27e/0x3a0 kthread+0xba/0xe0 ret_from_fork+0x2d/0x50 ret_from_fork_asm+0x11/0x20 Si kvm_clear_async_pf_completion_queue() realmente vac\u00eda la cola de trabajo, entonces no hay necesidad de regalar un referencia porque todas las invocaciones de async_pf_execute () se ver\u00e1 obligado a completarse antes de que la vCPU y su VM sean destruidas o liberadas. Y eso, a su vez, corrige el error de descarga del m\u00f3dulo, ya que __fput() no ejecutar\u00e1 module_put() en la \u00faltima referencia de vCPU hasta que se haya liberado la vCPU, por ejemplo, si al cerrar el archivo de vCPU tambi\u00e9n se coloca la \u00faltima referencia al m\u00f3dulo KVM. Tenga en cuenta que kvm_check_async_pf_completion() tambi\u00e9n puede sacar el elemento de trabajo de la cola de finalizaci\u00f3n y, por lo tanto, tambi\u00e9n necesita vaciar la cola de trabajos, ya que kvm_clear_async_pf_completion_queue() no ver\u00e1 el trabajo. En teor\u00eda, esperar en la cola de trabajo podr\u00eda retrasar una vCPU debido a la espera de que se complete el trabajo, pero esa es una posibilidad muy, muy peque\u00f1a y probablemente un retraso muy peque\u00f1o. kvm_arch_async_page_present_queued() realiza incondicionalmente una nueva solicitud, es decir, efectivamente retrasar\u00e1 la entrada del invitado, por lo que el trabajo restante es realmente solo: trace_kvm_async_pf_completed(addr, cr2_or_gpa); __kvm_vcpu_wake_up(vcpu); mmput(mm); y mmput() no puede eliminar la \u00faltima referencia a las tablas de p\u00e1ginas si la vCPU a\u00fan est\u00e1 activa, es decir, la vCPU no se atascar\u00e1 al derribar las tablas de p\u00e1ginas. ---truncado---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3d75b8aa5c29058a512db29da7cbee8052724157", diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26978.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26978.json index 04cba2e2bff..fc7a742700c 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26978.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26978.json @@ -2,8 +2,9 @@ "id": "CVE-2024-26978", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:15.040", - "lastModified": "2024-06-25T22:15:27.490", + "lastModified": "2024-07-03T01:50:11.337", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-476" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26984.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26984.json index 5f68dd4008e..46095d9d70a 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26984.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26984.json @@ -2,8 +2,9 @@ "id": "CVE-2024-26984", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:15.880", - "lastModified": "2024-06-27T13:15:57.467", + "lastModified": "2024-07-03T01:50:12.193", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: nouveau: corrige la condici\u00f3n de ejecuci\u00f3n de instmem alrededor de las tiendas ptr Al ejecutar una gran cantidad de VK CTS en paralelo contra nouveau, una vez cada pocas horas es posible que vea algo como este bloqueo. ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 0000000000000008 PGD 8000000114e6e067 P4D 8000000114e6e067 PUD 109046067 PMD 0 Ups: 0000 [#1] PREEMPT SMP PTI CPU: 7 PID: 53891 Comm: deqp-vk No contaminado 6.8.0-rc6+ #27 Nombre del hardware : Gigabyte Technology Co., Ltd. Z390 I AORUS PRO WIFI/Z390 I AORUS PRO WIFI-CF, BIOS F8 05/11/2021 RIP: 0010:gp100_vmm_pgt_mem+0xe3/0x180 [nuevo] C\u00f3digo: c7 48 01 c8 49 89 45 58 85 d2 0f 84 95 00 00 00 41 0f b7 46 12 49 8b 7e 08 89 da 42 8d 2c f8 48 8b 47 08 41 83 c7 01 48 89 ee <48> 8b 40 08 ff d0 0f 1f 0 0 49 8b 7e 08 48 89 d9 48 8d 75 04 48 c1 RSP: 0000:ffffac20c5857838 EFLAGS: 00010202 RAX: 0000000000000000 RBX: 00000000004d8001 RCX: 0000000000000001 RDX: 00000000004d8001 RSI: 00000000000006d8 RDI: ffffa07afe332180 RBP: 00000000000006d8 R08: ffffac20c5857ad0 R09: 0000000000ffff10 R10: 000000001 R11: ffffa07af27e2de0 R12: 000000000000001c R13: ffffac20c5857ad0 R14: ffffa07a96fe9040 R15: 000000000000001c FS: 00007fe395eed7c0(0000) GS:ffffa07e2c980000(0000) nlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000008 CR3: 000000011febe001 CR4: 00000000003706f0 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Rastreo de llamadas: ... ? gp100_vmm_pgt_mem+0xe3/0x180 [nuevo]? gp100_vmm_pgt_mem+0x37/0x180 [nuevo] nvkm_vmm_iter+0x351/0xa20 [nuevo] ? __pfx_nvkm_vmm_ref_ptes+0x10/0x10 [nuevo] ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nuevo] ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nuevo] ? __lock_acquire+0x3ed/0x2170? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nuevo] nvkm_vmm_ptes_get_map+0xc2/0x100 [nuevo] ? __pfx_nvkm_vmm_ref_ptes+0x10/0x10 [nuevo] ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nuevo] nvkm_vmm_map_locked+0x224/0x3a0 [nuevo] Agregar cualquier tipo de depuraci\u00f3n \u00fatil generalmente hace que desaparezca, as\u00ed que escrib\u00ed la funci\u00f3n a mano en una l\u00ednea y depur\u00e9 el asm. De vez en cuando pt->memoria->ptrs es NULL. Este ptrs ptr se establece en nv50_instobj_acquire llamado desde nvkm_kmap. Si el subproceso A y el subproceso B llegan a nv50_instobj_acquire aproximadamente al mismo tiempo, y el subproceso A llega a la l\u00ednea refcount_set, y en paralelo el subproceso B tiene \u00e9xito en refcount_inc_not_zero, existe la posibilidad de que el valor de ptrs no se haya almacenado ya que refcount_set no est\u00e1 ordenado. Forzar una barrera de memoria aqu\u00ed, eleg\u00ed smp_mb, ya que lo queremos en todas las CPU y es escritura seguida de lectura. v2: use smp_rmb/smp_wmb emparejado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/13d76b2f443dc371842916dd8768009ff1594716", diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2603.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2603.json index 6c72bf6fc01..017eee331b0 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2603.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2603.json @@ -2,8 +2,9 @@ "id": "CVE-2024-2603", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-26T05:15:50.163", - "lastModified": "2024-04-26T12:58:17.720", + "lastModified": "2024-07-03T01:53:22.183", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento Salon booking system de WordPress hasta la versi\u00f3n 9.6.5 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como administradores (o editores dependiendo de la configuraci\u00f3n del complemento de WordPress del sistema de reservas de salones hasta la versi\u00f3n 9.6.5) realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en configuraci\u00f3n multisitio)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/b4186c03-99ee-4297-85c0-83b7053afc1c/", diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2608.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2608.json index 67306cb981f..8f424912167 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2608.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2608.json @@ -2,8 +2,9 @@ "id": "CVE-2024-2608", "sourceIdentifier": "security@mozilla.org", "published": "2024-03-19T12:15:08.843", - "lastModified": "2024-03-25T17:15:51.783", + "lastModified": "2024-07-03T01:53:22.600", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-680" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1880692", diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2617.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2617.json index a82486e8b95..a8fb1d12bcc 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2617.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2617.json @@ -2,8 +2,9 @@ "id": "CVE-2024-2617", "sourceIdentifier": "cybersecurity@hitachienergy.com", "published": "2024-04-30T13:15:47.200", - "lastModified": "2024-04-30T17:52:35.057", + "lastModified": "2024-07-03T01:53:23.587", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-358" + } + ] + } + ], "references": [ { "url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000199&languageCode=en&Preview=true", diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2697.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2697.json index cfb537e84d6..a6acd1d79ed 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2697.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2697.json @@ -2,8 +2,9 @@ "id": "CVE-2024-2697", "sourceIdentifier": "contact@wpscan.com", "published": "2024-05-17T06:15:51.443", - "lastModified": "2024-05-17T18:36:05.263", + "lastModified": "2024-07-03T01:53:28.700", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El complemento de WordPress socialdriver-framework anterior a 2024.0.0 no valida ni escapa algunos de sus atributos de c\u00f3digo corto antes de devolverlos a la p\u00e1gina, lo que podr\u00eda permitir a los usuarios con un rol tan bajo como colaborador realizar ataques de Cross-Site Scripting almacenado que podr\u00edan ser utilizados contra usuarios con privilegios elevados, como administradores." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/c430b30d-61db-45f5-8499-91b491503b9c/", diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27037.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27037.json index aac4595dd0b..1efac3682ca 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27037.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27037.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27037", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T13:15:49.450", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-07-03T01:50:15.890", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/01511ac7be8e45f80e637f6bf61af2d3d2dee9db", diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27050.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27050.json index 1cce5f88603..493009f93ec 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27050.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27050.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27050", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T13:15:50.070", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-07-03T01:50:17.020", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: libbpf: use la macro OPTS_SET() en bpf_xdp_query() Cuando los campos feature_flags y xdp_zc_max_segs se agregaron a libbpf bpf_xdp_query_opts, el c\u00f3digo que los escribi\u00f3 no us\u00f3 la macro OPTS_SET(). Esto hace que libbpf escriba en esos campos incondicionalmente, lo que significa que los programas compilados con una versi\u00f3n anterior de libbpf (con un tama\u00f1o m\u00e1s peque\u00f1o de la estructura bpf_xdp_query_opts) tendr\u00e1n su pila da\u00f1ada por la escritura de libbpf fuera de los l\u00edmites. El parche que agrega el campo feature_flags tiene un rescate anticipado si el campo feature_flags no es parte de la estructura opts (a trav\u00e9s de la macro OPTS_HAS), pero el parche que agrega xdp_zc_max_segs no lo hace. Para mantener la coherencia, esta soluci\u00f3n simplemente cambia las asignaciones a ambos campos para usar la macro OPTS_SET()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/682ddd62abd4bdcee7584246903e7a2df005fe0d", diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27052.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27052.json index aec6fbaec48..f389a1f8f15 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27052.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27052.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27052", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T13:15:50.170", - "lastModified": "2024-06-25T22:15:29.170", + "lastModified": "2024-07-03T01:50:17.917", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: rtl8xxxu: agregue cancel_work_sync() para c2hcmd_work Es posible que la cola de trabajo a\u00fan est\u00e9 ejecut\u00e1ndose cuando se detiene el controlador. Para evitar un use-after-free, llame a cancel_work_sync() en rtl8xxxu_stop()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1213acb478a7181cd73eeaf00db430f1e45b1361", diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27053.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27053.json index 7a2bdc22c48..fd4a80900a7 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27053.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27053.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27053", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T13:15:50.223", - "lastModified": "2024-06-25T22:15:29.230", + "lastModified": "2024-07-03T01:50:18.727", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: wifi: wilc1000: corrige el uso de RCU en la ruta de conexi\u00f3n Con lockdep habilitado, las llamadas a la funci\u00f3n de conexi\u00f3n desde la capa cfg802.11 generan la siguiente advertencia: ======== ====================== ADVERTENCIA: uso sospechoso de RCU 6.7.0-rc1-wt+ #333 No contaminado ------------- ---------------- drivers/net/wireless/microchip/wilc1000/hif.c:386 \u00a1uso sospechoso de rcu_dereference_check()! [...] pila backtrace: CPU: 0 PID: 100 Comm: wpa_supplicant No est\u00e1 contaminado 6.7.0-rc1-wt+ #333 Nombre de hardware: Atmel SAMA5 unwind_backtrace from show_stack+0x18/0x1c show_stack from dump_stack_lvl+0x34/0x48 dump_stack_lvl from wilc_parse_join_bss_para m +0x7dc/0x7f4 wilc_parse_join_bss_param desde connect+0x2c4/0x648 conectar desde cfg80211_connect+0x30c/0xb74 cfg80211_connect desde nl80211_connect+0x860/0xa94 nl80211_connect desde genl_rcv_msg+0x3fc /0x59c genl_rcv_msg de netlink_rcv_skb+0xd0/0x1f8 netlink_rcv_skb de genl_rcv+0x2c/0x3c genl_rcv de netlink_unicast+ 0x3b0/0x550 netlink_unicast de netlink_sendmsg+0x368/0x688 netlink_sendmsg de ____sys_sendmsg+0x190/0x430 ____sys_sendmsg de ___sys_sendmsg+0x110/0x158 ___sys_sendmsg de sys_sendmsg +0xe8/0x150 sys_sendmsg de ret_fast_syscall+0x0/0x1c Esta advertencia se emite porque en la ruta de conexi\u00f3n, al intentar Para analizar los par\u00e1metros BSS de destino, eliminamos la referencia a un puntero de RCU sin estar en la secci\u00f3n cr\u00edtica de RCU. Corrija el uso de desreferenciaci\u00f3n de RCU movi\u00e9ndolo a una secci\u00f3n cr\u00edtica de lectura de RCU. Para evitar incluir todo el wilc_parse_join_bss_param en la secci\u00f3n cr\u00edtica, simplemente use la secci\u00f3n cr\u00edtica para copiar datos de ies" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/205c50306acf58a335eb19fa84e40140f4fe814f", diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27124.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27124.json index 59d79d455e4..9a5b0ab1be8 100644 --- a/CVE-2024/CVE-2024-271xx/CVE-2024-27124.json +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27124.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27124", "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2024-04-26T15:15:48.500", - "lastModified": "2024-04-26T15:32:22.523", + "lastModified": "2024-07-03T01:50:21.947", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27264.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27264.json index 0712d9453c4..ff7c32d08f6 100644 --- a/CVE-2024/CVE-2024-272xx/CVE-2024-27264.json +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27264.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27264", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-05-22T20:15:09.047", - "lastModified": "2024-05-24T01:15:30.977", + "lastModified": "2024-07-03T01:50:28.290", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,26 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + }, + { + "lang": "en", + "value": "CWE-276" + }, + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/284563", diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27280.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27280.json index 261fcbefb60..20b1bb2ae73 100644 --- a/CVE-2024/CVE-2024-272xx/CVE-2024-27280.json +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27280.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27280", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:11:56.940", - "lastModified": "2024-05-14T16:13:02.773", + "lastModified": "2024-07-03T01:50:29.333", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema de sobrelectura del b\u00fafer en StringIO 3.0.1, distribuido en Ruby 3.0.x hasta 3.0.6 y 3.1.x hasta 3.1.4. Los m\u00e9todos ungetbyte y ungetc en StringIO pueden leer m\u00e1s all\u00e1 del final de una cadena, y una llamada posterior a StringIO.gets puede devolver el valor de la memoria. 3.0.3 es la versi\u00f3n fija principal; sin embargo, para los usuarios de Ruby 3.0, una versi\u00f3n fija es stringio 3.0.1.1, y para los usuarios de Ruby 3.1, una versi\u00f3n fija es stringio 3.0.1.2." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://hackerone.com/reports/1399856", diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27314.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27314.json index 4d0abe539c0..0d4266f36d0 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27314.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27314.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27314", "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", "published": "2024-05-27T07:15:09.297", - "lastModified": "2024-06-07T09:15:12.277", + "lastModified": "2024-07-03T01:50:30.720", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27347.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27347.json index 5583aa7c98f..cbbb617dd50 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27347.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27347.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27347", "sourceIdentifier": "security@apache.org", "published": "2024-04-22T14:15:07.310", - "lastModified": "2024-05-01T17:15:30.383", + "lastModified": "2024-07-03T01:50:32.683", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Vulnerabilidad de Server-Side Request Forgery (SSRF) en Apache HugeGraph-Hubble. Este problema afecta a Apache HugeGraph-Hubble: desde 1.0.0 antes de 1.3.0. Se recomienda a los usuarios actualizar a la versi\u00f3n 1.3.0, que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27349.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27349.json index 952ca4589a3..5d0610ed0da 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27349.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27349.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27349", "sourceIdentifier": "security@apache.org", "published": "2024-04-22T14:15:07.470", - "lastModified": "2024-05-01T18:15:16.273", + "lastModified": "2024-07-03T01:50:32.910", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n mediante suplantaci\u00f3n de identidad en Apache HugeGraph-Server. Este problema afecta a Apache HugeGraph-Server: desde 1.0.0 antes de 1.3.0. Se recomienda a los usuarios actualizar a la versi\u00f3n 1.3.0, que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 0.0, + "baseSeverity": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 0.0 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27351.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27351.json index be61aa4f6c3..6abd68d5946 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27351.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27351.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27351", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-15T20:15:09.303", - "lastModified": "2024-05-01T17:15:30.490", + "lastModified": "2024-07-03T01:50:33.137", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En Django 3.2 anterior a 3.2.25, 4.2 anterior a 4.2.11 y 5.0 anterior a 5.0.3, el m\u00e9todo django.utils.text.Truncator.words() (con html=True) y el filtro de plantilla truncatewords_html est\u00e1n sujetos a un potencial Ataque de denegaci\u00f3n de servicio de expresi\u00f3n regular a trav\u00e9s de una cadena manipulada. NOTA: este problema existe debido a una soluci\u00f3n incompleta para CVE-2019-14232 y CVE-2023-43665." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1333" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/03/04/1", diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27353.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27353.json index f5bbae15ffc..91cb0859a04 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27353.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27353.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27353", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-15T15:15:08.097", - "lastModified": "2024-05-15T16:40:19.330", + "lastModified": "2024-07-03T01:50:33.967", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de corrupci\u00f3n de memoria en SdHost y SdMmcDevice en Insyde InsydeH2O kernel 5.2 anterior al 29.05.09, kernel 5.3 anterior al 38.05.09, kernel 5.4 anterior al 05.46.09, kernel 5.5 anterior al 05.54.09 y kernel 5.6 anterior al 05.61.09 podr\u00eda provocar una escalada privilegios en SMM." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:L", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-822" + } + ] + } + ], "references": [ { "url": "https://www.insyde.com/security-pledge", diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27374.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27374.json index 57d6505b599..7df962195c1 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27374.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27374.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27374", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-05T19:15:13.347", - "lastModified": "2024-06-27T16:22:34.347", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:50:34.903", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -68,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27394.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27394.json index f4c0cfcff80..7dc5ffdc7ae 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27394.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27394.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27394", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-14T15:12:27.363", - "lastModified": "2024-05-14T16:13:02.773", + "lastModified": "2024-07-03T01:50:36.103", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Fix Use-After-Free en tcp_ao_connect_init Dado que call_rcu, que se llama en el recorrido hlist_for_each_entry_rcu de tcp_ao_connect_init, no forma parte de la secci\u00f3n cr\u00edtica de lectura de RCU, es posible que el El per\u00edodo de gracia de RCU transcurrir\u00e1 durante el recorrido y la clave quedar\u00e1 gratuita. Para evitar esto, se debe cambiar a hlist_for_each_entry_safe." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/80e679b352c3ce5158f3f778cfb77eb767e586fb", diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27405.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27405.json index 615920dcaf5..0b70ad7fa5e 100644 --- a/CVE-2024/CVE-2024-274xx/CVE-2024-27405.json +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27405.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27405", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T12:15:10.500", - "lastModified": "2024-06-27T13:15:58.107", + "lastModified": "2024-07-03T01:50:37.447", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: gadget: ncm: Evite soltar datagramas de NTB analizados correctamente. A veces se observa cuando se usa tethering a trav\u00e9s de NCM con Windows 11 como host, en algunos casos, gadget_giveback tiene un byte. adjunta al final de una NTB adecuada. Cuando se analiza el NTB, la llamada de desenvolvimiento busca los bytes sobrantes en el SKB proporcionado por u_ether y, si hay bytes pendientes, los trata como un NTB separado y lo analiza. Pero en caso de que el segundo NTB (seg\u00fan la llamada de desenvolvimiento) est\u00e9 defectuoso/da\u00f1ado, todos los datagramas que se analizaron correctamente en el primer NTB y se guardaron en rx_list se descartan. Agregar algunos seguimientos personalizados mostr\u00f3 lo siguiente: [002] d..1 7828.532866: dwc3_gadget_giveback: ep1out: req 000000003868811a length 1025/16384 zsI ==> 0 [002] d..1 7828.532867: K: ncm_unwrap_ntb para procesar: 1025 [002] d..1 7828.532867: ncm_unwrap_ntb: K: ncm_unwrap_ntb nth: 1751999342 [002] d..1 7828.532868: ncm_unwrap_ntb: K: ncm_unwrap_ntb seq: 0xce67 [002] 7828.532868: ncm_unwrap_ntb: K: ncm_unwrap_ntb blk_len: 0x400 [002] d..1 7828.532868: ncm_unwrap_ntb: K: ncm_unwrap_ntb ndp_len: 0x10 [002] d..1 7828.532869: ncm_unwrap_ntb: K: NTB analizado con 1 fotograma En este caso, la devoluci\u00f3n es de 1025 bytes la longitud del bloque es 1024. El 1 byte restante (que es 0x00) no se analizar\u00e1, lo que provocar\u00e1 la eliminaci\u00f3n de todos los datagramas en rx_list. Lo mismo ocurre con los paquetes de tama\u00f1o 2048: [002] d..1 7828.557948: dwc3_gadget_giveback: ep1out: req 0000000011dfd96e length 2049/16384 zsI ==> 0 [002] d..1 7828.557949 ncm_unwrap_ ntb: K: ncm_unwrap_ntb nth: 1751999342 [002] d..1 7828.557950: ncm_unwrap_ntb: K: ncm_unwrap_ntb blk_len: 0x800 Lecroy muestra un byte adicional entrante confirmando que el byte proviene de la PC: Transferencia 2959 - Bytes transferidos (1025) Marca de tiempo ((18.524 843 590) - Transacci\u00f3n 8391 - Datos (1025 bytes) Marca de tiempo (18.524 843 590) --- Paquete 4063861 Datos (1024 bytes) Duraci\u00f3n (2.117us) Inactivo (14.700 ns) Marca de tiempo (18.524 843 590) --- Paquete 4063863 Datos (1 byte) Duraci\u00f3n (66.160 ns) Hora (282.000 ns) Marca de tiempo (18.524 845 722) Seg\u00fan el controlador de Windows, no se necesita ZLP si wBlockLength es distinto de cero, porque wBlockLength distinto de cero ya le ha dicho al lado de la funci\u00f3n el tama\u00f1o de la transferencia. Sin embargo, hay dispositivos NCM en el mercado que dependen de ZLP siempre que wBlockLength sea m\u00faltiplo de wMaxPacketSize. Para manejar dichos dispositivos, se agrega un 0 adicional al final para que la transferencia ya no sea m\u00faltiplo de wMaxPacketSize." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/059285e04ebb273d32323fbad5431c5b94f77e48", diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27407.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27407.json index 8f2344c9e6c..f6de6147898 100644 --- a/CVE-2024/CVE-2024-274xx/CVE-2024-27407.json +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27407.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27407", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T12:15:11.000", - "lastModified": "2024-05-17T18:35:35.070", + "lastModified": "2024-07-03T01:50:38.343", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: fs/ntfs3: Se corrigi\u00f3 la verificaci\u00f3n de desbordamiento en mi_enum_attr()" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1c0a95d99b1b2b5d842e5abc7ef7eed1193b60d7", diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27431.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27431.json index c8cafd7ccb9..a97d266cac6 100644 --- a/CVE-2024/CVE-2024-274xx/CVE-2024-27431.json +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27431.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27431", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T12:15:16.410", - "lastModified": "2024-06-25T22:15:29.990", + "lastModified": "2024-07-03T01:50:40.003", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cpumap: Inicializa a cero la estructura xdp_rxq_info antes de ejecutar el programa XDP Cuando ejecutas un programa XDP que est\u00e1 adjunto a una entrada de cpumap, no inicializamos la estructura de datos xdp_rxq_info que se utiliza en xdp_buff que respalda la invocaci\u00f3n del programa XDP. Tobias not\u00f3 que esto lleva a que se devuelvan valores aleatorios como el valor xdp_md->rx_queue_index para programas XDP que se ejecutan en un cpumap. Esto significa que b\u00e1sicamente estamos devolviendo el contenido de la memoria no inicializada, lo cual es malo. Solucione este problema inicializando a cero la estructura de datos rxq antes de ejecutar el programa XDP." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2487007aa3b9fafbd2cb14068f49791ce1d7ede5", diff --git a/CVE-2024/CVE-2024-275xx/CVE-2024-27516.json b/CVE-2024/CVE-2024-275xx/CVE-2024-27516.json index 6d0702b7946..e16eec5a71d 100644 --- a/CVE-2024/CVE-2024-275xx/CVE-2024-27516.json +++ b/CVE-2024/CVE-2024-275xx/CVE-2024-27516.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27516", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T01:44:20.137", - "lastModified": "2024-03-22T03:15:07.923", + "lastModified": "2024-07-03T01:50:41.420", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "livehelperchat 4.28v es vulnerable a la inyecci\u00f3n de plantillas del lado del servidor (SSTI)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://github.com/LiveHelperChat/livehelperchat/commit/a61d231526a36d4a7d8cc957914799ee1f9db0ab", diff --git a/CVE-2024/CVE-2024-275xx/CVE-2024-27574.json b/CVE-2024/CVE-2024-275xx/CVE-2024-27574.json index e8fd9d4a44a..a760a8931cd 100644 --- a/CVE-2024/CVE-2024-275xx/CVE-2024-27574.json +++ b/CVE-2024/CVE-2024-275xx/CVE-2024-27574.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27574", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T21:15:48.987", - "lastModified": "2024-04-23T12:52:26.253", + "lastModified": "2024-07-03T01:50:42.303", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en Trainme Academy versi\u00f3n Ichin v.1.3.2 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de los par\u00e1metros informacion, idcurso y tit." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/7WaySecurity/vulnerabilities/tree/main", diff --git a/CVE-2024/CVE-2024-275xx/CVE-2024-27575.json b/CVE-2024/CVE-2024-275xx/CVE-2024-27575.json index 4b22cbed203..62c58cd23ad 100644 --- a/CVE-2024/CVE-2024-275xx/CVE-2024-27575.json +++ b/CVE-2024/CVE-2024-275xx/CVE-2024-27575.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27575", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-04T13:15:44.620", - "lastModified": "2024-04-07T04:15:07.723", + "lastModified": "2024-07-03T01:50:43.093", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de Directory Traversal en INOTEC Sicherheitstechnik GmbH INOTEC Sicherheitstechnik GmbH WebServer CPS220/64 V.3.3.19 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del archivo /etc/passwd." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/s4fv4n/098bd368bf054d008078e369108c2ebd", diff --git a/CVE-2024/CVE-2024-275xx/CVE-2024-27593.json b/CVE-2024/CVE-2024-275xx/CVE-2024-27593.json index 8cfa3fc3fc0..0a2e10b012e 100644 --- a/CVE-2024/CVE-2024-275xx/CVE-2024-27593.json +++ b/CVE-2024/CVE-2024-275xx/CVE-2024-27593.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27593", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-15T17:15:10.290", - "lastModified": "2024-05-15T18:35:11.453", + "lastModified": "2024-07-03T01:50:43.897", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de cross-site scripting (XSS) almacenado en la funci\u00f3n de filtro de Eramba Versi\u00f3n 3.22.3 Community Edition permite a atacantes autenticados ejecutar script web o HTML de su elecci\u00f3n a trav\u00e9s de un payload manipulado inyectado en el campo de nombre del filtro. Esta vulnerabilidad se ha solucionado en la versi\u00f3n 3.23.0." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://blog.smarttecs.com/posts/2024-002-cve-2024-27593/", diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27752.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27752.json index 0723ae058d1..acc620408af 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27752.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27752.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27752", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T16:15:09.687", - "lastModified": "2024-04-19T16:19:49.043", + "lastModified": "2024-07-03T01:50:45.653", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de Cross Site Scripting en CSZ CMS v.1.3.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del campo Palabra clave predeterminada en la funci\u00f3n de configuraci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/flyhha/cms/blob/main/1.md", diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27790.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27790.json index 2d93ec5048d..53f881e1b0e 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27790.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27790.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27790", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T15:13:01.817", - "lastModified": "2024-05-14T16:13:02.773", + "lastModified": "2024-07-03T01:50:47.493", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Claris International ha resuelto un problema que permit\u00eda potencialmente el acceso no autorizado a registros almacenados en bases de datos alojadas en FileMaker Server. Este problema se solucion\u00f3 en FileMaker Server 20.3.2 validando las transacciones antes de responder a las solicitudes de los clientes." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://support.claris.com/s/answerview?anum=000041674&language=en_US", diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27791.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27791.json index e1721ae7840..7b776fda1ae 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27791.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27791.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27791", "sourceIdentifier": "product-security@apple.com", "published": "2024-04-24T17:15:47.177", - "lastModified": "2024-04-24T17:16:50.397", + "lastModified": "2024-07-03T01:50:48.290", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en iOS 17.3 y iPadOS 17.3, tvOS 17.3, macOS Ventura 13.6.4, iOS 16.7.5 y iPadOS 16.7.5, macOS Monterey 12.7.3, macOS Sonoma 14.3. Es posible que una aplicaci\u00f3n pueda da\u00f1ar la memoria del coprocesador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:L", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 5.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/HT214055", diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27793.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27793.json index bae54c65901..0a81ed07c0f 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27793.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27793.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27793", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T15:13:02.777", - "lastModified": "2024-06-10T18:15:28.523", + "lastModified": "2024-07-03T01:50:49.173", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en iTunes 12.13.2 para Windows. El an\u00e1lisis de un archivo puede provocar la finalizaci\u00f3n inesperada de una aplicaci\u00f3n o la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "http://seclists.org/fulldisclosure/2024/May/8", diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27794.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27794.json index 25d90fe5ec4..c25c33fc974 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27794.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27794.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27794", "sourceIdentifier": "product-security@apple.com", "published": "2024-04-15T23:15:06.890", - "lastModified": "2024-04-16T13:24:07.103", + "lastModified": "2024-07-03T01:50:49.393", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Claris FileMaker Server anterior a la versi\u00f3n 20.3.2 era susceptible a una vulnerabilidad de Cross-Site Scripting reflejada debido a un par\u00e1metro manejado incorrectamente en el endpoint de inicio de sesi\u00f3n de FileMaker WebDirect. La vulnerabilidad se resolvi\u00f3 en FileMaker Server 20.3.2 escapando del contenido HTML del mensaje de error de inicio de sesi\u00f3n en la p\u00e1gina de inicio de sesi\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://support.claris.com/s/article/Security-Vulnerability-in-Claris-FileMaker-Server?language=en_US", diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27796.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27796.json index 47c89c08668..f30a4ca2d3a 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27796.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27796.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27796", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T15:13:03.243", - "lastModified": "2024-06-11T08:15:48.723", + "lastModified": "2024-07-03T01:50:50.207", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en iOS 17.5 y iPadOS 17.5, macOS Sonoma 14.5. Un atacante puede aumentar los privilegios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1325" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/May/10", diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27800.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27800.json index 7c965a5e9df..2077980c588 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27800.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27800.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27800", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:49.683", - "lastModified": "2024-07-02T13:38:30.207", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:50:51.033", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27804.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27804.json index b9f558e8944..2c4fd5c4df9 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27804.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27804.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27804", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T15:13:04.033", - "lastModified": "2024-06-10T18:15:28.780", + "lastModified": "2024-07-03T01:50:51.930", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El problema se solucion\u00f3 mejorando el manejo de la memoria. Este problema se solucion\u00f3 en iOS 17.5 y iPadOS 17.5, tvOS 17.5, watchOS 10.5, macOS Sonoma 14.5. Una aplicaci\u00f3n puede ejecutar c\u00f3digo arbitrario con privilegios del kernel." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1325" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/May/10", diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27808.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27808.json index ea5ee7cc780..0dcb23177cf 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27808.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27808.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27808", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:50.160", - "lastModified": "2024-07-02T13:25:26.647", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:50:52.903", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-786" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27810.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27810.json index ad87afc49d5..02f256a3c72 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27810.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27810.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27810", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T15:13:04.267", - "lastModified": "2024-06-11T08:15:49.350", + "lastModified": "2024-07-03T01:50:53.720", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se solucion\u00f3 un problema de manejo de rutas con una validaci\u00f3n mejorada. Este problema se solucion\u00f3 en iOS 17.5 y iPadOS 17.5, tvOS 17.5, watchOS 10.5, macOS Sonoma 14.5. Es posible que una aplicaci\u00f3n pueda leer informaci\u00f3n confidencial de ubicaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-28" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/May/10", diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27811.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27811.json index fe804fa8c43..71dc239cc29 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27811.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27811.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27811", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:50.230", - "lastModified": "2024-07-02T13:26:31.883", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:50:54.533", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27812.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27812.json index 64e211a0a8d..4e0f3ce19c2 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27812.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27812.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27812", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:50.300", - "lastModified": "2024-07-02T13:28:23.257", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:50:55.430", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27813.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27813.json index 7311769e561..08761e7b763 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27813.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27813.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27813", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T15:13:04.600", - "lastModified": "2024-06-10T18:15:28.920", + "lastModified": "2024-07-03T01:50:56.220", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en macOS Sonoma 14.5. Es posible que una aplicaci\u00f3n pueda ejecutar c\u00f3digo arbitrario fuera de su zona de pruebas o con ciertos privilegios elevados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "http://seclists.org/fulldisclosure/2024/May/12", diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27814.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27814.json index cec4e573a1c..8f767dd10b3 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27814.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27814.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27814", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:50.373", - "lastModified": "2024-07-02T13:23:48.803", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:50:56.430", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.4, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 } ] }, diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27815.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27815.json index a5db46d32ce..1f6de018719 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27815.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27815.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27815", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:50.440", - "lastModified": "2024-07-02T13:24:26.530", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:50:56.640", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 5.2 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27817.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27817.json index 281cbfb10eb..c1525d5fcf8 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27817.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27817.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27817", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:50.547", - "lastModified": "2024-06-27T18:20:29.193", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:50:57.557", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-353" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27819.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27819.json index 458cd7b1f75..2f75de862e5 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27819.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27819.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27819", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:50.623", - "lastModified": "2024-06-27T18:20:15.513", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:50:58.300", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.4, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 } ] }, diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27820.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27820.json index e82d5c0c042..7996412ab12 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27820.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27820.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27820", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:50.693", - "lastModified": "2024-06-27T18:19:33.087", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:50:58.540", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27822.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27822.json index 27bac37821c..c49fc195243 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27822.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27822.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27822", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T15:13:05.587", - "lastModified": "2024-06-10T18:15:29.157", + "lastModified": "2024-07-03T01:50:59.383", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se abord\u00f3 un problema de l\u00f3gica con restricciones mejoradas. Este problema se solucion\u00f3 en macOS Sonoma 14.5. Es posible que una aplicaci\u00f3n pueda obtener privilegios de root." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-277" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/May/12", diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27825.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27825.json index 0592ab87b72..c56ba44234f 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27825.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27825.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27825", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T15:13:06.050", - "lastModified": "2024-06-10T18:15:29.263", + "lastModified": "2024-07-03T01:51:00.263", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema de degradaci\u00f3n que afectaba a las computadoras Mac basadas en Intel se solucion\u00f3 con restricciones adicionales de firma de c\u00f3digo. Este problema se solucion\u00f3 en macOS Sonoma 14.5. Es posible que una aplicaci\u00f3n pueda omitir ciertas preferencias de privacidad." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-277" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/May/12", diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27827.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27827.json index 3a1bd5a6b48..6e9d8a1e28a 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27827.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27827.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27827", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T15:13:06.363", - "lastModified": "2024-06-11T08:15:49.890", + "lastModified": "2024-07-03T01:51:01.090", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Esta cuesti\u00f3n se abord\u00f3 mediante una mejora de gesti\u00f3n de estado. Este problema se solucion\u00f3 en macOS Sonoma 14.5. Es posible que una aplicaci\u00f3n pueda leer archivos arbitrarios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/May/12", diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27828.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27828.json index a9c1932213f..3b91a48d22c 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27828.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27828.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27828", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:50.773", - "lastModified": "2024-06-27T18:09:56.683", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:51:01.887", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 } ] }, @@ -48,6 +69,20 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-786" + }, + { + "lang": "en", + "value": "CWE-788" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27829.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27829.json index 2ca840dd72c..347970c8a30 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27829.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27829.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27829", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T15:13:06.737", - "lastModified": "2024-06-10T18:15:29.377", + "lastModified": "2024-07-03T01:51:02.723", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El problema se solucion\u00f3 mejorando el manejo de la memoria. Este problema se solucion\u00f3 en macOS Sonoma 14.5. El procesamiento de un archivo puede provocar la finalizaci\u00f3n inesperada de la aplicaci\u00f3n o la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-788" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/May/12", diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27831.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27831.json index 3a053230f40..28525adf018 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27831.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27831.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27831", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:50.927", - "lastModified": "2024-06-27T17:29:26.540", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:51:03.627", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 6.0 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-786" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27832.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27832.json index 47828f3a434..f7841ff76d7 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27832.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27832.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27832", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:51.007", - "lastModified": "2024-06-27T18:10:53.993", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:51:04.443", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, @@ -48,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-703" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27833.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27833.json index c072c626eb4..daba4048111 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27833.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27833.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27833", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:51.090", - "lastModified": "2024-06-27T16:58:29.140", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:51:05.337", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-190" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27834.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27834.json index 2c3cf748360..6fd806069cf 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27834.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27834.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27834", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T15:13:06.953", - "lastModified": "2024-06-22T02:15:44.787", + "lastModified": "2024-07-03T01:51:06.170", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en iOS 17.5 y iPadOS 17.5, tvOS 17.5, Safari 17.5, watchOS 10.5, macOS Sonoma 14.5. Un atacante con capacidad de lectura y escritura arbitraria puede eludir la autenticaci\u00f3n de puntero." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-277" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/May/10", diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27836.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27836.json index f049d0acaba..79e37b716b1 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27836.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27836.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27836", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:51.167", - "lastModified": "2024-06-12T04:15:12.133", + "lastModified": "2024-07-03T01:51:06.973", "vulnStatus": "Undergoing Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en visionOS 1.2, macOS Sonoma 14.5, iOS 17.5 y iPadOS 17.5. El procesamiento de una imagen creada con fines malintencionados puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jun/5", diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27837.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27837.json index e127d38f2b9..500e881e2ac 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27837.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27837.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27837", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T15:13:07.433", - "lastModified": "2024-06-10T18:15:29.550", + "lastModified": "2024-07-03T01:51:08.273", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se solucion\u00f3 un problema de degradaci\u00f3n con restricciones adicionales de firma de c\u00f3digo. Este problema se solucion\u00f3 en macOS Sonoma 14.5. Un atacante local puede obtener acceso a elementos del llavero." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-280" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/May/12", diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27840.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27840.json index efd094a15f6..ec26855a1f9 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27840.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27840.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27840", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:51.313", - "lastModified": "2024-06-12T04:15:12.327", + "lastModified": "2024-07-03T01:51:09.067", "vulnStatus": "Undergoing Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El problema se solucion\u00f3 mejorando el manejo de la memoria. Este problema se solucion\u00f3 en macOS Ventura 13.6.7, macOS Monterey 12.7.5, iOS 16.7.8 y iPadOS 16.7.8, tvOS 17.5, visionOS 1.2, iOS 17.5 y iPadOS 17.5, watchOS 10.5. Un atacante que ya haya logrado la ejecuci\u00f3n del c\u00f3digo del kernel puede ser capaz de eludir las protecciones de la memoria del kernel." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-786" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jun/5", diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27841.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27841.json index 0db37b5258c..e4775d4bfff 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27841.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27841.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27841", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T15:13:07.953", - "lastModified": "2024-06-10T18:15:29.657", + "lastModified": "2024-07-03T01:51:10.377", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El problema se solucion\u00f3 mejorando el manejo de la memoria. Este problema se solucion\u00f3 en iOS 17.5 y iPadOS 17.5, macOS Sonoma 14.5. Es posible que una aplicaci\u00f3n pueda revelar la memoria del kernel." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/May/10", diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27847.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27847.json index 58725f1ab2a..52b5c44e95e 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27847.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27847.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27847", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T15:13:08.743", - "lastModified": "2024-06-11T08:15:50.523", + "lastModified": "2024-07-03T01:51:11.167", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Este problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en iOS 17.5 y iPadOS 17.5, macOS Sonoma 14.5. Es posible que una aplicaci\u00f3n pueda eludir las preferencias de privacidad." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-277" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/May/10", diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27848.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27848.json index 05c333bd512..8a7a500dcec 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27848.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27848.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27848", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:51.530", - "lastModified": "2024-06-11T13:54:12.057", + "lastModified": "2024-07-03T01:51:11.980", "vulnStatus": "Undergoing Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Este problema se solucion\u00f3 mejorando la verificaci\u00f3n de permisos. Este problema se solucion\u00f3 en macOS Sonoma 14.5, iOS 17.5 y iPadOS 17.5. Es posible que una aplicaci\u00f3n maliciosa pueda obtener privilegios de root." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-277" + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/HT214101", diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27851.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27851.json index 6e52a89911a..2b4acda8197 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27851.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27851.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27851", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:51.680", - "lastModified": "2024-06-12T04:15:12.577", + "lastModified": "2024-07-03T01:51:13.350", "vulnStatus": "Undergoing Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El problema se solucion\u00f3 con comprobaciones de los l\u00edmites mejoradas. Este problema se solucion\u00f3 en tvOS 17.5, visionOS 1.2, Safari 17.5, iOS 17.5 y iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. El procesamiento de contenido web creado con fines malintencionados puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jun/5", diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27857.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27857.json index 522b4dea130..ad61b98d4f4 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27857.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27857.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27857", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:51.833", - "lastModified": "2024-06-12T04:15:12.663", + "lastModified": "2024-07-03T01:51:14.753", "vulnStatus": "Undergoing Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se solucion\u00f3 un problema de acceso fuera de los l\u00edmites mejorando la verificaci\u00f3n de los l\u00edmites. Este problema se solucion\u00f3 en visionOS 1.2, macOS Sonoma 14.5, tvOS 17.5, iOS 17.5 y iPadOS 17.5. Un atacante remoto puede provocar la finalizaci\u00f3n inesperada de una aplicaci\u00f3n o la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jun/5", diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27975.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27975.json index 49f91e8dddb..04fe4821c96 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27975.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27975.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27975", "sourceIdentifier": "support@hackerone.com", "published": "2024-04-19T02:15:10.007", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:51:20.333", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US", diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27976.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27976.json index 71b76fe70cd..29b53d98a0f 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27976.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27976.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27976", "sourceIdentifier": "support@hackerone.com", "published": "2024-04-19T02:15:10.150", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:51:21.030", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US", diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27977.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27977.json index cab4b19fd31..00c52a6ab35 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27977.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27977.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27977", "sourceIdentifier": "support@hackerone.com", "published": "2024-04-19T02:15:10.303", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:51:21.727", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US", diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27978.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27978.json index 75df2f4253f..299f642b1a4 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27978.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27978.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27978", "sourceIdentifier": "support@hackerone.com", "published": "2024-04-19T02:15:10.447", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:51:22.450", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US", diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27984.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27984.json index 430a9819f66..2a731647242 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27984.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27984.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27984", "sourceIdentifier": "support@hackerone.com", "published": "2024-04-19T02:15:10.597", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:51:23.260", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US", diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2729.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2729.json index 918c9ac5271..4c55a5621a2 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2729.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2729.json @@ -2,8 +2,9 @@ "id": "CVE-2024-2729", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-18T05:15:48.343", - "lastModified": "2024-04-18T13:04:28.900", + "lastModified": "2024-07-03T01:53:30.393", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento Otter Blocks de WordPress anterior a 2.6.6 no escapa correctamente del atributo de sus bloques mainHeadings antes de agregarlo al bloque renderizado final, lo que permite a los contribuyentes realizar ataques XSS almacenados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/5014f886-020e-49d1-96a5-2159eed8ba14/", diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2749.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2749.json index 804bb4d0a9c..d5f14467462 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2749.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2749.json @@ -2,8 +2,9 @@ "id": "CVE-2024-2749", "sourceIdentifier": "contact@wpscan.com", "published": "2024-05-14T15:20:41.787", - "lastModified": "2024-05-14T16:13:02.773", + "lastModified": "2024-07-03T01:53:31.040", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El complemento VikBooking Hotel Booking Engine & PMS WordPress anterior a 1.6.8 no restringe adecuadamente el acceso a su configuraci\u00f3n, lo que permite a cualquier usuario que pueda acceder a un men\u00fa manipular solicitudes y realizar acciones no autorizadas como editar, cambiar el nombre o eliminar (categor\u00edas para ejemplo) a pesar de que la configuraci\u00f3n inicial proh\u00edbe dicho acceso. Esta vulnerabilidad se asemeja a un control de acceso roto, lo que permite a usuarios no autorizados modificar el complemento cr\u00edtico de VikBooking Hotel Booking Engine y PMS WordPress antes de las configuraciones 1.6.8." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/c0640d3a-80b3-4cad-a3cf-fb5d86558e91/", diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2757.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2757.json index ac180ffa2e6..a423800ed68 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2757.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2757.json @@ -2,8 +2,9 @@ "id": "CVE-2024-2757", "sourceIdentifier": "security@php.net", "published": "2024-04-29T04:15:08.113", - "lastModified": "2024-06-10T17:16:25.537", + "lastModified": "2024-07-03T01:53:32.100", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/04/12/11", diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2761.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2761.json index 79b4db2ddf7..00b3ae668f1 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2761.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2761.json @@ -2,8 +2,9 @@ "id": "CVE-2024-2761", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-19T05:15:49.907", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:53:33.097", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento Genesis Blocks de WordPress anterior a 3.1.3 no escapa adecuadamente a la entrada de datos proporcionada a algunos de sus bloques, lo que permite su uso con al menos privilegios de colaborador para realizar ataques XSS almacenados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.0 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/e092ccdc-7ea1-4937-97b7-4cdbff5e74e5/", diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28010.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28010.json index 54a96608696..179b2269ea0 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28010.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28010.json @@ -2,8 +2,9 @@ "id": "CVE-2024-28010", "sourceIdentifier": "psirt-info@cyber.jp.nec.com", "published": "2024-03-28T01:15:47.470", - "lastModified": "2024-04-02T06:15:15.097", + "lastModified": "2024-07-03T01:51:25.390", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Uso de contrase\u00f1a codificada en NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF 800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N , WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN y MR02LN, todas las versiones permiten a un atacante ejecutar un comando arbitrario del sistema operativo a trav\u00e9s de Internet." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt-info@cyber.jp.nec.com", diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28063.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28063.json index dbd7a2bd027..a8d3761d470 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28063.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28063.json @@ -2,8 +2,9 @@ "id": "CVE-2024-28063", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-18T22:15:07.133", - "lastModified": "2024-05-20T13:00:04.957", + "lastModified": "2024-07-03T01:51:26.370", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Kiteworks Totemomail hasta 7.0.0 permite /responsiveUI/EnvelopeOpenServlet envolventeRecipient XSS reflejado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://www.objectif-securite.ch/advisories/totemomail-reflected-xss.txt", diff --git a/CVE-2024/CVE-2024-282xx/CVE-2024-28269.json b/CVE-2024/CVE-2024-282xx/CVE-2024-28269.json index a49fb4275e3..c9849bb534c 100644 --- a/CVE-2024/CVE-2024-282xx/CVE-2024-28269.json +++ b/CVE-2024/CVE-2024-282xx/CVE-2024-28269.json @@ -2,8 +2,9 @@ "id": "CVE-2024-28269", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T19:15:23.257", - "lastModified": "2024-04-30T19:35:36.960", + "lastModified": "2024-07-03T01:51:32.517", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "ReCrystallize Server 5.10.0.0 permite a los administradores cargar archivos al servidor. La carga de archivos no est\u00e1 restringida, lo que permite cargar archivos maliciosos. Esto podr\u00eda resultar en una ejecuci\u00f3n remota de c\u00f3digo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://sensepost.com/blog/2024/from-discovery-to-disclosure-recrystallize-server-vulnerabilities/", diff --git a/CVE-2024/CVE-2024-282xx/CVE-2024-28279.json b/CVE-2024/CVE-2024-282xx/CVE-2024-28279.json index 6f0be40288c..1143c995081 100644 --- a/CVE-2024/CVE-2024-282xx/CVE-2024-28279.json +++ b/CVE-2024/CVE-2024-282xx/CVE-2024-28279.json @@ -2,8 +2,9 @@ "id": "CVE-2024-28279", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:14:18.757", - "lastModified": "2024-05-14T16:13:02.773", + "lastModified": "2024-07-03T01:51:33.390", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Code-projects Computer Book Store 1.0 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de book.php?bookisbn=." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://code-projects.org/computer-book-store-in-php-with-source-code/", diff --git a/CVE-2024/CVE-2024-282xx/CVE-2024-28294.json b/CVE-2024/CVE-2024-282xx/CVE-2024-28294.json index 522d3698476..a9100678b7e 100644 --- a/CVE-2024/CVE-2024-282xx/CVE-2024-28294.json +++ b/CVE-2024/CVE-2024-282xx/CVE-2024-28294.json @@ -2,8 +2,9 @@ "id": "CVE-2024-28294", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T21:15:47.910", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-07-03T01:51:34.303", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que Limbas hasta v5.2.14 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro ftid." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/lx39214/248dc58c6d05455d4bd06c4d3df8e2d0", diff --git a/CVE-2024/CVE-2024-283xx/CVE-2024-28320.json b/CVE-2024/CVE-2024-283xx/CVE-2024-28320.json index ae48e1897f3..f1c11c511e3 100644 --- a/CVE-2024/CVE-2024-283xx/CVE-2024-28320.json +++ b/CVE-2024/CVE-2024-283xx/CVE-2024-28320.json @@ -2,8 +2,9 @@ "id": "CVE-2024-28320", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T18:15:07.553", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-07-03T01:51:35.080", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La vulnerabilidad de referencias directas a objetos inseguras (IDOR) en Hospital Management System 1.0 permite a los atacantes manipular par\u00e1metros de usuario para acceso no autorizado y modificaciones a trav\u00e9s de una solicitud POST manipulada a /patient/edit-user.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 7.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], "references": [ { "url": "https://packetstormsecurity.com/files/177326/Hospital-Management-System-1.0-Insecure-Direct-Object-Reference-Account-Takeover.html", diff --git a/CVE-2024/CVE-2024-283xx/CVE-2024-28322.json b/CVE-2024/CVE-2024-283xx/CVE-2024-28322.json index a16b292511c..51084d18927 100644 --- a/CVE-2024/CVE-2024-283xx/CVE-2024-28322.json +++ b/CVE-2024/CVE-2024-283xx/CVE-2024-28322.json @@ -2,8 +2,9 @@ "id": "CVE-2024-28322", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-26T22:15:07.793", - "lastModified": "2024-04-29T12:42:03.667", + "lastModified": "2024-07-03T01:51:35.980", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en /event-management-master/backend/register.php en PuneethReddyHC Event Management 1.0 permite a atacantes ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro event_id en una solicitud POST manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/Sospiro014/zday1/blob/main/event-managment.md", diff --git a/CVE-2024/CVE-2024-283xx/CVE-2024-28325.json b/CVE-2024/CVE-2024-283xx/CVE-2024-28325.json index f148547e629..819f09075a6 100644 --- a/CVE-2024/CVE-2024-283xx/CVE-2024-28325.json +++ b/CVE-2024/CVE-2024-283xx/CVE-2024-28325.json @@ -2,8 +2,9 @@ "id": "CVE-2024-28325", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-26T19:15:47.597", - "lastModified": "2024-04-26T19:59:19.793", + "lastModified": "2024-07-03T01:51:36.767", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,46 @@ "value": "El router Asus RT-N12+ B1 almacena las credenciales en texto plano, lo que podr\u00eda permitir a atacantes locales obtener acceso no autorizado y modificar la configuraci\u00f3n del router." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.3, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-256" + }, + { + "lang": "en", + "value": "CWE-522" + } + ] + } + ], "references": [ { "url": "http://asus.com", diff --git a/CVE-2024/CVE-2024-283xx/CVE-2024-28326.json b/CVE-2024/CVE-2024-283xx/CVE-2024-28326.json index e4224bd71d5..c92299fbf27 100644 --- a/CVE-2024/CVE-2024-283xx/CVE-2024-28326.json +++ b/CVE-2024/CVE-2024-283xx/CVE-2024-28326.json @@ -2,8 +2,9 @@ "id": "CVE-2024-28326", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-26T20:15:07.480", - "lastModified": "2024-04-29T12:42:03.667", + "lastModified": "2024-07-03T01:51:37.560", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El control de acceso incorrecto en los routers Asus RT-N12+ B1 permite a atacantes locales obtener acceso al terminal ra\u00edz a trav\u00e9s de la interfaz UART." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1263" + } + ] + } + ], "references": [ { "url": "http://asus.com", diff --git a/CVE-2024/CVE-2024-283xx/CVE-2024-28328.json b/CVE-2024/CVE-2024-283xx/CVE-2024-28328.json index 667693fb39f..91de6b08632 100644 --- a/CVE-2024/CVE-2024-283xx/CVE-2024-28328.json +++ b/CVE-2024/CVE-2024-283xx/CVE-2024-28328.json @@ -2,8 +2,9 @@ "id": "CVE-2024-28328", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-26T15:15:48.687", - "lastModified": "2024-04-26T15:32:22.523", + "lastModified": "2024-07-03T01:51:38.350", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La vulnerabilidad de inyecci\u00f3n CSV en el router Asus RT-N12+ permite a los usuarios administradores inyectar comandos o f\u00f3rmulas arbitrarias en el par\u00e1metro de nombre del cliente que pueden activarse y ejecutarse en una sesi\u00f3n de usuario diferente al exportar al formato CSV." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "http://asus.com", diff --git a/CVE-2024/CVE-2024-283xx/CVE-2024-28344.json b/CVE-2024/CVE-2024-283xx/CVE-2024-28344.json index 64fe24c23fb..e3b168d5c3d 100644 --- a/CVE-2024/CVE-2024-283xx/CVE-2024-28344.json +++ b/CVE-2024/CVE-2024-283xx/CVE-2024-28344.json @@ -2,15 +2,51 @@ "id": "CVE-2024-28344", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-10T19:15:49.070", - "lastModified": "2024-04-10T19:49:51.183", + "lastModified": "2024-07-03T01:51:39.137", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Open Redirect vulnerability was found in Sipwise C5 NGCP Dashboard below mr11.5.1. The Open Redirect vulnerability allows attackers to control the \"back\" parameter in the URL through a double encoded URL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 3.1, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], "references": [ { "url": "https://securitycafe.ro/2024/03/21/cve-2024-28344-cve-2024-28345-in-sipwise-c5/", diff --git a/CVE-2024/CVE-2024-283xx/CVE-2024-28397.json b/CVE-2024/CVE-2024-283xx/CVE-2024-28397.json index 553e27fe5b0..873a17a84e5 100644 --- a/CVE-2024/CVE-2024-283xx/CVE-2024-28397.json +++ b/CVE-2024/CVE-2024-283xx/CVE-2024-28397.json @@ -2,8 +2,9 @@ "id": "CVE-2024-28397", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-20T17:15:50.527", - "lastModified": "2024-06-21T11:22:01.687", + "lastModified": "2024-07-03T01:51:40.043", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en el componente js2py.disable_pyimport() de js2py hasta v0.74 permite a atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de una llamada API manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/Marven11", diff --git a/CVE-2024/CVE-2024-284xx/CVE-2024-28417.json b/CVE-2024/CVE-2024-284xx/CVE-2024-28417.json index 23243239bd8..e21c4c6b9c1 100644 --- a/CVE-2024/CVE-2024-284xx/CVE-2024-28417.json +++ b/CVE-2024/CVE-2024-284xx/CVE-2024-28417.json @@ -2,8 +2,9 @@ "id": "CVE-2024-28417", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-14T13:15:53.790", - "lastModified": "2024-03-14T14:21:20.217", + "lastModified": "2024-07-03T01:51:41.033", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Webedition CMS 9.2.2.0 tiene una vulnerabilidad XSS almacenado a trav\u00e9s de /webEdition/we_cmd.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], "references": [ { "url": "https://gitee.com/shavchen214/pwn/issues/I94VFH", diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28556.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28556.json index 41e2d088954..dcd9fd1cf70 100644 --- a/CVE-2024/CVE-2024-285xx/CVE-2024-28556.json +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28556.json @@ -2,8 +2,9 @@ "id": "CVE-2024-28556", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-15T19:15:09.870", - "lastModified": "2024-04-16T13:24:07.103", + "lastModified": "2024-07-03T01:51:41.963", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en Sourcecodester php task management system v1.0, permite a atacantes remotos ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s de un payload manipulado en admin-manage-user.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/xuanluansec/vul/blob/main/vul/1/README.md", diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28562.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28562.json index 309605678c3..7740beda078 100644 --- a/CVE-2024/CVE-2024-285xx/CVE-2024-28562.json +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28562.json @@ -2,8 +2,9 @@ "id": "CVE-2024-28562", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T06:15:08.127", - "lastModified": "2024-05-01T18:15:17.357", + "lastModified": "2024-07-03T01:51:42.723", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de desbordamiento de b\u00fafer en open source FreeImage v.3.19.0 [r1909] permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente Imf_2_2::copyIntoFrameBuffer() al leer im\u00e1genes en formato EXR." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/04/11/10", diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28563.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28563.json index 83bd56cbdee..a06024f5ec7 100644 --- a/CVE-2024/CVE-2024-285xx/CVE-2024-28563.json +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28563.json @@ -2,8 +2,9 @@ "id": "CVE-2024-28563", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T06:15:08.780", - "lastModified": "2024-05-01T18:15:17.410", + "lastModified": "2024-07-03T01:51:43.500", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de desbordamiento de b\u00fafer en open source FreeImage v.3.19.0 [r1909] permite que un atacante local provoque una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de la funci\u00f3n Imf_2_2::DwaCompressor::Classifier::Classifier() al leer im\u00e1genes en formato EXR." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/04/11/10", diff --git a/CVE-2024/CVE-2024-286xx/CVE-2024-28627.json b/CVE-2024/CVE-2024-286xx/CVE-2024-28627.json index 5b0a5fc22a2..7977f371d49 100644 --- a/CVE-2024/CVE-2024-286xx/CVE-2024-28627.json +++ b/CVE-2024/CVE-2024-286xx/CVE-2024-28627.json @@ -2,8 +2,9 @@ "id": "CVE-2024-28627", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-23T14:15:08.377", - "lastModified": "2024-04-24T13:39:42.883", + "lastModified": "2024-07-03T01:51:44.343", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,46 @@ "value": "Un problema en Flipsnack v.18/03/2024 permite que un atacante local obtenga informaci\u00f3n confidencial a trav\u00e9s del archivo reader.gz.js." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-603" + }, + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://labs.integrity.pt/advisories/cve-2024-28627/", diff --git a/CVE-2024/CVE-2024-286xx/CVE-2024-28699.json b/CVE-2024/CVE-2024-286xx/CVE-2024-28699.json index e9edcab74ed..a8cdcdd6118 100644 --- a/CVE-2024/CVE-2024-286xx/CVE-2024-28699.json +++ b/CVE-2024/CVE-2024-286xx/CVE-2024-28699.json @@ -2,8 +2,9 @@ "id": "CVE-2024-28699", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T15:15:47.757", - "lastModified": "2024-04-22T19:24:06.727", + "lastModified": "2024-07-03T01:51:45.310", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de desbordamiento de b\u00fafer en pdf2json v0.70 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de las funciones GString::copy() e ImgOutputDev::ImgOutputDev." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "http://pdf2json.com", diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28716.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28716.json index 378f82bd18a..501a54902a2 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28716.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28716.json @@ -2,8 +2,9 @@ "id": "CVE-2024-28716", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T15:15:52.673", - "lastModified": "2024-04-30T17:52:35.057", + "lastModified": "2024-07-03T01:51:46.153", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en OpenStack Storlets yoga-eom permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente gateway.py." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1333" + } + ] + } + ], "references": [ { "url": "https://bugs.launchpad.net/solum/+bug/2047505", diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28717.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28717.json index 1f984cddf13..42d1596d311 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28717.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28717.json @@ -2,8 +2,9 @@ "id": "CVE-2024-28717", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T12:15:07.663", - "lastModified": "2024-04-22T13:28:34.007", + "lastModified": "2024-07-03T01:51:46.980", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en OpenStack Storlets yoga-eom permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente gateway.py." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://bugs.launchpad.net/storlets/+bug/2047723", diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28722.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28722.json index 04e42dd6a45..fd81ef665af 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28722.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28722.json @@ -2,8 +2,9 @@ "id": "CVE-2024-28722", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T01:15:47.257", - "lastModified": "2024-04-22T13:28:43.747", + "lastModified": "2024-07-03T01:51:47.757", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de Cross Site Scripting en Innovaphone myPBX v.14r1, v.13r3, v.12r2 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro de consulta en el endpoint /CMD0/xml_modes.xml" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "http://innovaphone.com", diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28734.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28734.json index ed6893902e9..e8a684f1e30 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28734.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28734.json @@ -2,8 +2,9 @@ "id": "CVE-2024-28734", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-19T14:15:07.687", - "lastModified": "2024-04-25T19:15:49.850", + "lastModified": "2024-07-03T01:51:48.533", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de Cross Site Scripting en Unit4 Financials de Coda v.2024Q1 permite a un atacante remoto escalar privilegios mediante una script manipulada al par\u00e1metro cols." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://packetstormsecurity.com/files/177619/Financials-By-Coda-Cross-Site-Scripting.html", diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28736.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28736.json index 8e82cd58c7c..35e61d8ee0f 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28736.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28736.json @@ -2,8 +2,9 @@ "id": "CVE-2024-28736", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-31T16:15:09.360", - "lastModified": "2024-05-31T19:14:47.793", + "lastModified": "2024-07-03T01:51:49.307", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en Debezium Community debezium-ui v.2.5 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n de actualizaci\u00f3n de p\u00e1gina." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-256" + } + ] + } + ], "references": [ { "url": "https://packetstormsecurity.com/files/178794/Debezium-UI-2.5-Credential-Disclosure.html", diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28820.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28820.json index 5727d4a45b6..f22ab70ad8e 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28820.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28820.json @@ -2,15 +2,55 @@ "id": "CVE-2024-28820", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-27T16:15:10.950", - "lastModified": "2024-06-27T17:11:52.390", + "lastModified": "2024-07-03T01:51:51.323", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the extract_openvpn_cr function in openvpn-cr.c in openvpn-auth-ldap (aka the Three Rings Auth-LDAP plugin for OpenVPN) 2.0.4 allows attackers with a valid LDAP username and who can control the challenge/response password field to pass a string with more than 14 colons into this field and cause a buffer overflow." + }, + { + "lang": "es", + "value": "Desbordamiento de b\u00fafer en la funci\u00f3n extract_openvpn_cr en openvpn-cr.c en openvpn-auth-ldap (tambi\u00e9n conocido como el complemento Three Rings Auth-LDAP para OpenVPN) 2.0.4 permite a atacantes con un nombre de usuario LDAP v\u00e1lido y que pueden controlar el campo de contrase\u00f1a de desaf\u00edo/respuesta pasar una cadena con m\u00e1s de 14 dos puntos a este campo y provocar un desbordamiento del b\u00fafer." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/threerings/openvpn-auth-ldap/pull/92", diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28880.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28880.json index d84b3a120ba..c6f9a11e576 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28880.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28880.json @@ -2,8 +2,9 @@ "id": "CVE-2024-28880", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-05-28T00:15:08.407", - "lastModified": "2024-05-28T12:39:28.377", + "lastModified": "2024-07-03T01:51:53.260", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de Path traversal en MosP kintai kanri V4.6.6 y versiones anteriores permite a un atacante remoto que puede iniciar sesi\u00f3n en el producto obtener informaci\u00f3n confidencial del producto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/jp/JVN97751842/", diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28886.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28886.json index 411241360ea..3a37844bbab 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28886.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28886.json @@ -2,8 +2,9 @@ "id": "CVE-2024-28886", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-05-28T03:15:08.470", - "lastModified": "2024-05-28T12:39:28.377", + "lastModified": "2024-07-03T01:51:54.130", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo existe en versiones de UTAU anteriores a la v0.4.19. Si un usuario del producto abre un archivo de proyecto UTAU manipulado (archivo .ust), se puede ejecutar un comando arbitrario del sistema operativo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/jp/JVN71404925/", diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28890.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28890.json index 4da52346595..3ee2e0eb152 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28890.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28890.json @@ -2,8 +2,9 @@ "id": "CVE-2024-28890", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-04-23T05:15:49.260", - "lastModified": "2024-04-23T12:52:09.397", + "lastModified": "2024-07-03T01:51:54.973", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Forminator anterior a 1.29.0 contiene una carga sin restricciones de archivos con una vulnerabilidad de tipo peligroso. Si se explota esta vulnerabilidad, un atacante remoto puede obtener informaci\u00f3n confidencial accediendo a archivos en el servidor, alterar el sitio que utiliza el complemento y provocar una condici\u00f3n de denegaci\u00f3n de servicio (DoS)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://jvn.jp/en/jp/JVN50132400/", diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28893.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28893.json index b6843a89be3..ee85df118a4 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28893.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28893.json @@ -2,8 +2,9 @@ "id": "CVE-2024-28893", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2024-05-01T16:15:07.553", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-07-03T01:51:55.153", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Ciertos paquetes de software de HP (SoftPaqs) son potencialmente vulnerables a la ejecuci\u00f3n de c\u00f3digo arbitrario cuando el archivo de configuraci\u00f3n del SoftPaq se modifica despu\u00e9s de la extracci\u00f3n. HP ha lanzado paquetes de software actualizados (SoftPaqs)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.1, + "impactScore": 6.0 + } + ] + }, "references": [ { "url": "https://support.hp.com/us-en/document/ish_10502451-10502508-16/hpsbhf03931", diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28960.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28960.json index 0412f1b5179..aa2a1806306 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28960.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28960.json @@ -2,8 +2,9 @@ "id": "CVE-2024-28960", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-29T06:15:07.270", - "lastModified": "2024-04-19T23:15:10.657", + "lastModified": "2024-07-03T01:51:57.697", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en Mbed TLS 2.18.0 hasta 2.28.x anteriores a 2.28.8 y 3.x anteriores a 3.6.0, y en Mbed Crypto. La API PSA Crypto maneja mal la memoria compartida." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2024-03.md", diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2836.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2836.json index 60b0ad09fc7..53e4447a05e 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2836.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2836.json @@ -2,8 +2,9 @@ "id": "CVE-2024-2836", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-15T05:15:15.267", - "lastModified": "2024-04-15T13:15:31.997", + "lastModified": "2024-07-03T01:53:35.640", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento Social Share, Social Login and Social Comments Plugin de WordPress anterior a 7.13.64 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con altos privilegios, como editores, realizar ataques de cross-site scripting incluso cuando unfiltered_html no est\u00e1 permitido." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/36f95b19-af74-4c56-9848-8ff270af4723/", diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2837.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2837.json index 46236e35801..d1ece2a4764 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2837.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2837.json @@ -2,8 +2,9 @@ "id": "CVE-2024-2837", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-26T05:15:50.200", - "lastModified": "2024-04-26T12:58:17.720", + "lastModified": "2024-07-03T01:53:35.850", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento WP Chat App de WordPress anterior a 3.6.4 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con altos privilegios, como administradores, realizar ataques de Cross-Site Scripting incluso cuando unfiltered_html no est\u00e1 permitido." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/91058c48-f262-4fcc-9390-472d59d61115/", diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2883.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2883.json index fc623b70772..2c67a0f128c 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2883.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2883.json @@ -2,8 +2,9 @@ "id": "CVE-2024-2883", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-03-26T21:15:53.173", - "lastModified": "2024-03-29T04:15:08.743", + "lastModified": "2024-07-03T01:53:37.420", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Use after free en ANGLE en Google Chrome anterior a 123.0.6312.86 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chromium: cr\u00edtica)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html", diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2885.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2885.json index 5b6f380d5b0..08eecb322f2 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2885.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2885.json @@ -2,8 +2,9 @@ "id": "CVE-2024-2885", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-03-26T21:15:53.220", - "lastModified": "2024-03-29T04:15:09.077", + "lastModified": "2024-07-03T01:53:37.660", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Use after free en Dawn en Google Chrome anterior a 123.0.6312.86 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html", diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2886.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2886.json index 21944463bd5..56cf3d40569 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2886.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2886.json @@ -2,8 +2,9 @@ "id": "CVE-2024-2886", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-03-26T21:15:53.260", - "lastModified": "2024-03-29T04:15:09.233", + "lastModified": "2024-07-03T01:53:37.867", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Use after free en WebCodecs en Google Chrome anteriores a 123.0.6312.86 permit\u00eda a un atacante remoto realizar lectura/escritura arbitraria a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html", diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2887.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2887.json index 910bb9516f9..9b5d46f463c 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2887.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2887.json @@ -2,8 +2,9 @@ "id": "CVE-2024-2887", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-03-26T21:15:53.300", - "lastModified": "2024-03-29T04:15:09.423", + "lastModified": "2024-07-03T01:53:38.087", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Type Confusion en WebAssembly en Google Chrome anterior a 123.0.6312.86 permit\u00eda a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 6.0 + } + ] + }, "references": [ { "url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html", diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29149.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29149.json index cec5dba7857..bbeb8a00091 100644 --- a/CVE-2024/CVE-2024-291xx/CVE-2024-29149.json +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29149.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29149", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T17:15:07.897", - "lastModified": "2024-05-07T20:07:58.737", + "lastModified": "2024-07-03T01:52:06.800", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en los tel\u00e9fonos de escritorio Alcatel-Lucent ALE NOE hasta 86x8_NOE-R300.1.40.12.4180 y en los tel\u00e9fonos de escritorio SIP hasta 86x8_SIP-R200.1.01.10.728. Debido a una vulnerabilidad de tiempo de verificaci\u00f3n y tiempo de uso, un atacante autenticado puede reemplazar la imagen de firmware verificada con firmware malicioso durante el proceso de actualizaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 0.7, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] + } + ], "references": [ { "url": "https://www.al-enterprise.com/-/media/assets/internet/documents/n-to-s/sa-c0071-ed01.pdf", diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29150.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29150.json index 648e9a3e010..cab11f21185 100644 --- a/CVE-2024/CVE-2024-291xx/CVE-2024-29150.json +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29150.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29150", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T17:15:07.963", - "lastModified": "2024-05-07T20:07:58.737", + "lastModified": "2024-07-03T01:52:07.770", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en los tel\u00e9fonos de escritorio Alcatel-Lucent ALE NOE hasta 86x8_NOE-R300.1.40.12.4180 y en los tel\u00e9fonos de escritorio SIP hasta 86x8_SIP-R200.1.01.10.728. Debido a una gesti\u00f3n de privilegios inadecuada, un atacante autenticado puede crear enlaces simb\u00f3licos a datos confidenciales y protegidos en ubicaciones que se utilizan para depurar archivos. Dado que el proceso de recopilaci\u00f3n de registros de depuraci\u00f3n se lleva a cabo con privilegios de root, cualquier archivo al que se haga referencia en el enlace simb\u00f3lico se escribe en el archivo de depuraci\u00f3n, otorgando as\u00ed accesibilidad al atacante." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://www.al-enterprise.com/-/media/assets/internet/documents/n-to-s/sa-c0071-ed01.pdf", diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29158.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29158.json index 81667ae2253..58b44515871 100644 --- a/CVE-2024/CVE-2024-291xx/CVE-2024-29158.json +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29158.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29158", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:15:31.730", - "lastModified": "2024-05-14T16:13:02.773", + "lastModified": "2024-07-03T01:52:08.880", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "HDF5 hasta 1.14.3 contiene un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en H5FL_arr_malloc, lo que provoca la corrupci\u00f3n del puntero de instrucci\u00f3n y provoca denegaci\u00f3n de servicio o posible ejecuci\u00f3n de c\u00f3digo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29160.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29160.json index 6b8e528fe3e..51715fa8e68 100644 --- a/CVE-2024/CVE-2024-291xx/CVE-2024-29160.json +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29160.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29160", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:15:32.213", - "lastModified": "2024-05-14T16:13:02.773", + "lastModified": "2024-07-03T01:52:09.797", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "HDF5 hasta 1.14.3 contiene un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en H5HG__cache_heap_deserialize, lo que provoca la corrupci\u00f3n del puntero de instrucci\u00f3n y provoca denegaci\u00f3n de servicio o posible ejecuci\u00f3n de c\u00f3digo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29161.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29161.json index 801d8409c0a..cb8c66d82eb 100644 --- a/CVE-2024/CVE-2024-291xx/CVE-2024-29161.json +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29161.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29161", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:15:32.390", - "lastModified": "2024-05-14T16:13:02.773", + "lastModified": "2024-07-03T01:52:10.720", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "HDF5 hasta 1.14.3 contiene un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en H5A__attr_release_table, lo que provoca la corrupci\u00f3n del puntero de instrucci\u00f3n y provoca denegaci\u00f3n de servicio o posible ejecuci\u00f3n de c\u00f3digo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29162.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29162.json index 01b0af9db99..d546d25aca6 100644 --- a/CVE-2024/CVE-2024-291xx/CVE-2024-29162.json +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29162.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29162", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:15:32.590", - "lastModified": "2024-05-14T16:13:02.773", + "lastModified": "2024-07-03T01:52:11.517", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "HDF5 hasta 1.13.3 y/o 1.14.2 contiene un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en H5HG_read, lo que resulta en denegaci\u00f3n de servicio o posible ejecuci\u00f3n de c\u00f3digo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29163.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29163.json index 10ca0c79a65..ada6b0c8057 100644 --- a/CVE-2024/CVE-2024-291xx/CVE-2024-29163.json +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29163.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29163", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:15:32.803", - "lastModified": "2024-05-14T16:13:02.773", + "lastModified": "2024-07-03T01:52:12.290", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "HDF5 hasta 1.14.3 contiene un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en H5T__bit_find, lo que provoca la corrupci\u00f3n del puntero de instrucci\u00f3n y provoca denegaci\u00f3n de servicio o posible ejecuci\u00f3n de c\u00f3digo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29164.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29164.json index 1055af356a6..3f54f01d50e 100644 --- a/CVE-2024/CVE-2024-291xx/CVE-2024-29164.json +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29164.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29164", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:15:33.100", - "lastModified": "2024-05-14T16:13:02.773", + "lastModified": "2024-07-03T01:52:13.070", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "HDF5 hasta 1.14.3 contiene un desbordamiento del b\u00fafer de pila en H5R__decode_heap, lo que provoca la corrupci\u00f3n del puntero de instrucci\u00f3n y provoca denegaci\u00f3n de servicio o posible ejecuci\u00f3n de c\u00f3digo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29165.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29165.json index 39af8a2afc0..7bd34656122 100644 --- a/CVE-2024/CVE-2024-291xx/CVE-2024-29165.json +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29165.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29165", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:15:33.297", - "lastModified": "2024-05-14T16:13:02.773", + "lastModified": "2024-07-03T01:52:13.840", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "HDF5 hasta 1.14.3 contiene un desbordamiento de b\u00fafer en H5Z__filter_fletcher32, lo que provoca la corrupci\u00f3n del puntero de instrucci\u00f3n y provoca denegaci\u00f3n de servicio o posible ejecuci\u00f3n de c\u00f3digo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29169.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29169.json index 39e11f26963..c01c983f54b 100644 --- a/CVE-2024/CVE-2024-291xx/CVE-2024-29169.json +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29169.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29169", "sourceIdentifier": "security_alert@emc.com", "published": "2024-06-13T16:15:10.610", - "lastModified": "2024-06-13T18:35:19.777", + "lastModified": "2024-07-03T01:52:14.690", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29204.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29204.json index 3993d6f316e..5a6ee9f90e2 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29204.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29204.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29204", "sourceIdentifier": "support@hackerone.com", "published": "2024-04-19T02:15:10.760", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:52:15.910", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US", diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29205.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29205.json index f32ed189e35..ee75ce0a2a6 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29205.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29205.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29205", "sourceIdentifier": "support@hackerone.com", "published": "2024-04-25T06:15:57.923", - "lastModified": "2024-04-25T13:18:13.537", + "lastModified": "2024-07-03T01:52:16.640", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-703" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/SA-CVE-2024-21894-Heap-Overflow-CVE-2024-22052-Null-Pointer-Dereference-CVE-2024-22053-Heap-Overflow-and-CVE-2024-22023-XML-entity-expansion-or-XXE-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US", diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29206.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29206.json index 7e957ce68f5..8eb7d954281 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29206.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29206.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29206", "sourceIdentifier": "support@hackerone.com", "published": "2024-05-07T17:15:08.027", - "lastModified": "2024-05-07T20:07:58.737", + "lastModified": "2024-07-03T01:52:17.397", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://community.ui.com/releases/Security-Advisory-bulletin-039-039/44e24007-2c2c-4ac0-bebf-3f19b9b24f09", diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29207.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29207.json index 400df3c0e1a..24286552650 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29207.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29207.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29207", "sourceIdentifier": "support@hackerone.com", "published": "2024-05-07T17:15:08.183", - "lastModified": "2024-05-07T20:07:58.737", + "lastModified": "2024-07-03T01:52:18.087", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://community.ui.com/releases/Security-Advisory-bulletin-039-039/44e24007-2c2c-4ac0-bebf-3f19b9b24f09", diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29208.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29208.json index 71804940294..32c0b56958f 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29208.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29208.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29208", "sourceIdentifier": "support@hackerone.com", "published": "2024-05-07T17:15:08.330", - "lastModified": "2024-05-07T20:07:58.737", + "lastModified": "2024-07-03T01:52:18.780", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-521" + } + ] + } + ], "references": [ { "url": "https://community.ui.com/releases/Security-Advisory-bulletin-039-039/44e24007-2c2c-4ac0-bebf-3f19b9b24f09", diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29210.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29210.json index 11813bbb3d8..dea534378fc 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29210.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29210.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29210", "sourceIdentifier": "support@hackerone.com", "published": "2024-05-07T17:15:08.647", - "lastModified": "2024-05-07T20:07:58.737", + "lastModified": "2024-07-03T01:52:19.497", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://support.knowbe4.com/hc/en-us/articles/28959854203923-CVE-2024-29210", diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29212.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29212.json index 70a4f5d11ff..1236fe54fc3 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29212.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29212.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29212", "sourceIdentifier": "support@hackerone.com", "published": "2024-05-14T15:15:43.623", - "lastModified": "2024-05-14T16:13:02.773", + "lastModified": "2024-07-03T01:52:20.207", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], "references": [ { "url": "https://www.veeam.com/kb4575", diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29217.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29217.json index 40471dfe363..9071f957896 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29217.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29217.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29217", "sourceIdentifier": "security@apache.org", "published": "2024-04-21T16:15:47.617", - "lastModified": "2024-05-01T17:15:31.350", + "lastModified": "2024-07-03T01:52:20.987", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Neutralizaci\u00f3n inadecuada de la entrada durante la vulnerabilidad de generaci\u00f3n de p\u00e1ginas web ('cross-site Scripting') en Apache Answer. Este problema afecta a Apache Answer: versiones anteriores a 1.3.0. Ataque XSS cuando el usuario cambia de sitio web personal. Un usuario que haya iniciado sesi\u00f3n, al modificar su sitio web personal, puede introducir c\u00f3digo malicioso en el sitio web para crear dicho ataque. Se recomienda a los usuarios actualizar a la versi\u00f3n [1.3.0], que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 2.5 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29218.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29218.json index 5bb4e56a33e..dbddda01bc2 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29218.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29218.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29218", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-04-15T11:15:08.533", - "lastModified": "2024-04-15T13:15:31.997", + "lastModified": "2024-07-03T01:52:21.197", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Existe una vulnerabilidad de escritura fuera de los l\u00edmites en KV STUDIO Ver.11.64 y anteriores y en KV REPLAY VIEWER Ver.2.64 y anteriores, lo que puede provocar la divulgaci\u00f3n de informaci\u00f3n o la ejecuci\u00f3n de c\u00f3digo arbitrario al hacer que un usuario del producto afectado abra un archivo especialmente manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/vu/JVNVU95439120/", diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29291.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29291.json index 5ec46dac811..0446f7c28ea 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29291.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29291.json @@ -2,8 +2,16 @@ "id": "CVE-2024-29291", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-16T23:15:08.767", - "lastModified": "2024-06-04T19:19:08.753", + "lastModified": "2024-07-03T01:52:22.557", "vulnStatus": "Awaiting Analysis", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -15,6 +23,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/whiteman007/43bd7fa1fa0e47554b33f0cf93066784", diff --git a/CVE-2024/CVE-2024-293xx/CVE-2024-29320.json b/CVE-2024/CVE-2024-293xx/CVE-2024-29320.json index f5cde888c39..4d3c789d48a 100644 --- a/CVE-2024/CVE-2024-293xx/CVE-2024-29320.json +++ b/CVE-2024/CVE-2024-293xx/CVE-2024-29320.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29320", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T16:15:07.290", - "lastModified": "2024-04-30T17:52:35.057", + "lastModified": "2024-07-03T01:52:23.320", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Wallos anterior a 1.15.3 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de la categor\u00eda y los par\u00e1metros de pago en /subscriptions/get.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/ellite/Wallos", diff --git a/CVE-2024/CVE-2024-293xx/CVE-2024-29376.json b/CVE-2024/CVE-2024-293xx/CVE-2024-29376.json index 7582aec84a3..f7bcda3822d 100644 --- a/CVE-2024/CVE-2024-293xx/CVE-2024-29376.json +++ b/CVE-2024/CVE-2024-293xx/CVE-2024-29376.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29376", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T19:15:46.560", - "lastModified": "2024-04-22T19:24:06.727", + "lastModified": "2024-07-03T01:52:24.250", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Sylius 1.12.13 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s del campo \"Provincia\" en la Libreta de direcciones." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 0.0, + "baseSeverity": "NONE" + }, + "exploitabilityScore": 2.5, + "impactScore": 0.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/r2tunes/Reports/blob/main/Sylius.md", diff --git a/CVE-2024/CVE-2024-293xx/CVE-2024-29384.json b/CVE-2024/CVE-2024-293xx/CVE-2024-29384.json index 05cdabd3b71..0f6c03071d3 100644 --- a/CVE-2024/CVE-2024-293xx/CVE-2024-29384.json +++ b/CVE-2024/CVE-2024-293xx/CVE-2024-29384.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29384", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T20:15:07.993", - "lastModified": "2024-05-01T13:02:20.750", + "lastModified": "2024-07-03T01:52:25.030", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en CSS Exfil Protection v.1.1.0 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de las funciones content.js y parseCSSRules." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://github.com/mlgualtieri/CSS-Exfil-Protection/issues/41", diff --git a/CVE-2024/CVE-2024-293xx/CVE-2024-29390.json b/CVE-2024/CVE-2024-293xx/CVE-2024-29390.json index 0bad322a203..16953fab83d 100644 --- a/CVE-2024/CVE-2024-293xx/CVE-2024-29390.json +++ b/CVE-2024/CVE-2024-293xx/CVE-2024-29390.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29390", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-20T21:15:49.583", - "lastModified": "2024-06-21T11:22:01.687", + "lastModified": "2024-07-03T01:52:25.827", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "La versi\u00f3n 1.0 de Daily Expenses Management System, desarrollado por PHP Gurukul, contiene una vulnerabilidad de inyecci\u00f3n SQL ciega basada en el tiempo en la p\u00e1gina 'add-expense.php'. Un atacante puede explotar el par\u00e1metro 'elemento' en una solicitud POST para ejecutar comandos SQL arbitrarios en la base de datos backend. Esto se puede hacer inyectando consultas SQL especialmente manipuladas que hacen que la base de datos realice operaciones que consumen mucho tiempo, confirmando as\u00ed la presencia de la vulnerabilidad de inyecci\u00f3n SQL basada en el retraso en la respuesta del servidor." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://github.com/CyberSentryX/CVE_Hunting/blob/main/CVE-2024-29390/README.md", diff --git a/CVE-2024/CVE-2024-294xx/CVE-2024-29400.json b/CVE-2024/CVE-2024-294xx/CVE-2024-29400.json index 8068ad6935d..ef1e6b66311 100644 --- a/CVE-2024/CVE-2024-294xx/CVE-2024-29400.json +++ b/CVE-2024/CVE-2024-294xx/CVE-2024-29400.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29400", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-12T07:15:08.667", - "lastModified": "2024-04-12T12:43:46.210", + "lastModified": "2024-07-03T01:52:26.027", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en RuoYi v4.5.1 que permite a los atacantes obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro de estado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://github.com/Fr1ezy/RuoYi_info", diff --git a/CVE-2024/CVE-2024-294xx/CVE-2024-29417.json b/CVE-2024/CVE-2024-294xx/CVE-2024-29417.json index 26b8c44e90b..284b8929382 100644 --- a/CVE-2024/CVE-2024-294xx/CVE-2024-29417.json +++ b/CVE-2024/CVE-2024-294xx/CVE-2024-29417.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29417", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-03T15:15:08.103", - "lastModified": "2024-05-03T15:32:19.637", + "lastModified": "2024-07-03T01:52:26.833", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La vulnerabilidad de permisos inseguros en e-trust Horacius 1.0, 1.1 y 1.2 permite a un atacante local escalar privilegios a trav\u00e9s de la funci\u00f3n de restablecimiento de contrase\u00f1a." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-277" + } + ] + } + ], "references": [ { "url": "https://blog.pridesec.com.br/en/horacius-unauthenticated-privilege-escalation/", diff --git a/CVE-2024/CVE-2024-294xx/CVE-2024-29466.json b/CVE-2024/CVE-2024-294xx/CVE-2024-29466.json index 4754c26ad2d..dad44ea090b 100644 --- a/CVE-2024/CVE-2024-294xx/CVE-2024-29466.json +++ b/CVE-2024/CVE-2024-294xx/CVE-2024-29466.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29466", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T21:15:45.863", - "lastModified": "2024-05-01T13:02:20.750", + "lastModified": "2024-07-03T01:52:27.797", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-26" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Xiqinger/b3cb51f390d408c3c66c66e645ba5ac0", diff --git a/CVE-2024/CVE-2024-294xx/CVE-2024-29499.json b/CVE-2024/CVE-2024-294xx/CVE-2024-29499.json index c32e399a867..ff72a297985 100644 --- a/CVE-2024/CVE-2024-294xx/CVE-2024-29499.json +++ b/CVE-2024/CVE-2024-294xx/CVE-2024-29499.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29499", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-22T17:15:08.993", - "lastModified": "2024-03-22T19:02:10.300", + "lastModified": "2024-07-03T01:52:28.783", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que Anchor CMS v0.12.7 conten\u00eda una Cross-Site Request Forgery (CSRF) a trav\u00e9s de /anchor/admin/users/delete/2." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/daddywolf/cms/blob/main/1.md", diff --git a/CVE-2024/CVE-2024-296xx/CVE-2024-29660.json b/CVE-2024/CVE-2024-296xx/CVE-2024-29660.json index eb9e1043d37..32f415be9c0 100644 --- a/CVE-2024/CVE-2024-296xx/CVE-2024-29660.json +++ b/CVE-2024/CVE-2024-296xx/CVE-2024-29660.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29660", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-25T17:15:49.377", - "lastModified": "2024-04-25T17:24:59.967", + "lastModified": "2024-07-03T01:52:29.550", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de Cross-Site Scripting en DedeCMS v.5.7 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado en el componente stepelect_main.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/ysl1415926/cve/blob/main/DedeCMSv5.7.md", diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29733.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29733.json index 2b3c0ebfd08..78f439273ca 100644 --- a/CVE-2024/CVE-2024-297xx/CVE-2024-29733.json +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29733.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29733", "sourceIdentifier": "security@apache.org", "published": "2024-04-21T18:15:45.043", - "lastModified": "2024-05-01T18:15:18.867", + "lastModified": "2024-07-03T01:52:30.320", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Vulnerabilidad de validaci\u00f3n de certificado incorrecta en el proveedor FTP Apache Airflow. El enlace FTP carece de una validaci\u00f3n completa del certificado en las conexiones FTP_TLS, lo que potencialmente puede aprovecharse. La implementaci\u00f3n de una validaci\u00f3n de certificados adecuada pasando context=ssl.create_default_context() durante la creaci\u00f3n de instancias de FTP_TLS se utiliza como mitigaci\u00f3n para validar los certificados correctamente. Este problema afecta al proveedor FTP Apache Airflow: anterior a 3.7.0. Se recomienda a los usuarios actualizar a la versi\u00f3n 3.7.0, que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29740.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29740.json index bdbc097e805..d5842f93c24 100644 --- a/CVE-2024/CVE-2024-297xx/CVE-2024-29740.json +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29740.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29740", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-04-05T20:15:08.010", - "lastModified": "2024-04-08T18:49:25.863", + "lastModified": "2024-07-03T01:52:30.657", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En tmu_set_table de tmu.c, hay una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-04-01", diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29745.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29745.json index 4620971a891..7301f9668ca 100644 --- a/CVE-2024/CVE-2024-297xx/CVE-2024-29745.json +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29745.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29745", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-04-05T20:15:08.253", - "lastModified": "2024-04-08T22:53:32.127", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:52:31.423", + "vulnStatus": "Modified", + "cveTags": [], "cisaExploitAdd": "2024-04-04", "cisaActionDue": "2024-04-25", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", @@ -39,6 +40,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -52,6 +73,16 @@ "value": "CWE-908" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29784.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29784.json index 8a12d4c1b79..49a262e2e12 100644 --- a/CVE-2024/CVE-2024-297xx/CVE-2024-29784.json +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29784.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29784", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:52.110", - "lastModified": "2024-06-17T12:43:31.090", + "lastModified": "2024-07-03T01:52:34.030", "vulnStatus": "Undergoing Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En prepare_response de lwis_periodic_io.c, existe una posible escritura fuera de los l\u00edmites debido a un desbordamiento de enteros. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29786.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29786.json index 69f19cb583e..800d623758c 100644 --- a/CVE-2024/CVE-2024-297xx/CVE-2024-29786.json +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29786.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29786", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:52.257", - "lastModified": "2024-06-17T12:43:31.090", + "lastModified": "2024-07-03T01:52:35.427", "vulnStatus": "Undergoing Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En pktproc_fill_data_addr_ without_bm de link_rx_pktproc.c, hay una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a la ejecuci\u00f3n remota de c\u00f3digo sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29787.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29787.json index fb8218c0362..251511b8fcd 100644 --- a/CVE-2024/CVE-2024-297xx/CVE-2024-29787.json +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29787.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29787", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:52.340", - "lastModified": "2024-06-17T12:43:31.090", + "lastModified": "2024-07-03T01:52:36.683", "vulnStatus": "Undergoing Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En lwis_process_transactions_in_queue de lwis_transaction.c, existe un posible Use after Free debido a un Use after Free. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29822.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29822.json index d4cf07d2fd9..8decedf7850 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29822.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29822.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29822", "sourceIdentifier": "support@hackerone.com", "published": "2024-05-31T18:15:10.837", - "lastModified": "2024-05-31T19:14:47.793", + "lastModified": "2024-07-03T01:52:39.707", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29823.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29823.json index d98e2d4cf4d..6a891343515 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29823.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29823.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29823", "sourceIdentifier": "support@hackerone.com", "published": "2024-05-31T18:15:11.017", - "lastModified": "2024-05-31T19:14:47.793", + "lastModified": "2024-07-03T01:52:40.430", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29824.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29824.json index 5a2b6e227c1..195114cdbb5 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29824.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29824.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29824", "sourceIdentifier": "support@hackerone.com", "published": "2024-05-31T18:15:11.177", - "lastModified": "2024-05-31T19:14:47.793", + "lastModified": "2024-07-03T01:52:41.133", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29825.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29825.json index 52aa7701982..0d0b9266fef 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29825.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29825.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29825", "sourceIdentifier": "support@hackerone.com", "published": "2024-05-31T18:15:11.443", - "lastModified": "2024-05-31T19:14:47.793", + "lastModified": "2024-07-03T01:52:41.840", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29826.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29826.json index cbad5c73baf..e4b79b57697 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29826.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29826.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29826", "sourceIdentifier": "support@hackerone.com", "published": "2024-05-31T18:15:11.617", - "lastModified": "2024-05-31T19:14:47.793", + "lastModified": "2024-07-03T01:52:42.553", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29827.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29827.json index 8010a65af30..e3dc85f999a 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29827.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29827.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29827", "sourceIdentifier": "support@hackerone.com", "published": "2024-05-31T18:15:11.780", - "lastModified": "2024-05-31T19:14:47.793", + "lastModified": "2024-07-03T01:52:43.270", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29829.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29829.json index fc168b292a6..81c6a3143d0 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29829.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29829.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29829", "sourceIdentifier": "support@hackerone.com", "published": "2024-05-31T18:15:12.107", - "lastModified": "2024-05-31T19:14:47.793", + "lastModified": "2024-07-03T01:52:43.970", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29830.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29830.json index 45601c3cd77..0bd08d55aa7 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29830.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29830.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29830", "sourceIdentifier": "support@hackerone.com", "published": "2024-05-31T18:15:12.390", - "lastModified": "2024-05-31T19:14:47.793", + "lastModified": "2024-07-03T01:52:44.693", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29846.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29846.json index 39184287c98..2b142493b6a 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29846.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29846.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29846", "sourceIdentifier": "support@hackerone.com", "published": "2024-05-31T18:15:12.557", - "lastModified": "2024-05-31T19:14:47.793", + "lastModified": "2024-07-03T01:52:46.270", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://www.ivanti.com/blog/topics/security-advisory", diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29848.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29848.json index 20c223a1b92..f8be373d43f 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29848.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29848.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29848", "sourceIdentifier": "support@hackerone.com", "published": "2024-05-31T18:15:12.727", - "lastModified": "2024-05-31T19:14:47.793", + "lastModified": "2024-07-03T01:52:46.980", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29849.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29849.json index d95ef417620..02cbd6b30a9 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29849.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29849.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29849", "sourceIdentifier": "support@hackerone.com", "published": "2024-05-22T23:15:08.683", - "lastModified": "2024-05-24T01:15:30.977", + "lastModified": "2024-07-03T01:52:47.767", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-288" + } + ] + } + ], "references": [ { "url": "https://veeam.com/kb4581", diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29850.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29850.json index 0b051af3270..2f0a52bde99 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29850.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29850.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29850", "sourceIdentifier": "support@hackerone.com", "published": "2024-05-22T23:15:08.857", - "lastModified": "2024-05-24T01:15:30.977", + "lastModified": "2024-07-03T01:52:48.473", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-294" + } + ] + } + ], "references": [ { "url": "https://veeam.com/kb4581", diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29852.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29852.json index c56fda2c4c2..306149ed1b0 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29852.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29852.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29852", "sourceIdentifier": "support@hackerone.com", "published": "2024-05-22T23:15:09.193", - "lastModified": "2024-05-24T01:15:30.977", + "lastModified": "2024-07-03T01:52:49.260", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-280" + } + ] + } + ], "references": [ { "url": "https://veeam.com/kb4581", diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29853.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29853.json index aa222080610..1aa5bcd955a 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29853.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29853.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29853", "sourceIdentifier": "support@hackerone.com", "published": "2024-05-22T23:15:09.367", - "lastModified": "2024-05-24T01:15:30.977", + "lastModified": "2024-07-03T01:52:49.947", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-288" + } + ] + } + ], "references": [ { "url": "https://veeam.com/kb4582", diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29868.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29868.json index c9b20abac8c..da98d1f0f81 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29868.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29868.json @@ -2,15 +2,43 @@ "id": "CVE-2024-29868", "sourceIdentifier": "security@apache.org", "published": "2024-06-24T10:15:09.387", - "lastModified": "2024-06-24T12:57:36.513", + "lastModified": "2024-07-03T01:52:50.837", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Apache StreamPipes\u00a0user self-registration and password recovery mechanism.\nThis allows an attacker to guess the recovery token in a reasonable time and thereby to take over the attacked user's account.\nThis issue affects Apache StreamPipes: from 0.69.0 through 0.93.0.\n\nUsers are recommended to upgrade to version 0.95.0, which fixes the issue.\n\n" + }, + { + "lang": "es", + "value": "Uso de la vulnerabilidad del generador de n\u00fameros pseudoaleatorios (PRNG) criptogr\u00e1ficamente d\u00e9bil en el mecanismo de autorregistro de usuarios y recuperaci\u00f3n de contrase\u00f1as de Apache StreamPipes. Esto permite a un atacante adivinar el token de recuperaci\u00f3n en un tiempo razonable y as\u00ed hacerse cargo de la cuenta del usuario atacado. Este problema afecta a Apache StreamPipes: desde 0.69.0 hasta 0.93.0. Se recomienda a los usuarios actualizar a la versi\u00f3n 0.95.0, que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29916.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29916.json index 2446d5e27a5..07133dc8eb5 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29916.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29916.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29916", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-21T17:15:09.897", - "lastModified": "2024-03-21T19:47:03.943", + "lastModified": "2024-07-03T01:52:52.383", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El sistema dormakaba Saflok antes de la actualizaci\u00f3n de software de noviembre de 2023 permite a un atacante desbloquear puertas arbitrarias en una propiedad mediante tarjetas de acceso falsificadas, si el atacante ha obtenido una tarjeta de acceso activa o vencida para la propiedad espec\u00edfica, tambi\u00e9n conocido como el problema \"Unsaflok\". Esto ocurre, en parte, porque la funci\u00f3n de derivaci\u00f3n de claves se basa \u00fanicamente en un UID. Esto afecta, por ejemplo, a Saflok MT y a las series Confidant, Quantum, RT y Saffire." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.4, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-407" + } + ] + } + ], "references": [ { "url": "https://news.ycombinator.com/item?id=39779291", diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29987.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29987.json index 277b81b3f81..976ddb06cb7 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29987.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29987.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29987", "sourceIdentifier": "secure@microsoft.com", "published": "2024-04-18T19:15:11.403", - "lastModified": "2024-06-11T16:15:25.047", + "lastModified": "2024-07-03T01:52:55.750", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-359" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2908.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2908.json index 2c00d1b74d8..3d08f22b25c 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2908.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2908.json @@ -2,8 +2,9 @@ "id": "CVE-2024-2908", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-26T05:15:50.240", - "lastModified": "2024-04-26T12:58:17.720", + "lastModified": "2024-07-03T01:53:38.703", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento Call Now Button de WordPress anterior a 1.4.7 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/58c9e088-ed74-461a-b305-e217679f26c1/", diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2961.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2961.json index b9192b2ff8c..34d247e5f0d 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2961.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2961.json @@ -2,8 +2,9 @@ "id": "CVE-2024-2961", "sourceIdentifier": "3ff69d7a-14f2-4f67-a097-88dee7810d18", "published": "2024-04-17T18:15:15.833", - "lastModified": "2024-06-10T18:15:30.657", + "lastModified": "2024-07-03T01:53:40.707", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "La funci\u00f3n iconv() en las versiones 2.39 y anteriores de la librer\u00eda GNU C puede desbordar el b\u00fafer de salida que se le pasa hasta en 4 bytes al convertir cadenas al juego de caracteres ISO-2022-CN-EXT, lo que puede usarse para bloquear una aplicaci\u00f3n. o sobrescribir una variable vecina." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 4.7 + } + ] + }, "weaknesses": [ { "source": "3ff69d7a-14f2-4f67-a097-88dee7810d18", diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2975.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2975.json index 5380d92d3d3..3d53f5a6572 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2975.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2975.json @@ -2,8 +2,9 @@ "id": "CVE-2024-2975", "sourceIdentifier": "security@octopus.com", "published": "2024-04-09T01:15:49.583", - "lastModified": "2024-04-09T12:48:04.090", + "lastModified": "2024-07-03T01:53:41.630", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1223" + } + ] + } + ], "references": [ { "url": "https://advisories.octopus.com/post/2024/sa2024-01/", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30058.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30058.json index b1d8971b997..3d7874e8fd6 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30058.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30058.json @@ -2,8 +2,9 @@ "id": "CVE-2024-30058", "sourceIdentifier": "secure@microsoft.com", "published": "2024-06-13T20:15:12.670", - "lastModified": "2024-06-26T18:15:13.110", + "lastModified": "2024-07-03T01:53:46.567", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-357" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30107.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30107.json index ba2fd00e3d5..e4addcde6b3 100644 --- a/CVE-2024/CVE-2024-301xx/CVE-2024-30107.json +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30107.json @@ -2,8 +2,9 @@ "id": "CVE-2024-30107", "sourceIdentifier": "psirt@hcl.com", "published": "2024-04-18T21:15:07.287", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:53:50.107", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0112489", diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30119.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30119.json index 2cfdadc20c5..f780d432c40 100644 --- a/CVE-2024/CVE-2024-301xx/CVE-2024-30119.json +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30119.json @@ -2,8 +2,9 @@ "id": "CVE-2024-30119", "sourceIdentifier": "psirt@hcl.com", "published": "2024-06-14T22:15:10.317", - "lastModified": "2024-06-17T12:42:04.623", + "lastModified": "2024-07-03T01:53:51.120", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-522" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-326" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30162.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30162.json index 56c5ae008a5..204742deec9 100644 --- a/CVE-2024/CVE-2024-301xx/CVE-2024-30162.json +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30162.json @@ -2,8 +2,9 @@ "id": "CVE-2024-30162", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-07T17:15:50.170", - "lastModified": "2024-06-07T19:24:09.243", + "lastModified": "2024-07-03T01:53:51.970", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Invision Community hasta 4.7.16 permite la ejecuci\u00f3n remota de c\u00f3digo a trav\u00e9s del m\u00e9todo apps/core/modules/admin/editor/toolbar.php IPS\\core\\modules\\admin\\editor\\_toolbar::addPlugin(). Este m\u00e9todo maneja archivos ZIP cargados que se extraen en el directorio apps/core/interface/ckeditor/ckeditor/plugins/ sin verificar adecuadamente su contenido. Esto puede ser aprovechado por usuarios administradores (con el permiso toolbar_manage) para escribir archivos PHP arbitrarios en ese directorio, lo que lleva a la ejecuci\u00f3n de c\u00f3digo PHP arbitrario en el contexto del usuario del servidor web." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-345" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Apr/21", diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30164.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30164.json index d70150b6902..266f0ae3a8f 100644 --- a/CVE-2024/CVE-2024-301xx/CVE-2024-30164.json +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30164.json @@ -2,8 +2,9 @@ "id": "CVE-2024-30164", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T17:15:10.160", - "lastModified": "2024-05-29T13:02:09.280", + "lastModified": "2024-07-03T01:53:52.840", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Amazon AWS Client VPN tiene un desbordamiento de b\u00fafer que podr\u00eda permitir que un actor local ejecute comandos arbitrarios con permisos elevados. Esto se resuelve en 3.11.1 en Windows, 3.9.1 en macOS y 3.12.1 en Linux. NOTA: aunque la resoluci\u00f3n de macOS es la misma que para CVE-2024-30165, esta vulnerabilidad en macOS no es la misma que CVE-2024-30165." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://docs.aws.amazon.com/vpn/latest/clientvpn-user/client-vpn-connect-linux.html", diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30165.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30165.json index f54dd5eea28..6bbd746af9d 100644 --- a/CVE-2024/CVE-2024-301xx/CVE-2024-30165.json +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30165.json @@ -2,8 +2,9 @@ "id": "CVE-2024-30165", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T17:15:10.237", - "lastModified": "2024-05-29T13:02:09.280", + "lastModified": "2024-07-03T01:53:53.630", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Amazon AWS Client VPN anterior a 3.9.1 en macOS tiene un desbordamiento de b\u00fafer que podr\u00eda permitir que un actor local ejecute comandos arbitrarios con permisos elevados, una vulnerabilidad diferente a CVE-2024-30164." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://docs.aws.amazon.com/vpn/latest/clientvpn-user/client-vpn-connect-macos.html", diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30419.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30419.json index 5545cfb2bd2..43a8d644460 100644 --- a/CVE-2024/CVE-2024-304xx/CVE-2024-30419.json +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30419.json @@ -2,8 +2,9 @@ "id": "CVE-2024-30419", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-05-22T05:15:52.137", - "lastModified": "2024-05-22T12:46:53.887", + "lastModified": "2024-07-03T01:54:04.563", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La vulnerabilidad de Cross-Site Scripting existe en las versiones de la serie a-blog cms Ver.3.1.x anteriores a la Ver.3.1.12, versiones de la serie Ver.3.0.x anteriores a la Ver.3.0.32, versiones de la serie Ver.2.11.x anteriores a Ver.2.11.61, versiones de la serie Ver.2.10.x anteriores a Ver.2.10.53 y Ver.2.9 y versiones anteriores. Si se explota esta vulnerabilidad, un usuario con un privilegio de colaborador o superior que pueda iniciar sesi\u00f3n en el producto puede ejecutar un script arbitrario en el navegador web del usuario que accedi\u00f3 al sitio web utilizando el producto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://developer.a-blogcms.jp/blog/news/JVN-70977403.html", diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30623.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30623.json index ffbf19d6861..e2f4c8507e0 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30623.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30623.json @@ -2,8 +2,9 @@ "id": "CVE-2024-30623", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-29T13:15:15.913", - "lastModified": "2024-03-29T13:28:22.880", + "lastModified": "2024-07-03T01:54:12.180", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Tenda FH1205 v2.0.0.7(775) tiene una vulnerabilidad de desbordamiento de la regi\u00f3n stack de la memoria en el par\u00e1metro de p\u00e1gina de la funci\u00f3n fromDhcpListClient." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/fromDhcpListClient_page.md", diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30637.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30637.json index 4d68f60aaa7..fe656ca12d2 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30637.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30637.json @@ -2,8 +2,9 @@ "id": "CVE-2024-30637", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-29T14:15:14.727", - "lastModified": "2024-04-01T01:12:59.077", + "lastModified": "2024-07-03T01:54:12.967", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Tenda F1202 v1.2.0.20(408) tiene una vulnerabilidad de inyecci\u00f3n de comandos en la funci\u00f3n formWriteFacMac en el par\u00e1metro mac." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/formWriteFacMac.md", diff --git a/CVE-2024/CVE-2024-307xx/CVE-2024-30799.json b/CVE-2024/CVE-2024-307xx/CVE-2024-30799.json index 6fcd3f99ece..f2d356b0550 100644 --- a/CVE-2024/CVE-2024-307xx/CVE-2024-30799.json +++ b/CVE-2024/CVE-2024-307xx/CVE-2024-30799.json @@ -2,8 +2,9 @@ "id": "CVE-2024-30799", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T01:15:47.340", - "lastModified": "2024-04-22T13:28:43.747", + "lastModified": "2024-07-03T01:54:13.747", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Un problema en PX4 Autopilot v1.14 y anteriores permite a un atacante remoto ejecutar c\u00f3digo arbitrario y provocar una denegaci\u00f3n de servicio a trav\u00e9s de la funci\u00f3n Breach Return Point." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://github.com/PX4/PX4-Autopilot/issues/22428", diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30800.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30800.json index 391d16b5222..0d4d1e0b7cc 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30800.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30800.json @@ -2,8 +2,9 @@ "id": "CVE-2024-30800", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-23T13:15:46.700", - "lastModified": "2024-04-24T13:39:42.883", + "lastModified": "2024-07-03T01:54:13.930", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "PX4 Autopilot v.1.14 permite a un atacante volar el dron a zonas de exclusi\u00f3n a\u00e9rea al romper la geocerca utilizando fallas en la funci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.3, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://github.com/PX4/PX4-Autopilot/issues/22282", diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30862.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30862.json index 098c2047c8d..3c71b5001cb 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30862.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30862.json @@ -2,8 +2,9 @@ "id": "CVE-2024-30862", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-01T16:15:43.537", - "lastModified": "2024-04-02T12:50:42.233", + "lastModified": "2024-07-03T01:54:14.183", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "netentsec NS-ASG 6.3 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de /3g/index.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-index.md", diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30890.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30890.json index d5e5dc55bff..ebf33fdb4ca 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30890.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30890.json @@ -2,8 +2,9 @@ "id": "CVE-2024-30890", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-25T17:15:49.797", - "lastModified": "2024-04-25T17:24:59.967", + "lastModified": "2024-07-03T01:54:15.373", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/rootlili/198922ef72c9bef973e04eb6b36a8aad", diff --git a/CVE-2024/CVE-2024-309xx/CVE-2024-30915.json b/CVE-2024/CVE-2024-309xx/CVE-2024-30915.json index 3b180a7dd93..64d9bf8e380 100644 --- a/CVE-2024/CVE-2024-309xx/CVE-2024-30915.json +++ b/CVE-2024/CVE-2024-309xx/CVE-2024-30915.json @@ -2,8 +2,9 @@ "id": "CVE-2024-30915", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-11T06:15:06.977", - "lastModified": "2024-04-11T12:47:44.137", + "lastModified": "2024-07-03T01:54:16.067", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Se descubri\u00f3 un problema en el commit de OpenDDS b1c534032bb62ad4ae32609778de6b8d6c823a66, que permite a un atacante local provocar una denegaci\u00f3n de servicio y obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro max_samples dentro del componente DataReaderQoS." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://github.com/OpenDDS/OpenDDS/issues/4527", diff --git a/CVE-2024/CVE-2024-309xx/CVE-2024-30920.json b/CVE-2024/CVE-2024-309xx/CVE-2024-30920.json index 4142f084478..04348905e05 100644 --- a/CVE-2024/CVE-2024-309xx/CVE-2024-30920.json +++ b/CVE-2024/CVE-2024-309xx/CVE-2024-30920.json @@ -2,8 +2,9 @@ "id": "CVE-2024-30920", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-18T21:15:07.447", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:54:16.273", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de Cross Site Scripting en DerbyNet v9.0 y versiones anteriores permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente render-document.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://chocapikk.com/posts/2024/derbynet-vulnerabilities/", diff --git a/CVE-2024/CVE-2024-309xx/CVE-2024-30921.json b/CVE-2024/CVE-2024-309xx/CVE-2024-30921.json index 02103d55a66..60e3a4f23cd 100644 --- a/CVE-2024/CVE-2024-309xx/CVE-2024-30921.json +++ b/CVE-2024/CVE-2024-309xx/CVE-2024-30921.json @@ -2,8 +2,9 @@ "id": "CVE-2024-30921", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-18T21:15:07.513", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:54:17.057", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de Cross Site Scripting en DerbyNet v9.0 y versiones anteriores permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente photo.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://chocapikk.com/posts/2024/derbynet-vulnerabilities/", diff --git a/CVE-2024/CVE-2024-309xx/CVE-2024-30922.json b/CVE-2024/CVE-2024-309xx/CVE-2024-30922.json index af009e8f17a..2f31230bdf1 100644 --- a/CVE-2024/CVE-2024-309xx/CVE-2024-30922.json +++ b/CVE-2024/CVE-2024-309xx/CVE-2024-30922.json @@ -2,8 +2,9 @@ "id": "CVE-2024-30922", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-18T21:15:07.570", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:54:17.827", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n SQL en DerbyNet v9.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de la cl\u00e1usula Where en la representaci\u00f3n de documentos de adjudicaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://chocapikk.com/posts/2024/derbynet-vulnerabilities/", diff --git a/CVE-2024/CVE-2024-309xx/CVE-2024-30924.json b/CVE-2024/CVE-2024-309xx/CVE-2024-30924.json index 52bf0b1821a..47a667f904b 100644 --- a/CVE-2024/CVE-2024-309xx/CVE-2024-30924.json +++ b/CVE-2024/CVE-2024-309xx/CVE-2024-30924.json @@ -2,8 +2,9 @@ "id": "CVE-2024-30924", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-18T22:15:10.063", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:54:18.593", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La vulnerabilidad de Cross Site Scripting en DerbyNet v9.0 y versiones anteriores permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente checkin.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 0.0, + "baseSeverity": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 0.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-692" + } + ] + } + ], "references": [ { "url": "https://chocapikk.com/posts/2024/derbynet-vulnerabilities/", diff --git a/CVE-2024/CVE-2024-309xx/CVE-2024-30925.json b/CVE-2024/CVE-2024-309xx/CVE-2024-30925.json index 66de23c5504..fc412df275f 100644 --- a/CVE-2024/CVE-2024-309xx/CVE-2024-30925.json +++ b/CVE-2024/CVE-2024-309xx/CVE-2024-30925.json @@ -2,8 +2,9 @@ "id": "CVE-2024-30925", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-18T22:15:10.120", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:54:19.410", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La vulnerabilidad de Cross Site Scripting en DerbyNet v9.0 y versiones anteriores permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente photo-thumbs.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://chocapikk.com/posts/2024/derbynet-vulnerabilities/", diff --git a/CVE-2024/CVE-2024-309xx/CVE-2024-30926.json b/CVE-2024/CVE-2024-309xx/CVE-2024-30926.json index 727aac8a99c..e52aa948b3e 100644 --- a/CVE-2024/CVE-2024-309xx/CVE-2024-30926.json +++ b/CVE-2024/CVE-2024-309xx/CVE-2024-30926.json @@ -2,8 +2,9 @@ "id": "CVE-2024-30926", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-18T22:15:10.173", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:54:20.187", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La vulnerabilidad de Cross Site Scripting en DerbyNet v9.0 y versiones anteriores permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente ./inc/kiosks.inc." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://chocapikk.com/posts/2024/derbynet-vulnerabilities/", diff --git a/CVE-2024/CVE-2024-309xx/CVE-2024-30927.json b/CVE-2024/CVE-2024-309xx/CVE-2024-30927.json index 6bdf5ca82f1..35fc6452a12 100644 --- a/CVE-2024/CVE-2024-309xx/CVE-2024-30927.json +++ b/CVE-2024/CVE-2024-309xx/CVE-2024-30927.json @@ -2,8 +2,9 @@ "id": "CVE-2024-30927", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-18T22:15:10.223", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:54:20.970", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La vulnerabilidad de Cross Site Scripting en DerbyNet v9.0 y versiones anteriores permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente racer-results.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://chocapikk.com/posts/2024/derbynet-vulnerabilities/", diff --git a/CVE-2024/CVE-2024-309xx/CVE-2024-30928.json b/CVE-2024/CVE-2024-309xx/CVE-2024-30928.json index afc8a326736..028c2d3ba74 100644 --- a/CVE-2024/CVE-2024-309xx/CVE-2024-30928.json +++ b/CVE-2024/CVE-2024-309xx/CVE-2024-30928.json @@ -2,8 +2,9 @@ "id": "CVE-2024-30928", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-18T22:15:10.293", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:54:21.770", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La vulnerabilidad de inyecci\u00f3n SQL en DerbyNet v9.0 y versiones anteriores permite a los atacantes ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro 'classids' en ajax/query.slide.next.inc" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://chocapikk.com/posts/2024/derbynet-vulnerabilities/", diff --git a/CVE-2024/CVE-2024-309xx/CVE-2024-30929.json b/CVE-2024/CVE-2024-309xx/CVE-2024-30929.json index 1e1c8512c11..a43be7fb676 100644 --- a/CVE-2024/CVE-2024-309xx/CVE-2024-30929.json +++ b/CVE-2024/CVE-2024-309xx/CVE-2024-30929.json @@ -2,8 +2,9 @@ "id": "CVE-2024-30929", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-18T22:15:10.343", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:54:22.560", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La vulnerabilidad de Cross Site Scripting en DerbyNet v9.0 y versiones anteriores permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro \"atr\u00e1s\" en playlist.php" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://chocapikk.com/posts/2024/derbynet-vulnerabilities/", diff --git a/CVE-2024/CVE-2024-309xx/CVE-2024-30931.json b/CVE-2024/CVE-2024-309xx/CVE-2024-30931.json index 73d7b686f97..7b967aadb1c 100644 --- a/CVE-2024/CVE-2024-309xx/CVE-2024-30931.json +++ b/CVE-2024/CVE-2024-309xx/CVE-2024-30931.json @@ -2,8 +2,9 @@ "id": "CVE-2024-30931", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-25T22:15:30.313", - "lastModified": "2024-06-26T12:44:29.693", + "lastModified": "2024-07-03T01:54:23.343", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de Cross-Site Scripting almacenado en Emby Media Server Emby Media Server 4.8.3.0 permite a un atacante remoto escalar privilegios a trav\u00e9s del componente Notifications.html." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://happy-little-accidents.pages.dev/posts/CVE-2024-30931/", diff --git a/CVE-2024/CVE-2024-309xx/CVE-2024-30938.json b/CVE-2024/CVE-2024-309xx/CVE-2024-30938.json index 48c19973f8f..8b8384c975d 100644 --- a/CVE-2024/CVE-2024-309xx/CVE-2024-30938.json +++ b/CVE-2024/CVE-2024-309xx/CVE-2024-30938.json @@ -2,8 +2,9 @@ "id": "CVE-2024-30938", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T00:15:10.623", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:54:24.137", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La vulnerabilidad de inyecci\u00f3n SQL en SEMCMS v.4.8 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro ID en el componente SEMCMS_User.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/lampSEC/semcms/blob/main/semcms.md", diff --git a/CVE-2024/CVE-2024-309xx/CVE-2024-30946.json b/CVE-2024/CVE-2024-309xx/CVE-2024-30946.json index ad47f1066bc..dfeb8515fc8 100644 --- a/CVE-2024/CVE-2024-309xx/CVE-2024-30946.json +++ b/CVE-2024/CVE-2024-309xx/CVE-2024-30946.json @@ -2,8 +2,9 @@ "id": "CVE-2024-30946", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-02T13:15:51.910", - "lastModified": "2024-04-02T18:12:16.283", + "lastModified": "2024-07-03T01:54:24.920", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que DedeCMS v5.7 contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) a trav\u00e9s de /src/dede/co_do.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/testgo1safe/cms/blob/main/1.md", diff --git a/CVE-2024/CVE-2024-309xx/CVE-2024-30950.json b/CVE-2024/CVE-2024-309xx/CVE-2024-30950.json index b9d3de79238..57361180c72 100644 --- a/CVE-2024/CVE-2024-309xx/CVE-2024-30950.json +++ b/CVE-2024/CVE-2024-309xx/CVE-2024-30950.json @@ -2,8 +2,9 @@ "id": "CVE-2024-30950", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T19:15:07.420", - "lastModified": "2024-04-17T20:08:21.887", + "lastModified": "2024-07-03T01:54:25.763", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de cross site scripting (XSS) almacenadas en FUDforum v3.1.3 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el campo de declaraciones SQL en /adm/admsql.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/CrownZTX/vulnerabilities/blob/main/fudforum/stored_xss_in_admsql.md", diff --git a/CVE-2024/CVE-2024-309xx/CVE-2024-30951.json b/CVE-2024/CVE-2024-309xx/CVE-2024-30951.json index 330d55e4232..6acc4240cf7 100644 --- a/CVE-2024/CVE-2024-309xx/CVE-2024-30951.json +++ b/CVE-2024/CVE-2024-309xx/CVE-2024-30951.json @@ -2,8 +2,9 @@ "id": "CVE-2024-30951", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T18:15:15.947", - "lastModified": "2024-04-17T20:08:21.887", + "lastModified": "2024-07-03T01:54:26.557", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que FUDforum v3.1.3 conten\u00eda una vulnerabilidad de cross site scripting (XSS) reflejada a trav\u00e9s del par\u00e1metro chpos en /adm/admsmiley.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 0.0, + "baseSeverity": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 0.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/CrownZTX/vulnerabilities/blob/main/fudforum/Reflected_xss_in_FUDforum.md", diff --git a/CVE-2024/CVE-2024-309xx/CVE-2024-30953.json b/CVE-2024/CVE-2024-309xx/CVE-2024-30953.json index d46f982d84f..6a862f5d5f0 100644 --- a/CVE-2024/CVE-2024-309xx/CVE-2024-30953.json +++ b/CVE-2024/CVE-2024-309xx/CVE-2024-30953.json @@ -2,8 +2,9 @@ "id": "CVE-2024-30953", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T19:15:07.470", - "lastModified": "2024-04-17T20:08:21.887", + "lastModified": "2024-07-03T01:54:27.430", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de cross site scripting (XSS) almacenadas en Htmly v2.9.5 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro Nombre del enlace del m\u00f3dulo Editor de men\u00fas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/CrownZTX/vulnerabilities/blob/main/htmly/stored_xss_in_Menueditor.md", diff --git a/CVE-2024/CVE-2024-309xx/CVE-2024-30974.json b/CVE-2024/CVE-2024-309xx/CVE-2024-30974.json index a4c18be72d5..3c357f37549 100644 --- a/CVE-2024/CVE-2024-309xx/CVE-2024-30974.json +++ b/CVE-2024/CVE-2024-309xx/CVE-2024-30974.json @@ -2,8 +2,9 @@ "id": "CVE-2024-30974", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T21:15:08.023", - "lastModified": "2024-04-22T13:28:50.310", + "lastModified": "2024-07-03T01:54:28.233", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La vulnerabilidad de inyecci\u00f3n SQL en autoexpress v.1.3.0 permite a los atacantes ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro carId." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/torchstar/autoexpress/blob/master/buginfodetail.md", diff --git a/CVE-2024/CVE-2024-309xx/CVE-2024-30981.json b/CVE-2024/CVE-2024-309xx/CVE-2024-30981.json index 77189042eb0..bb998a5ca13 100644 --- a/CVE-2024/CVE-2024-309xx/CVE-2024-30981.json +++ b/CVE-2024/CVE-2024-309xx/CVE-2024-30981.json @@ -2,8 +2,9 @@ "id": "CVE-2024-30981", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T17:15:15.193", - "lastModified": "2024-04-17T20:08:21.887", + "lastModified": "2024-07-03T01:54:29.020", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://medium.com/%40shanunirwan/cve-2024-30981-sql-injection-vulnerability-in-cyber-cafe-management-system-using-php-mysql-v1-0-534676f9bdeb", diff --git a/CVE-2024/CVE-2024-309xx/CVE-2024-30982.json b/CVE-2024/CVE-2024-309xx/CVE-2024-30982.json index 34536dfe113..30029baf6b7 100644 --- a/CVE-2024/CVE-2024-309xx/CVE-2024-30982.json +++ b/CVE-2024/CVE-2024-309xx/CVE-2024-30982.json @@ -2,8 +2,9 @@ "id": "CVE-2024-30982", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T18:15:16.037", - "lastModified": "2024-04-17T20:08:21.887", + "lastModified": "2024-07-03T01:54:29.753", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en phpgurukul Cyber Cafe Management System Using PHP & MySQL 1.0 permite a los atacantes ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro upid en el archivo /view-user-detail.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://medium.com/%40shanunirwan/cve-2024-30982-sql-injection-vulnerability-in-cyber-cafe-management-system-using-php-mysql-v1-0-2024a9eed6d7", diff --git a/CVE-2024/CVE-2024-309xx/CVE-2024-30983.json b/CVE-2024/CVE-2024-309xx/CVE-2024-30983.json index cbbc3c4c492..5bf69679ede 100644 --- a/CVE-2024/CVE-2024-309xx/CVE-2024-30983.json +++ b/CVE-2024/CVE-2024-309xx/CVE-2024-30983.json @@ -2,8 +2,9 @@ "id": "CVE-2024-30983", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T17:15:15.257", - "lastModified": "2024-04-17T20:08:21.887", + "lastModified": "2024-07-03T01:54:30.537", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en phpgurukul Cyber Cafe Management System Using PHP & MySQL 1.0 permite a los atacantes ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro compname en el archivo /edit-computer-detail.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://medium.com/%40shanunirwan/cve-2024-30983-sql-injection-vulnerability-in-cyber-cafe-management-system-using-php-mysql-v1-0-e67289ffb08a", diff --git a/CVE-2024/CVE-2024-309xx/CVE-2024-30985.json b/CVE-2024/CVE-2024-309xx/CVE-2024-30985.json index 8c42d524bca..c6cd5cb0358 100644 --- a/CVE-2024/CVE-2024-309xx/CVE-2024-30985.json +++ b/CVE-2024/CVE-2024-309xx/CVE-2024-30985.json @@ -2,8 +2,9 @@ "id": "CVE-2024-30985", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T18:15:16.097", - "lastModified": "2024-04-17T20:08:21.887", + "lastModified": "2024-07-03T01:54:31.323", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en \"B/W Dates Reports\" page in phpgurukul Client Management System using PHP & MySQL 1.1 permite a un atacante ejecutar comandos SQL arbitrarios a trav\u00e9s de los par\u00e1metros \"todate\" y \"fromdate\"." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://medium.com/%40shanunirwan/cve-2024-30985-sql-injection-vulnerability-in-client-management-system-using-php-mysql-1-1-c21fecbda062", diff --git a/CVE-2024/CVE-2024-309xx/CVE-2024-30989.json b/CVE-2024/CVE-2024-309xx/CVE-2024-30989.json index 370dadce14a..2ac19ce59b9 100644 --- a/CVE-2024/CVE-2024-309xx/CVE-2024-30989.json +++ b/CVE-2024/CVE-2024-309xx/CVE-2024-30989.json @@ -2,8 +2,9 @@ "id": "CVE-2024-30989", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T19:15:07.520", - "lastModified": "2024-04-17T20:08:21.887", + "lastModified": "2024-07-03T01:54:32.110", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://medium.com/%40shanunirwan/cve-2024-30989-multiple-stored-cross-site-scripting-vulnerabilities-in-client-management-system-3cfa1c54e4a6", diff --git a/CVE-2024/CVE-2024-309xx/CVE-2024-30990.json b/CVE-2024/CVE-2024-309xx/CVE-2024-30990.json index f68963c6b81..3a3d02671cb 100644 --- a/CVE-2024/CVE-2024-309xx/CVE-2024-30990.json +++ b/CVE-2024/CVE-2024-309xx/CVE-2024-30990.json @@ -2,8 +2,9 @@ "id": "CVE-2024-30990", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T19:15:07.570", - "lastModified": "2024-04-17T20:08:21.887", + "lastModified": "2024-07-03T01:54:32.807", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en the \"Invoices\" page in phpgurukul Client Management System using PHP & MySQL 1.1 permite a un atacante ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro \"datos de b\u00fasqueda\"." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://medium.com/%40shanunirwan/cve-2024-30990-sql-injection-vulnerability-in-invoices-page-of-client-management-system-using-php-58baa94a1761", diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31005.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31005.json index 0ed756bbb8e..63db3903cc1 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31005.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31005.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31005", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-02T08:16:16.147", - "lastModified": "2024-04-02T12:50:42.233", + "lastModified": "2024-07-03T01:54:33.603", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Un problema en Bento4 Bento v.1.6.0-641 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de Ap4MdhdAtom.cpp,AP4_MdhdAtom::AP4_MdhdAtom,mp4fragment" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://github.com/axiomatic-systems/Bento4/issues/941", diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31012.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31012.json index b6bc5cf4d1c..60b30e6f444 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31012.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31012.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31012", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-03T04:15:12.797", - "lastModified": "2024-04-03T12:38:04.840", + "lastModified": "2024-07-03T01:54:33.790", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en SEMCMS v.4.8 que permite a atacantes remotos ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s del archivo upload.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://github.com/ss122-0ss/semcmsv4.8/blob/main/readme.md", diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31031.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31031.json index ff37274ae07..5e0df2dc877 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31031.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31031.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31031", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T19:15:07.623", - "lastModified": "2024-05-03T03:16:28.790", + "lastModified": "2024-07-03T01:54:34.620", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en `coap_pdu.c` en libcoap 4.3.4 permite a los atacantes provocar un comportamiento indefinido a trav\u00e9s de una secuencia de mensajes que conducen a un desbordamiento de enteros sin signo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], "references": [ { "url": "https://github.com/obgm/libcoap/issues/1351", diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31036.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31036.json index e29da7823d3..c7520ad90af 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31036.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31036.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31036", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T22:15:07.400", - "lastModified": "2024-04-23T12:52:26.253", + "lastModified": "2024-07-03T01:54:35.980", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en la funci\u00f3n read_byte en NanoMQ v.0.21.7 permite a los atacantes provocar una denegaci\u00f3n de servicio mediante la transmisi\u00f3n de hexstreams manipulados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://github.com/nanomq/nanomq/issues/1722", diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31040.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31040.json index a2a8445817f..d132b52780f 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31040.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31040.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31040", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T19:15:07.680", - "lastModified": "2024-04-17T20:08:21.887", + "lastModified": "2024-07-03T01:54:37.220", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de desbordamiento de b\u00fafer en la funci\u00f3n get_var_integer en mqtt_parser.c en NanoMQ 0.21.7 permite a atacantes remotos provocar una denegaci\u00f3n de servicio a trav\u00e9s de una serie de hexstreams especialmente manipulados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 2.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/nanomq/nanomq/issues/1720", diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31062.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31062.json index b48f7e377c0..941771b5f77 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31062.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31062.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31062", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T19:15:48.947", - "lastModified": "2024-03-28T20:53:20.813", + "lastModified": "2024-07-03T01:54:38.023", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de cross-site scripting en Insurance Mangement System v.1.0.0 y anteriores permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del campo de entrada Street." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], "references": [ { "url": "https://github.com/sahildari/cve/blob/master/CVE-2024-31062.md", diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31340.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31340.json index 05dbe51b2cb..e407efca1e0 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31340.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31340.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31340", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-05-22T06:15:12.350", - "lastModified": "2024-05-22T12:46:53.887", + "lastModified": "2024-07-03T01:54:45.633", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Las versiones de TP-Link Tether anteriores a 4.5.13 y las versiones de TP-Link Tapo anteriores a 3.3.6 no validan correctamente los certificados, lo que puede permitir que un atacante remoto no autenticado escuche a escondidas una comunicaci\u00f3n cifrada a trav\u00e9s de un ataque de intermediario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://jvn.jp/en/jp/JVN29471697/", diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31397.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31397.json index f3221536d00..fdacf1e512b 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31397.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31397.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31397", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-06-11T06:15:10.057", - "lastModified": "2024-06-11T13:54:12.057", + "lastModified": "2024-07-03T01:54:48.070", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Existe un problema de manejo inadecuado de valores adicionales en Cybozu Garoon 5.0.0 a 5.15.2. Si se explota esta vulnerabilidad, un usuario que pueda iniciar sesi\u00f3n en el producto con privilegios administrativos puede provocar una condici\u00f3n de denegaci\u00f3n de servicio (DoS)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-231" + } + ] + } + ], "references": [ { "url": "https://cs.cybozu.co.jp/2024/007901.html", diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31401.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31401.json index 966f3d32620..ace3901d882 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31401.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31401.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31401", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-06-11T05:15:53.320", - "lastModified": "2024-06-11T13:54:12.057", + "lastModified": "2024-07-03T01:54:49.037", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de Cross-Site Scripting en Cybozu Garoon 5.0.0 a 5.15.2 permite a un atacante remoto autenticado con privilegios administrativos inyectar un script arbitrario en el navegador web del usuario que inicia sesi\u00f3n en el producto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://cs.cybozu.co.jp/2024/007901.html", diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31403.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31403.json index 6ad55a595f1..ad9ec8dd3ae 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31403.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31403.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31403", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-06-11T05:15:53.397", - "lastModified": "2024-06-11T13:54:12.057", + "lastModified": "2024-07-03T01:54:49.817", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de autorizaci\u00f3n incorrecta en Cybozu Garoon 5.0.0 a 6.0.0 permite a un atacante autenticado remoto alterar y/u obtener los datos de Memo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://cs.cybozu.co.jp/2024/007901.html", diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31413.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31413.json index 49d08482365..e78bae93491 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31413.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31413.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31413", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-05-01T13:15:52.080", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-07-03T01:54:50.813", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Existe una vulnerabilidad libre de puntero que no est\u00e1 al inicio del b\u00fafer en CX-One CX-One CXONE-AL[][]D-V4 (la versi\u00f3n que se instal\u00f3 con un DVD versi\u00f3n 4.61.1 o inferior y se actualiz\u00f3 a trav\u00e9s de CX- Una actualizaci\u00f3n autom\u00e1tica de V4 en enero de 2024 o antes) y Sysmac Studio SYSMAC-SE2[][][] (la versi\u00f3n que se instal\u00f3 con un DVD versi\u00f3n 1.56 o anterior y se actualiz\u00f3 mediante la actualizaci\u00f3n autom\u00e1tica de Sysmac Studio V1 en enero de 2024 o antes). previo). Abrir un archivo de proyecto especialmente manipulado puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://jvn.jp/en/vu/JVNVU98274902/", diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31466.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31466.json index f90fb7bf04e..23ea4c8eba8 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31466.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31466.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31466", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-05-14T22:15:09.777", - "lastModified": "2024-05-15T16:40:19.330", + "lastModified": "2024-07-03T01:54:52.503", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-006.txt", diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31467.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31467.json index eab58e7b776..a3cd05cee0b 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31467.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31467.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31467", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-05-14T23:15:08.250", - "lastModified": "2024-05-15T16:40:19.330", + "lastModified": "2024-07-03T01:54:53.180", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-006.txt", diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31468.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31468.json index 44c2edea902..6ec226a599a 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31468.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31468.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31468", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-05-14T23:15:08.870", - "lastModified": "2024-05-15T16:40:19.330", + "lastModified": "2024-07-03T01:54:53.860", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-006.txt", diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31469.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31469.json index 375d5fb5746..e11afe8ac09 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31469.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31469.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31469", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-05-14T23:15:09.153", - "lastModified": "2024-05-15T16:40:19.330", + "lastModified": "2024-07-03T01:54:54.540", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-006.txt", diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31470.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31470.json index aa590a225cf..b16b7d948ce 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31470.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31470.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31470", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-05-14T23:15:09.443", - "lastModified": "2024-05-15T16:40:19.330", + "lastModified": "2024-07-03T01:54:55.227", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-006.txt", diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31471.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31471.json index 959b5a67716..b45252a1e8d 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31471.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31471.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31471", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-05-14T23:15:09.753", - "lastModified": "2024-05-15T16:40:19.330", + "lastModified": "2024-07-03T01:54:55.993", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-006.txt", diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31472.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31472.json index 34391712d9c..e3f25d8a1e3 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31472.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31472.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31472", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-05-14T23:15:10.020", - "lastModified": "2024-05-15T16:40:19.330", + "lastModified": "2024-07-03T01:54:56.687", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-006.txt", diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31474.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31474.json index 78b797261d9..71cd5c5539c 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31474.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31474.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31474", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-05-14T23:15:10.560", - "lastModified": "2024-05-15T16:40:19.330", + "lastModified": "2024-07-03T01:54:57.453", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-463" + } + ] + } + ], "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-006.txt", diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31475.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31475.json index 5cfce0b68ec..e97b0e85415 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31475.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31475.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31475", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-05-14T23:15:10.870", - "lastModified": "2024-05-15T16:40:19.330", + "lastModified": "2024-07-03T01:54:58.147", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-463" + } + ] + } + ], "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-006.txt", diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31476.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31476.json index 4cd080e3b7f..d9bec85f7ff 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31476.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31476.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31476", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-05-14T23:15:11.150", - "lastModified": "2024-05-15T16:40:19.330", + "lastModified": "2024-07-03T01:54:58.830", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-006.txt", diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31477.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31477.json index 16761d647d5..1fd4347d04e 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31477.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31477.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31477", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-05-14T23:15:11.423", - "lastModified": "2024-05-15T16:40:19.330", + "lastModified": "2024-07-03T01:54:59.510", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-006.txt", diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31478.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31478.json index 184ccb0f462..a5aff0566ad 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31478.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31478.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31478", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-05-14T23:15:11.710", - "lastModified": "2024-05-15T16:40:19.330", + "lastModified": "2024-07-03T01:55:00.270", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-006.txt", diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31479.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31479.json index 43cfb26a67e..3e36006b971 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31479.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31479.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31479", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-05-14T23:15:11.997", - "lastModified": "2024-05-15T16:40:19.330", + "lastModified": "2024-07-03T01:55:01.120", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-006.txt", diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31480.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31480.json index 47898fae529..abda59b232e 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31480.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31480.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31480", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-05-14T23:15:12.363", - "lastModified": "2024-05-15T16:40:19.330", + "lastModified": "2024-07-03T01:55:01.950", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-006.txt", diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31481.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31481.json index a925d88cf2a..648b3f5ba8e 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31481.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31481.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31481", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-05-14T23:15:12.593", - "lastModified": "2024-05-15T16:40:19.330", + "lastModified": "2024-07-03T01:55:02.813", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-006.txt", diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31482.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31482.json index 441b4481298..4775c8944d3 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31482.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31482.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31482", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-05-14T23:15:12.843", - "lastModified": "2024-05-15T16:40:19.330", + "lastModified": "2024-07-03T01:55:03.583", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-006.txt", diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31502.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31502.json index 12056127dec..55487c797f9 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31502.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31502.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31502", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-26T21:15:49.140", - "lastModified": "2024-04-29T12:42:03.667", + "lastModified": "2024-07-03T01:55:04.920", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en Insurance Management System v.1.0.0 y anteriores permite a un atacante remoto escalar privilegios mediante una solicitud POST manipulada a /admin/core/new_staff." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://github.com/sahildari/cve/blob/master/CVE-2024-31502.md", diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31510.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31510.json index 622cfbbf155..44df0b472c2 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31510.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31510.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31510", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-24T15:15:23.587", - "lastModified": "2024-05-24T18:09:20.027", + "lastModified": "2024-07-03T01:55:05.800", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,46 @@ "value": "Un problema en Open Quantum Safe liboqs v.10.0 permite a un atacante remoto escalar privilegios a trav\u00e9s del par\u00e1metro crypto_sign_signature en el componente /pqcrystals-dilithium-standard_ml-dsa-44-ipd_avx2/sign.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1319" + }, + { + "lang": "en", + "value": "CWE-327" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/liang-junkai/a9fc693f8bdf176e9d9f56773bf20703", diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31544.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31544.json index e6faac35841..49d86b820cb 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31544.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31544.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31544", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-09T13:15:33.557", - "lastModified": "2024-04-10T13:24:22.187", + "lastModified": "2024-07-03T01:55:06.580", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de cross-site scripting (XSS) almacenado en Computer Laboratory Management System v1.0 permite a los atacantes ejecutar c\u00f3digo JavaScript arbitrario al incluir payloads maliciosos en los par\u00e1metros \"remarks\", \"borrower_name\", \"faculty_department\" en /classes/Master.php? f=save_record." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/emirhanmtl/vuln-research/blob/main/Stored-XSS-Computer-Laboratory-Management-System-PoC.md", diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31545.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31545.json index 5dd258ed67a..8935c05fa45 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31545.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31545.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31545", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T19:15:46.627", - "lastModified": "2024-04-22T19:24:06.727", + "lastModified": "2024-07-03T01:55:07.333", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Computer Laboratory Management System v1.0 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro \"id\" de /admin/?page=user/manage_user&id=6." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 9.4, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/emirhanmtl/vuln-research/blob/main/SQLi-4-Computer-Laboratory-Management-System-PoC.md", diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31546.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31546.json index 0d5acc79279..bf6f7e94063 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31546.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31546.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31546", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T18:15:08.887", - "lastModified": "2024-04-19T18:29:53.040", + "lastModified": "2024-07-03T01:55:08.090", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Computer Laboratory Management System v1.0 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro \"id\" de /admin/damage/view_damage.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/emirhanmtl/vuln-research/blob/main/SQLi-2-Computer-Laboratory-Management-System-PoC.md", diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31547.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31547.json index 5ffa04e1925..6b3932253b7 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31547.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31547.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31547", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T18:15:08.940", - "lastModified": "2024-04-19T18:29:53.040", + "lastModified": "2024-07-03T01:55:08.870", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Computer Laboratory Management System v1.0 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro \"id\" de /admin/item/view_item.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/emirhanmtl/vuln-research/blob/main/SQLi-3-Computer-Laboratory-Management-System-PoC.md", diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31552.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31552.json index 5b7423ed03a..1f29058237c 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31552.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31552.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31552", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T17:15:54.847", - "lastModified": "2024-04-19T18:29:53.040", + "lastModified": "2024-07-03T01:55:09.627", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La versi\u00f3n CuteHttpFileServer v.3.1 tiene una vulnerabilidad de descarga de archivos arbitrarios, que permite a los atacantes descargar archivos arbitrarios en el servidor y obtener informaci\u00f3n confidencial." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://www.yuque.com/sickle-ffnce/awixr8/gsu7nyi0gu9q1nl8", diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31556.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31556.json index ae8b2c2578c..31718b7750f 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31556.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31556.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31556", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T21:15:12.060", - "lastModified": "2024-05-15T16:40:19.330", + "lastModified": "2024-07-03T01:55:10.450", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en Reportico Web anterior a v.8.1.0 permite a un atacante local ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s de la funci\u00f3n sessionid." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://github.com/reportico-web/reportico/issues/53", diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31578.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31578.json index 0936313e539..2eb48e0509e 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31578.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31578.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31578", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T14:15:08.563", - "lastModified": "2024-06-10T18:15:31.253", + "lastModified": "2024-07-03T01:55:11.213", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que la versi\u00f3n n6.1.1 de FFmpeg conten\u00eda un heap use-after-free a trav\u00e9s de la funci\u00f3n av_hwframe_ctx_init." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/1047524396/45400cce5859d78dcd3a62010df8d179", diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31580.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31580.json index a8a4da15c34..013ee9a828d 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31580.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31580.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31580", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T19:15:07.783", - "lastModified": "2024-04-17T20:08:21.887", + "lastModified": "2024-07-03T01:55:11.977", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/1047524396/038c78f2f007345e6f497698ace2aa3d", diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31583.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31583.json index e7f69fb8f8c..0b037c0e3e3 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31583.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31583.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31583", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T19:15:07.950", - "lastModified": "2024-04-17T20:08:21.887", + "lastModified": "2024-07-03T01:55:12.663", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que Pytorch anterior a la versi\u00f3n v2.2.0 conten\u00eda una vulnerabilidad de use-after-free en torch/csrc/jit/mobile/interpreter.cpp." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/1047524396/43e19a41f2b36503a4a228c32cdbc176", diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31584.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31584.json index 5ed3a622624..98bbd09abd1 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31584.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31584.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31584", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T21:15:08.080", - "lastModified": "2024-04-22T13:28:50.310", + "lastModified": "2024-07-03T01:55:13.417", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Pytorch anterior a v2.2.0 tiene una vulnerabilidad de lectura fuera de los l\u00edmites a trav\u00e9s del componente torch/csrc/jit/mobile/flatbuffer_loader.cpp." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://github.com/pytorch/pytorch/blob/v2.1.2/torch/csrc/jit/mobile/flatbuffer_loader.cpp#L305", diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31586.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31586.json index 121abdc48d1..ebc6f773d15 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31586.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31586.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31586", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-20T21:15:49.843", - "lastModified": "2024-06-21T11:22:01.687", + "lastModified": "2024-07-03T01:55:14.213", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Existe una vulnerabilidad de Cross Site Scripting (XSS) en la versi\u00f3n 1.0 de Computer Laboratory Management System. Esta vulnerabilidad permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de los par\u00e1metros Nombre del prestatario, Departamento y Comentarios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/CyberSentryX/CVE_Hunting/tree/main/CVE-2024-31586", diff --git a/CVE-2024/CVE-2024-316xx/CVE-2024-31615.json b/CVE-2024/CVE-2024-316xx/CVE-2024-31615.json index 316d507adec..46dd1045168 100644 --- a/CVE-2024/CVE-2024-316xx/CVE-2024-31615.json +++ b/CVE-2024/CVE-2024-316xx/CVE-2024-31615.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31615", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-25T20:15:07.147", - "lastModified": "2024-04-26T12:58:17.720", + "lastModified": "2024-07-03T01:55:14.960", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "ThinkCMF 6.0.9 es vulnerable a la carga de archivos a trav\u00e9s de UeditorController.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://github.com/huajiuqi/bug/blob/main/%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md", diff --git a/CVE-2024/CVE-2024-316xx/CVE-2024-31616.json b/CVE-2024/CVE-2024-316xx/CVE-2024-31616.json index 14c95dad435..c165c951259 100644 --- a/CVE-2024/CVE-2024-316xx/CVE-2024-31616.json +++ b/CVE-2024/CVE-2024-316xx/CVE-2024-31616.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31616", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-23T22:15:07.200", - "lastModified": "2024-04-24T13:39:42.883", + "lastModified": "2024-07-03T01:55:15.753", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema descubierto en los routers RG-RSR10-01G-T(W)-S y RG-RSR10-01G-T(WA)-S con la versi\u00f3n de firmware RSR10-01G-T-S_RSR_3.0(1)B9P2, versi\u00f3n (07150910) ) permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s del archivo common_quick_config.lua." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-790" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Swind1er/0c50e72428059fb72a4fd4d31c43f883", diff --git a/CVE-2024/CVE-2024-316xx/CVE-2024-31636.json b/CVE-2024/CVE-2024-316xx/CVE-2024-31636.json index 07f98fc9faf..adb1551291c 100644 --- a/CVE-2024/CVE-2024-316xx/CVE-2024-31636.json +++ b/CVE-2024/CVE-2024-316xx/CVE-2024-31636.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31636", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-03T17:15:07.687", - "lastModified": "2024-05-06T12:44:56.377", + "lastModified": "2024-07-03T01:55:16.580", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en LIEF v.0.14.1 permite a un atacante local obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro de nombre del componente machd_reader.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.9, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.3, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-457" + } + ] + } + ], "references": [ { "url": "http://lief.com", diff --git a/CVE-2024/CVE-2024-316xx/CVE-2024-31650.json b/CVE-2024/CVE-2024-316xx/CVE-2024-31650.json index 7e331aa3d03..3476157bffa 100644 --- a/CVE-2024/CVE-2024-316xx/CVE-2024-31650.json +++ b/CVE-2024/CVE-2024-316xx/CVE-2024-31650.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31650", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-15T21:15:07.593", - "lastModified": "2024-04-16T13:24:07.103", + "lastModified": "2024-07-03T01:55:17.350", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Cross-site scripting (XSS) en Cosmetics and Beauty Product Online Store v1.0 permite a los atacantes ejecutar scripts web o HTML arbitrario a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro Apellido." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.6, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-31650.md", diff --git a/CVE-2024/CVE-2024-317xx/CVE-2024-31714.json b/CVE-2024/CVE-2024-317xx/CVE-2024-31714.json index 0eeb0009298..12a4e18c039 100644 --- a/CVE-2024/CVE-2024-317xx/CVE-2024-31714.json +++ b/CVE-2024/CVE-2024-317xx/CVE-2024-31714.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31714", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-20T18:15:10.330", - "lastModified": "2024-05-20T19:34:58.277", + "lastModified": "2024-07-03T01:55:18.240", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " Vulnerabilidad de desbordamiento del b\u00fafer en Waxlab Wax v.0.9-3 y anteriores permite a un atacante provocar una denegaci\u00f3n de servicio a trav\u00e9s del componente de la librer\u00eda Lua." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/lakemoon602/vuln/blob/main/wax.md", diff --git a/CVE-2024/CVE-2024-317xx/CVE-2024-31744.json b/CVE-2024/CVE-2024-317xx/CVE-2024-31744.json index 14866ee9a85..b0e37181f90 100644 --- a/CVE-2024/CVE-2024-317xx/CVE-2024-31744.json +++ b/CVE-2024/CVE-2024-317xx/CVE-2024-31744.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31744", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T13:15:13.500", - "lastModified": "2024-04-19T16:19:49.043", + "lastModified": "2024-07-03T01:55:18.993", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En Jasper 4.2.2, la funci\u00f3n jpc_streamlist_remove en src/libjasper/jpc/jpc_dec.c:2407 tiene una vulnerabilidad de falla de aserci\u00f3n, lo que permite a los atacantes provocar un ataque de denegaci\u00f3n de servicio a trav\u00e9s de un archivo de imagen espec\u00edfico." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] + } + ], "references": [ { "url": "https://github.com/jasper-software/jasper/commit/6d084c53a77762f41bb5310713a5f1872fef55f5", diff --git a/CVE-2024/CVE-2024-317xx/CVE-2024-31750.json b/CVE-2024/CVE-2024-317xx/CVE-2024-31750.json index 730dfa9ebf3..9ef816097e9 100644 --- a/CVE-2024/CVE-2024-317xx/CVE-2024-31750.json +++ b/CVE-2024/CVE-2024-317xx/CVE-2024-31750.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31750", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T00:15:10.690", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-07-03T01:55:19.837", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en f-logic datacube3 v.1.0 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro req_id." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/lampSEC/semcms/blob/main/datacube3.md", diff --git a/CVE-2024/CVE-2024-317xx/CVE-2024-31755.json b/CVE-2024/CVE-2024-317xx/CVE-2024-31755.json index fd751ad5061..3724cc53074 100644 --- a/CVE-2024/CVE-2024-317xx/CVE-2024-31755.json +++ b/CVE-2024/CVE-2024-317xx/CVE-2024-31755.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31755", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-26T03:15:06.690", - "lastModified": "2024-04-26T12:58:17.720", + "lastModified": "2024-07-03T01:55:20.690", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que cJSON v1.7.17 contiene una infracci\u00f3n de segmentaci\u00f3n, que puede activarse a trav\u00e9s del segundo par\u00e1metro de la funci\u00f3n cJSON_SetValuestring en cJSON.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 7.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://github.com/DaveGamble/cJSON/issues/839", diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31801.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31801.json index 0e5e8dc173a..19704bb6b1d 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31801.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31801.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31801", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T20:15:08.453", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-07-03T01:55:21.550", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de Directory Traversal en NEXSYS-ONE anterior a v.Rev.15320 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de una solicitud manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://dishdev.nexsysone.com/nexsysonev3/", diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31804.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31804.json index e0223643c77..71e352aea21 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31804.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31804.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31804", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-23T15:15:49.750", - "lastModified": "2024-04-24T13:39:42.883", + "lastModified": "2024-07-03T01:55:22.410", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de ruta de servicio sin comillas en Terratec DMX_6Fire USB v.1.23.0.02 permite a un atacante local escalar privilegios a trav\u00e9s del componente Program.exe." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 0.0, + "baseSeverity": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 0.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-428" + } + ] + } + ], "references": [ { "url": "https://medium.com/%40kobbycyber/terratec-dmx-6fire-usb-unquoted-service-path-cve-2024-31804-70cced459202", diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31810.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31810.json index 4ca33d90865..5083e18633e 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31810.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31810.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31810", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:25:45.230", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:55:23.187", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-259" + } + ] + } + ], "references": [ { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/HardCode/HardCode.md", diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31818.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31818.json index 4d9372b79c3..ce31fc4a6dd 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31818.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31818.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31818", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-12T13:15:20.590", - "lastModified": "2024-04-15T13:15:51.577", + "lastModified": "2024-07-03T01:55:23.933", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La vulnerabilidad de Directory Traversal en DerbyNet v.9.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro de p\u00e1gina del componente kiosk.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://chocapikk.com/posts/2024/derbynet-vulnerabilities/", diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31821.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31821.json index f0cb3548010..63f57ea1c4f 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31821.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31821.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31821", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T18:15:07.747", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-07-03T01:55:24.693", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en el commit Ecommerce-CodeIgniter-Bootstrap v. d22b54e8915f167a135046ceb857caaf8479c4da permite a un atacante remoto ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s del m\u00e9todo ManageQuantitiesAndProcurement del componente Orders_model.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/LioTree/5c963a37e2c335c22e74ca3d9aea32bb", diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31823.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31823.json index 42b44374768..aabbfc3b7f4 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31823.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31823.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31823", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T18:15:07.880", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-07-03T01:55:25.480", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en el commit Ecommerce-CodeIgniter-Bootstrap v. d22b54e8915f167a135046ceb857caaf8479c4da permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del m\u00e9todo removeSecondaryImage del componente Publish.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/LioTree/4989e0f20b6a885604dd3178fa4b66b5", diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31828.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31828.json index 4bc18baaac6..172699ae6a5 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31828.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31828.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31828", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-26T22:15:08.200", - "lastModified": "2024-04-29T12:42:03.667", + "lastModified": "2024-07-03T01:55:26.250", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La vulnerabilidad de cross site scripting en Lavalite CMS v.10.1.0 permite a los atacantes ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s de un payload manipulado en la URL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://jinmu1108.github.io/uncategorized/CVE-2024-31828/", diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31841.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31841.json index f996d28f3df..ecc74ef00eb 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31841.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31841.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31841", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T16:15:10.427", - "lastModified": "2024-04-19T16:19:49.043", + "lastModified": "2024-07-03T01:55:27.077", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en Italtel Embrace 1.6.4. El servidor web no puede sanitizar los datos de entrada, lo que permite a atacantes remotos no autenticados leer archivos arbitrarios en el sistema de archivos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "https://www.gruppotim.it/it/footer/red-team.html", diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31843.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31843.json index e8ac105f800..b0aa295d50d 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31843.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31843.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31843", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-23T19:16:01.210", - "lastModified": "2024-05-24T01:15:30.977", + "lastModified": "2024-07-03T01:55:27.880", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en Italtel Embrace 1.6.4. La aplicaci\u00f3n web no verifica adecuadamente los par\u00e1metros enviados como entrada antes de procesarlos en el lado del servidor. Esto permite a los usuarios autenticados ejecutar comandos en el sistema operativo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://www.gruppotim.it/it/footer/red-team.html", diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31845.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31845.json index 362ce3897c0..7fd0d7a60c3 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31845.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31845.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31845", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-21T16:15:26.103", - "lastModified": "2024-05-21T16:53:56.550", + "lastModified": "2024-07-03T01:55:28.633", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en Italtel Embrace 1.6.4. El producto no neutraliza o neutraliza incorrectamente la salida escrita en los registros. La aplicaci\u00f3n web escribe registros utilizando un par\u00e1metro de cadena de consulta GET. Este par\u00e1metro puede ser modificado por un atacante, de modo que cada acci\u00f3n que realice se atribuya a un usuario diferente. Esto se puede explotar sin autenticaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-117" + } + ] + } + ], "references": [ { "url": "https://www.gruppotim.it/it/footer/red-team.html", diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31846.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31846.json index ccfc7718b98..bfa6a2bd61c 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31846.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31846.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31846", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T16:15:10.483", - "lastModified": "2024-04-19T16:19:49.043", + "lastModified": "2024-07-03T01:55:29.393", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en Italtel Embrace 1.6.4. La aplicaci\u00f3n web no restringe o restringe incorrectamente el acceso a un recurso por parte de un actor no autorizado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://www.gruppotim.it/it/footer/red-team.html", diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31857.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31857.json index 316ea3e351f..6973e345ca2 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31857.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31857.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31857", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-04-23T05:15:49.377", - "lastModified": "2024-04-23T12:52:09.397", + "lastModified": "2024-07-03T01:55:30.363", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Forminator anterior a 1.15.4 contiene una vulnerabilidad de Cross Site Scripting. Si se explota esta vulnerabilidad, un atacante remoto puede obtener informaci\u00f3n del usuario, etc. y alterar el contenido de la p\u00e1gina en el navegador web del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/jp/JVN50132400/", diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31860.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31860.json index 8f5a0fb257b..62ded0a090c 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31860.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31860.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31860", "sourceIdentifier": "security@apache.org", "published": "2024-04-09T09:15:26.293", - "lastModified": "2024-05-01T18:15:23.393", + "lastModified": "2024-07-03T01:55:31.267", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Vulnerabilidad de validaci\u00f3n de entrada incorrecta en Apache Zeppelin. Al agregar indicadores de ruta relativa (por ejemplo .. ), los atacantes pueden ver el contenido de cualquier archivo en el sistema de archivos al que pueda acceder la cuenta del servidor. Este problema afecta a Apache Zeppelin: desde 0.9.0 antes de 0.11.0. Se recomienda a los usuarios actualizar a la versi\u00f3n 0.11.0, que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31865.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31865.json index 034497fe0ad..076d550cef4 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31865.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31865.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31865", "sourceIdentifier": "security@apache.org", "published": "2024-04-09T16:15:08.213", - "lastModified": "2024-05-01T18:15:23.627", + "lastModified": "2024-07-03T01:55:31.473", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Vulnerabilidad de validaci\u00f3n de entrada incorrecta en Apache Zeppelin. Los atacantes pueden solicitar la actualizaci\u00f3n de la API cron con privilegios no v\u00e1lidos o inadecuados para que el port\u00e1til pueda ejecutarse con esos privilegios. Este problema afecta a Apache Zeppelin: desde 0.8.2 antes de 0.11.1. Se recomienda a los usuarios actualizar a la versi\u00f3n 0.11.1, que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31948.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31948.json index 32be8ced870..1194300f75b 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31948.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31948.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31948", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-07T21:15:07.423", - "lastModified": "2024-04-28T07:15:08.843", + "lastModified": "2024-07-03T01:55:34.387", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En FRRouting (FRR) hasta 9.1, un atacante que utiliza un atributo SID de prefijo con formato incorrecto en un paquete de BGP UPDATE puede provocar que el daemon bgpd falle." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1287" + } + ] + } + ], "references": [ { "url": "https://github.com/FRRouting/frr/pull/15628", diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31953.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31953.json index 30bb048bae7..04499620021 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31953.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31953.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31953", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:27:50.960", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:55:35.270", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-31953/", diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31954.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31954.json index 3d0bf126a5b..15e63f5987c 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31954.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31954.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31954", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:30:12.197", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:55:35.973", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-538" + } + ] + } + ], "references": [ { "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-31954/", diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31961.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31961.json index d0f8a608d84..6987c259b83 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31961.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31961.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31961", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-08T16:15:08.960", - "lastModified": "2024-05-08T17:05:24.083", + "lastModified": "2024-07-03T01:55:36.730", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n SQL en unit.php en Sonic Shopfloor.guide anterior a 3.1.3 permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s del par\u00e1metro nivel2." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://bugs.sonic-technology.com/cve-2024-31961.html", diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31963.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31963.json index c8c3159f3ce..3960b114977 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31963.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31963.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31963", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-02T16:15:07.863", - "lastModified": "2024-05-03T17:15:07.743", + "lastModified": "2024-07-03T01:55:37.503", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad en los tel\u00e9fonos SIP Mitel de las series 6800 y 6900, incluida la unidad de conferencia 6970, hasta 6.3 SP3 HF4, permite a un atacante autenticado llevar a cabo un ataque de desbordamiento del b\u00fafer debido a una comprobaci\u00f3n de los l\u00edmites y una sanitizaci\u00f3n de entrada insuficientes. Un exploit exitoso podr\u00eda permitir que un atacante provoque una denegaci\u00f3n de servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0006", diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31964.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31964.json index 09d9c315ccd..3cece2f4ba7 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31964.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31964.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31964", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-02T16:15:07.913", - "lastModified": "2024-05-03T17:15:07.803", + "lastModified": "2024-07-03T01:55:38.253", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad en los tel\u00e9fonos SIP Mitel de las series 6800 y 6900, incluida la unidad de conferencia 6970, hasta 6.3 SP3 HF4, permite a un atacante no autenticado llevar a cabo un ataque de omisi\u00f3n de autenticaci\u00f3n debido a un control de autenticaci\u00f3n inadecuado. Un exploit exitoso podr\u00eda permitir a un atacante modificar la configuraci\u00f3n del sistema y potencialmente causar una denegaci\u00f3n de servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0007", diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31965.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31965.json index 20e794770e8..8f511a09e20 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31965.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31965.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31965", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-02T16:15:07.973", - "lastModified": "2024-05-03T17:15:07.850", + "lastModified": "2024-07-03T01:55:39.003", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,46 @@ "value": "Una vulnerabilidad en los tel\u00e9fonos SIP Mitel de las series 6800 y 6900, incluida la unidad de conferencia 6970, hasta 6.3 SP3 HF4, permite a un atacante autenticado con privilegios administrativos realizar un ataque de path traversal debido a una validaci\u00f3n de entrada insuficiente. Un exploit exitoso podr\u00eda permitir a un atacante acceder a informaci\u00f3n confidencial." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + }, + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0008", diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31966.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31966.json index dd07a0b1ec9..ec7f4705e98 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31966.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31966.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31966", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-02T16:15:08.020", - "lastModified": "2024-05-03T17:15:07.893", + "lastModified": "2024-07-03T01:55:39.753", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad en los tel\u00e9fonos SIP Mitel de las series 6800 y 6900, incluida la unidad de conferencia 6970, hasta 6.3 SP3 HF4, permite a un atacante autenticado con privilegios administrativos realizar un ataque de inyecci\u00f3n de argumentos debido a una sanitizaci\u00f3n insuficiente de los par\u00e1metros. Un exploit exitoso podr\u00eda permitir a un atacante acceder a informaci\u00f3n confidencial, modificar la configuraci\u00f3n del sistema o ejecutar comandos arbitrarios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-88" + } + ] + } + ], "references": [ { "url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0009", diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31967.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31967.json index af390138992..daa64350f3a 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31967.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31967.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31967", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-02T16:15:08.073", - "lastModified": "2024-05-03T17:15:07.947", + "lastModified": "2024-07-03T01:55:40.527", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad en los tel\u00e9fonos SIP Mitel de las series 6800 y 6900, incluida la unidad de conferencia 6970, hasta 6.3 SP3 HF4, permite que un atacante no autenticado lleve a cabo un ataque de acceso no autorizado debido a un control de acceso inadecuado. Un exploit exitoso podr\u00eda permitir a un atacante obtener acceso no autorizado a la informaci\u00f3n del usuario o a la configuraci\u00f3n del sistema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0010", diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31974.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31974.json index 8ec17c76cf0..93ad7f7c41c 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31974.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31974.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31974", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-17T16:15:07.883", - "lastModified": "2024-05-17T18:35:35.070", + "lastModified": "2024-07-03T01:55:41.323", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " La aplicaci\u00f3n com.solarized.firedown (tambi\u00e9n conocida como Solarized FireDown Browser & Downloader) versi\u00f3n 1.0.76 para Android permite a un atacante remoto ejecutar c\u00f3digo JavaScript arbitrario mediante una intenci\u00f3n dise\u00f1ada. com.solarized.firedown.IntentActivity utiliza un componente WebView para mostrar contenido web y no sanitiza adecuadamente el URI ni ning\u00fan dato adicional pasado en el intent por ninguna aplicaci\u00f3n instalada (sin permisos)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/actuator/com.solarized.firedown/blob/main/CVE-2024-31974", diff --git a/CVE-2024/CVE-2024-320xx/CVE-2024-32025.json b/CVE-2024/CVE-2024-320xx/CVE-2024-32025.json index 7ac926edf71..17250b5f3e8 100644 --- a/CVE-2024/CVE-2024-320xx/CVE-2024-32025.json +++ b/CVE-2024/CVE-2024-320xx/CVE-2024-32025.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32025", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-16T15:15:37.467", - "lastModified": "2024-04-19T17:15:54.903", + "lastModified": "2024-07-03T01:55:43.420", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-320xx/CVE-2024-32051.json b/CVE-2024/CVE-2024-320xx/CVE-2024-32051.json index 11792dfe97b..05cba28f437 100644 --- a/CVE-2024/CVE-2024-320xx/CVE-2024-32051.json +++ b/CVE-2024/CVE-2024-320xx/CVE-2024-32051.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32051", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-04-24T06:15:14.040", - "lastModified": "2024-04-24T13:39:42.883", + "lastModified": "2024-07-03T01:55:45.237", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,46 @@ "value": "El problema de inserci\u00f3n de informaci\u00f3n confidencial en el archivo de registro existe en RoamWiFi R10 antes de 4.8.45. Si se explota esta vulnerabilidad, un atacante no autenticado adyacente a la red con acceso al dispositivo puede obtener informaci\u00f3n confidencial." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + }, + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/jp/JVN62737544/", diff --git a/CVE-2024/CVE-2024-321xx/CVE-2024-32161.json b/CVE-2024/CVE-2024-321xx/CVE-2024-32161.json index 5c946e0a2bb..c8a7b5e0562 100644 --- a/CVE-2024/CVE-2024-321xx/CVE-2024-32161.json +++ b/CVE-2024/CVE-2024-321xx/CVE-2024-32161.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32161", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T18:15:16.337", - "lastModified": "2024-04-17T20:08:21.887", + "lastModified": "2024-07-03T01:55:49.600", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "jizhiCMS 2.5 sufre una vulnerabilidad de carga de archivos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "http://jizhicms.com", diff --git a/CVE-2024/CVE-2024-321xx/CVE-2024-32163.json b/CVE-2024/CVE-2024-321xx/CVE-2024-32163.json index a245c6f1684..ed1ab47f44a 100644 --- a/CVE-2024/CVE-2024-321xx/CVE-2024-32163.json +++ b/CVE-2024/CVE-2024-321xx/CVE-2024-32163.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32163", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T19:15:08.117", - "lastModified": "2024-04-17T20:08:21.887", + "lastModified": "2024-07-03T01:55:50.383", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "CMSeasy 7.7.7.9 es vulnerable a la ejecuci\u00f3n de c\u00f3digo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://github.com/XiLitter/CMS_vulnerability-discovery/blob/main/CMSeasy_7.7.7.9_code_execution.md", diff --git a/CVE-2024/CVE-2024-322xx/CVE-2024-32206.json b/CVE-2024/CVE-2024-322xx/CVE-2024-32206.json index aa080851f51..8c3698643f4 100644 --- a/CVE-2024/CVE-2024-322xx/CVE-2024-32206.json +++ b/CVE-2024/CVE-2024-322xx/CVE-2024-32206.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32206", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T16:15:10.827", - "lastModified": "2024-04-19T16:19:49.043", + "lastModified": "2024-07-03T01:55:51.200", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de Cross Site Scripting (XSS) almacenadas en el componente \\affiche\\admin\\index.php de WUZHICMS v4.1.0 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro $formdata." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "http://wuzhicms.com", diff --git a/CVE-2024/CVE-2024-322xx/CVE-2024-32211.json b/CVE-2024/CVE-2024-322xx/CVE-2024-32211.json index b93f0b7db43..16456135449 100644 --- a/CVE-2024/CVE-2024-322xx/CVE-2024-32211.json +++ b/CVE-2024/CVE-2024-322xx/CVE-2024-32211.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32211", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T18:15:23.987", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-07-03T01:55:51.973", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en LOGINT LoMag Inventory Management v1.0.20.120 y anteriores permite a un atacante local obtener informaci\u00f3n confidencial a trav\u00e9s de los componentes UserClass.cs y Settings.cs." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-328" + } + ] + } + ], "references": [ { "url": "https://gainsec.com/2024/04/28/cve-2024-32210-cve-2024-32211-cve-2024-32212-cve-2024-32213-lomag-integrator-ce-warehouse-management/", diff --git a/CVE-2024/CVE-2024-322xx/CVE-2024-32212.json b/CVE-2024/CVE-2024-322xx/CVE-2024-32212.json index 6a4b56a7f63..6d08cb35544 100644 --- a/CVE-2024/CVE-2024-322xx/CVE-2024-32212.json +++ b/CVE-2024/CVE-2024-322xx/CVE-2024-32212.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32212", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T18:15:24.037", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-07-03T01:55:52.740", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en LOGINT LoMag Inventory Management v1.0.20.120 y anteriores permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s de los componentes ArticleGetGroups, DocAddDocument, ClassClickShop y frmSettings." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gainsec.com/2024/04/28/cve-2024-32210-cve-2024-32211-cve-2024-32212-cve-2024-32213-lomag-integrator-ce-warehouse-management/", diff --git a/CVE-2024/CVE-2024-322xx/CVE-2024-32213.json b/CVE-2024/CVE-2024-322xx/CVE-2024-32213.json index cf7704feff5..dff415081d3 100644 --- a/CVE-2024/CVE-2024-322xx/CVE-2024-32213.json +++ b/CVE-2024/CVE-2024-322xx/CVE-2024-32213.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32213", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T18:15:24.090", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-07-03T01:55:53.503", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que la aplicaci\u00f3n LoMag WareHouse Management versi\u00f3n 1.0.20.120 y anteriores permit\u00eda contrase\u00f1as d\u00e9biles. De forma predeterminada, se permiten contrase\u00f1as codificadas de 10 caracteres con poca o ninguna complejidad." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-521" + } + ] + } + ], "references": [ { "url": "https://gainsec.com/2024/04/28/cve-2024-32210-cve-2024-32211-cve-2024-32212-cve-2024-32213-lomag-integrator-ce-warehouse-management/", diff --git a/CVE-2024/CVE-2024-322xx/CVE-2024-32228.json b/CVE-2024/CVE-2024-322xx/CVE-2024-32228.json index 32f61b530f5..5928c3bd27b 100644 --- a/CVE-2024/CVE-2024-322xx/CVE-2024-32228.json +++ b/CVE-2024/CVE-2024-322xx/CVE-2024-32228.json @@ -2,7 +2,7 @@ "id": "CVE-2024-32228", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T21:15:03.480", - "lastModified": "2024-07-02T12:09:16.907", + "lastModified": "2024-07-03T01:55:54.267", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,46 @@ "value": "FFmpeg 7.0 es vulnerable al desbordamiento del b\u00fafer. Hay un SEGV en libavcodec/hevcdec.c:2947:22 en hevc_frame_end." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + }, + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://trac.ffmpeg.org/ticket/10951", diff --git a/CVE-2024/CVE-2024-322xx/CVE-2024-32236.json b/CVE-2024/CVE-2024-322xx/CVE-2024-32236.json index d1fb9c2fc1e..15824947200 100644 --- a/CVE-2024/CVE-2024-322xx/CVE-2024-32236.json +++ b/CVE-2024/CVE-2024-322xx/CVE-2024-32236.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32236", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-25T17:15:49.957", - "lastModified": "2024-04-25T17:24:59.967", + "lastModified": "2024-07-03T01:55:55.017", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en CmsEasy v.7.7 y anteriores permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de la funci\u00f3n de actualizaci\u00f3n en el componente index.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], "references": [ { "url": "https://github.com/cidengcc/cmseasy/issues/1", diff --git a/CVE-2024/CVE-2024-322xx/CVE-2024-32238.json b/CVE-2024/CVE-2024-322xx/CVE-2024-32238.json index d5428eb6763..13107b3df9f 100644 --- a/CVE-2024/CVE-2024-322xx/CVE-2024-32238.json +++ b/CVE-2024/CVE-2024-322xx/CVE-2024-32238.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32238", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T20:15:07.630", - "lastModified": "2024-04-23T12:52:30.940", + "lastModified": "2024-07-03T01:55:55.820", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "H3C ER8300G2-X es vulnerable a un control de acceso incorrecto. Se puede acceder a la contrase\u00f1a del sistema de administraci\u00f3n del enrutador a trav\u00e9s de la interfaz de inicio de sesi\u00f3n de la p\u00e1gina del sistema de administraci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + } + ], "references": [ { "url": "https://github.com/asdfjkl11/CVE-2024-32238/issues/1", diff --git a/CVE-2024/CVE-2024-322xx/CVE-2024-32258.json b/CVE-2024/CVE-2024-322xx/CVE-2024-32258.json index 50b76ff02f4..4958f5f3f54 100644 --- a/CVE-2024/CVE-2024-322xx/CVE-2024-32258.json +++ b/CVE-2024/CVE-2024-322xx/CVE-2024-32258.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32258", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-23T16:15:07.353", - "lastModified": "2024-04-24T13:39:42.883", + "lastModified": "2024-07-03T01:55:56.647", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El servidor de red de fceux 2.7.0 tiene una vulnerabilidad de path traversal, lo que permite a los atacantes sobrescribir cualquier archivo en el servidor sin autenticaci\u00f3n mediante una ROM falsa." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://github.com/TASEmulators/fceux/issues/727", diff --git a/CVE-2024/CVE-2024-322xx/CVE-2024-32281.json b/CVE-2024/CVE-2024-322xx/CVE-2024-32281.json index 3ab9aa2a93e..f88c9b56d4e 100644 --- a/CVE-2024/CVE-2024-322xx/CVE-2024-32281.json +++ b/CVE-2024/CVE-2024-322xx/CVE-2024-32281.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32281", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T13:15:08.247", - "lastModified": "2024-04-17T15:31:50.160", + "lastModified": "2024-07-03T01:55:57.420", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El firmware Tenda AC7V1.0 v15.03.06.44 contiene una vulnerabilidad de inyecci\u00f3n de comandos en la funci\u00f3n formexeCommand a trav\u00e9s del par\u00e1metro cmdinput." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formexecommand.md", diff --git a/CVE-2024/CVE-2024-322xx/CVE-2024-32283.json b/CVE-2024/CVE-2024-322xx/CVE-2024-32283.json index c89aab4fbc6..2ebfd56200a 100644 --- a/CVE-2024/CVE-2024-322xx/CVE-2024-32283.json +++ b/CVE-2024/CVE-2024-322xx/CVE-2024-32283.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32283", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T14:15:08.683", - "lastModified": "2024-04-17T15:31:50.160", + "lastModified": "2024-07-03T01:55:58.170", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El firmware Tenda FH1203 V2.0.1.6 tiene una vulnerabilidad de inyecci\u00f3n de comando en la funci\u00f3n formexeCommand a trav\u00e9s del par\u00e1metro cmdinput." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/formexecommand_cmdi.md", diff --git a/CVE-2024/CVE-2024-322xx/CVE-2024-32286.json b/CVE-2024/CVE-2024-322xx/CVE-2024-32286.json index 4aef98f3db7..9fb3ac76e08 100644 --- a/CVE-2024/CVE-2024-322xx/CVE-2024-32286.json +++ b/CVE-2024/CVE-2024-322xx/CVE-2024-32286.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32286", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T14:15:08.793", - "lastModified": "2024-04-17T15:31:50.160", + "lastModified": "2024-07-03T01:55:58.927", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El firmware Tenda W30E v1.0 V1.0.1.25(633) tiene una vulnerabilidad de desbordamiento de pila ubicada a trav\u00e9s del par\u00e1metro de p\u00e1gina en la funci\u00f3n fromVirtualSer." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromVirtualSer.md", diff --git a/CVE-2024/CVE-2024-322xx/CVE-2024-32287.json b/CVE-2024/CVE-2024-322xx/CVE-2024-32287.json index ae37c78f30a..8a22c9b08d5 100644 --- a/CVE-2024/CVE-2024-322xx/CVE-2024-32287.json +++ b/CVE-2024/CVE-2024-322xx/CVE-2024-32287.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32287", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T14:15:08.843", - "lastModified": "2024-04-17T15:31:50.160", + "lastModified": "2024-07-03T01:55:59.670", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El firmware Tenda W30E v1.0 V1.0.1.25(633) tiene una vulnerabilidad de desbordamiento de pila a trav\u00e9s del par\u00e1metro qos en la funci\u00f3n fromqossetting." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromqossetting.md", diff --git a/CVE-2024/CVE-2024-322xx/CVE-2024-32290.json b/CVE-2024/CVE-2024-322xx/CVE-2024-32290.json index c104fe44163..47e2f64bb8a 100644 --- a/CVE-2024/CVE-2024-322xx/CVE-2024-32290.json +++ b/CVE-2024/CVE-2024-322xx/CVE-2024-32290.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32290", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T14:15:08.960", - "lastModified": "2024-04-17T15:31:50.160", + "lastModified": "2024-07-03T01:56:00.430", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El firmware Tenda W30E v1.0 v1.0.1.25(633) tiene una vulnerabilidad de desbordamiento de pila a trav\u00e9s del par\u00e1metro de p\u00e1gina en la funci\u00f3n fromAddressNat." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromAddressNat_page.md", diff --git a/CVE-2024/CVE-2024-322xx/CVE-2024-32291.json b/CVE-2024/CVE-2024-322xx/CVE-2024-32291.json index 1185ad3e7b3..33b11c1a2d8 100644 --- a/CVE-2024/CVE-2024-322xx/CVE-2024-32291.json +++ b/CVE-2024/CVE-2024-322xx/CVE-2024-32291.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32291", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T14:15:09.010", - "lastModified": "2024-04-17T15:31:50.160", + "lastModified": "2024-07-03T01:56:01.233", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El firmware v1.0.1.25(633) de Tenda W30E v1.0 tiene una vulnerabilidad de desbordamiento de pila a trav\u00e9s del par\u00e1metro de p\u00e1gina en la funci\u00f3n fromNatlimit." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromNatlimit.md", diff --git a/CVE-2024/CVE-2024-322xx/CVE-2024-32292.json b/CVE-2024/CVE-2024-322xx/CVE-2024-32292.json index 03f14971e1d..30b51e1ba10 100644 --- a/CVE-2024/CVE-2024-322xx/CVE-2024-32292.json +++ b/CVE-2024/CVE-2024-322xx/CVE-2024-32292.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32292", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T14:15:09.063", - "lastModified": "2024-04-17T15:31:50.160", + "lastModified": "2024-07-03T01:56:01.983", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El firmware Tenda W30E v1.0 V1.0.1.25(633) contiene una vulnerabilidad de inyecci\u00f3n de comando en la funci\u00f3n formexeCommand a trav\u00e9s del par\u00e1metro cmdinput." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formexecommand_cmdi.md", diff --git a/CVE-2024/CVE-2024-322xx/CVE-2024-32299.json b/CVE-2024/CVE-2024-322xx/CVE-2024-32299.json index c196a4b8e19..38f5cf864a1 100644 --- a/CVE-2024/CVE-2024-322xx/CVE-2024-32299.json +++ b/CVE-2024/CVE-2024-322xx/CVE-2024-32299.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32299", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T14:15:09.160", - "lastModified": "2024-04-17T15:31:50.160", + "lastModified": "2024-07-03T01:56:02.733", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/fromWizardHandle.md", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32301.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32301.json index 51d650f8a0b..42ff81c2ef9 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32301.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32301.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32301", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T13:15:08.293", - "lastModified": "2024-04-17T15:31:50.160", + "lastModified": "2024-07-03T01:56:03.403", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El firmware Tenda AC7V1.0 v15.03.06.44 tiene una vulnerabilidad de desbordamiento de pila a trav\u00e9s del par\u00e1metro PPW en la funci\u00f3n fromWizardHandle." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/fromWizardHandle.md", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32305.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32305.json index 017c3707c61..a303e5b2738 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32305.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32305.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32305", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T16:15:08.893", - "lastModified": "2024-04-17T16:51:07.347", + "lastModified": "2024-07-03T01:56:04.160", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromWizardHandle.md", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32306.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32306.json index 320b7e40e20..779d90ae5b4 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32306.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32306.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32306", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T14:15:09.260", - "lastModified": "2024-04-17T15:31:50.160", + "lastModified": "2024-07-03T01:56:04.840", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Tenda AC10U v1.0 Firmware v15.03.06.49 tiene una vulnerabilidad de desbordamiento de pila ubicada a trav\u00e9s del par\u00e1metro PPW en la funci\u00f3n fromWizardHandle." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/fromWizardHandle.md", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32311.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32311.json index 94b379a7e7b..63920ade069 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32311.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32311.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32311", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T14:15:09.313", - "lastModified": "2024-04-17T15:31:50.160", + "lastModified": "2024-07-03T01:56:05.617", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El firmware Tenda FH1203 v2.0.1.6 tiene una vulnerabilidad de desbordamiento de pila a trav\u00e9s del par\u00e1metro adslPwd en la funci\u00f3n formWanParameterSetting." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/formWanParameterSetting.md", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32312.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32312.json index 89e34f17cf3..bf4feb59e43 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32312.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32312.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32312", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T13:15:08.440", - "lastModified": "2024-04-17T15:31:50.160", + "lastModified": "2024-07-03T01:56:06.373", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El firmware Tenda F1203 V2.0.1.6 tiene una vulnerabilidad de desbordamiento de pila ubicada en el par\u00e1metro adslPwd de la funci\u00f3n formWanParameterSetting." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1203/formWanParameterSetting.md", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32313.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32313.json index 7da3e831456..dfa4ab64f1f 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32313.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32313.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32313", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T13:15:08.490", - "lastModified": "2024-04-17T15:31:50.160", + "lastModified": "2024-07-03T01:56:07.130", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El firmware Tenda FH1205 V2.0.0.7(775) tiene una vulnerabilidad de desbordamiento de pila ubicada a trav\u00e9s del par\u00e1metro adslPwd de la funci\u00f3n formWanParameterSetting." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/formWanParameterSetting.md", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32314.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32314.json index 10aa39c0e5e..6e102b41269 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32314.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32314.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32314", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T16:15:08.950", - "lastModified": "2024-04-17T16:51:07.347", + "lastModified": "2024-07-03T01:56:07.890", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El firmware Tenda AC500 V2.0.1.9(1307) contiene una vulnerabilidad de inyecci\u00f3n de comandos en la funci\u00f3n formexeCommand a trav\u00e9s del par\u00e1metro cmdinput." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.8, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formexecommand_cmdi.md", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32315.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32315.json index a8621397de6..b76f7bad281 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32315.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32315.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32315", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T14:15:09.367", - "lastModified": "2024-04-17T15:31:50.160", + "lastModified": "2024-07-03T01:56:08.650", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El firmware Tenda FH1202 v1.2.0.14(408) tiene una vulnerabilidad de desbordamiento de pila a trav\u00e9s del par\u00e1metro adslPwd en la funci\u00f3n formWanParameterSetting." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formWanParameterSetting.md", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32318.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32318.json index 647010488ef..e17aef88e10 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32318.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32318.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32318", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T16:15:09.130", - "lastModified": "2024-04-17T16:51:07.347", + "lastModified": "2024-07-03T01:56:09.407", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El firmware Tenda AC500 V2.0.1.9(1307) tiene una vulnerabilidad de desbordamiento de pila a trav\u00e9s del par\u00e1metro vlan en la funci\u00f3n formSetVlanInfo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/fromSetVlanInfo_vlan.md", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32320.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32320.json index dc09ff3233d..00fb5227e4b 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32320.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32320.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32320", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T16:15:09.190", - "lastModified": "2024-04-17T16:51:07.347", + "lastModified": "2024-07-03T01:56:10.160", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El firmware Tenda AC500 V2.0.1.9(1307) tiene una vulnerabilidad de desbordamiento de pila a trav\u00e9s del par\u00e1metro timeZone en la funci\u00f3n formSetTimeZone." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formSetTimeZone.md", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32325.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32325.json index 7c29bb8d12f..3b1f96f1358 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32325.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32325.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32325", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-18T17:15:48.740", - "lastModified": "2024-04-18T18:25:55.267", + "lastModified": "2024-07-03T01:56:10.923", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "TOTOLINK EX200 V4.0.3c.7646_B20201211 contiene una vulnerabilidad de Cross Site Scripting (XSS) a trav\u00e9s del par\u00e1metro ssid en la funci\u00f3n setWiFiExtenderConfig." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.4, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/XSS_ssid/README.md", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32326.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32326.json index 07f14943d65..34250885337 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32326.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32326.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32326", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-18T17:15:48.817", - "lastModified": "2024-04-18T18:25:55.267", + "lastModified": "2024-07-03T01:56:11.760", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "TOTOLINK EX200 V4.0.3c.7646_B20201211 contiene una vulnerabilidad de Cross Site Scripting (XSS) a trav\u00e9s del par\u00e1metro clave en la funci\u00f3n setWiFiExtenderConfig." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/XSS_key/README.md", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32327.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32327.json index 028f8a07022..e0761354981 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32327.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32327.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32327", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-18T17:15:48.873", - "lastModified": "2024-04-18T18:25:55.267", + "lastModified": "2024-07-03T01:56:12.527", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "TOTOLINK N300RT V2.1.8-B20201030.1539 contiene una vulnerabilidad de almacenamiento de Cross Site Scripting (XSS) en el reenv\u00edo de puertos en la p\u00e1gina de firewall." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/N300RT/XSS_5_Port_Forwarding/README.md", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32333.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32333.json index 12f2a2bb326..ba3eda69e64 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32333.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32333.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32333", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-18T17:15:48.987", - "lastModified": "2024-04-18T18:25:55.267", + "lastModified": "2024-07-03T01:56:13.287", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "TOTOLINK N300RT V2.1.8-B20201030.1539 contiene una vulnerabilidad de almacenamiento de Cross Site Scripting (XSS) en el filtrado MAC en la p\u00e1gina de firewall." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/N300RT/XSS_3_MAC_Filtering/README.md", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32334.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32334.json index a0c6cd21824..015f1e61f4d 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32334.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32334.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32334", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-18T17:15:49.043", - "lastModified": "2024-04-18T18:25:55.267", + "lastModified": "2024-07-03T01:56:14.057", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "TOTOLINK N300RT V2.1.8-B20201030.1539 contiene una vulnerabilidad de almacenamiento de Cross Site Scripting (XSS) en el filtrado de IP/puerto en la p\u00e1gina de firewall." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/N300RT/XSS_4_IP_Port_Filtering/README.md", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32335.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32335.json index 64047c59501..e47a5b1499c 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32335.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32335.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32335", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-18T17:15:49.100", - "lastModified": "2024-04-18T18:25:55.267", + "lastModified": "2024-07-03T01:56:14.820", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "TOTOLINK N300RT V2.1.8-B20201030.1539 contiene una vulnerabilidad de almacenamiento de Cross Site Scripting (XSS) en el control de acceso en la p\u00e1gina inal\u00e1mbrica." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/N300RT/XSS_2_Access_Control/README.md", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32337.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32337.json index e3a034a37c0..d95066ce0cd 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32337.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32337.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32337", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T21:15:09.267", - "lastModified": "2024-04-18T13:04:28.900", + "lastModified": "2024-07-03T01:56:15.610", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de cross site scripting (XSS) en la secci\u00f3n Configuraci\u00f3n de WonderCMS v3.4.3 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro ADMIN LOGIN URL en el m\u00f3dulo de Seguridad." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/adiapera/xss_security_wondercms_3.4.3", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32338.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32338.json index a29e2f6b3d0..f76267ddaf2 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32338.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32338.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32338", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T21:15:09.343", - "lastModified": "2024-04-18T13:04:28.900", + "lastModified": "2024-07-03T01:56:16.380", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de cross site scripting (XSS) en la secci\u00f3n Configuraci\u00f3n de WonderCMS v3.4.3 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro T\u00cdTULO DE LA P\u00c1GINA en el m\u00f3dulo P\u00e1gina actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/adiapera/xss_current_page_wondercms_3.4.3", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32339.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32339.json index c73b28a1e4b..0294ad22ea3 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32339.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32339.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32339", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T21:15:09.400", - "lastModified": "2024-04-18T13:04:28.900", + "lastModified": "2024-07-03T01:56:17.143", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "M\u00faltiples vulnerabilidades de cross site scripting (XSS) en la p\u00e1gina HOW TO de WonderCMS v3.4.3 permiten a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en cualquiera de los par\u00e1metros." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/adiapera/xss_how_to_page_wondercms_3.4.3", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32342.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32342.json index 609e6b37b3c..56f210d296e 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32342.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32342.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32342", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T21:15:09.560", - "lastModified": "2024-04-18T13:04:28.900", + "lastModified": "2024-07-03T01:56:17.900", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de cross site scripting (XSS) en la p\u00e1gina de creaci\u00f3n de Boid CMS v2.1.0 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro Permalink." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/adiapera/xss_create_boidcms_2.1.0", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32343.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32343.json index 6e1be60d910..b5cdd84a1d1 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32343.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32343.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32343", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T21:15:09.623", - "lastModified": "2024-04-18T13:04:28.900", + "lastModified": "2024-07-03T01:56:18.650", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de cross site scripting (XSS) en la p\u00e1gina de creaci\u00f3n de Boid CMS v2.1.0 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro Contenido." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/adiapera/xss_create2_boidcms_2.1.0", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32344.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32344.json index b0363758fa5..cb201f2fc8c 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32344.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32344.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32344", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T21:15:09.677", - "lastModified": "2024-04-18T13:04:28.900", + "lastModified": "2024-07-03T01:56:19.393", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de cross site scripting (XSS) en el men\u00fa Configuraci\u00f3n de CMSimple v5.15 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro Editar en la secci\u00f3n Idioma." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/adiapera/xss_language_cmsimple_5.15/blob/main/README.md", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32345.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32345.json index 2930ad6e3be..4bd5c2bba1f 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32345.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32345.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32345", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T21:15:09.727", - "lastModified": "2024-04-18T13:04:28.900", + "lastModified": "2024-07-03T01:56:20.143", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de cross site scripting (XSS) en el men\u00fa Configuraci\u00f3n de CMSimple v5.15 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro Configuraci\u00f3n en la secci\u00f3n Idioma." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 0.0, + "baseSeverity": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 0.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/adiapera/xss_language_cmsimple_5.15", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32349.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32349.json index 1de51f1acb9..d9f317bc2c9 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32349.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32349.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32349", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T16:17:02.243", - "lastModified": "2024-05-14T19:17:55.627", + "lastModified": "2024-07-03T01:56:20.913", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK X5000R V9.1.0cu.2350_B20230313 contiene una vulnerabilidad de ejecuci\u00f3n remota de comandos (RCE) autenticada a trav\u00e9s de los par\u00e1metros \"mtu\" en el binario \"cstecgi.cgi\"." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/1s1and123/Vulnerabilities/blob/main/device/ToToLink/X5000R/TOTOLink_X5000R_RCE.md", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32352.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32352.json index 7638235310f..a9ccf4f0bc9 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32352.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32352.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32352", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T16:17:03.113", - "lastModified": "2024-05-14T19:17:55.627", + "lastModified": "2024-07-03T01:56:21.743", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK X5000R V9.1.0cu.2350_B20230313 contiene una vulnerabilidad de ejecuci\u00f3n remota de comandos (RCE) autenticada a trav\u00e9s del par\u00e1metro \"ipsecL2tpEnable\" en el binario \"cstecgi.cgi\"." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/1s1and123/Vulnerabilities/blob/main/device/ToToLink/X5000R/TOTOLink_X5000R_RCE.md", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32353.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32353.json index abf39c4aac9..7150ebf91fc 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32353.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32353.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32353", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T16:17:03.320", - "lastModified": "2024-05-14T19:17:55.627", + "lastModified": "2024-07-03T01:56:22.500", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK X5000R V9.1.0cu.2350_B20230313 contiene una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro 'puerto' en la funci\u00f3n setSSServer en /cgi-bin/cstecgi.cgi." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/1s1and123/Vulnerabilities/blob/main/device/ToToLink/X5000R/TOTOLink_X5000R_RCE.md", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32354.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32354.json index f1a2d27df9b..84f835063e6 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32354.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32354.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32354", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T16:17:03.623", - "lastModified": "2024-05-14T19:17:55.627", + "lastModified": "2024-07-03T01:56:23.250", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK X5000R V9.1.0cu.2350_B20230313 contiene una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro 'timeout' en la funci\u00f3n setSSServer en /cgi-bin/cstecgi.cgi." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/1s1and123/Vulnerabilities/blob/main/device/ToToLink/X5000R/TOTOLink_X5000R_RCE.md", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32355.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32355.json index 495fd80e682..c9e300d4429 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32355.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32355.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32355", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T16:17:03.927", - "lastModified": "2024-05-14T19:17:55.627", + "lastModified": "2024-07-03T01:56:24.003", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK X5000R V9.1.0cu.2350_B20230313 contiene una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro 'contrase\u00f1a' en la funci\u00f3n setSSServer." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/1s1and123/Vulnerabilities/blob/main/device/ToToLink/X5000R/TOTOLink_X5000R_RCE.md", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32359.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32359.json index ae9492f0a9d..b0799685e26 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32359.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32359.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32359", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-02T16:15:08.127", - "lastModified": "2024-05-02T18:00:37.360", + "lastModified": "2024-07-03T01:56:24.743", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un riesgo de autorizaci\u00f3n RBAC en Carina v0.13.0 y versiones anteriores permite a atacantes locales ejecutar c\u00f3digo arbitrario a trav\u00e9s de comandos manipulados para obtener los secretos de todo el cl\u00faster y apoderarse del cl\u00faster." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], "references": [ { "url": "http://carina.com", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32368.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32368.json index 49d4b48c137..eb3d555c170 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32368.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32368.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32368", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T14:15:07.560", - "lastModified": "2024-04-22T19:24:12.920", + "lastModified": "2024-07-03T01:56:25.517", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de permiso inseguro en Agasta Sanketlife 2.0 Pocket 12-Lead ECG Monitor FW Version 3.0 permite a un atacante local provocar una denegaci\u00f3n de servicio a trav\u00e9s del componente Bluetooth Low Energy (BLE)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 0.0, + "baseSeverity": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 0.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://en.wikipedia.org/wiki/Bluetooth_Low_Energy_denial_of_service_attacks/", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32369.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32369.json index d2ca204a81e..1bfc81e429d 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32369.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32369.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32369", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T15:15:08.520", - "lastModified": "2024-05-07T20:07:58.737", + "lastModified": "2024-07-03T01:56:26.273", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en HSC Cybersecurity HC Mailinspector 5.2.17-3 a 5.2.18 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de un payload manipulado para el par\u00e1metro de inicio y l\u00edmite en el componente mliWhiteList.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://cwe.mitre.org/data/definitions/89.html", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32370.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32370.json index ce8a5113ba5..28aef1692fe 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32370.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32370.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32370", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T15:15:08.597", - "lastModified": "2024-05-07T20:07:58.737", + "lastModified": "2024-07-03T01:56:27.030", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en HSC Cybersecurity HC Mailinspector 5.2.17-3 a 5.2.18 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de un payload manipulado para el par\u00e1metro id en el componente mliSystemUsers.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-782" + } + ] + } + ], "references": [ { "url": "https://cwe.mitre.org/data/definitions/639.html", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32371.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32371.json index 60adc987a37..d312a083169 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32371.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32371.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32371", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T15:15:08.653", - "lastModified": "2024-05-07T20:07:58.737", + "lastModified": "2024-07-03T01:56:27.783", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en HSC Cybersecurity HC Mailinspector 5.2.17-3 a 5.2.18 permite que una cuenta de usuario normal escale sus privilegios y obtenga acceso administrativo cambiando el par\u00e1metro de tipo de 1 a 0." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "https://cwe.mitre.org/data/definitions/639.html", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32391.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32391.json index 7d80d226bd5..07b7865fd3a 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32391.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32391.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32391", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T21:15:08.700", - "lastModified": "2024-04-22T13:28:50.310", + "lastModified": "2024-07-03T01:56:28.530", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de Cross Site Scripting en MacCMS v.10 v.2024.1000.3000 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/magicblack/maccms10/issues/1133", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32392.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32392.json index 6b7f6998f0d..a3f69079c7f 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32392.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32392.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32392", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T21:15:08.747", - "lastModified": "2024-04-22T13:28:50.310", + "lastModified": "2024-07-03T01:56:29.287", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de Cross Site Scripting en CmSimple v.5.15 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente functions.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 4.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/Hebing123/cve/issues/33", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32394.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32394.json index 8999af0c188..12cb15cff54 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32394.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32394.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32394", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T21:15:49.657", - "lastModified": "2024-04-23T12:52:26.253", + "lastModified": "2024-07-03T01:56:30.023", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Un problema en ruijie.com/cn RG-RSR10-01G-T(WA)-S RSR_3.0(1)B9P2_RSR10-01G-TW-S_07150910 y RG-RSR10-01G-T(WA)-S RSR_3.0( 1) B9P2_RSR10-01G-TW-S_07150910 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud HTTP manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 0.0, + "baseSeverity": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 0.0 + } + ] + }, "references": [ { "url": "https://gist.github.com/Swind1er/7aad5c28e5bdc91d73fa7489b7250c94", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32399.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32399.json index 00edfc9f63c..96eaf34151e 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32399.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32399.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32399", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T20:15:07.683", - "lastModified": "2024-04-23T12:52:30.940", + "lastModified": "2024-07-03T01:56:30.203", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de Directory Traversal en RaidenMAILD Mail Server v.4.9.4 y anteriores permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del componente /webeditor/." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 7.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://github.com/NN0b0dy/CVE-2024-32399/blob/main/README.md", diff --git a/CVE-2024/CVE-2024-324xx/CVE-2024-32404.json b/CVE-2024/CVE-2024-324xx/CVE-2024-32404.json index 9962b4803f7..e8a8392a87d 100644 --- a/CVE-2024/CVE-2024-324xx/CVE-2024-32404.json +++ b/CVE-2024/CVE-2024-324xx/CVE-2024-32404.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32404", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-26T04:15:09.107", - "lastModified": "2024-04-26T12:58:17.720", + "lastModified": "2024-07-03T01:56:30.957", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La vulnerabilidad de inyecci\u00f3n de plantilla del lado del servidor (SSTI) en inducer related anterior a v.2024.1 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de una carga \u00fatil manipulada para la funci\u00f3n Markup Sandbox." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://packetstormsecurity.com/2404-exploits/rlts-sstexec.txt", diff --git a/CVE-2024/CVE-2024-324xx/CVE-2024-32405.json b/CVE-2024/CVE-2024-324xx/CVE-2024-32405.json index a164d155e6b..fbe19c4d1ae 100644 --- a/CVE-2024/CVE-2024-324xx/CVE-2024-32405.json +++ b/CVE-2024/CVE-2024-324xx/CVE-2024-32405.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32405", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T20:15:07.737", - "lastModified": "2024-04-27T05:15:48.447", + "lastModified": "2024-07-03T01:56:31.770", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de Cross Site Scripting en Inducer Relate anterior a v.2024.1 permite a un atacante remoto escalar privilegios a trav\u00e9s de un payload manipulado al campo Respuesta del par\u00e1metro InlineMultiQuestion en la funci\u00f3n Examen." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.6, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://cxsecurity.com/issue/WLB-2024040051", diff --git a/CVE-2024/CVE-2024-324xx/CVE-2024-32406.json b/CVE-2024/CVE-2024-324xx/CVE-2024-32406.json index 700377e62b4..4560c5d6731 100644 --- a/CVE-2024/CVE-2024-324xx/CVE-2024-32406.json +++ b/CVE-2024/CVE-2024-324xx/CVE-2024-32406.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32406", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-26T04:15:09.163", - "lastModified": "2024-04-26T12:58:17.720", + "lastModified": "2024-07-03T01:56:32.550", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La vulnerabilidad de inyecci\u00f3n de plantilla del lado del servidor (SSTI) en inducer relate anterior a v.2024.1 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado para la funci\u00f3n de emisi\u00f3n de tickets de examen por lotes." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://packetstormsecurity.com/files/178251/Relate-Learning-And-Teaching-System-SSTI-Remote-Code-Execution.html", diff --git a/CVE-2024/CVE-2024-324xx/CVE-2024-32407.json b/CVE-2024/CVE-2024-324xx/CVE-2024-32407.json index d9024f58149..1dc1ac48e83 100644 --- a/CVE-2024/CVE-2024-324xx/CVE-2024-32407.json +++ b/CVE-2024/CVE-2024-324xx/CVE-2024-32407.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32407", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T19:15:46.680", - "lastModified": "2024-04-22T19:24:06.727", + "lastModified": "2024-07-03T01:56:33.310", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en Inducer Relate anterior a v.2024.1 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado para la funci\u00f3n Page Sandbox." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1336" + } + ] + } + ], "references": [ { "url": "https://book.hacktricks.xyz/v/jp/pentesting-web/ssti-server-side-template-injection", diff --git a/CVE-2024/CVE-2024-324xx/CVE-2024-32409.json b/CVE-2024/CVE-2024-324xx/CVE-2024-32409.json index 386a6bdc626..312292d7da0 100644 --- a/CVE-2024/CVE-2024-324xx/CVE-2024-32409.json +++ b/CVE-2024/CVE-2024-324xx/CVE-2024-32409.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32409", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T16:15:10.883", - "lastModified": "2024-04-19T16:19:49.043", + "lastModified": "2024-07-03T01:56:34.063", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en SEMCMS v.4.8 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un scriptmanipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 0.0, + "baseSeverity": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 0.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "http://semcms.com", diff --git a/CVE-2024/CVE-2024-324xx/CVE-2024-32418.json b/CVE-2024/CVE-2024-324xx/CVE-2024-32418.json index d09ef5a7294..fb7c18e7dd7 100644 --- a/CVE-2024/CVE-2024-324xx/CVE-2024-32418.json +++ b/CVE-2024/CVE-2024-324xx/CVE-2024-32418.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32418", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T01:15:47.397", - "lastModified": "2024-04-22T13:28:43.747", + "lastModified": "2024-07-03T01:56:34.817", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,46 @@ "value": "Un problema en flusity CMS v2.33 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente add_addon.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + }, + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://github.com/PWB003/cms/blob/main/1.md", diff --git a/CVE-2024/CVE-2024-324xx/CVE-2024-32491.json b/CVE-2024/CVE-2024-324xx/CVE-2024-32491.json index 970a84fd8f2..d923315abd8 100644 --- a/CVE-2024/CVE-2024-324xx/CVE-2024-32491.json +++ b/CVE-2024/CVE-2024-324xx/CVE-2024-32491.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32491", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T17:15:19.183", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-07-03T01:56:37.743", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en Znuny y Znuny LTS 6.0.31 a 6.5.7 y Znuny 7.0.1 a 7.0.16 donde un usuario que inici\u00f3 sesi\u00f3n puede cargar un archivo (a trav\u00e9s de una solicitud AJAX manipulada) a una ubicaci\u00f3n de escritura arbitraria atravesando rutas. Se puede ejecutar c\u00f3digo arbitrario si esta ubicaci\u00f3n est\u00e1 disponible p\u00fablicamente a trav\u00e9s del servidor web." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://www.znuny.org/en/advisories/zsa-2024-01", diff --git a/CVE-2024/CVE-2024-324xx/CVE-2024-32492.json b/CVE-2024/CVE-2024-324xx/CVE-2024-32492.json index 633c3250945..53fe3b5f264 100644 --- a/CVE-2024/CVE-2024-324xx/CVE-2024-32492.json +++ b/CVE-2024/CVE-2024-324xx/CVE-2024-32492.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32492", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T17:15:19.243", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-07-03T01:56:38.510", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en Znuny 7.0.1 a 7.0.16 donde la vista de detalles del ticket en el frente del cliente permite la ejecuci\u00f3n de JavaScript externo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://www.znuny.org/en/advisories/zsa-2024-02", diff --git a/CVE-2024/CVE-2024-324xx/CVE-2024-32493.json b/CVE-2024/CVE-2024-324xx/CVE-2024-32493.json index 4b3b963b507..b6c8279685a 100644 --- a/CVE-2024/CVE-2024-324xx/CVE-2024-32493.json +++ b/CVE-2024/CVE-2024-324xx/CVE-2024-32493.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32493", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T17:15:19.300", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-07-03T01:56:39.257", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en Znuny LTS 6.5.1 a 6.5.7 y Znuny 7.0.1 a 7.0.16 donde un agente conectado puede inyectar SQL en el par\u00e1metro ID del formulario borrador de una solicitud AJAX." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://www.znuny.org/en/advisories/zsa-2024-03", diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32605.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32605.json index 384e5c22eca..879670d0739 100644 --- a/CVE-2024/CVE-2024-326xx/CVE-2024-32605.json +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32605.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32605", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:36:45.230", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:56:44.803", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La librer\u00eda HDF5 hasta 1.14.3 tiene un b\u00fafer basado en mont\u00f3n sobrele\u00eddo en H5VM_memcpyvv en H5VM.c (llamado desde H5D__compact_readvv en H5Dcompact.c)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32612.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32612.json index 18d7f7dc6f5..38d5896f9c4 100644 --- a/CVE-2024/CVE-2024-326xx/CVE-2024-32612.json +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32612.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32612", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:36:46.267", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:56:45.670", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La librer\u00eda HDF5 hasta la versi\u00f3n 1.14.3 contiene un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico sobrele\u00eddo en H5HL__fl_deserialize en H5HLcache.c, lo que resulta en la corrupci\u00f3n del puntero de instrucci\u00f3n, una vulnerabilidad diferente a CVE-2024-32613." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32613.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32613.json index ee2c31bd2fd..d4a3de141be 100644 --- a/CVE-2024/CVE-2024-326xx/CVE-2024-32613.json +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32613.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32613", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:36:46.383", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:56:46.420", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La librer\u00eda HDF5 hasta la versi\u00f3n 1.14.3 contiene un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico sobrele\u00eddo en la funci\u00f3n H5HL__fl_deserialize en H5HLcache.c, una vulnerabilidad diferente a CVE-2024-32612." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32614.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32614.json index d31c803d573..eb624cff138 100644 --- a/CVE-2024/CVE-2024-326xx/CVE-2024-32614.json +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32614.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32614", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:36:46.507", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:56:47.230", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La librer\u00eda HDF5 hasta 1.14.3 tiene un SEGV en H5VM_memcpyvv en H5VM.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32615.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32615.json index 58cdbbec7e6..de0e90f4e39 100644 --- a/CVE-2024/CVE-2024-326xx/CVE-2024-32615.json +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32615.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32615", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:36:46.620", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:56:48.017", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La librer\u00eda HDF5 hasta 1.14.3 contiene un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en H5Z__nbit_decompress_one_byte en H5Znbit.c, causado por el uso anterior de un puntero inicializado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32616.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32616.json index 3ad3a5d4fd4..e32380b3d3b 100644 --- a/CVE-2024/CVE-2024-326xx/CVE-2024-32616.json +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32616.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32616", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:36:46.753", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:56:48.773", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La librer\u00eda HDF5 hasta 1.14.3 contiene un b\u00fafer basado en mont\u00f3n sobrele\u00eddo en H5O__dtype_encode_helper en H5Odtype.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32618.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32618.json index acd7ef81bfa..a36cbe08ada 100644 --- a/CVE-2024/CVE-2024-326xx/CVE-2024-32618.json +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32618.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32618", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:36:47.230", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:56:49.560", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La librer\u00eda HDF5 hasta la versi\u00f3n 1.14.3 contiene un desbordamiento del b\u00fafer basado en mont\u00f3n en H5T__get_native_type en H5Tnative.c, lo que provoca la corrupci\u00f3n del puntero de instrucci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32619.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32619.json index de7f78cb332..44df90341dc 100644 --- a/CVE-2024/CVE-2024-326xx/CVE-2024-32619.json +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32619.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32619", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:36:47.453", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:56:50.330", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La librer\u00eda HDF5 hasta la versi\u00f3n 1.14.3 contiene un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en H5T_copy_reopen en H5T.c, lo que provoca la corrupci\u00f3n del puntero de instrucci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32620.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32620.json index 4d9152bda24..b52b9ddc6c2 100644 --- a/CVE-2024/CVE-2024-326xx/CVE-2024-32620.json +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32620.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32620", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:36:47.570", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:56:51.087", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La librer\u00eda HDF5 hasta la versi\u00f3n 1.14.3 contiene un b\u00fafer basado en mont\u00f3n sobrele\u00eddo en H5F_addr_decode_len en H5Fint.c, lo que provoca la corrupci\u00f3n del puntero de instrucci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32623.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32623.json index 4b4ced8ccf9..3d1b0cbfa96 100644 --- a/CVE-2024/CVE-2024-326xx/CVE-2024-32623.json +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32623.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32623", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:36:47.943", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:56:51.853", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La librer\u00eda HDF5 hasta 1.14.3 contiene un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en H5VM_array_fill en H5VM.c (llamado desde H5S_select_elements en H5Spoint.c)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32638.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32638.json index aaf70702883..e7d3e5141dd 100644 --- a/CVE-2024/CVE-2024-326xx/CVE-2024-32638.json +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32638.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32638", "sourceIdentifier": "security@apache.org", "published": "2024-05-02T10:15:08.443", - "lastModified": "2024-05-02T14:15:09.830", + "lastModified": "2024-07-03T01:56:53.103", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Vulnerabilidad de interpretaci\u00f3n inconsistente de solicitudes HTTP (\"contrabando de solicitudes HTTP\") en Apache APISIX cuando se utiliza el complemento `forward-auth`. Este problema afecta a Apache APISIX: desde 3.8.0, 3.9.0. Se recomienda a los usuarios actualizar a la versi\u00f3n 3.8.1, 3.9.1 o superior, lo que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", @@ -25,6 +49,16 @@ "value": "CWE-444" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-444" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32674.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32674.json index e5489f0ee0e..1fc4168565a 100644 --- a/CVE-2024/CVE-2024-326xx/CVE-2024-32674.json +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32674.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32674", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-05-08T04:15:09.840", - "lastModified": "2024-05-08T13:15:00.690", + "lastModified": "2024-07-03T01:56:55.253", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Heator Social Login WordPress anterior a 1.1.32 contiene una vulnerabilidad de Cross-site scripting. Si se explota esta vulnerabilidad, se puede ejecutar un script arbitrario en el navegador web del usuario que accedi\u00f3 al sitio web utilizando el producto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/jp/JVN87694318/", diff --git a/CVE-2024/CVE-2024-327xx/CVE-2024-32715.json b/CVE-2024/CVE-2024-327xx/CVE-2024-32715.json index d58c07d341d..8a285b98462 100644 --- a/CVE-2024/CVE-2024-327xx/CVE-2024-32715.json +++ b/CVE-2024/CVE-2024-327xx/CVE-2024-32715.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32715", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-09T17:15:49.270", - "lastModified": "2024-06-10T02:52:08.267", + "lastModified": "2024-07-03T01:56:58.463", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Vulnerabilidad de autorizaci\u00f3n faltante en Olive Themes Olive One Click Demo Import. Este problema afecta a Olive One Click Demo Import: desde n/a hasta 1.1.1." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, "weaknesses": [ { "source": "audit@patchstack.com", diff --git a/CVE-2024/CVE-2024-327xx/CVE-2024-32735.json b/CVE-2024/CVE-2024-327xx/CVE-2024-32735.json index 67761ebbc2b..63f6b746008 100644 --- a/CVE-2024/CVE-2024-327xx/CVE-2024-32735.json +++ b/CVE-2024/CVE-2024-327xx/CVE-2024-32735.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32735", "sourceIdentifier": "vulnreport@tenable.com", "published": "2024-05-14T15:37:03.527", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:56:59.647", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], "references": [ { "url": "https://www.cyberpower.com/global/en/File/GetFileSampleByType?fileId=SU-18070002-07&fileSubType=FileReleaseNote", diff --git a/CVE-2024/CVE-2024-327xx/CVE-2024-32737.json b/CVE-2024/CVE-2024-327xx/CVE-2024-32737.json index 1c1ebb7cac6..704fea063ae 100644 --- a/CVE-2024/CVE-2024-327xx/CVE-2024-32737.json +++ b/CVE-2024/CVE-2024-327xx/CVE-2024-32737.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32737", "sourceIdentifier": "vulnreport@tenable.com", "published": "2024-05-14T15:37:04.270", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:57:00.443", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://www.cyberpower.com/global/en/File/GetFileSampleByType?fileId=SU-18070002-07&fileSubType=FileReleaseNote", diff --git a/CVE-2024/CVE-2024-327xx/CVE-2024-32738.json b/CVE-2024/CVE-2024-327xx/CVE-2024-32738.json index 8045c818335..831396bd917 100644 --- a/CVE-2024/CVE-2024-327xx/CVE-2024-32738.json +++ b/CVE-2024/CVE-2024-327xx/CVE-2024-32738.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32738", "sourceIdentifier": "vulnreport@tenable.com", "published": "2024-05-14T15:37:04.597", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:57:01.140", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://www.cyberpower.com/global/en/File/GetFileSampleByType?fileId=SU-18070002-07&fileSubType=FileReleaseNote", diff --git a/CVE-2024/CVE-2024-327xx/CVE-2024-32743.json b/CVE-2024/CVE-2024-327xx/CVE-2024-32743.json index 29eed1db8f1..0709e7944aa 100644 --- a/CVE-2024/CVE-2024-327xx/CVE-2024-32743.json +++ b/CVE-2024/CVE-2024-327xx/CVE-2024-32743.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32743", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T21:15:09.783", - "lastModified": "2024-04-18T13:04:28.900", + "lastModified": "2024-07-03T01:57:02.120", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de cross site scripting (XSS) en la secci\u00f3n Configuraci\u00f3n de WonderCMS v3.4.3 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro SITE LANGUAGE CONFIG en el m\u00f3dulo Seguridad." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/adiapera/xss_security_wondercms_3.4.3", diff --git a/CVE-2024/CVE-2024-327xx/CVE-2024-32744.json b/CVE-2024/CVE-2024-327xx/CVE-2024-32744.json index 2ed2ec67f35..76525c0abd4 100644 --- a/CVE-2024/CVE-2024-327xx/CVE-2024-32744.json +++ b/CVE-2024/CVE-2024-327xx/CVE-2024-32744.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32744", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T21:15:09.843", - "lastModified": "2024-04-18T13:04:28.900", + "lastModified": "2024-07-03T01:57:02.937", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de cross site scripting (XSS) en la secci\u00f3n Configuraci\u00f3n de WonderCMS v3.4.3 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro PAGE KEYWORDS bajo el m\u00f3dulo CURRENT PAGE." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/adiapera/xss_current_page_wondercms_3.4.3", diff --git a/CVE-2024/CVE-2024-327xx/CVE-2024-32745.json b/CVE-2024/CVE-2024-327xx/CVE-2024-32745.json index 1a29ff55f69..e5c82a1b955 100644 --- a/CVE-2024/CVE-2024-327xx/CVE-2024-32745.json +++ b/CVE-2024/CVE-2024-327xx/CVE-2024-32745.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32745", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T21:15:09.897", - "lastModified": "2024-04-18T13:04:28.900", + "lastModified": "2024-07-03T01:57:03.693", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de cross site scripting (XSS) en la secci\u00f3n Configuraci\u00f3n de WonderCMS v3.4.3 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro PAGE DESCRIPTION bajo el m\u00f3dulo CURRENT PAGE." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/adiapera/xss_current_page_wondercms_3.4.3", diff --git a/CVE-2024/CVE-2024-327xx/CVE-2024-32746.json b/CVE-2024/CVE-2024-327xx/CVE-2024-32746.json index 9621cb11f7c..bb35fb3ec09 100644 --- a/CVE-2024/CVE-2024-327xx/CVE-2024-32746.json +++ b/CVE-2024/CVE-2024-327xx/CVE-2024-32746.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32746", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T21:15:09.943", - "lastModified": "2024-04-18T13:04:28.900", + "lastModified": "2024-07-03T01:57:04.453", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de cross site scripting (XSS) en la secci\u00f3n Configuraci\u00f3n de WonderCMS v3.4.3 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro MEN\u00da bajo el m\u00f3dulo Men\u00fa." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], "references": [ { "url": "https://github.com/adiapera/xss_menu_page_wondercms_3.4.3", diff --git a/CVE-2024/CVE-2024-327xx/CVE-2024-32752.json b/CVE-2024/CVE-2024-327xx/CVE-2024-32752.json index 0b8f59fb790..3b4a73ad8e9 100644 --- a/CVE-2024/CVE-2024-327xx/CVE-2024-32752.json +++ b/CVE-2024/CVE-2024-327xx/CVE-2024-32752.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32752", "sourceIdentifier": "productsecurity@jci.com", "published": "2024-06-06T21:15:48.523", - "lastModified": "2024-06-07T14:56:05.647", + "lastModified": "2024-07-03T01:57:05.223", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,74 @@ "value": "En determinadas circunstancias, las comunicaciones entre la herramienta ICU y un controlador de puerta iSTAR Pro son susceptibles a ataques Machine-in-the-Middle que podr\u00edan afectar el control y la configuraci\u00f3n de la puerta." } ], - "metrics": {}, + "metrics": { + "cvssMetricV40": [ + { + "source": "productsecurity@jci.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.8, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, "weaknesses": [ { "source": "productsecurity@jci.com", diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32849.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32849.json index 1fdbe714e27..738c4c50c7d 100644 --- a/CVE-2024/CVE-2024-328xx/CVE-2024-32849.json +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32849.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32849", "sourceIdentifier": "security@trendmicro.com", "published": "2024-06-10T22:15:09.453", - "lastModified": "2024-06-11T13:54:12.057", + "lastModified": "2024-07-03T01:57:09.160", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://helpcenter.trendmicro.com/en-us/article/tmka-19175", diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32850.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32850.json index 326ac6f36ab..377958fe36e 100644 --- a/CVE-2024/CVE-2024-328xx/CVE-2024-32850.json +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32850.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32850", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-05-31T02:15:08.843", - "lastModified": "2024-05-31T13:01:46.727", + "lastModified": "2024-07-03T01:57:09.843", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Existe una neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando (\"Inyecci\u00f3n de comando\") en la versi\u00f3n del firmware SkyBridge MB-A100/MB-A110 4.2.2 y anteriores y el firmware SkyBridge BASIC MB-A130 Ver. 1.5.5 y anteriores. Si la funci\u00f3n de control y supervisi\u00f3n remota est\u00e1 habilitada en el producto, un atacante con acceso al producto puede ejecutar un comando arbitrario o iniciar sesi\u00f3n en el producto con privilegios de administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/vu/JVNVU94872523/", diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32891.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32891.json index 02518c83203..c19a071853a 100644 --- a/CVE-2024/CVE-2024-328xx/CVE-2024-32891.json +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32891.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32891", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:53.690", - "lastModified": "2024-06-17T12:43:31.090", + "lastModified": "2024-07-03T01:57:12.270", "vulnStatus": "Undergoing Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En sec_media_unprotect de media.c, existe una posible corrupci\u00f3n de la memoria debido a una condici\u00f3n de ejecuci\u00f3n. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32893.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32893.json index b3c3e58c926..97eab59852f 100644 --- a/CVE-2024/CVE-2024-328xx/CVE-2024-32893.json +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32893.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32893", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:53.847", - "lastModified": "2024-06-17T12:43:31.090", + "lastModified": "2024-07-03T01:57:13.633", "vulnStatus": "Undergoing Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En _s5e9865_mif_set_rate de exynos_dvfs.c, existe una posible lectura fuera de los l\u00edmites debido a una conversi\u00f3n incorrecta. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32896.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32896.json index 6e59033e3fe..e0a91b02ee0 100644 --- a/CVE-2024/CVE-2024-328xx/CVE-2024-32896.json +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32896.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32896", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:54.080", - "lastModified": "2024-06-14T17:58:30.333", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:57:14.863", + "vulnStatus": "Modified", + "cveTags": [], "cisaExploitAdd": "2024-06-13", "cisaActionDue": "2024-07-04", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", @@ -39,6 +40,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 } ] }, @@ -52,6 +73,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-783" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32907.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32907.json index 1ceb4266414..d4365ba95e9 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32907.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32907.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32907", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:54.877", - "lastModified": "2024-06-17T12:43:31.090", + "lastModified": "2024-07-03T01:57:15.760", "vulnStatus": "Undergoing Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En memcall_add de memlog.c, existe un posible desbordamiento del b\u00fafer debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32909.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32909.json index 8bed59ff59e..ec64904748f 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32909.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32909.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32909", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:55.027", - "lastModified": "2024-06-17T12:43:31.090", + "lastModified": "2024-07-03T01:57:16.980", "vulnStatus": "Undergoing Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En handle_msg de main.cpp, existe una posible escritura fuera de los l\u00edmites debido a un desbordamiento del b\u00fafer del mont\u00f3n. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32925.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32925.json index 6de8f698a0f..d8771839888 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32925.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32925.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32925", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:56.187", - "lastModified": "2024-06-17T12:43:31.090", + "lastModified": "2024-07-03T01:57:18.617", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En dhd_prot_txstatus_process de dhd_msgbuf.c, hay una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda conducir a la ejecuci\u00f3n remota de c\u00f3digo sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32926.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32926.json index 03883666ce0..ebefa57d248 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32926.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32926.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32926", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:56.253", - "lastModified": "2024-06-17T12:43:31.090", + "lastModified": "2024-07-03T01:57:19.363", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Existe una posible divulgaci\u00f3n de informaci\u00f3n debido a la divulgaci\u00f3n de informaci\u00f3n del canal lateral. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32929.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32929.json index 5defd5ca4e8..5de69d11f58 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32929.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32929.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32929", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:56.320", - "lastModified": "2024-06-17T12:43:31.090", + "lastModified": "2024-07-03T01:57:19.547", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En gpu_slc_get_region de pixel_gpu_slc.c, existe un posible EoP debido a un use after free. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-05-01", diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32930.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32930.json index 39b9846d0e5..ba6aa7bf83f 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32930.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32930.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32930", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:56.390", - "lastModified": "2024-06-17T12:43:31.090", + "lastModified": "2024-07-03T01:57:20.283", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "En plugin_ipc_handler de slc_plugin.c, existe una posible divulgaci\u00f3n de informaci\u00f3n debido a datos no inicializados. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n local de 4 bytes de memoria de pila sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32988.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32988.json index 04d0a1bc09e..9cddbe04240 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32988.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32988.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32988", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-05-22T08:15:10.080", - "lastModified": "2024-05-22T12:46:53.887", + "lastModified": "2024-07-03T01:57:22.273", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La aplicaci\u00f3n 'OfferBox' para las versiones de Android 2.0.0 a 2.3.17 y la aplicaci\u00f3n 'OfferBox' para las versiones de iOS 2.1.7 a 2.6.14 utilizan una clave secreta codificada para JWT. La clave secreta para JWT se puede recuperar si se realiza ingenier\u00eda inversa al binario de la aplicaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/jp/JVN83405304/", diff --git a/CVE-2024/CVE-2024-330xx/CVE-2024-33004.json b/CVE-2024/CVE-2024-330xx/CVE-2024-33004.json index 63cd852ec82..9fba230a819 100644 --- a/CVE-2024/CVE-2024-330xx/CVE-2024-33004.json +++ b/CVE-2024/CVE-2024-330xx/CVE-2024-33004.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33004", "sourceIdentifier": "cna@sap.com", "published": "2024-05-14T16:17:13.957", - "lastModified": "2024-05-14T19:17:55.627", + "lastModified": "2024-07-03T01:57:23.963", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], "references": [ { "url": "https://me.sap.com/notes/3449093", diff --git a/CVE-2024/CVE-2024-330xx/CVE-2024-33007.json b/CVE-2024/CVE-2024-330xx/CVE-2024-33007.json index 0d5853ab0f7..cfa10aa0619 100644 --- a/CVE-2024/CVE-2024-330xx/CVE-2024-33007.json +++ b/CVE-2024/CVE-2024-330xx/CVE-2024-33007.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33007", "sourceIdentifier": "cna@sap.com", "published": "2024-05-14T16:17:14.693", - "lastModified": "2024-05-14T19:17:55.627", + "lastModified": "2024-07-03T01:57:24.730", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://me.sap.com/notes/3446076", diff --git a/CVE-2024/CVE-2024-331xx/CVE-2024-33101.json b/CVE-2024/CVE-2024-331xx/CVE-2024-33101.json index d27c1b6a0d3..8f2a317f862 100644 --- a/CVE-2024/CVE-2024-331xx/CVE-2024-33101.json +++ b/CVE-2024/CVE-2024-331xx/CVE-2024-33101.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33101", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T18:15:19.797", - "lastModified": "2024-04-30T19:35:36.960", + "lastModified": "2024-07-03T01:57:25.600", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de cross-site scripting (XSS) almacenado en el componente /action/anti.php de ThinkSAAS v3.7.0 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro word." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/thinksaas/ThinkSAAS/issues/34", diff --git a/CVE-2024/CVE-2024-331xx/CVE-2024-33102.json b/CVE-2024/CVE-2024-331xx/CVE-2024-33102.json index d3e155a1106..91551b8d231 100644 --- a/CVE-2024/CVE-2024-331xx/CVE-2024-33102.json +++ b/CVE-2024/CVE-2024-331xx/CVE-2024-33102.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33102", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T18:15:19.853", - "lastModified": "2024-04-30T19:35:36.960", + "lastModified": "2024-07-03T01:57:26.367", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de cross-site scripting (XSS) almacenado en el componente /pubs/counter.php de ThinkSAAS v3.7.0 permite a los atacantes ejecutar scripts web o HTML arbitrario a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro de c\u00f3digo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/thinksaas/ThinkSAAS/issues/35", diff --git a/CVE-2024/CVE-2024-331xx/CVE-2024-33110.json b/CVE-2024/CVE-2024-331xx/CVE-2024-33110.json index 06d3108601a..b71498c46f2 100644 --- a/CVE-2024/CVE-2024-331xx/CVE-2024-33110.json +++ b/CVE-2024/CVE-2024-331xx/CVE-2024-33110.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33110", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T15:15:23.537", - "lastModified": "2024-05-06T16:00:59.253", + "lastModified": "2024-07-03T01:57:27.130", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El enrutador D-Link DIR-845L v1.01KRb03 y anteriores es vulnerable a la omisi\u00f3n de permiso a trav\u00e9s del componente getcfg.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], "references": [ { "url": "https://github.com/yj94/Yj_learning/blob/main/Week16/D-LINK-POC.md", diff --git a/CVE-2024/CVE-2024-331xx/CVE-2024-33113.json b/CVE-2024/CVE-2024-331xx/CVE-2024-33113.json index 26c3c33eab9..db02c0c26ea 100644 --- a/CVE-2024/CVE-2024-331xx/CVE-2024-33113.json +++ b/CVE-2024/CVE-2024-331xx/CVE-2024-33113.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33113", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T15:15:23.703", - "lastModified": "2024-05-06T16:00:59.253", + "lastModified": "2024-07-03T01:57:27.973", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,46 @@ "value": "D-LINK DIR-845L <=v1.01KRb03 es vulnerable a la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s de bsc_sms_inbox.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + }, + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/yj94/Yj_learning/blob/main/Week16/D-LINK-POC.md", diff --git a/CVE-2024/CVE-2024-331xx/CVE-2024-33120.json b/CVE-2024/CVE-2024-331xx/CVE-2024-33120.json index 17cc3f4d2cc..2d298dcf605 100644 --- a/CVE-2024/CVE-2024-331xx/CVE-2024-33120.json +++ b/CVE-2024/CVE-2024-331xx/CVE-2024-33120.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33120", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T15:15:09.353", - "lastModified": "2024-05-07T20:07:58.737", + "lastModified": "2024-07-03T01:57:28.817", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que Roothub v2.5 conten\u00eda una vulnerabilidad de carga de archivos arbitraria a trav\u00e9s del par\u00e1metro customPath en la funci\u00f3n upload(). Esta vulnerabilidad permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de un archivo JSP manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "http://roothub.com", diff --git a/CVE-2024/CVE-2024-331xx/CVE-2024-33121.json b/CVE-2024/CVE-2024-331xx/CVE-2024-33121.json index 5a034b928ab..43793ddfd3e 100644 --- a/CVE-2024/CVE-2024-331xx/CVE-2024-33121.json +++ b/CVE-2024/CVE-2024-331xx/CVE-2024-33121.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33121", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T20:15:11.000", - "lastModified": "2024-05-07T13:39:32.710", + "lastModified": "2024-07-03T01:57:29.587", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/33121.txt", diff --git a/CVE-2024/CVE-2024-331xx/CVE-2024-33124.json b/CVE-2024/CVE-2024-331xx/CVE-2024-33124.json index 48d339d2f6e..311ba993237 100644 --- a/CVE-2024/CVE-2024-331xx/CVE-2024-33124.json +++ b/CVE-2024/CVE-2024-331xx/CVE-2024-33124.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33124", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T15:15:09.477", - "lastModified": "2024-05-07T20:07:58.737", + "lastModified": "2024-07-03T01:57:30.343", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que Roothub v2.6 contiene una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro nodeTitle en la funci\u00f3n parentNode()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/33124.txt", diff --git a/CVE-2024/CVE-2024-331xx/CVE-2024-33144.json b/CVE-2024/CVE-2024-331xx/CVE-2024-33144.json index fe2cf16d6b4..a19251925b9 100644 --- a/CVE-2024/CVE-2024-331xx/CVE-2024-33144.json +++ b/CVE-2024/CVE-2024-331xx/CVE-2024-33144.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33144", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T16:15:07.810", - "lastModified": "2024-05-07T20:07:58.737", + "lastModified": "2024-07-03T01:57:31.107", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que J2EEFAST v2.7.0 contiene una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro sql_filter en la funci\u00f3n findApplyedTasksPage en BpmTaskMapper.xml." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/33144.txt", diff --git a/CVE-2024/CVE-2024-331xx/CVE-2024-33146.json b/CVE-2024/CVE-2024-331xx/CVE-2024-33146.json index 7033298d979..b776b0663de 100644 --- a/CVE-2024/CVE-2024-331xx/CVE-2024-33146.json +++ b/CVE-2024/CVE-2024-331xx/CVE-2024-33146.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33146", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T16:15:07.877", - "lastModified": "2024-05-07T20:07:58.737", + "lastModified": "2024-07-03T01:57:31.870", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Se descubri\u00f3 que J2EEFAST v2.7.0 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro sql_filter en la funci\u00f3n de exportaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/33146.txt", diff --git a/CVE-2024/CVE-2024-331xx/CVE-2024-33149.json b/CVE-2024/CVE-2024-331xx/CVE-2024-33149.json index 73bbde6d534..7c3af958dfe 100644 --- a/CVE-2024/CVE-2024-331xx/CVE-2024-33149.json +++ b/CVE-2024/CVE-2024-331xx/CVE-2024-33149.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33149", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T17:15:08.910", - "lastModified": "2024-05-07T20:07:58.737", + "lastModified": "2024-07-03T01:57:32.207", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que J2EEFAST v2.7.0 contiene una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro sql_filter en la funci\u00f3n myProcessList." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/33149.txt", diff --git a/CVE-2024/CVE-2024-331xx/CVE-2024-33153.json b/CVE-2024/CVE-2024-331xx/CVE-2024-33153.json index 579805eac17..011654ddcc9 100644 --- a/CVE-2024/CVE-2024-331xx/CVE-2024-33153.json +++ b/CVE-2024/CVE-2024-331xx/CVE-2024-33153.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33153", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T17:15:08.967", - "lastModified": "2024-05-07T20:07:58.737", + "lastModified": "2024-07-03T01:57:33.003", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que J2EEFAST v2.7.0 contiene una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro sql_filter en la funci\u00f3n commentList()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/33153.txt", diff --git a/CVE-2024/CVE-2024-331xx/CVE-2024-33155.json b/CVE-2024/CVE-2024-331xx/CVE-2024-33155.json index 0e0b73573de..f7ca7cd32d7 100644 --- a/CVE-2024/CVE-2024-331xx/CVE-2024-33155.json +++ b/CVE-2024/CVE-2024-331xx/CVE-2024-33155.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33155", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T17:15:09.030", - "lastModified": "2024-05-07T20:07:58.737", + "lastModified": "2024-07-03T01:57:33.780", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que J2EEFAST v2.7.0 contiene una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro sql_filter en la funci\u00f3n getDeptList()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/33155.txt", diff --git a/CVE-2024/CVE-2024-331xx/CVE-2024-33161.json b/CVE-2024/CVE-2024-331xx/CVE-2024-33161.json index 9197fc8f539..1bcd6803e1b 100644 --- a/CVE-2024/CVE-2024-331xx/CVE-2024-33161.json +++ b/CVE-2024/CVE-2024-331xx/CVE-2024-33161.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33161", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T17:15:09.080", - "lastModified": "2024-05-07T20:07:58.737", + "lastModified": "2024-07-03T01:57:34.540", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que J2EEFAST v2.7.0 contiene una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro sql_filter en la funci\u00f3n unallocatedList()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/33161.txt", diff --git a/CVE-2024/CVE-2024-331xx/CVE-2024-33164.json b/CVE-2024/CVE-2024-331xx/CVE-2024-33164.json index 36f2b9e69fb..c6231c22238 100644 --- a/CVE-2024/CVE-2024-331xx/CVE-2024-33164.json +++ b/CVE-2024/CVE-2024-331xx/CVE-2024-33164.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33164", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T17:15:09.140", - "lastModified": "2024-05-07T20:07:58.737", + "lastModified": "2024-07-03T01:57:35.293", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Se descubri\u00f3 que J2EEFAST v2.7.0 contiene una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro sql_filter en la funci\u00f3n authUserList()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/33164.txt", diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33211.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33211.json index 2573be50c3e..a3e6dc133e2 100644 --- a/CVE-2024/CVE-2024-332xx/CVE-2024-33211.json +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33211.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33211", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-23T15:15:50.030", - "lastModified": "2024-04-24T13:39:42.883", + "lastModified": "2024-07-03T01:57:35.503", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que Tenda FH1206 V1.2.0.8(8155)_EN contiene una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria a trav\u00e9s del par\u00e1metro PPPOEPassword en ip/goform/QuickIndex." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://palm-vertebra-fe9.notion.site/formQuickIndex-e1f24466830f4cb4a7756d6997f411b4", diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33213.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33213.json index fffb83d67d9..9cd0a8064f5 100644 --- a/CVE-2024/CVE-2024-332xx/CVE-2024-33213.json +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33213.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33213", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-23T15:15:50.150", - "lastModified": "2024-04-24T13:39:42.883", + "lastModified": "2024-07-03T01:57:36.257", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que Tenda FH1206 V1.2.0.8(8155)_EN contiene una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria a trav\u00e9s del par\u00e1metro mitInterface en ip/goform/RouteStatic." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://palm-vertebra-fe9.notion.site/fromRouteStatic_2-e98a555978be404583fef5f5c1e50efa", diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33214.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33214.json index fb12ea91f0b..2d2c304eea5 100644 --- a/CVE-2024/CVE-2024-332xx/CVE-2024-33214.json +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33214.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33214", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-23T15:15:50.197", - "lastModified": "2024-04-24T13:39:42.883", + "lastModified": "2024-07-03T01:57:37.013", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que Tenda FH1206 V1.2.0.8(8155)_EN contiene una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria a trav\u00e9s del par\u00e1metro de entradas en ip/goform/RouteStatic." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://palm-vertebra-fe9.notion.site/fromRouteStatic_1-c8b6c87ee247481c9728a4ed4c6ac853", diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33215.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33215.json index 87b5b5f1c13..a654cc484ed 100644 --- a/CVE-2024/CVE-2024-332xx/CVE-2024-33215.json +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33215.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33215", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-23T15:15:50.250", - "lastModified": "2024-04-24T13:39:42.883", + "lastModified": "2024-07-03T01:57:37.763", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que Tenda FH1206 V1.2.0.8(8155)_EN contiene una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria a trav\u00e9s del par\u00e1metro mitInterface en ip/goform/addressNat." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://palm-vertebra-fe9.notion.site/fromAddressNat_mitInterface-20fb36254513485082243e393b11fd1c", diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33259.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33259.json index ce5395eeb12..daa62569b8d 100644 --- a/CVE-2024/CVE-2024-332xx/CVE-2024-33259.json +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33259.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33259", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-26T15:15:49.250", - "lastModified": "2024-04-26T15:32:22.523", + "lastModified": "2024-07-03T01:57:38.597", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que el commit cefd391 de Jerryscript conten\u00eda una infracci\u00f3n de segmentaci\u00f3n a trav\u00e9s del componente scanner_seek en jerry-core/parser/js/js-scanner-util.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://github.com/jerryscript-project/jerryscript/issues/5132", diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33260.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33260.json index 76bf662ddcf..6e335ddc91e 100644 --- a/CVE-2024/CVE-2024-332xx/CVE-2024-33260.json +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33260.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33260", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-26T15:15:49.303", - "lastModified": "2024-04-26T15:32:22.523", + "lastModified": "2024-07-03T01:57:39.373", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que el commit cefd391 de Jerryscript conten\u00eda una infracci\u00f3n de segmentaci\u00f3n a trav\u00e9s del componente parser_parse_class en jerry-core/parser/js/js-parser-expr.c" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://github.com/jerryscript-project/jerryscript/issues/5133", diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33267.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33267.json index 86626439346..73dd0e0d9c0 100644 --- a/CVE-2024/CVE-2024-332xx/CVE-2024-33267.json +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33267.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33267", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T15:15:52.953", - "lastModified": "2024-04-30T17:52:35.057", + "lastModified": "2024-07-03T01:57:40.120", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en Hero hfheropaid v.1.2.5 y anteriores permite a un atacante escalar privilegios a trav\u00e9s de la funci\u00f3n HfHeropaidGatewayBackModuleFrontController::initContent()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://security.friendsofpresta.org/modules/2024/04/29/hfheropayment.html", diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33269.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33269.json index 47ad349a9ed..3a265c80961 100644 --- a/CVE-2024/CVE-2024-332xx/CVE-2024-33269.json +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33269.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33269", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T20:15:08.607", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-07-03T01:57:40.893", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en Prestaddons flashsales 1.9.7 y anteriores permite a un atacante ejecutar comandos SQL arbitrarios a trav\u00e9s del m\u00e9todo FsModel::getFlashSales." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://security.friendsofpresta.org/modules/2024/04/25/flashsales.html", diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33271.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33271.json index 82f964e487a..3545c584c26 100644 --- a/CVE-2024/CVE-2024-332xx/CVE-2024-33271.json +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33271.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33271", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T20:15:08.657", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-07-03T01:57:41.730", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en FME Modules eventsmanager anterior a 4.4.0 permite a un atacante obtener informaci\u00f3n confidencial del componente ps_customer." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-359" + } + ] + } + ], "references": [ { "url": "https://security.friendsofpresta.org/modules/2024/04/25/eventsmanager.html", diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33275.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33275.json index 1530bc601b7..c8fb85e3351 100644 --- a/CVE-2024/CVE-2024-332xx/CVE-2024-33275.json +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33275.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33275", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T15:15:53.187", - "lastModified": "2024-04-30T17:52:35.057", + "lastModified": "2024-07-03T01:57:42.480", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en Webbax supernewsletter v.1.4.21 y anteriores permite a un atacante remoto escalar privilegios a trav\u00e9s del m\u00f3dulo Super Newsletter en los componentes product_search.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://security.friendsofpresta.org/modules/2024/04/29/supernewsletter.html", diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33276.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33276.json index 872b91b4e69..c8f0b22192f 100644 --- a/CVE-2024/CVE-2024-332xx/CVE-2024-33276.json +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33276.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33276", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T20:15:08.753", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-07-03T01:57:43.290", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en m\u00f3dulos FME preorderandnotication v.3.1.0 y anteriores permite a un atacante remoto ejecutar comandos SQL arbitrarios a trav\u00e9s del m\u00e9todo PreorderModel::getIdProductAttributesByIdAttributes()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://security.friendsofpresta.org/modules/2024/04/25/preorderandnotification.html", diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33278.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33278.json index f91f89ffbad..fe556ea4613 100644 --- a/CVE-2024/CVE-2024-332xx/CVE-2024-33278.json +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33278.json @@ -2,15 +2,55 @@ "id": "CVE-2024-33278", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-24T14:15:11.687", - "lastModified": "2024-06-24T19:26:47.037", + "lastModified": "2024-07-03T01:57:44.047", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer Overflow vulnerability in ASUS router RT-AX88U with firmware versions v3.0.0.4.388_24198 allows a remote attacker to execute arbitrary code via the connection_state_machine due to improper length validation for the cookie field." + }, + { + "lang": "es", + "value": "Vulnerabilidad de desbordamiento de b\u00fafer en el enrutador ASUS RT-AX88U con versiones de firmware v3.0.0.4.388_24198 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de Connection_state_machine debido a una validaci\u00f3n de longitud incorrecta para el campo de cookies." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/viktoredstrom/cd2580fb0e93e47133b2998553b0a52f", diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33292.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33292.json index 791de6e21a2..ea8322f5992 100644 --- a/CVE-2024/CVE-2024-332xx/CVE-2024-33292.json +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33292.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33292", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T19:15:26.857", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-07-03T01:57:44.807", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en Realization MGSD v.1.0 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro id." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/JayChousfan/6a3a8e5a0fa5f1088d83ee21ed2dbb4a", diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33294.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33294.json index 6e40412d458..840eae0ece9 100644 --- a/CVE-2024/CVE-2024-332xx/CVE-2024-33294.json +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33294.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33294", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T15:15:23.753", - "lastModified": "2024-05-06T16:00:59.253", + "lastModified": "2024-07-03T01:57:45.580", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en el sistema de librer\u00eda que usa PHP/MySQli con Source Code V1.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de la variable _FAILE en el componente Student_edit_photo.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/CveSecLook/cve/issues/16", diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33300.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33300.json index 59381c5b427..f2e6cdadcf3 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33300.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33300.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33300", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T19:15:26.910", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-07-03T01:57:46.330", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Typora v1.0.0 a la versi\u00f3n v1.7 (a continuaci\u00f3n) El editor Markdown tiene una vulnerabilidad de Cross Site Scripting (XSS), que permite a los atacantes ejecutar c\u00f3digo arbitrario cargando archivos Markdown." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/whoisoo6/Stored-xss-vulnerability-exists-in-Typra", diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33302.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33302.json index 32d26c52ada..42758d44918 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33302.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33302.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33302", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-02T14:15:09.883", - "lastModified": "2024-05-02T18:00:37.360", + "lastModified": "2024-07-03T01:57:47.117", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "SourceCodester Product Show Room 1.0 y anteriores son vulnerables a Cross Site Scripting (XSS) a trav\u00e9s del \"Segundo nombre\" en Agregar usuarios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33302.md", diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33303.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33303.json index 465486e07f4..e5dee013869 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33303.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33303.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33303", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-02T14:15:09.950", - "lastModified": "2024-05-02T18:00:37.360", + "lastModified": "2024-07-03T01:57:47.943", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "SourceCodester Product Show Room 1.0 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s de \"Nombre\" en Agregar usuarios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33303.md", diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33304.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33304.json index 6d742c194ab..52349222fd5 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33304.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33304.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33304", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T19:15:26.970", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-07-03T01:57:48.707", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "SourceCodester Product Show Room 1.0 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s de \"Apellido\" en Agregar usuarios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33304.md", diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33305.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33305.json index 6c9a09d995b..56863caeb64 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33305.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33305.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33305", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-02T14:15:10.023", - "lastModified": "2024-05-02T18:00:37.360", + "lastModified": "2024-07-03T01:57:49.460", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33305.md", diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33306.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33306.json index dd82bd4dc30..625c799fb8e 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33306.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33306.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33306", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T20:15:12.787", - "lastModified": "2024-05-02T13:27:25.103", + "lastModified": "2024-07-03T01:57:50.153", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "SourceCodester Laboratory Management System 1.0 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s del par\u00e1metro \"Nombre\" en Crear usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33306.md", diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33327.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33327.json index 7bf74c85f72..28947fe0477 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33327.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33327.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33327", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-26T19:15:13.290", - "lastModified": "2024-06-27T12:47:19.847", + "lastModified": "2024-07-03T01:57:51.030", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de Cross Site Scripting (XSS) en el componente UrlAccessibilityEvaluaci\u00f3n.jsp de Lumisxp v15.0.x a v16.1.x permite a los atacantes ejecutar scripts web o HTML de su elecci\u00f3n a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro contentHtml." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/rodnt/c53d4c95bb6966f0a2cf381ae5089c79", diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33329.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33329.json index 025d1caf2f0..1def15f0472 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33329.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33329.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33329", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-26T19:15:13.453", - "lastModified": "2024-06-27T12:47:19.847", + "lastModified": "2024-07-03T01:57:51.877", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/rodnt/f6b3a2ac875b8f13656063eefbfd9812", diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33332.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33332.json index b612e4f6c27..494c41d6387 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33332.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33332.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33332", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T20:15:08.467", - "lastModified": "2024-05-01T13:02:20.750", + "lastModified": "2024-07-03T01:57:52.560", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/wy876/cve/issues/3", diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33335.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33335.json index ad1c149090b..1f45d668259 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33335.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33335.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33335", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-20T17:15:50.820", - "lastModified": "2024-06-24T15:15:11.490", + "lastModified": "2024-07-03T01:57:53.270", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en H3C SeaSQL DWS v.2.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un archivo manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/vrhappy/08cb4c8721eed8a74fe786ecdff1ec1e", diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33342.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33342.json index bd4affe989c..5d6ffa7603b 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33342.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33342.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33342", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-26T18:15:46.350", - "lastModified": "2024-04-26T19:59:19.793", + "lastModified": "2024-07-03T01:57:54.047", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que D-Link DIR-822+ V1.0.5 conten\u00eda una inyecci\u00f3n de comando en la funci\u00f3n SetPlcNetworkpwd de prog.cgi, que permite a atacantes remotos ejecutar comandos arbitrarios a trav\u00e9s del shell." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "http://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-822%2B", diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33343.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33343.json index 839309086c3..a51bd7085b7 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33343.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33343.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33343", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-26T18:15:46.413", - "lastModified": "2024-04-26T19:59:19.793", + "lastModified": "2024-07-03T01:57:54.823", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que D-Link DIR-822+ V1.0.5 conten\u00eda una inyecci\u00f3n de comando en la funci\u00f3n ChgSambaUserSettings de prog.cgi, que permite a atacantes remotos ejecutar comandos arbitrarios a trav\u00e9s del shell." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "http://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-822%2B", diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33344.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33344.json index 2a333e7ff3f..8a048ae900a 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33344.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33344.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33344", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-26T18:15:46.467", - "lastModified": "2024-04-26T19:59:19.793", + "lastModified": "2024-07-03T01:57:55.620", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que D-Link DIR-822+ V1.0.5 contiene una inyecci\u00f3n de comando en la funci\u00f3n ftext de upload_firmware.cgi, que permite a atacantes remotos ejecutar comandos arbitrarios a trav\u00e9s de shell." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "http://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-822%2B", diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33345.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33345.json index 287c4695f13..24a78628017 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33345.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33345.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33345", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T18:15:07.990", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-07-03T01:57:56.393", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que D-Link DIR-823G A1V1.0.2B05 conten\u00eda una desreferencia de puntero nulo en la funci\u00f3n principal de upload_firmware.cgi, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una entrada manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "http://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-823G", diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33350.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33350.json index 765a4ec8254..3c9ee4d3267 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33350.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33350.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33350", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T21:15:47.960", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-07-03T01:57:57.207", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de Directory Traversal en TaoCMS v.3.0.2 permite a un atacante remoto ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s del componente include/model/file.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://github.com/majic-banana/vulnerability/blob/main/POC/taocms-3.0.2%20Arbitrary%20File%20Writing%20Vulnerability.md", diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33374.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33374.json index 054f19b3b6b..0135b02b945 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33374.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33374.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33374", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-14T15:15:50.073", - "lastModified": "2024-06-17T18:15:16.017", + "lastModified": "2024-07-03T01:57:58.047", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El control de acceso incorrecto en la interfaz UART/Serial en el enrutador LB-LINK BL-W1210M v2.0 permite a los atacantes acceder al terminal ra\u00edz sin autenticaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://github.com/ShravanSinghRathore/Security-Advisory-Multiple-Vulnerabilities-in-LB-link-BL-W1210M-Router/wiki/Incorrect-Access-Control-%28CVE%E2%80%902024%E2%80%9033374%29", diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33383.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33383.json index 58989ba6398..3857726a9cb 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33383.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33383.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33383", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T20:15:08.580", - "lastModified": "2024-05-01T13:02:20.750", + "lastModified": "2024-07-03T01:57:58.903", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de lectura arbitraria de archivos en novel-plus 4.3.0 y anteriores permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de una solicitud GET manipulada utilizando el par\u00e1metro filePath." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], "references": [ { "url": "https://juvl1ne.github.io/2024/04/18/novel-plus-vulnerability/", diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33393.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33393.json index 2145b1fde38..4328bae450b 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33393.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33393.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33393", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T19:15:27.020", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-07-03T01:57:59.677", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,46 @@ "value": "Un problema en spidernet-io spiderpool v.0.9.3 y anteriores permite a un atacante local ejecutar c\u00f3digo arbitrario mediante un comando manipulado para obtener el componente token." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + }, + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/HouqiyuA/fdb09caea44c80a5681ca1d30bcd6777", diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33394.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33394.json index ae327693cdf..2597d11304a 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33394.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33394.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33394", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-02T18:15:07.523", - "lastModified": "2024-05-03T12:50:34.250", + "lastModified": "2024-07-03T01:58:00.483", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en kubevirt kubevirt v1.2.0 y anteriores permite a un atacante local ejecutar c\u00f3digo arbitrario mediante un comando manipulado para obtener el componente token." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/HouqiyuA/1b75e23ece7ad98490aec1c887bdf49b", diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33396.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33396.json index 45d07ce784e..4ad9ce7c9a9 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33396.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33396.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33396", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-02T19:15:06.117", - "lastModified": "2024-05-03T12:50:34.250", + "lastModified": "2024-07-03T01:58:01.270", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en karmada-io karmada v1.9.0 y anteriores permite a un atacante local ejecutar c\u00f3digo arbitrario mediante un comando manipulado para obtener el componente token." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/HouqiyuA/2b56a893c06553013982836abb77ba50", diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33398.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33398.json index be4413b1e26..e1c201b688b 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33398.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33398.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33398", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-03T16:15:11.393", - "lastModified": "2024-05-06T12:44:56.377", + "lastModified": "2024-07-03T01:58:02.040", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Hay un ClusterRole en piraeus-operator v2.5.0 y versiones anteriores al que se le ha otorgado permiso de lista de secretos, lo que permite a un atacante hacerse pasar por la cuenta de servicio vinculada a este ClusterRole y usar sus privilegios de alto riesgo para enumerar informaci\u00f3n confidencial en todo el cl\u00faster." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/HouqiyuA/d0c11fae5ba4789946ae33175d0f9edb", diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33401.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33401.json index 9c7871cefcd..3b458992707 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33401.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33401.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33401", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T22:15:06.943", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-07-03T01:58:02.837", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://gitee.com/zchuanwen/cve123/issues/I9I18D", diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33402.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33402.json index d36bb41a532..06602d13e43 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33402.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33402.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33402", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T18:15:09.010", - "lastModified": "2024-05-29T13:02:09.280", + "lastModified": "2024-07-03T01:58:03.570", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n SQL en /model/approve_petty_cash.php en campcodes Complete Web-Based School Management System 1.0 permite a un atacante ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro id." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%204.pdf", diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33404.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33404.json index 322e6b8f25a..64c33be10ae 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33404.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33404.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33404", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T18:15:07.927", - "lastModified": "2024-05-06T19:53:38.797", + "lastModified": "2024-07-03T01:58:04.417", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n SQL en /model/add_student_first_paid.php en campcodes Complete Web-Based School Management System 1.0 permite a un atacante ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro index." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 8.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%203.pdf", diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33405.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33405.json index d6587f65272..0f3af0904e6 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33405.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33405.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33405", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T18:15:08.000", - "lastModified": "2024-05-28T18:15:09.170", + "lastModified": "2024-07-03T01:58:05.170", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en add_friends.php en campcodes Complete Web-Based School Management System 1.0 permite al atacante ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro friend_index." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%204.pdf", diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33406.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33406.json index c3945a8b777..bf2aa5b7ac1 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33406.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33406.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33406", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T18:15:08.067", - "lastModified": "2024-05-28T18:15:09.227", + "lastModified": "2024-07-03T01:58:05.953", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en /model/delete_student_grade_subject.php en campcodes Complete Web-Based School Management System 1.0 permite al atacante ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro index." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%205.pdf", diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33407.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33407.json index aa59a082be7..033e6024537 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33407.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33407.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33407", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T18:15:08.120", - "lastModified": "2024-05-06T19:53:38.797", + "lastModified": "2024-07-03T01:58:06.720", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en /model/delete_record.php en campcodes Complete Web-Based School Management System 1.0 permite al atacante ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro id." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%206.pdf", diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33410.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33410.json index 50ba59f610c..fad4ec29ef0 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33410.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33410.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33410", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T18:15:08.283", - "lastModified": "2024-05-28T18:15:09.427", + "lastModified": "2024-07-03T01:58:07.577", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en /model/delete_range_grade.php en campcodes Complete Web-Based School Management System 1.0 permite al atacante ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro id." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%205.pdf", diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33411.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33411.json index 261b367a7ae..7a4736836c6 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33411.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33411.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33411", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T18:15:08.347", - "lastModified": "2024-05-28T18:15:09.483", + "lastModified": "2024-07-03T01:58:08.337", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n SQL en /model/get_admin_profile.php en Campcodes Complete Web-Based School Management System 1.0 permite a un atacante ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro my_index." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2010.pdf", diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33423.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33423.json index 569854c01f3..58ba64aaca5 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33423.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33423.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33423", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T20:15:12.887", - "lastModified": "2024-05-02T13:27:25.103", + "lastModified": "2024-07-03T01:58:09.100", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La vulnerabilidad de Cross Site Scripting (XSS) en el men\u00fa Configuraci\u00f3n de CMSimple v5.15 permite a los atacantes ejecutar script web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro Cerrar sesi\u00f3n en la secci\u00f3n Idioma." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], "references": [ { "url": "https://github.com/adiapera/xss_language_cmsimple_5.15", diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33424.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33424.json index 8356025d1aa..73aba5e6a67 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33424.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33424.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33424", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T19:15:27.070", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-07-03T01:58:09.857", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de Cross Site Scripting (XSS) en el men\u00fa Configuraci\u00f3n de CMSimple v5.15 permite a los atacantes ejecutar script web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro Descargas en la secci\u00f3n Idioma." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/adiapera/xss_language_cmsimple_5.15", diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33429.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33429.json index bc36986d093..dd977f2ebe0 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33429.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33429.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33429", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T19:15:27.170", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-07-03T01:58:10.623", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de desbordamiento de b\u00fafer en pcm_convert.h:513 de phiola v2.0-rc22 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un archivo .wav manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-2/heap-buffer-overflow-2.assets/image-20240420011116818.png", diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33430.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33430.json index a914aa06ac5..035b0280d18 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33430.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33430.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33430", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T19:15:27.223", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-07-03T01:58:11.383", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,46 @@ "value": "Un problema en phiola/src/afilter/pcm_convert.h:513 de phiola v2.0-rc22 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un archivo .wav manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-482" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/segmentFault-1/poc/I2ZFI3~5", diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33431.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33431.json index 569f9320df3..9739beac71a 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33431.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33431.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33431", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T19:15:27.283", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-07-03T01:58:12.147", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en phiola/src/afilter/conv.c:115 de phiola v2.0-rc22 permite a un atacante remoto provocar una denegaci\u00f3n de servicio a trav\u00e9s de un archivo .wav manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-670" + } + ] + } + ], "references": [ { "url": "https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/flowPointException-1/flowPointException-1.assets/image-20240420004701828.png", diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33434.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33434.json index 9145a4437c6..e435bbaf0ac 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33434.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33434.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33434", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T14:15:10.760", - "lastModified": "2024-05-07T20:07:58.737", + "lastModified": "2024-07-03T01:58:12.927", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en tiagorlampert CHAOS antes de 1b451cf62582295b7225caf5a7b506f0bad56f6b y 24c9e109b5be34df7b2bce8368eae669c481ed5e permite a un atacante remoto ejecutar c\u00f3digo arbitrario mediante la concatenaci\u00f3n insegura del argumento `filename` en la cadena `buildStr` sin ninguna sanitizaci\u00f3n o filtrado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/slimwang/d1ec6645ba9012a551ea436679244496", diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33435.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33435.json index 9f0654926c5..5c442ade524 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33435.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33435.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33435", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T20:15:08.800", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-07-03T01:58:13.733", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de permisos inseguros en Guangzhou Yingshi Electronic Technology Co. El sistema de grabaci\u00f3n y reproducci\u00f3n inteligente de alta definici\u00f3n Ncast Yingshi 2007-2017 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n backend /manage/IPSetup.php" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + } + ], "references": [ { "url": "https://github.com/vulreport3r/cve-reports/blob/main/Ncast_Yingshi_has_RCE_vulnerabilities/report.md", diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33442.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33442.json index d5dc360a636..6e1bf1dbd76 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33442.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33442.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33442", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T18:15:24.337", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-07-03T01:58:14.593", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en flusity-CMS v.2.33 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente add_post.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/summerwayace/cms/blob/main/1.md", diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33443.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33443.json index 2d63b32c1d2..273619e9d5c 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33443.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33443.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33443", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T18:15:08.100", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-07-03T01:58:15.370", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Un problema en onethink v.1.1 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado en el componente AddonsController.class.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ] + }, "references": [ { "url": "https://gist.github.com/LioTree/a81111fb0c598a920cb49aaf0bd64e58", diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33444.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33444.json index e7bda571ba9..08014a3ef02 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33444.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33444.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33444", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T17:15:19.357", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-07-03T01:58:15.583", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en onethink v.1.1 permite a un atacante remoto escalar privilegios mediante un script manipulado al componente ModelModel.class.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/LioTree/1971a489dd5ff619b89e7a9e1da91152", diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33445.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33445.json index d9ec12ed9c8..25dca23b4d1 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33445.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33445.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33445", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T17:15:19.410", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-07-03T01:58:16.350", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en hisiphp v2.0.111 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado en el par\u00e1metro SystemPlugins::mkInfo en el componente SystemPlugins.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/LioTree/04a4ece38df53af4027d52b2aeb7aff6", diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33454.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33454.json index af829fddd11..d5ada8915d9 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33454.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33454.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33454", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:37:41.710", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:58:17.097", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La vulnerabilidad de desbordamiento de b\u00fafer en esp-idf v.5.1 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado en el componente de la pila Bluetooth." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Zakary-D/30f565c4266c02c62aa9089c363e78e9", diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33485.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33485.json index f2b8eea1a5c..7318fc6dba9 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33485.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33485.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33485", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T18:15:11.950", - "lastModified": "2024-05-14T19:17:55.627", + "lastModified": "2024-07-03T01:58:17.873", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en el sistema de inscripci\u00f3n automatizada CASAP usando PHP/MySQLi con Source Code V1.0 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de un payload manipulado para el componente login.php" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/CveSecLook/cve/issues/17", diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33511.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33511.json index 43735703c3a..b453a151304 100644 --- a/CVE-2024/CVE-2024-335xx/CVE-2024-33511.json +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33511.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33511", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-05-01T15:15:15.060", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-07-03T01:58:19.517", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-004.txt", diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33512.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33512.json index 68a8f6a00c0..f0117aa40f7 100644 --- a/CVE-2024/CVE-2024-335xx/CVE-2024-33512.json +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33512.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33512", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-05-01T15:15:15.257", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-07-03T01:58:20.207", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-004.txt", diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33513.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33513.json index d299a672a0f..347a5b154bd 100644 --- a/CVE-2024/CVE-2024-335xx/CVE-2024-33513.json +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33513.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33513", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-05-01T17:15:36.510", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-07-03T01:58:20.920", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33514.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33514.json index ab098224460..a888d765248 100644 --- a/CVE-2024/CVE-2024-335xx/CVE-2024-33514.json +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33514.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33514", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-05-01T17:15:36.673", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-07-03T01:58:21.100", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-004.txt", diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33515.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33515.json index a37ecf85260..afc2cacc843 100644 --- a/CVE-2024/CVE-2024-335xx/CVE-2024-33515.json +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33515.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33515", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-05-01T17:15:36.837", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-07-03T01:58:21.780", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-004.txt", diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33516.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33516.json index 25ab1492eba..a290c64cfe4 100644 --- a/CVE-2024/CVE-2024-335xx/CVE-2024-33516.json +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33516.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33516", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-05-01T17:15:37.000", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-07-03T01:58:22.457", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-004.txt", diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33518.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33518.json index 4e58ad16832..f75857f13e3 100644 --- a/CVE-2024/CVE-2024-335xx/CVE-2024-33518.json +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33518.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33518", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-05-01T17:15:37.323", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-07-03T01:58:23.150", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-004.txt", diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33525.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33525.json index 0374a07a7ca..e635d563550 100644 --- a/CVE-2024/CVE-2024-335xx/CVE-2024-33525.json +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33525.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33525", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-21T19:15:10.010", - "lastModified": "2024-05-23T17:15:28.933", + "lastModified": "2024-07-03T01:58:23.960", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " Una vulnerabilidad de Cross Site Scripting Almacenado (XSS) en la funci\u00f3n \"Import of organizational units and title of organizational unit\" en ILIAS 7.20 a 7.30 e ILIAS 8.4 a 8.10, as\u00ed como ILIAS 9.0, permite a atacantes remotos autenticados con privilegios administrativos inyectar archivos web arbitrarios. script o HTML a trav\u00e9s de la carga de archivos XML." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://docu.ilias.de/ilias.php?baseClass=illmpresentationgui&cmd=layout&ref_id=1719&obj_id=159938", diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33529.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33529.json index 113ef3667d3..440ed454540 100644 --- a/CVE-2024/CVE-2024-335xx/CVE-2024-33529.json +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33529.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33529", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-21T15:15:29.290", - "lastModified": "2024-05-23T17:15:29.293", + "lastModified": "2024-07-03T01:58:24.870", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": " ILIAS 7 anterior a 7.30 e ILIAS 8 anterior a 8.11, as\u00ed como ILIAS 9.0, permiten a atacantes remotos autenticados con privilegios administrativos ejecutar comandos del sistema operativo mediante la carga de archivos con tipos peligrosos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://docu.ilias.de/ilias.php?baseClass=illmpresentationgui&cmd=layout&ref_id=1719&obj_id=170040", diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33530.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33530.json index ade2115043c..5fa57b3e40b 100644 --- a/CVE-2024/CVE-2024-335xx/CVE-2024-33530.json +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33530.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33530", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-02T16:15:08.190", - "lastModified": "2024-05-02T18:00:37.360", + "lastModified": "2024-07-03T01:58:25.043", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "En Jitsi Meet anterior a 9391, una falla l\u00f3gica en las reuniones Jitsi protegidas con contrase\u00f1a (que utilizan un lobby) conduce a la divulgaci\u00f3n de la contrase\u00f1a de la reuni\u00f3n cuando se invita a un usuario a una llamada despu\u00e9s de esperar en el lobby." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://insinuator.net/2024/05/vulnerability-in-jitsi-meet-meeting-password-disclosure-affecting-meetings-with-lobbies/", diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33531.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33531.json index 9f9221100b6..c18a5dc1a2f 100644 --- a/CVE-2024/CVE-2024-335xx/CVE-2024-33531.json +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33531.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33531", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-24T06:15:14.210", - "lastModified": "2024-04-24T13:39:42.883", + "lastModified": "2024-07-03T01:58:25.220", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "cdbattags lua-resty-jwt 0.2.3 permite a los atacantes eludir todas las comprobaciones de firmas de an\u00e1lisis JWT creando un JWT con un encabezado enc con el valor A256GCM." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] + } + ], "references": [ { "url": "https://github.com/cdbattags/lua-resty-jwt/commit/d1558e2afefe868fea1e7e9a4b04ea94ab678a85", diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33601.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33601.json index 7dcb9ff280b..367cdc730e1 100644 --- a/CVE-2024/CVE-2024-336xx/CVE-2024-33601.json +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33601.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33601", "sourceIdentifier": "3ff69d7a-14f2-4f67-a097-88dee7810d18", "published": "2024-05-06T20:15:11.603", - "lastModified": "2024-06-30T15:15:09.900", + "lastModified": "2024-07-03T01:58:29.503", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "nscd: la cach\u00e9 de netgroup puede terminar el daemon ante una falla en la asignaci\u00f3n de memoria La cach\u00e9 de netgroup del daemon de cach\u00e9 del servicio de nombres (nscd) usa xmalloc o xrealloc y estas funciones pueden terminar el proceso debido a una falla en la asignaci\u00f3n de memoria que resulta en una denegaci\u00f3n de servicio a los clientes. La falla se introdujo en glibc 2.15 cuando se agreg\u00f3 el cach\u00e9 a nscd. Esta vulnerabilidad s\u00f3lo est\u00e1 presente en el binario nscd." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "3ff69d7a-14f2-4f67-a097-88dee7810d18", diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33602.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33602.json index 82986a2af49..f6d1cfae78a 100644 --- a/CVE-2024/CVE-2024-336xx/CVE-2024-33602.json +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33602.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33602", "sourceIdentifier": "3ff69d7a-14f2-4f67-a097-88dee7810d18", "published": "2024-05-06T20:15:11.680", - "lastModified": "2024-06-30T15:15:09.973", + "lastModified": "2024-07-03T01:58:29.700", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "nscd: la cach\u00e9 de netgroup supone que la devoluci\u00f3n de llamada de NSS utiliza cadenas en el b\u00fafer La cach\u00e9 de netgroup del daemon de cach\u00e9 del servicio de nombres (nscd) puede da\u00f1ar la memoria cuando la devoluci\u00f3n de llamada de NSS no almacena todas las cadenas en el b\u00fafer proporcionado. La falla se introdujo en glibc 2.15 cuando se agreg\u00f3 el cach\u00e9 a nscd. Esta vulnerabilidad s\u00f3lo est\u00e1 presente en el binario nscd." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, "weaknesses": [ { "source": "3ff69d7a-14f2-4f67-a097-88dee7810d18", diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33631.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33631.json index e9a6686dac9..e791000c25a 100644 --- a/CVE-2024/CVE-2024-336xx/CVE-2024-33631.json +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33631.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33631", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-29T06:15:14.940", - "lastModified": "2024-04-29T12:42:03.667", + "lastModified": "2024-07-03T01:58:30.720", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33661.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33661.json index c7ce09a5618..b6cbfff0b6d 100644 --- a/CVE-2024/CVE-2024-336xx/CVE-2024-33661.json +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33661.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33661", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-26T00:15:08.953", - "lastModified": "2024-04-26T12:58:17.720", + "lastModified": "2024-07-03T01:58:33.073", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Portainer anterior a 2.20.0 permite redireccionamientos cuando el objetivo no es index.yaml." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], "references": [ { "url": "https://github.com/portainer/portainer/compare/2.19.4...2.20.0", diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33666.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33666.json index 15f2bb69357..b3e393abff2 100644 --- a/CVE-2024/CVE-2024-336xx/CVE-2024-33666.json +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33666.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33666", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-26T01:15:46.190", - "lastModified": "2024-04-26T12:58:17.720", + "lastModified": "2024-07-03T01:58:33.837", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en Zammad antes de la versi\u00f3n 6.3.0. Los usuarios con acceso de cliente a un ticket podr\u00edan haber accedido a los detalles de contabilidad de tiempo de este ticket a trav\u00e9s de la API. Estos datos deben estar disponibles s\u00f3lo para los agentes." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://zammad.com/en/advisories/zaa-2024-01", diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33668.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33668.json index 8f44ae2c061..b064af55b91 100644 --- a/CVE-2024/CVE-2024-336xx/CVE-2024-33668.json +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33668.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33668", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-26T01:15:46.320", - "lastModified": "2024-04-26T12:58:17.720", + "lastModified": "2024-07-03T01:58:34.653", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en Zammad antes de la versi\u00f3n 6.3.0. Zammad Upload Cache utiliza FormID inseguros y parcialmente adivinables para identificar el contenido. Un atacante podr\u00eda intentar forzarlos para que carguen contenido malicioso en borradores de art\u00edculos a los que no tienen acceso." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], "references": [ { "url": "https://zammad.com/en/advisories/zaa-2024-02", diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33669.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33669.json index 0ff05cf5529..4a55726fd51 100644 --- a/CVE-2024/CVE-2024-336xx/CVE-2024-33669.json +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33669.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33669", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-26T01:15:46.383", - "lastModified": "2024-04-26T12:58:17.720", + "lastModified": "2024-07-03T01:58:35.420", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://blog.quarkslab.com/passbolt-a-bold-use-of-haveibeenpwned.html", diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33670.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33670.json index ea4c2f9e8b8..e4344379ebc 100644 --- a/CVE-2024/CVE-2024-336xx/CVE-2024-33670.json +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33670.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33670", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-26T01:15:46.573", - "lastModified": "2024-04-26T12:58:17.720", + "lastModified": "2024-07-03T01:58:36.127", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://help.passbolt.com/incidents/reflective-html-injection-vulnerability", diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33672.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33672.json index 139bf660fea..9bea7082f5a 100644 --- a/CVE-2024/CVE-2024-336xx/CVE-2024-33672.json +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33672.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33672", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-26T02:15:06.607", - "lastModified": "2024-04-26T12:58:17.720", + "lastModified": "2024-07-03T01:58:36.807", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], "references": [ { "url": "https://www.veritas.com/support/en_US/security/VTS24-001", diff --git a/CVE-2024/CVE-2024-337xx/CVE-2024-33748.json b/CVE-2024/CVE-2024-337xx/CVE-2024-33748.json index 13cb0c8c5a0..620ae9fff1d 100644 --- a/CVE-2024/CVE-2024-337xx/CVE-2024-33748.json +++ b/CVE-2024/CVE-2024-337xx/CVE-2024-33748.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33748", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T16:15:07.943", - "lastModified": "2024-05-14T15:38:03.207", + "lastModified": "2024-07-03T01:58:38.810", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de Cross-site scripting (XSS) en la funci\u00f3n de b\u00fasqueda en MvnRepository MS Basic 2.1.18.3 y versiones anteriores." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/Fr1ezy/Fr1ezy-ms-basic_XSS", diff --git a/CVE-2024/CVE-2024-337xx/CVE-2024-33752.json b/CVE-2024/CVE-2024-337xx/CVE-2024-33752.json index 5fa485ad77a..957630584cc 100644 --- a/CVE-2024/CVE-2024-337xx/CVE-2024-33752.json +++ b/CVE-2024/CVE-2024-337xx/CVE-2024-33752.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33752", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T14:15:08.003", - "lastModified": "2024-05-06T16:00:59.253", + "lastModified": "2024-07-03T01:58:39.567", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Existe una vulnerabilidad de carga de archivos arbitrarios en emlog pro 2.3.0 y pro 2.3.2 en admin/views/plugin.php que podr\u00eda ser aprovechada por un atacante remoto para enviar una solicitud especial para cargar un archivo malicioso para ejecutar c\u00f3digo arbitrario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://github.com/Myanemo/emlogpro/blob/main/emlog%20pro2.3.2%20File%20upload%20to%20getshell.md", diff --git a/CVE-2024/CVE-2024-337xx/CVE-2024-33753.json b/CVE-2024/CVE-2024-337xx/CVE-2024-33753.json index c0e70bd23aa..6aa314a6e88 100644 --- a/CVE-2024/CVE-2024-337xx/CVE-2024-33753.json +++ b/CVE-2024/CVE-2024-337xx/CVE-2024-33753.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33753", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T12:15:08.223", - "lastModified": "2024-05-06T12:44:56.377", + "lastModified": "2024-07-03T01:58:40.327", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Section Camera V2.5.5.3116-S50-SMA-B20160811 y versiones anteriores permiten cambiar las cuentas y contrase\u00f1as de administradores y usuarios sin autorizaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://github.com/kklzzcun/Camera/blob/main/Camera/%E8%B6%8A%E6%9D%83%E4%BF%AE%E6%94%B9%E7%AE%A1%E7%90%86%E5%91%98%E6%88%96%E7%94%A8%E6%88%B7%E4%BF%A1%E6%81%AF.md", diff --git a/CVE-2024/CVE-2024-337xx/CVE-2024-33763.json b/CVE-2024/CVE-2024-337xx/CVE-2024-33763.json index 4c687b71b2a..fcafab496bb 100644 --- a/CVE-2024/CVE-2024-337xx/CVE-2024-33763.json +++ b/CVE-2024/CVE-2024-337xx/CVE-2024-33763.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33763", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T03:15:07.257", - "lastModified": "2024-05-01T13:02:20.750", + "lastModified": "2024-07-03T01:58:41.113", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que lunasvg v2.3.9 conten\u00eda un desbordamiento insuficiente del b\u00fafer de pila en lunasvg/source/layoutcontext.cpp." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-124" + } + ] + } + ], "references": [ { "url": "https://github.com/keepinggg/poc/tree/main/poc_of_lunasvg", diff --git a/CVE-2024/CVE-2024-337xx/CVE-2024-33768.json b/CVE-2024/CVE-2024-337xx/CVE-2024-33768.json index e863403dce0..60b7654094d 100644 --- a/CVE-2024/CVE-2024-337xx/CVE-2024-33768.json +++ b/CVE-2024/CVE-2024-337xx/CVE-2024-33768.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33768", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T03:15:07.463", - "lastModified": "2024-05-01T13:02:20.750", + "lastModified": "2024-07-03T01:58:42.057", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que lunasvg v2.3.9 conten\u00eda una infracci\u00f3n de segmentaci\u00f3n a trav\u00e9s del componente composition_solid_source_over." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-653" + } + ] + } + ], "references": [ { "url": "https://github.com/keepinggg/poc/tree/main/poc_of_lunasvg", diff --git a/CVE-2024/CVE-2024-337xx/CVE-2024-33772.json b/CVE-2024/CVE-2024-337xx/CVE-2024-33772.json index cd30d9dd317..872c4e65ef7 100644 --- a/CVE-2024/CVE-2024-337xx/CVE-2024-33772.json +++ b/CVE-2024/CVE-2024-337xx/CVE-2024-33772.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33772", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:05.437", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:58:42.817", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de desbordamiento de b\u00fafer en /bin/boa en D-Link DIR-619L Rev.B 2.06B1 a trav\u00e9s de formTcpipSetup permite a usuarios remotos autenticados activar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s del par\u00e1metro \"curTime\"." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/YuboZhaoo/IoT/blob/main/D-Link/DIR-619L/20240424.md", diff --git a/CVE-2024/CVE-2024-337xx/CVE-2024-33775.json b/CVE-2024/CVE-2024-337xx/CVE-2024-33775.json index 8bbb3f6c63b..6dfcb25a66c 100644 --- a/CVE-2024/CVE-2024-337xx/CVE-2024-33775.json +++ b/CVE-2024/CVE-2024-337xx/CVE-2024-33775.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33775", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T13:15:52.130", - "lastModified": "2024-05-02T16:15:08.243", + "lastModified": "2024-07-03T01:58:43.587", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema con el componente Autodiscover en Nagios XI 2024R1.01 permite a un atacante remoto escalar privilegios a trav\u00e9s de un Dashlet manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://github.com/Neo-XeD/CVE-2024-33775", diff --git a/CVE-2024/CVE-2024-337xx/CVE-2024-33780.json b/CVE-2024/CVE-2024-337xx/CVE-2024-33780.json index 669615f852b..9ae6d9047c4 100644 --- a/CVE-2024/CVE-2024-337xx/CVE-2024-33780.json +++ b/CVE-2024/CVE-2024-337xx/CVE-2024-33780.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33780", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T14:15:10.820", - "lastModified": "2024-05-07T20:07:58.737", + "lastModified": "2024-07-03T01:58:44.400", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que MP-SPDZ v0.3.8 conten\u00eda una infracci\u00f3n de segmentaci\u00f3n mediante la funci\u00f3n osuCrypto::copyOut en /Tools/SilentPprf.cpp. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante un mensaje manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/FudanMPL/Vulnerabilities-in-MPC-Framework/tree/main/MP-SPDZ/SEGV-SlientPprf-3", diff --git a/CVE-2024/CVE-2024-337xx/CVE-2024-33781.json b/CVE-2024/CVE-2024-337xx/CVE-2024-33781.json index 329ed207256..05ec648024d 100644 --- a/CVE-2024/CVE-2024-337xx/CVE-2024-33781.json +++ b/CVE-2024/CVE-2024-337xx/CVE-2024-33781.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33781", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T14:15:10.880", - "lastModified": "2024-05-07T20:07:58.737", + "lastModified": "2024-07-03T01:58:45.220", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que MP-SPDZ v0.3.8 conten\u00eda un desbordamiento de pila mediante la funci\u00f3n octetStream::get_bytes en /Tools/octetStream.cpp. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante un mensaje manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/FudanMPL/Vulnerabilities-in-MPC-Framework/tree/main/MP-SPDZ/stack-buffer-overflow-octetStream", diff --git a/CVE-2024/CVE-2024-337xx/CVE-2024-33782.json b/CVE-2024/CVE-2024-337xx/CVE-2024-33782.json index 9cc96cafb5f..2801742c8ce 100644 --- a/CVE-2024/CVE-2024-337xx/CVE-2024-33782.json +++ b/CVE-2024/CVE-2024-337xx/CVE-2024-33782.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33782", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T14:15:10.933", - "lastModified": "2024-05-07T20:07:58.737", + "lastModified": "2024-07-03T01:58:46.057", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Se descubri\u00f3 que MP-SPDZ v0.3.8 conten\u00eda un desbordamiento de pila mediante la funci\u00f3n OTExtensionWithMatrix::extend en /OT/OTExtensionWithMatrix.cpp. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante un mensaje manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://github.com/FudanMPL/Vulnerabilities-in-MPC-Framework/tree/main/MP-SPDZ/stack-buffer-overflow-OTExtensionWithMatrix", diff --git a/CVE-2024/CVE-2024-337xx/CVE-2024-33783.json b/CVE-2024/CVE-2024-337xx/CVE-2024-33783.json index 3de8dcda6fd..cb5ce8300ae 100644 --- a/CVE-2024/CVE-2024-337xx/CVE-2024-33783.json +++ b/CVE-2024/CVE-2024-337xx/CVE-2024-33783.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33783", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T14:15:10.990", - "lastModified": "2024-05-07T20:07:58.737", + "lastModified": "2024-07-03T01:58:46.247", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que MP-SPDZ v0.3.8 conten\u00eda una infracci\u00f3n de segmentaci\u00f3n mediante la funci\u00f3n osuCrypto::SilentMultiPprfReceiver::expand en /Tools/SilentPprf.cpp. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante un mensaje manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/FudanMPL/Vulnerabilities-in-MPC-Framework/tree/main/MP-SPDZ/SEGV-SlientPprf", diff --git a/CVE-2024/CVE-2024-337xx/CVE-2024-33788.json b/CVE-2024/CVE-2024-337xx/CVE-2024-33788.json index c773696fbc9..d4392b02443 100644 --- a/CVE-2024/CVE-2024-337xx/CVE-2024-33788.json +++ b/CVE-2024/CVE-2024-337xx/CVE-2024-33788.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33788", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T13:15:49.667", - "lastModified": "2024-05-06T16:00:59.253", + "lastModified": "2024-07-03T01:58:47.000", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que Linksys E5600 v1.1.0.26 conten\u00eda una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro PinCode en el endpoint del formulario /API/info." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/ymkyu/CVE/tree/main/CVE-2024-33788", diff --git a/CVE-2024/CVE-2024-337xx/CVE-2024-33789.json b/CVE-2024/CVE-2024-337xx/CVE-2024-33789.json index f8448111603..578fa9875b2 100644 --- a/CVE-2024/CVE-2024-337xx/CVE-2024-33789.json +++ b/CVE-2024/CVE-2024-337xx/CVE-2024-33789.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33789", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-03T17:15:07.993", - "lastModified": "2024-05-06T12:44:56.377", + "lastModified": "2024-07-03T01:58:47.770", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que Linksys E5600 v1.1.0.26 conten\u00eda una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro ipurl en el endpoint del formulario /API/info." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/ymkyu/CVE/tree/main/CVE-2024-33789", diff --git a/CVE-2024/CVE-2024-337xx/CVE-2024-33791.json b/CVE-2024/CVE-2024-337xx/CVE-2024-33791.json index 4e20792cb42..1b9d6a6d3f4 100644 --- a/CVE-2024/CVE-2024-337xx/CVE-2024-33791.json +++ b/CVE-2024/CVE-2024-337xx/CVE-2024-33791.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33791", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-03T17:15:08.047", - "lastModified": "2024-05-06T12:44:56.377", + "lastModified": "2024-07-03T01:58:48.567", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de cross-site scripting (XSS) en netis-systems MEX605 v2.00.06 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en la funci\u00f3n getTimeZone." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/ymkyu/CVE/tree/main/CVE-2024-33791", diff --git a/CVE-2024/CVE-2024-337xx/CVE-2024-33792.json b/CVE-2024/CVE-2024-337xx/CVE-2024-33792.json index 33f8e4e7591..6e961b50fc7 100644 --- a/CVE-2024/CVE-2024-337xx/CVE-2024-33792.json +++ b/CVE-2024/CVE-2024-337xx/CVE-2024-33792.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33792", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-03T17:15:08.093", - "lastModified": "2024-05-07T05:15:51.893", + "lastModified": "2024-07-03T01:58:49.357", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de cross-site scripting (XSS) en netis-systems MEX605 v2.00.06 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en la p\u00e1gina tracert." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "https://github.com/ymkyu/CVE/tree/main/CVE-2024-33792", diff --git a/CVE-2024/CVE-2024-337xx/CVE-2024-33793.json b/CVE-2024/CVE-2024-337xx/CVE-2024-33793.json index d77d3b8584a..17897e910da 100644 --- a/CVE-2024/CVE-2024-337xx/CVE-2024-33793.json +++ b/CVE-2024/CVE-2024-337xx/CVE-2024-33793.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33793", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-03T17:15:08.147", - "lastModified": "2024-05-07T06:15:08.720", + "lastModified": "2024-07-03T01:58:50.130", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de cross-site scripting (XSS) en netis-systems MEX605 v2.00.06 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en la p\u00e1gina de prueba de ping." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://github.com/ymkyu/CVE/tree/main/CVE-2024-33793", diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33801.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33801.json index c733eaea189..b5874ac48f8 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33801.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33801.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33801", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T16:15:16.077", - "lastModified": "2024-05-28T17:11:47.007", + "lastModified": "2024-07-03T01:58:50.903", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n SQL en /model/get_subject_routing.php en campcodes Complete Web-Based School Management System 1.0 permite a un atacante ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro id." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2017.pdf", diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33804.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33804.json index c972f8410a2..15c1be49048 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33804.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33804.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33804", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T16:15:16.480", - "lastModified": "2024-05-28T17:11:47.007", + "lastModified": "2024-07-03T01:58:51.660", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n SQL en /model/get_subject.php en campcodes Complete Web-Based School Management System 1.0 permite a un atacante ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro id." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2016.pdf", diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33805.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33805.json index 33f31428494..062dec7a3c1 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33805.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33805.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33805", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T16:15:16.547", - "lastModified": "2024-05-28T17:11:47.007", + "lastModified": "2024-07-03T01:58:52.423", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n SQL en /model/get_student.php en campcodes Complete Web-Based School Management System 1.0 permite a un atacante ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro id." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2013.pdf", diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33807.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33807.json index 1340c05e589..5f3868bce04 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33807.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33807.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33807", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T16:15:16.690", - "lastModified": "2024-05-28T17:11:47.007", + "lastModified": "2024-07-03T01:58:53.170", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n SQL en /model/get_teacher_timetable.php en campcodes Complete Web-Based School Management System 1.0 permite a un atacante ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro de calificaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2019.pdf", diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33820.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33820.json index e92180b1c9d..50789ef05b5 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33820.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33820.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33820", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T16:15:07.837", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-07-03T01:58:53.933", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El Router Gigabit inal\u00e1mbrico de banda dual Totolink AC1200 A3002R_V4 Firmware V4.0.0-B20230531.1404 es vulnerable al desbordamiento del b\u00fafer a trav\u00e9s de la funci\u00f3n formWlEncrypt del servidor boa. Espec\u00edficamente, explotan la longitud del campo wlan_ssid que desencadena el desbordamiento." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Swind1er/ee095fbfe13f77a5b45b39a5aa82bd17", diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33829.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33829.json index 0518b87c34a..b66f3625981 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33829.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33829.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33829", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T13:15:49.730", - "lastModified": "2024-05-06T16:00:59.253", + "lastModified": "2024-07-03T01:58:54.750", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que idccms v1.35 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /admin/readDeal.php?mudi=updateWebCache." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/xyaly163/cms/blob/main/1.md", diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33830.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33830.json index e769e69993c..e2859d88980 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33830.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33830.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33830", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T13:15:49.787", - "lastModified": "2024-05-06T16:00:59.253", + "lastModified": "2024-07-03T01:58:55.540", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que idccms v1.35 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /admin/readDeal.php?mudi=clearWebCache." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/xyaly163/cms/blob/main/2.md", diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33831.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33831.json index 9a2a56c3d26..bd09150dd8e 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33831.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33831.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33831", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T18:15:19.973", - "lastModified": "2024-04-30T19:35:36.960", + "lastModified": "2024-07-03T01:58:56.317", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de cross-site scripting (XSS) almacenado en el m\u00f3dulo Expectativa avanzada - Respuesta de yapi v1.10.2 permite a los atacantes ejecutar scripts web o HTML arbitrario a trav\u00e9s de un payload manipulado inyectado en el campo del cuerpo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], "references": [ { "url": "https://github.com/YMFE/yapi/issues/2745", diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33832.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33832.json index bcdcda3273a..09a95eb2363 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33832.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33832.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33832", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T18:15:20.027", - "lastModified": "2024-04-30T19:35:36.960", + "lastModified": "2024-07-03T01:58:57.087", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que OneNav v0.9.35-20240318 conten\u00eda Server-Side Request Forgery (SSRF) a trav\u00e9s del componente /index.php?c=api&method=get_link_info." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], "references": [ { "url": "https://github.com/helloxz/onenav/issues/186", diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33835.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33835.json index 5613585aed1..1b5ffda69b5 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33835.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33835.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33835", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T11:15:47.827", - "lastModified": "2024-05-01T13:01:51.263", + "lastModified": "2024-07-03T01:58:57.853", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Tenda AC18 V15.03.05.05 tiene una vulnerabilidad de desbordamiento de pila en el par\u00e1metro remotoIp de la funci\u00f3n formSetSafeWanWebMan." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/isBigChen/iot/blob/main/tenda/formSetSafeWanWebMan.md", diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33836.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33836.json index 5094bac3cae..1bd9d8e2bf6 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33836.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33836.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33836", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-19T21:15:56.920", - "lastModified": "2024-06-20T12:43:25.663", + "lastModified": "2024-07-03T01:58:58.623", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el m\u00f3dulo \"JA Marketplace\" (jamarketplace) hasta la versi\u00f3n 9.0.1 del M\u00f3dulo JA para PrestaShop, un invitado puede cargar archivos con extensiones .php. En la versi\u00f3n 6.X, el m\u00e9todo `JmarketplaceproductModuleFrontController::init()` y en la versi\u00f3n 8.X, el m\u00e9todo `JmarketplaceSellerproductModuleFrontController::init()` permiten cargar archivos .php, lo que conducir\u00e1 a una vulnerabilidad cr\u00edtica." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2024-06-18-jamarketplace.md", diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33856.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33856.json index 5f888bfcd23..9c01440171c 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33856.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33856.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33856", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T16:15:08.010", - "lastModified": "2024-05-07T20:07:58.737", + "lastModified": "2024-07-03T01:58:59.643", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en Logpoint antes de 7.4.0. Un atacante puede enumerar una lista v\u00e1lida de nombres de usuario observando el tiempo de respuesta en el endpoint de Forgot Password." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-204" + } + ] + } + ], "references": [ { "url": "https://servicedesk.logpoint.com/hc/en-us/articles/18533583876253-Username-enumeration-using-the-forget-password-endpoint", diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33857.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33857.json index 873671178d3..c29448ce8b9 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33857.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33857.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33857", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T16:15:08.080", - "lastModified": "2024-05-07T20:07:58.737", + "lastModified": "2024-07-03T01:59:00.423", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en Logpoint antes de 7.4.0. Debido a la falta de validaci\u00f3n de entradas de URL en la inteligencia de amenazas, un atacante con acceso de bajo nivel al sistema puede activar Server Side Request Forgery." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.6, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.1, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], "references": [ { "url": "https://servicedesk.logpoint.com/hc/en-us/articles/18533639896093-Server-Side-Request-Forgery-SSRF-on-Threat-Intelligence", diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33860.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33860.json index 2aca6889fd5..f6c066982e7 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33860.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33860.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33860", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T17:15:09.257", - "lastModified": "2024-05-07T20:07:58.737", + "lastModified": "2024-07-03T01:59:01.367", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en Logpoint antes de 7.4.0. Permite la inclusi\u00f3n de archivos locales (LFI) cuando se utiliza una ruta de archivo arbitraria dentro del recopilador del sistema de archivos. El contenido del archivo especificado se puede ver en los registros entrantes." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-73" + } + ] + } + ], "references": [ { "url": "https://logpoint.com", diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33863.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33863.json index 75ea096bf73..eb1cdd0fabc 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33863.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33863.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33863", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T16:17:22.170", - "lastModified": "2024-05-14T19:17:55.627", + "lastModified": "2024-07-03T01:59:02.140", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en linqi anterior a 1.4.0.1 en Windows. Hay inclusi\u00f3n de archivos locales /api/Cdn/GetFile." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], "references": [ { "url": "https://linqi.help/Updates/en#/SecurityUpdates", diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33864.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33864.json index a1f3de9f940..9afbe92f384 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33864.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33864.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33864", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T16:17:22.280", - "lastModified": "2024-05-14T19:17:55.627", + "lastModified": "2024-07-03T01:59:02.930", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en linqi anterior a 1.4.0.1 en Windows. Hay SSRF mediante la generaci\u00f3n de plantillas de documentos; es decir, a trav\u00e9s de im\u00e1genes remotas en procesos de creaci\u00f3n, inclusi\u00f3n de archivos y generaci\u00f3n de documentos PDF a trav\u00e9s de JavaScript malicioso." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], "references": [ { "url": "https://linqi.help/Updates/en#/SecurityUpdates", diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33867.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33867.json index c116ea98fb9..a4c8bec874d 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33867.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33867.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33867", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T16:17:22.633", - "lastModified": "2024-05-14T19:17:55.627", + "lastModified": "2024-07-03T01:59:03.697", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en linqi anterior a 1.4.0.1 en Windows. Hay una contrase\u00f1a salt codificada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.6, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-259" + } + ] + } + ], "references": [ { "url": "https://linqi.help/Updates/en#/SecurityUpdates", diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33868.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33868.json index 5ac1bf0b8c2..aeb95fae5f5 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33868.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33868.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33868", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T16:17:22.740", - "lastModified": "2024-05-14T19:17:55.627", + "lastModified": "2024-07-03T01:59:04.490", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en linqi anterior a 1.4.0.1 en Windows. Hay inyecci\u00f3n LDAP." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://linqi.help/Updates/en#/SecurityUpdates", diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33873.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33873.json index 9bcf7a69df2..afb2b01f746 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33873.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33873.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33873", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:09.727", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:59:05.293", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La librer\u00eda HDF5 hasta 1.14.3 tiene un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en H5D__scatter_mem en H5Dscatgath.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33874.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33874.json index 2f780f550f4..8ae7be7dc96 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33874.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33874.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33874", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:09.980", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:59:06.100", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La librer\u00eda HDF5 hasta 1.14.3 tiene un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en H5O__mtime_new_encode en H5Omtime.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33877.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33877.json index f4725deac54..d617f47233c 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33877.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33877.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33877", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:10.513", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:59:06.870", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La librer\u00eda HDF5 hasta 1.14.3 tiene un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en H5T__conv_struct_opt en H5Tconv.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33881.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33881.json index 7b7770468fc..2d2d41953d3 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33881.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33881.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33881", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-24T17:15:10.447", - "lastModified": "2024-06-26T14:42:27.170", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T01:59:07.727", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33891.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33891.json index 7eda0355b15..21c727bd711 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33891.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33891.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33891", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-28T23:15:07.200", - "lastModified": "2024-04-29T12:42:03.667", + "lastModified": "2024-07-03T01:59:08.507", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-321" + } + ] + } + ], "references": [ { "url": "https://delinea.com/products/secret-server", diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33899.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33899.json index 418c341be52..81f6d0015a8 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33899.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33899.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33899", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T00:15:07.773", - "lastModified": "2024-05-21T17:15:08.907", + "lastModified": "2024-07-03T01:59:09.200", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "RARLAB WinRAR anterior a 7.00, en plataformas Linux y UNIX, permite a los atacantes falsificar la salida de la pantalla o provocar una denegaci\u00f3n de servicio mediante secuencias de escape ANSI." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-150" + } + ] + } + ], "references": [ { "url": "https://sdushantha.medium.com/ansi-escape-injection-vulnerability-in-winrar-a2cbfac4b983", diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33900.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33900.json index 7128477832a..500eabc3684 100644 --- a/CVE-2024/CVE-2024-339xx/CVE-2024-33900.json +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33900.json @@ -2,8 +2,16 @@ "id": "CVE-2024-33900", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-20T21:15:09.177", - "lastModified": "2024-06-06T18:15:16.170", + "lastModified": "2024-07-03T01:59:09.967", "vulnStatus": "Awaiting Analysis", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -14,7 +22,42 @@ "value": " KeePassXC 2.7.7 permite a los atacantes recuperar credenciales de texto plano." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-316" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Fastor01/30c6d89c842feb1865ec2cd2d3806838", diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33905.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33905.json index cfca548b122..dcd651d284e 100644 --- a/CVE-2024/CVE-2024-339xx/CVE-2024-33905.json +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33905.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33905", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T06:15:17.667", - "lastModified": "2024-05-01T18:15:24.390", + "lastModified": "2024-07-03T01:59:10.763", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En Telegram WebK anterior a 2.0.0 (488), una mini aplicaci\u00f3n web manipulada permite XSS a trav\u00e9s del tipo de evento postMessage web_app_open_link." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/04/30/4", diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33996.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33996.json index b05ef68fc8d..50d42474106 100644 --- a/CVE-2024/CVE-2024-339xx/CVE-2024-33996.json +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33996.json @@ -2,8 +2,9 @@ "id": "CVE-2024-33996", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-05-31T20:15:09.647", - "lastModified": "2024-06-03T14:46:24.250", + "lastModified": "2024-07-03T01:59:14.897", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "La validaci\u00f3n incorrecta de los tipos de eventos permitidos en un servicio web de calendario hizo posible que algunos usuarios crearan eventos con tipos/audiencias para los que no ten\u00edan permiso para publicar." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 4.0 + } + ] + }, "weaknesses": [ { "source": "patrick@puiterwijk.org", diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34001.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34001.json index 3e4fa89580c..84797935c7a 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34001.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34001.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34001", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-05-31T20:15:10.183", - "lastModified": "2024-06-03T14:46:24.250", + "lastModified": "2024-07-03T01:59:15.240", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Las acciones en la herramienta preestablecida de administraci\u00f3n no inclu\u00edan el token necesario para evitar un riesgo CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.7, + "impactScore": 6.0 + } + ] + }, "weaknesses": [ { "source": "patrick@puiterwijk.org", diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34003.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34003.json index 7ea6a3374ea..1b66e246dfa 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34003.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34003.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34003", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-05-31T21:15:09.240", - "lastModified": "2024-06-03T14:46:24.250", + "lastModified": "2024-07-03T01:59:15.440", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "En un entorno de alojamiento compartido que ha sido mal configurado para permitir el acceso al contenido de otros usuarios, un usuario de Moodle con acceso para restaurar m\u00f3dulos de taller y acceso directo al servidor web fuera de la ra\u00edz web de Moodle podr\u00eda ejecutar una inclusi\u00f3n de archivo local." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, "weaknesses": [ { "source": "patrick@puiterwijk.org", diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34006.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34006.json index 52329eb548b..0a378681975 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34006.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34006.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34006", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-05-31T21:15:09.533", - "lastModified": "2024-06-03T14:46:24.250", + "lastModified": "2024-07-03T01:59:15.730", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El informe de registro del sitio requiri\u00f3 codificaci\u00f3n adicional de las descripciones de eventos para garantizar que cualquier HTML en el contenido se muestre en texto plano en lugar de representarse." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, "weaknesses": [ { "source": "patrick@puiterwijk.org", diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34020.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34020.json index 55bbfe6eeeb..85451692037 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34020.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34020.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34020", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T16:15:35.570", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-07-03T01:59:16.227", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se encontr\u00f3 un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en la funci\u00f3n putSDN() de mail.c en hcode hasta 2.1." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "http://ftp.kaist.ac.kr/hangul/code/hcode/", diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34030.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34030.json index 4c098d33473..17c6839061c 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34030.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34030.json @@ -2,15 +2,32 @@ "id": "CVE-2024-34030", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-24T14:15:11.977", - "lastModified": "2024-06-24T19:26:47.037", + "lastModified": "2024-07-03T01:59:17.300", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: of_property: Return error for int_map allocation failure\n\nReturn -ENOMEM from of_pci_prop_intr_map() if kcalloc() fails to prevent a\nNULL pointer dereference in this case.\n\n[bhelgaas: commit log]" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: PCI: of_property: error de devoluci\u00f3n por falla de asignaci\u00f3n de int_map Devuelve -ENOMEM de of_pci_prop_intr_map() si kcalloc() no logra evitar una desreferencia de puntero NULL en este caso. [bhelgaas: registro de confirmaci\u00f3n]" } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/598e4a37a2f8da9144ba1fab04320c32169b6d0d", diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34045.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34045.json index d29624b1210..dec764deddc 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34045.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34045.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34045", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T00:15:07.660", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-07-03T01:59:18.230", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La funci\u00f3n de incremento m\u00e9trico de O-RAN E2T I-Release Prometheus puede fallar en sctpThread.cpp para message.peerInfo->counters[IN_INITI][MSG_COUNTER][ProcedureCode_id_E2setup]->Increment()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://jira.o-ran-sc.org/browse/RIC-1047", diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34058.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34058.json index bbe2082969a..965ae251ddb 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34058.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34058.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34058", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-17T16:15:08.010", - "lastModified": "2024-06-10T17:16:28.297", + "lastModified": "2024-07-03T01:59:19.210", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " El paquete WebTop para NethServer 7 y 8 permite XSS almacenado (por ejemplo, a trav\u00e9s del campo Subject si es un mensaje de correo electr\u00f3nico)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/May/27", diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34091.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34091.json index 5a5e9453680..a8d12ef9035 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34091.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34091.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34091", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T16:15:13.590", - "lastModified": "2024-05-06T19:53:38.797", + "lastModified": "2024-07-03T01:59:22.050", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://archerirm.com", diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34093.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34093.json index 9fc70049bd8..79411c62bcc 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34093.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34093.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34093", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T16:15:13.817", - "lastModified": "2024-05-06T19:53:38.797", + "lastModified": "2024-07-03T01:59:22.817", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], "references": [ { "url": "https://archerirm.com", diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34144.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34144.json index ef72c579f39..421570a25b9 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34144.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34144.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34144", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-05-02T14:15:10.280", - "lastModified": "2024-05-02T18:00:37.360", + "lastModified": "2024-07-03T01:59:25.760", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de omisi\u00f3n de la sandbox que involucra cuerpos de constructores manipulados en Jenkins Script Security Plugin 1335.vf07d9ce377a_e y versiones anteriores permite a atacantes con permiso para definir y ejecutar scripts de la sandbox, incluidos Pipelines, eludir la protecci\u00f3n de la sandbox y ejecutar c\u00f3digo arbitrario en el contexto de la JVM del controlador Jenkins." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/05/02/3", diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34145.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34145.json index cacd7ab41a9..839467d7aec 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34145.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34145.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34145", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-05-02T14:15:10.330", - "lastModified": "2024-05-02T18:00:37.360", + "lastModified": "2024-07-03T01:59:26.520", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de omisi\u00f3n de la sandbox que involucra clases definidas en la sandbox que ocultan clases espec\u00edficas no definidas en la sandbox en Jenkins Script Security Plugin 1335.vf07d9ce377a_e y versiones anteriores permite a atacantes con permiso para definir y ejecutar scripts en la sandbox, incluidos Pipelines, para eludir la protecci\u00f3n de la sandbox y ejecutar de forma arbitraria. c\u00f3digo en el contexto de la JVM del controlador Jenkins." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/05/02/3", diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34146.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34146.json index e0b548a75c2..29b4657ac6d 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34146.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34146.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34146", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-05-02T14:15:10.380", - "lastModified": "2024-05-02T18:00:37.360", + "lastModified": "2024-07-03T01:59:27.270", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,50 @@ "value": "Jenkins Git server Plugin 114.v068a_c7cc2574 y versiones anteriores no realiza una verificaci\u00f3n de permisos para el acceso de lectura a un repositorio Git a trav\u00e9s de SSH, lo que permite a los atacantes con una clave p\u00fablica SSH previamente configurada pero que carecen de permiso general/lectura acceder a estos repositorios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + }, + { + "lang": "en", + "value": "CWE-862" + }, + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/05/02/3", diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34147.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34147.json index a11aca9a548..4a4b4cf1a57 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34147.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34147.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34147", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-05-02T14:15:10.447", - "lastModified": "2024-05-02T18:00:37.360", + "lastModified": "2024-07-03T01:59:28.043", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Jenkins Telegram Bot Plugin 1.4.0 y versiones anteriores almacenan el token de Telegram Bot sin cifrar en su archivo de configuraci\u00f3n global en el controlador de Jenkins, donde los usuarios con acceso al sistema de archivos del controlador de Jenkins pueden verlo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/05/02/3", diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34148.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34148.json index 2550cf26d48..fd056303db7 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34148.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34148.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34148", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-05-02T14:15:10.523", - "lastModified": "2024-05-02T18:00:37.360", + "lastModified": "2024-07-03T01:59:28.797", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El complemento Jenkins Subversion Partial Release Manager 1.0.1 y versiones anteriores deshabilita mediante programaci\u00f3n la soluci\u00f3n para CVE-2016-3721 cada vez que se activa una compilaci\u00f3n desde una etiqueta de versi\u00f3n, estableciendo la propiedad del sistema Java 'hudson.model.ParametersAction.keepUndefinedParameters'." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/05/02/3", diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34199.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34199.json index e59c776424a..14aecc4d3ee 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34199.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34199.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34199", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:32.970", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:59:29.647", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "TinyWeb 1.94 y versiones anteriores permiten a atacantes remotos no autenticados provocar una denegaci\u00f3n de servicio (desbordamiento de b\u00fafer) al enviar elementos excesivamente grandes en la l\u00ednea de solicitud." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://github.com/DMCERTCE/PoC_Tiny_Overflow", diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34200.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34200.json index d256618dbaa..cd43abf683b 100644 --- a/CVE-2024/CVE-2024-342xx/CVE-2024-34200.json +++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34200.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34200", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:33.103", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:59:30.427", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK CPE CP450 v4.1.0cu.747_B20191224 contiene una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en la funci\u00f3n setIpQosRules." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/n0wstr/IOTVuln/tree/main/CP450/setIpQosRules", diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34201.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34201.json index 442e59ede02..0f7d7b72ecc 100644 --- a/CVE-2024/CVE-2024-342xx/CVE-2024-34201.json +++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34201.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34201", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:33.213", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:59:31.177", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK CP450 v4.1.0cu.747_B20191224 contiene una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en la funci\u00f3n getSaveConfig." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/n0wstr/IOTVuln/tree/main/CP450/getSaveConfig", diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34202.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34202.json index 7fb2fe64c4c..281be184bde 100644 --- a/CVE-2024/CVE-2024-342xx/CVE-2024-34202.json +++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34202.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34202", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:33.323", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:59:31.937", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK CP450 v4.1.0cu.747_B20191224 contiene una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en la funci\u00f3n setMacFilterRules." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/n0wstr/IOTVuln/tree/main/CP450/setMacFilterRules", diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34203.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34203.json index c6dc3b604aa..1d847fa03ab 100644 --- a/CVE-2024/CVE-2024-342xx/CVE-2024-34203.json +++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34203.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34203", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:33.450", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:59:32.703", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK CP450 v4.1.0cu.747_B20191224 contiene una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en la funci\u00f3n setLanguageCfg." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 3.8, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/n0wstr/IOTVuln/tree/main/CP450/setLanguageCfg", diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34205.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34205.json index 9fad4316c40..8075e5b3e07 100644 --- a/CVE-2024/CVE-2024-342xx/CVE-2024-34205.json +++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34205.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34205", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:33.927", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:59:33.503", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK CP450 v4.1.0cu.747_B20191224 contiene una vulnerabilidad de inyecci\u00f3n de comandos en la funci\u00f3n download_firmware." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://github.com/n0wstr/IOTVuln/tree/main/CP450/download_firmware", diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34206.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34206.json index eab8f13e2a7..47a6347c5a7 100644 --- a/CVE-2024/CVE-2024-342xx/CVE-2024-34206.json +++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34206.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34206", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:34.100", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:59:34.333", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK outdoor CPE CP450 v4.1.0cu.747_B20191224 contiene una vulnerabilidad de inyecci\u00f3n de comando en la funci\u00f3n setWebWlanIdx a trav\u00e9s del par\u00e1metro webWlanIdx." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/n0wstr/IOTVuln/tree/main/CP450/setWebWlanIdx", diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34209.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34209.json index e60c6369343..c6a0e943503 100644 --- a/CVE-2024/CVE-2024-342xx/CVE-2024-34209.json +++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34209.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34209", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:34.560", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:59:35.650", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK CP450 v4.1.0cu.747_B20191224 contiene una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en la funci\u00f3n setIpPortFilterRules." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/n0wstr/IOTVuln/tree/main/CP450/setIpPortFilterRules", diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34210.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34210.json index 717c7163b88..cedcbad0ffa 100644 --- a/CVE-2024/CVE-2024-342xx/CVE-2024-34210.json +++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34210.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34210", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:34.720", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:59:36.677", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK outdoor CPE CP450 v4.1.0cu.747_B20191224 contiene una vulnerabilidad de inyecci\u00f3n de comando en la funci\u00f3n CloudACMunualUpdate a trav\u00e9s del par\u00e1metro FileName." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://github.com/n0wstr/IOTVuln/tree/main/CP450/CloudACMunualUpdate_injection", diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34212.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34212.json index fbbc684c742..3fdfdf24dd6 100644 --- a/CVE-2024/CVE-2024-342xx/CVE-2024-34212.json +++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34212.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34212", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:35.000", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:59:37.463", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK CP450 v4.1.0cu.747_B20191224 contiene una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en la funci\u00f3n CloudACMunualUpdate." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/n0wstr/IOTVuln/tree/main/CP450/CloudACMunualUpdate_overflow", diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34213.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34213.json index d81b4fce07c..723006ce29c 100644 --- a/CVE-2024/CVE-2024-342xx/CVE-2024-34213.json +++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34213.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34213", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:35.123", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:59:38.230", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK CP450 v4.1.0cu.747_B20191224 contiene una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en la funci\u00f3n SetPortForwardRules." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/n0wstr/IOTVuln/tree/main/CP450/SetPortForwardRules", diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34215.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34215.json index bf9fbf47cdf..afd69fd84d0 100644 --- a/CVE-2024/CVE-2024-342xx/CVE-2024-34215.json +++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34215.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34215", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:35.270", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:59:38.987", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK CP450 v4.1.0cu.747_B20191224 contiene una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en la funci\u00f3n setUrlFilterRules." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/n0wstr/IOTVuln/tree/main/CP450/SetUrlFilterRules", diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34218.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34218.json index d8f1dbac5ca..8e86c57404f 100644 --- a/CVE-2024/CVE-2024-342xx/CVE-2024-34218.json +++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34218.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34218", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:35.720", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:59:39.750", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK outdoor CPE CP450 v4.1.0cu.747_B20191224 contiene una vulnerabilidad de inyecci\u00f3n de comando en la funci\u00f3n NTPSyncWithHost a trav\u00e9s del par\u00e1metro hostTime." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.8, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/n0wstr/IOTVuln/tree/main/CP450/NTPSyncWithHost", diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34220.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34220.json index 24e53cf3e03..4e2d1410afc 100644 --- a/CVE-2024/CVE-2024-342xx/CVE-2024-34220.json +++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34220.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34220", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:35.973", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:59:40.530", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Sourcecodester Human Resource Management System 1.0 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro 'leave'." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/dovankha/CVE-2024-34220", diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34221.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34221.json index 71ea4333c26..74bf5106432 100644 --- a/CVE-2024/CVE-2024-342xx/CVE-2024-34221.json +++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34221.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34221", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:36.090", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:59:41.290", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Sourcecodester Human Resource Management System 1.0 es vulnerable a permisos inseguros que resultan en una escalada de privilegios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://github.com/dovankha/CVE-2024-34221", diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34222.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34222.json index 0c4bd772d60..5efaec4b4b7 100644 --- a/CVE-2024/CVE-2024-342xx/CVE-2024-34222.json +++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34222.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34222", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:36.200", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:59:42.050", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Sourcecodester Human Resource Management System 1.0 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro searchcountry." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/dovankha/CVE-2024-34222", diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34225.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34225.json index a0a629ccd91..c6fdc73b465 100644 --- a/CVE-2024/CVE-2024-342xx/CVE-2024-34225.json +++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34225.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34225", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:36.797", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:59:42.910", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de Cross Site Scripting en php-lms/admin/?page=system_info en Computer Laboratory Management System que utiliza PHP y MySQL 1.0 permite a atacantes remotos inyectar script web o HTML de su elecci\u00f3n mediante los par\u00e1metros de nombre y nombre corto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/dovankha/CVE-2024-34225", diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34241.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34241.json index 690283fa848..608996a4f06 100644 --- a/CVE-2024/CVE-2024-342xx/CVE-2024-34241.json +++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34241.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34241", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-17T16:15:08.093", - "lastModified": "2024-05-17T18:35:35.070", + "lastModified": "2024-07-03T01:59:43.687", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " Una vulnerabilidad de Cross Site Scripting (XSS) en Rocketsoft Rocket LMS 1.9 permite a un administrador almacenar un payload de JavaScript utilizando la interfaz web de administraci\u00f3n al crear nuevos cursos y notificaciones de nuevos cursos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://grumpz.net/cve-2024-34241-a-step-by-step-discovery-guide", diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34244.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34244.json index 30dab6d78c3..f9b0a4f832b 100644 --- a/CVE-2024/CVE-2024-342xx/CVE-2024-34244.json +++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34244.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34244", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-08T17:15:07.730", - "lastModified": "2024-05-09T13:05:45.620", + "lastModified": "2024-07-03T01:59:44.530", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,46 @@ "value": "libmodbus v3.1.10 es vulnerable al desbordamiento del b\u00fafer a trav\u00e9s de la funci\u00f3n modbus_write_bits. Este problema puede desencadenarse cuando la funci\u00f3n se alimenta con entradas especialmente manipuladas, lo que conduce a una lectura fuera de los l\u00edmites y puede causar potencialmente un bloqueo u otros comportamientos no deseados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + }, + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://github.com/stephane/libmodbus/issues/743", diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34246.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34246.json index 992fd7ee416..bf8463429e6 100644 --- a/CVE-2024/CVE-2024-342xx/CVE-2024-34246.json +++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34246.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34246", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T16:15:13.987", - "lastModified": "2024-05-06T19:53:38.797", + "lastModified": "2024-07-03T01:59:45.300", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que wasm3 v0.5.0 conten\u00eda una lectura de memoria fuera de los l\u00edmites que provoca un error de segmentaci\u00f3n a trav\u00e9s de la funci\u00f3n \"main\" en wasm3/platforms/app/main.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://github.com/wasm3/wasm3/issues/484", diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34249.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34249.json index 83bb4dd06fd..b8f0bac7649 100644 --- a/CVE-2024/CVE-2024-342xx/CVE-2024-34249.json +++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34249.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34249", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T15:15:24.367", - "lastModified": "2024-05-06T16:00:59.253", + "lastModified": "2024-07-03T01:59:46.180", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que wasm3 v0.5.0 conten\u00eda un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico que provoca un error de segmentaci\u00f3n a trav\u00e9s de la funci\u00f3n \"DeallocateSlot\" en wasm3/source/m3_compile.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://github.com/wasm3/wasm3/issues/485", diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34250.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34250.json index 18a82f55568..ef98f8022c4 100644 --- a/CVE-2024/CVE-2024-342xx/CVE-2024-34250.json +++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34250.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34250", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T16:15:14.033", - "lastModified": "2024-05-06T19:53:38.797", + "lastModified": "2024-07-03T01:59:47.113", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 una vulnerabilidad de desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en Bytecode Alliance wasm-micro-runtime v2.0.0 que permite a un atacante remoto causar al menos una denegaci\u00f3n de servicio a trav\u00e9s de la funci\u00f3n \"wasm_loader_check_br\" en core/iwasm/interpreter/wasm_loader.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://github.com/bytecodealliance/wasm-micro-runtime/issues/3346", diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34251.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34251.json index ad1824c1503..83087bacabe 100644 --- a/CVE-2024/CVE-2024-342xx/CVE-2024-34251.json +++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34251.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34251", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T16:15:14.083", - "lastModified": "2024-05-06T19:53:38.797", + "lastModified": "2024-07-03T01:59:48.090", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 una vulnerabilidad de lectura de memoria fuera de los l\u00edmites en Bytecode Alliance wasm-micro-runtime v2.0.0 que permite a un atacante remoto provocar una denegaci\u00f3n de servicio a trav\u00e9s de la funci\u00f3n \"block_type_get_arity\" en core/iwasm/interpreter/wasm.h." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://github.com/bytecodealliance/wasm-micro-runtime/issues/3347", diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34255.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34255.json index a2a650d2315..d91751e437e 100644 --- a/CVE-2024/CVE-2024-342xx/CVE-2024-34255.json +++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34255.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34255", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-08T13:15:08.033", - "lastModified": "2024-05-08T13:15:17.563", + "lastModified": "2024-07-03T01:59:48.913", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "jizhicms v2.5.1 contiene una vulnerabilidad de cross site scripting (XSS) en la funci\u00f3n de mensaje." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/Cherry-toto/jizhicms/issues/93", diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34256.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34256.json index 411acc88cd2..f6a23dd1ea2 100644 --- a/CVE-2024/CVE-2024-342xx/CVE-2024-34256.json +++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34256.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34256", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T16:17:23.980", - "lastModified": "2024-05-14T19:17:55.627", + "lastModified": "2024-07-03T01:59:49.690", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "OFCMS V1.1.2 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de la funci\u00f3n de nueva tabla." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/ZackSecurity/VulnerReport/blob/cve/ofcms/1.md", diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34274.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34274.json index 6e6b984396c..d0571fa8540 100644 --- a/CVE-2024/CVE-2024-342xx/CVE-2024-34274.json +++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34274.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34274", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-21T20:15:08.870", - "lastModified": "2024-05-22T12:46:53.887", + "lastModified": "2024-07-03T01:59:50.460", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " OpenBD 20210306203917-6cbe797 es vulnerable a la deserializaci\u00f3n de datos que no son de confianza. Las cookies bdglobals y bdclient_spot del software OpenBD utilizan datos serializados, que pueden usarse para ejecutar c\u00f3digo arbitrario en el sistema. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el mantenedor." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 3.9, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.5, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], "references": [ { "url": "https://github.com/OpenBD/openbd-core/issues/89", diff --git a/CVE-2024/CVE-2024-343xx/CVE-2024-34308.json b/CVE-2024/CVE-2024-343xx/CVE-2024-34308.json index 9d32e062954..81cdead004d 100644 --- a/CVE-2024/CVE-2024-343xx/CVE-2024-34308.json +++ b/CVE-2024/CVE-2024-343xx/CVE-2024-34308.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34308", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:38.800", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T01:59:51.267", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK LR350 V9.3.5u.6369_B20220309 conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro de contrase\u00f1a en la funci\u00f3n urldecode." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/totolink%20LR350/README.md", diff --git a/CVE-2024/CVE-2024-343xx/CVE-2024-34313.json b/CVE-2024/CVE-2024-343xx/CVE-2024-34313.json index de7b7e1781b..886c5c8f47e 100644 --- a/CVE-2024/CVE-2024-343xx/CVE-2024-34313.json +++ b/CVE-2024/CVE-2024-343xx/CVE-2024-34313.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34313", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-24T20:15:10.573", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T01:59:52.040", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en VPL Jail System hasta v4.0.2 permite a los atacantes ejecutar un directory traversal a trav\u00e9s de una solicitud manipulada a un endpoint p\u00fablico." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://github.com/vincentscode/CVE-2024-34313", diff --git a/CVE-2024/CVE-2024-343xx/CVE-2024-34315.json b/CVE-2024/CVE-2024-343xx/CVE-2024-34315.json index 171a42f2139..3b024ff7cf8 100644 --- a/CVE-2024/CVE-2024-343xx/CVE-2024-34315.json +++ b/CVE-2024/CVE-2024-343xx/CVE-2024-34315.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34315", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T19:15:08.447", - "lastModified": "2024-05-07T20:07:58.737", + "lastModified": "2024-07-03T01:59:52.883", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que CmsEasy v7.7.7.9 contiene una vulnerabilidad de inclusi\u00f3n de archivos locales a trav\u00e9s de la funci\u00f3n file_get_contents en el m\u00e9todo fckedit_action de /admin/template_admin.php. Esta vulnerabilidad permite a los atacantes leer archivos arbitrarios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://github.com/H3rmesk1t/vulnerability-paper/blob/main/CmsEasy-7.7.7.9-File%20Inclusion2.md", diff --git a/CVE-2024/CVE-2024-343xx/CVE-2024-34332.json b/CVE-2024/CVE-2024-343xx/CVE-2024-34332.json index dee3712d9c6..570d5e92a73 100644 --- a/CVE-2024/CVE-2024-343xx/CVE-2024-34332.json +++ b/CVE-2024/CVE-2024-343xx/CVE-2024-34332.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34332", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-10T16:15:13.470", - "lastModified": "2024-06-10T18:06:22.600", + "lastModified": "2024-07-03T01:59:53.650", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en SiSoftware SANDRA v31.66 (SANDRA.sys 15.18.1.1) y anteriores permite a un atacante escalar privilegios a trav\u00e9s de un b\u00fafer manipulado y enviado al controlador del kernel mediante la API de Windows DeviceIoControl." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://belong2yourself.github.io/vulnerabilities/docs/SANDRA/Elevation-of-Privileges/readme/", diff --git a/CVE-2024/CVE-2024-343xx/CVE-2024-34338.json b/CVE-2024/CVE-2024-343xx/CVE-2024-34338.json index 77647f2a717..c5301cf5261 100644 --- a/CVE-2024/CVE-2024-343xx/CVE-2024-34338.json +++ b/CVE-2024/CVE-2024-343xx/CVE-2024-34338.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34338", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:39.337", - "lastModified": "2024-05-20T19:15:08.670", + "lastModified": "2024-07-03T01:59:54.407", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n de comando ciego en Tenda O3V2 V1.0.0.12 y anteriores permite a atacantes remotos ejecutar comandos del sistema operativo a trav\u00e9s del par\u00e1metro dest en /goform/getTraceroute" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "http://exzettabyte.me/blind-command-injection-in-tenda-o3v2", diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34402.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34402.json index af0bf80303a..4d2433f8c5b 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34402.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34402.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34402", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-03T01:15:48.633", - "lastModified": "2024-06-10T17:16:29.087", + "lastModified": "2024-07-03T01:59:58.723", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en uriparser hasta la versi\u00f3n 0.9.7. ComposeQueryEngine en UriQuery.c tiene un desbordamiento de enteros a trav\u00e9s de claves o valores largos, con un desbordamiento de b\u00fafer resultante." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/05/06/1", diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34403.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34403.json index 7b8783f2ec8..69f8f969ae3 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34403.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34403.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34403", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-03T01:15:48.693", - "lastModified": "2024-06-10T17:16:29.170", + "lastModified": "2024-07-03T01:59:59.493", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en uriparser hasta la versi\u00f3n 0.9.7. ComposeQueryMallocExMm en UriQuery.c tiene un desbordamiento de enteros a trav\u00e9s de una cadena larga." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/05/06/1", diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34405.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34405.json index ad3bb50afc2..726d372f30e 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34405.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34405.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34405", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-11T19:16:07.003", - "lastModified": "2024-06-13T18:36:09.013", + "lastModified": "2024-07-03T02:00:00.383", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Validaci\u00f3n inadecuada de enlaces profundos en McAfee Security: Antivirus VPN para Android anterior a 8.3.0 podr\u00eda permitir a un atacante iniciar una URL arbitraria dentro de la aplicaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://www.mcafee.com/en-us/consumer-corporate/mcafee-labs/product-security-bulletins.html", diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34408.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34408.json index 05af2dcb4e0..9f2bdc9e130 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34408.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34408.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34408", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-03T06:15:13.883", - "lastModified": "2024-05-03T12:48:41.067", + "lastModified": "2024-07-03T02:00:01.550", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Tencent libpag hasta 4.3.51 tiene un desbordamiento de enteros en DecodeStream::checkEndOfFile() en codec/utils/DecodeStream.cpp a trav\u00e9s de un archivo PAG (gr\u00e1ficos animados port\u00e1tiles) manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://github.com/Tencent/libpag/issues/2230", diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34453.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34453.json index 57336d54bde..52789672d64 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34453.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34453.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34453", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-03T18:15:10.160", - "lastModified": "2024-05-06T12:44:56.377", + "lastModified": "2024-07-03T02:00:06.540", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "TwoNav 2.1.13 contiene una vulnerabilidad SSRF a trav\u00e9s del par\u00e1metro de URL index.php?c=api&method=read_data&type=connectivity_test (que llega a /system/api.php)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], "references": [ { "url": "https://github.com/tznb1/TwoNav/compare/v2.1.13-20240321...v2.1.14-20240419", diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34454.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34454.json index 8900dcd7ac5..1825889a7e2 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34454.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34454.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34454", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-26T22:15:08.650", - "lastModified": "2024-05-28T12:39:28.377", + "lastModified": "2024-07-03T02:00:07.617", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Nintendo Wii U OS 5.5.5 permite a los atacantes intermediarios falsificar certificados SSL como si vinieran de una CA ra\u00edz, porque existe un mecanismo de verificaci\u00f3n secundario que solo verifica si se conoce una CA e ignora los detalles de la CA y firma (y porque * se acepta como nombre com\u00fan)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://github.com/PretendoNetwork/SSSL", diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34455.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34455.json index 33c4f81c43b..d04f30b9833 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34455.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34455.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34455", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-03T19:15:07.950", - "lastModified": "2024-05-07T18:15:08.417", + "lastModified": "2024-07-03T02:00:08.547", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Buildroot anterior a 0b2967e carece del bit adhesivo para el directorio /dev/shm." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/05/06/2", diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4467.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4467.json index 97ba8760eed..7f3a3b74d55 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4467.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4467.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4467", "sourceIdentifier": "secalert@redhat.com", "published": "2024-07-02T16:15:05.423", - "lastModified": "2024-07-02T17:44:45.700", + "lastModified": "2024-07-03T00:15:02.313", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -48,6 +48,18 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2024:4276", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:4277", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:4278", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-4467", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5037.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5037.json index 06c089f0d56..3ea29e145e9 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5037.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5037.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5037", "sourceIdentifier": "secalert@redhat.com", "published": "2024-06-05T18:15:11.747", - "lastModified": "2024-06-18T17:04:31.360", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T00:15:02.640", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -93,6 +94,10 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2024:4151", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-5037", "source": "secalert@redhat.com", diff --git a/README.md b/README.md index c6da030de2c..b9b64d9be7d 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-07-02T23:55:33.053516+00:00 +2024-07-03T02:00:33.205262+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-07-02T23:15:11.140000+00:00 +2024-07-03T02:00:08.547000+00:00 ``` ### Last Data Feed Release @@ -27,7 +27,7 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-07-02T00:00:08.667218+00:00 +2024-07-03T00:00:08.648271+00:00 ``` ### Total Number of included CVEs @@ -38,22 +38,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `0` -- [CVE-2024-24791](CVE-2024/CVE-2024-247xx/CVE-2024-24791.json) (`2024-07-02T22:15:04.833`) -- [CVE-2024-4708](CVE-2024/CVE-2024-47xx/CVE-2024-4708.json) (`2024-07-02T23:15:10.860`) -- [CVE-2024-6453](CVE-2024/CVE-2024-64xx/CVE-2024-6453.json) (`2024-07-02T22:15:05.077`) ### CVEs modified in the last Commit -Recently modified CVEs: `5` +Recently modified CVEs: `1203` -- [CVE-2023-4727](CVE-2023/CVE-2023-47xx/CVE-2023-4727.json) (`2024-07-02T23:15:10.230`) -- [CVE-2023-7250](CVE-2023/CVE-2023-72xx/CVE-2023-7250.json) (`2024-07-02T23:15:10.377`) -- [CVE-2024-2199](CVE-2024/CVE-2024-21xx/CVE-2024-2199.json) (`2024-07-02T23:15:10.617`) -- [CVE-2024-3657](CVE-2024/CVE-2024-36xx/CVE-2024-3657.json) (`2024-07-02T23:15:10.747`) -- [CVE-2024-6387](CVE-2024/CVE-2024-63xx/CVE-2024-6387.json) (`2024-07-02T23:15:11.140`) +- [CVE-2024-34222](CVE-2024/CVE-2024-342xx/CVE-2024-34222.json) (`2024-07-03T01:59:42.050`) +- [CVE-2024-34225](CVE-2024/CVE-2024-342xx/CVE-2024-34225.json) (`2024-07-03T01:59:42.910`) +- [CVE-2024-34241](CVE-2024/CVE-2024-342xx/CVE-2024-34241.json) (`2024-07-03T01:59:43.687`) +- [CVE-2024-34244](CVE-2024/CVE-2024-342xx/CVE-2024-34244.json) (`2024-07-03T01:59:44.530`) +- [CVE-2024-34246](CVE-2024/CVE-2024-342xx/CVE-2024-34246.json) (`2024-07-03T01:59:45.300`) +- [CVE-2024-34249](CVE-2024/CVE-2024-342xx/CVE-2024-34249.json) (`2024-07-03T01:59:46.180`) +- [CVE-2024-34250](CVE-2024/CVE-2024-342xx/CVE-2024-34250.json) (`2024-07-03T01:59:47.113`) +- [CVE-2024-34251](CVE-2024/CVE-2024-342xx/CVE-2024-34251.json) (`2024-07-03T01:59:48.090`) +- [CVE-2024-34255](CVE-2024/CVE-2024-342xx/CVE-2024-34255.json) (`2024-07-03T01:59:48.913`) +- [CVE-2024-34256](CVE-2024/CVE-2024-342xx/CVE-2024-34256.json) (`2024-07-03T01:59:49.690`) +- [CVE-2024-34274](CVE-2024/CVE-2024-342xx/CVE-2024-34274.json) (`2024-07-03T01:59:50.460`) +- [CVE-2024-34308](CVE-2024/CVE-2024-343xx/CVE-2024-34308.json) (`2024-07-03T01:59:51.267`) +- [CVE-2024-34313](CVE-2024/CVE-2024-343xx/CVE-2024-34313.json) (`2024-07-03T01:59:52.040`) +- [CVE-2024-34315](CVE-2024/CVE-2024-343xx/CVE-2024-34315.json) (`2024-07-03T01:59:52.883`) +- [CVE-2024-34332](CVE-2024/CVE-2024-343xx/CVE-2024-34332.json) (`2024-07-03T01:59:53.650`) +- [CVE-2024-34338](CVE-2024/CVE-2024-343xx/CVE-2024-34338.json) (`2024-07-03T01:59:54.407`) +- [CVE-2024-34402](CVE-2024/CVE-2024-344xx/CVE-2024-34402.json) (`2024-07-03T01:59:58.723`) +- [CVE-2024-34403](CVE-2024/CVE-2024-344xx/CVE-2024-34403.json) (`2024-07-03T01:59:59.493`) +- [CVE-2024-34405](CVE-2024/CVE-2024-344xx/CVE-2024-34405.json) (`2024-07-03T02:00:00.383`) +- [CVE-2024-34408](CVE-2024/CVE-2024-344xx/CVE-2024-34408.json) (`2024-07-03T02:00:01.550`) +- [CVE-2024-34453](CVE-2024/CVE-2024-344xx/CVE-2024-34453.json) (`2024-07-03T02:00:06.540`) +- [CVE-2024-34454](CVE-2024/CVE-2024-344xx/CVE-2024-34454.json) (`2024-07-03T02:00:07.617`) +- [CVE-2024-34455](CVE-2024/CVE-2024-344xx/CVE-2024-34455.json) (`2024-07-03T02:00:08.547`) +- [CVE-2024-4467](CVE-2024/CVE-2024-44xx/CVE-2024-4467.json) (`2024-07-03T00:15:02.313`) +- [CVE-2024-5037](CVE-2024/CVE-2024-50xx/CVE-2024-5037.json) (`2024-07-03T00:15:02.640`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 54275338870..318715a819e 100644 --- a/_state.csv +++ b/_state.csv @@ -26369,7 +26369,7 @@ CVE-2007-3480,0,0,7de4dd0ab5b49b85376510832cb6f3f7fb3b1d5cb517bcf28856b37796278a CVE-2007-3481,0,0,c80c85415ffef6b56314ef8e2db3b395adee7f1cb304a926ff45d43670a579e8,2024-05-17T00:34:41.360000 CVE-2007-3482,0,0,4d1cabba4b551e13aaf116de8ce2c839b101aefd06dbb5d930ec2f0f9bd84a9c,2008-11-15T05:00:00 CVE-2007-3483,0,0,269cf38e43d4edcda238622991fd070bc9b10aed77677953afd93d31666fdbe2,2017-07-29T01:32:18.817000 -CVE-2007-3484,0,0,5929e7484279166092e376435c807e046dca06d0daa5a9981d8cd63db5f519a3,2024-06-04T19:16:52.743000 +CVE-2007-3484,0,1,ad247a745bd846453399507d7b4856d2ddcc0068b545c942d97258115ef6c70f,2024-07-03T01:35:02.900000 CVE-2007-3485,0,0,9643d6dff6d3148371915c1d070c10f7c00b446e185fe58fbbc00cb77c86fd64,2008-11-15T06:52:49.610000 CVE-2007-3486,0,0,0d622fe49e34156223b725d17f06092ba97e23f8a5173fe534bb90fbf462792a,2008-11-15T06:52:49.797000 CVE-2007-3487,0,0,a7c56715d853c5247766965a3dc12d11ab682568978c0f5f8a4e39d731e431e0,2018-10-16T16:50:08.913000 @@ -46762,18 +46762,18 @@ CVE-2010-5149,0,0,f4074c5914c3257c79085b187120879be27c7d7684e2e1c70bf52a9bf8aaff CVE-2010-5150,0,0,818455badcb568bdab14c19861431ceb4fcb83daec5e8cdf49c7d1f613a835aa,2024-05-17T00:48:26.437000 CVE-2010-5151,0,0,c42cf532b187d91dda673a5b831a9a5312653f42f397715b3fce85bfa66cadd2,2024-05-17T00:48:26.587000 CVE-2010-5152,0,0,f519d7cd997fadea4110907fc3d39e18f10c27981fbd443564d43704782cc77f,2024-05-17T00:48:26.693000 -CVE-2010-5153,0,0,4a281efec2a2e85b5cd63e8a601bab19269a7bee61f4dc20fb5c1d324c00cfd9,2024-06-26T19:15:12.027000 +CVE-2010-5153,0,1,78b8c8fb92ffd4de600d0d29c1d02644fc5d85e41cd4fe98e0ae92de1904dab0,2024-07-03T01:35:04.330000 CVE-2010-5154,0,0,b8325868ef8f261b72b2e55a26508ed1e50e459e77350d91bf14160581023d1f,2024-05-17T00:48:26.887000 CVE-2010-5155,0,0,61b700c331884d286f5ff865450f4f584346f5db4c8dc72c8cb8b39e4f4f98dd,2024-05-17T00:48:26.973000 CVE-2010-5156,0,0,ebffc9ffa145e5a9e51e16a52ff81c248fb098bb27aaaa5660991f7f59191d7b,2024-05-17T00:48:27.073000 CVE-2010-5157,0,0,1366eb99763dc3ec620120d88a4a5975fa2a438385600e09d0a199c400a8ff24,2012-08-27T04:00:00 CVE-2010-5158,0,0,0dcb5e2114962d5bcd92b44ceac9701326c6d2a159c2065bb46518674a80c185,2024-05-17T00:48:27.213000 CVE-2010-5159,0,0,bb372e4c138b5da60c1a4898d8e0834aac29ea34023c6c3ddb835b6632f8f737,2024-05-17T00:48:27.300000 -CVE-2010-5160,0,0,54f0e6001ffe6875dc01e24194f30885f67fd3075cd9be43c31513f594cebbaa,2024-06-04T19:16:53.120000 +CVE-2010-5160,0,1,da5f1a66736e9b0566def6da157c3a1769a235d72bf15b0cd721e5e5d52b478d,2024-07-03T01:35:06.877000 CVE-2010-5161,0,0,5e676bcb13690cf82b0066901173c095c26494cacfc3e12c3e78530ffd8c1e29,2024-05-17T00:48:27.480000 CVE-2010-5162,0,0,e602e1f9d296ef3d6bfc4cbc52215bb0971b4ddf94b63a9277bfb7dc9a1bcc67,2024-05-17T00:48:27.573000 CVE-2010-5163,0,0,d799de5d48def4143473b920eb8544d7816bf68957c7fc7e79f426a54703bcc7,2024-05-17T00:48:27.660000 -CVE-2010-5164,0,0,e4318251429af0be47d987bc8c1b9812c5a6356b09fef5dd7d960c09e93890f8,2024-06-26T19:15:12.250000 +CVE-2010-5164,0,1,5d405ae9f591d4b08de8edc9c6c7c663c94b6534988b6dfebabee1c010821445,2024-07-03T01:35:07.733000 CVE-2010-5165,0,0,0464131efc6668ec8de460c7ed04262434b67511ed694a332460e02be2fc19fb,2024-05-17T00:48:27.833000 CVE-2010-5166,0,0,bc3cd3e9eb5fcae91c79ef490a13057adc3e68fb53d29806e1b032da2bd8086a,2024-05-17T00:48:27.927000 CVE-2010-5167,0,0,5d91c79d5bd7376e93ae2fae4f6c5832307f85c588861697519715bb62171775,2024-05-17T00:48:28.013000 @@ -46784,7 +46784,7 @@ CVE-2010-5171,0,0,36786707f9ff5af00d142a757c7bc424b134ac6c9ffb4fa67864a553caa626 CVE-2010-5172,0,0,e46aba6f0d585dc896ffa64403d93a92db2a44cf5347661cbacd29a9f06c4273,2024-05-17T00:48:28.537000 CVE-2010-5173,0,0,3edbe2c96792a8f4fe465dd4f7a6d2627d8bffcc549a12ad6fcab8c35cd8fbed,2024-05-17T00:48:28.623000 CVE-2010-5174,0,0,9357e1484c1ff64e7068e4f94bb688f80338100e5e10efce55db7a520c684497,2024-05-17T00:48:28.713000 -CVE-2010-5175,0,0,549350d85e451dfeaf263931206fa47e187f12ce94c2133c06967da1b0579ec7,2024-06-26T19:15:12.430000 +CVE-2010-5175,0,1,2b9bf9c38d2285eff498426bfab6dae1e01c98f76efed89c218d7719f28e733b,2024-07-03T01:35:08.560000 CVE-2010-5176,0,0,b8a468773bb50e60f60a03b20ac651f1a627acdaaec4382f2577467b1799dc53,2024-05-17T00:48:28.887000 CVE-2010-5177,0,0,97b0d687f43e481278fe65e276a02eb27d4698add271f46ad62927a5aa584a98,2024-05-17T00:48:28.970000 CVE-2010-5178,0,0,1d2c75e74f0933d9687f9749b3e8bee309d7655d25f45e43d78584745780dbcd,2024-05-17T00:48:29.073000 @@ -47501,7 +47501,7 @@ CVE-2011-0607,0,0,34dae17e937ee80370facfa36e3fd70c92a5a0fee51b087a28002da2992a5a CVE-2011-0608,0,0,8934fb8e569fb4c1f54cc32e56890b5cf9ed6d756fa77ded0f58527d19aff8ee,2018-10-30T16:26:24.687000 CVE-2011-0609,0,0,d26d4363f8c440ef4d7a84dacf00d8b961324f342cff92f01dd5d12371f4ba24,2024-06-28T14:20:56.560000 CVE-2011-0610,0,0,c467e8a59910e980aa6ce8828f3680bbc6417e12d6d1f4fb713d5d3d04a72c79,2017-09-19T01:32:07.817000 -CVE-2011-0611,0,0,3f709d71342533e2fba1141c571699f75c67b46c0e40fd0ff3b7e372d245f9ff,2024-02-02T02:39:19.227000 +CVE-2011-0611,0,1,46a90db973edaf687a6e15dfeaf375885621c958cff47f3dd33091b8fca97089,2024-07-03T01:35:09.403000 CVE-2011-0612,0,0,a63028b54ff15e3d1fd0e40392f1af950157f3cc76c979998036409a8967027c,2011-05-25T04:00:00 CVE-2011-0613,0,0,e74a45acedabec4e51238cbb33dc9af72df658accd484240584b61bc1e8f7226,2011-05-25T04:00:00 CVE-2011-0614,0,0,7662bc34cf9a9d73243e2b3f35e8fbfcf6c62b9dcbfe3d1a2f76f2ce9a50c90a,2011-09-22T03:28:33.693000 @@ -47618,7 +47618,7 @@ CVE-2011-0733,0,0,af25a917692871ade89631350a24fd65fa3b5b7d14b81d8cef1b9817120ada CVE-2011-0734,0,0,d8ea9b66108383b6b046e07bd891a594df875da3c1534cce2f97d7055a611d3c,2011-11-08T04:18:45.373000 CVE-2011-0735,0,0,356056c565423ea16216106c55034c4d12f9cecb7688c47a038c79a811bd49c9,2011-11-08T04:18:45.577000 CVE-2011-0736,0,0,245a12476cdfd3cc5452edfcb421eef4c13bdf56ffd672d534612237d54e1b86,2024-05-17T00:48:56.413000 -CVE-2011-0737,0,0,f8bdd2fcf342766e1016186a48ceaa176430bb0e5e3bf33547b1d9cc708d2f4a,2024-06-04T19:16:53.317000 +CVE-2011-0737,0,1,fa966c759aba14742526c78142d59cbc1c20c5de307346d96540930fa2cc2b1a,2024-07-03T01:35:10.423000 CVE-2011-0738,0,0,64de30e62cd3d3e3e6892a8d017d6460a1fd361ba89742e36b22d657be388d66,2017-08-17T01:33:42.837000 CVE-2011-0739,0,0,276c7ff05f5a086b51c8641bd120f0fe2c0508ec7c33ef6a14a39e6d4c8d04fd,2017-08-17T01:33:42.900000 CVE-2011-0740,0,0,9f24a5947a2102f4196116192daa28cde5104fa873e28b89bc3afb84ce0bae25,2017-08-17T01:33:42.963000 @@ -56610,7 +56610,7 @@ CVE-2012-5376,0,0,64786e4442a8bbfc15f2cedfc2200130c317247c3f207dd4fddaa1474651a8 CVE-2012-5377,0,0,b818e6da07f22077fe50eba798f8ac4dc36f9c6952f09a44017fee0367782806,2013-03-02T04:47:09.330000 CVE-2012-5378,0,0,746b1e03b7325c16601ecd437f2315648bd42ae7ad88d86b31360ac39c94b256,2013-03-02T04:47:09.497000 CVE-2012-5379,0,0,3c275dd252316d15f45698e1b1538572146745c5eee22cc22b7552a839f9f045,2024-05-17T00:53:45.903000 -CVE-2012-5380,0,0,d28626624f9b4e44f3632202dfc7f799d600248e7fd26393574457d3039a9c30,2024-06-04T19:16:53.463000 +CVE-2012-5380,0,1,5e4c1d586d03ff10e5ce1c175fe614eb87d7f1544771728c26cc651802432bc2,2024-07-03T01:35:11.640000 CVE-2012-5381,0,0,da70925921b5cd1bc34435129516e5edf16ba68613e7b5768bc6c17113dac739,2024-05-17T00:53:46.083000 CVE-2012-5382,0,0,05c20441255c6d3c776a4d34d1bacbf6cd08cb70da188ad4b14ce0524fb64800,2024-05-17T00:53:46.170000 CVE-2012-5383,0,0,c13d8a8e9d80f9058bb026bfaaae5f0cfce38a85f6fc34179a0a365ab9fd7f37,2024-05-17T00:53:46.250000 @@ -57657,7 +57657,7 @@ CVE-2012-6660,0,0,4204af3ea712772dc4d2606f2cf6e50a4341f1ad86d3a699d4638987ff7995 CVE-2012-6661,0,0,f39755d71d5dcc549a8db5e512206dba577042eda0dc3867bbe57bd93b2c2a66,2014-11-05T03:32:38.557000 CVE-2012-6662,0,0,1e751bc515057f0a0c08389a90d61351cc4d3ce27e4b7bbe699da54113df605c,2018-07-14T01:29:00.267000 CVE-2012-6663,0,0,3f87372a88dc5ad47844a9ccc94a467ebb7601db36607697bda1bc45ab17e576,2020-01-28T20:10:46.747000 -CVE-2012-6664,0,0,6080c2ea515d440e0d90bd1b2385410b9842e9236d647a4b263d6a7cd7c30c44,2024-06-24T12:57:36.513000 +CVE-2012-6664,0,1,8b94b621b0d9209b8828be318274ba77a928b6737a74b13b02e08a462dc13c48,2024-07-03T01:35:12.607000 CVE-2012-6665,0,0,4c489dc740807bb39593fa609a1515059c128f2ac44b714b33a3cf55b66a3194,2014-11-18T16:54:06.737000 CVE-2012-6666,0,0,962b7cb2904b2d0ca796b3fd595fd8726e2100a0e8fd30af14539bc437b2ae26,2020-02-11T17:40:31.837000 CVE-2012-6667,0,0,41abfcc68b31ea0d99df1ebdea5c67ae9abb0258c45c1107f8327c663f06ea92,2018-01-29T13:07:10.593000 @@ -60707,7 +60707,7 @@ CVE-2013-3241,0,0,81f61c2b8787357efc0d29ab00cf698b3c728d06997f02fe2608209ecdbf55 CVE-2013-3242,0,0,b818b43955440eb2e5a9a4f980d57e1156da28bd0f4f946938d8aae27e39d5de,2014-03-07T13:46:53.637000 CVE-2013-3243,0,0,0a1a97ab72712e3f2c332fa2d34698c40881d8191209adadb3acce8023f911f3,2013-11-22T19:53:56.653000 CVE-2013-3244,0,0,f7f8da6bc794877387a72a3300b8115be5c478a613e45881cb8118076fda14e3,2013-10-25T15:18:40.540000 -CVE-2013-3245,0,0,3323db812a420a39fa9d41f994e041bd45f6c971a30e84165d5c979e2171da87,2024-06-04T19:16:53.593000 +CVE-2013-3245,0,1,aabaef180996b7524eccbfa825092606b40c031e80cfece8f88eb85c69148d10,2024-07-03T01:35:13.413000 CVE-2013-3246,0,0,2164853e75b6dbcd4cf59697dd439ed6c89b5b2b0d88f6b72f3e043abcb89eba,2020-01-03T21:16:33.960000 CVE-2013-3247,0,0,db7df97ac6c6aa8874509566e50e38e0c6a7f80346b386b5a57cc89040bf7792,2020-01-03T20:43:10.653000 CVE-2013-3248,0,0,9d201fe8d4faa7e35a30d6606067e88f9a9d4e146446bf0895ca4419251f7fbe,2013-10-04T16:37:29.077000 @@ -65252,7 +65252,7 @@ CVE-2014-0804,0,0,64f7bcd62c09feae210ed04317dd3c363bf64429ff0d6cc82e25aa05b441d8 CVE-2014-0805,0,0,64ffdc7602e5834fa9b3519c18d42dd7b07d229d431db1ea7d9952fad9ee621e,2014-01-14T04:49:19.543000 CVE-2014-0806,0,0,0f5d623ba97d2afe2377f45b01521ed33883dbba85dc359bb516719da4f3d8f9,2014-08-11T15:04:43.700000 CVE-2014-0807,0,0,f009d972ec55433ad7f1cd0b29e7cbdba3753adab49339cad8b728a428899860,2014-01-23T18:10:13.500000 -CVE-2014-0808,0,0,ec99d11a59fc6ca90e8d2cfd9ce2503b6ff4dde6ec03b45442c931798a2a1bed,2024-06-11T06:15:08.923000 +CVE-2014-0808,0,1,f76fdbd1aac4f64484329f0f8673371ce487cd3954d2e5c776d36e70f7f159b4,2024-07-03T01:35:14.373000 CVE-2014-0809,0,0,ea31d36adc72e3733e28eeb6bfacf81b8f998d70f553d482caf7c863538e6e07,2017-08-29T01:34:15.467000 CVE-2014-0810,0,0,45fb5c84f4f5cfdebd55044c843a5258a6f94a800107fdc85390866929ef99a4,2014-01-29T18:39:45.720000 CVE-2014-0811,0,0,c0c381561c327e70759153bf230a2a174504949fe49060ef9f4430788889edad,2015-08-13T17:50:46.333000 @@ -69393,7 +69393,7 @@ CVE-2014-5464,0,0,8deeb0281b9db4f212ca4efdc66134ce9c70ee9145596f228ca92cc47c5e63 CVE-2014-5465,0,0,e8b4208809e03f584a6bb3cd21c0f2caf8fc4911bc0406369f6e78ca20d1fd36,2014-09-03T20:15:36.530000 CVE-2014-5466,0,0,db9eafbbaf858dce0cad9d969bef5c12f1cdb630be454ce3009b8131d8762879,2014-12-17T19:31:00.807000 CVE-2014-5468,0,0,812685be9ec8145ad2039b5d3daf489a0510c1859c48812122bc52998a08515c,2020-02-11T16:02:39.280000 -CVE-2014-5470,0,0,525514ccbdeb1911827d4c3ea2565d7a420b8a5ef765a77a313f3f56c7982ccd,2024-06-24T12:57:36.513000 +CVE-2014-5470,0,1,186b2f7c3788bcb00ae4c1c74dddc5d71ce3047a724197f35ade0c1fa27857ff,2024-07-03T01:35:15.277000 CVE-2014-5471,0,0,511c8895ca38af1a8d65229a32673dc6b2ea2427c860430ddaa267c61dd3f125,2023-11-07T02:20:50.287000 CVE-2014-5472,0,0,a2fdef957a40c099c9f524e19471baf211bdbb59c08d4930abb8cfc2e4fbac0d,2023-11-07T02:20:50.383000 CVE-2014-5500,0,0,d3411653c84229d5b2a0ee341eae110722fede3a1b2b0df5c988c79a9ce8736e,2020-01-28T21:17:09.127000 @@ -75528,7 +75528,7 @@ CVE-2015-2047,0,0,f520385424497d896879a9bba5d7c98d0b045d559380dbbfdaa25116d7e67e CVE-2015-2048,0,0,be6b830b4bcf4a242fbf47e76d67b8782971a050369af6f8295f6a574416d408,2023-04-26T19:27:52.350000 CVE-2015-2049,0,0,a4e7ee15d2f2e9ee170086a5cd16d4b1f56f3eee7e10ee37f3be68fc01e311f9,2023-04-26T19:27:52.350000 CVE-2015-2050,0,0,1b8bd60107a2a2a89cdbbcb2caec4386ee0ada5b56b0db54abdff5f52313a80f,2023-04-26T19:27:52.350000 -CVE-2015-2051,0,0,a075a05103e4dbf6ddb61585ef4fb27b8eaa46da3e1ad5db5306e06059d245b2,2023-04-26T19:27:52.350000 +CVE-2015-2051,0,1,e044525e83d7a0d0243a08aab3fdd41bf0ebb2ec6cb8e7fb0f0ce9ff67c75703,2024-07-03T01:35:16.440000 CVE-2015-2052,0,0,15bedaa4810fc76374f6619a1341ef4403a7704758b77bf6ec017fb2cb92f6b9,2023-04-26T19:27:52.350000 CVE-2015-2053,0,0,b300bbf505a241c2c015579c59d13aeb8a834ca5fff23124563c66079322b690,2016-11-30T03:00:45.767000 CVE-2015-2054,0,0,d36926d2c1b6ea62ba573c9c552f0dab350a9abe45cc4916f7201e66bd4c9d9f,2016-11-30T03:00:46.893000 @@ -83392,7 +83392,7 @@ CVE-2016-10069,0,0,c6f86705793134392d3e3a4b1acc49c278dc92cde9427ac523aa759820063 CVE-2016-1007,0,0,bc6c466a2a12c7ad4f73429684ee8b7cf3eda973ea51815c4882babdbd820427,2016-12-03T03:19:30.003000 CVE-2016-10070,0,0,26e8edf7e7905fd3983da8e7fd55ecc6fb97c66501c07f2a8552ffa831d072bf,2020-11-16T19:44:19.990000 CVE-2016-10071,0,0,f0fbec0b41a419853d7c2c8e04716d64920e05dc6592ff49bf4b6911568adf20,2020-11-16T19:43:42.800000 -CVE-2016-10072,0,0,2c73bce20dd2cc27868e25d1a90709fa7a5d904563e07d4cda6786815d3660c3,2024-06-26T19:15:12.660000 +CVE-2016-10072,0,1,0d1509ea15cedcaa00278f2089f66114baa4b8dde4c244f34ec4f573309dbdc4,2024-07-03T01:35:17.340000 CVE-2016-10073,0,0,a0f05aefd35fcd7e849631a4e68d07781dd62d3b554a70d49a326d22d0c34867,2019-07-11T12:45:44.207000 CVE-2016-10074,0,0,3d66474bec87704d1afb288a1ed65348ebc6e217425889c52b9636ac8a671e04,2017-11-04T01:29:15.287000 CVE-2016-10075,0,0,cd41506b4f4f8c378fdc8458eab8cd4066a6c978fcb4d8e949a04de94828655b,2018-10-21T10:29:01.503000 @@ -86981,7 +86981,7 @@ CVE-2016-3717,0,0,df334f2cae8cd072b75ef71e463097db5f835905f9717004bb368a99916409 CVE-2016-3718,0,0,430c768ce8519758c274fd50c03d67ad0f9401d5f7b67983d04cd1d775ecfb45,2023-02-12T23:20:05.733000 CVE-2016-3719,0,0,6ea015930dae25aa7a12329274d6abd4dc14250ae579a99a072665c1acc4f256,2023-11-07T02:32:25.260000 CVE-2016-3720,0,0,b4f018e88701f3fb82c319c5ab09fb7dd1af769658e41a2a706154e0a06eb237,2019-10-10T12:18:55.307000 -CVE-2016-3721,0,0,0c76e61a1620e73742a50575973d18acad7a9e02507a921163516ef0c610969b,2024-05-02T14:15:09.123000 +CVE-2016-3721,0,1,6cc746b94821579f0d3c9319f6f27904b973426ad3ff9de0a6339c3d6d45b074,2024-07-03T01:35:18.193000 CVE-2016-3722,0,0,410dcfc040cc72e5f898c1531cd9e1034da088710bf551f56663281d550e62b9,2018-01-05T02:30:43.430000 CVE-2016-3723,0,0,8b5d55c51776e8c99c693ef4b357cec74332f45a7f651f5bd4866712af5d65d9,2018-01-05T02:30:43.510000 CVE-2016-3724,0,0,5067455123a06c47a42d835b98d61c428c852c957d58ca9c36bd5b82932b2b0b,2018-01-05T02:30:43.573000 @@ -89526,7 +89526,7 @@ CVE-2016-6525,0,0,a9796fda095cefbfa578ad1ee4208bcff31b8e026c69960c35e8edeb8f1fb1 CVE-2016-6526,0,0,654c73f6c91d3ac43c5b77f442dea5dbddcb47de5c7b228ac2f75a8f6d865a17,2017-01-27T16:05:28.567000 CVE-2016-6527,0,0,b623f4d236e5a56796488c0e1f4e75223b87ac198fd2dcf9075ffec5901bd4ee,2017-01-27T16:09:13.133000 CVE-2016-6530,0,0,e15aa22b3a4ef8432f4aa2f2358b8096fe74924852e9f802807a6fa20ffc2e0e,2016-11-28T20:33:33.830000 -CVE-2016-6531,0,0,c2b79411b8214b6456f1336886f9a15d3a6e63b15af8ff8123201bd9f4e8e2ea,2024-06-04T19:16:53.970000 +CVE-2016-6531,0,1,f94e9648fb641b848400fee0b7bfde89f0aebac54cbf2fbe12db2016570facb0,2024-07-03T01:35:18.510000 CVE-2016-6532,0,0,7c4456539892c0a5d8cba61820bf7ffa0f4b2b3f915e47cb572716f955195a6e,2016-11-28T20:33:35.970000 CVE-2016-6534,0,0,f45c03acd2404f6a9161aaa76ddf906e2aaaa39edf2ac4ab6099684207dbebc8,2017-04-14T15:11:43.223000 CVE-2016-6535,0,0,c7b6841574de451eff29a66507ef5572f6c5407105fe5937a01add6407c2b371,2016-11-28T20:33:36.970000 @@ -97920,7 +97920,7 @@ CVE-2017-14519,0,0,6ff7c369dbcd4e229cf72e4ed4ce4ee073d0343791e48cc61b32547a5a6e3 CVE-2017-1452,0,0,83a01aeb90410d4f0aa7bd6004c7bb884e86b4cca0dab370d6383cd6c62b6f39,2019-10-03T00:03:26.223000 CVE-2017-14520,0,0,7ee548a0e440257328a1e04e36e212b5b0c24609a1b1962e848d9e3186cd55b2,2018-01-09T02:29:06.287000 CVE-2017-14521,0,0,c44f2072a9da98437b0622133a8c991023033cd9761f82d99329468b0c520ac3,2019-04-26T19:58:57.437000 -CVE-2017-14522,0,0,4dbefe8e85eec762c0f8b3316b4d7b31ba3c162ca2fc9f4700102fa21259dc83,2024-06-04T19:16:54.113000 +CVE-2017-14522,0,1,7c8c8961cc253a98aa1da734556e5b11192ae4872a6988b82da35bc9326e6f78,2024-07-03T01:35:18.887000 CVE-2017-14523,0,0,09f1401e98982943254dc26408713c76f58aa982a61955ffc8967471578c3219,2024-05-17T01:14:41.643000 CVE-2017-14524,0,0,c659fb4002e480cef610f5c57c335f3795e95aa5f2c14af0b31189072d99959f,2017-10-06T15:28:41.983000 CVE-2017-14525,0,0,cacd4b5696ccc1a50387560040fe8d50673e140e1db1b988f4d0f518a563778b,2017-10-06T15:29:44.187000 @@ -100795,7 +100795,7 @@ CVE-2017-1751,0,0,a1b6ee7aded64e47920f96c52527fc60cc46fe6def5ce65e186154edae004a CVE-2017-17511,0,0,85a579a3e8d0dfbe2d340392b821413e5f3c53a5f704de927d2e958e28c0c1e1,2019-04-26T15:15:51.500000 CVE-2017-17512,0,0,06c04691b0662394b75007c694f8bdaa65878c854ce94176bb3106ca52b3e176,2018-03-16T01:29:07.267000 CVE-2017-17513,0,0,8d907902f598cd75bcf3168e200f86b787568fdb04b2401376f0d4109b69836a,2018-01-02T17:44:58.497000 -CVE-2017-17514,0,0,a30b08c48026e9961336027645cf3676ec74fb67dc1677ce8e5aa1ea161c7bae,2024-06-04T19:16:54.240000 +CVE-2017-17514,0,1,0ce724fd010071d4c7c25a35f3ec31fb169eff2f6bb170625b70b9f562af58e4,2024-07-03T01:35:19.223000 CVE-2017-17515,0,0,f31a83d369b1af133b5c59b1f4588f974e6dbdb5505acec02319d9909e49f1f0,2024-05-17T01:16:07.810000 CVE-2017-17516,0,0,de31d64c0c1d02f120eeec63ec4e7d0f2cce53340006f89806ffd2d016c047c0,2017-12-29T15:39:15.297000 CVE-2017-17517,0,0,349296ca6151efd72f856b31794da1da4a09966e6e362f9b4a133f7f26d18387,2017-12-29T15:39:03.310000 @@ -101182,7 +101182,7 @@ CVE-2017-17914,0,0,160a4ae47aa8c873e4cfc3e46e0dcc59cc260ed61af9895292a3ad260b3ee CVE-2017-17915,0,0,3b8a33cae9c5bf40ea23be22676635fb3fa831a0a41a8240c24870685b829c75,2020-02-10T16:15:12.063000 CVE-2017-17916,0,0,c79dc5fcf40815522b0ad74b78c3cf433407422e9c531086d1f8aa3a9a891efd,2024-05-17T01:16:21.577000 CVE-2017-17917,0,0,352da608d8bb944e7938d8746c91ded8def75e9bcccef306d05beb4c42bedfc5,2024-06-26T20:15:12.240000 -CVE-2017-17919,0,0,e53a8498f6a1ed89ecb7b8f17eacfcf5b627dca32484b25076c6efe92714572a,2024-06-04T19:16:54.370000 +CVE-2017-17919,0,1,0e7013a1348fb54a17ab5304e8bcb2331819b91b1bbc4f8dec28e3a5d890766e,2024-07-03T01:35:20.180000 CVE-2017-1792,0,0,31789e9993e85bf202eb139e5853c1a7ec9742386a07633adc65a36e009fffb0,2019-10-09T23:26:31.397000 CVE-2017-17920,0,0,d776a703dbf96edf7d314ec29b2159aa7f5e4ee3f8bd53825e213fca7a555a2c,2024-05-17T01:16:21.870000 CVE-2017-17924,0,0,9d1b2fb046e9c1564ec23f873d49d544a6f12fc071f03f96d4681b1c466d1851,2018-01-10T15:13:50.037000 @@ -101230,7 +101230,7 @@ CVE-2017-17969,0,0,a02c67f592c5397c5a0d2e986f3d882be645feb1dc59073018384b59c0cab CVE-2017-17970,0,0,a312c04363f721078dcff17b964c38cc0d1ec161135093a257b734ffe8a044f6,2018-01-31T18:09:20.977000 CVE-2017-17971,0,0,7163b5950fedf29b973a980216165f6029f0e6bc80e759da1894cd4dd88adbc3,2022-11-17T17:21:59.260000 CVE-2017-17972,0,0,d62a634b08988226b15d8568986b3c731f57ae8dab9aef5f3b185c0362078973,2019-07-07T21:52:41.413000 -CVE-2017-17973,0,0,d0e5f9975484a93dcf8152506e2577d9e085798328c57458454d608cf94101af,2024-06-04T19:16:54.477000 +CVE-2017-17973,0,1,ae01a644fec802b49b795a3f4856d0d57df4af08c7ba246030ef169c9d6491f0,2024-07-03T01:35:21.047000 CVE-2017-17974,0,0,fbce9b72e2fc16271c661e5c7d626f68da86548cbcc2b3afd4cfdc6ab9bfd813,2019-10-03T00:03:26.223000 CVE-2017-17975,0,0,030859f97a345682f7be0c5de98ee359f166b888d462c016fd54fc542d4babe0,2018-05-24T01:29:00.723000 CVE-2017-17976,0,0,2b3674555df962ab654ce30b67c666e363d8540dba54477b94effa3e5f040af6,2018-02-08T16:24:17.930000 @@ -103940,7 +103940,7 @@ CVE-2017-3502,0,0,40f615a995b9167301e5ebbcad92bb38e9e0bcd49d5cf7c0b1f81bc49a5958 CVE-2017-3503,0,0,d7791ebdde8a62a572f9829e1009473c85c07ddaf8a21c2bfaff92c6c5062356,2019-10-03T00:03:26.223000 CVE-2017-3504,0,0,b49b1f93c22d9e565cbe057985231e7197c72ba2e8d0718b90201cfc398088ed,2019-10-03T00:03:26.223000 CVE-2017-3505,0,0,bdbf2a14c55f32b4e54ec0b3d3579478aad1c444210303092c061b8a6b479d42,2019-10-03T00:03:26.223000 -CVE-2017-3506,0,0,cd943bf8edb126bc66ed3ef7e12919921d250131d52d1ca7be727f103fbbffcd,2024-06-07T13:22:32.107000 +CVE-2017-3506,0,1,ce56eab238ed809b8a251f9337488078d0473dac23a822be702eee75efce62cc,2024-07-03T01:35:21.677000 CVE-2017-3507,0,0,008c4dc8574d486a0f06cbb430498c99597c21e6048da1f0aab1920e70aa5574,2019-10-03T00:03:26.223000 CVE-2017-3508,0,0,65ea463405d662343f3a23fb3c3e88d2fa18434966ec8f4595c13b65acd39e73,2019-10-03T00:03:26.223000 CVE-2017-3509,0,0,fe56b4379238c94dcfbaf40b7c17d0ddea9e6691a7eafd5cb58fbad36200389f,2019-10-03T00:03:26.223000 @@ -107299,7 +107299,7 @@ CVE-2017-7301,0,0,9dc184e7dc858f5e80e3696feb412f667b1a0112592651d053f5e6663e8d9a CVE-2017-7302,0,0,405186c44caf39ae969d1188f5829b6fc9dad47b4e5336759fb8883150d6996b,2017-03-31T16:28:29.987000 CVE-2017-7303,0,0,7d714feb4d5331f7be7bfc6478f990e4ff0a522e4d86b9b27a267c96cbd38b9f,2017-03-31T17:00:51.633000 CVE-2017-7304,0,0,fac78ee19cce796c5d3b1a8fb26927ffe2268575557255dc246f6ab70b646eb1,2017-03-31T17:06:40.837000 -CVE-2017-7305,0,0,3cb1e14d37ec63d6a596d7b5667bd7a0b3e5f45ce0bc0747f1a2e40afcf7563f,2024-06-04T19:16:54.933000 +CVE-2017-7305,0,1,d739678bba8185dee45364bf3e1cf7ecbc55473862a823851d277f19c45f23b3,2024-07-03T01:35:22.590000 CVE-2017-7306,0,0,1117c18f1515fec030127c67427e23aabe26b4dcc09b44b29d66319d2d462299,2024-05-17T01:19:43.030000 CVE-2017-7307,0,0,e24de956d653ef7d76f2be51b34e8ac2312e759664077712e15bc829010eb8ae,2019-10-03T00:03:26.223000 CVE-2017-7308,0,0,f69bce2324ebad4b0bad57be61dee5ae37ef1228111cc259f8fb17b189534a7d,2023-02-14T18:32:40.287000 @@ -107880,7 +107880,7 @@ CVE-2017-7934,0,0,6509ad1210147a2f37f99de18e77bec245bc09c56f84bb9b94b5fbcaa5a1c2 CVE-2017-7935,0,0,c5b12e45bd362aa8b8c96239cac3088010c77b7957ce01a05282debacb0084a6,2019-10-09T23:30:01.030000 CVE-2017-7936,0,0,ee771e0b581393ddde2c1929f0985e971498f5b2e1fb63d557fd8cf900b8544c,2019-10-09T23:30:01.157000 CVE-2017-7937,0,0,22c3662b5698f152a3ca69e20a068cacf1bc487977b467bca5a0881756320ef8,2019-10-09T23:30:01.593000 -CVE-2017-7938,0,0,4ffebf7db337676f4207e98e9d663eae30c19fdd4c100bb4112e52d4b5697bf2,2024-04-30T07:15:48.343000 +CVE-2017-7938,0,1,74ded71a02603c9baeb93d5391ddbca64c6c39f7df9c7d79b141e4313a93f282,2024-07-03T01:35:23.457000 CVE-2017-7939,0,0,cc88ad4617c70e129da4ca01930c326cd1795f28efd38af7e0b79c0cb9c73bb6,2019-10-03T00:03:26.223000 CVE-2017-7940,0,0,e6315dda7bb4159979b6f2383fb2002b6137e1a073f8f8a41fedc549a7f15f90,2019-09-16T14:33:28.640000 CVE-2017-7941,0,0,046b4e9e2f5936b9dee3468621e77878134ca79650e8b0d28f3d271668fd2ebb,2019-10-03T00:03:26.223000 @@ -107897,7 +107897,7 @@ CVE-2017-7952,0,0,acacef7f7dd5e16a975089a2abf8dff18dcbc1fbe08ac3c99aa6d18bf5c048 CVE-2017-7953,0,0,da0169278275adc681f8f6d59ad87e4128f79c2273a95d76b8b8aa156bf1047d,2017-08-13T01:29:21.867000 CVE-2017-7957,0,0,81f1cf07e35a2e65d46eec07dfcdc5ca23e86e18fb64666b383ff6bba9e23bb3,2019-03-26T17:15:49.980000 CVE-2017-7960,0,0,a0242ae4c18130e71690ae4d6ef55739c650edd1fb44c0a875d76532fea53622,2019-10-03T00:03:26.223000 -CVE-2017-7961,0,0,f54af296489398e2f35c929dbdca9a41ef07c3356400b24800f5a707edb2eedb,2024-06-04T19:16:55.123000 +CVE-2017-7961,0,1,db4d20904f602bc13745044e76050c24bf7721c38b57aa7b1ca2642aa89abba9,2024-07-03T01:35:23.737000 CVE-2017-7962,0,0,5dfdf21cb89041b4240fb4e605644d2d14cca104b87730a95c47ad9582b228d6,2019-09-16T14:33:28.640000 CVE-2017-7963,0,0,bdf67cbcc8a98608a2b9f061eb82a8d70ff3e3fb166c389c6db8bf6550cabe6e,2024-05-17T01:20:04.830000 CVE-2017-7964,0,0,465e5ad9a0f7cde3d48acc772e2bf0f2d9d26888ea1e27da7c65ba219dad2b47,2019-10-03T00:03:26.223000 @@ -108343,7 +108343,7 @@ CVE-2017-8453,0,0,1ade74bf622e1eee81f0c15e76eee991be9e77bb313a78930ab85c0915aa16 CVE-2017-8454,0,0,2e0a864e37ca6392a4216a194ee8a0783cbe6219bd71d5afa7b14161184034f9,2017-05-12T13:25:35.123000 CVE-2017-8455,0,0,1961b2a9e3724d43b332c98943a27326f5f1db172693a1c4d958d19267928d8f,2017-05-12T14:57:27.523000 CVE-2017-8458,0,0,eca132dbac5ae60abae89c6e78f7f1d10bf815437ad5c9feb3ab493ba9601cf4,2019-10-03T00:03:26.223000 -CVE-2017-8459,0,0,e05981b20a04c3df2f652d71b4493574c85b37a1f1fdb0bdd1a24b48bb6619eb,2024-06-26T20:15:12.373000 +CVE-2017-8459,0,1,6b77909343869be5d866514afaf5d7fd889b270efec54476e2ebcf99a8a0550e,2024-07-03T01:35:24.003000 CVE-2017-8460,0,0,0107d1432fbc7b9b0cb183cc6032573bfe4f99b9c33617d09a1df29c07281c5c,2019-10-03T00:03:26.223000 CVE-2017-8461,0,0,d2fa9842795b751f8291127da3d24e8366a5133dc64d62044067d0ad4dad75df,2021-03-29T14:07:07.087000 CVE-2017-8462,0,0,2901bcb730e7b2e3dc91a123f364891095148cad94ce9252a43354b875f4432f,2019-03-19T19:48:30.877000 @@ -109051,7 +109051,7 @@ CVE-2017-9226,0,0,2764b6aad4c765e6175a96ae4be6d6ad9d6c47acf9477eadd5193c9aff927c CVE-2017-9227,0,0,74ab63bb9709fc0179731c0ead9bf70ab5dc3cd649d37caffe649ba2e9223630,2022-07-20T16:34:01.827000 CVE-2017-9228,0,0,afb241de52aebe45cc897da45863db1964ddb8c0eae36d9ca4d6c547d7e2dd1d,2022-07-20T16:34:30.863000 CVE-2017-9229,0,0,b8f3f6a018e98654c6f65fa839817aecfc502092d761c0e3bb6b0ea155f7f3ea,2022-09-01T16:20:47.960000 -CVE-2017-9230,0,0,caa8603544f8030931ecf827d3e52acd5dec38fad23696d2eec5162a64f3abf8,2024-06-04T19:16:55.253000 +CVE-2017-9230,0,1,da979458691ec3cea074fe0593889181d023978b93250330134a9403f1092108,2024-07-03T01:35:24.270000 CVE-2017-9231,0,0,b630102d12d2aefb45269239e3a944b9228f5ba4d116277530fe696a17b9d87b,2017-07-07T01:29:05.807000 CVE-2017-9232,0,0,9afe228b167724d95510ba92693c240a464fddac356da4b242a4f72f304bb83a,2019-10-03T00:03:26.223000 CVE-2017-9233,0,0,ec9091e3b522f96b7a11b58deb8fe238a1e05497703ab63355ccd831ae902daa,2023-11-07T02:50:37.820000 @@ -109605,8 +109605,8 @@ CVE-2017-9851,0,0,73d99d2f011d5989d4ac4319d19143433665e70995cfb8589778e84237c7a6 CVE-2017-9852,0,0,f66720559e067630f471cefd3358fd4ff705966b6b19164e8c7f28207b232d74,2024-05-17T01:21:02.543000 CVE-2017-9853,0,0,eb71e8bbd47ca5cfb4ab87686c246566f1a0a8310b31dddeb6becee6e88c7bbd,2024-05-17T01:21:02.750000 CVE-2017-9854,0,0,406b4fd12e2181d2c7ac2f08af2729d60001cbc68b627349905ece6e70d5379f,2024-05-17T01:21:02.920000 -CVE-2017-9855,0,0,5458f3515cecb4bcfa65ffbf40be2edf1170ed82c2627d58fdf626d3655d45e1,2024-06-04T19:16:55.507000 -CVE-2017-9856,0,0,80eee7634b76dd046ad512c51eb2e60f2723d2ddc3aa48e89bc8e1f0dd45ff5b,2024-06-04T19:16:55.747000 +CVE-2017-9855,0,1,5ab25d19a67fc4462eba01b4bb65c0080ac877ea125791d5ddbe2241dcff270d,2024-07-03T01:35:25.410000 +CVE-2017-9856,0,1,df27b68242ae1225d7f531b7ab68e0775a1f70bd48b6824f63ff61e6c8ef56a6,2024-07-03T01:35:26.443000 CVE-2017-9857,0,0,0c4078ccd2daa00d013a61b192335277ffa814abcb6e5011b38470c9b35570bb,2024-06-04T19:16:55.880000 CVE-2017-9858,0,0,4b820b3e22085401984bda701b121f0b5a9201c4dcace70481deb06431747472,2024-05-17T01:21:03.430000 CVE-2017-9859,0,0,7328ead9e5d724c0ad1850a6f155dd99f81eddc60b99717531657ab9c99eb37f,2024-05-17T01:21:03.563000 @@ -111779,7 +111779,7 @@ CVE-2018-10718,0,0,3a7267c5002bac9a078ba4487918dd3b39c0cbba1da9f5edd34c1f51d81cc CVE-2018-1072,0,0,328901f86245546c0e7b6a8285ffd79a8162d521a14b64f2a6c4f4e6f5647cba,2019-10-09T23:38:02.943000 CVE-2018-10722,0,0,8624e8d6b732238fa5087cf8246211dfbffcc77aabc2d83996cef428cf152f82,2018-06-13T15:27:20.230000 CVE-2018-10723,0,0,1fe81e0c0301e5a97a121e0240b19b167b85941f5745d48ff34cba0ad6fc0bc5,2018-06-12T12:44:59.213000 -CVE-2018-10726,0,0,c2ab62602a8034fabf7b1873b50c3a58eae54d5f172dd36533d172bcc0ed5a11,2024-06-04T19:16:56.023000 +CVE-2018-10726,0,1,46a3dddff69d6bdce31f26de14d6107b68e1b37aa0a992709741f46f19addf7d,2024-07-03T01:35:27.627000 CVE-2018-10727,0,0,f3788a63768ad567d6911224d1aed914c07eb6610b393b66d3d89b8c3e16f828,2019-10-31T01:07:46.510000 CVE-2018-10728,0,0,e06c02cdbe87d564067845bce20aaee0ad8ec25cc302f2d4d7cee9d49833067a,2018-06-20T15:47:39.513000 CVE-2018-10729,0,0,ac1492149049093ebf005d73236820e1a65bbd80d5a066303dbd55c9d0853594,2018-06-20T17:36:34.497000 @@ -112136,7 +112136,7 @@ CVE-2018-11103,0,0,bf255ab7414041c299e21a27bf80d28c2dae16466a8dce9683675a16ef3ed CVE-2018-11105,0,0,16a167a51004f736f454241b048beb1854bb38aaae0e89ac5697b5654db17d92,2023-05-26T18:55:47.037000 CVE-2018-11106,0,0,683f9db071e16d88ee404b51047105cbe40afeab2cc75c8d49e32841e493b409,2023-11-07T02:51:37.613000 CVE-2018-1111,0,0,0e384f909d6e0915d972d3a054dfad9fdb57dbd15ef4489722e78dc6d080f07f,2023-02-12T23:32:38.430000 -CVE-2018-11116,0,0,6becaf4693852dfcfc631f108cc55a1ddba7e9ecfca58e6c277c96cc9c090f3a,2024-06-04T19:16:56.150000 +CVE-2018-11116,0,1,0fc53ee1a3094d7c5fe0aec9cdb822fb4093a5b2c60dc87cb6ecaa104888eb3f,2024-07-03T01:35:28.467000 CVE-2018-11117,0,0,e263645a46012b1f1dfe656879af3bd479bfd18559d697113375cb07ff01e0a7,2018-06-15T19:37:42.600000 CVE-2018-11118,0,0,f39d17641dc82b5e726dd4ea2d43c56be4eacbdf4ec33af20a5087f650ca1ac6,2018-06-15T19:43:24.957000 CVE-2018-11119,0,0,e857e42b163872989c1139dd6a81d06e748d74a09eef5f4b357f98a11e230087,2018-06-15T19:39:10.197000 @@ -112666,8 +112666,8 @@ CVE-2018-11678,0,0,c27072c55d5a8a8249addf9b97e89023d87ddcf1277048f86246c8759cacb CVE-2018-11679,0,0,81afff03e103cbfa71cf74be7dac6aa8a71793b0c7cee7dc2eaf379a7909d634,2018-07-09T14:11:02.133000 CVE-2018-1168,0,0,54c9a3a72cf05c567caaf57a38cd19192d1ef75da359b274f8be84e4ee28a192,2023-05-16T21:04:23.433000 CVE-2018-11680,0,0,3bb381b99a8a5d08872ea2018f2617b5ba8b32aed492f0971aa2d2358c05d160,2018-07-09T14:08:11.580000 -CVE-2018-11681,0,0,95ac62f65f9d4ece49d4aa52201e4ca1c2e7e7b53bd2380edd2265ced8bb01d5,2024-06-04T19:16:56.400000 -CVE-2018-11682,0,0,fc58a76e3e0be812ecdada83e181d939c2716168f89f08aebf54ac59570bc011,2024-06-10T18:15:18.183000 +CVE-2018-11681,0,1,3f0b8c48009fbdc20cef75d855010ab0aa7c4244e7c83795bb058c81add9d474,2024-07-03T01:35:29.537000 +CVE-2018-11682,0,1,c9387aadf19432af035992697ccc4e2dd5e29f5e3ef8c164c058f35a10694745,2024-07-03T01:35:30.440000 CVE-2018-11683,0,0,fe8b15a12919f95dd69dec09c23f9866189a8afdaa40eef3b2b6f4ce0ff21d51,2020-08-24T17:37:01.140000 CVE-2018-11684,0,0,4bdd889d1950bbfb049eae9924920c51c4168ada5a76409071db63cc604aeca2,2020-08-24T17:37:01.140000 CVE-2018-11685,0,0,7d49f414bb3d3f1470daa43bbded9753700558fed264ac486272aef1a7e47078,2020-08-24T17:37:01.140000 @@ -112712,7 +112712,7 @@ CVE-2018-11723,0,0,cda15fb3aa79b90511415bc830e6e8e8e51122ecc046217c28420d7a79fd8 CVE-2018-11724,0,0,28afff45ace5826a5ab942878a6517dbcdf9fd83da45d70943d9fc50b9c67203,2019-10-03T00:03:26.223000 CVE-2018-11725,0,0,9475f7c9a632c6d5970d7314402f347d451d790de16c4763a0ba8a02c9892208,2018-08-08T15:18:46.960000 CVE-2018-11726,0,0,f31d62e50210c389d4e7fe3ea3d400b089f682115c34e9d3a3fb570922549ced,2020-08-24T17:37:01.140000 -CVE-2018-11727,0,0,8a6e2b1aae005a0870f2c5d7580b7e6bf0ea57e00da7dc33aa60242e267db656,2024-06-04T19:16:56.537000 +CVE-2018-11727,0,1,4f7f02237c8041686b9317f11213e3f397ff89dd4dbd4e4c7a17101a5274cb56,2024-07-03T01:35:31.443000 CVE-2018-11728,0,0,818b757a132ce2d0a3816ef01b92d9563612687a852fe5556cdb510a0fae473b,2024-05-17T01:22:41.027000 CVE-2018-11729,0,0,a1052064371b2b2d423a58f380c6c483fed94056f09ad06abc284ebdfc84b75b,2024-05-17T01:22:41.120000 CVE-2018-1173,0,0,0ac3d6c68e3401c24f4b98bbb5f29154bf40841ee68e222c685cd05ef82460f2,2019-10-09T23:38:13.507000 @@ -116656,7 +116656,7 @@ CVE-2018-16307,0,0,ee7d16b48a5908a6fe4d010b1ec6f48e61dd35daeec0b655f4238550b39be CVE-2018-16308,0,0,cca3c5e9fe3f5b5c65b3b0f605c483f4c66a4df5776bcb3e7c569977669540fb,2020-08-24T17:37:01.140000 CVE-2018-16309,0,0,97f4855a6b1d2999e448269389c0e10c40c60d07543d9b9c8bc93bd59c4752f1,2023-11-07T02:53:44.803000 CVE-2018-1631,0,0,6fef9cddd7513d50990f2db9a88f0f29e66dfca28c44392db923ceefb5d4f893,2023-02-24T00:14:33.947000 -CVE-2018-16310,0,0,112f6750cefb8b93d1eb341ca90017174dd198dbdcc25e6c29f90966d35805f9,2024-06-10T21:15:48.783000 +CVE-2018-16310,0,1,b205db3dd50a6fe80121b0d0e254a854c6ded6ef2cdb7eb43765a7ff3cd6e78d,2024-07-03T01:35:33.430000 CVE-2018-16313,0,0,345f1265583b15b7ca3762839747a90370be255eb7ce11ea0de201d2dc612d4d,2018-11-02T22:17:43.130000 CVE-2018-16314,0,0,1c1996c24716d12b4fff3eaf7dfb967623bbffac2c20760f03996ab4b778bf7e,2018-11-13T17:48:15.513000 CVE-2018-16315,0,0,2f5272a167f9e975a7a50bada8213454bf1029bc05adfbea6449241d8b7b6c4c,2018-10-25T13:40:09.570000 @@ -118050,7 +118050,7 @@ CVE-2018-18008,0,0,f17521d1f57ea353b0fd658b337d965a3f36b007173fa44d25bf59cd63339 CVE-2018-18009,0,0,588c4bc76bfb55c7992134582d181d8711029d3bd5b217f0c4aeda6038891750,2021-04-23T13:40:34.740000 CVE-2018-1801,0,0,b6311108331fcf0d894cf88fd10fe257504420f7bee2556aa8c6b4f3b78c7e34,2019-10-09T23:39:07.633000 CVE-2018-18013,0,0,3730fe6165476eb6f05205ed8afd90663696c816652614ebdd5900bffd6aea92,2024-05-17T01:25:25.320000 -CVE-2018-18014,0,0,1e2580c6c99fe06e014f3452385dda6ba9ac307ef2f5f2c4fcd0fb6a4b9644a4,2024-06-26T20:15:12.740000 +CVE-2018-18014,0,1,5222f72f0b39ecea508f3706b83817e794af6d1a18744f6a0e858f9fee51a8e3,2024-07-03T01:35:33.810000 CVE-2018-18016,0,0,3ee2eb029d5869a4b3a16ee844835b037ce14260e25d9fd9c4696ba095f07e32,2019-10-03T00:03:26.223000 CVE-2018-18017,0,0,f44dcf63f3d0ae5df82aa9143876453570e7a723a1f89b72c6905e62ab2cc8c0,2019-04-16T13:30:33.967000 CVE-2018-18018,0,0,64c7ffaa953496b489b8314b64574533fbe58934b6f391b10ce4a84898284ddf,2019-04-16T14:18:39.613000 @@ -118944,7 +118944,7 @@ CVE-2018-19089,0,0,de087063105ee8a84ceddf6f01d8b791a91578120be7af58c5169b7a5122a CVE-2018-19090,0,0,de03bd6ab8661327957205e5bc74503d92d62bb9a506f543ffaaa0fddeb4e939,2018-12-11T16:29:55.810000 CVE-2018-19091,0,0,c30178498c7c0c5d0f8e845ae4b162fbb557a24c95ae99dadd7a606094c52f9c,2018-12-11T16:30:18.560000 CVE-2018-19092,0,0,ac92fd91545557f44c4733325b1edd04a3a2688f037f49de2a8c2ee3e65217d1,2018-12-13T15:58:33.597000 -CVE-2018-19093,0,0,dece25a9c43017982f4e7d8e5950a4261baf255382e9ad497082d97399f72e3d,2024-06-04T19:16:56.793000 +CVE-2018-19093,0,1,458a6df14bacf3fe2f259990fe77461de757976f82aa4a8b0b16a7b99b994506,2024-07-03T01:35:34.453000 CVE-2018-1910,0,0,7c27c661a01b5e172ba368d1b1b9aab10c077a84e34b1e5e63d9276cdf84f088,2019-10-09T23:39:20.010000 CVE-2018-19104,0,0,e7491cbe4cecfdcd40c0d7ec11afd7c18a64487629123cb41d141ef36b13df86,2018-12-11T21:23:16.840000 CVE-2018-19105,0,0,e65452c87e27ba5f146f94c4170487eaf752829b430f56469a00a51d99126f54,2019-05-06T00:29:00.263000 @@ -120083,7 +120083,7 @@ CVE-2018-20432,0,0,4a2811fa0199676ef59abf875991e44b9674d40db9feb116e0784400f2108 CVE-2018-20433,0,0,7f4b6156b8a700a8192757ab08a68fb4a1af2c0489855b89d03bab11822f5c96,2023-11-07T02:56:17.210000 CVE-2018-20434,0,0,50353a8a78e7516bfca93bb1e9906d2092cf16c31b4a929b2c21b6b6fea8e11a,2019-06-04T23:29:00.360000 CVE-2018-20436,0,0,9a99ce6910d1f5c0013d9f41795e911898630375a2eb1dd93d9b9ca1eac55c02,2024-05-17T01:26:54.527000 -CVE-2018-20437,0,0,2f8bbd74e21aff2c2c8a5e856f18e9b351f7ff46e47b004587d306395c67ed67,2024-06-04T19:16:56.930000 +CVE-2018-20437,0,1,468d6e6dc6fe7afa818480aa8dab4258562a0f73a045fa9843adc5bf361773e1,2024-07-03T01:35:35.440000 CVE-2018-20438,0,0,46b406b1b5c5d024c91cbf163cc48f210a1976b0f1c6a0d9526b3d33ff4b023c,2019-10-03T00:03:26.223000 CVE-2018-20439,0,0,be9615e722246ca58f438b827cc202346928ec4f96b8e718f900c807230a2c8c,2019-10-03T00:03:26.223000 CVE-2018-2044,0,0,0c3e7978a7192ab53e89f50be97c7b6a64becd46860c12ddc9a73cf740d0840e,2023-11-07T02:56:38.123000 @@ -121382,7 +121382,7 @@ CVE-2018-25098,0,0,fcae82fd425e45c0b5170e1d16175026afcc4282c8c2d036ab7934ed74d6d CVE-2018-25099,0,0,4477c16cb5a3503e957873dbddbd3b50ffb7092ffd27acf2a352c93f686dfb7f,2024-03-18T12:38:25.490000 CVE-2018-25100,0,0,26375a09020100e722ed36e37b25c669512cdaa2d61a780ec73480ee78db5d6b,2024-03-25T01:51:01.223000 CVE-2018-25101,0,0,b04dde640afba29853f504e83596fe419f66817bb46aeb488be7718ce77d287c,2024-06-04T19:16:57.060000 -CVE-2018-25103,0,0,cbeb7183ee8d2abcf399d0a65ec2e2339a740557f606406f70279bfefd9ef633,2024-06-20T12:44:22.977000 +CVE-2018-25103,0,1,9dfc21f1a82dd6ea6c50fd8da379acadae36d409a2223f5b4b3b6b024d5e8a3f,2024-07-03T01:35:36.127000 CVE-2018-2515,0,0,158f882e4275a7485a2b9ce17e7e57c4ea22cf74c55a78a9900c73a4caa327c0,2023-11-07T02:57:57.887000 CVE-2018-2560,0,0,0bb1a26d6c05fddeb488697adb0bbe667a3dd77c1a5bc7af495c8721df5b1197,2020-08-24T17:37:01.140000 CVE-2018-2561,0,0,b76feaa260e2f54fc8eeb8d50d578ffdd22b603f486ac4f8f5b3bc42df22fa45,2018-01-25T13:53:15.120000 @@ -122744,7 +122744,7 @@ CVE-2018-4228,0,0,36ba0e9324d60dcb6e2d20d52eae4806e45fcad091546bcfe020c86e05f320 CVE-2018-4229,0,0,3350d9afef186ace65add58367e2a00f6ced3518e099703db9c54a5fa56a2559,2020-08-24T17:37:01.140000 CVE-2018-4230,0,0,08a5aa4deaf617a7dfbceed0b772978e34876452fd7e38a922da1fa6544c14fc,2018-07-13T17:58:29.330000 CVE-2018-4232,0,0,ce6f8b36af32291448fe502906bf8d0a4faecc03cb56ca2208423628cc6a1dc9,2019-10-03T00:03:26.223000 -CVE-2018-4233,0,0,93cc4d8586b5569e4092c019aaff7cd1b07f4ca606822096f23c239ce2fa91d4,2019-06-02T17:29:00.610000 +CVE-2018-4233,0,1,6f8ff254df1dbc6c45d622e94808351dcb9e6f30f5aa197bacba4b2a18036332,2024-07-03T01:35:36.460000 CVE-2018-4234,0,0,427d663f51eb4d2598c91da5361e8b2885bbbd67feef111294a736be5f7b5f5f,2018-07-13T17:58:08.237000 CVE-2018-4235,0,0,0aff306383aa22030b5130a2fd127ff9956fcfa26ac871fd2ace7bff8df708f6,2018-07-17T16:11:39.100000 CVE-2018-4236,0,0,ef6436e1fb5fca61c0e62474704a59dd11086b5237f97d26feaef8b1382220c0,2018-07-13T17:57:49.703000 @@ -122906,7 +122906,7 @@ CVE-2018-4400,0,0,699dfc3ec1640885642b679bcf93e5d36be7a53bee9a6f903253eb84810e40 CVE-2018-4401,0,0,c4d63b847af3c2d30e1ba61953c16bbf33253a67f0da24faac36753c84e0e7c0,2019-04-05T20:31:04.127000 CVE-2018-4402,0,0,2c9b5577874477f38323ce1c390ca4bca397c3b2d39bd153c894ef44734c9b12,2019-04-05T16:15:47.827000 CVE-2018-4403,0,0,8906e685a98ec4a30330144cb86d50b62f53b108c5059172d2716c2d22ecc5df,2019-04-05T16:14:37.693000 -CVE-2018-4404,0,0,657373ada21cec5647c7da2f59ec34218b7333eee903dc156db4b5ef4d4f07ff,2023-11-07T02:58:24.420000 +CVE-2018-4404,0,1,259e20ca678106606326c5e161235b331a616ff95b80d05efba94e169011994d,2024-07-03T01:35:37.820000 CVE-2018-4406,0,0,c9930473c49cbd3f23d5ede7b893a252ab043810b2b768c5c2d5af7f18e96ea6,2019-04-05T14:07:49.350000 CVE-2018-4407,0,0,fbb04c6073d90420ce2340a9660e4248f7237d4ed1d9b6d4ed70a53109b76972,2023-06-12T07:15:10.957000 CVE-2018-4408,0,0,b227fd52c7d928aaf5564e38e9f65c4c5fdfda9e50448a21f4e174d3f5eba118,2019-04-05T14:02:29.847000 @@ -123753,7 +123753,7 @@ CVE-2018-5274,0,0,f0f19ec1ceaf5b9769f67990b0fcb8c8ecacf84437ba06d197ff9c72a69f32 CVE-2018-5275,0,0,690238cde44790e68a6a792a6a26aa4bd8f1932c4ec253f633fa79b41cc82d7d,2024-05-17T01:28:43.913000 CVE-2018-5276,0,0,fcbce7047357467b176d718cdf504d09e7c73b5958442d6d8045be0dce650c72,2024-06-26T20:15:12.850000 CVE-2018-5277,0,0,204edff53a328edc98ee4a272c47cf815b6b0201a8d3ceeb890c6c2287b54b95,2024-05-17T01:28:44.083000 -CVE-2018-5278,0,0,545cb0c9935686e577e256c1f3cb5e976ebf215e571b4e988adbf92032d5ffbb,2024-06-11T19:16:04.457000 +CVE-2018-5278,0,1,44f54c917ae67ea183a1f5bf9a6df3d3ef75bdd878461985ea281f0f5b629de8,2024-07-03T01:35:39.040000 CVE-2018-5279,0,0,d0031ea2b182fffceab5699a9e7e971285920f95eb65d8923b7b60f383f9e32f,2024-05-17T01:28:44.267000 CVE-2018-5280,0,0,c70e86a0e74d4ea613c9f406dbcf39d92c5e39f9192d649874554b48b37fe937,2022-06-16T16:18:23.657000 CVE-2018-5281,0,0,d10744e49f3b763d131fc56c23f104b9cdb913c5bbd579ab9c026d16946d30ff,2022-06-16T16:18:39.807000 @@ -128140,7 +128140,7 @@ CVE-2019-1010016,0,0,b659b9d3d9dcbf6a428750004f68702620ceca34c94d09df855db51a705 CVE-2019-1010017,0,0,1093f1a5629a91c39b4a965fdcdfb39eddb9f0bb05507c391aaaeab8e241de70,2019-07-17T18:55:01.707000 CVE-2019-1010018,0,0,622fa23478b7e8d628a69251fccec66fcbcf4ffe5d59544983c4319c0a4dd9f8,2019-10-09T23:44:12.930000 CVE-2019-1010022,0,0,d20efb51f5415f1e8500dbdce89e3ed0a854795819b89e0ba6a131000a095e27,2024-05-17T01:30:58.973000 -CVE-2019-1010023,0,0,1ae015d94ba2a8eccccb73f0a8e0ebb383f6bbba61abab122c974cf350efaa1e,2024-06-11T19:16:04.713000 +CVE-2019-1010023,0,1,f07119c4dfbf7ca6953a921f1d4ea4c8e524caab070da982b9ec89fb5068dca0,2024-07-03T01:35:40.327000 CVE-2019-1010024,0,0,bdac636646c945c153c2eff3a90b9b3df1f79eaa4bbbe29cdb7ec01d000b14f4,2024-05-17T01:30:59.183000 CVE-2019-1010025,0,0,f42d3de4f064a72a4159a7fd14205d6b66fb437f5b575e19c7b093f77ed23f14,2024-05-17T01:30:59.273000 CVE-2019-1010028,0,0,52616deab1af39b72035c93517b4fdb9398b8cbe68ab2302cc009b5610844401,2019-07-15T14:26:34.140000 @@ -128799,7 +128799,7 @@ CVE-2019-10566,0,0,7cbd0d2f867edea708f0f82f1c1299b62c889bad4db1ce257b174e8df735d CVE-2019-10567,0,0,3f606b7778a201cbd18db5c694aa85ed8bb2d27828d35ded4af30a434f1721bb,2020-02-10T01:15:56.953000 CVE-2019-10568,0,0,c22cdf3b34ab079ee8ce1915e46df359c7bbcff864be8f17b80e131c122dd678,2023-11-07T03:02:30.390000 CVE-2019-10569,0,0,c88d0b12ebb7161da1346392dd94936249767540cc4a5c065469760f5e3179b0,2020-03-09T12:14:44.897000 -CVE-2019-1057,0,0,889d408a90947225445b7dcb82da586bf62d85ca6e0dcbd1cb0df19f73b14992,2024-05-29T17:15:56.280000 +CVE-2019-1057,0,1,792f5c187f6cc5642fcfb3086d9db495e7a5778e677a1aac0db552b43c79327d,2024-07-03T01:35:49.753000 CVE-2019-10571,0,0,72ebecd8884c104b077c943b43ef13a67a7c9302c6d964dfc3242bfa18da7d74,2019-12-13T20:48:35.070000 CVE-2019-10572,0,0,02a3a9e3826456af1f9fdf968d689ddefa8ca1097f92f711fea7c9ff21bbf28d,2019-12-23T15:07:13.210000 CVE-2019-10573,0,0,41e8e97d511e224a5a926a1665c7b88f71dcdba10f1874223aa001a197aeb2c5,2023-11-07T03:02:30.673000 @@ -129673,7 +129673,7 @@ CVE-2019-11496,0,0,f65c093c5c0de5586313dc7dd23f7a29db0b49e2f23a810e65fa905d41109 CVE-2019-11497,0,0,44f73da5e37a7b5dbf40e71f8952c4c13114f2c4028db322a7493b86c45b4c7a,2019-09-26T19:15:11.777000 CVE-2019-11498,0,0,e184ace1c72691b9580f51c6ff2827f89735242ef1122ac12da792976bb657a2,2023-11-07T03:03:02.423000 CVE-2019-11499,0,0,cb4441d4ca6115e0c0f637370fa5492f0f1d357b45adfe091afa7afa44319148,2023-11-07T03:03:02.500000 -CVE-2019-1150,0,0,5a172f40af1174d86c886382655a64836ffb716819a4bcf7680743d07f244c6c,2024-05-29T17:16:01.677000 +CVE-2019-1150,0,1,19cf43d27c8c7896d693621bd6138c84e3e652dff9cc628e5125354637d06422,2024-07-03T01:35:51.453000 CVE-2019-11500,0,0,da02cdd53ad7cdc600440ed1d457a35e90a9598b0207ba171c84967bb894b061,2023-11-07T03:03:02.563000 CVE-2019-11502,0,0,7e281013589e1bc42d7c1532b0566f6a86587307cfc53872b34900e11313c227,2019-05-02T13:35:31.683000 CVE-2019-11503,0,0,15b71a24b6bec23f4178e283037c533d3570a80587fde80542c53a710bca26f0,2023-11-07T03:03:02.650000 @@ -129738,7 +129738,7 @@ CVE-2019-11565,0,0,a0d195e1bb3535191d06705e3b3b1708f3718b584eb2d99a14d90df4b865d CVE-2019-11567,0,0,f347db5d3025b5be8256c34a201b7d0e1b4464e4b3c2df1c6ffdea18eb34f471,2019-04-29T18:35:11.860000 CVE-2019-11568,0,0,d5e3a7af4ab230df8f1aed2bd073f0bcc3c3e3e0372a478c2bae38b4b766b231,2019-04-29T18:35:41.330000 CVE-2019-11569,0,0,171be400180fad42535da9c5adf16f7475af5b104386658af07dc922d43eb34d,2019-05-07T12:02:42.783000 -CVE-2019-1157,0,0,4631466c9e8d4fd12832d880290defa4cba7f6f86d6666dbd1e934f9de5c19df,2024-05-29T17:16:03.650000 +CVE-2019-1157,0,1,de252cd7aa49962debeb42a72e4e0167582e4a84e400190752c6fa4237fd6d30,2024-07-03T01:35:52.550000 CVE-2019-11574,0,0,32bf6902ba76a19217e4776950561d1fcd9eebe859f15eca91322044dac05f89,2020-03-25T13:22:40.687000 CVE-2019-11576,0,0,949248c944d8b7450e2d1d570a99dc143103ade04b617578c6a58abb8c74db9b,2020-08-24T17:37:01.140000 CVE-2019-11577,0,0,30f3967c894aa9c593b853f8a45b349a95fbf8bce5af5a7830f2e3607c0eb2a9,2019-04-29T16:59:06.933000 @@ -129788,7 +129788,7 @@ CVE-2019-11616,0,0,77b550f4c86c2dd4e30d32173f876fa3b7a54ee215d081b9d9b27018b3f90 CVE-2019-11617,0,0,07a6eb00b71a1985c8d138104e91fa398c1e7fe065a9300b6c6e3e9de3514843,2019-05-01T19:38:28.360000 CVE-2019-11618,0,0,e2d0c1ffec0f2f2320f4bea0ba759572d6b3f7e5df6efa770abeabcbf41349e9,2020-08-24T17:37:01.140000 CVE-2019-11619,0,0,75dca83183e9f7ff97a00c89d483ab7c07045ff2a1b97dda2ba8ae6844c42d8a,2019-05-01T16:19:01.133000 -CVE-2019-1162,0,0,74c2f6092c88d4ce7d5264e9c9e5afbfd08fcded0a6270eb6f68803025244f7d,2024-05-29T17:16:04.553000 +CVE-2019-1162,0,1,09e74de2c2a58e959feb14a9fb1f7a08e75885ba3cb5e8e2f2cf9fe81c2456c5,2024-07-03T01:35:53.940000 CVE-2019-11620,0,0,8abf597423f1cdb2ec46146487880d2b1ed1ecdb6cff5c302dce34667db34ad7,2019-05-01T19:25:21.450000 CVE-2019-11621,0,0,7fd56ddd28157686eb95a87e325a17cec072568e20f95a77c2adbf9d7ec9ea1d,2019-05-01T19:20:06.553000 CVE-2019-11622,0,0,dc6acf0d8ddf509a8dec3337c6679691cab626a270ba6360708cb295470029c6,2019-05-01T19:14:31.203000 @@ -129906,7 +129906,7 @@ CVE-2019-11736,0,0,c7296d4ddbea469e3b7329b23d6e6fb741bb7f9e9d743f89ceafc294c5a7f CVE-2019-11737,0,0,e6990b9c640e937356880d094912d5e86d48beeb94783b42662312c7d224c37d,2019-10-02T13:40:03.773000 CVE-2019-11738,0,0,6e7309e9536c245d43d0b7a6eb0a4852f8963ba3be92f4d36cda4bffd3687387,2022-03-31T18:07:13.633000 CVE-2019-11739,0,0,88e3e84774a7dc9069b615a45dfbf76d2e618212c67ed532b33f9cd5d33c8322,2020-08-24T17:37:01.140000 -CVE-2019-1174,0,0,16f2f7f9c392775ce754cece41cde0f5a007ffc370e0862fb598cfbc34958f08,2024-05-29T17:16:06.970000 +CVE-2019-1174,0,1,0fede09deda1ac476813fe53b600604d2f56e2c06833aa0335078fa71f5546b3,2024-07-03T01:35:55.440000 CVE-2019-11740,0,0,2cf463388880dd9485304249be69b7e6448bf22c10c69bb3b07980914de79653,2022-03-31T17:49:18.060000 CVE-2019-11741,0,0,352f659e03a246f783f53f1329ce9991b67e8116b30f840ee70fb34c0836e43a,2019-10-02T17:31:48.873000 CVE-2019-11742,0,0,11680436fdcf7540da174949193b774999b41dd84c0303954f1e095f36305c1e,2019-10-04T18:15:13.753000 @@ -129917,7 +129917,7 @@ CVE-2019-11746,0,0,dfdbe549aad8e8976c5554ff3055684a498d10a8b24b6862cecf0b9b077ed CVE-2019-11747,0,0,af15beea3481bb58a0aa023bb17a89f9f2c2ac7e604495b2f36e495404eab32b,2019-10-05T06:15:14.083000 CVE-2019-11748,0,0,ddbe92e5c96f3bfa46c2b5bcaff5cdcc7161718ea196ef3b3a2ed9650f9e05de,2020-08-24T17:37:01.140000 CVE-2019-11749,0,0,35186eb259d4ed508ac9c2590d2a2a7fd8c41ed4ba87762da2038dd92f6d8392,2020-08-24T17:37:01.140000 -CVE-2019-1175,0,0,151a5247b74a0eac23785d95969b28882fade64fc0d4c7f01be00c7fb999913b,2024-05-29T17:16:07.200000 +CVE-2019-1175,0,1,4a7bbfc2ae22ee473d7e8adc4a68d17ffa618d1eb4b614c8c858d12a68129899,2024-07-03T01:35:56.507000 CVE-2019-11750,0,0,f984031a3655c8fa8fba476042468fe9b7ab9640943ff774a801d28a435cb15f,2020-08-24T17:37:01.140000 CVE-2019-11751,0,0,5a74d98808778802a14c63dfd24521ab51609acc272785dc6f97e46acf164a16,2020-08-24T17:37:01.140000 CVE-2019-11752,0,0,ddd40897f3402a4a3edfcf700990119f17d84303bc38f146e5933dadc4ba2bbf,2019-10-04T18:15:14.237000 @@ -129939,7 +129939,7 @@ CVE-2019-11766,0,0,70ed151528adf6b6a685f9baab66a27e78263e9d297c4a6ee62c2306504bc CVE-2019-11767,0,0,207051fb4687ff50f185000cca66ef8726260f442d81f6e9ab13919e2126a715,2019-05-06T15:57:29.780000 CVE-2019-11768,0,0,ec80d4c26f596b078a3c1bc6b72e66c254f78cc69a7f10c2af3214860a607abc,2023-11-07T03:03:11.800000 CVE-2019-11769,0,0,3d51a11f9fbe49ebff27cd27ace85e1d2ea01245576f90f7c1f3e1111dc6f00f,2019-09-13T16:29:57.637000 -CVE-2019-1177,0,0,2b4fa81c073366c5c8de812a904cd19f86daa58546f34a7c13af17714ee5e10c,2024-05-29T17:16:07.710000 +CVE-2019-1177,0,1,93040aee1c46244a94e72f98d06df60cec811f9a4013de6e264832cc0850ac6a,2024-07-03T01:35:57.300000 CVE-2019-11770,0,0,f40f9487a5169c75ec51585661d224a0ccbf53ef1c58de58dc37ac53a428524b,2023-03-24T17:48:41.007000 CVE-2019-11771,0,0,23e98d48dacf43bc985551af39733986051fca4a2a011fc43bf128a045fd7dad,2023-03-24T17:48:52.927000 CVE-2019-11772,0,0,2ea7f5315bf7acf461ff05751ed6244c9a2e542f091ef3bac76ead3813af0aac,2019-09-02T10:15:13.240000 @@ -130025,7 +130025,7 @@ CVE-2019-11846,0,0,2b196815de29a1e04c1093a26fcb121082239a954febeb471919de512d20a CVE-2019-11847,0,0,99cfb074b7635ba796e57ce2c442c9fcd9377f0b703259d603158a50d8a46d30,2020-10-19T18:38:21.800000 CVE-2019-11848,0,0,8f97233a10ebbdd47b91dc9fd634d7a7aaea697bf4f6f106ceae02b4e77de7cc,2022-02-09T19:26:12.647000 CVE-2019-11849,0,0,583dc99f2f7192cd3014eb7f1283b16ee9f0fd3ee417403636184b722019c563,2022-02-09T19:26:29.637000 -CVE-2019-1185,0,0,2eae21701a1b4adc42803074789f649ac894c41f9f39763203899cdf233f94f1,2024-05-29T17:16:09.763000 +CVE-2019-1185,0,1,e8b2712c7242cd9011d3f9e1cbb080386a48fb6b215a295620f5dfc3671e0959,2024-07-03T01:35:58.330000 CVE-2019-11850,0,0,85ef5ec9e1d6df3e0a0b61fa2d8e4e8167d25a8a9f737e5ee242b676ea9791b8,2022-02-09T19:26:45.310000 CVE-2019-11851,0,0,a79e4c8b96e92c000470dc136eb4aa5c9d91414d2c0bdf4bb862dd7fd93f77cd,2023-01-06T02:00:37.547000 CVE-2019-11852,0,0,e1ec5139c83f867243abd03da64b59cb01dfe072d8374dd6a5c6b2ebdbc904cf,2022-02-09T19:27:05.883000 @@ -130050,7 +130050,7 @@ CVE-2019-11876,0,0,21fe107ec12da4e6d8b965de48a8e966291d7ffe9a96e9b0525d786d78d6b CVE-2019-11877,0,0,414b71292959652680e943719563f6d7360477a93d7b9081584447645fc0009d,2023-11-07T03:03:17.643000 CVE-2019-11878,0,0,82c469b4580586d9d8b71f1f722dd6e05ab466091f7b63b0895b2e349b5fdad3,2019-05-13T14:06:45.330000 CVE-2019-11879,0,0,517f60c5cf19c544c059b4783f7c6c5013a6a9f91d45e14bb4a8203d06e0311e,2024-05-17T01:31:57.620000 -CVE-2019-1188,0,0,aae6667a547292c35de8421e079f1a4642e0bb9c391249ad1d65845e900acd68,2024-05-29T17:16:10.430000 +CVE-2019-1188,0,1,bf7964416dbc774063dfa047603f7946fdef595fa1ccaac92bbb2a408358027b,2024-07-03T01:35:59.260000 CVE-2019-11880,0,0,48af937e6448ef3adc76176826e8e1bf10f06778a670ef78573fdae9a02c9f34,2019-05-23T12:23:08.497000 CVE-2019-11881,0,0,e8c437bf5bbe253c1171872adbe463d7c774c17a8b73ecc7a7c122bde2bacb11,2022-04-13T23:44:10.453000 CVE-2019-11884,0,0,fb32415eeda68ffc58495accd330708612f4f21dda0422b7a52a081187f7d04b,2023-11-07T03:03:17.790000 @@ -130082,7 +130082,7 @@ CVE-2019-11926,0,0,2ae2259d9385ca90884119fc78155834705fc66b792a5a83da0b38e8dcda2 CVE-2019-11927,0,0,0e1ac80867c5eee1ad0fab812a4c9a1f7d94ae5b1ab01e209bb904ac8928b7ac,2020-10-08T14:44:23.100000 CVE-2019-11928,0,0,a2ffc7dc329456abeb01e13bdf426e822c2ae243ec95144ad345880088b7675d,2020-09-11T18:30:52.303000 CVE-2019-11929,0,0,38d7ea4480eb23a3eb8ff0515cb597f7c7d6e8f8663a6c7ec9dcc7ac2e95b5d8,2019-10-10T17:14:58.233000 -CVE-2019-1193,0,0,f27532ca1d92e8873757c0828c9e0f56066ba640273ace64da8c7dc7f0065319,2024-05-29T17:16:11.180000 +CVE-2019-1193,0,1,f67fe1ad8de69ecdf266ce1aeeec06914a1a95ae5e29e4140db2027f5a5d1c3c,2024-07-03T01:36:00.023000 CVE-2019-11930,0,0,86612730a04c629b15a3ab99817f514aeb4f09a269360926a94341e6c1841710,2024-02-08T20:12:24.120000 CVE-2019-11931,0,0,28cf121490b03d619181188d348b71ec24fc1113bc9c62430f1c6d7c59bbb854,2019-11-19T13:39:00.187000 CVE-2019-11932,0,0,317fc10cfcf728c08cc315144f50409e612551ceaaebcfb39723f9bdb33fb42b,2023-03-01T17:58:13.130000 @@ -130093,7 +130093,7 @@ CVE-2019-11936,0,0,32032636edb10b551208dc3367105d7342ed925d5c584d98d7d27c73025b9 CVE-2019-11937,0,0,cf5f698c4a18f407418b991372382f62d0da236dca5bc16ab42a6a226e874dc8,2020-08-24T17:37:01.140000 CVE-2019-11938,0,0,4c487a2b4c3b9b16408a6de12f90d8a962964cc09304bb70da010abc7daedbf0,2020-03-11T16:21:00.180000 CVE-2019-11939,0,0,75ae64f0310d98b540c512138396d63d86c222debda12a4457b202e30609ceb0,2020-03-20T17:15:15.843000 -CVE-2019-1194,0,0,74e699e29d35641c02daa6fb2d463e79904e938abd184cc69fc9b2c02b3ced71,2024-05-29T17:16:11.437000 +CVE-2019-1194,0,1,7fe9675dd18d5f46c761eb424364291df8c63ced421ee1392c20e7c0bfdcd3e6,2024-07-03T01:36:00.767000 CVE-2019-11940,0,0,0015c108e4e355876725734ec8a8ff36ebf15bc72455bc05bcbc06e9ae4dc3e1,2019-12-17T20:18:50.240000 CVE-2019-11941,0,0,2f7885a220d2c89ec11c4a6fb9fc19d195c51485c43c7102217bf454d8c3c856,2020-08-24T17:37:01.140000 CVE-2019-11942,0,0,d11c37671b4949b7a946ca4b07fe31d5cb11a6dd47ffc42b5c71f31cb07dfceb,2020-08-24T17:37:01.140000 @@ -130211,7 +130211,7 @@ CVE-2019-12043,0,0,1483d9273fe6286173d9c571264da751a4c545adf63142d2b55acf9bea28a CVE-2019-12044,0,0,d2d8f7540a3bd0f7dcb1aa3defa9f40c378506b3b010b5d4a92d7ef4fd0d65ae,2019-05-24T19:55:04.177000 CVE-2019-12046,0,0,5c59bd7292018b8b5ec2761e997ac78c23c7d91b401e9fa570a838d87b4684c1,2020-08-24T17:37:01.140000 CVE-2019-12047,0,0,51f1ee9ea24352a9c5d04fc77b386fd539eb8e31f262887b92c3d67d3e244adf,2019-05-13T16:24:01.007000 -CVE-2019-1205,0,0,c83a16e42920f757ef643ab5fddb98b450342f44240d6c13e16efe18d525b369,2024-05-29T17:16:13.340000 +CVE-2019-1205,0,1,1ecff39ea61bb669ff0e74e453c1ff3e5eb3a229efbb773f4048370ce62eaa4c,2024-07-03T01:36:01.620000 CVE-2019-1206,0,0,1470952df53a9b6b2298e0b039b6e8cb44d8637ffcd3f2da91c5fe9212045c55,2024-05-29T17:16:13.443000 CVE-2019-12067,0,0,383c1ff6e1f676c3f605bdda6ed7d13a60f1f9880588a729c707076e59a09f69,2022-05-13T17:28:43.707000 CVE-2019-12068,0,0,a8d0a360a14f97018ef259b4b4fd145a3351d7cba3e64a41b88e9e9e8a409b21,2023-11-07T03:03:28.070000 @@ -130375,7 +130375,7 @@ CVE-2019-12264,0,0,f68030caa5ae0703e1fb48b17f6872dbd93fe1212014214dbd091140392c2 CVE-2019-12265,0,0,4b371d2a787a47132d71ad34225ee2266cbcf0d3a68a208d649e0864e5a39358,2022-08-12T18:44:44.460000 CVE-2019-12266,0,0,66f7307e8480f9363142ba82c71f09cdeda204aa9fbe900988cc982d6a6b0710,2022-04-05T21:21:36.460000 CVE-2019-12269,0,0,d912d65a9560b4c74e9f4e1a475d3ea6df6c5ee6b15763e10f4e25ae7ec233f7,2023-11-07T03:03:30.620000 -CVE-2019-1227,0,0,b2c623519c8e7faeb291aaba2d2c920d05096e00cd8d3eb34b0f907d2ef5b555,2024-05-29T17:16:15.713000 +CVE-2019-1227,0,1,e532088e11d4c0fb2150e508a43f06238b905512f60ab48b64cf50419a497320,2024-07-03T01:36:02.340000 CVE-2019-12270,0,0,87a8e700c989c5c8eae3802130df3be7a964a1a4da63b8b6566617a73fa36d92,2020-08-24T17:37:01.140000 CVE-2019-12271,0,0,a7393142a074ee4d25c8423ce448303df8ecd43aeb2672debaf9f7e41bca48f6,2019-11-21T14:43:57.893000 CVE-2019-12272,0,0,75953f1be491a27e8ca150a1f0df59f1846c0a93845adbb6b4c04933d30198c5,2020-08-24T17:37:01.140000 @@ -130385,7 +130385,7 @@ CVE-2019-12276,0,0,239af9bb04c8066f4cc77373d211951d0afae6eee09558c16ee349a6f79bd CVE-2019-12277,0,0,3346e571c2923e6b877521f47be89c7fd42df874d2a70a5d0a12c44a9ddb34dc,2020-08-24T17:37:01.140000 CVE-2019-12278,0,0,86014793e04e9c29f543b7d410b4bf36f5c97b4ba2c63dbb9310bca63c87f1a2,2020-08-24T17:37:01.140000 CVE-2019-12279,0,0,f129cc628f2b3bab2d4f96804f22ddf566a41fed8066d58aa167b152a8c92493,2024-05-17T01:32:07.820000 -CVE-2019-1228,0,0,c4e28ac6f3489569b04a63c2636c95e653c099a364b332c95176d4b2ab86b550,2024-05-29T17:16:15.987000 +CVE-2019-1228,0,1,82b17493cd5756a48499c9a600e5abc400a299a12e553c0e36804f85fa08e564,2024-07-03T01:36:03.077000 CVE-2019-12280,0,0,0ca794aec379b9039519f16d3e67e574f93328405694796020d39d701e8e91e2,2019-06-26T17:27:34.290000 CVE-2019-12288,0,0,472d49831196bbed87811ae982841dd4f16882a3dced5b43f1d740b8cc538e1b,2021-09-13T11:38:56.497000 CVE-2019-12289,0,0,cf2241041fa1437e3f04992c7b78e02990215b9e62251e2ef66e8f3b9e0e2c3a,2020-08-24T17:37:01.140000 @@ -130825,7 +130825,7 @@ CVE-2019-12757,0,0,f687c5d5c4c255ec0bbcf17804c97f82386baed36eb157d4e7fc6a20e3b30 CVE-2019-12758,0,0,3c17162d0ff62e4971cf85d0bc866512f3b725616fd9c729233881f838cfe674,2020-08-24T17:37:01.140000 CVE-2019-12759,0,0,0f7bb9c723516741f1c61aaba4d259b83f1859534b8dcefcaaceac0081ed8d9b,2020-08-24T17:37:01.140000 CVE-2019-1276,0,0,daa1bb7861a768c3482ea34e2d0b31a4b4658fe9725100c05d3812cac82a7b41,2023-11-07T03:08:00.707000 -CVE-2019-12760,0,0,3b443eb6eb4fd08caf1e9372facd7b9ce3fce68a6a86f9796b0fc9f387a6e1ec,2024-06-11T21:15:51.900000 +CVE-2019-12760,0,1,51837a5d82f02788bbc14f1a05677551c8cb6c5de9e8fa4cc34274d04b098920,2024-07-03T01:35:41.783000 CVE-2019-12761,0,0,9e10740652a7839a7498c10b211d6eeb2fe5d8683c3ac89c1b143714cbe3c87e,2021-08-03T15:15:08.047000 CVE-2019-12762,0,0,6df893e272a846d8878dfbdf98fb92c121e440dd777be6d32a4f7f74395a280b,2023-11-07T03:03:40.433000 CVE-2019-12763,0,0,feae6a1c16dec94964602f6b3b01cf783249c8aa9048b652926f7cd5abbe37f7,2021-07-21T11:39:23.747000 @@ -131629,7 +131629,7 @@ CVE-2019-13638,0,0,3929d8db3142d73c08e48d9672ca7631a8925fac91d6472c6f209414cf829 CVE-2019-1364,0,0,68252dd7056f67db2daff28c6f8be7866e301e68a1b0209f6488ea39139a1430,2020-08-24T17:37:01.140000 CVE-2019-13640,0,0,56f95f0554f5ae8474ca508fad0023180031bdc51c4699ee8d58c237a3ec248f,2023-11-07T03:03:54.030000 CVE-2019-13643,0,0,279c0a94beb2c88ecea565a3f7846e1946bae75788be46180d49fe2f363a0f26,2019-07-23T16:43:02.673000 -CVE-2019-13644,0,0,30d69f5a9c00ccea1150262434ad453480e698af791c3f0fb5c47a1db54a9e3f,2024-06-04T19:16:57.510000 +CVE-2019-13644,0,1,cad5d4d6086b8d2e53d7b79e7218758c30e412c72917a80b4f55449aa5d7cb7c,2024-07-03T01:35:42.100000 CVE-2019-13645,0,0,47c3557b2606e7b253f0dfb998793a72f84bb8a3882971d6a4d2e703c6a8f806,2024-05-17T01:32:50.263000 CVE-2019-13646,0,0,fd054bac87abd16472def70b1922af1a5e3b0d08e4624062faf5ec3ed6a3b9ac,2024-05-17T01:32:50.350000 CVE-2019-13647,0,0,51b92d174e8894c3805530cffdd38e352ce3a7b9b747266e969ae011acc5369b,2024-05-17T01:32:50.440000 @@ -132104,7 +132104,7 @@ CVE-2019-14228,0,0,39cda72e09ff4abc467e804a00a685bb40e5cbba8e418677fae43574b88e9 CVE-2019-1423,0,0,1df3942a017bf096d3cfc32a86d8af5b8a392fcade709e8ff7f3b31ffce7bac8,2020-08-24T17:37:01.140000 CVE-2019-14230,0,0,a834a2a83b8e7263e597fe1139b3b1531a21c67d85ee25bfcd95e1a796e4e547,2019-07-23T18:55:15.377000 CVE-2019-14231,0,0,d0f633ffe1ff95d5d33151ce469c5cd6e457bda186b122f4fa774bb6c534fefb,2019-07-23T19:20:11.447000 -CVE-2019-14232,0,0,6536594db3f28ccb79b9fe03be0521eafb4c026704038bb4e00489d8f23ea65c,2024-05-01T17:15:23.913000 +CVE-2019-14232,0,1,a7aaf80c55cfdfa6c64fb7144517386a2c8204612457ddd8b879c8f83311da01,2024-07-03T01:35:42.547000 CVE-2019-14233,0,0,2e69c723e5beac3de56f5148e599edc0c0b2cd57f38d5900bd520af10c61f0e7,2023-11-07T03:04:51.850000 CVE-2019-14234,0,0,987322a9571ecb30b73af9c37cd4ef931a3f73b1c9208538cf1aacff44532c1b,2023-11-07T03:04:51.923000 CVE-2019-14235,0,0,df2c5de8456bd171072db4762ffce0de65bd411c848d5b72cac1a5a6486e9a25,2023-11-07T03:04:52.010000 @@ -136574,7 +136574,7 @@ CVE-2019-19583,0,0,92aaa160852ed67c7a6cf3e744762baf4c5bc7452e210fcc788d3d87b13e5 CVE-2019-19585,0,0,30b88ac7fd830ce01bdf80a1e33329e8a5dbef1e4d59a678953034abd6a0bbbf,2023-01-31T20:46:45.367000 CVE-2019-19587,0,0,7f6e16417dc9f15817bf1c1ed83742ff8bf13a3a414e5f7b7ffd0cbd4e7e3ac4,2019-12-06T17:47:23.397000 CVE-2019-19588,0,0,eac68a7e022cefcf32a1011d48747efb9976e1d181bbb307b4c3227ca2bfecc1,2020-08-24T17:37:01.140000 -CVE-2019-19589,0,0,842d225837471583ced8032ece65c480f059188aebe798a66674cb58210486d2,2024-06-04T19:16:58.127000 +CVE-2019-19589,0,1,7062403f1a155a75bfd14870988c168e03b96f57cc7459f9e4d256077b1285cc,2024-07-03T01:35:45.240000 CVE-2019-1959,0,0,13121ee34c6369c694a176d38efb98e3d43e6d4b11fd16b9a1086d9aae5dcad7,2020-10-16T14:43:26.960000 CVE-2019-19590,0,0,f2241bf7b74d156ae15fcbfb8359a8fcc95b93e930332a9a6d1c8db9adac4598,2023-11-07T03:07:43.043000 CVE-2019-19592,0,0,7024a05733eedda8e93ff558f9761417cfdf0608e6f2ae8ea132262d897bcd1b,2020-01-28T17:31:36.363000 @@ -136711,11 +136711,11 @@ CVE-2019-19746,0,0,7496dbb7701f079fb861542a8268868f4ce34c0bcaa82c3f8ce824c47836b CVE-2019-19747,0,0,e4d055d4e13a340b85243a2e1ebc118c37ba99de09a620117e3d033feedaa2ac,2020-01-03T16:21:05.267000 CVE-2019-19748,0,0,e70c2bdc7244c49603d02a6d1b7d6c46ceed54dd81a456dfefd903920efd3dfd,2019-12-13T13:34:04.483000 CVE-2019-1975,0,0,8ebe91cd136ef9f649067e00c81bd549551eb5b0112e0b690422ffed67ca50ba,2021-11-02T20:03:38.680000 -CVE-2019-19750,0,0,12fd2e34791119d45f95f74a18cc718a7a4e78ccb40a7cde11381cadb33be9a7,2024-04-30T18:15:19.217000 -CVE-2019-19751,0,0,e47c939df8f27126e2fedad6c9af05782683ffe582a19024035ac9cf19448f30,2024-04-30T19:35:36.960000 +CVE-2019-19750,0,1,6d810aefe05e2924b202e94ea3b33f6e56245239530b0ad7a6266669ab22c56c,2024-07-03T01:35:46.357000 +CVE-2019-19751,0,1,333e2228e5359aa9aa6607b9b93a13db1e1e4a3afd8a27e1b0809b961a7ade91,2024-07-03T01:35:47.590000 CVE-2019-19752,0,0,dfe9c1df0a680d1561153b191102a594f6d317df7ea9df43ba32d8dbec04c3b6,2024-04-30T19:35:36.960000 CVE-2019-19753,0,0,3ccdf4a6e040eb77e3741e3e2fdfe10f25b5beb0c35bbe1d95862e288ea52202,2024-04-30T19:35:36.960000 -CVE-2019-19754,0,0,418d1d725b6014e7ca54b23dd45f302910441520be48a0520a2f2911ab77a241,2024-04-30T19:35:36.960000 +CVE-2019-19754,0,1,cea16ae880519bbe1d98fa9bfa11e9d2b0fb7aed20d6d73373e4fe599034df53,2024-07-03T01:35:48.790000 CVE-2019-19755,0,0,37035b7734253d64f3c91a48c186318fb5da18e51dc2cafe38b526cdbeee8569,2024-04-30T19:35:36.960000 CVE-2019-19756,0,0,7f008bf0df7cd341019a0ca12092f2bebc077861b764b1f2e41153e961e981ef,2021-11-02T19:16:30.403000 CVE-2019-19757,0,0,3fb6636c3c4c4520c83d7d95a0bd50df6cb961a31e5298a5b5c721d326e59bde,2020-02-24T17:53:03.400000 @@ -141827,7 +141827,7 @@ CVE-2019-7252,0,0,867184020b08f3fc709306c75a2c692cefc343ba6b5fd49a37a531f1cdf36f CVE-2019-7253,0,0,fad52b53282803d4d4d5e4e473135d9e4346b8ca3d896ff1b05ae3d9f491a8b9,2019-07-03T17:19:15.327000 CVE-2019-7254,0,0,f01c4cdeab11b9ee74f295802daff28c7992564c5d93a420f6f97a384f4473f8,2021-10-04T17:15:57.257000 CVE-2019-7255,0,0,d0345945117860857123641eb29c7700e1e9f797af57bb14c8b9d8b6af6257bb,2022-10-14T01:21:44.847000 -CVE-2019-7256,0,0,697a3a29292970c38153676480bc6a81cf6741f8f8d78c0fc991b2aaf3f78ffc,2024-05-23T17:58:01.130000 +CVE-2019-7256,0,1,14b4138b3293797f26382877efae69f5fc1e1a68710e578d84f5e0f410906836,2024-07-03T01:36:04.380000 CVE-2019-7257,0,0,c12bc70a2706aa0b1a235996b97baa21edcbdbf4fa73b5dff9cad9d98f3e95db,2022-10-14T01:32:10.637000 CVE-2019-7258,0,0,871837c4692b71db165da95382f732357ce210cf9527f590a57fa413b26df05a,2022-10-14T01:33:11.630000 CVE-2019-7259,0,0,46f6a86727161a6a5d745e3c1fecd80f0957dd84595b021b3c0adac240e889d9,2022-10-14T01:13:17.953000 @@ -145635,8 +145635,8 @@ CVE-2020-10669,0,0,ca180d01384ad04211e88b90747df0627ef485a81d37f2bb8db8060c8dd1e CVE-2020-1067,0,0,cba45e175cb0f0af5d654f778f97d1af9f501d95d704e7058e011b36065c6ac2,2021-07-21T11:39:23.747000 CVE-2020-10670,0,0,ef0a633832ae1ca45856ae10f6b9ba4ffb97d4d1fc3cc5be00209c2b638db391,2020-03-23T17:03:14.620000 CVE-2020-10671,0,0,b82ba2c53c108dc3e8bbf691d0cee73d71d98ceb0d16a6f21aa6c5dc5b274392,2020-03-23T17:01:31.067000 -CVE-2020-10672,0,0,9d4e805f9f2f55b708ea98c2890ded38d762c6b40e486464310161dfe3ed686f,2023-11-07T03:14:11.640000 -CVE-2020-10673,0,0,959ae58a886cd6d98684aa994e9a25c6de201cbd615db3e4091b6b1285b0197d,2023-11-07T03:14:11.723000 +CVE-2020-10672,0,1,56835e004683f5ecf74c0f32f01633e8b341a8f4c52eaccbf82eb3fe1e1a84b9,2024-07-03T01:36:05.477000 +CVE-2020-10673,0,1,49946108bcc66fc635cf0574a751942b0b59464362ddcc07a037d56372419304,2024-07-03T01:36:08.040000 CVE-2020-10674,0,0,859a4999220ce9f0d901a775804f7753d41501bc260a029f8134f02b1bf7919b,2020-03-20T18:49:20.243000 CVE-2020-10675,0,0,72c9638ade8e468e4ab12470847853fb84bf9317a75be409f0563da6d6910b8b,2023-11-07T03:14:11.810000 CVE-2020-10676,0,0,fdf7aed059478f7b29b03a739d64d1da62f291cdb9617d598f7993690c9c7e1d,2023-12-14T20:43:09.407000 @@ -145937,8 +145937,8 @@ CVE-2020-10964,0,0,789daf866b4cea0ad7c47cb0af6a4a6f5bddf436f8039c48d5677f470c727 CVE-2020-10965,0,0,b29cbabedf8f07f4b5028c7e876e76e9500743ae3c0731522bef3a7430c26ba0,2021-07-21T11:39:23.747000 CVE-2020-10966,0,0,2e788631c0a069733b98e8a42e09f1ca0fadb43cfe103322fbb528ab81f1b408,2022-07-12T17:42:04.277000 CVE-2020-10967,0,0,3afe2f47594a5f145c1f672b478c4d780ad66ef175814ed89bdd884d6e20c61d,2023-11-07T03:14:26.377000 -CVE-2020-10968,0,0,37af3b6028e0ee13f459b978a6e63f2d4d2573c124489c92ad8f0d900175dc0d,2023-11-07T03:14:26.457000 -CVE-2020-10969,0,0,19fdb9035d5c3b33bc15b99032dfef98b872e5810897c075d25b780cdadc5e34,2023-11-07T03:14:26.560000 +CVE-2020-10968,0,1,f599a069efc70252dfee9bb03ee205e042965aac96cccc2ed6ec39ab8964a5e4,2024-07-03T01:36:08.923000 +CVE-2020-10969,0,1,e9212f9376de482f002b50a6d538c2ce2fd8555382b098d5d5a929571d76d6a1,2024-07-03T01:36:09.833000 CVE-2020-1097,0,0,e6d083bca31c50a4178d18048befc674230cf885e8b99d1626f7ca9d2a1932a9,2023-12-31T22:15:56.483000 CVE-2020-10971,0,0,480232982d571aa27978514624b28209cd445aa6b479b2abe0bd553ccce4f8d5,2020-12-04T20:15:12.457000 CVE-2020-10972,0,0,8e2f24cb04672f00c2d5487f900f2f40e6426cd790274bfc42e8f768ed887db7,2022-04-29T13:26:17.740000 @@ -146090,9 +146090,9 @@ CVE-2020-11107,0,0,234d4afcfe2da914e7311fa76a7145ad1984ec19d982195bcd88cfa4623cf CVE-2020-11108,0,0,612ccc5af55f3277e008d4fe0c713113038aa744877ac65a45cdbeb536ad0003,2020-05-27T18:15:12.877000 CVE-2020-1111,0,0,94693c5467c80e8119c002c3657b6b41315d5bd60168637ef8c8c3fcb85d5dc0,2021-07-21T11:39:23.747000 CVE-2020-11110,0,0,8413f7ff7453a9361141dcde9f8dd8f071bc38d977a54eccb8a1f77f3c5f6a28,2023-02-10T18:04:39.533000 -CVE-2020-11111,0,0,ca7269d106b7d18aa621d0f9566ba3b75d60ec7bc1391534f3f4ba2911fc6478,2023-11-07T03:14:30.317000 -CVE-2020-11112,0,0,e59cde4aa40a32d91a0fbb0ce5d3ea56ad656c6176290f8474c799e525e752dc,2023-11-07T03:14:30.397000 -CVE-2020-11113,0,0,e8eea196b344f272335d5a4b89c28a66ba14ebee8411695303ff13d92d7523c5,2023-11-07T03:14:30.480000 +CVE-2020-11111,0,1,c1b9e1068ed1042d9fa47d36acac752e4c4a38570f7026f99233be2e521503d9,2024-07-03T01:36:10.713000 +CVE-2020-11112,0,1,3b9cba4c70d9c218d61e553e0613e84e49c867f4a920ebe05ff8b12d7d48249c,2024-07-03T01:36:11.610000 +CVE-2020-11113,0,1,4f61752188f30358c7ba5f84100ef4cbc37de0014e8ea29a6b7124414cb31051,2024-07-03T01:36:12.463000 CVE-2020-11114,0,0,471860a51c3eb980b75f4bbf7582476bfded90dd273b52b8aa8ccbfdd440f3e3,2020-11-09T15:53:08.420000 CVE-2020-11115,0,0,f31d58b5f3099cfe3485029d85b455a04ac89b0b35cac74a122f80b04f3c4516,2020-09-11T16:50:52.697000 CVE-2020-11116,0,0,27ff1607d791666f6536537da0e97ebe7e410ae99e867726b5c402280280cf1b,2020-09-11T16:45:56.233000 @@ -146825,7 +146825,7 @@ CVE-2020-11872,0,0,b5192f35ade26ae7b6d9340eed7d7bcbd14ddaccd0a3e643f65abf820e9fd CVE-2020-11873,0,0,9529d5617866f0edcdb90f9535fc045cb78258e51f0fa7e106fada731d8cc097,2020-04-22T18:00:12.197000 CVE-2020-11874,0,0,6119315304de60f0e01b30236326d368426e0b5f9e3e549957cf8b0dd9f6a83a,2020-04-24T14:33:38.877000 CVE-2020-11875,0,0,0528c15a7a16c7d6eba47b4f13976efb17c6b8c56559848df161fbb8f954b311,2022-10-05T16:54:28.790000 -CVE-2020-11876,0,0,cc8e6af0f7765c8b223de7cc77c4a033780594b5aec7cac9de5aa3b76a166dc7,2024-06-04T19:17:00.030000 +CVE-2020-11876,0,1,dc8638b13cdde6b23736ccc1a119415afa07ed7852fafc98a53b970c0c8fa83a,2024-07-03T01:36:13.627000 CVE-2020-11877,0,0,07beec8f166536dd7a800282e5deee8bff661c08cd99530e5ee36198cb117bf1,2024-05-17T01:41:47.333000 CVE-2020-11878,0,0,a9d992d688915ee32ba14077f1669a6391a1d5eacefec9896f80816c2c207a69,2020-04-29T19:10:17.993000 CVE-2020-11879,0,0,a9518de536873369c2911a4347ce729006a3713b3899c6414aa0b8ee67dc3ded,2020-09-04T15:00:27.887000 @@ -147501,7 +147501,7 @@ CVE-2020-1266,0,0,be568c62410ad866d9e5ce6f856285eef36527344ae35a531c0ace60bf4aa7 CVE-2020-12662,0,0,a50202a22e5fd6ca70e2ddc132c2e601eb50d5054d053a8739f12375441ac6cf,2023-11-07T03:15:42.370000 CVE-2020-12663,0,0,75beb77ebadaa78b84642c5f4c9f19cfe75a93733a1e1b2a433185b1f5b74682,2023-11-07T03:15:42.447000 CVE-2020-12666,0,0,fe755727c03d8130c7fd2ed15e9ba86f693d12f15275354037125d23793eaa13,2023-11-07T03:15:42.550000 -CVE-2020-12667,0,0,fd96d32138ba34fff8302fe18c7d4480b5c7e076daa1e21a385059e1f8c882e9,2024-04-26T07:15:47.467000 +CVE-2020-12667,0,1,414678b138cbfb1bbb2d578be2c93f5a9af489ffb004114f9d6370837eedba98,2024-07-03T01:36:14.667000 CVE-2020-12668,0,0,76729c036030ac405133032ed3ea2891f1f66ef07a3eb7665de76e2610c0bcfd,2021-07-21T11:39:23.747000 CVE-2020-12669,0,0,74ee601d98fd6ad7039430102906960989d828cf9bd6e4c06ed3d687ff46d97d,2021-07-21T11:39:23.747000 CVE-2020-1267,0,0,05789cc17c6058015a629047859d2317dbbb98762c770905ae60901f6166798e,2021-07-21T11:39:23.747000 @@ -148443,7 +148443,7 @@ CVE-2020-13650,0,0,dba55786a9ea124bbd14220955a280022e0ce1a3e8d672a7904b5f66d94ec CVE-2020-13651,0,0,50c746ffb71ca84b046d757a7848f7175786e0869d05d2cc239657edf730421c,2021-07-21T11:39:23.747000 CVE-2020-13652,0,0,cff0704a1fbefa6f723a5cb2989b219f95d9103cd07641cc750232a604786c0f,2020-06-19T20:59:55.207000 CVE-2020-13653,0,0,9fef6b45a0a781f00b6828e1f457e89fe2cdde8f5c218d1d160eaf76a53c6a7f,2020-07-09T20:29:57.623000 -CVE-2020-13654,0,0,eda18a055b32adcc14748d2667d863c6886c18b34f34c3d5499b230e2c4e0d3c,2024-05-02T17:15:07.590000 +CVE-2020-13654,0,1,81a0537524936069ce9943df110188f2140b759f7b45537dd33d093232dddaf0,2024-07-03T01:36:15.643000 CVE-2020-13655,0,0,cfff03f7dbb0df535a07fb959ac7512a05926b864d92d1c47cf259888aa91aee,2020-09-03T17:46:54.660000 CVE-2020-13656,0,0,f55cc4f8690e2d2f608187ea1c0bdb574220f80af769fac7330ad9cddcc2e272,2020-06-22T14:30:03.077000 CVE-2020-13657,0,0,99601111e23533f43a07e7bc67e19a627db3fc9f179bd54ec8629d70e39bab60,2021-07-21T11:39:23.747000 @@ -148743,7 +148743,7 @@ CVE-2020-13961,0,0,1fe463453099b23513150647de34a505435c3e49bfb1bd37008a666a6fd18 CVE-2020-13962,0,0,73efb252eadcc56a142d208d0445dc25a58d319b90a52e53e0c7ef8825dcf6b3,2023-11-07T03:17:04.313000 CVE-2020-13963,0,0,5a2208f871acab2397f31e74f10b59d9b44e43f17a6c3a1b3c64f29aa547891c,2022-11-05T02:04:33.607000 CVE-2020-13964,0,0,4164273b77e227c4c8f846f5383d7c8a507930d52d88ee08b556d2b4408e2e82,2023-11-07T03:17:04.400000 -CVE-2020-13965,0,0,8ccb6b96a4afe0bb61e914f3bf14eee5fcf8639e21b9de06d92da39525e5770d,2024-06-27T18:06:30.240000 +CVE-2020-13965,0,1,b04e91d8ea362586bb8f8dcbf311dea1d4e8a30a5c488066eff65e7714f6d3d0,2024-07-03T01:36:16.497000 CVE-2020-13968,0,0,31f2705e5110608578328547025f665cb791c3bf95647fd72cce63dd0efb9c76,2020-12-23T19:23:28.590000 CVE-2020-13969,0,0,ef7ada27dc8f94a96c31abd823098e38b638d6e725d18bf5b8b998ea32c4422f,2020-12-23T19:21:31.573000 CVE-2020-1397,0,0,e79ab87fef1aa5c692c9714693118d984c5317843a4a8b70d569e39bb4504ccc,2021-07-21T11:39:23.747000 @@ -149028,13 +149028,13 @@ CVE-2020-14314,0,0,11f037baceaa255bebdcf1ccb895640bda674f2f00e67ea6d8dae6acdab91 CVE-2020-14315,0,0,316b042e84fa6bb45845d0aa3fe5dd7e4b5e86324465cb8665189319a204d9d0,2022-01-01T18:38:25.567000 CVE-2020-14316,0,0,e80af924cebb78b9cf35cf5905e163a83b5cb62d9dba60cb94af15eb84b444bb,2021-07-21T11:39:23.747000 CVE-2020-14317,0,0,cdda4d77e183f0751e3a94da2ba7e99b403e8098cf3058c236e7c7cc9f3c4edd,2021-06-10T19:34:49.500000 -CVE-2020-14318,0,0,e224801174fc60f98f4567ce9948af9aaedcc98f662a95b674fbe5825a4e27e8,2024-04-22T16:15:11.597000 +CVE-2020-14318,0,1,c04c201e8d2aec53f91e89b0f5d6357f4ee790e376413118559a7523c6f28c4b,2024-07-03T01:36:17.507000 CVE-2020-14319,0,0,0705adf5d12c3d901038f515df6ac33f815666de2227a60ec76c6d99ec1ae006,2020-08-12T14:16:48.007000 CVE-2020-1432,0,0,38bd03d5c139278aa3aa8dd6915ff2181722853e76c94ca4a8be7d79e85cb97c,2021-07-21T11:39:23.747000 CVE-2020-14320,0,0,067327c76855c6973adab6e64127421729a695bd5e5149a5d881e487234d4cc2,2022-08-17T15:17:47.090000 CVE-2020-14321,0,0,a78f441212fdcd3943e422c0afe71b6576b7c0cd09dfba842fd604e11346c92e,2022-12-08T03:19:52.513000 CVE-2020-14322,0,0,dd031b3adefed2f31c576493d7ea59ec6008cb796e713a80407cff1d9e3d7b0a,2022-12-07T02:55:05.243000 -CVE-2020-14323,0,0,c54c0d05d24cdc77a6ae98a1652279d320c466985a9a2dedb15ce96db3075636,2024-04-22T16:15:11.780000 +CVE-2020-14323,0,1,3445b5d9b53bf562c58c32ea74333ff45b304ec443f45235d8bcd733c1f9a164,2024-07-03T01:36:18.413000 CVE-2020-14324,0,0,7fbdea3533007b8b583e2fa55e5c4cf6c4d42fc8194bab55378516d60684a539,2020-08-13T16:46:55.333000 CVE-2020-14325,0,0,24693bbc5060f44409b40d7b0f0a06ced2e9c286fd0530c97ddf949c8e827486,2021-07-21T11:39:23.747000 CVE-2020-14326,0,0,bf7b27e7ba1344e88c33495f802fd065f8633f8a4b9392d86d299759bfb78c26,2022-07-15T17:38:28.783000 @@ -149647,7 +149647,7 @@ CVE-2020-14926,0,0,db4e55043a7b6d0ab2a53d74f9adaf601ce2fe836ae320a6ea2b788354e87 CVE-2020-14927,0,0,2f106dc8fb4a619ece51c6fb69ae04d863a6bd4a7623316c29837214fb44b40e,2020-06-24T12:44:32.627000 CVE-2020-14928,0,0,263191a132f641387ddd05882e3af334a2e1aea264e79ce6cb8754d1ef3ef37f,2023-11-07T03:17:22.757000 CVE-2020-14929,0,0,35bcea656d2973ea5f7d0e8fa22943f1ed53585d2305d1cd692c52f28c2ed4db,2023-11-07T03:17:22.837000 -CVE-2020-1493,0,0,d8c160e97f00ac7e73f26c607a9e2e9edd750fa0cd2f69b1a32f8c99af905cd0,2024-01-19T00:15:12.853000 +CVE-2020-1493,0,1,6926336219310eaa2d8722c85b7db2ddbd0b10505ec0944a03865b33089c04f1,2024-07-03T01:36:22.230000 CVE-2020-14930,0,0,fe9db2c89ba65e31cad0bca48b53eb500e2f8c5bb839a55f12cd15224bdaeeda,2021-07-21T11:39:23.747000 CVE-2020-14931,0,0,e897bbad88afece8061022c6ccf7db080495022a9b61b11630ab834013b3442f,2020-06-26T18:47:20.987000 CVE-2020-14932,0,0,5e08de888f262f4b4cdb20a772958e13162ae4326a121481dc399903a6a1e398,2020-06-26T19:03:39.820000 @@ -150477,7 +150477,7 @@ CVE-2020-15774,0,0,7f669c74d4a450851527c36b8ccd034885afba84a49fad252ecac3b24b384 CVE-2020-15775,0,0,16dc699c12ee8715f35173c89ff9ca93a846b39f589d4ad8c84ee2eb1808e2dc,2022-09-30T03:38:56.237000 CVE-2020-15776,0,0,83011097c7d543255a913e4959a8fbe15ce1d5c55410d53b547d64de792da90b,2022-09-30T03:39:31.617000 CVE-2020-15777,0,0,fff83a2e8ead54e2c6e308797a62a0646f12295ed75fbe496761aa37f2772a62,2023-05-16T10:53:55.200000 -CVE-2020-15778,0,0,77eeae6784ff5001363e977ab6dd8b586ab95a3fd65f0231f033fb267ae00d29,2024-06-04T19:17:00.783000 +CVE-2020-15778,0,1,f6c6f840023664934ad53b2c20a82e90e3515e55f7e97837622538d882948497,2024-07-03T01:36:18.793000 CVE-2020-15779,0,0,bc6409af642c369c1174ce8617de74bd300ad9386b23f60b61fc6d1f6a76e8eb,2020-07-22T17:06:55.403000 CVE-2020-1578,0,0,a18f82251171f635f0d3275c3c425b4aa23a8e88b94eb335a3ed501d4a1876bd,2024-01-19T00:15:19.627000 CVE-2020-15780,0,0,699270fed47a8454a4711fc9cb455314cd285aeab3a82e6610f5ed1ef34a4255,2022-04-27T15:44:41.210000 @@ -151712,7 +151712,7 @@ CVE-2020-17515,0,0,b9ea468468ff921fe86bb29317afe15999bb9e8acd56c04de22c44a3c44e1 CVE-2020-17516,0,0,aec899ffce214285b5fc00810f926119a3b2a0e5b9234fe4df0136b5e9ee6c2c,2023-11-07T03:19:12.413000 CVE-2020-17517,0,0,e57f8498c8e6974eebe301708a418fa30210de71584034ce279b24f095df3efe,2022-08-05T17:12:46.173000 CVE-2020-17518,0,0,daa2c88d02dd0aa54a186f84810417e21874c98a0279b98c0b237cdcb62e335d,2023-11-07T03:19:12.540000 -CVE-2020-17519,0,0,801e64e3f52b3b13347e15c70ce10c60ee1466c0cd1054c1334e621deca6b30a,2024-06-10T15:23:11.997000 +CVE-2020-17519,0,1,ee5431afe97b51aaac491e61ff0e3d4572f4f3f2cff1f25f528c484097433479,2024-07-03T01:36:20.030000 CVE-2020-1752,0,0,2e8d828892809fece2039127c34a2042793c9d5fc1907e321ded9d79de475846,2023-11-07T03:19:33.337000 CVE-2020-17520,0,0,7b53e64eb7d9b93274b75df4e0956be00e02218d21c5618af95f2af576e8f301,2021-07-21T11:39:23.747000 CVE-2020-17521,0,0,ad3f32118d1f52088c1208d11c2f8e5a04ae0f368a8398ed10f42ca8c6165c50,2023-11-07T03:19:12.847000 @@ -151878,7 +151878,7 @@ CVE-2020-18280,0,0,f572efa78737139e378997143345ebcbe7d680f8ec8f30d9e6db57e161ed5 CVE-2020-18282,0,0,829d96b0a674e14506a6a9ffa89aae374a349439b328984134ba89b922820e92,2023-05-11T17:53:25.337000 CVE-2020-1829,0,0,14375d49f5ca4b48644883646cf93382161f5f31c7c3252b7a611b13c9396b74,2020-02-20T19:39:27.533000 CVE-2020-1830,0,0,cc344be753badd3618990beb6b93749b1175539d4edc1848241fea50a93f8cf0,2020-02-20T19:37:59.400000 -CVE-2020-18305,0,0,d13ce7b89126e0700f9cf00522fbc6bacf2081e4c2864aae37d995e52337602a,2024-05-14T16:13:02.773000 +CVE-2020-18305,0,1,4c6564b5ce52fb4fc88556a5239b2e92e4049ca8d9f8b8abe3638ad7e20ebb5b,2024-07-03T01:36:20.330000 CVE-2020-1831,0,0,c951921907f752352eb7f724df92f8ff0efe9d828b4db0d7022e5f244a6f2372,2020-06-02T17:25:31.950000 CVE-2020-1832,0,0,2fb508bbc7ecec29eea154fe537e9f7e439a0e4d11011ee7f4acaf0e3bc17e86,2020-06-02T14:50:52.420000 CVE-2020-18324,0,0,47a53b7208913a7317b437f45ce32872ca1fb7a8a91930b053c72f8b7ed48b3a,2022-03-11T14:44:15.817000 @@ -152057,7 +152057,7 @@ CVE-2020-18897,0,0,673ef3e9eafe06b09ce86d015e8cd9e0db49d33b6e0dcd25325855b7313d1 CVE-2020-18898,0,0,66cfc8a38f2073824892187b68493877a2f0d61208a31db863f20a0c6c51a899,2022-10-26T19:09:58.010000 CVE-2020-18899,0,0,712ef9c472a719306990f6053779bd42098bcf2ff480d608376c279d5c665d1f,2023-12-22T10:15:08.330000 CVE-2020-1890,0,0,3cdb951463da8abe5ea297907b86e151c4a443bc103c9f6cdb79e1153cc757e6,2020-09-11T18:05:56.863000 -CVE-2020-18900,0,0,de338daa0f1d3c524ff81e0ed525a6727ade244d019d6d8adf3c9f502d99687e,2024-06-04T19:17:01.007000 +CVE-2020-18900,0,1,5ba78fa974661e6726324b92704e4116ffcb0b3a00580e956afd92df9ebb8ca1,2024-07-03T01:36:21.130000 CVE-2020-1891,0,0,03402ddca00426d38b239a4f1a38abf1d7da8b71f29359b01f87f9faed2a9b42,2020-09-11T17:53:14.820000 CVE-2020-18912,0,0,266315262e21eb8446000c55e1c63eca0739df02b6aebd058ee92cf79b90ed27,2023-08-31T20:34:31.370000 CVE-2020-18913,0,0,af2e5cd6795f909ec6726415570b2c734f280b060926d8f507a9b68fde087926,2021-09-01T20:59:18.617000 @@ -154732,7 +154732,7 @@ CVE-2020-25566,0,0,67c7dae13f4b90e8c4d52e2816b9ac7efcdd96fd8c10702721374b1c3f7cd CVE-2020-2557,0,0,65114866a5d0c57368eca07bc96e1f090929809a615afc4a341c487168d48101,2022-10-25T17:57:21.693000 CVE-2020-25573,0,0,7a25910a7ab815890aa0a8a93657f2f73996ba3d859976e94b28f2be9710c2e8,2020-09-22T17:47:51.177000 CVE-2020-25574,0,0,567efd5875951c4e78573a8f2bc11f8af6ad8dc48a01b592566283efcf37e9ac,2021-07-21T11:39:23.747000 -CVE-2020-25575,0,0,b4c3fcedcf4d66bedc5050b0cac6e3762a6ab024f58cfb11785e15498895b159,2024-06-04T19:17:01.203000 +CVE-2020-25575,0,1,399c2f9ad768ce46d2151034f247fa80fda45b447ee3028166e3915ae7d1002a,2024-07-03T01:36:23.557000 CVE-2020-25576,0,0,345c0c46875b3ee90df1f162173f032b35466da7801ea26fd3a301a79f49777f,2020-09-22T17:38:58.223000 CVE-2020-25577,0,0,25047294b24f503e4ed5bbddf2a93b4988862148f53ad5f4c612f090a1ca1fd2,2021-06-03T19:12:25.530000 CVE-2020-25578,0,0,f106ef3c849f981b7dc94d7ee5e69bf45f39abaa86e689c08d0dd377cd5161cf,2022-06-28T14:11:45.273000 @@ -156515,7 +156515,7 @@ CVE-2020-27980,0,0,830e0577abb68165c9c35cfee8a51a6c60b275961913eacc553537d4de1e9 CVE-2020-27981,0,0,3bf1cf696baed293d6f1c494649e96f73f2b4efb503676e9261e973789bcf998,2023-11-07T03:21:05.573000 CVE-2020-27982,0,0,70ca59fb1385b23162e90bbdce886489f3ca652b5a09f2b283acf812a05b7f88,2022-06-29T19:26:58.403000 CVE-2020-27985,0,0,a9fa671040ba0d03eb80352920f757134e4910d5a213c85f82de8aa9c0ebf9f9,2021-07-21T11:39:23.747000 -CVE-2020-27986,0,0,1d02d3ba89b0df01e41bbc70cbd0f66b6e7c582bfc0f988e3ac9a2643bfa6af3,2024-06-04T19:17:01.417000 +CVE-2020-27986,0,1,cc5e7329ab11785b75655e2c2419f81239734db3e4347bdbeb7bd534a6842cec,2024-07-03T01:36:24.937000 CVE-2020-27988,0,0,9ab79366c3ed68b76b66778fd7f6c57d888326736f4fa82fc9799e7aa6b4af17,2020-11-17T17:32:48.473000 CVE-2020-27989,0,0,3c3e6dc04c4234121f699bdd521cd7d0f355fd8ce641076508fcbeb790e32104,2020-11-17T17:32:47.300000 CVE-2020-2799,0,0,7d72c312cfb2fb0910af2d8f59bd0858966d4f8190716eb8e73ddd03b3a31f1f,2020-04-16T16:26:49.680000 @@ -156676,7 +156676,7 @@ CVE-2020-2824,0,0,1b3839e690239e450ef59e3ea9ce79ec653bbbd631a6c0510b497b249f8111 CVE-2020-28241,0,0,2118c7a09bd70d775b0c7b5012205a38632906f6eb54c3a3b193c9a6d0339ed1,2023-11-07T03:21:08.773000 CVE-2020-28242,0,0,a991398b2a2de3e82e9526dd86cfec431befdc15722d23a2d322ac76a63478ea,2023-11-07T03:21:08.837000 CVE-2020-28243,0,0,c34f2b4d09890f3ab1d571b65534f37170456ebf56bb4b342197109455d8ffe4,2023-12-21T18:31:01.147000 -CVE-2020-28246,0,0,bd11dd94baab0c77e88a0f3ab8d65cf2d2260215c3b68ed052c52573c0b2a34e,2024-06-04T19:17:01.543000 +CVE-2020-28246,0,1,352212eb398939f43a14d09ec0345c80a2c6b356422ba209ee6de81d8fbbd058,2024-07-03T01:36:25.867000 CVE-2020-28247,0,0,746f877bb001e17d44affe5c44ffa78d2b337205523a4e4f405079cf6652a2e1,2021-01-29T01:00:46.653000 CVE-2020-28248,0,0,cef6e3d5bee771e4a44b7fb8a23466a07d115803d24dd3f38876d0e696b9dfb7,2021-07-21T11:39:23.747000 CVE-2020-28249,0,0,c320854d40e07ad6da93ecb085c4a2a5a23620de069fa64a6444a115124b1629,2020-11-12T18:34:15.967000 @@ -158283,7 +158283,7 @@ CVE-2020-35582,0,0,ee5284a7a3cca5f67b4bdc6cf6f76e8cc75b5ec0259dc2c8d0abaf6ad990c CVE-2020-35584,0,0,288906065e688dd2dbae1754b70b86bfad18dfd34985a87d8671a59eaf3caba3,2021-07-21T11:39:23.747000 CVE-2020-35585,0,0,585ac6de2dc64bac03f29d6c23beaa404c60dcb9405f249d8b8a3f36aafc6aed,2020-12-23T19:38:55.317000 CVE-2020-35586,0,0,9b76047f8ab5a4bc95aabe6b4c27837eb6133fa9ae245aab96d902336d66debd,2020-12-23T19:28:56.907000 -CVE-2020-35587,0,0,1f137ff1a2af00a3c4f7831a95829373c03165164f03ec340934266740b6e1c4,2024-06-04T19:17:01.813000 +CVE-2020-35587,0,1,548418e097a8b76c91c475e45b2825b69ffc84b4a3b6c50c9822467ba7417691,2024-07-03T01:36:27.170000 CVE-2020-35588,0,0,f584e4ea74dbd372544ac65900975a31ed047b271e7b5435dcaee28e08046e6f,2023-11-07T03:21:59.303000 CVE-2020-35589,0,0,a04322dd757c2b9d97ab16eaaa6f39a43fa088fac6586c52e6df3d809080c05d,2020-12-22T19:53:04.990000 CVE-2020-3559,0,0,12a81b914b6e5cf162bce38c73dd82249c107ac88e61c39554430e6caa32d35b,2021-04-16T15:01:40.010000 @@ -158744,13 +158744,13 @@ CVE-2020-36175,0,0,0a3a78d3b88526d95fcb0e696145d83042adc30007ed742f17a7201888eb9 CVE-2020-36176,0,0,5040060b1db6bd0137382ae500c991980c9f0199ed91ce2eb790ccde00cc268f,2021-07-21T11:39:23.747000 CVE-2020-36177,0,0,4fc45580793ff2ee449a8fa285b83146ba72b5a56b467a82d99e90330f293a6a,2021-01-12T14:39:36.797000 CVE-2020-36178,0,0,db89e6b9ce80608954ad24ee3470265cd88d6d4931957966113dfb706314b3cd,2021-01-12T14:38:08.807000 -CVE-2020-36179,0,0,904131efbab1eae3e46e426fa598a91b1b9f9888ca7a34e7253f1cd3bd2de4f3,2023-11-07T03:22:06.623000 +CVE-2020-36179,0,1,f045d92dd53e1814b942e81769535a0d827ae50652f4ae7edddaea2f0a3568c7,2024-07-03T01:36:28.273000 CVE-2020-3618,0,0,2698cfcfd7e15c327cbe009624a7b57aa8c44350fc24872851ce97d1ea2889cb,2020-06-02T20:10:29.827000 -CVE-2020-36180,0,0,4730d21ffc2d2eb170df193e85c14a6a2b824cacb5c4813db3be7fa23b19d4e8,2023-09-13T14:56:32.590000 -CVE-2020-36181,0,0,661976590d1ef6d2b94af92a9202c93878c40cf4b8f8896a609bf298e8b9df1b,2023-09-13T14:56:39.930000 -CVE-2020-36182,0,0,ac8c7e01928a6ad830db67d31dc7376ac3623a3ddb7c6df983de0f081f15864f,2023-09-13T14:56:46.657000 +CVE-2020-36180,0,1,dc0d00d1270454f711cfdff33ab819127143777b3fdfb18b8706596c83a63b7e,2024-07-03T01:36:30.047000 +CVE-2020-36181,0,1,d28a252045b033efb3b18219221e17301a852b05c24069670f11410b7a582941,2024-07-03T01:36:30.900000 +CVE-2020-36182,0,1,9d71e33e669156090438f2281ede2715bd63745247a5d71d8a731bec5afc247a,2024-07-03T01:36:31.760000 CVE-2020-36183,0,0,204d335c01e864ee22d4f404d8242d8c90b118def3dcab060d1914a1f0af2462,2023-09-13T14:56:58 -CVE-2020-36184,0,0,b62c4100ab55d4f834efca31911438d946aa9be7e6f009ee43f13aa7556ea31d,2023-09-13T14:57:10.147000 +CVE-2020-36184,0,1,2156cd89b54daa5b8fcf1d4925f4ec18c8bf29ebfbc8565c9b76bb495008c878,2024-07-03T01:36:32.620000 CVE-2020-36185,0,0,1a7e6470cd0339cd0a1ba367ee1b1b75bab2e9598e2c9663281dfebaeb8dd1a5,2023-09-13T14:57:03.383000 CVE-2020-36186,0,0,fcf534fd391ccd5697893d31531ea0ed8aeec1653dc9728df8739cb9172edaba,2023-09-13T14:57:19.297000 CVE-2020-36187,0,0,9c501fa00e50458e9d073bd23f9f2a5e4b91b0bd0da1f7042f398336da2a4438,2023-09-13T14:57:25.667000 @@ -171089,7 +171089,7 @@ CVE-2021-25298,0,0,4e2a2cef7fb187f31aec2c6106381e4e90369f82e0869f0b34713fc8a0961 CVE-2021-25299,0,0,0cd1ae6e3300fe32daf5c8170b35397490d3a53545adbb8365265915ef462ba5,2021-03-04T21:18:50.673000 CVE-2021-25306,0,0,78beb965b82385615cb6b1debb2c33cf1e1670b8cd308089737a6b638979a9df,2021-03-08T15:41:17.123000 CVE-2021-25309,0,0,774f95526e769f8074cb452190513c1166cff42c409c34b68a09f282b5e1631b,2022-04-26T16:00:33.177000 -CVE-2021-25310,0,0,aac7142dcc2ee4e479f2e9a1ab5684bb18c6449118b74a15452cd0dac3652a4d,2024-06-04T19:17:02.997000 +CVE-2021-25310,0,1,73daf729ca79adcfbec252eb58ea1ebe9ba279c2dcfc6c3375e1f6cba2e8ad9d,2024-07-03T01:36:36.343000 CVE-2021-25311,0,0,cd30cca65ad296a257f2ee7fbab3e3ee2f2c06484d0c89f28e3f3b4461066596,2021-08-12T21:26:41.997000 CVE-2021-25312,0,0,c456ec9c00d24efed743372a3dd2cc2f06097b20ac34f97ed7c56447c2e762f1,2021-02-04T15:08:11.440000 CVE-2021-25313,0,0,03380da599d4a21980f9a2d0f8d6e69dbb49dace79293da56209df3af84f5ecd,2022-04-13T23:44:10.187000 @@ -172083,7 +172083,7 @@ CVE-2021-26914,0,0,7a97e468922848ffeae92013a625692c6392af7ad54168fecfacf439b6712 CVE-2021-26915,0,0,2d1fea0cc250f241b0eba573baed0fa49e626de9cdc94715b7402f766451a8ee,2021-02-24T12:31:30.977000 CVE-2021-26916,0,0,92666a548f00b18b687a9af3fe0339f99997850d946bc596762dea3a11adf5cf,2021-02-11T15:44:56.757000 CVE-2021-26917,0,0,99af4b7b84c118799629ce9ac1e2aa5cb2204243fc9344f9f172b0bfdd139dc3,2024-05-17T01:55:16.787000 -CVE-2021-26918,0,0,d683c3836582b679647ca4d1ce51df55c534b0a5d4efaefd74559ef624ecd57a,2024-06-04T19:17:03.393000 +CVE-2021-26918,0,1,7eb6c0ffc0a3f5999605ea6d28b8f4fa4c92a4af174352e94fd22c90befe2bc0,2024-07-03T01:36:37.450000 CVE-2021-26919,0,0,a4f844127325a28ab47c51549e18d702fb69781ff1a9040733cc9935e353446c,2023-11-07T03:31:49.750000 CVE-2021-26920,0,0,e11963e2127778e27917fda4aa51caf61b2571fff19939add99220e4654b5841,2023-11-07T03:31:49.833000 CVE-2021-26921,0,0,e2becb808e07b4ea4c8fa92cee994e1c3f58d2f5912d0194987f6ceb43054890,2021-03-22T15:49:44.830000 @@ -172092,7 +172092,7 @@ CVE-2021-26924,0,0,55a4a4769cab429ba3fc8ba31bcae73cb83a99c2d0fbd7c6cbe5ce24f078a CVE-2021-26925,0,0,b7e4416c55967ba561aadf52c042f82c8a15ecb12470df27e179123cc76a6422,2023-11-07T03:31:49.940000 CVE-2021-26926,0,0,9b96bc09bd3ac92fa5f6ddd6b5b9efc9294ebb2e8ed2294be7ffcd4e87617a95,2023-11-07T03:31:50.017000 CVE-2021-26927,0,0,8374de74b34073c3a1d18857b67512b9b1c565cda5477edf891ae9e22a58f885,2023-11-07T03:31:50.107000 -CVE-2021-26928,0,0,8ded9d8edec0ab1f6398185e48b061a4633aa691fcf4e6fbbba459f7b5456569,2024-06-04T19:17:03.527000 +CVE-2021-26928,0,1,135e147845f5812e2ce17e9a284f0822f8509c1be698fbd52cd7665e2091389e,2024-07-03T01:36:38.313000 CVE-2021-26929,0,0,5e60371ad60753408c70253000048bdcea8b945a075b36b35a5da14794bfcc2d,2021-04-19T20:21:24.513000 CVE-2021-26930,0,0,f4a522c19ef1684f71f92b159161f50f320250c5d0176dd1634bca3a35c34c16,2024-03-25T01:15:50.033000 CVE-2021-26931,0,0,37e6298a8caaaae796edf0e37f080d2e86e319ef938062c8901566b2f1af9121,2024-03-25T01:15:50.217000 @@ -173012,9 +173012,9 @@ CVE-2021-28236,0,0,4e5c799d22e43086f6b24f445af444f847b6ffb8b5619b4a45c2c80b1a91f CVE-2021-28237,0,0,6c96fe8231373ce61575901ddfb90aefb075353fae4043387036f047e3f78b46,2021-12-06T19:08:37.600000 CVE-2021-28242,0,0,0011e5be4142b01e4b00c5d1c3b7d81672f4d836802c3bfdb9f9d142afdf7e2c,2022-05-03T16:04:40.443000 CVE-2021-28245,0,0,82e289351fa17d594c4cc8bd026051652448d15d25177220a543b94996cdfba7,2021-04-05T18:04:38.610000 -CVE-2021-28246,0,0,010346bc5fb166dba11b277be9e751d53cb843b54e06406205c2f7a8634fd8fb,2024-06-18T19:15:55.260000 +CVE-2021-28246,0,1,d1734d2a7bb6ef20f8c18d0dadf01f62bc5ca9d8bd05c1a3c0a65e8d4fb4e855,2024-07-03T01:36:39.333000 CVE-2021-28247,0,0,3b3b0af814aeeef960ee4a7c9b04a15defbd8db53a402fc82af33718203091f1,2024-06-04T19:17:03.890000 -CVE-2021-28248,0,0,4debbf3e19781d213c724a0233694aa3dd1425a9ecdf3bd0b2c29556e6b694d2,2024-06-04T19:17:03.980000 +CVE-2021-28248,0,1,ed6074cf1af76f55aadab78e285abd1c2d4d2eb3dd8a2cff211bb65b35bb5913,2024-07-03T01:36:40.460000 CVE-2021-28249,0,0,4fa1b4393c894561d86d2b4b6bc90bbc3ddb7a67cdf2814a039b21562ef1c01f,2024-05-17T01:55:49.290000 CVE-2021-28250,0,0,f9257dddf3ecf9eef0c65257b3d1a224000b1677cc99e1d09db385ffcbc289c7,2024-05-17T01:55:49.383000 CVE-2021-28254,0,0,a540741741560bcc53138cace6dec585c57238e5554e68b7dff94501dd4fd31f,2023-04-28T03:50:18.003000 @@ -174507,7 +174507,7 @@ CVE-2021-3049,0,0,346f6dc518f626b13b82b5bb8a0ca0504b5d02be1c598373dd1cf7a705f72d CVE-2021-30490,0,0,0ce8ed6d16cf36fda6e259887cf82fa1d0adf3419f3b557fb483a54328e5d39c,2022-08-17T20:47:57.200000 CVE-2021-30493,0,0,ec012902dd7b74eb41cda05ba64be1371721248339df7372739a90e8a97aa34d,2021-04-22T15:11:04.050000 CVE-2021-30494,0,0,947734facd5f13b80dc96719ed3e6dcae9ed29494eaa7dfee45f492c91396bdc,2021-04-22T15:12:15.667000 -CVE-2021-30496,0,0,e1818e89c3ed5bbf124797724ab20397be0b2449b840dfb87283fc35ef7b17c7,2024-06-04T19:17:04.460000 +CVE-2021-30496,0,1,58660c16f0f3eb00d477f8207a73bef53eaa546286e287901eec46df7bb13337,2024-07-03T01:36:41.530000 CVE-2021-30497,0,0,e21c62c97a3f287c50b4c1b86c6ff0f89b5ca2f2e9a8d3577ade0de35166e02d,2022-04-13T17:44:42.277000 CVE-2021-30498,0,0,c6250d39980949210a498c9b678f4217a96268e3769072bf7bb0e92c69be414c,2024-04-07T10:15:07.870000 CVE-2021-30499,0,0,c4c2ba7ad25b9ea1bb964220d3e24b1fd08152f83c9fa38e09b1c6936e45e86f,2024-04-07T10:15:08.593000 @@ -175806,8 +175806,8 @@ CVE-2021-31950,0,0,6083519c50a9938ad046d0bfab8973c51b9e76907524b94249f7123a9596c CVE-2021-31951,0,0,4b87722df375dd02fd619c07f08192112e04e4e84f0cfe57d944c1e71c799742,2023-08-01T23:15:13.190000 CVE-2021-31952,0,0,8e9a0350f78cb4edd7d938badddb70a8b305f74f04880782acf49d2e948929ad,2023-08-01T23:15:13.287000 CVE-2021-31953,0,0,649c521f1d81d85c689c56d1606a99c790b46ed41084fc3fcb22d10e319beef7,2023-08-01T23:15:13.377000 -CVE-2021-31954,0,0,271dc5e04b89befc1e4f50e02a51ea5d23c17ac551413ca666af17317cdf8522,2023-08-01T23:15:13.470000 -CVE-2021-31955,0,0,da422cce85804c007bfec791605fe1e841ec7005ff67d88606b56eb1fa198179,2023-08-01T23:15:13.570000 +CVE-2021-31954,0,1,e80b5d49b3744c0eb4eb6e41a2d80a1beefbe874dbf46434283c287384a0f087,2024-07-03T01:36:42.700000 +CVE-2021-31955,0,1,53e588b041c55a76a663b1d517c7d914118e42edd8514467c5788efa258ae831,2024-07-03T01:36:43.470000 CVE-2021-31956,0,0,d4b28657492c93157d62bcd5b048b9d9301d97cdac12c65cdc76277a983bc076,2023-08-08T14:22:24.967000 CVE-2021-31957,0,0,e67aa6639757235ebbe9ee32f8662c5810aedcafa8316bcac6c37803048246a0,2024-05-29T15:15:43.553000 CVE-2021-31958,0,0,1df5ad750c19bf3dd9522238426d63736b56b744be6a17320ce1ed312489c034,2023-08-01T23:15:13.887000 @@ -175824,7 +175824,7 @@ CVE-2021-31967,0,0,3a9bc380911b24cbc029470ecc6965402e1eef912664de2f63c7f3ac6769d CVE-2021-31968,0,0,a444f2b0ad596ecc4a077dae0d7e09612bb0d31ccf6cda709749df75d93f232d,2023-08-01T23:15:14.640000 CVE-2021-31969,0,0,c23bee10b38ad4a17f87ab5c5c01ecaf28efbd74e659d4ff34ffbbb131144d31,2023-08-01T23:15:14.737000 CVE-2021-3197,0,0,504e1bb2cbcfbe3b3a0214c892832bd0a126baa3a4c0081ec26bbe04f3ff0c0d,2023-12-21T18:29:48.660000 -CVE-2021-31970,0,0,a2fa5fc11ba90b8b423dd5a1651857cdd796ddc1ce109089f60f766a6d6a489c,2023-08-01T23:15:14.843000 +CVE-2021-31970,0,1,0fd1b99e8c550b07cdc64cb96d1a2087803d50bb56568a297b442f8e50ac9107,2024-07-03T01:36:44.367000 CVE-2021-31971,0,0,3e04cc0aac4a6c843a0f9e226eeb5c3d38463d112269c0495dd4006998fbc297,2023-12-30T00:15:18.927000 CVE-2021-31972,0,0,249e81721809c647cc1252cac865d6c334358eb53e12c511b82d46baf57a15f3,2023-08-01T23:15:14.990000 CVE-2021-31973,0,0,f14c76c7ed4f43da543c76be7bae51af46e34691fecf696aef91f23c4945612e,2023-08-01T23:15:15.090000 @@ -176704,8 +176704,8 @@ CVE-2021-33141,0,0,3da10fd09067c4e805b35ee6dba49a4cc42965d808471542759ec4a6218aa CVE-2021-33142,0,0,e4c1cb5588de061e79531c415b4266c4a37c33466b6a43746d5f12b784e4c257,2024-05-17T18:36:31.297000 CVE-2021-33143,0,0,f151a42a3e3258f959bb97eef6e9cae0b6ec5a9edc199e5e9c961b82157120a2,2024-05-17T01:57:50.467000 CVE-2021-33144,0,0,e4c1412702ce1e66744905dbed082a548a063dc1a541dea63c16b7757b481b85,2024-05-17T01:57:50.507000 -CVE-2021-33145,0,0,64fd1ff2c55aad4ffd04bdadc943fbb08ba6584191a207a9e58a05c74456025e,2024-05-17T18:36:31.297000 -CVE-2021-33146,0,0,859caaacb51d0bcc055809d0321d6633449324e3601017f82e46f74f4529d491,2024-05-17T18:36:31.297000 +CVE-2021-33145,0,1,fa8c9843e7b9fcca7c562a7add034c5c8e68695955e92bb0c378acd44a9f83dd,2024-07-03T01:36:45.387000 +CVE-2021-33146,0,1,1b10b1154ea12dfba2ef43c2271cc4baf012ccc3e3f0df488ec84bb305233130,2024-07-03T01:36:46.133000 CVE-2021-33147,0,0,57354ef4bd70b821fbb2a79791566fe2d751ac5d5a290ace335b48279922a6e4,2022-02-15T16:51:32.753000 CVE-2021-33148,0,0,30ac282827e2798495c25f9fd4306fbb25357880eaca446beb5ac81a22e8ef15,2024-05-17T01:57:50.630000 CVE-2021-33149,0,0,cd66588fc37f759ac8036ed76d11a30809cfa8765427b545706872b99e702a6d,2022-10-26T22:48:29.373000 @@ -176721,7 +176721,7 @@ CVE-2021-33157,0,0,2047921840cef2b00b60cfbd0966529b2bc1c6d94447595668ccb0da70067 CVE-2021-33158,0,0,799d26f8647af5ffb3a9c61ab38419d0434e114f7c20156e8c22efd8211797d5,2024-05-17T18:36:31.297000 CVE-2021-33159,0,0,0383115ca416c3b8d0fb9b8673f03e833c4978aa275450a43c7e15fc730d7b0d,2023-05-22T15:27:24.463000 CVE-2021-33160,0,0,67702ec12ee046471d9ce49d8311526fc7bea9a043e1d476853a5fdec9221448,2024-05-17T01:57:51.020000 -CVE-2021-33161,0,0,80cbe3694c6f64d0cc6319a8400a36d027d4989de31cb4e77845853a45a28e8a,2024-05-17T18:36:31.297000 +CVE-2021-33161,0,1,a77024a69037bc23b25f320b1c43a23c22e20df88d144fe5f4a4729837b91cfd,2024-07-03T01:36:47.010000 CVE-2021-33162,0,0,360dcb4685181f7fa2dfa5d71c7ddd974907b344e2ac32da199ecb312a109390,2024-05-17T18:36:31.297000 CVE-2021-33163,0,0,cc937dde891593672047a764e95fe775f3b5ac6a96698dc735cb38c781d74a3a,2024-05-17T01:57:51.117000 CVE-2021-33164,0,0,cadfa2577d8706b044d88825166867b5cfd9047bb2fc6288db277ba0a2968eff,2022-11-17T13:53:14.713000 @@ -178135,7 +178135,7 @@ CVE-2021-3498,0,0,9db04db7fa73b3a1d604a88a21add474c43d170fe2a85578e0a339a540e923 CVE-2021-34980,0,0,695d450ac3010085055af6f4c8015c9a5a99f4cbd53d27536267deac44ef250c,2022-01-19T20:09:51.213000 CVE-2021-34981,0,0,a86c7a2b8999d98fb3cff07db08d72432f44527c148646cacd0001e7ee781074,2024-05-08T13:15:00.690000 CVE-2021-34982,0,0,4a2b26920c2e3bf27a87a0154230c8ea58f21f56e8aaaddf18f7211819a6d859,2024-05-08T13:15:00.690000 -CVE-2021-34983,0,0,725f20735fbd875cf89d00c7e1722de3066f0e1ade7f4d5934ee13a34ed2f180,2024-05-08T13:15:00.690000 +CVE-2021-34983,0,1,f80c83722ee9cd915ef57178cfbbc7d7c420eb0219cb1c53255b5a5b6b93dfa5,2024-07-03T01:36:50.850000 CVE-2021-34984,0,0,ed1596c3833443a873e7d02bebcfed85bd0444d4a8d914b244eb5c80f1614178,2022-01-20T18:19:58.510000 CVE-2021-34985,0,0,4b3f317c382d7c1092261fe5dc1b7226e47650b7fb394ae8588db8e05c896d21,2022-01-20T18:20:32.257000 CVE-2021-34986,0,0,24560d4aa489c4308ce32c4030da8089bd5fc75cf6cb58858d651dbb454ae7ab,2022-07-22T14:01:25.817000 @@ -178500,7 +178500,7 @@ CVE-2021-35554,0,0,3ca9f094ff3eef00b454a55c71be19e5dcee7b5f2212ae630996e5d1ee31c CVE-2021-35556,0,0,08b749ef20463efe34603e042681a87b616272c73daf05a6e5629a454630eed3,2024-06-21T19:15:18.310000 CVE-2021-35557,0,0,816fbd94394a1633d784e9a02fe05f438f2df4b3bad4d62d9e4a83c8e3b5c4e4,2021-10-25T16:12:49.827000 CVE-2021-35558,0,0,81a6b8dc32a265b854803d242b282113312ee51e74b221c6dbe8374ce9485377,2021-10-25T15:29:59.433000 -CVE-2021-35559,0,0,36372358d2c96672e666a847dc706a2a3d693bf7510a96f04273631b0cfa3f41,2024-06-21T19:15:18.470000 +CVE-2021-35559,0,1,64f7de352874fca4aee1fde8b6b101dd69a14760da098310a87ca87d60e69520,2024-07-03T01:36:51.900000 CVE-2021-3556,0,0,64ddf8f47dcde2902fe38b63497bd430264ebcf3dcb103f47bf340a3e93b4045,2023-11-07T03:38:06.500000 CVE-2021-35560,0,0,938d4b43fa820a94c1d66c81e297966ffeeacbef41d8accd0ed53c73e52ca4c0,2024-06-21T19:15:18.643000 CVE-2021-35561,0,0,16ffdb623e4ffdda9223d3afb3b31cb10a0baba10fe8192f4dc2ee76dee806b3,2023-11-07T03:36:34.780000 @@ -178803,7 +178803,7 @@ CVE-2021-36084,0,0,1943efc4f356b9aee63e2eb0ed82127d1fa17fe6cbdfbc137cee1dfc9d566 CVE-2021-36085,0,0,8b0b318340c0cfa9377b40b05889171387eef025025d4786abcdf87b01d4dac7,2023-11-07T03:36:42.577000 CVE-2021-36086,0,0,7a03bdc520004ea7495646f8abc513cf5e257dc64059a1a188df6af204d9818d,2023-11-07T03:36:42.637000 CVE-2021-36087,0,0,1f1eb59215453aeafe92c770fc46207bdcbf6ff56c352be49e57008075153005,2023-11-07T03:36:42.693000 -CVE-2021-36088,0,0,7bb6861f45adb90d9f6a84c8c76fb5d6635b03cb3ea082b13cc92a5faa4b6c3a,2024-05-23T16:15:08.583000 +CVE-2021-36088,0,1,97aaa4399e23b860c7d141e35cbc93e43f35e2cabf903f75c19c82d0292e8051,2024-07-03T01:36:52.800000 CVE-2021-36089,0,0,640f9942350bea8f21ae3b71210f665b377699c21a1d3083aeb271653d318cd8,2021-07-06T21:04:08.783000 CVE-2021-3609,0,0,e0ed8226661b0941186f50d52d52ac4837f1545f3698081026c3faebf3817dc4,2023-08-11T19:44:29.540000 CVE-2021-36090,0,0,14f14d2c78a07fa46898d109e1cad7365fec7e87d402ec6b9d012fd7f8704552,2023-11-07T03:36:42.777000 @@ -179015,7 +179015,7 @@ CVE-2021-36363,0,0,9c7e946b0e593bfa10d58c5987c9dc6c01780c4b9923cc103d4cb128f35e8 CVE-2021-36364,0,0,fb78ec70a79b4b1f410775a640c128add1c96a5037bda837e1230a0192056792,2021-10-04T14:49:01.790000 CVE-2021-36365,0,0,f8116594f76dcea6ed946d84fa8dac4c4054d489b534fc9a820f5a4fcefd8714,2021-10-01T14:08:13.040000 CVE-2021-36366,0,0,14f747bcd9faacaf8ccce43b232b9e72330e1aace70178013b0c6db806eba8ed,2021-10-04T14:49:40.537000 -CVE-2021-36367,0,0,ff391d4b34986da4cb62bee08fa043e8ad532ed63278bfb915951394dbe40d39,2024-04-25T22:15:07.883000 +CVE-2021-36367,0,1,0c437d1a92b028b783c1404735df08f0b56561aa800e259cd9084dd5343a5dcf,2024-07-03T01:36:53.610000 CVE-2021-36368,0,0,a5df8936c71246f5bb821a6ec6092ad596e2e597a2ef0e2ecb24b5c64cd76320,2024-05-17T01:58:53.237000 CVE-2021-36369,0,0,5c39b9c95cf0ff043116161777344c2dc7dc4d316a11790eec9bf55602f8e2ed,2023-01-20T13:31:40.710000 CVE-2021-3637,0,0,b1fd2f79313dc74a8787be58177fc25c7ac7d38f797058033b26f7211de6750c,2021-07-13T17:56:24.283000 @@ -179028,13 +179028,13 @@ CVE-2021-36376,0,0,6ea9989cb7aae95ea4b74fb4a339b3f9eb2d635138b6fe8f237a6147a6ad7 CVE-2021-36377,0,0,1158342462d76ee7bb84cafa9ecbfb93c350781a38425a55422e0f2c47212be8,2023-11-07T03:36:45.603000 CVE-2021-36379,0,0,42363e23407c555143ec4a28d26c0d8126b787648e1edf57744934ae5fed7fb6,2023-11-07T03:36:45.670000 CVE-2021-3638,0,0,6452193313ca7acd41690530e88dbd7c21aef6ce5f75c7b4036781969bc8049a,2023-02-23T20:23:21.053000 -CVE-2021-36380,0,0,8eaf1c2e7389361e8817cc5e3165a73e6fa9206fa9a5f286035385e52028457a,2024-03-06T02:00:02.077000 +CVE-2021-36380,0,1,c887aabb723b2c8587cdd130900fb23a21a37490a03afc721ac7e0a56c5c252a,2024-07-03T01:36:54.480000 CVE-2021-36381,0,0,45e999eea09634f1fd06952c5a0018e8dbe9eca11695531b1aebc6179b92e9e5,2021-07-14T19:45:34.997000 CVE-2021-36382,0,0,c8ff1399fa23f25dff8ff9c0e474a069dd23b91b993bceb9a6a94e1e85304204,2022-07-12T17:42:04.277000 CVE-2021-36383,0,0,3eaaf900c2ccce33c848a9998f0ad22cf238a3beeb13bdd9019aad12e498ffb5,2022-07-12T17:42:04.277000 CVE-2021-36385,0,0,c7e99a8699434a382344be24f88195d53db576a7ae370b785888562c0512f22d,2021-08-31T01:59:25.897000 CVE-2021-36386,0,0,1931f1511ec60b5b8870d09ebdbc9a30c4a9191f00cb871b4258143140e70103,2023-11-07T03:36:45.747000 -CVE-2021-36387,0,0,842ca87b344f3f90525307a9b4c6aab90ca2aa7850675be852b11e8ced259016,2024-05-14T21:15:11.260000 +CVE-2021-36387,0,1,986c85714f1d3e79d698156de97e0d3c23689e2518439a32cc1c2bf5b74e4d18,2024-07-03T01:36:55.290000 CVE-2021-36388,0,0,6def676ea066346c61d9ba5756a2f18b7c73ae63bc3a85990c44ec10d5493415,2024-05-14T20:15:12.353000 CVE-2021-36389,0,0,ebac8c8f66f6f704908f43736fc7ee3ab0c8df07d5596f0271a4b319567c822d,2024-05-14T20:15:13.290000 CVE-2021-3639,0,0,1739d2d02c3e9f49d382137f96fb66698616622f3caabbf1fd195b57e647e69f,2023-02-12T23:41:41.270000 @@ -180218,7 +180218,7 @@ CVE-2021-37997,0,0,9d3e3fbd1b196dca12ff255a95d8cb37b9efc66b29ffb222185e9eee9018c CVE-2021-37998,0,0,d8d4d691edd934e31d47f9ae49a9c7d1af2eed5033c380952c8fe30ea3f28756,2023-11-07T03:37:07.433000 CVE-2021-37999,0,0,1be1701d51ad2821e449a2518aca569200947e16584809bda604c11f067bbd29,2023-11-07T03:37:07.510000 CVE-2021-3800,0,0,343139414231f8fe58af1f06144762ff09ee3011cd885c612762d6418643b1a0,2023-04-25T15:42:47.950000 -CVE-2021-38000,0,0,af36e13830f058eb3bcc3fcea39bd91518a60f6ce3677f7a16de842410974a30,2024-02-15T02:00:01.650000 +CVE-2021-38000,0,1,a3604e5a08a3f5a5decd8f7643831caadcc929d25fc124e438ab8fe3fa9d556e,2024-07-03T01:36:56.643000 CVE-2021-38001,0,0,c7ae98917628c2f28a2e374c8a35172319f2d09871dd57812991e55d7e90e22f,2023-11-07T03:37:07.727000 CVE-2021-38002,0,0,49ba5cd2fdc9382f8390ea116bf250a2c80ea2d2cf533aa54eef0c83b7f10fa1,2023-11-07T03:37:07.790000 CVE-2021-38003,0,0,488156580497427de3316ee56eee6f30f75052c68a26356d79e83895216a1ac2,2023-11-07T03:37:07.900000 @@ -182333,7 +182333,7 @@ CVE-2021-4065,0,0,d1c2dee1cceec2a47ed46ae13670cb804e448d31b858772090684213a0e3e6 CVE-2021-40650,0,0,da2cf6be4a7856150d7d6a37a5bd557704b5042eb34774dc1111b9c733840443,2022-06-22T20:28:50.433000 CVE-2021-40651,0,0,d0d1e150724603ddbc53e71d2e422eb56717bc29db07af2c6c7fd1f081acea31,2021-10-07T15:33:47.493000 CVE-2021-40654,0,0,dd92544ffa979c86aeb15a276793324b64da9bf8e4fa374d7f3aae66aa3c5021,2022-07-12T17:42:04.277000 -CVE-2021-40655,0,0,0e657042524c277c7b599648eaa319d3a7f3a60842f5b4a96a3c7da501eca9ab,2024-05-18T01:00:01.417000 +CVE-2021-40655,0,1,4383421c5cb49581eaeb549e2240d2364219233b459cf404dbafbd647540b315,2024-07-03T01:36:58.373000 CVE-2021-40656,0,0,772d17f6c68174c6efe9ea7b2c2c3d0660b5c0daea6c415882fd90faa9cc3920,2022-04-14T17:12:14.893000 CVE-2021-40658,0,0,1a6cef94fbdf0d4ce12fec2dbc5bfbe2f21db2c8b1a373445d6312fbc728e1d9,2023-08-08T14:21:49.707000 CVE-2021-4066,0,0,264208dc008eaf0ff726ad3e5039031cfc74c0c015a70d61b6acc58a0317cf26,2023-11-07T03:40:09.250000 @@ -182941,7 +182941,7 @@ CVE-2021-41340,0,0,e5de8d13db3f0f5428a47ef9d4f3ef339f3a9bb088c8c0d4b2b16d3eefbd3 CVE-2021-41342,0,0,f313edff84a756cc29e77dfaebfea6401a779a2c9f1a3ab18651403cece4a595,2023-12-28T19:15:13.903000 CVE-2021-41343,0,0,c6ed1f3a4f351a067142481c385b2324a89ab08efa26350fb9f6995e79f9b792,2023-08-01T23:15:24.397000 CVE-2021-41344,0,0,d158d99e63cb1986b1b10940ca097baa5f23437ff0a1781673950fc1ff9d90c2,2023-08-01T23:15:24.577000 -CVE-2021-41345,0,0,7afbed5119d2268f8e9fba092af1ee60d61e3a29990dd3c7535e5a5d8728bf6f,2023-08-01T23:15:24.847000 +CVE-2021-41345,0,1,0595afc1b096b215013abfd69418bd77891d7283ea8074a161dd98264085608a,2024-07-03T01:36:59.773000 CVE-2021-41346,0,0,84209c1a0a5c2b3ff2d10f5cca251b1e8805aed671abed9fd8d1bc94cc40a4e8,2023-08-01T23:15:25.023000 CVE-2021-41347,0,0,b8c81ec9fbe4a15c84fca5da28b0b9494a324bbfd32206dd3cf2712b8c6786f4,2023-08-01T23:15:25.287000 CVE-2021-41348,0,0,d30bf29de07a1c7ae88b01ad4c8be1962531aecda34fe806d8de2ae88a1b7127,2023-08-01T23:15:25.577000 @@ -183205,7 +183205,7 @@ CVE-2021-41728,0,0,a3789485638c88d2400450abddfc232076a7dfa934f9a92b1e7f558b651e7 CVE-2021-41729,0,0,cff3f07d47889ab028d200a74ff5c5ce12bb4f514327a69ebef09c138c39447f,2021-10-08T03:19:02.667000 CVE-2021-4173,0,0,8fd0b0247facc31d3bbc27e1e0ee4a4f049922d7754b9864c43aa27019a6ce60,2023-11-07T03:40:18.087000 CVE-2021-41731,0,0,8aa02496d90c865b3ecc8077018b5c25d8db67c63dda87ef9a3c1e52c855a227,2022-09-20T18:21:52.703000 -CVE-2021-41732,0,0,2a83b1574c49bdd37a48d2ce37954b2ee64b1b16d0fcdfcbb4f723b61737094c,2024-06-04T19:17:06.807000 +CVE-2021-41732,0,1,cc8708fe533967116104e123363e66001fe681b603f3faaa95e4641e472c1631,2024-07-03T01:37:00.860000 CVE-2021-41733,0,0,ff581ebd5cf65f5415271d4f0165ae2407cf552807e2e54f5698089fce6066cf,2021-11-09T19:59:21.390000 CVE-2021-41736,0,0,03c05ea87be190c9b32f7f1c1562a04df5649899a6c4690fe19cee4727a806f5,2022-03-28T20:52:06.847000 CVE-2021-41738,0,0,b31dd907761d044b7768b4c22b2c7b7d1df9effc46b1626fbac2101f7c9b2f5a,2023-11-07T03:38:59.843000 @@ -183236,7 +183236,7 @@ CVE-2021-41771,0,0,69ab09373dc6c960f67a1679aa671a561e8dea989ba5f0cf444812ebac6cf CVE-2021-41772,0,0,9f417c1c813b1ee8136b01e2ae0ce30a9fde54cc892e5902702e6a7f0dba059a,2023-11-07T03:39:00.470000 CVE-2021-41773,0,0,825529a2015c160c0b7d9bab558b4712dba1a6c46aae282927a021796549a7a8,2023-11-07T03:39:00.550000 CVE-2021-4178,0,0,8c5898c38215a01aa38e42397ceda4c7b55c507cd171afb838d25e681a03081a,2022-10-04T17:55:01.783000 -CVE-2021-41780,0,0,542b3d1f927422bd9c58224334c3a78318b641b82ea4c64c7413610c908c9178,2022-09-02T13:04:32.863000 +CVE-2021-41780,0,1,258a9638b33a433252dee0fdedd3d524593db2f532009665bf1792fbc6fe5099,2024-07-03T01:37:01.927000 CVE-2021-41781,0,0,4d99965fc3f918f10b14de7a1e0acf9f1fe5d52e67ea7d08ccc0253009941754,2022-09-02T13:17:21.697000 CVE-2021-41782,0,0,d06da8ec99c4f1d8a6d78b974ddb04c6e27bc43fe2d48d770cf00f0373424781,2022-09-02T13:18:50.193000 CVE-2021-41783,0,0,ee4bdf2b6fb17e7a3745ed63d14834d830354355881c583c9ff75c274ceceee2,2022-09-02T12:54:28.320000 @@ -185128,7 +185128,7 @@ CVE-2021-44396,0,0,7c0ba48df549e25e005295bbe627041950189a573d8758add2ca397b502be CVE-2021-44397,0,0,aeede1d53bd2f94396aba7592014a0f445309317bb79c0c7fdefa09f8e68a5cc,2022-10-25T17:40:14.183000 CVE-2021-44398,0,0,555e554f6904e149f92b31d145cec3fd8d8d4f433c4c7cb018d9ef385828e3b5,2022-10-25T17:40:21.837000 CVE-2021-44399,0,0,8351d48ef470fa1034a9534b3958230b5279d3245a336ecc1fca4eba670b40e9,2022-10-25T17:40:29.917000 -CVE-2021-4440,0,0,791c73d2ad1cf6812f06a21bec04ead274157533938c2cb92b6a56f8973e37ec,2024-06-25T18:50:42.040000 +CVE-2021-4440,0,1,1cc601a0d6d7cce892d500d0c755a441444f3fafdfb5d5d8299bb852442c5c49,2024-07-03T01:38:13.980000 CVE-2021-44400,0,0,4bf726c514ec568544515b2748f948e99c81db36c2c66f97b411537a96b3cae0,2022-10-25T17:40:36.487000 CVE-2021-44401,0,0,68d7d93d9e3f406a7ab164303254465fd18dc424fd00d011aee0e99433fcfe2c,2022-10-25T17:40:42.937000 CVE-2021-44402,0,0,145a71ca0f99e2e160a739601e598a913b8350298bfa2d402e99094a1715380d,2022-10-25T17:40:50.610000 @@ -185244,12 +185244,12 @@ CVE-2021-44525,0,0,6b820d6919c2d01943d46896ef5d6de9c8c53a79d403084c5f83cd6fb10a4 CVE-2021-44526,0,0,4be7addced5f72bd938dfe4bd5492d583504564efebf82406f0d9921c5cfc79e,2022-07-12T17:42:04.277000 CVE-2021-44527,0,0,98b3636af3a764d7983306b650bb91fa37d3b37d05975e372f8078c17f77c2ca,2021-12-07T18:10:20.033000 CVE-2021-44528,0,0,5a8247318a415d998cb5e2d939fb63ae0febaa2fed8b5a9926e9c8471a8f4a25,2024-02-08T10:15:08.973000 -CVE-2021-44529,0,0,1e37306ada7d0a34eec244a30155dee123d0a412b949e4a32364c6b0fe1b9172,2024-03-26T01:00:02.003000 +CVE-2021-44529,0,1,0176eed7be92d13995ef043a69c09fc75b3de8c13cbc8c93fe5cfefc1fcc39c0,2024-07-03T01:37:04.553000 CVE-2021-44530,0,0,3f15c3b556169eb703ccfc6a06993cf774ed0372e7c3519d18d62ee61b373c60,2022-08-09T00:51:27.147000 CVE-2021-44531,0,0,22ecb4a37716a1bf13ecdc1523488af8d10da410c337855b860416b5b01f58f9,2022-10-05T13:56:24.620000 CVE-2021-44532,0,0,7b5f8e61434a78460bfc37ba9d479a188a39d971b9fd7242c8d12e0bad426243,2022-10-05T14:00:39.580000 CVE-2021-44533,0,0,8f37b375f097f3ed857ec0e06e863398c8b05412951caf6897b1620ae5918b20,2022-10-06T02:28:19.260000 -CVE-2021-44534,0,0,8783d1bda8855e9460b9a05b54fc430e2479906c547465eebe65dd92af66ad9e,2024-05-31T19:14:47.793000 +CVE-2021-44534,0,1,c84f5084dcdea8544eca5eabd8d7ce1047de900b56a3fb3dcc2bdc8db73b0bd7,2024-07-03T01:37:04.873000 CVE-2021-44537,0,0,98221955cc68c6f1f55c32aeedda94c05474da3662de0ae882a622ac4c426cc3,2023-11-07T03:39:39.547000 CVE-2021-44538,0,0,71f8964aa4274805978905df27b61842b00bfac427d5404f43e606aa91713840,2023-08-08T14:22:24.967000 CVE-2021-44540,0,0,8fd25b5ed3868cf9651982d0cbc8ed01ac5a03b91ac14ac45aa4451192fc3753,2023-11-07T03:39:39.620000 @@ -185972,7 +185972,7 @@ CVE-2021-45780,0,0,c2acc4e8ea62851f02f413f686106c08db88cc5e74d12bbcfb54ecec84421 CVE-2021-45781,0,0,71fc3abd11a86d35826ebd5425e72352a00780701dbe1bdafd5e49f93809c748,2023-11-07T03:39:55.377000 CVE-2021-45782,0,0,5767e61d831de627e0208b575115f6cc8e1083b2a6d45ca28b912ed2c19daf5c,2023-11-07T03:39:55.407000 CVE-2021-45783,0,0,1f04495fd021672f1e434e8f202fca396c95781d91a0ef836832d5708c2f7e39,2022-05-13T15:28:41.320000 -CVE-2021-45785,0,0,7dfa12877a794b200b6b707380f1d6fb2722fce991259bb278c52a82acf7e3fa,2024-06-26T17:42:23.627000 +CVE-2021-45785,0,1,0790804ca91aa7565386021c142c52aee1767eea753cfb3861ae0938a4cb9d2d,2024-07-03T01:37:05.873000 CVE-2021-45786,0,0,507c3725d8722cb8b1acbbebd8f8ed42cc62fb5aeded56d3509c1990522e5514,2022-03-22T17:13:51.327000 CVE-2021-45787,0,0,eb6a4144390b6a06bbb5accdca97c8bd9dbe9b8c3cf218c6a8e23ec5c725008b,2022-03-22T17:11:54.300000 CVE-2021-45788,0,0,725b65b79eece406eae184685956d92a26ade5e0d647ecf1c40d4d5dc9028aaa,2022-09-30T16:52:12.237000 @@ -187046,19 +187046,19 @@ CVE-2021-47226,0,0,dfff3ac9224a40a84fbf83ac1f899cbe607393c70b0fbb42696731b830bfe CVE-2021-47227,0,0,bf1f6724458af60a80f55e8b0c660742d5a99476825b2411dc7b10ba592833dc,2024-05-21T16:54:26.047000 CVE-2021-47228,0,0,d48ec2372953f698344a964b2854c22c0c2b3b4b3683e67379a0cb1a8ae1b604,2024-05-21T16:54:26.047000 CVE-2021-47229,0,0,673729027f70ec70ccec01160608d9b980fe5694b7d6864f8148ab1d2910b755,2024-05-21T16:54:26.047000 -CVE-2021-47230,0,0,f03655af1d70bb01fc4e0fe405c0e767affc0be1df30a89406cce40da9001255,2024-05-21T16:54:26.047000 +CVE-2021-47230,0,1,e93bfe980140e197128aeec8d8e071a295e8048bcae174dc11c0f6f8b98f2b67,2024-07-03T01:37:24.797000 CVE-2021-47231,0,0,5bd20e846b4ae9f7c09498f4244df8fd3f4a7278eca17a511816838bbf218e1c,2024-05-21T16:54:26.047000 -CVE-2021-47232,0,0,6cd2d58cf3c9119e7f603f1d9a9174a8e93a3ee55a46f26d379d8cc7dc3d73f5,2024-05-21T16:54:26.047000 +CVE-2021-47232,0,1,815758cd4f06e69d867d33b6931ac610aa8caffc0e8fb7075a2a9e75b5c2f775,2024-07-03T01:37:25.720000 CVE-2021-47233,0,0,15379da1b0cc3479acf24657c0dcec4b5422c55e1190c39e2fc2adcf95660e28,2024-05-21T16:54:26.047000 CVE-2021-47234,0,0,230b49dc9bf3f3acdcfe7e4098687f92d7286fb76c190d76f26169ab3a857766,2024-05-21T16:54:26.047000 CVE-2021-47235,0,0,1e83e084706d4a517910bdeb0dcbd1b4c7a8e2e90e23ac8b3b5cb07454958039,2024-05-21T16:54:26.047000 CVE-2021-47236,0,0,3d9f91b8210616b4e0f69493adde5ce7501e7f32d1be4368225a7fb3a6ea136a,2024-05-21T16:54:26.047000 CVE-2021-47237,0,0,e014c700239684b4a13b1638f6c3209c77c4843714b2e15060767c3d6d1aa5b7,2024-05-21T16:54:26.047000 -CVE-2021-47238,0,0,d5e8b558115e6c9efb61adbcdf042f493d269f01fc139d4d57fdd96f78898ab9,2024-05-21T16:54:26.047000 +CVE-2021-47238,0,1,3b5749e66c4a66ce2e47c8ef5276271531a3af5b310ad862877c7f81486d1043,2024-07-03T01:37:26.920000 CVE-2021-47239,0,0,ce84c18ea31d0ab0a744f18fa6468b5c275a6126c345de40ea10bc0c9ef1512f,2024-05-21T16:54:26.047000 CVE-2021-47240,0,0,c908e42d41ddb74ebfabf665149eeda7ad5350206d9381261030bbec24bb393a,2024-05-21T16:54:26.047000 -CVE-2021-47241,0,0,9e139a9fa8d89b035c006e5474091d0b82131687c0652e1f59fef3b221e60fc4,2024-05-21T16:54:26.047000 -CVE-2021-47242,0,0,9c9a5a94a18f55b664dc42639869f34c42a71ecd397c54ac4a335c50835ea900,2024-05-21T16:54:26.047000 +CVE-2021-47241,0,1,2764d87dbbdd945bdac610894ac6ec0ada98f0ab6455df88dafa8f522308ff27,2024-07-03T01:37:27.850000 +CVE-2021-47242,0,1,60a4600e7db813cddf859854f1e469858cbbdfee61f04b28efff60c5ccb535c8,2024-07-03T01:37:28.667000 CVE-2021-47243,0,0,d8ccb729b2c6d36fa70626aac46a95b79fb678f1a0becdc51ea04f82d34d9c39,2024-05-21T16:54:26.047000 CVE-2021-47244,0,0,862a44f59bca0b52c8ba78c02a97b1e91d96611d758b9d59455d6ffc3702b8ba,2024-05-21T16:54:26.047000 CVE-2021-47245,0,0,5afc4c1705ee784bd6d51252482d4d6e4343e98d07c4ba22248c5016340461e1,2024-05-21T16:54:26.047000 @@ -187075,7 +187075,7 @@ CVE-2021-47255,0,0,bce11706dcb5c1f410908baa3f7755eae932a6445ee4b6c0ca9a31d83ba30 CVE-2021-47256,0,0,8fc72f0773c1cfad3659a4caaf8d09ce84e03d304cdb03583bd7264c7478c213,2024-05-21T16:54:26.047000 CVE-2021-47257,0,0,2f92d930263afa538453fe93781374bbaea1ee906a03567456cc5a3243cd3e68,2024-05-21T16:54:26.047000 CVE-2021-47258,0,0,a7074f40c57891610cce5dbf2e5a676cb53fe7438fa4dace7e1fab48abc5eca6,2024-05-21T16:54:26.047000 -CVE-2021-47259,0,0,6500f928b2cb8d1e0bfd2b9826ec67ee58c00e59105e0e1d3a6407667c0f287e,2024-05-21T16:54:26.047000 +CVE-2021-47259,0,1,b94b7bd51459fdf369e8f3e705a39196eb98f20596c79a7966fbe7cd84498907,2024-07-03T01:37:30.730000 CVE-2021-47260,0,0,6145603297b5d5ccbe986e33d375d41b5ef0ab7450ec772dfabd33375586aaba,2024-05-21T16:54:26.047000 CVE-2021-47261,0,0,f2a2bd8d3f73be143675d5448b64b49bb9f36be040ae47cdda0fe44933674c0a,2024-05-21T16:54:26.047000 CVE-2021-47262,0,0,8f00c4f74f39492cae03cb7be3c05e766856c640973a57bb1d563234ef8c909c,2024-05-21T16:54:26.047000 @@ -187090,7 +187090,7 @@ CVE-2021-47270,0,0,80bde03174d58f604b378825626f187ac4718b72879ab08c81588cd54cf89 CVE-2021-47271,0,0,9c844b92bc394d22804fb32c956b70577751c38e0c1641b8fd1a852707556779,2024-05-21T16:54:26.047000 CVE-2021-47272,0,0,b61b258a5bd83b591b5c8af5dcdb8102f177c3fb12702c52c65b3b57d712f28d,2024-05-21T16:54:26.047000 CVE-2021-47273,0,0,aebaaa0ac27d96654fa6ee79cc158afc75cd4ad557c9c5608468def7e6d35dcf,2024-05-21T16:54:26.047000 -CVE-2021-47274,0,0,91221bc727e215402dfaebd31338c97bf1d542254ef8ecba308c4af344e12a71,2024-05-21T16:54:26.047000 +CVE-2021-47274,0,1,5e6b9f71d6b39e786c1e9484a9a5c1020a127cc111bfd1e3867b25c1d707414c,2024-07-03T01:37:32.447000 CVE-2021-47275,0,0,3bc679da1b883a9609fd05ead135185a06b8d4786c43c60a0d05b5924d388c45,2024-05-21T16:54:26.047000 CVE-2021-47276,0,0,44b76a47c7d9a2b7fa6ddc56d4c04c3b0c0449accad78f3c086ba0d0d1732460,2024-05-21T16:54:26.047000 CVE-2021-47277,0,0,9afe3ee7a74aef283083def5a86fd9b3f2b542588fa2c533458a1d50693270c3,2024-05-21T16:54:26.047000 @@ -187100,7 +187100,7 @@ CVE-2021-47280,0,0,cc54728787d3b6ce4b457d4a5b2b5120747429d79e47d276990656d98e3ae CVE-2021-47281,0,0,593aea6f832a6c532eeb85f4c4c58c4c07715365e7ef8e62c7d3ce5ea69f76f8,2024-05-21T16:54:26.047000 CVE-2021-47282,0,0,62215ebff03dbff1784bc17c7de1c05aee2b7455f65ee32fbef82e14b765e992,2024-05-21T16:54:26.047000 CVE-2021-47283,0,0,0ff0fec851130d9f4c124e66410697fa89f2725fd5fbd9a87a792eabb7ae2619,2024-05-21T16:54:26.047000 -CVE-2021-47284,0,0,6803845eb42c6e2028dde34255810396c0f218a68b17abd67007b27796d3dcd1,2024-05-21T16:54:26.047000 +CVE-2021-47284,0,1,ec827ed0cabfe70b5d0ef63cd6c2c3e8abb482399cd323f8dddc1f3e08f33d60,2024-07-03T01:37:33.787000 CVE-2021-47285,0,0,996ea18361ebd04fd45b1694fe1d9404484a2740395fd8ca2c06e472a7098e5f,2024-07-02T20:15:04.637000 CVE-2021-47286,0,0,b15e11781385fad96e49b76e139430d572cbbf1b8011cb250a6bdc2187552ec2,2024-05-21T16:54:26.047000 CVE-2021-47287,0,0,4414a4e5dfd31932f41a2b5e5bf416a5a7bb5ecb095d728c8b74b53d52aa09c1,2024-05-21T16:54:26.047000 @@ -187111,7 +187111,7 @@ CVE-2021-47291,0,0,0f09361065204eaf98af1a7ec3102f09cd5053efaf21452787b53341f12b2 CVE-2021-47292,0,0,884b26d9f4d0c8371412774628022356dc3ca0e6345b551899796164a53d0ca8,2024-05-21T16:54:26.047000 CVE-2021-47293,0,0,84909c003f4783fd8104b631c24e0ed3b6a3aa68cd954d7e57a53efa52fd05b2,2024-05-21T16:54:26.047000 CVE-2021-47294,0,0,e32e19bf4d5e397c2b28fb7e298970fe72354b4466592457edd00a04af2eaac4,2024-05-21T16:54:26.047000 -CVE-2021-47295,0,0,d4bb781a9c7e101bd24c9038c7c6043f1f0a5371cf3d0cbd9bec923627372f11,2024-05-21T16:54:26.047000 +CVE-2021-47295,0,1,013087c79c3f331d9bb419ea80648c1fa718978367791e83c9506e16cd9f49b1,2024-07-03T01:37:35.127000 CVE-2021-47296,0,0,80747d122807638681cd78223e1f1d9c65f79d7f7a7fa0dee0b4d460825e4195,2024-05-21T16:54:26.047000 CVE-2021-47297,0,0,055b83978b758fb05ccea8ed283eb453303a0fc72e0e958fe624ac4723725a12,2024-05-21T16:54:26.047000 CVE-2021-47298,0,0,601d6d581ba9b174d93330c9f71ce461d6051ac51582d134303f94766622fd8c,2024-05-21T16:54:26.047000 @@ -187129,7 +187129,7 @@ CVE-2021-47309,0,0,d5ec391627f024718de98698e635f107d6d9b623709437e5dce76601f922b CVE-2021-47310,0,0,4338f2e27a9d1bd793e55bde33f8aad31a68068301274ddd13e3400401484b8a,2024-05-21T16:54:26.047000 CVE-2021-47311,0,0,059c98e9fdcc37e440474c8e9821aa3d69b3d2b23b4f838e3850243d86db350c,2024-05-21T16:54:26.047000 CVE-2021-47312,0,0,aa0ede717e303fa4324ffafae41ec98de36567130568b52e5020f2201265c24b,2024-05-21T16:54:26.047000 -CVE-2021-47313,0,0,03be55df07f5895e40f932b208bdbec113903ae2e514886755116a8aaeb2812b,2024-05-21T16:54:26.047000 +CVE-2021-47313,0,1,f899276267ff4ce19db080468438f4559d2826fb2a0a89d3d3d9f6eb20a3c33b,2024-07-03T01:37:36.997000 CVE-2021-47314,0,0,01849966294520f593862058f8d85fdb0c23c85e9c4fe391213aedb8c7a2857a,2024-05-21T16:54:26.047000 CVE-2021-47315,0,0,b0ed028c87560ee4efb67f205dc89d17424d8d4048bb835b3d65a798b7e5371a,2024-05-21T16:54:26.047000 CVE-2021-47316,0,0,5deb7a57ca84ca173cacff542e0482bad719b4557b39d3ef0b2903d1acceb07d,2024-06-21T14:15:10.777000 @@ -187139,13 +187139,13 @@ CVE-2021-47319,0,0,36b0f40dc1f652e0a64c910bbdfd73ed37fab9e83fbbbef01b1c38287fe18 CVE-2021-47320,0,0,41ba6898e9108696a49582f00b03b0681abf412c541960b9d7fe3f4b3ef11fda,2024-05-21T16:54:26.047000 CVE-2021-47321,0,0,4f9e19b15788a2b41df81cb31b4962cc6f7a5f2928795f609c0184c42e7f5f13,2024-05-21T16:54:26.047000 CVE-2021-47322,0,0,fffd510c4c1162ae358631ced81df3b754aabcdda687d3b076a37c077f2dc055,2024-05-21T16:54:26.047000 -CVE-2021-47323,0,0,3a14ddfc8959287603542643e926c6a235bdf96566268db2d7a296f71b584b4a,2024-05-21T16:54:26.047000 -CVE-2021-47324,0,0,d6717e7c9a079e18dce5cd18c3815e2c4774972503d951fe8114ea573955af95,2024-05-21T16:54:26.047000 +CVE-2021-47323,0,1,30e05c967e404a3e5f5da00ae218abea7b53ded88fd1c5cde072add466e68d19,2024-07-03T01:37:38.240000 +CVE-2021-47324,0,1,61363a6b10f2a0291220f63a7e46539121593857110cd909ea3918bfb26707f6,2024-07-03T01:37:39.060000 CVE-2021-47325,0,0,df65236e4d563e7ff40e631bb087f4bffde6b04c02f22e6d89d972b900e594a5,2024-05-21T16:54:26.047000 CVE-2021-47326,0,0,effcfe425dd2a39d7ea0ddc982e859be643afc1e8970fc98319f837a9ad1e665,2024-05-23T14:15:09.033000 -CVE-2021-47327,0,0,006b996583d5f936287e38b392f217a2b9fae15222737d5997cba951c770622f,2024-05-21T16:54:26.047000 +CVE-2021-47327,0,1,78fe46e7b5a404eb7e59347255c542e9c2d4ea6efaa9017008334a63c8727f23,2024-07-03T01:37:39.993000 CVE-2021-47328,0,0,ea662e4c22d9a90044e61a948217e3ec770783fe36a77cb55bf5b53a2d5b3a74,2024-05-21T16:54:26.047000 -CVE-2021-47329,0,0,baef6901b2cecd463a20a8242e933b3ff3371d5cded73e352ebdcbab29498ff8,2024-05-21T16:54:26.047000 +CVE-2021-47329,0,1,9617f023b4c58539ce1aedb7e8c3a8b0044bc4a95894a91243feb803784966d7,2024-07-03T01:37:40.793000 CVE-2021-47330,0,0,19aba1f8e4607c38713bc65bea897cde962efe1f35ac57c33cec53e0e52823c1,2024-05-21T16:54:26.047000 CVE-2021-47331,0,0,78d7d9b0c5c5996321cf12646cf0f40d109083aeaceb84c7f1d3ee50c66fa206,2024-05-21T16:54:26.047000 CVE-2021-47332,0,0,16a2df91496625038f10eda37f3bdc13675ed49e64f7d79bd5101d04b8bd9eb8,2024-05-21T16:54:26.047000 @@ -187164,15 +187164,15 @@ CVE-2021-47344,0,0,454605af2b98a31ee92e34d4553d6d02dcffc3b60eb83aeea0bb5bfcbb72f CVE-2021-47345,0,0,0959039bb6546cf25cd3301ded9fbdb02eed0060a3530d77080fcdfc11b6d57a,2024-05-21T16:54:26.047000 CVE-2021-47346,0,0,32acc5c4daa85ee10040e4ad6c8d73e891d222187ef63fb42316fdaa164c681b,2024-05-21T16:54:26.047000 CVE-2021-47347,0,0,47c9a56975a9e565b238c0d86b504ae1d807db272528b6de0efb6e254a9dc097,2024-05-21T16:54:26.047000 -CVE-2021-47348,0,0,d3b3f2f10053ed409b0b801db03715c6ab7746b64a0d0f1b70e05191ba11e34b,2024-05-21T16:54:26.047000 +CVE-2021-47348,0,1,cbd7050f60b6d34998fac30b0c35a9199cb24117e7667e7c425da37d327e3490,2024-07-03T01:37:42.580000 CVE-2021-47349,0,0,1c15153e4b43e137bbe01c5628413b6582923189bf7d965709fdf5a2a2b0ceed,2024-05-21T16:54:26.047000 CVE-2021-47350,0,0,d84d756b3cec2d63f3b5c6ccc5964510a529693037698c2f59eb60e975521dd4,2024-05-21T16:54:26.047000 CVE-2021-47351,0,0,d4a33d41fb7cefd313b5d152e8e4ce08a152a31e512191681e7bf30a942cc6a7,2024-05-21T16:54:26.047000 CVE-2021-47352,0,0,337412fd38315995ff38f1168ed9ea202f160e7fb292085921ae46945ed16965,2024-05-21T16:54:26.047000 CVE-2021-47353,0,0,82449286bf035dd3365bef654a1c42f79bd8fc32b3386f5fdcfea11a6530f9e4,2024-05-21T16:54:26.047000 -CVE-2021-47354,0,0,d1756f24f266974558cae26cd61fe45fbc1d8601624cd7e266c2888c182d24f8,2024-05-21T16:54:26.047000 +CVE-2021-47354,0,1,16f6caca4e2b6bd67c382986a9d1bf3512aea61bbf81736934541f547aaa382b,2024-07-03T01:37:43.623000 CVE-2021-47355,0,0,8bfd8f049bebd0860d5d2443170e6d8ffc040ed38ec26b429d8d98267100f53e,2024-05-21T16:54:26.047000 -CVE-2021-47356,0,0,abe516b98742cc20190aff5df3a5ab6d43b6d310e8ed7b207d88153933afa84e,2024-05-21T16:54:26.047000 +CVE-2021-47356,0,1,241336664cee555206ad4da6f912d6ab75b0d43ba2647bab4f438c253fb46ca3,2024-07-03T01:37:44.487000 CVE-2021-47357,0,0,7004334f5b9c82df9b5d7baf5595b9ff5c28e09d9eeddef3e30f9d5c432da5ad,2024-05-21T16:54:26.047000 CVE-2021-47358,0,0,be038918bea32d62c3fa62b309869d32a95cf69a6c87880f27e5143486b51efe,2024-05-21T16:54:26.047000 CVE-2021-47359,0,0,95fc2ad70ea57831546526186c6a0d9fde77fd47f516e73031cb14018a41a458,2024-05-21T16:54:26.047000 @@ -187183,18 +187183,18 @@ CVE-2021-47363,0,0,451cdd7364ca5bb4efb829c4788dd40cbcbb6746f764979ca242e60d95b58 CVE-2021-47364,0,0,a359c0821ddec86a5ec45c24f5ca9b471348d9b0ab67d37b811ff9e91cc9f727,2024-05-21T16:54:26.047000 CVE-2021-47365,0,0,cc4189fbcffc5971bf13fada3d5b9812a0f8df36d75145a9ac2100acf8b6e7e7,2024-05-21T16:54:26.047000 CVE-2021-47366,0,0,952c14013292cbd66020cc6442b5f0a722aec92c17cf6354c36f9cf97af07ff8,2024-05-21T16:54:26.047000 -CVE-2021-47367,0,0,35fdb08e335b566147ec4f408bf06eb76d7023c1c31fb2c7e829cf9670d3d3fa,2024-05-21T16:54:26.047000 -CVE-2021-47368,0,0,a2a5aad8f2355bed383c642aac4772d20c10bdfad5fd121578abf1d1a33c14c1,2024-05-21T16:54:26.047000 -CVE-2021-47369,0,0,6efd20c2e959f14eff5c8822d0e90fe1facc2ab13cab61aceb7dd8d615086ca8,2024-05-21T16:54:26.047000 +CVE-2021-47367,0,1,0bb1b92b77584979835ac49cf2a174823760722ee7f760f1bba8c9c0b01e084b,2024-07-03T01:37:45.997000 +CVE-2021-47368,0,1,ca5abd62423948cde41220042d443084f74a0a14e425a935b6e1bd78153e1e2f,2024-07-03T01:37:46.787000 +CVE-2021-47369,0,1,3c47d880305925a50771bb15516bcb189c4ef17bd942d5a576934350dcffa438,2024-07-03T01:37:47.597000 CVE-2021-47370,0,0,85a1587c7c7e04b19d536647b3526a2dda2c907d012c10e22f12812bde0ab56b,2024-05-21T16:54:26.047000 -CVE-2021-47371,0,0,fe669008ff8ae520df5f0085c34871273e4011cbc84002aba4b77afe2527c9a5,2024-05-21T16:54:26.047000 +CVE-2021-47371,0,1,f5f3185ca08086598a7c7c2e5704eb1083d48bd9cf99d7b12b38889b099feb89,2024-07-03T01:37:48.470000 CVE-2021-47372,0,0,d7d358c9f491fe46df3242764ec03f41b929d96e02108c7ae13ce0539b9ea407,2024-05-21T16:54:26.047000 CVE-2021-47373,0,0,90ac7e16c6ddaf6f2c0fd5ac595c1ad46d623c766835184609352179898a2519,2024-05-21T16:54:26.047000 CVE-2021-47374,0,0,27260b37185e1bbe54cc591e43efaea256e9a8dab676902371a34b7d39627f94,2024-05-21T16:54:26.047000 CVE-2021-47375,0,0,fbe14b57b08a23fef4021bd7deaedc125938e16d164fcbd5a03e5e90187873b7,2024-05-21T16:54:26.047000 CVE-2021-47376,0,0,5758126c634cac5445211629bf4de556fb2ff8a22d38acd4da90c5c69c9d320c,2024-05-21T16:54:26.047000 CVE-2021-47377,0,0,cf358ffde0362061df1698cd1aecfeffad2dd4cd7b6e43e6e493ba351d7ed661,2024-05-28T19:15:08.857000 -CVE-2021-47378,0,0,2b27cbcc3406221fafdcb1fddf77a1337f3f07bff5bcc3dd173994ad488284bd,2024-05-21T16:54:26.047000 +CVE-2021-47378,0,1,5ea5e826dec8b76b410756090c46d1d228123900ca6f5676dcdceb9701ef0e95,2024-07-03T01:37:49.463000 CVE-2021-47379,0,0,355ccf1026d45dfe8372730ffc02b05885def1eaa5fd74af6346a3f16202a040,2024-05-21T16:54:26.047000 CVE-2021-47380,0,0,d07b04e895db0b550c891d25b79b3be85d73be1eefc3bc0dd2d02ec1b8243012,2024-05-21T16:54:26.047000 CVE-2021-47381,0,0,ff9ed10e5eb606d4e4565d76a77446f0b56ae82ac3dbcce44c7852c76e0f1a0c,2024-05-21T16:54:26.047000 @@ -187205,7 +187205,7 @@ CVE-2021-47385,0,0,07eaed946a2a9d232c10ed4b0efe6bdf93e4f06b333db4eb289bd51a15464 CVE-2021-47386,0,0,44f1997d9cfeae54f6351b256ca991e2a6811de804a0722fee92cf555cdcddd4,2024-05-21T16:54:26.047000 CVE-2021-47387,0,0,6677a3ada1b90e26c087f5398695729cd49832bb12507b95bd0abd8cbe36f0c1,2024-05-21T16:54:26.047000 CVE-2021-47388,0,0,a2597a8082e6e7cfdc0a6885efcb2572358e29c5f700e35d61444e39d998c2f4,2024-05-21T16:54:26.047000 -CVE-2021-47389,0,0,57a3db8a136c83b419566b866a09a4c89657ffa298bcfcd6e1cacaa6fa1d09ed,2024-05-21T16:54:26.047000 +CVE-2021-47389,0,1,ba875602e685e7335d08aef441b03bcd6c8778ebb815b60f4684d02c07f45205,2024-07-03T01:37:51.067000 CVE-2021-47390,0,0,03c3564822ed1b7d876d50188b9c1ed1fb70ad73fcfdf2688c04d92b1ab95e21,2024-05-21T16:54:26.047000 CVE-2021-47391,0,0,cdc33f7c82603c94f36855422da7ddc848f1baeb16de5abf5385d9e35324c0a3,2024-05-21T16:54:26.047000 CVE-2021-47392,0,0,bb0e9ce9c96c156603b802686e332e3fc41735c81d7e887d2a01c5f3adef3945,2024-05-21T16:54:26.047000 @@ -187219,7 +187219,7 @@ CVE-2021-47399,0,0,cc68c09478e6c5eec983e1cebd0146a06a6502d1c0db75df5b32a5ff8a835 CVE-2021-47400,0,0,237afca36d8c00d0bb96d18349d83399fc064531391f52a74971929070a9c511,2024-05-21T16:54:26.047000 CVE-2021-47401,0,0,472b96e05aa3c77ed20d2122aa9930b3e1d9a5cc0808562aecfcc5ff8b64b81c,2024-05-21T16:54:26.047000 CVE-2021-47402,0,0,e0ef990aee7d555c2830e62f234c5eb41973383cc813065222f79da5004afef0,2024-05-21T16:54:26.047000 -CVE-2021-47403,0,0,7fd04b88a22ed907d6870d456dc00ca6198aa0a2d2f0b04a3cfff7b867603bcd,2024-05-21T16:54:26.047000 +CVE-2021-47403,0,1,08ee4ab563474f56852b2719b7b0bf75a748c36a1cf828e0ac8f1681f2363b1e,2024-07-03T01:37:52.627000 CVE-2021-47404,0,0,1e991f1a5a586ed7518f189a2e970eacf8609f95e050741874e23fa92a3095d8,2024-05-21T16:54:26.047000 CVE-2021-47405,0,0,9f71f45d34e0f9d60127ba4a920143ed9775e9d9ee7b2e35b04b7affdc0fdeb1,2024-05-21T16:54:26.047000 CVE-2021-47406,0,0,520cfff5f8c639e7ccb7f4a6f56f26231f2ce6030ff7d0ef78330f9e70bc2e08,2024-05-21T16:54:26.047000 @@ -187257,7 +187257,7 @@ CVE-2021-47437,0,0,400b2cfefeb28742e9cd9fa413ed008739dd199187af17d7cd4841d253d63 CVE-2021-47438,0,0,4df07f3c7f29d04799cea214a1d9a838ba17b31a9fa844f55807934e0ce96c9b,2024-05-22T12:46:53.887000 CVE-2021-47439,0,0,caf21942e898095d87bc284c58f9bd5666ba2ec0a29a0407146e84a77566d303,2024-05-22T12:46:53.887000 CVE-2021-47440,0,0,ac4af7b294baada150b51095a15aa2b8a0ff9132986ab7a375e2b531e64ddb95,2024-05-22T12:46:53.887000 -CVE-2021-47441,0,0,ae93116c6c5c20b0b711aae6dd53cda6d20fe3d919e3550a9999cae1d428fd81,2024-05-22T12:46:53.887000 +CVE-2021-47441,0,1,0f3b983feef84ab521b403aca7907c792115b545aee8b57acd22e8325593d7f9,2024-07-03T01:37:55.917000 CVE-2021-47442,0,0,c0d589ef75e72a0d696fe161badbd1b51079d08ade8f58fc1ab499030c22c105,2024-05-22T12:46:53.887000 CVE-2021-47443,0,0,ef2ff3871b1da15e2de22e234297e1b9b29a0d228d33ad609eb671f21d791a06,2024-05-22T12:46:53.887000 CVE-2021-47444,0,0,424d403222ef2e4f27f7c7e5c0dbbf9311c57e242b9cef695a5f5a4a946b84c4,2024-05-22T12:46:53.887000 @@ -187272,7 +187272,7 @@ CVE-2021-47452,0,0,94d947e053e167550dab7d76dbd08b03c34bc4853fafc8f8f90d074d6d488 CVE-2021-47453,0,0,f05c40506f4880d9d9f9d79d0dfd3a548f7d8fe135be0b5cce8bbae2b8a7db7a,2024-05-22T12:46:53.887000 CVE-2021-47454,0,0,c081b145297617f91a670f00c37bfb7e93f7532376ba05b45ec343c4766cf022,2024-05-22T12:46:53.887000 CVE-2021-47455,0,0,9fe08ace3f648aeda48f38cf2685bb483a333db0fc9cfc5d9a14bcb6955b1d59,2024-05-22T12:46:53.887000 -CVE-2021-47456,0,0,76d4cd45b5c58e0c4d8097a772dc874ac630d7ba4a32314bba0d17b4587d58e0,2024-05-22T12:46:53.887000 +CVE-2021-47456,0,1,701327b2cb7120b48f1f4f39e6ace0a12c0220da4ceae15cd175605f4bc81153,2024-07-03T01:37:57.757000 CVE-2021-47457,0,0,247cd67a2c4bff8a87584f64b2100a0b4c3d5a8cd7dae84e54a875703952cb9f,2024-05-22T12:46:53.887000 CVE-2021-47458,0,0,8c60ddf5aa7c82cec253d5b9af258047a16466592a2d4d351dc8c946d3a073a9,2024-05-22T12:46:53.887000 CVE-2021-47459,0,0,9d7485ffc288401c62b17c99bd70aa862aec0e04be1f585bf7eb9aa88d4bdc36,2024-05-22T12:46:53.887000 @@ -187280,7 +187280,7 @@ CVE-2021-47460,0,0,3a86c1e69a33e1154ba95a2c4288da5f08e33431a303e020a1e6e75e0585f CVE-2021-47461,0,0,953190ae79f27312c4ff2e7b70def700ee40bff2756bbe748e8ba2824aaa3a74,2024-05-22T12:46:53.887000 CVE-2021-47462,0,0,b9377e39468fbe7c0422e61916da4905368c8e4e7b4e53c7866a68db6d61c893,2024-05-22T12:46:53.887000 CVE-2021-47463,0,0,f36b51722c9f6335983acc2ce4cb10a632ab09e39e6dc56d4afa7896f287ecae,2024-05-22T12:46:53.887000 -CVE-2021-47464,0,0,e79a375124691b233398bd5a59861999c9149f5a04b1e594101fe124cd38e237,2024-05-22T12:46:53.887000 +CVE-2021-47464,0,1,b2b22ef044e2823e1c45ba446b02f98fa45320b044f27af3461aacaeab3078b5,2024-07-03T01:37:59.053000 CVE-2021-47465,0,0,9046453dcb263a9f567fe4b81a67e32f086601b8041f4d7e408e620156865611,2024-05-22T12:46:53.887000 CVE-2021-47466,0,0,14671d77f280c4a95c5219d4cf385422c37e1903f0001d7e87ce68909a5f1f08,2024-05-22T12:46:53.887000 CVE-2021-47467,0,0,8545acd7f0207ff792fbe479b106f9fba8d4e8125bc3422e61d5eeda847bf3a4,2024-05-22T12:46:53.887000 @@ -187292,17 +187292,17 @@ CVE-2021-47472,0,0,d7ffb60c1efa6aeedbeb6f5a045eedbe61f352602a4eba01f18d081b1113d CVE-2021-47473,0,0,a06d0b2b3fb2a56155409742cc763e481118233c333bae60fb67e17923573646,2024-05-22T12:46:53.887000 CVE-2021-47474,0,0,5aa7ee22ccceebf8afc658dcaeb529c380fd6398ba5a5b4aacbae80a3d788859,2024-05-22T12:46:53.887000 CVE-2021-47475,0,0,bda5bd6370629486bc328ef4919cd6bc566c5d10fcc12f7f374913a6b12c2f04,2024-05-22T12:46:53.887000 -CVE-2021-47476,0,0,2f7bd8201a552a17b1866b7f463ead1d76996396b3fc073d0d9ebe63c2faf6a3,2024-05-22T12:46:53.887000 +CVE-2021-47476,0,1,1b42c81eb7f29ec566104afdaff00d3344433b6b6aa94d52090f3f923099e39a,2024-07-03T01:38:00.540000 CVE-2021-47477,0,0,ffa7fb4c0919de71df07b8a012dfae46b4022776fa495a6ae239269875bb2af6,2024-05-22T12:46:53.887000 CVE-2021-47478,0,0,4b50f486053497bd64fced5c8414d2dfddc1d755bf91ba9f59173a416ff3c781,2024-05-22T12:46:53.887000 CVE-2021-47479,0,0,0d3cc8b3eae551511a3ebf95a6c1f3ca768cd3c6e99810dc993588d732622622,2024-05-22T12:46:53.887000 CVE-2021-47480,0,0,8300f17f999611b05708b693aa44ae8ca4973b78df7f104e1fae5389d87097fe,2024-05-22T12:46:53.887000 CVE-2021-47481,0,0,f289cc9077ce4e88b482fcaee94e98c93450cc4918238d5746979b1092f15fb8,2024-05-22T12:46:53.887000 -CVE-2021-47482,0,0,0c535dc3e6cd83774b46931dc00321dbfbe3ebf40f4932330207ea92552c2881,2024-05-22T12:46:53.887000 +CVE-2021-47482,0,1,d3ac9665d27e7dd3222f790be23a9da91a7f3170d9af3ce2e3bb8b397a84081d,2024-07-03T01:38:01.587000 CVE-2021-47483,0,0,73d06bef52378cc35c2ffe4b1d76ff6f1275047b38dd5bc503ebf8b86d40598e,2024-05-22T12:46:53.887000 CVE-2021-47484,0,0,5a88077a15611f8cc4f7ac814b49c5c5f94e79780e3e80e1c63803e3e6eb8df2,2024-05-22T12:46:53.887000 CVE-2021-47485,0,0,58109945935784f50d631a560cff62e533deeb63b75664b236f89f8794d6a0dc,2024-05-22T12:46:53.887000 -CVE-2021-47486,0,0,a31c8e87bd280153a8a8bccd61a681db2940dc67d96d58a047fa9ea766a90b66,2024-05-22T12:46:53.887000 +CVE-2021-47486,0,1,41d64af05f9f7e7f079d43365667fcc12c2bdc11c6514c521a628dc553dcbe93,2024-07-03T01:38:02.550000 CVE-2021-47487,0,0,1b569f2ae9600bd68c50b1cf935e085fa6762f0c6e5998fb0afef48e32dd7a6d,2024-05-28T19:15:08.983000 CVE-2021-47488,0,0,1224776e91c5a7612aad87d9026a02a5b19f103da745e1910b889fdfd0f43876,2024-05-22T12:46:53.887000 CVE-2021-47489,0,0,1333520ac3e371cd74d9375a514ddb772a332c275dc176d18b61aeff278bd492,2024-05-22T12:46:53.887000 @@ -187319,7 +187319,7 @@ CVE-2021-47499,0,0,3cb729b337901a00284a6dd8db82736ddaad024f1e9640e5f0e8d08e16ff2 CVE-2021-47500,0,0,74d2ead562c7a8cfb658c85619b684d056ae8dccec63a611bf0d1e925d8673e4,2024-05-24T18:09:20.027000 CVE-2021-47501,0,0,870af4a08d4b55f1863c12c327b2e2029b90dc310e8487386f6cf347cc93a9cb,2024-05-24T18:09:20.027000 CVE-2021-47502,0,0,489b6623b8c74dccbb6f028d20f48ac852f8eb858f83457824f15fb8ec72420a,2024-05-24T18:09:20.027000 -CVE-2021-47503,0,0,2b54d5f772f65f4811f0b8a7f12cf3f21f39615ccf4785fe03e0d8ae0d1086fe,2024-05-24T18:09:20.027000 +CVE-2021-47503,0,1,982249576876f88d1d9fdb452c39fb8005b1d89a5d75bffcabb4371bf452e2c0,2024-07-03T01:38:04.253000 CVE-2021-47504,0,0,86ff96cbd43f598a097462fee3a551a48e47e19d4c10d9021f9e31268d12d647,2024-05-24T18:09:20.027000 CVE-2021-47505,0,0,587d3c086ee291d7c3e4beeb005ab056c8aea3f2dfe0551edd8752e747b91e8d,2024-05-24T18:09:20.027000 CVE-2021-47506,0,0,8a036ea0bea3481775866f7cfac3fb39167e0258c06e62a11d0cb551000c32cc,2024-05-24T18:09:20.027000 @@ -187335,7 +187335,7 @@ CVE-2021-47515,0,0,4b0fe86c41ea131834566251cc2153f1aa2bacf98ee647015efe82de1a8fd CVE-2021-47516,0,0,15a9786f5620e3f86f14762bfeb0fd9b540c19e7b529f56cc4fe31072e97df0d,2024-06-10T18:43:51.307000 CVE-2021-47517,0,0,68d4b1f8179ad17d7741942e291913e77725f4cf220062ae984f0faae86bf9ed,2024-05-24T18:09:20.027000 CVE-2021-47518,0,0,6a1b8b570ae85bb8e3e3588fc7474f748dcff56362c577e6e39173de9dbc2cfb,2024-06-10T18:43:43.857000 -CVE-2021-47519,0,0,18d80697b0762f1cdc3fa945d68670ae0be1202739466adae0cf259bd9139ca1,2024-06-10T18:43:26.763000 +CVE-2021-47519,0,1,9d7cf0436a168eed94651f9f97570e76fac4f252f1de05082c2e8b81fbc9c269,2024-07-03T01:38:05.877000 CVE-2021-47520,0,0,d817bd4893be3bdef11401ab78c52bfe74ddeadbb3cf4e676b0de08a6efcf54a,2024-06-10T18:42:47.233000 CVE-2021-47521,0,0,ce9a91bed88014d5860697812b196996d6863014fc1671941612911524323b30,2024-06-10T18:41:35.017000 CVE-2021-47522,0,0,6a61ffb9002b23f7e225a7981a99e895e51a61ab4b5bcf936f0cba05ba0896db,2024-06-10T18:42:19.167000 @@ -187364,10 +187364,10 @@ CVE-2021-47544,0,0,f79795d45ec86024adc669e638f18860bcf298c02a6d3b83525f67512e199 CVE-2021-47545,0,0,7a729950c7b53801bcb4ccb943c7fd94366f722c2f1058fe3d0c7e067590cdcf,2024-06-13T14:15:10.783000 CVE-2021-47546,0,0,3af84ddd9fcd49edabe8726c0dd363f371de5b18d210c52c0f4f7bffa0beee4b,2024-06-10T18:30:20.320000 CVE-2021-47547,0,0,3055a8c1ecdaf1bebf0a74bb41eaf039135dbbab3ff1f7d004351f8f6b5ee172,2024-05-24T18:09:20.027000 -CVE-2021-47548,0,0,f004a4a5bb0b50ea0d94ce57835ee44a7c431c9414f5744d4b17252bb1d4cd2c,2024-05-24T18:09:20.027000 +CVE-2021-47548,0,1,03a8a3877d4ca0ad093bd20ff48d4aebe255325f8becd5edf1b9a31b21d3ffa9,2024-07-03T01:38:08.723000 CVE-2021-47549,0,0,a406083d84ba06ddf9b4bef66a889518dc29d66b05024c086f82e52467b59744,2024-05-24T18:09:20.027000 CVE-2021-47550,0,0,9fbf03d21b1e8a0f1003489b58f442ad23c18337e12097df9ffbbe17502eb9e9,2024-06-10T19:23:10.227000 -CVE-2021-47551,0,0,a59c589f23c481bb96f229a1e8056ebadc5d223e908cb7128a133b3037b2f12d,2024-05-24T18:09:20.027000 +CVE-2021-47551,0,1,2037ebec9cd8406c75a4393d26ee8abf9ff4a8ae48c5458cedcbca08f15f44c0,2024-07-03T01:38:09.747000 CVE-2021-47552,0,0,97438f0e765b4e7960628f69c2b687bd556499171ecebfda3b09ccea176fc134,2024-05-24T18:09:20.027000 CVE-2021-47553,0,0,bf93bad92ccd11f0c351029d4dcbf970003f138802655bd44b126a6452abb59d,2024-05-24T18:09:20.027000 CVE-2021-47554,0,0,25c7d016ddc87fe8274bff744d76b6654441341e9799b78378e10bf6b5223787,2024-05-24T18:09:20.027000 @@ -187402,7 +187402,7 @@ CVE-2021-47582,0,0,2ce9440ba1c9bfa4fce1eb9f2a968e9bc20efa09fbaf77bbb876f9900c96b CVE-2021-47583,0,0,71356b902fbeb2a7776e143f0558c2a21afa193a7877d36978558eb4ad0c8da2,2024-06-20T12:43:25.663000 CVE-2021-47584,0,0,f95da46e379be35effbdbebd9c6dde440fb79cefcfd0cac47c33424036e8bc62,2024-06-20T12:43:25.663000 CVE-2021-47585,0,0,bbaab35a282507692a0e9407f1122cd2043f21129de9b01fb025cb4462f32c58,2024-06-20T12:43:25.663000 -CVE-2021-47586,0,0,7bd2ad125ca602813d13a31c32d4d88514df9199698b5df7e1b5536013378fc6,2024-06-20T12:43:25.663000 +CVE-2021-47586,0,1,43a350738cd92215883dae2d0f75b2537927b72a55c6c8b78e203743018315a0,2024-07-03T01:38:11.913000 CVE-2021-47587,0,0,fa5cb28cf70ca95dc26ec4c09cc77bfd665285ce3c772fcd3808b6fd3d20fbf0,2024-06-20T12:43:25.663000 CVE-2021-47588,0,0,c08c3b4d8b14513f30d473c1f08b7308f5086c05ad9135336496a653214077ac,2024-06-20T12:43:25.663000 CVE-2021-47589,0,0,4149af2da59a86f91b3e41a07765832c87ebf4b81bee8efe27a599bbee03fbd4,2024-06-20T12:43:25.663000 @@ -187918,7 +187918,7 @@ CVE-2022-0551,0,0,e08f293b37e5f46391e4160f101b09ea5cff3fcbd38854b7db6f22155314b8 CVE-2022-0552,0,0,a3069e6a15248853b7dddc1f1ff07a24f38a97fb381cb5305a8cbb8b63666717,2023-02-12T22:15:20.927000 CVE-2022-0553,0,0,55817ed9980527bf2084443781acf52b0b4e8ea97ad2c0ecd38394d896b038ca,2023-07-21T17:13:15.200000 CVE-2022-0554,0,0,206c02c2c048e081bd0cc1e097927865a34adb033310eeaa2a52fce943c03409,2023-11-07T03:41:22.640000 -CVE-2022-0555,0,0,86e3cfc1334eb61ef3b93b6eb97861346425dc5b031e82a11fb76a788bc2931b,2024-06-03T19:23:17.807000 +CVE-2022-0555,0,1,cf5d29e4aab187d9be51ba052de37fe9bcc280d9dbb0e255fac324c60c53cffb,2024-07-03T01:38:14.863000 CVE-2022-0556,0,0,6e6573ffaf259f6b836774745100afc166cfd1857d2ce580fd0eaff17a386504,2023-06-26T19:38:49.617000 CVE-2022-0557,0,0,c1dc62dbfe92704b7ae486f9a6c5148b91440c0bbddff6576f96f85dbd654f15,2022-03-18T21:00:13.693000 CVE-2022-0558,0,0,540ea40562eb2bf5f69bd24d6ba8845f7f5baa4987556f791a63253d6491e5a7,2022-02-17T13:54:33.137000 @@ -194358,7 +194358,7 @@ CVE-2022-25477,0,0,d20a27df31d38af0afc20c681228c4a914eabe55303b966622f4ed5bb1b1c CVE-2022-25478,0,0,70e7c014b7b7f01e5419065792c5e0879950224514b5eee9a13a25f85d4890c3,2024-07-02T19:15:11.870000 CVE-2022-25479,0,0,bbcbe3ce2d31a511def7cbae6b0c5276bdbdd0c47a66e512186e701cee1954bd,2024-07-02T19:15:11.957000 CVE-2022-25480,0,0,b85c1709cb146bb1b0393a679e804a8c10249abb28f64a7e7994dfbec0265b6b,2024-07-02T19:15:12.037000 -CVE-2022-25481,0,0,421b401b20e9e22f5ad772dff507a3a1e2483021fab730987885599f766afa84,2024-06-04T19:17:14.633000 +CVE-2022-25481,0,1,d8914892ae94539e6b18fbcd727395bf982994a1a334a92092d2f4e3819a8123,2024-07-03T01:38:19.293000 CVE-2022-25484,0,0,99a222d35a5c2f1b2db0f90a8390321c73db93867e67f18b2c213513a13e5439,2022-03-28T20:53:05.180000 CVE-2022-25485,0,0,f943c508b3e38959fea36ca9f014627ff6eee45f93d348f17a276f89be77fc1e,2022-03-23T18:18:46.160000 CVE-2022-25486,0,0,f49d709b52c7d7fce93d2631d774ac42d59ac75a64d7eb0b86f75b827afbefeb,2022-10-27T19:24:47.267000 @@ -194888,11 +194888,11 @@ CVE-2022-26121,0,0,4817365b3bafeb84d119c418106e525a51ee13efbb3dbeff4f67392c24807 CVE-2022-26122,0,0,164e09a43d54baa84f677905fe92592c3975ef059fd5c9aad24fb02dab655a90,2022-11-04T13:20:04.217000 CVE-2022-26123,0,0,1787ce5646f40762dea206165529e10857c399b1641402cf9a38d3372b8e1c52,2023-11-07T03:44:55.963000 CVE-2022-26124,0,0,e20bb143cce5026d61c911367e43a77e98b0573f5e60aa8ccd3e2b66894fc66e,2022-11-17T15:30:49.277000 -CVE-2022-26125,0,0,3a905a5274655d3dfdcf4f2478bcbec125449c70b1d71699ad8d163cf22d48bb,2024-04-28T07:15:06.517000 +CVE-2022-26125,0,1,582316c4ef30c4c58e084f484da8323c1453b9e25ca9a09299e1cae3081bdb5f,2024-07-03T01:38:21.020000 CVE-2022-26126,0,0,32dfa62d61a5d16f68bd723c2983b613f1a7c7b8e207663a6170c469abb99101,2024-04-28T07:15:07.730000 CVE-2022-26127,0,0,162a6115c253725d88345b3571e46cb238048a196a7344dc52efb4e4459ecb24,2024-04-28T07:15:07.867000 CVE-2022-26128,0,0,4149c1ef554e8b47bab5fb405b73b0533394c6970d1244b41e94f3318f660640,2024-04-28T07:15:07.963000 -CVE-2022-26129,0,0,d3a579058fad1bafab753d65dd8d570687fab27eb8c3ac9e47fc69e06a3a3083,2024-04-28T07:15:08.080000 +CVE-2022-26129,0,1,be0cc07a4702becddd3794850dbc57a0064de81f4cb4bfe11e1098fab3d87289,2024-07-03T01:38:21.390000 CVE-2022-2613,0,0,2705769156bba6f27f784ac788bc68d117dccf546508708f0b6cf796aa748101,2023-11-07T03:46:44.133000 CVE-2022-26130,0,0,e3cfbac27b943eb46061ce2deac038d92c7f0bb2ed8b82045deb01a11bdc767d,2022-05-16T12:34:17.893000 CVE-2022-26131,0,0,e201a577539ce448fa5c37858b58af9176e209c969b7e93a64a87874412b5ef2,2022-03-23T18:37:02.983000 @@ -195227,9 +195227,9 @@ CVE-2022-26572,0,0,01c797f9a77e6e2b9279647e62838ffa3e2a27c62fdfb7bc4bedeae68df4f CVE-2022-26573,0,0,9f167d5a94f2530d8e6c43911a2d982d77df738c06c1b7368ae74c71c695f90a,2022-03-30T13:21:27.910000 CVE-2022-26579,0,0,34b379c12b5d03dfbaec21616363cb5826febae928d39efa804828796a8d5a94,2024-04-23T14:15:07.533000 CVE-2022-2658,0,0,152df8f2a13fa84f4559eae28af444eb0d81dfa93cd10d6d7431b9f674479e1e,2023-11-07T03:46:49.523000 -CVE-2022-26580,0,0,6e4ff77c928a57112a9a01ebafd61c61e2f04e95548af3b5c6d37a8d5e366f36,2024-04-23T14:15:07.720000 -CVE-2022-26581,0,0,fe19a6c2a77bc9c836756f40f53161e34e7c8b1ad804197a2f6b990a50f290d4,2024-04-23T14:15:07.827000 -CVE-2022-26582,0,0,7ffb6accec102774751a38ae28b2b1712111a81869983e943865b6099a1c4088,2024-04-23T14:15:07.933000 +CVE-2022-26580,0,1,f543894f2f75ac368db1151522cde06bb943ac19596b2e1c9cf1cfb514549d90,2024-07-03T01:38:21.617000 +CVE-2022-26581,0,1,174108667d340651719ef5f66fff4f38b8122b06cc9eea26de8fccf3397a38d8,2024-07-03T01:38:22.477000 +CVE-2022-26582,0,1,e4f10cd55660a637b07cb5ff153889c32c9d119539c8752bb8398394b57ee532,2024-07-03T01:38:22.713000 CVE-2022-26585,0,0,cefb1ad72e785c7e7ecf73600bb23b412fbb7fef5fe7531babf9c249998f62e7,2022-04-12T09:37:17.017000 CVE-2022-26588,0,0,8195e99d6dd05d1581cfc3f4163d469b39955563cb6b6d19490e2f825fea9f89,2023-11-07T03:45:04.337000 CVE-2022-26589,0,0,61c95cbdf519db7c8bde3a668b533cb90d0d1c1bcf85dc941779e875a17ea627,2023-11-07T03:45:04.600000 @@ -196305,7 +196305,7 @@ CVE-2022-27944,0,0,7e417e1e7e2bf65c062ed500719f749b95d6a9ace155dd430cafec7e1fcfc CVE-2022-27945,0,0,239925ab507025f2c54c4b0fc5a716be01a92ca1981af1955b43c7b1ec519991,2022-03-31T01:01:29.273000 CVE-2022-27946,0,0,5347d3c82d0da0f956d76a34a42b617b89894dcf6da906a0243ab1fbd8673eda,2022-03-31T01:00:49.037000 CVE-2022-27947,0,0,ea376bf30641c63aae1ce823ecf36bf2adc6a3dd9a76e9bd00c871fe4e649450,2022-03-31T00:59:20.323000 -CVE-2022-27948,0,0,c2e8a831acae410fa4aba12a88b069818d918af475fbf6690588672eb4c7ddf5,2024-06-04T19:17:15.463000 +CVE-2022-27948,0,1,a53fd08aee714839d7d9f3d1a1cfda951b9fdfd6ea78ac2558f68344115ee043,2024-07-03T01:38:25.163000 CVE-2022-27949,0,0,784d5fbe8a68ae965db6aba31257ffb3272a7ca9a5fa2e4fbc860454d0253f69,2022-11-16T18:52:04.637000 CVE-2022-2795,0,0,49588383ad557395a4f15b6eb17882563ba8a7a281bfa39d2ac141c631198817,2023-11-07T03:46:53.600000 CVE-2022-27950,0,0,c7f46baa9749906a7bbe17c4acd2ce63e0af0b0df0facb02e4597fac1d286f97,2022-04-05T13:08:56.440000 @@ -196859,7 +196859,7 @@ CVE-2022-28652,0,0,175f00525a87dceb7a234c5311850586afb57155f0eba4be3b8fca1c044bc CVE-2022-28654,0,0,bd5b11f0530d7b1f2f227dc48086186c6ed13ebed1cd8a9485ef386ed1c85e82,2024-06-11T17:04:47.620000 CVE-2022-28655,0,0,69c04d36f6023b198a9f94ddaa234c34c62ba3c3283b0e3c84b5ec96a611a116,2024-06-11T17:04:20.947000 CVE-2022-28656,0,0,10ed4078111225055fc73e8d5c93bacba765e9be1bd5927b0ca5a032ed105fa9,2024-06-11T17:02:46.767000 -CVE-2022-28657,0,0,87affe5ad5a71bb7203f20998766d987a4f1cd002bb891c78e6bc9e411a1f862,2024-06-11T17:02:05.497000 +CVE-2022-28657,0,1,06fc2415c033b6ca9a7ef6f695583d44086aec51b4b1923db9e5850171d149c1,2024-07-03T01:38:25.937000 CVE-2022-28658,0,0,0e63e959545e5e1f31bf991eb041fb7c708844e024447417ac0d2441a507b62e,2024-06-11T16:56:43.970000 CVE-2022-2866,0,0,39936636c7b18b74703b9b6f9b14aacde95244838843f9eb43e74857aedd50d3,2022-09-02T22:02:57.273000 CVE-2022-28660,0,0,56c6ace0e4d9c9af155b31cd3cc2403dccde1c6848618344b9372c4d85c50f7f,2022-10-07T15:45:37.153000 @@ -198279,7 +198279,7 @@ CVE-2022-30329,0,0,1e4dd5a55573e7e5a013b63f922cccbee97ab466e2a60437c8ca4ae025888 CVE-2022-3033,0,0,04d6f731ac8bfa74ecd44970b9b4139094e5c3f9a2dccd741e7f3aaf386e9788,2023-08-08T14:22:24.967000 CVE-2022-30330,0,0,876c82068abdcf186aa7b3e8a5f8616f863cc3d82cca821d376d16d4b07af7ee,2023-08-08T14:22:24.967000 CVE-2022-30331,0,0,b59f313d8f3ba3a246834807358e04b85d223642f4ad3f5d1588020d00fc8d4a,2024-05-17T02:09:04.580000 -CVE-2022-30332,0,0,44a853d0f21cb54a3d6e8f1ab62da33b469752869a0e0ad135055671589c3583,2024-06-18T14:01:34.683000 +CVE-2022-30332,0,1,c101b05288b71e38fad6a64517c7456bf7788930b89b4f27c13db023f289ea64,2024-07-03T01:38:27.583000 CVE-2022-30333,0,0,55300acd01befeaf7a91f569ccd8af135dbdc96ed4ccbe77000e577c74150005,2024-06-28T14:12:45.617000 CVE-2022-30334,0,0,cd25538698a372e38cded8a3faa0ddac856c8de83bfb793bc0c3db012023959f,2023-08-08T14:22:24.967000 CVE-2022-30335,0,0,f793ef292c40aa9629afac7f2d724bbe8c9406a4419beea8dad8af24e5cd174a,2022-05-17T19:15:34.883000 @@ -198304,7 +198304,7 @@ CVE-2022-30375,0,0,e332890859c56dcfe5a6b8701700d0e06d4a661dd4b04ab8582794681d383 CVE-2022-30376,0,0,2f15d0767febb438935bd574cb5691032de5b5860b997c4b39555abb4825ea92,2022-05-23T17:11:19.630000 CVE-2022-30378,0,0,c0b82b4e3286c616bf4771f0e6afe61660b7771be1e95a5db6c3146a5a53e67b,2022-05-23T17:11:01.687000 CVE-2022-30379,0,0,406a6b36b3be7d7e33d681ec295bce38da0c7073fc6b4a86196b523f835d3158,2022-05-23T17:09:03.923000 -CVE-2022-3038,0,0,54d98685165c164b1e7567bb632953856a05b4ce837a1ee7cee7a837d4780057,2024-06-28T13:40:50.297000 +CVE-2022-3038,0,1,cf8e656dc05bc180104c1539a60d0f56fa26e9cc9a7119d78970b2f0e321a7e5,2024-07-03T01:38:43.383000 CVE-2022-30381,0,0,bcdd96ae4df6372bdae86d919c4b8843f6e880893a867237882b64198f43f345,2022-05-23T18:02:46.847000 CVE-2022-30384,0,0,5a4ed52707188c5a36e98b161cc45869d9528166765143596e0fa54aeb89b7bc,2022-05-23T18:04:10.067000 CVE-2022-30385,0,0,ad44945b47f058a58f9030d235daab30b9074079c5eeec09caa5cc8bd7d26887,2022-05-23T18:04:30.260000 @@ -198680,7 +198680,7 @@ CVE-2022-30795,0,0,d0afae6b28561907e08e2963502bbae872b588976d360924ac68a79aa50b4 CVE-2022-30797,0,0,ae7e005adcbfb38dbaab6123d22ff93d4b659d1f3a472bd2307807f4b633e525,2022-06-10T20:36:51.240000 CVE-2022-30798,0,0,8be9505911799c127a304bd3fcbb609eb716e100110ff3b89d8d5b2851332370,2022-06-10T20:38:56.497000 CVE-2022-30799,0,0,fabe6cec1e20208ca3bc15977ff4f8fd1df073ef498bf1a7586cb522e4a42184,2022-06-10T20:57:51.350000 -CVE-2022-3080,0,0,9c9cc4155bac6e67ccfaede4dbfdd5412c66a73167c9f294bc2a0b7366c8c714,2024-06-21T19:15:23.630000 +CVE-2022-3080,0,1,946ca10978ab642b4374b3c035e430d06fa82d8d91b5814e555a8547309b7e20,2024-07-03T01:38:44.257000 CVE-2022-30804,0,0,5676975de26e9c8bc92b48c568bb46bc5cb3d391499f631e1bf74d20be5360cb,2023-08-08T14:22:24.967000 CVE-2022-30808,0,0,e93dfc501b28f491b755845b8900661c5fe62bbb60ec70c39559280db3e20f7f,2022-06-10T14:47:00.813000 CVE-2022-30809,0,0,623aa735d4f96341d0f16ac639869e6d5c195afb856a144a7ab7f104301e883e,2022-06-10T14:41:31.080000 @@ -199546,7 +199546,7 @@ CVE-2022-31808,0,0,a9b5adcb1cbf57448d4754888c6d0a2e2adeae6958ec7a5c06b412439f2ce CVE-2022-3181,0,0,c0e551ec256e0b4dcebdb7d7ffd4438a390baae8c12a5cf470be82263a004724,2023-11-07T03:50:56.520000 CVE-2022-31810,0,0,3a734843782c1a61aa965152632f6604e0c3c6f24d4914a2e3fa2caa9d34aeec,2023-07-19T14:41:04.087000 CVE-2022-31813,0,0,df3b0a1f72f0b0119f7b950f2fdf2dc9e701be98dd4afa23c271cff4b4d42dec,2023-11-07T03:47:42.113000 -CVE-2022-31814,0,0,5c4e1145ec493f87220e0893ab615eb8c7bb227ea9146baa3089c9b182736aef,2024-05-14T10:41:30.723000 +CVE-2022-31814,0,1,6cbc1b4477b1236662c89ab49d263616c38df0276d7a2eb2391f2ecbfb3409f5,2024-07-03T01:38:28.430000 CVE-2022-3182,0,0,77198b1b7f0d25b2761674d7500044aa2eca35e83ab6395f7e42e5a1b4dc3487,2022-09-20T19:09:43.470000 CVE-2022-31827,0,0,f53b8d3e16db7ab42ba9462051b73c9785cbe75d5b5fa09f3bedd02e1abdb642,2022-06-15T17:55:47.803000 CVE-2022-3183,0,0,aec626c36c170416185eda3829c503344d8797c0e7dd3346930be0cab89db5ad,2023-11-07T03:50:56.953000 @@ -199868,7 +199868,7 @@ CVE-2022-32271,0,0,f91a809a45aa1334650a473ac5f65456fca4868edbcb75c338ac23b8cf864 CVE-2022-32272,0,0,56190bbc7af934772fc708f9ef383de6197d73f8d32f8c2ce29a532f4649135c,2023-03-28T17:15:11.453000 CVE-2022-32273,0,0,89055a972aa081f8ac177f480aaa792aa0052d747db15cc67554ba63abf7a95a,2022-06-15T14:51:59.957000 CVE-2022-32274,0,0,ed4b3b35e055002cf7f2f360916410db44e0ff1b3dc342e47e68335bd1efe2f2,2022-07-26T10:20:03.307000 -CVE-2022-32275,0,0,c58a118551f3bc0cfe2414d4efb8c9664aad710bfc6eeb4a78b8f161b0138f3a,2024-06-04T19:17:15.757000 +CVE-2022-32275,0,1,deb62146fbd782911f2d9038ca7c0fd978d9b14fc944e6cb9f4a00b8f8df79c1,2024-07-03T01:38:29.250000 CVE-2022-32276,0,0,ab4e8943bdc56710c860e4b6f1e1abdedefd94a4ec9b2461d6e70ff3160bbb33,2024-05-17T02:09:54.600000 CVE-2022-32277,0,0,075b0c9f67aff6c6738a9f4becff639765c931f1519efc5a74741489a7912c02,2024-05-17T02:09:54.693000 CVE-2022-32278,0,0,dba070cb697d21a95dbf009b53f96329651c357a84432fa6611190fa0a8e2103,2022-07-08T16:46:06.147000 @@ -200051,13 +200051,13 @@ CVE-2022-32496,0,0,5a7e62ff7cb6a6820cfb109eaf351a8361842dd7987c2aa5041c8e594eb1e CVE-2022-32497,0,0,ade8e224378cedef31903a8de3bff4489d1ed831c984b6cb549a5284d237c86c,2023-11-07T03:47:50.543000 CVE-2022-32498,0,0,5ba50e2e5f495efe36b157febed2f9aeb8e46b983dff6b21b466844eec402f3a,2022-07-30T01:24:17.157000 CVE-2022-3250,0,0,fbcdc8d2496a6ea80a56c106db7a35d772c41695a76d66908aa618ebc896f83c,2022-09-23T17:00:34.603000 -CVE-2022-32502,0,0,bbbf77029bf140f776d3dd8d6f439e5b77401409ab6dbbc8ce461739b1b93356,2024-05-14T16:13:02.773000 -CVE-2022-32503,0,0,08665c406dbfd953251200487f1920797c223c05e72de78cbd96ec997144e847,2024-05-14T16:13:02.773000 -CVE-2022-32504,0,0,cd5d48ca630415131aeb0f1f08df68f2a5dfd1efe92e29d766fc1aa2c4a6b489,2024-05-14T16:13:02.773000 +CVE-2022-32502,0,1,8043bd7b67ea0539b415e98c4f691c3c17aca58cf56f8cb93f7ff0987225b88f,2024-07-03T01:38:30.257000 +CVE-2022-32503,0,1,f57183dbef2543b9f63dcf473a4267a67a4ba901286e8bc05468ac8a81f43f5a,2024-07-03T01:38:31.060000 +CVE-2022-32504,0,1,f985a28466775169224400eb27b21a7a82a049f055b74ee3fe4261e86e2a23c4,2024-07-03T01:38:31.860000 CVE-2022-32505,0,0,77d3fa3e009e6a469d7813bdcaf5b038df2d68f523ef734964e2f14be10c3762,2024-05-14T16:13:02.773000 CVE-2022-32506,0,0,739325b4b5ccc18b1252783c7e34b3ed907901a55943034438438db03f993eb9,2024-05-14T16:13:02.773000 CVE-2022-32507,0,0,1c12ff48ffcf657cbc6fe182911360d733342b45e08662f91df2b0b30cf36c62,2024-05-14T16:13:02.773000 -CVE-2022-32508,0,0,27768d871f5c350883d5cf33d7054456826dc52534e4ccc9e62f0899695a176e,2024-05-14T16:13:02.773000 +CVE-2022-32508,0,1,a82e6070d51429707c08716a8f4c6bc4c23bc87bd713671d9f9c95e952ee7b45,2024-07-03T01:38:32.660000 CVE-2022-32509,0,0,2426eaffc80b093787f731f6e410f9c119b75c46ec3ccb8017af3e9de9cbdb32,2024-05-14T16:13:02.773000 CVE-2022-3251,0,0,031bdfee899a2701c89c75c36f3087b8bc560e9d6e5e3a7aa4a82daf3c759fdf,2022-09-23T16:56:54.663000 CVE-2022-32510,0,0,9081216e6c6a2685d4ed8d8af1fc541bb2ce3ca18ecb43575857fae9c02c1544,2024-05-14T16:13:02.773000 @@ -200295,7 +200295,7 @@ CVE-2022-32739,0,0,315ae5b8454cbd4fe600e02bcbdcfa719c96a706ec94a57d44c4c9af98c21 CVE-2022-3274,0,0,6f79ba87ede54d24f0edf49b0b70078b6ddc0d5b11cd5d60d5665f9e1993e41f,2022-09-26T14:05:38.923000 CVE-2022-32740,0,0,1421b70287d9f57f4df6659ad7c1e2a7a0c2efaee128af981713d361fecbf561,2022-06-22T12:42:36.647000 CVE-2022-32741,0,0,b0c95053a325d3b04555e964911ce6522f5ddd4018929080efb7444104d0f65d,2022-06-22T13:41:06.453000 -CVE-2022-32742,0,0,4f855883961bb77de2fd0e8d2e9cabe623b4da019e0bbe279fa6d822f7867a52,2024-04-22T16:15:12.257000 +CVE-2022-32742,0,1,91e1575d63a607cdbd585c40aaa750f3be10191c42d762564cfef7a090a2b463,2024-07-03T01:38:33.443000 CVE-2022-32743,0,0,a35927822b8b1cd64483e08c3e1b86277897a8089c644666ebbb2f740b9ad312,2023-11-07T03:48:10.633000 CVE-2022-32744,0,0,19b84c4d4fa814744c604f8c7c8876997f08058bba7d9e274310062dca294c70,2023-09-17T09:15:10.790000 CVE-2022-32745,0,0,eb4e71a3b53baf6ad3e64634c9bdba0c220070c1e87f0abbe7802079bc995be7,2023-11-07T03:48:10.707000 @@ -200457,7 +200457,7 @@ CVE-2022-32893,0,0,d94366aeae31f2dc5d0a6f0c277dae91ad53f4a7936b122b0c8a85cb2b6b7 CVE-2022-32894,0,0,258579e09971ddea3b4815a13f4b228f09b463853438998782e99d4d4a74b2e8,2022-12-07T03:02:55.287000 CVE-2022-32895,0,0,a866a4ecd54090d59826e47060c2fe31da4fd60afa522dd3d88fdd6339a97c2f,2022-11-03T14:38:33.867000 CVE-2022-32896,0,0,17fd28355dac713cc35d13c78c58dc3e1c8b430c0015f022b283eda11acef2f1,2023-08-08T14:22:24.967000 -CVE-2022-32897,0,0,ad1349fe5eaed63ccba0146dc0974a0d84416447755751e4c227e8c842cc303f,2024-06-12T18:08:05.860000 +CVE-2022-32897,0,1,d3d6c939e90fb5f7f4e2b153c4cdf90d943957a76a34501fa289e2ad32993494,2024-07-03T01:38:33.783000 CVE-2022-32898,0,0,dc4c5dc9a5f3f10252df3b48ee72cd91d41244a4d9e1d63ef2e7b84b757e902a,2023-01-09T16:41:59.350000 CVE-2022-32899,0,0,afe99f73cfd08bcbacadec410d0fe2bcc62f7d2c73f75e55f14d8746d172f152,2023-01-09T16:41:59.350000 CVE-2022-3290,0,0,2598192fd9d11269a3309ca73acf9adcc0a3e7182df9deebc35808ec4cc8523b,2022-09-28T13:54:11.263000 @@ -200746,7 +200746,7 @@ CVE-2022-33242,0,0,a91e1e8cebe0d25eaf3c677f8ca5a1b4701f474e25d2503162b030fee6ad9 CVE-2022-33243,0,0,d55d737fb6bfc0caa4cea887c8886f5d2db34651e9d244f7d01822adc93e6053,2024-04-12T17:16:08.560000 CVE-2022-33244,0,0,3ee08aa09a045fd91f9a2932cccc9fbadd4b205e5b277acbb287b3371664056d,2024-04-12T17:16:09.260000 CVE-2022-33245,0,0,22f4e7335f05655004ec8051dc645052e4325cf7be478f789344f6b21a569dae,2024-04-12T17:16:09.680000 -CVE-2022-33246,0,0,c92445ea4b143dd5b10578791f1811b83c0b115f3a8f8c5b0b2e17e55bba644e,2024-04-12T17:16:10.150000 +CVE-2022-33246,0,1,71cbd60d3cc45c35a37dbdd021a27eb16750ec7bf40fa5641eaa1f2a28b066fa,2024-07-03T01:38:35.110000 CVE-2022-33248,0,0,db26acbf366eb7afdc81fbccde376a7cefe22b6727c744bc64f02804e24dc177,2024-04-12T17:16:10.593000 CVE-2022-3325,0,0,dd195acbe719e05394cbed0f080aa81ff8523914e8030666b0a42fdc0ee0377d,2023-08-08T14:21:49.707000 CVE-2022-33250,0,0,7e16f301ec38c138c511b21aedd28e32c8a4a6604045b36000b48431820d15fb,2024-04-12T17:16:11.233000 @@ -201606,7 +201606,7 @@ CVE-2022-34557,0,0,eecc8b4bc07828b9b1046bebce9f29c4e5bf4a70e8e91f5056094a302147e CVE-2022-34558,0,0,fbe60d47fc8f6f689dbf168e606cdea671312f94d428e8ee9c8ecf061888f6d0,2022-08-04T18:14:00.777000 CVE-2022-3456,0,0,b8ac2735d87fb3428674d1a6a5c18dac0738f373459ad6b97d466d7c80e95ab6,2022-10-14T09:18:29.033000 CVE-2022-34560,0,0,e91d51c2883781c533c5a1902138bcfefc9afc3404c46a9ecd9b9328f3d71189,2024-04-22T19:24:12.920000 -CVE-2022-34561,0,0,10280994f89caba871f260f21d33d4e9d31cc6ffdab4f6fb1097140c4eeb8bed,2024-04-22T19:24:12.920000 +CVE-2022-34561,0,1,7a1d876593aca947858cbf9ce774fe978316dedeefc5275fb7c9ba221e2f79ac,2024-07-03T01:38:38.140000 CVE-2022-34562,0,0,9ade501ca25f94b5887ae7ee8ff2f0e48455417107d579d0eb7087214d71a829,2024-04-22T19:24:12.920000 CVE-2022-34567,0,0,c7081cacbea5c4bf7e640ccd7be62566ef6f65f476c142672c62d14de0fec3d5,2022-08-09T15:16:01.133000 CVE-2022-34568,0,0,7d7e21cf0f762a871ae8e12be991913f168ecf5cf382ff57f18f7a6cb3db8140,2023-08-08T14:21:49.707000 @@ -202426,7 +202426,7 @@ CVE-2022-35493,0,0,3fbd6e82bbdf46b2fc6829f415a2cc90121509376addf5102172805f20f63 CVE-2022-3550,0,0,756957ccd55359b7c0978f68036f94b6b7a1a89f37ba4fbd76e88b0c1375bad5,2023-11-07T03:51:25.593000 CVE-2022-35500,0,0,e4a3e6aaf78e4048d7dd258306698c8f6c2483fa0c0e3adbb5e1e15607e82bd5,2022-11-28T15:26:40.780000 CVE-2022-35501,0,0,0f02773590d7a16f97f67c931824c201f7e648389cd66dfda888e1343e91f455,2022-11-28T18:14:00.097000 -CVE-2022-35503,0,0,ac61ad095abe9ccb93455308659ce1a5c4e4129d0fc4a1b2badb720aacefb82b,2024-05-02T16:15:07.667000 +CVE-2022-35503,0,1,78b337d66b660c134bf977e18ed937eefcd19739330fc6789be3bfd04de5b06d,2024-07-03T01:38:39.057000 CVE-2022-35505,0,0,6c78edaa4497d167f87abd11a1b8b8aa506854460361fcf9259c1dc57318c246,2022-08-10T15:48:34.157000 CVE-2022-35506,0,0,43651b2bf00b655a27022bdb0fe35c1cce7134fb3dcfbf8b5fc5c0c25002da17,2023-08-08T14:22:24.967000 CVE-2022-35507,0,0,e86eac31135a1e76950fd89549b8296eb5af137be3ef8ade737d6ee342e0e457,2023-11-07T03:49:18.840000 @@ -203749,7 +203749,7 @@ CVE-2022-37015,0,0,26ac84e20527e936bb600212843b8f28317497b7cf5774ac209ffd3574ba5 CVE-2022-37016,0,0,af22d1a738a017c331839a2ce3a7b82ff4cb1c516c429af17730fc70dbbd928b,2023-08-08T14:22:24.967000 CVE-2022-37017,0,0,7dbbb2db383a65e34cfecd910337739e41614ef36b7e475c8358204ab8b1fca2,2023-08-08T14:22:24.967000 CVE-2022-37018,0,0,8cf3ca0e518e3ee0e2fa7290fc1879e49deefc718751e150a277388265762a6a,2022-12-20T19:30:46.703000 -CVE-2022-37019,0,0,c1691f3d1ce7a0db1c937b32a9e75a8d539d169dda8ed4f3ef396d4a52a35264,2024-06-11T13:54:12.057000 +CVE-2022-37019,0,1,7cff26cf17d9c4f08e037c921ad6ecad5294a5f236afc7ba7e9d80b7f76b7c14,2024-07-03T01:38:40.297000 CVE-2022-3702,0,0,7b6c03663b66d4cb07a5c874ce6757b9ee999f9d0b92a04bdb1c2dcd37536a24,2023-11-07T19:48:09.467000 CVE-2022-37020,0,0,62c76d7487d81e0d00ce9884ed6661abc80ac63dee48344d3f4b997438d9d33a,2024-06-11T13:54:12.057000 CVE-2022-37021,0,0,8457916b93c24ba9a7e4ca4fc479cc2e4823ece1b38743970c89cda20001b78b,2022-09-07T00:57:58.920000 @@ -204048,7 +204048,7 @@ CVE-2022-37406,0,0,fbdd149ad63023ba8de7832926e0ff0db7c8a46d931054e7f55cea54ab409 CVE-2022-37407,0,0,156baf94556463331abf1cc9614f6e7da38ccbef3879796f93c7cbc2fe670bf0,2022-09-10T03:39:20.550000 CVE-2022-37409,0,0,77033a962ea4c09422012ff858029b433fecf0270ecd2744c4c0e42112c644aa,2023-11-07T03:49:48.137000 CVE-2022-3741,0,0,ffb9c71793d80e28b322f5564814f73b4a37b59b0d5f16419a808fe0b6f07077,2022-11-01T18:45:08.013000 -CVE-2022-37410,0,0,8205a7ed8b8db1a00cc38198428672cc7f66ff362fe7bf2acfba0f235272a1ba,2024-05-17T18:36:31.297000 +CVE-2022-37410,0,1,6987cc70676556b3bbe994ef7db0b33a34a917081523d455e1ae7db68db1126b,2024-07-03T01:38:40.667000 CVE-2022-37411,0,0,1bcd26787a54b9196a874682ded35ddf9f1403d90c19a6068c9bf5c768f49a0e,2022-09-14T21:35:49.463000 CVE-2022-37412,0,0,b2bce03cfcaacc79be2a70461b0912eec0656cdc13b38f31f01f3488e7613e7b,2022-09-10T03:38:32.353000 CVE-2022-37415,0,0,d695e7f47fd1fd0357ef75bfa09df31ebdd7591912a5825c6f29245bb74e5f2f,2023-08-08T14:21:49.707000 @@ -204524,7 +204524,7 @@ CVE-2022-3816,0,0,345004d8efc9c5a042aa3b332ad957769af11790ae1a1092bafcd85fa03cfd CVE-2022-38161,0,0,c6e949eea01024dd16b4b0caf69f8df1a0555dc2c6edf25a6260ce5ca216c9f3,2022-09-15T17:08:49.740000 CVE-2022-38162,0,0,a3d634cc9852288db1e49ed0e2ad5f0177fd9f79ca201e09260f41f764c3346f,2023-11-07T03:50:03.920000 CVE-2022-38163,0,0,606d4976fd9ef59bb309b68e4b8b8dbb98aed4fa72eecbf3ebd68c800f4fea7e,2022-11-29T18:07:23.960000 -CVE-2022-38164,0,0,891438b9d97b578379035d9977e3d0e8e3e9eef678f28550bcdc53590d00e5ac,2024-05-14T11:15:06.580000 +CVE-2022-38164,0,1,567866c3349a6760f7f32cb4decacc913008f2cee52d37e8d66d3de0e5024e0d,2024-07-03T01:38:42.007000 CVE-2022-38165,0,0,8ffd75ae2b232d05010b6928dab600e411d9aa9b693a05f9617fa8b8c985632f,2022-11-22T00:41:35.893000 CVE-2022-38166,0,0,cb5a6104982f97dc342b1301fbdeb6ca4b2aa23ce352c39925def6364f8e3b88,2022-11-30T21:10:40.080000 CVE-2022-38167,0,0,01feba81785a679ed7ab94793444f6983d192908ef236a1aa0bda9e53160fc9a,2022-11-17T20:25:27.510000 @@ -204953,7 +204953,7 @@ CVE-2022-38705,0,0,58464e4464999c640433dc31f1c8330cb2c23deda3c39c084ec5a974591fb CVE-2022-38707,0,0,fb094ae991a56c0c795b92715485f656ef83ff68d78429d79cc4722b4bfcb2f3,2023-05-11T14:17:11.117000 CVE-2022-38708,0,0,aecadae88af05d1c96a0043887df11993569751eabbe6505af244121f12692eb,2023-11-07T03:50:11.823000 CVE-2022-38709,0,0,e6e88bea3274f28e2d41d42790eb92f3fa3c687a4752ded25cabcefcd876c1ea,2022-10-14T20:30:32.833000 -CVE-2022-38710,0,0,5c83e31066a2e9aa4915e919b839ada34b9bb0a94d8abeb5128af2b069b1500e,2024-04-18T04:15:08.367000 +CVE-2022-38710,0,1,830e0e94583ffcb8159f179750666649292743dd25ba595d9d9d7fd875daf9ad,2024-07-03T01:38:43.047000 CVE-2022-38712,0,0,4b55d3db6ded2fd8dc07767cd59a1d6e8318d653d3d714c522d1c3eeb9f03127,2022-11-04T15:16:45.807000 CVE-2022-38714,0,0,b47899d93b52f94a55f4a4d167a2f32243af9e6db459e546eaafc429ba85cd53,2024-02-12T20:39:15.693000 CVE-2022-38715,0,0,9b2d253f7fa658444f770869b0badf5cc7f24116022485b34ef44200a43fddc1,2023-02-02T17:22:07.650000 @@ -206449,9 +206449,9 @@ CVE-2022-40812,0,0,acf4c5c8a7f13ceef567dd77ac5ac9383f064e5c09aefa2d062af82f8e0c2 CVE-2022-40816,0,0,3d6397b201f81c1a859601be465a6709932746d332fb0c7562520fb70aab7a84,2023-08-08T14:22:24.967000 CVE-2022-40817,0,0,70269ba0c0d21ea973d601b0f5c31051a837a987e8495efea763cfecf48848f5,2022-09-29T14:00:47.583000 CVE-2022-4082,0,0,3298dd92c15c61cb44d7d0149ab60747a9169e1a3fb803ff121df0d1d774e09a,2023-11-07T03:56:52.890000 -CVE-2022-40824,0,0,d3d425eb2ab9c946863105f5a16a2f4c6daf035e90d28e704ecb8b4d060187b9,2024-06-05T20:15:10.583000 +CVE-2022-40824,0,1,0a908f47d6358dd339042ed7d70d38d0ff59984114bedc03add6e9e9f620bd7c,2024-07-03T01:38:46.790000 CVE-2022-40825,0,0,edd1489cf44a5081ecaddb1e294d6c9017e9a6f0da92b219a5108293cdd9a093,2024-05-17T21:15:06.997000 -CVE-2022-40826,0,0,2d4afd66392c92fd93c1ce3ef36f83a07244dc19d2d328ee1048a1367f845f73,2024-06-05T20:15:10.707000 +CVE-2022-40826,0,1,7f68525eef61266a5d914eb78e686c486efdc7afce66445fc76113f14b1f9e5e,2024-07-03T01:38:47.693000 CVE-2022-40827,0,0,eb4edd6a53ff4276c2eee2413bf40d1cdaf860bb0461923e0a9f798da8115647,2024-06-06T18:15:12.513000 CVE-2022-40828,0,0,a5bdfd07b96cc23f23647af90d22425cea2f201a26db70477a81fcb28c7d8796,2024-06-06T18:15:12.643000 CVE-2022-40829,0,0,167fbdb68e68c6dd17619b3a67d70e7a3aa055b265ccc0034c86dddf062f431f,2024-05-17T21:15:07.330000 @@ -208211,7 +208211,7 @@ CVE-2022-42970,0,0,684351571c726e3643d500eb09cd3f89b360763f0fd695f8bb69c804dc28d CVE-2022-42971,0,0,a1a760e3587785043d9b78a199e09a9c4c8e485ce4f48cc34275b0d788d0cab8,2023-02-08T19:43:51.890000 CVE-2022-42972,0,0,5f3b3d9ac192cbb1a45d6a773c5e886c09251dfb9ca13b3ca9cb8c11930ec490,2023-02-08T19:40:51.330000 CVE-2022-42973,0,0,0f6e1ea59a6d9a4bb4e66c46715b9ab0d86461aefc26a6b95446083a3d658078,2023-02-08T19:00:42.387000 -CVE-2022-42974,0,0,edd3e9f8732ff4df34e6a20ed1be68a223b678c7e3ab4ecc085c942516210d61,2024-06-24T12:57:36.513000 +CVE-2022-42974,0,1,34410008e50058ee3cabe891484832c5d8574ed92a0405b5bf83f51e3dcd3fb9,2024-07-03T01:38:49.800000 CVE-2022-42975,0,0,f256f7d52b33ef16660e0ebf6c4ccc6fe1ffaf6c18f82025b01cf1cab52da7cb,2022-10-20T14:12:10.597000 CVE-2022-42977,0,0,4fbf7f5ca129c3ea9e7ba51c6d4ee0d909c52d7d9db35f31f31607b56dc98718,2023-08-08T14:22:24.967000 CVE-2022-42978,0,0,02efb548f6368a021b2a0aa5395451ba1b2aaa35e6f5787da8fad0ffe5e4b189,2022-11-17T04:59:09.643000 @@ -208403,12 +208403,12 @@ CVE-2022-43264,0,0,d09fc6fa78c099bc317b6b60128dc0152eb27c22926ced4f3549db46ffd1b CVE-2022-43265,0,0,4336e51566a8658be82d61a99a11c96697b2520321bc7263cd195efada182c4e,2022-11-17T05:00:09.033000 CVE-2022-4327,0,0,4376b214c9bfd64bdc214ddcd9348400b68d2f4c56d6d84e25650d2819589906,2023-11-07T03:57:33.320000 CVE-2022-43271,0,0,a9c5cf6eb4e96f9c2aa76228aea2c0aa107d65de604ff5ae347aa52f97d080d1,2022-12-29T15:52:43.040000 -CVE-2022-43272,0,0,975aca4e316c4b8a5bd12543011a2ede893a1d3ee6ece6474f661908b135c5ed,2024-06-28T19:15:03.977000 +CVE-2022-43272,0,1,6ec1fe53be1bd516c25036b2d69e6ca89619461877c4c5006c561d0f8fc99e8d,2024-07-03T01:38:50.747000 CVE-2022-43275,0,0,d3b33023ef30f64eecc90b7793a13dae1efe9467e99fc0219acb4e2d1372de55,2022-10-28T18:27:46.030000 CVE-2022-43276,0,0,5ee12ee2f860c457919ca9e01f8c2a56bd56801165972697ea6946b09cad6ba5,2022-10-28T18:30:48.927000 CVE-2022-43277,0,0,79defdf3bb022c935512dd1a8f6df33b0351fb0fc7c9f15642f9c3ce93f8691c,2022-11-09T17:03:10.517000 CVE-2022-43278,0,0,ecb8b056e9c5b4005e6c30fb35ea383fcfec95e544aa02a3b6a26c6bb8e0a236,2022-11-09T17:07:03.247000 -CVE-2022-43279,0,0,d5ddcfd5289d5f51aba4c604812ec44455f8ad5fcdc5ac4d22f7236974d5b828,2024-05-14T11:35:52.330000 +CVE-2022-43279,0,1,3d6fc6803cec7261a0240ab729fc0b343259583d5b3ecbecb393cfcd23c6d85f,2024-07-03T01:38:51.027000 CVE-2022-4328,0,0,ddcc39709df9f2216f6646c388b85636cfebbc8a99afea1f4b46e0b0e6779a05,2023-11-07T03:57:33.557000 CVE-2022-43280,0,0,ec00dc54f31177773c804adfe17f1e31c64265fe3c2c88cfcc1c6e1a50397e7d,2022-11-01T16:35:31.087000 CVE-2022-43281,0,0,01f34dbc0a5db95586be0a2c38f11d0013d6d7d36eb7f617351e43cc71c2d1fe,2022-11-01T16:35:42.713000 @@ -209847,7 +209847,7 @@ CVE-2022-45374,0,0,234bcbe42a398d02916a1144810e73140e49a3f8ec8b20f6e09659996a8bd CVE-2022-45375,0,0,da864e8b34db6ab6a597fd88184987813df60814774dbb456962ae5ebf75ac4e,2023-12-28T19:25:01.977000 CVE-2022-45376,0,0,b57105367642e35382bdd8a9080749d9beec61a989c5635676db7750b0359258,2023-05-26T13:59:21.923000 CVE-2022-45377,0,0,22cbe4252822fe666d39f11f7d395bd49f2da129efb23b521e602cf3f981e012,2023-12-29T03:46:35.557000 -CVE-2022-45378,0,0,9da05f3c5a6f3da06db38e206fb915a0d95227d28e21a26304891b248afd77cf,2024-06-04T19:17:18.987000 +CVE-2022-45378,0,1,e7f02a4f74ad6073cafff51a785be1639b59f958e74ca5d680013ecc4d5b073b,2024-07-03T01:38:54.307000 CVE-2022-45379,0,0,c4b81fcf9f58c87a381176e8f2f29306045b684f608fa1fd4b332ebbe1afa8fd,2023-11-22T04:18:00.013000 CVE-2022-45380,0,0,0310d686afffeae499d29644e90f6d0552c0e6d7bfd9c98c7e040efcddb0806d,2023-11-22T04:23:52.063000 CVE-2022-45381,0,0,86d541c10f6f0b87764b3ea9ebf099e0fe6fd9fdad3b1a45134750c065084bc1,2023-11-22T04:23:46.943000 @@ -210259,7 +210259,7 @@ CVE-2022-45925,0,0,fd7051a696b3f22bdc4f0c838abc5ef791297ad80cd0b8eb63f31599526d2 CVE-2022-45926,0,0,fb2fe7a1bc006fa7fb3e239d1549e4c27173c2380f9e46c34dfa5d44f19fa717,2023-01-26T19:16:48.833000 CVE-2022-45927,0,0,2d8121245e6a894c11dd14ab6a2621d053f515cadd318bd586217b7c82d2c519,2023-01-30T15:28:54.280000 CVE-2022-45928,0,0,c9fcbf662fac772bbbe3bf0a462241c586620e0d0c3e7572d8191497c6265236,2023-01-25T21:28:22.397000 -CVE-2022-45929,0,0,f7879af52b9a397d58fdd7046a9b167967946a38eba792f1ff3b3cafea896207,2024-06-21T11:22:01.687000 +CVE-2022-45929,0,1,e598bcb9fd632f9ee1881028547f5884d69873713e07091464d6e1bf1d707a59,2024-07-03T01:38:55.120000 CVE-2022-4593,0,0,eb6ffb8de64998ea2127551b2c0e8bff71c720033be3ec04cd9cfc44b019f521,2023-11-07T03:58:16.583000 CVE-2022-45930,0,0,c421a42777d5939834ae83348afde1ca99d648269378cede4f668e29a1de4f22,2022-11-30T20:47:36.310000 CVE-2022-45931,0,0,4503725956684c17f88fe293de22602f713acbe0d22ac8ff3064c40a2f3edd38,2022-11-30T20:46:53.243000 @@ -210562,7 +210562,7 @@ CVE-2022-46361,0,0,48af788a58afbaf7c68c15682aa1cf23fbbb25599ddca0d79988ec2a2a7e4 CVE-2022-46363,0,0,f60a988c8ffd33f8af77aab20e90e3352e2c47354ba2b0ead6c0d3187e1e4994,2023-11-07T03:55:35.590000 CVE-2022-46364,0,0,e5a91b6cd6bc8bc05a6b37ec9d4813e50e44ac366260b43a7716c9d7b8dd681f,2023-11-07T03:55:35.660000 CVE-2022-46365,0,0,49f12c8346e6acb2bc589dce6d1e7a675c5047f1cc7936e412f2ecb1cd6d8388,2023-05-09T18:04:19.747000 -CVE-2022-46366,0,0,209072b83da9b0a8f6084a46894e7fff3098737bd27f167d97c640002ad4b0a1,2024-06-04T19:17:19.320000 +CVE-2022-46366,0,1,d6a42f095f7db680c8c8cdbafc2c42e0052c60553e6dd107a9265756b43f5a25,2024-07-03T01:38:56.220000 CVE-2022-46367,0,0,fd739109985cc5484b233d9366e5dfa8dcdf235da9e5e882f2fb6e69ad50ed55,2023-01-20T17:37:26.593000 CVE-2022-46368,0,0,59c6ccb9296595ab5d6995c2e8a0ee18b939f83c365c5987b63854ce452d3dd3,2023-01-20T17:37:14.357000 CVE-2022-46369,0,0,59811d25b0b895b77dce4985a59565480c39c2744dcdb353b0549f867db5fd22,2023-01-20T17:37:05.553000 @@ -210964,7 +210964,7 @@ CVE-2022-4689,0,0,1901863d9fa5f21671be7413cf1a4f33dcb9df921b7e51dbfc67c0b983e5ee CVE-2022-46890,0,0,59b348900e16b36a60e6516ec58e9962ae51f5ca9ce2a778654586eb395ebde6,2023-01-25T19:42:31.377000 CVE-2022-46891,0,0,8a376dcbf1698e9d7b7fe4949efda57881620d379cb6db454cc5e201cb5541cd,2023-12-14T20:03:01.073000 CVE-2022-46892,0,0,a56d140c34343ed0f64fb36a782cfa4c680e92acfe5096d3981a9b72a63ee30e,2023-02-24T17:39:20.057000 -CVE-2022-46897,0,0,a2a25cd933bd7a20451d6afe983bf5d3556e8af44f1bc8ec54b25e723b0438d8,2024-04-22T19:24:06.727000 +CVE-2022-46897,0,1,fe57547f97f17bf88594b7dfabf1162a67ec8bfa3eab2856b5d894212f819333,2024-07-03T01:38:56.470000 CVE-2022-46898,0,0,583e583a4450019af7906c16806bbd75685154c7a427e0dfd1819b59427aeb9a,2023-08-01T01:21:54.823000 CVE-2022-46899,0,0,a82b09cb63c7c53524c9166ef97cf86c92637442927f77c18c1a5425982d9add,2023-08-01T01:28:42.690000 CVE-2022-4690,0,0,6c562749bf713390fef7e8aad10e54856e0beda67ef25a92956268fab262ffdf,2022-12-30T16:25:52.877000 @@ -211001,7 +211001,7 @@ CVE-2022-46957,0,0,a1d69dd7ded209329cda3c095131afda943c6757285b7cf3dc9db52b87d9d CVE-2022-46959,0,0,4db9327c805a892369b9295e5190ce93e76847af4e4be43860a7588dd3445976,2023-01-30T18:39:34.020000 CVE-2022-4696,0,0,52b7d04508bea231933e8f68dbf29fc8af5d819b2d476d7835fc9b0454a92e61,2023-11-07T03:58:36.397000 CVE-2022-46965,0,0,20e755a6e88190e1cd456602b3456a03d93a7f04cf4e1d102b6a994756960bd5,2023-02-09T18:20:27.117000 -CVE-2022-46966,0,0,929dceae30dfbe363d3f1bbd87a2328f3623784da546e0bd6b69cf5833a1305a,2024-04-23T14:15:08.030000 +CVE-2022-46966,0,1,e68da19fdccc93c97706b064420d206374084e04c937d12ed5ab06a46a3c42c2,2024-07-03T01:38:57.337000 CVE-2022-46967,0,0,48ce65d256b755064cfec8aacf7b990fad5eb5514109cafe07e366d09b78a326,2023-02-03T14:17:09.377000 CVE-2022-46968,0,0,6337fcb7cf8e6e9756ace0855244a520c959b290b83833babca955789ad869db,2023-02-06T15:15:02.717000 CVE-2022-4697,0,0,9870ed438fbb8b321a6538e9874a4439a56d7aa6121810992596ab3d6bae66ba,2023-11-07T03:58:36.550000 @@ -211042,7 +211042,7 @@ CVE-2022-4705,0,0,bd9745f5749f178c7d1e177eae8c5a51ed2a9ffa1d35048aae36d55fe710cc CVE-2022-47052,0,0,cdeb090117f54dd5fa36366253c9272543592c90aa12cd7a11d8cc1c26db7410,2023-08-08T14:21:49.707000 CVE-2022-47053,0,0,148ddc36db4a5d93fe86c3ae287b8ee210435f54dd063fe6928e5b7642969bae,2023-04-19T19:30:39.953000 CVE-2022-4706,0,0,905bc2ad0cdae79a1a9799421d2945489dbfdb1f0526cb0de0b802900858a58e,2023-11-07T03:58:38.607000 -CVE-2022-47065,0,0,7e3e0724f70ef51f7f5a01c8003370422eb64302a4852b87ee848378c314dafd,2024-06-04T19:17:19.530000 +CVE-2022-47065,0,1,a2370a09c2f7e284b10f7b1a01285d8f4d6d319ed5a5c969ea88c029225aa76a,2024-07-03T01:38:58.160000 CVE-2022-47069,0,0,80f16216389e52c46901a06b83c4e99fd2d5aafa67654e4f454a0c72eecf6ad7,2023-08-26T02:16:36.260000 CVE-2022-4707,0,0,0732a63b40891a6d7c0504bd759c49a310c556656161411dd1550fd236af307a,2023-11-07T03:58:38.813000 CVE-2022-47070,0,0,3fcdc149be794f646c5affd23a79765cd0b6c53254fa995bd5561df8e06feccc,2023-02-13T15:09:02.843000 @@ -212039,7 +212039,7 @@ CVE-2022-48613,0,0,933d1b28adc9d144ccefdf3525b003f1aeb5987ce03546278c3e696c33dcb CVE-2022-48614,0,0,75c1e3ea7eaa5931eb17de8ec4a37f67747321aa68e7ad765a36e74d4c0b196b,2023-12-13T15:59:51.227000 CVE-2022-48615,0,0,055c9c353d7834832491d320050eaeb4819f21bf0043d973bf54368192621e50,2023-12-15T15:02:28.517000 CVE-2022-48616,0,0,badf219c6cb76117b605813df3a55a6d3fc4257eefc4a446371736bff470f9fc,2023-12-15T15:27:11.247000 -CVE-2022-48618,0,0,a669391da2f0a53136a78f7b063b3f2696713e1261c8564ce327fa9e501bdf45,2024-04-11T12:48:39.987000 +CVE-2022-48618,0,1,85562c41f60a21bba96736b5185b3de187c089c735cf6bf7e366532d5e5649a6,2024-07-03T01:38:59.610000 CVE-2022-48619,0,0,b3fb42206d07b24cee31fa3d145164af7bcd66405bae1f4f6e7d73cbdc6a15b3,2024-01-19T15:27:59.073000 CVE-2022-4862,0,0,1b796270d64ccbf1ea7ac394a5f920793c1d2128dc270ca00f899f5edc8ed10e,2023-11-07T03:59:08.013000 CVE-2022-48620,0,0,cbd27ca620fd4c0c404a47f00df16e1e31841607dafabdeec4e089e8bf4e76d4,2024-03-23T03:15:08.797000 @@ -212058,9 +212058,9 @@ CVE-2022-48631,0,0,e86c6e0a4e17a2e96066a2f7bd29beb53cc43608b54ec7e7f562e334cf9e9 CVE-2022-48632,0,0,b7a2e2c435ed6bccb92e28652765522cc691129ab123560a51b9f721fedc20a8,2024-04-29T12:42:03.667000 CVE-2022-48633,0,0,4e64777f01a91bb6df6f7cf0d3c0dfaa4820bd5ea9e429fd52f0f69b8ae9d187,2024-04-29T12:42:03.667000 CVE-2022-48634,0,0,a107b249566e63780278a216e8a150d7eed88df042877785aa08219321ad94fb,2024-04-29T12:42:03.667000 -CVE-2022-48635,0,0,59f8a1ec95efe205f8c1b17e26f2ca0ce38203341b4ce938e70081d6dc993598,2024-04-29T12:42:03.667000 +CVE-2022-48635,0,1,d07f3535dd18090e28a3ad66b0f48653e8ef64caf808c0affb4639b5bb25d19e,2024-07-03T01:39:01.047000 CVE-2022-48636,0,0,1ddfee184b4515746b3ec63d6697bdc440e9f2a1f46d18d99d76822f8ada6b41,2024-04-29T12:42:03.667000 -CVE-2022-48637,0,0,68fbcb7f01f95aec94ebb3f49cc846cb50f75e4407f16dd097ad3d5884b5c40f,2024-04-29T12:42:03.667000 +CVE-2022-48637,0,1,95cbf38f6433ae1842bf68b823814d5589e431e5f63f01bcfbef4ed19660977f,2024-07-03T01:39:01.937000 CVE-2022-48638,0,0,80adcf713c6f84faba8b13ce11af9ae21b0df62af4cb39554d2b9a0c9a3a841c,2024-04-29T12:42:03.667000 CVE-2022-48639,0,0,271823ba33c91f47a44d03bd0cf6a4661383c8d4cd9e06e476503db055a90deb,2024-04-29T12:42:03.667000 CVE-2022-4864,0,0,d23161698d876889bbe57cc3b493d8a62ae4301980779460573eee0ceb3a8d84,2023-10-11T15:24:48.003000 @@ -212076,11 +212076,11 @@ CVE-2022-48648,0,0,2eda19f274b92bacf2b14dfa81305467ceeb94ded57b0c152ef7964221f14 CVE-2022-48649,0,0,b70a26c9275bd33fc0b5ab517aa6149b599fe1b137f749c5b50c3e8b6121cf74,2024-04-29T12:42:03.667000 CVE-2022-4865,0,0,ca348115ae41e38a1bc69af0c75dfb35364aad74f0d955859af486be9af48649,2023-01-06T21:22:00.620000 CVE-2022-48650,0,0,b2f3ad99d6da16f3b8fbdb0df441f7e80991374606a0ed4425a0c5de23501e9f,2024-04-29T12:42:03.667000 -CVE-2022-48651,0,0,be0472f45e5b93bc292c90b67bea0d9edc1843d7532460583b02ee998a6d3e37,2024-04-29T12:42:03.667000 +CVE-2022-48651,0,1,ea5e7dd991b84e861b0bd0b393c1c319833e347be30618e84d0eb3f743ebfc69,2024-07-03T01:39:03.180000 CVE-2022-48652,0,0,60dcbfe168884e496e7026b25633c34ec1ae5964fa79b80d4189f6571d1744e8,2024-04-29T12:42:03.667000 CVE-2022-48653,0,0,af95f04ccaeac0af19b16f99e2946b1817f70437b5dfd9e67e9db7dc2eccefa4,2024-04-29T12:42:03.667000 CVE-2022-48654,0,0,6f2317418c44c3a7aee8fc030c5299b7dce52edbee9470a8ef6e774ee8f36634,2024-05-23T19:01:47.760000 -CVE-2022-48655,0,0,593cc012468bea45ca7a8e26a1cd4d59fcd31a1328baf6140db347239d96a9c7,2024-06-27T14:15:12.480000 +CVE-2022-48655,0,1,117c1f7933b825ff69775b7174e7dea2fe0670d0f8ada0f09471ea3ef6ecf8ba,2024-07-03T01:39:04.060000 CVE-2022-48656,0,0,1ec5039099009577220507619f62ff2e7b95ec0befd729beab8d6c32c6b58a40,2024-05-16T20:41:09.867000 CVE-2022-48657,0,0,8210fcd373060a1239c3202a06e963524e41a0034e529f67ddac6cb402fee763,2024-05-16T20:31:47.880000 CVE-2022-48658,0,0,fea65c2de99597dc1d2d5a29bcf40302a5535ba0b6839e73e33083e36b201790,2024-04-30T15:07:59.460000 @@ -212092,12 +212092,12 @@ CVE-2022-48662,0,0,d24307670efb9c6fbfb5580d089ccdefd8957c53630d1ae83db33751283a9 CVE-2022-48663,0,0,4f5603eb8d8a10620cb44a161edf7b10adcbaa9a11033f3f7fccb38ef636ef83,2024-04-29T12:42:03.667000 CVE-2022-48664,0,0,b2a6f1e510110b133c772eeb7e365f6142506c4cc5dbfee2d8466f128c52c768,2024-04-29T12:42:03.667000 CVE-2022-48665,0,0,156db0788956a7d9433c7ed45421620e677157f09bf6a503f106337316ce0e1c,2024-04-29T12:42:03.667000 -CVE-2022-48666,0,0,e89f77189f9dd39ffb9cb444fddfde665ae413b2acabd2822f3e96741ef4d272,2024-04-29T12:42:03.667000 +CVE-2022-48666,0,1,e86ee33dcd763d200fbb6d2a70a4b97f8118d9e6ad1b1596ca673174dca6a215,2024-07-03T01:39:05.427000 CVE-2022-48667,0,0,fea320fc30b8e20d03bd29c66176a5d330022cbe5a7c1c17bc4a9da6e49c8174,2024-04-29T12:42:03.667000 CVE-2022-48668,0,0,228d489d1f34a9e09a2e0db1a8ecaeed153a7dbdd673765ef8b5cfd95f8e0655,2024-04-29T12:42:03.667000 CVE-2022-48669,0,0,924a5a271b2b1f1e2b644fe7e0386ec6c2bc9af4df977f70bde60730dd6a3160,2024-05-01T19:50:25.633000 CVE-2022-4867,0,0,df30bf033a8b71c87ccc147259fbbc1d4b447580323b889a3d7676505e257148,2023-01-06T21:26:37.597000 -CVE-2022-48670,0,0,2f00d002688b586b078e34d3bbf056acf45ed73c426d1eb153fd3d7885546faf,2024-05-23T20:26:26.033000 +CVE-2022-48670,0,1,cddc4d913fc705785aa8a403d73ce736c7d9ddcc87a2c75d21fbd304ce895062,2024-07-03T01:39:06.507000 CVE-2022-48671,0,0,345b087fdf7a29c2a22f9407913d44a46a6dcb9e2d8bc831170752c9ec2199f8,2024-05-23T20:26:32.357000 CVE-2022-48672,0,0,608a9f4bbdbfeaa5c234d43ea7d6267c5cfed6a3f49f2f595d741d22e8bb0e69,2024-05-23T20:26:40.327000 CVE-2022-48673,0,0,9605618fa7597ed94995f84a27fb057932599afff122e438d60e99636f587007,2024-05-23T20:26:54.160000 @@ -212107,8 +212107,8 @@ CVE-2022-4868,0,0,49bc3762269009af54870f2860cabd5c2f0372571503d002526079fe993a74 CVE-2022-48681,0,0,87ea3536a125ead12bc84931d58f6cdc8b01f80a07f5daca9e8b795750274574,2024-05-28T12:39:28.377000 CVE-2022-48682,0,0,a9e8566df4d423615eab0842eba8f88c67d4de5de15c1876586d34ed294d4bbf,2024-04-26T12:58:17.720000 CVE-2022-48683,0,0,231318f64008f2f3695ffe0b49c56b82eb9076a10e27c878281bb8e00293e71f,2024-06-12T18:05:40.943000 -CVE-2022-48684,0,0,183793e4ba2f09101fce115e434fee8cb8ff9c6a4ec46d5771edf2b59c69d11d,2024-04-29T12:42:03.667000 -CVE-2022-48685,0,0,ffa3e1d85b1e2d4bd3c19f046cb04890a395016777f2401ecc051ad5f33c92b4,2024-04-29T12:42:03.667000 +CVE-2022-48684,0,1,4f92efa369cdee66d6f53eb185220c289dbd6040fa52ad2a4c427379f363d035,2024-07-03T01:39:07.940000 +CVE-2022-48685,0,1,279d877bd3e5e695339d59d1554a8781d3242fb426a6baf3c7acd095af7bbbff,2024-07-03T01:39:08.670000 CVE-2022-48686,0,0,ee162749a361db1a0b6a353b0eb61f9a34a852517c7d84ecd41264480ae7864b,2024-05-23T20:33:45.640000 CVE-2022-48687,0,0,154cc9d9f32ec8b0f10de1628955ee37a741d3f226440d234da62eb278afefe6,2024-05-23T20:33:49.117000 CVE-2022-48688,0,0,2b696539b728bee97e44de8c598ffc8f476d756e332df2a283fc8a9074238df0,2024-05-23T20:33:54.213000 @@ -212142,7 +212142,7 @@ CVE-2022-48712,0,0,7f76c44302869b6f00ed94de5892f7f01970a82d79ccd50eee5da4bea7bc8 CVE-2022-48713,0,0,e0e0549ab59879cbb734327af4fdc9f7b6dd1cd6bd79e091f961b99d45f15c0e,2024-06-20T12:43:25.663000 CVE-2022-48714,0,0,db2f69cc1e312e4177f489724ad4fa9c96e69547444a07fce0d7dc3a499eb388,2024-06-20T12:43:25.663000 CVE-2022-48715,0,0,a6ec305f45a9ee598bf1b4b4f7f7299343393213f1103818a96d6e9c196ae7cf,2024-06-20T12:43:25.663000 -CVE-2022-48716,0,0,ba2cb258cc1f70e325254de9984fc84cebf37c0c8041603174e7f633bd3dfd1c,2024-06-20T12:43:25.663000 +CVE-2022-48716,0,1,1288d286656db17c43b8e3c9f6eb25225ae1da1a6ef842eb6115eda843ed17f2,2024-07-03T01:39:11.570000 CVE-2022-48717,0,0,6910aeac97ea8633bf534a324a43bbd67a89fcdac70e84d7a71bbb491b133562,2024-06-20T12:43:25.663000 CVE-2022-48718,0,0,88ae2a5bf302e27d45701b50405269347ec972ac17f70c3a964aa6083259d576,2024-06-20T12:43:25.663000 CVE-2022-48719,0,0,b73c2b7473ad37217e5d14f9c429cb8ecb28d51a7f3db8c97f81f5bc54e2d8ae,2024-06-20T12:43:25.663000 @@ -212176,15 +212176,15 @@ CVE-2022-48743,0,0,224e8eecd97805b2f9ed3a1a7a106c45f401d3117d0f950c673ae6520cc3f CVE-2022-48744,0,0,d2c05955465e3b8e9415925d07607f60549adac7e3d69c42ff9aca7a08f31833,2024-06-20T12:43:25.663000 CVE-2022-48745,0,0,fc8f7e9be39a16e544db23aa6e671605c0afa8849222ec4f65ef1ab4b57e6ef6,2024-06-20T12:43:25.663000 CVE-2022-48746,0,0,4c2c8a0183eaa1f7e85f6d29e59aac11b767fc453d74f18ef197b869b8276657,2024-06-20T12:43:25.663000 -CVE-2022-48747,0,0,282a49a9c34b5f4731795689579b98650d519d40e42eaedb4f8f848134106aa4,2024-06-20T12:43:25.663000 -CVE-2022-48748,0,0,4532e8ccdca0ff0b39a222470540fed238d7867797e2fccef2fbc88ef0cf7465,2024-06-20T12:43:25.663000 +CVE-2022-48747,0,1,aa1cb9efcca7c13891b9cc3d8cd2d307d24734d06b6fc90bb25e227010e2f6e5,2024-07-03T01:39:13.487000 +CVE-2022-48748,0,1,8ceaaf6df6e057efbae67972ff0fd4ea5b5ca2de3f69a0edbfbd5849c7be6738,2024-07-03T01:39:14.287000 CVE-2022-48749,0,0,761352292034513a5608df0f864268c681cfef00532bb0c89c6c6daca4c3cf0a,2024-06-20T12:43:25.663000 CVE-2022-4875,0,0,17c44f8ed61133d49317ef236aeaa7add57a954975b984861ea8fa8f275ad9d2,2024-05-17T02:17:00.353000 CVE-2022-48750,0,0,2954a30ebd42f3feefa9c31697eee77cf8030c891f25783907b2257b92befd2c,2024-06-24T16:15:10.050000 CVE-2022-48751,0,0,ccbe45a6f46ea478f6d2103d0c462b7b927be5c05a337aad0597f6ed69e6258f,2024-06-20T12:43:25.663000 CVE-2022-48752,0,0,9d9a185802f3eb156cd507d10d389a1da8eb659638fb3fdf21cc2b4309cd38b5,2024-06-20T12:43:25.663000 CVE-2022-48753,0,0,a394b42b6cf3cc352557e3c8140aa4d7c71463c650867404c296d9fb853db470,2024-06-20T12:43:25.663000 -CVE-2022-48754,0,0,337f3449be64113aaf24de412d4655db674450d28f7fcca4bbf2e4f2d29c93e6,2024-06-20T12:43:25.663000 +CVE-2022-48754,0,1,5e2ca936305382512d4f653834ab56313ed29fa4ae7f0616f9271b8d0d1471f0,2024-07-03T01:39:15.380000 CVE-2022-48755,0,0,e043097107c305ab62672804380f87fe8e1823a16a03476e7a3b134acdab4e4b,2024-06-20T12:43:25.663000 CVE-2022-48756,0,0,106be3f391c228d430dde34032e5497a387c6774288b1de150fa82711b5332d1,2024-06-20T12:43:25.663000 CVE-2022-48757,0,0,14bc9d85b6d03c1c26df1d21dd635873063f0f4981d5674745a75becadb9420b,2024-06-20T12:43:25.663000 @@ -214551,7 +214551,7 @@ CVE-2023-20593,0,0,5b6de142defa5fdef614fce8bcb40ae6fd853b71ac6d4377311c8e23a0560 CVE-2023-20594,0,0,68af9f73e4098f5a776af9e4c8368d3080debc90a065edce379f1acb9c7e36b2,2023-09-22T19:16:57.037000 CVE-2023-20596,0,0,59ef036923cbf266fad48fa96d89a546be40d77f96542f9062d8c725651f0117,2023-11-21T20:28:27.040000 CVE-2023-20597,0,0,721f84d41857e7602f18a6b757c5b59c2a6c524afca0eab0fc8021e64c097d77,2023-09-22T22:35:09.617000 -CVE-2023-20598,0,0,46396794b1edf6ba8e5a399623942ee2233e7053fe34a23034573c90b82af582,2023-10-28T03:31:07.843000 +CVE-2023-20598,0,1,31d1f72ad8044792b59173cbde7edc73795ce9839aa1e20213bbad8dd73bae38,2024-07-03T01:39:18.680000 CVE-2023-2060,0,0,d05b43cf43305f69cfc303ebaf6c0d97d71414bd9d28168d6f5727fb07d9879f,2023-06-16T14:56:47.700000 CVE-2023-20602,0,0,7f6f96d9680c751c9f7f8a01d2d31ed1266c349b188d21b24f87bb74e3d1fb2c,2023-02-14T17:12:33.240000 CVE-2023-20604,0,0,7e236b0b0cab5be01044732f3c5ab4456f07599b4fc463d24aa0004d65fb7e08,2023-02-14T17:16:53.203000 @@ -214887,7 +214887,7 @@ CVE-2023-20934,0,0,2acbf14225086937001483242d6a50b70eeb771481395be7d6797f467c3a0 CVE-2023-20935,0,0,512d3416849c7128f01563da17c85598a24194c1289e85e769d3c6b9ccabcebb,2023-04-25T22:10:16.327000 CVE-2023-20936,0,0,c4edeb13d86be924f1723d1ea7c21a3fae32e4268604a2bc7c2fa4eed6c117e1,2023-03-29T07:35:16.100000 CVE-2023-20937,0,0,b85d7cbebd0e309b7e5e0b2a98791856f7d0d5fe7001a13d315b6198d7be0e23,2023-03-06T19:36:21.957000 -CVE-2023-20938,0,0,e06668deef4b3f2e2800c8f12bbda1295261fa50a99e57cb3f544c20eb0dc909,2023-03-06T19:32:27.957000 +CVE-2023-20938,0,1,dac7f70ff61ebb6aa6f6fe91fdf50017fb068df2b04cae218f049550ea1811ba,2024-07-03T01:39:19.567000 CVE-2023-20939,0,0,e2cee337ede2353f6d99bddf17bed43247628da1ac9370111a6145ca95eb50c9,2023-03-06T19:41:17.620000 CVE-2023-2094,0,0,4f50486f5a209c0a75c963e09ed014e88dc4f5f8247bde94f53bc60c331d7560,2024-05-17T02:22:39.677000 CVE-2023-20940,0,0,bf1d86a4da02a6c965e0578d66035cc5409cc45be3f6be6214ec1da700470af7,2023-03-06T19:40:50.823000 @@ -215233,7 +215233,7 @@ CVE-2023-21263,0,0,6f307de95e3ad8aea972c0afdfa43203d7b9218f92cbf8ef2fc51a0f38bba CVE-2023-21264,0,0,17b22bd5a1758c89932ff426dfb16f5c70f19f90be0c0908b3ea624d7a59c1bb,2023-08-24T15:31:45.313000 CVE-2023-21265,0,0,6778af06e4047b0ed9b4c2e3fd1624630e2c10c35875be23f62fa37b56697ad6,2023-08-24T15:09:04.043000 CVE-2023-21266,0,0,6325982ba6ca9d5e043598097cea55a18e3f2ca76153e5b78fc645f130bc243b,2023-10-11T18:25:58.667000 -CVE-2023-21267,0,0,9dd0b7bb6609ce1446963524ac6943f0ed10a28814d38939e8fb043d0db7f3c4,2024-05-07T21:15:07.873000 +CVE-2023-21267,0,1,228f6f7596b6cb97274c6123e77ddff3343b22ba18b10a96e2055db9bcead853,2024-07-03T01:39:20.417000 CVE-2023-21268,0,0,e79ff45500f753574c74f6deed9441a450540bd6fc2c735be33819b8962c19f5,2023-11-15T02:55:56.537000 CVE-2023-21269,0,0,7912f0830bb08f735151395b5e169a8adf1e7843f52d1970a2fcc74002cecc61,2023-08-24T15:07:31.833000 CVE-2023-21271,0,0,5b48b78812b670c16202b60708d06b257460b892e78c6d2ed0c42d8a8dfe3e92,2023-08-18T19:54:05.827000 @@ -216433,7 +216433,7 @@ CVE-2023-22523,0,0,769b5f78540ec921fbf74ad89cd6bee0a4a017c6196bbc875d9518dde1767 CVE-2023-22524,0,0,e9fb68c09c50c346eb4d2dc5fdeae5d57f89100980b6b1cca2f61a16b42266ad,2023-12-11T15:14:40.480000 CVE-2023-22525,0,0,d96d1084aef9c25cf9b18732ab149a62a3ae25d305b8aaba4a77302d2b1a84ef,2024-01-16T18:15:09.257000 CVE-2023-22526,0,0,bb9a292063898e8d55e8feb8a20e6814318ba665de441d31be5b07d5bf4d4d3a,2024-01-22T14:52:22.780000 -CVE-2023-22527,0,0,9ae0e2b1b6eaf63bcda822653fcb798c7cb2b420381fc2f6432d1673e7afc971,2024-06-10T16:10:53.183000 +CVE-2023-22527,0,1,cd7d80e7197119c14610367cd820b40cfbdabd4ab6d0b0d0dc0ee550ee54b359,2024-07-03T01:39:25.327000 CVE-2023-2253,0,0,1c8bf38d2b14c2db8de319269a780fd14b6399082e4985b9addd463e2b2470e1,2023-06-29T16:15:09.677000 CVE-2023-2254,0,0,522df819919c4502ad5f10a9de519964085e7b1ba533755e7e903e2853d4e13e,2023-11-07T04:12:16.740000 CVE-2023-2255,0,0,e724c0cc5a73e96de8356a9bd84568eab663ccfa21c122b777c5fe7043a22cf7,2023-11-26T09:15:45.077000 @@ -216515,7 +216515,7 @@ CVE-2023-22652,0,0,22b310772038f08a4e58450ff2cc11ade814694d9e643598182c60a0305bc CVE-2023-22653,0,0,9db7cdbfdf0619b166218142000b543e6474f266e8aa2df68ce9199cba92901b,2023-08-02T15:34:59.683000 CVE-2023-22654,0,0,170dca4af8a053abb14c59bade8c81c32603404d528c2babdac78d55367964dc,2023-05-30T22:22:43.403000 CVE-2023-22655,0,0,1dc704fae6b6099bc993cff4aa0686f77ab8c6bf7ae2328cf1e76079b53178ac,2024-05-04T16:15:14.887000 -CVE-2023-22656,0,0,63fe2e73ee68810c7ad15a481155dd3a673cb4fbfc609a71302512d8206e33d5,2024-05-17T18:36:31.297000 +CVE-2023-22656,0,1,13fd713a3e9ab2b67c43394a4a250c8506512fa2422b7f30fa1cb4633f19c38f,2024-07-03T01:39:26.087000 CVE-2023-22657,0,0,50aba77e7826f44f75fd8eca9cdefd06087e1b24472024d8ed2ae2967b0f87b1,2023-11-07T04:07:12.750000 CVE-2023-22659,0,0,71d1f10cbb6b53df610f190613167a6c75fa7f817c0f72a1094380595ddd5133,2023-07-13T17:17:26.230000 CVE-2023-2266,0,0,efd39beec0972f4ca6c4e4c2a91a0e0977c9d5cb369dcbe4c78cac976909f512,2023-12-06T00:35:24.197000 @@ -216772,7 +216772,7 @@ CVE-2023-2293,0,0,90ed5899f096be71c2b9ad576c51076dec3c12793695a6938bd11a33d4695c CVE-2023-22931,0,0,46bc66829d61883c5057f64f21605777d9e87cfb4a2b30c2c5c12c7500d2f49b,2024-04-10T01:15:09.737000 CVE-2023-22932,0,0,b6ee3456f6313710215fcacb19ac1865c7f5003b27a62beee218db769a7a8518,2024-04-10T01:15:10.877000 CVE-2023-22933,0,0,22ae54461aa7534c3058ab19cdc73a183f8d11b4cebdbb4a1d5c47caaa0ba97e,2024-04-10T01:15:11.057000 -CVE-2023-22934,0,0,ed0a750c9ccf35a8b08ab0dd3fbc04b8cab08e67147ed3a9cfbdd2469dbd10f4,2024-04-10T01:15:11.233000 +CVE-2023-22934,0,1,e7ca70d3df1ad016b2f95cc43f4439f28d6e82ecac77e1039c74e2947a90b0dd,2024-07-03T01:39:27.173000 CVE-2023-22935,0,0,c015ee59dfc1edf910d0d33433ae3de9abbb6c4d94a575ed1d231eb40b62f243,2024-04-10T01:15:11.420000 CVE-2023-22936,0,0,46bdd185f80984858e0fefcdf343e9826d24551c041a6a62cadb33df32caa7d1,2024-04-10T01:15:11.613000 CVE-2023-22937,0,0,0ed45c248b0a8a3dde3de032045e875a57f1c143b175fc7b69cc1012e0c7ac46,2024-04-10T01:15:11.810000 @@ -216834,7 +216834,7 @@ CVE-2023-23011,0,0,018eae1babbb9f2575e2bc66b7b0c0358528b7342bfaa1b0900133b447e61 CVE-2023-23012,0,0,cf53a65480831197f15ac2005c38528d1a518c72abb109a549aa43b322009bb0,2023-01-28T03:44:45.493000 CVE-2023-23014,0,0,90de8138a5539a8213b0fcac2e4ea28a7c14d1f646cc6e26745084a133c174fa,2023-01-28T02:47:30.483000 CVE-2023-23015,0,0,507ea8aee7739fe155c6977fc3a2011efbd5d31c42ad0211a9416462e62eb1ab,2023-01-26T18:59:21.923000 -CVE-2023-23019,0,0,a9b515b707dfba6aa5e01257ee100a17a9d6063b08feb5d008752faf704032fd,2024-05-01T19:50:25.633000 +CVE-2023-23019,0,1,cf38fada7abd9875f16ec87b5afd92c33c36dbfcaea5a39ec2c7599eccf79b77,2024-07-03T01:39:28.063000 CVE-2023-2302,0,0,9409bd460b4682723c7a4466f5c5d56baec6cae34a6c2de0eb52e1235b15d474,2023-11-07T04:12:22.047000 CVE-2023-23021,0,0,6a7e169d021c19bbb75009f231c12a643001e2553d96e2e5ff324076b043a50f,2024-05-01T19:50:25.633000 CVE-2023-23022,0,0,0ea61fa1ed3ef98b535474e43831625beb1e2df8f29f2db9ee1849d63cd76552,2024-05-01T19:50:25.633000 @@ -217502,7 +217502,7 @@ CVE-2023-2392,0,0,fa218e7012e2b910d0c9a566576aac1b7f67fc91d1b959196a9e2e49aefbdd CVE-2023-23920,0,0,607c4f550d0260c2c398f7d8014f1121f94cb7d04b027b4bef4e787241dafb94,2023-05-03T04:15:09.413000 CVE-2023-23921,0,0,2fff7086333fefa79735fb6cd6cf832ff997abaebcd86506b91977634aa8f7d5,2023-02-28T19:07:06.573000 CVE-2023-23922,0,0,3cc1884b754bc1d301fc4dc78858cf0a2ad1bda68b0f72bdbce929789298962e,2023-02-28T19:08:14.307000 -CVE-2023-23923,0,0,b9f5a979fcdc9d2ef8095e423a4e2a3473e782ac524fc99f818ad8279809cba9,2023-02-28T19:17:27.487000 +CVE-2023-23923,0,1,9d569ac6640ca0d6bada54235b3a091ebfb755e420eb641890bd31e75110f8aa,2024-07-03T01:39:31.063000 CVE-2023-23924,0,0,f80f6bf2b804de6a29ba3eb8bd4e57ae0efefd866c709cd87ca6ff404acb85c0,2023-11-07T04:08:06.033000 CVE-2023-23925,0,0,14c910b59eeed5110caa0488ff60d7e78fa86d97a5696fecefb70f6233224d33,2023-11-07T04:08:06.150000 CVE-2023-23926,0,0,fc15285352dc58675376a0af026e7e06cbe5a7d3f9f4bb389dfd37ee02dc6460,2023-04-14T21:15:08.047000 @@ -217629,7 +217629,7 @@ CVE-2023-2406,0,0,8010042360768bfa7f244c60d934f6bc2326f62c428aae45cb4dc2d3e34f17 CVE-2023-24060,0,0,01b6d6e3850cffe381340593024dccef7ff6262229e563587a91fe67d8e5fc30,2023-02-07T19:13:09.287000 CVE-2023-24065,0,0,b5bd81be3a9f81444344b4cd5fe7d695c9b5ca21605a255f7ae1c70d0fdc8eee,2023-02-07T17:29:25.500000 CVE-2023-24068,0,0,87a0f89fc247dc12889574fbec0208c1b7c8de682dfdbdc8ae9050adb740379f,2024-05-17T02:20:11.750000 -CVE-2023-24069,0,0,ffaa7c379614ba320aacefe71f9461db6d256194d1181636bd7620007fe5ed8a,2024-06-04T19:17:23.460000 +CVE-2023-24069,0,1,8f270c3ae7ca33578a655692c7011772d08c02696b3e1ad234870d150ca3a2b0,2024-07-03T01:39:32.413000 CVE-2023-2407,0,0,9fcb68551278985b18635d6fb7080fb1ff13872b42fcde02f56cb3c9cab816a5,2023-11-07T04:12:37.020000 CVE-2023-24070,0,0,413ce1aea8abd070ae219722fd1507035c56bfbee289aee775c9118e2adeb4ad,2024-01-09T02:55:33.710000 CVE-2023-24078,0,0,022e8409c67ca786cf3765e8d856e82b1266d66ca0e0a832f619fd63e32cf1a5,2023-07-04T17:15:10.567000 @@ -218635,7 +218635,7 @@ CVE-2023-25392,0,0,6bc4e2db2d4228b1d1a5ccca42fecfc848ef2f401416e096ab51aa4690452 CVE-2023-25394,0,0,aeeb3beb31cb6d41866e902f7427c2f284244ed76c778e848400393c878d178b,2023-08-28T18:15:08.750000 CVE-2023-25395,0,0,c0633b7a10c9a54745d78a021db1c674ebbd0932c411b6d0ca2875ccb4fd90ec,2024-03-08T14:15:52.223000 CVE-2023-25396,0,0,ceb39b67a169d82252bfa90ee34f431530d6902dcc01e0f21c05a3deb46ac9fb,2023-02-18T21:21:51.837000 -CVE-2023-25399,0,0,4886df79f589ce0358eddc48c1febb4bffd0f923912e64bd940c99861ca22ba0,2024-06-04T19:17:24.313000 +CVE-2023-25399,0,1,599a2cac22213c6cf08929681bd7fad1d9ed406963031cd88e514afbe115be3d,2024-07-03T01:39:35.733000 CVE-2023-2540,0,0,287e5d9e2e4863b70bfb3b3dff9968760f9f15d98726eada48eb332830375131,2023-11-07T04:12:51.453000 CVE-2023-25402,0,0,01e03b04633651a61f687b61ffd6eb65827e82e1dc3abf91e108b855dbbb97e9,2023-03-10T15:00:34.830000 CVE-2023-25403,0,0,8f26f71dea1a17ec4b38737fe8b6f5eeb1dac06953aa392885dcc8c2b2c5b2a1,2023-03-10T15:02:24.733000 @@ -219300,7 +219300,7 @@ CVE-2023-26126,0,0,67dcdc1a3cc3fc8902e9ba54f6954a17abc89ceda99c0cc113cd591c90812 CVE-2023-26127,0,0,6236517c369a07149faee2a6aab63f4a59cccc8ec9a5d851123c6fef17702c72,2023-11-07T04:09:24.477000 CVE-2023-26128,0,0,a4880daee1bfa268b9583d67005a6ffeccf642e95c41bc32cb205befed5deb09,2023-11-07T04:09:24.700000 CVE-2023-26129,0,0,20bc9cb4312699827e73da7bf77ae453e81c62726f54f4c5cd6c40e6f103a8fc,2023-11-07T04:09:24.900000 -CVE-2023-26130,0,0,7304a8a2b23cfdb4f195343eb2fd8a318578c83b3848ca31221d7d54c0d4c756,2024-05-02T03:15:14.767000 +CVE-2023-26130,0,1,33eb095272f3a00a8da36d798cbd7743c68666063dea7de8a55edfb909e77da9,2024-07-03T01:39:37.680000 CVE-2023-26131,0,0,14c2413b019a28dbfebe3045b3b81ccd0832fa2f5d0205be699df65a92b1bbdc,2023-11-07T04:09:25.290000 CVE-2023-26132,0,0,f0ea5935c5598d1eb4dddaa3267dcfd5bbb4104bfb3ed080792a7a1004f1f4fa,2023-11-07T04:09:25.510000 CVE-2023-26133,0,0,54e487f52c66a8dcca22566f37bb763d4495864419103360faef064bfe0dc6ca,2023-11-07T04:09:25.713000 @@ -219675,7 +219675,7 @@ CVE-2023-26560,0,0,a6056c56d1a67b9faac17b08ec372723c0882d09ee778f501af40dc67b21d CVE-2023-26562,0,0,bf06cbf1982e6d2ee72b482e135500e7e04aad75268b60cda6cc50d8a161b1d1,2024-02-13T18:23:02.393000 CVE-2023-26563,0,0,ad337a389517e66055efff6190bc1e8f38a6961c1d2790692ca3811e579f5956,2023-07-26T16:23:15.603000 CVE-2023-26564,0,0,1b69f8be4ab3ee18a8f5ea1183aee85cb0648110440bac6ce87e29813b2b1bad,2023-07-26T13:58:32.947000 -CVE-2023-26566,0,0,36d62915102b590bcaf7ac3b980d760555efd11e6000420e3b6bfe56b786a113,2024-05-14T16:13:02.773000 +CVE-2023-26566,0,1,ae4ea3cf14a7d506042dd39ffbc958f2d012f8a28764a157d6db66e3943cac77,2024-07-03T01:39:39.010000 CVE-2023-26567,0,0,df71d619d6f301d6a9a0dcbbb5904b098ad848dca9fadc7d8d8c9f3fa26a1124,2023-05-05T15:10:19.097000 CVE-2023-26568,0,0,4e7571fb9340e4d0ff3ccb59f0a39dffa3a953316f51c0dbf5f863bc7f00ec4d,2023-10-28T03:20:16.467000 CVE-2023-26569,0,0,fd8fe37fe1f3f9c35e7883c9ff05eaf80ed9b33910b14583243f0f337f44cc71,2023-10-28T03:20:20.530000 @@ -219714,7 +219714,7 @@ CVE-2023-2660,0,0,616af0a832795a9379a99070b85161ed993a8f9425dfa646ec02d8e99104a5 CVE-2023-26600,0,0,082a5a40003457cdcb9bc982343b3a43f4debaf37f4262b90b97fef94c96e25d,2023-03-13T17:47:33.683000 CVE-2023-26601,0,0,7b674f2a8e2bec159e58ffb9e220bc037e134be1a5263b6a67b4cdd33b3e5bbf,2023-03-13T17:44:45.677000 CVE-2023-26602,0,0,6c6999eaefa6818056578b112ce02b6e82b18dba81dc757925a9d9664e372103,2023-03-07T19:07:11.717000 -CVE-2023-26603,0,0,992326f42a5a8c19baf90372d20e87fc38d5ed50e586e3658f330b96f16a9014,2024-04-29T12:42:03.667000 +CVE-2023-26603,0,1,b5920fdafc985390fa2a544b4145e41cd5f87293e4072c9665e851a235b399e1,2024-07-03T01:39:39.820000 CVE-2023-26604,0,0,2d88cec2d1d9a7d4a604fb7583adb4176010b0268b5fda597e93dfff8baa2e94,2023-11-07T04:09:41.293000 CVE-2023-26605,0,0,f1d913142ac1d44bc49e2d7d4cb638ad0dbe7ae96775e3b7bd85f589841ca0ce,2024-03-25T01:15:53.723000 CVE-2023-26606,0,0,a1bb89d315dd684fae3bae228622f2bc2356ffe1fa611816e008ca9f62fab2a2,2024-03-25T01:15:53.793000 @@ -219768,7 +219768,7 @@ CVE-2023-26784,0,0,580edc347dec56e62d9aaf0ace6272579bbb199a51ed99d83bd1986a745d3 CVE-2023-26788,0,0,8921f7bfea8679f71dfe8d97c9c14d11dec79d275d2668afcb8098a3ac1c90b5,2023-04-14T03:53:02.843000 CVE-2023-26789,0,0,dd86748eba18e304041d525b8ca38b3dc310acbfcf00a7db85c58214f973c99f,2023-04-11T14:46:38.527000 CVE-2023-2679,0,0,7f2fb551eec22f8dfaba64b9fdfaae1ad50ddd9717d1bbbb9f2d45080e4f7cad,2023-05-25T19:38:25.710000 -CVE-2023-26793,0,0,bd0cd52f38660d1ba910bb6f55d766a91c3876eb744b6e4bda9c2f766cffd74e,2024-05-01T19:50:25.633000 +CVE-2023-26793,0,1,dad66677bdb4946ac25c0d7162367136f0a4fc78e85166bb9b3fb95ccff5ebba,2024-07-03T01:39:40.663000 CVE-2023-2680,0,0,8007f22dd00dba59e0b8ff60387f782fdb1f81129a9a8240af19ed80f1da9255,2023-12-28T16:23:09.520000 CVE-2023-26800,0,0,a3636a9c3d747dc8b9e77d2149e12dca633b8eb0697221b400831704c945ed76,2023-04-03T16:33:09.653000 CVE-2023-26801,0,0,c8bf4717f80195da472a540a631ed15f9fc85384e66fc13b058e6991994f19cd,2023-04-03T16:39:03.460000 @@ -220003,7 +220003,7 @@ CVE-2023-27191,0,0,477aca0a6fbad7a9b6b8cfb3fd7814efe37d01994d9cdcb9e4be1ffefe053 CVE-2023-27192,0,0,0b3ee194d607d5bc569bb6bb55a4f5b7387018214e2c4fdb3a0f317a0cebf696,2023-04-20T19:46:04.170000 CVE-2023-27193,0,0,927dfa147c5f81e8f1217f2eca503f81af97abfbd4c06cae83b7cf4e9d35d7a0,2023-04-22T02:00:45.180000 CVE-2023-27197,0,0,226c36fe3af1ef2b1cf32df131f3aaf9429c7056ad14b70bd1d806965d553e91,2024-04-23T14:15:08.123000 -CVE-2023-27198,0,0,99d3581f7e31609c49bb781586efd00cb8967310b06b598a951fcb3272673438,2024-04-23T14:15:08.220000 +CVE-2023-27198,0,1,d7c5d99d6e1c2d2350e3e97ed6cdfbc824dd778955fb5505c7385cdd6dd3931d,2024-07-03T01:39:41.580000 CVE-2023-27199,0,0,07b800e4b3335089249efd966457be92e06d87fe41cd8f4219430dcc44529576,2024-04-23T14:15:08.290000 CVE-2023-27202,0,0,77bc334449af3c3c3034fe35b90a515fac6bc4198ea6906ef099d5106f8f4f3f,2023-03-13T03:51:33.370000 CVE-2023-27203,0,0,dda9e6f0ca6de99d481d7af1e28f518aa426e6be8182cb98d6abf027219d2d86,2023-03-13T03:51:39.573000 @@ -220335,7 +220335,7 @@ CVE-2023-27558,0,0,87ba6982de7c378f24f0e65891bf0ec6161ebd1a5c42c8ca4207593b916e2 CVE-2023-27559,0,0,e5c755de156a10d97aca0977943e22afb069004cc308a9d0638ce362e4ca2253,2024-02-01T14:09:30.907000 CVE-2023-2756,0,0,477770fab46dba9894293194aab78a779bface6cb65c11dbd1b59ebe2d50d5da,2023-05-25T19:15:29.773000 CVE-2023-27560,0,0,fd169f13a98d8e7156ba713cd8b4c730d64b4d7a144c1024928abe78d476c50c,2023-03-10T18:54:55.587000 -CVE-2023-27561,0,0,5851910c830e0c623fbd8c64cbd2e6cc8d795bc706d59df548dd3e42bd9848a6,2023-11-07T04:09:59.443000 +CVE-2023-27561,0,1,4d0c127d91cefb6ee7c7f597a55a913b57e532ecaa8ded522d8b5c1a48efc91b,2024-07-03T01:39:46.513000 CVE-2023-27562,0,0,521a7d91c666d328719fa314d653b912626a17c1d95076820a3a5ef2f7d04e13,2023-06-22T15:15:12.007000 CVE-2023-27563,0,0,e4f59cd6829f50ab4c1a2a3645a8220769aaf80c58a1f20c42dc626b11fa626d,2023-06-22T15:15:12.123000 CVE-2023-27564,0,0,46e8539d291bd709c23ace021720193f98ada68d416e1f1629df33fa0f718134,2023-06-22T15:15:12.233000 @@ -221002,13 +221002,13 @@ CVE-2023-28325,0,0,318eece509ac20d5f8b78db5fc12b0752e9b55331a135f3402c370a6ba1b2 CVE-2023-28326,0,0,fc0e72e80c7a90dc1906d35b5db8acf653727ea0915e43a265ecf21af438a885,2023-11-07T04:10:28.880000 CVE-2023-28327,0,0,ccbad673b3596eab7db0da04f3246089fe9386f352f279a45d86580009650c97,2023-04-29T03:12:41.973000 CVE-2023-28328,0,0,24b169db9e51755735a9ba30848459b46dbae25eda16eba92079096dbc90763a,2023-05-03T14:15:33.387000 -CVE-2023-28329,0,0,10795024949c1df0208813522afb0cf66dcc049e61c8d066096d72b7bf7a0443,2024-04-19T14:15:08.937000 +CVE-2023-28329,0,1,14bd1237be8c834d2b6903d2022400762656c030012fd364a4d4901ffcc904ce,2024-07-03T01:39:49.640000 CVE-2023-2833,0,0,4480446c7e0fc380df441064c602d6824d10cf502a5dc1c96156d858d8eba7a4,2023-11-07T04:13:24.363000 -CVE-2023-28330,0,0,01a8e26ac9e1ae6c34784e6eec3b0abdd0b108edb202adf2958c98deb4e73c57,2024-04-19T14:15:09.017000 +CVE-2023-28330,0,1,485bb14092005ab577833121758bce3d161c59a95731b9926f9cccad1c6a7419,2024-07-03T01:39:49.903000 CVE-2023-28331,0,0,26c0ff3ccaabba628aef9726dfdb1352af4a09f863b0a657a20c78cd65328211,2024-04-19T14:15:09.107000 CVE-2023-28332,0,0,3a089716c48f0f690ccc5e4bbceaa12486294da2ed19b74c2d5b1b003b856915,2024-04-19T14:15:09.180000 -CVE-2023-28333,0,0,80a6ed9d6779069d3b583ccd35f936c2cdb24503d9cfe0fce51fce98a7043533,2024-04-19T14:15:09.250000 -CVE-2023-28334,0,0,090287bf1644fdfe8e205349b278bd85049a553a8c7c12f85292f136aec28115,2024-04-19T14:15:09.330000 +CVE-2023-28333,0,1,cdd263ba73d39d67e43868153b27be67dc38b67123627c36c2edd1ed5a4ea9ea,2024-07-03T01:39:50.127000 +CVE-2023-28334,0,1,b8e2746a8d95ae9d870b8bd6563ee5705d5f350051dfd63dfa2b03f76983c976,2024-07-03T01:39:50.350000 CVE-2023-28335,0,0,a76a647c3a844572ec79d08d95cbc1bd15a530ae1464b638c819080c2b8c0361,2024-04-19T14:15:09.407000 CVE-2023-28336,0,0,a90e3c55e85603912f0d313aa52a80a12b40919a15337b020741ea87b001c767,2024-04-19T14:15:09.473000 CVE-2023-28337,0,0,ce6cf9b0f4b2f263d82dfa1955780cbb836c45f4e38b6cc688b91539c97068ca,2023-03-21T17:40:15.477000 @@ -221058,7 +221058,7 @@ CVE-2023-2838,0,0,d3f6bff56a0380017bb64083ce207cbf5ae73d2f953c61492b83c6eb6a6d11 CVE-2023-28380,0,0,e67e440890fbe92eed00af11bb09e03fed9e6cba9f7525e0039ffc2e9df791e0,2023-11-07T04:10:32.717000 CVE-2023-28381,0,0,3711242bc6f37d6bb3bf39d64693075fb47d3a6dd68df7daade1ecc1bbaaabed,2023-10-18T15:00:34.063000 CVE-2023-28382,0,0,abfb1a49fcabd3c433774b84f11f31c969bb74a05179f46725f71802a61a1f94,2023-06-01T19:20:13.567000 -CVE-2023-28383,0,0,5c3d06cfbac5a8f315de39b5ce5e12c557afa33df26d5f6f40322f9160f25404,2024-05-17T18:36:31.297000 +CVE-2023-28383,0,1,e268f46c52c7dc2f4e894bd60f23419b5adfd4cb0803cf31a4c8c763ead02cf4,2024-07-03T01:39:50.563000 CVE-2023-28384,0,0,94e7b4fc7052325fd40e4636abf68c1e150c0e282d640bb0f9741e05f148f548,2023-11-07T04:10:32.950000 CVE-2023-28385,0,0,fe688d9c8edfac14337b53cfe5693cc7d336a9e23c7854b02e76a9a521a9bec2,2023-11-07T04:10:33.120000 CVE-2023-28386,0,0,30711d5d97d42fb2f8fa351b20a53febbae618d2e8b6bef84760e4a2849772fd,2023-05-27T01:59:16.440000 @@ -221526,7 +221526,7 @@ CVE-2023-28858,0,0,011df0bac04bc87df95994c1b3e55ca3cc5b885a4113b222fc3b46e56f821 CVE-2023-28859,0,0,dd925f6241e4a2be83ea00a786ba6fc5299cfcc8d994f716e443cf718cd5da8b,2023-05-17T17:08:20.883000 CVE-2023-2886,0,0,3aaac5483bfb19901fa58891c6e5a468993f3db4f1bf125792f15c949845c790,2023-11-02T01:46:01.450000 CVE-2023-28862,0,0,170dd9ccbe35ded0e1ff5303e569e23ec7bc3359084c857e1571367bc52605fb,2023-07-14T13:15:09.167000 -CVE-2023-28863,0,0,5b9f6fbc49f2f72646c4fcd6c4f998c30afe581009e0a2d13f18b190180ee464,2024-04-30T19:15:22.867000 +CVE-2023-28863,0,1,47766741f1006ac4798c9ff9c0198c57e84673376f14da345580715999ec1335,2024-07-03T01:39:52.190000 CVE-2023-28864,0,0,b53b9a31e04a18ab26a92d23614ce8825a553be82d95a49cad787677dc09aa8b,2023-07-27T03:47:50.647000 CVE-2023-28866,0,0,7b5ab9a9fd3d718e917316e0046a608e2f5cdf5b502da99441c79802e834fd00,2023-11-07T04:10:55.740000 CVE-2023-28867,0,0,11ed3f93d6faa0d51c3a1b27a8fdcb70e828388dc5f52ca5e989f587124ec7bf,2023-04-03T14:01:07.433000 @@ -222531,7 +222531,7 @@ CVE-2023-30380,0,0,cd9fa796d3c04fde94050bc709ac25e6b3019c8e392c0177ae52fecd76fd4 CVE-2023-30382,0,0,0cff4c021d70d3c623ea73cf13122731f9972bc0fbe1eb7a6d613fe90d399187,2023-05-31T17:19:05.437000 CVE-2023-30383,0,0,1f41f027a76f4b84394d324b506f65bf20ad7b31d7ae79c51f9b5d83365abec9,2023-11-07T04:13:41.537000 CVE-2023-3039,0,0,02805a9efc8a54732f6271aa90d956cf59d7c9138dd3feaed49a24014a9d4e56,2023-09-15T16:34:33.573000 -CVE-2023-30394,0,0,093eb00cd100b18376dae2ec6db91c4bbd042b64ac4548337d3dfc08ce21c165,2024-05-24T17:15:45.210000 +CVE-2023-30394,0,1,b61d3fb492bce0d1de679771cf6508ff610a45a4544b26a6122f8a133861a9a4,2024-07-03T01:39:54.553000 CVE-2023-30399,0,0,7447a8c0b487419c48fed9e0da2534db0a292327146c9ccaddf77dee5fb4a442,2023-05-12T17:38:01.150000 CVE-2023-3040,0,0,b52f890f4a60e4f7728aac16550f4fdaf6d93f94b2a81685a9a25b3b1dd04f14,2023-06-28T19:16:52.077000 CVE-2023-30400,0,0,a87a8904964e9d08439aa29fc6cd52be4a78fb77dafeb52e8159f3a295ce4dfb,2023-06-21T14:49:43.397000 @@ -223610,7 +223610,7 @@ CVE-2023-31871,0,0,e85dcda49c93d9576127e7f0280dfcf3a99945dec60cb03b4fab3294bda76 CVE-2023-31873,0,0,b7641dae267be1760a099006461d04c0323149c27d54f0210125b783abb8f528,2023-06-02T03:13:03.820000 CVE-2023-31874,0,0,43a20b383c5faa3696ee91708a9efd2421628ef474f0d749d6aa5b75f8454336,2023-06-03T04:09:10.037000 CVE-2023-3188,0,0,65b1cba06578fe27623cfa3d3ff37b4c1fa034a01a3a81d964ec59f80261a82c,2023-06-16T03:47:37.890000 -CVE-2023-31889,0,0,7852057321977ac36abd568ccc64d97962ef30db2284cc9b0bebb9e24a3974c3,2024-04-30T13:11:16.690000 +CVE-2023-31889,0,1,8da7943f2303142f20a0c6e6b858bccb074c327803ea0c0283b81ea0d271b17b,2024-07-03T01:39:56.557000 CVE-2023-3189,0,0,7f2a1889cfe0e18660c5ab913f6b063d1d020fa4f01a83643f3f0efddae7f3fa,2024-05-17T02:27:20.717000 CVE-2023-31890,0,0,b6df4f97f276ae2e26e07a832095a8ad1d8a6a8ee131b9381fca9a6c45ca7e7e,2023-05-25T00:31:04.963000 CVE-2023-31893,0,0,5829804df8bf5b2e83c79de7482c34b562d10eb37e29e09770e92e07a2e6fdc2,2023-11-07T04:14:25.490000 @@ -223657,7 +223657,7 @@ CVE-2023-3195,0,0,98bcbad71228d6a709f23c4d92ccf2d260cb35c034c1df4d0e26ba09d444f1 CVE-2023-3196,0,0,12b464f18c4bbf1f0de5b734fccde2168245c9ff981689115c68acc7124ee134,2023-10-05T00:56:33.370000 CVE-2023-3197,0,0,dc7336628eacaf5d546f45114ef9de166606a6b8b1e7ed968a183731613169c9,2023-11-07T04:18:11.597000 CVE-2023-31972,0,0,0634e842df15555134fd3d77f69c296317b288d60194b74716a50d640fd7d816,2024-05-17T02:24:05.100000 -CVE-2023-31973,0,0,3415bc391001120acf21c476ca44095a90745177c0a4904b31f1a17cbc9be9af,2024-06-04T19:17:27.633000 +CVE-2023-31973,0,1,f135b1929fd5bbe94ca4d4658a784de17b324310975ce587282d439c5c40a50e,2024-07-03T01:39:57.370000 CVE-2023-31974,0,0,9e8decaf2171aaf1bb8736e0d21aaaea87aa9184c68eed56bde1b4df1a38b390,2024-05-17T02:24:05.283000 CVE-2023-31975,0,0,4bffdd046d581c41bd97194808228f804a1e498cd45aff984930626311de3599,2024-05-17T02:24:05.370000 CVE-2023-31976,0,0,9353ec59b03aa0b4f98f53ddbda87329ad4d82bffa6f2304806ebe725a144db2,2023-05-16T15:21:24.530000 @@ -224380,7 +224380,7 @@ CVE-2023-32709,0,0,3f7707e06634e7bfe62f9f7d54349bfd4843588b5f0db0190bffc311dea51 CVE-2023-3271,0,0,a7af40c7c7c2bfaf4b93cedd905cdc7dbf7db087eb0a0dc81f6fd07c52dc7a6c,2023-07-19T17:16:17.150000 CVE-2023-32710,0,0,628e7939bf4968b78fffd579b28064f148933d851580d7f4015ca703c0f8e33e,2024-04-10T01:15:13.780000 CVE-2023-32711,0,0,fb68dc5a419f35a409ec707e4cd0de625d4cdf04a8f3db918fae0158310e2792,2024-04-10T01:15:13.947000 -CVE-2023-32712,0,0,91476afa1412cdfda7ff45add093ad44c917229d9100d963144bf03a90324a00,2024-04-10T01:15:14.110000 +CVE-2023-32712,0,1,49c6ab0a9fb7ef30eb7f4c7b17aea24232fcbdcc776dd11cf968e303baa52e2e,2024-07-03T01:40:03.950000 CVE-2023-32713,0,0,fcbbed6e5672e207edbf5278c99133c26b2d7171931e1e3018ff7b79b459e4b8,2024-04-10T01:15:14.347000 CVE-2023-32714,0,0,1052dcceaab36634ea2982e418448d2a705d5c8b21354300f9562c8998382631,2024-04-10T01:15:14.490000 CVE-2023-32715,0,0,a09d82568b0f9ddcd495a32a98977421390abd28a07292b2acba608d880e0925,2024-04-10T01:15:14.637000 @@ -224541,7 +224541,7 @@ CVE-2023-32886,0,0,a1e0e6e35a82474801d01fee00ed7b713b76cb490c9e009a01e021dd350dc CVE-2023-32887,0,0,48abfa29f65ba36268ecb2732df23027db92d23ebae32c0977ef469c44d687f7,2024-01-05T12:13:33.227000 CVE-2023-32888,0,0,bedec17a23698ccdadb336abf8b29d54162af8ad914a562ab7359fcf8148445a,2024-01-05T12:13:38.553000 CVE-2023-32889,0,0,7cb67259e9340438e5c911944c46393c49874c183ab4a4642ae61b61abc60ead,2024-01-05T12:13:41.860000 -CVE-2023-32890,0,0,10a3fddb39cbdd3377312fb553ca005e7d07be302f9a4671ee902c2993565801,2024-04-01T03:15:07.630000 +CVE-2023-32890,0,1,eb304c24f18daac453bd54f93398acdc8265ac647e9c71261cf092befb74da5d,2024-07-03T01:40:05.030000 CVE-2023-32891,0,0,09eecc819ceaf3608a4419e7e5b09cb8d1608302b5880d0698c2eca4637b514e,2024-01-05T12:13:46.007000 CVE-2023-3291,0,0,50ba92d440169e058cabf8272524addfce3b26587de2ca01da6efdc860fd0a1f,2023-07-15T04:15:12.797000 CVE-2023-3292,0,0,3bc36b7adaaa0f48e8f0a081da821bfcf4bfcb185d07c41948cb64a3f47d3581,2023-11-07T04:18:24.753000 @@ -224987,7 +224987,7 @@ CVE-2023-33461,0,0,7a2b014463bbd34f475410ed0ac5de990384aae621e78afc444dffec48dfa CVE-2023-33466,0,0,edb400e1765c8e049d90fabaabe681d7a3f1799525c77d9b7167542116dbab9c,2023-09-12T11:15:07.650000 CVE-2023-33468,0,0,d9e4dab7978126c8da945b9754e1c87cd2541aea620924504d1a3e6d84fa8f27,2023-08-16T18:03:44.977000 CVE-2023-33469,0,0,387b19c0d50f438ab4dc1ed606512c9de33f04198989847c56b1073a99f44fdf,2023-08-17T01:40:13.813000 -CVE-2023-3347,0,0,9d004dc0e2be83fb431274d5262bfbe2e966cdf82d3f13d64620a48f4aba697e,2023-08-15T04:15:11.833000 +CVE-2023-3347,0,1,a723926bed15f7839c499a6cc8847a6e0b8aed6868ff9adee3647f2061979db2,2024-07-03T01:41:00.823000 CVE-2023-33472,0,0,6523bc76d6a00e38e259d21aca93d03253a0f102234024bde438d0d36d5a1858,2024-01-22T19:21:10.370000 CVE-2023-33476,0,0,9e4822aebccc19652dca83ddabc6a1cae3f3bac23653324d76ea4b6817a8903c,2023-11-25T11:15:16.937000 CVE-2023-33477,0,0,e2bcac495623babc236700f7f358107f045123e5fcef695df6a6049a86ee3582,2023-06-13T19:14:00.687000 @@ -225404,7 +225404,7 @@ CVE-2023-34044,0,0,71833bb0b6045cb11c0a7e75c9e5696268019f3c80e76946b19c7d0199c20 CVE-2023-34045,0,0,6b1b2c19fff4633e31b5c8e8f551b8488e58323d60c8ec07a89de4df2d59352e,2023-10-28T03:34:24.963000 CVE-2023-34046,0,0,20e315461df623f727e22674bd60c34dc6d5b9018b104dbe212631cd72c4ffb8,2023-10-28T03:34:15.293000 CVE-2023-34047,0,0,73170c0b6633414290e2ce79d1900c952ed793081a07fae973bb5f95a0019f70,2023-10-18T18:04:30.410000 -CVE-2023-34048,0,0,050b8db2e2e0c371ebb4e0c5c81d1d79f490e2f46aadf5ac40acf62b26093bc6,2024-01-23T02:00:01.253000 +CVE-2023-34048,0,1,5e587a3965b61fa3a500d1f7154937c2feebc1aafbedf03eeaa865ef18101733,2024-07-03T01:40:09.093000 CVE-2023-3405,0,0,cea43164727f36a40b310cd10e0233d79b6e7e47b19b8a661a12ffa184d1c536,2023-07-06T13:43:06.847000 CVE-2023-34050,0,0,3007e72e953efc7f7769088953e86d0e1d31277cf1bd39c060ae6b773dec8536,2023-10-25T16:54:31.770000 CVE-2023-34051,0,0,5b8bbf7afa8561a41e03dda3a943300283b847fb1457e1458ad55a02f9d1aef4,2023-10-30T15:28:40.420000 @@ -225711,7 +225711,7 @@ CVE-2023-34358,0,0,abd90ae8e77faca30e672b5cb90eb2435944614b3bd07c25ef936fa287f43 CVE-2023-34359,0,0,7437dbef21e997bb48063dadca3ee66ab5272480d86dad528bcfc561af3064e6,2023-08-04T17:27:09.303000 CVE-2023-3436,0,0,751a2117b4b957b1f6b95ee6a12c7109c0bc15f6a853fb2f81c6cf6aede67fdd,2023-07-06T16:00:57.783000 CVE-2023-34360,0,0,e3602d57a89565961b5fce50e0630911d37353b27e54bbdb059fac8da0ef93f2,2023-08-04T17:27:01.823000 -CVE-2023-34362,0,0,02f1d1b59dae1c063ee42c1ad32c23066324e51d9173880bebe3fbab00460f24,2024-06-27T19:15:29.160000 +CVE-2023-34362,0,1,86a6d7a8ea810c83770d2dcd52b7568f507460b8c193d603091884d2c28635ef,2024-07-03T01:40:13.847000 CVE-2023-34363,0,0,5a8a8a4dbf2b327839d34d4993980daa8b7d6ff2e22666a41fae8eee5a0f6684,2023-06-21T12:54:48.157000 CVE-2023-34364,0,0,352eb4f66acf42acfd78df2cd233eac5f739fe7449b2a38cf3dc2da0dc4b31b8,2023-06-21T01:55:59.977000 CVE-2023-34365,0,0,b673f668278470b045078cbc4733bdcaefa5d4627f2a3a26f3947d29988787ea,2023-10-12T22:48:08.197000 @@ -226411,7 +226411,7 @@ CVE-2023-35698,0,0,1a5f0de9e827e1f26d8ce1a23936779b2a92a9242596f2af26444c4d5f2f3 CVE-2023-35699,0,0,c06aba707c695839836dd82c54f55ca34badb20d57868cee747251dc69fa9bf6,2023-07-18T11:46:43.907000 CVE-2023-3570,0,0,a3d0980af40216925d7b37ef22d88a52e18ec285675de4b6c57400b6bb6155b1,2023-08-25T07:15:08.680000 CVE-2023-35700,0,0,d85439aec76d8ba3f8c755512b44f4a752c457c5d0362fdcaf7a45cdedd4d318,2023-11-07T04:15:57.173000 -CVE-2023-35701,0,0,fd8f611d2bf0848286e7963e7fa8ed032b5156dd85003d7effcae5297ead5904,2024-05-03T12:48:41.067000 +CVE-2023-35701,0,1,fc1ff5b0f9b77d828775afd11577555332290909e0acc8e685affbc672221c1d,2024-07-03T01:40:17.900000 CVE-2023-35702,0,0,43a538fd2a6551344790ddc23675ac41256cc49affe767c42203bb8af1f9d9f6,2024-04-09T21:15:08.687000 CVE-2023-35703,0,0,bd220da906e6173a01fcf88c08076bd5470744a21943fd30147c0383607c053a,2024-04-09T21:15:08.797000 CVE-2023-35704,0,0,9f7caa8dfb464038a77a6e4bcadca0149b6bc7207c34073f0385815b079c70e4,2024-04-09T21:15:08.890000 @@ -226553,7 +226553,7 @@ CVE-2023-35854,0,0,1c39d442015db1a5acfa66cd5fb6d5559cb80e73215bad6a8c25d21a5feb6 CVE-2023-35855,0,0,1e9be71693fad7cf56d0318b0ba20d6035d9a725b2abbea2fe9539b815203b24,2023-06-30T17:15:06.973000 CVE-2023-35856,0,0,b854da7ee9c64545491e837f868263a8a8f96959c6af9d42f3060318b930132d,2023-06-30T17:08:42.590000 CVE-2023-35857,0,0,0ba70612435f4711dc24f371837dd94c4de0819880c87119106823057668b992,2023-06-27T18:37:38.063000 -CVE-2023-35858,0,0,9e07bdca9f18719cfb2f794140415e9ff26498774880c0abc972f8eedcf32936,2024-06-13T18:35:19.777000 +CVE-2023-35858,0,1,89c699311d612c7ccd45b078a0938d7b347412bbf450f40451b911ac3920f103,2024-07-03T01:40:22.063000 CVE-2023-35859,0,0,ec5d137d135e921e7969441a22663017694bae7103cd337fb113078f44e9d0fd,2024-06-13T18:35:19.777000 CVE-2023-3586,0,0,3b8bfb800b44b46b4fd2831a9a0b1713654ca4a16af8a763d3e5e779b94349f4,2023-07-27T19:37:49.247000 CVE-2023-35860,0,0,7906db5e30391c8a482047de89f47da74d8d9696854f6d7992900294d7e7a800,2024-06-13T18:35:19.777000 @@ -226741,7 +226741,7 @@ CVE-2023-36049,0,0,5201a118da6748b0eb898e88d966747bfa8420a88e22b4867b9d3191781b4 CVE-2023-3605,0,0,bc42059535f7062d0f5322fb9f942c8c0e20861ebb1e7c121b652581188d5fcf,2024-05-17T02:27:38.087000 CVE-2023-36050,0,0,c5557d8b66949eac251fbfbe218f04d6b26a816d4c1a209d6314d83e7c1f8af4,2024-05-29T02:16:01.060000 CVE-2023-36052,0,0,ad12219548e4aa40413eb80545605b172d3fd9f4450a90222fbe92bd31378a42,2024-05-29T02:16:01.190000 -CVE-2023-36053,0,0,7a3b6f54079bf2ce434f98780e5d7f13c49594c264992ee4f17a082bd2e0bcc2,2024-04-20T03:15:06.487000 +CVE-2023-36053,0,1,5f4779a3c0e379c8ec9155a0f6d5086aa46002948658a0a046f5bb808018c516,2024-07-03T01:40:24.413000 CVE-2023-36054,0,0,dbcfaa05975d3e8d5786da873dfb6caf187448c5e6e2536799998c36d4814bb8,2023-11-15T03:23:27.470000 CVE-2023-3606,0,0,5929d4107c45e74b0a8c12934e9ec320c305fbdd477fd98e1c68f34d27626584,2024-05-17T02:27:38.190000 CVE-2023-3607,0,0,ab290eb359ad6661d76751270178dfa49f435c44e956238ad2efa66d5f2b73c5,2024-05-17T02:27:38.307000 @@ -226849,7 +226849,7 @@ CVE-2023-36260,0,0,df1237c6457c1b4206b0d5ad02f97032b3a81e18fce3bd69452c4d79fca18 CVE-2023-36262,0,0,0329ac7656644a7553d710ca8782f80b6527e8ade23f535dbdfe1383401c9bcd,2023-11-07T04:16:25.310000 CVE-2023-36263,0,0,4649624e62df1f3c72417442caed269512009de2869b36a656dd3f389025818b,2023-11-08T16:48:00.990000 CVE-2023-36266,0,0,c1aa488a681cc1956fd75006960cd6c7c828125dd8c47d0a0f508b4841f1fbf5,2024-05-17T02:25:39.600000 -CVE-2023-36268,0,0,59334e42c29ce9a6ad90592497e198d3a9a05a7bc406a9f7630efd960c25d4f7,2024-05-31T18:15:09.157000 +CVE-2023-36268,0,1,d00f4421ac8c751a524ef03b6b6a569cb1bb32c956c895cb4d33f7ebf0e71616,2024-07-03T01:40:25.423000 CVE-2023-3627,0,0,34eb25ece400e692d01118e91cdb54357e138708553e491dd2e85d00353848ee,2023-07-18T19:58:32.613000 CVE-2023-36271,0,0,ed782faec3fc64ed9c5c1d539673fb2cac501e252bddbf55d0751af403a70480,2023-06-27T12:18:30.333000 CVE-2023-36272,0,0,0a127fb20debfd02d6d9a91e4212d106baf67f3f214966d88f98ab750ccd33ca,2023-06-27T12:18:19.927000 @@ -227467,7 +227467,7 @@ CVE-2023-3703,0,0,76f02181cf5d80b7f612caff5073f455db91d34ac29ea7817245c12bf8efc7 CVE-2023-3704,0,0,0b7c69bc28e7afdd5dcf10d8a79e926f269c85852f7d6befc01c8a1d3a76f806,2023-09-01T17:12:08.027000 CVE-2023-37049,0,0,4a710d2494270e65f82c9c7a56bded47f634b44df6e778149a2d19ec0778c27d,2023-07-31T18:12:44.960000 CVE-2023-3705,0,0,8c79d499f4e32027bc4150fd363eda1f383550d9e90e93d841777af54adc58f7,2023-08-31T00:37:27.440000 -CVE-2023-37057,0,0,cd023ee94b75134222ab5c4bb1044768463ceb0a498cd67c1403064feed0ed55,2024-06-20T12:44:22.977000 +CVE-2023-37057,0,1,e1223f8efcbaf7ddeedc5d28ed13cdf256cc28b55524c35baa26ced5559f6966,2024-07-03T01:40:30.133000 CVE-2023-37058,0,0,636eb2ae68c7933ac1c46d0381f4bf470e2c04a0a3fd6f1a4e0652ebcf077f8e,2024-06-20T12:44:22.977000 CVE-2023-3706,0,0,d1d24339f524babb3c5d468291861ac849afd345e41ad883606273b20a797f16,2023-11-07T04:19:25.570000 CVE-2023-37061,0,0,7caa8b5c6907e4b61cbed31197e8664c90d669fbc2f478d5af9b346f52feb24b,2023-07-12T20:58:22.373000 @@ -227837,7 +227837,7 @@ CVE-2023-37520,0,0,9ec8c6e256db9e1ee06e769152b9cef91c832f4ba5e3851d9796e47494f46 CVE-2023-37521,0,0,3934cffb8951e320575f6a6b815a9c54b02e3cf380236fb2314adcd474dfbaac,2024-01-23T14:21:58.337000 CVE-2023-37522,0,0,89fbab1961c5fec16b49a6458f8b85b87e3933becc8a37e74a382fc5fed48963,2024-01-23T19:39:58.380000 CVE-2023-37523,0,0,f16775b843690af37c5baa96c1a69e6d211b410d3226a84e9ac558f09704eb2c,2024-01-23T16:54:43.840000 -CVE-2023-37526,0,0,28211ace9f85e0e4934f34e9867cb5b836f401ac3a23ec0a1fb6c93298ac56c0,2024-05-14T16:13:02.773000 +CVE-2023-37526,0,1,52c90d7c68b8a7d4b4d80db1072ce180a695c5c2d23e49ef6621eca890ff56f1,2024-07-03T01:40:35.700000 CVE-2023-37527,0,0,34e033dc0152166e15bd108d08a7f8bcde8623b7c286325f319cea11762bde0c,2024-02-10T01:19:03.593000 CVE-2023-37528,0,0,9a04f2b25e80543b5559ea592a703fb28ebfa5eb3187654b36de007f07d80c29,2024-02-12T16:55:42.290000 CVE-2023-37529,0,0,43b9461439608a19640517dd2fb8f49614d1e96387514762a901e55fe1c6c583,2024-02-29T13:49:47.277000 @@ -228451,19 +228451,19 @@ CVE-2023-38286,0,0,2ea40158ec9818cea2c111e32a6cdb85ffdb6be90a0776aa260b7c62e0143 CVE-2023-38288,0,0,4e09fe935b211d8976ac35865aa2db8a9a2746aebcba83a2a42f77442b554063,2023-11-07T04:17:14.293000 CVE-2023-38289,0,0,393a3d2cd00bfa282df8ba81ff2cfa497d880c900a7962bc261a38de402aa26a,2023-11-07T04:17:14.330000 CVE-2023-3829,0,0,44de65bbb6caddaf343b6a93c742d880a4f731aa467d5d05aa90e99474cc0738,2024-05-17T02:27:51.307000 -CVE-2023-38290,0,0,c3d4474bdb2921d4d4f2de1b63b6c5ebb856d3a8fd22d6f13e6cc78a055279c0,2024-04-22T19:24:06.727000 +CVE-2023-38290,0,1,ab283de32aa45986b6649e963064f48d5a6d06b634a8759fb47662b8f70e0b78,2024-07-03T01:40:42.817000 CVE-2023-38291,0,0,ec6d184e16f4bac46f45f1d46f62ee6b8547ee4dfeeec30611bb7d22eacc9a26,2024-04-22T19:24:06.727000 -CVE-2023-38292,0,0,48e0a25907dc031c19fa1dd1955b401389468e6ca59ad449237c7e63453117e0,2024-04-22T19:24:06.727000 -CVE-2023-38293,0,0,d7fe103b5065f0647e3007c2a33ac3a4d52cbc8ed5429273e63d5c517590e6f5,2024-04-22T19:24:06.727000 +CVE-2023-38292,0,1,76237901d4d96d35a542dc706847504ea3346899e96deafd796b22eb5dea6260,2024-07-03T01:40:43.677000 +CVE-2023-38293,0,1,8a3a9f3603aafbba92f85eed0067f39063fea016c09336499fe81a22b69b6e1c,2024-07-03T01:40:44.480000 CVE-2023-38294,0,0,21221ddf1a7803051eb14bebdda06b9569f089426cd68916403fa7572c21af1f,2024-04-22T19:24:06.727000 -CVE-2023-38295,0,0,0fe15181329bb149039476f578c5939e15346a6c6c63e8e5285ab5576606d0f8,2024-04-22T19:24:06.727000 -CVE-2023-38296,0,0,779a60775b2e5aa5705998b20f8bd43f888229dc44f1c694a31426b6d7dbd003,2024-04-22T19:24:06.727000 -CVE-2023-38297,0,0,17c3be2266d5930006dcb9b58f36abead2c3c795b1e3befde81d544ec083909b,2024-04-22T19:24:06.727000 -CVE-2023-38298,0,0,437fe50298b94cca3df18b1460d0ba2bf51fd612da7c6f9d6010e893b9ba5b48,2024-04-22T19:24:06.727000 +CVE-2023-38295,0,1,4016d9baae518bf0696b020435affdc349f967568dc7494a3b5a7127ee5a64df,2024-07-03T01:40:45.300000 +CVE-2023-38296,0,1,1f7e0b083f1ca97eb24702c1e157c0da38ead63f125398b9dc376080776135ab,2024-07-03T01:40:46.110000 +CVE-2023-38297,0,1,f3b4925769f6f90cc376d3161e09dafe9ca0c7a3591573719fd3fa874dde872e,2024-07-03T01:40:46.927000 +CVE-2023-38298,0,1,debb3ed1b34bb88369bd697dc12620e2bb1654e7205a7f55c40fcc1ad550c50a,2024-07-03T01:40:47.743000 CVE-2023-38299,0,0,2ad843e1ca4b3819cb79f54716b83572113e1705caef6697b75babe646cd7db6,2024-04-22T19:24:06.727000 CVE-2023-3830,0,0,a066fd993ced00ef511dd9a12b646fda0451d261645238a47451bd78bc920bb6,2024-05-17T02:27:51.403000 -CVE-2023-38300,0,0,fa823336efa18edefaccd96da4eb4b5a29ff88ab8950b0cd1a0e687014b21489,2024-04-22T19:24:06.727000 -CVE-2023-38301,0,0,39037023ea5840e52542fbc97c13a7ac103d134b6c2c5ecbc7b18126d4bd3b37,2024-04-22T19:24:06.727000 +CVE-2023-38300,0,1,21d7bcc0f4d78e8cd7b0e3ff2f4e41777aaed6e081cd5d88be120e8f54bb8f60,2024-07-03T01:40:48.550000 +CVE-2023-38301,0,1,dfbe90eed8465062140ec617f2e8acb915be38e7d4d7c9aea689994df35fc046,2024-07-03T01:40:49.340000 CVE-2023-38302,0,0,fc26addc0337319d47b29b0123872daf8c10a9fef866971c335055a718db29c8,2024-04-22T19:24:06.727000 CVE-2023-38303,0,0,12954e6b7d49a5b662e015224c39000c66a3dd29e3015d088530a37f229066c7,2023-08-04T03:55:50.193000 CVE-2023-38304,0,0,9e8d5aebcfc08be2edd64e8f958069ec67f79bd58d373fe39daf0d9a39b342c0,2023-08-04T03:55:41.383000 @@ -228562,7 +228562,7 @@ CVE-2023-38403,0,0,4c82680dbfe1caf8b5d8c8edcfd2c46c20a656376490d7aaf03abd30fe546 CVE-2023-38404,0,0,3dc6ba7796bd771a65b22048e59c9ab5fef46da9252fb3726f228bc9dd4b4359,2023-07-27T23:45:52.217000 CVE-2023-38405,0,0,c9debfd5593845ef6520958dbc49abb74fd74ee699fbdda9849aeefe8e69acd0,2023-07-27T03:46:14.810000 CVE-2023-38406,0,0,80db54cfbbd0fa8480b91b9c09dce70943da5a2cae85e18029363308bd7a260e,2024-04-28T07:15:08.367000 -CVE-2023-38407,0,0,9a208c073e5b7b4636ccaf26fbdd73e9008e152a34acdb22805b2c6218d358c2,2024-04-28T07:15:08.463000 +CVE-2023-38407,0,1,693c501a24fd30d31e2ef38a392256cef1f52bdf566fe136ed9d5ad372f839a0,2024-07-03T01:40:51.010000 CVE-2023-38408,0,0,a5b3564bc29fbafca29af20a4fd1ef12d39f0184d3edb95cb86e49e205895556,2024-04-04T06:15:08.430000 CVE-2023-38409,0,0,6490e149eaf901300003e5cb5fe2beb3e6bba4dd1431a86db788223f5e63097f,2023-07-27T03:49:09.943000 CVE-2023-3841,0,0,e5dcada75c14c3d2d0e09efd87694420b2d5ae1fd7d0416d0d7ea84e5522f02e,2024-05-17T02:27:52.550000 @@ -228573,7 +228573,7 @@ CVE-2023-38417,0,0,e4d439fe8ce17f78791d5bd05dc236aad43db9a860856e3def6ad290deadc CVE-2023-38418,0,0,a6c054982312baead20d4d1062cf45fee2dfc27569de516cd4a4dc27ad7f17ce,2023-08-08T17:14:37.997000 CVE-2023-38419,0,0,8bb4bba34e0c87e1dd765561972406c1898c8bd5b036b7284327d9aec57b9f71,2023-08-07T20:09:41.847000 CVE-2023-3842,0,0,32a83f4378de4a9af9290521186437291f83d6ccf4760a5623df57fb3f577b91,2024-05-17T02:27:52.660000 -CVE-2023-38420,0,0,543927d8d90cc01fdcae612ae0c16fc8f1ecf9563092b67ea5f4055e8cbdfb2f,2024-05-17T18:36:31.297000 +CVE-2023-38420,0,1,1924140eb0c8c09a97a94cc5a5050aea35f5a7b78310f3bfcbbc7e8d56c28391,2024-07-03T01:40:51.333000 CVE-2023-38421,0,0,d01e1833911d15e84fe9a94cbca5f8e5431d6afa879b63ce79bce4048c5f7089,2023-08-03T16:17:24.150000 CVE-2023-38422,0,0,c4b3917ceb8323726495000bc0956f846091f8243d4aa87abbdf71549343d6fb,2023-09-05T19:41:08.010000 CVE-2023-38423,0,0,5032f7c6cc898359d5c6eaf8a3ad09912048495a5af214ae581f939445907be5,2023-08-07T18:36:08.147000 @@ -228735,7 +228735,7 @@ CVE-2023-38576,0,0,af8fe57eb812ce53861c61345d0fee8b81c4f54d4d6d4bf17791b20b4197f CVE-2023-38579,0,0,d675649c63083678f4f6251f8e7bc0f6b675249c8aaa3432eda8a193ed725f0c,2024-02-13T21:56:17.013000 CVE-2023-3858,0,0,ee716c980fe92c129f94194c8217b011693419c1374acccc84354823a1228591,2024-05-17T02:27:54.297000 CVE-2023-38580,0,0,b787232fe68f479c14e77ddb87e020a544c96eaf393113e71173ba7c2d4fbf5d,2023-08-03T13:56:23.460000 -CVE-2023-38581,0,0,ffd2a8b6a7b760e4723b32802065e60b2b42b52c084969e78ab195032f44d853,2024-05-17T18:36:05.263000 +CVE-2023-38581,0,1,7eeb6701797b2df9a62cfcb0778a3b61c434b1b853404847e544724396d7a07a,2024-07-03T01:40:52.577000 CVE-2023-38582,0,0,10bcc044fc88ba7dd521c801c2f21225f49af5b2e932eb2a066b2a80d61b9c04,2024-05-17T02:26:37.773000 CVE-2023-38583,0,0,55d73cbaeac796f0ecaa1827bd7c5316e209b5f94d2661b0039ea695c5b500a5,2024-04-09T21:15:13.263000 CVE-2023-38584,0,0,0df06beac1368638581b849d87b47ba188de5635a830c495c1cfa6f89aa535bf,2023-10-26T14:26:11.107000 @@ -228915,7 +228915,7 @@ CVE-2023-38827,0,0,226e0bf0139eb60e20925421a3068041b066bb94746d6e571841462b055fe CVE-2023-38829,0,0,04f40c73ffb9ba15cad2ed194ae915aa7970c67d9d86c7205c8acfde6943d7e4,2023-09-13T14:40:32.463000 CVE-2023-3883,0,0,9c17bd0d4662d0002b70ed07b70fa9cb55984d05dd9cfdc885579fdb04af0803,2024-05-17T02:27:56.350000 CVE-2023-38830,0,0,6fd6692e47403d57826ef5a6317affc9e98c63acb30af4426948d5df3339e89d,2023-11-07T04:17:24.603000 -CVE-2023-38831,0,0,f793869ec0cc95c3dea9b373e1cd18e900b957ec9882c5ac9c7c8edaa9c83a4e,2024-06-27T18:47:24.473000 +CVE-2023-38831,0,1,e805252f6f1e0e681a7cd7d3211332eef23b661f36d2d3f3bd59aa867903869e,2024-07-03T01:40:53.693000 CVE-2023-38836,0,0,5d1b32ed45b0fd93269246c9025ce8c7a21511cf51485dab2b0261ffee4812db,2023-10-10T17:15:12.397000 CVE-2023-38838,0,0,d6352c5bcb35a2a8dd5214125a90474a2e489343497b559099f2d6bdfd0594cb,2023-08-22T00:57:04.490000 CVE-2023-38839,0,0,44167fbc27f4e87a9e80012672268bd920448f88770b4e1db0a376de160d10ca,2023-08-23T16:59:30.407000 @@ -229611,7 +229611,7 @@ CVE-2023-39710,0,0,4d2f90a91a62621cb130d8826d77dc0cff740004cc52afe3a563b5172fa82 CVE-2023-39711,0,0,d0b40f7326db4495cef1d669a989ff817c844836fc9d8c583768d80178b11552,2023-09-12T00:09:43.303000 CVE-2023-39712,0,0,1dada37a3f3c8d0e3d1bb538a550f03ae599f750eecf6b8742d5ec32b24d2a38,2023-09-12T18:28:56.037000 CVE-2023-39714,0,0,ec44cd11346d68329788caa23e26fb96cc3f9c9520db045a45291569731fa420,2023-09-06T00:04:08.890000 -CVE-2023-3972,0,0,bdc76ab920a5ac1424bb761f2544de430fd42cc9b30be70c658716f895872837,2023-11-09T19:40:56.750000 +CVE-2023-3972,0,1,8209573c854ceb65530b6cc2e4f9760bcbb47a40a92cb6ec1c0f3c1ae37a434a,2024-07-03T01:41:02.753000 CVE-2023-39726,0,0,ea080b8f27bf9f310bc6e62dca2b1d44617416822113f194e9039c3d2b0732bf,2023-11-07T17:15:35.560000 CVE-2023-3973,0,0,cfad4e66279172071f4c450006a1a7bd16548645ddf51196be362ba564e9f938,2023-08-03T13:31:43.900000 CVE-2023-39731,0,0,1712e7f673c614b2e4b4ef0d2812a6b0218e9767b1e13fd18f94bf89b53b2414,2023-10-26T15:33:42.247000 @@ -229674,7 +229674,7 @@ CVE-2023-39849,0,0,3661bb7450cd01a716a9c14b9f8d0e990703ec9a3600cc0da0dcb849361f8 CVE-2023-3985,0,0,335831b7dab920ef3ae13311655671c07dc7b454df30467d7a012aa5b1f5a12e,2024-05-17T02:27:59.550000 CVE-2023-39850,0,0,95a969ffc9e78f8ec75f500587d8c97d32559ecc7999e83511ad61eab6e3c60e,2023-08-18T19:52:43.933000 CVE-2023-39851,0,0,527c772bb1775c16e44ddee4396bf268733712831daba81d1966db45b36c03ce,2024-05-17T02:27:08.520000 -CVE-2023-39852,0,0,2bdf5700180678289b9c965226181d351be9e802776b8c80e7c7afdba3ccdd97,2024-06-04T19:17:37.793000 +CVE-2023-39852,0,1,9a2491e444acef08c1296607ec69d64b979a12f6a47c0ad5fffaec847f793112,2024-07-03T01:40:59.320000 CVE-2023-39853,0,0,4458d863ac70280df8fdc5529ac770e91f33119be3e34a0a54d4f3cb462ca219,2024-01-11T14:47:18.230000 CVE-2023-39854,0,0,a80f9238e5d73a8c38ec6550aa4f8906986a0a30173ca9ea6c2f7b094c11916c,2024-02-01T01:10:05.043000 CVE-2023-3986,0,0,8f70c9ddb10dcb50366d2addbbf0490dd7b3507e8092de7cf9d77bd63015c9b3,2024-05-17T02:27:59.680000 @@ -229838,7 +229838,7 @@ CVE-2023-40062,0,0,3491217f0e22241070482555e8285db81b015ce89081894a1a38c4b2a3d2c CVE-2023-40068,0,0,8d76b6159b50688f2b0b849502fbbd36df38292ac3f63bceb1d45bdd369d8911,2023-08-25T16:10:43.683000 CVE-2023-40069,0,0,8c4f5acaeee0a2e1746073a49f6f05b124a639e6752f2edacd11ac714eb281e7,2023-08-23T16:46:05.750000 CVE-2023-4007,0,0,9b4d6a30ed79b4dc76a79d6914b4e67d4946036e63ad91762a11e5705b51eb91,2023-08-03T19:16:00.417000 -CVE-2023-40070,0,0,d2ab43857dfc70550073471f0fb4bb0663d277db6e2be160c759aba501dd3e1b,2024-05-17T18:36:05.263000 +CVE-2023-40070,0,1,93e5570e0ce3746369c7d9e5e18832de1e5e1160a7942cd206a0c0a38ef8be7a,2024-07-03T01:41:03.770000 CVE-2023-40071,0,0,751c6ae44120831034765df62ba9ff4b38bf72dbc0f990d79d479cf6ce6c2c5d,2024-05-17T18:36:05.263000 CVE-2023-40072,0,0,d343886608a26ab8610e25ca44f022eccae5e67501b297c05e34f5dba4d21a5b,2024-02-28T23:15:08.150000 CVE-2023-40073,0,0,71e56a69ba402c0bb933309bae4723c246798038c8d2c9a621cc2572f9173152,2024-02-02T16:29:18.777000 @@ -229920,7 +229920,7 @@ CVE-2023-40151,0,0,9431105ce9ddf1090a9e164bea663f282ddc71188eae991a83d3f63e68b00 CVE-2023-40152,0,0,778b4430086c863a477398d0adfa787657686c71f3b9054976130c5c3365342b,2023-11-30T17:28:53.117000 CVE-2023-40153,0,0,78ce117b6fe59a36c45921fccfab6a83e5d546155e92a2fbe5ac7e8bc21ba4bd,2023-10-25T13:39:43.797000 CVE-2023-40154,0,0,4f545c644e9aecae0e7c5e28389e881785371ff348f62485e0fb6636df331841,2024-02-14T15:01:46.050000 -CVE-2023-40155,0,0,abf50ea750e68c3a0fcab61a8152c6169823dcb3b94c31a0169635b7d1dede7b,2024-05-17T18:36:05.263000 +CVE-2023-40155,0,1,6607ef25c31938b51bd9b5bc14fc82ea7b9d6e01e850e1c2a7260709004a339f,2024-07-03T01:41:05.087000 CVE-2023-40156,0,0,2dc3277a9fc506eb1d19429ceac7526e918fafd087cb342abdaaffa523257afa,2024-02-14T15:01:46.050000 CVE-2023-40158,0,0,01c68e5522e834fc982e25999e9571716b4c8bd6b6eaded0a57c181f615cd893,2023-08-29T14:35:53.187000 CVE-2023-4016,0,0,834245ffee21f8672464f07d5bd634fb6138dc12258b29f7f1677098eebfeffd,2023-12-15T18:19:03.787000 @@ -230034,7 +230034,7 @@ CVE-2023-40293,0,0,3e91b40761ee299655829605f60c684af2a5be7622d2e61ae3ccedf339529 CVE-2023-40294,0,0,d4bd6509d5c1ac7e980af451b8a70fd7d25239a642ad089d43c8d5295f4c19e4,2023-08-21T17:25:38.010000 CVE-2023-40295,0,0,a743eadcf15cc96af9c3861d2210341230395528d845a64c1ccef9069b916475,2023-08-21T17:35:53.970000 CVE-2023-40296,0,0,6fa5b6a6cc075360dfd806c6ac6e24533f004f65081952e873daa3d057118e65,2023-08-22T16:26:40.227000 -CVE-2023-40297,0,0,18cef25866662f88b02caa3ef4414d199858a4b2ce5bde6b3864469aba4c5e4a,2024-05-16T13:03:05.353000 +CVE-2023-40297,0,1,ddc0a127a362ed2874074b3bb08e044e355a773cf6e266ecae71001a19880a0c,2024-07-03T01:41:05.987000 CVE-2023-40299,0,0,fea7900b7883bfa0ab97eeb20413c4529da02df6227553717f2d432b6f923309,2023-10-12T17:32:03.607000 CVE-2023-4030,0,0,d357275122959a0f2477f9ecad7a5c2fbfddb1530041a10f12b3e5e5399828d2,2023-08-24T20:29:39.293000 CVE-2023-40300,0,0,12b768d230215ee821727c2018b2bf2ec81a405ef96ae608fc36f431cdf69658,2023-12-12T18:55:01.573000 @@ -230362,7 +230362,7 @@ CVE-2023-40646,0,0,a28e9d22a8f69ac68edbea83771530878b7d9215aae5423985926ed0a7fae CVE-2023-40647,0,0,619ffa47412f522734f842407cb1eca2eab7c5586c90e2c43c017745b68fbc17,2023-10-11T17:36:55.953000 CVE-2023-40648,0,0,58eb5cde4b81ce79622088456c9419c752652dc040d1b82d4c6afa0c958e9eec,2023-10-11T17:35:02.967000 CVE-2023-40649,0,0,ff5cf050848a4f8b27bb659f2fd5e248cad2c7ca463d0faa975067290b3af32d,2023-10-11T17:35:11.907000 -CVE-2023-4065,0,0,f5e58ea363900a26481294a9341d566818b1107c4d2441da44f0729ebf9b5a59,2023-11-07T04:22:04.953000 +CVE-2023-4065,0,1,53bc1466d2766f535c7082268cfb40c6472a034e603cd2ef9c5c8b38508e12b0,2024-07-03T01:42:41.460000 CVE-2023-40650,0,0,a36a7d8907fe2ef555ff83a379d929df8d05dbdb85621340ac0945d1b6754879,2023-10-11T17:35:18.570000 CVE-2023-40651,0,0,9e4a1ec7718a99eb301ca31da77b966a28a59320ff598331e4a828527dac1709,2023-10-11T17:35:31.657000 CVE-2023-40652,0,0,bf07db0083ab20239b128182dd935b4c5f0c1605628044895eb375b375987a67,2023-10-11T17:35:49.427000 @@ -230671,7 +230671,7 @@ CVE-2023-41099,0,0,2f7ed1bfc6b2d8415ebb005a1061cb50a8cd1311e2e59d23dabc0bfb121db CVE-2023-4110,0,0,62dc5e9bf46cc8e619ee56bc7a76f82e9b230f23cc72d0f40c8f22bea091920a,2024-05-17T02:31:19.523000 CVE-2023-41100,0,0,0e98c62233ad8fdc1a0dc794cad2a13de21da53ef316b7fa45391b4c29fb335f,2023-08-28T21:27:36.420000 CVE-2023-41101,0,0,f0e4fcdc25d45660d87e851fa7c8989fc4a8763942368859f18e9d739c0bb2b3,2024-06-20T18:15:11.237000 -CVE-2023-41102,0,0,162f5ecbf4d0ad70d2d3c4f76fa68891315f90a8db2489b9b9b61ba6407c2a5f,2024-06-20T18:15:11.333000 +CVE-2023-41102,0,1,f216f4c1ebc33324b19da1d1eef6d0bc1892cb58bbc5fedb7a880712f7efd474,2024-07-03T01:41:11.897000 CVE-2023-41103,0,0,2e9c5658d8e085314a307e9b4407246c0a83e99822f5631f35e29f67c6ba9aa3,2023-09-15T14:56:53.237000 CVE-2023-41104,0,0,26b88ec397bfc19eae05a7a32b350924bbd51b39b465df386506014eb416e50f,2023-08-28T21:41:07.790000 CVE-2023-41105,0,0,59eff7f6b797aeb7d9435c5dc53e0dfd19084f7897d66a0f230216b00ed68118,2023-11-07T04:20:53.350000 @@ -230887,7 +230887,7 @@ CVE-2023-41316,0,0,030558c60c6503b6d70438c5bdb300cb16b9842b4edc48e67f7200d633961 CVE-2023-41317,0,0,163b2d47bc93051806e40e199b2e98036588f22b34ef85271473d480871454b4,2023-09-08T16:49:51.803000 CVE-2023-41318,0,0,c135e9b5a7eb91826b6c6cd0ca08d480facedbefc2dea57f6210b1a0668c730a,2023-09-13T02:17:59.247000 CVE-2023-41319,0,0,c3710a259e690d5c1d93f6d34f54eea19317ff469273c468750179a9f3af3214,2023-09-13T14:25:28.587000 -CVE-2023-4132,0,0,c0bb8fc8ab1434751e97fbae1c233155a701050fbaf4c2b3ec402a855bb1f98b,2024-02-07T22:15:08.790000 +CVE-2023-4132,0,1,4a9f5e4e7388d3dfe9faa53c174a12d591d8f06b7f71510ba2eed385105cc552,2024-07-03T01:42:42.327000 CVE-2023-41320,0,0,20470b220c693f1096084b7c941258d40f3c51db9f154845312b3f1eb74052be,2023-09-29T18:15:45.027000 CVE-2023-41321,0,0,2f7429ec6567a2e66d3e5f71a176d39775c943f130c264e8534cff30a0d298fc,2023-09-29T18:13:40.220000 CVE-2023-41322,0,0,ba43cc3765de21690e0a340d007fe2a7656cfe6f9b2f9eedb75db3ebe0780ad7,2023-09-29T18:13:00.543000 @@ -231360,7 +231360,7 @@ CVE-2023-4199,0,0,f7de59f6b2eff5d85d5c81edbc58bffdc241931d6db8c8ac7e1eecaf7bbbe3 CVE-2023-41990,0,0,4cdf41ae5457182e2854914f83e208b2b103461a48653080b69c6bc694e9ca27,2024-02-16T18:45:01.993000 CVE-2023-41991,0,0,4b1c0cdc591d0ef573393f9cf3eba11f26ef484ab08b6ab13bcc2f3bd1d99d72,2024-06-21T16:15:46.357000 CVE-2023-41992,0,0,18a81c74d0fdc748297772ba130c146157b922f5faa391cf649b430e0926d6e1,2024-06-21T16:15:24.927000 -CVE-2023-41993,0,0,8b66a38717b6c137c1fca203d1eb351e3cab82720e86b23cd64a6fb3575cb509,2024-05-23T17:51:57.663000 +CVE-2023-41993,0,1,1050389b01ab132e826377a424e70eaf85566934123216a96b945d191d9b80e8,2024-07-03T01:41:20.690000 CVE-2023-41994,0,0,9d9ed96a7983233cac79f96192d0a87b7a85f153815c6f80ec3cd0d903fdd3d2,2024-01-12T14:42:23.890000 CVE-2023-41995,0,0,e3cc6815d15e6c68ba1ad2369c922ee2a0d1bddabf438d7900aa1668a96a5bd0,2023-12-22T16:15:29.073000 CVE-2023-41996,0,0,4b33e62f353d6c102117ee546f57300f74113d54fc9245a6b2d032ea8b426565,2023-12-22T22:15:07.727000 @@ -231558,12 +231558,12 @@ CVE-2023-42325,0,0,6c1f4ed57f48948ce9cfc30a4377d71ffc4c56d4c9d31f0e6886721ee68d1 CVE-2023-42326,0,0,65cb58c24a100a4b7d7cc1b87107ce8335b9dd2ff9415c116d0324f26015d854,2023-12-12T20:15:07.807000 CVE-2023-42327,0,0,dc17be2b5ae230f12251ba509da7b88646fb5698fd06ebe4ca1f917fc7979d8b,2023-12-12T20:15:07.867000 CVE-2023-42328,0,0,32a02006f7cc2ebca42918038c6b77c8b90ce4ad120066b09bec6b773c3c8adf,2023-09-21T17:48:17.520000 -CVE-2023-4233,0,0,8da6100488f039b39af90e79aff62eb8afad5d44d5ab7076a23658c4c64e2162,2024-04-18T13:04:28.900000 +CVE-2023-4233,0,1,91c127f5b421515d4365de7b10d049ac34f757ffd3f3a9d84fc5cd6308c1e47e,2024-07-03T01:42:43.300000 CVE-2023-42331,0,0,42653761bad098b0c4327d40791810a1e14184ca77d0408deba71c659e97b6c9,2023-10-13T01:19:51.037000 CVE-2023-42334,0,0,dc85f41ac33c8f46ba5464f6347fdd227b5819cc16d25bf8711c22468f10f42f,2023-09-22T02:10:48.637000 CVE-2023-42335,0,0,e816a9ad9da337f19a12e35c3dc875f6c604f80ee9f24737cd61f20fdb017380,2023-09-22T02:11:00.637000 CVE-2023-42336,0,0,50b89d1dd1d2271f828f4723297f4d3c69a79456b1f998bf3f3f4fa1aec0d82e,2023-09-20T20:55:55.307000 -CVE-2023-4234,0,0,1f15673929ae6398190ee35bc716f5b2fd9da9a92890131bab9d2b5585767c0b,2024-04-18T13:04:28.900000 +CVE-2023-4234,0,1,f2e8514e535a37a7165088db67c3e8ffbef5ef65eb0c30251c5d827838f01cc4,2024-07-03T01:42:44.060000 CVE-2023-4235,0,0,82822b1778317f0c464daa60091fba641fe04a5efd228ea89aa7681cb91fee24,2024-04-18T13:04:28.900000 CVE-2023-42358,0,0,6a9ae5d1522b295c400ceb9de3acc488b399e291c07e9743cf6d77112b3cd474,2024-01-10T19:39:10.430000 CVE-2023-42359,0,0,43d5430ef7f42022ff5934174ff6b248d86704598bb7094b6e8db4d10d1b7688,2023-09-19T21:24:04.917000 @@ -231589,7 +231589,7 @@ CVE-2023-42419,0,0,e2fcc77eaa863f71e635a0b9b62635de4a65677cae31fdb25ad8667675011 CVE-2023-4242,0,0,9e6641b32a4726c582bab0ab2ad666c1d22d35d37ff41436ee9d550833c4de53,2023-11-07T04:22:21.677000 CVE-2023-42425,0,0,d103db8ab2cb9fd916409787c5907e84cf193d69b068a942b20e7f729c914b96,2023-11-09T00:06:40.200000 CVE-2023-42426,0,0,f2b27a2bfd49dfdf24a8d2e1d4dd58b678c541239c81fb46ad6d517a97642ae2,2023-09-26T14:39:54.583000 -CVE-2023-42427,0,0,44f0ab874878e92a86b9b62037c57f0af407b9b23ee5ce4efe6fb1f869065cc6,2024-06-03T14:46:24.250000 +CVE-2023-42427,0,1,9ff8f679ec88f07b5ed3c0905719baed34f328bf5cbfedcb21632b4e278e5adf,2024-07-03T01:41:29.597000 CVE-2023-42428,0,0,1a5186fae785f2468c230055be6fba9923a6ee7c94f2b365f251aa993fa249ba,2023-11-22T00:05:52.117000 CVE-2023-42429,0,0,716e6dbe083c19347a98c7e366c8d5f52ecf63acfa5a9c244a2604ac14a72d7d,2024-01-30T14:20:32.207000 CVE-2023-4243,0,0,b240fe9b00ad77e83f43eb1cb37a923cc50a357d33a8359ca23c1bcb45e3c918,2023-11-07T04:22:21.837000 @@ -231882,7 +231882,7 @@ CVE-2023-42753,0,0,3e5b4cb61c42d83c57e20f29810d886d9cfc778a0d313ec6b46dde1aeec06 CVE-2023-42754,0,0,55476c044cc3bb964d92c3897c4c72eb7de4aedaa6aa8e5cfb35de27f7eeb8f6,2024-05-22T17:16:04.360000 CVE-2023-42755,0,0,7a86f3a569c70622ae1cea891d915eb97bfc9f08632fef0a949a20ea6e7e2546,2024-05-22T17:16:04.537000 CVE-2023-42756,0,0,1791119cd49d1f819b757c7a73ec49ac86914ba524bc67f6888a58dd72ac15ca,2024-04-30T14:15:09.243000 -CVE-2023-42757,0,0,f46e3894d2e12ec0442a7829f3dc5951255bcdedeca7dc7903e2fea24af4c1ee,2024-05-07T20:07:58.737000 +CVE-2023-42757,0,1,53f895ca4b2413554de30c5001e6737fc08818e69f276382dbe276da25387997,2024-07-03T01:41:30.683000 CVE-2023-4276,0,0,ba81376334b317afdb94ddec1b24db97dd7a21c1b03cf9fb7c1f4917c56320c0,2023-11-07T04:22:23.843000 CVE-2023-42765,0,0,5c07d365916475ee0acf6aefb6b25c6c60ad0df44cdaf01f8edc8d17551c86ed,2024-02-12T16:44:16.617000 CVE-2023-42766,0,0,7a1c88ad4b3ecaadc9dc2ef702cb0eb6552014e74a8c5b82be6b12d8f8816434,2024-01-30T14:28:01.303000 @@ -231891,7 +231891,7 @@ CVE-2023-42769,0,0,08c6effb0b9bd2db90c064eb068ca0e87e7c886660ea1c69e6c082763ddc2 CVE-2023-4277,0,0,60e52b2e35e8d855a36825f1fc83582ab115124202d449cdda94adfa4bd7d825,2023-11-07T04:22:24.093000 CVE-2023-42770,0,0,79a5b3f73b0bb93fdbfc047167fbc2fbfa5fd0d015165e4a58aa9f1ee052af08,2023-11-29T17:11:33.587000 CVE-2023-42771,0,0,b080d5e6a0c6792d8ab92c78c8703f1204893ef2adebdea405218fc54b6970bc,2023-10-04T21:05:00.090000 -CVE-2023-42773,0,0,897d8168cc57325f0ff2ae14d2a0bd78fb4e30a0beeb9e92241450c07103c0b7,2024-05-17T18:36:05.263000 +CVE-2023-42773,0,1,736d6fa55c636e82886587b5e918da34ad4de8b81b4ecb0ec09664b358c5957d,2024-07-03T01:41:31.007000 CVE-2023-42774,0,0,ad26d7a9424f012557cc56d244288377b36365c9350d77c503f132a91e83eb4f,2023-11-24T15:39:53.750000 CVE-2023-42775,0,0,e9f63ab8899922f199e6598903f6762d51629030e1b8cdb15253c947e09ffd3a,2024-02-14T18:15:46.060000 CVE-2023-42776,0,0,1393e4a821bb8ccaac5bfa53f6d13f12792bb127de487240ab3fbbc80c3e3c91,2024-02-14T15:01:46.050000 @@ -232025,7 +232025,7 @@ CVE-2023-42912,0,0,c098e394dc0a67e07f9df04c549c33226f6d9ce3b3c9000a8422b2e740c1e CVE-2023-42913,0,0,fca9e6b4a7bebf8cd0dd440c67f0319697b048295dd7ed33ccca693aa95bb9ee,2024-04-08T22:46:44.747000 CVE-2023-42914,0,0,d136deea7639edb129a4f43389dd9bd60f947fe20e61b8abbaafea8d30a38f33,2023-12-14T14:54:10.347000 CVE-2023-42915,0,0,1be85ce6fa0cfc0bf8e379977bec0d27fb6c9ccbc4c64c6fe4121e3a8a02c76e,2024-02-14T03:15:13.210000 -CVE-2023-42916,0,0,b16120314a3b2522f20b5c2c8bc888aad0f2518db6b7ac5b217ce93e966dfdf9,2024-06-26T20:00:49.967000 +CVE-2023-42916,0,1,fb420376f2574e0c95f9ff3cb36f6c359496786a1c3b0d46b831510c60b8804d,2024-07-03T01:41:31.913000 CVE-2023-42917,0,0,30c946e857d0a5d7bb6ecb0dec2a330c9cce36ed5951ac6c1e695eca41827919,2024-06-26T20:01:23.280000 CVE-2023-42919,0,0,60021fe4d11f6a5bf84bbd1335f9f5851355a857da16393688b92141c112d64b,2023-12-14T14:08:16.317000 CVE-2023-4292,0,0,f5f39697fac4fe73280e30bf9044ef09c04e4c52310b1ec3c758250ceee4e5dd,2023-09-22T13:48:01.647000 @@ -232039,7 +232039,7 @@ CVE-2023-42928,0,0,4d575fc7bee0ddbdac6cb470d5d7d4a1a9c0adf90a31f047e6f305ee0485d CVE-2023-42929,0,0,eb3f00ec709ba2f7760fb72343fbc272118a213ac02cb710d8fda7bd7caee235,2024-01-12T14:42:35.277000 CVE-2023-4293,0,0,8c3d33cc7fec3d9fd4477f1dbb51347bcd3c3988430a3515a2e389b8d5e05eab,2023-11-07T04:22:25.750000 CVE-2023-42930,0,0,00ba480d92534d8bf16eb0b9b509da978474e6eeba0de572b854069e83b9fb08,2024-04-08T22:46:51.907000 -CVE-2023-42931,0,0,cc135f3a406bba6acce03c3ed1d75052b880c12d21ae369126b45d24a980e70c,2024-04-08T22:47:13.533000 +CVE-2023-42931,0,1,319431b6a467504601fa76bed823464e64a52fea8dd6400a4f241a4408b9cfa3,2024-07-03T01:41:32.827000 CVE-2023-42932,0,0,d72ebc99606ff88b5196fb92ba085a234d9bb36deaf43aae627023bac3f8f5fa,2023-12-13T21:15:31.733000 CVE-2023-42933,0,0,4515d35610e674bb40f9ac6898c27078c01d4ce90705902554e59c696decfa5a,2024-01-12T14:42:31.583000 CVE-2023-42934,0,0,9bbd832bbd99920d5b4e7783d7815e5b4e4bfb6335bc1932425966a175c8c3cb,2024-01-16T23:52:48.783000 @@ -232061,7 +232061,7 @@ CVE-2023-42951,0,0,f47d9d53b96327a99c3cf9d9b6178395ac7e4f6ffb9fc1067e40ded2ecc60 CVE-2023-42952,0,0,f7dadd56b6a68a714e4e042690efb1e01d718cc903255fad9804058d56088666,2024-02-22T19:07:27.197000 CVE-2023-42953,0,0,0ea855ba33bbd4297f25ae9925400ebda739241895a723a394f07f9bd3e18595,2024-02-22T19:07:27.197000 CVE-2023-42954,0,0,4ff84847c56efbc3f637425a9807eb7b381f4c2cedb6bf16f12c3ca640d4fba3,2024-03-22T12:45:36.130000 -CVE-2023-42955,0,0,975c267f31e1f4c8eac80d396ff8538a774aa24157b73d6b254309e4ca1be250,2024-05-14T16:13:02.773000 +CVE-2023-42955,0,1,048bd99f0ab58fd5fb77045b6c0168d4d4fb97b035ea28ad7d10928caea120b4,2024-07-03T01:41:33.800000 CVE-2023-42956,0,0,37e2253f9e32ca2eaca96ee5948d673b3082374d721374eeccd56848afaf7c5a,2024-06-12T10:15:27.210000 CVE-2023-4296,0,0,e4697418375e16ece070d7b80c1fefdaf488931fca9a321d519649e0d7ae4f3c,2023-11-07T04:22:26.050000 CVE-2023-42962,0,0,44095971da853f64edd0a62395835f1f770cc82d53ee4c8cc6c9470bceeed50c,2024-04-08T22:47:42.510000 @@ -232113,7 +232113,7 @@ CVE-2023-43087,0,0,667e7a1b851f13b8d758e4ffd78a64f60bdef487b4d73971779373e34b957 CVE-2023-43088,0,0,bde58ececd793b572305255ff13c000c58f6728644880987d5a7e5e5e4a2ee15,2024-01-04T14:53:55.977000 CVE-2023-43089,0,0,fe16bf3ec38df95d79f3e5146964b59b23cf04317e400bdb47572747bad024da,2023-12-06T18:38:41.917000 CVE-2023-4309,0,0,945c454549b9020c789e40f94a9e1dc845de071a566be6891691418533afa203,2024-05-17T02:31:29.167000 -CVE-2023-43090,0,0,ae7a9f4b26bf0cd02818bde00c10d20e6a910ad3bfa35a10761a5cf0e38f44d8,2023-09-26T13:10:22.500000 +CVE-2023-43090,0,1,507461cef9ce19e274dc5453485eda8431b038cbbad75c2eb7bbbb63602d39d5,2024-07-03T01:41:35.037000 CVE-2023-4310,0,0,6a0febd7c8617d762d6387e63de58071821195cfb7ca3404cba5806c0dff26e5,2023-11-07T04:22:27.147000 CVE-2023-43102,0,0,c0c41ac96d91b8864e0ed5bfdfd63fb27c6da8bb7156aac474f470834a009a3e,2023-12-12T17:11:13.437000 CVE-2023-43103,0,0,59c410f59c05a5c55d51d0f012acc939e1db664779a2cbc258832432b3d8eb26,2023-12-12T17:10:33.093000 @@ -232170,7 +232170,7 @@ CVE-2023-43203,0,0,89492255a78602a3660bb14c29156ff5d3f1c78d9c5f696957821b2311a48 CVE-2023-43204,0,0,4a4c4d4994b2f884e18726aeca1648bfa11032f7530eed52aae397e60b88aa06,2023-09-22T14:03:57.567000 CVE-2023-43206,0,0,53b089b8d72e932a87f991eeb097f8b081c537207c2cfa523c62acb7d105f551,2023-09-22T14:03:46.960000 CVE-2023-43207,0,0,8d34533c58528826e409ae037f8fc09815bbec54dca957a0332119b691dd4bc7,2023-09-22T14:03:39.580000 -CVE-2023-43208,0,0,694bda0c9001945af9d8c58bbb067fe7a83c215d5b4d74ec15119a90f59f0215,2024-05-23T19:54:02.490000 +CVE-2023-43208,0,1,7ece583f83d12823f27e37fe4ed7283fb7b9ac811118d20c01637421647fc533,2024-07-03T01:41:35.797000 CVE-2023-4321,0,0,30a31ab53fa53fe15c449ae93d43fb2ff1c384fe951606ab3d89bf78f7dc8679,2023-08-22T20:43:55.613000 CVE-2023-43216,0,0,be2ff07bef1ed4a95f5a3833eea5f9ba32b594950eb332bce26f1dff8ec8c9b8,2023-09-27T16:25:34.437000 CVE-2023-4322,0,0,864f4e2e8ced6d046b50f82917512ed1e21dde9d3f0e69edfd9d5977cde60080,2024-01-21T03:03:06.933000 @@ -232522,7 +232522,7 @@ CVE-2023-43741,0,0,5b9fd46db187cda5c77965433c4b5636cb0c24421d652aabbb7f76057d0dc CVE-2023-43742,0,0,185e96498182a5ccaff006f021c4582a206371858aef0a63185bb3aa9e7f6356,2023-12-13T15:41:01.980000 CVE-2023-43743,0,0,2296a97d18de28271ecbaffbadc0a078eb350eef44ff2ba72b978a0db6169b31,2023-12-13T15:38:28.213000 CVE-2023-43744,0,0,f3a79cdb2dbe451ad393caaf1b05906d033b5aa76ecb0a7dbb73688d592149c1,2023-12-13T15:35:02.467000 -CVE-2023-43745,0,0,1e0c0636cdd92b656ae2c6a7be1acce75447f50782bdf46c2b6a26d5c50f7f75,2024-05-17T18:36:05.263000 +CVE-2023-43745,0,1,f3739feda008313a329a871fdc85be21540c352197be82388b2162b709b6f68c,2024-07-03T01:41:38.710000 CVE-2023-43746,0,0,50c4613f72162871059b2b2d4a35f862641097b4c7e14d6164ab3269e20ed152,2023-11-02T01:38:07.017000 CVE-2023-43748,0,0,2e432cdac8f0a63b92bff2807f45a9d2579778da02cf46b18ae9316239de1add,2024-05-17T18:36:05.263000 CVE-2023-43749,0,0,ffc5d45677a6f0ab8bfb9c487dc7e916a9114ef62727dd7e20d0acc2c19f4eaa,2024-02-14T18:15:46.093000 @@ -232543,7 +232543,7 @@ CVE-2023-43766,0,0,c3d94b17d2392ff09b084a320fd1fc8561aef9620231c6123d5d5b274c6c0 CVE-2023-43767,0,0,d64e561a1c17c316e6afd120956b606e2b04bebdf6cf0733e0c8ab3f6dee8101,2023-09-26T14:51:32.377000 CVE-2023-43768,0,0,aafbdf647bae3fcd2bd22968442ecc0c40c5a0132da4cdb5b52caf5aa0b8f805,2024-03-27T12:29:30.307000 CVE-2023-43769,0,0,8a9468590748146a71cded148013655e0f6d836db6406d4cc1576abfe45a1c00,2024-02-29T13:49:47.277000 -CVE-2023-43770,0,0,4d03f5a49044ae7b1bf7e63c7fded1226329481138e6fbbc5a637c75be3534a8,2024-02-13T02:00:01.627000 +CVE-2023-43770,0,1,eaa3bf890c36759a4a5591b7732f56027e80a8b6d5ca30152a007417441a3c30,2024-07-03T01:41:39.790000 CVE-2023-43771,0,0,b763e3326e80cea8f70a57d10f56b8ce7d4f44b5bc136e95cf6b451d994cda2a,2023-09-26T13:09:31.350000 CVE-2023-43775,0,0,426987aa94272a00d1fff68283ba8b1d7192d0003eed39019bbe2da8e1858bf2,2023-10-02T18:32:56.620000 CVE-2023-43776,0,0,18cad57c6143609fc3801717a686a62a748940101cbe3921e5d85b67391c9da0,2023-10-25T13:38:32.223000 @@ -232603,7 +232603,7 @@ CVE-2023-4384,0,0,164482b10ca75cfd04bb57dc20a55eb524d05072e29f93ed1abbd0bf554dfa CVE-2023-43842,0,0,111feb7401b3e9698079eec4a5a4f30a75b7e383580d68a949241e2d2f924177,2024-05-29T13:02:09.280000 CVE-2023-43843,0,0,dc937277992f748461c4223facf3af5539616a872ae4c298d0d59ea4d52ab7a9,2024-05-29T13:02:09.280000 CVE-2023-43844,0,0,6afa63cd1e452aaeda08144db56bf474b58ad8a388e3b781b7bb8aaf3a5dcae1,2024-05-29T13:02:09.280000 -CVE-2023-43845,0,0,e36b7189aac89206bf1754a5036d147fb23be19fb4828e35481c59e1aa2b879b,2024-05-29T13:02:09.280000 +CVE-2023-43845,0,1,d8c84d9afe0ac5a8afc98f0447d8c6711d3b8b032d2ae653c041ead4ab58d994,2024-07-03T01:41:41.020000 CVE-2023-43846,0,0,ac9581d597c9f44d89c8c4a6580ba0174fb38e6245374deab30fda24162ba39b,2024-05-29T13:02:09.280000 CVE-2023-43847,0,0,737531868fa51d12c3ad9fdf1b2b2f8a68d2c0766e5f6d405e3fc7a77117ac3e,2024-05-29T13:02:09.280000 CVE-2023-43848,0,0,651a934980decc2e99e4b1429951b4f07c18e461667c19d535be0e5f36fc3b02,2024-05-29T13:02:09.280000 @@ -233207,7 +233207,7 @@ CVE-2023-44853,0,0,bf03c230d0b4355dd84043746661e667426fd45ab3b65003e02a2b12657fb CVE-2023-44854,0,0,022cfa266bd41555241c52fee709741d2a44ad3cf7d945d89a15ad185ec4847c,2024-04-12T12:43:46.210000 CVE-2023-44855,0,0,25f61c2b7922b96b8465d95bc00ce7701b948783d451a1e6fcafb1cfa3862d16,2024-04-12T12:43:46.210000 CVE-2023-44856,0,0,e55c1477812be3a3227ba8ae233cc5dc3f767f5e974aca63fee6ab5d3f5eb07f,2024-04-12T12:43:46.210000 -CVE-2023-44857,0,0,63119e1d82663da627b20caeb0eb7910f5f896abe513cabe47ec00c2608675bf,2024-04-12T12:43:46.210000 +CVE-2023-44857,0,1,26efa4526fba2775c0abb30007c2cd5f8e11cb8211d852c759d226044c613250,2024-07-03T01:41:47.663000 CVE-2023-4486,0,0,7c8fa42bc051cffd420b5ef55e4a2970270cf57ff76a0f7885fa95967ec6e230,2023-12-19T17:15:07.377000 CVE-2023-44860,0,0,c0b6d0b5ccb7ac2fd592f94105e82e028e7be32a8921f980bc7c99a63cb71cf8,2023-11-07T04:21:40.847000 CVE-2023-4487,0,0,1f836b80619020f29266c245ced151007377272af6eda47c1003f870bd49ebf3,2023-09-09T03:52:35.157000 @@ -233430,7 +233430,7 @@ CVE-2023-45209,0,0,d13548e8ddbbdaac5d3f52671e86030a122df1b714f3b254bf7e83ee6e6f3 CVE-2023-4521,0,0,b688f7ebb4a8ae05081b90dfc2d3e5aa63110c07fe8f0a8aec7d54e7490212fe,2023-11-07T04:22:41.103000 CVE-2023-45210,0,0,015445c8d46db4b328a64a863b4689dd675056770aa7f333e4d9c645a082f231,2023-12-11T17:28:08.023000 CVE-2023-45213,0,0,a2b3d1477a2dfd29fc40134a810140d4b9b048c230f577d5a486c601eff0ad0c,2024-02-12T16:44:57.010000 -CVE-2023-45217,0,0,386ece3dff84a5d0f11105d7772508cd6d63bd39198c66f3d7ebf822b4bfac75,2024-05-17T18:36:05.263000 +CVE-2023-45217,0,1,b242cd4a28367d0d17ee46fefcd9fd963383a0b11fdff04c8576d650db6a0d85,2024-07-03T01:41:49.660000 CVE-2023-45219,0,0,270bb0600a3f55378c55b5ea38799f305c6eb8bb95c5b79f810dab4de3af729a,2023-10-18T01:32:45.897000 CVE-2023-4522,0,0,21c51931efbb0b6a933132cf5b91fe4ef9967ce64c453416b56e884701256728,2024-03-13T02:15:50.700000 CVE-2023-45220,0,0,89f02225b08d53cf6d2310d9295828baf1a8becf9542b9fbe85548c6da689aab,2023-11-06T14:42:32.330000 @@ -233497,13 +233497,13 @@ CVE-2023-45303,0,0,6a4197d9306cf9c8969848abc5c09ad71f64056108f7d036edd2e1fc1a8e8 CVE-2023-4531,0,0,2505356872c1ecc6a3c3abbde06198791dd73fac09425052fd91f18f8dbf680a,2023-09-08T16:51:00.220000 CVE-2023-45311,0,0,c55d5039e08f94d152f20b510f185ee56e0ccf20660af7e24cd17ec077068907,2023-11-28T07:15:43.260000 CVE-2023-45312,0,0,4e2ccd821f75344dd9e0f1b2d16370eba307196e003fc1b10f2595fabda3c96a,2023-11-07T04:21:44.090000 -CVE-2023-45315,0,0,69ebab85143ada0fd91768eea4d30cedfa81c0a115c5d2f4151a43d6fe9ca784,2024-05-17T18:36:05.263000 +CVE-2023-45315,0,1,0015d13db4624e57dda596fb704547c049b03e9719ea11b6bef4521d5271356a,2024-07-03T01:41:50.760000 CVE-2023-45316,0,0,d05dfe1f1337f68ddee1af98cca84aab8a6cf78f9140310e00c18d54aa873f2a,2023-12-14T18:58:08.837000 CVE-2023-45317,0,0,3e2aaa72f6fe8552f76fa30f9984cd75b52dedeb9ea5f3006a7faeb25bc78c39,2023-11-07T19:54:46.170000 CVE-2023-45318,0,0,5dd26b0f2c45cbfc38f90aed7c3240384ce42b88d7465553c07958d85607e76c,2024-02-20T19:50:53.960000 CVE-2023-45319,0,0,86650df0833723bbc1971d56ca3efdd449b339b2278f2fe27ae7800625741942,2023-11-15T20:15:50.193000 CVE-2023-4532,0,0,6f2368b2a3fc8c7c4f0e7b6068be73911c444cb8a49a7579ec5af887ef07ee5c,2023-10-03T19:28:34.357000 -CVE-2023-45320,0,0,165a314770672e97043b0e1ff9fdff2d0330a7d11e01b5af96fca2d5246d44a9,2024-05-17T18:36:05.263000 +CVE-2023-45320,0,1,e20435de8e58fba25528f0899673d8da831ddd5e7582bd8c6d4b1d4cfa65cede,2024-07-03T01:41:51.467000 CVE-2023-45321,0,0,ecd9a1b357498cd394e7fd770f31eebdd46a7877ed3636051ade3b732f299cd2,2023-11-06T14:44:12.273000 CVE-2023-45322,0,0,e8870ea4d2b6b9db0ca67d4898085217fcf562a8965643170e540dbee35386ce,2024-05-17T02:29:45.487000 CVE-2023-45323,0,0,99016fe100ab8d35ba774b06fd45bf3706bc8f516bf776ea8a3e7db25c9c7404,2023-11-09T15:40:37.763000 @@ -233545,7 +233545,7 @@ CVE-2023-45356,0,0,1cf9ec1635445b1e89fc035d1c6658b359fe2f6207c1d6a169e11a2e9183d CVE-2023-45357,0,0,d5601735f3144beca6f68fda4958c26ff2a271f72c71f45e2b7a69a3060f24e5,2023-10-24T19:56:37.377000 CVE-2023-45358,0,0,2ee5762472d76baa8bb96baa9fd868cfa08527d9006291ad728bfa89be014b56,2023-10-24T19:19:29.867000 CVE-2023-4536,0,0,4d2ca0f605005d1efb6986b0e170b2776b19094f26815c0707c494af554f098c,2024-01-23T19:38:31.160000 -CVE-2023-45360,0,0,0477c7eabadbb82ab38b0ce3890fa3bfe154e9caf25187723a241b0439ce8607,2024-06-10T17:16:13.783000 +CVE-2023-45360,0,1,51f5be670f4820f6554440e90df143b044bbe2fdeab52ce50a1d833e1bcd2b47,2024-07-03T01:41:52.177000 CVE-2023-45362,0,0,aa35acf4ef1c5b9a2917422d876bbc72be9bb9b98f62b3825cb3dc6a24bcd34f,2024-06-10T17:16:14.220000 CVE-2023-45363,0,0,09559cd0eae3e940983ac6f2d7e3bf8ccee121a75d4c652aace8e4b542c73f54,2023-11-28T13:15:07.313000 CVE-2023-45364,0,0,9aa989440de47fdef43073ef24a6e83a05e6e06e303b33bfed743e867fbb3a97,2023-10-12T16:03:43.650000 @@ -233568,7 +233568,7 @@ CVE-2023-45381,0,0,636ca78eac443cb4f637348d8ee4fee7573f821206a15e9b4f252bf045e55 CVE-2023-45382,0,0,e749ad67c4426048984c6f05c233a1830e3b02d47768e2a2990488263070e4a2,2023-11-25T02:16:09.063000 CVE-2023-45383,0,0,6c000ddfd6441a1c3da2c29134b230f4ee0b5b99ea849d6a70757063a564d1cb,2023-10-25T01:24:51.267000 CVE-2023-45384,0,0,68ffd294aedd1a768c3567558e16eccd5913adcff18912fc360412fcfa9f0f6a,2023-10-25T15:26:34.353000 -CVE-2023-45385,0,0,0f0e359387179cf2d7def0c42d2c5a84ff6a57f07bc4db29274d8f37ef2a0791,2024-04-30T17:52:35.057000 +CVE-2023-45385,0,1,072d831afcf155a1a098246c8171b23a796730d670060e7e0f202c096e056688,2024-07-03T01:41:53.003000 CVE-2023-45386,0,0,374130a71b25dc67a6870f15ed35a03693b486ed6a765768cf670f637ae4325c,2023-10-23T14:15:43.003000 CVE-2023-45387,0,0,45194877e2f2c310ab8a3e47aa92255ab544f487fbe86f4f4335fc4ee36c6e08,2023-11-25T02:15:57.857000 CVE-2023-4539,0,0,3f1ef5a4dce974f3bd7b99806bac78a9be3898dc33b90833d649bc46cca7bd92,2024-02-15T14:28:31.380000 @@ -233754,7 +233754,7 @@ CVE-2023-45702,0,0,de5d102699bd8c10fd8f0316a6585254fb134a2ff0d9938ccb0037068e910 CVE-2023-45703,0,0,dea19aa7d6a8a6afd2ee4037f85223b782d0f4c3a590d34c9d227990e4e23cff,2024-01-02T16:18:39.287000 CVE-2023-45705,0,0,08c5362f863babc2c1eaf45f307c5df7bbcd696a92fe782bb3c50b132fd68c74,2024-03-28T16:07:30.893000 CVE-2023-45706,0,0,e0385697c332dc3ef5d217fc3035264af0d1f8faaf7ecfd441572d04148ca310,2024-03-28T16:07:30.893000 -CVE-2023-45707,0,0,4911ce06ae8bf5bed86ddb43ecc9350893d6c543828e4a14f89b11ddb700adab,2024-06-10T02:52:08.267000 +CVE-2023-45707,0,1,c9b6196c79b5d00c9329a89273abfc5e4f68dd2d284703e16af7a7bd88eb0240,2024-07-03T01:41:54.823000 CVE-2023-4571,0,0,a5446c6fc7ea19a5021097a5b731baab9b76b99d147937c6f0c007231d2c5858,2024-04-10T01:15:17.183000 CVE-2023-45715,0,0,ee88768f0065e790f1c75fc2a7a8c50b52683fce9b06dae4e814cd4daafca29c,2024-03-28T16:07:30.893000 CVE-2023-45716,0,0,0a00a1625e10fd10c315dd94d684f341e834c086570f2f1b11bcfdbaa4c3a720,2024-02-26T21:22:54.537000 @@ -233868,7 +233868,7 @@ CVE-2023-45841,0,0,3851f1199922ddfee2c7450031a284a943265a00a94c54d5a485a28382565 CVE-2023-45842,0,0,df4b797914ae37016372d133760e1d4dfdc6387e21b65012e18b6fdd8f49c74b,2023-12-12T01:17:12.297000 CVE-2023-45844,0,0,9939ef4d3a5f92a299f7722960c61b4180b134226dc413b6beda5d202b3d4796,2023-11-06T14:39:14.153000 CVE-2023-45845,0,0,81a781af82db73404d8fd111c4a5b53d7c349c250689e5be02c90f127bf85a19,2024-05-17T18:36:05.263000 -CVE-2023-45846,0,0,d22fd61f9efce4f8298b3f7c87b6a8eeaf856c15d89c5c3f919492150be609bf,2024-05-17T18:36:05.263000 +CVE-2023-45846,0,1,7e97bec05528c5d3c814716d330ec4cbbf0b8dfe300e92e8f8b68aeca1cee284,2024-07-03T01:41:56.303000 CVE-2023-45847,0,0,3a74142613f67f762fa3bb8cbba00b0fc89943c398ed44c13d6b502104a60018,2023-12-14T18:20:40.697000 CVE-2023-45849,0,0,65f4549530a146f83a1a874717e18ac041135712f7b80665012be4b86cbc841f,2023-12-08T00:15:07.350000 CVE-2023-4585,0,0,16f90cbd6ab4b021f3dd1013a5df370bd0b40f37efc4b817c4f885f625b865c1,2023-12-21T00:57:28.747000 @@ -233933,8 +233933,8 @@ CVE-2023-45920,0,0,65d7d2ce0a0262772d3ab5884e97ff83a6493f02729ce45348dc60f1281d5 CVE-2023-45921,0,0,645fcaff78feed0e43ec127059f0dcc7feb6d53759818ded268f99ff2c3f84f3,2024-01-29T09:15:42.547000 CVE-2023-45922,0,0,f553ee1024e9d6617aab805459a8f8d42a6afe3ed3edac7d3660a9abfa0accf0,2024-06-10T21:15:49.337000 CVE-2023-45923,0,0,5946dd1d30e5db85cc88e2299cbbf78c4c1c23d4d9e7d4f1539852b51a3b5d93,2024-01-30T06:15:45.300000 -CVE-2023-45924,0,0,c926b02314dc345741852f008b67bf13126173d04318d481458a620d3701c4ab,2024-07-02T04:15:02.707000 -CVE-2023-45925,0,0,318183d9ce7e7d4f33e1f7efbaf455f4711625e4eb7e1530869992147c22e3f4,2024-06-04T19:17:49.370000 +CVE-2023-45924,0,1,4696ed2541eaf9609c534370ab6a26af99fa2e76657c715446514e3dcda5c971,2024-07-03T01:41:57.447000 +CVE-2023-45925,0,1,55c2bf5f3cb3b82e5ee8c4d2baa8feca3b5b51cc715103c50deecdc500ed4f9b,2024-07-03T01:41:58.250000 CVE-2023-45926,0,0,b31fd162068a0734b2b75498e371bf05938747f0b8d935b26b2fd650b2446211,2024-01-30T06:15:45.480000 CVE-2023-45927,0,0,6aed1e8c1cac976d39372a205b9cf2acc98f0084185486e97f5992573dfcc834,2024-03-27T12:29:30.307000 CVE-2023-45928,0,0,47558c1eca203c24f69589e30fb4f90aaef8f6b0bba4ad813aa029274f5783ce,2024-01-30T06:15:45.520000 @@ -233974,7 +233974,7 @@ CVE-2023-46007,0,0,6d540cf7917d33d1f9d983e500b20f05d5c29bcca54bb5f0e94646ac8afd8 CVE-2023-46009,0,0,1eea79869ff9979be475d14a391a108d5bb4d81ac6b06bd913ba7c8e20cd6553,2024-03-01T06:15:48.187000 CVE-2023-4601,0,0,7e66d916aaa833c26886fbece03518fb3051aa64188e2867c5cc5865d8e4a590,2023-10-28T03:47:10.133000 CVE-2023-46010,0,0,5c3101c7e3486cee898c26544050cd1e4dac93f563bf83b1f90e9001eb81a654,2023-11-01T17:22:21.600000 -CVE-2023-46012,0,0,038ee914a5051346f5ed95ab7e14d740dc1c68f17972ce1f335549badf0e0157,2024-05-07T20:07:58.737000 +CVE-2023-46012,0,1,4c65f81e70f0620db4899567118f905fdf02497ad39bfaa25c1f94bbefb73efd,2024-07-03T01:41:58.970000 CVE-2023-46014,0,0,d4729429d3274daf3dacb04f38f72ea86d397cc5ddcddf9cf33a1c589166a976,2023-11-16T17:32:08.327000 CVE-2023-46015,0,0,a925f4893e8c378bbe13c70dd87f1a6e101207e6c0972bf6dc467f19c6b90d64,2023-11-16T17:31:55.777000 CVE-2023-46016,0,0,aee2ef485dc27314bd5b66585658e6faf5cbfcbe4e851aa29624c3312fd47461,2023-11-16T17:31:46.947000 @@ -234007,7 +234007,7 @@ CVE-2023-46055,0,0,fdf1d245240a975fe0c288b57f8a59d44c9d185d042258dbbbcef27fafed4 CVE-2023-46058,0,0,60caa10856250aa45ff6a614c1529ac57a3c57157cecbc316e05d8e91d2dc6dc,2023-10-30T11:37:02.710000 CVE-2023-46059,0,0,a648e86cef9cc64c17ea1f3cff43740e568be223396cc2a910edd349ad88eaf5,2023-10-30T11:37:14.247000 CVE-2023-4606,0,0,bb64a605ede1c16aa270e38005c735f3c1784fb2351d43c31d0557d507a7edbc,2023-11-07T19:11:17.050000 -CVE-2023-46060,0,0,395f78a03c03a9e21376931e4240101b13d92e6518822fe3fe723bdf9c08ada3,2024-04-17T16:51:07.347000 +CVE-2023-46060,0,1,4376276787a2ebb1cb93ed196e48be33f88d33d99d1dd919d053ddf0d753774e,2024-07-03T01:41:59.363000 CVE-2023-46066,0,0,41d6277ab5fd36f484c79eab475c38d0efebc32de61f15e15029ef4998d24622,2023-10-19T18:39:24.183000 CVE-2023-46067,0,0,0d353d912d067e409437742ada4e01ea19d3c1d07f86c5cb09863faef188d615,2023-10-27T19:33:46.597000 CVE-2023-46068,0,0,1729060e36c673691d03be4e10577dd27887fabd355b101ba826ad4931439fb2,2023-11-01T17:22:06.537000 @@ -234207,7 +234207,7 @@ CVE-2023-46289,0,0,eeb8999c1027929e8e1432385e10738220f809cefa40c971cda5d3b70278a CVE-2023-4629,0,0,46099667ebb1d5620c651151fc81b80f7b26e3b0acd8b7bf49782cc690ba95f3,2024-03-12T12:40:13.500000 CVE-2023-46290,0,0,60b800c48e60334c2e69f95b8f0bf14e1eb82a55ac0513b709fcee11b9dfacac,2023-11-07T19:09:56.033000 CVE-2023-46294,0,0,d783b82054408b7c98198cf9de768f7b26016fb2ccfc90ad71b9515834779094,2024-05-02T13:27:25.103000 -CVE-2023-46295,0,0,457eaf15e2892398271302dc9373fdd6809c617422b7b9e79ec4f464f0931804,2024-05-02T13:27:25.103000 +CVE-2023-46295,0,1,b15972e98a1950e4d4a3b9eb508002e3a9685d0bb1eed8df111f8eb853e8c9e0,2024-07-03T01:42:00.680000 CVE-2023-46297,0,0,05d3c94eb7d68360161ab19a0103507bcacb4db4cbb9057e58019a522e6d5140,2024-05-29T19:50:25.303000 CVE-2023-46298,0,0,b077731bbae2546ee5da04f8027611b1fe7cb45539952cb1927c0319e4c642b7,2023-10-28T03:30:11.740000 CVE-2023-4630,0,0,4ec69a1c8fa3ee9a535125a88ba9d69fb2f86c9491ff178e8c57f885e14fd03b,2023-09-13T16:50:23.250000 @@ -234215,7 +234215,7 @@ CVE-2023-46300,0,0,0717e33737bc41686c733bf7e7fb3f4e87670f94456a3f5f908d9ad680b0f CVE-2023-46301,0,0,4bc065fc0550d760de641e0a5426cb26061bacffa84b2c5d6c474914f7b6e8be,2023-10-31T17:08:30.707000 CVE-2023-46302,0,0,4657366a67d8e79775047138127619bb65dfc4001addca3f3c68fdbe69d1172b,2023-11-30T15:15:48.393000 CVE-2023-46303,0,0,f588576f0391c22f76c1458b98d4818f3afd8a52b7c57a797fbd89390f6e96fd,2023-10-28T03:29:56.570000 -CVE-2023-46304,0,0,289f5025aa0b30545da631aca8a4a234658107005e2609497c7565698bf4099f,2024-04-30T17:52:35.057000 +CVE-2023-46304,0,1,bc7df584cc001dfecad7d99844692a6781c859f60b464862787f124b7a502319,2024-07-03T01:42:01.507000 CVE-2023-46306,0,0,3cc3c3abc132825b0de5e5713618461432ca75d34cf5d6314908b068992c117b,2023-11-02T15:47:02.097000 CVE-2023-46307,0,0,70b1e7b39477592163424a81cdcac5736b174b2b3ef677dc9db177c5b5ec12cc,2023-12-12T17:06:02.260000 CVE-2023-46308,0,0,93fc954f3a128690a25cd4b8d8fc47afecd3303f2e318c0a2f0696550f2b4f76,2024-01-09T17:47:09.937000 @@ -234225,7 +234225,7 @@ CVE-2023-46311,0,0,0e5573500a39b307b2c60ac16805905b2aa525dda4cdcdcb4966393d23868 CVE-2023-46312,0,0,d9900d295c00c4481ba9b90bea85e05da8631659306e5a8ba168f098d658bd0c,2023-11-08T02:24:43.287000 CVE-2023-46313,0,0,26bdfe7606548277b659acc13ea81113d83bd485148153f8e6f1479f3453c4b8,2023-11-08T02:24:23.733000 CVE-2023-46315,0,0,57a98b2aebce8ecc683c579ecab4f70ccf386cd5d66dd5be60de10a3266ce442,2023-10-30T19:09:47.337000 -CVE-2023-46316,0,0,9db82e6b3a327aff70b5846772dbcce2234cd9ed944e1d72cffcfdefe44f7b3e,2024-01-22T17:15:08.997000 +CVE-2023-46316,0,1,3c376a76d803d7925f6a44c2a01182f2c03d5cd7f395048cd866af0f844b7ef7,2024-07-03T01:42:02.420000 CVE-2023-46317,0,0,694a297f17ff9207c60fbdce8d22fba527c4634032e046bb6af6efabfc0b5eba,2023-11-01T14:29:58.033000 CVE-2023-46319,0,0,f549a62ac35bc0c2e39528c500aa1a51a1c42b39b43aeeb677284f636cf829e9,2023-10-28T03:24:08.903000 CVE-2023-4632,0,0,2b0fcc254050a731a02634a0d4fae3b9ab4834b9d97199940474ad2ea5c9e74e,2023-11-16T17:33:06.617000 @@ -234256,7 +234256,7 @@ CVE-2023-46357,0,0,7dd1f79e9bc467f3e776df1b5b155279fa6793b1f324f700db4046e6b595f CVE-2023-46358,0,0,56df74669daf1cfc9fa494bb056d07dbc425937077ecfecbb0cd68da1668136d,2023-11-01T18:34:30.390000 CVE-2023-46359,0,0,9bed5d075b18bf2d983f4926b778297bf5eeb0b8ce32fb053ea0cda1d64bf540,2024-02-13T16:06:48.480000 CVE-2023-4636,0,0,562e61f0bdb21a8e9740d1d2cc4470f44b3543b2478b7a0ab69d9b539d930758,2023-11-07T04:22:48.493000 -CVE-2023-46360,0,0,a502e36d74a6900498c45e3f2ba3819c06e089f23a5cd263b0cd1810443d473d,2024-02-13T18:13:03.937000 +CVE-2023-46360,0,1,15b7a0bfab198a40fa51898875d8715bef48ca2dde4b0a9c26bf4f4c0eae3a96,2024-07-03T01:42:03.253000 CVE-2023-46361,0,0,7fabfe553960e5b849ed9b73987a4ec0a7e939e62b9cea294ce3da4781666f25,2023-11-06T19:26:57.803000 CVE-2023-46362,0,0,cd4d73c01c5aaf758b43287c22fef256862def3d118db2fdbbe791237cbb0e5a,2023-11-15T19:49:17.137000 CVE-2023-46363,0,0,fb7aaff72d646c72ea119ea9b6602c72606acb2c1787d2b6dcd0052cbe3fedaf,2023-11-15T19:22:31.510000 @@ -234402,7 +234402,7 @@ CVE-2023-46562,0,0,366983b793e3e72c26cde43b82b88e03484e5a1d9b5bbe1b26f0dcf9b2334 CVE-2023-46563,0,0,c446d53d746796f88f77d80d091b9f9c3b598f114302a710d0d5651ee3412bb9,2023-10-27T22:00:00.013000 CVE-2023-46564,0,0,ff998003dc795a8f0291ab89ab2c7139ae1a38507e082a3b1cadc8aaa8efd172,2023-10-27T21:59:51.473000 CVE-2023-46565,0,0,0f34a62dc08c5e9007d8f9098c94c708242c0d964c590d32125573cfc7636cfa,2024-04-30T13:11:16.690000 -CVE-2023-46566,0,0,471d9db8dd05b1a897e724c1dabe714f2d862815c06b5a064a0023f8b2551ca3,2024-04-30T13:11:16.690000 +CVE-2023-46566,0,1,817c4e8fa759c5542cbea7b815bba4eefb974ca574f472f95baa4f05798e9f10,2024-07-03T01:42:04.097000 CVE-2023-46569,0,0,ca938e7eb0c27179a5022e9899fd4674404438b92b72d178a4b10062ed4c3ba6,2023-10-31T15:24:49.480000 CVE-2023-46570,0,0,c990920fa786ff502dd8be52f0959107a8f5ed7528be39cbef3eb5f1e6f7f8ec,2023-10-31T15:24:57.817000 CVE-2023-46574,0,0,2b220ba68c36ab806a61c39e7a41d5362c4552fa37a2644713939a967f56e226,2023-10-27T21:59:44.067000 @@ -234493,12 +234493,12 @@ CVE-2023-46683,0,0,a352b3622bfa5b727ee4c9e9990b11035967820b7c86353f993767f535c02 CVE-2023-46686,0,0,6c8587417c6ad35ad5bc9862ffda506549d70ed1e418d96a72befc37ac461ead,2023-12-28T20:08:24.817000 CVE-2023-46687,0,0,4c381fd89a6853349c558c4fb82eeb2b29cd61546ff6e41f902fa36aada3203d,2024-02-15T07:22:46.397000 CVE-2023-46688,0,0,c8cf9dcc97d717964d18601b17175507c314a960f04fee0869b41c8545ba2b52,2023-12-11T17:27:33.120000 -CVE-2023-46689,0,0,602b8654d4860462fc0de31f40aa0cbedd6ffea23a45cbff3ff248f8122d5c99,2024-05-17T18:36:05.263000 +CVE-2023-46689,0,1,3d2176bf10285ea50762ce13a75795e7d4ad97473f4d025a55e049d4ec149203,2024-07-03T01:42:05.130000 CVE-2023-4669,0,0,4e11648cf2978a048ce994fb21f288509f3f783347b59fce6dc9616fed92e00b,2024-05-17T02:31:42.653000 CVE-2023-46690,0,0,f595b5776e3a89d563db4b7c15d5ce1559ff19cfe3c884ee3ac9a6a3f2dcffd0,2023-12-06T18:49:11.797000 -CVE-2023-46691,0,0,24954aa8b426450268969ff630e1ef67fbcbea5392808b1b2e8deabe5a9d6ecf,2024-05-17T18:36:05.263000 +CVE-2023-46691,0,1,fc5ef5914268338aab0f0866378cd8f74ea597c95c3f2599bf44e78e22dd0eb0,2024-07-03T01:42:05.847000 CVE-2023-46693,0,0,852030708cb5147647dd56ddb7053b52ca5ba36757a864c4a018c226d37a8dfd,2023-12-11T19:14:27.790000 -CVE-2023-46694,0,0,9e5adead55fec7fdec741c94d6466ddd13686e5e931fb4148bdb83821cd7943e,2024-05-29T13:02:09.280000 +CVE-2023-46694,0,1,b094ba94bed3b5bd3e80005e362c0d66e3d103652fb4a147c77dfdb913e335ae,2024-07-03T01:42:06.570000 CVE-2023-46695,0,0,f04fde2521ecf7d3eabd0c4fa9f23ae3e2c51de9c5fb9c26fad1bc60bdc368e0,2023-12-14T10:15:08.170000 CVE-2023-46699,0,0,46e2b1dc87b6591b49ea519af5b5ea086c07ebf6ac9e5f3d5f8165a6f1fc4b2c,2024-01-04T17:09:09.933000 CVE-2023-4670,0,0,56ca27d289857fa9cce1a82dd8b06f90d907f35e41e78ba05fca50614d2a3304,2023-09-20T15:24:30.517000 @@ -234605,8 +234605,8 @@ CVE-2023-46802,0,0,81ab742ef444b7c62f7f45fae874a3923600da74bccd6c05821cc0f3c3485 CVE-2023-46803,0,0,6d9acf7fa697eba714f52e6c2563d15daaa62001c85a491829c55db066eb5d2d,2023-12-21T04:49:22.117000 CVE-2023-46804,0,0,303fee7e8ddf7f125b651ea337e3f6426140c80ed6928e8d77bc4dfdbfc39c28,2023-12-21T04:49:19.073000 CVE-2023-46805,0,0,82dafc5ea0b29ca28bb6a9f9e3594fe74c7356bc89f8ec291be9e07cf6b947fd,2024-06-10T15:39:50.823000 -CVE-2023-46806,0,0,9c963a2febb7ff838b4c28cffca7e0db14a0e07828484b5709c1386765763262,2024-05-24T01:15:30.977000 -CVE-2023-46807,0,0,077574d4e6428ea3dd7a6b80ba2c35e8b4ec40cf97524e039aebad25e5aaeeae,2024-05-24T01:15:30.977000 +CVE-2023-46806,0,1,49a0b042d8e030d1507dfed8a0c175f6283ca7615330bcadaded676c9bd069b4,2024-07-03T01:42:07.793000 +CVE-2023-46807,0,1,c28cf6fba75d9bfea83f438d6bca59021e282ddfe25b1a9c7a037441645e037f,2024-07-03T01:42:08.520000 CVE-2023-46808,0,0,cbddf0c466af810602e3b5e48604f0a280381993f5e5339e9c62959d89628764,2024-04-01T15:31:56.613000 CVE-2023-4681,0,0,d4b1d47c3f1f541f581a94f5a50c79c85882e6afa6d0d58510fdf4b0129b96ab,2023-09-05T16:22:15.077000 CVE-2023-46810,0,0,f489bc989faca2ffd890051eeca4d29dc1d904b12f4600a012b6b1e3cc582a66,2024-05-31T19:14:47.793000 @@ -234850,7 +234850,7 @@ CVE-2023-47165,0,0,a7b08d2ff3ee802a407abecdc2d2b4f1d37cb7e807eb71f2d519687a57b17 CVE-2023-47166,0,0,e50298cb81fedd5a59e9af388f25468272b5925ff46d386592239fec8ca1c7e9,2024-05-01T19:50:25.633000 CVE-2023-47167,0,0,d6d051dee0bdf619cce5a3865e3675a696da5d8609f3bdcb7762a87f6550e8ba,2024-02-09T02:10:50.633000 CVE-2023-47168,0,0,5fca546f27cbaff058a5661b989d8656bc3335768a7a457ee1d061238e0ace77,2023-12-01T21:24:07.470000 -CVE-2023-47169,0,0,5c8946b41da7836a62d56ab4bb6dc03a49f0a514a61f93b158cf421d8f3b4bda,2024-05-17T18:36:05.263000 +CVE-2023-47169,0,1,cac3988fd2f00de2c35166f0919f9550facb8d93c531fa714242d48560dac4cd,2024-07-03T01:42:09.907000 CVE-2023-47170,0,0,3ca18c10c3994d460f4cb6e6bd4ebf7e655548a4736370cf1d0886d63d7ddc57,2024-02-05T05:15:07.730000 CVE-2023-47171,0,0,65ed9d5abf908e984f90eadcff5bf4ea86edadd55e35071e16c4aaf375e11c63,2024-01-17T15:22:38.970000 CVE-2023-47172,0,0,e6f130f0901d1476a705ea8aeacecc36f6d28d5ab136906ac411a2c4447ed095,2023-11-28T21:57:21.713000 @@ -234884,7 +234884,7 @@ CVE-2023-47204,0,0,b43cf2bc871d7e4c85b23236f9263f9df7624d6ed6d283606c60f635c575d CVE-2023-47207,0,0,282df8dd913e0a92c9ee0c050e772e75cfdc1c98e07c7ef000fa50406702a38f,2023-12-06T18:48:48.427000 CVE-2023-47209,0,0,5a3534375985be4e31c91d5f0346bbc99b438747f524690171e5c5828c27f382,2024-02-09T02:10:45.003000 CVE-2023-4721,0,0,8fb93ec641bf4963e7d43794a0269b710c7d6d3ee34fa94fc0791119016bc173,2023-09-06T00:15:28.960000 -CVE-2023-47210,0,0,8bd54e08c090baa55e12e8c9e87be5a6e32b0b456fbcec3f92ce96cac10b6778,2024-05-17T18:36:05.263000 +CVE-2023-47210,0,1,e62daede3ddc1b31ef043d527e408f0a9addd65be9bee951a5c14de46ded64d0,2024-07-03T01:42:10.710000 CVE-2023-47211,0,0,46675d79a2114fd074c88997bc417b337098487627d422dd6af3409458458775,2024-01-12T18:44:45.403000 CVE-2023-47212,0,0,64aec6382f0d92957166487f72b4d228772553ffa26a2bb4e177f4486d3646c5,2024-06-10T17:16:15.040000 CVE-2023-47213,0,0,5f958cd1ac22b1fd7005ac8b063466e688d4f6222ae9f8c29aadfa3678a3f27d,2023-12-05T19:13:43.543000 @@ -234907,7 +234907,7 @@ CVE-2023-47230,0,0,98e54ec85149eb5b7a886246e70faa9789424eff695d2b80f1f18594563dc CVE-2023-47231,0,0,52a0fc4892df54cf36480ba4cd483981c6f7b112e09729fb822f624c1979cdea,2023-11-15T16:21:11.800000 CVE-2023-47233,0,0,f218de1aa213737abb82ac9db8f945feef1a2acc74d030ea2fa8cb512c6ec493,2024-06-27T13:15:52.623000 CVE-2023-47234,0,0,2789fb6053c1e8a11522a688aee6f2a244ebebed599b2e822033da845b9ed62d,2024-04-28T07:15:08.703000 -CVE-2023-47235,0,0,15f2454b87d18384661fef3e851716f49203fc6cf99784f467ee56364a4d98f7,2024-04-28T07:15:08.770000 +CVE-2023-47235,0,1,b75caa87f8a3a2600e2a80e9d7122ca67645d01789e6d8aacfb2b04849ef8ebd,2024-07-03T01:42:11.777000 CVE-2023-47236,0,0,b0b312089de1fa4b30acc4988ffca55daee03fe17197415e08738b0e7d2a16c8,2023-12-28T20:07:16.600000 CVE-2023-47237,0,0,300757c13e0afaa0d3ea72a8a7866748846c7ae9f4f522d4cbba9d38a9f2ce25,2023-11-15T02:25:41.300000 CVE-2023-47238,0,0,66d5330fa3782d388bd9bee2a81da2820e2ebb34194b1a721643b50ddf6a49cb,2023-11-15T02:25:33.170000 @@ -234940,12 +234940,12 @@ CVE-2023-47263,0,0,677ab9fce589c1d1a7e84495fba44efba88975d28c1c0b358eaa4e3b2e310 CVE-2023-47264,0,0,9faf020667cc25f07dfb8382df553caabe75eac9b1668d9c999deccefa85a8b6,2023-12-01T18:32:28.423000 CVE-2023-47265,0,0,e5dd3e8f07e2cde29a7b164b7d2f2d8fb5d2648b52cb927855305ced52fdae4d,2023-12-28T14:00:15.887000 CVE-2023-47267,0,0,7af787055fd484ddb13b770f63a574a7140e8e765ce3a9c07340594a128f888a,2023-12-29T03:11:24.070000 -CVE-2023-4727,0,1,f3a8a54571b263c24ca90ad48f9d245b3efa2186a120007712b19e024ba617b1,2024-07-02T23:15:10.230000 +CVE-2023-4727,0,0,f3a8a54571b263c24ca90ad48f9d245b3efa2186a120007712b19e024ba617b1,2024-07-02T23:15:10.230000 CVE-2023-47271,0,0,9cc05b4e0b65c52657ed8cdc25e16f6a7fc3036ff1196f68571bcac4e63323c6,2023-12-20T01:15:07.297000 CVE-2023-47272,0,0,6e28ab19abbf3b1b70b10399ba447a3637cdf3f4443fc6db792243e0885fe9db,2023-12-28T17:24:36.373000 CVE-2023-47279,0,0,77443ef453c9d718722250faa2452d8d4368ad781c70a56bce601eb3ebab7163,2023-12-06T18:38:55.820000 CVE-2023-4728,0,0,3739059a9e889248ad0d9a8fd436f1cc6c46a0e5ea28e1d984a31031df86b6c0,2024-03-12T12:40:13.500000 -CVE-2023-47282,0,0,147f940c830d6e1c14f443cd2b452a49e9170b1c555600aaa0210539f9696424,2024-05-17T18:36:05.263000 +CVE-2023-47282,0,1,8665c3cbb25e2795a74c32b46946c120e821aa6fc7cfe00e8166e449e7fb5d1d,2024-07-03T01:42:12.093000 CVE-2023-47283,0,0,60e1454176bd7ed0a3132a6d52101088fa7d827e2deaf9e097ee2a811ea4a3bb,2023-11-22T00:05:40.857000 CVE-2023-4729,0,0,f59bc19fc36952c25f2ec64c44b945dee977c3f01e1cc7e4cfcaa96c93eb5664,2024-03-12T12:40:13.500000 CVE-2023-47304,0,0,479b5f8959b04d3e08ea0e2ce92de50218c370ec8b84765c36c3ad8d181305aa,2023-12-11T15:37:02.707000 @@ -235013,7 +235013,7 @@ CVE-2023-4742,0,0,92aeeffb12212bb9b1b2758262acfe1726b1713a9e8b6da9a4d202aca12113 CVE-2023-47422,0,0,53e4ba62d7fd0242ce1870b57522bcebcee34260151a2b5b738b7621b64d4019,2024-02-22T19:07:37.840000 CVE-2023-4743,0,0,76ccc52ee34a9ae80e8834c59856d1fd9946d3b8f84225b432ec040f31d7bd6b,2024-05-17T02:31:45.843000 CVE-2023-47430,0,0,e6a5754bab3f4151de611d77cd2c885bddd03b736d05dd3ab604542d22404cc3,2024-03-26T12:55:05.010000 -CVE-2023-47435,0,0,37241594adc4ade617a6532fae81d87edb118d7059a5791ddbbe732f8d96645b,2024-04-19T18:29:53.040000 +CVE-2023-47435,0,1,503cd7afba24087d7278aebbcd258808073035bf713012b8eb8fdd772acdfb43,2024-07-03T01:42:12.810000 CVE-2023-47437,0,0,6e79bd1227b77bbb4f11ccfeeaa138eb5ff31bfe22e27fcab2f47ad374baaeca,2023-12-01T19:48:29.537000 CVE-2023-47438,0,0,479cbd83c7c1950583b3656496c410334cd711e47d5d8ea1a19ff583debe6d28,2024-03-28T02:01:13.303000 CVE-2023-4744,0,0,8f5ee08e65ddf1a74186e352e89a4e435b37d0ee4d02569cc2726d93ec407dca,2024-05-17T02:31:45.953000 @@ -235138,7 +235138,7 @@ CVE-2023-47616,0,0,a22f1aa8f2324be47acb237238a7748b00a3e23fc1a08f2b5440e88a12377 CVE-2023-47617,0,0,c89037decd9f6e5e190432e4c83df30b66d7682701ac5375032efc55271ef443,2024-02-09T02:10:37.967000 CVE-2023-47618,0,0,46f0d899e3917e2a4f6061d152622b32fadebc153a8fb4ab8b4603df078b5864,2024-02-09T02:10:33.477000 CVE-2023-47619,0,0,4251c6a49f61526865c295203725d8cc3ee5e9f14dcf6fbe027ecd203f82080d,2023-12-19T14:45:12.943000 -CVE-2023-4762,0,0,7e247f1d7f26c11a445b343b9af73ea85227cf0ac1fe6f9e1c002a195b313a03,2024-06-10T16:13:42.487000 +CVE-2023-4762,0,1,20474f7c57b0b1d60e14292d42140663cfbf22f40fdb968fb162bdc85078d1fe,2024-07-03T01:42:46.600000 CVE-2023-47620,0,0,b018994059aac66c986b6a302a0b5a3a5967fe341f458d5b6d5591b4d0617267,2024-02-13T01:15:07.983000 CVE-2023-47621,0,0,fd6d86d157b39d2b335af4e2e7c195dcf5f3a7411eec2adb2371062b52a70855,2023-11-21T03:10:58.357000 CVE-2023-47622,0,0,e812868eba2c9e547dbcd688af8fb74835c63b8aaaf3d3d8f81bfed4a7fab8ba,2024-04-15T19:12:25.887000 @@ -235194,7 +235194,7 @@ CVE-2023-47672,0,0,fe373617440d9a165f45306f73bd3af1017e4c09f55b8e5854e32ea643087 CVE-2023-47673,0,0,97e8bfa3ac10c2246cef6a5031c56b0303fd0cfb3720ff012a9707e2cea87411,2024-02-06T14:15:55.047000 CVE-2023-47674,0,0,eff3cb202c68310b2428576f99bc8606e52e60dd39a497438300d3052e8e1a2c,2023-12-05T19:11:17.703000 CVE-2023-47675,0,0,b5d30eba1ecc4a944b40987d9ab273e9dbd8543d3842a7a31559cdd3ffabaf24,2023-11-22T00:05:28.373000 -CVE-2023-47678,0,0,bda9ec5da3a75993b01e519fd6af148f2c4398b7dbe8f7b4635a0c4c3b51f328,2024-06-04T19:17:51.097000 +CVE-2023-47678,0,1,1657ec5af66a76b14903f17461c73011e9a72a0e017b8f5746008072f0cbf9c4,2024-07-03T01:42:14.340000 CVE-2023-47679,0,0,6a7281ce75d88db73ee4644105ec6a35308c3adb3e0a17e43a1be4e968fc5b2b,2024-05-17T18:36:05.263000 CVE-2023-4768,0,0,4a45b9a26a63dda75c659ff661d20422bc870280687842f9433a1cb52a94b57e,2023-11-13T18:28:18.260000 CVE-2023-47680,0,0,92ee1efbc9cf057b2aac6bfa02d096a8847a00df5987488cef44359cea582925,2023-11-17T14:50:40.710000 @@ -235373,7 +235373,7 @@ CVE-2023-48017,0,0,fd3bf91a32865c1a971e0561cd0946a2f9e4af5dd63813c530d38c2581282 CVE-2023-4802,0,0,1c1bbf22a1dbea2c8a7ba6d438156cd528e16c02f15853c542dc5d592be47ba7,2023-10-13T22:15:10.537000 CVE-2023-48020,0,0,dfc11fc8349c5a3499e636901207c479f3338b0ad31c34202a8115aabce58f21,2023-11-17T21:27:51.187000 CVE-2023-48021,0,0,180e5f47429499a40ffab0e193dc1a9e50ea7a91e4cfe3780d5f18d138d445fc,2023-11-18T03:27:32.867000 -CVE-2023-48022,0,0,bdae083aa7dccefe97ce536817211c68da5baebd5557aa69b0a36c8f6595e275,2024-06-12T21:15:49.817000 +CVE-2023-48022,0,1,bb58d121428e91611d58653c9162cc69e4ff34f98854560c837ffb103c3c61e4,2024-07-03T01:42:17.167000 CVE-2023-48023,0,0,8e582ca94aff6735b09dd498a3cefb2f7bb3e33e201545fb45c4baf4be7187d3,2024-05-17T02:30:38.467000 CVE-2023-48024,0,0,e6a4e6e166a6ed0ddd0b1739242856ee3c6d68fe8c575122b547ac1b8aaa6a28,2023-11-25T02:23:37.257000 CVE-2023-48025,0,0,936245d7484c699b71ef540588cfc253752d8cb2fd2930a2dd9392e6880b0d70,2023-11-25T01:21:30.640000 @@ -235448,8 +235448,8 @@ CVE-2023-4817,0,0,730dafa0009615726fac3b77b3be7137b9257eb2c70d008758052fa40c3f36 CVE-2023-48172,0,0,5a469e0274433a0ae0c832bd74c7fde63212f4ba8f5394a1cc6402ed0325e021,2023-12-09T04:46:27.490000 CVE-2023-48176,0,0,c3abf7182d832669fb665b5e3a6edfc409b19c925d485b0863dc39013424ec2e,2023-11-30T20:21:54.850000 CVE-2023-4818,0,0,32c4ac875c9fff7c6d3cbfffc06a837d78543029d0a511e26bbd5fea2f1807e9,2024-01-19T16:35:49.683000 -CVE-2023-48183,0,0,374fef2d154279a8b351befbca3ad5116cc95f0c1cc7011c511ba962c5439277,2024-04-23T12:52:09.397000 -CVE-2023-48184,0,0,899caf45ae8acd3a7cda77d5b27c17e70ad3d79c87aaa9397538df7a4162100f,2024-04-23T12:52:09.397000 +CVE-2023-48183,0,1,e30177454f59bb0f06584d26feaa9f110fa0ec2af3bd7711cda6932b65226702,2024-07-03T01:42:18.010000 +CVE-2023-48184,0,1,2a3c5af64fd53e932537ccff83557b108ba1700dbb22cbbe968d9532a829a3fb,2024-07-03T01:42:18.813000 CVE-2023-48185,0,0,7ef7d220f1c753558def21f6a3c05b2c9063a72adb28cbfed77d5f1a672c1649,2023-12-02T00:21:40.093000 CVE-2023-48188,0,0,215b3c362c06f3f67c5f56adafe9b5433496acde9c1298c239fef4711454e212,2023-12-01T04:00:46.523000 CVE-2023-4819,0,0,486c1da204e823d4e3904d929a1e95095c2adfb2e9e8d41b10f2b239f97150b3,2023-11-07T04:23:00.223000 @@ -235618,7 +235618,7 @@ CVE-2023-48360,0,0,5f52fe9ee7f393ac321bc47178d905c7234bca1ce2a8a389c4be92357f554 CVE-2023-48363,0,0,1c71f90d086f9a4e8b6a985ba05521a60ebf32c533f9a33e64d0d0c63d0db63f,2024-06-11T12:15:13.450000 CVE-2023-48364,0,0,860ce4c9024f442acd95ce827f4acb0bf80273564e5ad65456d62edfe408ee1a,2024-06-11T12:15:13.600000 CVE-2023-48365,0,0,92b94a01aa64371270f664c267020af715b7d3e08ac6d8798928c922a3dc054c,2023-11-29T20:43:54.133000 -CVE-2023-48368,0,0,8ca0d824794f32702d28da492f3f25d93b5fe210e06861189d08c33f2f0ea83f,2024-05-17T18:36:05.263000 +CVE-2023-48368,0,1,14fc972e365681825e25968bdbe284b3728808e51453cd80c5c505a8e3ca41c3,2024-07-03T01:42:20.450000 CVE-2023-48369,0,0,476fb784121fe9e74a99fac62bdf0f332197e1520dde9dac0a54fe1ee315c6a7,2023-12-01T21:37:48.153000 CVE-2023-4837,0,0,5eda826768772b37d81ef65011339002d4824ff6d272e0327b36ba8b1b62ed7f,2024-05-17T02:31:48.790000 CVE-2023-48371,0,0,d610201241d12c4cdc64741daa7966450682d7a6dda71ac622cee439a759c926,2023-12-22T17:00:42.830000 @@ -235991,7 +235991,7 @@ CVE-2023-48722,0,0,b21bc90cd9ce1ec7c1af64c0d1da78505a33d180402299b29d84366f786b9 CVE-2023-48723,0,0,51de78ba4a0fea3bc725aa980029a19ae13dc47bb89690d15ea1655fe7f3baae,2024-01-02T16:15:12.377000 CVE-2023-48724,0,0,161f36a41465719e133c9dd4fcc3244326e7b46b87de3c4fdce57047eeea7f1b,2024-04-10T13:24:22.187000 CVE-2023-48725,0,0,e6e5b3a3cd78432765b74b2d7360c44fd933c54a4cf2f2334e127b9f4342156b,2024-03-08T14:02:57.420000 -CVE-2023-48727,0,0,5c3755f34bdeb7d1ba96210efbc4c70f670197c5e00f7085be50401034240b15,2024-05-17T18:36:05.263000 +CVE-2023-48727,0,1,9952b30b8ee49262df2f099bc86cddbc0267d3d946019a464bc87fca1aae30d9,2024-07-03T01:42:22.043000 CVE-2023-48728,0,0,ed4fb3603eb3d1fb4a8089303ba944449bfea1856081f932800d0cc5bd7026e1,2024-01-17T15:19:11.497000 CVE-2023-48729,0,0,13f3c83cf7904baff3f0b31a9a04b64ff281e898cd527079412a7cd8a8ab623a,2024-02-14T18:15:46.243000 CVE-2023-4873,0,0,465c1e241ee1b198b74a3fc3bb12f674d897060f7573d208dbebf389159d3a67,2024-05-17T02:31:51.323000 @@ -236049,8 +236049,8 @@ CVE-2023-48788,0,0,a76225488769211eb3f82baf06e8c2fdae1734ff7e897a76c118d8a783dbc CVE-2023-48789,0,0,1e0645fec7ea3fad71b3ca71ed4dc6753766cac9708402fdc1f8d159af41e8e9,2024-06-03T14:46:24.250000 CVE-2023-4879,0,0,8ff2f4fac231edfb0e8e6c6042e670dbdf0da9230931b634f3b1ed60cbdab258,2023-09-18T18:58:43.767000 CVE-2023-48791,0,0,4e7d2cae3ad6ba11c4e276624bedca77887a0ee315b409ddadb10bd81db3bb45,2023-12-15T20:09:24.010000 -CVE-2023-48792,0,0,a3c17617afe01ace18242f14c2f591f70a09281fccef1129ab04ab7743ac5ed0,2024-02-09T19:41:33.093000 -CVE-2023-48793,0,0,2854f6c6f521cbba3acc8f424414b10e13f57b8f6a918b43472ae35fef784b47,2024-02-09T19:40:42.787000 +CVE-2023-48792,0,1,5c2aee35948bf52c45856f04423cf3034c4db1705c4352d4c0ffe18b53f16d95,2024-07-03T01:42:23.563000 +CVE-2023-48793,0,1,e12fc34ba64c9d158dedcc17eac798e8672651aef8eadf95d2da8c11d5f8f26b,2024-07-03T01:42:24.367000 CVE-2023-48795,0,0,9a1b9599bc877327a43d279d8887b2292c9be4a9c871a29ddf35e8d8a742e4bb,2024-05-01T18:15:10.657000 CVE-2023-48796,0,0,9e1a54d61837f1660243218a92f33ab6c093e838cf1a08d33043e191ed76cc35,2023-12-01T20:14:35.870000 CVE-2023-48799,0,0,41b4e4c55be354a73001fc873a1fa0ce0a1c366cc1850043936be8ca9abad6fa,2023-12-07T20:14:48.190000 @@ -236100,7 +236100,7 @@ CVE-2023-48860,0,0,b650f66bd82e10eb24c227258eb0bacd29892b1b7ed9d78489c662c7ad0b6 CVE-2023-48861,0,0,3c29f239b0595edbc180c33fe01576fee5a79874aafac034ecddfba0e2b39602,2023-12-11T17:54:53.557000 CVE-2023-48863,0,0,f97de4feb3b75fe65ed11a9be5544ea7bdc582a61a017b4bceb0d8ebca95c907,2023-12-07T20:51:22.473000 CVE-2023-48864,0,0,e030c3642f5f605cdbe28f176b78801327737c9c3f7a9a7e5bebe5ee2b71bac2,2024-01-17T01:35:05.413000 -CVE-2023-48865,0,0,7021cd6e2eb84705e0c0bff283208d507ae86633e5ea2fa51ec10da5391d4550,2024-04-12T12:43:57.400000 +CVE-2023-48865,0,1,3cd7555bca8ad7233487cb54ed0d72f203c740126d7cff50faef21a12594eef5,2024-07-03T01:42:25.237000 CVE-2023-48866,0,0,f4f9743675afabccf5b6b1dd4c34a22ac8f4a08a4ba5e7a9d10bd28622ce7cc3,2023-12-07T18:16:40.137000 CVE-2023-4887,0,0,793ecb0244893b4c9ce5a6ff3e0d13a36652a9ee0ae60286c38b9a12736b0c04,2023-11-07T04:23:08.350000 CVE-2023-4888,0,0,7445aea8fbbbdc356ee73ac5d755cb38cd5e4c7b2adfdb09db6e14773a12c91e,2023-11-14T19:20:47.200000 @@ -236230,10 +236230,10 @@ CVE-2023-49107,0,0,0e9af909d621a9c4570185530fdb9aef197de445657f00c33192f11bd7858 CVE-2023-49108,0,0,8b448f813b7f2ff64556bb633e06c1db82194a485a83298972e379416108c845,2023-12-07T17:52:39.950000 CVE-2023-49109,0,0,3bb373d6db941540f9b57f78839d3b030348e834d02ede0d650edc70819635fb,2024-02-20T19:50:53.960000 CVE-2023-4911,0,0,0380760292e65955859c1ea2fd6467a51435ec5fc89240e3b7268906c4542c20,2024-02-22T20:18:58.020000 -CVE-2023-49110,0,0,288c4dfef5553cc86cf8232acf93e2c4f0f7ced39e372f23d4f20ee3b357fad9,2024-06-20T16:07:50.417000 -CVE-2023-49111,0,0,39eaef1b1cefe18a93fba8917b64eadec3fbfd3722261b5867f4dd77a2add98d,2024-06-20T16:07:50.417000 -CVE-2023-49112,0,0,dd4452bd1c78d0b19ca25cc28d4bc8e567b574019a48944860d3858d0f452c4b,2024-06-20T16:07:50.417000 -CVE-2023-49113,0,0,ebec5dd238079a4b14d06678dfa32d79eabf90e2d5277d1c4f610738deab797c,2024-06-20T16:07:50.417000 +CVE-2023-49110,0,1,8b58334ac02dd5b7b1ae35b2a658333276b33522d3c8b5bb0fe8859f970db620,2024-07-03T01:42:26.413000 +CVE-2023-49111,0,1,df0dafd2b2920c0c1ef482d192465048000f9bae0650aaf5841143aa649b80f8,2024-07-03T01:42:26.627000 +CVE-2023-49112,0,1,fa413702068a86fc4c7e36ae8fc0a181d36075b881dffad29e8ffcbd503a5335,2024-07-03T01:42:26.830000 +CVE-2023-49113,0,1,9f18333823936b97e2c8227f5a9e9ed3eb5632dd98baceeb7500bf5382f29091,2024-07-03T01:42:27.633000 CVE-2023-49114,0,0,1149e9644a812fe979090b00a81f87220fd6ab37816f13bf4a0117849686b510,2024-03-03T03:15:07.170000 CVE-2023-49115,0,0,5521cb202ae5061815fd537e9e2cfdbe31e289a6cd8497886659ee4f090a5b70,2024-06-28T17:15:03.173000 CVE-2023-49117,0,0,532b60b363b961206673339ea571d1dbd7872affd35f7cb4f7e7a5be2e8191ec,2024-01-04T02:42:06.503000 @@ -236321,7 +236321,7 @@ CVE-2023-4922,0,0,7a4053a720178fbf5ce70edceb9e6f8bc04f3e44dde847a94f283d80d99b21 CVE-2023-49221,0,0,b50dd3cb2e90096f94a49181c494c07832236ea17f0d7581eb845989d43ed6aa,2024-06-10T02:52:08.267000 CVE-2023-49222,0,0,d9417ad6738721be2202baa06c85d8a21ffb4ad2c0f5faeabfe36a91f4a94f7b,2024-06-10T02:52:08.267000 CVE-2023-49223,0,0,0a7218c0a5de813ffb956c86470a45ee7c472e44d7ddbdfaf5f94ef38dd1508b,2024-06-10T02:52:08.267000 -CVE-2023-49224,0,0,9305276a75cfe335c70ce45041a0232c2151b28a6620c596c3d86e76e9f68a97,2024-06-10T02:52:08.267000 +CVE-2023-49224,0,1,00cff83598c8c518139faa5c75184294b6f617eeb72a225d37eed61869884f54,2024-07-03T01:42:28.180000 CVE-2023-49225,0,0,67ae01b5198a01c140f5deaeaca8526fd2eaf70466f07438af6053aa64cc8dcb,2023-12-12T17:04:37.617000 CVE-2023-49226,0,0,f1a97f1312ace441154176f1d2587ee178c928f3456e9b9c638512f47ae381ae,2024-01-03T22:54:12.677000 CVE-2023-49228,0,0,b37aa175fce7fe3dc61886d1f496eca0de99535cf0452ee346d5f2bbad00baaa,2024-01-04T17:54:01.673000 @@ -236406,12 +236406,12 @@ CVE-2023-49322,0,0,ec573216ebb589a7bde5f243513713e9483d1daf2c07741422a11e58b2466 CVE-2023-49328,0,0,2663afaf0fdc14fbd61676b6a0c189ccd927763de1881d5d7d0168b413a2f270,2024-01-03T20:43:29.493000 CVE-2023-49329,0,0,c639631ea0b01f58ba85dbaa7f0a475b505fb4a877133b9c4e228894b22af3d9,2024-01-26T19:01:44.507000 CVE-2023-4933,0,0,53cb5ff21b4e9bf5c75b3188e0de1a02ee33e8cba99d0c1ae0f005f47daf1a34,2024-02-16T18:57:14.973000 -CVE-2023-49330,0,0,7e910ae6495cd370beeddabae92e2b862db6b0b217ada0f46fb0b2912b87d5d0,2024-05-20T18:15:09.137000 -CVE-2023-49331,0,0,e437332fad5ee7712aa6c190d09c1acedf8b23a3e5aed76a102a11371326dcf9,2024-05-20T19:34:58.277000 -CVE-2023-49332,0,0,3e2752be3f9e31278ff2b9fa5bf519c06226890fb084666268bc167af9b1d824,2024-05-20T19:34:58.277000 -CVE-2023-49333,0,0,ed2c77fad0328335b3609985e1582f2307f52d39054aaef5736efe9574d5797f,2024-05-20T19:34:58.277000 -CVE-2023-49334,0,0,0b749aecd3b498755874d794d15a346f1eac005646ff4d13644fbfa77ca3b02a,2024-05-20T19:34:58.277000 -CVE-2023-49335,0,0,493a5c8d5d630a91a473f60106af86c63abb9ac7950df521ccba5a9e9cf0012f,2024-05-20T19:34:58.277000 +CVE-2023-49330,0,1,5e4f6cb47609d927ea1410c1c9373a3574d6b84836b654a38d309d07130a3b34,2024-07-03T01:42:29.057000 +CVE-2023-49331,0,1,e56bb4829a12af906f9f6871659deeddbcbb61f190c9255fbcb33ea59401c94f,2024-07-03T01:42:29.803000 +CVE-2023-49332,0,1,eca450298543a1bb3b60419f228582d01112a944a6e91163937afb2a06a49810,2024-07-03T01:42:30.520000 +CVE-2023-49333,0,1,2eeb609e3d15605e1b1c20b57855cb7150b1db2f497ce8ac5071b5a0b4351712,2024-07-03T01:42:31.230000 +CVE-2023-49334,0,1,9ad6eedcb03f7a172221bc2f6a0260009bbad50c9cbb4a0f5dbd937d290a65da,2024-07-03T01:42:31.940000 +CVE-2023-49335,0,1,e7d994af3bf6531f78fd36c6bf9b0b84ca46db68a74be45308869abcb571e682,2024-07-03T01:42:32.677000 CVE-2023-49337,0,0,86718fbf647addc1ffa7afba66842634946d6f14a10a1ba39713b41194fe1fa1,2024-02-29T13:49:47.277000 CVE-2023-49338,0,0,2e7514f1a1d95d8adbcb4af72640d5c4afe066a5541734fa443bd47771d4ba41,2024-02-29T13:49:47.277000 CVE-2023-49339,0,0,5e0b0c12f27e752a168c99793f0c0ee1088d5fc0e77c7aa77b0e94e5e50795d6,2024-02-13T14:01:40.577000 @@ -236502,7 +236502,7 @@ CVE-2023-49468,0,0,57d5ec3ccc918036b475b9f54b2e396366451915366ece25a89704668e428 CVE-2023-49469,0,0,cf895a2dc3add24e416ac7bcb0530a971aa2975c73743a17956ace666f5a97e4,2024-01-04T17:14:07.600000 CVE-2023-4947,0,0,22b6b14e8c839e20c9429d0ba7697cdb9ac98a0cca963ad631bd6ecd6354934f,2023-11-07T04:23:12.703000 CVE-2023-49471,0,0,9786a9b85e2a2cfc8ac5810f9b5329581bf752664798422bca39fbc4f46bebdd,2024-01-17T13:41:42.813000 -CVE-2023-49473,0,0,aeef6c93fd318627f792961aa8af17a21d95870ef45f980d4b13b8e018ac9a79,2024-04-30T19:35:36.960000 +CVE-2023-49473,0,1,dad30ce72062f68a05a70e37e06e47346cc49eba3f96dc90d30bb523b9481850,2024-07-03T01:42:33.563000 CVE-2023-4948,0,0,fe74618322894acd9d5c196407c8ee7a7b8a3cfef58094beba352735ceb5a1e6,2023-11-07T04:23:12.883000 CVE-2023-49484,0,0,b3bb47b9d3bebe9b919a712e385039470f90ec9024bd9f7aa1a5d970a61e5cfd,2023-12-11T19:11:05.637000 CVE-2023-49485,0,0,48aa9077d57b1d2e7ae05300b0cb802f30139b627a9d2c23d0e1071b24d3a4ae,2023-12-12T17:19:56.587000 @@ -236516,12 +236516,12 @@ CVE-2023-49492,0,0,9c4bd2462efa2df7646c733d775d9d840d2fc245f51cd020c6e395a977ae4 CVE-2023-49493,0,0,5e0822009efb3642e80a93910e9beb8c427c299d5b40190675128087213f18f3,2023-12-12T18:23:26.673000 CVE-2023-49494,0,0,20f2018af131e9761c71797e19c82aa1cea48a88ac53e09531f5cfaf288cdf8e,2023-12-13T16:29:45.553000 CVE-2023-4950,0,0,cfa22e548c13257df3eb2012ab1d52681f07d9b27f1451606b444baef665ec7d,2023-11-07T04:23:13.067000 -CVE-2023-49501,0,0,8b9342cb05566cb3da36d2c1cdbf84a61d70bc40ea9decf4ea40435d7f624457,2024-06-10T18:15:23.307000 -CVE-2023-49502,0,0,346c1e17457c56ca6744cf9e738602f54800ecb677c100fcb5a268083036dd22,2024-06-10T18:15:23.440000 +CVE-2023-49501,0,1,645917e29a67e528a19c4a043d7875898b0f4fee2f593c517e0baaf3dee3ffd4,2024-07-03T01:42:34.367000 +CVE-2023-49502,0,1,da8e0d36f34c81e431a3c0503a4c8b04107975d42b4eed4873540a19ebc677de,2024-07-03T01:42:35.263000 CVE-2023-49508,0,0,92b43d1e29e41e8f387ba55174b4e5d8a40e7e33b6df860adcf514b0ce52ed12,2024-02-16T13:37:51.433000 CVE-2023-4951,0,0,c076a2463493da9bc3b373429bc0f5c55992a1aa278a23958a81e73c8c3be286,2023-09-22T15:15:14.253000 -CVE-2023-49515,0,0,08c2bcc95a06809fb7d6f5d078242b8d31f74f229706b6d7c235970e4b8cb422,2024-01-24T16:48:09.680000 -CVE-2023-49528,0,0,9c01f6db2187e1da2cfd462d9e0cbba511108b5680f545282e64368401d1e6be,2024-06-10T18:15:23.510000 +CVE-2023-49515,0,1,fba6ae4b9dbda87bf77d58079d1e7fdc5597e983326dac218dacc086c68e81b6,2024-07-03T01:42:36.150000 +CVE-2023-49528,0,1,bcff757c4ee07f22736afa13a889e6d02ee86ae241b71b1c98b3c18a1dcdacf5,2024-07-03T01:42:36.973000 CVE-2023-49539,0,0,7ce109109350d274fa4509bc4cf5d34703fed136447f67f16382a2f84ee128a3,2024-03-01T22:22:25.913000 CVE-2023-49540,0,0,0068c2fd4daf40dfc9bb2f3a3b013aea4d48b09eb92a0fb6604787f731ac0e73,2024-03-01T22:22:25.913000 CVE-2023-49543,0,0,6c3c8e82e12cbc074c9b5ec14949b483db3aac2048236dfbf377ab4d4b7e20d2,2024-03-01T22:22:25.913000 @@ -236574,7 +236574,7 @@ CVE-2023-49609,0,0,cfadb254c8ff32da8dcb4f73efed6c3b90ecd1a350b850cb898b392245d84 CVE-2023-4961,0,0,e4aa63ee50fe794744abd71721cecf1e73ef1f06e678ada5c85e909d11885a1b,2023-11-07T04:23:13.490000 CVE-2023-49610,0,0,08d82d3af6f57f27b31cca58f60d1a8d0949fca9c1ffeb3eac6cda419e30856a,2024-05-17T02:31:09.050000 CVE-2023-49611,0,0,cf17ac6bf45b5bb412ac7e187ed615ef9ae3854555947f34f1af970b7cff226c,2024-02-14T18:15:46.413000 -CVE-2023-49614,0,0,08db10e41fc0e9113ffc92a885e0f913feb8f72183129936a00ecc24feee9993,2024-05-17T18:36:05.263000 +CVE-2023-49614,0,1,febb4bee3f6315670369e5d82d01d40402f43b67a7f99bc5b479c449077f7234,2024-07-03T01:42:38.460000 CVE-2023-49617,0,0,d724d3ea25090436122a9ea3921453ed554fa47fed3d3acd31e23d5e4220fec4,2024-05-17T02:31:09.227000 CVE-2023-49619,0,0,b0ca208f7d9cb15d9f697582815956654823cd4b82a4f8585baded6c869a694b,2024-01-17T13:44:55.787000 CVE-2023-4962,0,0,3a1bf533672c5a68cc2c5a0b6854d8452b55565fcfc3cb60757f1c5681a1c9ed,2024-01-17T21:58:45.003000 @@ -236851,11 +236851,11 @@ CVE-2023-49999,0,0,8eb410116f8139237e4d4645132c57f7d4d0a47750131858175f4b02723dd CVE-2023-50000,0,0,edce1177adbc3120490932ad28eb0908ae1d710c5789d4a818c9d8c99725d651,2023-12-09T04:45:09.690000 CVE-2023-50001,0,0,0aa0e453b86689f5ac41c926c58da0d619039ce538304d34e38e5a3692741e33,2023-12-09T04:45:12.637000 CVE-2023-50002,0,0,72b2835024aa8f106fc4b57cc2959a311f3e68c21a6c9a6191613f2ae70454c9,2023-12-09T04:45:15.093000 -CVE-2023-50007,0,0,ab0889505b7ebdd5b2640130fb1c7b5e435bb3b4dd0b5d414d130deb4d17511b,2024-06-10T18:15:23.583000 +CVE-2023-50007,0,1,c2a98c3d87da72b92c324ba3cb08ad35629bf406e9b3c35addda6f10f3816108,2024-07-03T01:42:48.353000 CVE-2023-50008,0,0,6430cdc6b54a437d0648221c80becd6ac9249f50de651c80f9e402d6343e69b5,2024-06-10T18:15:23.660000 -CVE-2023-50009,0,0,eb58fae97922bd4e9849c57765688abbe397ae3d4d335cac5e524bbb841215b0,2024-06-10T18:15:23.723000 +CVE-2023-50009,0,1,170dd9930657e166b905729f0ac42a66a8992249c05ebf1d569c0f4eb6cd99b1,2024-07-03T01:42:49.137000 CVE-2023-5001,0,0,8d4a70d2ed1fe35121450c787c3bbd11a6bfd8d579c5feb8be884a6f01e781d0,2023-11-07T04:23:17.670000 -CVE-2023-50010,0,0,2c5e92663551bcedc216078b01c4540055e0a62a06b343b59d6d012d8750f7f7,2024-06-10T18:15:23.783000 +CVE-2023-50010,0,1,2cb91c5b0cd0b34eab6d9a9d9e423db72c16e763bec8471e43a8ef97d96dc827,2024-07-03T01:42:49.940000 CVE-2023-50011,0,0,06fd9011277607c300a2f1116cc8f443fed8d39fba75e4e4358f7ede2b673b13,2023-12-19T13:49:18.530000 CVE-2023-50015,0,0,e39c90fe1bcbad7c5cc184a23e5dbf57286511bad672139c5244862778b234ea,2024-03-11T01:32:39.697000 CVE-2023-50017,0,0,94a085d3b9a01b673efd08f3fd6d1c5bd5fec950ce7fd1026d076a4011d3d29a,2023-12-19T02:36:27.887000 @@ -236865,7 +236865,7 @@ CVE-2023-50020,0,0,0420bf44f3192678835af5943c71c435d383debc14787f6862dfd11873466 CVE-2023-50026,0,0,ddb63f64ad9db005831a0adfbb131b3f4a80d06c694a28549975d090519ef096,2024-06-07T14:12:14.943000 CVE-2023-50027,0,0,cc6332349beda48de311c789172519792bf0e1d73915b299358aaf3ebbfbd533,2024-01-11T14:26:14.217000 CVE-2023-50028,0,0,c4dec5d92b9d7082f423a44ec040b850ebf7d261529103270f04a2098eaade81,2024-01-25T19:55:05.850000 -CVE-2023-50029,0,0,7c9bacbacbf165ee4707b0129bcdc91ac10f64d0a4f7c58838d3265ccd9ec1e8,2024-06-25T12:24:17.873000 +CVE-2023-50029,0,1,5be71ab341cad2392714c91534374e0354d8190466c3a5c7ad66938c666dc7a6,2024-07-03T01:42:50.713000 CVE-2023-5003,0,0,2849233ffe4afb30b72aadd62309b165bd2ceffb201a5ac14f68b09d02b2ba14,2023-11-07T04:23:17.990000 CVE-2023-50030,0,0,6c466acfd9c93ba20780248d726b1091908b80e5ee7f2c9d8b4bffa54cf157fa,2024-01-25T17:10:31.103000 CVE-2023-50035,0,0,7af1ae42c48e4a2c0ccb4a35436abe8d24603d49181e707354cb51c037ebe841,2024-01-05T19:14:27.160000 @@ -237113,7 +237113,7 @@ CVE-2023-50441,0,0,9bd760298da517bd28996f023ce7334405dbe92c32aa3c503cc1491615459 CVE-2023-50442,0,0,a057a5b7c26414fc7563d24cb642834802b777e3b23cc824df69ea34217acf4a,2023-12-20T18:29:15.687000 CVE-2023-50443,0,0,274542200fff426927a34d0d27b8cdb3042965648a1dcf389e5eb13576a3b3fd,2023-12-20T18:51:56.390000 CVE-2023-50444,0,0,38c1ada4e0572d58fe6354b6dd2e3bb6174f3b1abe52517e3be8703c30a907d4,2023-12-20T18:31:52.980000 -CVE-2023-50445,0,0,a8eb176a669cd1e21275fd5a7208e03ca36ce08b5f863c7b8c3a5a38eb33bcc7,2024-01-24T16:15:08.313000 +CVE-2023-50445,0,1,c46c9ed53637e012ae7f341d8f4351d1697f0ce5316f2de804732128a76d9079,2024-07-03T01:42:57.717000 CVE-2023-50446,0,0,b695f5a12568e4d1dcada2df1460b60525412989181e3c9caace1cac4b258d09,2023-12-13T19:46:58.377000 CVE-2023-50447,0,0,4274e15463a664271f217c6353494295c4741fbda8ce5043605a4d94e5999dab,2024-03-27T21:15:48.783000 CVE-2023-50448,0,0,42b0c812ec7d1de171876fa730dde3f7cb36fefe88b892e58aa2486acba50cc7,2024-01-04T23:56:47.930000 @@ -237346,7 +237346,7 @@ CVE-2023-50902,0,0,1513c647ffec3bccc364b057fe7be8ad3f21264b604f6b5475cb44c0c9074 CVE-2023-50905,0,0,c0b30a24d3473e2350b628f1856fc1c117d2f8592d3dde08d565e83b22838670,2024-02-29T13:49:29.390000 CVE-2023-5091,0,0,742357f5a217cf462519eaf750c88817634b0babb2a1ac8228f117003e40bd4b,2024-01-12T13:39:11.443000 CVE-2023-50914,0,0,37b288e4aab9b333f4f2eb5cf9059fe9b4dc0a10b43a591dd3d271890d33cf80,2024-04-30T17:52:35.057000 -CVE-2023-50915,0,0,d657891fff28603b87e7aea05b9509d77de602dc5993c4ffdbf6fb63e8f63dd9,2024-04-30T17:52:35.057000 +CVE-2023-50915,0,1,00a3ea633ae9e4b305c66a6f1d527334c4e7bed6ec1f5b05792ab5b0d7042af6,2024-07-03T01:42:59.473000 CVE-2023-50916,0,0,8389bab58e732355670227e157a42be931a6ad30ed375a5de2bdca2e8f73b50f,2024-01-19T17:49:52.770000 CVE-2023-50917,0,0,ae02854392d1c9add428acaf26494bf33c678553d73518cd872ace972206aa21,2024-01-22T17:15:09.207000 CVE-2023-50918,0,0,84c5eb6df0deb5d7c5d3c51cf99a8f6fdd461afc97576ca67536170b8d368e90,2023-12-19T17:18:38.713000 @@ -237532,7 +237532,7 @@ CVE-2023-5125,0,0,a1c4b4038cc3b3040fdc552203e289f2b08811b020cfaa60abf15cb6844a5b CVE-2023-51252,0,0,97b0a93e1209328abbb58dc0a45505bee63febd69325e191d1dbc34677553e32,2024-01-16T14:52:36.910000 CVE-2023-51254,0,0,2951fd8f57ef9e178e730cf865fbc6403f9d3f515dca49258f4eef9df3eeaf7a,2024-04-30T13:11:16.690000 CVE-2023-51257,0,0,31bdf7412e4e5acb9a330111da0884c7d96702973921f9850abb00f7ef71c413,2024-01-24T03:15:08.353000 -CVE-2023-51258,0,0,2f954d231392e93c159911f0e9c9d8f12349a16d3e1ff23f202870ee4682e46c,2024-01-25T01:58:44.797000 +CVE-2023-51258,0,1,d3e271202376810fcfda0efd55002c29227cc5aae074ae90051f19d88beefced,2024-07-03T01:43:00.690000 CVE-2023-5126,0,0,d07370d7f0e13771f12a09e9ace3b5d0cc599f59eef1ce6d7e3a5320e50d0626,2023-11-07T04:23:29.160000 CVE-2023-5127,0,0,15e8847853d54803dead2e3e4891f023b235e0ff9a2e809ba8631cba80a8d144,2023-11-07T04:23:29.330000 CVE-2023-51277,0,0,159ef1229b386571133417e6aeaea94d1d0ad081c0f756b7799ca07f2f64dcfb,2024-01-11T17:01:29.977000 @@ -237626,7 +237626,7 @@ CVE-2023-51432,0,0,4f3fd4cb5623159c289f10a09b810bedac23e66a0d10d08ee4ee670996b21 CVE-2023-51433,0,0,b8dc83f5ab50c43545500f2811d3f45773d2e8a990907e7386902922217ce41f,2024-01-05T16:09:17.817000 CVE-2023-51434,0,0,c18c66478f4f646ecdb1bffd9ab109859696d38a901559a7d2490ec2a2e73028,2024-01-05T16:08:52.337000 CVE-2023-51435,0,0,6886e648ace9ec1e7b1e3588b5169a9e1d93651d8974969f424f6273501f9ead,2024-01-05T16:08:27.370000 -CVE-2023-51436,0,0,2107f712f63a1e19020cfd2dedacda1fd4d3800c643011de684bf36e0ed532c5,2024-06-03T14:46:24.250000 +CVE-2023-51436,0,1,c35875997ed2056fea70cee9ee34b76cb7e30017abe9d3ed3aabf7ef3562133e,2024-07-03T01:43:03.210000 CVE-2023-51437,0,0,cff2fa72c6f410b0d66688710679d3379510f0eb38be71b8edcccc6a345e8282,2024-02-15T04:53:10.967000 CVE-2023-51438,0,0,855a9448e478f67c468dcc7663116d45af1608148d1f8960150aa736f11b316d,2024-01-16T16:16:21.633000 CVE-2023-51439,0,0,cc269d06ee3b6379c19a2c90f0a7cb761b566cb78f2db97b1bee392fc7d9ba5b,2024-01-11T20:36:36.063000 @@ -237902,7 +237902,7 @@ CVE-2023-51704,0,0,6072a879b080e6fb033e8ec423231f186d958a65066b901d7febb9355953e CVE-2023-51707,0,0,590aa0b7ca5dffbde59e4aef6b25734ed4bd181b63c1dab2b39387171595b51a,2024-01-09T20:07:58.863000 CVE-2023-51708,0,0,863a3af7e2d76aebe513db0a9f2335334bcb9ea2a792766a29aa2a8a44379ddc,2024-01-09T15:52:37.997000 CVE-2023-5171,0,0,913db5b04f4ceac9626806f4eb63dab596791968e32a0113d235f062fc82b34f,2023-10-12T02:52:09.820000 -CVE-2023-51710,0,0,6f3d5633cfbf22a5a808a41139057d9aad79420b0463e184e46940dca9d9cb27,2024-04-30T13:11:16.690000 +CVE-2023-51710,0,1,79ce6e5c96d55165aab5c91dac2a06a015fe7d1749cae928be620bf7f109c0a4,2024-07-03T01:43:17.330000 CVE-2023-51711,0,0,7e881883c8f55aa311ed9a227e318c5afff91457b7833eeef9e535da9f3867fd,2024-01-30T21:10:53.387000 CVE-2023-51713,0,0,907a8c1c025513145041da52429ea23dc549b70249768a5c88d61e100b67a5a3,2024-01-08T19:06:50.837000 CVE-2023-51714,0,0,dd553579ec0002cc6be113fe27e4117d192784ede7fc6cb66b7dfee9b3fbca0c,2024-05-01T01:15:06.390000 @@ -237942,7 +237942,7 @@ CVE-2023-51747,0,0,c29edea4240e179a7c47f1db954eeb18bde8c32cbe4c6a2ceb762a555d949 CVE-2023-51748,0,0,44503024f846564ce6045aaae5d45f243612266681d1c57f6886448ef3e8326b,2024-01-18T19:15:09.460000 CVE-2023-51749,0,0,701ea0cc6b04a83b234fa4516e42232bc43a17a9a57b5743f6480a17b5e34138,2024-05-17T02:32:26.283000 CVE-2023-5175,0,0,52f024310a9cca1f1633a144d94eac9de059c6e7a03ba675890700e275db0374,2024-01-07T11:15:14.073000 -CVE-2023-51750,0,0,3e06d2055f61806a4ea14cdea88a042e23214c52e560534746acea9a3bcab337,2024-06-12T20:15:10.907000 +CVE-2023-51750,0,1,63b1adde2fc7cdc2009d9f1f23ef609d165715dafde8b2528d78f4e8fb77690e,2024-07-03T01:43:18.250000 CVE-2023-51751,0,0,7a2dab1e27d28f618f7d961a0fe8a5e3239ba8655c43686671fcf9f58106eb1b,2024-01-22T18:41:31.690000 CVE-2023-51754,0,0,1316b4249b3be14e7f5edc3479969da72b751bd75e4b72a07fe730baccc3fe5a,2024-02-14T18:15:46.867000 CVE-2023-51755,0,0,f725e97de2464cb69191bf94874954133bb20b3e8fbd0481e11e3eea52e56870,2024-02-14T18:15:46.907000 @@ -237974,14 +237974,14 @@ CVE-2023-51786,0,0,0e567df6d814f1cdbc94ad3dbc17d5fd1cfaa7c36a3e490807031a37bf64f CVE-2023-51787,0,0,63d102c9251f904f2b5484f4649646b9f390213aa14f9875d4d55034c5dfad91,2024-02-15T06:23:39.303000 CVE-2023-5179,0,0,45eb9585edeef4044494871bf68ee2595ee61a9cca8e1bdf6fe79481fd3a39b9,2023-11-14T21:29:41.243000 CVE-2023-51790,0,0,34792c7c9d74f45a3954ab5a202b8afe400253531dd82ed2e2fbf28e9ed3fa97,2024-01-18T19:47:57.360000 -CVE-2023-51791,0,0,01d963dfb7a7c5130696984fcde64633c86efbaee38d1e363dcac81c48e489b0,2024-06-10T18:15:24.107000 -CVE-2023-51792,0,0,39ac9888bfc61bb20986dec4f2052ff03c2f80475749471e50a16b339e82f3da,2024-06-10T18:15:24.167000 -CVE-2023-51793,0,0,f14230199610063ffbe4d10517032b7ce961eb018e3ca4b6889503a1a1383c0b,2024-06-10T18:15:24.273000 +CVE-2023-51791,0,1,87766c92c59658db618453044f42ccf339cd6c1b3df114431d44a1d21e1cad84,2024-07-03T01:43:19.107000 +CVE-2023-51792,0,1,7d8f3e64f0e3a253e4c7a397ca38ef25dc0134afeebb28d2f1443032c2248e98,2024-07-03T01:43:19.913000 +CVE-2023-51793,0,1,f16336383b20e4486ab2bdbaee11737ed89ba61bef56cc3fe1951b13c7e9c182,2024-07-03T01:43:20.733000 CVE-2023-51794,0,0,24e4cdcfff7039fd032bbc3a832b94f95e5e50b76f8017bb84aee66b11d09f08,2024-04-26T15:32:22.523000 -CVE-2023-51795,0,0,ed07bae9bd89de65539d5d841cb6bc298f750a23155a9cf73a73ed96be4ef89b,2024-06-10T18:15:24.363000 -CVE-2023-51796,0,0,cf367d3e314f93ce48918e1d5d94c420e43601248e570ed37b88ec1e2a1f8693,2024-06-10T18:15:24.427000 -CVE-2023-51797,0,0,191f35c165a5940a22dd44f4a7b596055fe181b842155150477445ec3f088a03,2024-06-10T18:15:24.487000 -CVE-2023-51798,0,0,600613243de42c0c1f4cf3c6be516a68ac84411ad37f0f3f1a0351ae5f6dbac1,2024-06-10T18:15:24.550000 +CVE-2023-51795,0,1,41b6f5402a8178a714e5febf29ef36c0df54c514b584c16c16c7e7f627bdcc57,2024-07-03T01:43:21.537000 +CVE-2023-51796,0,1,3bdae660f318686e13d3a2a8a11434f559a9ba3bec20be5b73aed2cdea2caea4,2024-07-03T01:43:22.343000 +CVE-2023-51797,0,1,15fc85d3358fc86d221e1d0ab3fdefddcc3d7931f292adf653ee482f3b3f049e,2024-07-03T01:43:23.157000 +CVE-2023-51798,0,1,3544aa30bd6dda454e0b3df26600e87350716d42514085effafca2449c32796c,2024-07-03T01:43:23.963000 CVE-2023-5180,0,0,6648cabc013b52666c2fbe5cf29dcef95c2c9930e7cd33a1d40d20b27536398a,2024-01-04T15:43:40.260000 CVE-2023-51800,0,0,9ebfc58a2eb628f09a96e526516e12240e8bb85fc4e11d2d583c2b2719caabba,2024-02-29T13:49:29.390000 CVE-2023-51801,0,0,8cfe662b5b3598910a81e15e44e4c1d8555947453e63004ea63b5e4fd392069a,2024-02-29T13:49:29.390000 @@ -238008,7 +238008,7 @@ CVE-2023-5184,0,0,bf9550067b063a44f5e2c60f84a5dc2e3934ba6dac9ad3d3d8dec394ee076a CVE-2023-51840,0,0,2e2dc4e56206ef09b07482626c518e6fe03125bc73805e6245582857f1472ad5,2024-02-03T00:29:48.223000 CVE-2023-51842,0,0,e0369b9a49f0cf84587338e1939b6265330f9f97b2fd01f93784be60255c10c5,2024-02-06T17:00:29.330000 CVE-2023-51843,0,0,273c52920383b16344817eb583cc56df030df52ace9d49f8039a41ceed8a76f6,2024-02-05T18:54:19.030000 -CVE-2023-51847,0,0,efc52785b94fd1e80eb9516df1c4906acfbaa52940aecb07a4d870bd4c16b0f7,2024-06-07T14:56:05.647000 +CVE-2023-51847,0,1,f496b4676a3a37f14b152aab6efee475f4e72b93dc4870446fabaf50ff48b69a,2024-07-03T01:43:24.980000 CVE-2023-5185,0,0,386042611b3c261d0b3f5e9b3745929d3ada33035e3086a1e80d8399eec7c66a,2023-09-29T18:54:59.730000 CVE-2023-5186,0,0,36263dcb3f06333f123a325e436cd03c03cbb31f2674173ec0bcfae3d9ef14b5,2024-01-31T17:15:17.980000 CVE-2023-5187,0,0,9dd87329dc229e5fe70944a1f9ce7b1568c1b908fe74eefae61702f0410ac112,2024-01-31T17:15:18.097000 @@ -238105,7 +238105,7 @@ CVE-2023-52075,0,0,849cf25ae1b4e576588db3e9f900c5f9565291ce2cef30c02ade7f33ef0d4 CVE-2023-52076,0,0,96bb30c05a0b24e0b19e11829076e8391e5c9cc1f31cc1ffa3b43447ccb54b0b,2024-06-15T04:15:10.857000 CVE-2023-52077,0,0,7ea9bdcc1b4ed6b7240096b1c1151d23e5ff74fd5076c4fa5ecd11d25ef4132d,2024-01-04T23:11:39.740000 CVE-2023-52079,0,0,82f653e7d5fbd8aa7819b340211d406b5545c82ffb4ccb81c0b1fb33874cea94,2024-01-04T19:24:22.547000 -CVE-2023-52080,0,0,97499d29b9ff14cdd0b7095b579b1f036c14a40044428f9bd8485d56e866cc4c,2024-04-30T13:11:16.690000 +CVE-2023-52080,0,1,16e1183fdba497f4398000c353592a24caf71cf22049d387f166e50636415004,2024-07-03T01:43:25.923000 CVE-2023-52081,0,0,55e9723bd29c5c6eaea3e650db8b2b010214b8854096cec59b7a5b75de2cb4e0,2024-02-29T01:42:06.407000 CVE-2023-52082,0,0,a040644528e65985246fb75c7e95ed66bc16eecf218c443d33c009500d330ea6,2024-01-04T19:31:50.127000 CVE-2023-52083,0,0,847a53600e309c03a5583afaad9ea6ec855c085e2d316e614ff71251e3514cee,2024-01-05T00:01:33.360000 @@ -238186,7 +238186,7 @@ CVE-2023-52155,0,0,2d124c7a3937e95fe09338bcde4297ee381aa5672d319a6218dc245e97278 CVE-2023-52159,0,0,9bf34263569cd9396d2193ed479c2125f1050e109a79c5640609380e6e4e5cf8,2024-03-25T14:15:09.267000 CVE-2023-52160,0,0,3cbe9dbbf23461cc9665f17f1860098398eb52c02e5ead3239a9707fba769c7f,2024-03-10T04:15:06.897000 CVE-2023-52161,0,0,4de9257ef3be21964b4728d6cd7db6e1764586b6317dd49dcb16510f88bf11fe,2024-03-23T03:15:10.210000 -CVE-2023-52162,0,0,8059c4b34f586104a1d3f75f4b14804c072307f105a7526de96e4b01d87bf077,2024-06-04T16:57:41.057000 +CVE-2023-52162,0,1,1bd9338733b6c2d388fd5a0badb736e81147c7da89aba74926195068a6aea86e,2024-07-03T01:43:27.207000 CVE-2023-5217,0,0,7ba5b927181a714978a513b1447492d30b9204770bc875e02b0ddf7485f511cb,2024-02-15T02:00:01.650000 CVE-2023-52173,0,0,653751d06808116187d115997433d85c759b866ee7527f311b397336366ebb4c,2024-01-04T23:34:46.453000 CVE-2023-52174,0,0,79e20d77a07605a892f972d0d5b1fee1a2293c3b3ed991923dbc5981d1985ef0,2024-01-04T23:35:08.563000 @@ -238306,7 +238306,7 @@ CVE-2023-5233,0,0,2c175d98d7f92eb24bffcf137b7e470abfb025cc3ed9a17368756eeaead46a CVE-2023-52330,0,0,e2800780eb3cbc03d4aa6964a6474d9931c1d698241a436d65bb6485bac07f9d,2024-01-29T22:50:14.043000 CVE-2023-52331,0,0,535f0900022808958f12c3c9fbe9fba9ddf6a2e5a13656842cd697778a94e0e0,2024-01-30T20:10:23.003000 CVE-2023-52337,0,0,55fa913fa16a3f0160ce03eb40c23b005cbeaa3ffa6035c50c9b775c51f9b858,2024-01-31T14:15:49.160000 -CVE-2023-52338,0,0,1624cbd545a406765d7bcac1a3d3b91d423eec4716fd6d521cb1f95b005a9081,2024-01-31T14:38:35.867000 +CVE-2023-52338,0,1,c19a89634d444e8b7418866f672b3a80a92a3dcfedfc6c85a948f1f2cb0e5bd6,2024-07-03T01:43:29.373000 CVE-2023-52339,0,0,4bbe57cf8d5f09dfe60f342a3942dda58e6da98c8314b5c5a36b0823a95b8323,2024-02-05T03:15:07.563000 CVE-2023-5234,0,0,0558a6bed4fe4d192c05a4915c3afbcc280f1387dd5837f40b9ee15558ea5e92,2023-11-29T02:25:14.437000 CVE-2023-52341,0,0,e416d66dc300a1fec35b92634bca599425c1eba7c994f713ffc16aead39c631c,2024-04-08T18:48:40.217000 @@ -238337,7 +238337,7 @@ CVE-2023-52363,0,0,c1dcca60bab229666e09c45cc7bfff29bdd3e5c32ff3551407c4d455c18c8 CVE-2023-52364,0,0,7756465d56e31dace56765c964633284bab49769c738e0b94dd5746a0d4321f2,2024-04-08T18:48:40.217000 CVE-2023-52365,0,0,04f5738027bcccfa061f7a9142086a77386fc2ff6337615b00f39e148b6f5377,2024-02-20T19:50:53.960000 CVE-2023-52366,0,0,20fb8e4fefe4720a53164f57c0f59b13495b47bb9338886bcd384b6b25cb588c,2024-02-20T19:50:53.960000 -CVE-2023-52367,0,0,f8a2cfa35a0db131b51dba6961563742d79875ff1e6cc49950ce4506f374f819,2024-02-20T19:50:53.960000 +CVE-2023-52367,0,1,059d33a9b5e3c4078b26cbdc15a1861aeba6ae88b6776bd4d8541399245b8c62,2024-07-03T01:43:31.290000 CVE-2023-52368,0,0,94b737df202d05945cd332c165250a9af924d18cbfe14263eb6d260f34e0fc43,2024-02-20T19:50:53.960000 CVE-2023-52369,0,0,3a7a64b10f5d683b617a6254042448548bac384d22a9043d72c2fcb76d9e4b61,2024-02-20T19:50:53.960000 CVE-2023-5237,0,0,eca0605aac0c74be9069660c91fb5d2937b5868fb8e67e103a1da25efd1a9054,2023-11-08T18:36:19.067000 @@ -238441,7 +238441,7 @@ CVE-2023-52486,0,0,9fdf2be55de582f7905e210dff16a1cdee55082a0519ced31c129176372c1 CVE-2023-52487,0,0,3a3e78ea084186adb0371544efb8f82f408d5369c2752062166753139b8af6aa,2024-03-12T12:40:13.500000 CVE-2023-52488,0,0,36d1bcdd5eea0c015d4ea7995b92de787572d11131cea5de38143fd765fb8b1f,2024-06-25T22:15:15.140000 CVE-2023-52489,0,0,4f90b8e08c302884e41cdc6c08a1a5c753a54199d0a445e09422e43dc2c21cdc,2024-06-25T23:15:22.287000 -CVE-2023-5249,0,0,c9a9a73292b795eaae901259118258ec7b799bf56b78d4d6d33ce623b44e08f3,2024-02-13T00:37:35.327000 +CVE-2023-5249,0,1,902c33c9dbd28cbe5075a17fccde01699ae9f0ae88d9ebb42328197dcacfdffa,2024-07-03T01:44:12.613000 CVE-2023-52490,0,0,622c560311948d3ead282b4c85e1584dfa5c2a8b7f9863e5b3204916300680b6,2024-03-12T12:40:13.500000 CVE-2023-52491,0,0,b60db874cba7486f888c4a6b582cc2fdcfe853c36d4329adf458516b4d9ef768,2024-06-25T21:15:53.700000 CVE-2023-52492,0,0,806ef9a4737e3bbe4aadde43ff3cfee809b161cb350c534e4b9069e3fa0418d4,2024-06-25T22:15:15.203000 @@ -238640,9 +238640,9 @@ CVE-2023-52667,0,0,787093db68bf1b9b20596d7ef1261e24adc5e62f6348f729d5ba8574fb3fc CVE-2023-52668,0,0,4d2d993ac1d820e293c0f61b8f61d3d9a89e72171c702092ea81b4ccfb9f39e8,2024-05-17T18:35:35.070000 CVE-2023-52669,0,0,59e6faaa43234715ba02f44d3e31f6bf98121f38bfe4efd79b3ef2ea8b6d5160,2024-06-25T22:15:16.753000 CVE-2023-5267,0,0,d6c1d8912f5615c4494ff19c986e1371086f07b976cd294e8cd11dfb02e20e2c,2024-05-17T02:32:56.563000 -CVE-2023-52670,0,0,683aaa78a260dcf278cfa508fdd5a3be2e98e9383964502173c6de9a2d6d97f0,2024-06-27T13:15:53.823000 +CVE-2023-52670,0,1,cf3c00012a5e88946ca4744de68fe35c4e4cfc458379d7a390c12be7a5327fd7,2024-07-03T01:43:43.890000 CVE-2023-52671,0,0,9b568b898eb29ec8b1b8f319ccba72ec86f17e8b65b1e7de39ab1acd73bbdc8a,2024-05-17T18:35:35.070000 -CVE-2023-52672,0,0,502abf3b745535c9298e77a6e9d82ce20c690f2409f96c79c24c6d39e1ed5d26,2024-06-25T22:15:16.900000 +CVE-2023-52672,0,1,da4010aeac4767d6b145d414fea366ad8d9ee563172792eeed9fe47d9888e26a,2024-07-03T01:43:44.910000 CVE-2023-52673,0,0,112daaa1adde346922d18f1d4baa30002304d5f2de45f82bd50028313b13376a,2024-05-17T18:35:35.070000 CVE-2023-52674,0,0,e974fe95ec64a50e50921de5cfad884096acaaac4bf1480461ec4d9ac4570585,2024-05-17T18:35:35.070000 CVE-2023-52675,0,0,cdd5cda7925b03e3f4f0a647d7269340dcdc034443ae92fca395a3371a973b37,2024-06-25T21:15:54.317000 @@ -238668,7 +238668,7 @@ CVE-2023-52692,0,0,d3a824fff4206452ad3a8c5733a1eefca805babf20e86b0ca829f9c0513bd CVE-2023-52693,0,0,9a4a796f270a85042e718ff10e0b6447ba65a8fec990240bd06d3517c4ea5337,2024-06-27T12:15:16.257000 CVE-2023-52694,0,0,644dbdd18363a3d8dbfc62c48e89109b201700bf5492906c071e0227e8e224a7,2024-06-25T21:15:54.917000 CVE-2023-52695,0,0,314ead98f71d5b192704698752c6f3077c829550a93116d660f4795acf61243e,2024-05-17T18:35:35.070000 -CVE-2023-52696,0,0,280f298a684bb98e30133689d3b90949f8b86e0a7a643bfaa1bcc17be2c50f8b,2024-06-25T21:15:54.993000 +CVE-2023-52696,0,1,f95b3c2eadc20ab855225b4141727cdc729465e4359fc8f0a59c52ad84f59f19,2024-07-03T01:43:47.200000 CVE-2023-52697,0,0,2d1eba29fe37a6cc489e274028ede887898bb9ba133424d9e0f857e7dca7dc53,2024-05-17T18:35:35.070000 CVE-2023-52698,0,0,4b851be2c7d3c21992795e6492c16e4e8c32b224aaa5ac4f846d5a363eca8782,2024-06-27T12:15:16.323000 CVE-2023-52699,0,0,7a5287478c931e704f68856082fc996aa72e6f6c685dd11a5c560b10b7729e4b,2024-06-27T13:15:53.990000 @@ -238696,10 +238696,10 @@ CVE-2023-5272,0,0,812d9b2d86101e770022ea5fdc9753e8d0c371cc8c8892a4e2c903d747bdeb CVE-2023-52720,0,0,75bfde3295801a77c4f6473b23346451d10c61a44e23cf0480e483b8b4e9675f,2024-05-14T16:13:02.773000 CVE-2023-52721,0,0,98d08c504cfe7b805234b0d4bd2dac9d9340759f28e2f1a76d8fb0ecc63116c4,2024-05-14T16:13:02.773000 CVE-2023-52722,0,0,1cb69373fa2e3f9acfda8cf3f1059ac59bcd836ce4838b0dffed4f7be87d9c0e,2024-06-28T05:15:10.640000 -CVE-2023-52723,0,0,583a4c96a7b28499ddb7ff561365e6e19aba033c74ad8d268661d6153971a1dd,2024-05-05T22:15:07.487000 +CVE-2023-52723,0,1,2fe194d004e97af726d85431e007c3326f52eff7c20e279a9c12c4d1b3f28f1f,2024-07-03T01:43:49.597000 CVE-2023-52724,0,0,e4f95bcab1195f846dc270610c1bdc3ac2e4854ca9278c47b39a202d9f9600b6,2024-04-30T13:11:16.690000 -CVE-2023-52725,0,0,88d4f88411bb4be959efdeb51d80e463c208ec56315d110e44fcff8343b01a06,2024-04-30T13:11:16.690000 -CVE-2023-52726,0,0,5e306dbe5f156c9416e227d0fff184c45bfebf2f1e4b91c9c4b65ae3bc844b98,2024-04-30T13:11:16.690000 +CVE-2023-52725,0,1,6c8006c6d070845e944a8779fc3ce3ac7e3893f3aa940aa4f5f18ea13a44ba8c,2024-07-03T01:43:50.417000 +CVE-2023-52726,0,1,461e65a6795b13b587912cbbcf2691811a9fedc1284b87ef3001955692c77f7d,2024-07-03T01:43:51.233000 CVE-2023-52727,0,0,1958b69b15c048830f3c4c5db779aefa583c03ebf854ad7308a4e5e62116942b,2024-04-30T13:11:16.690000 CVE-2023-52728,0,0,74d507eb0e35cc6fa3ead987ba4ec40b907dd5b43d9df4005dc274d9ba9c082e,2024-04-30T13:11:16.690000 CVE-2023-52729,0,0,f66898f0cedff9459bb08c0ad4c6a50cee7d49ab64c76e92ba3f6278585c99ef,2024-05-06T12:44:56.377000 @@ -238707,9 +238707,9 @@ CVE-2023-5273,0,0,2102b32da0a88aa454835d5aa17e6415147d836efb048cecd13db4b53f5a51 CVE-2023-52730,0,0,0deb15e6433a877e8b04899b1861c74cfb8da99d66444e96a574c8d842d50dcb,2024-05-21T16:53:56.550000 CVE-2023-52731,0,0,af04438af74546f66706b8db927165ea52d670bdff267ccf7a616906fd780f5b,2024-05-21T16:53:56.550000 CVE-2023-52732,0,0,3c3d16e3893662259f2e4eb94ebdd9bea67a82712fa379b46f5cc9b0aa4fd50c,2024-05-21T16:53:56.550000 -CVE-2023-52733,0,0,d8555e0d821e52d774372fd1c4a010550ecf3b5918186b80672307d71704916e,2024-05-21T16:53:56.550000 +CVE-2023-52733,0,1,5e666bf1bd240a4d6aa89470b389cfffbef5176705346f24aa3877874bff10d8,2024-07-03T01:43:52.120000 CVE-2023-52734,0,0,628cc728186bcf0b7a821aa9aa47bbcf76fcfb297f5910858fd6b82d7e7400ce,2024-05-28T19:15:09.773000 -CVE-2023-52735,0,0,c5a4671acf7c1d43c74b81262e0b0e0afb69975cd93b8ab7acf34b00696c3321,2024-05-21T16:53:56.550000 +CVE-2023-52735,0,1,179c3f86616fee02c6472500bdd41878f007d990a3ea0e8bcc41b49975c24734,2024-07-03T01:43:52.910000 CVE-2023-52736,0,0,aef7abdda92948e005474185762f5b04e8dc3faf86a042f2b2ff6617aada2702,2024-05-21T16:53:56.550000 CVE-2023-52737,0,0,8e1d8de4328745723845ff23cac4d2ff0e4cee264b1c62ba7f7fb77be715683d,2024-05-21T16:53:56.550000 CVE-2023-52738,0,0,562ceb2a6aa016c82eeacde0c21fdc7e1657bf0b009c0b5269cb65d2630a007b,2024-05-21T16:53:56.550000 @@ -238728,7 +238728,7 @@ CVE-2023-52749,0,0,5220f21ee6f6e56ec9d22a7fd0d0de1da106a23cdeaa0595f03afa7ec16df CVE-2023-5275,0,0,9a81436027e8dad0b67eefc484a675cc6dfdf47ffb7247993749a2124145a13c,2023-12-05T18:18:37.050000 CVE-2023-52750,0,0,e71055bea596efb86a970a1150f15746fae58326b74e8d80b64f42f04b03ca3c,2024-05-21T16:53:56.550000 CVE-2023-52751,0,0,994a147c446c7d64d5d7c400dbed4501a56e9e25f4d68ea4cccfe1f20801eea5,2024-05-21T16:53:56.550000 -CVE-2023-52752,0,0,25de89af3d4053d37f8f8e8a25e68095a261521025a1fab0bcc59aaf799f0bac,2024-05-24T01:12:36.930000 +CVE-2023-52752,0,1,080f7d3a9c9511b1fa29ecb56aca500b83bcd9e17ca5cbd487e46e625c926cc5,2024-07-03T01:43:54.420000 CVE-2023-52753,0,0,01ad314fc21f348a08f59b0508c438f15217c5b77323cc27c5533e8fcf19711c,2024-05-24T01:12:46.227000 CVE-2023-52754,0,0,6c3f909df442358f10009af2374d307a27574624f35992cb0e89815656c4ead5,2024-05-21T16:53:56.550000 CVE-2023-52755,0,0,363ad3830894b1997ea949ce826bd999a8f15d7d0e03a2a28cfadc8e6277ff11,2024-05-21T16:53:56.550000 @@ -238742,7 +238742,7 @@ CVE-2023-52761,0,0,5dc9a77ce43e271ec7ec3a0f6a89311ebf8dd3294290ba2098a925f57829a CVE-2023-52762,0,0,e051cbe927f0b925f24aa1fd9504bf125ee4f52920bff2547a798b26279e30db,2024-05-21T16:53:56.550000 CVE-2023-52763,0,0,49eda8005639c7fbd3fb15b022dd837521591617583c13802ba975bbc5cef840,2024-05-21T16:53:56.550000 CVE-2023-52764,0,0,8ce90d265c973f8748780e45ed828e9382cffd357d3ad3199e698e1c9de9ba48,2024-05-21T16:53:56.550000 -CVE-2023-52765,0,0,e1fd2c6443606303c584e4cc886f95bbcfc84846962d47c3065d016eddb0646f,2024-05-21T16:53:56.550000 +CVE-2023-52765,0,1,4d08d64e3f368ae7205ec65c2170d2d1dbc59b27b6484cbd71a0d1b8ea1cd2f7,2024-07-03T01:43:55.870000 CVE-2023-52766,0,0,2626b435866d37bf719baaa860071efd96f875ac7c37514a15d37dde4c63fe91,2024-05-21T16:53:56.550000 CVE-2023-52767,0,0,3e4b39f11d4d37239aaefa8cd9aeacdd3a601585a32160042873f10589f9f28a,2024-05-21T16:53:56.550000 CVE-2023-52768,0,0,a6c8185e75ee1d39f3741a911521ca1fbcfb7326ada62323f3912d9190ba74d1,2024-05-21T16:53:56.550000 @@ -238782,7 +238782,7 @@ CVE-2023-52798,0,0,f4bf40a7b4aec53e30269a85f3eb51a674429f8fb9b496ff5744ac2655c51 CVE-2023-52799,0,0,cde34f1c080e291d19b6bead7c097c43ba74339851e793355ab446b5c7779724,2024-05-21T16:53:56.550000 CVE-2023-5280,0,0,05e6a37f5f9bd5a1bc94abc6e2d70e08893d7b367c610c9b600bbd1ae1bd72af,2024-06-04T19:18:10.060000 CVE-2023-52800,0,0,6094ca9eec86821482714021ea5ff6a4ed14e109d9b84ed733b5609c4c4727b4,2024-05-21T16:53:56.550000 -CVE-2023-52801,0,0,b535c81deacc001cc55809f26279fcc8f943e4b47f03e1d38835d1eabced2661,2024-05-21T16:53:56.550000 +CVE-2023-52801,0,1,b95bb5d93b24e9cbb6c35e0192140cfc3d31cdb66f52213d203f1a292ea4cc97,2024-07-03T01:43:59.217000 CVE-2023-52802,0,0,7a66c54da530bf46ad265c5d3722bf29ac68c9be9672cf77b5fe3d0070a86e8a,2024-06-08T12:15:09.783000 CVE-2023-52803,0,0,d97cd26a8945749301c75b128288d9947cc059912546c7832626e8b531842222,2024-05-21T16:53:56.550000 CVE-2023-52804,0,0,42b607e83ed9029b8db30ea60d460b5ef07801a80958b4f415168da424d1d25d,2024-05-21T16:53:56.550000 @@ -238792,11 +238792,11 @@ CVE-2023-52807,0,0,6bffbfe0aa21a0e57e846bf1410012a012197844ce6b944252226fe58ba8c CVE-2023-52808,0,0,ce263bffe80b34b66d052f9614fd122523d74cc64be4fda2b9472e4e5bd6f215,2024-05-21T16:53:56.550000 CVE-2023-52809,0,0,60cb5069e36c6a606e44c12adef30ddc87db004372ad6da7992313846113a914,2024-05-24T01:14:23.283000 CVE-2023-5281,0,0,3348e062e5900d7608c13be0d6ebb12227074a1c0c0a52ec29086c5132b72d53,2024-05-17T02:32:57.910000 -CVE-2023-52810,0,0,417210d1c7ef3f18726774ae2d97eb23192514cbdeac71482ecab139a9904f12,2024-05-21T16:53:56.550000 +CVE-2023-52810,0,1,cff498cbe788ab138e0eb34e25fdb80301269d8036021fb508076e7f49de12cd,2024-07-03T01:44:00.357000 CVE-2023-52811,0,0,5f7a2cfdaa57bcb58280adbb2c8449f6e74791352a01647e281c22cfdb99f273,2024-05-21T16:53:56.550000 CVE-2023-52812,0,0,a70330260601d4d9158448703f35fbecad422b15f2eb2b0783e7510a153f69ef,2024-05-21T16:53:56.550000 CVE-2023-52813,0,0,7997ac0edbb940366a1f6ced893aa03683f9a80bc6d8c9d7d94663906491cdcb,2024-05-21T16:53:56.550000 -CVE-2023-52814,0,0,83c106e0b2481e5bb803ac7b7cc12185c41c5c92284d0f0fec2db70f2f78696f,2024-05-24T01:14:26.427000 +CVE-2023-52814,0,1,7beb37b73115ec81ce0ec04ef14d3c556e989e0aeced84f5749a8521c2300544,2024-07-03T01:44:01.383000 CVE-2023-52815,0,0,8865097e19f8199bcf614e66daad082004f0941206c02cd02ce614595cdd6bdb,2024-05-24T01:14:29.643000 CVE-2023-52816,0,0,32afdc778740219544c5a36f8ad71efec47925eff397f90fc5b56e8319c3fc6e,2024-05-21T16:53:56.550000 CVE-2023-52817,0,0,6ed2f91f17991dfe3f07963dd3070d17fc622a92351edb2e524768b2dfed8328,2024-05-24T01:14:32.607000 @@ -238816,7 +238816,7 @@ CVE-2023-52829,0,0,5afebfb846e70c655f7ce11830a8f5dc1c086ee7d6922331550e76c859232 CVE-2023-5283,0,0,6bc1f9f5e045837e586f583048ee477c9ac0f83988f1d2acd638608858a2eb2f,2024-06-05T21:15:14.330000 CVE-2023-52830,0,0,ffd8b43d89ab3cf830402c7f9802fc634cff6ffc5ac67317d7e2656bafc923f8,2024-05-22T12:15:09.470000 CVE-2023-52831,0,0,89150521dedfd43c04f52577560d3f35445116958af36ec421c9a9b707bacb48,2024-05-21T16:53:56.550000 -CVE-2023-52832,0,0,ee31f3ae24b88b1fef656cc66abbd2c2b73f94a036bfcb6c927c64c3f9581dae,2024-05-21T16:53:56.550000 +CVE-2023-52832,0,1,696be23cda75223f024d4dfcc59813ef358d3f8b0a5a566a6e57238e1cd47e46,2024-07-03T01:44:03.033000 CVE-2023-52833,0,0,2a7327dad43e42597667b837e7a4c79242e34141acfb7fef265997c26a20f909,2024-05-21T16:53:56.550000 CVE-2023-52834,0,0,4c70939223da2ff10f137d3b4e8cfd731a9d6a74b25f653510f2b2b420d51330,2024-05-21T16:53:56.550000 CVE-2023-52835,0,0,d5c80e311812c39002641ed6ce4b30d932a3e6d16ab02e43e5ad247d799ac110,2024-05-21T16:53:56.550000 @@ -238829,7 +238829,7 @@ CVE-2023-52840,0,0,56ae23c9ebec4eaf920aa2ec886a962976622a7ac5ce2ca000dfc390c4872 CVE-2023-52841,0,0,b621be1219ae4a3af1c2432bd7774f69e65afc54dc0178d5ef61af507f60916b,2024-05-21T16:53:56.550000 CVE-2023-52842,0,0,3f432d6ebfb3456acda27ee55f8ca95c54c69810ccc6f9bcfc6576d98405a90a,2024-05-21T16:53:56.550000 CVE-2023-52843,0,0,338eb1a79815546115d509760c806f79b424c44938e36d5cdb0695dd0b109191,2024-05-21T16:53:56.550000 -CVE-2023-52844,0,0,f7d7dc6095c8a37c9747bedada3dee59ac8f0139be803fe2f6022322c32c8e4c,2024-05-21T16:53:56.550000 +CVE-2023-52844,0,1,51fa27b0054aa1f73d276f0533cb46b0c7a766a06bc7ba2b439dbc07f79bab2a,2024-07-03T01:44:04.703000 CVE-2023-52845,0,0,7fffe9b735b2bd79171b9c576cca576d7dc78c7ec7e582c224df901fd6d89e4c,2024-05-21T16:53:56.550000 CVE-2023-52846,0,0,8d71ce98ad52bfe497e85d1cd0d9631eaa703871085af182a03b8c1374177910,2024-05-21T16:53:56.550000 CVE-2023-52847,0,0,94f3c11e7250e03f7fa4f2935402235c23cbf0e8dd97c4a399e43cb921621535,2024-05-21T16:53:56.550000 @@ -238844,11 +238844,11 @@ CVE-2023-52854,0,0,21a52d06a636912187d5fb1cc0ca68b12a115d81d2a4b1f2320a734f92a09 CVE-2023-52855,0,0,c3d0d7128c94bc30348e4fe26edbd85bb554ec04d14672b516237dd4070ec0e9,2024-05-21T16:53:56.550000 CVE-2023-52856,0,0,69b75b8af0921929d923f7a396c85fca96f0dee0d8443b852717abff585c5154,2024-05-21T16:53:56.550000 CVE-2023-52857,0,0,0271800c1cf160112ecdd2dd5ee8fca1976bc47199f11f3993894f87bd3f2d46,2024-05-21T16:53:56.550000 -CVE-2023-52858,0,0,e9e9aaa57a43f7ba2ae81d967f5062b4b691dff8d860d8b1944ce769488c032a,2024-05-21T16:53:56.550000 +CVE-2023-52858,0,1,c7e1b46a9414c1e8429aa874e28c5485097a335b9f097a0c31407ca6e4a98cfd,2024-07-03T01:44:06.567000 CVE-2023-52859,0,0,c2c12a316881ec57023089193b586695736ddbfdcd51889918ff2fa95daf8a89,2024-05-21T16:53:56.550000 CVE-2023-5286,0,0,0676effc6f90664843f21b9d4bce8e0799bf64ce1527189f7cccb5d658b67693,2024-05-17T02:32:58.453000 CVE-2023-52860,0,0,a06e985a63c795ddd420b7532beb14d48e7ae03c61d774e2cf294c09ad6725ae,2024-05-21T16:53:56.550000 -CVE-2023-52861,0,0,cc0ef637281de6affd974188619f95377e94714d3fda9fa38b14a410d3d9ea50,2024-05-21T16:53:56.550000 +CVE-2023-52861,0,1,0ba89c620b53b7997e5b0a5ed7e22a03376017d887df49a75e14b2c691dd945e,2024-07-03T01:44:07.527000 CVE-2023-52862,0,0,f8e5573962337110db68643416014395568579ad146dd635ae6f8fc1caa89411,2024-05-21T16:53:56.550000 CVE-2023-52863,0,0,f6c1a229c64d0eb3bb6d9604788c3ed9f324b7606d90fc6686e4ca356a3a931c,2024-05-21T16:53:56.550000 CVE-2023-52864,0,0,806a587c67d2086d128decfad533c3891f6add157cb201b814f8ae252a1fc663,2024-05-21T16:53:56.550000 @@ -238856,7 +238856,7 @@ CVE-2023-52865,0,0,99ec945239f9a662757d39ed9c81b107a566984663dd04c4fe7664417c32c CVE-2023-52866,0,0,224c83b63dfcda7619ca2722daedfaa644ac10f16da0e9deeb7558c4c27cc333,2024-05-21T16:53:56.550000 CVE-2023-52867,0,0,dfcf095d216fa864834a2d0da16ef00b94ef351e6a086a85e2626eb566b6e711,2024-05-21T16:53:56.550000 CVE-2023-52868,0,0,d6696b9f1434275b867a9169deb3204df084d0b01b372a53977314591dc16618,2024-05-21T16:53:56.550000 -CVE-2023-52869,0,0,b3fa53f3382962885ea197a8c6b24a62c687a8fb309df79cf1990907c1469688,2024-05-21T16:53:56.550000 +CVE-2023-52869,0,1,d37040a4a2cb7087cc996199bd2cd80e9806440599974a39ed1796463348598f,2024-07-03T01:44:08.950000 CVE-2023-5287,0,0,be0bda9c159a7195542a144797aa08dbe543bba9949898623f2e62a342f559b5,2024-05-17T02:32:58.597000 CVE-2023-52870,0,0,1bdf081b86fb9580636c15b99fd16dec4a74cf1b8d0e697c0b5151b326360f34,2024-05-21T16:53:56.550000 CVE-2023-52871,0,0,dc3517db9d009fbfcc7591cb9c65c247aa790eb27feeb7a27f58e7bfd719f966,2024-05-21T16:53:56.550000 @@ -238872,7 +238872,7 @@ CVE-2023-5288,0,0,0738994bddf6db9f0b825ffb89279f9130371f293c5b8f6550deac482c5ff7 CVE-2023-52880,0,0,db47fbb82270b913ed21d04b3703922bf0b547a598dbaa8991147465e5956b2f,2024-06-27T12:15:16.400000 CVE-2023-52881,0,0,6f27b572b3e64428644bdda7520544f8cd90fee86a13f8f6a714c131a849a56d,2024-05-29T13:02:09.280000 CVE-2023-52882,0,0,618547f54e650cd3257252cf26d275464ccb6b2e3c001bfe1d26572e4392c548,2024-06-27T14:15:12.840000 -CVE-2023-52883,0,0,60288e6afd3acdd5078c57ea111f332b080b703e7c9ae57294260ecafe90f4c1,2024-06-20T12:43:25.663000 +CVE-2023-52883,0,1,97759c00758e41d95ed1ae62b92bf41e3188ce0db01c0040d74fe100684b74d7,2024-07-03T01:44:10.627000 CVE-2023-52884,0,0,3ab17bbd7764403ee078e65ba1cc3c50e85e943699ba320291de13c4366192b4,2024-06-21T11:22:01.687000 CVE-2023-5289,0,0,e99a2312fffac7e548d9067401ea1735cab5340b5825bd2426e3171dd9b0909d,2023-10-02T18:13:04.227000 CVE-2023-52890,0,0,a0eebe139551581f49cfd3b7f68f49883daf2a40bfb5a3949932cb006cd09360,2024-06-13T18:36:09.010000 @@ -238988,7 +238988,7 @@ CVE-2023-5401,0,0,133226cc268c2b40c73ae597723c8452d689f69314a6d40c8d854e4d97b9f7 CVE-2023-5402,0,0,d6ca0e0d138e7f0e18108bc80eb991912358210793d36b8686051b13c8765059,2023-10-11T19:19:54.037000 CVE-2023-5403,0,0,4ec80dee8764393cf6bc6c69896e4f95979827ab7c0a4e3e971d47dce6477b18,2024-04-17T20:08:21.887000 CVE-2023-5404,0,0,511484d9cc75eada2ffc9a9796fff23a0a7ebe0388ab1a4541fcf0781d86075b,2024-04-17T20:08:21.887000 -CVE-2023-5405,0,0,cfb8a988b0486cc8665996a67f54066e3d545a7550a64e0bc86d3cf1b7a92799,2024-04-17T20:08:21.887000 +CVE-2023-5405,0,1,e0839594cb0360764ad0f14fa9080a0641121a81bc0331853c7df504564e24b3,2024-07-03T01:44:14.093000 CVE-2023-5406,0,0,5582852e19f377e5793a7605bb9d3b0fe400df7b16762ce5a3c179066fc0da08,2024-04-17T20:08:21.887000 CVE-2023-5407,0,0,c25bd4372bb6455ada4a253eda41b4de73403906c5a53571ce0a6abf70ee9078,2024-04-17T20:08:21.887000 CVE-2023-5408,0,0,443628942e473656420f67d7b7b9b3fa498d5d13f709544aa261b0e4696090c6,2024-01-21T01:48:09.767000 @@ -239113,7 +239113,7 @@ CVE-2023-5541,0,0,c7ffa7c396f3c10257d26aa366bb164db4e6d1e7cf5746cb501157ec0970a9 CVE-2023-5542,0,0,00afc45e8703e942ace0a9b3c1e8c17226d7cef9d284b405f04c3986971344f7,2023-11-16T19:02:12.333000 CVE-2023-5543,0,0,62a41283eb9322d2bbc4dcf371d954d0db5f8903fec12ecc5955281890fac303,2023-11-18T03:20:11.913000 CVE-2023-5544,0,0,e397719c1ab3bacb4140adfe3a0187862920fd248a1053fcd386d8e8aa51b878,2023-11-15T14:36:11.500000 -CVE-2023-5545,0,0,4cd182c69020a1204525ce33c05e9a9b93a8abaffe3f4977c41797112749f18f,2023-11-16T19:05:39.550000 +CVE-2023-5545,0,1,1a81f7a5b132baa5b636a14da0d5ccec0dfafc62c20acbea2acab3a02d3e827d,2024-07-03T01:44:15.480000 CVE-2023-5546,0,0,bd8bf89a9bcaba83d0ee657de8d38a89d9784a48263d4eb22877fee9560e13d9,2023-11-15T14:35:48.060000 CVE-2023-5547,0,0,b06729e3a4df80d0e31ffa0676f08e433fd5503091fe67d83a7d36d1621ed762,2023-11-15T14:18:41.997000 CVE-2023-5548,0,0,cf5736b417445fd32604fd6a1cec244c4a5ca16e2f2d333519403aa3e276d84b,2023-11-16T19:07:47.660000 @@ -239232,7 +239232,7 @@ CVE-2023-5671,0,0,3cc2b9c1deb62dceb8ed00c2d8762fe59a768998f615d5585f03bd3dd8ce13 CVE-2023-5672,0,0,b606b655dc2985c3ef150964e49693e9c24950f987c8d71991ac4c23768844b2,2024-01-04T17:08:45.617000 CVE-2023-5673,0,0,70e5322ee14dd36a1fef1c30959d5e0c92016645b510b75cfd68b74728b861b6,2024-01-04T17:09:37.303000 CVE-2023-5674,0,0,d18ab2900ed7e529311b11ab81d26d18c239ed8c3d95a148f12ff9fdb604f6d6,2024-01-04T18:49:34.613000 -CVE-2023-5675,0,0,54f62109b8f29c4d90f4ee0ef3c4e4803f273865a1bffa8067c831d9a412e317,2024-04-25T17:25:05.903000 +CVE-2023-5675,0,1,95e8de0bc40b05155482dcdd97fbfc8fc9ae0472c4e1a540ce976bbd424621c2,2024-07-03T01:44:16.897000 CVE-2023-5676,0,0,c192e1317c9dd9e6e795afdc87fde3c831c86613079a468411f986e2046923eb,2023-11-22T22:39:25.137000 CVE-2023-5677,0,0,004c3e3f7004a28a876413d86856f1517cff863998043d0f69b3f9e4b9b898bd,2024-02-13T00:38:00.893000 CVE-2023-5678,0,0,ad85b7f85185cc697ec1f457f396463cbc44a9124905bcb5c855383874eba894,2024-05-01T18:15:12.393000 @@ -239610,7 +239610,7 @@ CVE-2023-6077,0,0,00cb332e84c1cdb0a08d37bede99e9542082ced2d016768c2fc5525fef9cea CVE-2023-6078,0,0,07eb2d7211a7a35cad567f2504930e6ea706e464ee574705a8749f6488aa9d0b,2024-02-09T20:23:01.477000 CVE-2023-6079,0,0,c657f5e2aa1940d462b06edca15d409e8635e96c4f0c0b9d7aa570802bdc6721,2023-11-15T17:15:41.840000 CVE-2023-6081,0,0,615862707d31666fe696ea9a52b36f9c26135f6c10879ec4b59a1dbbf126f06b,2024-02-12T17:31:21.670000 -CVE-2023-6082,0,0,60d428b432359f538360fa9554336a52897e0668352156dcae212dc11086bac7,2024-02-12T17:31:21.670000 +CVE-2023-6082,0,1,51c624ad920580029fe98684df7d8cf2bd1be9e07e746827001b4e3f04e6cf80,2024-07-03T01:44:19.650000 CVE-2023-6083,0,0,c176f2f1944a9cc01244ccb97ce0f8eae685eef377596e563a31b2de00ba8302,2023-11-14T00:15:08.847000 CVE-2023-6084,0,0,16d7a7039b6dbd155b6ca7781f3d7df429a1269812ca4c2ad7365d169c693ea9,2024-05-17T02:33:30.967000 CVE-2023-6085,0,0,35b5096e799bfbd6b5c16e62cf5d80bc5db8f4321ce57b047bbff11c1be2052d,2023-11-14T00:15:08.887000 @@ -239987,7 +239987,7 @@ CVE-2023-6511,0,0,6e9c9df66d5d6dc8e4f56e8e2fdba7ec529133e95fcd90f501e771942ada71 CVE-2023-6512,0,0,64d380cef3fda827fb5c24f06d407e7bbe2ae11eddc20026be124aa98b7d5aa7,2024-02-15T20:51:30.973000 CVE-2023-6514,0,0,462d0381adee46f7d1bc8e9e06cc0477813ef83f17d6573090aec4daf5e3641f,2023-12-12T21:20:07.693000 CVE-2023-6515,0,0,f8b5dfeafa02f6ea14895918c71114daa82062d8ee30097654581a5159050496,2024-03-21T02:50:38.423000 -CVE-2023-6516,0,0,12e1bae25dfeda79a20ab04cb8cd54f13dccb908e53f5d68c3b4ba4d35071b06,2024-05-03T13:15:21.250000 +CVE-2023-6516,0,1,2c423d948b9c47297e64a9f334bc2af5ff13514943adfe950fcd08cce2172881,2024-07-03T01:44:22.620000 CVE-2023-6517,0,0,3467593a9d1064dca9fbac50097aac110e8ea12ac0f5d56273a5e05aa7052234,2024-03-21T02:50:38.540000 CVE-2023-6518,0,0,701884efa90328aec127750f6d7a617892af73d7d9d1cbf5cfc7a0127e0ae388,2024-03-21T02:50:38.627000 CVE-2023-6519,0,0,1067c6eb2fdb653773710a715d19abe17d72d4948b55787118a707da115fb55e,2024-03-21T02:50:38.713000 @@ -240209,7 +240209,7 @@ CVE-2023-6781,0,0,606133b53d71d301d434687c95e9541c45256035c97457e3cef427e3e2fa86 CVE-2023-6782,0,0,9d49a53aeef1daeb1b880b1c10125bd540373eabc0b6ef10f8f3d1b558ba4034,2024-01-18T16:11:09.587000 CVE-2023-6784,0,0,8a2dc120c2f7c09cd65b30de205a120bba14591ed7954e6b475e7a765c9d6768,2023-12-28T20:16:01.087000 CVE-2023-6785,0,0,6032c6c6494d8ab6426166c8858fe7b4f5d0ea17027dec5e421fd5772b1b9f25,2024-03-13T18:16:18.563000 -CVE-2023-6787,0,0,384eb893bdb4a7e6c70f0f350f57f655613c588c815a42063451cd53c36c5605,2024-04-25T17:24:59.967000 +CVE-2023-6787,0,1,f049a1f35e2aee24f976886d6c66885fd4024d6e89e26b74ded6d29472700286,2024-07-03T01:44:24.660000 CVE-2023-6788,0,0,50e116b22f39b4eda80be0e0174e50805515a5317ae162b416827d632334043b,2024-01-11T23:33:05.333000 CVE-2023-6789,0,0,58210ee945774473d3672ef0a5317f3e9fd1821a6536ceabc670f03a82b8c1b1,2023-12-18T18:54:39.670000 CVE-2023-6790,0,0,59d4d6839301f4b4ea57b622791c925b2ceacc81b1978d57ea06e29921fd8384,2023-12-18T18:53:56.697000 @@ -240489,7 +240489,7 @@ CVE-2023-7097,0,0,393d56af626ac19b61da5dc4114ce2ce874e6b1f8cae834c87175dbc31098c CVE-2023-7098,0,0,3190311802c269bc572c8caa8c2e10791e9e466cd89f0ac16ce9b93abb795b89,2024-05-17T02:34:09.450000 CVE-2023-7099,0,0,3f947e491b7832e41b88075391a1226cdc48ad5cf459786eb64f473058479da2,2024-05-17T02:34:09.553000 CVE-2023-7100,0,0,615108e9b211b628f9794b9c92c7d82b695ac2f42301eb20fde060086d41afb7,2024-05-17T02:34:09.663000 -CVE-2023-7101,0,0,615be3d913f455af64fb909616ab5af3554b5493c4032247e39f863f39d25ab4,2024-06-10T16:27:23.950000 +CVE-2023-7101,0,1,08fa6710491663ce9e72ea40e1e6ffe82fb355a851825bc7387528ad39010ece,2024-07-03T01:44:28.913000 CVE-2023-7102,0,0,fc4da897b012dd5882404997a4db8d905c1af55198af6653038a2f751936374c,2024-01-09T20:07:12.283000 CVE-2023-7103,0,0,e8b884e5a1d7c721c22e5b5060188b31b48678e21b13c10c5b3763cb2cd202fd,2024-03-05T13:41:01.900000 CVE-2023-7104,0,0,8a941aa82f7d0c443d56cbb267972310bbfd2dc559d10cd0725c8748eb020dc7,2024-05-17T02:34:09.853000 @@ -240544,7 +240544,7 @@ CVE-2023-7159,0,0,05b26456d9c7e8d8ae16a3e8d37f5c6fa6b140068ec05296dc8a17c61bcf65 CVE-2023-7160,0,0,27c7b58da8e7edad8e3294d4a7ec7e226d14d0f3c01e6e364a112be8228fab48,2024-05-17T02:34:14.753000 CVE-2023-7161,0,0,b3930ab3a97e1d3c27fc99be304904454c6f0d4bcb0814fc27d950acdf3052c3,2024-05-17T02:34:14.867000 CVE-2023-7163,0,0,0f5c35a87fc47051aa08ee9aab448a8efa59bbfa72ee9ee97a6b130cd14ca045,2024-01-04T19:56:45.747000 -CVE-2023-7164,0,0,0eba723e66ffde882f886b1d956fc76bf968cae8235a06d4473a12b674cc971f,2024-04-08T18:48:40.217000 +CVE-2023-7164,0,1,e7da404d660f91758f580fc565df691ca99acae8f562df71fb30da4b6304eb9b,2024-07-03T01:44:29.277000 CVE-2023-7165,0,0,1d97a8a837ff89aac62852f940d39f1fe6be2be70c7e979a7de92240e40591e2,2024-02-27T14:20:06.637000 CVE-2023-7166,0,0,a05c5c3b5e771dd0d783b188143511eee70b2418a0548eb26ff6dbae55fdbae4,2024-05-17T02:34:15.110000 CVE-2023-7167,0,0,2ad0a7fd6f0156359513234ef6a12567866f88d4c0e31ddc963112ef38c1e460,2024-02-27T14:20:06.637000 @@ -240616,13 +240616,13 @@ CVE-2023-7245,0,0,c2b129587df81b933ff7a681e47b41470d61b90df3071adf7be4cf49259748 CVE-2023-7246,0,0,3670c56f241b5abdb9348ae25af71574dc282c770d240ab173c684606bb29a99,2024-03-20T13:00:16.367000 CVE-2023-7247,0,0,c2c23a7b7393abf86d5128d2c24b59326c78c84a35ee098ee0a06670d40df43e,2024-03-12T12:40:13.500000 CVE-2023-7248,0,0,73545909515ba9da671114a339e1418b83b4c4cb1fae4d9763595cd55045ee5e,2024-03-17T22:38:29.433000 -CVE-2023-7250,0,1,9a5f9775079474ddc45acce310e1f8cd06db79a566ee35ec7f63e8af33eee385,2024-07-02T23:15:10.377000 +CVE-2023-7250,0,0,9a5f9775079474ddc45acce310e1f8cd06db79a566ee35ec7f63e8af33eee385,2024-07-02T23:15:10.377000 CVE-2023-7251,0,0,73fa31f7b11a2c8f7785ccd98b3beff89a3869cfbe5b74910fb2dd1341267135,2024-03-26T12:55:05.010000 -CVE-2023-7252,0,0,2392d7e3f3e585dc7390c0e965b0650ef11fa8ae2796aaf6e5db491d8ab57d29,2024-04-22T13:28:43.747000 -CVE-2023-7253,0,0,6a907485fdee60605139b38f9229fa03da0ccfe5b94dcf86ca3826725a280a6c,2024-04-24T13:39:42.883000 +CVE-2023-7252,0,1,a96b97f43999a9df13dd6b86a1c20c7b99309234cadd0538e19b9a3c2d31e5fc,2024-07-03T01:44:29.993000 +CVE-2023-7253,0,1,4436e6df0abbc2be66c875c1a3b7421386cfdc4e7cfd00a94031f9b2a2d0783b,2024-07-03T01:44:30.193000 CVE-2023-7258,0,0,5ff9fbb18c87cd79eeba5bdac9e20b834be684e2899fd63fb3e107422ede555b,2024-05-15T18:35:11.453000 CVE-2023-7259,0,0,291fdf96791c66804d1f0d3fb86a244e544f8112f70bc253658c7b47edf99960,2024-06-04T19:18:14.193000 -CVE-2023-7261,0,0,439b4de2c23e80354c01018ba2c6192a50a53aad78a67156eae3ceb151c83469,2024-06-10T02:52:08.267000 +CVE-2023-7261,0,1,44080cc2bc0d6a25d80bc7855327b03309b2d9def17d97f1c55e50122c67ac97,2024-07-03T01:44:30.563000 CVE-2023-7264,0,0,1c4cfb34070a7ce4966884df1379f77375459d76b20ac1f3cbf195ee6437fa6a,2024-06-11T13:54:12.057000 CVE-2023-7270,0,0,94669c63f2ade4ddfb25257f684257783c88dfab1050378b21b0aca26b8fce28,2024-06-27T12:47:19.847000 CVE-2024-0007,0,0,3bebeca11ed66b29340ad5b2f4a6fdda381d640f217ed7214dda7d3a471e9da1,2024-02-15T06:23:39.303000 @@ -240640,9 +240640,9 @@ CVE-2024-0020,0,0,10041dfbf81efabcaeebded3d09f521b1a43a499af72b2f92a5be41564fb24 CVE-2024-0021,0,0,195598eeee803724595407e6749c18133eef4a41fdfa20e3801df52f8b02d210,2024-02-16T21:39:50.223000 CVE-2024-0022,0,0,4a467d6471e95818a3d22a3a3b2b0ace1e955edd8938bf07362529e426c48b2a,2024-05-08T13:15:00.690000 CVE-2024-0023,0,0,71da3b12c0926fa4407d7d8b99e783afc4b3b8dca223802c3cbec4fc1454193b,2024-02-16T21:39:50.223000 -CVE-2024-0024,0,0,9695496faf21869ae27e24fd5804a5db62c0e4d48854b678bfad1ed86d21796b,2024-05-08T13:15:00.690000 +CVE-2024-0024,0,1,5fb9489ab6bda1953438739836edf4a6b94bd74733037853a8a3c897eda90f7b,2024-07-03T01:44:32.010000 CVE-2024-0025,0,0,af2ba2278c83468f9c9ee0818a23ceb585092240fb112c4e6afc1134d6fd4bad,2024-05-08T13:15:00.690000 -CVE-2024-0026,0,0,e6a377fd8570a4c81be68a612c3de8ef2df46e27fc79072d59d489ce3a103b25,2024-05-08T13:15:00.690000 +CVE-2024-0026,0,1,774ed6ba82d0d9c7a541b3db4a5a359cf56663a0f101d669bdf9d716d0a13278,2024-07-03T01:44:32.803000 CVE-2024-0027,0,0,feebb29267eef6b846e635c87d884020111a5d4fbb253c2894c96109d4c1ea4e,2024-05-08T13:15:00.690000 CVE-2024-0029,0,0,095a39a40d263e89af48de4c6c2fad99c624ff9d4486c4388646dda629a45307,2024-02-16T13:37:55.033000 CVE-2024-0030,0,0,13b9ef30b4ddf3dc33f3691e1ffdf43744c22c4945c3db2bbc2cc35ea6de8cb0,2024-02-16T13:37:55.033000 @@ -240657,9 +240657,9 @@ CVE-2024-0038,0,0,8798af074e75acf30506472783c98fe3ca6f9989b456036fb13460ce3a0660 CVE-2024-0039,0,0,eef2053d277ee92cf2426457ee1c3166f51184d93b11850784119e4a32b8f532,2024-03-12T12:40:13.500000 CVE-2024-0040,0,0,4afedb45d19d9a2df9a3ecdcf577c422a3b0751bcf061eb077253f060c2e8e31,2024-02-16T13:37:51.433000 CVE-2024-0041,0,0,4dc5cf8202a81389ba1711e9ab4229bb6c315c100ad135fbbcb3e9e75477a4a9,2024-02-16T13:37:51.433000 -CVE-2024-0042,0,0,54aa11511c3436154cc58982a9c29fd41c0a94a3fbbc291e5ee682eb8413416c,2024-05-08T13:15:00.690000 -CVE-2024-0043,0,0,d8662c3f376186d2afa8921d0f64ba917609cb5d50d7912e4139ecbce23b8235,2024-05-08T13:15:00.690000 -CVE-2024-0044,0,0,252052610b4ae0ffd4cf0806647555b0208a30970458880cb5d65b093fa59399,2024-03-12T20:15:07.633000 +CVE-2024-0042,0,1,f86d339d4113b5a4769bf21105f85dafb8e05e2676c67a9485f2ba2585631706,2024-07-03T01:44:33.743000 +CVE-2024-0043,0,1,f3099d06b40cffee02572b8511d5ab7fd4ed425254fa8e65e2f8173e0b0fad0e,2024-07-03T01:44:34.530000 +CVE-2024-0044,0,1,1b47d31ca0f3ca49c0b5dc05a9176417e6a0ac469a146bb9b6eda355db8c477c,2024-07-03T01:44:34.730000 CVE-2024-0045,0,0,74be948ede2409dd1fced42dd7b971d5edcab5dd8de9a50e019ab3d0529aa80e,2024-03-12T12:40:13.500000 CVE-2024-0046,0,0,db8b26e423bc7f5764a0a6553823c47d2a6413b4d120bb9d62204abe423b4123,2024-03-12T12:40:13.500000 CVE-2024-0047,0,0,993274a4a1514003e0b4e6f55d530c359898e88fc2cb19719d5752f77b0e4830,2024-03-12T12:40:13.500000 @@ -240709,7 +240709,7 @@ CVE-2024-0099,0,0,922026d11edb09689a5419f4b6981b91f643282898008757d63b84ab582e71 CVE-2024-0100,0,0,bbf51d2ce3c3a951e3f6f4fb5d57dd8d1c73fdd75ab0ade8734c57fcf29d357b,2024-05-14T16:13:02.773000 CVE-2024-0103,0,0,c0f8f807fdf8426bc2106e7af79b6cd7b7308e8ea4f1780be6db3fdc6d1d8cf2,2024-06-17T12:43:31.090000 CVE-2024-0151,0,0,aafc841cfb528b9ef4d150e11c8565679b9331c9ad5bf3569e38f74d72962c86,2024-04-25T08:15:07.420000 -CVE-2024-0153,0,0,687da5d226530ac38f394cd9b952906c5e53ebec74b3ccf6df4062258fc2674f,2024-07-01T12:37:24.220000 +CVE-2024-0153,0,1,27805279095cb051183cab09aac75c2d46b1759d5204833928b95d85cf667e87,2024-07-03T01:44:37.677000 CVE-2024-0154,0,0,fee6d0edd38400fe9a2f331d67a355be9bc81701717352554939ef10dafbbf73,2024-03-13T18:15:58.530000 CVE-2024-0155,0,0,56d3003aea28bbff1e776f33de697fc847d720d7a8270931f6c22f264f5611eb,2024-03-04T13:58:23.447000 CVE-2024-0156,0,0,47a5ee4f12284e0f109441891942aa0eb589b2387e172b6366b6741bcabc51b4,2024-03-04T13:58:23.447000 @@ -240794,7 +240794,7 @@ CVE-2024-0248,0,0,2c37da61220f65b312245a2221cad9ad4877aec90b17ba5c2a3e9d6be35f78 CVE-2024-0250,0,0,1024a1aee8c07f43ea895a2e7847039d1e10efacdd7ad8bb0a19e5b1e9b5ffab,2024-02-12T17:31:21.670000 CVE-2024-0251,0,0,14956aba5a33632df721b3e529915eceaf50c3d32f322e21763f782642d137c0,2024-01-19T19:55:23.980000 CVE-2024-0252,0,0,0742069b1e41d825214331d01ce9e201ec5268e0275b0cee132c0981d24a8c51,2024-06-07T09:15:09.347000 -CVE-2024-0253,0,0,17245b937e0c32fe975e23111ffc2a6d705cdcda6f929faed8ec43bbc42ed144,2024-06-07T09:15:09.830000 +CVE-2024-0253,0,1,ddeee69b21b0084e2ba924b18ea5e397f396de8ad90474cf8bfd96614dee6053,2024-07-03T01:44:39.010000 CVE-2024-0254,0,0,e5eae8b11bfbdda0720ecba88e72e29efdd7b42117ba1a4582cfd62b02acbde8,2024-02-12T20:53:02.440000 CVE-2024-0255,0,0,541867be2e415931a41832092b931a9f6ed85b86ce138a5f77d6aa8f5909e5ad,2024-02-07T23:31:10.567000 CVE-2024-0256,0,0,49de163342e5ba45f12c2cbfe0a11fce418d24b9f8f242901a15605875a38ffa,2024-02-14T19:17:28.387000 @@ -240810,7 +240810,7 @@ CVE-2024-0265,0,0,c92e53ad11d8cc92e384202f84ffb84ebc3a003d44078864509b06cf66d723 CVE-2024-0266,0,0,1f93978b4f9e67732f5b15c0c12c46f0abc642ad41cceb231dfc5cf1f4dd3db0,2024-05-17T02:34:26.760000 CVE-2024-0267,0,0,7bfa7e3e2406c91814fcd34290ef18f2d24d1589bf4eec596441d1f5524f71fb,2024-05-17T02:34:26.867000 CVE-2024-0268,0,0,47456ea67f83d497b23ab66d4eb26e09b3a02ce26d0ebba5362ab64458aec1d3,2024-05-17T02:34:26.973000 -CVE-2024-0269,0,0,bc92809fbef56177c2266a465311f680c4061e34f4603b208a36bf6fc6a1e8a0,2024-06-07T09:15:10.160000 +CVE-2024-0269,0,1,1778338e12d66bb0d88ebb267f8fb5d1b0dcb1c97c9c2ef80ca6ec116995ea7e,2024-07-03T01:44:39.930000 CVE-2024-0270,0,0,149ad3058bdac0775166c4ada5886140d2ef7911f78d4ac8cfd20bed2c2a09cf,2024-05-17T02:34:27.107000 CVE-2024-0271,0,0,0babf6d710da9e84fe5f2931459a4e7abc266edc03bc1f216288ddf6b7abe814,2024-05-17T02:34:27.210000 CVE-2024-0272,0,0,7e654e469550a6946514d4b9e4f195a2cdceebadef5efa3588d6ac1e48606e73,2024-05-17T02:34:27.317000 @@ -240926,7 +240926,7 @@ CVE-2024-0393,0,0,8881de5088bee2f43467b73941f684354c9bcdccfa7386a7827d4a78a7e8f3 CVE-2024-0394,0,0,132997f5a0f39575e52ab364803d29384d542a557e73a32dea0a249b2357dfb2,2024-04-03T17:24:18.150000 CVE-2024-0395,0,0,9697a8ac3bbf759d0c2ea19b7ab0aa903676619b1d5a607c85b8d090a4e44ee7,2024-01-10T14:15:44.970000 CVE-2024-0396,0,0,106628bcb832aae2e274e4e91fdb5add809827efe4c459066d3102ffe0249334,2024-01-29T15:22:40.317000 -CVE-2024-0397,0,0,f559bd631e9ad345a230e622ff58736383b6d20f916da29823b9431f2d24f22c,2024-06-20T12:44:22.977000 +CVE-2024-0397,0,1,2e613c278e7a674d938da26e95659aba98bdc0c83250df3e9fb0c402bddb3d09,2024-07-03T01:44:41.987000 CVE-2024-0399,0,0,f9efd00d0c28d2f5fd7844014ccf20e6de83c83ab3d0467105e159f94efa805f,2024-04-15T13:15:31.997000 CVE-2024-0400,0,0,18035b4484267a537c15645ebee53285fc55ae5559f980b5f9795ec2795f24dd,2024-03-27T12:29:30.307000 CVE-2024-0401,0,0,eb06da8d7bba1b4b23b9513633128fc89991a02e4c0b59d538b76f5796878a05,2024-05-20T19:34:58.277000 @@ -240955,7 +240955,7 @@ CVE-2024-0423,0,0,7d4a04da13054879f494c098af81e5d1a40dc7a54a7095c9beb9a76b5a7aeb CVE-2024-0424,0,0,abb78097a089ceb004cb5799ce72e0994d7dbde660b904e531496cb79e0b00ad,2024-05-17T02:34:36.843000 CVE-2024-0425,0,0,4bd20ed5f25e41b045b0c15d6fb21aa0a99af5b8225b51cd90bf10afdb3ee6e0,2024-05-17T02:34:36.960000 CVE-2024-0426,0,0,dc2503e487443148dcbdf0fc2befb20491e6bd175db5dc3ad90a2662250ca01b,2024-05-17T02:34:37.057000 -CVE-2024-0427,0,0,72bf8272ccf61d83a1ed262ae5d3e3e739f88253a88c7f9166fa5c26b80984c2,2024-06-13T18:36:09.013000 +CVE-2024-0427,0,1,338dfef85682a70527a72a07e776fc139be85a70c6b9744e2d313fea8de1af4c,2024-07-03T01:44:43.070000 CVE-2024-0428,0,0,37bff535bf2c9e1ae078fb4d60a7c98c748660d27c6ecb91d92b35a3e5480a60,2024-02-13T16:02:08.357000 CVE-2024-0429,0,0,a5dcc970fcf67ff36a86102ddf640d2aa59e10e0dd71eeb43dcc044ba8efc6a0,2024-01-18T17:26:20.573000 CVE-2024-0430,0,0,aba50a31b10197c02d651790a3a56fbe7b065e4109a81ec99f27f92d46566686,2024-01-30T15:19:33.147000 @@ -241043,8 +241043,8 @@ CVE-2024-0514,0,0,18fd727c0557dac7fe8ee5d82335381520160f2d155bc86b399bda86a4184e CVE-2024-0515,0,0,6a5960e824fa1e21fe29e9274febf6c5866f9774504ae5f10a707ba6f8555ecf,2024-02-29T13:49:29.390000 CVE-2024-0516,0,0,6605c01ec045f9e3984e5335f409aa9cf2a09075470f6a0d6ae284b896826390,2024-02-29T13:49:29.390000 CVE-2024-0517,0,0,7d90617c43ba0962c9c0ad896660a79f4481906adb156795af4a7156524b1b73,2024-01-22T19:53:16.533000 -CVE-2024-0518,0,0,0f3284bac6f19c8dc31de38d0e284e3cdc0c8b2e00c849c3904ea81ca5797e60,2024-01-22T19:53:24.690000 -CVE-2024-0519,0,0,55b82021be1bcaf7198e737c935bd5ddf353a98cab3e69da28816ed30ec74f05,2024-01-22T19:53:33.937000 +CVE-2024-0518,0,1,06cfe0138669d1b5b40a81316c7b8388ecfb6c3e22ceca04d1f26bac47601569,2024-07-03T01:44:45.150000 +CVE-2024-0519,0,1,8584572e2642603b4ed437d90bfbe5a77cb1e21d05696a519969e2d534951fa0,2024-07-03T01:44:45.993000 CVE-2024-0520,0,0,533588e621d38dd5f7bc0fd1260b41d0b819c833a04365c06209f8439da47c4f,2024-06-07T14:56:05.647000 CVE-2024-0521,0,0,972e3ac07457bb0a501956009e9ab1f31349232a7f575875539533e34d112aef,2024-01-29T15:26:35.300000 CVE-2024-0522,0,0,24ca48a88658b103b93d5731ee46dcb614dfdfdf4fc0486a46b71011716e0971,2024-05-17T02:34:43.397000 @@ -241184,8 +241184,8 @@ CVE-2024-0667,0,0,2681b7becac6d5374ec2219687491519adea78bdc5162cd2d7253f0786abc5 CVE-2024-0668,0,0,3db9a5de6e4dca9e79ecb9554115ef410935372b559bc145d7ca0c6d374ebafc,2024-02-13T16:24:26.927000 CVE-2024-0669,0,0,476d8f93fcd7134fc732a1bd0cd06cc03563cad47067b8fa5ebf76f58a942cc6,2024-01-26T18:52:05.550000 CVE-2024-0670,0,0,1ea636a062af9aa5e99e5a5c7d298851385b5f544f8a313b4c9f392c635877d4,2024-03-13T23:15:45.750000 -CVE-2024-0671,0,0,4890f124f1a6dc41ee5a171545cbfbfb460cbf78227930e985bd3c3baad23424,2024-04-19T13:10:25.637000 -CVE-2024-0672,0,0,58be04f792629bb92fe8dd81a235d6fbc1db0aef237431f7f2a626ebb552cbae,2024-03-28T12:42:56.150000 +CVE-2024-0671,0,1,da79a7432f09b3aacdd03314c2c3998286887dab5f0baa17017c9c249e32ba15,2024-07-03T01:44:49.547000 +CVE-2024-0672,0,1,9f967c7c28c39681b8715c430ba5c3017f006b32b9fca1db8d250c48798b2ff7,2024-07-03T01:44:50.407000 CVE-2024-0673,0,0,7b92dc7ebac1440bd036f3f010b9fd93c7e175ef616500dc0d0251320f5fab95,2024-03-28T12:42:56.150000 CVE-2024-0674,0,0,9139aa9ed68295af11e7b8aed5b715e6e747bd34139c805f237fd0a45d0b36ba,2024-02-08T16:39:59.450000 CVE-2024-0675,0,0,8bea4fa993c9477b8fb58d2ccef75bd1eb1d23abf07c79567a0ddce8b0191850,2024-02-08T16:39:42.950000 @@ -241469,7 +241469,7 @@ CVE-2024-0976,0,0,961ca83ff90147b357fdad21a4ce2284407f8f5fed2f5570590409615417a9 CVE-2024-0977,0,0,265a9a088dbf9179612f3eba4d6866f7160bf19014cca832dc6a54c521c233b7,2024-02-14T18:46:52.707000 CVE-2024-0978,0,0,57707b936b24299b5240c63ec392dd38bc59dc5fe8314fbaf47e7586fd61e0f7,2024-02-29T13:49:29.390000 CVE-2024-0979,0,0,7723165f13ecdb2435ed2fb1f551bb8ae4a819c47830717a3e66000b31abf2c4,2024-07-02T14:51:28.827000 -CVE-2024-0980,0,0,f315f58bbc7d421e9e9b581f53566d3945bc347b1ca4f3f65618a1b592d8dba3,2024-03-28T02:01:13.303000 +CVE-2024-0980,0,1,c8c9084fb2baad3341765fe36b79c09c499a2498d7806837427d52160f9ced2a,2024-07-03T01:44:56.397000 CVE-2024-0983,0,0,ae05daa2819fc42abf2cc0aed0ec977b40d58c31465549c2cfe7791e8c6cecae,2024-02-29T13:49:29.390000 CVE-2024-0984,0,0,32a53697d4c68794e0f7d534229f2199d1ec3163c027c80a4fc5f01ab0bb8955,2024-02-29T13:49:29.390000 CVE-2024-0985,0,0,6abdc3a2e97e39786284b3bc77a2915cf97149b89c179d3872f3c6717cda4a06,2024-06-20T00:15:09.260000 @@ -241549,7 +241549,7 @@ CVE-2024-1061,0,0,947e75b14694e9a11f0f1cc99c5910bdfa7e7bd5faa6e5b7b033897e8f48ab CVE-2024-1062,0,0,6bed00278c1048f6252097b8c4f513b9734062a2d71abef01442ceb94c03a194,2024-07-02T12:15:02.653000 CVE-2024-1063,0,0,9f783a34601f62d19b147f2fe9fbb48179f2e91e414b112cc308b0e641d38b87,2024-02-05T18:25:57.167000 CVE-2024-1064,0,0,54ebccd3b0484c776a35abc0a579ad4dfe5016d375ba9d7ccf7a7253f76d1013,2024-02-12T18:42:14.777000 -CVE-2024-1065,0,0,07c6b023634593680b772042b06337ebc58e33ca2032ca3f9810f92b441f4c8b,2024-04-19T13:10:25.637000 +CVE-2024-1065,0,1,6b929e111558868b0121ca43ebc298de03b6cbdcab98142e875670ec0e17e759,2024-07-03T01:44:57.727000 CVE-2024-1066,0,0,dee5d81e7a0b9b9fb8a137a3449558003e1ae30b794977ba6cb78edfb4b822d2,2024-03-04T21:00:15.267000 CVE-2024-1067,0,0,8b71487d65b84bafea9ebb18e100372da8f5057c406bc15b886e4c9806cd2c75,2024-05-03T14:17:53.690000 CVE-2024-1068,0,0,d3b4b3131376b66b7ece0178ce7734c07daab57c4731b536024565a8c74d6a4c,2024-03-12T12:40:13.500000 @@ -241561,7 +241561,7 @@ CVE-2024-1073,0,0,adaf97fc5155b3c580417fc4779c1ce9fb6459b581a763739c6822c5178eb8 CVE-2024-1074,0,0,633d4c34e54d562a3c8ef166e41f454bd743f2b77196fa371b31e3cbb9b84270,2024-03-13T18:16:18.563000 CVE-2024-1075,0,0,1a2b469e57d35fd84b679f6fccb1281a6feade2a72464af7e7a4de99488a9956,2024-02-13T19:43:13.480000 CVE-2024-1076,0,0,5a9f9042e17a4f18255753cc0108cf3dbe7c5142f87a1141b1768f9f2a5c2e61,2024-05-08T13:15:00.690000 -CVE-2024-1077,0,0,e9f68f289e9abed92d15ff856c2fcc321bbcef63d9600b92166ab0eb9a1d34f2,2024-02-05T20:49:00.927000 +CVE-2024-1077,0,1,9052c519c4a7de5cf3516fc923116c25b788d5b36a137a2e416fb3d37403344d,2024-07-03T01:44:58.330000 CVE-2024-1078,0,0,6c9dee916fa3df09a1f7e03c1b0577e56d8c16195545070c4376ae3f631ca16e,2024-02-14T18:39:51.437000 CVE-2024-1079,0,0,6ac7286a778516cf89549df1a9d53e18b60d41d010ca37479fb08260829225dd,2024-02-14T19:33:09.977000 CVE-2024-1080,0,0,304c0398dc5f4a2caa82c312c98405b7134a29bc39ecd98425df8c836bd99fe1,2024-03-13T18:16:18.563000 @@ -241583,8 +241583,8 @@ CVE-2024-1095,0,0,df3c9b754a366dd4bae7a412155dd92109950a1d3409f2396655e3fd5c46a9 CVE-2024-1096,0,0,0511628751a4d3c33dfebd06790b048648e8a66a1c69f04faa3a9a5040d5bc55,2024-03-21T02:51:34.720000 CVE-2024-1098,0,0,3310ee4a717b92204b72ac7d3b1f5a99add80655b788189450c3415dec3db0a7,2024-05-17T02:35:14.017000 CVE-2024-1099,0,0,b2010c7c960783f169f92fed984856979d82b749d81b332d47244e41b291b4ef,2024-05-17T02:35:14.133000 -CVE-2024-1100,0,0,7d7cd09d8e340fd4ffd8f5a92b571e6ec32c1ff1dc046f90771f1515b8eb9057,2024-05-30T13:15:41.297000 -CVE-2024-1102,0,0,e674666daf854d1ea3c1366c0490a136435911016ce15135405e45a0296c599d,2024-06-04T17:15:47.410000 +CVE-2024-1100,0,1,f004473b9cf0d9d95a81c6b2db685e986de4389d0d38ab5c3537c8bbd36c025b,2024-07-03T01:44:59.517000 +CVE-2024-1102,0,1,9f788b8998d0881c3a87580c29b86b36fe5ea4d008a4351422134cfe2f1cb098,2024-07-03T01:44:59.757000 CVE-2024-1103,0,0,32c2403b3235f3d51f16a9c0f1555e66ef01d8c80920f98db19da2d6af331543,2024-05-17T02:35:14.273000 CVE-2024-1104,0,0,4986f7d9d93ce17dfdb3c18d1dbdea210136d53ee2c0a156b2b261fba310efd6,2024-02-22T19:07:27.197000 CVE-2024-1106,0,0,704e011d119ecc0a0a6c94048139401779c5b0cce30a694f65f63b54706d619d,2024-02-27T14:20:06.637000 @@ -241612,7 +241612,7 @@ CVE-2024-1127,0,0,d56eedcfadebd263336bcc9003136ee639f27dd6c46c9263fea0eb8ea044d7 CVE-2024-1128,0,0,a231b73c645395e365defb40ca5d41741520485dac9e62df464e6e1705f68d2e,2024-02-29T13:49:29.390000 CVE-2024-1129,0,0,efcf801aad96aab23ddf4c5c1c7fe067759cd524a5f540fb4b3132cd808f2d93,2024-02-29T13:49:29.390000 CVE-2024-1130,0,0,19b9a2e3e227bc6e3d85f9dd98bd15cfd41c18a2ee1bc79c328385d5148fea32,2024-02-29T13:49:29.390000 -CVE-2024-1132,0,0,9ed9093a5d69eec7aaa9293012130ad2c33be7b2260c2825364334ddab958fd0,2024-06-20T06:15:09.397000 +CVE-2024-1132,0,1,3de6e62885ac8497a4c1d8f4950ebedc171b13b33dfedd6a9eea9ae164fd993a,2024-07-03T01:45:01.507000 CVE-2024-1133,0,0,85f4bf6d861639f9431d20ab28a51d2af9f3a3ecb32590788260710816d3a125,2024-02-29T13:49:29.390000 CVE-2024-1134,0,0,2e7c5ee3a71225c7c6e3e9d595fec8d66565da1f8113a13a6b762c5258606aef,2024-05-24T13:03:05.093000 CVE-2024-1135,0,0,c4e807742cebaf6bf696946dfb175a5e42a114f551ef03f8a1a000797bbd864f,2024-06-30T23:15:02.563000 @@ -241681,7 +241681,7 @@ CVE-2024-1200,0,0,34f3327e52268af6598a3ed2e1fe7065c0a7d9b826aea15a86c5ffb2ab105c CVE-2024-1201,0,0,ff74f12e6106529eaffb9117e70c6f3a10b2b8f55039a19edec6d706d4090510,2024-02-09T19:27:29.517000 CVE-2024-1202,0,0,f81c25465162623e375dc607a2453a5b326099ddc8d46c3996f7d092705cb575,2024-06-06T14:15:10.523000 CVE-2024-1203,0,0,fb24c2a27e75750ae607c5c83e02745495de5eedde1bafe986263083a797f7c6,2024-03-13T18:16:18.563000 -CVE-2024-1204,0,0,9391cba801c85cf15166cddc29feca62acf989ce01f1be05c55056df23b9a5b0,2024-04-15T13:15:31.997000 +CVE-2024-1204,0,1,227dcadf8be17e7ba46954487209fff721db299a9b29c34d65c82dfa9a2b5cb2,2024-07-03T01:45:05.337000 CVE-2024-1205,0,0,6377c19ab3caf8be6436fa7835c35a6e44c7097e9389c96aef4f0a1e0a912393,2024-03-20T13:00:16.367000 CVE-2024-1206,0,0,2864c05d1536152b20c092c120d96a23f5fd73e20c310a663111eae7ef674b23,2024-02-29T13:49:29.390000 CVE-2024-1207,0,0,f1e39aa9f4fae080615ceb22c991bb5ab1be6b272e49830e77e13729606230d5,2024-02-15T02:05:42.313000 @@ -241695,7 +241695,7 @@ CVE-2024-1215,0,0,d28400af01cf6da0c9ccdf77edda5884abf59abc1579cb18ea8627b70ccffd CVE-2024-1216,0,0,eed4a95a362941ba5542e37a6a2e23d06d62fcaa28ffbb34127aad12c5332aef,2024-03-21T02:51:38.760000 CVE-2024-1217,0,0,7c891522015c867731e112786f8baf0eedff610ff6da66ffe43d61ae316f5a37,2024-02-29T13:49:29.390000 CVE-2024-1218,0,0,5c1e6ad4ced18087b86a14b531fa46181b1159e90a257e95f321211d43b44dc1,2024-02-29T13:49:29.390000 -CVE-2024-1219,0,0,eb21c49d183b6f4b4caaabc1fce1642768be7abef9aa0f26ead0fe827e16a9a8,2024-04-17T12:48:07.510000 +CVE-2024-1219,0,1,c458cc72658e7a053403f6629df47005daa64a22965acf0ef87a52df05752215,2024-07-03T01:45:05.720000 CVE-2024-1220,0,0,7fc61962f6d2075b07bb030435da96def1b153ddab02d3c5264f2409e74faa58,2024-03-06T15:18:08.093000 CVE-2024-1221,0,0,0c5ab33b7870e2bf051350fb7acecbf2c6c7fa7a7d7d98825cf22e1a78f68392,2024-03-14T12:52:16.723000 CVE-2024-1222,0,0,a9c51e07b268b389397d67cab327be7600ea5aafbf0fac1c47df16a93f253448,2024-03-14T12:52:16.723000 @@ -241820,7 +241820,7 @@ CVE-2024-1352,0,0,e0b6a716f2e5b0725527c1a8037ed8995ec00af00fdbeed9d4a1021a159725 CVE-2024-1353,0,0,3b2e255ff40ac243863150eaa69490181576d4bc3b445766b9d3d2be6f1c4ad9,2024-05-17T02:35:24.150000 CVE-2024-1354,0,0,7e9a958865e30c89765260c45d4ae133e4c586a23883dff6b33b804192a001d2,2024-03-05T20:22:24.573000 CVE-2024-1355,0,0,dd36a54ac939524c987827d5cb09797409e1063b770f9d9a2dc86b1a7287f5d9,2024-03-05T20:22:38.100000 -CVE-2024-1356,0,0,006a2f6dfff4352ae3ba24ba5214951c5372a0a8f840d4bddd3e210bc6737588,2024-03-06T15:18:08.093000 +CVE-2024-1356,0,1,14b2816357b5b6c8e88a4ebd012b1ee5eac7c6f7a64d8a4c918eb54e55f0353d,2024-07-03T01:45:11.987000 CVE-2024-1357,0,0,3e719d1386b68f74bac78fded4c12eb6113d801d07a6b01c6c13cbf093a4f755,2024-04-16T13:24:07.103000 CVE-2024-1358,0,0,59bf1dc2789a9e992220be1d0127dfa83d08d3077a1ea92d6417d6450ac5f1b5,2024-03-13T18:16:18.563000 CVE-2024-1359,0,0,709fa5d5f426354abf236525051c41916ab3da3c1737b61ccd8944f2befceb44,2024-03-05T20:22:49.650000 @@ -241857,7 +241857,7 @@ CVE-2024-1391,0,0,95159e2513e9127a66f6050cbc2679326245e87281e8aee9653919649cc97f CVE-2024-1392,0,0,0948736f211221c32ddb432668205bccae67223b950d877ef11c76bff68a1c8f,2024-03-13T18:15:58.530000 CVE-2024-1393,0,0,d7662d0cf4655f5dc37cac1727274e85c0d695350e85be99fa06d400366cbddc,2024-03-13T18:15:58.530000 CVE-2024-1394,0,0,165f33562f18e63e8a619116a51b597c395907033340f10ab7f53d479f543479,2024-06-27T05:15:50.317000 -CVE-2024-1395,0,0,bc906c24f3b97a1f76fb28d9eb27a1438a7ca78483d0c0a7452e9b7efa2da958,2024-05-03T14:17:53.690000 +CVE-2024-1395,0,1,9f5cead23576320934b06ae7650426cd28c58ea3927d599eb3ccbebbf15a3072,2024-07-03T01:45:14.570000 CVE-2024-1396,0,0,c2c7f8124754e0c20b02f3a3637cca1d95a3c2b253208efd7a2814f2d0550bd5,2024-05-02T18:00:37.360000 CVE-2024-1397,0,0,e6d8c9c2beca75d3fdc5f918cb423cf21913a9c807f46126d5b49c29c7bd60f0,2024-03-13T12:33:51.697000 CVE-2024-1398,0,0,2b28153468f4d42956e25c3f4649f2a8573b6a6d707501b23def6a1cde88644b,2024-03-04T13:58:23.447000 @@ -242039,7 +242039,7 @@ CVE-2024-1593,0,0,5d762f901a5b7a13ebd19f4f0e91645438720f053707b63d3e7e21f508c31a CVE-2024-1594,0,0,1d62f8d55fb3a974435872bb233738098cc7a319efe1e15acb72ee1c1daae795,2024-04-16T13:24:07.103000 CVE-2024-1595,0,0,0ac9aed2c4ed6b9e7bc181d6ab55412b8033a5bfcbc541a4a4b602392614e428,2024-03-01T14:04:26.010000 CVE-2024-1597,0,0,26859ef531918a7a283641927754cea63a7414240e4caa854088065bd0691f96,2024-06-10T17:16:17.200000 -CVE-2024-1598,0,0,1c541f665599324783f98e8e7828494708c01619833bec5586e6a8d892dd2c89,2024-05-14T19:18:31.490000 +CVE-2024-1598,0,1,53d65181c5dfe1c31bf5402ab568020e4bee791aaf0f23781c0a55de69756e2c,2024-07-03T01:45:24.367000 CVE-2024-1599,0,0,2f7770422da9bff7bed3eef076e29376c9b42774c7fc9bda69a503fd449e3156,2024-06-07T11:15:53.177000 CVE-2024-1600,0,0,a1cf7c20c4c53ecd0ddc2601c3f6df39efaefde9047db784f0058d6905cd6130,2024-04-10T19:49:51.183000 CVE-2024-1601,0,0,5de9e18b0c5a4daa146100818a9ac068a88d159e30320cca5c3c0caf368ddd5c,2024-04-16T13:24:07.103000 @@ -242048,7 +242048,7 @@ CVE-2024-1603,0,0,5d1338246e7eff570937017899def31d469c1473946b1d3e9d827eb4f9c813 CVE-2024-1604,0,0,5eb6bfa2b690cdc5042b3cd6683eec4697c9011ce1615c69d454ffb962b9e2b0,2024-03-18T12:38:25.490000 CVE-2024-1605,0,0,7074df8750d7a162d5543d10d5434be9d2e408e307c5952acb4cd8e797b0b6be,2024-03-18T12:38:25.490000 CVE-2024-1606,0,0,c36cce5ef22cd77fc10abd764d2af4d1af3e80b0452c270d3845af04c4c46ba6,2024-03-18T12:38:25.490000 -CVE-2024-1608,0,0,9c8b01b69ae5b4c70260d911aff7b2894c96a989ff451b383a0cacb2ffa6ce98,2024-02-20T19:50:53.960000 +CVE-2024-1608,0,1,44224eee05265f6f7b8c8729d57dee56f28fe5925bde16e1c91e799aa3c2bf41,2024-07-03T01:45:25.227000 CVE-2024-1618,0,0,0f299c1a292ffb16d251386c7bde9d0738e4cebbec19e926c886455e5550e1fa,2024-03-12T16:02:33.900000 CVE-2024-1619,0,0,cfc8445e3935906ad1a507b0c5ffd0fe9724e5ada07fa45f6ddb4dad1e58f60a,2024-02-29T13:49:29.390000 CVE-2024-1622,0,0,008d271b6bbf0be364def470530167dff53e33fd04b103e731aac594ad8fe316,2024-03-23T03:15:10.947000 @@ -242158,11 +242158,11 @@ CVE-2024-1733,0,0,0a3bd094d039e642acfbaf43d971fa4ffe129283e1d81d79ef06d054dffc15 CVE-2024-1735,0,0,2da699be929c3e6e7a8ea02e879ac093b8348fa1c03aafb2bff14b57237795a6,2024-06-12T08:15:50.043000 CVE-2024-1736,0,0,4046e84b8490c7f836a95d83a381f1921bdd459ffba2ada5f53ce4a10b9200a6,2024-06-13T18:36:09.010000 CVE-2024-1738,0,0,245548fdb1434c1862c520551a3580b8f1b213c8017bcf448612a1521be9210e,2024-05-15T16:15:09.807000 -CVE-2024-1739,0,0,398ce12115ac80cff2c91fe0aa06351d90b13a79f040c7b34d2ff3e71cc6590f,2024-04-16T13:24:07.103000 +CVE-2024-1739,0,1,0f6aa88dfc12de7693a69727eb574af9b67e4c54140ec3c21c30b657e8fcbacf,2024-07-03T01:45:31.133000 CVE-2024-1740,0,0,a4727f762c1d1efaf400e2db679e98eaa1364e84183339aff737ffb5d021d54f,2024-04-10T19:49:51.183000 CVE-2024-1741,0,0,d588cdec4e1d5da894361b54450023cc90f66f6c8804e8a4beda0263242afb4c,2024-04-15T18:15:09.937000 CVE-2024-1742,0,0,4fbf4a0c921fc3a958c91053411502e81c61e37a288f49d83ab6feab91ed6e07,2024-03-22T12:45:36.130000 -CVE-2024-1743,0,0,6a8a86b72bacf6759f461f5041b23200d16ebf4ad5b85c179aaba2482082bd1f,2024-04-24T13:39:42.883000 +CVE-2024-1743,0,1,483e7e67b70ea440915c26337d00527748cea35503b453ed4beec805a523f208,2024-07-03T01:45:31.390000 CVE-2024-1745,0,0,0c0bf770eedd9092e313b5152244a64d67966fb6a4aa7d030150554ac7159289,2024-03-26T12:55:05.010000 CVE-2024-1746,0,0,3940e769193bb75ecd4efe34f9a17d9557fffd4c4c753ea7f9b1c1be15386399,2024-04-15T13:15:31.997000 CVE-2024-1748,0,0,ce2ee680aa4e05ef3f474327683015e9258b499b794192b6bf695d9c4d2cdeb0,2024-05-17T02:35:34.880000 @@ -242258,7 +242258,7 @@ CVE-2024-1844,0,0,2054eb4498d263a5b76e50b83840fddade66cc253e40e49eba0a175cbd7b51 CVE-2024-1846,0,0,ef5b5743243fde26f19bda8d3441988876e0bebaf27eaa4fdca21b8d69d3b82c,2024-04-15T13:15:31.997000 CVE-2024-1847,0,0,ddf021c560c9a355a4027f45ca2e43bbcfa55803fd85d605289c4213c23658d7,2024-04-04T15:15:37.850000 CVE-2024-1848,0,0,8e701b6e1325c7234b61586f907ad90369eb320c9306dd5c4c2226a189893dd1,2024-03-22T12:45:36.130000 -CVE-2024-1849,0,0,532018eadf82886ca4cca63392aba0dcc6fcd78fc0ffe48f54db95fe01a37b88,2024-04-15T13:15:31.997000 +CVE-2024-1849,0,1,00d6444439ba73f9c7a830dd07d737b1f65ea5d9bfffc4a03f13d3870e058393,2024-07-03T01:45:36.280000 CVE-2024-1850,0,0,619cf2eb46834aecbb5c680ea41679eadc7e54936ecf9bc9140e736a3bd02f40,2024-04-10T13:23:38.787000 CVE-2024-1851,0,0,ac07ab34f3e596527407cf2fcb93e785fa1a213045982c8aadd05f9e543a11a5,2024-03-08T14:02:57.420000 CVE-2024-1852,0,0,9f92825b65e6bb9369c1037dcd50c43b1f7e5526ff6359d4256ca25ce4ba1079,2024-04-10T13:23:38.787000 @@ -242402,10 +242402,10 @@ CVE-2024-1999,0,0,f6af60cbfc609ce1a5481b1af111b21c76b0267bc8cc3b99baa03f46180b41 CVE-2024-2000,0,0,108d93fddd41a17ddd3e047596b7f6a0573ec46987e100f3d626f9ebaa3d0da8,2024-03-13T18:15:58.530000 CVE-2024-20001,0,0,8efb1dbe27f5e7618046f10f9b4be42dee6a7bd8241e11b9072ab6e49025782f,2024-02-09T02:02:13.153000 CVE-2024-20002,0,0,46b6afed42316be97368931c2d39434a4c3b4f4412ec2aa11d0d2b3e3bf7e82f,2024-02-09T02:01:37.090000 -CVE-2024-20003,0,0,161cab7ddc4b98b2ef6112ed0e01b1cdfc43521bfb89175c8951df537d9d4adc,2024-02-09T02:01:04.183000 -CVE-2024-20004,0,0,8f7b86963fffcf5859ac20b5fb4beca56f0023db6896c9d375e2a71f5710e5ad,2024-02-09T02:04:19.843000 +CVE-2024-20003,0,1,252c3ca307d160fe322f3e6f3c838ec528b0deb286e51517bf83a2ddeb36c723,2024-07-03T01:45:42.740000 +CVE-2024-20004,0,1,f0724cab7e23c1672343a65224d29c6de9c5ef503ce348d95a653731adbda199,2024-07-03T01:45:43.630000 CVE-2024-20005,0,0,9fc2bf3343a8741d67973894e1598f1d9222d1a794f1fc5bf1012a3bea045463,2024-03-04T13:58:23.447000 -CVE-2024-20006,0,0,1d610c51e958067d7f763f3b8e28ffb260a4a7c1c9f95d20305b36fad232680a,2024-02-09T02:04:52.490000 +CVE-2024-20006,0,1,17a91c2471e0eca90fb18bbcfea0e3d03ed760ac5103107ae434f69000dabe0f,2024-07-03T01:45:44.467000 CVE-2024-20007,0,0,a7c256a107341f0ce36afa509119aeae8c92b9fd20fd5e357135446be2b5db04,2024-02-09T02:05:10.947000 CVE-2024-20009,0,0,8a3dd19d087c675ed4a06369b3717506a8fbc605930d6e2e550f72cb428b21c9,2024-02-09T02:05:28.177000 CVE-2024-2001,0,0,9d9c4055a068a623a65ab5f6f8115eff6835137ff40d45fdb28a012cdb774cf0,2024-02-29T18:06:42.010000 @@ -242413,72 +242413,72 @@ CVE-2024-20010,0,0,ce5c0e4e356843474710ae52b2ea98e454f1f5137e6aec762a218fd3f8e69 CVE-2024-20011,0,0,6627edd4b73a2cd01e0235883cf3040679db12149efdee6d4cf5fb8ba442dfe0,2024-02-09T02:06:03.160000 CVE-2024-20012,0,0,632cbb17513ceb654ad274eef75e2829b7e381e8bf179a8f5f1390d0abaa74a1,2024-02-09T02:06:22.713000 CVE-2024-20013,0,0,0e897aaa0b6c5b11c722305e684d61e31baa1805e2dc75b67e8eee7409f44ad5,2024-02-09T02:06:40.570000 -CVE-2024-20015,0,0,7c8c5010306fad88d9aeb6d613d4e1c8b6b08d65fb0f89e26a0113e83ae80a67,2024-02-09T02:06:59.953000 -CVE-2024-20016,0,0,80024ff8e99187a55862476b7a1fa004e8ed2b1221aac982c2942f3999dce093,2024-02-09T02:07:50.523000 +CVE-2024-20015,0,1,d1d8bdd6d1fa1f4d1678fcb9177a4ae4da0af52770fa46e26129dd1c299d4bcb,2024-07-03T01:45:45.330000 +CVE-2024-20016,0,1,23d42679a125731e1842dc4827fc98ffaa2afa5f0ebd1d4093677bb31bac3891,2024-07-03T01:45:46.207000 CVE-2024-20017,0,0,dfb161f2493dc4c9c4d67e5f43fa0163e6299a3fa9fb242cfc4b241fa6efa012,2024-03-07T03:15:06.853000 CVE-2024-20018,0,0,a9b64a9435b5bc63345cae4ecd28b39a61d7f82c3a2ac625a302e9d9c9f1b435,2024-03-04T13:58:23.447000 CVE-2024-20019,0,0,39a6c56b7e5ee43e38177652e3585ce43be13db3cc946fe944d7eb64d20c92e4,2024-03-04T13:58:23.447000 CVE-2024-2002,0,0,f9538af5e2272cbd0aa160ba82bdd06f169b250031f3e62bc00bccc2e10da541,2024-04-19T23:15:10.720000 CVE-2024-20020,0,0,54f21da7d859fe56eef653e88280a7576539f77f17050a17a46c0dc69cb94b04,2024-03-04T13:58:23.447000 -CVE-2024-20021,0,0,2314e00297e58df6ffa914334ff6d4c9f3b1c4bbd018e21ab6728061d6be2265,2024-05-06T12:44:56.377000 +CVE-2024-20021,0,1,9da6b4090664581723961fe14bfe7a2d90b8c57bd1123df3f77b75a47e068fa3,2024-07-03T01:45:47.187000 CVE-2024-20022,0,0,5fea28aa9694d95fb69b0ecbf4c1968d72487f38dd57069f7814e0738000f9a9,2024-03-04T13:58:23.447000 CVE-2024-20023,0,0,3a102728acb4ac1cc7bd3c8526ef188fc726b2d6df358b3c4749c39431589641,2024-03-04T13:58:23.447000 -CVE-2024-20024,0,0,dba0899610d7b1e815affd8b3fbc91d6d9cd6255cf998dd42484e5d58d135521,2024-03-04T13:58:23.447000 +CVE-2024-20024,0,1,a587bfbae48c7d89e5f8cdf3a4d9f1f662ddb9590db59d2b26f356c2c055895e,2024-07-03T01:45:47.463000 CVE-2024-20025,0,0,2dc8d5861f55cfdb562970c4f547982af20e958dcf2f7992d527caeeb0e6800e,2024-03-04T13:58:23.447000 CVE-2024-20026,0,0,e830b62633c706912ab62dba426d6370828ee334bb3a8ce8a9ce2d95bd832cc5,2024-03-04T13:58:23.447000 CVE-2024-20027,0,0,1bb050a3b71879883abc7ed0b7ca5bc9ff0c930db54aa278b2333abac3671a44,2024-03-04T13:58:23.447000 -CVE-2024-20028,0,0,8e07efaf0cad6d5c1ddf904f3b78e7b2b7c0e9cfae992411d56b93bd7bc5c5cd,2024-03-04T13:58:23.447000 +CVE-2024-20028,0,1,cfbf4d0a5e915e0bee3fad17577f931af15ec4fffb945f6759a6ae86484e677f,2024-07-03T01:45:48.410000 CVE-2024-20029,0,0,1842a0f8d68497b7d014f95f56186619617c68695c68f0738839c531bcbafccb,2024-03-04T13:58:23.447000 CVE-2024-2003,0,0,2c98e18589071193a30bed6055c24ac0b56c5b82dfe77c2da874dbd049997be8,2024-06-21T11:22:01.687000 CVE-2024-20030,0,0,9d0737a657bdf3e18312d83ef3295a09312da06277325d20791f4dac17b2ef82,2024-03-04T13:58:23.447000 CVE-2024-20031,0,0,be44a648bd8dd0d9a5966ba2d30120c24ff30c168e04ba6c1c2f00bc42e32ec6,2024-03-04T13:58:23.447000 CVE-2024-20032,0,0,9fa8bddb4c531682ee647a7b76d2f6990793752bf987d4eb8877b604bdf2596d,2024-03-04T13:58:23.447000 CVE-2024-20033,0,0,dd7b0d171a78cc9c57411fef24d94e38963c8d068304f0ce024c3a57d34364be,2024-03-04T13:58:23.447000 -CVE-2024-20034,0,0,93278e0749782d2c25112e4fb3609c910bb5c9ea866dd09ed84038d8f126e1e6,2024-03-04T13:58:23.447000 +CVE-2024-20034,0,1,cf35da749882a42d3fb4d555cf4c7784b9ca63e49754c62d7cbfb93c29b82d3d,2024-07-03T01:45:49.510000 CVE-2024-20036,0,0,7016446f74f2148ba6dea33766b6827610d502eb9c245e0a1c0d7d040f7a8ae8,2024-03-04T13:58:23.447000 CVE-2024-20037,0,0,01128565246092f61c328423c961d180f319d8569a52c3d96eb198cb92edb3a4,2024-03-04T13:58:23.447000 CVE-2024-20038,0,0,ca6160c9ee802f2f7025c409725accb336619b3068c3b423047000c1c0be64c1,2024-03-04T13:58:23.447000 CVE-2024-20039,0,0,9a1aec6c692c7ea1a32f8f2a06b073157ba8250ebca50606ffe9369bebc6c14d,2024-04-01T12:49:09.583000 -CVE-2024-2004,0,0,b76b5abc293761ddb384a0a1aad77b3afdabd8c0487a5f517ffb3862e4b42db9,2024-06-10T17:16:24.980000 +CVE-2024-2004,0,1,986b9069f0e16c9cad75d0af17c842c0acbddb79c7dfed57e096aa6b1b17c80f,2024-07-03T01:52:57.560000 CVE-2024-20040,0,0,5b510d8ce08224e8d7209fa602ef8f1b04d1879dc497a7da7b4292a3ccd7d3f4,2024-04-01T12:49:09.583000 -CVE-2024-20041,0,0,67d5a777a7e1478cbd690b3b02e76ec18ef42d4bf0e75f9321f18c25486f2416,2024-04-01T12:49:09.583000 -CVE-2024-20042,0,0,c37c5a81be5d4d69cb8134a6f40bb33d66d6ee794131c7efbee5ef8b7bcaf0da,2024-04-01T12:49:09.583000 +CVE-2024-20041,0,1,797b0699213b143be2b5cc6707e3db6951b01d8acd1047588c4a44bd9a512123,2024-07-03T01:45:50.520000 +CVE-2024-20042,0,1,32382b46cafc275eb8cb8740c3ccddf6582487704ec09b63083a965b2c45f6dc,2024-07-03T01:45:51.343000 CVE-2024-20043,0,0,4bb4a7314f2c49db5a5c8f36286a5d15da7c6f286f0afaf5cdabc887325ad2e2,2024-04-01T12:49:09.583000 -CVE-2024-20044,0,0,2ae2a838ef404b5860f36565a410efbca7b44b6a7fc875014c70f52cf7c70dc5,2024-04-01T12:49:09.583000 +CVE-2024-20044,0,1,7b00cd01d330620de78c873c2b5a5d1db703e947cc4fd0c1c90748e651832421,2024-07-03T01:45:52.167000 CVE-2024-20045,0,0,9b277554a663731d919abd21d4fa7693268640d4a1ef69487c4f7d12200e8e99,2024-04-01T12:49:09.583000 -CVE-2024-20046,0,0,42710ed60aaca38daa08564f993faf7f7df909534819acdb9bb94ee7a4642939,2024-04-01T12:49:09.583000 +CVE-2024-20046,0,1,2b2346806d601871102b47d1857114a53d4c008a1b72821d4c813d568163c45f,2024-07-03T01:45:53.103000 CVE-2024-20047,0,0,5f8d70e1b88970b78b52646725813e6c2a1e2bc7c8d4acd92f09dd6529f8fb58,2024-04-01T12:49:00.877000 -CVE-2024-20048,0,0,28ce6026160dfa9df5c0c3cff1cadf1caa7d59e31b276e78a1bd0473e777ca99,2024-04-01T12:49:00.877000 +CVE-2024-20048,0,1,20f0a9f9a5cb818fc2b8e857bf930b064e9ba7c6112710d3c0a129a489a821eb,2024-07-03T01:45:54.020000 CVE-2024-20049,0,0,fd4b03c8bc4ccc8da37e8b674374aac58f273e3358263c00aad033b79491c106,2024-04-01T12:49:00.877000 CVE-2024-2005,0,0,daea362fffde0fb082d151df2358d46320eb09b5bd7b3280d080d5b1980ab867,2024-04-03T17:15:55.773000 CVE-2024-20050,0,0,95322fe2b16db8b685650311de92e79ad057beee44933003db399869ad7057e9,2024-04-01T12:49:00.877000 CVE-2024-20051,0,0,ac8c6cb03169c225f44030c8338332eae6341083b0dea4fd4f7f7df49a416537,2024-04-01T12:49:00.877000 CVE-2024-20052,0,0,b608de291ef41c7d946e08bcab7170bcded9ac66eae6e962c374ac118bb3436a,2024-04-01T12:49:00.877000 -CVE-2024-20053,0,0,23e0ee14142e8de66fb072a389717342c576ae0faa1fcdb0c00c138427077a91,2024-04-01T12:49:00.877000 -CVE-2024-20054,0,0,196ffd82a2bc4114c93d285cf3c39cab5b18744f37d8ff374529d50119278779,2024-04-01T12:49:00.877000 +CVE-2024-20053,0,1,029e5b2ad2abf5e766d734dceb6d55f903a4b3644467cad36d2c8b5267d2d63b,2024-07-03T01:45:55.163000 +CVE-2024-20054,0,1,3b350a0abc5b4af719ed6067f2b39a6126acf9aa30ac8e3ae176e3781b70163c,2024-07-03T01:45:55.993000 CVE-2024-20055,0,0,4dd704c095e53d7cf4a2fe7965dfdb1d6d64132f42f0670efc379daf78b59d78,2024-04-01T12:49:00.877000 CVE-2024-20056,0,0,b6b1fd02c7f65676a17715d6b07abf6a4c4976bab2542183e6318957156dd374,2024-05-06T12:44:56.377000 CVE-2024-20057,0,0,990250f8f14d0f92aaa5182dea898467760f130428bbcc4648d47043ada62fe9,2024-05-06T12:44:56.377000 -CVE-2024-20058,0,0,6d4f895ec14a4021b6587b5f76f3a75b7aaa5cea2cb450fac7010b299de74e35,2024-05-06T12:44:56.377000 +CVE-2024-20058,0,1,ed8bcd6cd361d5b7f7bbe8a13a97e17b959d3a200e38056f47705aab43dc0ea1,2024-07-03T01:45:57.120000 CVE-2024-20059,0,0,069a934ceb0aa0ce2c4d5b69ddba8190765f629560d198c71ae0abe51dd90d26,2024-05-06T12:44:56.377000 CVE-2024-2006,0,0,df4bc94ba9e1d1c638a16eca7ef98c4896fe8b4e7cd4dfad87563fdb108addf7,2024-03-13T18:15:58.530000 CVE-2024-20060,0,0,75f7569bafb5a37910c3681015f5a2d8c69cddb76f7a80e23135d23a09480ac6,2024-05-06T12:44:56.377000 CVE-2024-20064,0,0,2591925e496d0a99183c0f63a57deca1e1ee6cc6147c6c9cef55cd369d8dccb5,2024-05-06T12:44:56.377000 CVE-2024-20065,0,0,8ab52ef99ec3cc5757b239673490a11d1ec0d860257f5b5d3dc656099140a331,2024-06-03T14:46:24.250000 CVE-2024-20066,0,0,f48106ad7b4ca43e5987705fe9ab68bb5e05a7ed45f830ed2c0ed90706d533c8,2024-06-03T14:46:24.250000 -CVE-2024-20067,0,0,8ca013ea49df42071de66561e1c22be3b5ac8f57cdfeaa22a3dddd5dfd181f38,2024-06-03T14:46:24.250000 +CVE-2024-20067,0,1,1f8b2f8c715bdcaed434516377e7c3641986c19edc4e9bc14558e6ec2383790e,2024-07-03T01:45:57.883000 CVE-2024-20068,0,0,2f2abfaa08cd0bdd6c93098c81d84704288eb5ba32b8fc9912c23932a1791695,2024-06-03T14:46:24.250000 CVE-2024-20069,0,0,78cbc94c051d996863509570fb7b0483c8280c3196e606c277f7b98186f4acdc,2024-06-06T03:15:08.747000 CVE-2024-2007,0,0,eaadf0f3a9ed7b4e615e29ccca11af1a4d5565e9ea5b62f105dcbfa87f797ec4,2024-05-17T02:37:59.197000 CVE-2024-20070,0,0,c0742d62ad8c435485d2c646bc6e3664615e7c2cd94b9b30ac32d747aa095c1c,2024-06-03T14:46:24.250000 -CVE-2024-20071,0,0,62d9d4142c30c139a3b27f6c0c1aa6c041b330e017e407121ef771b72105502e,2024-06-03T14:46:24.250000 -CVE-2024-20072,0,0,c200ff4baf6255d64deb0271583c6f0f747c9ccdf27a663d7a798dfcb83f3347,2024-06-03T14:46:24.250000 -CVE-2024-20073,0,0,a0b25eb428467d36e6c8d6b6d33dfc4191a095e61c25b5d42e8224294b10245c,2024-06-03T14:46:24.250000 -CVE-2024-20074,0,0,ae8ea4f1aeb95c2db6d96bbffc4725f4aeeca344255405cba91589fc79862e12,2024-06-03T14:46:24.250000 +CVE-2024-20071,0,1,410f42d94adb2ac030a10c212dc2dfbda3e5d2020644b7c1536ad292ae26f08f,2024-07-03T01:45:58.913000 +CVE-2024-20072,0,1,639e86e3d37aa95f3c744b6c3fdbeb01d314bfccd155f1c09f5fa09f8c152367,2024-07-03T01:45:59.183000 +CVE-2024-20073,0,1,b92b89689d99337a33ea65b4b166e8cf9f21aa160cfd841da21a2f3df1963e49,2024-07-03T01:45:59.423000 +CVE-2024-20074,0,1,92cbda2ee994adad88a59787efddc8d0bc527b773105a4e8540b8e425473be3a,2024-07-03T01:45:59.657000 CVE-2024-20075,0,0,c25b515a91dbc89ebe595fac548aad128c5354b0efe2add6f43a7dd87e7c74de,2024-06-03T14:46:24.250000 -CVE-2024-20076,0,0,7a7cdd6b11d797bc1065c2a69cb9c58eccd1fe55a553f474fcbfe7ead824177f,2024-07-01T12:37:24.220000 -CVE-2024-20077,0,0,078df06cdcdb9fbee70d10a06d71a0c738e3f06468faa637c9b71b99bd9250ed,2024-07-01T12:37:24.220000 -CVE-2024-20078,0,0,f7d8ca3412c1bf1826924b855782cd80652b405b3608aec4d57b9c0cf2c70fb9,2024-07-01T12:37:24.220000 +CVE-2024-20076,0,1,043a02e00362b41ad4a169900cabc4b373bea5e59c8b7eb2aa47b1c366f92529,2024-07-03T01:46:00 +CVE-2024-20077,0,1,5ac9101dfc5d925867f375757f40d5d4d6e0cc7f8cf8a55648aa9d83a17a5b14,2024-07-03T01:46:00.247000 +CVE-2024-20078,0,1,d5f48505c574c6565f4358009b04f1f8167b5408792fb9d871c2e1d23683448a,2024-07-03T01:46:00.490000 CVE-2024-20079,0,0,2b8a0e5983dc5248cc97f95dd3191ef3fe114b43595192c541ca56a9b4ab2524,2024-07-01T12:37:24.220000 CVE-2024-2008,0,0,89351e3b3909d90b71f2b464baa5c1531110f0fc183853e9b068b202a6597011,2024-04-04T12:48:41.700000 CVE-2024-20080,0,0,9f77e554af3bbd3c0972041ad77ad07151acaabcf84a676d09d66327102a89a6,2024-07-01T12:37:24.220000 @@ -242506,7 +242506,7 @@ CVE-2024-20254,0,0,483b1bcc903a1f3fe5774e73017e3920b0d7ed3bc82e804e2d29798a51416 CVE-2024-20255,0,0,4c8067b6b3b68c94894b4ecd8c182992b7e2d67f936be466104b1472a1d76a79,2024-02-15T15:54:19.960000 CVE-2024-20256,0,0,643357aedff71b916efc28a152bf88a1ecacffa30d979bdd3a58df8bd0acabae,2024-05-15T18:35:11.453000 CVE-2024-20257,0,0,76ffe9a92c93a06325edca86ddf0d31564fbc213598c5ddb9861c391515973e1,2024-05-15T18:35:11.453000 -CVE-2024-20258,0,0,86668eb2a14f93ae58cca9d4779b12b7223791a7316a5480eeeb82e1669b4fc2,2024-05-15T18:35:11.453000 +CVE-2024-20258,0,1,dd86e76a96b4e6a893c0c6ec61ba16ebd8778c22b6c500e3943b86dcf8fd547a,2024-07-03T01:46:01.017000 CVE-2024-20259,0,0,73ab78da8d0a510423d7dde4580b3cd86ea36933046212658a9baf6cc1c10b54,2024-03-27T17:48:21.140000 CVE-2024-2026,0,0,5071705b646dd74094af5cbedc0c8f83ed6481f03743c4a8c8e638254d8625b5,2024-04-10T13:23:38.787000 CVE-2024-20261,0,0,28ae2eaa7fd2c580717dbb491e2368839090c9828bd63ed0d087b1404a2d8648,2024-05-22T18:59:20.240000 @@ -242559,7 +242559,7 @@ CVE-2024-20321,0,0,6de34d7d404f536decd9f5a380e1c4f28760edee84d237a9b02d7c6e56d78 CVE-2024-20322,0,0,505d656abd2ee0d10812405b8fc5e64f58335921bda14716ed43aa4bb4075f75,2024-03-13T18:15:58.530000 CVE-2024-20324,0,0,8105b558a920362954e59927ed45c499623f22f3987422dccf7aa064c5d5be0c,2024-03-27T17:48:21.140000 CVE-2024-20325,0,0,dfe1f947bf6fc9efa452f1881c4faae47bd9e909bfa416f69baa534db16c5289,2024-02-22T19:07:27.197000 -CVE-2024-20326,0,0,c32fe6e3ea4d72c777354dd7629e7198c7f007d42047707cc655659d56c1b7f4,2024-05-16T15:44:44.683000 +CVE-2024-20326,0,1,da6640a18213d5341d3d6d6fde35996d9b5364b80a7a8fd68c21380f84c10d82,2024-07-03T01:46:03.803000 CVE-2024-20327,0,0,0b0737184be7039f4590b285733309ba156da40401e164ab950277586b5aa24a,2024-03-13T18:15:58.530000 CVE-2024-20328,0,0,13a28c8852ca273b55c1f130423e4a6ac2577a7815aa1061922f9234c0e1ab39,2024-03-01T22:22:25.913000 CVE-2024-2033,0,0,f5fe8db5021f3e22566d05e7fe01aca13f3288ae0aa286203b57a8e2fcfb1f17,2024-04-10T13:23:38.787000 @@ -242588,7 +242588,7 @@ CVE-2024-2036,0,0,8e04d23ebbe0a468fdcd1f86116418146522877c82a0d297361ec20a661cc7 CVE-2024-20360,0,0,01ead87c85ac9daa6d9dc5587bf54cc99118981f1da825db23bf3ff6ee991ac2,2024-05-28T14:29:13.403000 CVE-2024-20361,0,0,0f85246ce19542f4971e629f8d682179d61b7aa25f2b62c267e7838ff8b7ad1f,2024-05-22T18:59:20.240000 CVE-2024-20362,0,0,0e125a5f57daca09b3a31c24c5285918bb46201f033defe636102ce0379b9ecc,2024-04-03T17:24:18.150000 -CVE-2024-20363,0,0,fe925afc777be9269abff93f8682bd3ba985a86878eabacda4c81b6f839b04ef,2024-05-22T18:59:20.240000 +CVE-2024-20363,0,1,fd62098992468346229d2c9f8f88c3a0bdc7312cacd90d8bf7a2b7925976c048,2024-07-03T01:46:06.070000 CVE-2024-20366,0,0,847482c81cd89b351ccec66c9f3c8d8074954a0de68a5d98d408eebff09cee32,2024-05-15T18:35:11.453000 CVE-2024-20367,0,0,e44fa9dcd83189ac4bb0284b57ce6be9f7d161e3fd46e74e477fe5fd623ca1b7,2024-04-03T17:24:18.150000 CVE-2024-20368,0,0,4814a8127430faf4ae61ecb30b9f4c874f54598057d22bcc8b2ca14f1fefa88a,2024-04-03T17:24:18.150000 @@ -242603,7 +242603,7 @@ CVE-2024-2039,0,0,4f1e5a8a814f51edc0234cc5670da2107cc2a93a2ef1eadc628898e3eec44b CVE-2024-20391,0,0,f91eada0700f8cd9f2eaea2b871ba7d3969d87e51919a0eb478edbaaab6f3a9d,2024-05-15T18:35:11.453000 CVE-2024-20392,0,0,ace66ba4c79c3f433832bd6cfa0988701f79a2b5d6c0fbe5016f71bba33a0a9b,2024-05-15T18:35:11.453000 CVE-2024-20394,0,0,d0e5fc3a79dfeb923dc3f02320ce7649899cba8340301b836f168cfe3139baa9,2024-05-15T18:35:11.453000 -CVE-2024-20399,0,0,2a3cc3aff262dde5cb825891ce2589c869f735b250afc08dc247e72a97725da0,2024-07-02T12:09:16.907000 +CVE-2024-20399,0,1,0e6c2648140a4eb958e1147ef290736c299fa556f2d3e49fafe1f717e89dec31,2024-07-03T01:00:01.810000 CVE-2024-20404,0,0,679bbd668c3128b9d2c298395d952eaf5fd76470dbc9bd0e765678566e0d175f,2024-06-13T20:25:46.837000 CVE-2024-20405,0,0,e5acdd821474e29805e089211fec2d1d30a76e0d4d4635efbeb215040858791b,2024-06-18T18:04:04.497000 CVE-2024-2041,0,0,f285d116ebee20fb02fc2c7de4f69fe8567e76fe9eda446fb7969801431b3d7d,2024-05-06T14:15:07.747000 @@ -242975,7 +242975,7 @@ CVE-2024-20993,0,0,c76300dcc4585f2fd56825f1fae341382d1cd779fec3e9fb9411c2853b283 CVE-2024-20994,0,0,b3403ec5f8f7e61f7f4af0c6aace34821d061ec3c3a5defb0a1731263df52eb0,2024-04-26T09:15:09.500000 CVE-2024-20995,0,0,b95ab7ba1796a5c7c3d8cca5a05491e5c3405546d94cafab94c4e486e52dbfc6,2024-04-17T12:48:31.863000 CVE-2024-20997,0,0,a0562a98fec8a4ebdffc03b42c8a9bd17be145809ca03786920461d7f7935e0b,2024-04-17T12:48:31.863000 -CVE-2024-20998,0,0,85de6ffd6030cc8a221ae4016bc0c4c8c05647ac9c3e97be0058ceba11b095e5,2024-04-26T09:15:09.567000 +CVE-2024-20998,0,1,45f0642541da0d531c6249ccae4fbcc371dd659326bb9c94a1fffbd680edd27d,2024-07-03T01:46:21.563000 CVE-2024-20999,0,0,38d72c1914c2f7cd32bbca38dbf6b31d7cdb66a1301d3d4028479f0594575e11,2024-04-17T12:48:31.863000 CVE-2024-21000,0,0,b798a7a05ed2c5c61deffa53fd920f65f082fefcd1be9dcb2f05765ff755e538,2024-04-26T09:15:09.633000 CVE-2024-21001,0,0,3ea0c4d6e032b3ca8ec16b34404a4967da44fa0d30a3f03ab34610e8d8a28c90,2024-04-17T12:48:31.863000 @@ -242987,7 +242987,7 @@ CVE-2024-21006,0,0,24276fa121e200514fbab563a229066611a958ddf026b368bb42bffc3d6d1 CVE-2024-21007,0,0,5e79b59d23f74227973014469c9c006292d5a48a207617d864ea85e415e8727f,2024-04-17T12:48:31.863000 CVE-2024-21008,0,0,180cac58dafa1a6df58140c22b0eca553c92b315a62e4ef184cd9f39162279ed,2024-04-26T09:15:10.100000 CVE-2024-21009,0,0,18229ce1f393c1090ccc124960e638f3e12f15d4c4376268b2d606e28dd897cc,2024-04-26T09:15:10.177000 -CVE-2024-2101,0,0,c8a12667f3958d332efb261f4cb3c420df5b094482122aff9dbb41fd78e244db,2024-04-17T12:48:07.510000 +CVE-2024-2101,0,1,f64308a9cf2bd395190830ff176a54d77164cf0faaa20d92ded300e0efbb1c30,2024-07-03T01:53:00.530000 CVE-2024-21010,0,0,0583ed22b473d6988a741927f390c519f270906aef73a2591d45e4735fe791d0,2024-04-17T12:48:31.863000 CVE-2024-21011,0,0,e51db7fcde12c70e147c567049e27d3541f52ee809a17a8d7464122ff2dfd216,2024-04-26T09:15:10.240000 CVE-2024-21012,0,0,1ba8160029b175c6622d869a0e69ea4e7de662e09959c9853286e890342c833a,2024-04-26T09:15:10.307000 @@ -243010,7 +243010,7 @@ CVE-2024-21027,0,0,a03a9045ad57d10d7d7381e34394d810fee044cf8b77728df056807f4595b CVE-2024-21028,0,0,049e0616b7d859ad56707b59abb10619183c31d144be62290937334d919ca094,2024-04-19T17:34:24.897000 CVE-2024-21029,0,0,36d1c8191d52e2f424fb4e6cb31c2c317e624517495ef4e386b75d183f736507,2024-04-19T17:33:31.747000 CVE-2024-2103,0,0,4357f6f4848f7c5880c727dbfe8b97df3dcf5303e95d5a7ff4fdf7062d775ac8,2024-04-04T16:33:06.610000 -CVE-2024-21030,0,0,2b0990a808d3b5ee5406b9871fcf3e42066f5470ecb69f52790eb1c012f9498d,2024-04-19T17:33:22.030000 +CVE-2024-21030,0,1,8784ba0a3755df5b21c90fc1a3d06189077ff55e4dd10202c7d6a2ef21eadb3a,2024-07-03T01:46:23.853000 CVE-2024-21031,0,0,01618b75017bccb998a097106f7e0cf7a3509b8d8b27a6bafd408750ecc49582,2024-04-19T17:31:50.307000 CVE-2024-21032,0,0,de3dd91f4dfaa3177669b2adbe2eddd36feb749dbcecd07e41c89410fae8c43e,2024-04-17T12:48:31.863000 CVE-2024-21033,0,0,2e7eba3cd8fbe6dbb0ec0022fd0a5d8193fa13f9812c0320780e3b72caa0358e,2024-04-17T12:48:31.863000 @@ -243020,7 +243020,7 @@ CVE-2024-21036,0,0,226d345eb757d5c9c3bb396722f293039f19b42c79013a73d9a9b6230995d CVE-2024-21037,0,0,008daff49abfa82869dc407f37cb56857f5d964e85457a4a91c40eb3b9d694f2,2024-04-17T12:48:31.863000 CVE-2024-21038,0,0,6187fdde74ab2405c9dfaf7ec7f4c53ca2824334351a9b2d9fcd49744494b523,2024-04-17T12:48:31.863000 CVE-2024-21039,0,0,49a2d5d7bc00bf377e585a02f4f5ccfcc2587e8f75fc7c62cf031f2d92057bec,2024-04-17T12:48:31.863000 -CVE-2024-21040,0,0,583007bd6bade4ac47cbb9f7ffc2583d31b7f31cf7d322b8f9dde2abb413b637,2024-04-17T12:48:31.863000 +CVE-2024-21040,0,1,9207f1539b8715e9de73bf8605d282f9258ecbde4b6b5af37d49fb9b9b73b544,2024-07-03T01:46:25.020000 CVE-2024-21041,0,0,de835777516670f61385f64273b8ad48df5cd361214a943fb968f07cf218636c,2024-04-17T12:48:31.863000 CVE-2024-21042,0,0,55cfa49e541a98c8c46c0984731cf65bd60394e99ffa86b77041311895d8fe86,2024-04-17T12:48:31.863000 CVE-2024-21043,0,0,dc53e5b2fe828c248a1b79bd90c649b6e9d473f8d2bf850bfa71770b33e8828b,2024-04-17T12:48:31.863000 @@ -243033,11 +243033,11 @@ CVE-2024-21049,0,0,7054a195f3429edd9476cd9dfa40257598e09d87ccf8f54b2b49bb0bfb4da CVE-2024-21050,0,0,f98fec72eb6309b4b34ce86a8c3fc1af06635e46cd1cd5c3eb0a8d6c20caca8c,2024-04-26T09:15:10.637000 CVE-2024-21051,0,0,730cfd973bf7091010cd7d085d104e60aabba29ee2a6c8c244aff9d1cbbed2ab,2024-04-26T09:15:10.703000 CVE-2024-21052,0,0,8fcaea640b31493e5de3c6ccb4ebeb658571630df3fef65a5175d6e228e8694b,2024-04-26T09:15:10.767000 -CVE-2024-21053,0,0,c2c0a8c5dcab83286aca7e7963eac42e47eb420c2e3d2a667e93e64c217a6979,2024-04-26T09:15:10.830000 -CVE-2024-21054,0,0,e24c12fb30efee61e27276f118ec633c2f2181c3cc815f52a626e859d3b61ead,2024-04-26T09:15:10.893000 +CVE-2024-21053,0,1,7fef0dc012419ed4a2e2c8a891096cd3e5ba1da6901d2a12026f2e7f8894c29a,2024-07-03T01:46:26.233000 +CVE-2024-21054,0,1,835b9f20e0e5a67456e3f5d7374f40411fa327258971531851fde9f6c745e99a,2024-07-03T01:46:26.957000 CVE-2024-21055,0,0,2df92d5c8d1855c6d37c903263abdc53486ae44cb92f073c6ae1754af77b63df,2024-04-26T09:15:10.953000 CVE-2024-21056,0,0,579cbfc70c1c9aab939983ee7e32b20bd0bb975794ba9eef2d4101c6cd0ec5ba,2024-04-26T09:15:11.017000 -CVE-2024-21057,0,0,ad7960b918cba84a9285e5b5081ac7265ed8f95ac167f4cd8446241a852a140e,2024-04-17T12:48:31.863000 +CVE-2024-21057,0,1,c1217f83633c24cb2e62e95ffd4860f165c284aba6906919eece4336c921ccc6,2024-07-03T01:46:27.783000 CVE-2024-21058,0,0,eae646366535f64911b6f5c11cf05f1d61655fe725482e333195d91352108784,2024-04-17T12:48:31.863000 CVE-2024-21059,0,0,d0601741f771540671417f30cde21017e42f48bcbaa909a0b589bd2b89204ba5,2024-04-17T12:48:31.863000 CVE-2024-2106,0,0,15de6b929ace188c18cf26b3c461a92f15449ebc8c35903dbddfc1b7b27db756,2024-03-13T18:15:58.530000 @@ -243045,7 +243045,7 @@ CVE-2024-21060,0,0,b942e5dad21401bfd1ddb5c1762fba0f27820544c03df6084d9db3684eef1 CVE-2024-21061,0,0,c067c76274d3dd0d768c412c439a785c45be17779bda9b8868cf83195c350110,2024-04-26T09:15:11.143000 CVE-2024-21062,0,0,8c99a8a390e279e41608a032223c81c88432586b692c9bfab98f514db375d2e0,2024-04-26T09:15:11.213000 CVE-2024-21063,0,0,00386ec9dcc1fb2e461a93486ecd091af48c62d800497f6a70a354e04b74b45f,2024-04-17T12:48:31.863000 -CVE-2024-21064,0,0,9f3d1dcc2da77fdbd8284a8907c4fea172ce50f42d0e165f15cd0a1ff6590ae3,2024-04-17T12:48:31.863000 +CVE-2024-21064,0,1,5b2971adc59d71b4aaa5c906c9a4f9e6fc91222b1a769debcd275580759920af,2024-07-03T01:46:28.883000 CVE-2024-21065,0,0,5c383c00c861b9299dc3d8d083a6c7b2ef320b710a4f76187481f80141c2960a,2024-04-17T12:48:31.863000 CVE-2024-21066,0,0,de5f164f54f519fa892c56099d5df7cc21033da5ed96c3454d6c06c478b93607,2024-04-17T12:48:31.863000 CVE-2024-21067,0,0,a54cc3b06c3985193c6346b3dbabf214dd2faeed68c1d4b7f9a909ecc6ea6d17,2024-04-17T12:48:31.863000 @@ -243067,7 +243067,7 @@ CVE-2024-21080,0,0,01811d1f17c04832a5c53ff5c25f7b600d2f5efedad9bc1c4e4ea77f8597e CVE-2024-21081,0,0,8525b7c574e97940ea59e5c3f9b60a1dccb8ad8d7a8590b7c7a54ff25a5e4348,2024-04-17T12:48:31.863000 CVE-2024-21082,0,0,c26bfca8435f62f7a91a96e3ea3770988e364ed37b65c6e9e3c3fa331f2f9538,2024-04-17T12:48:31.863000 CVE-2024-21083,0,0,1bebe608617a7b6c263f2bd12f08aa2fed726df83e43e9cb80226396336525ef,2024-04-17T12:48:31.863000 -CVE-2024-21084,0,0,1cb8a741188b441a8430ab8dada3a0d4db99599bc63794a25c2cddb40535089e,2024-04-17T12:48:31.863000 +CVE-2024-21084,0,1,3ecf39fd228939a2dce5544ec5b78321dcd296bd51eedb006c227a11eff8a7bd,2024-07-03T01:46:30.583000 CVE-2024-21085,0,0,0058a664b0df21c244c1d472b5e2011b273e74051e0bea775e1fbfbea1bb74a2,2024-04-26T09:15:11.447000 CVE-2024-21086,0,0,6225dbda94f0cf6447c5470d5f742e2b6c9860df4608d2672fbec36d7710ddae,2024-04-17T12:48:31.863000 CVE-2024-21087,0,0,f8237848d938fc88482015bdb3b6d1a78dccab6ea7842d043b863cb9cebae2ad,2024-04-26T09:15:11.543000 @@ -243075,11 +243075,11 @@ CVE-2024-21088,0,0,0b47b6e6f749e55fe17c53a0cff2705786e752e1ca3d888cedabbece54b4b CVE-2024-21089,0,0,7ae0e2f140ca265b5d64456eb374dbc3af60cb417339d84d08e68381e3cd98b4,2024-04-17T12:48:31.863000 CVE-2024-2109,0,0,89609790095cc0b59640b182b51cb1ac6a5a02de2cf22383cb4f12d8da91c579,2024-05-02T18:00:37.360000 CVE-2024-21090,0,0,60f046f0a9c5304d80718309bd3f85c9cf0c6185072eb892eff16f11c4191497,2024-04-17T12:48:31.863000 -CVE-2024-21091,0,0,44e6366ed6ec2fbfb62bb3aa882742738c04c1e25886d4262fb2f0c2b7a75b22,2024-04-17T12:48:31.863000 +CVE-2024-21091,0,1,9a3043aa88572c51cb2bee778e3b5eee6044532371caffcb433155119b6a18eb,2024-07-03T01:46:31.737000 CVE-2024-21092,0,0,a96f28afb2f79eb08be708f78284cdf08500da8888a0d9699ed9e4b0d6e8e593,2024-04-17T12:48:31.863000 CVE-2024-21093,0,0,3d565421d62fe80376ef2125e9dfb06fdc2a836fda042dda6ad1a1534f2a4f7d,2024-04-17T12:48:31.863000 -CVE-2024-21094,0,0,45dda780f642e6a4bed8a6906d75e79d99e2cd6f95b5c06d841ff6133c98a162,2024-04-26T09:15:11.613000 -CVE-2024-21095,0,0,5ad9583e4e50b36f664407f6f6164a53dc891483d679c27c4541f930caca17b4,2024-04-17T12:48:31.863000 +CVE-2024-21094,0,1,263056239ff6ad0bc667e8c6542629ef5df05fe8ce26e38409cfe58bcbaf0d28,2024-07-03T01:46:32.570000 +CVE-2024-21095,0,1,71837bbaf2bea328402990b14e523963606d49d2731911e5f425e34df69f4f33,2024-07-03T01:46:33.287000 CVE-2024-21096,0,0,f886e9f1346c46c50df462685f956aa1271b364c94bcf6ac8ddc7ccf2fe96a82,2024-06-18T02:15:09.823000 CVE-2024-21097,0,0,8349406a296787533db135239586ab1e354af73ee7e59b17b17098f82af1b697,2024-04-17T12:48:31.863000 CVE-2024-21098,0,0,831ff7ad8d2c7af64e56d89acbf46d4cc91ab5d8748a94e6b6ad4c192afd1308,2024-04-17T12:48:31.863000 @@ -243113,7 +243113,7 @@ CVE-2024-2113,0,0,1af2e189d0f766a4a77361c625e87ddcd239476cacd0eaf00d619a2d2d68e8 CVE-2024-2115,0,0,d143f7e37acad4fe03aa4c56d721ecbb114e211aea88a809faac9f70095e9492,2024-04-05T12:40:52.763000 CVE-2024-2116,0,0,0a8927d2c3af56415377e26a49eef636f1c80d9f9b3374c561d3bce1d3a48066,2024-03-29T12:45:02.937000 CVE-2024-2117,0,0,d94804a9fc0846420aec73bfb7661886dd6c525cbdcae51571bcd3adf1a56a79,2024-04-10T13:23:38.787000 -CVE-2024-2118,0,0,cc7239e1911b2fedd7efefc2bcf43293737a1c458586fdac470d8d5bcdb87f90,2024-04-17T12:48:07.510000 +CVE-2024-2118,0,1,8cc75b149351247ebd9b7f215d921c62e30056d8a3359ddec0c5f6ccbae617de,2024-07-03T01:53:01.593000 CVE-2024-2119,0,0,fddfb28891aa483f76592c7c27b82101a08176e818c0033898539a16e1ac7da1,2024-05-22T12:46:53.887000 CVE-2024-2120,0,0,d869e2d6a05f40fd099ef5d11b57f9e00d7f0b266e38148b71c8a447ce60ab1d,2024-03-27T12:29:30.307000 CVE-2024-2121,0,0,4e86b6ec3433d288b50b9e9c9587d6707962f4c2d7ff92215a6366c5fd16dc6b,2024-03-27T12:29:30.307000 @@ -243319,7 +243319,7 @@ CVE-2024-2150,0,0,cf5a5d3bf641537c55201147042c523c1cbd4d23088b2e4aabb2f5daef8816 CVE-2024-21500,0,0,c7cd747e0f0c4b38d8e4dbe19bee0ca66b1639098d16200b89805bcc371371ae,2024-02-20T19:50:53.960000 CVE-2024-21501,0,0,123be261b7f019199f015b76dce85111faae1f8c46476c73a31f61e53780c904,2024-06-10T18:15:25.273000 CVE-2024-21502,0,0,4303e1ae1b6dcbd72e1c376c19ab8a2359e92d842fa95b6d253e62be71a359d4,2024-02-26T13:42:22.567000 -CVE-2024-21503,0,0,dbde89ae4e130de7b3da2486efecec01760e430d7d72c91a7a50092dd8618341,2024-03-19T13:26:46 +CVE-2024-21503,0,1,e2363221420f9e91165d2e5e4f11cb5254f6968c7e760608a87c93e517f340a6,2024-07-03T01:46:41.680000 CVE-2024-21504,0,0,49e3dd2437933564763de1c9017a71fc9b864133b3b4959dcdb8b06a9a352074,2024-03-19T13:26:46 CVE-2024-21505,0,0,790ab171c9e46ac93718d1bb5680fe990f4ed1edc4d489f5e4dab09077e05267,2024-03-25T13:47:14.087000 CVE-2024-21506,0,0,6b97e4d4a271672352300824f36b76f10f9a4b0847e1f645fc21c5d93ab418f0,2024-06-05T15:15:11.173000 @@ -243331,9 +243331,9 @@ CVE-2024-21511,0,0,d034a9f6c4dcc55a5c4fdcdd7e3a31e0606abc8a26dae5773e22f734aa49e CVE-2024-21512,0,0,aa76b050e4c93f61d8197b2abb831a8245fb81d83da1143493979b801398852e,2024-06-06T13:15:31.390000 CVE-2024-21514,0,0,e46d2510c7d7d4af2532b103543d4d4cc9a1ce528ea64400d0426ee8dac1b60c,2024-06-24T19:59:16.767000 CVE-2024-21515,0,0,0328aa4c891cdd4af83806c0833511fbd9428103cda9e00c6fd9a5ee4d968daf,2024-06-24T19:58:28.987000 -CVE-2024-21516,0,0,e92a521ad5aff100399165764c49274a0077f590f2572735a3a35e0256794ca8,2024-06-24T19:57:38.197000 +CVE-2024-21516,0,1,abe3a9cd7507c4a7cc049f342ee17d37e317ed8b9557eb7b4e8fb458fc8f5c80,2024-07-03T01:46:42.813000 CVE-2024-21517,0,0,186f90d2088e8e33683da894eb00f6f13b8f4ae5479bdad5267ce001807a583a,2024-06-24T19:56:45.167000 -CVE-2024-21518,0,0,83a4ac5f480325e602a67a8a1958abd8c4414c62288c5217c40c0680b80ab4b9,2024-06-24T19:56:14.723000 +CVE-2024-21518,0,1,01d6f2ab49352480cf19019c7c7e4b7fa996341e6363bf5c2aff55de9f9b49d0,2024-07-03T01:46:43.670000 CVE-2024-21519,0,0,bf9643fa21c9312ad7f9de95a92dae918c8943fd492bc976b0551db532a526a1,2024-06-27T13:15:55.027000 CVE-2024-2152,0,0,3cc97618eb3606d7138054800fe4c9dd1b810706cf75a720e72d22a25acc79fd,2024-05-17T02:38:04.770000 CVE-2024-21520,0,0,719b2dc3254f707e72c103bbdbbe58152dcb2f4bbbb92f02a73b99a9ae3141f8,2024-06-26T12:44:29.693000 @@ -243433,7 +243433,7 @@ CVE-2024-21677,0,0,cd63a9344db53196b5943e582014caefd2ce4c1e61501d807a03293e59d4b CVE-2024-21678,0,0,a74398aed7f752b8a4413bad434f2adf6ab8a95bc47028b48620e299957a54d0,2024-02-20T19:50:53.960000 CVE-2024-2168,0,0,b854878eddfae20c7bf7090b800e5793dbeb1896e489304f1c2dd8d4439ad998,2024-05-17T02:38:05.397000 CVE-2024-21682,0,0,6b4858b4700d4b6ec3ad8145ec0ece417db20d31f4042e4246bb7ce7db07ab15,2024-02-20T19:50:53.960000 -CVE-2024-21683,0,0,4606a78c4030c676b13be131298ac67504c74d2a7960f7e607518276fc67bc44,2024-06-10T18:15:25.363000 +CVE-2024-21683,0,1,9e98100df1746075be9f809cd7f00fd6b0e3e97382e91b70d2a85ac430e36b94,2024-07-03T01:46:45.440000 CVE-2024-21685,0,0,e2cb496c7456474dc422afe7a0ecdd1596dce839e094299685a35eed8de7809e,2024-06-20T12:44:01.637000 CVE-2024-2169,0,0,151ccb2c8e1a2ae0c1ec7f646f803cafe134a2f43c3cebd718a131296f39d84d,2024-03-20T13:00:16.367000 CVE-2024-2170,0,0,ecb9a4c8858b9f58e40341aa169d3b7c37f3c5e40f6e92367b411525d123f7bf,2024-03-26T12:55:05.010000 @@ -243446,7 +243446,7 @@ CVE-2024-21725,0,0,bdf9c93b4a7ea1086142df5e839e5b4f02916d7ec678326728b59bee6aa76 CVE-2024-21726,0,0,f58382291c9f1461cf13ca0d051f8f0f0c9fa0278dc3151fc85e945cfade72ff,2024-02-29T13:49:29.390000 CVE-2024-21727,0,0,b27ab17b4cf9fa0c975b07ecf9db3a828358193d90226e060ebcb50e44b258d3,2024-02-15T14:28:31.380000 CVE-2024-21728,0,0,0d7074802f0bbe539004625d566f506428ee0f00b86885184a6c8af5d1b929ba,2024-02-16T13:38:00.047000 -CVE-2024-2173,0,0,0f84aa367ce4d705f73e89c66035e24b645443bf890c89b473c02dc8dea8baa3,2024-03-23T03:15:12.133000 +CVE-2024-2173,0,1,cc4124960d2643aa2251e7a3c8790f6df41511bad9bea7473c2d4e9b36b2911e,2024-07-03T01:53:03.693000 CVE-2024-21732,0,0,7a8bdaaf9609522ec086cb797e1911cb25fd0ba362f1f69c1302646455757ad6,2024-01-08T18:51:23.740000 CVE-2024-21733,0,0,6a822bcba55aae3b24fb21f4cd21d6c25ecbe736276d21ef2a3d97f8f805110a,2024-02-16T13:15:10.190000 CVE-2024-21734,0,0,652c558bfc482936599b7d824ea3a77e00ef63d3b87116475d92e963662baebc,2024-01-12T16:34:40.870000 @@ -243457,7 +243457,7 @@ CVE-2024-21738,0,0,278c1bdd65ae1ef741a29fb166b2b284a0905063e85efd5ce35f4fc963819 CVE-2024-21739,0,0,07f93ee1de6db4cd150e8044f6df8dfeec5c0df6671390dcd392c083d70bdcb1,2024-06-26T12:44:29.693000 CVE-2024-2174,0,0,02677fb92d9ec9e938d433dc80bb7dba037bdfac0e28c902361565b03794253f,2024-03-23T03:15:12.243000 CVE-2024-21740,0,0,80331fbcb4933bf7f4b07b3e6c688ccc6372ad93a7d99105a5d11a968ea5fbe7,2024-06-26T12:44:29.693000 -CVE-2024-21741,0,0,d2196869594799b3d3a519e07d5725cef751911c38e7ad74939dddf42da7bb29,2024-06-26T12:44:29.693000 +CVE-2024-21741,0,1,abad64de70c0fef6bdf30dcd2634a39b659714e71a96cc61f74db71b448be2aa,2024-07-03T01:46:46.537000 CVE-2024-21742,0,0,f05425c22b68eed9b18152111fdcbba099b7d5c68b9f0b2090a8077e4941bea6,2024-02-29T01:44:04.040000 CVE-2024-21744,0,0,75da6a88047b7dd10fd2808157b826b0359816427c478b970c1329b6cad90830,2024-01-11T18:45:53.040000 CVE-2024-21745,0,0,bf3a505c3e58c8e06145ffd7ba2bd556421c95bc4b61cb5874ba3a8a81e74cc4,2024-01-11T18:45:19.053000 @@ -243491,7 +243491,7 @@ CVE-2024-21785,0,0,46bd06c347f5d7360c065beeb6507b52c4cc85b4c48098eb453bc83e12d33 CVE-2024-21788,0,0,38da0f632cd1fea2a38481fa5d82800cc79d63e45addfec9f74ba1417b51ce70,2024-05-17T18:36:05.263000 CVE-2024-21789,0,0,065592bcd8c720a7bd60596f25729aa5b68a77a3a9f40afcc7521d9d3e39931f,2024-02-14T18:04:45.380000 CVE-2024-2179,0,0,ae7ec0d777d4f092532ca994d6b0860fc5ecc6f92bb84e39b0499b0a5cdf3be6,2024-03-06T15:18:08.093000 -CVE-2024-21791,0,0,e0cab86533dc35defdd008ab5decdd482c50ec9b66bd24a606c6deb59577e8d1,2024-06-07T09:15:10.820000 +CVE-2024-21791,0,1,787b38572829aab753d6cfdda2787bc47cd39c47a22a59d3029267970cc9daab,2024-07-03T01:46:48.367000 CVE-2024-21792,0,0,f0ad507f0eb84dd7d85ebb6df20be3f06e6ebf8ecfb2115a3ca7d7445f51f11c,2024-05-17T18:36:05.263000 CVE-2024-21793,0,0,b55902d470d37a2479e376b66a185ed8b4afdd3b18a61089b937f4c3059f5d26,2024-05-08T17:05:24.083000 CVE-2024-21794,0,0,5140601c591fc7e01c922f6b4426d49907b4278c42a623419c59c4c96fa7afa6,2024-02-07T17:15:44.653000 @@ -243505,7 +243505,7 @@ CVE-2024-21805,0,0,0cc71f66658f89ba3aa136c4707e117e9b180b89a5ccd9ebabe7b07f7d2cf CVE-2024-21809,0,0,f76a941a1ff5266e5377b205eec9435b0913d9cc5f891c8ba5bc78c4548798bb,2024-05-17T18:36:05.263000 CVE-2024-2181,0,0,a2fd878694432bbeda0e10d1053b12e99b3f48073d2428b435e4e90241d01c63,2024-04-10T13:23:38.787000 CVE-2024-21812,0,0,17aa7837957a8314d8283bcd6803c6ec88b5ca54481af89e2e3321502a717b6c,2024-04-02T15:15:52.650000 -CVE-2024-21813,0,0,68ba38472cfa0e89f314498046021b9f0c8f75b730b5ee40fdd037ee2264b153,2024-05-17T18:36:05.263000 +CVE-2024-21813,0,1,612fc9e5e1b11dee0bfc71c94e5d870ebaf8f3e7e8c28582b4730e725388cfa7,2024-07-03T01:46:49.307000 CVE-2024-21814,0,0,dddfdfc1e42fcccf3ce7b2bb13840091d318cff72fb9f26cd1ec562ce0c74599,2024-05-17T18:36:05.263000 CVE-2024-21815,0,0,ab91a303e2db960020337e0aa80545ce17eb52c46e86c32df0cef6312db60a85,2024-03-05T13:41:01.900000 CVE-2024-21816,0,0,ed35c1f8ddc7850dea188572415674feef10c1ffe60798b90d7a35a6b1fca0ac,2024-03-04T13:58:23.447000 @@ -243517,9 +243517,9 @@ CVE-2024-21824,0,0,3bddb01433a875d84e1ff57d3fa88062c16a6aea3448fe5a7afcbbae2986d CVE-2024-21825,0,0,1b47c3f0e2bb27ba429b8b0ff73ec4e737b53c8991d881956fe812d8a2d73bd5,2024-02-26T18:15:07.390000 CVE-2024-21826,0,0,db46d5d52cce4b3faca9d1878c694b0b714eba4ae02907457ece6927043134cc,2024-03-04T13:58:23.447000 CVE-2024-21827,0,0,812c74c9ba8d71849167f2a6716a320f7245bf6b8b90ac7020ded0508bcc1dcd,2024-06-25T18:50:42.040000 -CVE-2024-21828,0,0,0250a3d20529676ff2fa7d6979ac4bf5ca8f87e28525553552c2706e5c45d931,2024-05-17T18:36:05.263000 +CVE-2024-21828,0,1,88cb5c9903fd1c4f16d4af828768cbf95671e28587a038a573d470994b7962b2,2024-07-03T01:46:50.690000 CVE-2024-2183,0,0,d2fc5903dd12fc59dfdda0bd9c528b50368a6c295b02593ecad0115a711b3755,2024-04-10T13:23:38.787000 -CVE-2024-21831,0,0,80cadbf10c91b711fa3e2dfce5f1386f490c30f51eb3986f8ac8665da82300fe,2024-05-17T18:36:05.263000 +CVE-2024-21831,0,1,9403a3b9e0cc57695dbc8303d38fe710d2e07914a8ff134cb0d06a991e5fb5bc,2024-07-03T01:46:51.433000 CVE-2024-21833,0,0,d495db7ecc3e5eea6a844ebf68934df72f88808ddb4472cc88d71eac4c0a6284,2024-01-18T18:26:59.627000 CVE-2024-21834,0,0,adfdacc4c0ad7fb798fc6feea300b691936e258291634c57f962c7e425f92b08,2024-04-02T12:50:42.233000 CVE-2024-21835,0,0,fb0916fa42539929733a385b3b3838d919de0dc39f62f3f217cea291341fe53a,2024-06-07T17:48:28.307000 @@ -243529,7 +243529,7 @@ CVE-2024-21838,0,0,2e87184ffbd37f09fc02bbbce38359315ed0c01cd7f2541a39d089530736b CVE-2024-2184,0,0,b7ea4f5ba4c2bd608dff608bfe2a87def706e3fb064d33fdd3c3733ae6e79e4b,2024-03-11T01:32:29.610000 CVE-2024-21840,0,0,ba783d6125c59c9321abeb19e4ad3c65376e311d48c8d637117e60a3ad69607f,2024-02-06T18:32:20.340000 CVE-2024-21841,0,0,1ef7e6e8b2964a91e0a0a8934574e0d82bee2205fbe548cfb37b58592f6d6e55,2024-05-17T18:36:05.263000 -CVE-2024-21843,0,0,4c4b0d24df80226862d3bd0775efbbff5c5b0d80d5be22b6e016b0ddec9549e1,2024-05-17T18:36:05.263000 +CVE-2024-21843,0,1,5c410450f108a72387931ae84dd4efc7ecf10bc87d25368775ef5471dda9e3bf,2024-07-03T01:46:52.670000 CVE-2024-21845,0,0,c3c19550dac060de10c39d04cca7b66f65b34853e3fc2412b58fd540397606b8,2024-02-07T18:23:06.690000 CVE-2024-21846,0,0,512115685a3e2b33a587ce498f8e7a2dc5af4eb1a32f7fb8c1963942429e6055,2024-05-28T17:15:09.287000 CVE-2024-21848,0,0,1fde96dab5128745ee3e4ea7f8cda5cbe7e9c944949a63485c9658d999c137ed,2024-04-05T12:40:52.763000 @@ -243542,7 +243542,7 @@ CVE-2024-21860,0,0,9745cb77a8de410a197a8548750acfeec47533851fdeac14642298bec1ba6 CVE-2024-21861,0,0,02006d6a0a360d33a49963ff9ba036df087b483429a728bf20220dbc980b8012,2024-05-17T18:36:05.263000 CVE-2024-21862,0,0,144c34a99fca2ab2ff29021e426c6fdfebf22e9c643ef01b52bc5b8896c6655d,2024-05-17T18:36:05.263000 CVE-2024-21863,0,0,271dac2898e305fa77d04d20ca85b0dae0a5a0857bbfa85084510f677962f58a,2024-02-07T18:23:11.090000 -CVE-2024-21864,0,0,dacd35476ad64bba17a87af8e8c63462342d6a50a3fd943cab4472448841de76,2024-05-17T18:36:05.263000 +CVE-2024-21864,0,1,d598b0e62a067b81caf056567b896db11a3be7faee98cc9eb033e95fd9880608,2024-07-03T01:46:53.603000 CVE-2024-21865,0,0,7a0c150742a363fb7b1bfb201c6089eca71d87169fcff3d08a3aee9d2d9b45ea,2024-03-25T13:47:14.087000 CVE-2024-21866,0,0,e7c03b05e2d3f94b4b523aca377b349190d980e16c741cbf713751bf3c07dcf0,2024-02-07T17:27:52.793000 CVE-2024-21869,0,0,48ec62155fd9a810461dcd57893eff3c63fc7d7992b6dd94f9f3d8f38382a25c,2024-02-07T17:29:50.927000 @@ -243551,7 +243551,7 @@ CVE-2024-21870,0,0,eb93ddaf02bbc4698ce65f000ac66cf4bffe10c9c37f8f4faeecaca1a0400 CVE-2024-21872,0,0,22239b31aa97c4b593463d4050e00628060c6b9d8d31d97490cfec35d2339863,2024-05-28T17:15:09.413000 CVE-2024-21875,0,0,d88c7fa028650d8c38c644c89741f5c8883fbb1f9fa5219cf2c447a4b53bf374,2024-04-12T07:15:08.283000 CVE-2024-2188,0,0,50073fcb971d8d943a63e1f3e232811ec9a11d1acf3f48e9da561ed8964c30e8,2024-03-05T13:41:01.900000 -CVE-2024-21885,0,0,4c0a37c40fd97a6227c8ac231d63d8978b27ea4cc3663dac441d0237ba7c4585,2024-05-22T17:16:14.187000 +CVE-2024-21885,0,1,9068295558a67fe62442995ec6e89d07cfd310e730d45127d8b53a1f17657461,2024-07-03T01:46:54.537000 CVE-2024-21886,0,0,9d88c691c44df7e3c56c69da8cca3e89baff037b02f5cb7b18f748891d376c22,2024-05-22T17:16:14.343000 CVE-2024-21887,0,0,186d8ed16e2e82e2d98d02e1e469da947894827895381adaa2845388c827f41d,2024-06-10T16:21:07.127000 CVE-2024-21888,0,0,9de3f75608c2ffa998f0bcfa0dcc7f6af68bb755862afa34798392c7baa192b3,2024-01-31T19:53:06.303000 @@ -243559,8 +243559,8 @@ CVE-2024-2189,0,0,755678a5bdbb40e2e701e49c726ff2918078208afc7f267cd9073681b3e848 CVE-2024-21890,0,0,a23e39bf178457ea1a62055175acdccf21db560a2e161d84f67585a3aec660a5,2024-05-01T18:15:13.430000 CVE-2024-21891,0,0,a2485cf665b74852ec579d22867079892dab474f76b17a713a8f19b29fc1374c,2024-05-01T18:15:13.500000 CVE-2024-21892,0,0,0a2d4c2722cd9d0c5169a54525f85c8a3a71dec229f64a884ec45af2c9ceefca,2024-05-01T18:15:13.610000 -CVE-2024-21893,0,0,8e30826f2f638f6b28dccfb70150ad8a33cc616c290d8b76095e5ee871803b64,2024-02-01T02:00:01.187000 -CVE-2024-21894,0,0,78e81b5d057018993badd2be6cc56fe1fecba9799406c1904ab0b415aa943275,2024-04-08T22:53:09.773000 +CVE-2024-21893,0,1,e6c8de16df34a44a76a97b9b1d88a4dad03789192b9eaacf3482dda91a673010,2024-07-03T01:46:55.640000 +CVE-2024-21894,0,1,99d4be035674fd6f5aa2e0bb3c54ccc20c81ba516b5e4a7075a4f68df66ede3d,2024-07-03T01:46:56.430000 CVE-2024-21896,0,0,c4faded4836c068721da2d463fea335960350fed751393a368c4ddefc5978706,2024-05-01T18:15:13.687000 CVE-2024-21899,0,0,688bbc85b9f5d15251f75737cd336d68aa458da265ba78cb33907c6eacd4fe61,2024-03-13T14:25:02.043000 CVE-2024-21900,0,0,e9e3bacd169a2499fbcf9944a7d36b5aa443f74334f0445e246d0d286dadb841,2024-03-13T14:24:02.157000 @@ -243597,10 +243597,10 @@ CVE-2024-21985,0,0,853a82d200092c0582c4290723b53256d943e3aa0955024d181a6e0dc05db CVE-2024-21987,0,0,a312d19cf1876839a82cf4ab8a29efb39c100512ae446943b26071c9bd69f220,2024-02-16T21:39:50.223000 CVE-2024-21988,0,0,6d98a65c82c7e5efbca9ec9e46767cf60b6e116825eaf3026bae79fbf289f816,2024-06-17T12:42:04.623000 CVE-2024-21989,0,0,ff0faa596af54ed5ae8099ba628458de998e57d9e93fbba155c9de7f27b73b08,2024-04-18T13:04:28.900000 -CVE-2024-2199,0,1,31e85cc8f708ae33d11caf88fb8f95bb65ee9b7c3962b91a3deeeb287e629ff4,2024-07-02T23:15:10.617000 +CVE-2024-2199,0,0,31e85cc8f708ae33d11caf88fb8f95bb65ee9b7c3962b91a3deeeb287e629ff4,2024-07-02T23:15:10.617000 CVE-2024-21990,0,0,0b4ba6f896ec2fdb9c7522d6449f5c0166971932fa2ba6c5f18beb5ae9a5b96a,2024-04-18T13:04:28.900000 CVE-2024-2200,0,0,c95251fe62e0a963b7f86da5338bcf7f5fe53157d94fd1e09dd2c48a41fbdf10,2024-04-10T13:23:38.787000 -CVE-2024-22002,0,0,414e0abb0991bcf1056e17651b74f77477e56f14822643d1fad03b790e5a58fd,2024-06-20T12:44:01.637000 +CVE-2024-22002,0,1,3f46bf566ffde9830b437d34f578da579affa782f9e33834d952fd66d67c0a78,2024-07-03T01:46:58.073000 CVE-2024-22004,0,0,722cf9801f459066afdd85850c725b2e967fa83ca93b6dee72900667c46a5b4a,2024-04-08T18:49:25.863000 CVE-2024-22005,0,0,313b9bc6d7138eced2900a2388d6d58fcc17e9d91231c0517d2cb0e3e82b9d0d,2024-03-15T20:15:07.527000 CVE-2024-22006,0,0,4c7c420bbb6e62588c7a1f4eb632b3e6efe7a61ff08393b9055a3796f498bb2e,2024-03-15T20:15:07.573000 @@ -243611,14 +243611,14 @@ CVE-2024-22010,0,0,c8be08522110436a9d4fa99d4021d5a2fb6c1481cb50733e6d40fe00f78ad CVE-2024-22011,0,0,a4e97c7f0f5404ca7a76cbebfc7c0a8de2f95a8e9b552d17a02deebc519bdec2,2024-03-12T12:40:13.500000 CVE-2024-22012,0,0,6083637305fc19ea62a8c209ebe6bfac1cd035e045c787ca530a090291dc1971,2024-03-12T21:15:57.953000 CVE-2024-22014,0,0,79bf9edaea087eb4739d179f2ed69981a390cf89f67c6fe45526acb6cb4887ec,2024-04-15T19:12:25.887000 -CVE-2024-22015,0,0,6797154115c52984e527a8d84186a281218b7d6d6cad6d8130d2c3cd26e74901,2024-05-17T18:36:05.263000 +CVE-2024-22015,0,1,ab9198a00b8902f553a18672e99e37367cbd733d408a460d3e69564e986f708c,2024-07-03T01:46:59.010000 CVE-2024-22016,0,0,72bb3341c866069974fe863b6c9e848e25809f5f0697d51cda8a3c348c9671f4,2024-02-07T17:33:12.727000 CVE-2024-22017,0,0,eda129adeae4ecfa4b275b7bc6bb5638800d036cf47c85fe2baa6a803f743c01,2024-06-10T17:16:18.773000 CVE-2024-22019,0,0,49190872720c4c119c607cdd3cd1206179dcd2b84c9cd0a4595a1040743a11fe,2024-05-01T18:15:13.800000 CVE-2024-2202,0,0,830996a3e5b6be902d6f2e65d3759482285591493d041fcbf74113f66926d781,2024-03-25T01:51:01.223000 CVE-2024-22021,0,0,ba38d4b86a2c5af951f989c7a28594b6207f0b19739ba3d580be6e4d49001bfb,2024-02-29T01:44:04.690000 CVE-2024-22022,0,0,925c0d46bbd39b5d0f2644b5e26e0cd82488a20b7de7cccfa4639e9bb8f60d9e,2024-02-15T18:45:30.887000 -CVE-2024-22023,0,0,7e8e0e905a60ffd4a97223bf6516f7cf037ccc58c54cec4a4d059a3dd8a4e247,2024-04-08T22:51:43.003000 +CVE-2024-22023,0,1,738809cdca073240a61fbce615868c0b1c3f7d174f610e159e035e11db1f2996,2024-07-03T01:46:59.843000 CVE-2024-22024,0,0,980d44adebdc63cfe4985efd7aa2ee2044d33423093fc7c9f165c43f20a43115,2024-02-13T15:15:32.193000 CVE-2024-22025,0,0,8df8368d53c6b0aa2e92c5a6d4608e201433aebd46fd17e0cf5482211e1088ef,2024-06-10T18:15:25.577000 CVE-2024-22026,0,0,3bdc95eb798660b93c55f5c4cd51e979b7b2ea5880fd0a7947a517a2a1795f62,2024-05-23T15:17:25.833000 @@ -243639,13 +243639,13 @@ CVE-2024-22049,0,0,9b7359ed630e382551d4570c9533818edaca377c6778b42eef7546c621957 CVE-2024-22050,0,0,6cc1f5932c87c1ee4d5f0c22a81597d6852da9226b500ed6c316fab1f5f2b61b,2024-01-10T15:10:36.697000 CVE-2024-22051,0,0,351db93d6ca76e0dc0a7975efc553f9724406030c8337d111a27ec7033241658,2024-01-11T17:07:05.660000 CVE-2024-22052,0,0,0227f99d44e89893938b4544ca95dcc1c41e798d05744c94fdce48542d951019,2024-04-08T22:52:44.573000 -CVE-2024-22053,0,0,8caa4e40ec88ec96bdfc5af942e0f8feb54eb37f45d5fc1c8cea6c8e5bc74f38,2024-04-08T22:53:03.443000 +CVE-2024-22053,0,1,fcc7090aebe2df352917521dee947feb77d6dc39631742e8018d520fad4e92a3,2024-07-03T01:47:01.167000 CVE-2024-22054,0,0,ea7f90611fdd0de53fc019330b39d133a7eda202c929c51b6ca495fd39ad0bf5,2024-03-04T02:15:16.820000 CVE-2024-22058,0,0,2edaa6959cbfe6a9fa9d45e5111a81d4ebaa88dfee56fd716b2def1fcb46404e,2024-05-31T19:14:47.793000 -CVE-2024-22059,0,0,4443ccacf839bef386f3dd9603b5cb3a37b39def8998bf9a8ff761e1dfdef616,2024-05-31T19:14:47.793000 +CVE-2024-22059,0,1,50d90b3cb7f9bf66ee5ba944e169106caf70e42a039b7301c7281a7acc269806,2024-07-03T01:47:02.030000 CVE-2024-2206,0,0,89bb78f285eca92521ddf90479f409077fb3db3aa39188b40e35723bcbb7e9a7,2024-04-16T12:15:10.187000 CVE-2024-22060,0,0,8196312ba8e15fb6a16f27d7e77100a283cd190872d1648c8877d6e45bc67f8c,2024-05-31T19:14:47.793000 -CVE-2024-22061,0,0,7e6b9bd07913a675f2f822ab70679b29ef286665a0e4e28b5039260be9545249,2024-04-19T13:10:25.637000 +CVE-2024-22061,0,1,a2f8b1edabd606da9b855ff3e3612ece1cc2a51d553a7dadaf2301f49cdc94da,2024-07-03T01:47:02.763000 CVE-2024-22064,0,0,c629ceda13b1d36f0f60a6ea95a2c77f87751465f007aa3a59355e800a89dfe9,2024-05-14T16:13:02.773000 CVE-2024-22074,0,0,959aaae231895ad1dab22cc5268e854f7f776fc321d5804e91f78b08ec2f5391,2024-06-07T14:56:05.647000 CVE-2024-22075,0,0,e134c94ca50cfff14da7c6327f518dbd409e37e86810fc1b2a583012e3bdb9ef,2024-01-10T15:06:42.563000 @@ -243666,7 +243666,7 @@ CVE-2024-2209,0,0,eeaa5baaa32a49eda6878a59f2ebb6696131e5d9ac6771a3c4e8da4f915f93 CVE-2024-22091,0,0,dc570940b7ab49002875ff65e39f32c1969cc3886a9c720bac1bdb544d2393e3,2024-04-26T12:58:17.720000 CVE-2024-22092,0,0,35cd11c9c07a47737b4e29cb95e656383a3704154bd1a4578e67800eda161eb7,2024-04-02T12:50:42.233000 CVE-2024-22093,0,0,b7c449b9319413a66024fe7dcdb8bf0035d00dbeef636282eb761ad13794295d,2024-02-14T18:04:45.380000 -CVE-2024-22095,0,0,561ad02a49117b109fa7a66b65f1a5418b980c4c5cc6beee5100d8033f26fb67,2024-05-17T18:36:05.263000 +CVE-2024-22095,0,1,626bfaf44345bbe4e9983a24af7501d010f455b3385d9a6f62ce99af00466cf4,2024-07-03T01:47:03.793000 CVE-2024-22096,0,0,330d7fb3350f034a1e0c8805b47a2db6dbe2ceb88846f9ddfaaa7c652ddde766,2024-02-07T17:33:26.800000 CVE-2024-22097,0,0,dc5034d6090bb42f5640214b5fe568fb1a52ad7dbb7e8b0261ed05bfcaebecb1,2024-04-02T15:15:52.733000 CVE-2024-22098,0,0,143b86afbf5a983f03c2f584969195c0ed3a1e44177534377f9bd3d74e39f2b3,2024-04-02T12:50:42.233000 @@ -243674,10 +243674,10 @@ CVE-2024-22099,0,0,1ca221f767509ed389320bf6e17bb08d430c1bb802873593e5ee88df116cf CVE-2024-2210,0,0,5a03f758877779e9677ec1f83746a6fce63214add6c369b78804c38534e8d822,2024-03-27T12:29:30.307000 CVE-2024-22100,0,0,a6ff3a70b4f3071cb6edf59573e0a019914b2e075d17d6c1c64c20010521b0fb,2024-03-01T14:04:26.010000 CVE-2024-22102,0,0,d95547a89c084be0eb15a34268c23156cd9dcb017353433ab47ab8013a00898c,2024-07-02T17:44:45.700000 -CVE-2024-22103,0,0,6e1d65fdb3cf474d9e88e77145f3b0071363290b216874b8510845964b73fc52,2024-07-02T17:44:45.700000 +CVE-2024-22103,0,1,df31d6a9f48aa48f01b40433d5c00619bb455399975aab2700dd8183ff7ea955,2024-07-03T01:47:04.630000 CVE-2024-22104,0,0,0c00a222c49023fb7d23209c7a2e23d50832446a91f69f43dbf37e749397fc53,2024-07-02T17:44:45.700000 CVE-2024-22105,0,0,af1c58cbed2ba7357c4b3cb20ef053301db567530bde3b44f88c2c6bacb21416,2024-07-02T17:44:45.700000 -CVE-2024-22106,0,0,95a81ffb858c556ed361ac455c5d6f1f41eb92223b95426dd50fedb27842f26b,2024-07-02T17:44:45.700000 +CVE-2024-22106,0,1,52a43b0c9b783aa52ea821e92300a8c5acd357122ee7e7081d92784e9bb2abf6,2024-07-03T01:47:05.580000 CVE-2024-22107,0,0,e3cca6041ab5ebaddd7412e3f1116f94d2eef4d2646eefe8a425a6cd027599ec,2024-02-09T19:44:32.497000 CVE-2024-22108,0,0,cdaf61a2506aec5c5c15705bb009e8054dc2f9e9fadf39ff642fb65becdf0793,2024-02-09T19:39:12.853000 CVE-2024-2211,0,0,f252c5769fd953dc08095bc92fa002da1e59442805565547bd754c92279eb026,2024-03-06T15:18:08.093000 @@ -243715,7 +243715,7 @@ CVE-2024-22148,0,0,eb4d4a193f2153f5fe3df79c79a6ba27f52e6d1edc409f8c9f4419f061b12 CVE-2024-22149,0,0,993c76a1c016f836df9d96f9ff69fb5ecade44a2c16fb44ee1e8795031628948,2024-03-27T12:29:30.307000 CVE-2024-2215,0,0,bab2a3391ec80ee40463865cb86e61a9df2c78bd495d21727bd044393f96dc6c,2024-05-01T18:15:19.133000 CVE-2024-22150,0,0,73a6449bdd862cb4aceb7dfcabf00926f0730684d1b40796cd1922a1d89122f5,2024-02-06T15:42:52.927000 -CVE-2024-22151,0,0,0079ce780aa18d5b31c59f24d9a1214e963a8a50f3424a7f1c05e3150fabe1f9,2024-06-10T02:52:08.267000 +CVE-2024-22151,0,1,dd28f3ab075e860268614df2897be6953e355259213176a1b898c65c31ebd23d,2024-07-03T01:47:07.170000 CVE-2024-22152,0,0,77741f5ed7ba0cff2726117ba8b408bddeb0ad8028c0019d800ba91134fb10eb,2024-01-30T17:36:20.533000 CVE-2024-22153,0,0,183cafa541cc9d6796e6f60d4f84cc3fefe9e93bd9495a8b813ab36c05739148,2024-02-06T15:43:49.957000 CVE-2024-22154,0,0,c5d6f5ccc259910245679ed3525d0fea5ed728e2e4ec972b00aa2e1bbd5206eb,2024-01-31T20:20:56.647000 @@ -243737,7 +243737,7 @@ CVE-2024-2217,0,0,07b67ca85e13a2c6962db1475a9d0f8a931b674f51497121f9a33c8078bd4b CVE-2024-22177,0,0,1ff2297e612a95969b8693bc6a53ecafa7223eba267b1cfe298d3bc1fedfbe99,2024-04-02T12:50:42.233000 CVE-2024-22178,0,0,894383da751aaa1046c611146ada59662a01e512644efee9e31c744bf34674c7,2024-04-03T17:24:18.150000 CVE-2024-22179,0,0,077a89cd90d357917ee36a8e199f939ad2a69cb604b53e3f5f34bba5fb27b47b,2024-05-28T17:15:09.547000 -CVE-2024-2218,0,0,ac8d685f53f18102ca3ef8fa1ee4310f41990dece8fa344575e88ea54c620ccb,2024-06-17T12:42:04.623000 +CVE-2024-2218,0,1,5b034e25a8a8d43ef39f575ebdde025e2af6f0733566077f07a201f593a25e73,2024-07-03T01:53:05.340000 CVE-2024-22180,0,0,19e9318ece70bb0e88968bad696b07798db0b84c54153f426e33acb6b2d89f93,2024-04-02T12:50:42.233000 CVE-2024-22181,0,0,aa4f7fc8e8236ce5a2a5625d560e720bca0124d088633712af3a8c63643e6bd8,2024-06-10T17:16:18.890000 CVE-2024-22182,0,0,33412ce4ff69d7e4ec2fcd049c27451f4c9a424792b679659080bdcd047dcd32,2024-05-17T02:36:15.670000 @@ -243755,7 +243755,7 @@ CVE-2024-22196,0,0,4bcfd4815ebe8b8ac03d174d4f1a94c36139d4fdd43fce25d3760cfd5295f CVE-2024-22197,0,0,a31ca1c384eec2a677476912822646145621e94067b0724bef0f1faae8385d2c,2024-02-29T01:44:05.423000 CVE-2024-22198,0,0,9a6bcb1ffad51ec0771f4ce3c1b7886e912e42c7538e92dc9b11917bc0812a1c,2024-01-18T19:14:25.667000 CVE-2024-22199,0,0,77eb611a7b277cb248918b51763a94c433dcad8aa85fdccb191ccbbd344bf772,2024-01-18T16:54:56.383000 -CVE-2024-2220,0,0,3b70eff3108a1fd372f38c940c611a0bc1caa7414bc4ee004fed1f4e2d3ec6a3,2024-05-24T01:15:30.977000 +CVE-2024-2220,0,1,5af099dd8defb36fcecf9c835f2050bc314a5c4729a60014994ecad4b361ccff,2024-07-03T01:53:05.537000 CVE-2024-22200,0,0,2d2dc6aa2d6e67d6ce2d4538edbff74b41b0708f1b4ceb17fe23c3c985c7a985,2024-02-08T17:01:25.927000 CVE-2024-22201,0,0,6f117e6246b1dc90ddcd71a7294d55f574229c0f2f36a0c40df2284de244b48a,2024-05-01T18:15:13.847000 CVE-2024-22202,0,0,e1aee0413d2fb0642bc93b11c1c7a422f2cb02fde5420d88a13d06e7e36aba6b,2024-02-13T18:30:53.013000 @@ -243799,8 +243799,8 @@ CVE-2024-22241,0,0,496f061bf551a3619640a70a8bba0bd7b22a646ffcd7631f69738ec433aa1 CVE-2024-22243,0,0,6324ece72c10b2aa24e493775157f043a82a34dd2651ccf585a3e747b1c10c65,2024-06-10T18:15:25.757000 CVE-2024-22244,0,0,dba693b18f33ed082209a3d3f3d2de08ada28a695c46abcbcc3a38f60d7e7b06,2024-06-11T13:54:12.057000 CVE-2024-22245,0,0,927c448062746f597b41ffcf29cd16f5426f577e5bde39a0c34f8f665ebf4695,2024-05-17T02:36:17.103000 -CVE-2024-22246,0,0,2ad5bd7b29792c82fa874f445ae8d963d5c600e0d5bd2daf2a1e4cb1775585e8,2024-04-02T18:12:16.283000 -CVE-2024-22247,0,0,7aa6179e4d9d77f1196a818a0bd3f59c7ca5feeb69c6d7e8598bace55e108a70,2024-04-02T18:12:16.283000 +CVE-2024-22246,0,1,76171b54a9144a796e871026656a5c18298d50d46b7b4fd57d1a0e8c44956850,2024-07-03T01:47:08.260000 +CVE-2024-22247,0,1,5dceb0753aeffb2a61cefe474810b3d4538fb7426596059650e37c1a32336c77,2024-07-03T01:47:08.997000 CVE-2024-22248,0,0,2ece3a07f4990d2b2cb3328c0a925fd71ff67cafea8fa1b3490e8b19789ebd51,2024-04-02T18:12:16.283000 CVE-2024-22250,0,0,d256c1ae83efcb4fd0767134e7c2a7cbb8c79785a1e10a237d283f4bb314783d,2024-05-17T02:36:17.283000 CVE-2024-22251,0,0,2c97f940db42ae011ed6a48babf352df0cd9a0c6766b6bcecb43c6a36d93a587,2024-02-29T13:49:29.390000 @@ -243811,22 +243811,22 @@ CVE-2024-22255,0,0,505a899b5cd44111ec51f06319a556c9dfde5553a6ebdfc520dd74bd3e8c9 CVE-2024-22256,0,0,7ccfa1d456f911dd1ae59428e390bb74a9bd8e0f03e6ec12672c279cdd5bf898,2024-03-12T15:01:32.347000 CVE-2024-22257,0,0,874ff0a72fdff7945c5fa3fbbe0cdd5ca05cc513db9be5811beb7a84e897ff09,2024-04-19T07:15:09.223000 CVE-2024-22258,0,0,73834c066fffbf1ceac081ac0d8fd511b8fd9e870301a54667895cd45741a179,2024-03-20T13:00:16.367000 -CVE-2024-22259,0,0,dce7d33f8caf96926ed38e47ae4f4d2a0e606a3507b6c30493d6119b160a21fd,2024-06-10T18:15:25.853000 +CVE-2024-22259,0,1,1619807ca0dd0d25e590483ba5fe046c92691b86131dda52a5fc321e717fd519,2024-07-03T01:47:10.080000 CVE-2024-2226,0,0,ee8f1ca60db458688b285f09c24138ba2af43e7eda48e7abf64d7861f3a6fd0e,2024-04-10T13:23:38.787000 CVE-2024-22260,0,0,1800eaba107462f56167bed05f6ecba42f4ea33d7ec01a035d5fd1b4f699d4b8,2024-06-28T10:27:00.920000 CVE-2024-22261,0,0,becda971f9fe2bc0796e849a1ca6efcee98df6406cf540f6a7792c4f11b5b746,2024-06-11T13:54:12.057000 CVE-2024-22262,0,0,f19b1c11ec8069ac727f7996014f3456fd5a6417d431b01d11ac200419a9bbec,2024-06-10T18:15:25.940000 -CVE-2024-22263,0,0,05e1e7315e7f035b5eed904b4ce84da90b832cc34c42840059ea59ce5d4610d0,2024-06-20T12:43:25.663000 +CVE-2024-22263,0,1,f896fa0a79a81d0e9a59972a76bdb3f38491a193f39dfa7074f7f8bf4c5f9aad,2024-07-03T01:47:11.083000 CVE-2024-22264,0,0,96bdae8486634c5f71f7c0824f656da1157e383d5f4bd5d08e042b1398b50bf7,2024-05-08T13:15:00.690000 CVE-2024-22266,0,0,00ca0b0bb686e5de0808c372a0dca387ad248949c8bb90b3dfb3008d90a00e7f,2024-05-08T13:15:00.690000 CVE-2024-22267,0,0,727e40be0aa0227d7b476a6c5d7d557ff3749d3281a0273fd0cde6d1d2dc7d37,2024-05-14T19:18:31.490000 CVE-2024-22268,0,0,8ac3cbde6056dd76380b18daea36d084eaf68822fc6e2befa66f62359bde99b8,2024-05-14T19:18:31.490000 -CVE-2024-22269,0,0,e5b2481e914f4cbe2d5c3a7c9bd35107871ac3a1f2df2e0bafead5f5e86a85b7,2024-05-14T19:18:31.490000 +CVE-2024-22269,0,1,83ec4dd4286041c4360e0d35616ab25a9b861fe9ef36df2e2fc4ebcfa2a6967e,2024-07-03T01:47:12.157000 CVE-2024-2227,0,0,a04566641cf07b0256d6370713fe01392f720fcac34bba4d9533a8931d87226f,2024-03-22T19:02:10.300000 CVE-2024-22270,0,0,6ddec6950380375d517eada92585a48899328ef96a9cd5eb66f2637f566ac1fc,2024-05-14T19:18:31.490000 CVE-2024-22272,0,0,adae0aee6ad029e4fd483a8691d818f9453c2dae8103d6feb214d470c1deea16,2024-06-28T10:27:00.920000 CVE-2024-22273,0,0,16868e6e004c6ea2c682b722d1af123cd0ac6fcfe5ea535614be88cbaef5ca1b,2024-05-22T12:46:53.887000 -CVE-2024-22274,0,0,da89bea76d6b538861a6666c1640acb76ac100e4dc1f77b4f4f466724f6cc406,2024-05-22T12:46:53.887000 +CVE-2024-22274,0,1,87361af428d962de76a852670d2cc5984c82c5471ebe2a2d40c0bfba59a3e184,2024-07-03T01:47:13.067000 CVE-2024-22275,0,0,d091ffc8d821e68d75dc2e136f38c753791a1420e1604ca18001c3ee3e374585,2024-05-22T12:46:53.887000 CVE-2024-22276,0,0,84ef821328733e6d2023f2ca9295825f754ca59ef6a3ea10fbc3d2996560b9b8,2024-06-28T10:27:00.920000 CVE-2024-22279,0,0,ff0edd9c060816dc238726f665fb413b790bba614b84113a6241bd5b06ac695f,2024-06-12T18:04:20.147000 @@ -243917,12 +243917,12 @@ CVE-2024-22386,0,0,9bb868760c88683007f1f54485a980666afe5aeeb8bc008d8d811fea3dbfe CVE-2024-22388,0,0,c4d155a1650cf8d6f3af35aa33a3624b01d880288d632870cec483f12be1e88c,2024-02-14T20:59:09.660000 CVE-2024-22389,0,0,96781b551653662b24bed6c6167841567f0e5e4776b3fb44064036280367773a,2024-02-14T18:04:45.380000 CVE-2024-2239,0,0,39e7f275af33a75dc9ccc5324d6f8398d75467c16638ade753370c3004c45df2,2024-03-13T18:15:58.530000 -CVE-2024-22390,0,0,88b51b24f236963dff6aa8c3fef37fe4c6c8cb5a481a8f81a21153c3382f30e8,2024-05-17T18:36:05.263000 +CVE-2024-22390,0,1,55902feb124ae1975588cd87c6024bd399658d0d39667fda823793e05c4f62c0,2024-07-03T01:47:16.433000 CVE-2024-22391,0,0,62341b5152aa1a774d6fbe2b0ec3f90eb73f70a9c84602a13eb88c5ee62936fb,2024-05-05T03:15:06.950000 CVE-2024-22393,0,0,baae8029e1587725a02d8ccb1fb298e540bb69b478da7728d31a9731926e8718,2024-02-22T19:07:27.197000 CVE-2024-22394,0,0,e453a8f525f8738202a11eba022f3eade3114cf25a7a2366a64db19b418e37dc,2024-02-14T21:46:40.537000 CVE-2024-22395,0,0,6711e106c8c4c38c682ec5a4d729c0e15c9677b5ef0302671313a8f4838fafc1,2024-02-26T13:42:22.567000 -CVE-2024-22396,0,0,61b3bcd631321b824bd8f13e62ee835db141fe0fb2cba3cf7d52fdf3093e7773,2024-03-14T12:52:09.877000 +CVE-2024-22396,0,1,a5f00b94b83832b467db4300982cd3b6b686890c80cea01a13cc610352a5b12f,2024-07-03T01:47:17.270000 CVE-2024-22397,0,0,1449e8939a0a6c79b850fc1dae16eaf04b2e6b2c8511d86f8174b4699c258b21,2024-03-14T12:52:09.877000 CVE-2024-22398,0,0,edf5338da9ca4f3a2eb32b53996533281c3dcfaf909d9756219f2a6e236d1091,2024-03-14T12:52:09.877000 CVE-2024-22400,0,0,75e98c1f1edd6beccc5653abbccb406114df98ae36ae20c7db97671271c6d967,2024-01-26T20:55:37.543000 @@ -244015,7 +244015,7 @@ CVE-2024-22533,0,0,84ada03ee37935d281b6ef02f8758f6d805bf66c7cac8fad1d52934fdf1b6 CVE-2024-22543,0,0,4bbc43f5b3e2685d1c9696fcc6499264d266d040456549b4c4eb8710fde430af,2024-02-27T14:20:06.637000 CVE-2024-22544,0,0,d4860d160590ae20dbc5d6de1bfe49fdfc11d59a0cfbde30c670036465a08e6a,2024-02-27T14:20:06.637000 CVE-2024-22545,0,0,21a44afa77ff3bc1528d0f92d9dbe45aaebe8c2d773e6d661e586abe7a9ac385,2024-03-05T18:15:48.443000 -CVE-2024-22546,0,0,6a6e43d5d7e5d42e93867224e6199069cc606e1d50732d906bd6ed40c57009cf,2024-04-30T19:35:36.960000 +CVE-2024-22546,0,1,e9e7789c2178195f81c38b7f4473534160dfa78b46fb2352260cdce1bd7f6814,2024-07-03T01:47:18.977000 CVE-2024-22547,0,0,435aee4ac29e540430ed8124a6d3ce7be57829e1b8ca6167335ef3bc4b085e52,2024-02-23T02:42:58.253000 CVE-2024-22548,0,0,7d281051e3f1672a0e8c6ae82119054f50e0c0cf80064dc21e880381f007b189,2024-01-20T18:51:21.163000 CVE-2024-22549,0,0,9d125f13584b8e9a98c7ba04ebcdd0c32883b8ff51ce2ca12c4e35cf1c2f09cf,2024-01-20T18:51:14.307000 @@ -244029,7 +244029,7 @@ CVE-2024-22563,0,0,e68d7fb0548f09a5ec2c02ea3bc2e400b99a4a7ece951a19b220371a41585 CVE-2024-22567,0,0,37499b14fc95be5de51f415505f023a34c878497b34bd94665d0d5d9fc0f3959,2024-02-14T19:54:19.663000 CVE-2024-22568,0,0,b7d805911224b1ae0c1c8858ee61b49b9c11cc28a75ce32a84caadcf77d4e108,2024-01-20T18:49:52.490000 CVE-2024-22569,0,0,bee3ca02120bb4729d62660d17afd0816ef9535b004ff125be13883d678f5fb9,2024-02-06T18:07:39.733000 -CVE-2024-2257,0,0,e0de8fd35bb16723a00e051e40382b6adae8db85ef6ac2955ba0b6721d22478a,2024-06-05T13:15:12.557000 +CVE-2024-2257,0,1,87856c3d2c0879cb041162bfc2d43d1a962975cb88c7d659c694453442f173d3,2024-07-03T01:53:07.027000 CVE-2024-22570,0,0,c41ee5b58f7f6a9dd8b89c3af365a9d60dc2b413d2b344b295ffdf6e10d67e91,2024-02-02T23:32:46.897000 CVE-2024-2258,0,0,0a2d974520f3aded55b51d15a5993f56250b1aed189d20a50869de8aedadc1c1,2024-04-29T12:42:03.667000 CVE-2024-22588,0,0,a2c6cd05590470f0279e75fb12dad64f1e0ed398a983cfaa98608323ce35b7b6,2024-05-24T18:09:20.027000 @@ -244055,7 +244055,7 @@ CVE-2024-22637,0,0,26b297452537f73426f9b1e1c51d8375cdf08e35ab6ae3bee9824c37bc50f CVE-2024-22638,0,0,60058d6cb515c8aa3a8ab899f954be18d8e911ef19644ca8cbcf96f8a8fef453,2024-04-23T20:15:07.290000 CVE-2024-22639,0,0,d147d90780a694ff1383e30f52d6dbe1e7da032a2cc352a3c7766915866417f2,2024-01-29T15:57:50.477000 CVE-2024-2264,0,0,ac80bb0c3113d5753bfebf327d65c058c1a7083afb4e44aaee012c5bbd89ffb0,2024-05-17T02:38:07.433000 -CVE-2024-22640,0,0,ca252cbd019ab7bfc4e81259b4d024e00b654964f9b62d3c108ed3ffeed36caf,2024-05-02T03:15:14.890000 +CVE-2024-22640,0,1,102e2d28349ae3c03a07486f025247cff5be73b09510fcc21313c4b6c8ce55b1,2024-07-03T01:47:19.810000 CVE-2024-22641,0,0,0c05c49df58d834d722a2d36cad576d99157e542f5a058c380c89067d3f5b959,2024-05-29T13:02:09.280000 CVE-2024-22643,0,0,acc61f08a1073b7993a535a7dc4ecf3492177f02866390d4f33a88b7ebfb7b1f,2024-02-03T00:28:40.073000 CVE-2024-22646,0,0,3a86f6cf8b5df97f2d3aadd50de49f432e2c6ccdb28c2bf8f4f8ba9395ea6ba2,2024-02-03T00:28:48.987000 @@ -244084,7 +244084,7 @@ CVE-2024-22719,0,0,aaa66993ee37f29c20b14223b821b03b5d493f183b96f427d11d296868ca1 CVE-2024-2272,0,0,20cc5b74c21ce330c57966463b39c63d1c5d5be281d00278d0950c30b3bcdc65,2024-05-17T02:38:08.237000 CVE-2024-22720,0,0,038b3febcbb5c10efe83cdd43116a146b0f8fc2b785e2d6c2bedf080ee4dce1e,2024-01-30T20:51:16.247000 CVE-2024-22721,0,0,7905b4e3cc2db104ef010b5c0c631d984fa4f3d297ab2c2ea62f2468b547701d,2024-04-12T12:43:57.400000 -CVE-2024-22722,0,0,4c2f1f24db004bad8a9f340e9af058ce351f7ad6e7631c5d67936b590e6abcb0,2024-04-12T12:43:57.400000 +CVE-2024-22722,0,1,2ec00a5c8e46809886d975f9e62c1646ed03ce66e913f1360753f43119db0813,2024-07-03T01:47:20.897000 CVE-2024-22723,0,0,85f1b081b17479287a97ddf9df11ce1719fb0f8d5476d86f18383abbb6aff1e5,2024-02-28T14:06:45.783000 CVE-2024-22724,0,0,a38074ce3c98995a05ae2567149e27464bc7056d5dc8da246b430c02271d6fda,2024-03-21T12:58:51.093000 CVE-2024-22725,0,0,386223ddf5bd359b392565f888fa17c656c4159abf859639a21b41119e3cd376,2024-01-30T20:42:46.143000 @@ -244105,29 +244105,29 @@ CVE-2024-22770,0,0,f2a2a69cf9ce7d556b6b228c10722f7f9528f890b579414a4469048f6692b CVE-2024-22771,0,0,0dd34dafcdaa309c8637826e95d97aeb9822548d77b388b6c8b8378fb56f1e0c,2024-01-29T15:53:04.917000 CVE-2024-22772,0,0,7b07baabcd2a25eaa93c8a3a6e55d6143f69fb79e8629b89561882c2cb32d998,2024-01-29T15:52:25.997000 CVE-2024-22773,0,0,3aba96c911c7d73db03474bcda5543c0564d460038cf19cf729bddcf3e7c9cc0,2024-04-29T20:15:08.227000 -CVE-2024-22774,0,0,51b08a4c28b92deca2ce0a1da657702db62d41661863bad2bc83746ee882b6c8,2024-05-19T05:15:06.337000 +CVE-2024-22774,0,1,853beb0389c513470cd58906aafec7d14c972ce0d4386b56f01ffafcb0357503,2024-07-03T01:47:21.717000 CVE-2024-22776,0,0,90ee7d73ff2ea3165d0ee53642fafcade627122c4deabb0ceebf5f729ef60456,2024-02-23T16:14:43.447000 CVE-2024-22778,0,0,b51d89db366702e623e9ffcc2087e24c0edaa0d76ed8dc9f0f78dc0d88754ad8,2024-02-22T19:07:27.197000 -CVE-2024-22779,0,0,eda1283002ca0a5ba4b71e37cd224cf29419640cfe8456a3a65e695acd500b10,2024-02-10T04:10:09.100000 +CVE-2024-22779,0,1,da7d6977832dc3c77efd0828b12672e5165d77aed4664eb8e25534e23467c0f0,2024-07-03T01:47:22.543000 CVE-2024-2278,0,0,207e2f51738b382e656f75c22347fd5450b8d4ce530caf11838743da2ac45b4a,2024-04-01T12:49:00.877000 CVE-2024-22780,0,0,7f3239e2db375f765f90f52543bdbcccb2a20757a7cd068a76d9a55c97657017,2024-04-02T18:12:16.283000 CVE-2024-2279,0,0,840779d3b8dde5a422cda59c3e85c02ce57b31f4846ea3c8574f9bd433ec61e7,2024-04-12T12:43:57.400000 CVE-2024-22795,0,0,74ecb133836626bb2368eab49a74768ea23b2ee0b898200b84b5a979cafed20f,2024-02-15T17:53:54.680000 CVE-2024-2280,0,0,b064f3feb8722910a4651d8fcd5aa5f1892c8cb4f5e0e1796b328260936ab591,2024-04-05T21:15:09.660000 -CVE-2024-22807,0,0,2660271cb3d9c1820afd48952a430fa0095fc95dc0357ac2eb19f5afa1a76606,2024-04-22T13:28:34.007000 -CVE-2024-22808,0,0,8a34b75770fc74023fc8e1c350f98c39db72e3ad9d21f62f3311b9d890f0b64e,2024-04-22T13:28:34.007000 -CVE-2024-22809,0,0,324855ddce6aa2b4fa8e40cd3594c009b9f21d82d0b8093051610e525bf54002,2024-04-22T13:28:34.007000 +CVE-2024-22807,0,1,a580199af0b24a15f866ec5a74a185471ee1f26b8c57c1b2fc09fc1c09da3690,2024-07-03T01:47:23.287000 +CVE-2024-22808,0,1,b7a5aa8a22094453a9d6da6ca906feec6515eab5ea3c97e56f8c2898e1e92f7b,2024-07-03T01:47:24.097000 +CVE-2024-22809,0,1,afebd17c1e8cd42b36ec9ebebc6c487b6a24e5a21164f1b103a87d2176ee2be1,2024-07-03T01:47:24.930000 CVE-2024-2281,0,0,678591f1662b2466c636da3b7ea8d4aecc69271c2cc3e9520b9377148c2d1287,2024-05-17T02:38:08.820000 -CVE-2024-22811,0,0,9af8b1e7424f46fa391c4f11700a190b3a1844bad28245e0d57293a4b528732e,2024-04-22T13:28:34.007000 -CVE-2024-22813,0,0,49ca82a1810249bb85040e7f95a74bf85cdb5402b4939df6d045c7dbc7ac652a,2024-04-22T13:28:34.007000 -CVE-2024-22815,0,0,c86592a53b58a23612278e5d6fbfc7577e5c601e71c63f4df92d1983bb72f026,2024-04-22T13:28:34.007000 +CVE-2024-22811,0,1,7fd67adbf482683e7c42965a6d24dc2241e5261fbe35e982d93c2d300a43b572,2024-07-03T01:47:25.797000 +CVE-2024-22813,0,1,d84c3545183972fb46dbe44d2e2d57fc4a1c3e486bb78d857906c2011155d504,2024-07-03T01:47:26.623000 +CVE-2024-22815,0,1,ee087337930e11018ffcef6c1087bd381adf7141f63872cbdf5df42f054b9f7e,2024-07-03T01:47:27.470000 CVE-2024-22817,0,0,eb15e92e9d0667f5c190034654618b8eeeb0dfc84cfb608c765282f0f5a04fcf,2024-01-23T14:23:18.990000 CVE-2024-22818,0,0,cb135bb8e203bf8edbad428e88de582fd5c2ab18516529aab641b2e535a51f86,2024-01-23T14:23:46.073000 CVE-2024-22819,0,0,0eb9b3434533fedaa8cbae17f2a15bb53110d617baacce71ff390d25b5e6cc78,2024-01-23T14:23:51.943000 CVE-2024-2282,0,0,c1ae030d788a4d8e10e3d7755235dea662a549e692bd46e5b5ce60e281999ba8,2024-05-17T02:38:08.927000 CVE-2024-22824,0,0,0e57a7333dd925b9e9a776e0a7ccc63af630d522cf4936742b2123d54c73c6ad,2024-02-20T19:50:53.960000 CVE-2024-2283,0,0,51044cd2dc7315a5113c29d77a70333663a2eb1afc00d45611079e000d888488,2024-05-17T02:38:09.023000 -CVE-2024-22830,0,0,b8b7f4dffa8d1e4fe964d67968fe920ec78fdf445ba2023d32d71f57bb73db0e,2024-05-01T19:50:25.633000 +CVE-2024-22830,0,1,a6f77720269d5397aba86bc0fa5dc72ef95b239e52ec057218738fed180c27f0,2024-07-03T01:47:28.283000 CVE-2024-22836,0,0,62c651f90ba1b8c08871776c5eb787f2963ec144dbd08e02b7b6c9de6c156ef9,2024-02-15T16:00:38.090000 CVE-2024-2284,0,0,fbd40eff77fbd9078ba9c0d39ae77d6bf7e4a071aa6dd9c76f513ac90c869d7f,2024-05-17T02:38:09.120000 CVE-2024-2285,0,0,d598e8e82ab18256cdda62cdf9c434814416ade091e9d74340549bdb3966ca87,2024-05-17T02:38:09.217000 @@ -244136,7 +244136,7 @@ CVE-2024-22852,0,0,fba9226bfac500a19dd8b91a9788eed1682675a652e0b6dd1f0ee08e7df87 CVE-2024-22853,0,0,ec6a06bd931391a16658f5323e2bffe5ddc884df4aacc34598a685bd3979b258,2024-02-12T17:50:31.950000 CVE-2024-22854,0,0,8b8b90cd6c1c9786e2fb5396ca19284ddab9c4ff42eae4bf034495afa4860075,2024-02-16T13:37:51.433000 CVE-2024-22855,0,0,1ea53d8c3efe191d3641b8f5d52ec06bd00349e74446b7b408dab6756f559628,2024-06-13T18:36:09.010000 -CVE-2024-22856,0,0,1db436dd1cb2a23310320ff23e9771e20af5e9762fcab5bed6358a83124247e2,2024-04-22T13:28:34.007000 +CVE-2024-22856,0,1,6a3f29bbeb760b1b5f19c8ae7d193c6384c770b41fcb22b793b9dc616df88d1a,2024-07-03T01:47:29.290000 CVE-2024-22857,0,0,dc8c498662e053f2e9a39f301d349f3ad8950912cf2843180c278fecc58efab5,2024-04-19T01:15:06.297000 CVE-2024-22859,0,0,b948ee8fe798cbf01c18cac852f304ecb9e81e6d367124ad19db38465396c137,2024-05-17T02:36:25.953000 CVE-2024-2286,0,0,657861131740076699183211e8ffc4b18c067668bfd7d2635b81e0ec9c54a21c,2024-03-13T18:15:58.530000 @@ -244160,7 +244160,7 @@ CVE-2024-22900,0,0,254e082003561180ecd392f3a9c102fc841e1bde56aa59cbf964fe2817289 CVE-2024-22901,0,0,8a50b23cdceca6b003b10fb1d10a0eb69c8b3f5c24256d493c5ce2629f318cde,2024-02-07T17:37:28.593000 CVE-2024-22902,0,0,fbf1665f8a0c495bb4c5734518bdb188f14e0ba8d35feaea9e626f6d31bec387,2024-02-07T17:37:40.617000 CVE-2024-22903,0,0,b065e43b3567286ff1c11abbe22fe1f66bcb052a0745b0d35654b96ab7e2d4be,2024-02-07T17:37:48.350000 -CVE-2024-22905,0,0,cfff96a7bd3fe64b5e210d15d7b0cb253e9ac8308b72b2526d9bd7beb7986173,2024-04-22T13:28:50.310000 +CVE-2024-22905,0,1,09732b6a64758cf91423735af54193632b7a0df1e6e43f31234cfa11b4179080,2024-07-03T01:47:30.227000 CVE-2024-2291,0,0,5a0d8dd1dccfcea1bdf6701723096db89286716c354b8745f8eab33b1e17acb9,2024-03-20T17:18:21.343000 CVE-2024-22910,0,0,f81ed92ed3df2208879820818c283e795606947a0eb3a19b60106e6202f734d1,2024-05-14T16:13:02.773000 CVE-2024-22911,0,0,2c6bed04bf2f4f5833b6ceb73482cd6c764a8005f6b7e06026bae5b9181bc291,2024-01-25T15:26:07.957000 @@ -244204,7 +244204,7 @@ CVE-2024-2304,0,0,002885016cb6de20a7ac74c3320e64b475ced64cf41e23553cf72ac590e02c CVE-2024-23049,0,0,0b53d9fcaa3d982fbaba3ce5ecc9aca5fa97b026cc60aeb6562fcda76003228f,2024-02-12T17:17:31.967000 CVE-2024-2305,0,0,67ddd3b17ba89a100104a555d07abbc0e6c698f4bcfe4bdd3aaeaec76405ba20,2024-04-10T13:23:38.787000 CVE-2024-23052,0,0,77bed15b5f7e3314dd1881600e0ebeeaf755dc8617c95300b8711f94c23a9aaa,2024-02-29T13:49:29.390000 -CVE-2024-23054,0,0,33bc84808c5267105bbf1f05c69dd18d50eb53fad76c5e5038e537d42119e3a6,2024-02-13T18:27:16.557000 +CVE-2024-23054,0,1,7a4436b0ce2b8f811851624479923281ac594f0e57d9c7febac6e9ac0a1c183e,2024-07-03T01:47:31.317000 CVE-2024-23055,0,0,54124e9a9a97d45f754e7c71f6e5d2e241045f3c06b3c7fed8b9e56023ee1e70,2024-02-02T17:05:51.857000 CVE-2024-23057,0,0,adc1796cef08e8d149e4ec26b93b507eb10ee425914261b35693ce21283d0912,2024-01-18T15:16:24.097000 CVE-2024-23058,0,0,5c41cad6af95abe6a7917f0dfb22027d597dfaf2d1d65add1f47a86773bcf588,2024-01-18T15:16:50.140000 @@ -244225,9 +244225,9 @@ CVE-2024-23083,0,0,2c8dec299330d14018a11785cefe558a96fda4422c8b3a8ec3351387ca462 CVE-2024-23084,0,0,67a8177594fece41c5c3f5327481804111bb6cdb8d6e219dd88915d9de8dd42c,2024-05-17T02:36:28.667000 CVE-2024-23085,0,0,c8bd84e6f4d26add24174616b5668bfc1e08e303e79f277fd83e1d8beeac61ba,2024-05-17T02:36:28.720000 CVE-2024-23086,0,0,86eb4b3b7b34189b0ee349784eea514a120500e757a3b65a5b5319d9d9b41675,2024-05-17T02:36:28.767000 -CVE-2024-2309,0,0,5e7d16d6f71f2f007544bcbcc47dd8107c18e2714e36b52143e4572bbdc63440,2024-04-17T12:48:07.510000 +CVE-2024-2309,0,1,b4bab766083001057d63d861d742eba6fb7b051d100b953adf8a9460cad67846,2024-07-03T01:53:08.927000 CVE-2024-23094,0,0,8b7fd2c37601b9f636934db44ed8e567ef20eff4d921df465afdbb6ef925a041,2024-02-22T19:07:27.197000 -CVE-2024-2310,0,0,0edce614ca737c9f4f6f172b9fca4020b1a932854b13e864a7ef93ffce2dc5e8,2024-04-26T12:58:17.720000 +CVE-2024-2310,0,1,499b89515ad327ded91d404511ae8dcfd3fae99d14d1816e5fc98cd9421d4da6,2024-07-03T01:53:09.113000 CVE-2024-23105,0,0,4f4ecfc1737be07823bcaafc96e8879d6b5c3ae1db58c428ada8e62f19153579,2024-05-23T15:52:39.123000 CVE-2024-23107,0,0,322e47dd821fc1fd2d2c1cca77300d8b32f4ff697feaa94db5e3454edd4583a0,2024-06-03T14:46:24.250000 CVE-2024-23108,0,0,4bd66ae4e2150cd9c3073e095bacf489de77af9a273b611e130c3e3fa4edf7ea,2024-02-07T15:02:00.203000 @@ -244266,26 +244266,26 @@ CVE-2024-23137,0,0,a3dfbd98c2dc1ba45435d76ef85744b5c19037c4a2624aa7d2b0ff334bf9c CVE-2024-23138,0,0,6b090492cd013e3e650e24e59443f58d52996df0034c406247881d7acc03e3d0,2024-03-18T01:13:31.203000 CVE-2024-23139,0,0,3d593be31839f5d86966b7965df31cd04e51b507bda09669a8893d4214cfafec,2024-03-18T01:13:31.203000 CVE-2024-2314,0,0,ed96f7e1946840e93c2198da1169aca1bfa11c5d8065acfea02e9fe912a3e6df,2024-03-11T01:32:29.610000 -CVE-2024-23140,0,0,45b423c206cd93b0b6587c84982cd33f24d34738ace5bfaf02bb18136b0e15fd,2024-06-25T12:24:17.873000 -CVE-2024-23141,0,0,6156b394eb6e79fa9a17bebcd5fc737f297f563b0194ca943ea0eebf0754097c,2024-06-25T12:24:17.873000 -CVE-2024-23142,0,0,096985f813211f49425cf60983ae8768243f7ea9929c029b5af48e4447b52c16,2024-06-25T12:24:17.873000 -CVE-2024-23143,0,0,e04fc7de80232e9def9aad9bd71721080df1a77e6f21130a4d79e9cbce277124,2024-06-25T12:24:17.873000 -CVE-2024-23144,0,0,c31cb5fec76300a6d3c629f8f5885b765d4ad3d1e91354d74cfbe57aba8e8838,2024-06-25T12:24:17.873000 -CVE-2024-23145,0,0,7c671b2f51bfa6aa5016830bb862be73a0a0eece1d7798fa0500ce17c76a3e32,2024-06-25T12:24:17.873000 -CVE-2024-23146,0,0,e81497684c72b1bd3cc1af5deb5f9b4c7206bf86962657914742725702890fd4,2024-06-25T12:24:17.873000 -CVE-2024-23147,0,0,c6ac950efc2e67ad0d6affbb86588e8ab4329ae68b5c8063ce63e1f6470b5acc,2024-06-25T12:24:17.873000 -CVE-2024-23148,0,0,0cc3f09ea3cee3bb4d4c6d1a5f626cccbc1087c36c80a1c06bb3c47d72cbeda6,2024-06-25T12:24:17.873000 +CVE-2024-23140,0,1,5880ade88028c79d39a927f070e37e0f639c65305e423ff522539ca095faa88c,2024-07-03T01:47:32.750000 +CVE-2024-23141,0,1,4fb29a5afa16fb29b24bc9f0691e8fab3bca8453a3f652aef89ff8f784397309,2024-07-03T01:47:33.010000 +CVE-2024-23142,0,1,a2dcb08f3a105c5a38d15a1e4c7fd1b92d9adeed645056e0e830a118bd33d309,2024-07-03T01:47:33.247000 +CVE-2024-23143,0,1,f0d2b13bb8e56e7c3d343e4cd2799c9e735166b687ba7c6b3cca5388ea44f6ed,2024-07-03T01:47:33.480000 +CVE-2024-23144,0,1,47993f9f00354d95111396e368861b1aea8133c817c749ab9b7413e9b3d05d7f,2024-07-03T01:47:33.713000 +CVE-2024-23145,0,1,8ea13e97df27b66102973a2f35f0e884ddede3e94a7bd4b932c7e1bda11397ef,2024-07-03T01:47:33.940000 +CVE-2024-23146,0,1,c9ab3b2b65b697d473465cd7dcbbd37ee7743393b6257d030c7d43f735d4eb7a,2024-07-03T01:47:34.180000 +CVE-2024-23147,0,1,5501f17ecc0a7e07475f9f72a63761eb8934129647aa8037d87bee0bdf7e043a,2024-07-03T01:47:34.407000 +CVE-2024-23148,0,1,f163092e189644bb6f69811a212b9b411504f9f98d2b1dd4d6e9852bde1c5117,2024-07-03T01:47:34.640000 CVE-2024-23149,0,0,242d8caf5deb75b9fbd1f60b635cd54b2b743a36dfa977ecbeafb68c5bb6441d,2024-06-25T12:24:17.873000 -CVE-2024-23150,0,0,e73e4adcb67ba199ececb516776757e2a7c933e76c1c7239fcf3ff9aaf2eb649,2024-06-25T12:24:17.873000 +CVE-2024-23150,0,1,2ec2a3f5ae0ed899b10a9a3ad1ef287d5eb257340d2b38f86c7e5aa0270d1e52,2024-07-03T01:47:35.010000 CVE-2024-23151,0,0,b29d40e3cefbbec81e68405bffac98bc5e7c10dc76dec3d6cd672fea6115bc13,2024-06-25T12:24:17.873000 CVE-2024-23152,0,0,c5c382b3ba462bda0286084969263304e92f041f435cc9b3b38363a1158fa042,2024-06-25T12:24:17.873000 -CVE-2024-23153,0,0,9d7347511f82e37de9feda8cd1fc6313bd959f7bc9d299f8d211f89badb7ac92,2024-06-25T12:24:17.873000 -CVE-2024-23154,0,0,a6c6e4310a54363850435549aa4e4279e6a151c01e421c1f811c260fef759458,2024-06-25T12:24:17.873000 +CVE-2024-23153,0,1,a9475572f3855658e511a61491406daf3a3db34baa0f7eeec4405b900cc5c36f,2024-07-03T01:47:35.377000 +CVE-2024-23154,0,1,602e96827d2a402dbec8eeda4b14e220087b363940e263d35c0ecc3fd1600d12,2024-07-03T01:47:35.613000 CVE-2024-23155,0,0,b5a5ca511786ec9141eb382a511c04b70c91f341a2813d1c1ec6e9c48c8d96b1,2024-06-25T12:24:17.873000 -CVE-2024-23156,0,0,e1f5520a59ddec83f572dcf695fe92cff509dd03c13f3d318df346b51f9b5e3c,2024-06-25T12:24:17.873000 -CVE-2024-23157,0,0,6ac68778d6c1e076b700f51d7d7684dcf94e8bd1ae968969a45b3908e8cb1e56,2024-06-25T12:24:17.873000 -CVE-2024-23158,0,0,b84602d24a72e01827a3d987ac0b33544320a773792ea1b6a27fefb21d82fde6,2024-06-25T12:24:17.873000 -CVE-2024-23159,0,0,867090c90435d6cc8f32c15176430032240814c1a4a9ec9e13851a45e57591d8,2024-06-25T12:24:17.873000 +CVE-2024-23156,0,1,e24cb23ed4ec717877b5c274024621080584b7bbc10a01ea6112a78c48daa1ce,2024-07-03T01:47:35.950000 +CVE-2024-23157,0,1,11b0d8091c8fa8dd11dadbcf1fbb903ad812d8f095800e3ccd96bef2996bf47e,2024-07-03T01:47:36.180000 +CVE-2024-23158,0,1,7c083896ae118c56bbbf5e942c8384ee2397bcd81ab6e0a549fde13b2ebb526d,2024-07-03T01:47:36.407000 +CVE-2024-23159,0,1,4caf10c46ce8846c250a24031e5b623ee32b37adaf5a74b6dad704236bf3795e,2024-07-03T01:47:36.637000 CVE-2024-2316,0,0,b19568c74ff3303e21c6f779d3f7251e97a598ce30370572128b37d7e3b8336b,2024-05-17T02:38:09.927000 CVE-2024-2317,0,0,a696c117ae514f4e733f3f16d6619ea5748142dccfe9e4a63d423b5b3c8772c3,2024-05-17T02:38:10.027000 CVE-2024-23170,0,0,13146081a2acee1dfc9938d9131a35ea909e72090f99ea62e52485862035b1b1,2024-02-22T03:15:08.297000 @@ -244303,7 +244303,7 @@ CVE-2024-23182,0,0,f1264713bd57ef4128de6f3045f4c61bebd1bad343f929e4484b785773092 CVE-2024-23183,0,0,93cf9ba468f15615134365f0103ab70e70069d42361d31f584c40ec201d8a9a2,2024-01-29T22:55:48.787000 CVE-2024-23186,0,0,bbede5329e23f6d21fbfd0079911ffff5ce7c8f0feb3eca943a9e45025325b07,2024-05-07T01:15:06.237000 CVE-2024-23187,0,0,ca43fe47ac5e4f8e0837d05960bc85196f0848f99f9621a877a9935d921738d1,2024-05-07T01:15:06.333000 -CVE-2024-23188,0,0,b1a2d1f0f91f6cd6b9b1c34720bb841e2df94d9574bd5426957800406c7f074c,2024-05-07T01:15:06.413000 +CVE-2024-23188,0,1,ce1c34d2ff7cdb555552e77ea8d56a52e7e8358bfb4cacf42906fa2a1a9d9495,2024-07-03T01:47:37.067000 CVE-2024-23189,0,0,38105a286e29ba4aeb2b7f55c2818d00acb37082743b2ce1bce1b1cce9e3180d,2024-04-11T11:15:48.320000 CVE-2024-2319,0,0,7c418d002244d51b00ca2fafa0c8e14c5cc40641054fa1d4dc85ce7d77674499,2024-03-08T21:19:43.127000 CVE-2024-23190,0,0,add17161c7c8505b6ba715b4898e70540bf15ecced41ee84c2b2e0388a683985,2024-04-11T11:15:48.423000 @@ -244334,10 +244334,10 @@ CVE-2024-23220,0,0,8ac5f8ea712aad989eb58875485617fa914d9322cd1efd90091219b5c7412 CVE-2024-23222,0,0,4721e0650f1741a6181143ce02f8b434bb1555a2f2760565c1ff4ba82e5774fb,2024-06-12T10:15:30.200000 CVE-2024-23223,0,0,d780b4d6e2ed4fd16bbb8e5d6b950b4f66cdf843fe3ec44eff85a2bd755e98e1,2024-01-27T03:48:24.797000 CVE-2024-23224,0,0,8c8e9af636b106e202b7f940d165666567457368baa4cae37acc93fd6c8a64d2,2024-01-27T03:45:02.100000 -CVE-2024-23225,0,0,60201724dacc7ab21bc37a6fc0b753b2d2e5d48cf78ebf0e87c3f73e3c2960cc,2024-05-23T17:57:40.620000 +CVE-2024-23225,0,1,845fa2197aa2aade23d73e024a310b4250103bf0ab7bf9bca77212be45861740,2024-07-03T01:47:38.013000 CVE-2024-23226,0,0,1b82b4673b34cfde627eee1f5d6fa409ed57aa961d24a2b22edaff38026e1585,2024-03-13T23:15:46.243000 CVE-2024-23227,0,0,04e1ce79d1fe22c4b70141c1091acf9b225e65a49459c2665f7c7f4c8cca9f1e,2024-03-13T23:15:46.290000 -CVE-2024-23228,0,0,f80e6c54b4fcb5b0b07c9156372fa6d875a1f0a4205b9f716b0f8a8654d4aff2,2024-04-24T17:16:50.397000 +CVE-2024-23228,0,1,cc53be31cb9d833cc5f783d1b1a5baa2ef8daadab372d7bfd86c3142f74dcac9,2024-07-03T01:47:38.910000 CVE-2024-23229,0,0,e805dd1682e1632875738dc1ef5498ba908f35fdf996585c4b9c6ef230af458c,2024-06-10T19:15:53.010000 CVE-2024-23230,0,0,55c48b39c3ece7e8bd290abec0554d2fd62bde0178d567ca7f3a9325e643783e,2024-03-13T23:15:46.337000 CVE-2024-23231,0,0,bef797a63304d9f49f7b188b3a4f20b360d10ecbf0da1ccef3327823aca0d323,2024-03-13T22:15:09.780000 @@ -244345,7 +244345,7 @@ CVE-2024-23232,0,0,4b7ad8c1b3903858edb8692c81d95e615006f96097c7aa2a17b9b479bd7a3 CVE-2024-23233,0,0,86946236eb7754c5260f52438b295c9b9017522c2a5c92843819d59d683abc63,2024-03-13T21:15:56.140000 CVE-2024-23234,0,0,e1e8f5ba1d067d79a25f6060929a26b1f03013fee21a9aa8264e6de3dac60114,2024-03-13T23:15:46.387000 CVE-2024-23235,0,0,f40dbea8ffc81789b377e6e56780364f6c13a63f8f0a8176aaa5cabe8eb52e18,2024-03-13T23:15:46.430000 -CVE-2024-23236,0,0,0474e87f4994246bcfdbd310efcf00ba0176cad344bca4dd70847d52b47ea9e1,2024-06-10T18:15:26.030000 +CVE-2024-23236,0,1,35e1e8394e7b9f6ad4331abd77ccd4bc245703e2c3f094e21b2b9f6f0cc432ae,2024-07-03T01:47:39.753000 CVE-2024-23238,0,0,5fa8dfac4eefb425ef52511f8ed7bc7a1c36ea77f79b7679fc51f9c85170adf5,2024-03-13T21:15:56.270000 CVE-2024-23239,0,0,444f1a6a50f397f79f87993b3304cf230fbb95a42c68a4f41ab84193072da8c7,2024-03-13T22:15:09.947000 CVE-2024-2324,0,0,ee033d0044e6a9121f29af0e88ca0be97780518efecb294abff217412bf688a9,2024-05-02T18:00:37.360000 @@ -244355,13 +244355,13 @@ CVE-2024-23242,0,0,d58199cf00cf0bd14e52590b2b275f168602d52e966a0541a985d92d2891b CVE-2024-23243,0,0,be621379a2909602b7af862f42600805a729b4fc88ec3b1873ea1d2a4e240b2e,2024-03-13T21:15:56.460000 CVE-2024-23244,0,0,834563ce88f60d98123b4cd07b42d049909c2500e0219c3a4c10cd45dd2e78fe,2024-03-13T23:15:46.480000 CVE-2024-23245,0,0,eb92890ae09f1beba67fd3fe8c5b93f95441e0d02bf9f3d03f261dec65f51d83,2024-03-13T23:15:46.520000 -CVE-2024-23246,0,0,35ade6591543da60554a3e5d0b3ba4063bcd707fba447526ac948b0b2212c210,2024-03-13T23:15:46.563000 +CVE-2024-23246,0,1,a3f6288a4dec4e6b98e18e3dcc2273527c942df80239f6227e94a0328a431f71,2024-07-03T01:47:40.097000 CVE-2024-23247,0,0,8cedc356a5f40bb739283e8e4d0d6f8d8deae5a1378794e92c4d7ce373c0a0f0,2024-03-13T23:15:46.613000 CVE-2024-23248,0,0,3b100f3348e9ddca065d4f3fd478aec1907931fa96a4ed3377d05be33d175a96,2024-03-13T21:15:56.690000 CVE-2024-23249,0,0,e0d7f2aee237d26c7b0c8ad64668a6a03d87d4b0174d6e350f019a0b7d59e493,2024-03-13T21:15:56.730000 CVE-2024-2325,0,0,23b75df513c3c155a2acfcf2e34574fcebd08fb3e2a0b9207d1fa3d021e99412,2024-04-10T13:23:38.787000 CVE-2024-23250,0,0,23972341b564827ce5b9505c9a1f83d7e8d72dc9e37716cac001382a6c566edd,2024-03-13T22:15:10.157000 -CVE-2024-23251,0,0,96e70b07a66d7f472b49833215bfc93a919fca706b76bfff4aca5346ae508db8,2024-06-27T14:53:47.067000 +CVE-2024-23251,0,1,092f1229e72a5c3cf728a0733bb73dcf6be0d42bcc4cdd3b35ac4b29d4862c68,2024-07-03T01:47:41.057000 CVE-2024-23252,0,0,0664eeb2c9608aca7ada566c98a3c55b1e928a3feb65097958db8fb31b3c0f73,2024-03-26T19:15:48.757000 CVE-2024-23253,0,0,236890f266aeb2a0ef621837a0a5e82d7bb89a3a03220dfe0920fc94f8f6fd50,2024-03-13T21:15:56.870000 CVE-2024-23254,0,0,f51bdaebdfa7043c82ce44968eb18a23393946054fa5c04d601cb0af5a7300fc,2024-05-07T06:15:07.777000 @@ -244373,7 +244373,7 @@ CVE-2024-23259,0,0,3633304c00d9b61d2276602a4d70f195a2f6d4c5259952b9d8a17acbd0f70 CVE-2024-2326,0,0,12b2206992cd5759fe8aee87c6407370214deede0821de38c8b79b4f8ae58ac1,2024-03-25T01:51:01.223000 CVE-2024-23260,0,0,ac51097be919769185607479bb94f83816dfb0a823a36b798ca92a20e15eff71,2024-03-13T21:15:57.227000 CVE-2024-23262,0,0,a3cc71b13c4680e14b673df2b1c613ebe49f9c48b8a03c413fc86e337ee8ff7f,2024-03-13T23:15:46.790000 -CVE-2024-23263,0,0,e1470c0cf18c20dd93f57c3b2ee5212707befa56115ce9075abd93531831d844,2024-05-07T06:15:07.993000 +CVE-2024-23263,0,1,d226157fc33b45c7e307e7b0bb570cfcc69dc1555ae79726ac7dbaf98cfcacab,2024-07-03T01:47:42.140000 CVE-2024-23264,0,0,9964a20888e66392c96c48ccf311158160cfbf4ec169d1a0d4c0b8eb5a95ac52,2024-03-13T23:15:46.883000 CVE-2024-23265,0,0,2ede0506b261d93e08a6a8ab0db637e55925e03c20e9a8ae30d3752777087982,2024-03-13T23:15:46.933000 CVE-2024-23266,0,0,6815b460f7716d52df98ab436e6b42da2e782eedd3a5d15e033e5ba09801dfb0,2024-03-14T19:54:56.477000 @@ -244382,7 +244382,7 @@ CVE-2024-23268,0,0,81165c5c09e8474d57b6891cda51eb4f30eab0837f193e7c4798fe99fd2b9 CVE-2024-23269,0,0,b560efe5c2974c123fc7f649e82a050e1990e700d52c94117e9aef09610b87b2,2024-03-13T23:15:47.147000 CVE-2024-2327,0,0,a7786a53bb7c4df3e66b854b45a310f7f5811391bb9bcee5783d76299a2ec745,2024-04-10T13:23:38.787000 CVE-2024-23270,0,0,9ffc7392eb2f4eff1860dcb80336f5a8cdd382df1e721d75c8ca7db15331f0ca,2024-03-14T19:06:02.210000 -CVE-2024-23271,0,0,1634202da84764fc84b3255b8bd1fcfdb2089a9d4e80b2b9862976174e7690c9,2024-06-12T10:15:30.320000 +CVE-2024-23271,0,1,6a29a9531f0b7611530f759ed6be3e45e418fbf4ab5efa9d49fa0fca351f3056,2024-07-03T01:47:42.990000 CVE-2024-23272,0,0,c9da5a5a9448d1badcb55f1bb94ecccfda01d4c50c7c75b1140074bcaecd426e,2024-03-14T19:54:08.100000 CVE-2024-23273,0,0,cb1e92b841add9beb7ff32d91364414d10118c43bd74e233718396f3b8460ec5,2024-03-14T19:54:26.287000 CVE-2024-23274,0,0,662fb9b0795cd70eed82bdcf20d41f74676c2f9885c0d27e476a9f0c92a781b5,2024-03-14T19:54:38.937000 @@ -244409,7 +244409,7 @@ CVE-2024-23292,0,0,1902f1a71fb665c00536465cef16656fbb94decd356fb8bbbf59c91ea3da5 CVE-2024-23293,0,0,3586a96339f859c33a0ba7c3a1765492ff6970f8b37d549d40edcdf59b329d60,2024-03-13T22:15:11.390000 CVE-2024-23294,0,0,c0cdcedc3bcfe664ab02fca520276a0c72a6eafb77125bfc3a4566d618829e43,2024-03-13T21:15:58.733000 CVE-2024-23295,0,0,743f5eabb2b6d4f98b7103afe617defce53a2964c31cc5fb435d1e716a86d3b5,2024-03-13T23:15:47.630000 -CVE-2024-23296,0,0,f2d241411bbf170ca53882111e52dbdb186cee03e035f81f8ca923817c8ecb80,2024-06-10T18:15:26.090000 +CVE-2024-23296,0,1,12a1de3d62ca79ef989249cb1e691420221912e9533cad73e61bbc1dd756eb30,2024-07-03T01:47:43.840000 CVE-2024-23297,0,0,11090791f72ea9d35b8fb354b91b4b823c54cb3e7511d3c9883ee2b46d74ae89,2024-03-13T22:15:11.520000 CVE-2024-23298,0,0,0db74819ed2b222cfa97f4a2ff3293f59c3a4c8235378608525d7e46421fc5d7,2024-03-17T22:38:29.433000 CVE-2024-23299,0,0,9cbedc1b6c106d21c23b83013b85bcc3f46b28eda4f03d0872450db614ec5b11,2024-06-12T18:03:36.960000 @@ -244542,17 +244542,17 @@ CVE-2024-23522,0,0,7c088d2b09cc2e5e477c07b1d4ef807535495454f574963a9dafd17ab8e96 CVE-2024-23523,0,0,13316361d7846e6bf749bdea54d907de9d96954e12edb4899346015be33f686c,2024-03-17T22:38:29.433000 CVE-2024-23524,0,0,b4e07bfebc676f16e7c9cc5e0a5f2262c8872797e5d06800ed4ab67d5fef487e,2024-06-10T12:40:41.360000 CVE-2024-23525,0,0,c9ea3f9f05986326992f0c2128558f249961ba75cda273f72dbac98591a6932d,2024-05-05T15:15:49.067000 -CVE-2024-23526,0,0,30d606f0eba5761919592b8a5008d0e69ca508d137995732983dadd8b2152fdd,2024-04-19T13:10:25.637000 +CVE-2024-23526,0,1,807e029925542dd0305ba76d2ef112e9c9d0141646231e69bc0a89a5683f9dc3,2024-07-03T01:47:48.580000 CVE-2024-23527,0,0,024d167c32106440ba360cc7e1648a7e6b4c387298a495a5c7cfd6bef1ff05a9,2024-04-25T13:18:20.370000 -CVE-2024-23528,0,0,849b6d3d79c8413a2d280ebe68004e7b6c77a93efb497d64b5a385ef1fbb2d19,2024-04-19T13:10:25.637000 -CVE-2024-23529,0,0,aaeaf2f05c047c5ba120f59b4e7397229e9960e52723bb51b5eed42c58b65abf,2024-04-19T13:10:25.637000 +CVE-2024-23528,0,1,e779fcf8fa4180f6f764cd654b708fc7d6b626e2546f7831d3bc246c98ff795d,2024-07-03T01:47:49.403000 +CVE-2024-23529,0,1,408c4c7399e8d26f6b7909fd3f0b70e86354d6eb8f5e40ade28219e78f17f9cb,2024-07-03T01:47:50.133000 CVE-2024-2353,0,0,2a97ff7fa745ca72d26cbc4facf5c67e75b9ea012622d121cc27269746ed1b03,2024-05-17T02:38:11.500000 -CVE-2024-23530,0,0,fa78ad7403349ea67cd01ab57be0c0f96dac4e9dada73a542b4fb164a0b78ac6,2024-04-19T13:10:25.637000 -CVE-2024-23531,0,0,6545847047dfd3d3f42d4178c0b73a9a7e89be4a85869f0c2c992580cd908bd8,2024-04-19T13:10:25.637000 -CVE-2024-23532,0,0,71b0712ed88e2a10521e11c2945a1244a21a0d94b01f57cb3b21e5a9a9dc2891,2024-04-19T13:10:25.637000 -CVE-2024-23533,0,0,7f48c34953ea9e43a9cd82a62d2776cff06a46c23d52e151d96efef76194b5ba,2024-04-19T13:10:25.637000 -CVE-2024-23534,0,0,85522c92667111763b23cb626d02987036980ff2fa7db4bdba4db06fe7193143,2024-04-19T13:10:25.637000 -CVE-2024-23535,0,0,673960086f31032a8a70c34f013a53e58b60727169a708847c2c7817bd4d52d6,2024-04-19T13:10:25.637000 +CVE-2024-23530,0,1,51dbac4d7a0a33f65b4fc6d03124a2a588d6477cf623dfb112acc41a1865a7d9,2024-07-03T01:47:50.867000 +CVE-2024-23531,0,1,aef12b89405b2c8cac47db31d97672cf83d451706a51c8ad1d16b9761196c85e,2024-07-03T01:47:51.630000 +CVE-2024-23532,0,1,2939af3804bb767bf20911ae3972dbeb56638cfdfebdc62714d1a6dd263a8762,2024-07-03T01:47:52.387000 +CVE-2024-23533,0,1,e86fc5f13e26f2ebdd8a5647a064361100133b87f160955e402e2c31d5725733,2024-07-03T01:47:53.110000 +CVE-2024-23534,0,1,3b36be6636568459b8bd7d7f2d7751e4a293db722b1da1b17a1e8ddab109bd92,2024-07-03T01:47:53.810000 +CVE-2024-23535,0,1,b63d030eea75ecc91481b0806d9679c79835740a552b1450cd7dc42123b41052,2024-07-03T01:47:54.527000 CVE-2024-23537,0,0,18692ae32a82ab1e50b0cd580a5ad6559f5b2605ae8b0de3b94c86446075c2d8,2024-05-01T18:15:14.173000 CVE-2024-23538,0,0,92700eb875127c3c26c4961fad027aa1d629dff00f7d623576a56b97f2c72b6a,2024-05-01T18:15:14.250000 CVE-2024-23539,0,0,dacbb0e71f89fa878b5732ed25232ca4892f5a0416acfca069a7ede34e0d4e7f,2024-05-01T17:15:29.230000 @@ -244571,9 +244571,9 @@ CVE-2024-23560,0,0,39262a3d1a015486541c11a9acaae3509226c69e322cbf4650c4cfad43009 CVE-2024-23561,0,0,a22fcf5dfd91b5d6ac506750080d833a3983c3c231b1230f7c5930b307faa639,2024-04-16T13:24:07.103000 CVE-2024-2357,0,0,2af3f167a5f07c033333870e1f5044e9ac66d1548287fd20eff05541e2132cfb,2024-03-23T03:15:12.690000 CVE-2024-23576,0,0,19b2dcf6e3c1e0697b2bea4d3507ea8b750bc4bf3b04f60b20452c989aaf2ffa,2024-05-14T16:13:02.773000 -CVE-2024-23579,0,0,4ceb913a6efb1195c5f71d8e4aa3ce14fc029dca3ec318ee0e16d3e7100b0c72,2024-05-29T13:02:09.280000 +CVE-2024-23579,0,1,c21892456c22f0f232ec5c1ceee77db91725955ceae3295921c8e393b52d9988,2024-07-03T01:47:55.687000 CVE-2024-2358,0,0,a1b0ff86c10dcc0cc90254078c2507c7f215f808024299c95ae7b33a0c1059e0,2024-05-16T13:03:05.353000 -CVE-2024-23580,0,0,d2f59df9c644e03bb550a63f6698b713682259ef7c86320b2ff20348599f9308,2024-05-29T13:02:09.280000 +CVE-2024-23580,0,1,5718ea9f66086a41a59f079246d02ed41858f86711210914df45620e8d73526f,2024-07-03T01:47:56.403000 CVE-2024-23583,0,0,8045b8b55a9fb922e451a3cdb9c3e44b27bb0ff91f2a1c66c35720ad6820d03a,2024-05-20T13:00:34.807000 CVE-2024-23584,0,0,0a74df816091d3b0eb89fda75cd2dbdfa4a27fc3d1fc7171d6cfed2608adfd53,2024-04-11T01:24:48.327000 CVE-2024-2359,0,0,33fa70e58cb138f001f137996158cf53baff2fc647d26dc120be368c2b10ed74,2024-06-07T14:56:05.647000 @@ -244582,7 +244582,7 @@ CVE-2024-23592,0,0,8410729adf8ea2140a95009744b2dfc023c8f0c5b5843d18404a4118ed1b6 CVE-2024-23593,0,0,e43cd79f2df730f0b9c8ef9c7ef8b007f3d9ef85731bb4145522b4b6df0d2413,2024-04-15T19:12:25.887000 CVE-2024-23594,0,0,4ee287fb2806b084145e389a1db24a17ecf815a9228bb0d30b732f16b4247731,2024-04-15T19:12:25.887000 CVE-2024-23595,0,0,461be60ee39dcf2e356fd0d37760faca7854d34e9ff334e7c08e774a8c0ee8a5,2024-06-07T19:15:23.570000 -CVE-2024-23597,0,0,1f7da20ec47e4baf8e3a4c4dda0c43af706a55b4c2bfe1a8a393b2307952ee96,2024-05-01T19:50:25.633000 +CVE-2024-23597,0,1,1044f570b239ea97c7bd0709961e0bc23dacfc3e4d46ca11165f61566b85cd58,2024-07-03T01:47:57.317000 CVE-2024-2360,0,0,d251135115836cbfe30cd2566048479149a1ed2531d2356c2655e3e0c0acbe65,2024-06-07T14:56:05.647000 CVE-2024-23601,0,0,8dbcdb8185734bded21b9bd34be5a747be4e7f42a227254a74e0278058a081d6,2024-06-10T16:15:11.993000 CVE-2024-23603,0,0,2b536971fe4d260603348583e5e85d59f5debd4cec090f729c87a6dbde3a5ce7,2024-02-14T18:04:45.380000 @@ -244675,16 +244675,16 @@ CVE-2024-23689,0,0,d7d4e018343e45ab929852f091e2e71006911f05a5c0cdd59769a6f5a80fd CVE-2024-2369,0,0,6a36576cd82a0efb1a6cf47fca1f81c4dce9d8f7b0632041d2d5bfbf236b9c0b,2024-04-08T18:15:08.527000 CVE-2024-23692,0,0,ee8d47877e8ab9dffb6b0f67245eb523eb65e271e0c42f12e1c102143c73f4cc,2024-06-28T04:15:04.597000 CVE-2024-2370,0,0,d585ae9ac856bf263bbb5fc87411ce61002d06f83e420348ba9623542805dbad,2024-03-20T16:15:08.270000 -CVE-2024-23704,0,0,b6e98937a05e8e3c54df94790ffc1b76a7a7dbc7d0f374847ce3c9bc63a138f4,2024-05-08T13:15:00.690000 -CVE-2024-23705,0,0,208f2921dda59fa7b14af1145627e3c7132ea207198825c4a670a9a509059f41,2024-05-08T13:15:00.690000 -CVE-2024-23706,0,0,ede5e9781e6c6ec2abcdffec573f476f646b6ee17b57168f8acd6e142b27a4f2,2024-05-08T13:15:00.690000 -CVE-2024-23707,0,0,beaafb205c308f17a4429b5bf78e5116812407accb95c86e274dcfc855a4d3d2,2024-05-08T13:15:00.690000 -CVE-2024-23708,0,0,944bf8e3b1bdd5dd13087e52b6bc0b12db4ce28387d3267bdede3aac1b86f48b,2024-05-08T13:15:00.690000 -CVE-2024-23709,0,0,7d7720ecbab15759adcb1691fe9ddfb28fe198373b1d1b7d71dfb9c0add8cd6b,2024-05-08T13:15:00.690000 +CVE-2024-23704,0,1,3ab2415bdb26ba29dae3109785e9f4b7ad9e6e4e471a3ed83e21564f6ce311e3,2024-07-03T01:47:59.750000 +CVE-2024-23705,0,1,ead7fe198af09437794c6077c888124fa1580ba6ce0d00067776236205768400,2024-07-03T01:48:00.597000 +CVE-2024-23706,0,1,babe5ff56a1d4a28f81247fdfc7205f6cd9fa2ddbe2826f5bdf18ddb36d0d2f0,2024-07-03T01:48:01.407000 +CVE-2024-23707,0,1,de06c54b01b50c7ee8eaf57e83c8e50f0519388a760daadedf65fa62d4cccb8c,2024-07-03T01:48:02.287000 +CVE-2024-23708,0,1,4d59e4f4929ae2353651e29b21457a04e0165e60511aebb470f63de6c6b68d06,2024-07-03T01:48:03.097000 +CVE-2024-23709,0,1,dc400007ea16188eacfc9466b22ae75237bff556adf9f34ba5e4a0201918c134,2024-07-03T01:48:03.920000 CVE-2024-2371,0,0,a8997ff43822803cbf539ca13b12874ecac2c50678484052b1886a13bb4141ef,2024-03-12T12:40:13.500000 -CVE-2024-23710,0,0,875b540c736db70688faac8a12bf84197a0fca29c77d660c89604a89a08155fc,2024-05-08T13:15:00.690000 -CVE-2024-23712,0,0,919e3319d1f664152d53fed292be330cd72f407fec402d411bcb187a93e318fb,2024-05-08T13:15:00.690000 -CVE-2024-23713,0,0,0691c897fc48ab427b9bc1671f8a76e244ad28c6f85b4df5ef0dd1573e78d54a,2024-05-08T13:15:00.690000 +CVE-2024-23710,0,1,bd7284af235de5db2fd51076f2026e0e8319c2a15e9eab609541ac6fe582caf9,2024-07-03T01:48:04.733000 +CVE-2024-23712,0,1,99a9a0e98f6ec74442cc23ab4a592b5612be30e655f849926f8cbd43d464cc6c,2024-07-03T01:48:04.970000 +CVE-2024-23713,0,1,84ac23a9c686e595929bab4dad7b08bca80d94f5a0dad54d418e0bd955964876,2024-07-03T01:48:05.220000 CVE-2024-23717,0,0,6124f28576b39881108c8f8a6a5c6f0e66ec8c6ba51a289d578374ba7fe9cba6,2024-03-12T12:40:13.500000 CVE-2024-23721,0,0,4c5a2d52378f8e46ea724b0f797b6d954983df3d251eb4a27defb616bbf83240,2024-03-21T12:58:51.093000 CVE-2024-23722,0,0,a9b0a777e5fe6ce3139b9265b8428b51f6f9a472e3a11168445dfbf933d3ddd3,2024-03-26T17:09:53.043000 @@ -244723,7 +244723,7 @@ CVE-2024-23762,0,0,1fc25d58731097f8aad4c8f7676cdc9a123654581fd6c8477b826714cd9e3 CVE-2024-23763,0,0,94cc309a27a6f19d801354e2361325aae58be01ed476b8fc22a2371a8d35f8dd,2024-02-15T04:49:47.153000 CVE-2024-23764,0,0,b3135c7b86d92abe0ba829866971e25bead6def6664dd24257c259d94b7c1186,2024-02-15T17:57:25.633000 CVE-2024-23765,0,0,a9bf9ddaf0ea53521841e4a7d5249d26363bad2b049c64b95ac86a5fafa6d151,2024-06-27T12:47:19.847000 -CVE-2024-23766,0,0,54ae780967bd9b6ca5368925e3ab14431b4d613d4ab8eb2ca8c3cafb1be0bc79,2024-06-27T12:47:19.847000 +CVE-2024-23766,0,1,745046bc01c8fb779d22eb65856beb7240cd099e103c65a0cc993dacce583ed7,2024-07-03T01:48:06.303000 CVE-2024-23767,0,0,c123c2989650a70e6c7d5f568469b1c99b3cb5d77a8ff0fadade34b74ac4b8d2,2024-06-27T12:47:19.847000 CVE-2024-23768,0,0,926e611d1088d9f1f309e3cf68eaddf916ef7d0caac52f28b5ab1d1ea7b5269d,2024-01-26T19:15:05.400000 CVE-2024-23769,0,0,8006533b03738d14f12e88159dd00f6815ea0cfbfbe8531d0a76387b0244675f,2024-02-15T15:40:20.690000 @@ -244731,8 +244731,8 @@ CVE-2024-2377,0,0,3193bacb38964a76865be4cdd2e9adb774f62e3213cbbc5f66850373a4fcad CVE-2024-23770,0,0,d308ea235638520048aecb2f126af743a6f79f00cf88059a602cfd74145feab5,2024-01-26T19:18:29.190000 CVE-2024-23771,0,0,ffb1ffb392a719f610312001c323ebc0b81b01439264d54a4e46f4afbb11b184,2024-01-26T19:24:40.873000 CVE-2024-23772,0,0,7d161a2a1bc845a4be2a35c19c4a877308f37d761990df9b3413f298faaafefe,2024-04-30T17:52:35.057000 -CVE-2024-23773,0,0,3ee4b5076f6862264bf57f8f71dfc400a5a3c1d7ffe9b2133aebe18e3047af32,2024-04-30T17:52:35.057000 -CVE-2024-23774,0,0,feab34a9e90ffed1327d796d10cc1abedc09a31d20c42b9edf56bf62dc73a2d0,2024-04-30T17:52:35.057000 +CVE-2024-23773,0,1,68a2baea72cac295ac3164079d63bbdb3d639aae37850380cffc53410ce09a8d,2024-07-03T01:48:07.100000 +CVE-2024-23774,0,1,96f1ad77f319c324f0206e952eb8a5e51b3f4050682ede7a1754b336a786d8e3,2024-07-03T01:48:07.913000 CVE-2024-23775,0,0,3f14e612f21bf3a005c618e710dfc25be4ed3fed6dcd32f828b01526aab3cc14,2024-02-22T03:15:08.370000 CVE-2024-2378,0,0,3e5adac56d52c45eb09d1bbd05e2a30fa69fd7cb2ee0029f9ae2e536537485fc,2024-04-30T17:52:35.057000 CVE-2024-23782,0,0,6f45eb4b7ce48f87446d0358843a09e5a8ec20837c83d13c1a3b26ddd36a0376,2024-02-02T15:38:55.017000 @@ -244799,7 +244799,7 @@ CVE-2024-2384,0,0,539d389d95c0bbacf4b9526b37bc9ffafada42c0e4afb502dcd629c03479ff CVE-2024-23840,0,0,1ded845e82a305e5f73a094b6796732449ab7d74b497ffaebee95e5d56b36579,2024-02-05T20:56:21.880000 CVE-2024-23841,0,0,d2a4da220caebcf45780e1057f515ab58990e805115b7734955f48097838cd01,2024-02-06T15:20:17.970000 CVE-2024-23842,0,0,2212211bdbb2ca579a147070da65a7a620c66f0c76761387864aa64e079f8f56,2024-01-29T15:51:53.207000 -CVE-2024-23847,0,0,23d093bdecee27ec637b5bb871cf6ad4a373509326000c1ec54f137e07713fd6,2024-05-31T13:01:46.727000 +CVE-2024-23847,0,1,c4eed5a77c2359a39292ae0dca85a080d99c03858d9859ae3c079b97137c2c4f,2024-07-03T01:48:09.197000 CVE-2024-23848,0,0,bfa0c8d83f377f5a3a9e67c8800cd93c20c12a8637d3ee4ee062b72b7591a36a,2024-01-30T02:04:25.450000 CVE-2024-23849,0,0,2320aa21cc353546d7dbbd1a8bfdde2281063ba155249762ef0c9618e3748031,2024-06-27T13:15:55.160000 CVE-2024-23850,0,0,eaee80c6a4df06415b75844b5854d1fb017cf0a71c38adc88e28ca7730fea568,2024-06-25T22:15:17.963000 @@ -244862,7 +244862,7 @@ CVE-2024-23904,0,0,678d9b9e94528dc2befb7afc9e4f3790d1499e848c388388aaa93c118b2a1 CVE-2024-23905,0,0,2d8ebad5c05b335845d8a0c6b27832798a9c27087f41f1dd4daf5a7e2afef75a,2024-01-29T19:26:11.517000 CVE-2024-2391,0,0,de3d6024524cfd3118d436640b62b0ac7f3b4f8e5171fa580bac06e37eaf60b0,2024-05-17T02:38:12.397000 CVE-2024-23910,0,0,aba61cd3a2ae29c18e33a58335fcd90731a0761c8ff2e34ecb287fa079b2c2ef,2024-06-12T01:15:48.943000 -CVE-2024-23911,0,0,f05e17f474751d92c0d0b7dd0326335d7f22fd7de41e1b09eac2c91ab043885f,2024-04-15T13:15:31.997000 +CVE-2024-23911,0,1,fdddcb19f4466c54e569787b1df836a5978efd401f095a2d3642663fd0df94ef,2024-07-03T01:48:10 CVE-2024-23912,0,0,080156a618404e0ca3baa4f7599f1e29c42bf3d6269477605580cfd701bc162f,2024-05-03T12:48:41.067000 CVE-2024-23913,0,0,d5d1f634deeb38dd714043e74c8802abcbf968bda94cd6401f14fcd205b89888,2024-05-03T12:48:41.067000 CVE-2024-23914,0,0,f217a6f0b82dd7b5dcbdb9e211f3f50becfcb615e996156072d08100e14c1a21,2024-05-03T12:48:41.067000 @@ -244886,7 +244886,7 @@ CVE-2024-23975,0,0,baeca8d4c06e1a18eea86da121d0a833b4b39a471498d57fc82722b025e37 CVE-2024-23976,0,0,9685f4f7ec189a5d86ae9e492003126f133b025f9dbebea5b2080780048e5888,2024-02-14T18:04:45.380000 CVE-2024-23978,0,0,8385721845a15c3770957c33eee7ab3b21a901100e361c363180110b0b7503e0,2024-05-17T02:36:41.847000 CVE-2024-23979,0,0,3d911dc61bf5e87f1ad51f604a1f73c131a2123fd076410323dd618c86bb88f2,2024-02-14T18:04:45.380000 -CVE-2024-2398,0,0,1525aa3a275ca7a4767e6b20cb607e7b91b2f08f71a9a95da1144c69839d61a6,2024-05-03T13:15:21.640000 +CVE-2024-2398,0,1,0f4a48da0ead4f20c3af2704d87468d8abca50984f056bab845a2786b3e742c6,2024-07-03T01:53:12.523000 CVE-2024-23980,0,0,3f708e24e60241fcb04c41f40502aced7aba4fc920dde1bb909c9b621d60b5d0,2024-05-17T18:36:05.263000 CVE-2024-23982,0,0,d52003f4ccb21aa01a008299898f0d6a9180af3e2a0a80305a9ab57dd3077531,2024-02-14T18:04:45.380000 CVE-2024-23985,0,0,258f4468fe9f37b9a6c2732e57d96bdd80375c2f3603af19ad729cbcccfb8b72,2024-02-01T17:33:41.777000 @@ -244921,7 +244921,7 @@ CVE-2024-2404,0,0,8479bc256669d7f6da1fce0af005097ec4cab5986897d5ad02003bc96e6be0 CVE-2024-24041,0,0,f96650c9700d93c943d8efc95d65c599a8e77cc1d7aaa4ba87820d6237153959,2024-02-07T17:14:41.607000 CVE-2024-24042,0,0,4a4e7ea160d5d0244b906cb4642841160ba9374fd30aaa87521360ed2e8ecd1a,2024-03-19T13:26:46 CVE-2024-24043,0,0,8fe33813863354c4eead332dc6243b19fd5b77f5e3a94ddd813814cf68659374,2024-03-19T13:26:46 -CVE-2024-2405,0,0,6fadbb3a08e48e4daaf715605940677b2a23272062986f3b1cf2a8081644718f,2024-05-02T13:27:25.103000 +CVE-2024-2405,0,1,758f03026c76b7f47d263886ed290a557d382d5cf70707c814c23dc8eb2e5ffc,2024-07-03T01:53:13.110000 CVE-2024-24050,0,0,ccdf8a4463bf6582ad99a29c76e6e3640436eaa4075881cd577d9e7450feacb8,2024-03-21T12:58:51.093000 CVE-2024-24051,0,0,ecd5357adc22831bd3b69ccdcd6affb021471f52c2843fc6a2c7692f187ce829,2024-06-13T18:36:09.010000 CVE-2024-24059,0,0,3da8cffbcfd869f14b04835347f156c5cf1a6025fa9627a3ec1ec79a41a9d0be,2024-02-03T00:40:43.793000 @@ -244950,7 +244950,7 @@ CVE-2024-24113,0,0,9eef336ce15946e031a73b26b3e239a7b6b89883c338eb5418a2161e5a5d4 CVE-2024-24115,0,0,14551eae0714aa949f3a2722e897b385606f2d79896bdde4df5b423d4061d078,2024-02-15T16:01:23.457000 CVE-2024-2412,0,0,9da3746de04798c774d1548b9fdc14dcbb04c7bd05255497f31c936724c81211,2024-03-13T12:33:51.697000 CVE-2024-2413,0,0,15a38bc7a67008ff14d882f69f22d9cc77ac428652f07f01e61fdc7dde1a3f0f,2024-03-13T12:33:51.697000 -CVE-2024-24130,0,0,3510bde1c67a0e43626fd597904310729ef06aef86c568f05d953496a7b78adc,2024-02-14T20:38:39.543000 +CVE-2024-24130,0,1,3711a524e7aaabb83e56488f8a369c6a69a909641f1667882c43871af5a9c3a7,2024-07-03T01:48:12.487000 CVE-2024-24131,0,0,bac167d4b98c744eda2d1fc405ff0c5eb467a5a3a9f2fd6ec2feeb07e7d79ad5,2024-02-12T14:32:43.777000 CVE-2024-24133,0,0,90f9c85333c4fd5569ecbc14fb2a291cc4ef1ef7dadf481e49035df24a64e9af,2024-05-17T02:36:43.020000 CVE-2024-24134,0,0,a120337ded6b89894c962001172a8dab1d9544a203ea0b8294e89bbc43addb6c,2024-02-22T03:36:42.397000 @@ -244969,7 +244969,7 @@ CVE-2024-2415,0,0,43d65008353e02b0a627c711e477028113011c39db9d3d84b4e86ec05b2fa6 CVE-2024-24150,0,0,bb25001b58b37c3faaa913f21b26ac84ab72443ce7d6507597696a74e7617fa2,2024-03-12T14:59:55.920000 CVE-2024-24155,0,0,114c432258c203679f3415252c50393d032e77f75f3e78118df7ca8b87e1cd84,2024-02-29T13:49:29.390000 CVE-2024-24156,0,0,a35c64ecbf66a175c3792e952f903768ac574ea7ea08ef64210df2e25e380442,2024-03-17T22:38:29.433000 -CVE-2024-24157,0,0,9fc91fcf9a38a3661cc612de60749b38b6952c6f91fce161c6cf6b83ca0f8743,2024-05-14T16:13:02.773000 +CVE-2024-24157,0,1,27cfa63ed3b3e1406c543915593772b11a8bd32859f21bed59160debb46b1929,2024-07-03T01:48:13.313000 CVE-2024-2416,0,0,27e81bce712a3113732c0666078dcb1cab463bfe4b9424d34cd0aa09318f9de2,2024-03-13T12:33:51.697000 CVE-2024-24160,0,0,cfef8a3cb10ac6cf5fe849694fa5021f72cd98bc85770980c25e5b7851a1891e,2024-02-06T20:59:08.493000 CVE-2024-24161,0,0,4562d973369fe14dca9774df5d40611a7dfeda1d9b2131a90de46c2f4f44765f,2024-02-06T21:21:36.413000 @@ -245019,10 +245019,10 @@ CVE-2024-2428,0,0,a12acd196e6489491150ab75ad9922280151d93b658bfb481d4c1c66079cd1 CVE-2024-2429,0,0,6f82bfe12677abd0ded60841d7ddd794d901d8b55be20f02cefabe3e057f8434,2024-04-26T12:58:17.720000 CVE-2024-24291,0,0,ed81ca1f7d07ab5682e5dc3e12510be85bd8028a8e8a8fb1a80b96c7b9ae97e4,2024-02-13T20:13:26.593000 CVE-2024-24293,0,0,eb622a35637583d584ad609649d42dcf62a63a936bf3a82b7c98c7b05f54a6ab,2024-05-20T19:34:58.277000 -CVE-2024-24294,0,0,995f96adfe13bdbb912d6d3268bd6ba67a89d1bb5a9002e7061cc6eff4be560e,2024-05-20T19:34:58.277000 +CVE-2024-24294,0,1,fb53dd3f3a0181debfcca619f6a3363f362852d8c93652ea4617fd4b0661a31c,2024-07-03T01:48:14.450000 CVE-2024-24300,0,0,a8dc475a562e17ac269ab87541d5cc3de5e8b25ad6f69c16a9e202ce4fe0a524,2024-02-15T06:23:39.303000 CVE-2024-24301,0,0,eea9ef656f8457ca391649537e978f0d3e4722722df26eae84433b0c4b119a98,2024-02-15T06:23:39.303000 -CVE-2024-24302,0,0,449b9cf4e02c6c056b845a3613a24a6a7c3cc41bbd8662ade9cfd67dd2332ad7,2024-03-04T13:58:23.447000 +CVE-2024-24302,0,1,772bc3946fe7698710ee11197feaab740359b0c096b2ee136ddb7f1dcb856d06,2024-07-03T01:48:15.277000 CVE-2024-24303,0,0,ceba5abd46246953377aeeca62d9d959b0441a138ecaac05977ec29895ea28cb,2024-02-14T19:38:18.727000 CVE-2024-24304,0,0,360d35f6c1c59a974e32bf3385aac130f56751bb90d7452c7cffa0763d8c86b2,2024-02-14T19:54:48.247000 CVE-2024-24307,0,0,2f2dad26e52efb490c9c538691b7722d151bd3460907a6c84d9c157b2e42739a,2024-03-04T13:58:23.447000 @@ -245031,8 +245031,8 @@ CVE-2024-24309,0,0,eef7b18f7602fb7202ca3818cf48d865dc53a4e9413ca95deae26e9c7c650 CVE-2024-2431,0,0,09f1ed526805bf98c05e58194567081e16168a26b1474492042fb18dc1072928,2024-03-13T18:15:58.530000 CVE-2024-24310,0,0,4924b11f9c6511ff9bfe2b484cc3ccee18402e2096746433734d2b4b5ac9f2ed,2024-02-26T13:42:22.567000 CVE-2024-24311,0,0,e89824fd7fda28874d73b4a8d50487d03632e9807867517f94590e11715165c2,2024-02-14T21:39:26.980000 -CVE-2024-24312,0,0,bcdada5cdfbe941e63fea70e149be156c612acfa9a429742ea15112f2958aeba,2024-05-01T19:50:25.633000 -CVE-2024-24313,0,0,46c7a8fc51db52b7e24b7ff65408386b3abb21710b866f570f5d3a26f39d6e4c,2024-05-01T19:50:25.633000 +CVE-2024-24312,0,1,c3d81851b0a21c153d5502fcc6af6d534386ad04fb506c5f3df2dbd0255efd0a,2024-07-03T01:48:16.113000 +CVE-2024-24313,0,1,fb5ae34a5906d70e9a89b5d57ccc3ef0ec67afb90df0388312d4db57d8583f43,2024-07-03T01:48:16.943000 CVE-2024-2432,0,0,95d50df4a017dece9ed34f3701f7d0d07bad7a8af1c00c7abf68bf89082534a0,2024-03-13T18:15:58.530000 CVE-2024-24320,0,0,7cb23303554f396b6b57d6bd075695abc3acd27016918345466bd347ef7cb20c,2024-06-17T12:42:04.623000 CVE-2024-24321,0,0,ca000380665704431ad3ba708c0d9f4c51234d831950593dbae83135468cb92e,2024-02-15T05:02:58.427000 @@ -245093,7 +245093,7 @@ CVE-2024-2448,0,0,9e30ccfd39b87812540a13d959f2aae1c5a415e25ce2c2852e72d5c6bc3b6d CVE-2024-24482,0,0,d0c5de64fed42524f00b63fd5c9fd6582210b6f756383f7c85fd22e6463f36a5,2024-02-12T17:46:35.760000 CVE-2024-24485,0,0,c7e8c403d6357c5922b5d47216b7ffdcf22e376618ae35637f5f2b9e30ec0927,2024-04-16T13:24:07.103000 CVE-2024-24486,0,0,d7ed2c16e5601f75e195b3cac3961ea438d1470aa390add1505048749d707e17,2024-04-16T13:24:07.103000 -CVE-2024-24487,0,0,c593a5b965cc3533ddc557cf6b0813e8b6c5f77c215684915b40c63fb601343f,2024-04-16T13:24:07.103000 +CVE-2024-24487,0,1,61850b43e58031befd51f24dca0d71cabb99802e7eb8c3674186f5ae5bc1c9ee,2024-07-03T01:48:18.013000 CVE-2024-24488,0,0,1834d834c06b744231a786a072c029583b1651fcc4f266317ba3be41edb13e03,2024-02-15T02:23:45.887000 CVE-2024-2449,0,0,81af4b04300933867744fde84b6165c2710bb3d8c358245e7272e559a8ae0dec,2024-03-22T15:34:43.663000 CVE-2024-24494,0,0,81f8461d94de9e292cd8ff42a2c2a5da1fbe2233d78d68b156c60eaf9ab5a816,2024-02-09T01:37:59.330000 @@ -245108,15 +245108,15 @@ CVE-2024-2451,0,0,853c51caa971f14a57f8fab9dbe4cada883118d2f62e8bf781564989c931a9 CVE-2024-24511,0,0,c6be1b7dc4e4419b5c47cd96597e4f754600544541a0f3ad8bce7c662831be50,2024-03-04T13:58:23.447000 CVE-2024-24512,0,0,dc7bbd1e8e3d7fb704deaaad5bd8d5c7e92cb755f835a8b4f37b0a5fb3a90d40,2024-03-04T13:58:23.447000 CVE-2024-2452,0,0,9d1efd8d5c0af40850d1027332ddadc263159fe45095c2497fdd89cc57281119,2024-06-10T19:15:53.417000 -CVE-2024-24520,0,0,30252fb47f9758f2d7901a536fe54e320899c83e8a336904c96fd6e092fb48ce,2024-06-07T15:15:49.760000 -CVE-2024-24524,0,0,40ecb02cd326bdc34833c61cf5eb3e9f45f526d45502f51591361c36d1938c63,2024-02-09T16:30:43.830000 +CVE-2024-24520,0,1,3c774368f33e309a9aff5a70713a9d6c94a70066616aae4e879a98640fa83db5,2024-07-03T01:48:18.843000 +CVE-2024-24524,0,1,61939d34114517af38312bcfbce13ad9e833fb758fc861ac1b9c4d60456d9a12,2024-07-03T01:48:19.690000 CVE-2024-24525,0,0,13b50b322b70c1ba78c523473a9882b44cc13b59455e3e47dd336806a91a1148,2024-02-29T13:49:29.390000 CVE-2024-24528,0,0,184f3e16e059f6b990b79bbe85c13104f1b7059f71d8a1713060531c24aa2c42,2024-02-26T19:15:07.247000 CVE-2024-2453,0,0,3516619c9d1ad877533ff47d2854d77f923dcb6e13d6b386a451fa313ccb4d47,2024-03-22T12:45:36.130000 CVE-2024-24539,0,0,f93dd0b0f28d93142ebc045d2b13c802b69814cdafc34403acf2ae3cd69400ec,2024-03-18T12:38:25.490000 CVE-2024-2454,0,0,0b9f095d4355e2ae908fadafa529487790a4decf8d55ba7b4076087a41339237,2024-05-14T16:13:02.773000 CVE-2024-24543,0,0,f516e88d85199344e1e2c4ae69468b4de7248951f71da4710fc97171a286ff1a,2024-02-14T17:13:32.827000 -CVE-2024-24548,0,0,9dbe1af5af4a9b865bf88b2a305b739ac231a7ce95c9c8ed04344b3144708c91,2024-02-08T18:53:14.107000 +CVE-2024-24548,0,1,b2630c3d24a789753fdaa109f39bed000429d845fa16c1ba7d96c172523068ec,2024-07-03T01:48:20.620000 CVE-2024-24549,0,0,7307c54c0ee6a9a65247489e8d526cb2c7b7a14f1ca835929ecd7a55bbe78415,2024-06-23T09:15:11.213000 CVE-2024-24550,0,0,61ac0958f7c81e21ffc6e212d90df9448e358c246c7d982ac945bf9b3b54c3a6,2024-06-24T12:57:36.513000 CVE-2024-24551,0,0,c09e43903e6a99d3af4df7dea02c9ad73e2d982e9e97e52cd339d3e743832e20,2024-06-24T12:57:36.513000 @@ -245261,12 +245261,12 @@ CVE-2024-24783,0,0,8bc0d7ff7019860b6231b1595f67b432d97124cc86e254463eb84039bf06c CVE-2024-24784,0,0,f5c4e4ed2e33329929985e15b388385fc51516eef30ac3f254a09f278f2575ab,2024-05-01T17:15:29.527000 CVE-2024-24785,0,0,cc84396d420fdc7cd1eec42a211ce9d46ae1b3fd12a46276acc97b91955cfa1d,2024-05-01T17:15:29.610000 CVE-2024-24786,0,0,0112d36d75e12362b0246061d23e3880906a29463bfdcb239d077b99ff2f9c0b,2024-06-10T18:15:26.830000 -CVE-2024-24787,0,0,b3bcd0df2f6c744ccf50ca5da0f1801b01a261f7e49cf2f9e75dcde0c510eeda,2024-06-10T17:16:20.237000 +CVE-2024-24787,0,1,d01b1be209abf6a135a8c9ff38f241150f7e8624b3b2cb4fb60d5dab3691270a,2024-07-03T01:48:25.213000 CVE-2024-24788,0,0,ec3a0e2bb85b04f6091132ce0b358d8c88079508c68a38db8ec47a1c1ba68f35,2024-06-14T13:15:50.670000 -CVE-2024-24789,0,0,43ea651f3b7312a155a6d6c3aa916c2fcdbd8bd472319341c3d7874a3e55bb9b,2024-06-19T03:15:09.183000 +CVE-2024-24789,0,1,fd6a5b95d991b0dab3309c11b164e4c1e60de61b7d4a99fed36d8b88b927fd59,2024-07-03T01:48:25.510000 CVE-2024-2479,0,0,62ab2572f43d54e062a6ec9f07869b63a0bdfad1924b8c09404f39717bdfbd77,2024-05-17T02:38:14.640000 CVE-2024-24790,0,0,eea6958e81d73afbece6bae935d256b81d43a28af6bfcc689fa474522b0325d6,2024-06-18T17:59:12.547000 -CVE-2024-24791,1,1,296f893d4f4d9f7a8b6abcb64bb7c0eaf17d3226917caae92e3b3be9e9ba7cb6,2024-07-02T22:15:04.833000 +CVE-2024-24791,0,0,296f893d4f4d9f7a8b6abcb64bb7c0eaf17d3226917caae92e3b3be9e9ba7cb6,2024-07-02T22:15:04.833000 CVE-2024-24792,0,0,856277335b0a65941c91908e89bfe8db9fa7dd817204d99e1f16a0e92b8015e5,2024-06-27T19:25:12.067000 CVE-2024-24793,0,0,c02d48f5d574325816298b4b1d2848ca92f5dc7aa67a2fd30978e3885630bc1b,2024-02-20T19:50:53.960000 CVE-2024-24794,0,0,0d491c54da3b197a1321ac69102f9de79d058e3462ee7572209ea583555d837a,2024-02-20T19:50:53.960000 @@ -245387,8 +245387,8 @@ CVE-2024-24906,0,0,6cea72bb7f9258908c1ed1c3f8325d4f06f0b542821e0483a147e01b51c62 CVE-2024-24907,0,0,df860e0bf6b93f40d4575a350995841695d535878bc5da8a5944cc146004b078,2024-03-01T15:23:36.177000 CVE-2024-24908,0,0,8283d99d7a40754c521eccb4d65696182424210fa0da9643faa3048901b25890,2024-05-08T17:05:24.083000 CVE-2024-2491,0,0,56d5936f32866edf29962cfc16d1b84e21384fb0d36dc5404e3888c50a6878ee,2024-04-01T01:12:59.077000 -CVE-2024-24910,0,0,bb7bb7f4f89300a6c40465a407ba5586d91f4a455e8da02c5a17663b7715ec72,2024-04-18T18:25:55.267000 -CVE-2024-24912,0,0,79cdf936b61cd3c2ac1888b2bf7026a51d657f04895fbd14d8ade234a06c9bbb,2024-05-01T19:50:25.633000 +CVE-2024-24910,0,1,5fd61dd70d8ecfaf176a8f6d8c2c30bd5b15998ebd0d63a548282cf932846ba7,2024-07-03T01:48:29.673000 +CVE-2024-24912,0,1,062a374f9b828270aaaca83725cc485b3e4124c6c8401ce960438704f1123123,2024-07-03T01:48:29.930000 CVE-2024-24919,0,0,631488eceb3aa7a5b392dcd29a6118459517fd4a65613afe40baee8a3cebfa78,2024-05-31T16:04:09.703000 CVE-2024-2492,0,0,a83da3e7ac12e71f3238f0026df94ba19b3a7e74326df6047a5459c611fae961,2024-04-10T13:23:38.787000 CVE-2024-24920,0,0,0c6e0a299c3dcb3e2c9c47cd3391320c9c9126b8fcb7683d54f65bff941cba09,2024-02-13T14:01:00.987000 @@ -245436,22 +245436,22 @@ CVE-2024-2497,0,0,a2f60841ac4494781cdcd08b43982a34617e8b0f51f90f443479a810b923dd CVE-2024-24975,0,0,375565038c24fc327fc2c0a3c714946ca9e1c626fbb524a69b78744e6d3eab6c,2024-03-15T12:53:06.423000 CVE-2024-24976,0,0,c9c1564bfde752c9f650b4df6eb66a2a9d3a9d0c2cc93ccf26aa30039f28a3d8,2024-04-03T17:24:18.150000 CVE-2024-24978,0,0,c5ed5bc9ba8c7757cb570e2c66a5838ec85d55ef0ed0e79605098288eb1bfdda,2024-05-01T19:50:25.633000 -CVE-2024-24981,0,0,a2a47a96f2c6c9e134f5cc9ef64ecb7bfbeeb7ff48bb83bd8883645550cfa6f8,2024-05-17T18:36:05.263000 +CVE-2024-24981,0,1,4778c6815162129c19c427caa98fb743cbc1e80e4ace882077c64de825799123,2024-07-03T01:48:32.340000 CVE-2024-24988,0,0,5be9c22e9d6c42885be25053a8e3f832fee202eb91ce1cb05a36918eae761d1a,2024-02-29T13:49:29.390000 CVE-2024-24989,0,0,f5f90cfaf231c17880476c2247dc1ebc4c2a99f05fa6baf0600807265bae483b,2024-06-10T17:16:21.607000 CVE-2024-2499,0,0,937cfbbbcabf9a44c0364bd98cffe1d075baa5b58aa206a922d3f920fb87da2d,2024-04-08T18:49:25.863000 CVE-2024-24990,0,0,af094b8cf1e86ab7ac87eef5eef78e8a43482f28ab9103a80890b0937c46b21b,2024-06-10T17:16:21.730000 -CVE-2024-24991,0,0,48f782e086fd602ce24c675e97c2f85a2be14e6be4571c47abdc5123a6bc6106,2024-04-19T13:10:25.637000 -CVE-2024-24992,0,0,ab958065c256669f568c67ca65f9424366dfa0ae34ef699a93ffaf00d34a72cb,2024-04-19T13:10:25.637000 -CVE-2024-24993,0,0,d21a66397ede7626c0970edfb539f5bde3077cfb7ee763b2ae38b50e5f61c494,2024-04-19T13:10:25.637000 -CVE-2024-24994,0,0,aba6bd9ecbf8c0c6ddbfb1ba4e1f4dd1eed394cd457385703dc9933f0b3e65b9,2024-04-19T13:10:25.637000 -CVE-2024-24995,0,0,c4fbbd3900a74ca82c771647a8d6c6d2454ce93b71f20cba86dc74a8a46d34c9,2024-04-19T13:10:25.637000 +CVE-2024-24991,0,1,2900dea50f0db553cefe48171901e23df8de3353302519a3043eb70fb8ed604b,2024-07-03T01:48:33.167000 +CVE-2024-24992,0,1,b64e06396c32ea77485bd57886751b876f5c1a5d86b4810fe1783de0baf1a4e6,2024-07-03T01:48:33.900000 +CVE-2024-24993,0,1,3f477b0d01c1c13b0e5e4e3a41de2765884977e3ce501d188d2df030ffb18a68,2024-07-03T01:48:34.617000 +CVE-2024-24994,0,1,42f2d80bacffedefc75634a19d5bdcf04cc6d212fb826cca85477fe85d0611d4,2024-07-03T01:48:35.360000 +CVE-2024-24995,0,1,994724640a945c1000fc39c7b0f132e31e20015b4a8b29a9d6a77367cacaaa2d,2024-07-03T01:48:36.090000 CVE-2024-24996,0,0,1c280b16d38969c7f4694696d07ee6a3f55a56e58f768c5394ecbdb913e5b2f6,2024-04-19T13:10:25.637000 -CVE-2024-24997,0,0,db1eb2aff8a95f37b9b7cbbefc91dbb64eab35b40f4ec22250cdd4e3f544bd32,2024-04-19T13:10:25.637000 +CVE-2024-24997,0,1,96eb4bc98ead652d8a74e40e88af7ac14ac55e90b6d09d12a9e3cbed51dc328f,2024-07-03T01:48:36.903000 CVE-2024-24998,0,0,ce4c4f168b0a937a209322576f4019db9a86fed8b1262316955a4b803480e335,2024-04-19T13:10:25.637000 -CVE-2024-24999,0,0,3c29e7abd2bdaedb7d556f410011f917502a4f431964d78de349579a8b2a5b7f,2024-04-19T13:10:25.637000 +CVE-2024-24999,0,1,c9900f55e1f00f2949e7c7e8c454bb95b3957fef73e3633271464f0acd65aa92,2024-07-03T01:48:37.637000 CVE-2024-2500,0,0,f5c841f144cdfe7169c1d4e3da08b5dd9b9f87140741671656f61d60bd0ec54e,2024-03-22T12:45:36.130000 -CVE-2024-25000,0,0,171a31ba2ee231f2a37ff8039aac812ff6a52dbf6798e2e41d5be25dcd32bbac,2024-04-19T13:10:25.637000 +CVE-2024-25000,0,1,0b40ba851bdb9ea4a2539d08f7cb1357bdb6189c1e99aa8ea8c9ebc4a54a4498,2024-07-03T01:48:38.350000 CVE-2024-25001,0,0,c1f11a8c76d43265d10cf34f1d6db6525f3220be11629d1b39a2f52375286f02,2024-02-02T09:15:37.527000 CVE-2024-25002,0,0,5b471b86f2b8e38328babfc3642e60a83c0e02cb964240f5f385287d2af3cff0,2024-03-25T16:43:06.137000 CVE-2024-25003,0,0,81fc44567692de3ff8c7fc733c0c0e2d235894df02bbd6e47e58282e052331c4,2024-02-14T20:15:45.910000 @@ -245473,7 +245473,7 @@ CVE-2024-25041,0,0,7928ae57a8bc2dc3a8c04d59e5aa30b1327837d78f88e428ea9c9bbae0acf CVE-2024-25046,0,0,4397b23573a65e79c16052f58f281291388123ce903b9df7b4059c81aac5ce1a,2024-06-10T18:15:27.350000 CVE-2024-25047,0,0,64419cf1d56aa51442fec48f489740b8b22b015f011042cff3e462c703444ca0,2024-06-21T19:15:30.053000 CVE-2024-25048,0,0,610a65aa068817d20a042aeecc25c887034723f165ecc379125f80c2bf8a57aa,2024-04-29T12:42:03.667000 -CVE-2024-2505,0,0,f9efd81999a67e571786699340d45ecbc4af4577ba4f92360cdbb165e79506a4,2024-04-29T12:42:03.667000 +CVE-2024-2505,0,1,47f3647a7f39a1a6bf9463d8b64e750951935a282bf349e6bd3af724e0fc071f,2024-07-03T01:53:18.567000 CVE-2024-25050,0,0,2895a503880459770c96f9ab5f8cf4bc71edd50703fee0b5f0e32007918ee69d,2024-04-29T12:42:03.667000 CVE-2024-25052,0,0,a1c8165788344cec6c26b0ce1cd1c907b8a407a30045684a7d709a32eba309a1,2024-06-13T18:35:19.777000 CVE-2024-25053,0,0,a7c1d494e85c793a8b85597c57f93ed8af694871477cfb34ba8468c39dbbe4ad,2024-07-01T12:37:24.220000 @@ -245484,8 +245484,8 @@ CVE-2024-25064,0,0,1c648660fe74d25bd4bc9587030796b3cc77cb44c915d4df3e4024ac11525 CVE-2024-25065,0,0,f671f82a7697d47568409b085db18a169bcbb80a6a570c1657ffbf02010a7804,2024-02-29T13:49:29.390000 CVE-2024-2507,0,0,ea9c85786faadd0442f075fa7cedcc51f34924f4764686abb8afe0beed882661,2024-04-10T13:23:38.787000 CVE-2024-25075,0,0,8f1ad7795ac9be7789e9412ad24a6f478ed4bba46ede8202f16d701d6f470c93,2024-04-03T12:38:04.840000 -CVE-2024-25078,0,0,923f5a98c76fddb9e4e2db43199116d1cc9ba1943ebe456f66645c49398f92ca,2024-05-15T16:40:19.330000 -CVE-2024-25079,0,0,6cddcf4552001cd25004ada11f414d1f2dfc60b9804267ce17f41effcdbcce6c,2024-05-15T16:40:19.330000 +CVE-2024-25078,0,1,14ea593bbd760f1a861775a7e6100acb3fd7a8f88d884ae3f61694ec3c2b2927,2024-07-03T01:48:39.997000 +CVE-2024-25079,0,1,df3a5b95b7f6f4370caee005112754774cb6bfa4fa30f82a6ed48ecf2a7fc17d,2024-07-03T01:48:40.830000 CVE-2024-25080,0,0,b71676650e0fe980740d0ba2f09b4ab96eab09f2522aeb1c79a8cba30e06c62f,2024-04-01T12:49:00.877000 CVE-2024-25081,0,0,37094cd80b0e02ee04bd4b4ad310191b35edfe5b1b26bd730c126ade0890fc6e,2024-05-01T19:15:22.183000 CVE-2024-25082,0,0,73cee04ee797f69b5a7d548ce52642d4be8f4f30b151a272c43f273d4c926f75,2024-05-01T19:15:22.237000 @@ -245494,7 +245494,7 @@ CVE-2024-25086,0,0,2486a20dbc230be31b45c0265918e4c1e78343efe8379ef27746c14bbd21d CVE-2024-25087,0,0,189fff92b1879b541729bb27a59416a8cc10248cdc3f2566012939e56a4a869f,2024-07-02T17:44:45.700000 CVE-2024-25088,0,0,35ea77a928ff967f8a8b623f0e595e0ad53ecdc9ed5356569b06ed8430196a2b,2024-07-02T17:44:45.700000 CVE-2024-25089,0,0,5efabd2c26974f37d1846cb1668b5b36df31dff51c549d5b8d4c512bfb0c7d05,2024-02-13T00:38:12.137000 -CVE-2024-2509,0,0,d87071763c3f045575858adf9ceada540509d3a47b1787f91e2dde65a0044380,2024-04-08T18:15:08.580000 +CVE-2024-2509,0,1,e1632462213f3b340d9efadccdf81857ddba6b28ec7154489106797e9e1ad3ed,2024-07-03T01:53:19.050000 CVE-2024-25091,0,0,01b357047b564e780ed13b7e87b2fb8ec79ae12ad4e744cc9437e3dc74a94964,2024-03-01T14:04:04.827000 CVE-2024-25092,0,0,3532d5e0c56e9f2613e02555af7079338ad04e45b74e242ce5c38f60e8dbf179,2024-06-10T02:52:08.267000 CVE-2024-25093,0,0,c29d732f68144a1dd5d537415c8d51940073ac1e6ff114431aa6a52d78b263f0,2024-02-29T13:49:29.390000 @@ -245629,7 +245629,7 @@ CVE-2024-25291,0,0,bc77bf07b7f0885dcc53f309d4c8551c9d231ccb3e5075560ca429ae43d29 CVE-2024-25292,0,0,93d2b7f6141fe539a29ae7e5b673c657afb26540dc5e8da909caf90c01b33dc8,2024-02-29T13:49:29.390000 CVE-2024-25293,0,0,0b85db10c32bd0ffaa51c674a448c6fa3593e795a8c8cebcd511335821521f83,2024-03-01T14:04:26.010000 CVE-2024-25294,0,0,f95809dd72d0d29f306e64dc9390645e69b344c0241b1ce90e2194188140d725,2024-03-21T12:58:51.093000 -CVE-2024-25297,0,0,e43f2838978fb40e4930c991059ea0b3926c2eca96695eab2334d8a4e8886560,2024-04-11T14:02:41.473000 +CVE-2024-25297,0,1,3720ba95083a9c1ee3bb9579b18dcf812e8f1a8183f8ef86b53f57de77baca4a,2024-07-03T01:48:44.367000 CVE-2024-25298,0,0,bf85debb0b48c7785ba1fe04e103d557c66dabf290db3d94d61aedde1f0f4cc2,2024-04-11T14:02:27.920000 CVE-2024-2530,0,0,840de7776d49b53a5f9e7a995946ebd7a23aba1a427105027b273205f3f0273b,2024-05-17T02:38:17.580000 CVE-2024-25300,0,0,00d5a1baa6ea777d5242d82c3fcea6510e4f7a3fadd8d373439ff775edc53ce1,2024-04-26T16:06:22.873000 @@ -245662,7 +245662,7 @@ CVE-2024-2535,0,0,5003a806af9fd722d81a3ae38c9ab95ad0fd8018f3974e8238a7f92af2686e CVE-2024-25350,0,0,4025b81199a224e7878ebb894cfce4cd4a7613ab77d81e491781294f349534f6,2024-02-29T13:49:47.277000 CVE-2024-25351,0,0,b34112a1dde05e9e9b4f5cfa676ebc0f3ddbf68e11e3555b3133c6ff3fc419ef,2024-02-29T13:49:47.277000 CVE-2024-25354,0,0,f42efd766ea7de269c602d96eef2e737ebc201c930b7678451ec9c71ead98d82,2024-03-28T02:01:13.303000 -CVE-2024-25355,0,0,a5127d1d0c6690d708c65943a31d2cbba146cc88492f6b30cba5dff3ecfd683e,2024-05-01T19:50:25.633000 +CVE-2024-25355,0,1,9e4c154c10879aa65df3f836e3d26a161aa9d5b18c5f9f98e84ee39f0e0f3042,2024-07-03T01:48:45.420000 CVE-2024-25359,0,0,e52a0991ba8548dff26799e463bd4b47a9488509a0199d8c2e3284055fd171da,2024-03-21T12:58:51.093000 CVE-2024-2536,0,0,671f61d8f69f123ac0a044d4939347c45ec1c01a8fc8620d0ca3b16f74cc8685,2024-04-10T13:23:38.787000 CVE-2024-25360,0,0,1c224af52aa70bed49a607a4215cecfbab2aa2b1075dbd9a5d0950bdddee46dc,2024-02-12T17:31:21.670000 @@ -245676,14 +245676,14 @@ CVE-2024-25381,0,0,2fbf6a4c7caf83717eb116c843eb9d06446ef20fab32ebaa59c38b740fd20 CVE-2024-25385,0,0,3d2189f37c69e02ce7f2d6f668e9f0e15554305edf58754347a8471b02d03f2f,2024-02-23T02:42:54.547000 CVE-2024-25386,0,0,b3e34473858eb8e804a89ab203abac2433271329bd78e7f08fb63dfed4e84395,2024-03-13T04:15:07.960000 CVE-2024-25388,0,0,cee77ee0bae8e1ef7305910968331b1d7b6c7e617890c334f730f40dc433dd01,2024-05-01T18:15:15.110000 -CVE-2024-25389,0,0,de7e27d64fe964d6d4ffbceb10e5b1436c9f9551804e7d88fdf187646f0b5fc0,2024-05-01T18:15:15.173000 +CVE-2024-25389,0,1,300e228567e32929b074f159e6b0c3d280feae8278a6996691035995a5db28e1,2024-07-03T01:48:46.323000 CVE-2024-2539,0,0,f25f12532940b515866968371aba8ed1356f3c8da800c6922f39d9ae9e60a0cf,2024-04-10T13:23:38.787000 CVE-2024-25390,0,0,4a40525265aafe069c1e8004d164376033591b97208ef196787395d0e2292107,2024-05-01T18:15:15.223000 CVE-2024-25391,0,0,ead1e68bdcf1fea9b38ad40fe7f23c53788078af7d30e7999204d9377643d440,2024-05-01T18:15:15.270000 -CVE-2024-25392,0,0,3d18f513566b745c344523607f638df8f5503ad25be010c15a517f9a6170d9ee,2024-05-01T18:15:15.317000 -CVE-2024-25393,0,0,f9968267cda521a9bd30593653ee403289172c54ce68ab7b20ac21e13b994e2e,2024-05-01T18:15:15.370000 -CVE-2024-25394,0,0,3d8e140eae2925b4367910ee589422aa82a5201da8cb9454d7cfeab54750f0a7,2024-05-01T18:15:15.427000 -CVE-2024-25395,0,0,abd266324aba51820023e28c1ec1d426492f4e0244d7fc1826505354fc747bcb,2024-05-01T18:15:15.483000 +CVE-2024-25392,0,1,a206d17696fcf4904f59efd952331512dcb83b18b402273ed46f576aef4a6d5f,2024-07-03T01:48:47.150000 +CVE-2024-25393,0,1,a5db428aad7c170c9baea9d18a6180462a997ce75098c3cb1498156e5372e220,2024-07-03T01:48:47.993000 +CVE-2024-25394,0,1,be9935f7dc1f2a9ef5bc4751361c0c48070487f3d65e34adb53e8eab07ac227f,2024-07-03T01:48:48.800000 +CVE-2024-25395,0,1,56e51d7cdf071865c9c3e88e6e5ac096f849119a0a671dbbfc83351b3b934eaa,2024-07-03T01:48:49.520000 CVE-2024-25398,0,0,5f9177c45e78128f47bee33d155348e7281adb4722b60ad3313c147682b88eac,2024-02-28T14:07:00.563000 CVE-2024-25399,0,0,b681bbee2f606a57716a8b8a1ed6ef4fd1407c61ce2bf8ffff233f88dd45b3ba,2024-02-28T14:07:00.563000 CVE-2024-25400,0,0,dd915a440ac73df2132a6cf61c1461d16e0e6c674a077089d357fa7024e90617,2024-06-17T20:15:12 @@ -245699,7 +245699,7 @@ CVE-2024-2542,0,0,6c077f2bb629a1c1fb1163538212f04d947edadd7bbedc6294899ac59ba5b1 CVE-2024-25420,0,0,e0d5ccadb914dda205f82e80c0a7aee5f6fc17ec37e5b4a46d9fe90c72482659,2024-03-27T12:29:30.307000 CVE-2024-25421,0,0,541431fb721c49167084cbc501b059961969c28902a19d56e08bf6556ad2cfe9,2024-03-27T12:29:30.307000 CVE-2024-25422,0,0,9045d15a9a7aafc5aaaae0629255ad0c09af460732a4878c1110a6bd32d7e5a3,2024-02-29T13:49:47.277000 -CVE-2024-25423,0,0,33cd9c56ae4cfa1d6cc2435a00a829df789b80150b430b34308e45329f20c67c,2024-02-22T19:07:27.197000 +CVE-2024-25423,0,1,9c38591521533b12d0d8640f97867e59ae0ba009f0e2d3612c6f7b4eda265498,2024-07-03T01:48:50.347000 CVE-2024-25428,0,0,c9a4a68822ce56f9f70c0633568698e7786e1f54738d13d0ca759099f302c24e,2024-02-22T19:07:37.840000 CVE-2024-2543,0,0,948700ae15fbd5c1866509dc944be18a443427fe1c4b177507ba1136d9b34fa6,2024-04-10T13:23:38.787000 CVE-2024-25434,0,0,697a02c9c4f985f6fefec935d860bbe4ed3c1b769b3e0509b4ac3ebf45248c8e,2024-03-04T13:58:23.447000 @@ -245731,33 +245731,33 @@ CVE-2024-25501,0,0,bf285c0d0f063e749fd3088de6d5fd4b5fa405fe4b880c9267b8673a65457 CVE-2024-25502,0,0,50331b6b298e51ff1fb5155b43730c3887534f74eacaa5eabfebdbefa930be85,2024-02-16T13:38:00.047000 CVE-2024-25503,0,0,90dfcc14a3c7a010a114348a2bfe63fa0b75dea73044dfc564baa777268ada75,2024-04-04T12:48:41.700000 CVE-2024-25506,0,0,2f20dc186d5013a60c5a0662addaebb91bb2fda284189b786801332d38fe3fb9,2024-03-28T20:53:20.813000 -CVE-2024-25507,0,0,385816ec57eee07428508c0f3766760bde64e65f556b00c315c1deb2ebb29fce,2024-05-07T20:07:58.737000 +CVE-2024-25507,0,1,d01f5e6d07dd4234554e701d042eeba7ebff258fccd1723712b33d5ea82451cc,2024-07-03T01:48:51.430000 CVE-2024-25508,0,0,b5eb0c8705dabcc5e77ea6a4b149e04b9b5058a9f695e22b13a1ef1202156e3b,2024-05-07T20:07:58.737000 -CVE-2024-25509,0,0,9fe85f1b368db4fc0378b0a04e7ae41e234cf2c8577663ce5bfc4e1d75671cd2,2024-05-07T20:07:58.737000 -CVE-2024-25510,0,0,6aa5702be90069ef373da6db77eddd347c447c40a4eaa2a00bea47b9c16cd66b,2024-05-07T20:07:58.737000 -CVE-2024-25511,0,0,0891de6b8b2a064dc47bbcf931be9f667a8efc85120914bb5bb427adaed549fc,2024-05-07T20:07:58.737000 -CVE-2024-25512,0,0,477dd266e785948cc8d4b283587fdfa7009c733a054db4243cd227a7b08a4e34,2024-05-07T20:07:58.737000 -CVE-2024-25513,0,0,5397d81b969d4fe13c16506ed11428432479f479b26623a12883955abfe88e17,2024-05-07T20:07:58.737000 -CVE-2024-25514,0,0,0b1076a2f77d015a01663997ce23a39085488fdd693ddc55effeb7dceb4345ab,2024-05-07T20:07:58.737000 -CVE-2024-25515,0,0,db61d298c80a0e80b3d853a84871df01225304c1367e3e0085f7671b94aae04b,2024-05-08T17:05:24.083000 -CVE-2024-25517,0,0,239345b80d175a14caca8b2e8cba8716a4aa00a66578a1e993f929c72a9a5a97,2024-05-08T17:05:24.083000 -CVE-2024-25518,0,0,a787325087ca718f8a72b1c33c656c16afe7fd5536c340254dadf2bb7a31483d,2024-05-08T17:05:24.083000 -CVE-2024-25519,0,0,8c8710268d38df551f4f454a8c619c7f072a497cff74e7195788918955414f62,2024-05-08T17:05:24.083000 -CVE-2024-25520,0,0,ee64c7c96a45bc862dce13cd3c5793ea235e546b1b0a9249f289dc6adb3bafa8,2024-05-08T17:05:24.083000 -CVE-2024-25521,0,0,416bafee6e5a0f75e8c24dff06e0e197f829e23535a41fee0e2a763197fbad10,2024-05-08T17:05:24.083000 -CVE-2024-25522,0,0,421d70da94599ae2c4833057042d6adbf2069593e96cf0faa3322dd2f5349cc5,2024-05-08T17:05:24.083000 -CVE-2024-25523,0,0,995c4cbeabfb1397bb2d9223e297711f26e7a1c7348cfb6e7c01b22909fa6a4d,2024-05-08T17:05:24.083000 -CVE-2024-25524,0,0,a12bfd544794d8eb156e45e347be18873472ca3aa9631a39bd134b50393bc054,2024-05-08T17:05:24.083000 -CVE-2024-25525,0,0,ea134f98e6b49ff557730e5c0acd94b28ef3c104034a95d45f967875b9fddd4f,2024-05-08T17:05:24.083000 -CVE-2024-25526,0,0,925ecd6eecd67f2c834e7d4e906c1d0b615057f0dcb124a57f7aedda52a820d7,2024-05-08T17:05:24.083000 +CVE-2024-25509,0,1,43932d598b677151ec148e2c6fe397dad54fbcf37bcb8324dfd2608c97fcef93,2024-07-03T01:48:52.240000 +CVE-2024-25510,0,1,861a29eb687c50c63d985cbe3b942fd6dcb2a5ed2f01fa956e441eba24a1e618,2024-07-03T01:48:53.193000 +CVE-2024-25511,0,1,45841a27c05abdda5e88c8662dccb1b2ce0612679a4549ee5889dfadc7c35b1c,2024-07-03T01:48:53.997000 +CVE-2024-25512,0,1,30e70416daf9bc731aa2cc10d3309e50db92ad7a3860e9d31d00559db96a5244,2024-07-03T01:48:54.810000 +CVE-2024-25513,0,1,e5062eb724e28d313633d42f841b561d08be5c78f711f7ea5efe756559893d6d,2024-07-03T01:48:55.660000 +CVE-2024-25514,0,1,23a6d7786b07c6d4165763f38cdb7f2d9493690fa965d572cf69d30d82f34603,2024-07-03T01:48:56.460000 +CVE-2024-25515,0,1,9552fe583425297ae50d0d3fb3aef41d1ff7ccab24982b4401e1de2eb31209ba,2024-07-03T01:48:57.273000 +CVE-2024-25517,0,1,2d5bfca64a87833b4bf7fcaafb0e1c6c75a7c73d9c79ee7ef678b3593647ad5d,2024-07-03T01:48:58.093000 +CVE-2024-25518,0,1,4f656721efc43904c6c1b7982efa8acf36cdc63eca4dc6a739fe56633964cd05,2024-07-03T01:48:58.917000 +CVE-2024-25519,0,1,1e9856bf69a42caa8c87d9efc940250a43a6d8133746dd534ead5365966d2794,2024-07-03T01:48:59.717000 +CVE-2024-25520,0,1,ef18d590b5f58eb9bb7ec3b39fa017b59c50accc89216dbff8503dbc68a15ded,2024-07-03T01:49:00.550000 +CVE-2024-25521,0,1,92b6345ac0bc5186de3acc2eb108650c8fdf5ebf11f9b3b43771a2e77e69def2,2024-07-03T01:49:01.367000 +CVE-2024-25522,0,1,20bcbb11d104068e82316fe242ad3d32a079fcd34efa7624e69f8b13b3bb1c9c,2024-07-03T01:49:02.173000 +CVE-2024-25523,0,1,beefb80737df4ab8caaa870d04de106a9b1b2b2e0c0621a221e2cb789f06070f,2024-07-03T01:49:03.080000 +CVE-2024-25524,0,1,48003a3df0f0b9027037f7b2a5987e318382c4cf2a4cd2e1a9068d21e6785c7d,2024-07-03T01:49:03.920000 +CVE-2024-25525,0,1,40a61381f3700d580572257b27d7896530e1f40138bd2f98e8bbeb02315818db,2024-07-03T01:49:04.777000 +CVE-2024-25526,0,1,3c2f647419e510f91e589593c4f997246867311b54f7c9006f9890f2c867a5e1,2024-07-03T01:49:05.593000 CVE-2024-25527,0,0,24cf0f52ffc1df88afef5722e1e82dddc045101bdf1eb2e5a656344144c7466f,2024-05-08T17:05:24.083000 -CVE-2024-25528,0,0,7bec5c4ab6d20feac5834e70352bdbdd123101b2275c80230ba1ac58f436a2dc,2024-05-09T13:05:45.620000 +CVE-2024-25528,0,1,eb181ff279c84d91717021c2fea760cf8cb6e8cbaff1cf9b78043b6022c5d472,2024-07-03T01:49:06.467000 CVE-2024-25529,0,0,fffddf60fd90501de0d014a56389b4118b58f6a9fe74915fdb6a1257ab535c42,2024-05-08T17:05:24.083000 CVE-2024-2553,0,0,f7edc7d57f34fb804725f8ce94b00e22a7734877755df3504eccbf037d689709,2024-05-17T02:38:18.470000 -CVE-2024-25530,0,0,9039d3c6b11579305ee12573b8d8b37b1cb2397932d5bcda6629efc9778f22f8,2024-05-08T17:05:24.083000 -CVE-2024-25531,0,0,bde885516c112113e0f5510c5c9fbddb8017dd080da8f9b372cb5f248e59121d,2024-05-08T17:05:24.083000 -CVE-2024-25532,0,0,96b3fd0d2ace5b0a1c4b6e451e7abd69656ab8d7c63728880798cd3d472d67e5,2024-05-09T13:05:45.620000 -CVE-2024-25533,0,0,961acce4f8c52c14a6f6e7ecedb6147cd159203bfe2ed3261303ea0742637025,2024-05-09T13:05:45.620000 +CVE-2024-25530,0,1,114f13be12205b5e8e078f769103c74d2951fd25a93df8266ab8b89213f79502,2024-07-03T01:49:07.270000 +CVE-2024-25531,0,1,bd85456fb7927acce04fe7a9bc7cdc00ebec612fe72b4d084a7b6d36f2668c40,2024-07-03T01:49:08.077000 +CVE-2024-25532,0,1,e49a0b06aa42ebeb681466a026e650a02f7f003c3c52a351a3b30566efcaa78c,2024-07-03T01:49:08.880000 +CVE-2024-25533,0,1,2874c2bc34cbfc664239f45f2595adead46a71c8191985e29a283c134de2ce3a,2024-07-03T01:49:09.687000 CVE-2024-2554,0,0,4552a796c9ee85b6ef29110dc12b6fdb2bc1c1c6991b4eed32c798f6675b6182,2024-05-17T02:38:18.567000 CVE-2024-25545,0,0,8526ed8de9098a72565cdcc04fa7aedeb1b9a5c07e5de61b39c48fe6223c15e6,2024-04-15T13:15:51.577000 CVE-2024-2555,0,0,1ccd9e64964f5792668bd459afb6e731d8426585bc7d41154044abff86d56e8e,2024-05-17T02:38:18.663000 @@ -245772,7 +245772,7 @@ CVE-2024-25567,0,0,bbb8c64eb3dcee3e8e89951734f837d0c3bea66c11459a30529f4c9133593 CVE-2024-25568,0,0,c3930e2ab541535f4ac48d47d06821e2cee1eed8bbcbd00dd0856e41d7aafc24,2024-06-12T01:15:49.033000 CVE-2024-25569,0,0,4638448a8546825fa9e00c3ff94a077ca9cbdaa5d8882a201d353ede23041668,2024-05-05T03:15:07.033000 CVE-2024-2557,0,0,7033022bd95c620bc17bec08414220fdfdd18b2ab9f776b8e336562f8180ee53,2024-05-17T02:38:18.850000 -CVE-2024-25572,0,0,6916ce68d4646365d0578802b2b08ffd76a62b8c07df1314570c90fc1d876f93,2024-04-11T12:47:44.137000 +CVE-2024-25572,0,1,a19a9cf36c077c05dc278f38e37ca145a9759fc24272e685a0d3f0ff41385f00,2024-07-03T01:49:10.700000 CVE-2024-25574,0,0,4bc8d3cd97ad31d3dfd232c462a09dc1924d30756dc7bfcb27690950ff1edfb2,2024-04-02T12:50:42.233000 CVE-2024-25575,0,0,5af0aa3097d78d1504ce01f6ae14ec7e5926b1b9756fc2644e591f5a22c7fdfb,2024-04-30T17:52:35.057000 CVE-2024-25578,0,0,ff68f9ee0e3394b3fa83fe8766f2e044325a5fd043b437de063c0cd80654c610,2024-03-01T14:04:26.010000 @@ -245804,9 +245804,9 @@ CVE-2024-25608,0,0,777906eeb0a5b0a9c86f59255c54f56d84853d1b7a72669bef6a4f4e08ea2 CVE-2024-25609,0,0,70b2abe4f6b07d14dd1eaed8f77b182b189fc3d24fbd2fcce03d566544ebecbb,2024-02-20T19:50:53.960000 CVE-2024-2561,0,0,e70e3d297a5cfcf73280f39c37fc0e34bc702bf39d4cc7a0f97dd902309c51c9,2024-05-17T02:38:19.233000 CVE-2024-25610,0,0,32d42c7fcf60736021dc24b7a8ddbe346dbc5974b75a910934a4ff892eb9f8d0,2024-02-20T19:50:53.960000 -CVE-2024-25611,0,0,b8aad29ecd8dafe739aa6a39e6e9b9c4b39c67e14764ad44399a3e75bbf7bb9a,2024-03-06T15:18:08.093000 -CVE-2024-25612,0,0,a837136520aeaa34f4b70e7dd03ddbfd53112c6e4bd6fadaa68c3f07ddc2bf40,2024-03-06T15:18:08.093000 -CVE-2024-25613,0,0,7f1b3624c63428ec6d1d29574479c91c783edf25de1e80833547cabd596b80af,2024-03-06T15:18:08.093000 +CVE-2024-25611,0,1,c46de1e524e793cc86eb0bdc5cbe2ad34eb76119a0ea8cb24d1cb4a5d6d9cd72,2024-07-03T01:49:12.103000 +CVE-2024-25612,0,1,992b930be46b09503820d0b6f1a3d60846959dd7632bae760537040765476509,2024-07-03T01:49:12.820000 +CVE-2024-25613,0,1,518989afe4200072598a83066099c13cd3429e215fba7075062ef659312e601e,2024-07-03T01:49:13.593000 CVE-2024-25614,0,0,40870767459011e297497de817aef42d74930f89baf5f764fcc19618de4a7138,2024-03-06T15:18:08.093000 CVE-2024-25615,0,0,acf89427f3010b7007b44229a1d165cabfd84113acd72ac65a4b2696544988f2,2024-03-06T15:18:08.093000 CVE-2024-25616,0,0,08e7e92a31b8175954afe7fe6329cd6c1ab805b72ac96ece1d0fb03d1064f703,2024-03-06T15:18:08.093000 @@ -245886,7 +245886,7 @@ CVE-2024-25718,0,0,bb40d9a7c3627957c0a8684f79fde7f1f2d52dca2e08e3b7ada94b1f5660b CVE-2024-2572,0,0,bda2e78923efb2e80e48abe37f879d2bccb5f3875e6afb96342c33b2d570ec5a,2024-05-17T02:38:20.357000 CVE-2024-25722,0,0,e703a271dc38d4f8d963c274b2985e5e8af09acb3f7e3b10f6e36bda19fd7082,2024-02-11T22:29:15.837000 CVE-2024-25723,0,0,f5e48ae195e8428328f05db62baab9ea4ea7e3efac70245f05a45f8f26aeeb9e,2024-02-28T14:07:00.563000 -CVE-2024-25724,0,0,39faae4366a8129982af64af8fee968f3aba6ba52ca55176169b5f313e45c10f,2024-05-22T12:46:53.887000 +CVE-2024-25724,0,1,6c3ef472ec3fdf4e4f5e27a3bc11b2436df6b7d677ccade72728fd545179cc6f,2024-07-03T01:49:15.880000 CVE-2024-25728,0,0,89e7ab8efb6550f3630b9bd068d82cee0ea2b2673bf3b1c3df3c1a4a7ca27daa,2024-02-11T22:29:15.837000 CVE-2024-25729,0,0,184930f04b43901bc1f4566a359e2a59bf4139503b85debe12ca335f06305c1a,2024-03-08T14:02:57.420000 CVE-2024-2573,0,0,8794bf8374457a16a6e1849ae018a87dce48fb499e80c0f948b02eb3b1cff67b,2024-05-17T02:38:20.443000 @@ -246050,7 +246050,7 @@ CVE-2024-25971,0,0,228018ab5fef0c3ed939f781a64df1faee82a7c7248157c7097bf7afb03a0 CVE-2024-25972,0,0,03be68c424c2117dfe63b169d17d7f8ada85eec42d35f349ee6876cb9f658b31,2024-03-01T14:04:04.827000 CVE-2024-25973,0,0,fca2cd3fc869e318a8dbf83dd06094ef0c34286b7d421da7c64a9a5612af38b9,2024-02-21T07:15:58.040000 CVE-2024-25974,0,0,455908519f9c0b510f9276a34d5bc0fdc3808298a4e41e75f9e5535d39103827,2024-02-21T07:15:58.427000 -CVE-2024-25975,0,0,9e70d60a3c41ad5590aa52742853c8de2c8782e2c68c12575ff098a22860647d,2024-06-10T17:16:22.227000 +CVE-2024-25975,0,1,7575b9d67e4ea045410d7956ad161bd45f31efb1c5194db4cce836637ccacb6a,2024-07-03T01:49:20.510000 CVE-2024-25976,0,0,af013f5d7124558455739bd8657fdb41692f515ee3e85b934d818e8fa4a1a90e,2024-06-10T17:16:22.307000 CVE-2024-25977,0,0,2b6afc810557db726576499354b60b46e97d0658cd69cbff27c2298f880b45c2,2024-06-10T17:16:22.373000 CVE-2024-25978,0,0,6077c79891dbc19bf922b49d852065c4a1dfd37d10fb26a09b28d42f35261fd6,2024-02-29T03:15:07.067000 @@ -246093,7 +246093,7 @@ CVE-2024-26024,0,0,446166e750142f30b836c26c29324a3e66b74c06f52673e398585fd034e50 CVE-2024-26026,0,0,a3caa671cadcbee0b7a7647f8dff9c68f25411a54544c0183999cc9da232fc84,2024-05-08T17:05:24.083000 CVE-2024-26028,0,0,f0eeab6f00388b393e9761660fb13451fd75e54f8248c45c23f5d18cc79809b2,2024-03-18T19:40:00.173000 CVE-2024-26029,0,0,73b1b2a7a164f2d1b52c68fceca6c2cc8b7181b78e4f3a2dcaf477ebe79168d6,2024-06-20T16:03:36.843000 -CVE-2024-2603,0,0,4c37ef52a7f3919b1ed75f79e6f53895a8c8809eb0619c9287c9e5b10ed97fd0,2024-04-26T12:58:17.720000 +CVE-2024-2603,0,1,78190220c4426015d8e369c25fb4d08ae79b05986155963bab2103b320746b59,2024-07-03T01:53:22.183000 CVE-2024-26030,0,0,6e3023416b037dd092fe7b5e942072e3533649d1b2cfd157142cc39338fedbad,2024-03-18T19:40:00.173000 CVE-2024-26031,0,0,ed002faaad586ba4ca84a6198e87a403fdacf5cc79e96297a7527ff0ace203b7,2024-03-18T19:40:00.173000 CVE-2024-26032,0,0,d12b1deafb7f503f2da2b6f08ed3ffc2b0c3783c86e2506252b03bfbb01459b8,2024-03-18T19:40:00.173000 @@ -246147,7 +246147,7 @@ CVE-2024-26076,0,0,dd253dd02ca5cdf33476fa07aa48b0d3b8afaffb5fcaa6203628f4bd44edf CVE-2024-26077,0,0,9ad69f54bc1eb0ff6be907095f4d102577daf5f12eb9866764b78a91a829950d,2024-06-14T19:35:14.353000 CVE-2024-26078,0,0,070fd8f14d3101afe8a2249032d64b596c2af3ab88dc9e96b41587d3a7b93214,2024-06-14T19:35:02.233000 CVE-2024-26079,0,0,d38ad5703492e3d5955769f8da924f53fd7fefeb38650250cfec3e979713edbc,2024-04-10T13:23:38.787000 -CVE-2024-2608,0,0,ae6bcd3c34b2e2d2990ddd5b5011c47bd45b71daefa72e13093360a8fd3053e7,2024-03-25T17:15:51.783000 +CVE-2024-2608,0,1,034c3f0d69de46d9ba7a73a0532d7d80b727b4c71250c7f2c3749a641f69ef8b,2024-07-03T01:53:22.600000 CVE-2024-26080,0,0,985369cd20039768ffb9e0a343ef3ec94259ec110458f9976172d6fbd3da993c,2024-03-18T19:40:00.173000 CVE-2024-26081,0,0,c72f7c9f4be196347838ee307769204199a6cbfb17a050e9a8f3ac2863295699,2024-06-14T19:34:47.583000 CVE-2024-26082,0,0,56a13f29a2e8ddbfc7e70df0673c54a7fca13e31cd226d69d2cc85615a83a09f,2024-06-14T19:34:37.370000 @@ -246235,7 +246235,7 @@ CVE-2024-26166,0,0,f391c4b0db733d40148db48047d4241707d804226a4057e01c2cdc7ed3c4a CVE-2024-26167,0,0,df41d27f07d121d47403423e03cb5d0669d0be17e49911f76c8b08032270ca64,2024-06-11T16:15:19.920000 CVE-2024-26168,0,0,949af59ee3b8c1baa60afaabce6faf5f018a8b72d7b8397412fa4ad69b2f274a,2024-04-10T13:24:00.070000 CVE-2024-26169,0,0,876220a6addf603249aab5a8d380045e5fae4595204990ceaffb72e1d0ad1afc,2024-06-14T17:36:18.710000 -CVE-2024-2617,0,0,babf715e658d886f2044bd63c306bf0aff0a68888d1930a63deb9a40a6ed8a17,2024-04-30T17:52:35.057000 +CVE-2024-2617,0,1,c735ab59fafbabeeafc878072d5ef91a88b0cb8e9dc08af938860e93db5c996f,2024-07-03T01:53:23.587000 CVE-2024-26170,0,0,f2c772370ea374610349e86e1f764806e1b8901d9cb2b50e74b95ca0709a0820,2024-05-29T00:15:37.043000 CVE-2024-26171,0,0,9585df40c5f7289258f98464992d6f7b36d924236a4b679b88371a3376d72c9d,2024-04-10T13:24:00.070000 CVE-2024-26172,0,0,c6f278d7e7fafad9e920f5166d13c7edaac3efa6dc535e1f3334920cb3dd37e9,2024-04-10T13:24:00.070000 @@ -246325,7 +246325,7 @@ CVE-2024-26254,0,0,07a4b81b26bc3f1c97cbd450d7200968eabb824affdc4e125ab1428b8b376 CVE-2024-26255,0,0,85638effedfaf37162394543c2ea8be3fea3cadc51d4bb0413585c9f3e228970,2024-04-10T13:24:00.070000 CVE-2024-26256,0,0,3e9fd5f0cea24d911e8a5503fa19177642b096dc511ef1b7b5f746aab8cc55a7,2024-06-12T02:15:09.700000 CVE-2024-26257,0,0,05a28d03660a848990668904555214fae6f00026d23d1677e03b07f5dc8dee4e,2024-04-10T13:24:00.070000 -CVE-2024-26258,0,0,e2948ebecdedd5be931de1508231bfb7181246b38ce20c139f19e68ae9750f3d,2024-04-04T12:48:41.700000 +CVE-2024-26258,0,1,56e6cbff63319419d28919e5ab94a9d137eaeced96f06dc8fcae1f1b4a33af9f,2024-07-03T01:49:34.870000 CVE-2024-2626,0,0,0f82bfcd678adfe2206a7b49362dbece30aa00242a9c52e3ba26851c15f6dba3,2024-04-01T15:22:37.883000 CVE-2024-26260,0,0,65643e0ce4f84c48cec78b438df5085c99da999075d065c3a4c15ac8e9f87e0c,2024-06-28T02:15:03.190000 CVE-2024-26261,0,0,513bda7a092399193b5a95cba8191ef907d5160f5f00ea0bdca470614c45d8a0,2024-06-28T02:15:03.423000 @@ -246364,20 +246364,20 @@ CVE-2024-26301,0,0,2608c1cecd8361b3b47bfbbf59c86957def061e4e57f0dcf17ead87df4592 CVE-2024-26302,0,0,06ca396cc01c14d2ae0f6244893f0725bb4301aac5cbbab64c89dda4aad3860e,2024-02-28T14:06:45.783000 CVE-2024-26303,0,0,e8a32302234eae79d15cd650de94083a6eecd6414f858c459fb16f2cfc29e3a0,2024-03-27T12:29:30.307000 CVE-2024-26304,0,0,0b20334eea94fd7542c192fe2b31f743af7a584e97ca17063369a172ed015faa,2024-05-01T19:50:25.633000 -CVE-2024-26305,0,0,94c4b3d79dd1d183447f4af0dc1e5f03272b1d3120be0b6ee9079e3ebe568cd9,2024-05-01T19:50:25.633000 +CVE-2024-26305,0,1,a65ba50eb26a2c8cd8116833b01ccff155f5f99454b54473ac13d25eeaae6554,2024-07-03T01:49:36.833000 CVE-2024-26306,0,0,0ad788973fbbd4d8625f41ad93584f6b3d96f58b918c8ac5d2726ff31f3ddf40,2024-05-14T16:13:02.773000 -CVE-2024-26307,0,0,7e66114bdd9afc6dd1e7c01dc2508c4e49d31a2a3f77da3a8a839cfa264a32ad,2024-05-01T17:15:30.020000 +CVE-2024-26307,0,1,69e56c1207bd415bbef84f2246a3f4dffa28e9109056e4a053129ad394592e62,2024-07-03T01:49:37.557000 CVE-2024-26308,0,0,2ba9e28d3969717f6516b4803ddc13ceecd3ad2f69b64fd95ab4756f662bdfa5,2024-03-21T19:54:03.230000 CVE-2024-26309,0,0,f36b82bfd58135529029d2dbb3557eae73d94f3c7d43b34f799072bc28e25580,2024-03-08T14:02:57.420000 CVE-2024-2631,0,0,ef53dc4c0236fb1eb623bfb36f2824e0ea2259d5ae6edb826dc04699165fea4c,2024-04-01T15:23:45.590000 CVE-2024-26310,0,0,cdf3231f7a059b92520dd591ab7449fe300f81e89c81c63cb479e44416fa612e,2024-02-22T19:07:27.197000 CVE-2024-26311,0,0,c10525456294b75c6b4919ba396921719972a7cc08a82934dcff79f6c0deabee,2024-02-22T19:07:27.197000 -CVE-2024-26312,0,0,0c7256602f4c7a7373cf9d9a58827aa9f1abc86874588a78f13a6e093c4ede7e,2024-05-06T19:53:38.797000 +CVE-2024-26312,0,1,63211e4b9a2e957457396397837a5777078f70d897b833c1c389cff9a53a6fcc,2024-07-03T01:49:37.810000 CVE-2024-26313,0,0,307927a31aa9525f579ecee601093796b34c0481bc031cf5fc7cd7d3e73f1218,2024-03-08T14:02:57.420000 CVE-2024-26314,0,0,0d34c3ef9621fd978ad0be298f858bcd5d61c687de97df8a2778efccfa284634,2024-07-02T17:44:45.700000 CVE-2024-26318,0,0,5a8434e81e693bc0f90a66d9a6d8655df17a4e5f3f1f4a63075d970f5e64fed9,2024-02-20T19:50:53.960000 CVE-2024-2632,0,0,ea393f116b0cce8559537657b6b48805c98531cb8a651d292d9e39cc33b1c1ca,2024-03-19T13:26:46 -CVE-2024-26327,0,0,cdb018804c204ef80ecdc8daa637463eea9f06e211b3135332b7863d1171c7d8,2024-04-19T07:15:09.703000 +CVE-2024-26327,0,1,30d08d577d44d38c98e8d09a3ca2e28a354f8d84b13e8b7475d667e0aa1a602c,2024-07-03T01:49:38.810000 CVE-2024-26328,0,0,70bb62dee22bd65978afbda4aa44a7dcc2acba975045b0300cec412005d5eda5,2024-04-19T07:15:09.770000 CVE-2024-26329,0,0,6eec7b644c4867f186846a122998b4350a4dc0459882c3ea663ee6d77c6e1117,2024-04-05T12:40:52.763000 CVE-2024-2633,0,0,d6d619ede14eb7136c8ee12cb2cd0efea8cc18b4fa44aa46ef5af23251d75954,2024-03-19T13:26:46 @@ -246396,7 +246396,7 @@ CVE-2024-26350,0,0,94fde44080954984b73836ed416075677e0fc24eadc0bc6ed473bcf70a41b CVE-2024-26351,0,0,ca59fd7de6fb4b8be3d1dd63bf1340c6e097ec7efd2f74728f2b6d3782e5af9c,2024-02-22T19:07:27.197000 CVE-2024-26352,0,0,a91e9b827b34ff74d03de6eecd5ed6a244c3125227e96fd7536e6e0fc75fc75e,2024-02-22T19:07:27.197000 CVE-2024-2636,0,0,2136f31c86bb7a335e516e0265dfb7c3eee5b1d10cfc06f1391b5375fe684311,2024-03-19T13:26:46 -CVE-2024-26362,0,0,6a18777bd7815cb774b31220e78a758adc0ac0f202205f9d0b94f55fedbb403c,2024-04-11T12:47:44.137000 +CVE-2024-26362,0,1,5faf69da8a67af4816d796fd5b51111ac2c788f77e8e8dd0cf83d9d0e45a369d,2024-07-03T01:49:39.793000 CVE-2024-26367,0,0,ceb2808d00aec1724941312eb31317fb9ca784802bb2ae58f80e28e9667ecf83,2024-05-14T19:18:31.490000 CVE-2024-26369,0,0,b0322db94f9b89a2da31dd1ffa70ef568f3b1c4901ca044ba9c0ea1e2eb29c09,2024-03-19T13:26:46 CVE-2024-2637,0,0,41c22874cb88b645bccc5162f78b9b5c7f466bc74b1b50f3d7f10bda614ec047,2024-05-27T08:15:09.360000 @@ -246439,8 +246439,8 @@ CVE-2024-26492,0,0,223ddadc0c7efe7b0886f487630808be0927541c8864c0a1df96647191c41 CVE-2024-26495,0,0,bbb6b231bf109fc8acfd5241f02faec1361b46bca779b6926f0190dbd5a53c19,2024-04-03T12:38:04.840000 CVE-2024-2650,0,0,e5741f6c9edd36c8ab868274b7c5445ec4657874106d32e2eb21c1d38ec57aa0,2024-04-10T13:23:38.787000 CVE-2024-26503,0,0,67af53e4079744ca59c487303c5ff1417327cd875b9be966624dba59813771c0,2024-03-15T12:53:06.423000 -CVE-2024-26504,0,0,2653b69a5d062f1bf5bae1c6c532ca9111e1532942253f3f1d64a0b886f79a1b,2024-05-01T19:50:25.633000 -CVE-2024-26507,0,0,039aad4630cad94a99defc88ef2147fce5ade2d9db98cb7f07599e47ad1ff8af,2024-06-10T18:06:22.600000 +CVE-2024-26504,0,1,666faf787e5dc390b263f6f43b439704bacedd4c95ae744503624ba00795620b,2024-07-03T01:49:41.007000 +CVE-2024-26507,0,1,64f088a446d983fef0e9e5fe7e57b9067d595ae9ecbc4c9f4bac89b612f6dadc,2024-07-03T01:49:41.820000 CVE-2024-2651,0,0,0d048908653e9857526dde0003f34c423314d600b67c7d845e0b43f056ba9c85,2024-05-14T16:13:02.773000 CVE-2024-26517,0,0,bd4763012c70279fd682115754eb1a354519ae29026816c007044315383dfe51,2024-05-14T16:13:02.773000 CVE-2024-26521,0,0,cd304afd2135ea7b8ef2211742c7b93ec84446277e098ef9dbbecd48d38b35d0,2024-03-12T12:40:13.500000 @@ -246761,7 +246761,7 @@ CVE-2024-26850,0,0,dab640da12df724b0a3e304a986a85e4251ea2bf463c19dbbcb16aaddef82 CVE-2024-26851,0,0,17abdfa7553c9586287186cf7930189d90be563de8a21e88abcb269bc4ef19f5,2024-06-27T13:15:56.800000 CVE-2024-26852,0,0,929805d418e0925118a949e72844d455001fdcb146e5b9be74c860c17b87c399,2024-06-27T12:15:21.490000 CVE-2024-26853,0,0,5c1d6d0e3fff92a472dae6bdc4a94a39e8c365023f2aa19dd97627908917e416,2024-04-17T12:48:07.510000 -CVE-2024-26854,0,0,53a21f4c14becc0ad04525e83e52a874180b437662d139535b9813fc17df7d89,2024-04-17T12:48:07.510000 +CVE-2024-26854,0,1,71382c729dcbfb61122fea21c2172ded949fa87a0f12accbe08dbcfd7b75a577,2024-07-03T01:49:55.907000 CVE-2024-26855,0,0,886ddc3721adf95f88b9bbfc2e5477192b0a984b817d6e8f089c87f8f71b32f9,2024-06-25T22:15:24.110000 CVE-2024-26856,0,0,d2ecc22abb6a286e1e94e314d6222b6a396e97380332e1141586776671c270c3,2024-04-17T12:48:07.510000 CVE-2024-26857,0,0,ce7325075365245fd95cf133db6fd5d7000c600dc3e76e7125131211de098e3d,2024-06-27T13:15:56.880000 @@ -246772,7 +246772,7 @@ CVE-2024-26860,0,0,955f045170883df7e16a3327bfda3dbef0b53bfbdc290182b2ade36cd0a20 CVE-2024-26861,0,0,8f8500ff35b5ba7c52edf0020fa7734eb1cc56b05f96c4080397501db239088f,2024-06-25T22:15:24.310000 CVE-2024-26862,0,0,a4798f87cc3af6d50bb3d0861f8abe3759900dcd5c97bdebd3438bf13ad928fa,2024-06-25T22:15:24.387000 CVE-2024-26863,0,0,0209e47ff9cfcec7c1fe274a2511fb6024826a5951f1df017809b69e9034c675,2024-06-27T12:15:21.633000 -CVE-2024-26864,0,0,2b55b561df842115720c0063a297afd9b7f4919f08124d6ea85ca055ed0d5ac6,2024-04-17T12:48:07.510000 +CVE-2024-26864,0,1,cde86c845159def7daa507d75fbf654ff0f83d93de2d59c846972031136c89fd,2024-07-03T01:49:57.117000 CVE-2024-26865,0,0,d1702cc240e430cbb6f254e98b3323917b6e3e54d44bbaeb519424848b98254b,2024-04-17T12:48:07.510000 CVE-2024-26866,0,0,9cf2c6dd16558c41d4e9bc85a931c7250d9dd5f5522c8eca13890782afc35a08,2024-04-17T12:48:07.510000 CVE-2024-26867,0,0,e76b2b0f326d3e35d47859522bdb2881a58f9e936a4a2a6027a052a6a2082706,2024-04-17T12:48:07.510000 @@ -246807,7 +246807,7 @@ CVE-2024-26892,0,0,688376c4324ea6e95054950a543b4e29e1ce33115f8cd0779143841c3bda1 CVE-2024-26893,0,0,1f6a9cc5570b4cc20166e056fbbe56ac59e2bccce9acb4ad6f8361f3f40f222e,2024-04-17T12:48:07.510000 CVE-2024-26894,0,0,511c8af8a1aae3705ce71f019d1e232a006324960f8d3d953c567e5a4353572d,2024-06-27T12:15:22.177000 CVE-2024-26895,0,0,db3f834083271c88a2daa1aa14eb5f61bf8f4edfa34b6bcb164297fe50ac444e,2024-06-25T23:15:27.080000 -CVE-2024-26896,0,0,c7f67bd677ed32d8b4a7649e5d29a65fac6c5af022bd8a34212a71825017e7f6,2024-04-17T12:48:07.510000 +CVE-2024-26896,0,1,b08f3e33c23ae0b83635aecbc40be8738b6df9560f03215c69e56c9079672600,2024-07-03T01:49:59.133000 CVE-2024-26897,0,0,6bcf13dce11b85f353022bbc8fc5f6986fcb0b78458e3fa86db5590c08c6f073,2024-06-25T23:15:27.180000 CVE-2024-26898,0,0,9e525eab1c9e8995de7e43db178036926cea6bb5d20e70c586b397918eaa4357,2024-06-27T12:15:22.257000 CVE-2024-26899,0,0,021eca8ea6a81120cb7c81a3d3bdb18e09f0d17f90de09091ca22a9d038b6b84,2024-04-29T19:34:10.080000 @@ -246837,29 +246837,29 @@ CVE-2024-26920,0,0,21e54f7cffce25f076f12e61f0ebb2408a05fa58f844d6d62f7a9b8a454f9 CVE-2024-26921,0,0,76d623900726b55efb66263c05dcf2e665a9ce9fb4f9ecc19bf3b35e90cf98c7,2024-04-18T13:04:28.900000 CVE-2024-26922,0,0,ea9e0a3791a3b37f43c13160be5c02289544ce9e8ec20d8e53b5453592702b96,2024-06-27T12:15:22.813000 CVE-2024-26923,0,0,b461fe01e06fb707cd15b897f191eea1bdccd90b00b363d7aa1c5f6a9f6a5876,2024-06-27T12:15:22.923000 -CVE-2024-26924,0,0,aa51c2f7556b40f5a535c9d9d209d7eb48deb40b816b86d1979e69c1b929d0f3,2024-06-25T22:15:26.257000 +CVE-2024-26924,0,1,4995bf418ad040001a9127f17d0754d5e3fc34b1ab969f823d8ebf3fc8141c89,2024-07-03T01:50:00.957000 CVE-2024-26925,0,0,c80e18dae334fcb4312a5252981fb94870f3e4932fef1f9fc7f6178d6b1fef71,2024-06-25T21:15:58.627000 CVE-2024-26926,0,0,efa4d9f5b99e592708f9a5ef1ea162339d7a56f0818c92044e9abb2fcb35c80c,2024-06-25T23:15:27.893000 -CVE-2024-26927,0,0,84d28aa2d82d7b353955d491991b07be5f1f5eedde26b528784c0de359b7829c,2024-04-29T12:42:03.667000 +CVE-2024-26927,0,1,4116dbe7df52a1c2d9850cca2fd6397392bdbeda2c2b84e268cf9d86129f791b,2024-07-03T01:50:01.863000 CVE-2024-26928,0,0,356749b5efd3e51950b32012233c612b93e1c25f21b750fb61ffd2aaf8554d2d,2024-04-29T12:42:03.667000 CVE-2024-26929,0,0,bbb851a79a93a363e352bb5d96ddf71c38e37b9f175f55319aa1039600b887ab,2024-05-23T19:07:27.803000 CVE-2024-2693,0,0,0523f248585c70810eb494560526f8a16efe419cf7f3014aa23838648b0d3e89,2024-04-10T13:23:38.787000 CVE-2024-26930,0,0,3885fe1fa73799da895810b44f93f3951c708b35b460f991f25484a478614d7a,2024-05-23T19:10:49.540000 CVE-2024-26931,0,0,2cdf8e04feaa44739b4bdcdd7f8ff95110c37b6b478bd37402a6a0b6da093d4f,2024-06-27T13:15:57.053000 -CVE-2024-26932,0,0,f2d026e35f4b5233187abee7e42482ca04237021bc627080ec5bc9b0491b80e1,2024-05-23T19:12:39.257000 +CVE-2024-26932,0,1,a7582335e50b6e1a72f82df662a334c5ee8442e98bc313740f04373597dd30db,2024-07-03T01:50:02.753000 CVE-2024-26933,0,0,74ecb5d6388685ffacbea1351beb1f6d860ac3447041ba550ec0df60bf844fa0,2024-05-23T19:12:43.773000 CVE-2024-26934,0,0,bf6e546596921728acfe319c516bea1e1abf8b1196f18535cded4e1ddbafaedf,2024-06-27T13:15:57.133000 CVE-2024-26935,0,0,e73d92e1aa9b37641485ddd30110986ec457a10279231ad37da824c924ed1239,2024-06-25T21:15:58.710000 CVE-2024-26936,0,0,ac3611a024cce1dc29fc377a7f2aca0292c14e6592911fdbd080f60f2117c044,2024-05-17T11:15:08.257000 CVE-2024-26937,0,0,13ddbdb7deacac9c8664659994e91c378253f75f957ac64f7f94e46370a06239,2024-06-25T22:15:26.440000 CVE-2024-26938,0,0,321e927ef910319074b978288ce15e9ebcbbcafa9b2849cd294ce5472307acb5,2024-05-01T13:02:20.750000 -CVE-2024-26939,0,0,85eb64cbd7ee938c6394d3981a444b673e98017b7758d5c581c06bdedc9d8308,2024-05-01T13:02:20.750000 +CVE-2024-26939,0,1,3127531537fc8434c8a8153e0717ce9c8f7520225ded802370bdb01946c9c847,2024-07-03T01:50:03.663000 CVE-2024-26940,0,0,0f7b60c7074169eef5b0805dc07f3f012de89cf52283f43c6fb864cb8061acc6,2024-05-01T13:02:20.750000 CVE-2024-26941,0,0,d5edb0519d12495e38c26375af70fb76a969a5da638017008bfea75e4a0468ef,2024-05-01T13:02:20.750000 -CVE-2024-26942,0,0,c074e6f277587fe537ac2b909f91dc78abb860cb08d8b6da3f762950bc1732e5,2024-05-23T19:13:50.467000 +CVE-2024-26942,0,1,2d57b93ce0dd646b07d92a214c08685384cf52a1b44011b76a4f0a2c97f50567,2024-07-03T01:50:04.523000 CVE-2024-26943,0,0,28c15f250470f99abb4044cea0ff718e86e66a59267e92211de026301eb61abf,2024-05-01T13:02:20.750000 CVE-2024-26944,0,0,95cb3bf01235c272219e76e8386a7bba4aabd1011dab496d9c06632c2a39819d,2024-05-01T13:02:20.750000 -CVE-2024-26945,0,0,71f3a344617dd79a1f3cddce27c3109f39a6428bfc6d71dfba56b0575d04c141,2024-05-01T13:02:20.750000 +CVE-2024-26945,0,1,ceea5ef58ad54d0a792ae170098830605013e0d3f4d8eb0315b8ddad809a5bda,2024-07-03T01:50:05.433000 CVE-2024-26946,0,0,03955d0f2bc318bb8984ca0ab6d4535e3edab8a455147eb89f589c2cd541c436,2024-05-01T13:02:20.750000 CVE-2024-26947,0,0,9675f42687fbcf2f6cc20529b1558a892788f21cf57028b5f39f7df35aa2717e,2024-05-13T08:15:10.313000 CVE-2024-26948,0,0,504fd54b8014ad5c80880b8f7264990235361232cb4d396abc33d35f86643df1,2024-05-01T13:02:20.750000 @@ -246867,15 +246867,15 @@ CVE-2024-26949,0,0,98298e6aa8285a2887507ae75a22585976bb1c7094fc806d2d56455f999b3 CVE-2024-2695,0,0,8a09fd0fbbc0e6aad9f600099af217153dcb87824db83615c89c25b3d512d1ef,2024-06-17T12:42:04.623000 CVE-2024-26950,0,0,3dc1f7bf7e9e6267c2bcffe3bb557dc394f0c1c2ab76d79961eda90eb74502ca,2024-06-25T22:15:26.520000 CVE-2024-26951,0,0,0f8ea3bcc3485368c7aaf5f7c1ab72347a950fda68c6016016f8dd78003a1fd0,2024-06-25T22:15:26.583000 -CVE-2024-26952,0,0,0c7c82bf8d86d0ae89c3b2237d651698f1432d7566849359fbaaee4955185c25,2024-05-25T15:15:08.950000 +CVE-2024-26952,0,1,47ebebbcdab3581e41cc5107a6b3f0472a8676645b0ea70ac7b8109d2eee0964,2024-07-03T01:50:06.420000 CVE-2024-26953,0,0,b1854779e5eec614f10783eb3e8416f5d1c68fe6686910e1a9dd6e7c25f031a2,2024-05-01T13:02:20.750000 CVE-2024-26954,0,0,3a105c87f2e28741d42d75481e9c6df77e80795742a4248ce96271c79efd9110,2024-05-01T13:02:20.750000 CVE-2024-26955,0,0,f3682ec6a42ed9fad15d4ad94f0afc24f8f82991e5d90ea0d9ac427041d25652,2024-06-27T13:15:57.220000 CVE-2024-26956,0,0,03b8b6d93122c87e1d6edb9acf0c32232fac7a1bfa20c866ade9468ab42e2937,2024-06-27T13:15:57.290000 -CVE-2024-26957,0,0,89c95fb54a9473fd2f13dc8428ef5a0f623a46d47ab10b47c5e8ea9d9d785a77,2024-06-25T22:15:26.860000 +CVE-2024-26957,0,1,871ec22ed701e6c25fde35c12b49fcc960cd21538002ff829aa32c4c117b7686,2024-07-03T01:50:07.493000 CVE-2024-26958,0,0,14cf34198e5226cd9903fa4b7cd1b1356a627031f18c7d5956b5b6c2e6094b25,2024-06-25T22:15:26.937000 CVE-2024-26959,0,0,b20b713d07b74cf4ab31aefa115749077979ac722940c0353f278e6b20f8cce7,2024-05-01T13:02:20.750000 -CVE-2024-26960,0,0,22325a059eb9edd82895d60c0c03c404d34154d4cadfb1c07e012192d60b845b,2024-06-25T23:15:28.093000 +CVE-2024-26960,0,1,59e6b3e033a957b45cd72dd6675eb95ba7e94918875e89eeb9cba1fa4639541c,2024-07-03T01:50:08.270000 CVE-2024-26961,0,0,05af2764d15ac446009c797cc05088526f3e6471c70181e566519fae53a37419,2024-06-25T22:15:27.007000 CVE-2024-26962,0,0,21615a88704d38867dbd9993e5fd2c885d58669c1484f879178b0965705ef667,2024-05-01T13:02:20.750000 CVE-2024-26963,0,0,889457b3fe1d29054f2c173859213556de5ffec87e40d507efafbf347da7e76d,2024-05-01T13:02:20.750000 @@ -246885,23 +246885,23 @@ CVE-2024-26966,0,0,988d3836d88dc653d434c39d37ea05ba90773acadabefa49a68922d719606 CVE-2024-26967,0,0,3f8ba2525e4f63fd5e4a12d535e0b4f15bc370694291b91bd2baa1315d6d7195,2024-05-01T13:02:20.750000 CVE-2024-26968,0,0,385865acf42afbe5d6d9407148d078a33fc4bbdf230b0f52e55a8fe947965732,2024-05-01T13:02:20.750000 CVE-2024-26969,0,0,d00ce9b06a03c713518bd3eb23ecc51ac3ce412faa9cd03f86e60da072aa6f54,2024-06-27T13:15:57.397000 -CVE-2024-2697,0,0,b7384cb6c757a6d68e4eb4a4e83d3c11493a757d33b49920dcbeecea6aacf51f,2024-05-17T18:36:05.263000 -CVE-2024-26970,0,0,87a268cdb06f0936f321efcfeded1ea4b0f392fc80fd1889624d73b685c501d5,2024-06-25T22:15:27.303000 +CVE-2024-2697,0,1,f8c842b96914534995a7f6c1541ce43d05eddbe65424b582cf5dfaf951722d70,2024-07-03T01:53:28.700000 +CVE-2024-26970,0,1,3c35fe8319cb49f9fc9255264025a882fc92fbc6a7b0648c8516887eea16225d,2024-07-03T01:50:09.343000 CVE-2024-26971,0,0,6b41071d6836bf413ec0d9a17a0b6d0e444914fad9b95723f69c2aeb1ca1ca5b,2024-05-01T13:02:20.750000 CVE-2024-26972,0,0,2ea7fa74cfe98c165c3e419a6f2631ccb110e153161fee98058a6b4579c8bf52,2024-05-01T13:02:20.750000 CVE-2024-26973,0,0,ff95881471f628307c43018b0d4a9aaf4c18e0565bd184d6ab78743fbeb0040e,2024-06-27T12:15:23.210000 CVE-2024-26974,0,0,40f15b142d902b780f0ed9a5e7d2b9362ae9f273032eec29fbfa853a02fb1645,2024-06-27T12:15:23.293000 CVE-2024-26975,0,0,8f19cd721adbc3dd7c661f9a8d550ab97e4f94e7a1b3b7e5ff34954db774d0ec,2024-05-01T13:02:20.750000 -CVE-2024-26976,0,0,54ddcc42ad3e9144ac97081490f710ad2737a213a0769374a3cbc23c2919efb8,2024-06-27T12:15:23.370000 +CVE-2024-26976,0,1,30943d015d6f9e470cbf6f9a436113a4fc8c476dd148f5ad8d13b404e4baec7c,2024-07-03T01:50:10.377000 CVE-2024-26977,0,0,7f4303ba7265fe68f47a9d9801d011f3d78c2b9c80b2b80c869116171921f0d6,2024-05-01T13:02:20.750000 -CVE-2024-26978,0,0,483466422e03f75e7df98f91f4f0a342a075a28cd1a2811bba9ac8a642b730a7,2024-06-25T22:15:27.490000 +CVE-2024-26978,0,1,b62ba10e220aee05c207f27d9ce90b8810a5ae9c8aebf27ac3c64683154dd1d6,2024-07-03T01:50:11.337000 CVE-2024-26979,0,0,54694270d008c20297a5341208d33ae44a9e8eec55dc5d4e396d03aaba5d47ac,2024-06-12T16:15:11.147000 CVE-2024-2698,0,0,758579b568a4887d746dcbadeb9e5d5dbe9c948ed21f398b8dd22a95a4fd3e38,2024-06-27T03:15:49.860000 CVE-2024-26980,0,0,ec5b812a8dbedf3c6e27cceb9a929403fd6e62291ad747f9f2a67748a6189d95,2024-05-17T11:15:08.357000 CVE-2024-26981,0,0,78b7e7c683bce4836c9547c018e0cc1c1614c35cf0899c3a1d961f61b36bdfc3,2024-06-27T12:15:23.460000 CVE-2024-26982,0,0,71a4b88e652ac72451ef2b1c06677d2a8721eacfd6194887bc3cbe1ed1aa0fda,2024-05-03T06:15:10.953000 CVE-2024-26983,0,0,d3d7f9f5caf4e079a71f70f8bc14c3d32922ad02f616d250213454d5ce4002ce,2024-05-13T08:15:10.750000 -CVE-2024-26984,0,0,7f6d074d92e883fac3f50ea56a6ad13c2ac13c934f88c96c2396a4e6624aa53c,2024-06-27T13:15:57.467000 +CVE-2024-26984,0,1,3242ef5633b232011b368edbcc114d10037a576fda03267e797bc4436c77737b,2024-07-03T01:50:12.193000 CVE-2024-26985,0,0,7a740fe69951ccfc3b1e74b7db3fbfca448128a35ad090b49ba3486012aceb7d,2024-05-13T08:15:10.823000 CVE-2024-26986,0,0,3a04da6776d5b30be98a9a3456a9602e44e9b692af32172ae4d107260563fc81,2024-05-23T19:14:25.180000 CVE-2024-26987,0,0,8c26013d98bcf2e4e743c73d724873f3f29d66506454e1cf0da9933616dab821,2024-05-23T19:15:23.693000 @@ -246957,7 +246957,7 @@ CVE-2024-27033,0,0,e817cc98b5190793135c3bd18ab65a167e608cc8f3ca593ad6d803d03c216 CVE-2024-27034,0,0,5b1c4c72c15b589bb88da4f2c0040f3c36b27bc8d226ace8f4cb0b859be1d61e,2024-05-01T19:50:25.633000 CVE-2024-27035,0,0,75ce8cd999fde49c8a49584c5335f6d3bd679a43b32b236e19ac09e9b9e84acf,2024-05-01T19:50:25.633000 CVE-2024-27036,0,0,45f7528031da5f17cc420714d80b032cc0196c8ac3fff06f0bba88cdf0a47bd1,2024-05-01T19:50:25.633000 -CVE-2024-27037,0,0,e4ca38ae1b88b37bd1f8950736f23b000586d56c2b00205b6d75cc42cce4d4f9,2024-05-01T19:50:25.633000 +CVE-2024-27037,0,1,135591b5e8a55eb5ce962bd98bf8d946730dde849976aa38e9a7607fe8478094,2024-07-03T01:50:15.890000 CVE-2024-27038,0,0,aac6f128a2b7cc671e89f6cd496a68a255a07d87d810a6dd8cbdd74ecbd09d6f,2024-06-25T21:15:58.793000 CVE-2024-27039,0,0,ed4ba32d17a0fd7f637f45995d661ac555d159fb46dd379e6c3c8b1f723bc7a2,2024-05-01T19:50:25.633000 CVE-2024-2704,0,0,9d106e2a42025ec8fa45d69b5c0a0b5cdbec180ff9fcd6a29154d0957359da10,2024-05-17T02:38:25.980000 @@ -246972,10 +246972,10 @@ CVE-2024-27047,0,0,79816067c09291199a2b02cd8ce910c0433db186878f016a7a73a27b920c4 CVE-2024-27048,0,0,45eaaaa13fad0bf72d0089e8a3dfef271de46ff51485852bb2d39923a5177cb9,2024-05-01T19:50:25.633000 CVE-2024-27049,0,0,65cc558c22a88b2154202b4b806f620f51b51904f97b3aa60c73da128c7087c4,2024-05-01T19:50:25.633000 CVE-2024-2705,0,0,3e666a308898abd217bf65b86a46d45692dd7d1d908a3e27e105a106e339abbb,2024-06-18T20:15:12.870000 -CVE-2024-27050,0,0,095663a997128fbd9542749ad5c9496142651465f23e755a7bd79657f4a2aadd,2024-05-01T19:50:25.633000 +CVE-2024-27050,0,1,dd1eb20f7cebaf03087c82f7049e5087e8556c8b803e5a5d2fec557dfd4f9a9f,2024-07-03T01:50:17.020000 CVE-2024-27051,0,0,f538d49dea09fc8e046e115a414b4c9b26c5f0665b004bffd98fe051abc7a52b,2024-06-25T22:15:29.110000 -CVE-2024-27052,0,0,3fdc0d2bd0319b18def541418baebcf627f952bbb7fc37fcc116beb1c741c9c0,2024-06-25T22:15:29.170000 -CVE-2024-27053,0,0,0dc507c0496ee0b829d0b3a57bd1b4a51476bd2055cc290092f658512193a5e1,2024-06-25T22:15:29.230000 +CVE-2024-27052,0,1,5def08a6dfc2bf471175fd717e5b1cca3b49d17960d50bf8264f2c735a7ef219,2024-07-03T01:50:17.917000 +CVE-2024-27053,0,1,0e94f9e68df85347a12572424dfaa9f95370b522d5c7b0199d58c0cc4a3d2a3b,2024-07-03T01:50:18.727000 CVE-2024-27054,0,0,b3828feb26e7193e98004950722f954a0d27ddf6659e10f6d54fdf8a21f5d085,2024-05-01T19:50:25.633000 CVE-2024-27055,0,0,b139ffaada6869cacbe2977f7f53e69927c3cb7015f4f2f7e113c5331af5815e,2024-05-01T19:50:25.633000 CVE-2024-27056,0,0,07f62717c62a9735eb3c1bd93c9c65c098d48d4d06f9016f7ee847ea7bbf1fa9,2024-05-01T19:50:25.633000 @@ -247039,7 +247039,7 @@ CVE-2024-2711,0,0,80eecb09bc786c349f171557dbca1f01daa7603122f867515e5e3d12bb6df6 CVE-2024-27110,0,0,1f459ce0397f3bd5ab00416d5a98f7fa5e01cb8abb8ffd0034d459fd88eae9d6,2024-05-14T19:17:55.627000 CVE-2024-2712,0,0,8a318e35bf229c3f0dd5db5ecabd652818c52f2a8d11afdd3e709877412ead7f,2024-06-27T19:15:13.167000 CVE-2024-27121,0,0,9ff77f57a33b5e7894f52bbf3c39c57fbfb06ac4fc9de183cada29d2e4e25cb4,2024-03-12T12:40:13.500000 -CVE-2024-27124,0,0,e26031ea84f9a49a7ece127894379063d9907ca8ca486aa0cff6de5d68ba6fdd,2024-04-26T15:32:22.523000 +CVE-2024-27124,0,1,26db67db3453e1dd267c91698f9b1417c8d160e52aa7cf62e0f7bdbf1310db55,2024-07-03T01:50:21.947000 CVE-2024-27127,0,0,0dd5e397c474a9ffd4753312393a0a29d3669dbc8ea3d16e7bfbb9019919a563,2024-05-21T16:53:56.550000 CVE-2024-27128,0,0,1bce392fa9d2a689b9ca5f77f13a07b6f5de5cdaff6f1fdec225d9014cd0146a,2024-05-21T16:53:56.550000 CVE-2024-27129,0,0,63822593b737c1f7d1321e2bde68830f9b7bb468d4be611abb41f975e7936bff,2024-05-21T16:53:56.550000 @@ -247159,7 +247159,7 @@ CVE-2024-27255,0,0,1a87ed865e33969bd25e1a85296cce48c9cd6a59a0cfe097079e825c89c05 CVE-2024-2726,0,0,86fe8b0d397a8074a2c940021570750a55036cbee3d4d8f0a542dcc682e4af2c,2024-03-22T15:34:43.663000 CVE-2024-27260,0,0,522ae8ef6f299c11a8fcb1cc5ace09319fb6956211b0f4d544d2205a4b18cf0a,2024-05-17T18:36:31.297000 CVE-2024-27261,0,0,bbed66d7d6087a4518d3eea41ca0d4f2f5d3d3e2b2ec24c87084c9ef60c5b4e2,2024-04-15T13:15:51.577000 -CVE-2024-27264,0,0,13e8d9f019860c2cefea18af28c143ff000ab8ae14ca69bbd1ade808fc47399e,2024-05-24T01:15:30.977000 +CVE-2024-27264,0,1,5b05058cab01af78485d8e87f447d715fe24de200504b4a03b12082b6abc7ab2,2024-07-03T01:50:28.290000 CVE-2024-27265,0,0,a52bbd360a6e47490ba11a2331048d18c2ebad63cb5bd9c43f26e021577a44df,2024-03-19T16:52:02.767000 CVE-2024-27266,0,0,f3ab0f27c5fbbc81843b4329fa53134d5b91174cad9bacbbc5dbf01cfacc3864,2024-03-19T16:52:35.400000 CVE-2024-27268,0,0,3c687588a19276e5b44431496d7af7239b9640f9b0218bde7d09fb0845bffcbc,2024-05-16T01:15:07.370000 @@ -247172,7 +247172,7 @@ CVE-2024-27277,0,0,6c09ef572e665868238fb6d81d7d941702112e8d7fb954bfa230fe4edfeb4 CVE-2024-27278,0,0,2ef9546b6eb3a76ad70be700186038d995dd630654759ed72b9b3d10968f6d39,2024-03-06T15:18:08.093000 CVE-2024-27279,0,0,a0a465925dfcee0f633443a4d3db070f2bf023c10d4135b020d1a0fbe76c5a4b,2024-03-12T12:40:13.500000 CVE-2024-2728,0,0,7421d8c55e6957a53bf73010cf85ba08bc0e32ff69843b7d1d465cfe4b69908c,2024-03-22T15:34:43.663000 -CVE-2024-27280,0,0,e50303bf4f44ffad0232e2c4c2f6388f57986e0547ef4b2e08c2be28e430a005,2024-05-14T16:13:02.773000 +CVE-2024-27280,0,1,06be16cf339e78f4b79ae71bca9b88fd97cb5e827ebeaaec64aef2e8ba93add4,2024-07-03T01:50:29.333000 CVE-2024-27281,0,0,3e7909b4ec22b1800139a5d6363ad5f7d4604c5ed61c884f67f94e877ee84ba4,2024-05-14T16:13:02.773000 CVE-2024-27282,0,0,6c498d8d3ca11839f8304e51870fb0650c23b00e373c0afe7416efbaa99cc19e,2024-05-14T16:13:02.773000 CVE-2024-27283,0,0,d0d6cc69e38ce7977029c4d3a011dff4f743808fa73bec6f0327124024522ffa,2024-02-22T19:07:27.197000 @@ -247182,7 +247182,7 @@ CVE-2024-27286,0,0,dc5e3eb074fb45a698b8815c2cfdfbf8ad2c6a1a603a9be18fc4332e22258 CVE-2024-27287,0,0,d39a5a81bba12832000063f3b9581e0b7d6775f42d5ae8b4ab36f6d9201b4612,2024-03-06T21:42:48.053000 CVE-2024-27288,0,0,972b8881fdda4caea1ce2e8251f4902d5d9c956c56f59d23bb4c51d8ee2f2790,2024-03-06T21:42:48.053000 CVE-2024-27289,0,0,94a320fc3e3b519521594a16d2cd589eda8024b7301f94db72ff8831b436ae41,2024-03-06T21:42:48.053000 -CVE-2024-2729,0,0,4e68ff60ec11a831f00831614845f504bbe5ad2c0b8a6f725de994373a6baf6a,2024-04-18T13:04:28.900000 +CVE-2024-2729,0,1,014913c07d07a7d30dcd939763c2e1443102e2977a3cd1720a301d0534e829c0,2024-07-03T01:53:30.393000 CVE-2024-27290,0,0,46afcd058e69ddd463d55bd6114c2bf186c2c4e4a355006dc3d58bec7a9da571,2024-03-21T12:58:51.093000 CVE-2024-27291,0,0,c4d0ad0c0399c8997dec37bc4474b8774cfe2b824eca646ed305114cc011e11b,2024-03-21T12:58:51.093000 CVE-2024-27292,0,0,d01fe4db95f9c2e2ecef918b2a428f31ae89268ce31a396edf76121b103b1264,2024-03-21T12:58:51.093000 @@ -247207,7 +247207,7 @@ CVE-2024-2731,0,0,7242593ba3e5c5b48a25383d38b7647a4613c0186c7dc999e27ef7b770a540 CVE-2024-27310,0,0,b45f8a5f5df268ee7d6f50eae8157f5ceefa5fce0c8c6b70a667f82c7c056cd0,2024-06-07T09:15:11.247000 CVE-2024-27312,0,0,9f35cba247fedea3f548006ffd04728d6c9e275ad8e782791ca1754778b6d39d,2024-06-07T09:15:11.640000 CVE-2024-27313,0,0,abfc55e858edef62cf245a012f5c8675eea16323079fcd802a4ef8e6ddc5d69c,2024-06-07T09:15:11.917000 -CVE-2024-27314,0,0,6298273c443ed75c3ff6a9720e799c95ed2e5c3d14076aff1cbea4fe45a2368e,2024-06-07T09:15:12.277000 +CVE-2024-27314,0,1,507bfabf98c061d8de81cbc1d95b3b58842135d25b3a81edb36b7651b27ac69f,2024-07-03T01:50:30.720000 CVE-2024-27315,0,0,1b06bd54abb4ee7969c3aca53e6bed402762ed42c4492d0ee8674e3fa0b42312,2024-02-28T15:15:09.670000 CVE-2024-27316,0,0,b47ae7ed2f6b6d0404e92040d827962fa7519af4fad78f5cadf42a3a74fb9b8f,2024-06-10T17:16:22.980000 CVE-2024-27317,0,0,c3dded617afb79b595cc5394bc34fa2395e63ed9fe33b66ba0cb8f90b0b09bad,2024-05-01T18:15:16.097000 @@ -247241,13 +247241,13 @@ CVE-2024-27343,0,0,45c7ed1c4eed9ea624ee8b5def6c8c375e3f0f3011b69d57beef7384d6bbc CVE-2024-27344,0,0,8aefe242670cc36dda0dce3798a7acb646a2bde29ffc66b45e4357a4348e3048,2024-04-03T17:24:18.150000 CVE-2024-27345,0,0,fe911dc85212419c00cd206bd5ce379cb6ba140e18be3c5480a17f10aedd8eb1,2024-04-03T17:24:18.150000 CVE-2024-27346,0,0,386b701029626639fdc143fc77e569108911d00594cd7781652dc458bf9d469e,2024-04-03T17:24:18.150000 -CVE-2024-27347,0,0,60a93be8afd2fcd06e9544a59825efe159e7b160c5bb04f2afd79efa1c98e3e4,2024-05-01T17:15:30.383000 +CVE-2024-27347,0,1,aa6bb96be7bc41dc2b8b854a600f1bcc7744ab20513fb28f41f361c130b3e452,2024-07-03T01:50:32.683000 CVE-2024-27348,0,0,d98966d101bef8f3ba7865313a7b82f5808acf763b8f01d477948e99d880afd1,2024-05-01T17:15:30.443000 -CVE-2024-27349,0,0,e89c7c92e57c71cb6c79dc1a19ad63b57f0d549f77ae92ba9c2b3f4e55005468,2024-05-01T18:15:16.273000 +CVE-2024-27349,0,1,88b94935f18791608992594036627e2f38bf8f66250b8863a7cf3ad8bea894c1,2024-07-03T01:50:32.910000 CVE-2024-2735,0,0,0fc46982ae2bb65c79d893d71d43586449f915b196de8114a5c92c3c81993284,2024-04-10T13:23:38.787000 CVE-2024-27350,0,0,5597abb0ceda36739a00afc67d358c9c0f6015c501af0eb35c72e1c96465f58f,2024-02-26T16:32:25.577000 -CVE-2024-27351,0,0,2ac2acce5ea2d788011c345a3cb3826063d4d354be03f1b01afdeb5e54341432,2024-05-01T17:15:30.490000 -CVE-2024-27353,0,0,3af425ac275286291683a33b3c47ae2bb760f11da9fe50c1a7f1324913127e48,2024-05-15T16:40:19.330000 +CVE-2024-27351,0,1,5a36bd6e7f8b98dc30dfca7d22b6d4573152d80044f0f10dfc41d8abe078fc7e,2024-07-03T01:50:33.137000 +CVE-2024-27353,0,1,cbcb4ed0cb0d6b5421bdc80855b33d7fe1407fb7f951e4769d290990900afec8,2024-07-03T01:50:33.967000 CVE-2024-27354,0,0,3ace96f0cae30cfccef0c08e69f46a230792c5572ff398d91aa2a719b3624556,2024-03-21T02:52:19.927000 CVE-2024-27355,0,0,f69927749d318ce3d471850deb21bc77767a9c94b5f501be3a1713c1109a5c66,2024-03-21T02:52:19.970000 CVE-2024-27356,0,0,2464f4bdc7cd759969915038df7055199f0bd02c6d9b1a8ceb85c7588507e9ba,2024-02-27T14:20:06.637000 @@ -247257,7 +247257,7 @@ CVE-2024-27370,0,0,5b56b4aec0b74e65c542ad5e11bbce934e8a13a6890d7d5fbee25660d9ce6 CVE-2024-27371,0,0,9a5ee3ff6f4187d583cb003bf2bfa499e427c66f27dff5bb486ff8a2172d0862,2024-06-27T16:40:45.063000 CVE-2024-27372,0,0,65a4e6083a0e4ea46660ce2ac40164e0a6aada29e2b404abc66d633a42676525,2024-06-27T16:41:21.603000 CVE-2024-27373,0,0,a5f85bf1fd75d6fbe892aeea2fbeb2e36f32ed9ba5cc01854079a9bc49e845d8,2024-06-27T16:41:34.797000 -CVE-2024-27374,0,0,bd7738519b11de2e26f481267980d18f6433d786a5c9e284e466087266c6b5f9,2024-06-27T16:22:34.347000 +CVE-2024-27374,0,1,3b34220f69671b36a06fb2439f20f7eba7d2c207b7eb01a9af38b33fbd61591b,2024-07-03T01:50:34.903000 CVE-2024-27375,0,0,6605f9f7094be90dc73fada9dcbe43de56313caed93bade5130eb807c0e7fb79,2024-06-27T16:23:15.020000 CVE-2024-27376,0,0,fed48e9f8125655fdf96661c1312e2c746857548fc664043f2915d6a240e8599,2024-06-27T16:22:54.273000 CVE-2024-27377,0,0,769553f4327ff876a97da185a25006beb31a3bcc617248132a6ba5aa2fab8f09,2024-06-27T16:01:21.063000 @@ -247274,7 +247274,7 @@ CVE-2024-27390,0,0,088d48d2e2c1bcbc528cc1356aa6950519935849f26ef96b1de44cf555978 CVE-2024-27391,0,0,65e70f3aa31d54f10a2175246c716de3159fc241796a5925ea0202b5aca1491a,2024-05-01T19:50:25.633000 CVE-2024-27392,0,0,18daf9b92d6f4a5d902800f45a93c4399e05b57b0a6af86e6495b3c7c8276140,2024-05-01T19:50:25.633000 CVE-2024-27393,0,0,abff7d3b8b6a93c872388469215c515ae6242ed29551d606546cbdc1cadebd04,2024-06-10T17:16:23.223000 -CVE-2024-27394,0,0,5f3b48017ab68ac2baf99659dbcc7502dca6d5bd073c58ee1148f9b029b4147b,2024-05-14T16:13:02.773000 +CVE-2024-27394,0,1,67112e71836ab43c8ed49fc976b35d6b12c82b3bc282714292ffbd79ee2fef5b,2024-07-03T01:50:36.103000 CVE-2024-27395,0,0,98f969ef2089a9bfd038e0010d850cce07aa0fbd924ac06a86915809550f6eb8,2024-06-27T12:15:24.577000 CVE-2024-27396,0,0,42553a414ba04e25cb84edcc00ca276fdab11b8b6aa0359262c770174c4693f1,2024-06-27T12:15:24.647000 CVE-2024-27397,0,0,20cdabdacc1a91eb0fa4ef8f472950cd97f44c72e319ec51c8fec0dd6043366e,2024-05-14T16:13:02.773000 @@ -247286,9 +247286,9 @@ CVE-2024-27401,0,0,baf7cf6d1266783f7d59648e66746111df25d32dd02c98387b129cc05c99d CVE-2024-27402,0,0,09147ae02a3a7a2264bac7d60094578346abbac731c3e7adfecab21418aafc37,2024-05-17T18:35:35.070000 CVE-2024-27403,0,0,6a5707a6f954b40be9e3b6c26d5507b4b7f1f5c9197cc64654509565a2ec7207,2024-05-17T18:35:35.070000 CVE-2024-27404,0,0,4237c01d8ab9cf8456ec0aa70f7e9a2f19875e407f4983ea57b89219830052cd,2024-05-17T18:35:35.070000 -CVE-2024-27405,0,0,e22ba9a2f2f16fa23a4dda3e9dfb96bd007c5d9723816c829a6f7c795f8f0d62,2024-06-27T13:15:58.107000 +CVE-2024-27405,0,1,87e9f55f3568c2487fcf6017cb2d7861f4033217a20084a0c240897fca1b7345,2024-07-03T01:50:37.447000 CVE-2024-27406,0,0,6435bcf8e953210d5be13edfe9d91f7384274892bbfe873bfe41e9b71332ec13,2024-05-17T18:35:35.070000 -CVE-2024-27407,0,0,d4a85656bb9a3d2ab118803bb206b3ede2c953a34c749d63998c454190e577c0,2024-05-17T18:35:35.070000 +CVE-2024-27407,0,1,f3c05cd23d444b53011bcada5eb1e95ae3ca95e51b4457a17eabb9e5ca7c50fa,2024-07-03T01:50:38.343000 CVE-2024-27408,0,0,0572afe7277c29f5abd1e0f4e403754ad27372e133b70e7aaa80e2448c5b5c7c,2024-05-17T18:35:35.070000 CVE-2024-27409,0,0,a88069aee368bf34a4979a9a3b6d9d7d28d6f70a563fbefdbfa8560ce32534ac,2024-05-17T18:35:35.070000 CVE-2024-2741,0,0,72a13180f65eaa34946651eb5c88084bf0e961149a90b72b29d8dddde47c3326,2024-04-11T12:47:44.137000 @@ -247314,7 +247314,7 @@ CVE-2024-27427,0,0,a5e0bb1eb9dddbe621a76038e97dbb5a1e22ad2d3eee07e0a566bbc8af043 CVE-2024-27428,0,0,ea78bb280f9a53a6b506787004b62c38d567896934657d8b3f5126f855f09118,2024-05-25T14:15:52.687000 CVE-2024-27429,0,0,ec3689eecc91e5ba4faa53ce00f63d5adc063318e2e0b4f5ade93be78bdbcd4a,2024-05-21T15:15:28.810000 CVE-2024-27430,0,0,e8f5f3c3f666b15261835cea03a1b31ed58b3552a000ce08076960981f5e6ac3,2024-05-25T14:15:52.803000 -CVE-2024-27431,0,0,7fe258ab2fc8f534b54ee2e9c55e33f3f2d56b5fb5b150aa59c7a075d9d775b9,2024-06-25T22:15:29.990000 +CVE-2024-27431,0,1,f0b943d0779f4c0250316bc3e4f86930ac87e351769e7377bcc9a253794ae476,2024-07-03T01:50:40.003000 CVE-2024-27432,0,0,bd5937e394f88597ffcbb76a366023ae78d17301b9b0df7b8cd54461933e850c,2024-05-17T18:35:35.070000 CVE-2024-27433,0,0,748a157ff40623987a9ce9e7520b789e1e0da033650e1c52c5ba9d314e1f74bd,2024-05-17T18:35:35.070000 CVE-2024-27434,0,0,d841fd1dcd86a1f8018e08863074d3e441327d97f4f98a84814791f719b18dd7,2024-05-17T18:35:35.070000 @@ -247343,7 +247343,7 @@ CVE-2024-27476,0,0,8cccfbd88a289b73ae2a82f1969e7e11b3256be620bf6a323e970ad5fee54 CVE-2024-27477,0,0,475b0780b17016d259d91214e57785f69e50a4f85e3c7b3b34cb0c00dc852aa4,2024-04-10T19:49:51.183000 CVE-2024-2748,0,0,cea6a4ab9c8e50f2f7b04d95a9a3a983480b862f6880d1aa4b59ef11a50c4683,2024-03-21T12:58:51.093000 CVE-2024-27488,0,0,a11ec8781330011d7d2c9111350fb429a691d0d011b5b0ec6e5912d62ef9d791,2024-04-08T18:48:40.217000 -CVE-2024-2749,0,0,15bf252598be006305ab3dfdb472a94389f6607d5fc856f891ef57336dc8de85,2024-05-14T16:13:02.773000 +CVE-2024-2749,0,1,1d41dd2f9a8ec812d743eb2503d3459b40e5b74ef406549f3f22535f8f1ae124,2024-07-03T01:53:31.040000 CVE-2024-27497,0,0,bf2a79c4e0ba614def454bde2dd33c58ed2360c3c6db31ca982c34485458d0c9,2024-03-01T15:23:36.177000 CVE-2024-27499,0,0,390358464fa22ad31b65f9d31827086f66523c12c4d3b7c65414a80ffe5fd4f0,2024-03-01T22:22:25.913000 CVE-2024-2750,0,0,793615775ea67e5aaa15784497f8741f13964297cd422277d144de589da63db5,2024-05-02T18:00:37.360000 @@ -247351,7 +247351,7 @@ CVE-2024-27507,0,0,8c49360d0ef5426050d1f79db1fc5fe5b76497de80bce0c2485f14be48a59 CVE-2024-27508,0,0,040c763fe5f3ce1aa685f7456be4b1599a5d1d348a6a3ea3969c861bb92ef9ee,2024-02-28T14:07:00.563000 CVE-2024-2751,0,0,048a4865e89bf3e291a581857de376753d193bc7f3c741677d219a1ffc0f7e38,2024-05-02T18:00:37.360000 CVE-2024-27515,0,0,f99f7250526320b1e7250419a5b3dff4ee674d7e75fbaa06a1a665327078fcdc,2024-02-28T14:06:45.783000 -CVE-2024-27516,0,0,bc77d943dca3237cfc969969b912fe04cfc9a7bb141bbb351e6e03a84319d787,2024-03-22T03:15:07.923000 +CVE-2024-27516,0,1,3dc18d3982e9b3ac9d2998b4f4d3df66c427d5d211641c6aee2d4c423b9aacd1,2024-07-03T01:50:41.420000 CVE-2024-27517,0,0,eaf81e12deb64dd8d1b2d24380f4196dfb242fbf2c45d957e1074397f4677a35,2024-02-29T13:49:29.390000 CVE-2024-27518,0,0,d767806bfefeb1852934300770c4563b38304048001d8b1ab83b8a57e2574266,2024-04-30T13:11:16.690000 CVE-2024-2752,0,0,7ac7e54b3b6d9b85b342200600a035abc39ba2fc0d9149450b049bc12eee1885,2024-05-02T18:00:37.360000 @@ -247370,22 +247370,22 @@ CVE-2024-27565,0,0,96e6f13815f4c6a293b19a63ca7a0089b2c54f0432c50f30c4cd3de5a637e CVE-2024-27567,0,0,4368e6c3c29630571d47ba92cf82bb82637985666e0ed1ee7f11385613c02512,2024-03-01T15:23:36.177000 CVE-2024-27568,0,0,323797eb146837ccc897ceddbc9a717a6133487b17fde4d619016ddccf714199,2024-03-01T15:23:36.177000 CVE-2024-27569,0,0,000ff88e8ff4678a3790d0ee96674581a9a53afd1b5f0d49033b717c5dd656d1,2024-03-01T15:23:36.177000 -CVE-2024-2757,0,0,2605928fd157f4e6afefcdc5f624ef9a840bf3b7389bfc1a78ff4ebf5ce8becf,2024-06-10T17:16:25.537000 +CVE-2024-2757,0,1,4c422aba4be6a9a5da2652e2a836599ffe438bdae4eb45bb7067f46f34ffd36e,2024-07-03T01:53:32.100000 CVE-2024-27570,0,0,30e1bdadd931878127199d0565523cd94923921178695ba62d569ae38e48386b,2024-03-01T15:23:36.177000 CVE-2024-27571,0,0,2fcce61cb867ec2a650e4bd74e7018e990625a473882c12953648f5c8c2545b3,2024-03-01T15:23:36.177000 CVE-2024-27572,0,0,6169a6a6221da5c6dbb1556f7b45e6b45c4deebae5e21607b1e3cfa478f1fe5b,2024-03-01T15:23:36.177000 -CVE-2024-27574,0,0,8e35363a297bb354ed77e854cc086ede00fd9f4b0bf134e0bf41d2ca17f3da6f,2024-04-23T12:52:26.253000 -CVE-2024-27575,0,0,fe78cdbfc48ba2557faf61957a122c11738e27bfad3d91860b0cc50d57150a36,2024-04-07T04:15:07.723000 +CVE-2024-27574,0,1,3445d7e232fea473b297543f2639b454fd942ac9a4758abe8e2e7d31ea60e498,2024-07-03T01:50:42.303000 +CVE-2024-27575,0,1,be8794a9d53d194bc575e7dee32b34180e95b0c9ca647d9bec212ab94e155297,2024-07-03T01:50:43.093000 CVE-2024-2758,0,0,17991f9023170386d082f67ecd28c59f739c4b241c4acc5ac889665593ad11b4,2024-05-01T18:15:19.300000 CVE-2024-2759,0,0,cb410b99122b16bbafd55e196fc83701c95bae09fba9353767401f5fe587c56c,2024-04-04T16:33:06.610000 CVE-2024-27592,0,0,1ee880de3a9d61f4b25b2b3ac56dc03f1e8964452682bc0959dc8a13f2b2c67c,2024-04-16T23:15:08.690000 -CVE-2024-27593,0,0,cdef71c0e901eda15f536b4ae6225f30c0594f68da387f97635a90ec438a2eec,2024-05-15T18:35:11.453000 +CVE-2024-27593,0,1,029f3c2e91f81eb13ffd203db20809d92acce3f5ac8b5078e84e11d1f4fdb2ab,2024-07-03T01:50:43.897000 CVE-2024-2760,0,0,a061be605bfdf89df12f7caacd6b7263c7034257ee7260474dff7d3e633c6b9d,2024-04-23T12:52:09.397000 CVE-2024-27602,0,0,641d004f193cbc187bf560868353a5607871444565457a2a1f222c57bafe0082,2024-04-03T12:38:04.840000 CVE-2024-27604,0,0,5dd90a20288c95f7805059ddcbf501c6de9e3b933a16f752b43bf101ed5f2058,2024-04-03T12:38:04.840000 CVE-2024-27605,0,0,4f744199930e3e7e9b7f220c4e73a81bb4fe207bf4ecc2f618ea8f6d8437d165,2024-04-03T12:38:04.840000 CVE-2024-27609,0,0,f5d2fceb3a71c480d99c4c75cd0a83ffe0e0dd3a726d0869ef9aadec6a003cba,2024-04-01T01:12:59.077000 -CVE-2024-2761,0,0,cf834841c5b211eef0e0519a3f2694713d2a65d6dd9e3a3ffa371f6cc81ff7d7,2024-04-19T13:10:25.637000 +CVE-2024-2761,0,1,5795ed83fa99c1921b7aae8b1ff040c74f4ad844a04231fed91291049f2adb58,2024-07-03T01:53:33.097000 CVE-2024-27612,0,0,c510222cc98aeecd84a141efbf806cb4a31be0185bd980ef0ea0993f9e29a425,2024-03-08T14:02:57.420000 CVE-2024-27613,0,0,55e42cf2e4639a6096ea75af39dc974125f1048dbd4b80fc4aa61dc42e00d85d,2024-03-08T14:02:57.420000 CVE-2024-27619,0,0,ac27585ed59a6668049d75158e75afc441f45955e396bf2ead784d9f82b5977e,2024-04-01T01:12:59.077000 @@ -247445,7 +247445,7 @@ CVE-2024-27744,0,0,c100d4ba8f49a307e8f166c43dcf72396c641c27bc5c30f424e004f4b4c33 CVE-2024-27746,0,0,6f3ddced2e2b26bef51987507b4e7466957a803a9da415c8c1c8b245cafe1423,2024-03-13T07:15:36.470000 CVE-2024-27747,0,0,eff635f872515818dfe20352d610bb047327d7f6971e953c63bc92feb6bf3ebe,2024-03-13T07:15:36.523000 CVE-2024-2775,0,0,d091a1ccf78d17372f4f84bb820577e82fa0db6e70e795af7b29b14574f220d9,2024-05-17T02:38:29.683000 -CVE-2024-27752,0,0,970fca7c4ec7389f39a7d1047a6be210ee7d7567899789b6ea71437350f1c56b,2024-04-19T16:19:49.043000 +CVE-2024-27752,0,1,b5e0902297e1d9d8f0b79a5fa02c330bc4447f06ee56b81e4776b650e157a62a,2024-07-03T01:50:45.653000 CVE-2024-27756,0,0,a0b7876d1bcd508f42c19e34f906c00ccf4c6d4fd282b64eb52f33eb0c45850b,2024-03-26T18:15:10.693000 CVE-2024-27757,0,0,758da8d428041fb55cda5e8ed49e42184e30c0310dfccc74e01819218179190e,2024-03-18T12:38:25.490000 CVE-2024-27758,0,0,ad62de4aef328e51046fcc2255106ca410bd8ad59c431cc8a168005ae5bd0821,2024-03-12T17:46:17.273000 @@ -247466,70 +247466,70 @@ CVE-2024-27776,0,0,6275d390ba958ed1bba8b1d4de2ca05eb959bf7d338960cf80f1a89694c26 CVE-2024-2778,0,0,42cbc20405f3ee35374ef4ea72808c22dd795c7f7e01e3e442c0f4aa51ec7373,2024-05-17T02:38:29.967000 CVE-2024-27789,0,0,e8af3b8395ebfe2a50ae6a05a1719125fcf49e2fa7ab9962ec195038f09bfe15,2024-06-10T19:15:53.183000 CVE-2024-2779,0,0,7d93945d439dc1c56122930b3da6852f346b5a9c5c7e988befb1c7629d43acd9,2024-05-17T02:38:30.057000 -CVE-2024-27790,0,0,bcfd5001fb1cf915dabaeb0b530ecc91785155cc1894eb908f37345e8fae816d,2024-05-14T16:13:02.773000 -CVE-2024-27791,0,0,44e295d56ae82c935e7837aa163b1c182c6b8efd5ceb84b892de3324ac96937b,2024-04-24T17:16:50.397000 +CVE-2024-27790,0,1,1b39da6789d4ef1f12b3b596beb188b9a11f1e783662eb312c24bcef2ae1da98,2024-07-03T01:50:47.493000 +CVE-2024-27791,0,1,09b0597ca715a1f6ef86184b931742440fb3c3b5a01efc19b59894d859d878db,2024-07-03T01:50:48.290000 CVE-2024-27792,0,0,b95a839f6d92f70e579e6fb1f69e78add1d64a83552f4a2c177f2ea0f9d25269,2024-06-12T18:02:45.480000 -CVE-2024-27793,0,0,353572505ffd41c49c8a655c8653c3aeaf93e2259f3ba926c49eca056984adca,2024-06-10T18:15:28.523000 -CVE-2024-27794,0,0,f83311c8ff012592a70730809fe5cac1d0e670b37674538bd8092c8ae8d69027,2024-04-16T13:24:07.103000 -CVE-2024-27796,0,0,0f6294260561edcbf030914cbfc2e2f9112190409fca9765281ce7a127290cce,2024-06-11T08:15:48.723000 +CVE-2024-27793,0,1,1b6a23c11a935c27256b2d5a9880463f95ce349dd6e5eaa7f6bfd705591d7421,2024-07-03T01:50:49.173000 +CVE-2024-27794,0,1,b75d2039b6158a4929ffa606a51b07ea3ce814d9da4d930322d189103f2032cd,2024-07-03T01:50:49.393000 +CVE-2024-27796,0,1,4b7279c3feb336e34123ba67ded6045e38a903dedab1f07b2afe52f0d873a234,2024-07-03T01:50:50.207000 CVE-2024-27798,0,0,96770d0ca7d69538b21522ed5c1df64fc164bf06c1fda12cf5ffe66287c823eb,2024-06-11T08:15:48.807000 CVE-2024-27799,0,0,884ab3b726e34f80c319ede5bd0049a4beba35406e34d8151ad3d9e6a79e3ee6,2024-07-02T13:38:10.830000 CVE-2024-2780,0,0,ebb4d263bdb4979d90a73abab8050be4d34d6c520d6b3b8fff46d8c73490b44f,2024-05-17T02:38:30.160000 -CVE-2024-27800,0,0,4da96fee910effa9ec8224915d828ceed8f936ec6118057c5263adaeb2506265,2024-07-02T13:38:30.207000 +CVE-2024-27800,0,1,1195d6c6d3bb4b4cbf9c635f7205b297262d647bbfd1f49970d42c77f812d37b,2024-07-03T01:50:51.033000 CVE-2024-27801,0,0,4f37242e62570444393eedc0e6b0ad8e8ff66a897bd149ce4d1292d83e4fe3ae,2024-07-02T13:36:50.500000 CVE-2024-27802,0,0,5fa4df8e0fa4e055c45d206bab7fd01f5c4103a30fc3e7d9373406c7aa7c6468,2024-07-02T13:37:19.690000 CVE-2024-27803,0,0,53706579cbd6412d2f61db763826287c31c4944b996a096fc5d655cd875e9fe8,2024-06-10T18:15:28.727000 -CVE-2024-27804,0,0,b62a48f9287009a5776ff73fff04f1a8014c48cf3784f3553bc30fd3fc9e5868,2024-06-10T18:15:28.780000 +CVE-2024-27804,0,1,cc0ff5a5b94c6780767cdc22ac5b7c683a356469ddaa3536697d5bd02fd071c5,2024-07-03T01:50:51.930000 CVE-2024-27805,0,0,80bf48e5a18746668d82dbc585fcdc5e0dc3f16985a0a47b63c1fdbef2db8980,2024-07-02T13:29:10.397000 CVE-2024-27806,0,0,28c67af34cc68b2a5a6c23ba0a23708c28b0ee7df3bcafd7c779ecd50c264c63,2024-07-02T13:29:21.613000 CVE-2024-27807,0,0,a7b781fd7f96d6bc57a085fc734d11b31dcdd4417a6ae278ff1c40e2b1bf7128,2024-07-02T13:33:44.157000 -CVE-2024-27808,0,0,23e6e0f18c42379bca9dc57d10567b52b3e4dcd3533d41d3944d1614348cfa7a,2024-07-02T13:25:26.647000 +CVE-2024-27808,0,1,0e786fcdc7ac7f7247d972ac7ba3fbaa92c628a0afe531fe3d853f6df664bccf,2024-07-03T01:50:52.903000 CVE-2024-2781,0,0,7440c381afc245ac61500f5670c7b774787526dc48ee470e168c2fa8882d9975,2024-03-27T12:29:30.307000 -CVE-2024-27810,0,0,f36cf8877043b3c02a9350712f62c03fcb599625852fd9446ed0d3dcc7aa3a57,2024-06-11T08:15:49.350000 -CVE-2024-27811,0,0,dda1f55f7b6bd81c7e3eabb39164505d7c49bb0992798acbcdfaa884374c23d4,2024-07-02T13:26:31.883000 -CVE-2024-27812,0,0,32a33a1708511e171e22b47d57f0df70dbdd6798a5769e35cc8d8ef5f4f584ea,2024-07-02T13:28:23.257000 -CVE-2024-27813,0,0,e5f2882c5f57de51fb8cbfdbe3d9f69786dda1b139d68761ff0d9306574aba8e,2024-06-10T18:15:28.920000 -CVE-2024-27814,0,0,89c753947aa1af192111f29fccdc8bc3d4c8a6d444aeb81de9538292f7243ce7,2024-07-02T13:23:48.803000 -CVE-2024-27815,0,0,bf129f61c12bf99cc96d2a53fbcd74ea2fbcf6c64a51c522e274c1c3e166a819,2024-07-02T13:24:26.530000 +CVE-2024-27810,0,1,131d49a9ababc6e1b56ddd9789d941a01f074ae704d1acea7c3e5f91ec92a79f,2024-07-03T01:50:53.720000 +CVE-2024-27811,0,1,cf157c9c893021758020e95900f9b13420c68cf22fe15e38b0a93ed47fe613e0,2024-07-03T01:50:54.533000 +CVE-2024-27812,0,1,e7c3223e43baf8d7f28688930e2d8c8938ef379a12a8d3feb5b2d21387591196,2024-07-03T01:50:55.430000 +CVE-2024-27813,0,1,7509894567bacd8024514a5dcee7ac821e790e4f4fe9721e1c69cc172a7632d5,2024-07-03T01:50:56.220000 +CVE-2024-27814,0,1,4d984815b410e205b72405c2d467ac188e0b951fcaa72bcf867e3a4e9a308816,2024-07-03T01:50:56.430000 +CVE-2024-27815,0,1,d4d929e969df5e6d126561402877d5f150bcfd9ba0154fd52fd603f8c3293f47,2024-07-03T01:50:56.640000 CVE-2024-27816,0,0,796a750f65ffb329e29033d8bba60513b21bc14881ed71a1b811a2e04501ae1b,2024-06-10T18:15:28.970000 -CVE-2024-27817,0,0,ddd2da83f4b7748cc856d3e260ff0201019ae172fcb38433bb3a1df4d28887cf,2024-06-27T18:20:29.193000 +CVE-2024-27817,0,1,a6ab5e337d8094f63b0da74ff4d2361a68df33c6031350054ba5dcf0e38bfd15,2024-07-03T01:50:57.557000 CVE-2024-27818,0,0,53d578e3a0a5c74afcd3cfe2146b5bdd30d3ee9cca34913d6e2df31ef7d7a6a4,2024-06-11T08:15:49.700000 -CVE-2024-27819,0,0,0662cb5a059c79921f698b1fa7c0491c2dd5e5bafdad44c59c0700dded8ea3b2,2024-06-27T18:20:15.513000 +CVE-2024-27819,0,1,b01d18af8106a4eb630a10d613bb8fd3a0b60e4d3d78300e68d51ac0725c6ff4,2024-07-03T01:50:58.300000 CVE-2024-2782,0,0,91d9b539aa31e7a5bf0be259f7ee77e02d3f24638d700db95962fd57c1db4b96,2024-05-20T13:00:34.807000 -CVE-2024-27820,0,0,a3bf17c8cef2eb78d9aa1475aeeb1f2a5bbf7c4f4ca14da0224509fff6e490d2,2024-06-27T18:19:33.087000 +CVE-2024-27820,0,1,a1605198dcbf5219cf280b9649bff24b5d5f9453251b177f1725c884a033aed8,2024-07-03T01:50:58.540000 CVE-2024-27821,0,0,1de7b9a00e0f15ecd864890bdb004777a3be2018051ca91dd74315d450ee5849,2024-06-10T18:15:29.097000 -CVE-2024-27822,0,0,523a0187399a43dcbb08e6d44e81c3f2dbc8fa1f2bc5926aeab19b9c97bd93b4,2024-06-10T18:15:29.157000 +CVE-2024-27822,0,1,00b8edec8aa3387668b84ecf0596531970e488898abd3e050f82e3809ca5cb58,2024-07-03T01:50:59.383000 CVE-2024-27824,0,0,bac18298cb87bbf4437c3c19802ecf7c192a4b0487eb1723234b03d4506aa7e9,2024-06-11T08:15:49.830000 -CVE-2024-27825,0,0,37ba7296b9e432dd36a2f579aa8aa6b1828ebb3ec4651f97514f9da1fedab657,2024-06-10T18:15:29.263000 -CVE-2024-27827,0,0,f606ee564bddcdd28f55aa4bba96bebbc2683729b049ba42feab41bc19daec3f,2024-06-11T08:15:49.890000 -CVE-2024-27828,0,0,384faa88fe1f82c31929bf57b145ec81a72064abfa68625d0d8a2a6c1a9329d4,2024-06-27T18:09:56.683000 -CVE-2024-27829,0,0,24825b1ab4796019403a414c0e4a694a721b0ade700a310f7fa91966f0664d24,2024-06-10T18:15:29.377000 +CVE-2024-27825,0,1,56d745c63f5923700ccb89bf72b89b53d35743fee3115939c5b740b7e01f6df0,2024-07-03T01:51:00.263000 +CVE-2024-27827,0,1,cddbc1abcd04a5361aa0d1e9cd6f7e77fbe95d6c2f77829fa9afe90c486dfc2e,2024-07-03T01:51:01.090000 +CVE-2024-27828,0,1,ce24f26049ae95ba26226eb49c194da6cf3360ec68cebf954b176dbdf142d332,2024-07-03T01:51:01.887000 +CVE-2024-27829,0,1,29662b914240e4af6a8df4845b3cfc144c064fdea834172457246a33af580145,2024-07-03T01:51:02.723000 CVE-2024-2783,0,0,5e3d9294a74b759ac7450c1cf79e73d07c944f71ed4c195d3306f256a09a6879,2024-04-10T13:23:38.787000 CVE-2024-27830,0,0,6653b2da5a37d39ef2226e875871935d95521e7b5255b78b4c573dab71498ca2,2024-06-27T18:10:32.247000 -CVE-2024-27831,0,0,527b1c31917e9e7dbf7a5012d7794064aefb3c85cefdaa6fee1b53b3ecb3ad97,2024-06-27T17:29:26.540000 -CVE-2024-27832,0,0,03cb78d39783cdf87a376f92e361ef1b9d3f45ad2550aae07c1e0e55a420f86b,2024-06-27T18:10:53.993000 -CVE-2024-27833,0,0,494bead0bfe43ec3d81fb2f69ddd8cb683d80bf9882a9dde030f2a58904d8f30,2024-06-27T16:58:29.140000 -CVE-2024-27834,0,0,e2167083bfd89b6181316b7a7da6384936e2657f954430f9692723151f42b5c8,2024-06-22T02:15:44.787000 +CVE-2024-27831,0,1,d329789678dec21e4f63d88045f001e21097b4a93f4f6c593e93222f147b572c,2024-07-03T01:51:03.627000 +CVE-2024-27832,0,1,1c0abe513a18598fd26800bd617f0bcc215d7bddc730b421b0d506e5f4c6e19c,2024-07-03T01:51:04.443000 +CVE-2024-27833,0,1,88977c443f553604d1509740afb5a1d15d5bfa1b09ae539bfe66a271b80b8f6c,2024-07-03T01:51:05.337000 +CVE-2024-27834,0,1,06794ec44703c3870f34ff1d3005d79fcfa8a16205b060c7ff641078012e5cfc,2024-07-03T01:51:06.170000 CVE-2024-27835,0,0,c3d25dd6cfd2f797e5af53adbf0373a3dd203d6ad6e8d11af15dc203eb2402ab,2024-06-10T18:15:29.497000 -CVE-2024-27836,0,0,b773dd708601dd753c7be7ee6eed395801286dc6a375875b571ce4e6543608f8,2024-06-12T04:15:12.133000 -CVE-2024-27837,0,0,901f3c3a397896b090baa01f5e16b0462e9f3677320c7d083f0561d63284135d,2024-06-10T18:15:29.550000 +CVE-2024-27836,0,1,d7e5142ca6fa7487d04f3b56f1546b9e918b549b4e15b6dab3f84f5764bab6bd,2024-07-03T01:51:06.973000 +CVE-2024-27837,0,1,7e4bb4d9cc28d81f3afe01a685bcf2ea16ed26bf202a4b18649d6d977d69ced8,2024-07-03T01:51:08.273000 CVE-2024-27838,0,0,7572685344f037b7f96c99b7bcecb088c1b65cdf3f7efc49191c8482465b5e8a,2024-06-12T04:15:12.237000 CVE-2024-27839,0,0,dc2551c161bade026d50a7722610913c7d6281d71628fa7705ad0b54f8ad144e,2024-06-10T18:15:29.607000 CVE-2024-2784,0,0,ba1190a588b039c20289ccfefd73f048dc164c370109c9a0315fb7e323728a74,2024-05-24T13:03:11.993000 -CVE-2024-27840,0,0,c15e3a423b01bc3a5ad458bff4ab4dff98f8fd08c3d59eae01bead4fca3d00d4,2024-06-12T04:15:12.327000 -CVE-2024-27841,0,0,160e608c0f194092a3d3fa2958525a7ea0dc3c80c71963835592dc22256a7e3a,2024-06-10T18:15:29.657000 +CVE-2024-27840,0,1,56fa4740b346bcb911ef828a7fa1d3a0a599df16ab19781ac80272f5dc7a8547,2024-07-03T01:51:09.067000 +CVE-2024-27841,0,1,c196712b25e7bd8d66323b49a59c084563ec41f23c04da910219b17a17279957,2024-07-03T01:51:10.377000 CVE-2024-27842,0,0,c2f4ad1e4648fa9ae5110e6bcc4b9d3a34413349e7ab03cdd6ea669b8d6af4f4,2024-06-10T18:15:29.733000 CVE-2024-27843,0,0,caaa2b70673c0fd7a60807026442c43e55ad72502b0f967bc1cef9c19a74b1af,2024-06-11T08:15:50.327000 CVE-2024-27844,0,0,84fbe7cb07be50d1cdab0e609209638f2d6f39906ac0812e2fb3c162808a8348,2024-06-12T04:15:12.407000 CVE-2024-27845,0,0,d4eebf73963a1d2d1c6adb57dd2a336a70657901886f6dbd008cb17709c2b955,2024-06-11T13:54:12.057000 -CVE-2024-27847,0,0,5b46b94da4559b57e8ec553aeceab469e79f3b10d85d6cbba1ed5528322d1b03,2024-06-11T08:15:50.523000 -CVE-2024-27848,0,0,4b368180f5fb14dc7e8ba14f94ddd18f6e4398ff6552c839e866b31d453172f1,2024-06-11T13:54:12.057000 +CVE-2024-27847,0,1,be6eb9a0d20bc008efd3235440ec5fe6670ad0bd2a6cedf0bc5d5f0b0c4962ca,2024-07-03T01:51:11.167000 +CVE-2024-27848,0,1,1019ee2043aa67690938b0d1fab41d1c381553edfbc383541ecf82e7495fcbfa,2024-07-03T01:51:11.980000 CVE-2024-2785,0,0,f421029e3ad60193115519ce84f2fb34a615c8431383b64062041ee6b872f244,2024-05-14T16:13:02.773000 CVE-2024-27850,0,0,e1d4379d6b3d34c01ebe4dd5e7858f8de64aeb5953240c61d195d17d1f48e9f7,2024-06-12T04:15:12.480000 -CVE-2024-27851,0,0,2f7870d15a5cf33928d720d3e13b0f4afb8834ce510ccac560c34b016b0a9696,2024-06-12T04:15:12.577000 +CVE-2024-27851,0,1,20416253b2599df26c3b322a6efc6a4efc655856220ad817be23d3b30dc68157,2024-07-03T01:51:13.350000 CVE-2024-27852,0,0,2264a1594190812a9b29fc0e3f886882ab3c63c917f94e71ed2dc96c8e6c2c94,2024-06-10T18:15:29.900000 CVE-2024-27855,0,0,7a41b8238436a46025b45552c8cda3356564589cbbf3b4bae7d5eb20d8672a8c,2024-06-11T13:54:12.057000 -CVE-2024-27857,0,0,803d8efe7bb49cf3c18a557e9bdcd3fe89c30050e4113fcd0f030929c76c160d,2024-06-12T04:15:12.663000 +CVE-2024-27857,0,1,c656440d8235ebe336c8f0cb6c0dbbed059f704b9d7b7858d9d6b284ae7c3693,2024-07-03T01:51:14.753000 CVE-2024-2786,0,0,dcf647d15f4b220698a959a93f7a5cdfd4a7ecd495ee9aa1ef69052001df8b00,2024-04-10T13:23:38.787000 CVE-2024-27867,0,0,929b60a50faac760812cfff090aaa2b01b31cf8cfca2ab2ec6bdf5a9e5f514fb,2024-06-26T12:44:29.693000 CVE-2024-2787,0,0,496195d9f69f32f0c6a6baaf1ee3e4e62db7dfd0c17c88d9010b922be319ee45,2024-04-10T13:23:38.787000 @@ -247620,15 +247620,15 @@ CVE-2024-27970,0,0,400f0279b55b3a379ae4cb2321b0f7168d543425d3ae3678bf6361a1a4e68 CVE-2024-27971,0,0,d8f83462b30f7abea583d1edc858a6bbe9d2ee807d2040001abf90463b63d4fe,2024-05-17T18:36:05.263000 CVE-2024-27972,0,0,e0f7933a8078741e5e2cdbc1c8aaffaa42eca2ccffc4cf4f10a410272b4fcf47,2024-04-03T12:38:04.840000 CVE-2024-27974,0,0,c5d12161a6a294fb4d33a068888d07d2dec693f9073d8d47f06182bf4fe2779a,2024-03-18T12:38:25.490000 -CVE-2024-27975,0,0,5e723b988881d768c48479414306df95a821f21a86f27f09cadd1c6d52236353,2024-04-19T13:10:25.637000 -CVE-2024-27976,0,0,f3b1e833dad783111ddd8bfbbe0149eef66e07b7a8072b5581df7564368c462e,2024-04-19T13:10:25.637000 -CVE-2024-27977,0,0,79115d830f48a29f88dcdaaca48ae6ee1fb6d0fb09d17cc8101a8fadff78d08c,2024-04-19T13:10:25.637000 -CVE-2024-27978,0,0,e9674be0e16d316b4e2f9c28404921788d0b6676687576369bca16c3012670cc,2024-04-19T13:10:25.637000 +CVE-2024-27975,0,1,628fa6593d5d98fbf43326e7307f982b7a57304446d55cc554f5b8b82b744b9b,2024-07-03T01:51:20.333000 +CVE-2024-27976,0,1,f6d7730a29882f81108291258e14f13d29a2159cf5abda97fb8b7490244dab5e,2024-07-03T01:51:21.030000 +CVE-2024-27977,0,1,09cebd1c563d6c711f33424e2c16188d6c5dfd54056f5a0f51dbb6772ec18b17,2024-07-03T01:51:21.727000 +CVE-2024-27978,0,1,250783b0f69a457469cf7c694c435403bad621cb087de31c6c68f131268a6f51,2024-07-03T01:51:22.450000 CVE-2024-2798,0,0,ef363290583ea8fbea084f3f83308db5f7af67c2905e490208724743ab38649d,2024-04-23T12:52:09.397000 CVE-2024-27981,0,0,bca4d502eb0003b495c2e3eabf4c8b77f995ffb842787b13a54996fb18ec7ff9,2024-04-05T12:40:52.763000 CVE-2024-27982,0,0,42061925be258b071db85ebd10bb4ff691889b4a60a16c6ca316fce35b36c5b0,2024-05-07T20:07:58.737000 CVE-2024-27983,0,0,b25fa75eaa529fe5fbf704f9217a9d69265c5031797b3ed896ccaf3501376ba4,2024-06-10T17:16:24.277000 -CVE-2024-27984,0,0,ee279ea71cab569d834a91520f5be7e4eb6eb4d684563974daf49b55af180ddb,2024-04-19T13:10:25.637000 +CVE-2024-27984,0,1,ae27a7b8caa0cad11075a3923e9ec947bcb71041ebacbff9045e417bd43dcbe8,2024-07-03T01:51:23.260000 CVE-2024-27985,0,0,955e6906e119ba8a42b7cac63660ecdcdbf497ae4a9c4abc6cb5033779d5aab5,2024-04-11T12:47:44.137000 CVE-2024-27986,0,0,221ac31a72264e8303bc0dc716d0bcad27f92aa2e3b64824247f9d02601983b8,2024-03-14T12:52:09.877000 CVE-2024-27987,0,0,457341cfe208a4dd4f1ca3a12fe23df96b337000dbd585aed58689be29e5bec4,2024-03-15T12:53:06.423000 @@ -247655,7 +247655,7 @@ CVE-2024-28007,0,0,856400479dcdda77e4b92ea6ef968816e66403c31f41c4cf24dafc318e3d2 CVE-2024-28008,0,0,d72d4796ccaf88b2167ea2950481d0bc280f9113b19c229fe97b70a39b77a56b,2024-04-02T06:15:14.930000 CVE-2024-28009,0,0,c2c2436eebdbd7704eab9297f24c9de71f8b14d7fbbd8a1528121414abab2252,2024-04-02T06:15:15.013000 CVE-2024-2801,0,0,087a2faf2cb39a083c3eb84242cefbf2b12fc23d4cbc6e70d1aa13cdadbcdcc0,2024-04-12T12:43:46.210000 -CVE-2024-28010,0,0,0be8a2352f0d2b81493c1a7e97568927fcbb265e0cc2658cb22f7b01a02ab00e,2024-04-02T06:15:15.097000 +CVE-2024-28010,0,1,99860cf8bf9189a8fb49a5935a3491edc3fdb8468d4665570b920e86cd7975a4,2024-07-03T01:51:25.390000 CVE-2024-28011,0,0,72da78acb5d3e75903bb8a28fff758885737a9a35bc760b6b460427c253c5d2d,2024-04-02T06:15:15.187000 CVE-2024-28012,0,0,b601a511e5c3061f586efb79dc5f31b5cd5b0f7397ecd414486a50f8e8994055,2024-04-02T06:15:15.263000 CVE-2024-28013,0,0,09b3d3194605be82a334453e16c64b4fd4730562b24b053d4872b80ba9919073,2024-04-02T06:15:15.350000 @@ -247686,7 +247686,7 @@ CVE-2024-28056,0,0,90e95402cb85f2ac6aeb96939956a4b0fb83eaa680280e3c7780943b8521d CVE-2024-2806,0,0,b62277c5d63601c4bcc81a2e918e4a750bf1a36445b883377dd7b976192345cf,2024-05-17T02:38:30.940000 CVE-2024-28060,0,0,a862e65a45592f53526175ae7b2f45e31eaff0e3e5dd6ff429a8d592d5b677a4,2024-05-29T13:02:09.280000 CVE-2024-28061,0,0,cc1d081ad33f2dafb0011f89af68791d1834366cd78823472243a6941ea341e8,2024-05-29T13:02:09.280000 -CVE-2024-28063,0,0,5118a72cbd753b6f7fa91ed78af1abbedf3683cc3e043cf25c89ac47f8f04d7e,2024-05-20T13:00:04.957000 +CVE-2024-28063,0,1,8b4daa0dfe18458d1d4f0e0079b8409dd79607264a48fce0d64909485ac7a6e2,2024-07-03T01:51:26.370000 CVE-2024-28064,0,0,d4ef909cb17c3cdb1e2d0bc0d383e367ea00ec2cddba9dbb7063988318bb0a6f,2024-05-20T13:00:04.957000 CVE-2024-28065,0,0,9c3c0973cec8416a73aebaf79d96b27bfde387bdfffa9e02e29e42d0c5bd8070,2024-04-08T18:49:25.863000 CVE-2024-28066,0,0,8d264de635ae9c8dc6d41b6ed16f7f85828f585eea298ce9fb065b16c33683e3,2024-04-08T18:48:40.217000 @@ -247849,13 +247849,13 @@ CVE-2024-28253,0,0,f5326dd97701553671f20b198d6b4e3bbd7507e645cfcbbef2e0eb0bd68e4 CVE-2024-28254,0,0,a9752b9597156f82582ee0901564a914d350dbef56a1d3e2cb37d87202697963,2024-03-21T02:52:24.507000 CVE-2024-28255,0,0,2223e20b88f20882b18c8e2daca66ddc78cf448142396bd3d6e2271daa5feb4a,2024-03-17T22:38:29.433000 CVE-2024-2826,0,0,c06816aa9b8cc8bc5652d3f93db7d31520531a1d3c899fdfc04204afd4aff493,2024-05-17T02:38:32.910000 -CVE-2024-28269,0,0,5e25e364fda3d17abe524b6067697eed20609070e92e0f7fc6052bd43048e1ca,2024-04-30T19:35:36.960000 +CVE-2024-28269,0,1,b7dba037dfa057d99dedf14ed710d84a658c9775dd875bb28a1c5e4a54714ee3,2024-07-03T01:51:32.517000 CVE-2024-2827,0,0,25b876aa80a4414249709b2b590feaaa0038d4c537eb2df951e71f023d4496e5,2024-05-17T02:38:33.003000 CVE-2024-28270,0,0,f654e93a55aad09ebe8372d915898812c2a1306adefa6bb8aebb87b68cea994c,2024-04-09T12:48:04.090000 CVE-2024-28275,0,0,20e2d2e3bfbe8540c4a348bc0e556a1aaebdf48e340e211a9afb11edded84f28,2024-04-03T17:24:18.150000 CVE-2024-28276,0,0,e5d0ca3338b4a8eaebb622a401ae3a8f89176db3eafcb6902453e3abdd94a54b,2024-05-14T16:13:02.773000 CVE-2024-28277,0,0,e80085629182a4156301aa69e3031f688c8f7716267666a9b7d80e876a57f0fa,2024-05-14T16:13:02.773000 -CVE-2024-28279,0,0,fa8a6bc3d07800ef5d3f6771d674634040611e31bb1bb55c210cfc26b14b2bbe,2024-05-14T16:13:02.773000 +CVE-2024-28279,0,1,55b3ccd94f211aef8d797e18d612a2f101844bd7f75e59dedcf73508a0cb187d,2024-07-03T01:51:33.390000 CVE-2024-2828,0,0,7529c0cc7391c2a2c2d5cf6a294edb59716c6698bcf758a8b4c9c4bf6d05ed28,2024-05-17T02:38:33.097000 CVE-2024-28283,0,0,268ce493b20c7a589a5e50c22f5ba70e4448bc55aa5cacedfa25c50cee9c0813,2024-03-20T13:00:16.367000 CVE-2024-28285,0,0,5a20b1d0ab2c155ab9dfe9a6a1c2cc6d338651026c05e05f654629eb6596e905,2024-05-14T16:13:02.773000 @@ -247863,33 +247863,33 @@ CVE-2024-28286,0,0,7b760a4769f45c40990c61b4c6dca958dc26708f19d30b01bb3a34dbec61c CVE-2024-28287,0,0,f3e972680aaba746036e0c18fb52d806a7d00f059e355ec696b64bf775ceea80,2024-04-02T18:12:16.283000 CVE-2024-28288,0,0,a02e3d9826d4212dd14a4181934d81e2a653b8135d5e48cc021c9f921b853477,2024-04-01T01:12:59.077000 CVE-2024-2829,0,0,08bec3122d40b09d10127b8a8474b30ecad7c5a3422bf977085189b53f8158fd,2024-04-25T13:18:02.660000 -CVE-2024-28294,0,0,c88981cd0f30e1c9e25ceadba4bfdd24f30af7355bc14934c65793d708e02faa,2024-04-30T13:11:16.690000 +CVE-2024-28294,0,1,78f4f9cea2d4a1ca93d50c609f48582229009802769f67fd7dc526cc547f67cb,2024-07-03T01:51:34.303000 CVE-2024-2830,0,0,d5b60d4e864f39f624f9c75c8c5ccee07e6c5fbd8045c5529f94cb5bf65e5175,2024-04-04T12:48:41.700000 CVE-2024-28303,0,0,32d4865094af329a688db1798283b86ca81a4a5fae30846af22292284fa8cb98,2024-03-20T13:00:16.367000 CVE-2024-2831,0,0,7d0d1d07ab4c944a6084ef684af8062ca485383fba14ec1c0d0134c80fa05201,2024-05-02T18:00:37.360000 CVE-2024-28318,0,0,ede034690df957e6783d45bfb66a16f12d36f93dac03aab57e77aeedfffbbc90,2024-03-15T16:26:49.320000 CVE-2024-28319,0,0,26fe071877c361c1420da78d668cd8bd73e607c2889fe07f596425c3f0efcaf7,2024-03-15T16:26:49.320000 CVE-2024-2832,0,0,7a66d92eabd94c5482fc841b94a91eb19495896ae05b07b20a66e016bb5f43e5,2024-05-17T02:38:33.270000 -CVE-2024-28320,0,0,957c8ff6de571cd3c980c35b1a45ec51598fc48c3780819baa18ab7d01a2b5bb,2024-04-30T13:11:16.690000 -CVE-2024-28322,0,0,ed9fba21dd28e439f28dbddd1f2cfc18af771aa174b88199296b78e7132753fe,2024-04-29T12:42:03.667000 +CVE-2024-28320,0,1,a2fb23f680e2bb675a224cd66e29bf262110d5410c13985fbfcef1c249b560f1,2024-07-03T01:51:35.080000 +CVE-2024-28322,0,1,57353b76141adc1a21b7e127ac12f2564b2d714c61135c271a9cb49aa77effcd,2024-07-03T01:51:35.980000 CVE-2024-28323,0,0,16dacab4d536bc79350286123596ce0c92a8e24f546fb8e6e6ccdaf1dc4caa64,2024-04-24T02:15:45.820000 -CVE-2024-28325,0,0,3d06015241e4570fb115409ab49ab86c42de8c8b4d800abe610c2f054ef4de5b,2024-04-26T19:59:19.793000 -CVE-2024-28326,0,0,bf7ff4074fbcea7d98c2489d08e5c9aaaa14fed47810bec98f3ada987f0664e8,2024-04-29T12:42:03.667000 +CVE-2024-28325,0,1,829f2b24ef0e6298df0e0a7317814ea224b3bc37dd5467e253067497a5469b95,2024-07-03T01:51:36.767000 +CVE-2024-28326,0,1,855dd245e209741ecd5af54aacc58610e12585c0f397bf5c5a4820ffc845584e,2024-07-03T01:51:37.560000 CVE-2024-28327,0,0,df89aa24ca113b4bb35dd7e4e3cc866c8cb49edc04173e04ac906c9b3f369796,2024-04-26T19:59:19.793000 -CVE-2024-28328,0,0,67ddee010490ebe1ed6c2c848f120ac482bf165023d656b59903b95975dde835,2024-04-26T15:32:22.523000 +CVE-2024-28328,0,1,88f82b4f564bb2f0cfcfafe664c725ce4612a144351633fca17b714d7ef38607,2024-07-03T01:51:38.350000 CVE-2024-2833,0,0,9e113ce28ea85bd7fbbe01a048a1b11092324a333ff2f6e807d8733739209b19,2024-04-18T13:04:28.900000 CVE-2024-28335,0,0,a217e219718a353480ebe6dbe5087fa485efbd4ed754c44582430f96bbfa9ecc,2024-03-27T12:29:30.307000 CVE-2024-28338,0,0,3ea1d4c3a66b67172d60399e17da8570aa15fd5d4f0e652ed0ed26bd90bdb1be,2024-03-12T17:46:17.273000 CVE-2024-28339,0,0,eb06dcbba6c6b866b3957a0b1f6af1817f1ee37fb8932a4cb080c5ef814ab185,2024-03-12T17:46:17.273000 CVE-2024-2834,0,0,e84fef3bf1f6390f87c0082fe9dff0370895cf3ef7cd902a2802b75627052cd1,2024-04-08T18:48:40.217000 CVE-2024-28340,0,0,b694df29079c0854c0447fab99b606db18330fac912bd90c8918c409f1ded072,2024-03-12T17:46:17.273000 -CVE-2024-28344,0,0,2b2ac48b2e688421c19c48d164ca5213d2597b1ed8640d5c5cbbafb9e6b2d033,2024-04-10T19:49:51.183000 +CVE-2024-28344,0,1,0c3e14b9ae8bb6c7602e9654cd79c28a4acdcb7e983c8568907b325a56962744,2024-07-03T01:51:39.137000 CVE-2024-28345,0,0,9f53096e64fde0bd9e67c2ba1058971494111a4dba7285ed04f98db5747f24bf,2024-04-10T19:49:51.183000 CVE-2024-2835,0,0,08ab633da70f5a51a99ace1acb3cf6af13c2240a7150392b865dae8e7499f2df,2024-05-20T15:17:54.513000 CVE-2024-28353,0,0,f5d0b12a1e8a931f5519e51563d18b142745d332ff192847a7afb495f17e2dd3,2024-03-15T12:53:06.423000 CVE-2024-28354,0,0,b6680336ce24c3665bbea7456a49c23f2010021d3a256de9fa063452e0cf7d3a,2024-03-15T12:53:06.423000 -CVE-2024-2836,0,0,9acd34fc60cb65ba9cd271e5ec35a02f0cd82360d653d80e871f78f2c63ee537,2024-04-15T13:15:31.997000 -CVE-2024-2837,0,0,b002f953f9a272374e9b6ca118b212a0ad54636d68e2a3369444d1d46409fd70,2024-04-26T12:58:17.720000 +CVE-2024-2836,0,1,36495018f88c8d364876859f0fc3fe350f22bae03ce0e1ddfd2fb6841831abfb,2024-07-03T01:53:35.640000 +CVE-2024-2837,0,1,ae302668592d4c18e6ec888a73f75aebb0caf04e9adb103971cba34e16c5520b,2024-07-03T01:53:35.850000 CVE-2024-2838,0,0,bfc3f66c2ee9498636bc1b73a4d214aed58a8ab41fd920e5a40fac64b074ff09,2024-04-29T12:42:03.667000 CVE-2024-28383,0,0,4ebb5b688ac785b11132be45898bb9d7934c49dcd0ae78bf745a27cbe4cf3c09,2024-03-14T14:21:20.217000 CVE-2024-28386,0,0,babe8ca097e0c09213bc5c6af798d9ab75b1906fe65d8568532f7dfbcdf59f5c,2024-03-25T16:43:06.137000 @@ -247904,7 +247904,7 @@ CVE-2024-28393,0,0,e0c4576a591386616a5436e610cf9896298fbb6cfafc568aeae2cf64152b1 CVE-2024-28394,0,0,f0eb5c2a2e992661c86d431672af612fba506c8020260929356a00254130fb99,2024-03-20T13:00:16.367000 CVE-2024-28395,0,0,82b3598bd12d6612d167521c1ee69fbab81f725a57a13c49e97ed83bf01459b1,2024-03-20T17:18:26.603000 CVE-2024-28396,0,0,08c911aadb83e5362b5d631a35d91514cb49b70b595ec0db66bff1b061c3d497,2024-03-20T17:18:26.603000 -CVE-2024-28397,0,0,097b8aef5beeceb6827bf0620ef916b2531024d9cb88e4f846720c6efa96f0bc,2024-06-21T11:22:01.687000 +CVE-2024-28397,0,1,8753dce28e32cd8db0feb9191cd053a133c82c9d87d7dd695b0e0743ff864c05,2024-07-03T01:51:40.043000 CVE-2024-2840,0,0,0b9b9cf54907fdf1823442cc4c2107a1ff7330df6580a85d873db983a404ff6f,2024-05-02T18:00:37.360000 CVE-2024-28401,0,0,83d95f41ea79f5a899455bbe843f9dc43cbd29f0392a9dd964c37347d6306d48,2024-03-17T22:38:29.433000 CVE-2024-28402,0,0,61ea1531e9fa41a150bc3854f6b2d96efe4af71d76e3f9c52520b041294710ef,2024-04-11T12:47:44.137000 @@ -247912,7 +247912,7 @@ CVE-2024-28403,0,0,b577222e891cfab5ecc98b2c037b9029cb9fef7f2ce9a6695d352b110d564 CVE-2024-28404,0,0,4b60ed3b31a1c9dc8aa900dc1d949b8d123d31ed4f7c4f06bc5925a45f3dfa3b,2024-03-17T22:38:29.433000 CVE-2024-28405,0,0,44c4bd671db9af2ee46ce791ec59e85555883e1841838334d46a271011bab789,2024-04-01T01:12:59.077000 CVE-2024-2841,0,0,f6af43dae97e58c6a98e438d6895f1cf65a1eae8a2bb0f25de9f610538297208,2024-03-29T12:45:02.937000 -CVE-2024-28417,0,0,af00e2b57e718e054f7e08c6b3b0d384a18688d81735bc5de07f53c08e95bb44,2024-03-14T14:21:20.217000 +CVE-2024-28417,0,1,f78ede20fcde24d3d7d8bc3dab1ce82d14b3041f2644162129c2ad754c19b6a4,2024-07-03T01:51:41.033000 CVE-2024-28418,0,0,ae238b712a12df26411e78ac0a02714475617bc52923967f2dcd5f99fed7ae88,2024-03-14T14:21:20.217000 CVE-2024-2842,0,0,04096fe7d1f311115cf3e9d072e2d5983a11017bc26d2824b7bd84f2710298d6,2024-03-29T12:45:02.937000 CVE-2024-28421,0,0,90a4d7a3d1595cfa8996f92f54737f97bf9cca063274efb8a0c9826ed947d7b0,2024-03-26T12:55:05.010000 @@ -247955,14 +247955,14 @@ CVE-2024-2855,0,0,cad9c20e45d2f11b4dcb483d96f858ccd5b9854983f0d32090f94573976b2b CVE-2024-28550,0,0,5d0ad6d2082f07d56cf9652440be9e3f8e89ff952367d33e244f401dd8cf5df1,2024-03-18T19:40:00.173000 CVE-2024-28551,0,0,40072188bc078513c98fe36eadc61408f0edcb42335d89d71c256bffca8b5040,2024-03-27T12:29:30.307000 CVE-2024-28553,0,0,f74a5d2edd657e610cfc2b884ed1530d128afd106cc0a285c1f4868830f65cd2,2024-03-21T20:58:52.357000 -CVE-2024-28556,0,0,029da341ae14e92abfb4c485ffb138fbfc54e57700e0fcdf8ee83f0fd4fd46dc,2024-04-16T13:24:07.103000 +CVE-2024-28556,0,1,c7a9f11c6c2b705f23220da2e3877bcb36402bff752864a8069f34266c46e417,2024-07-03T01:51:41.963000 CVE-2024-28557,0,0,c99317056e88c11c2e22bbb1cd9d424821ae7d16f3a12f097c6433bace1fd1cd,2024-04-16T13:24:07.103000 CVE-2024-28558,0,0,42fcc68e970ec7953900aa21345c948b519133d0fec39b6a390e75bbfed3bf69,2024-04-16T13:24:07.103000 CVE-2024-28559,0,0,6f7249af13d3d458dea5181e480abd5d70401028fb6553338823fba575746002,2024-03-22T12:45:36.130000 CVE-2024-2856,0,0,901c195e42b970fcfba41d968adbdd28b3755a56b68132d8bf236d5cf0ee9380,2024-05-17T02:38:34.693000 CVE-2024-28560,0,0,73cbd87a5bcb29476004a8f71bcb58ba805b830f22d73a89125c2feb4312f2b7,2024-03-22T12:45:36.130000 -CVE-2024-28562,0,0,14269f83968cd65c8e46cfdd1961f727884ce5a14f32d7014c19b91eebabe383,2024-05-01T18:15:17.357000 -CVE-2024-28563,0,0,2dba09931aa57620e449533d0e5bb1ce74f18e77c6760498155a973853037971,2024-05-01T18:15:17.410000 +CVE-2024-28562,0,1,aedaf708d3b18197d691f16e4924977de0b5623e261911d3fbbbaf3604c340ef,2024-07-03T01:51:42.723000 +CVE-2024-28563,0,1,a76a8c0b981d93846eaf9f675982e2266f870d6c33b80aaee30a9eb94f23d95b,2024-07-03T01:51:43.500000 CVE-2024-28564,0,0,93f443a5da21e01d53fc4363b2c431ffd3c8f477bab405eb8ef1e4325391c759,2024-05-01T18:15:17.460000 CVE-2024-28565,0,0,b882c13be35dea1b081bb1fb87d94d16ff144d006ec1f5c556ae8a3661c7ece6,2024-05-01T18:15:17.513000 CVE-2024-28566,0,0,c9f24212256cb9a88e3dae765064f6da32d332c93b211d045c3cbdffec25380a,2024-03-20T13:00:16.367000 @@ -247995,7 +247995,7 @@ CVE-2024-2861,0,0,20fac21e8ac916aba85c73de98afeef2560453504cc40b7cf7014b9abe18a5 CVE-2024-28613,0,0,bda4150312b2b3b79a305a8c0a3aeb6013ca159f1baaa84b69f3b052dab94ea7,2024-04-24T13:39:42.883000 CVE-2024-2862,0,0,a714f5e8cb944f65576648fcdb042cca021906895d812cc8cb0301d4fdfba94b,2024-03-25T13:47:14.087000 CVE-2024-28623,0,0,972befedc73e4c4f8bdd2f8c4cf61d42fcf307bb5ef2beaaeb5c62226e79d63e,2024-03-13T12:33:51.697000 -CVE-2024-28627,0,0,6a671373a26dcfca865ab0b6aa4916d6f5478e56c1a8322a3494e8abd4354729,2024-04-24T13:39:42.883000 +CVE-2024-28627,0,1,c3fbcb53d4bd8b45e2ac137db3c6b6a64476aafbbecf256367ec9be49dd43388,2024-07-03T01:51:44.343000 CVE-2024-2863,0,0,a0abc0f7c14521978f0dc43ba564a7b82984dfb54a3b3c1d89a63d2a160daf96,2024-03-25T13:47:14.087000 CVE-2024-28635,0,0,27b1feabb26b23ed8fc39746433da8fac5aba34dee4929b1b3945a734731461f,2024-03-21T12:58:51.093000 CVE-2024-28639,0,0,329b7b8ad88c37a706d7a70398ba531ff9e74bf0911225af5f9e1a6b5cf5aed8,2024-03-17T22:38:29.433000 @@ -248025,21 +248025,21 @@ CVE-2024-28681,0,0,ab17b4fa17ebf8eb3957de6dd91fe40414f05e3821f3c9e15b7d517b0542f CVE-2024-28682,0,0,5152c6a3d71ef9256a4c100c1d46f03254aeda535ba4c982fc323d50132c0ded,2024-03-13T18:15:58.530000 CVE-2024-28683,0,0,5e05ced0c6e7903250735aacec4ea0453b4627030ef2e380ed47238db8bee0a9,2024-03-13T18:15:58.530000 CVE-2024-28684,0,0,5e8cf612c51178ce0b7db285e9479c0e753c1929aaa4babe1afc56000a57a8d5,2024-03-13T14:28:45.217000 -CVE-2024-28699,0,0,91f828d475003be2a60ab1d1f33c28a1166bc108f6f1b20687ce26b5254a6f4f,2024-04-22T19:24:06.727000 +CVE-2024-28699,0,1,0b9a4e0b313e8b2e6ec1b9d8b9287e8c737e0019e26671b77c33fd8106965c4d,2024-07-03T01:51:45.310000 CVE-2024-2871,0,0,e9558decb3cc4c54584df3eb06fe6d1bb0c12954fd3dc0d6fb0a6933455338ba,2024-04-10T13:23:38.787000 CVE-2024-28713,0,0,beab16cae2dae6cd08028a095390b29624a6437ed474d84784c32091c71ece60,2024-03-28T20:53:20.813000 CVE-2024-28714,0,0,05d12d8ac80645ded00d1ead25c51baa98cf4af4d5a078fc724fffec6f7925ec,2024-03-29T12:45:02.937000 CVE-2024-28715,0,0,054dc6dc725c244acb835446cab8d82270f7d8ffd8311eb9aca1ba238d62a38d,2024-03-20T13:00:16.367000 -CVE-2024-28716,0,0,233ac8d363ac194959e51b7b6e78a16c94cfcf615e05cc4cca6cee73b40ed5f0,2024-04-30T17:52:35.057000 -CVE-2024-28717,0,0,f3e85174e10e6b2a875251d258bba0061735240c3fbf9f5c26ab3fb13ae8132b,2024-04-22T13:28:34.007000 +CVE-2024-28716,0,1,3f63cfc047c308b332d22713c97a67a2241b00455960cf73e7cb5d9cde33a8f2,2024-07-03T01:51:46.153000 +CVE-2024-28717,0,1,68c50e0969fa42fdfa87f41ced9aa5bc718acbfde537527889081e6d8b905cbf,2024-07-03T01:51:46.980000 CVE-2024-28718,0,0,5f0a839ac4250fecd45af64be191fc810afd4c63b89d4fc0f63a8d6841ad970e,2024-04-15T13:15:51.577000 -CVE-2024-28722,0,0,9f3d9610dcb3a88962a775c4bceb1adf34898d2ad0bcbbf8f024b9f550b378b8,2024-04-22T13:28:43.747000 +CVE-2024-28722,0,1,4d114a5bb3de475df05c084fbb00bf1fb6503998847c685d4d1672b2617054ce,2024-07-03T01:51:47.757000 CVE-2024-28725,0,0,5d6528e8744d76688217494d6011ccce2f402c87e1721e307b2ae6f6dd89ec12,2024-05-07T13:39:32.710000 CVE-2024-2873,0,0,38b44d61d3230fcaba1c551f8073fe8dda4eadd0cd50d8705b668e3c4529f628,2024-03-26T12:55:05.010000 CVE-2024-28732,0,0,ec5e6c9882e97cf45b4c95c1c5ffa7b0d32a1a92ed89d346b2a432d5adcd9a14,2024-04-08T18:48:40.217000 -CVE-2024-28734,0,0,ab89139fe8499f37581a857758b5dd911586d271cde02f4e4d8e7c034753a72e,2024-04-25T19:15:49.850000 +CVE-2024-28734,0,1,1c14934084e1e00ba63d896d0125baa20ca223930e97186ab2fc273c15799ec8,2024-07-03T01:51:48.533000 CVE-2024-28735,0,0,96e109e8715188f76ee57d058460375db0bc7cb9155343dbdf53039c574fd622,2024-04-25T19:15:49.910000 -CVE-2024-28736,0,0,608b62ef53e06b47e941ce223ed905598be9c44d72972f06039e8f0503121c16,2024-05-31T19:14:47.793000 +CVE-2024-28736,0,1,b18e265ab9079a090b10f2fe5a13acf391230f937283b97c645741a4ee888897,2024-07-03T01:51:49.307000 CVE-2024-2874,0,0,81d4f55665967a7403f77c13a3fe1cec09fb59ce9d6702cf1fc8df1173ec5909,2024-05-24T01:15:30.977000 CVE-2024-28741,0,0,ba024af92e852f8cb07287ef01e36bda32f00b417065062fcdaec7d68cbce596,2024-04-08T18:48:40.217000 CVE-2024-28744,0,0,9056a307a9a71984eefaac6c50b454d137864982a45296e74420e75a1c59bcd1,2024-04-08T18:48:40.217000 @@ -248074,12 +248074,12 @@ CVE-2024-28815,0,0,e7bdcd0ac6977f9c059dbb312ad54d9a388fdc8f6a137aa4ed5f32fc20fa2 CVE-2024-28816,0,0,4b9f923b99f4095b32672af0003c81bae1f3b3136774827600fae7accfedcfe3,2024-03-11T12:47:42.653000 CVE-2024-28818,0,0,d36b119687f46041625483716221e120ac5cbacfed027a7a801d492a6a4c86c8,2024-06-27T16:43:48.633000 CVE-2024-2882,0,0,9812a3c032ed9917e7cb4cc6df8e4f64906bd7d1b08b3232fe18bad2b2b9e505,2024-06-27T19:25:12.067000 -CVE-2024-28820,0,0,76d3cdcc8336c28bd2212a6cf1c85a9fa7d642e4ad3dd976b5e635cf5cf25072,2024-06-27T17:11:52.390000 +CVE-2024-28820,0,1,095fd29e11db669f6714a4a5dc4339712d67abbd0b3541df2a561e8f599caac0,2024-07-03T01:51:51.323000 CVE-2024-28823,0,0,d5aa89b5cdac6c3847ac374cba2a65b191e57c43dc618aabb1da571ab5b5e9dc,2024-03-11T12:47:42.653000 CVE-2024-28824,0,0,5a9476ae0fdb0520e3a986c832f5f9e27a50da5cb3aa11e06910544296f0e530,2024-03-22T12:45:36.130000 CVE-2024-28825,0,0,9e6f2228e06896e59bb560ffc81c60a9a09c25eeaded2122eaaaf9d670949d13,2024-04-24T13:39:42.883000 CVE-2024-28826,0,0,af714d67b245e2002324726263b60e676423e9fa16954adb4190fa57b660a93f,2024-05-29T13:02:09.280000 -CVE-2024-2883,0,0,e66be81816608580e2e81ffcb02cca4ae9a2aa5cbea60907cc2e1d80cffbaf4a,2024-03-29T04:15:08.743000 +CVE-2024-2883,0,1,4414164b8fa79ba498c6ddbb6ab7a825d3f0a39397b4604f63f00efe5e5aaa16,2024-07-03T01:53:37.420000 CVE-2024-28830,0,0,0345769512c8d0617caa5313f559fdb9de7066aaa2f880b3d0fe2b7aa28290e3,2024-06-26T12:44:29.693000 CVE-2024-28831,0,0,53daadc6768590b1e9dcc34c033a018728a5349f5fb865309e9216560e5790eb,2024-06-25T12:24:17.873000 CVE-2024-28832,0,0,e20e133fb158c153d5c99472d0490b974e0599ab693822dcae94c1e3de7df5f9,2024-06-25T12:24:17.873000 @@ -248090,7 +248090,7 @@ CVE-2024-28836,0,0,ef9665bb9a0895616f82c07b3b8f93ecbb9dcd318a88906096e3fd29af01d CVE-2024-28847,0,0,91e84a48bf06058e30212c2ac01ab493cb3959d3b6bfc21c8760687b856baf08,2024-03-17T22:38:29.433000 CVE-2024-28848,0,0,34495c9c0f308730fc81e42605f83951bd37f923638227e6b1f0c5438e0285ef,2024-03-21T02:52:25.197000 CVE-2024-28849,0,0,5e73d26630408070b9f2d0554aca63f533ce0044a2d97ed66eab06494ab2be18,2024-03-23T03:15:11.970000 -CVE-2024-2885,0,0,36d13a0c271763941b0c56d26677e7fa79665a4131baa83fce6ff864a2cfd9fa,2024-03-29T04:15:09.077000 +CVE-2024-2885,0,1,cfc1d2cd9741b3773937ec1be23cfd79c3d11601be824c8cd00c8aa5759a52e5,2024-07-03T01:53:37.660000 CVE-2024-28850,0,0,3f010e48b33d8f74ceb957fab8d6defaf56ad7dc42ab2eb1e3bf15c4cfbd82b3,2024-03-26T12:55:05.010000 CVE-2024-28851,0,0,906f9a947fffda466dc5b0dc3ea3a19dd7da386341dafbd6d5a62e9573bd0aa2,2024-03-17T22:38:29.433000 CVE-2024-28852,0,0,f198bf5880cc2f9b5f04cdc4feef8212d841d9b642454063dce115a6d543e785,2024-03-27T15:49:41.437000 @@ -248098,7 +248098,7 @@ CVE-2024-28853,0,0,a85a4454e871f07a0e1a82c76c89e8095a49b683e7738758e26ccd5a9ccfd CVE-2024-28854,0,0,3fef733b83ce353a9d601dd97a77245a0cb37d17c25b7206b7c91f3b890c0636,2024-03-17T22:38:29.433000 CVE-2024-28855,0,0,2384a3330fde47f752f152bfa13a6226cb6b236bb18ff2466f5e886c7d3e893c,2024-03-19T13:26:46 CVE-2024-28859,0,0,a8cd0b4848748fd022173581cb1e543e67d103484e84a644fc5bc03b92e37b5e,2024-03-17T22:38:29.433000 -CVE-2024-2886,0,0,35c386cbd8ef54cdc5990a1b0eb590a80c0abbdd7582caec7c2dacf8be986678,2024-03-29T04:15:09.233000 +CVE-2024-2886,0,1,ed3004c461231ae00a1d5b15fa79af4dd07181280b8f035e6f90fc17721004e3,2024-07-03T01:53:37.867000 CVE-2024-28860,0,0,c3ac94148a23300b2fa328274f5739fa5573c1ace8af4d6f8d44d76345f39d68,2024-03-28T02:01:21.693000 CVE-2024-28861,0,0,5bf1c7221daac03dbabf73db8fdaa0dbba2f944ba617d234eab106643136d93b,2024-03-22T19:02:10.300000 CVE-2024-28862,0,0,abd4a06acb5c828a7ab722874d22519cf91fbd6a363cf2586d749fb7523cc6c0,2024-03-17T22:38:29.433000 @@ -248109,20 +248109,20 @@ CVE-2024-28866,0,0,c8fdce91edf195256dbb4fdea4d7960487062cab72efc9f2b26b3b468b563 CVE-2024-28867,0,0,a2663eb7659e9fb153cbffc3c6774d69ca0c4039f52756d8a5671465d9404705,2024-04-01T01:12:59.077000 CVE-2024-28868,0,0,148f39496eb50fd19cf01404a0af3408bd44ce8d437a837fa99cdad3557f99f1,2024-03-21T12:58:51.093000 CVE-2024-28869,0,0,bed6e8ba3681250027e8ebaede92ab26ffb4384953b59d036748ca14616df063,2024-04-15T13:15:31.997000 -CVE-2024-2887,0,0,2797f3580910b2ccb8b3f25b6a77410f5acecf7fa931702ac72d99637f4042cf,2024-03-29T04:15:09.423000 +CVE-2024-2887,0,1,c42af46d10c700fa850ea04bb590acb930d5f5fd1c428610962643eaa93a7b49,2024-07-03T01:53:38.087000 CVE-2024-28870,0,0,0cf8b42440c9130608dacb5605e29ce5ef5a35c267c5a5fa0e99bf26d2d0161c,2024-04-04T12:48:41.700000 CVE-2024-28871,0,0,afc28d49a83d8eabefecf413603caf0043f414fa513c9500837e2c75462e6216,2024-04-04T16:33:06.610000 CVE-2024-28877,0,0,883039bbb8a02fedae5005218a87450c4b734f262948f425805257c253ab9e71,2024-06-13T18:36:09.013000 CVE-2024-28878,0,0,fe5b4dea6079affbe530b6afc0ec6cbc2c58efa98e54aaf61e9565b0ce4541ce,2024-04-15T13:15:51.577000 CVE-2024-2888,0,0,e48cc71bf8d96ab718c88bf59dd81f25047204b13c0446dd48014e6c60fc42d9,2024-03-26T12:55:05.010000 -CVE-2024-28880,0,0,35d2a54befedc79330309bd96c06a843a9691dc1cfbd09cefcb77479b9916a0e,2024-05-28T12:39:28.377000 +CVE-2024-28880,0,1,d86d3a57226b47e9756d0e2de7fe8eb3bf99b87dc35f89b5848778ed1b1b3b47,2024-07-03T01:51:53.260000 CVE-2024-28883,0,0,0da2cc6c41f6d079048ec96a542a244e3daa5cbbca8e93005185c421836d3999,2024-05-08T17:05:24.083000 -CVE-2024-28886,0,0,d74ffbdb0d7a385a360a7e546fbf00773f6b8132cc5abef9d6dbd5cbaf15ea10,2024-05-28T12:39:28.377000 +CVE-2024-28886,0,1,c5e838328be71c5eb5c783cfb3d7b29e0393c19c1f2fbf543fbfcbc9ad011077,2024-07-03T01:51:54.130000 CVE-2024-28889,0,0,bb3c202469f2e51ff05aa6d43099130e609fec5b2294b197effadcfbe55ab53d,2024-05-08T17:05:24.083000 CVE-2024-2889,0,0,047900621574a9797901d8767443e859750a2765d7b4c1f50c805ec45928b2d3,2024-03-26T12:55:05.010000 -CVE-2024-28890,0,0,9dae4a32452d4c238c84193167d3f8528617bb8ee93882e0c116e3ba82982853,2024-04-23T12:52:09.397000 +CVE-2024-28890,0,1,75d08f12fbd468307e29dd7cbe4c7c3d5acf11ae18647e40fe18f61a37a2bd23,2024-07-03T01:51:54.973000 CVE-2024-28891,0,0,d3e45bd47b45b967827b685dc5aca79c502a599b4c4b2ae06f1259844016862c,2024-03-22T12:45:36.130000 -CVE-2024-28893,0,0,7a5ddb17befb9bf2e45d04e01c7f7f0ee04434b65595862a797c5ad8614db28f,2024-05-01T19:50:25.633000 +CVE-2024-28893,0,1,6bb6e7d4eb5ffccbd865059808a0bb14806c115db17b0c7b58ceaf6722125e36,2024-07-03T01:51:55.153000 CVE-2024-28894,0,0,139b37292842325266e36fcf501a8211453c4135dbf7a79b4d495c356e7cd07a,2024-04-15T13:15:31.997000 CVE-2024-28895,0,0,e719d13135e97e941113ab974fe7dd84c43c28aacb52b0a20894b149f6e995bb,2024-04-01T01:33:21.910000 CVE-2024-28896,0,0,286c9b14277dfd3fb198ad35d3d66add8da721df3cae192b0956bb3da3951188,2024-04-10T13:24:00.070000 @@ -248182,7 +248182,7 @@ CVE-2024-2895,0,0,deecea79af1882af98fd48c4ed5cdad6d760534eb71cf7b13f7717f69abb3b CVE-2024-28951,0,0,c59d22693a6783914cb02db5be2e1a6f5b0c6277d54a6ec5614d046ef86ffa02,2024-04-02T12:50:42.233000 CVE-2024-28957,0,0,a169098a05ac68c39610a9d0c21c80f908b4c73fb6ad140d0292417789484670,2024-04-15T13:15:31.997000 CVE-2024-2896,0,0,0d440c90e92a7b803bc45ddfe38885eb33d3e34a76343a9bf560c93a9723c2f9,2024-06-26T20:15:15.187000 -CVE-2024-28960,0,0,e8dbeb1ca04aba553db6ad0a923d45f708fa651bef11fd340f54cf32195f3cfb,2024-04-19T23:15:10.657000 +CVE-2024-28960,0,1,52abb52a9d4e5bfc8a4202f8cac850702b2036add0599181377d1c9da970c376,2024-07-03T01:51:57.697000 CVE-2024-28961,0,0,0ddc41642ad07ac3588b209701b64adc26c13e6c39a5545ce50919c420215bae,2024-04-29T12:42:03.667000 CVE-2024-28963,0,0,c5c3b185efea606aed4d9595c8d313f3f2c0068b841b7e1d435fe02dbde99f32,2024-04-24T13:39:42.883000 CVE-2024-28964,0,0,39f231edb50636796dcac2656d216ab11b12d7dae679a06a7d2f297d8c8ed674,2024-06-13T18:36:09.010000 @@ -248278,7 +248278,7 @@ CVE-2024-29071,0,0,5ff903755374c23b025a98d3cc2b0f06ea188aa4151e3658c02fd385bc8b4 CVE-2024-29072,0,0,8bd07d62e543797cde35d8ea71e0325d73cf9726a00cd1db731a33d220e7c57e,2024-06-10T18:15:30.110000 CVE-2024-29074,0,0,9e8f322269475ed9cf88d107d6401cb08d7756267afe6b14bb883cfb51c03588,2024-04-02T12:50:42.233000 CVE-2024-29078,0,0,f341344696e65c0d3fdf677eb926388586920535705e81471de21157716771c8,2024-05-28T12:39:28.377000 -CVE-2024-2908,0,0,9f5f1c5ec2e808b81f6ec6ca53a4152861e77b7f91146de0808ea83300a2c863,2024-04-26T12:58:17.720000 +CVE-2024-2908,0,1,3845fc124bc9f710736d5363f9b086190df4e2925cb4e5b4a7eb9455fd55b3c6,2024-07-03T01:53:38.703000 CVE-2024-29086,0,0,1ba59cf7e266064553649d504d13e7bbef5ec69a70b08610439516755a245119,2024-04-02T12:50:42.233000 CVE-2024-29089,0,0,d048736b15469f0b39e3b876166869fc2f8a5b0a20328918b1229acf18e4ac1f,2024-03-20T13:00:16.367000 CVE-2024-2909,0,0,68117e34ca80bc8c9165ccc16b04b44079c40816237ed6e48dbf176c55e6bf7e,2024-05-17T02:38:36.843000 @@ -248338,27 +248338,27 @@ CVE-2024-29140,0,0,fbbad9e86dfcc78cc94b85fbd86b27c7285a2d9bf81924339dc3ebd393f12 CVE-2024-29141,0,0,5bce998d90032a0cf23871bca36c54861b809480f587cd5eb60caa1b7e514a33,2024-03-19T14:31:27.883000 CVE-2024-29142,0,0,3d99176f4d85d148ee233148c993a17a366c303789d941cc36575f5a634b4f81,2024-03-19T14:31:27.883000 CVE-2024-29143,0,0,a1e93df9451dd8c06c7a2104d206f94c25c39c30d89ae95cb5b825cd9ec51d18,2024-03-19T13:26:46 -CVE-2024-29149,0,0,0a051cd70f444c7f076a038ef5a239651e0124faf2741d58016b91f08f7dac05,2024-05-07T20:07:58.737000 +CVE-2024-29149,0,1,3887e60eeb63bc9cafb3d652beff1219d97a4604919fa5ac1837a650a43ed85b,2024-07-03T01:52:06.800000 CVE-2024-2915,0,0,964dabbde545b1ee227255a721578c284dc9872f1078b9295a9169d877ce4d6c,2024-03-26T17:09:53.043000 -CVE-2024-29150,0,0,062126a35544b774d6fb58afd2d590a447c3aac593c727f888b79a1635063392,2024-05-07T20:07:58.737000 +CVE-2024-29150,0,1,4924bacfe5857f73b4ac7a824a3a849e6169771413a526f86b266258de89e147,2024-07-03T01:52:07.770000 CVE-2024-29151,0,0,ef852a662e1eaee7e15d971ee7451f2c3e954b3d808a30cb9a36bbe68bb24c8f,2024-03-18T12:38:25.490000 CVE-2024-29152,0,0,c92904cfed16837c6741a6aae634cd863038c196f5243ffb888a5a789d858f82,2024-06-25T20:15:11.353000 CVE-2024-29154,0,0,dab131c9ff393e828252009730d8617a5e1a4fb5cfb7f2db054056bc6f27c2ba,2024-03-18T12:38:25.490000 CVE-2024-29156,0,0,98cbc37d07cb77607ab83580cc50ba5a01141613b7a3bb770966a3d6831e2326,2024-03-18T12:38:25.490000 CVE-2024-29157,0,0,0ffca9c85400879d2350f7e41592fe36ba7fd13fff06f556ca5f1be60327b7a3,2024-05-14T16:13:02.773000 -CVE-2024-29158,0,0,2d626a5888b7a26b746c4e76e36561e704096f3e021a4df5e0fbfb025927d75d,2024-05-14T16:13:02.773000 +CVE-2024-29158,0,1,233df1a8f6bd60efc553c6b930d261c8562f8385a13b7e3a3998e2d044729790,2024-07-03T01:52:08.880000 CVE-2024-29159,0,0,d287940e64aed26cf8e9b0f93ad8a5dbe300f81635819adb69203cfa6c5fdecf,2024-05-14T16:13:02.773000 CVE-2024-2916,0,0,ebca4cff0a5b27757fb80d922684d400f221b39afbfb98a0224e7c22bb605192,2024-05-17T02:38:37.200000 -CVE-2024-29160,0,0,99e9b1bc373385a6cc91324c74d4856d5317a1ec0a98e9620840ca286f5fed90,2024-05-14T16:13:02.773000 -CVE-2024-29161,0,0,7cccbc1e63536749091c6333f410014f8998e54321ee476e8fd1a9c99f74258f,2024-05-14T16:13:02.773000 -CVE-2024-29162,0,0,a647251c9e337d6f7ad2b369713de2b50eef9b841769a085874f4052e9b316b3,2024-05-14T16:13:02.773000 -CVE-2024-29163,0,0,101fdccb8d487394570d01d26d795ac3c4525476200b7ae3a6e0199149b6fa31,2024-05-14T16:13:02.773000 -CVE-2024-29164,0,0,c849bd0e0c082f681120f651dd7c1e8b36dd5605fe47c0e08d8750da3cca8b3d,2024-05-14T16:13:02.773000 -CVE-2024-29165,0,0,56d636407e1bb4b0ac449c45605f98b67e37c82a870441216999fc8912fdfab5,2024-05-14T16:13:02.773000 +CVE-2024-29160,0,1,14277773ec9d53ace5a45e8738713a751d526d84ef2e04b16fc3cf3277fe88fb,2024-07-03T01:52:09.797000 +CVE-2024-29161,0,1,5cfd8761d51385bcfe894c39c7820fc9a0931c36e498ce8b651dd3852cb6eb8b,2024-07-03T01:52:10.720000 +CVE-2024-29162,0,1,b1942e5218b9199d8b3f133e6f6ae0185975e4e85dad3209f496d8fff4251c5a,2024-07-03T01:52:11.517000 +CVE-2024-29163,0,1,17ffb72bd5e136d8bfcfddc39b6fc15b69108962b9f846734ed6aeb051a0131d,2024-07-03T01:52:12.290000 +CVE-2024-29164,0,1,0241c9be23a80d6ab3dceadfce1b9b19b6d47bdd0ac74b2f2c9ae593533e395b,2024-07-03T01:52:13.070000 +CVE-2024-29165,0,1,3c479a3372b122f69415807cf18990c87c6bdd2637a3e4ef28a1d60fed2086fd,2024-07-03T01:52:13.840000 CVE-2024-29166,0,0,b13dfaf0c8e4ea3bbd358bd8614d1947c156835fe22c5095fd83f7cd95ae4bba,2024-05-14T16:13:02.773000 CVE-2024-29167,0,0,bf34fde11ddaf885eca651982ced409116d0263648d1d196b5990bfa9a0517fe,2024-05-17T02:37:49.993000 CVE-2024-29168,0,0,55eaa2f8aa34951f2678d17cd09a8762011ab04d052991a6497f1ac90304aedd,2024-06-13T18:35:19.777000 -CVE-2024-29169,0,0,a02805aa944e613162d66dc748a6a46569f5a7dce5956826de0d7f8e99e21193,2024-06-13T18:35:19.777000 +CVE-2024-29169,0,1,46ae3e5e128a47a51f9060fa5b406a480b0436c4fa2b267a42e0503161231bfe,2024-07-03T01:52:14.690000 CVE-2024-2917,0,0,738b9419e321262581cbcbc36e60bc25c85f82bd40a8ab12d5b727ad6cc0972c,2024-05-17T02:38:37.297000 CVE-2024-29170,0,0,3a6ff2257b9f972ea2c611b834271a3e0fac88ad6ff708b8c384b495ffa37bbe,2024-06-04T16:57:41.053000 CVE-2024-29173,0,0,7834c8352c9984126ce7ef4158fbeb815c062c8fc3f1eb7ec698c2f25391dde6,2024-06-26T12:44:29.693000 @@ -248393,19 +248393,19 @@ CVE-2024-29200,0,0,2fded465a0d157f739ca7c28831045e810d35e1ed39056bf30a71fa62dc84 CVE-2024-29201,0,0,5033916f5c6e37ebfb2f1925ef22415c52e7214153fce901347173dc9b9eb9c1,2024-04-01T01:12:59.077000 CVE-2024-29202,0,0,2407457fd23b926dc515687b0bc64391303eb3a1899c8635138115822d2488d1,2024-04-01T01:12:59.077000 CVE-2024-29203,0,0,132c3d83e906b655066bee1fc4d3f90e18def73beb9178e8cc6662be34f71a9c,2024-03-26T17:09:53.043000 -CVE-2024-29204,0,0,ec859d0e8fa3a1772fb0be403427e1a00a2b3fa2a9c0decec9ddc0392ff924fb,2024-04-19T13:10:25.637000 -CVE-2024-29205,0,0,d9aaa05e0354d10fe1dfd52f1a5a03f9d56497d9e5b38ef9618dab542ef557cb,2024-04-25T13:18:13.537000 -CVE-2024-29206,0,0,6d0d2c841d8dc1a074fbdbacf1226b901909627b11a8b5054f09e29159f9912a,2024-05-07T20:07:58.737000 -CVE-2024-29207,0,0,ec25e20e8498e3d11e9375301c6dd152ecf3e0f90cf9e5d6a98497ceb0155dbf,2024-05-07T20:07:58.737000 -CVE-2024-29208,0,0,d395f5c52d3ed64600f5ccedcad7cfd8a77314fe3739258497e7530c09cbf27b,2024-05-07T20:07:58.737000 +CVE-2024-29204,0,1,f46d75bb1b023a43dcae1a8dabcfb9ff1c361a0d2e62ebcd4665665fa845bd3e,2024-07-03T01:52:15.910000 +CVE-2024-29205,0,1,4e674b8f8da8d044735de177a49e7b209584ddf484ab1ea225bf31caee569212,2024-07-03T01:52:16.640000 +CVE-2024-29206,0,1,e86d328fcc9a6f514df760d2a874996b94023486fc1fbca1ce78fd9823e4431a,2024-07-03T01:52:17.397000 +CVE-2024-29207,0,1,cb61fd349829f4c3ea10e2458bf16eaba90c4ab4b0709ae414d9c6319d6d4f1f,2024-07-03T01:52:18.087000 +CVE-2024-29208,0,1,98198b6466ca46a32ecf68f0f1b86f98f3da89bb7599062f6389607314074d9d,2024-07-03T01:52:18.780000 CVE-2024-29209,0,0,730a58a4d5c988d39296847a3cbeffaf8f223ddfb7528cfe72b7ecd7120d8d3e,2024-05-07T20:07:58.737000 CVE-2024-2921,0,0,6f7f3b512cf8e7465b0aea1823cce56bf608a3c1f40869feddab084c3da126e6,2024-04-09T19:15:38.423000 -CVE-2024-29210,0,0,85808d5cecba10d151fe0b578de53dfd10c6954e5c1065c0884a7236754d3536,2024-05-07T20:07:58.737000 -CVE-2024-29212,0,0,d1e1de4d046d49a4c2bf3e09127e1c6209af5babbac4af0414d2fd71b11411e7,2024-05-14T16:13:02.773000 +CVE-2024-29210,0,1,35f2fb1127989a840ec44eff998dd4dd34dd991643ed4983f752d1672da1ba01,2024-07-03T01:52:19.497000 +CVE-2024-29212,0,1,1247faf67a6d05877ef4c24ac6b7bb7d5fbf779bfef43566ef9132ba263c1abf,2024-07-03T01:52:20.207000 CVE-2024-29215,0,0,1deb2741af1ef43589dac951d569d4331d52605244b66711056e6a21b816405f,2024-05-28T12:39:42.673000 CVE-2024-29216,0,0,59c06798795d05e391cdd301154441d31362295e800c3b46a2b7bd83a3e2dbc0,2024-03-25T13:47:14.087000 -CVE-2024-29217,0,0,692aac671426b5dcedcd56fb24933db6c5a96f7af1aee50fe065d75a9d19b5cb,2024-05-01T17:15:31.350000 -CVE-2024-29218,0,0,671653d28334eb1b29de221436a2464edfec5acf42885adc45ca7b102375c361,2024-04-15T13:15:31.997000 +CVE-2024-29217,0,1,1379e154758970ea220e13f9d29020765e0cdb03091ce67a8deaa8fc55306947,2024-07-03T01:52:20.987000 +CVE-2024-29218,0,1,cf4584ad45aa9022ef363367b9662bb95c85c1cf05b783ff3f8b77c49f1740c3,2024-07-03T01:52:21.197000 CVE-2024-29219,0,0,4481109cba1c43e8c57c43af416b7ffd0dce43a288900ab9b937cea0ab69c2a2,2024-04-15T13:15:31.997000 CVE-2024-2922,0,0,3cb36cd942c44fb4bc05e47c0e65638d7b7319c1bc41952ab87c0a978527a366,2024-06-06T14:17:35.017000 CVE-2024-29220,0,0,1b65a8d6c350605472de3d4a64b6e0ccc843853d705695d9c55dd012b24dc815,2024-04-11T12:47:44.137000 @@ -248441,7 +248441,7 @@ CVE-2024-29276,0,0,aca23a437429c144243dafb6e7ab7580683c55fe67f055697aafa1a11e9b2 CVE-2024-29278,0,0,68d9b61e6ce874f8948705ce3cdb92754b448114cb863479c2e17e0909039bb0,2024-04-01T01:12:59.077000 CVE-2024-2928,0,0,52e75761419c8c2112a911614151e115b2003c195d62a406dbe9457ddc16786b,2024-06-07T14:56:05.647000 CVE-2024-2929,0,0,259a475f54199dd846f57ff088582fd42af9991bb7e5a0933d4c675cb91ec78a,2024-03-26T17:09:53.043000 -CVE-2024-29291,0,0,a5af85600bf8f10cd2f36db1ab16b2ebc1c6de446e84431419b2522daafbec86,2024-06-04T19:19:08.753000 +CVE-2024-29291,0,1,0d703378b5cb7b849e8c22cc50b73febed58a80d3feb1ebc89147218489081f9,2024-07-03T01:52:22.557000 CVE-2024-29296,0,0,9df6519fa8f3cc846555f57a851c9ca9c85b64bc0579ecca8b9610940400afaa,2024-04-10T19:49:51.183000 CVE-2024-2930,0,0,c889d2bb0ed003840384d753c9a4791cb56d30b7751947b8a13baa116735892f,2024-05-17T02:38:37.687000 CVE-2024-29301,0,0,154c6ea8f36ae553114269a1e880d159b7e9b09b869cc177af921f11e043c79a,2024-03-26T12:55:05.010000 @@ -248451,7 +248451,7 @@ CVE-2024-29309,0,0,45f1a5c62c6adb2cfc37fb8e478a65e7e38cb4d4cfc5c99ecb35ab6584ea9 CVE-2024-2931,0,0,a6d520754016bbdab2d7efa74efc39e3254a7b8cd183192dc94878921c91c9ca,2024-04-02T12:50:42.233000 CVE-2024-29316,0,0,a77a66080b82cffb666cc5dc96a72ca9eacad7eb3c1a78f29a15ae578e7a1db4,2024-03-29T12:45:02.937000 CVE-2024-2932,0,0,a3c1266ff6f47dc95aa30613f077416ccee7f436989a8ec80d1c9241ff3cefc9,2024-05-17T02:38:37.813000 -CVE-2024-29320,0,0,321a08ec2af8156a6831bdc4e0f91613cac88682c2798c2c52128b513367591a,2024-04-30T17:52:35.057000 +CVE-2024-29320,0,1,5a88a646bd3508d4821cd8830318eb2b89fbb2c1855b58fd2a38a2afb4c1e6ab,2024-07-03T01:52:23.320000 CVE-2024-2933,0,0,18d1f298f2b762b4118efe96c450d68f8ae481c12b8472bb73a5759391f8f4eb,2024-06-03T14:46:24.250000 CVE-2024-29338,0,0,e2411b46399ccf809f7042628f5dc80681cab752a4fc33bfa69d55d7b188c619,2024-03-22T19:02:10.300000 CVE-2024-2934,0,0,3802ca621262b108954a2e7ca078a0b3239a058a100ed0a90d89e0faae5d736e,2024-05-17T02:38:37.907000 @@ -248461,24 +248461,24 @@ CVE-2024-29366,0,0,7401048215b84763b7b2374bbab17e21709c21accf205850b7210511d30d6 CVE-2024-29368,0,0,58275317479c01c485651fa0a22ca9decedb8cd847a38eefd11c549de0fde384,2024-04-23T14:15:08.440000 CVE-2024-29374,0,0,dd275404ab360479a756d96aca2b6517b11bd3239b0ee4b1b68a18e9bbec3822,2024-03-21T19:47:03.943000 CVE-2024-29375,0,0,61c42a83ac8fdf63093e9fa8c57bcfe142ca6a7e368bf61cc8c311f84268ba4d,2024-04-04T12:48:41.700000 -CVE-2024-29376,0,0,353450270c15de8d6584b5c13c6c22d511637174d15636f8c676ae8554917a6d,2024-04-22T19:24:06.727000 +CVE-2024-29376,0,1,ef2434b33b4ebabd1988c2573e7e291cc10d7cd1308168626cdd5db2860751e3,2024-07-03T01:52:24.250000 CVE-2024-2938,0,0,0d6266c511957cbd6b8494ba4a5e28bce9547cd2935b8f09d809cbbace1e2bba,2024-05-17T02:38:38.137000 -CVE-2024-29384,0,0,41f8686a160822317d408a8ff90a93423222c25aae5419a36b339e4573a1ceea,2024-05-01T13:02:20.750000 +CVE-2024-29384,0,1,b089f835091687cd6d0dcdd933552a1f796e9abc13183d08fc4c9d160e3daf39,2024-07-03T01:52:25.030000 CVE-2024-29385,0,0,8759a5732499ce248301d7321fb10ac2a0ff45ccfb82ec638dc2ec07b266090d,2024-03-22T19:02:10.300000 CVE-2024-29386,0,0,46150b3636ce7f0c25cb166967d8e2ffb59b578767fa72331e04f23b7ba93e5f,2024-04-05T12:40:52.763000 CVE-2024-29387,0,0,64dc77a900c3b36a10f003711c44947a360d31708081f08c65915c82f4e2f15d,2024-04-05T12:40:52.763000 CVE-2024-2939,0,0,8d288c5421907c18561d6a467f0e78e7e78afcae942dcb9d7c160f3050babf32,2024-05-17T02:38:38.230000 -CVE-2024-29390,0,0,59b992f68f8adafef10a31fd58cc91572d7a486226e75133baeafacb71a20153,2024-06-21T11:22:01.687000 +CVE-2024-29390,0,1,814ac687e5b2e01cf32c7127e50bbccad0da0364edfe1ee5a384153ed32a0446,2024-07-03T01:52:25.827000 CVE-2024-29392,0,0,6821a4c6dd210bfae25d568d5e6add9cab71ce2f9ed1de56bded387978d60e49,2024-05-22T18:59:20.240000 CVE-2024-29399,0,0,1f0a560642c5bcb6053c3eb35cf9c158aa499897c937eeb4d73efac983ff0857,2024-04-11T12:47:44.137000 CVE-2024-2940,0,0,e525af8477a0b8a4e6a04b3ac27a53c69ee703f71a97899e4490355eb87ce77e,2024-06-05T20:15:13.267000 -CVE-2024-29400,0,0,7c7ba10951f85314b8517e4af19bc97a8e02a4fb9c2ebd30adadcdfaed825d5b,2024-04-12T12:43:46.210000 +CVE-2024-29400,0,1,8f34751d18d63c75601eb947e8c0e3714d1d567d723f8c0dc5c4c493f22e06b6,2024-07-03T01:52:26.027000 CVE-2024-29401,0,0,679ee7eb07f94632974ee3a3d5e9f1f36658f780199e198816f5b2401b4eaa19,2024-03-26T17:09:53.043000 CVE-2024-29402,0,0,fda5605a49d434b54f664af40772780310034556d5d1866a088f676172e81755,2024-04-17T12:48:07.510000 CVE-2024-2941,0,0,3664da94d27b244978ce98084134f6922c872e5b786ff31d00b4217eb8afd029,2024-06-26T19:15:13.107000 CVE-2024-29413,0,0,a58c13bdf67afd8b98d238166eefb90262a9870531d3d5f182e9810c30b452cd,2024-04-04T12:48:41.700000 CVE-2024-29415,0,0,53ed5ba54a647dd7681f8528c5dae7a4b047ea77500df24c050bdf2a62c4afe9,2024-05-28T12:39:28.377000 -CVE-2024-29417,0,0,89d07e3eb8e147d93c431f357bf92973ead1b3854c21888d1e99630fdc9218d4,2024-05-03T15:32:19.637000 +CVE-2024-29417,0,1,23124bcb1400c4464d6cdb85518e542571ce92d23b1dd27acde255160c2981ed,2024-07-03T01:52:26.833000 CVE-2024-29419,0,0,2f1c2a30167616ce2f7264d13a2e39c4e307caf2a0fab8a1d39f77c0f2b7d31b,2024-03-20T17:18:21.343000 CVE-2024-2942,0,0,441f0a67703a8db7af5d599581bb10078cc400b1f49682a90a1d996555281551,2024-05-17T02:38:38.500000 CVE-2024-29421,0,0,b912d08ce74526ab990d3c496b114c42a5453a9993fba547589b9c9c5249ee57,2024-05-22T18:59:20.240000 @@ -248506,7 +248506,7 @@ CVE-2024-29455,0,0,34e13e15e8ba1247bab4074112a2a8e07941c50f23ef976a2aa4934ef2701 CVE-2024-2946,0,0,b86288fa77fb47b4b83be2e46631f0944d38df3dbc98c9ee65a2d9324fa3b190,2024-04-10T13:23:38.787000 CVE-2024-29460,0,0,b846dd78dc5e35e9b0ddcbf6b64c6fe8dd169ef35be60b3c712c2dd2787cb070,2024-04-11T12:47:44.137000 CVE-2024-29461,0,0,0ea3979c495137b90acde4ca36a0a99c570c5e7619fef41ff59b36c98cf5a199,2024-04-15T13:15:51.577000 -CVE-2024-29466,0,0,49660dee45810adb8b0f9fcf1cc8fbc233bf54368b149fd6086e3e6603105ce6,2024-05-01T13:02:20.750000 +CVE-2024-29466,0,1,4fa136a9b1a51af6517f939484fb1c8a80e3e0537d7615acddb3c99d86059b49,2024-07-03T01:52:27.797000 CVE-2024-29469,0,0,fcd29429266b7a87e58735d5b1a87e454245abd68c4217f0834c945fcf2dbdeb,2024-03-21T12:58:51.093000 CVE-2024-2947,0,0,b68097f442084c413bcea33d1d0c33d19fa9ae07d0edeb3af3b79bd708e6dc65,2024-06-12T09:15:17.717000 CVE-2024-29470,0,0,47e23a8af4be8b838695296b19cd4bea426144fbae12eb976431244ea0a84b06,2024-03-21T12:58:51.093000 @@ -248518,7 +248518,7 @@ CVE-2024-29477,0,0,de7f481f5795eaec84a145aef7d5c448e8d3e580fe050c669bcf013e697d8 CVE-2024-2948,0,0,3594bbd430dd5444695ca044dc4efc4195ce92c17c43c967ca88fadf4c9f5e69,2024-04-01T01:12:59.077000 CVE-2024-29489,0,0,281c97da696e2014734e05639dd64d47354e5c2b4bcf9f1b7827a4a4899ee03d,2024-03-29T12:45:02.937000 CVE-2024-2949,0,0,fe05e354f0ebdb867f0f2833560dc840c15ef92daf8a56e7a3e31b95f453d065,2024-04-08T18:48:40.217000 -CVE-2024-29499,0,0,6d5bcd6ddf0ffffbb229032818f99219d3a96f2f060fbc36a33564f3ae345d5e,2024-03-22T19:02:10.300000 +CVE-2024-29499,0,1,0df4c342550eca93c20715245870721539a608c42f67ae6ae86966560d5e9723,2024-07-03T01:52:28.783000 CVE-2024-2950,0,0,e07028f6204e1653615da40fab9edc1b22f1b4a28f65125bfe5341d4aac985fa,2024-04-08T18:49:25.863000 CVE-2024-29500,0,0,e867a892b6feea61da09f4d0f3774bdfb045763ae21492d0ad387c1de2b2b650,2024-04-11T12:47:44.137000 CVE-2024-29502,0,0,1cedf8999be6431ee5260cbb2cb95e7cf3e534192a33d0246363cb8fb473dca1,2024-04-11T12:47:44.137000 @@ -248536,7 +248536,7 @@ CVE-2024-2957,0,0,737502ee51917bedcfc8e0d53eeb74b27331cb91e4661171e2fbc24aa9edcd CVE-2024-2958,0,0,1d0782ac3dad3eea05ab9020fa02a9c84923a290d1ec10084a1a3c542c4ae38a,2024-05-02T18:00:37.360000 CVE-2024-2959,0,0,8ebd6f5d854875f1243a0e742643637a0817e3e312cd0ab52e93c0912151ddf1,2024-05-02T18:00:37.360000 CVE-2024-2960,0,0,b0654508ad7da54a731428bce408e0368df4e1f951fcd18a828fd8ee507eddd3,2024-05-02T18:00:37.360000 -CVE-2024-2961,0,0,901130b66394032cb3a04c2a1ab67c36b3f2be3e5881241d9edc67beae7973e1,2024-06-10T18:15:30.657000 +CVE-2024-2961,0,1,9aeabb370372980f8d219112df9431f09ef8b1e170c45951dff7e07f6231e023,2024-07-03T01:53:40.707000 CVE-2024-2962,0,0,66e1dbbf6553695d3f3b80872691537dfe2ee799c385611e870cc04c150d3a60,2024-03-27T12:29:30.307000 CVE-2024-2963,0,0,fd3dfe2484fa8fbcf32b1e1713c092eebd2b546a8fe9a7f583270172bb703a7d,2024-03-29T12:45:02.937000 CVE-2024-2964,0,0,491ec5f2811a24301edaa3e4cd378090bf610cd2f1b9a50cd7e0dcb254704174,2024-03-29T12:45:02.937000 @@ -248546,7 +248546,7 @@ CVE-2024-2965,0,0,ae0a5407fd78d6b2604d9fd881735bd6f473d7086b4c284611aa9a0f4adc9d CVE-2024-29650,0,0,8ad374bfabee755625e57dff59b85656db535734df280985070b11f8f0b8c3b6,2024-03-25T16:43:06.137000 CVE-2024-29651,0,0,64d9a8930ee4398a03fcd3e224f1e639eea2a6cdeff56b4b739c9ec75d30844a,2024-05-20T19:34:58.277000 CVE-2024-2966,0,0,474ae2e5b1d6c6447ca9bee38c5e4dafcb7b2c2503070dea1f4351179cfe9798,2024-04-11T12:47:44.137000 -CVE-2024-29660,0,0,cb0158a2426209c1fb8f208ea06a0fca40402892acda514103396dc461115741,2024-04-25T17:24:59.967000 +CVE-2024-29660,0,1,92c6a0243a2c1471ce3712ba9ce2ea71347605bcd635b1e9cc6bc9d49c7bb0d5,2024-07-03T01:52:29.550000 CVE-2024-29661,0,0,261575e37794cafe64ffc39d8e8abae89bdc1f0dce273791f821aa281be54825,2024-04-22T13:28:34.007000 CVE-2024-29666,0,0,a8926fce030310567330d9b7c126003f732556a2ce979a6a3fd232707f8bbd99,2024-03-26T12:55:05.010000 CVE-2024-29667,0,0,1425649af0fe5303ac647a61948436bd641374e6a3c12789edb4485c777699d5,2024-04-01T01:12:59.077000 @@ -248561,23 +248561,23 @@ CVE-2024-2971,0,0,898bc718d43d0c390c6d16657d6a8f74b1bed4195ca2be9f6e03b60807e375 CVE-2024-2972,0,0,152d903d5348ef9a28736b9da1b981c53c5565cc38a67b052e47645292e97e48,2024-04-24T13:39:42.883000 CVE-2024-2973,0,0,b7c9e09de444b51c55bed333c2b413927266920f2185557e2ed2f3ecfa098739,2024-06-28T10:27:00.920000 CVE-2024-29732,0,0,f91e9a53bb8c78b9eaa9a43eb2f41d18e7980ac57e838dd405b45ee97833017f,2024-03-21T12:58:51.093000 -CVE-2024-29733,0,0,dc724364e3bd25549064de1d754c0f95dcc52779e1dd6513486011b2c63f334e,2024-05-01T18:15:18.867000 +CVE-2024-29733,0,1,0811972ef853088b726fd2b07316244d1d628e55e310910ac8174bd65d097612,2024-07-03T01:52:30.320000 CVE-2024-29734,0,0,8d99461dc9b8889d99315bde49edbce5536e3a20b88b53095157d8f0afc148b5,2024-04-03T12:38:04.840000 CVE-2024-29735,0,0,08441179a62f1cc6331292f57b194f29d2c97e3d1df4d6604f11a9eac503a49f,2024-05-01T19:15:23.573000 CVE-2024-29738,0,0,99465af485b39ff68e105b0428c69eb9adbd1c8e009fe9a3569be9db8bf56cc1,2024-04-08T18:49:25.863000 CVE-2024-29739,0,0,7135a40bab238cf97a55844698a5a7210b69874e392968b48d12413c9c3727c9,2024-04-08T18:49:25.863000 CVE-2024-2974,0,0,cc3d6ccfa15f0e42af840eac31b32f2ae897d1c61c7e06aeb8dd8aa1c1fe2162,2024-04-10T13:23:38.787000 -CVE-2024-29740,0,0,6afaeb137abdb820cd439f4a8de4b3444fb8dd8390664ecb8f5b544cb64f829a,2024-04-08T18:49:25.863000 +CVE-2024-29740,0,1,b8da55b65cd03c8f279340fc383178e4918b6ddc001e65f509694a717508d4d0,2024-07-03T01:52:30.657000 CVE-2024-29741,0,0,58a208fae70919819896a10b0ac69af17481c90fbaf33f6b074138668c8454e7,2024-04-08T18:49:25.863000 CVE-2024-29742,0,0,013e0935d87738e02ad985787df8e1bdb20608d450a31e334d4001bfd987aadc,2024-04-08T18:49:25.863000 CVE-2024-29743,0,0,2d88b2eb4af432fcf658c698c6f44520850b6e65f42e4f9d8e435f0857ed03f4,2024-04-08T18:49:25.863000 CVE-2024-29744,0,0,ca9c34220842db20c040958869ee7619d2f9abf8c801f17b5df2ee3c7b5aa48c,2024-04-08T18:49:25.863000 -CVE-2024-29745,0,0,360b3e0cef9ad697b4849e4b6c4e59a864e3d365e1324c003422150c1ef1dda2,2024-04-08T22:53:32.127000 +CVE-2024-29745,0,1,78004cfb0900810795e61a81e3d7c158941740f11ef378046d506f05ba94e1e8,2024-07-03T01:52:31.423000 CVE-2024-29746,0,0,29af8006f9fbd7af7095512e80e5bf0ae4c64952a941d41acef3a04849082a4e,2024-04-08T18:49:25.863000 CVE-2024-29747,0,0,87f4e304e93f8b6f286c656028c07dd1ca332ec61fa47e7ce7d137f30fe66b91,2024-04-08T18:49:25.863000 CVE-2024-29748,0,0,521433bbadcb400dfc92897155d667884ae0c1a8d67cb01db78baff427b50b49,2024-04-08T22:52:33.780000 CVE-2024-29749,0,0,33b9f39d00d5461e17b7d5a8f346443f168cc7b139342c04719e9f38cd1e308c,2024-04-08T18:49:25.863000 -CVE-2024-2975,0,0,6de0856746ca0e83e8c020b0c49b3d12b69bd33621171f2e1dc549a80a926408,2024-04-09T12:48:04.090000 +CVE-2024-2975,0,1,ce2c1eaa1d0b58261b411dcccccd364c347ae6cf1b55cf3907ef667aa6188f26,2024-07-03T01:53:41.630000 CVE-2024-29750,0,0,cd8489f4573c543020a3b6e8b96290737b84849a080d45bc65ef0ff04a2c59f0,2024-04-08T18:49:25.863000 CVE-2024-29751,0,0,3bc4aa316cc8565894aaa2a9c412da7054d4f835fd37d50bf2ebd4a04ae9df25,2024-04-08T18:49:25.863000 CVE-2024-29752,0,0,8570c8346da874298f8f35ea2088404fb97ccfc316a51781a5f28a7a73ba2064,2024-04-08T18:49:25.863000 @@ -248614,10 +248614,10 @@ CVE-2024-29780,0,0,dbb5b28e79357605c44be97580280388890d8927ed9d86b1dba54bfaf3205 CVE-2024-29781,0,0,b6224f330ff358aa94180da085366f464fc49ccb8c9a11cf2901ca1712188182,2024-06-17T12:43:31.090000 CVE-2024-29782,0,0,b3ef752bb36677cb2cb857b2f5c52a9011917aac03b1bfb7c687eea310dd8059,2024-04-08T18:49:25.863000 CVE-2024-29783,0,0,cd9af9ff3159d1cd0b45408995f42f2ac24497312e47148a7866abe02669b66b,2024-04-08T18:49:25.863000 -CVE-2024-29784,0,0,f2ed4979f68b9643c9303098fe17742223806213fc665b3907b03b192a51c868,2024-06-17T12:43:31.090000 +CVE-2024-29784,0,1,75a476725b58b69912c5c88a5976ab0700b0278b01f75a2c842fe2d934ccc8aa,2024-07-03T01:52:34.030000 CVE-2024-29785,0,0,6acf4d5e192a210ba9b844d54adbd79774477e59fb13750c29056bd3f9129dd1,2024-06-17T12:43:31.090000 -CVE-2024-29786,0,0,368c674350c7055582a942508d5232ebc053c8a0b73a90c8498f099300f2b473,2024-06-17T12:43:31.090000 -CVE-2024-29787,0,0,7015f2e19e91e4c13f781bcdc9f7c191c385c53814a9084507b433099bdc890a,2024-06-17T12:43:31.090000 +CVE-2024-29786,0,1,6ea1aba11793e88e3539f0a1fa716e9f6f197bd5c9e2809ecb83b2a20665ce3b,2024-07-03T01:52:35.427000 +CVE-2024-29787,0,1,8b3227822d531960b3be4bdc2e1a147750039f680413f3ae3fe72ae67cdc3673,2024-07-03T01:52:36.683000 CVE-2024-29788,0,0,8cc2af0c2b669256f5779a8a4a350af2b3525bc2e92357d3051a10e492c80e6c,2024-03-27T15:49:41.437000 CVE-2024-29789,0,0,28405d77cf9c690089caf44c730ea92c38ee335fb6ea974e0cc4c214ee7b123f,2024-03-27T15:49:41.437000 CVE-2024-2979,0,0,a292112e5c65c94cb7e5874aae33d26b8dd263e3daabe71788a5100e1cf8c075,2024-05-17T02:38:40.103000 @@ -248655,16 +248655,16 @@ CVE-2024-29818,0,0,1f8959f01324e92affea2052755ae86441537116ae9d8dda4a17418633306 CVE-2024-29819,0,0,489085f50dbde78feed33cc0a68fd671c989aac2e872d0b30a126d7fff3447e6,2024-03-27T12:29:30.307000 CVE-2024-2982,0,0,4aa7b937619803bd745055b07038dec2aac337789514c96ad26dee4b03439859,2024-05-17T02:38:40.403000 CVE-2024-29820,0,0,da81473ce6ac9b7a0c8169d0e94b81abe513c85a432f3965c234ec8d7d8b927f,2024-03-27T12:29:30.307000 -CVE-2024-29822,0,0,9ce746180dcb535301bc4becbdd4ed1866102889d77ceea1f7fa78a8db682e1a,2024-05-31T19:14:47.793000 -CVE-2024-29823,0,0,51f997a17d98e5f8e88be6e1ce231a3cbdecbf0b3cffed1719af8bdf55e49f0c,2024-05-31T19:14:47.793000 -CVE-2024-29824,0,0,d0612929873e152d904f08f3b760b2276d386fab374216a534bcf195762b6400,2024-05-31T19:14:47.793000 -CVE-2024-29825,0,0,b436fc4a690b2073b90148bfa213f637ae66a97ccbada2d183ce2152cb0cca7e,2024-05-31T19:14:47.793000 -CVE-2024-29826,0,0,b312222811c2d5d6ffb9c978e27cc450e11a9072a9fe21e27c0eace221aa56a2,2024-05-31T19:14:47.793000 -CVE-2024-29827,0,0,8bf59165a1c96983f2990924879918f858fd241662fe606f34d66423f09090dd,2024-05-31T19:14:47.793000 +CVE-2024-29822,0,1,d2615e91bb9823f5a68536f9b4cd5a24e0ab8f0aef33b45a1b908d6ea521e356,2024-07-03T01:52:39.707000 +CVE-2024-29823,0,1,21758f125f4d7ae23b17eb7d3b14695a0bc4f03982cdf3bd61c673e8fe783a08,2024-07-03T01:52:40.430000 +CVE-2024-29824,0,1,b375dd609ead4d6fa8deffd53d21027aee5b0c970a4280fe54c865911c5d6fab,2024-07-03T01:52:41.133000 +CVE-2024-29825,0,1,e1f08e7c77d9316a41574b3f9c50358ca3dcdde2c564abef4272669d8c666180,2024-07-03T01:52:41.840000 +CVE-2024-29826,0,1,015b7dc5cecd0e0c7eb7d8f1703674bec978f3ccdbd1be411e52d58ba200b131,2024-07-03T01:52:42.553000 +CVE-2024-29827,0,1,29c9069ded6ac01c3dd894b93f19938e882c8194d01f03990ea46638fcde5cd6,2024-07-03T01:52:43.270000 CVE-2024-29828,0,0,88b2301100152a3a8804ea58c67c8935af99a17ad84c5804a16e7ef535d9bcff,2024-05-31T19:14:47.793000 -CVE-2024-29829,0,0,5c4d42b34f68db9829cdc1b49162eadbbb56fe5d91370145250ab87f718a83f4,2024-05-31T19:14:47.793000 +CVE-2024-29829,0,1,2627c3c538089236c07fc9d99ff01f8523c0ad4c659196fc4e8a6a2fbde2ef8b,2024-07-03T01:52:43.970000 CVE-2024-2983,0,0,bbc8512579381338bf10ae1b698e35829f3ad472ac95ecb989d0b205ba03dc93,2024-05-17T02:38:40.503000 -CVE-2024-29830,0,0,12077b2f61cab24dbd463073ab211bf274cd487f3d06b2a4e1f04bbe362c9d75,2024-05-31T19:14:47.793000 +CVE-2024-29830,0,1,18395a43d7ad8c4a3ef4b143a126bb1f7f474279d280a4d068388e15b7d7d9c8,2024-07-03T01:52:44.693000 CVE-2024-29832,0,0,9f165dd8af7b150aedd8ba0e648c487f081558a3943c83b1f6267f1670f3eb8a,2024-03-26T17:09:53.043000 CVE-2024-29833,0,0,425a7917efe73a1770fcefa4ce4ec7e1a0c1da408936ec3b87fe92c30b675f21,2024-03-26T17:09:53.043000 CVE-2024-29834,0,0,8cc60342382915a3218e3b4fbfae27625c02b9703c9f2ace2a02e0ceee6666b1,2024-05-01T17:15:32.153000 @@ -248678,14 +248678,14 @@ CVE-2024-29841,0,0,55b576137a980baf276319e7949f14a0b7f1bac68593183f67439c72ef1c2 CVE-2024-29842,0,0,c555d339d968965f67a62125788ebd30337e465ee62002c966027b486a7b6656,2024-04-15T13:15:31.997000 CVE-2024-29843,0,0,0e7cac2423043e71c46c0b1e43ac9a8c810800e1746f633c825d47d92993ebb0,2024-04-15T13:15:31.997000 CVE-2024-29844,0,0,0b2bf20574d5156f6a667769b4d5660c6c41f0f9a81de3ca328a866e5a169d72,2024-04-15T13:15:31.997000 -CVE-2024-29846,0,0,b25e12d4248bf23f590abe7409cc0aaf0a481ebb63e90c1d24d26e072ad590be,2024-05-31T19:14:47.793000 -CVE-2024-29848,0,0,228968383d5313b56b259c6f06bef42fc944377c207e4821d48f31b56b31e39e,2024-05-31T19:14:47.793000 -CVE-2024-29849,0,0,ccaf70e0ea920c9401408369b91e6b1138ad2d7173b8d336d5c09826b845da90,2024-05-24T01:15:30.977000 +CVE-2024-29846,0,1,ecf705f8a3f3d5200a5c3119a1c5f5c4508879a9b659519aff9f7061bee1cc64,2024-07-03T01:52:46.270000 +CVE-2024-29848,0,1,572f203a18b60b1fdf8b35785afb572e4ba27bc9b1677d0760a64742aa875c84,2024-07-03T01:52:46.980000 +CVE-2024-29849,0,1,f0326930a23ff5c9419ec7504b4b4f26a8016e21eb2c16c17808ae35e2984b26,2024-07-03T01:52:47.767000 CVE-2024-2985,0,0,fa2452bdca8bf817e9c39173e50c9398ab81e8bbe363c5d181d5470655c888f8,2024-05-17T02:38:40.683000 -CVE-2024-29850,0,0,312685b23dbad4c8f8e6bd1bd0266c24c6e302be8a27839473fa75007f2aca05,2024-05-24T01:15:30.977000 +CVE-2024-29850,0,1,97868bac62290aeeaf47d9bee0575c21786d7518d529b709efa87179f84a22a5,2024-07-03T01:52:48.473000 CVE-2024-29851,0,0,218edcf6feb0effa72e3a8c5b814479d3c2c35c93f48749732d1e5886bf0b9db,2024-05-24T01:15:30.977000 -CVE-2024-29852,0,0,ca2ab03d52a8ecc9be34c09f2ce895e1acb480d7a13320d670e056e88b347616,2024-05-24T01:15:30.977000 -CVE-2024-29853,0,0,aa05b8b855ccb2c04433e87284eb4c79c04809a52f521f75709ccc473b6143f1,2024-05-24T01:15:30.977000 +CVE-2024-29852,0,1,726c48fca6ecce09ba0891a4732d56a8cd51267214424717a9c0997e21d90cb7,2024-07-03T01:52:49.260000 +CVE-2024-29853,0,1,c1ae8cba1ec19d8da2e0ffbfe16c680f8b2163da29207d481a72323097831057,2024-07-03T01:52:49.947000 CVE-2024-29855,0,0,ee183a830e94532701a8e68a1a05e136347fa507da9c0312445a531c86b3c251,2024-06-11T13:54:12.057000 CVE-2024-29857,0,0,9325f9fdc1f4e8265930eb53922aae24948d06e15ce403473a616a945c01d1ad,2024-05-14T16:13:02.773000 CVE-2024-29858,0,0,ec21ad079a83cd076ada45f6eaa6cdca3318bb07ab260d892702dff1f9c09fde,2024-03-21T12:58:51.093000 @@ -248696,7 +248696,7 @@ CVE-2024-29863,0,0,5ec71e17f35f1b20d68a8fb4a9c7a1d55d3d29cfb9efd5769e3093565fc81 CVE-2024-29864,0,0,a6ff60d6eca0eec860cad03d4ebcf6ddb2a8ce1d06f7fbda3179547925ea7c1b,2024-03-21T12:58:51.093000 CVE-2024-29865,0,0,c71ea820e322882cfd10f1c29db59e00803f8a609d75b87f5e2466dff384d5b6,2024-03-22T15:34:43.663000 CVE-2024-29866,0,0,2169c0f3fed16be1069cbb5502128dfabe18fe6fbc7db4f274cc3c93caea8ddd,2024-03-21T15:24:35.093000 -CVE-2024-29868,0,0,6456e128accc60aee2aef86dbbae1cd4b0483a8173709cce49d20eaf8f8b4d72,2024-06-24T12:57:36.513000 +CVE-2024-29868,0,1,6d9e485e8577ac109fc1f82f0290bd5fe84a3838b362df48ef16f072b5556dcf,2024-07-03T01:52:50.837000 CVE-2024-2987,0,0,8e4472435dae1bc704d5dce95b8b76dabb2648c6f5bada5b41186e08bd4d1ecf,2024-05-17T02:38:40.867000 CVE-2024-29870,0,0,e30dc3832a6e40f96f36d6a14e8c8edd290056d5cc189e329ff7d917f01a8001,2024-03-21T15:24:35.093000 CVE-2024-29871,0,0,26669ba5bfad06e749b4da0897856b8ae6b3b31b4382f6713c54983091b3efd3,2024-03-21T15:24:35.093000 @@ -248745,7 +248745,7 @@ CVE-2024-29912,0,0,d4e137e215b0b00b25a8930ce0d0657c6dd7b00bfc0db6a92606d9a19e62f CVE-2024-29913,0,0,86e3efc5b1353eb04c1c92a171500230e917b75dd52877c2f2066a6fd3fd1a62,2024-03-27T12:29:30.307000 CVE-2024-29914,0,0,41820f304cde41c3e6cd90a76cfeb8bb6694505fac53e08e98bf56ec132dedca,2024-03-27T12:29:30.307000 CVE-2024-29915,0,0,ed7f33b1235afbae494d2037161616570ebacbb5f3afa9bfd159dd9de9cf22c2,2024-03-27T12:29:30.307000 -CVE-2024-29916,0,0,1846bc416236dc619ebd1bf282dfc68f1e5c3f0768cb2b956c62d71d73906ba9,2024-03-21T19:47:03.943000 +CVE-2024-29916,0,1,1886b67993ddecd5872a368ade2b9940d3468220a38abae2736ce6002a67939a,2024-07-03T01:52:52.383000 CVE-2024-29917,0,0,95c3e445522199a26b83d938184afd90a1d9b3b2a8bc319b5dd0b9abf802413e,2024-03-27T12:29:30.307000 CVE-2024-29918,0,0,c4d24a04c4f4c9971aa2b61b2b16b6699727fc3170e99022d4d427890c1308f4,2024-03-27T12:29:30.307000 CVE-2024-29919,0,0,817229c260cd52d55a65e42df611e748e6f73b9a57660f2c28863f6cf3622c00,2024-03-27T12:29:30.307000 @@ -248813,7 +248813,7 @@ CVE-2024-29983,0,0,fcb26f8ef908d69f46c133d47f6fa7f3c86c8dbeb0e9e8f0c2b6960da90e3 CVE-2024-29984,0,0,c8eb19615edacf6092478fb2ad2d94260f928e0cc536a406011e5f52cd4d7b56,2024-04-10T13:24:00.070000 CVE-2024-29985,0,0,2e01df5251c981f52737c67be1729569718fa94485a3bfe706db8d88b47a628b,2024-04-10T13:24:00.070000 CVE-2024-29986,0,0,17685573c9412982552fc59dab43c7536712413b6d2f8f6b1273fa11c65f6435,2024-04-19T13:10:25.637000 -CVE-2024-29987,0,0,3573627c2ff244f2cb9e4bdad8b63accfe51c2fb4ec9a275c0c75f01626ac532,2024-06-11T16:15:25.047000 +CVE-2024-29987,0,1,739a645d6cb57eafd57ae46b02a164214b94110d7027433cafab7724c5c859ab,2024-07-03T01:52:55.750000 CVE-2024-29988,0,0,eaf2d772ec94145334adcb8db67ab7a5bf7b2094338217b8f25aa965ef678736,2024-05-03T16:13:41.277000 CVE-2024-29989,0,0,8f06390ede228924078f3e71f278dc13caa7b29bc7a43dd5671d47700d642746,2024-04-10T13:24:00.070000 CVE-2024-2999,0,0,66188d89d7d084310719b745c980d492c6cc053998ad2cc3ef073d46cef269ec,2024-05-17T02:38:41.973000 @@ -248888,7 +248888,7 @@ CVE-2024-30054,0,0,4bef1769b874d4ff9047765ac17cb428233424000152b0497aba8ed1ea3ca CVE-2024-30055,0,0,3c1bf54fd3fe6c5ab3703162f359c88c3cd7915d8f1fdb651cdd28bec89280a6,2024-05-15T20:15:11.047000 CVE-2024-30056,0,0,9eabc96ede995114869bb3aef4380d7f915e132e425ada2ef8ddea79edd8b89e,2024-05-28T12:39:42.673000 CVE-2024-30057,0,0,c7eab3d4cefd1514c5d88f29be8ea4faf479c2c21e752ea7a7a05bd4e8190c85,2024-06-26T18:15:12.910000 -CVE-2024-30058,0,0,e6962890a9824ef753f4a4c15f3b5e8d5d77a7cacfc1a8193e6f995befab26c4,2024-06-26T18:15:13.110000 +CVE-2024-30058,0,1,a1a511e081de1359a5c8e8dfcd73ce56d4990c75e99ccab65e8b03e7960f4873,2024-07-03T01:53:46.567000 CVE-2024-30059,0,0,0e87263445f5c97fb9a9f1ad7d5045c3390ca52e934287a08ee2b0f2dd5a42eb,2024-05-14T19:17:55.627000 CVE-2024-3006,0,0,a3349f2fae283580197c9d70e5010e27f73c2425a5df8de3e4af5a848c49e4b6,2024-05-17T02:39:40.117000 CVE-2024-30060,0,0,2d2a2a35846e7a2325ed3d83fd6e93b127058a9b2ed174c7bcd985716e44cfaf,2024-05-17T18:36:05.263000 @@ -248933,13 +248933,13 @@ CVE-2024-30101,0,0,0bec38d6d8ac185906d862c1965fa271c3a269e10cd1eca1349be7fa7804e CVE-2024-30102,0,0,fdb60017518c4e4447c4f87ac5e20b8bd141f8c977ea7ed95409f58601a5e359,2024-06-20T17:24:52.287000 CVE-2024-30103,0,0,e9b11315180cc2be70516f393013c4d68dd205d4a54691a3e15d1cbe00247ba4,2024-06-20T17:26:40.603000 CVE-2024-30104,0,0,5a9d1985e988cec27229a284222c230de4fd29fc24d0330a38548721a0729d9d,2024-06-20T17:27:01.447000 -CVE-2024-30107,0,0,7e9f39013645f69ffc09f932047c5fded8481e31de256075b8ab56490f9048bd,2024-04-19T13:10:25.637000 +CVE-2024-30107,0,1,d3b5ab85a30627420755b961fce34a4b2d10a642f6dfcc200d0ec65e71213655,2024-07-03T01:53:50.107000 CVE-2024-30109,0,0,6a8a59a3bf8868bc11960f386f3b1ccf692b85f5ec7ca1c3028fdcd4f6f4463b,2024-06-28T10:27:00.920000 CVE-2024-3011,0,0,1567706f33ba4a3729190a5acfa17d903c76e23445fbf38d371926fb70a5af71,2024-05-17T02:39:40.533000 CVE-2024-30110,0,0,31ab34f1dc971d2399c4b149c7b81d5c8b84b447a4e58f0764d923bfa4bd3cfa,2024-06-28T10:27:00.920000 CVE-2024-30111,0,0,20afbe01364d348dba165503ff4e528be7a6b88d771c910736a2fa16ed5a768c,2024-06-28T10:27:00.920000 CVE-2024-30112,0,0,7776e48af0349613d262d23e79d54eaf55862c79c613ef95710a33f68285b593,2024-06-26T12:44:29.693000 -CVE-2024-30119,0,0,faff61cb55bb1e1c818b9460a2a056f4c8970e03380dd9d518774564c9b27a5c,2024-06-17T12:42:04.623000 +CVE-2024-30119,0,1,4baed8c508a821c818525782701105249753896feab644ba3efffba269f578b9,2024-07-03T01:53:51.120000 CVE-2024-3012,0,0,3d13067eee5369169a098d5c023f7c1a68bff1bb4361076791d74ce86fdf610f,2024-05-17T02:39:40.620000 CVE-2024-30120,0,0,e36717a45c134ce96ee2f16d093d8717c8dcca8c5bf419fdf3e6a16688a2f2e7,2024-06-17T12:42:04.623000 CVE-2024-3013,0,0,d99aebfcd4c3fad166b5c8782b32734185b35fca38a39501e4e58d010c943884,2024-05-17T02:39:40.710000 @@ -248949,10 +248949,10 @@ CVE-2024-3015,0,0,5bfcc2df8ce380675198b2d677a05b9fe4d1d4de944a30f5dbc4a57145492e CVE-2024-30156,0,0,f042a6e9e665ad25cb33e6086a6b1915f5ef73ca21458bc60ad138bf3a5430b0,2024-03-25T01:51:01.223000 CVE-2024-3016,0,0,144d4fb32b1937399ef996d1fb0a438a94695eb58d12556815e9e53871a44930,2024-05-14T16:11:39.510000 CVE-2024-30161,0,0,f6e020d1b7d6902ffc5c88d1ad51f533f0208a2bc085d7a564099f91ae9a953b,2024-04-11T14:15:12.083000 -CVE-2024-30162,0,0,86d0c76758624e1d44eb2872fcf93da736e0f5211c0667a19006d7fd41141752,2024-06-07T19:24:09.243000 +CVE-2024-30162,0,1,bfc1b2dd1f9f0516f5fde509ec8f6b937e3d3043c9b38e8e614a15ddc80d79a3,2024-07-03T01:53:51.970000 CVE-2024-30163,0,0,ed34c2262e7c7a5b4ecc7a347b985e1d1a2b083b2d7d7e16a60fc8754b18c01e,2024-06-07T19:24:09.243000 -CVE-2024-30164,0,0,e604a746819c62a61fa9a1d06107b7335e1c3cec37770f0dfa87c35b495db483,2024-05-29T13:02:09.280000 -CVE-2024-30165,0,0,c3e47ef351718e7ba43773e63c1406cc889c24cbd661059aded8ef2545109ec1,2024-05-29T13:02:09.280000 +CVE-2024-30164,0,1,3fa9289f0559618e7bad46ffe5b89aecd709c72c162900fb09331245f882a216,2024-07-03T01:53:52.840000 +CVE-2024-30165,0,1,516d72029cdecb5325a90c1123b764a62c24a7b3a4fe7fb9f30a6bc38aa2d8cb,2024-07-03T01:53:53.630000 CVE-2024-30166,0,0,b150008503ab8c7534770489f2591fa7243e9c9df016e5c1c4c33123a4b73e85,2024-04-03T12:38:04.840000 CVE-2024-3017,0,0,1f5be6a00cc17bbba71ee155318c98c351cb1f43106e0816220cced6b290af06,2024-06-27T19:25:12.067000 CVE-2024-30171,0,0,01719a9378c350847ae599f84f673a1bd54b602a3108dc795b8a1c7ffe8fb56a,2024-06-14T13:15:51.603000 @@ -249194,7 +249194,7 @@ CVE-2024-30415,0,0,c67029325d33a1ce8e97b7604f93756b30725418df8597cb37f9b0d437540 CVE-2024-30416,0,0,3af0469edbc7730189819c559bfc99705333bc039fec00229c75444e3843fffd,2024-04-08T18:48:40.217000 CVE-2024-30417,0,0,4b0219fd35ed725db3c26aba1f1f4ed768dae0878c967a047f37117e414e514d,2024-04-08T18:48:40.217000 CVE-2024-30418,0,0,0aa631f82db225e247e747f2c214d9d726c3914e3c3ad6a01574772c58c07455,2024-04-08T18:48:40.217000 -CVE-2024-30419,0,0,bf4254e80686999a4b056e56a2d656433d6e48bc30becadd1a8c29a2c0dba46e,2024-05-22T12:46:53.887000 +CVE-2024-30419,0,1,2f530b202492e52318032e7619655e6192edb2822beab428ec9cba2b2427cda7,2024-07-03T01:54:04.563000 CVE-2024-3042,0,0,edf49fe44d6b8870126e49562de5abc06841d778b9974de7464ab1f1965672d6,2024-05-17T02:39:41.680000 CVE-2024-30420,0,0,0db933c30fe4b82a50dfb0c543e39daf4084f355ad47a2ac8e0693fe33e8c074,2024-05-22T12:46:53.887000 CVE-2024-30421,0,0,8cfd124574a85b45cac2d52527d901d612a69bb0525bed810c2e40b98978560c,2024-03-28T12:42:56.150000 @@ -249384,7 +249384,7 @@ CVE-2024-30614,0,0,07e4194c2494ff4594f776c6b8f53ad1a48995bb1a612cc43a1ae18f2a8b0 CVE-2024-30620,0,0,761188526e26cc91e0f6258925cfdd89caad5faac5077097ba431c437299a06b,2024-04-08T22:48:50.340000 CVE-2024-30621,0,0,9fba13a7080ae15640edcf3cb18d8dd79481c10bb3102533f267ff3982d5b57e,2024-04-08T22:48:53.950000 CVE-2024-30622,0,0,0da5246ef4e8510b5fbd6bec86e149da05d8dfe76b52aa744b083196821dd6ad,2024-03-29T13:28:22.880000 -CVE-2024-30623,0,0,6ede78fde134768f49ef746b2af5d5df00d246247702695d5ba85541fd1d9066,2024-03-29T13:28:22.880000 +CVE-2024-30623,0,1,068ad85c64fcd7c5771be6968a3fe4899f42b182e4626cc9e0835726390d147d,2024-07-03T01:54:12.180000 CVE-2024-30624,0,0,66d3e2d7e06cec16684c816196f2a69004a5a14026cf6f1d337c7e127ed9e3f6,2024-03-29T13:28:22.880000 CVE-2024-30625,0,0,a48225cb5b5eed5083ce514661098dcabbc07570c8aed6144d878bd7d95b966f,2024-03-29T13:28:22.880000 CVE-2024-30626,0,0,dd61e51a8ba5f6151ec2012c267de9a8f4363b4511aa2015e23176fa696a192e,2024-03-29T13:28:22.880000 @@ -249399,7 +249399,7 @@ CVE-2024-30633,0,0,ab319b0e491468d1c3cbfe5f0d96924a7633dfe57388516e1be47f6b3fc36 CVE-2024-30634,0,0,5ccb07d5328fc1be0e2cbedc51c91a12c3569f3573097e7566a8fa75fcc42efa,2024-04-01T01:12:59.077000 CVE-2024-30635,0,0,ef77a9e1c6244f1e6460f57329624df2a1158ef382b789e8309986f035c85862,2024-04-01T01:12:59.077000 CVE-2024-30636,0,0,c96d7020b9575675321d21406a3dff42d8ec7d0432a5844ede2770796a618007,2024-04-01T01:12:59.077000 -CVE-2024-30637,0,0,08a72ae3945dbc8426c1fcf549781118e319e52e6929a1d19f5c23c1cf06f6ec,2024-04-01T01:12:59.077000 +CVE-2024-30637,0,1,4903be2e34292b70c4fd64a16207b4d414e56da06073b801c097feb452620a21,2024-07-03T01:54:12.967000 CVE-2024-30638,0,0,476165b7ba1121567d55c67d54d9d40e3e29ea068ff3cb9f8e442a4ce4566f0b,2024-04-01T01:12:59.077000 CVE-2024-30639,0,0,46b7c5471e103449855c9fbd2240c66d12c0c2b4b2c2dd58c9da71634c442509,2024-04-01T01:12:59.077000 CVE-2024-3064,0,0,150d2695d7eeb315cec549f12d6c6ef3f6e02daaf223b84571983b190cdbdba2,2024-04-10T13:23:38.787000 @@ -249477,9 +249477,9 @@ CVE-2024-3076,0,0,b2ddfdf17526511f9ad04f6248546e0c8d288852cffe59b222a3e4004ceea7 CVE-2024-3077,0,0,df42d4a62ceb1c6a6275b9b1d36ac8da42c0ae3505d0e07beac8238605b5504b,2024-03-29T12:45:02.937000 CVE-2024-3078,0,0,bab9594b1bbcb7c5b250fbe2c8eea38e31b02ce838e7fc85a3f05fa82d4d81e1,2024-05-17T02:39:42.337000 CVE-2024-3079,0,0,50d8fa3f15e0dba3123c9f2a8c5f91dc9ed9337671e6596861e01a056d0b3f1c,2024-06-17T12:43:31.090000 -CVE-2024-30799,0,0,eae5bca102ad0c1fe3f236f7e51af89eca892740403953a6086f43b81ad7d92b,2024-04-22T13:28:43.747000 +CVE-2024-30799,0,1,d0be2d0f006d2c4f92e204846e2ae37ca4e292273d3e14437b5fe8a98380dd9a,2024-07-03T01:54:13.747000 CVE-2024-3080,0,0,9363c109e83d1ce4c30b747495432709a80af2001fbb6d090baa825c691ff1db,2024-06-17T12:43:31.090000 -CVE-2024-30800,0,0,f3aa3f6f154cac6ad1c0d84e6831cbd6fca8728e681fceff9d529e8d2a6eec09,2024-04-24T13:39:42.883000 +CVE-2024-30800,0,1,0821d6c5762542cf57058639b308e934860f4fe6fa29f94737b84029e48a9be3,2024-07-03T01:54:13.930000 CVE-2024-30801,0,0,59870152c8da15c65471b6c718cd867071125370ab29779fbd2a95a500515742,2024-05-14T16:13:02.773000 CVE-2024-30802,0,0,07a5f60026e39f7ac976e8364b15ee9d61c61f85b2e7ce06003ce4055b46ceb0,2024-05-14T16:13:02.773000 CVE-2024-30804,0,0,cc06a8e47fa63f418e439b59501ce1981d6b96e17fc4ed9991805cce053dddde,2024-04-29T12:42:03.667000 @@ -249501,7 +249501,7 @@ CVE-2024-30859,0,0,07863108200ea1214b143e037da0e726261ba3163514cc96b0c60d438d348 CVE-2024-3086,0,0,7e95cb4550fb1056dd0936024de18ec97380d1b1d2b431d1df6e7775642d2bd3,2024-05-17T02:39:42.693000 CVE-2024-30860,0,0,57c961935ca96f0d726c7792aada157040af2dca04eb4ceddb1a736e40c8a9bb,2024-04-02T12:50:42.233000 CVE-2024-30861,0,0,9f1fa8933ed2f68c5874a5300f5a3d37c1147e684241a006ca810c40cfb6858d,2024-04-02T12:50:42.233000 -CVE-2024-30862,0,0,ccdba0d117cf944c29a4b8d0aea6c6c432d8d37bb99634e25ef7a085bd0dad0b,2024-04-02T12:50:42.233000 +CVE-2024-30862,0,1,2f8ee6d6575c950abdb75d61397650796104ac283158fac245a38cdac1f61216,2024-07-03T01:54:14.183000 CVE-2024-30863,0,0,c8281ac28ed8a1a8d0b0d168e520b7f79c9e8ac5bb6e881c50a7ffa33faaedb9,2024-04-02T12:50:42.233000 CVE-2024-30864,0,0,7a490e12a6b59a146a093cae8b327acb94765f9bf349309a6726e4bfec7957f8,2024-04-01T15:53:18.060000 CVE-2024-30865,0,0,8d6be82e703e126fe494ca4f04954576ddfdaff6e7a189019ccd9c304483bfc3,2024-04-01T15:53:18.060000 @@ -249522,81 +249522,81 @@ CVE-2024-30885,0,0,053b43f723add848d769270cc9eabce98f2bef07551ec399121d9cd8c2945 CVE-2024-30886,0,0,78e1ecd0ca2250189e977131b68a166fe34cee6c425475aee62ecd362250a877,2024-04-24T13:39:42.883000 CVE-2024-30889,0,0,7a4509f1616bbdfd664f70717e2f2fde35cf219fb77a745eb861f104ffdffdfc,2024-06-06T19:09:09.840000 CVE-2024-3089,0,0,6d83a2e641781112a9b8cec51b7105b249659c2946e3299214b4477888519781,2024-06-10T19:15:54.210000 -CVE-2024-30890,0,0,39acc6930e6d21119fa952336469013f3c94563e745def6de23d4ab6c1b58299,2024-04-25T17:24:59.967000 +CVE-2024-30890,0,1,70cd6656f6551d3fbf1d211e5aa4de5732e110f0e7820ed44ca9141eadf4b5b1,2024-07-03T01:54:15.373000 CVE-2024-30891,0,0,eaa8b86280359f3d73f2f1d8a4256591b68799e019aa5c9624f2214d6f01088e,2024-04-05T12:40:52.763000 CVE-2024-3090,0,0,edb617b18b2f4521fb7eae141660187181b2d32e39e048a00e6fae489e6d207a,2024-05-17T02:39:43.047000 CVE-2024-3091,0,0,85c676f553cd7c37390e9dd1d2626d1b703e97dc8870baec0ee1e157f2c69f5b,2024-05-17T02:39:43.130000 -CVE-2024-30915,0,0,9a13183a0128e0ebba105aac6b4f16ab0a4a277d1597444f325eb278b416c302,2024-04-11T12:47:44.137000 +CVE-2024-30915,0,1,4a451061f2277273de3f1e30d4e5402fc40c4a77bd4f2be73b5ddc38a083afc5,2024-07-03T01:54:16.067000 CVE-2024-30916,0,0,a75ac013b4975103273f280feb4d1408231c0d93576fac2bd9f593ea396bd4d3,2024-04-11T12:47:44.137000 CVE-2024-30917,0,0,c44e8b8a426b1382e7b03152893a57378750ba3fe2425d8fdd5fd2662c53461b,2024-04-11T12:47:44.137000 CVE-2024-3092,0,0,cb7f2178928a426a0265657834f9aeb630ccb1ca35a9c66bd22fe30bfcb426f5,2024-04-12T12:43:57.400000 -CVE-2024-30920,0,0,d6db9607a13af968e8f4dfd3d19894d68bcc3ec267971761b8f9c7d836ce9968,2024-04-19T13:10:25.637000 -CVE-2024-30921,0,0,e1292fe78802c0d895b494d937db096f736247d36e40c3b2548f35a202c30dc9,2024-04-19T13:10:25.637000 -CVE-2024-30922,0,0,d5026c16db753723bd3d5b605a540f51e1c8d8caab2ca9698aabbb41e206e561,2024-04-19T13:10:25.637000 +CVE-2024-30920,0,1,755e5fd72bb1859fa0ef82051ceaafd42ee2d81708d249e6f1a815457a0034d0,2024-07-03T01:54:16.273000 +CVE-2024-30921,0,1,8e85a33db60f73a94dcc7d8613386cc444fa7f9176c5206bdd02bb45585e34b2,2024-07-03T01:54:17.057000 +CVE-2024-30922,0,1,cf163111ed5d85555cabc446f2f9d97fac6c7f0ed747ee1f78406fef4e9bf3e0,2024-07-03T01:54:17.827000 CVE-2024-30923,0,0,2b645588a6409d0059529917c7654e3d2ebc2f2b8324e069c91c32865052a48c,2024-04-19T13:10:25.637000 -CVE-2024-30924,0,0,d7a444b5ed03e7c8f3405be70a03072cd28047bb4bdd9424544d843556e08540,2024-04-19T13:10:25.637000 -CVE-2024-30925,0,0,8e354f49a4f749df14ced9f5f61698782a3c4559a4c0ca3611a5c975d150ca50,2024-04-19T13:10:25.637000 -CVE-2024-30926,0,0,800c22b0daa9f7d2b9aeb1272151dd94a2cd3ce872169a6858767bbe8e780d74,2024-04-19T13:10:25.637000 -CVE-2024-30927,0,0,7f5fb9dbb74187186c12e2f8edd52380a2fe14d4923fe303fe1e826ee9046ff5,2024-04-19T13:10:25.637000 -CVE-2024-30928,0,0,caf910b47d65799a57161146e34602829f47360642a8c8fe911c2d8ad140dddb,2024-04-19T13:10:25.637000 -CVE-2024-30929,0,0,3a4b987ba39620a2fa553421d0680484415e43d1909ca51832f180e76c2d2d0f,2024-04-19T13:10:25.637000 +CVE-2024-30924,0,1,22bd972b2c3f6dbbb8e41f56a66263757ec7eb8e597484f0e2796a2cac4237a4,2024-07-03T01:54:18.593000 +CVE-2024-30925,0,1,23f6cfde37cb305753d473ae13036a29f5bb7fcda37b8c8f7b5e05d6955a525c,2024-07-03T01:54:19.410000 +CVE-2024-30926,0,1,2e48339c860de6d8b8371963c63d2e47743152d622b217fd2eb9f09dedcce9c7,2024-07-03T01:54:20.187000 +CVE-2024-30927,0,1,d29266bc2b814d55a3b8dffd51faaae87e68901bd3496504dbc5db671534d1b0,2024-07-03T01:54:20.970000 +CVE-2024-30928,0,1,aee0febe63197b3c34ffc21c0b215933e4d30f06f0de72a31dd7df4c48678b26,2024-07-03T01:54:21.770000 +CVE-2024-30929,0,1,7150ed17033c783d22cb10cc7e29801b4cdbd11e710f0261447b2fe790494266,2024-07-03T01:54:22.560000 CVE-2024-3093,0,0,88e99931e3bb45e3b00bfc123293a0bff2319b704247b4d251e357b27062aff3,2024-05-07T13:15:48.260000 -CVE-2024-30931,0,0,c336f970cb863df7d55794c1c1216e535d9fa98cb01a6ae24e794a0505fdb1d1,2024-06-26T12:44:29.693000 -CVE-2024-30938,0,0,bb3c87898373ca38f4e6504fd7f34baf274fe16334abf7626317b091c9072986,2024-04-19T13:10:25.637000 +CVE-2024-30931,0,1,1c68d82180e73b8514f26d33f19b69f95be31480b9f9d1b6b39915134b180669,2024-07-03T01:54:23.343000 +CVE-2024-30938,0,1,29b8e40617dee21c8890e6dc6801cc20a4d0cd635b3d627aba79e0fa49cbd6d1,2024-07-03T01:54:24.137000 CVE-2024-30939,0,0,2c9741729607a2e80601d31a316dfe5a77e488a194c61c09d029bf2778d383d7,2024-04-26T12:58:17.720000 CVE-2024-3094,0,0,8ed23f1232ed36fe384d7a52f468b21b74026ccef3e50e7fa1460af68654fd3b,2024-05-01T19:15:27.340000 -CVE-2024-30946,0,0,0dff329aaece035fc82f00595012379643bd5a0edb89ee3a7369d6609e13a4d1,2024-04-02T18:12:16.283000 +CVE-2024-30946,0,1,7c64f57becf760e1029c7f17f5554dd3b55e452eafcf4a611ce8a9042ae36380,2024-07-03T01:54:24.920000 CVE-2024-3095,0,0,61d55fb0c9c8809327d85ad5dd4ab89ba9cf11921e765f0ffa52b8d4497f2fdb,2024-06-07T14:56:05.647000 -CVE-2024-30950,0,0,992550aa16b7b69040c27b7eadb42b4babd9ce9c185610db0008bbada9865896,2024-04-17T20:08:21.887000 -CVE-2024-30951,0,0,64c319e5130efe1148872b6efd54e0b74d19e18724bc83608b600a523ab1d0cb,2024-04-17T20:08:21.887000 +CVE-2024-30950,0,1,19fcf7a45168a789955b2198c0713f1a1ef707cd5bb1de038ced1b6154c32fe1,2024-07-03T01:54:25.763000 +CVE-2024-30951,0,1,9b092a5976ea47ae9ce6ac6665423991363b55ee54764d7a78a3d2ce95cbd3aa,2024-07-03T01:54:26.557000 CVE-2024-30952,0,0,45f3818300706503aa11d9788e132ab06eaeaa5db69128a0c2116be2f61adacf,2024-04-17T15:31:50.160000 -CVE-2024-30953,0,0,b6048a3223dd71969afb665512f3c96be52d96e721358fb67ff9cf9a8128e438,2024-04-17T20:08:21.887000 +CVE-2024-30953,0,1,6d921cd6fd90184e6ad5174bce664f22cb22e40d44f91e20fb09119d4bedb769,2024-07-03T01:54:27.430000 CVE-2024-3096,0,0,2be97d2fe97bbec19dc7276ea118f346f6501adfaa0ea823b2a503e30bbc7476,2024-06-10T18:15:36.050000 CVE-2024-30965,0,0,0e44dd5d951a25ac3e8873a32678a3145da47d1060cb5312576a9c0471b643ad,2024-04-02T18:12:16.283000 CVE-2024-3097,0,0,34b222095b4c58e8686826c73c47f391fd247710053df9aaf322e019da7a6c42,2024-04-26T15:56:40.820000 CVE-2024-30973,0,0,60d233d75a25952277335789c679aa444f3525d6e5b6af0f3b5901b26ae4a555,2024-05-07T13:39:32.710000 -CVE-2024-30974,0,0,fad1ff421513e997a755a646f437b1cf2946e8e72ed4701dccf29e92d3c1baae,2024-04-22T13:28:50.310000 +CVE-2024-30974,0,1,58d798e5f49d558922aa7ff1fef01b969ff326cf30be128717719a7efa0d452a,2024-07-03T01:54:28.233000 CVE-2024-30977,0,0,0a99023cc49f8723c27525ea3fd6d09c0a18e0536fb7ad1e37e70ef0654b9714,2024-04-08T18:49:25.863000 CVE-2024-30979,0,0,80ab36bca498e33975593d086ceeeedf107c2c6f87bef059b959bbe8c3731bf4,2024-04-17T16:51:07.347000 CVE-2024-3098,0,0,6c9612ddcc0eabe1134a3c49c1d4f4b4a8fb99e39689761d9db9b207a4883fdf,2024-04-10T19:49:51.183000 CVE-2024-30980,0,0,833b78703b167eadbc4b1a9a9075d8c2e0d7bf80c01c5e66d90e566b497b9b17,2024-04-17T20:08:21.887000 -CVE-2024-30981,0,0,7a30583a86922b622c8f887f7a2dc57638811dc66d038cb4f895bc0ab1e8be5c,2024-04-17T20:08:21.887000 -CVE-2024-30982,0,0,083216e97c6bb2a7fa08e2a81662afa500c7dce50789f4c41177ab9284ce882a,2024-04-17T20:08:21.887000 -CVE-2024-30983,0,0,c9c9bc0592fbc52eb6384605d5c5a29a6ad7fdf5f294379c7339da5a99f2d191,2024-04-17T20:08:21.887000 -CVE-2024-30985,0,0,d8f0d925b9a2e990485b09eebfacdd1b12594133ec9d7b6869fcee4818420422,2024-04-17T20:08:21.887000 +CVE-2024-30981,0,1,81ff6a46243c7a5c52b0937ea3bee82cb4611dbc80eba5e29f640cdeee5e81ee,2024-07-03T01:54:29.020000 +CVE-2024-30982,0,1,abb92dcf5227f0de2235f83151bb4c17ac247815f1c0f47d65a9b4e12810b860,2024-07-03T01:54:29.753000 +CVE-2024-30983,0,1,2cbc024ca963a2060abcda8a643819af2c23ea3b93fff72c45a96443fcc25e13,2024-07-03T01:54:30.537000 +CVE-2024-30985,0,1,b25f3bf5c3a4d3f24a10ceee3cda1fdaa58cf215787fb052566fa8895d17f665,2024-07-03T01:54:31.323000 CVE-2024-30986,0,0,69160755613857276587b8b1f60e6694734dd914ee3a7792655db531f176eec6,2024-04-17T20:08:21.887000 CVE-2024-30987,0,0,468cef77884a1b0247108985323c0f3c5634ef332631a4474a5705346708e7f7,2024-04-17T20:08:21.887000 CVE-2024-30988,0,0,0c1fba373369486acbe7abf7a68090de377b02d5f1663773aa31862718661b2e,2024-04-17T20:08:21.887000 -CVE-2024-30989,0,0,abfc1381013fe6bdf19bda4b713c3adec36443d13f21f1e69286d68a6c98069f,2024-04-17T20:08:21.887000 +CVE-2024-30989,0,1,e9ad3f0fd7b020db169e00582a63ad0d4a4ddd2830c93dde81a132eb7fa9369b,2024-07-03T01:54:32.110000 CVE-2024-3099,0,0,e7f0b923e112854028361ac6f6b5d6713757ab017ebdab6dfd1cd863c07fe47d,2024-06-07T14:56:05.647000 -CVE-2024-30990,0,0,d814580f329e12e99304963af29ee0361a06c58694e19a32d33d2edbadb55df4,2024-04-17T20:08:21.887000 +CVE-2024-30990,0,1,75078c15117c3d94d275d45a8f694936bc8470fa4ed9b39cfc5d97a4cf718730,2024-07-03T01:54:32.807000 CVE-2024-30998,0,0,179abd0db8095df44a7d1fc224d4f504797395ef6ca242b590dce2e234dbd0de,2024-04-03T12:38:04.840000 CVE-2024-31002,0,0,96e076f675a43d72347dc0c980a987d7f8bd37cac2f635917b77c618d7fb5159,2024-04-02T12:50:42.233000 CVE-2024-31003,0,0,3f0adfc7393f75768ba5f0ff119d336a00244f196f86b1dcc7f91a86901fc5be,2024-04-02T12:50:42.233000 CVE-2024-31004,0,0,f755b2d1295cbba2fb235b141572098c75292e03492bd90218100dd91b46b2be,2024-04-02T12:50:42.233000 -CVE-2024-31005,0,0,782f5eeda1d450c46424dc60bc6e4a7de1c6ae363a2e211c85f204b9263b919b,2024-04-02T12:50:42.233000 +CVE-2024-31005,0,1,045b5d5570cfb671aba58425d476f29fa3e750f6d99363d9b536e986ebd3831d,2024-07-03T01:54:33.603000 CVE-2024-31008,0,0,fb58f95d5ac3e573901428dcb6b3f88285442daec81b849ad7032a6828042476,2024-04-03T12:38:04.840000 CVE-2024-31009,0,0,4ba716bb3226f0c34bd04f51a3a22402f08a7c166518bbe25119daff68e02eff,2024-04-03T12:38:04.840000 CVE-2024-3101,0,0,9b3c2c160f2d1bfe69e819647e861314a4fc12690030afc8b742d8e1b3ba69e0,2024-04-10T19:49:51.183000 CVE-2024-31010,0,0,22d3a5a8802df0899a91f29c1da59c9756b041e238b139f6c5446937f944e965,2024-04-03T12:38:04.840000 CVE-2024-31011,0,0,e280dc2325f8c749d256893287e9934a0b438d76a624897891275e16b92e2305,2024-04-03T12:38:04.840000 -CVE-2024-31012,0,0,59265fe10316d43a2acb459ea9de60f6a264c8b6d13bc4dae0d363d3b5d71397,2024-04-03T12:38:04.840000 +CVE-2024-31012,0,1,ad29bbd0b94faf76dc619f91628d5426bf4af8e806ebef2aed88b1cbb982c08f,2024-07-03T01:54:33.790000 CVE-2024-31013,0,0,137ba39b03bbaab20823954557195167ac08df3fa32a6782dd4080f1d723f338,2024-04-03T12:38:04.840000 CVE-2024-3102,0,0,a4611cb42951d405d0279fa5f0d1a6d6a718442772eea2fe1d9a5cfbe9ea1709,2024-06-07T14:56:05.647000 CVE-2024-31022,0,0,a14e43455f8667f5b08643f4accc0ded65ef08c98d3d4f6b069b1542bbf69336,2024-04-08T18:48:40.217000 CVE-2024-31025,0,0,049c3aee715c9c75f255eea2ba7d71aee620ad97e93ef3b0e0a948ae51dd0b57,2024-04-04T12:48:41.700000 CVE-2024-31030,0,0,5f9414f16a2bb6bb5dbcce971bc03bb500c389d94e49dc4548aeface7891f345,2024-05-31T19:14:47.793000 -CVE-2024-31031,0,0,10bc7caba6a65e01bc9ea074e7bedfc063099ea11411b0d4a72c811b144cdc06,2024-05-03T03:16:28.790000 +CVE-2024-31031,0,1,22dbfc8ddbe94926f4450ce3680a694e3a6be4ac1b04af44fb2aad33642532ec,2024-07-03T01:54:34.620000 CVE-2024-31032,0,0,2f308f228deb76e92177e5f96ebfbe834c95bdfff6cc9b10092e4afc0a7c1465,2024-04-24T03:15:05.933000 CVE-2024-31033,0,0,c7a6cbfb5d238335f35ef47bba4fa3a92246db284515ca8db031f344b12dfa7a,2024-05-17T02:38:58.313000 -CVE-2024-31036,0,0,909c6e2eb879d6c5010d6c5c1d0b605640db140d047e5e64355a95d48cb1e70f,2024-04-23T12:52:26.253000 +CVE-2024-31036,0,1,c1dc30371cbc232c45ce2a1ab5b75a9f53a1a706550cc27b167d070e5b7d7860,2024-07-03T01:54:35.980000 CVE-2024-3104,0,0,927f515490606efe20907a2973fd062d79840e7c07fa0e36064aa10b549f022c,2024-06-07T14:56:05.647000 -CVE-2024-31040,0,0,58d694e98ef6e322b940345b4415e080b141132f654a38c35a41dac24f1e6dc0,2024-04-17T20:08:21.887000 +CVE-2024-31040,0,1,8cff83beadb4c661eae93230dc1b40189dfecbc2297bd60a6380f76952c5534c,2024-07-03T01:54:37.220000 CVE-2024-31041,0,0,55cb17ccb9a4ccc47749a0a1f025025c536447c530ceaeb2d7f75919ad09c350,2024-04-17T20:08:21.887000 CVE-2024-31047,0,0,ed6b998d2efbbc258ad744f538162378aa1b702ac5e17462e2e5f42d9945fb08,2024-04-09T12:48:04.090000 CVE-2024-3105,0,0,612909808e4133409e05068d0e1793c30e1c99e892435c60f7fd3ebc5a102cdc,2024-06-17T12:42:04.623000 CVE-2024-31061,0,0,020e38014038ba97f692790c06c98735ee7323fcc8614755f16c9c5708fe33f5,2024-03-28T20:53:20.813000 -CVE-2024-31062,0,0,9a85b45f2ef9be7ff3563a8d396c3a8dd45f237219d28fbf343c7fa8953f9bf5,2024-03-28T20:53:20.813000 +CVE-2024-31062,0,1,b5a9a4cbd113d85932da23971f519edde410a6db59033e4ad09ce76acba6508c,2024-07-03T01:54:38.023000 CVE-2024-31063,0,0,8c5e031664c3b218697e91183f663111a47f52e7fd5496cafc4f238d7a0c4ce8,2024-03-28T20:53:20.813000 CVE-2024-31064,0,0,f87fea954d6623f92ad98dc571744769b0a41ba2a8ecac509cf34a5bc1aaafc6,2024-03-28T20:53:20.813000 CVE-2024-31065,0,0,36c2c4ddfef551b3df9316a574430562ba7ec0ea51f9e5ecbfa0af993c7946d3,2024-03-28T20:53:20.813000 @@ -249786,7 +249786,7 @@ CVE-2024-31309,0,0,fffcb118c29828b67d952cb185f5d9b9c1e5391db0b01186447338db55581 CVE-2024-3131,0,0,c743c524a4c8650f09bc83876c03caf128d010267bf94a845848caa55c9a8038,2024-05-17T02:39:44.143000 CVE-2024-3133,0,0,a7a7a4865524243743a9c88c08b8282b249ad835f6a96871747e7128048107a2,2024-06-07T19:15:24.213000 CVE-2024-3134,0,0,e04064345e517c38325e3c54708d3b5c2565ae5cbcc3f4d3393427e4c611d4fe,2024-05-17T18:36:05.263000 -CVE-2024-31340,0,0,b9d9d2d7b18f1e02ef212d5338dbe97e71d92e3821d8f6eaa4023f1beec91d5a,2024-05-22T12:46:53.887000 +CVE-2024-31340,0,1,69d2a170836208f6faad46a647a02e1d14f5dbc15c6da296b85bfb3a229fe567,2024-07-03T01:54:45.633000 CVE-2024-31341,0,0,d4166215cbddfa0324e008e571dea19e89ceb3a6d8e359be3d6c61b47b5bedf9,2024-05-17T18:36:05.263000 CVE-2024-31342,0,0,3dcf837177f2ee22dd479f7dc441eb8e323a27e9d61f77326ada203aab00e68b,2024-04-10T19:49:51.183000 CVE-2024-31343,0,0,07130367d283f095e3c4a097fcb374b7f0ee04a0481c3dc18f14571141420df5,2024-04-10T19:49:51.183000 @@ -249848,21 +249848,21 @@ CVE-2024-31393,0,0,37f7a5992221d6bde3095665f91d96a5b3c012db649e1c1c87f1a16619b63 CVE-2024-31394,0,0,37a6c6ef2bd7d41356078f2b3597ee7803c3d40e7ebe2f84759f8ace62500d88,2024-05-22T12:46:53.887000 CVE-2024-31395,0,0,b30f8ee229d1f4f2f6537c380ff54efa3e461a52badeb419e6445201c1a3b054,2024-05-22T12:46:53.887000 CVE-2024-31396,0,0,b9f3c7c1150f9fb33024855b15874b092964398220773ed5b63437613ca6402c,2024-05-22T12:46:53.887000 -CVE-2024-31397,0,0,5eee1502d4a5447f84cbb0bc66e4f9fd202b0debfd716a5c39584799ee4ff7db,2024-06-11T13:54:12.057000 +CVE-2024-31397,0,1,84e5539fe288f7e4c3b9dc6907e828a79fd1c0ce0682e8ac0d31f1740d4dafd1,2024-07-03T01:54:48.070000 CVE-2024-31398,0,0,b8b54a1faa7cdf95a00879a93ee0d8d8e97c6c1dd542b97c6389c4dd830a0fd0,2024-06-11T13:54:12.057000 CVE-2024-31399,0,0,2ed6b5d423879b812e36af732a627532445c8478dff877395b5408da9b5c4177,2024-06-11T13:54:12.057000 CVE-2024-3140,0,0,8b1da86666a037f64c40af1ea9ecd283309aabcaa13d249aa0e2a07593cba475,2024-05-17T02:39:44.507000 CVE-2024-31400,0,0,a20931d18dad71e74aadf60fa929b53b125c74900663be5a553ffa1d7a3f0c4e,2024-06-11T13:54:12.057000 -CVE-2024-31401,0,0,8f136ed546f4c28e90bfcf4f57f8770eb3a5379ac128d71892ea350184379023,2024-06-11T13:54:12.057000 +CVE-2024-31401,0,1,b1f392d5797fcb52bdd41fd8d97bc9543b30afce53bb15f494cac005207df95c,2024-07-03T01:54:49.037000 CVE-2024-31402,0,0,15c2c63d18fd59b2bc62b5b289f6f1bfb7ed1e8bf0268fa2dc26f85aee60cfce,2024-06-11T13:54:12.057000 -CVE-2024-31403,0,0,851794d6834835e29652aee98cba4ca01fbc966082a84fa4a43ff125766ef9d4,2024-06-11T13:54:12.057000 +CVE-2024-31403,0,1,0224148112c12b7ed3a671555d8cb853847c387c0a01fd25254394bf7f9de8b8,2024-07-03T01:54:49.817000 CVE-2024-31404,0,0,4bba1ccfe7dcf77b15da6db9def5060dd2e699b70ed8f7304a7c07ee5eeb14e4,2024-06-11T13:54:12.057000 CVE-2024-31406,0,0,21585692d302884cf3150faa716f097a2673ce3764bdf3b78bdfd36f438a0484,2024-04-24T13:39:42.883000 CVE-2024-31409,0,0,2c3474e7adf2dfd4ffe107e0f21a962b12ec9583a2a32f1b573e427bba6ce25c,2024-05-16T13:03:05.353000 CVE-2024-3141,0,0,dfabbf3d0507d341626b2bd4d6e1dada0feb9b8a54e2d19fc7727779054508ab,2024-05-17T02:39:44.593000 CVE-2024-31410,0,0,d8bf6820d8f5d6884591de8f3ef108bfc6b4975173a66f374f2676ccab21cc0b,2024-05-16T13:03:05.353000 CVE-2024-31412,0,0,bf5e4b7125888123ed114d5a41d3a9e2f2c13a81227e8af339e531675aae10d6,2024-05-01T19:50:25.633000 -CVE-2024-31413,0,0,698cad7cc2e917bb34bb0c2eff1e375ca818f5fcbe8e16911c403ef0fbd2428b,2024-05-01T19:50:25.633000 +CVE-2024-31413,0,1,bb1445e4de4fe6231d24b5144c9534a3d5daec05348443646de7635aa924272f,2024-07-03T01:54:50.813000 CVE-2024-31419,0,0,36c8a60658bbd6b33e2cacab3bae7069924fea2c95b1bfd68ef2a5a438c0a6d2,2024-04-03T17:24:18.150000 CVE-2024-3142,0,0,d72c9fc602405d276968d5eddee02def25c25f0696a122ca36beea9d48f99460,2024-05-17T02:39:44.690000 CVE-2024-31420,0,0,5d7e593d118cd1f41577542846ec46b792c74358a1c27af2e9295870ce46a7f7,2024-04-03T17:24:18.150000 @@ -249907,25 +249907,25 @@ CVE-2024-31462,0,0,44e6531ceee59d107dbeeee07eb1fd8b488337c84dd99ea88e90d29f01df5 CVE-2024-31463,0,0,8268c987022371c22051c347672dbe62f7118dc9b6e5bdcfe2021c96688127a7,2024-04-17T16:51:07.347000 CVE-2024-31464,0,0,0e334e051a2f53edc57cbce800fcc17540fa9d746f3833bb6b1e894dc6dae023,2024-04-10T19:49:51.183000 CVE-2024-31465,0,0,f70429209ce72ff11ec51f35cb5d31673af53b3d766d75c0657593eff6ab185e,2024-04-11T12:47:44.137000 -CVE-2024-31466,0,0,94db57d1193b268260b92e5f8c0caea0c62070e3dce6f01012175cde02062c60,2024-05-15T16:40:19.330000 -CVE-2024-31467,0,0,8c32f6409f5d13976deae16737a43d677bcd59ee1f0d09b47128b1b8aee0c91b,2024-05-15T16:40:19.330000 -CVE-2024-31468,0,0,0e5f3c8f1f95e411038646995ae7f194881e67590e67dd3a7fd2a0dfe865bd10,2024-05-15T16:40:19.330000 -CVE-2024-31469,0,0,ba72593ad960d61e98baf0e3169e627392448e94238327dcca32b810d27e4853,2024-05-15T16:40:19.330000 +CVE-2024-31466,0,1,c7231c8c97f212df84a2794b95dae43c7f9a903f4e6427747b4c715d2041e517,2024-07-03T01:54:52.503000 +CVE-2024-31467,0,1,10552dfb42cae2bbdcd31dc134265bd269d0213f334bd2ecd852194c6ce3e571,2024-07-03T01:54:53.180000 +CVE-2024-31468,0,1,33807c28bc890187acbb078b48db5e83344c9b592a92ca428d128cf3901da24f,2024-07-03T01:54:53.860000 +CVE-2024-31469,0,1,bdd3a8266b9ee40f94a50725adfc6cf00d81439aba107c2d6860cd075dcb1e24,2024-07-03T01:54:54.540000 CVE-2024-3147,0,0,982efe5a2ce749cb576b655f53babb3b7f472deec76a1b3247afa76b7717197b,2024-05-17T02:39:45.117000 -CVE-2024-31470,0,0,c76ee2e7c1964b6cd00648ea931c5e27e2a1847149a3bd1f9ade98f0bca732df,2024-05-15T16:40:19.330000 -CVE-2024-31471,0,0,6144d154143aad7e1affa7d1004e717f27cdb0a770aa8d644143addf314faaef,2024-05-15T16:40:19.330000 -CVE-2024-31472,0,0,6ee2d2176ad1ab83685891d2742fbabf677aa12fd5a3b254851e22fb5eb30057,2024-05-15T16:40:19.330000 +CVE-2024-31470,0,1,02b6a95cd27617dd1c5b90183d9f46421996304e066c4af5b6997f2fd6201733,2024-07-03T01:54:55.227000 +CVE-2024-31471,0,1,2124415413c081701479ac118b3c909ea594a0fef9d48b8e709b5a8b0068d358,2024-07-03T01:54:55.993000 +CVE-2024-31472,0,1,c77970375af326eeb122633156ced146f5b19e31d0a2828cdf087cefbb2f97f6,2024-07-03T01:54:56.687000 CVE-2024-31473,0,0,6521d73e4c07a86b8cca8abacf384dc09529090051683bba616839a511b7ba68,2024-05-15T16:40:19.330000 -CVE-2024-31474,0,0,d9c5c26ff94c756a7fc3787d12aa503eb4f8c327e7707ff67cc5d2ba0ccc91d2,2024-05-15T16:40:19.330000 -CVE-2024-31475,0,0,c85617d60a9816a15443ec1e3c85aad430eaaa8b5ea416959e163b004e7e43d8,2024-05-15T16:40:19.330000 -CVE-2024-31476,0,0,7456552705bd924db40e35387e2e3d7a0112206f8bde02ec6345ed67285bfa4d,2024-05-15T16:40:19.330000 -CVE-2024-31477,0,0,ceb23334660c08c46a12d9afe519f625dd819698b1ba01d55894fd945a135c54,2024-05-15T16:40:19.330000 -CVE-2024-31478,0,0,12a2000d7b13b4cfac23840be5bb7c235cb771b9b01a3b7f19912636ea645aa2,2024-05-15T16:40:19.330000 -CVE-2024-31479,0,0,a52af0a3ae73b39c71d8125af0bacdff06c989087327604ae067e8bf3af31460,2024-05-15T16:40:19.330000 +CVE-2024-31474,0,1,3fe22b3f2f50b12ead08780c5d7337eb52fe05045f4f5d121a0714cdadfd4dcf,2024-07-03T01:54:57.453000 +CVE-2024-31475,0,1,267eb1feac853a5c9bd5774c8dc369584aafc47d42fd6edd43d1f3b01f6170ea,2024-07-03T01:54:58.147000 +CVE-2024-31476,0,1,f121e0ec81823098658d02f7da8a5a67532a2344eb6458de9d88fc9f3bce7586,2024-07-03T01:54:58.830000 +CVE-2024-31477,0,1,1b26a6a1c922791bcbc4b97a56fb7473f945db3da3dc86feefc0ff2800c48a73,2024-07-03T01:54:59.510000 +CVE-2024-31478,0,1,ff2a1c3880865d092b5866d6610dc28d1a85b6f088f681f6081a1ed8b8c02b0b,2024-07-03T01:55:00.270000 +CVE-2024-31479,0,1,f120665250ae6081be4111da0d7b4a341d2045c00d0ade7762db07e9aed38c28,2024-07-03T01:55:01.120000 CVE-2024-3148,0,0,286c1c0aa7b0d3b23b2257e5942a5c00f894f195194c7893dcc31dadf941b51e,2024-05-17T02:39:45.207000 -CVE-2024-31480,0,0,1dbbe3b9fa40fa99d03d7b2650f84daa1e91c485262c890543cc81f6e333b53d,2024-05-15T16:40:19.330000 -CVE-2024-31481,0,0,83745e1eee78c2867e2e5b94cff2fe552ac0936b21f5849e137a803caadfbda5,2024-05-15T16:40:19.330000 -CVE-2024-31482,0,0,a6e1ad0495d861d853602767472b39ae298327ad0b3fe474d5b8836861b083b6,2024-05-15T16:40:19.330000 +CVE-2024-31480,0,1,86a08888be6144dad7f109bcbc1e02bef137f5ec61892a589a8c1d32bdd1d4ec,2024-07-03T01:55:01.950000 +CVE-2024-31481,0,1,3cfd49abb9f667805e469e5ad5364d7cc935c3e4cd673de3efb106e0bfc78efb,2024-07-03T01:55:02.813000 +CVE-2024-31482,0,1,89e6919adebfceffee7b9ef72fc557a7257e2359e0de4d03c9ea7df82ed31700,2024-07-03T01:55:03.583000 CVE-2024-31483,0,0,bde678327370835d1aa36e347db01998d4ec66a2275c4946d48e0c638b6c74ca,2024-05-15T16:40:19.330000 CVE-2024-31484,0,0,87a3d1a614fb5575405ec60575059fa9c3009ab46d28f7442572559a35369246,2024-06-11T12:15:14.993000 CVE-2024-31485,0,0,fa5c6a497932049eb7a3605c5189f3094078d3328420a189e1b093ae5914e258,2024-06-11T12:15:15.123000 @@ -249940,36 +249940,36 @@ CVE-2024-31495,0,0,42fff448b4240874d456e917ec48e364b4b70752d9d1a1fb76f06c9d7e15c CVE-2024-31497,0,0,c39b897f04ef688f063ebceae74c1e66c102d61b4026ee0939893e9ccb564409,2024-06-20T19:15:49.960000 CVE-2024-31498,0,0,db3c4e2337e3fccc66e084ef6016d8532925f451bef4124b0c2782f0c54d90b6,2024-04-08T00:15:08 CVE-2024-3150,0,0,04068d35bd188e4cc82c8fa2f28c620f46e70084f017d1c4b8736ac9a757cf54,2024-06-07T14:56:05.647000 -CVE-2024-31502,0,0,52fc3984aab146fd5296bbc2584fa31ec06529d852df83c020a3abdb54510354,2024-04-29T12:42:03.667000 +CVE-2024-31502,0,1,48eff8d0e1056f4d498c02b25fa6f36fe79ddc405bd5236ddde6ae6266b87571,2024-07-03T01:55:04.920000 CVE-2024-31503,0,0,a2a7c8d9eaf4775895950c76302a02326a8d6e67bb7d5ec85d9e8a8516e17053,2024-04-17T12:48:07.510000 CVE-2024-31506,0,0,8be7ef5b3e9d65e4bba9dd63e2b7475f0658a4b183369094a98038d4eee40099,2024-04-10T13:24:00.070000 CVE-2024-31507,0,0,8a4d05957463fb55563022c4622a2463374ff774a0631f4c63214875a7c78bee,2024-04-10T13:24:00.070000 CVE-2024-3151,0,0,9347bf7ac28e84ca877a361b1eac7ef280766a4b0b29aa18ee59e0ed7a4dbbe2,2024-05-17T02:39:45.290000 -CVE-2024-31510,0,0,8d6d1b08dc90629221e7efff30d565dc4bf05f2cb7171984414e6e02bb2bf54f,2024-05-24T18:09:20.027000 +CVE-2024-31510,0,1,2ab08923e55b765ff03b9ec06ce50479208e1bb469f6adf849509f8193855a50,2024-07-03T01:55:05.800000 CVE-2024-3152,0,0,c35837c0aa31c949cf43dc6f979549eef143fbb0ccdbd0806b1482fca09a5466,2024-06-07T14:56:05.647000 CVE-2024-3153,0,0,71f9925c0b9c95802717e9ea3df72b541910d5a49c38656ce24e7b7ced61efb4,2024-06-07T14:56:05.647000 CVE-2024-3154,0,0,41e99f572a77ebdee6e8e47ee9e18a446acb6753ba44d660260064ab4ee43c62,2024-06-05T17:15:13.777000 -CVE-2024-31544,0,0,bc835e0f71240df22cec22617fbfab2cab4d97b1f555eabe4ef7c23231d6357c,2024-04-10T13:24:22.187000 -CVE-2024-31545,0,0,58f9284e649db693b69f38b498c09bbce1aa6659c4895ca2c4510e9e4f359bf5,2024-04-22T19:24:06.727000 -CVE-2024-31546,0,0,0f1c1c4c4e70b739ec88067856aa47df01b438e565763cea3e5ee7b15b2692f7,2024-04-19T18:29:53.040000 -CVE-2024-31547,0,0,620bf9372c1d180ac6e0a9d88039f2ec9f52d38e3a3d36a46bcc433dcbf30faf,2024-04-19T18:29:53.040000 +CVE-2024-31544,0,1,2535e66e98db21a02bea52017d819e1d7e0893ffb53b2843edb9987a766eaf9f,2024-07-03T01:55:06.580000 +CVE-2024-31545,0,1,990dd1804a5ee198d0f0887e154e925827e322f01f4e785463356ec825b7f751,2024-07-03T01:55:07.333000 +CVE-2024-31546,0,1,8e9514693e08d741612c9e2a09da9e87fa9f3e20f214aad0d330555f52918683,2024-07-03T01:55:08.090000 +CVE-2024-31547,0,1,22bd63034759209e253c932abeed783b0fd6c0ca9cadb92359cea5df0d575dd3,2024-07-03T01:55:08.870000 CVE-2024-3155,0,0,eee76fab35fcf29316db15cf35547dea4ad865a27e411f42f7bd3ef46e800d06,2024-05-21T12:37:59.687000 CVE-2024-31551,0,0,1e496baf26fc7c379802e32efa65ebe29e89fcd33af39e4b33cab5b68ae631aa,2024-04-29T12:42:03.667000 -CVE-2024-31552,0,0,0a44786ccab7bdadbfd444cc47befe91e7deebef75ff6d468cb452530ab14960,2024-04-19T18:29:53.040000 -CVE-2024-31556,0,0,8d1523110265503c6601383345cf8ab7d71c03f8783e3e6b916697932c3b6340,2024-05-15T16:40:19.330000 +CVE-2024-31552,0,1,0858b0a24a58ed1b7ceca30a28b8a4da432490c7becdeaa833c16bdd5d9db760,2024-07-03T01:55:09.627000 +CVE-2024-31556,0,1,284801355e37e5d2bb66f70abf65c157c874bd86154c46b8086826ccbf00b836,2024-07-03T01:55:10.450000 CVE-2024-3156,0,0,f01ef771ed03a9288d0ee4324d1f6cf3e47c9af6d908a880824436519abea0a6,2024-04-26T16:00:34.653000 CVE-2024-3157,0,0,efbf5e20eaa98706deef52c26be2e1cba3d67ed28d54a5b0520df90b69e7c692,2024-04-19T23:15:11.593000 CVE-2024-31574,0,0,d30d4d3620d807387396f69d492fff0388d23e7451887ca3e1dd10677ba3ffb1,2024-04-25T17:24:59.967000 CVE-2024-31576,0,0,741c8998460302eafaf2dd6cd838e7890c169c726e59c5f45ee51622793abfa6,2024-04-15T16:15:07.270000 -CVE-2024-31578,0,0,ae5d142a43d242c5aa2deaffb898522282d6f853810c3100386198e7b2e9b9cd,2024-06-10T18:15:31.253000 +CVE-2024-31578,0,1,6e50b0fb4096fdf1e9e4bd343bba1497d28778deb9cd70cc171baa5af3c65f3a,2024-07-03T01:55:11.213000 CVE-2024-3158,0,0,b6f3eae96db1aebf257009a6259047e5a021bd7f3ae01837a0c02ae4fb2d3f7e,2024-04-26T16:00:15.540000 -CVE-2024-31580,0,0,e997e3f25c911fc04de779fa9168de4ebef90131449df2b2dfb57ff9ee6e679b,2024-04-17T20:08:21.887000 +CVE-2024-31580,0,1,9892d534a6b740bd9f70a36f106331aeef11930b2acb708df4b7495ede87ec8f,2024-07-03T01:55:11.977000 CVE-2024-31581,0,0,0c13f552121d688c3bb11054a57da386d38b00579e2878a1121af5194a445a83,2024-06-10T18:15:31.323000 CVE-2024-31582,0,0,f99ff40027327bd3fbea4712d1d784593e1373bb4d685bc6d34f744e7fbd3541,2024-06-10T18:15:31.387000 -CVE-2024-31583,0,0,eec650b2d1a967bea49e6ce27fbd51a980897e8355103b69036a477d8192c36f,2024-04-17T20:08:21.887000 -CVE-2024-31584,0,0,7bd8b8c71b3cbc23e6db4c252c0ef145f85399e414092971d73799c932fbe46b,2024-04-22T13:28:50.310000 +CVE-2024-31583,0,1,5718d662ef0fc7a2030b838f396484569e04f36192be74d5dc7dbf12e0d69994,2024-07-03T01:55:12.663000 +CVE-2024-31584,0,1,b7635e33f3da4b67c08efe7ab25558c0ee24a2c8974cfc1133472b04b1184049,2024-07-03T01:55:13.417000 CVE-2024-31585,0,0,f39db829a58f7d59fd71840ee1d6249e8f60080525ab50f13dc25f4d37c76aac,2024-06-10T18:15:31.457000 -CVE-2024-31586,0,0,4d85436d457a983ea899360bd6e2976b62a3e0cfbfd1a3b05be2cb0f3f8f5591,2024-06-21T11:22:01.687000 +CVE-2024-31586,0,1,cc046b8727829f9f83874539c422d0e794e65c7e2b07e31c08215bcda9684cd0,2024-07-03T01:55:14.213000 CVE-2024-31587,0,0,2fc9a5d835e653be56e59eb894e67a7be08149fb53fde5c6e30e07cc9d34087a,2024-04-19T16:19:49.043000 CVE-2024-3159,0,0,90c5caca0cc5537160e74a2b26ddbcf22bba005cb0a42d8727caf893986c2f2f,2024-04-26T15:59:59.020000 CVE-2024-3160,0,0,fced239d04f545c08f1bd1561fcd0c39fc8f6eac24b548e53a624880004990a4,2024-05-17T02:39:45.510000 @@ -249980,8 +249980,8 @@ CVE-2024-31610,0,0,25f0fe7dce01b290d07505f210ca0196ceaddb3229e43445c402c10f0654a CVE-2024-31611,0,0,5f9e3922a5a892423d1bcf4416bca54c649670eb4a86ab19022e098b2dd1541f,2024-06-12T17:44:20.730000 CVE-2024-31612,0,0,113b62286ae368abe151f1276422ede5a17bbddf3e1084cf1b1f49c898ddb8c7,2024-06-12T18:10:30.587000 CVE-2024-31613,0,0,5ce067676435ff3d2e2e64f4a4df55c3ae784b167955254c2c482ea479d5a0e0,2024-06-10T18:06:22.600000 -CVE-2024-31615,0,0,fec656de044fff01992f2ac4c2d789e80286f56b4ff6f28fca891fbe026d80d2,2024-04-26T12:58:17.720000 -CVE-2024-31616,0,0,0d01710e8c157f0d32189692d849b27951e2db80c68fce9b88dd89c45379117e,2024-04-24T13:39:42.883000 +CVE-2024-31615,0,1,d368b7afcddf8004edd5887f0583685e84be26fc0d3934bf749ef04013bb7fc3,2024-07-03T01:55:14.960000 +CVE-2024-31616,0,1,1084c6c3d6d8aa5c511ab3dfa4028831dd239a202d2424f408608d0ae03fc34e,2024-07-03T01:55:15.753000 CVE-2024-31617,0,0,c260c6ccac3edc4a27efaf66cf18da63c001dac2ae71b06f8a2f6de4361b01e5,2024-05-22T18:59:20.240000 CVE-2024-3162,0,0,7209bf9b1b4a4f41543ae01bfd19e9aec1dd355164cd1434a8cb5548ea161c65,2024-04-03T12:38:04.840000 CVE-2024-31621,0,0,5859f84ce615fd32361b282eb85819f2850e262c3652d6c11e3c0f262c84e82a,2024-04-30T13:11:16.690000 @@ -249996,12 +249996,12 @@ CVE-2024-31629,0,0,c6deb3500079f97322ae259ccdb4dba2134e4c1cab0e163610c39515f2a1a CVE-2024-31630,0,0,f00d29794733f378a242dcde898b52549294418b098ad7c5b8f47cbc11aeba0d,2024-06-05T17:15:13.040000 CVE-2024-31631,0,0,0472b25eb5f7333616a703b6523cc295b0de589a1374c495f36fb95699859e21,2024-06-05T17:15:13.130000 CVE-2024-31634,0,0,4aa9be86cd809cace2c7d458fd82ce0e6e4c21e7757f642f911286874e9406fe,2024-04-16T13:24:07.103000 -CVE-2024-31636,0,0,4f5b16d7e2675dc91b2eb1ee5513d741f7a36531f2562618f3fd80c952497d58,2024-05-06T12:44:56.377000 +CVE-2024-31636,0,1,5030ab945dd9e3d071b87a4da035a97defc5897507c6002a20e31f1008a32478,2024-07-03T01:55:16.580000 CVE-2024-3164,0,0,7f780c294c8831979bff32bef1a48b2e6fa61521035bd6f029f476ca7c0385b5,2024-04-11T01:25:55.603000 CVE-2024-31648,0,0,f70c933feb3072bcb2ead02f6b1a919b0f866e1a11c84c8f391e2e290925af4f,2024-04-16T13:24:07.103000 CVE-2024-31649,0,0,639a5f64cbdf28db540c8732bf6df9d62d362e264fc5a0592fc2e34beb9bf811,2024-04-16T13:24:07.103000 CVE-2024-3165,0,0,de9c55d425cf1712b174cf5953c3fab2e18950a6202399f31519128938dc300f,2024-04-02T12:50:42.233000 -CVE-2024-31650,0,0,93c237f92a0565f29a186681c2be8c18bcc984e57115648f885447500f241b13,2024-04-16T13:24:07.103000 +CVE-2024-31650,0,1,f91457293ffe9951d31a570db1b9cb5f0c4dfb9ffa5e388dc3d2c34a75979925,2024-07-03T01:55:17.350000 CVE-2024-31651,0,0,449580f383ba06b10b890173ddf2d62af7a188eb69db82466ee9152e4b087212,2024-04-16T13:24:07.103000 CVE-2024-31652,0,0,208b4f263a9a44614b423f2ea1b775ae64777df67f6e60b98c2159dddb5c4a0b,2024-04-16T13:24:07.103000 CVE-2024-3166,0,0,c81e3e68f1adddc19d75d351634155c3d0e9e8ee00fc86bb432f2a7f3495b309,2024-06-07T14:56:05.647000 @@ -250013,13 +250013,13 @@ CVE-2024-31680,0,0,9cd3893ac983fae5e4213584fc439ab2d2b21e3e6bebab8790c0104ed80c7 CVE-2024-31682,0,0,108e09baf03792f64e1bb3f8dda027c9a854de6459715dd00219980dec3ce6cd,2024-06-04T16:57:41.057000 CVE-2024-31684,0,0,11342a2b4f3ad43cdbcffc10774218cb9d9c89bcfff7744f09b6a9696388c47e,2024-06-03T19:23:17.807000 CVE-2024-31705,0,0,8033fd37659a2da1fb0e7633bf6cd8849a478258d0204dab5311593f3afffaff,2024-04-30T13:11:16.690000 -CVE-2024-31714,0,0,6aa4e4a94a4a505a8b84d39ef299db51540666067fc7ccdc8a36e2c77c14684a,2024-05-20T19:34:58.277000 +CVE-2024-31714,0,1,e2cbcd04e6551aaebab596d7137808760f8842fa97ced3f3a7a7709d1ffb887c,2024-07-03T01:55:18.240000 CVE-2024-31741,0,0,7f7fe0680083852848d9489e7bfde2c974dd88476e32f02fc76986c5d4f4ace6,2024-04-29T12:42:03.667000 -CVE-2024-31744,0,0,2683100a95af5c52d0a1d38f815dd1f12090341766e4f7725aacfd2ec2cd65dd,2024-04-19T16:19:49.043000 +CVE-2024-31744,0,1,fb9aa7a38c780f352284188ba5594185fd9278eb672cdcc53bb5f1def8b1306f,2024-07-03T01:55:18.993000 CVE-2024-31745,0,0,a3bdd0cf6c191f4f752a70ac6769fb5b2d5c89636eeffe60e00827ad5ab48d32,2024-04-25T16:15:11.227000 CVE-2024-31747,0,0,49aad92068289c57c88fdfeae3beb34770db6465d2b4facaae5cc88a4dd58ad8,2024-04-30T13:11:16.690000 -CVE-2024-31750,0,0,ef2fe441e5dcedf0cb2da823df8fe57e9b7ada67d4a5ac9a3c649524c0ed2fa2,2024-04-19T13:10:25.637000 -CVE-2024-31755,0,0,70c6035ab4690bdcf4d9f882d2fd0d0c77fed8ca4c214a3e4eb169e3d269679c,2024-04-26T12:58:17.720000 +CVE-2024-31750,0,1,1a15dee129c540f50ba0b22addd9273e209e8744c01daff655aada30a84ff874,2024-07-03T01:55:19.837000 +CVE-2024-31755,0,1,3bd12cf4853126d6f31d6cbd32f6b5b02770582813fa897bd2c19a22d945bc42,2024-07-03T01:55:20.690000 CVE-2024-31756,0,0,b545fecad40ff4a3f9ae2638f024ca61b80a28fe13b877c281603566ed0b54f0,2024-05-22T12:46:53.887000 CVE-2024-31757,0,0,687398cce2bd1894ed226b76587327674cff37aef21494ede8fd245f77d3a4a6,2024-05-22T12:46:53.887000 CVE-2024-31759,0,0,7081cd22df5b9e4148ecc914176fc1f6cc04366073f8b1e4eccd8dfe4f2b7d73,2024-04-17T12:48:07.510000 @@ -250032,17 +250032,17 @@ CVE-2024-31783,0,0,39c4df7f07fa9e66dc5d42dd16bc0981c0d6511a0c96852796a6de0ccb03c CVE-2024-31784,0,0,0055eda0e2e2e3cebbac3d895c086f3674073feab99e847bee4ca99f9495a801,2024-04-16T13:24:07.103000 CVE-2024-3179,0,0,5abb24f6a5051585dee8d043e9230e5c2a9202caf7e3c5044373b856d11a8a98,2024-04-04T12:48:41.700000 CVE-2024-3180,0,0,cb7e6ecd5dde884356237a2b2dbf7b6ac67d07b2baecdd8da937f602eadd96a4,2024-04-04T12:48:41.700000 -CVE-2024-31801,0,0,76b9f35ed6859ef0acaad47e44f5e809d5f12f75f037ba060cfce40422774869,2024-04-30T13:11:16.690000 +CVE-2024-31801,0,1,167787a1907cdf000af60fbe9b5f7402195ddc6d583a2566e586e08b836488bc,2024-07-03T01:55:21.550000 CVE-2024-31802,0,0,3e784b6cdf1a165b3d21f2a1c540d8b026c9de6432feb4efe6875b7608e68ead,2024-06-28T10:27:00.920000 CVE-2024-31803,0,0,92f238036d017e7b84c8654e5a5e6072228cd9b3978fedfbf2bc24ff66d8e581,2024-05-14T16:12:23.490000 -CVE-2024-31804,0,0,bf9f7f1f5a4e866d017f381caebeeb6f3ac0c44960962a1df77a955bc10f27e8,2024-04-24T13:39:42.883000 +CVE-2024-31804,0,1,98ebf6123ba640ba12fc884ba3b75b6a9171ce60bb03787ca27a89dc86a8de4b,2024-07-03T01:55:22.410000 CVE-2024-31805,0,0,191a14c2d5ae7968331c5203389f4ad20337fe28197ac48f135f3f3b37941d31,2024-04-08T18:48:40.217000 CVE-2024-31806,0,0,c7316b5610952238bd564a03f742588c16e0f69b26333015edb5aadd6c88d624,2024-04-08T18:48:40.217000 CVE-2024-31807,0,0,db6f4b0b7aadfa01d793851a97ace37faa51b84df184fb574cc5d20f814f346d,2024-04-08T18:48:40.217000 CVE-2024-31808,0,0,e3f1ee6c7e76eb8e90bda1034c5fcfffcffdd99ff96f24189f3d7396a2575051,2024-04-08T18:48:40.217000 CVE-2024-31809,0,0,e05c4bfbbec6345ce72a7f536061ecaa11417312314649425c98c5e882a47f63,2024-04-08T18:48:40.217000 CVE-2024-3181,0,0,19462f0bae052150ee3deea6a2833d73153169ade51a21a9a0ee903c88e94c7c,2024-04-04T12:48:41.700000 -CVE-2024-31810,0,0,b8c11e81f35af9bc0f14a223ead89b2c1c44f7399a63240e10bb40aebaa5886b,2024-05-14T16:12:23.490000 +CVE-2024-31810,0,1,26fe393e9644e5bd4e624b86eb0f71b590d6fd459475e3a5579f903609e5f639,2024-07-03T01:55:23.187000 CVE-2024-31811,0,0,f8de130100e3a9acbca356f090bc88a0d04c0b513ecb2ef2dc10ec36737b68a7,2024-04-08T18:48:40.217000 CVE-2024-31812,0,0,b05af7aae3f0183f9f4818b40eff2f73c3a9ff92a0f722950386fe48e67f87dd,2024-04-08T18:48:40.217000 CVE-2024-31813,0,0,79a1a7c98afb7e38cd483bc8738d983156987401ca20a06a5604d84fd554c04e,2024-04-08T18:48:40.217000 @@ -250050,23 +250050,23 @@ CVE-2024-31814,0,0,e3ca4010fb6a58f61e69bd6376064660d2fdaf6bb387d308db35cab7cd7c1 CVE-2024-31815,0,0,30302ad414ab45baa3ec4e6cb3fe786fcebb8651723a135b55d05ee22523845e,2024-04-08T18:48:40.217000 CVE-2024-31816,0,0,8b0edd8a38c33b33b513f099b5e67906c887d32cd0308b5fdfadcac29bc21611,2024-04-08T18:48:40.217000 CVE-2024-31817,0,0,440a95dbf8589f9a9953a43f37d15f507abb02f786409b55238dedab4fef773a,2024-04-08T18:48:40.217000 -CVE-2024-31818,0,0,72cb9554b67c0af94ffbc580efc3a62e49e452a23305845c2a6157eaa69b0f7f,2024-04-15T13:15:51.577000 +CVE-2024-31818,0,1,eee16737d75f73f8b945462c1dcd4c5cb19514639603d213fd1ee2d8a446805c,2024-07-03T01:55:23.933000 CVE-2024-31819,0,0,1f8122b9110b9c9e379686153d36743829cf8787fef8a8a1bf73fc202035f197,2024-04-11T12:47:44.137000 CVE-2024-3182,0,0,2e270f4f3608fb5873bc26989d462e0d8be536fe98df44cf383b56c3de202fb7,2024-05-15T18:35:11.453000 CVE-2024-31820,0,0,53a16faaf48888346903fcbd57d0be6b6e997c7cc9b808188a566b0da0cce561,2024-04-30T13:11:16.690000 -CVE-2024-31821,0,0,c569fd754a13100f99a004a097455b073140e65e59c749e53df718879b6f98c3,2024-04-30T13:11:16.690000 +CVE-2024-31821,0,1,7ffbf5610a7d2af61b143191111032e3581481a662d8ad2f16b1a632dc4600a8,2024-07-03T01:55:24.693000 CVE-2024-31822,0,0,39f03d3ff200c72017a27779b734a3b0a55aa46362d194ac94877ae191a015e0,2024-04-30T13:11:16.690000 -CVE-2024-31823,0,0,c330dcd036dc01e5b50868bf19e8e1c60dcc1aae213890cc9951428752d20d51,2024-04-30T13:11:16.690000 -CVE-2024-31828,0,0,858561f1b03d252c7f0a8bed644602b810853f61f3442c470c2afa0cb506bbc9,2024-04-29T12:42:03.667000 +CVE-2024-31823,0,1,9d12c900b5aea261a617c0c45db69af06e76753d660b696289c6db95f54b5297,2024-07-03T01:55:25.480000 +CVE-2024-31828,0,1,abbd4faafd1830e19da09ba99cc549c95f576d3b26460d61eb3b11d4f3cf3073,2024-07-03T01:55:26.250000 CVE-2024-3183,0,0,f0a6251088cfd845783fa83089c4f66e5c1b4119e3b7eebeacea72fa8d6daced,2024-06-27T03:15:50.447000 CVE-2024-31837,0,0,9051d48b22c0cd39a45116204b9c51e9a92d936bee66589e1aa86bb8c892b824,2024-04-30T13:11:16.690000 CVE-2024-31839,0,0,25a7daa33bac03a27a09e1621adb92d9361c02bf4ef6c11d27831735c896c138,2024-04-15T13:15:51.577000 CVE-2024-31840,0,0,c5fc04e6fe2d5125db2057551f9a02458bb6ea8f5da45a1b3c46ba278c1be8c1,2024-05-21T16:53:56.550000 -CVE-2024-31841,0,0,e807a83ca93985dc842f15dd9311ce37f6ae1c5acd5a2d45df542202c187b560,2024-04-19T16:19:49.043000 -CVE-2024-31843,0,0,fe0a5faffa2f8ba6150f414fe1eb654e5bd5620908e7d04d503da3f11cfec371,2024-05-24T01:15:30.977000 +CVE-2024-31841,0,1,122a5c411034bfc4d48419a4ff14723715ac5ca83b5477dbeb8228548b367d99,2024-07-03T01:55:27.077000 +CVE-2024-31843,0,1,563abc77f9f757ff9b0691e6959d65798aa32245974217a00a4a26256c9469c9,2024-07-03T01:55:27.880000 CVE-2024-31844,0,0,faef32bf7f6d5cdf3926b68a0c0321962d1e2a27cd637406a13851a0747b2020,2024-05-21T16:53:56.550000 -CVE-2024-31845,0,0,03b0fc9e07486392f546668813e6d8872c2e067f35b698467c00f3868d4be08f,2024-05-21T16:53:56.550000 -CVE-2024-31846,0,0,ec1f3478d8b62b2fb094bc9ce16da74fa6c5e7add097c8b7f5b857bd703bef58,2024-04-19T16:19:49.043000 +CVE-2024-31845,0,1,5285f406c2c833baf2ad893e86a6252f005845d6cf83cc9d823751ca24673f2a,2024-07-03T01:55:28.633000 +CVE-2024-31846,0,1,9b0ce2d57c0813c3992666334f62ea2df99c41dc31797c0b704691d1b1dfe2ee,2024-07-03T01:55:29.393000 CVE-2024-31847,0,0,bb9854ea58cb5bbaaeb40d8ffe76e3f96dc38366eaedd1096182fbfbddf15aba,2024-05-21T16:53:56.550000 CVE-2024-31848,0,0,2da60f6a287cac48661bc0aa0bb0ac92caa20fc3ae4255bef230dfecf644c92e,2024-04-08T18:49:25.863000 CVE-2024-31849,0,0,f45798bfe1f17890c1c9f615c3d632efe82fbe29dd84fe4753d6d6beae3b4f6a,2024-04-08T18:49:25.863000 @@ -250075,14 +250075,14 @@ CVE-2024-31850,0,0,4dfa9605a049a09744618be099ad889f274ff40fc42a18e168685588a6a44 CVE-2024-31851,0,0,0e8250a21123e214b1f09f2b325f0d0e22e98cb6715480d7ac13d673f761eb46,2024-04-08T18:49:25.863000 CVE-2024-31852,0,0,7a968282e2d23775fda0d6edce03c38caf21ca868b2fca3251339d962c2ec4c6,2024-04-08T18:49:25.863000 CVE-2024-31856,0,0,62a52705b8ee623f45839141fd2c99784658855012cca1de7b4c490712cad657,2024-05-16T13:03:05.353000 -CVE-2024-31857,0,0,3e7ac60afeec75094fbcaec8b53e1a238b7bcb05ca078ef7a1edb4dbe4dfc654,2024-04-23T12:52:09.397000 +CVE-2024-31857,0,1,b57daea1515042b1254b11fea9a109934d9eaeaf743c5e6b1d4482216f0f52dd,2024-07-03T01:55:30.363000 CVE-2024-31859,0,0,2cbcc460dc8e0afa742cff93e4e3623f3eeecc1b5d4af790af6dab821b4c8601,2024-05-28T12:39:42.673000 -CVE-2024-31860,0,0,d73ad5b4a2d9a859a7feed5855247563613c099d829797e330f3c3b5f54770bb,2024-05-01T18:15:23.393000 +CVE-2024-31860,0,1,0c85f33d3dadfb2fd0d5a6f2d0ed9d9d75da9aaa685f77a3492d74d36fbf93e1,2024-07-03T01:55:31.267000 CVE-2024-31861,0,0,09f74af28b106a9bcd2fca862ca1484872e5dd069d055b6adc2bc96ecaaa18b8,2024-06-21T10:15:11.757000 CVE-2024-31862,0,0,bdbb4b1091af79e6aaf56d41a4760c428dcc1fb171014df01f6909ccda945916,2024-05-01T19:15:26.803000 CVE-2024-31863,0,0,c6ae1cb99dd6b8b6f74d87fc2d695eb3106e5de1e3c982a38b69c3cb15c02e9b,2024-05-01T18:15:23.507000 CVE-2024-31864,0,0,49aa3a8d1fca6882bee10753cc9be9363016130a8f0d3c0015b7461e645728b1,2024-05-01T18:15:23.563000 -CVE-2024-31865,0,0,2e5c8458fb931b600cc81217d1c1459e2cb074a1dd91f55f37020f655174aa70,2024-05-01T18:15:23.627000 +CVE-2024-31865,0,1,02a2ba0d6bb162e0849bdf7568c167d76e92f64cab3447bcb8f0f65f613886ef,2024-07-03T01:55:31.473000 CVE-2024-31866,0,0,273882af8e5be5ea8da6353ac690dc9a0d086b625d54fdea7b1703d5467930fa,2024-05-01T18:15:23.683000 CVE-2024-31867,0,0,e77b94cb0dbba9724dcb4bf10a3c28b5d0820940e8bf0aa9502c6074559fee16,2024-05-01T18:15:23.740000 CVE-2024-31868,0,0,f51ec98640700979c2fbd42ec349064554a4f4e2766ddc3095908e984b1027bd,2024-05-01T18:15:23.793000 @@ -250142,26 +250142,26 @@ CVE-2024-31941,0,0,b8dc065fda42126e32d28a44ef547549a83996a827e764074359d3e3ec8c1 CVE-2024-31942,0,0,ceae4b513a0b6e905236b05cb5dd98d07a79c0420729857e9c51c87c35b65b17,2024-04-15T13:15:31.997000 CVE-2024-31943,0,0,d050ed16bd2fd56e0b74cc5712c1eb7ef94538d6cfa9c00022a6cfa048bd2dcc,2024-04-10T19:49:51.183000 CVE-2024-31944,0,0,d1cf01bee95ac2d1b4f198f30f665ce7f3dae041b6378dd5d37f86b95341e18f,2024-04-10T19:49:51.183000 -CVE-2024-31948,0,0,61f6d35222c1e3f11e25e4eb10990c24f6ea2b07724ec51b46fb0ba4b709b0cc,2024-04-28T07:15:08.843000 +CVE-2024-31948,0,1,2545f6a13668ac7d71382ed97228591f14df9b7003f52f431839a3cf2cbd6d68,2024-07-03T01:55:34.387000 CVE-2024-31949,0,0,d55253e38f8bc425df8f875d525d4d6b96cb3180b7d665ec7de9778e227e2105,2024-04-28T07:15:08.917000 CVE-2024-3195,0,0,787f988864320d109487d10ab48e68d202e20bb992c996c1eb76e50864248bcc,2024-06-04T19:20:17.337000 CVE-2024-31950,0,0,6cefb0ca8246a802eee33ecaeabf30a3794c53c92173f69e19945e3bf38104d7,2024-04-08T18:48:40.217000 CVE-2024-31951,0,0,a02cb6e83819b8aefe87f14fcbaf10a3986c9b6174676e08f67eb54fe256f190,2024-04-08T18:48:40.217000 CVE-2024-31952,0,0,5f29e6541e024f9b1bd72bdf8ee8e438dfaedf18a9a002e17369656e46ca5c14,2024-05-14T16:12:23.490000 -CVE-2024-31953,0,0,349af2554a847e8e543f6d2e7fb2ab1b2e174d6939ccefa087da509beb98b6dd,2024-05-14T16:12:23.490000 -CVE-2024-31954,0,0,38e15f2c72040812222d44176415f65c50915df4a13df4b3dff26dacb9eb9fab,2024-05-14T16:12:23.490000 +CVE-2024-31953,0,1,473e2dd03665c41fd12eb732a6a8b796dd851974540019960eeeb8c84154b002,2024-07-03T01:55:35.270000 +CVE-2024-31954,0,1,75cb48abade3eb19dfa6628441b7fbf62791ae48f745250b97879749047eeee3,2024-07-03T01:55:35.973000 CVE-2024-31956,0,0,56222bae986fe87c83c759cf706c4f2021e893534f083e7f4ddb4dffa4c53b2c,2024-06-13T18:35:19.777000 CVE-2024-31958,0,0,92a0a8c4e3002c821a3c846306658e74a9964a41bffea58fc59bb9ff3c43087c,2024-06-07T19:24:09.243000 CVE-2024-31959,0,0,881dd9c88eb573b82854e8881ea0e763e3c9111ab6dfe4157e823bc664d8a323,2024-06-07T19:24:09.243000 CVE-2024-3196,0,0,d5a1cb2b9527bda623e9f193c03f796a5c33bdfc24e5ed9d8b0d65fcf6304b33,2024-06-04T19:20:17.433000 -CVE-2024-31961,0,0,20b0d44975ed70eae19046d0af2ef73227b8e6f84e506a70bfff04b1d59a99bc,2024-05-08T17:05:24.083000 -CVE-2024-31963,0,0,249e14088ef1cb978a544a035f12780b12c5cda25101329052cbf65a593c2351,2024-05-03T17:15:07.743000 -CVE-2024-31964,0,0,f089546e58d2aeee74d84c588de6ef2dbf87c2b9fd123b721ff3528b589dc85e,2024-05-03T17:15:07.803000 -CVE-2024-31965,0,0,22a3bfc23af62f43801c5b66cc9abca0d8607996de9edc8d645ed197c8440071,2024-05-03T17:15:07.850000 -CVE-2024-31966,0,0,ddd064df5d945d96673b4b04a1e18eecc3506c6c5dd9f2fc0b6bf2275119c5db,2024-05-03T17:15:07.893000 -CVE-2024-31967,0,0,249b381e9f20d03ccde397282990d8488f166802ffbcbe496c9573258c0e04d6,2024-05-03T17:15:07.947000 +CVE-2024-31961,0,1,8693e8165d9cdba44092b3dc0a2cbcef973a8cdf8c9f695519261f49865d4db3,2024-07-03T01:55:36.730000 +CVE-2024-31963,0,1,ba90c05a8c9e5dbd1f07d8d76d1b3e91d5e43d418493615f1ef67d7be6576eae,2024-07-03T01:55:37.503000 +CVE-2024-31964,0,1,8d3c29fd368a319e520256c3700d613581d90bf641f7cb9d55243462f4fa2849,2024-07-03T01:55:38.253000 +CVE-2024-31965,0,1,c4b61ad2f9eef097e0954fa70290fdb78da64c708fb57d0eafd03802547423d9,2024-07-03T01:55:39.003000 +CVE-2024-31966,0,1,e813fbcff3c742b22ff3620e22028114e0bd0dc18f84922743926ac1c55086d9,2024-07-03T01:55:39.753000 +CVE-2024-31967,0,1,d11e85355b08311754a29e0c672ae95e7ac529a4f49e30497f6cb09093fb91b0,2024-07-03T01:55:40.527000 CVE-2024-3197,0,0,f230012f26d9c5ad7a19d59a4fe32cd792e51986fc310e1cb293dde9780bbff6,2024-05-02T18:00:37.360000 -CVE-2024-31974,0,0,b80495ac5766a194e743b46af8cc4074eab52b6994dfb71577294d50058046f5,2024-05-17T18:35:35.070000 +CVE-2024-31974,0,1,eb64c7f63099840683d53752791541217d3c4d0792dfc9b0d9b46ea3d72b30e4,2024-07-03T01:55:41.323000 CVE-2024-31978,0,0,905fe24a9cf546b211ed3cfae7258dc772856eb0550beb1f55c95bc3799601d2,2024-04-09T12:48:04.090000 CVE-2024-3198,0,0,23f647a2f0b4c9d8282aac5d503e6a564aa810d1f345d5d2765d544a3ea2c117,2024-05-22T12:46:53.887000 CVE-2024-31980,0,0,5493ce321a7028d8f5abef4cb41ba8ec559703b9634518d9a316b2b5b284a44c,2024-05-14T19:18:31.490000 @@ -250201,7 +250201,7 @@ CVE-2024-32021,0,0,7dff6f8d8e1a4d7fc2d76dbbb4d0e044f98278ef9f9c8a6728b7047a40acd CVE-2024-32022,0,0,83ce972a62cb0d496d93021f959db1a9c7d93bf991779ee98a131d07725482e2,2024-04-19T16:15:10.533000 CVE-2024-32023,0,0,adb78947d782fcb7041c1fc7768e7f3d3c9be214fb8ab1e71bb129805ba1aaf5,2024-04-19T16:15:10.607000 CVE-2024-32024,0,0,02bb672a3ecdc1cc89be08499a8d52a34fd79fba894d179733ab551e6c2e5746,2024-04-19T16:15:10.680000 -CVE-2024-32025,0,0,a635afcb387dbe5410bf8bad0e5b341b465d3e8e5dad80589c68bbf869785294,2024-04-19T17:15:54.903000 +CVE-2024-32025,0,1,e506e930d891a31eccd6c83ee867f04455d6476651d4b5ef0565357464967d07,2024-07-03T01:55:43.420000 CVE-2024-32026,0,0,9aca731d81c4e3ffbf5853bebae91a7c74d278fe33c28085ed72b4d8de3653b6,2024-04-19T17:15:54.970000 CVE-2024-32027,0,0,5f3c09d170bbd26a1e397a298c9a92805316ba30164f013dc8cd02f515dcdaac,2024-04-19T16:15:10.750000 CVE-2024-32028,0,0,a16d36bcfaa5cccbb6282aecd03e18b80c66f8151e3c2f08a8edd43b521f9227,2024-04-15T13:15:31.997000 @@ -250221,7 +250221,7 @@ CVE-2024-32046,0,0,3771b70436f95435fc521db21da6fd859bb3ed607b3e6e7edd18844526774 CVE-2024-32047,0,0,f009d59be96ce9fa193a4aa9724cc4cc41ffb33bc61e4f05b98fbbfa91a9068b,2024-05-16T13:03:05.353000 CVE-2024-32049,0,0,d9cad06fbf5a30eecb78b22409f73f445b96767def965004d9fc51455fda8ca6,2024-05-08T17:05:24.083000 CVE-2024-3205,0,0,94de9427276f5133bdfe91db56cbfc9958b517e8a2bb181bf6c470a918feb832,2024-05-27T15:15:08.930000 -CVE-2024-32051,0,0,6b68078466255ceca82525e73c2bf321431fb4aeacd1939a9b40ac3cfa9637f8,2024-04-24T13:39:42.883000 +CVE-2024-32051,0,1,e28a1e0c21bc5f7358767662bb9a7b790bf9856f0536eacca66c7e2c127c26a1,2024-07-03T01:55:45.237000 CVE-2024-32053,0,0,c49f1ec019a03a55c7a246c2938dce6b00883e32de7837d58b7e2304f1b45b97,2024-05-16T13:03:05.353000 CVE-2024-32055,0,0,6f2d1e2b794c469fc60e21d2252e9f5df7bf8f202c22d166d778068242a50bff,2024-05-14T19:17:55.627000 CVE-2024-32057,0,0,5e67bb9c034526d5d833ae3ea893d728ce7f6380ab949c5a702a2155a40471cb,2024-05-14T19:17:55.627000 @@ -250306,115 +250306,115 @@ CVE-2024-32148,0,0,25993b40ac8c6405e3c4aa4697e7a65594872b4932df76faa669e9656c45d CVE-2024-32149,0,0,12d107e3c0999cbcd27b2d933b885433c81cf0faba3d46ab08b4e66fab365309,2024-04-15T13:15:31.997000 CVE-2024-3215,0,0,87550ed88317242f35b56ee440b2ef3ddf4431fdfdb3fabb22af72583d7166cd,2024-05-02T18:00:37.360000 CVE-2024-3216,0,0,aac88e798ffbdaddd62ae90ecbece12fc58351de061defd8cac2a138eea1c35f,2024-04-08T18:49:25.863000 -CVE-2024-32161,0,0,60a9978d35673eb48d5015a016115c1964e22e158d92ca4de7447769c2bc70ab,2024-04-17T20:08:21.887000 +CVE-2024-32161,0,1,aa486a10e1c1e1d4ce96087862c0685a8206cb453d4b368274ea4d3fc4398d92,2024-07-03T01:55:49.600000 CVE-2024-32162,0,0,118ad76854c7f44c6eff111c13a9015a5b3feb6620bf58d40eff2d6cbdaa766c,2024-04-17T20:08:21.887000 -CVE-2024-32163,0,0,2a0e3e31a356cd8bdaedc62aa40103c9838a070e53ea091fe0aa567b9d0934a1,2024-04-17T20:08:21.887000 +CVE-2024-32163,0,1,fc2eed4a9bb29bcfa67551b883d7bb89c5c9af4a13eff5016cb1daac622a783d,2024-07-03T01:55:50.383000 CVE-2024-32166,0,0,8c8680ec923ae3bed8a58326054c7f7280f0a44a3f507a43055bc183eecf3164,2024-04-19T16:19:49.043000 CVE-2024-32167,0,0,e1b908973391122461e7829a2d79d03ca6868b1699a22ea149cc482b5749c2dc,2024-06-12T18:00:30.120000 CVE-2024-3217,0,0,3ac42247ba2d685c0a6f4de738ef771d2778cce367312f144d0326551965dbb5,2024-04-05T12:40:52.763000 CVE-2024-3218,0,0,15d13fdbdfb7c920bd4937754941efbbf6a0874233b44e802f3c54e2e1e5f44b,2024-05-17T02:39:47.357000 CVE-2024-32205,0,0,3b6122f4454c6189a285ee435770c5e0b5d0cb175cbe04dd262a3757da1f87c2,2024-04-22T20:15:07.210000 -CVE-2024-32206,0,0,be52aa1a24711c5d2040610c8eabfaf214ad6fe9bf64a955721ba7c3bf07b18e,2024-04-19T16:19:49.043000 +CVE-2024-32206,0,1,8cd9c34ce9f7db79af05faf1c051a80ce3416b7ab823e5294fc2704f3b904424,2024-07-03T01:55:51.200000 CVE-2024-3221,0,0,186c7b7b6520d05d615d6c269bc114b3723d88b6ff31567b059a051c2d5cb959,2024-05-17T02:39:47.450000 CVE-2024-32210,0,0,d0758956dc52f4cf5602024642ff76bb2b5c583ff5b1e63bc6f84dc013fd06f2,2024-05-01T19:50:25.633000 -CVE-2024-32211,0,0,2b66354120eb78c5de130c5736a0f6cbdb759d8857b62aaa9610afcf2dbd191f,2024-05-01T19:50:25.633000 -CVE-2024-32212,0,0,308638b6504e9dac986372001ec76fb6f4bb563fffc0ef1ef751b01597b9a059,2024-05-01T19:50:25.633000 -CVE-2024-32213,0,0,d9b1dd437b93ee6625f4e0f6d3e434c9b4da35732523ef70dc3986502a40254b,2024-05-01T19:50:25.633000 +CVE-2024-32211,0,1,84e4b5826602163d039517450331f03278990516e0626af786de559d752b5412,2024-07-03T01:55:51.973000 +CVE-2024-32212,0,1,f6aba6b5a0388dc6cc8b07b61804546c09da8a05399de65b74351bf95fbbbb88,2024-07-03T01:55:52.740000 +CVE-2024-32213,0,1,41eb62ef3b9a2dab94a557aba3b39a317eb9e5981c9ad6e215d6c756107a42bd,2024-07-03T01:55:53.503000 CVE-2024-3222,0,0,799b361ab23aa76993ebff58db38db1a2ff6bbfd18c67fd1f278e8a3ffabcc98,2024-05-17T02:39:47.540000 -CVE-2024-32228,0,0,6b15a50432654b7e6fffc8920121f873b5ca8805f2b3a2218d0d6811b336b30d,2024-07-02T12:09:16.907000 +CVE-2024-32228,0,1,62135ad7292b6c8516771101f61c85ec84993fd54c5e6a300cda88351ea85c2e,2024-07-03T01:55:54.267000 CVE-2024-32229,0,0,00a4557f8564c10576c097d87b562b837eaa839b191212b0107c34b3bddfdec9,2024-07-02T12:09:16.907000 CVE-2024-3223,0,0,6cc36c470525be0fd4b2414cec5a9a6177e43b11e75a26205c33328451f02d8a,2024-05-17T02:39:47.627000 CVE-2024-32230,0,0,bba137e1373cb1ea88f9e5c5bc97b3dfc8dcee41432f2e75a6da02a5c1a71891,2024-07-02T12:09:16.907000 -CVE-2024-32236,0,0,4eef42ab5d5b212b2220dedc358c09498d51b50fcd2b77aa529d502462755d3d,2024-04-25T17:24:59.967000 -CVE-2024-32238,0,0,0e920ec9ded0c0837401c703af1964a27843eb631a1c2ab20523a0b29f896ad3,2024-04-23T12:52:30.940000 +CVE-2024-32236,0,1,d5871b893c68bbd3751dce630253c79d1c30665f824c9666c275163dd9ec41ce,2024-07-03T01:55:55.017000 +CVE-2024-32238,0,1,2e383d4cf27763d4a2e4c78aa0cd5794584e416efc1aa13fdb576cfd26ca2359,2024-07-03T01:55:55.820000 CVE-2024-3224,0,0,ac6a81131bf4dda9a1fb919110891b8e3432d607290ab1109b186afa8000defb,2024-05-17T02:39:47.717000 CVE-2024-3225,0,0,2d6dcbf0bdbb464101f6b69c967426dbd521147e41ea300dcba51b2b7dce767b,2024-05-17T02:39:47.810000 CVE-2024-32254,0,0,0a822eba06a834cf336156a0938a7461bb1c4b55ddb75ffba99f3f6b4a1c1462,2024-04-17T12:48:31.863000 CVE-2024-32256,0,0,a5d1df3249255701878f4ca3cc2c96f2401df41f8b31a37dac5eb50e5dc9f740,2024-04-17T12:48:31.863000 -CVE-2024-32258,0,0,4a9e799b5a75ad39b8560e95b812a67f5b992d61d15e8ff99b2d36a5987dc294,2024-04-24T13:39:42.883000 +CVE-2024-32258,0,1,5dae54230a1765016eb565e9e25d82cfb7f4d23860857f1e9a3317d31d41442b,2024-07-03T01:55:56.647000 CVE-2024-3226,0,0,22538a15ec2928b97d8af0c0dccde27c92434562358d7198046e84039fa826a9,2024-05-17T02:39:47.900000 CVE-2024-32268,0,0,ea660c910e15f3606747fa7586b7f7f075c28fded5db811b5df434089e7b4ab1,2024-04-30T13:11:16.690000 CVE-2024-32269,0,0,0142f3c45d36ad639eeafc5315f1fa2973454aa07cda0ce0b715e55142f5d44d,2024-04-30T13:11:16.690000 CVE-2024-3227,0,0,b7888e40c309eec617406e2a5679f992e8abeb4b92975527ef40097ea2d1b52b,2024-05-17T02:39:47.993000 -CVE-2024-32281,0,0,a566b9f3cf096fab338948e132be23b66a9f2501c95039dd7186fafc15df3cca,2024-04-17T15:31:50.160000 +CVE-2024-32281,0,1,2089769d5a8dd576a3c4cba2a6d21b0b986a7a5b7c0a620f0513ace1e68a0f46,2024-07-03T01:55:57.420000 CVE-2024-32282,0,0,e5357aafcfe3da38abc16b53a2fe91b224de61a5ed23923f7ac518d25d82dbfb,2024-04-17T15:31:50.160000 -CVE-2024-32283,0,0,a73c4976b3d443b506ba0da9981c9375a8bd94247f1b8cc95042d2a94eca34db,2024-04-17T15:31:50.160000 +CVE-2024-32283,0,1,c72ca6989168ee21133166c85a18b30a403543bd2802d4602b360f26e8ac9c38,2024-07-03T01:55:58.170000 CVE-2024-32285,0,0,9529431b83da151fb9b96ef61a6f52d78979021395b253d357cca57331ad87ff,2024-04-17T15:31:50.160000 -CVE-2024-32286,0,0,0446ae8cfeed3b6b428f38f3c2f4e35d46b31c54a9ccc231877126a8c050363b,2024-04-17T15:31:50.160000 -CVE-2024-32287,0,0,26a016a9b3c6a7e85e2e0f642b43856dadb05faacb97686d986a0222c93b67a8,2024-04-17T15:31:50.160000 +CVE-2024-32286,0,1,1db83aa9b55edb8231744756cf042cd8c4416ff23dccabd1d06f4f496f58980c,2024-07-03T01:55:58.927000 +CVE-2024-32287,0,1,932347149029d6eabd46a68bc6a82fe6d2945f3ac8f01e10c1833424637fa873,2024-07-03T01:55:59.670000 CVE-2024-32288,0,0,d6ad7a62d4bac5355131f6aa48a68ab7356e2aec6915f40a12433efb5f544350,2024-04-17T15:31:50.160000 CVE-2024-3229,0,0,6db44865bc549d81d248c9ff4567189d0e265f2d9666ac3a1b2d3d9f5ef83f57,2024-06-20T12:44:01.637000 -CVE-2024-32290,0,0,800e7992739d5b0400ed8c63993183d656650d0e339040a86ad028fc9cfdd76c,2024-04-17T15:31:50.160000 -CVE-2024-32291,0,0,b7153c4f84f4dcdc9674c2de97a60dfcb3c6ccd76dc3087e39499a1f30a8221c,2024-04-17T15:31:50.160000 -CVE-2024-32292,0,0,28e836ab012ba26ce6370aa637128c082a6104370d01202934f29fd84d4444bd,2024-04-17T15:31:50.160000 +CVE-2024-32290,0,1,ea7d12f24bd3a870d72d4f02beed12c0208289688c835eea6e908dc2b165b6cd,2024-07-03T01:56:00.430000 +CVE-2024-32291,0,1,6162d71e0c50cfd80b8166ccbdeaa2e4adf839d03127a1a5b034d5446628089a,2024-07-03T01:56:01.233000 +CVE-2024-32292,0,1,7d196aa8ee2ad410c3e453bbba317943102958b600dd9e6a6c1d957762e0ecb9,2024-07-03T01:56:01.983000 CVE-2024-32293,0,0,d16611fb15c081131f616e89cbae49c999e1669d1f3ba96273f94493581ea532,2024-04-17T15:31:50.160000 -CVE-2024-32299,0,0,fca46a7d533ca57179a1ec9db58160bbbed09496ab26c6e2bbf71176feb8d379,2024-04-17T15:31:50.160000 +CVE-2024-32299,0,1,d0a23aa31c0a2313e06327805357771e661b42ede7c77d86066b4cb57786b994,2024-07-03T01:56:02.733000 CVE-2024-3230,0,0,b827e5f5c7da5900d849c3ba32ae34e7601341c19e8bbb867783f44a3032e122,2024-06-04T16:57:41.053000 -CVE-2024-32301,0,0,96ee0b54df7a4f78b7d9427348511b154552dc59b2071b47f5d0ddac60dad82e,2024-04-17T15:31:50.160000 +CVE-2024-32301,0,1,4d4519a12ab144b213a6b233124e45a37b5f8337a2689aea47ff3693c4ac9546,2024-07-03T01:56:03.403000 CVE-2024-32302,0,0,856590d673eb02e246223aef7a9d9a79aa445cadb1ccbcb1f59c17c7bcefe824,2024-04-17T15:31:50.160000 CVE-2024-32303,0,0,f5183e57e6da8ebbb9ebe6e641e50d0eb754fcf17fc9e8be859d54b89499237b,2024-04-17T16:51:07.347000 -CVE-2024-32305,0,0,b3ec1687528efaa87ef0024d885c301fef57de41221c5e757405849bc101efd5,2024-04-17T16:51:07.347000 -CVE-2024-32306,0,0,aa33df8e3382ad4f3587707de420711c8d4bc95d162269500775e39271932148,2024-04-17T15:31:50.160000 +CVE-2024-32305,0,1,54019115d1050a8e7a6d5cd1d49afa66fdb4c41b3a834537b9695d1e6b1d3b78,2024-07-03T01:56:04.160000 +CVE-2024-32306,0,1,3216c07ec117e1fbeaffcf62eac6a3e3d7a0764d75335094f2ef3b1b39747031,2024-07-03T01:56:04.840000 CVE-2024-32307,0,0,f12ea8b10d41967ec04e04d309e47f66284aeaa4e445cf32481cc5868eeb97e7,2024-04-17T15:31:50.160000 CVE-2024-3231,0,0,e95a5eba69d2a70e73288b65ef51fe35c5a71d8dfb21ef835fe92cb48dff5b16,2024-05-17T18:36:05.263000 CVE-2024-32310,0,0,403a1cc9b3055e84cb063a6792bb8b91ae7423d97bc02d3245065155bc28c656,2024-04-17T15:31:50.160000 -CVE-2024-32311,0,0,7e2445a5fad1effcef3fbeb98cf6c155dca315f7fb6ac1b5415576c5bec93d56,2024-04-17T15:31:50.160000 -CVE-2024-32312,0,0,084c63dfa09617165f3e7b302c1a4fa0ad45e1e1036ec1d1dd3d03ec5eab1a2a,2024-04-17T15:31:50.160000 -CVE-2024-32313,0,0,a2110ea0886d29d878520f1e0bb2ca00a4861e43b88d4bf4a0209f9a29237c3f,2024-04-17T15:31:50.160000 -CVE-2024-32314,0,0,6de64238d854339de1e07cadd922f28350df5ac0c9cf632df88df1925f190160,2024-04-17T16:51:07.347000 -CVE-2024-32315,0,0,d967fd26b4dc8d6103f1375d2a0f029bf5673e33c09fc72c4af38656fdd44be4,2024-04-17T15:31:50.160000 +CVE-2024-32311,0,1,a7536302fbabb4b529b5593329bec7f2cf36802ec4f1587ed01bada9d7c32320,2024-07-03T01:56:05.617000 +CVE-2024-32312,0,1,fb39c38437b7e403d4bca9d564b66acec8787221ff0788e5fad32029133a3052,2024-07-03T01:56:06.373000 +CVE-2024-32313,0,1,b116247e5c00d5184493232455f468609fa393d89b579971585285365b8441db,2024-07-03T01:56:07.130000 +CVE-2024-32314,0,1,ef5dc51f0fe13e2d54624ad184f99cb7967409751beb976a4c726c8f3cfcb960,2024-07-03T01:56:07.890000 +CVE-2024-32315,0,1,ca838fbb773cbae3bd9255050bb868bf1fd48237f3ce87bc70b24f413e3dd8cb,2024-07-03T01:56:08.650000 CVE-2024-32316,0,0,a58c15fa4fd96274056ab104ca6fc1340e053661d8932d745c0fc4b1c09dc8e7,2024-04-17T16:51:07.347000 CVE-2024-32317,0,0,3b211721c2918106b1f1e7546bda616d889285c7b9549429ce029a2ae9fa7832,2024-04-17T16:51:07.347000 -CVE-2024-32318,0,0,af0147cc0b951b6320a20f40cec58c15f3c7ae517895de35f7ff02b93007344c,2024-04-17T16:51:07.347000 -CVE-2024-32320,0,0,37a3616f028696b5fd899f236869a82a73cb2f39b08a79d3a8c229c093bfc5dd,2024-04-17T16:51:07.347000 +CVE-2024-32318,0,1,ecff3438c4feb6e3e34e68eac1bc15ad0ca3b72da87c9841a9aa73abbe7e81f6,2024-07-03T01:56:09.407000 +CVE-2024-32320,0,1,ff00070c0799b87b8918f3636a7d891bdc3943256f60475437c9b0e24ed27cf0,2024-07-03T01:56:10.160000 CVE-2024-32324,0,0,88adad67deea1264e97a523d12962916f47e4cae672d5057f64601515c5c4891,2024-04-26T12:58:17.720000 -CVE-2024-32325,0,0,1606b9143cf3f301fb7c5a8ddfe5af1d789ae862e1039d8cdba213b614fe60be,2024-04-18T18:25:55.267000 -CVE-2024-32326,0,0,8d29072cf9ef63ed8de6e5b3ca6cd2fcf0e1dd16c656ea5ca29e42cf51ce35bc,2024-04-18T18:25:55.267000 -CVE-2024-32327,0,0,a6e9f7161ee1883fb85d4857caa44c041c8b788ab544bd06a70716304acc6f7a,2024-04-18T18:25:55.267000 +CVE-2024-32325,0,1,e571ce4c9c23cfa0415d1b6bab7055e53f7d8f4096b96dcccf19e795da707a69,2024-07-03T01:56:10.923000 +CVE-2024-32326,0,1,352e299308e53d7cab4ce30fdcac6ce9709918093eb2935d0146d3c8aaa13cb2,2024-07-03T01:56:11.760000 +CVE-2024-32327,0,1,f9ad5f85fd968b4c25755f74bae71baf13607a4e7af0f43bcd9f778540d1517c,2024-07-03T01:56:12.527000 CVE-2024-3233,0,0,20c2f7e902ff3f580d4cb1f6978216cec758c282dafb334fac21c0e0b6e57fbc,2024-05-02T18:00:37.360000 CVE-2024-32332,0,0,3a004a33f351b22bab28e754ff32dab060a1204ca044c29b556fab4eb6343e1a,2024-04-18T18:25:55.267000 -CVE-2024-32333,0,0,d0bf4e6d6996deb1c26a8bd39ed02f7e479d50c488218450b2120bedaffe7d66,2024-04-18T18:25:55.267000 -CVE-2024-32334,0,0,ef5843ee9073a9ebfe3edf50cbb437b59567bd65bdfb0b7afdb75a386d8533ba,2024-04-18T18:25:55.267000 -CVE-2024-32335,0,0,a18eecfae003f3755ca9788ae824f8ae11c862ee21bc8d2d8a24b68bc33a3ca0,2024-04-18T18:25:55.267000 -CVE-2024-32337,0,0,dc2a2a172fc7aa8fe691537543cfdcef733d9805fdad8204cdb15cb784f9f055,2024-04-18T13:04:28.900000 -CVE-2024-32338,0,0,5c39bd4988329d7ca44a2054334cbe64def16d95c15637e731a812da665625a6,2024-04-18T13:04:28.900000 -CVE-2024-32339,0,0,afe7433969155378d9f53eb585665f431668449ec7b8a1871dfc6bd28402185b,2024-04-18T13:04:28.900000 +CVE-2024-32333,0,1,5ea24f41febeedf6644810ff6c1c9911aaed47e6e3b7e6c8023de11405f771bc,2024-07-03T01:56:13.287000 +CVE-2024-32334,0,1,6996ffd498862ffa6ee12c5727ff00fad0e747fd1eeddd88f3108594110a0e18,2024-07-03T01:56:14.057000 +CVE-2024-32335,0,1,27b22302a22439219b05b87399163da322c2f17e7edfa76b1fbc93b9ad8d165a,2024-07-03T01:56:14.820000 +CVE-2024-32337,0,1,5e85592d7c78e5f96c7cce8de98f1c3610765794b25a03f4a02a293d1ede5863,2024-07-03T01:56:15.610000 +CVE-2024-32338,0,1,b6843ffaf837b705cd4efeb2888911cddf85726c89be4454c9b8836b2387fd4d,2024-07-03T01:56:16.380000 +CVE-2024-32339,0,1,40d4e9896b5ce55fafd4f5570160fb57639c45e0c00ed30bfdb9c5412b728799,2024-07-03T01:56:17.143000 CVE-2024-3234,0,0,621ff486fe67b005aafa4d077f43b44f73e9ffae621feda6c5ee33965813c116,2024-06-07T14:56:05.647000 CVE-2024-32340,0,0,ed4dc49e1d39da0a286df8b47ebcf315cd49853b7dd6112c802ea07e59d5ed41,2024-04-18T13:04:28.900000 CVE-2024-32341,0,0,71f1f455bcc77ba4bdae7357bc360322947a986c89138ad9c73bd315f3ef516b,2024-04-18T13:04:28.900000 -CVE-2024-32342,0,0,5ed8776d52ca78ebc18330cc82402250f424106e5b861cb93d248ff58681f335,2024-04-18T13:04:28.900000 -CVE-2024-32343,0,0,862e8e3fbd92547c244c5be90d83e1339d7a18685f98ec207b76da84ef301f11,2024-04-18T13:04:28.900000 -CVE-2024-32344,0,0,47eb1a8da70bc975fdd4934340a6940373147153bf19749b3895ed5e2ae65a6e,2024-04-18T13:04:28.900000 -CVE-2024-32345,0,0,3c4abcf95580a888529432fa6af7f966006546429f30889ca33584d7f7f45c9a,2024-04-18T13:04:28.900000 -CVE-2024-32349,0,0,2dd65a459732fedf1bef9a73f22f2cefe3aaf09d90aef21a91472b2f9e52d426,2024-05-14T19:17:55.627000 +CVE-2024-32342,0,1,bb454c0ee107b3bd4b385f651671a4e9a6ab8779e90f0240f01854727e0bd8df,2024-07-03T01:56:17.900000 +CVE-2024-32343,0,1,7f7865fa63b09a0451cd9cd36514192fc4a33dcb6cab82e4d53675ba720d24e9,2024-07-03T01:56:18.650000 +CVE-2024-32344,0,1,26bc83944a10a9caa4748416f25ffcf361d2edce0f9da57f190c8ec8cc08db28,2024-07-03T01:56:19.393000 +CVE-2024-32345,0,1,e0be9b7aaaddfaff09d7f0da62200edfad0f9dfd9fafabc086d22866c36a13d6,2024-07-03T01:56:20.143000 +CVE-2024-32349,0,1,e8628d661ed4f9b016ce895b07c4b1f81e2396ad94ad86dbdc5dd19bb212f985,2024-07-03T01:56:20.913000 CVE-2024-3235,0,0,87b194ac57d76e3164f790cf262b7f15e5577bfab72d12fd067ebb5070eb75e0,2024-04-10T13:23:38.787000 CVE-2024-32350,0,0,fdd6678a5e67bc1124bb59c36a80a14f25f4bf9bbefcff4ac4e75189e7a516df,2024-05-14T19:17:55.627000 CVE-2024-32351,0,0,9dfe8be024b6c2fa8636b30198bceafe2a6e74a41f370fde7bcfa153e4e2604c,2024-05-14T19:17:55.627000 -CVE-2024-32352,0,0,17f1d905d2c23f4b3d4eb0662a7f777efbcef858bf4a4b6c4c345a2eadd1a9bf,2024-05-14T19:17:55.627000 -CVE-2024-32353,0,0,c29230d4adf45bcdacb98744ec727c04b0a237c936de2944200d606a64817d6c,2024-05-14T19:17:55.627000 -CVE-2024-32354,0,0,2cb98cf03f55f0d3f314d8f78a7b2ae13f23e6c4927c02df2076089e9fc3cc74,2024-05-14T19:17:55.627000 -CVE-2024-32355,0,0,2701a15118616315b80ef66d15278af6b7051848ac735d5427c3a4cdd16dfa55,2024-05-14T19:17:55.627000 +CVE-2024-32352,0,1,d332e53ad000ad8435c81c28241440757adaa084990611f8a2796504f9f9ebea,2024-07-03T01:56:21.743000 +CVE-2024-32353,0,1,95056727f707fc243928d89d790259f229ec041cac954a579b9099dbee969c0b,2024-07-03T01:56:22.500000 +CVE-2024-32354,0,1,7a51f481a311ea6ef8a37cf0ab90a70652431f14a7a615163cc4248af79f2619,2024-07-03T01:56:23.250000 +CVE-2024-32355,0,1,968872e2f9388a4f300a29bf059bb9d041ad5f1af64c12a13c06a0c4c507e69c,2024-07-03T01:56:24.003000 CVE-2024-32358,0,0,4361acd373c6387e4e9f8c587956d55ed79588179fa5465dd154715a342d96e5,2024-04-25T17:24:59.967000 -CVE-2024-32359,0,0,b4d29b953e327824af6c91976648aff102dd83fb9c76233181d51fd1f9cb1231,2024-05-02T18:00:37.360000 +CVE-2024-32359,0,1,5f5adaa7c351afc161843c430c2d85ebb8e96c4f13e61a22d9be5940d569bde0,2024-07-03T01:56:24.743000 CVE-2024-3236,0,0,f8cddc598c55757cfd994b1be493c044d341c8da01a141ec54151a61683e3edb,2024-06-17T12:42:04.623000 -CVE-2024-32368,0,0,e5f9ac1f5e4b7deacae1b8adfb72b39f31c0e06e3a2c110e19b743f4b05d773c,2024-04-22T19:24:12.920000 -CVE-2024-32369,0,0,9089831a6180c7b5be681767b4ccc10fae87b49242f26b69d51f8d148f2c2512,2024-05-07T20:07:58.737000 +CVE-2024-32368,0,1,a245b295adfa06788541a26df62f1afc9fccb21b7ad815d7b584befe0d95c5a6,2024-07-03T01:56:25.517000 +CVE-2024-32369,0,1,ceaa4d49bac1e11a599e3682c2a04734321f86009f7fdf5c8ac8b6951737aa19,2024-07-03T01:56:26.273000 CVE-2024-3237,0,0,98b407c7ff694e30bff011becf60591f80a0369e19a531a10c3c30601e8332ec,2024-05-06T12:44:56.377000 -CVE-2024-32370,0,0,26b7981d1f93d45d4254ee84b1a71f312877cce2b730fe85df8dfce2590a1378,2024-05-07T20:07:58.737000 -CVE-2024-32371,0,0,af049493697e54e0bfaf711bb0f3f1b1ba27d89729279fbb568f9f3d48b2c246,2024-05-07T20:07:58.737000 +CVE-2024-32370,0,1,81492edf1d2c6a64042ad0cf6a2cd348080a7ef88ff3ba5fbdfd47e9e3993df4,2024-07-03T01:56:27.030000 +CVE-2024-32371,0,1,c5b061cf3b3b9690294029e93df017d05682693a4990cea94a8f5d54407c18f9,2024-07-03T01:56:27.783000 CVE-2024-3239,0,0,f0b5dee118fe7d72d1dd8b04a2bfd6454494350494e967af2c301b916ad31cc8,2024-05-14T16:11:39.510000 -CVE-2024-32391,0,0,b9d2ada2509e9e002fcf7fc50c30e5fa24f6bd077b7f0fab83dbe519d76755ce,2024-04-22T13:28:50.310000 -CVE-2024-32392,0,0,e9dc77721f231608117a79f151c9f1e6be5cd7530989658bd3dd67ce41889ce5,2024-04-22T13:28:50.310000 -CVE-2024-32394,0,0,5f3cc70e4b86c8028147d2489cef40fa6c9285878a28bdb0855878990e97443a,2024-04-23T12:52:26.253000 -CVE-2024-32399,0,0,881ee2dd975bc6f828957c741f38d2e9a20065eb3fba67ea84e4e0b7e3e06627,2024-04-23T12:52:30.940000 +CVE-2024-32391,0,1,f4272eb417a6619ae6f0cd98fa3d87733204a81be0ef4fa89595e43efd0dd672,2024-07-03T01:56:28.530000 +CVE-2024-32392,0,1,1310e6c1ebc0e444f0f75bdda70e281fbe8b1f234964a64919aa8a884e12d504,2024-07-03T01:56:29.287000 +CVE-2024-32394,0,1,75664c76484188f21d0bcb681b41ac4fccac73f64c127d861639924880bf9bbd,2024-07-03T01:56:30.023000 +CVE-2024-32399,0,1,d2afaf00c74d78a83f29aa1510c56e0bd37df6cf66b6b6c480bf78080175383e,2024-07-03T01:56:30.203000 CVE-2024-3240,0,0,29db5b1a5b433d74ddb6cf9845d6d7dbe813d3ab7ee99000a8ee5a7acd277af5,2024-05-06T12:44:56.377000 -CVE-2024-32404,0,0,dd51daa738e86af5cb3559b49847af8b161e8c694a948fb4fd3bf01830c7a4e1,2024-04-26T12:58:17.720000 -CVE-2024-32405,0,0,3ef8baadce3828c002829cc143866c02c5413778e0871cfcfbcacdfae3d8303e,2024-04-27T05:15:48.447000 -CVE-2024-32406,0,0,02ca7a177d496abc3e50a6810f02b9048e8ddb45b883c530d6fb401e9dec18da,2024-04-26T12:58:17.720000 -CVE-2024-32407,0,0,f9c1ecaffdf365c6c469d999c6d3bd257a3019da4a708055a81a3c667aefb4ce,2024-04-22T19:24:06.727000 -CVE-2024-32409,0,0,5dbff57cf8fd7b82954783bc9924685f205a96bfaeb0809b9689f26383dca086,2024-04-19T16:19:49.043000 +CVE-2024-32404,0,1,eb80f6787a363279634a5db4d277d494ac5dc1f2539325374b050a4c28b7d13b,2024-07-03T01:56:30.957000 +CVE-2024-32405,0,1,bc9991f960c5c51d23d0756dabed902418fdca4bc0036a9a8f03079b2256af7b,2024-07-03T01:56:31.770000 +CVE-2024-32406,0,1,73ac1f19b303163472b3c975415e4f499599d5740977837d587aebd96ab50699,2024-07-03T01:56:32.550000 +CVE-2024-32407,0,1,fbfaf7068ca597095592e38589ff8309655659ac5408bc5050ead219b55bbfea,2024-07-03T01:56:33.310000 +CVE-2024-32409,0,1,cdbdcb7de47ba32c82cee0bb38b83e5519f96f658f96608562f1e326a9e11332,2024-07-03T01:56:34.063000 CVE-2024-3241,0,0,81b33ae2e84671a92af0da565a61243f149bf0e66a90aca175abdd4ada353c8d,2024-05-14T19:17:55.627000 -CVE-2024-32418,0,0,95e561b293359ffe96c6d53d8bd7aa5dba172944f2d114b653ec1a760700c5d9,2024-04-22T13:28:43.747000 +CVE-2024-32418,0,1,8172cdb05b747b2afd259a179cd5212ac2debbeaf77726c784f5b816cfdb0abc,2024-07-03T01:56:34.817000 CVE-2024-32428,0,0,87a3edde2c4b0ace5bed90e6337013a3436ae0c663c6eeed3dbaf59e4e702dff,2024-04-15T13:15:31.997000 CVE-2024-32429,0,0,eb5275541e0171326bf869e836661a3d04172e6e7d4adfaa9657297147332796,2024-04-15T13:15:31.997000 CVE-2024-3243,0,0,c0b3d501de451bd25695181364b192f45772ac0c3be190b71ef36c93a88e910d,2024-04-16T13:24:07.103000 @@ -250475,9 +250475,9 @@ CVE-2024-32487,0,0,3964df55462d4b69b3a47831a0425ebab17556f2b889b4db15caceabcb50c CVE-2024-32488,0,0,6ce6bcee8af0a677e98d2bf7a3efd66cf8a3e580423515387116f39d710ba974,2024-04-15T13:15:31.997000 CVE-2024-32489,0,0,cbc8895e7f5e99c09f7bd505220fcc5514b4573939580e3f381a933acf3c9ef0,2024-04-15T13:15:31.997000 CVE-2024-3249,0,0,76c646e2435d001bf01037ff3fd93961dd050fc46c496185359532e97ed741fe,2024-06-25T12:24:17.873000 -CVE-2024-32491,0,0,0ef1d844738414cdd89361991aa89a441a6f02a4affed1e8b95f4fdb3144ccd8,2024-04-30T13:11:16.690000 -CVE-2024-32492,0,0,fbdbe605158ebb859c2c70df9471eb17e0db1ec1e36b709d629be4fcd2dc71e5,2024-04-30T13:11:16.690000 -CVE-2024-32493,0,0,99ad93b821b9120b3f9479fdbc637b6bf229eed0c91d108f68192b4be876e696,2024-04-30T13:11:16.690000 +CVE-2024-32491,0,1,d30474497268ba8f1eca4a0213eacdfe653c7390c8a6bb0f205ad6c8bcf6d00f,2024-07-03T01:56:37.743000 +CVE-2024-32492,0,1,b8f37fd95afd9f3c0db9b82f19324f4f73a560600fb9ed3392952c1c91bb381c,2024-07-03T01:56:38.510000 +CVE-2024-32493,0,1,ffb6c116d41e9a5c89f19db9ee55928315a8849f99630d88960b7d23ca7c5aa5,2024-07-03T01:56:39.257000 CVE-2024-3250,0,0,42d0527e4e3750c8dcbea25ddc3c02af060082636d586aa4581df30dc613d6b8,2024-04-04T22:15:09.350000 CVE-2024-32502,0,0,69fe824b685653a546225dc4ea95ba763f416a7963602dbf9b708132b70355bf,2024-06-07T19:24:09.243000 CVE-2024-32503,0,0,186ab37f647c5868bd0439903b3f859b2664660460df6c82459d804d339c4ae7,2024-06-07T19:24:09.243000 @@ -250588,26 +250588,26 @@ CVE-2024-32601,0,0,8cbfccd19a8758bfce621311ef1b74ead1c51ab9b770a5c88b9be54c4672c CVE-2024-32602,0,0,5a036ab20093db8d77d0bbad6ef85c0fe339eab100d61f79d2951ab5687311cf,2024-04-18T13:04:28.900000 CVE-2024-32603,0,0,237bdd6eb581c0410431fd7af056971ae43580f51f8ce5d9d85cbbd85e1f61e1,2024-04-18T13:04:28.900000 CVE-2024-32604,0,0,20060b0b46ff482c2f98c24b754e397faaf75159a62e3303a44f56bbb9c17c69,2024-04-18T13:04:28.900000 -CVE-2024-32605,0,0,fea6d197b96ef104c282ec84d7c011bc2be5afcd2f66d4b734abeb99318e847c,2024-05-14T16:12:23.490000 +CVE-2024-32605,0,1,de9c05a78c9964678d3bb18ce0c8aa64d771273179cdd76262e7bc3689e14034,2024-07-03T01:56:44.803000 CVE-2024-32606,0,0,84f5aac92ecf093d17a20a21bc7e9a141c10b8da10020af45274e5b48c677834,2024-05-14T16:12:23.490000 CVE-2024-32607,0,0,1eb0906ba82ffd31f442372eae23dcf0fae79b2fc936be2d1d644a2d9b7e8d24,2024-05-14T16:12:23.490000 CVE-2024-32609,0,0,3b49354e342795768d6c80152719823ff8bea6f8220eda3be3cdfb4ff0e96b74,2024-05-14T16:12:23.490000 CVE-2024-3261,0,0,64e31bcc6e62db1b4c5c56e73cf5a8cb5aea5ea94bcdf9adfdb13f502eaa6a22,2024-04-24T13:39:42.883000 CVE-2024-32610,0,0,22d07bb470516ba89e598a48be36f9f1a0690330204152a02db57fa1828530bd,2024-05-14T16:12:23.490000 CVE-2024-32611,0,0,925618efb4d1e78bad76a32070f40c9c6d8c021035ac6fadecaecc85defb72e1,2024-05-14T16:12:23.490000 -CVE-2024-32612,0,0,323aeb9da96b4d161bd0a9d885e8285c845d9cdd5eaba13d02a8af1a74e9ce07,2024-05-14T16:12:23.490000 -CVE-2024-32613,0,0,ad2a5d572e4c4b2530741b151a7b54a27d5dcc4824c7e22271d5a62459dfb33f,2024-05-14T16:12:23.490000 -CVE-2024-32614,0,0,f16bf73eb505e6ec86912c85bb0157832f13cee39b609d56680fadd018bfc118,2024-05-14T16:12:23.490000 -CVE-2024-32615,0,0,1a5096ac0be310fd1a9f3080fba1e0ef3d11189c7443f1e10c5faf3c7a3cceff,2024-05-14T16:12:23.490000 -CVE-2024-32616,0,0,c1e06dde8efe4093ae2b6a7546f1e47052cd013e4392d61a58f6df5051383400,2024-05-14T16:12:23.490000 +CVE-2024-32612,0,1,fa0d8cb7dacac717a406d4aabafa79934264f1b91f48d6d8c4723fee6286bb46,2024-07-03T01:56:45.670000 +CVE-2024-32613,0,1,f1f41ebc1e4e31cd144adfcffbfbbd261f6ca4f784d07dcc93c9e3cf304923f4,2024-07-03T01:56:46.420000 +CVE-2024-32614,0,1,0586f7e2db361ba016a10a7d05822a68e00bab4a467fb3c2cc530efcd3b5819c,2024-07-03T01:56:47.230000 +CVE-2024-32615,0,1,eed0625c47474188933c85f87c3961846e531f538a59e0623622ab217be95b75,2024-07-03T01:56:48.017000 +CVE-2024-32616,0,1,3470660bc21c15733b68c010ee9c1a1f6e6a37d50582163cfc4fb2ca8bf712a0,2024-07-03T01:56:48.773000 CVE-2024-32617,0,0,3956439f07d4411534f8f549ce08c96d328a2420265a359af3d1248df3e9b338,2024-05-14T16:12:23.490000 -CVE-2024-32618,0,0,5d3d540b7b55a3a64917a7fdaf780119cfb8e70e3d743f3b6cd2fe56b6676f96,2024-05-14T16:12:23.490000 -CVE-2024-32619,0,0,0d1b5353fce7d82ea5bb344e30710cf78e391234b8d0879e084fee9cb6fe9aad,2024-05-14T16:12:23.490000 +CVE-2024-32618,0,1,56dab34cac4614715d8aac7022fd1103f44443bc68e99df871e1adb6c0e5eb8d,2024-07-03T01:56:49.560000 +CVE-2024-32619,0,1,6ef2911538be2a3043e9cc5c5d55b0b987376f6227128d41d873c541e2af6ec3,2024-07-03T01:56:50.330000 CVE-2024-3262,0,0,758c253f08a1135a2d383be61db9b8d36970b2087c7788f9321bc534b0b4222c,2024-04-04T12:48:22.650000 -CVE-2024-32620,0,0,247557d3644dbb526b6d7611565760a28632bc99c21ecb94e3803afa1ff62cde,2024-05-14T16:12:23.490000 +CVE-2024-32620,0,1,85e9859841ce948d1529bf9265c5b199e10e1e938238ea78ce808ec9455f9d22,2024-07-03T01:56:51.087000 CVE-2024-32621,0,0,0d16af84588cba77912e6258bb92e0509e5d95cc26273293433e138b97031732,2024-05-14T16:12:23.490000 CVE-2024-32622,0,0,b317065f06760eaa27b0b7ac999830fa797acfe4b920f6d4614026ed40dcf7a9,2024-05-14T16:12:23.490000 -CVE-2024-32623,0,0,40d7a052a7921a06299c23fae7e652fcd6cf883d7ff64d7203a6aa59a6ad91ef,2024-05-14T16:12:23.490000 +CVE-2024-32623,0,1,a94c23c0c8f9c3e6770fcdb3523a72ba3a6a1e1fcaadb35697fb50c3e33015a8,2024-07-03T01:56:51.853000 CVE-2024-32624,0,0,2f355f5b776320f47db40144f30701bfd166073c8d5b94750f9e288f9784cd6b,2024-05-14T16:12:23.490000 CVE-2024-32625,0,0,83e118a0392b3bec4594db5d969d72238cd7025e3075e1bbd62c95f93a226798,2024-04-16T13:24:07.103000 CVE-2024-3263,0,0,3f703f1ba5ea7923ced884c4f521e9e2d72078574de8d888ca8ad52fe05fc989,2024-05-14T16:11:39.510000 @@ -250618,7 +250618,7 @@ CVE-2024-32634,0,0,399e2bba8e548c1c98770d2f478e96e69a60afbc020788dd69a365e3ae504 CVE-2024-32635,0,0,7682ccfb999fd6088fd46914c66488f76831bfd92b5abdeac8d55cebbc6f8570,2024-05-14T19:17:55.627000 CVE-2024-32636,0,0,b839e4487b1638854c5d5ed3e87a4fdbdb3bc06aadde0672da5bb7c4c26643f0,2024-05-14T19:17:55.627000 CVE-2024-32637,0,0,97158ed5566d3250b3fb8d995175abcc4416b94fccd5758c6cd34951fc968110,2024-05-14T19:17:55.627000 -CVE-2024-32638,0,0,59375073558f82dda1dfd378010829dbc4b43397a23c1692acbbc241abef4929,2024-05-02T14:15:09.830000 +CVE-2024-32638,0,1,64e69b6286f832bc6f0cd7c0b6e78e47c45f311d06cafdc54ce151131c91d6d4,2024-07-03T01:56:53.103000 CVE-2024-32639,0,0,f99f2a7c37840cbb9e81b91cedc42f4b5433fcd481ea7dcba5df3b2b90ac9ebd,2024-05-14T19:17:55.627000 CVE-2024-3264,0,0,e72e043177a1a04c7a4f16b77aec7fa5bf6f759e5ddd7b4a37761d45eae1d7e0,2024-06-24T19:26:47.037000 CVE-2024-32644,0,0,e88c5eb3a89ae127bbaa68ee6900bb69776588719de1a17fdbc979f8b62412c9,2024-04-19T16:19:49.043000 @@ -250646,7 +250646,7 @@ CVE-2024-32664,0,0,718b297c1c7558858a3c6f09924665172ffd7ff066b9e99da8e046f6aca66 CVE-2024-32669,0,0,120909758c684acb7a51e36d8f01a68b3f4d03ded247287f26cab48d9139b029,2024-05-14T16:12:23.490000 CVE-2024-3267,0,0,00a210ede7a73ca33b64d3b8a0e382509d5bafa34ae84022125b180763aee2bd,2024-04-10T13:23:38.787000 CVE-2024-32672,0,0,ee6c48c3e0e38e8c391ea6261e7813807f206a60f2ac1e86a9d8d6aba39ed1b6,2024-05-14T16:12:23.490000 -CVE-2024-32674,0,0,96f59a78cffb2c821be18a303b9da0d3f816839c22dca4209a77529199edce40,2024-05-08T13:15:00.690000 +CVE-2024-32674,0,1,8e274e9762e7b32d105911c76fa84ee156bae08969022295a61c40a0ca8ab4bf,2024-07-03T01:56:55.253000 CVE-2024-32675,0,0,87b463967c2204618d7e556d0f9b434f519dfbe770ec74ef985201062de7ccc7,2024-04-24T17:16:50.397000 CVE-2024-32676,0,0,c48bb61830c9720695f0f8b0e8d63e64e27e7902456d765223bd42b42ebc2759,2024-05-17T09:15:38.620000 CVE-2024-32677,0,0,b2d5b21c6c0b64a6ef3d2bb5d4a7fb394174b9e010ebfad39ee101d085a71d44,2024-04-25T11:15:46.440000 @@ -250691,7 +250691,7 @@ CVE-2024-32711,0,0,ee4fc6f8776e161cd18a75901753219a17a7dc9e2259a04b6086ad21e170f CVE-2024-32712,0,0,6cf3429c270426b91d6e245efb30946e3059e3ca7d973be6876a8f4441282d9c,2024-05-14T16:12:23.490000 CVE-2024-32713,0,0,4890bedc9533ffebd55221172f0c75f1346abd42e6c111dffbb34cd0b3f48d60,2024-06-12T13:34:29.523000 CVE-2024-32714,0,0,c706d4d1871d7a49138eb189601db2ab16e66a09952444b391946b116bada7fb,2024-06-10T02:52:08.267000 -CVE-2024-32715,0,0,abf04e75129e759b67ec48cbf05000a804f1a0c20a559d6b79120f4abacbafc4,2024-06-10T02:52:08.267000 +CVE-2024-32715,0,1,42a63ead2f66befea5d5699ec2ca2cc1b0483d0f505559315e90bee5a18c6e67,2024-07-03T01:56:58.463000 CVE-2024-32716,0,0,ef35512837a2eb385a00af812a4bd8ccb8fac7830ef81ad43aacfa3308965000,2024-04-24T13:39:42.883000 CVE-2024-32717,0,0,41fbfea18ca587f0b377a8ff08e3cedda799120e644b260bc7c5bf7bd95a593f,2024-05-14T16:12:23.490000 CVE-2024-32718,0,0,ac6094c004934613811f62cb54322c782e73ecaf784adcb8253ff40feadd2cda,2024-04-24T13:39:42.883000 @@ -250710,21 +250710,21 @@ CVE-2024-3273,0,0,daaa82c7e720f68a4f37f2f7272ffe56c61248628a537ab662a043f9a3093e CVE-2024-32730,0,0,1b540a6978216af51f74ca4011575d9f341f3a8ea462d26115f28861c4f0864f,2024-05-14T16:12:23.490000 CVE-2024-32731,0,0,38a3ff1f8bbd6df03536e2535563547564f97d47962816c584496adf13c47a39,2024-05-14T19:17:55.627000 CVE-2024-32733,0,0,cc2a83bf0b8d4e35cad819b5164d2b12cff00a586034fce34f072bdde6c85904,2024-05-14T19:17:55.627000 -CVE-2024-32735,0,0,4d0c9bfae38d72aeaf3eb2001474a54511f31ebc5302a4dadf43cc9d688ad128,2024-05-14T16:12:23.490000 +CVE-2024-32735,0,1,e15013a4e1a1f236c00a02b54c507f0ad852ae7952baaf46cb9cf5ab1260e99c,2024-07-03T01:56:59.647000 CVE-2024-32736,0,0,cc45b8c536288bb419de510340043b175e9acce96eb6d8446b58dafc25521b16,2024-05-14T16:12:23.490000 -CVE-2024-32737,0,0,05ff7280dc95b1f65d035c96a9405d72ed4713cd18ff546d33bffb3e4510a5d2,2024-05-14T16:12:23.490000 -CVE-2024-32738,0,0,bf01bd24de5b2bd4e1004b1c01d91b079bda8e15122b590826e1dcbbe224f04f,2024-05-14T16:12:23.490000 +CVE-2024-32737,0,1,cc883261dec3b83056ae60b1f3577975fafcbf9d68670556121e5122f6835fd3,2024-07-03T01:57:00.443000 +CVE-2024-32738,0,1,138d4a8ecb34682775dcea8f08e2e397d2ef2ee4373827128e457b38863861ed,2024-07-03T01:57:01.140000 CVE-2024-32739,0,0,00435f6608b30774352c5f378daf7d49e6235866350cae43aa4828bf124dead9,2024-05-14T16:12:23.490000 CVE-2024-3274,0,0,a2a8e7f0f8e7484faf8b0e9e6a2f428c50556aee17382f1003689463a42b45e4,2024-05-17T02:39:49.730000 CVE-2024-32740,0,0,341b24ae4b2bd0c9b4f3e3f9c2dfbb4e62b858de6f7e60010ce1f6ce67831bcf,2024-05-14T19:17:55.627000 CVE-2024-32741,0,0,05aea67e1c9a4731a1dc63887ff99e8572d63476d341fa7d4df08a62194a9577,2024-05-14T19:17:55.627000 CVE-2024-32742,0,0,511184436ab91afdadb5c62b8e2385ec92d0b0eacae73dfb4ca7f040a395a087,2024-05-14T19:17:55.627000 -CVE-2024-32743,0,0,edf9e18b1b448dbd637bbc79623f922e816f320285afdff06dfa2f94a76ea495,2024-04-18T13:04:28.900000 -CVE-2024-32744,0,0,1b7d2f5284e3100bac5a22aa75dd41934cf75bbb03b5daf27a5bf3a3b911df68,2024-04-18T13:04:28.900000 -CVE-2024-32745,0,0,7c7ddc449e8c742cc889f2211c73cf5b3fd566001a852588319e29620ec0008a,2024-04-18T13:04:28.900000 -CVE-2024-32746,0,0,15529f833c25b7b5b5022877593c49d5afec10018bbf65b56334a694e0bc455a,2024-04-18T13:04:28.900000 +CVE-2024-32743,0,1,7c7210717c145485b678548046e778a12d5b3e295d21899e2622876b6305e329,2024-07-03T01:57:02.120000 +CVE-2024-32744,0,1,730c62a9782f1ec14b532d218d1a82cf52126d4486a56deb0c6a760f69acf0d4,2024-07-03T01:57:02.937000 +CVE-2024-32745,0,1,d87072ecdb1e4f8a0773ba4e4f91279addf64348f8d708e8345ba181860605bf,2024-07-03T01:57:03.693000 +CVE-2024-32746,0,1,bf3d346f8591a3b2bf316b9b8132a2dfea1babc4dfa2642c153510eaf27fbfda,2024-07-03T01:57:04.453000 CVE-2024-3275,0,0,911ea91aef7f88befc82f4227a09867c3c1d7c5e1f1eaf9e7dcf15d1eb26a443,2024-05-02T18:00:37.360000 -CVE-2024-32752,0,0,397ccf54ed3571b7d395be8ff9092e3859eac6f23898bbdd1a86af941d776e4c,2024-06-07T14:56:05.647000 +CVE-2024-32752,0,1,6d13d08f37a2ca402822db1d06cec7dff10a8c26a5cf1f44d193d0e9a10e4087,2024-07-03T01:57:05.223000 CVE-2024-32755,0,0,b3528b194ab6699a4c0497b49f6b23d52c2b5f75510289aa8a21b02eac9ad3f2,2024-07-02T17:44:45.700000 CVE-2024-32756,0,0,7fa05cf39c6d3a5e903ec1a0f9f35b8a778ea0981647bd11b5e6e512e0af0b8a,2024-07-02T17:44:45.700000 CVE-2024-32757,0,0,324c62945352fac9f5590a80aa452fac7e1848c97df1fe1af0c1554b075a0f46,2024-07-02T17:44:45.700000 @@ -250801,9 +250801,9 @@ CVE-2024-32833,0,0,75a734274df361ea9a3f6b3015d66d3525b2c570f6f2524ded71781e2b6ac CVE-2024-32834,0,0,d2ed9ea40163afd5f111e44be27b5edfb4cb8a8dd0234c49fdc13943a21fbf2d,2024-04-24T13:39:42.883000 CVE-2024-32835,0,0,a55a936ce932c192bddb52ecc7ef5c50500f7aaee0689f590c1aa942fe932618,2024-04-24T13:39:42.883000 CVE-2024-32836,0,0,b79abde0b1fb00c320171e12e4361e475bc7a0910a68d24b478ff673cfed4676,2024-04-24T13:39:42.883000 -CVE-2024-32849,0,0,911a7e29746f175fb19c3c12d66bd3772f826858bf332bb5f36bdbd074fef2ea,2024-06-11T13:54:12.057000 +CVE-2024-32849,0,1,2dff3f0f8458f9bc03b8b89ff3ed496d4d9a414f0ec65647eae66f330eefae8c,2024-07-03T01:57:09.160000 CVE-2024-3285,0,0,ea17e16acaa3172cbcc052cf9bfb1b3e7ee2b004434b062b8e67c1c1ed8bff14,2024-04-11T12:47:44.137000 -CVE-2024-32850,0,0,e2d3ad4052fd34b4d59fd5011cddd317b3140c292d5e36efda816fa3450f0d6b,2024-05-31T13:01:46.727000 +CVE-2024-32850,0,1,4f078b72cb56eb731f7f52f47246fffeecf7a87d9cac03b2c1a5c91db75a028f,2024-07-03T01:57:09.843000 CVE-2024-32852,0,0,4f7510548ec964120ea01daa336363dba0106d72a02a92a026b00c9470af1a61,2024-07-02T12:09:16.907000 CVE-2024-32853,0,0,e8b03127c8846180090647525a5bc316a0e614792135ee9d381884b0abb9ff9a,2024-07-02T12:09:16.907000 CVE-2024-32854,0,0,d9b241b0c3b0ebfe2b6b5414fa128df6b4b1d0193c19bf12b0f5e3408d8fa6b7,2024-07-02T12:09:16.907000 @@ -250838,12 +250838,12 @@ CVE-2024-32887,0,0,9a0b5c279911d37e81f985d5cbe7f0510b3ecf67815d6d232314f8cb4e8f9 CVE-2024-32888,0,0,7a68ca18ce854868222b80336c9ae247321c1bc54ae858519ceac6d797dd7bd4,2024-05-15T16:40:19.330000 CVE-2024-3289,0,0,0a89519093f9cc15ad64192809f4f71759d5d5d9d17d2eddf005a9c4c6b81228,2024-05-17T18:35:35.070000 CVE-2024-32890,0,0,80b53d257dbc47827b967a6ec22fc70e9bb39dae5de4579c97bb47ad58884e95,2024-05-01T13:01:51.263000 -CVE-2024-32891,0,0,0f6acf9376a88a2e1481ea8c33ec8aea444aca936317e9b5fa7d9355af8c1c4e,2024-06-17T12:43:31.090000 +CVE-2024-32891,0,1,8a0f5363d9fa6b1b1d084c97d802fb52ab823370d67e6fcfdd19d9b8bf57ceb5,2024-07-03T01:57:12.270000 CVE-2024-32892,0,0,d09cf621a5198640d1590bf812307f6494b4f7236754c48113551ae4952a9d05,2024-06-17T12:43:31.090000 -CVE-2024-32893,0,0,9c21bb6d2ffe89e158cd247ff9d504973076b89b89f9dd17bad4d3b8dd5fe677,2024-06-17T12:43:31.090000 +CVE-2024-32893,0,1,0c1878ef4b8a7d4b4acf328abd68508f07e7b92789dcfcb4c893201f835ef8ad,2024-07-03T01:57:13.633000 CVE-2024-32894,0,0,1fee7d149001a152aa78b170399fbb77214c62b2843c8bc991616757309d5d12,2024-06-17T12:43:31.090000 CVE-2024-32895,0,0,b4ce8cb14651a8c1d5b038c6fb5f1773e85a16a57281c02d55aadc2187df8505,2024-06-17T12:43:31.090000 -CVE-2024-32896,0,0,b89b346449a4fdce96745f1a12e987bdeb5999dce997ec08bd51f2f582ce7f13,2024-06-14T17:58:30.333000 +CVE-2024-32896,0,1,488630bc5a56abb942dcf67bee02da446a8ee3fdd397356e05994c519aa70266,2024-07-03T01:57:14.863000 CVE-2024-32897,0,0,4fc5f5a460c93bb0780e03b36b9c9aaf78b9c8c9778a57de9d64a615622f29cc,2024-06-17T12:43:31.090000 CVE-2024-32898,0,0,dbe7241acfd745ff54bd5f0779b9ba062f0846b5eaffdbdf1772f5da50654c30,2024-06-17T12:43:31.090000 CVE-2024-32899,0,0,1fa76a3766c2befa12f68cc07845b1b461a678de0b835ce3e5011f07f790b2d8,2024-06-17T12:43:31.090000 @@ -250855,9 +250855,9 @@ CVE-2024-32903,0,0,93e670072f9d2b482a8f504a8514776c0f289ba8f85365c76415e3b1dc44a CVE-2024-32904,0,0,2035ed8e2e2a565c2d9db5032953ccaf4fad84f0fd671940fde1df0af13b4700,2024-06-17T12:43:31.090000 CVE-2024-32905,0,0,d670a9241a3bdf998e13f75e7120c696612525b30b4d025868886f8cc8b392db,2024-06-17T12:43:31.090000 CVE-2024-32906,0,0,907618472b4cb1ef279d4db4d523e0aa39ecda75eb634d2958bf785214529a58,2024-06-17T12:43:31.090000 -CVE-2024-32907,0,0,707ed1e0020ae91782af134809a994ec0f2f5aca9e9867d3bf466062218d0ec6,2024-06-17T12:43:31.090000 +CVE-2024-32907,0,1,ecf352ba7f122d5e499c50e4fb6a50b8f36f0142b4f18285166dda88585a4524,2024-07-03T01:57:15.760000 CVE-2024-32908,0,0,5e17516d74c81a571eb46e1e40f4e2ff9d7648d3b36532375875a466d92fd5b0,2024-06-17T12:43:31.090000 -CVE-2024-32909,0,0,aefeaa1675c09ba92d4c4a1d0225e08f778a1c32be8c50b1581cfd067908817a,2024-06-17T12:43:31.090000 +CVE-2024-32909,0,1,0271a6d7e80d0421d9b45d3c4e1d1b7f725eb29d18c395ad0687c7cee94a0f6f,2024-07-03T01:57:16.980000 CVE-2024-3291,0,0,d6a19598f7e10a631d5bbcd1a2f750e23f4c80cd3459568e72df6ee3f204db32,2024-05-17T18:35:35.070000 CVE-2024-32910,0,0,29cf6a0531855d50f315c3452df6e0eb31144ad7ac2ecf6b02a60ca456807cc8,2024-06-17T12:43:31.090000 CVE-2024-32911,0,0,e16102a4588453c66372cc339d8de78a8fe0bf75217d40b17bff15240917476b,2024-06-17T12:43:31.090000 @@ -250875,11 +250875,11 @@ CVE-2024-32921,0,0,819fa51385dda6f57050549e5933ba542115a94b0dc3e17493024eca85a5e CVE-2024-32922,0,0,41db22d6fea33c8fd8ad0051c1da0548eb69e5924cdd58d207fc96403406932c,2024-06-17T12:43:31.090000 CVE-2024-32923,0,0,7da771222663fa9369c7c70a1e789566f06bfef49a3a6822549a50142705a8b5,2024-06-17T12:43:31.090000 CVE-2024-32924,0,0,f4db2516035c9dfd72407d357f3c5c6a6730eefa228405fca5b8da9022108d2a,2024-06-17T12:43:31.090000 -CVE-2024-32925,0,0,e5e5aaae5a801405703ae4492f396cd0fece43bdfa3f29509ed3fd901236b168,2024-06-17T12:43:31.090000 -CVE-2024-32926,0,0,4d59d95e67f06dae310ae8a2d40220ef0668f77838338af7211426ab3456faca,2024-06-17T12:43:31.090000 -CVE-2024-32929,0,0,fca85852b4f9b4be325600280f8ac834cdec05282edbd84dc56f53976dad74ad,2024-06-17T12:43:31.090000 +CVE-2024-32925,0,1,952975d13abb7eac228747d03392395178a367274ac09eb4f5daa7e782f272a8,2024-07-03T01:57:18.617000 +CVE-2024-32926,0,1,9ef7e8771a6566bb36cb9f88d81a05eda20461f6e380085d4cd6c336f418a7f8,2024-07-03T01:57:19.363000 +CVE-2024-32929,0,1,17d10f21930634adcf648f3a1af5dffaf801c17e6eb1045912f45ef7311ec215,2024-07-03T01:57:19.547000 CVE-2024-3293,0,0,3552485a27a6b6c8b2cadd17fbdb3e630238722099a3e2d8d97b0f239cd2dc1a,2024-04-23T12:52:26.253000 -CVE-2024-32930,0,0,227270845521cff2d941eab53c1796fbaed28c3c5549cca0d58682d82af5d494,2024-06-17T12:43:31.090000 +CVE-2024-32930,0,1,fb1d198b0a6f1c4a99609fcd492e188ff0ceff2fe76051eb0cb8c91155418b98,2024-07-03T01:57:20.283000 CVE-2024-32932,0,0,379c0ae6cc2f94f410885ca7cc028fe0bf4b04f9e7e3efc2f3c97b4b40e1ac9c,2024-07-02T17:44:45.700000 CVE-2024-32936,0,0,a98023d22d8fe34ca67d2e41b0f1a0096283ac909ae52ca8a63dcd8b920ad836,2024-06-24T19:26:47.037000 CVE-2024-32943,0,0,681ae4b7d296514b2b529abffaf20ed5b5c5e8eb8fff0f6f2bae62e656ffc6eb,2024-06-21T11:22:01.687000 @@ -250923,7 +250923,7 @@ CVE-2024-32983,0,0,ce81205444cb1663f019c108840b9121773b51fa4288ee35e7c4848583e9a CVE-2024-32984,0,0,c1781ab02b497f7ad9edbf8a8951c53661ebdb78ecb66c7cf14dd96168971cad,2024-05-01T13:01:51.263000 CVE-2024-32985,0,0,551603a9d573917dc6e8180e1c86e20de47d20027e99828156dce46dac42a764,2024-05-14T16:12:23.490000 CVE-2024-32986,0,0,e1deb5dce0a20a0acf4a8da9213d1a6d597cdffb3cc6f869414020bdcaf43631,2024-05-03T12:48:41.067000 -CVE-2024-32988,0,0,bc48c608e9b42d070b551acc6687d58b1535377e62e996f0e4be09d902452e5d,2024-05-22T12:46:53.887000 +CVE-2024-32988,0,1,b75452c4939042145070e3930ee08a16366c08052457addaa745b6ead2778cf4,2024-07-03T01:57:22.273000 CVE-2024-32989,0,0,87c157b1e3d25527b7d1928b44314ff5515bc68d28ca4b835a710f703915d021,2024-06-14T08:15:40.147000 CVE-2024-3299,0,0,f60f2a80accdd6f345a6a9cd66637eda180121596f90c2e7d75707c9fce20eb6,2024-04-04T16:33:06.610000 CVE-2024-32990,0,0,f517fd83eeb745717387dc59840882f5435aeb995e5118d634e1729423fc341a,2024-06-14T08:15:40.410000 @@ -250939,9 +250939,9 @@ CVE-2024-3300,0,0,1a6109c8bd1508593cc8e2af285bc52264cb760861dae976ffae5c6edde381 CVE-2024-33000,0,0,f7c3878da3443e0af1f9be9089c259d82c336c00736d57f8315ffc60cf2a4cb2,2024-05-14T19:17:55.627000 CVE-2024-33001,0,0,c8206b28a061e185d52fadd106218deb8c3387bdacb5a4bacf69846d6cf833a9,2024-06-11T13:54:12.057000 CVE-2024-33002,0,0,0a262bd708eaa5ab273c1c7f9a9a8a5a7eb11d008d67ffa1b16928e33aeb1977,2024-05-14T19:17:55.627000 -CVE-2024-33004,0,0,e215b1e86cf9a7a74a4edd2089d53fd92990757783506e6df8b869a1dbdd318e,2024-05-14T19:17:55.627000 +CVE-2024-33004,0,1,fd3947efc9f6a79b80c112947403a2b0a9c6fdaf32bf5c0bd7b38f5115845055,2024-07-03T01:57:23.963000 CVE-2024-33006,0,0,3de8db02467d1c66da918aa215665a9f6424098c0742ce05aa96a3aaae6ee0bc,2024-05-14T19:17:55.627000 -CVE-2024-33007,0,0,7f78f4e95b75ebefb0718c8fd08f4f80a1b7726bd5222c65fe310b0f10d9da43,2024-05-14T19:17:55.627000 +CVE-2024-33007,0,1,8e38d5b6d2b9eb1b80b7c4b68a0aa966535c1221f485493f9e187b5af17c2ba9,2024-07-03T01:57:24.730000 CVE-2024-33008,0,0,c2a80a1d4e2dc5e1e75aadb7e1a929543cc5d10b6b6cfa3a8e96c582e25685b9,2024-05-14T19:17:55.627000 CVE-2024-33009,0,0,61ef23a6983c4f9d6408dfe200f276a3569c841477f02644b97f8743b9ee2d3c,2024-05-14T19:17:55.627000 CVE-2024-3301,0,0,fe53419d0990b3ee7e1694e790c41b07e4bb9e0efd3bec0afd1b54f9f665e1c7,2024-05-30T18:18:58.870000 @@ -250950,45 +250950,45 @@ CVE-2024-3307,0,0,0c526989944cfe68b9f0c23887ae40bc5c8c244ab9a96a8afcbc5907f3c67c CVE-2024-33078,0,0,04c3a44dd78d418f484a3d2bb089db81f731cffb08f90923e7bba9e97d89f66b,2024-05-01T19:50:25.633000 CVE-2024-3308,0,0,e67d94750b720297a8b6a0767d0960b33a91436391d2678f53cc34abe1cbf0b9,2024-05-02T18:00:37.360000 CVE-2024-3309,0,0,19830d3497b7cd442b078cebc8c87afb76f15d3a703a2ca882ed7fec3a15ca29,2024-04-29T12:42:03.667000 -CVE-2024-33101,0,0,93708796a8758e8cc71d0a2bc9b7c34ab553305d97d79c3ec701a780a40e0393,2024-04-30T19:35:36.960000 -CVE-2024-33102,0,0,5005fb945ef6e7d8761f951dfc5dd5041789fc3f59d55a6562a24c2de5646455,2024-04-30T19:35:36.960000 +CVE-2024-33101,0,1,02c41b74667ba4c6c855c7f8be761695b1033ca3ebd54d33f4c74ffe5c076663,2024-07-03T01:57:25.600000 +CVE-2024-33102,0,1,5913737ef9c2cdea9d03e524178ff2c4a07bc37811d823721759d56c1627f7bb,2024-07-03T01:57:26.367000 CVE-2024-33103,0,0,2aa0581d6dd4e37d89165f09381d9660126d8dc423d64bc642e8162a026e26fc,2024-05-17T02:39:22.550000 CVE-2024-3311,0,0,8e227c5dee8fedbb182f76c3c2f3081e8b3e58486bff7a3c40a74c83095aecea,2024-06-04T19:20:19.213000 -CVE-2024-33110,0,0,c737328608cdd270c9224e4e7e09b69aee9498b27cf4e327b8942bd500092fdb,2024-05-06T16:00:59.253000 +CVE-2024-33110,0,1,cadaede73d3a0da5440547f9c49768ef66978382531070a9c510181ac9abc5a8,2024-07-03T01:57:27.130000 CVE-2024-33111,0,0,037421c00013b59d74bdf937f3cc04c73db028e959cbdf208e3b0e85181fc725,2024-05-06T16:00:59.253000 CVE-2024-33112,0,0,63cedc96a774558f5fee60ef80727b6b0c0200c0c0c3205562cde281741f6dfb,2024-05-06T16:00:59.253000 -CVE-2024-33113,0,0,7277311ff99eecd6cbab6af3615d5261021e6e31791ab66e0d8cbc483cf104e2,2024-05-06T16:00:59.253000 +CVE-2024-33113,0,1,52de5588a6b1c2d4dca0e59f9ff40c57f764cd0549cbca52bafec015292d66c1,2024-07-03T01:57:27.973000 CVE-2024-33117,0,0,1141f5bd55b81d658c6e3c7994ad48fc5e0cf3dec4b9ba799562c98fbb5ae9de,2024-05-07T13:39:32.710000 CVE-2024-33118,0,0,ac34c28b0f9855a32e215f883b1aed7f164e30a3dc6b5ffd7f9c6f2ff28b9096,2024-05-07T13:39:32.710000 CVE-2024-3312,0,0,600190b8b1b98d908237811e0b165781ecf00c4b37f62f7ea411c1ef102136dd,2024-05-02T18:00:37.360000 -CVE-2024-33120,0,0,b15760f2bebdedfc42eb97ec9f62224e5c0293243fe8fe7be64396d6b78b3ffb,2024-05-07T20:07:58.737000 -CVE-2024-33121,0,0,a062e45141ba707414d4b0cabfd8c30afec0fd96441288a3da042ff169c24117,2024-05-07T13:39:32.710000 +CVE-2024-33120,0,1,75be799cb77913de5b744b592fc9f1d7bb2b4160e45ac741918319e80f040406,2024-07-03T01:57:28.817000 +CVE-2024-33121,0,1,edf7460f7f7adab8e228b5ff796261e79f522c43247c3404f31f8d8daf19d480,2024-07-03T01:57:29.587000 CVE-2024-33122,0,0,abdf24a5fd17de5e9f5289ccf9de2b407fdedda76bf5ca5d677a89db859927cb,2024-05-07T20:07:58.737000 -CVE-2024-33124,0,0,dcfe4b5e7495322ff69ea070cacd7bc06be24ca37ddc092a6f028e461bfc7c5e,2024-05-07T20:07:58.737000 +CVE-2024-33124,0,1,61d65caffa6a7c09f37b7d9aaeb31ffc0225bf90c60a22ae5f347bc3de14de18,2024-07-03T01:57:30.343000 CVE-2024-3313,0,0,4522b87a14767eb9675e0349d3ff030871782d4eaf9b41a1ee60aa3e1df0045c,2024-05-28T17:15:11.210000 CVE-2024-33139,0,0,a1def75a2b17047adcfa376068fb2a6d954d07b07e9ff64a4e279ac289e82199,2024-05-07T20:07:58.737000 CVE-2024-3314,0,0,95488108b8350e95f44b77cc325ef6d664335b414091e3723a0267658bd66adb,2024-05-17T02:39:50.393000 -CVE-2024-33144,0,0,8818d5606e4b98835491eb286787a4844b944b3a81f9082d3cfe35e0c9a04f85,2024-05-07T20:07:58.737000 -CVE-2024-33146,0,0,a54b0507b31622c29147f08a38d8e37e3706ba1badf15476743b1e616fa85cfe,2024-05-07T20:07:58.737000 +CVE-2024-33144,0,1,7ce66848bdfdad6c7661c7606415e2d330de485bc612c3cf999a55dbe1be4b18,2024-07-03T01:57:31.107000 +CVE-2024-33146,0,1,4baefebe2977ba4ed48c0fb4dc2805a0ffd790dd812293e2b72426874933d1a5,2024-07-03T01:57:31.870000 CVE-2024-33147,0,0,4e20223d30801a7f21075f78af39ad813c51d9a42f5da19568c56dfb94f8ec03,2024-05-07T20:07:58.737000 CVE-2024-33148,0,0,e602d5a33a62d03d47a28e7218226ed04f87672199559a9cef94aa6423eff20e,2024-05-07T20:07:58.737000 -CVE-2024-33149,0,0,ee01a8a32797ed4712b3898c9bc14b189dc597f5a4b9ac10acbcdeb722b3cdaf,2024-05-07T20:07:58.737000 +CVE-2024-33149,0,1,cd385dce8cfe9dabe6c5f72763dc870308b700fe51948946fbdaf204a00dfaef,2024-07-03T01:57:32.207000 CVE-2024-3315,0,0,f6177ad3fb4dc6f17488fa13529d64aa95baefa58a281ce37432ce4819f04517,2024-05-17T02:39:50.500000 -CVE-2024-33153,0,0,368eec03cffcac6a322def9fbf2a34f9b7e925d75e3449736e7f21a40bdb4522,2024-05-07T20:07:58.737000 -CVE-2024-33155,0,0,a6383905578ff9cb924bca63608e2f1bacfe4c936bd3b61b48350572ce68e880,2024-05-07T20:07:58.737000 +CVE-2024-33153,0,1,6b3b93fcc8a90a70e11c0b83b5ca4bcf0ecea245a6ab75c78fd7d09f8a892577,2024-07-03T01:57:33.003000 +CVE-2024-33155,0,1,e4ad5d640ecdba746dd1a49f46932097b92ddfffac20cb1d78f4e9e96f3384a0,2024-07-03T01:57:33.780000 CVE-2024-3316,0,0,755eac613ac0f3f96c418809a83b0076d1cfc54ee52931715ea7b2ee1b4c0d5a,2024-05-17T02:39:50.603000 -CVE-2024-33161,0,0,b6cc3a3005b15f936f7d4991f395a586914dcfea50d8f697e1545fae78de114a,2024-05-07T20:07:58.737000 -CVE-2024-33164,0,0,7c9f8316f65927cc5165cb484c48c36ddae8d6f81ca4e12752340663c22c4803,2024-05-07T20:07:58.737000 +CVE-2024-33161,0,1,7c862270cd8db5129099f6546f3d477eb1434dd611bb5f19fdd029c5b8f8aa28,2024-07-03T01:57:34.540000 +CVE-2024-33164,0,1,c1a8c6145de610892a7bb74e83180ec7a64a9f7db7bc45d4e35a23e8ebd4b541,2024-07-03T01:57:35.293000 CVE-2024-3317,0,0,268fd6a05bc213ed8b67e37e634d7f613dcb3522b15a1901c02c843c9f2b8099,2024-05-15T16:40:19.330000 CVE-2024-3318,0,0,26cc3af453f9b7d2d0f465154a23fc1065171fdfa524c18286eac13f3ef91d5e,2024-05-15T16:40:19.330000 CVE-2024-3319,0,0,f8440f53736afee3c536c36b4daab0cb134c44bb60b9ba7ada1f7f6e23c7a93a,2024-05-15T16:40:19.330000 CVE-2024-3320,0,0,aed8dafda882cf55453efda5eeebaa2a26c051fa8c3194e6cc0707606da554b4,2024-05-17T02:39:50.797000 CVE-2024-3321,0,0,267ad1cb87ca0a9a9d65e31ea648c8356111ad555cbe6ee6d86199727e4453ee,2024-05-17T02:39:50.900000 -CVE-2024-33211,0,0,8f743320303ebbb1257b36672c4718b77fe29ecedff4f25908c15d6e523348c0,2024-04-24T13:39:42.883000 +CVE-2024-33211,0,1,46152f7fae2f0904bdc8d43eed72ce61042ffe07ea20488d0724e6d357feeeca,2024-07-03T01:57:35.503000 CVE-2024-33212,0,0,fe18dfa218c6712fea180c0e6b039507df6232ec0c173e67e9a407cc5f79ca32,2024-04-24T13:39:42.883000 -CVE-2024-33213,0,0,b148497f8be1950a6fa46d58723de7904955cc78b66d2d908246ba324bd2fa49,2024-04-24T13:39:42.883000 -CVE-2024-33214,0,0,e8bb1a89ed9a6fe57462cf7839328d6243261c99698249abe128719bc3054c5f,2024-04-24T13:39:42.883000 -CVE-2024-33215,0,0,c8be43358325b8e905d28304a9339956d17f1418e85498fcb8a7134416d3977f,2024-04-24T13:39:42.883000 +CVE-2024-33213,0,1,535ed6b61a2defaf607542370541a34cb9da6a875bd2f52f1cf422d4fb6cc3a0,2024-07-03T01:57:36.257000 +CVE-2024-33214,0,1,8e181eaf2c411bd8942ecfd3d2eed2d851824edcd9b22698bc6806bfcacc1394,2024-07-03T01:57:37.013000 +CVE-2024-33215,0,1,f9635f87bc059511c8393decbd9afdfc8c1adc67d76d6bf1ee0f441704979663,2024-07-03T01:57:37.763000 CVE-2024-33217,0,0,4e1e2d2adceccdbe12f057aebeef0a19faff919f64d3f29d52997e302777a311,2024-04-24T13:39:42.883000 CVE-2024-33218,0,0,8fb813323ddb2eccbc35a036c2c8ad5959ce48973ef0d1e129c52465ed4133a5,2024-05-22T18:59:20.240000 CVE-2024-33219,0,0,4aa16dcbbd12c78070360ec152f9d696965613ce0542d0703865df89e3db6bb9,2024-05-22T18:59:20.240000 @@ -251008,107 +251008,107 @@ CVE-2024-33250,0,0,80f5075a1ccdf0bbe31bc42b408e98f86c2ee0faa43a99a4e3de76f2fa1f2 CVE-2024-33253,0,0,9724c511857718d0a8259b3f2abfa4544637a582271dda703908f0d9d40ec502,2024-06-17T12:43:31.090000 CVE-2024-33255,0,0,4441e8c613117278c3bbaacb9c21a29fddafcd2bd1cac93b64de97baf3c9b0be,2024-04-26T15:32:22.523000 CVE-2024-33258,0,0,41d7b4e3d9e09b0d296b620041fceccfb75290061ed11a54c972d58a06b97783,2024-04-26T15:32:22.523000 -CVE-2024-33259,0,0,80423b2f2a5ed9315f035176a4b15dcc22cbb638669092343148bea0fa9d0be1,2024-04-26T15:32:22.523000 -CVE-2024-33260,0,0,5b937fe263841d925b3a65ab37bb1402c69e7b60bc9cb364c2a89278db4c368c,2024-04-26T15:32:22.523000 +CVE-2024-33259,0,1,b9cfacc7381c863d79548660b191f9ab569132aff57640e20db67cfe7e276a28,2024-07-03T01:57:38.597000 +CVE-2024-33260,0,1,55a867adfd5e0f6edfcce33a55bd36bba0efe48c958963841545b9ad37a0e4be,2024-07-03T01:57:39.373000 CVE-2024-33263,0,0,0c56e0a61edf4ecae0c69f4d4728ba00fceb4374c288eb194edb02f12c4f710c,2024-05-14T16:12:23.490000 CVE-2024-33266,0,0,186f1252f7ca5ede1a70673f69a91ca858a9fb1b315dcbdb95f70746fdb43c97,2024-04-30T13:11:16.690000 -CVE-2024-33267,0,0,7377b5f27750d3a68d81ed80f1ede75175722a8b63847b78b8bd3cebadb2ef40,2024-04-30T17:52:35.057000 +CVE-2024-33267,0,1,7eba67054759f1c32ed4311ab6657f5b98d023948e910b24b95ed0e60d9c6b1a,2024-07-03T01:57:40.120000 CVE-2024-33268,0,0,43f1c4dc5a2965d643ab1f03d8000c98dd3b547b6c66a9c084db066a52e5db99,2024-04-30T13:11:16.690000 -CVE-2024-33269,0,0,eca8a7d4bd778f044772d00ad17f2d154b56690bb062f23161a42037bcd78975,2024-04-30T13:11:16.690000 +CVE-2024-33269,0,1,ff7344a3e782883ff05ffe243216e31d8ec317b81fe485e6183631084242f561,2024-07-03T01:57:40.893000 CVE-2024-33270,0,0,8642b31dd3005e3c324c16b789bdc68df55d51617455c5db15c20bb01f967927,2024-04-30T17:52:35.057000 -CVE-2024-33271,0,0,c684fccd9eeaa046e1d5e02e3f1a55745a4ff0fd47d5c4df7560df61937b284a,2024-04-30T13:11:16.690000 +CVE-2024-33271,0,1,ff4b503681588c5b252c4b59d9973b0db308ba4cd89028bb833a97a24a35af36,2024-07-03T01:57:41.730000 CVE-2024-33272,0,0,dbceae71cdcc4b04e65e8c3305296fa23a5fef2f5e74766bf7822e0af6840812,2024-04-30T13:11:16.690000 CVE-2024-33273,0,0,585d07525cd63ab54e2649da09bd7189be4bbd92fb20c631d01ed4b6f3a3376a,2024-04-30T17:52:35.057000 CVE-2024-33274,0,0,52b15509dffdfc3176647bce12df8b0c1eced4688c94457202dc37e296aad7ac,2024-04-30T17:52:35.057000 -CVE-2024-33275,0,0,1eda93c4e69f49e029fa8a68b75765614462353e3fa7514a52b5a4933dd5cd8a,2024-04-30T17:52:35.057000 -CVE-2024-33276,0,0,28ed6a9c7414da5d9ea790353557b1f0dcffdd008d1db835bce13592b7065315,2024-04-30T13:11:16.690000 -CVE-2024-33278,0,0,cd7614810fcd4d8ccced2a34db6b02a1f7d56e1be8bbb904a77223cb1e1edfb6,2024-06-24T19:26:47.037000 -CVE-2024-33292,0,0,c910276e47a35c4068de5fc63cb178d8e90cd026be04b7f1341194869e93ffe9,2024-05-01T19:50:25.633000 -CVE-2024-33294,0,0,651017db1c522f877e9d465fe559bbedb3d80764dd343a625f15cc6fbb311c22,2024-05-06T16:00:59.253000 +CVE-2024-33275,0,1,4251729a2acffecc6a6671231470090228a04965d2bd2942e3c8151bda563e34,2024-07-03T01:57:42.480000 +CVE-2024-33276,0,1,1fe1410ec422bac109498ece274211e156abcca47b7c8479c6d7de8507635a91,2024-07-03T01:57:43.290000 +CVE-2024-33278,0,1,66b076915372ac75eed52c103d009ceb4804813177b3c017eb8a608d0a388063,2024-07-03T01:57:44.047000 +CVE-2024-33292,0,1,c3ceabb00f3a3025e64af61f5190512ed104ea5315c3e330d81a0229db92ebd4,2024-07-03T01:57:44.807000 +CVE-2024-33294,0,1,17541a6765e44ea06a20248c9ca673778968fec1e4c8bcb2e45ac885e55d6596,2024-07-03T01:57:45.580000 CVE-2024-3330,0,0,18007e53c8b3ebb37b189e3c59f6487e0b2ed0f12210630f40669648720c1214,2024-06-27T19:25:12.067000 -CVE-2024-33300,0,0,b5580633aaa4d49e85a0455e8d12132260b285a311f5fd5f3bc6154bc8326258,2024-05-01T19:50:25.633000 -CVE-2024-33302,0,0,f449a0066677426884a735d01536f5d9fc04ec7e5bd5b5623c6477aa49227b3f,2024-05-02T18:00:37.360000 -CVE-2024-33303,0,0,9e0a761ad2ef54412edb163c310aa07186d2ba0aae63f9c1478cc659e13a65c0,2024-05-02T18:00:37.360000 -CVE-2024-33304,0,0,274a53c2e590765b7d2a360a389d7f6093c47f341a39ac6c5d8d95530f3b1382,2024-05-01T19:50:25.633000 -CVE-2024-33305,0,0,441bd225b8b59bb52bb6e45ab402df0b50dc1aa209fb9ad802c0ccf8660782cc,2024-05-02T18:00:37.360000 -CVE-2024-33306,0,0,428bbc6a8b5a62ff998dea118b0c1a9bedf7e8da9bb5b3a1ca2dc047c805df5f,2024-05-02T13:27:25.103000 +CVE-2024-33300,0,1,fa87abfdcbfd1e8c97c25122ede65d7d482f76e3289e99cabd18dd015de96144,2024-07-03T01:57:46.330000 +CVE-2024-33302,0,1,16226248dff503a810cb34493ca6df179d8a427e800a21d419cc2490b51d59e7,2024-07-03T01:57:47.117000 +CVE-2024-33303,0,1,3d6207cf61eaa0c4b222d2868df52f9c415342494118f3616c907664ad0775a3,2024-07-03T01:57:47.943000 +CVE-2024-33304,0,1,c69b7491366f4c957f408f15c91213d3a30f1301fa5b95f5233347233c728d2a,2024-07-03T01:57:48.707000 +CVE-2024-33305,0,1,9456b591799e836fd99c84c1fde49824c89d04ed858b129a95eda7b4d82dbd13,2024-07-03T01:57:49.460000 +CVE-2024-33306,0,1,9a9d23042570962300a30645ba4d19f889c5273037a417c4e7c74745e1c6a309,2024-07-03T01:57:50.153000 CVE-2024-33307,0,0,685e6dd47a08dab94c9ba0e23fd24014f68fb2d510e871d193d497b88ce19585,2024-05-02T13:27:25.103000 CVE-2024-33308,0,0,c51602bb951dc504524489be700ba980c6849c038059ed7b24a552934a0ffdc4,2024-05-17T02:39:23.753000 CVE-2024-33309,0,0,0ca9c109e2576b4aca347e95c0818278979b0a538a6e9aff426b0e613a867601,2024-05-17T02:39:23.810000 CVE-2024-3331,0,0,5769fc47c1644a784687913176ff51174f40b1dc158ef3146eb07b8f4d35b9c7,2024-06-27T19:25:12.067000 CVE-2024-33326,0,0,e65d4ed2661b78b0d6d9d84492b487f78a682aca0337d12f880fe182d4410799,2024-06-27T12:47:19.847000 -CVE-2024-33327,0,0,bf6a97c43d87047b96aea11c47fe4e7fb0caab7564740b92071e6077bad26d8f,2024-06-27T12:47:19.847000 +CVE-2024-33327,0,1,7caf9ed798d7ac11933dcfb0822d82d00c04b846f50a0663f4685fb11de6e487,2024-07-03T01:57:51.030000 CVE-2024-33328,0,0,90d28a35dd07b70524349882294f927c18c1bf26a735395d4ccf2ff290476545,2024-06-27T12:47:19.847000 -CVE-2024-33329,0,0,15728f7c043f3fdc61c44f99bb1dafd4965a9dafeb62ce67fee54eb02b498b0f,2024-06-27T12:47:19.847000 +CVE-2024-33329,0,1,98705ced2c36304a5a3f8cd53265fde17aacdf584c113adf6a16213749a55d4e,2024-07-03T01:57:51.877000 CVE-2024-3333,0,0,8caee5b26018a8a7a4f06ec5d64d35dd731cf8d2f43a25885f4e67db044a1bff,2024-04-17T12:48:07.510000 CVE-2024-33331,0,0,d376453cc8c649ab7a3cb33fa711c6bde798d37e4f57b1f2e9caeddda1eec751,2024-04-28T23:15:07.120000 -CVE-2024-33332,0,0,5b09c1082da77b8d3e91442a2c29c8546356fbe25aeb87e6d3bdb2141a4c33bc,2024-05-01T13:02:20.750000 -CVE-2024-33335,0,0,79d1f0750be8b4e49b7998487b901c2fb4cbf385a332a359ab8e1dc2669fa938,2024-06-24T15:15:11.490000 +CVE-2024-33332,0,1,d4616ec3d8fa6c2d14a3b8584e4c2b0a6bdaf97d03584623852ed717f43b90a3,2024-07-03T01:57:52.560000 +CVE-2024-33335,0,1,a6cf66b4ab082555dd66294d501cc06d5dc2570dbd2ca86fdaeca4a73e9bd728,2024-07-03T01:57:53.270000 CVE-2024-33338,0,0,9b8c84dbfacc6e8a05751db225811f66c7a44395ffe03492a33884b37ad228c7,2024-04-30T13:11:16.690000 CVE-2024-33339,0,0,1af2e0249bed8750531b95be13d2086bbc874a9cb43e2918f6202dbfdd9b1a67,2024-04-29T05:15:06.340000 -CVE-2024-33342,0,0,0c57431ffa337ca72451a692e966ba73858cd4216e3ebbd13920eb933bab73c3,2024-04-26T19:59:19.793000 -CVE-2024-33343,0,0,18276ed172f2dfacdbc9f6247f17d7e69a9aa2568786fa7516ed97ab1c42186e,2024-04-26T19:59:19.793000 -CVE-2024-33344,0,0,131c6ff540d161d495b4f8a524af6fe806a4427ab4fe069e3b50a0b4b8c71920,2024-04-26T19:59:19.793000 -CVE-2024-33345,0,0,7e89e81b2d7685c6c34b1a9a15e1d945044ecd27f7013fb1d01c673b4d1ae0f7,2024-04-30T13:11:16.690000 -CVE-2024-33350,0,0,144e795866532d4010724292bbdbe74a18701be22392e8071c46c27a5004fd5c,2024-04-30T13:11:16.690000 +CVE-2024-33342,0,1,060ace50da8b3f05ba7f67da31443071368333e101cc3fb61992e65c8481798b,2024-07-03T01:57:54.047000 +CVE-2024-33343,0,1,0403ccc83281b5ef39242fa2607cb174a7fbc97f1fc5833b8133765daf81f98a,2024-07-03T01:57:54.823000 +CVE-2024-33344,0,1,d3440b7441a8ba175b025336c345037d972b6caba49539eb2fcd5ae07cc7e54c,2024-07-03T01:57:55.620000 +CVE-2024-33345,0,1,5fb5f74cbe8d9322d0f3b29fb4588f6cf198e3debc3830c92870acdd420c4824,2024-07-03T01:57:56.393000 +CVE-2024-33350,0,1,4da55935e9588517cc2dba9e7ca9c451d32fef61d990ac2b7f8d39773dafe4a2,2024-07-03T01:57:57.207000 CVE-2024-3337,0,0,0e96a0de2c5ffbe4a9f2804ffa8c1140c4bee3e6e00979a6ee0758b1212b2f3c,2024-05-02T18:00:37.360000 CVE-2024-33371,0,0,ec7a79f056a06763ccfa7dcfdf94bdae70f29613e0b1d07abafaf338bff1ecb9,2024-05-01T13:02:20.750000 CVE-2024-33373,0,0,99b7497bb078bdf83fb304129b21aa2798c901fd9ac60f4753875e9aeb70b3dc,2024-06-17T18:15:15.920000 -CVE-2024-33374,0,0,f31f8e198d692129975bcaf7b94a4f3569071cac52d0ba48bf94e9c4b2d859cb,2024-06-17T18:15:16.017000 +CVE-2024-33374,0,1,243e9f210ed37aee6e82391955d78875fcc399a2a4a1c88574efbf4fc6f1f077,2024-07-03T01:57:58.047000 CVE-2024-33375,0,0,e0eba6392fdb7999a39fee885f67bacc2f50594b53677377ca106c2be6c0baba,2024-06-17T19:15:58.107000 CVE-2024-33377,0,0,678ecca4c46ab739843520542d6cffa2a387a8e6dc22686e1f86a739b43e0ba3,2024-06-17T18:15:16.107000 CVE-2024-3338,0,0,9454a656764280ba43f4b4a832049a80a0f45e8c0d37939e326776fd301ff609,2024-05-02T18:00:37.360000 CVE-2024-33382,0,0,fdefbc91dd758eee79622e13a87ace7fd97404c7ba92ae8195304a5c3b9d8c61,2024-05-09T13:05:45.620000 -CVE-2024-33383,0,0,70f21187cd92beebcc08c0b97ec4ff0e6f501ff7515be84dc12b959842f9d519,2024-05-01T13:02:20.750000 +CVE-2024-33383,0,1,a17ca065fb2e7fbe2ec9dff63547764a7d93f23fc83c9cf36fdef1a320ec24ba,2024-07-03T01:57:58.903000 CVE-2024-33386,0,0,436f4c1344591e4001ca08c7b23cbfcba1b8812956aad72563da143c23f90755,2024-05-16T09:15:13.600000 -CVE-2024-33393,0,0,018d61de30ae0147a0b58f5237f7fa8307e49a810da2f771e0e19fa79d7ec287,2024-05-01T19:50:25.633000 -CVE-2024-33394,0,0,ed10577b50a727b8e61753bfc089dbe484bddaeb7fa4df113e2419da22f628ba,2024-05-03T12:50:34.250000 -CVE-2024-33396,0,0,68a3840ed26978a94680f7555ff56bbd8b6ebcb38af1a3286b70476efdfc8f61,2024-05-03T12:50:34.250000 -CVE-2024-33398,0,0,4cdf3d1248cd43b76c839a6cfc26d3bc551030efba2d4965a209c715b6757520,2024-05-06T12:44:56.377000 +CVE-2024-33393,0,1,232ca2e885c806f4b9b9a02ff0150be30ef03824c7242fa15d1cda05a9c453d0,2024-07-03T01:57:59.677000 +CVE-2024-33394,0,1,7b222f25f909bf36b1a73106bc9440b0e4a207e0b25c09a543013f16580566cc,2024-07-03T01:58:00.483000 +CVE-2024-33396,0,1,c84805dbead4b3034624d9bfefee3aa00256e29f27f29843f126f45196ddb863,2024-07-03T01:58:01.270000 +CVE-2024-33398,0,1,96ccc0e818ac86c2609bf632a45842d69ddeccdc5c0db07415ac3f15480df390,2024-07-03T01:58:02.040000 CVE-2024-3340,0,0,bb944c005c7790c370881d2998d5d0e1d0131387022373f1f023fce27421a6d2,2024-05-02T18:00:37.360000 -CVE-2024-33401,0,0,5d04380e368d8eb619b4a4a002ca5575199de6847ec8a4e84f4d9353dbc31d29,2024-04-30T13:11:16.690000 -CVE-2024-33402,0,0,457f3b171e302239bfea0368be484183d32882a5553e0d5b893a325261d0c117,2024-05-29T13:02:09.280000 +CVE-2024-33401,0,1,f5c782efdaddc134127281dbf0507c23da03bf716b4c093fd81898611b625984,2024-07-03T01:58:02.837000 +CVE-2024-33402,0,1,fd5c0d4fea7ffcc0138dbfc3269178dd77fd48918b2a4be267a37b1c69649014,2024-07-03T01:58:03.570000 CVE-2024-33403,0,0,d9a44215029f012cefe540492828918a2b399e4cc9cdfbed53cb1eba30fabf75,2024-05-28T18:15:09.083000 -CVE-2024-33404,0,0,ca883305c7533d9f1bcb813d28533484bb9ca5a6cf87d89f2bd9aa84c74c9743,2024-05-06T19:53:38.797000 -CVE-2024-33405,0,0,6bcb2996725292b46bc3ac74029e79d0c9cf36c52face6a7229448c89d67a02e,2024-05-28T18:15:09.170000 -CVE-2024-33406,0,0,0a3952a44d92730f213a414039714ecfeb6fc9a9ed41483d85b02c57229cb944,2024-05-28T18:15:09.227000 -CVE-2024-33407,0,0,a316707034fe5bc69af3390a233a961eaf3b03c4749f483e01270d2aa4290a4b,2024-05-06T19:53:38.797000 +CVE-2024-33404,0,1,c9f51a5809fa297bb2289a78327e6d0ddc8d5e495b3e760ef4ac768d15a7f0ad,2024-07-03T01:58:04.417000 +CVE-2024-33405,0,1,7b64b483e46a97392e43f4b015cd27cd282d4799d58fb8648b12f3802fedd3a3,2024-07-03T01:58:05.170000 +CVE-2024-33406,0,1,8c679048379d6dc3620065008eeb4a0fa8183be266d695e89da0c2d5e3fa0724,2024-07-03T01:58:05.953000 +CVE-2024-33407,0,1,ed4a824fbf1e19bcadf3992da26933b694f424ff133570bc43d44a0c7b3a43a9,2024-07-03T01:58:06.720000 CVE-2024-33408,0,0,b1dc1cfa284ec119582c3e333a3c857ccf162bbb7da939d7f21e95b86f1a0e19,2024-05-28T18:15:09.290000 CVE-2024-33409,0,0,a4ec0ab79610c7a422ccb4902c34cb60c607b5619df8e2280820b42d73af29d4,2024-05-28T18:15:09.347000 CVE-2024-3341,0,0,6a7220590c46c9b457bdb714e3a172e69043834c00f974bf4469b0075cbe33fc,2024-05-02T18:00:37.360000 -CVE-2024-33410,0,0,477e888453b0eaecba14738a1fe6bdc8341a2f11f3fdb35a5a7ccacd62278820,2024-05-28T18:15:09.427000 -CVE-2024-33411,0,0,f331187643babf50dd1898ff98a6266416694f286cc63cfa23e1e06511b24261,2024-05-28T18:15:09.483000 +CVE-2024-33410,0,1,c078c0658ea8ad68f15ffc8e894b976091875813ae0f7dd53ee1a6c6de68b839,2024-07-03T01:58:07.577000 +CVE-2024-33411,0,1,d4b6b59aad1a2b98ba2b07a3f292ce85f1ef1e986776fdf66ecd25dfa92d252b,2024-07-03T01:58:08.337000 CVE-2024-3342,0,0,2c3ca8d5c3061bb507c26662d038cd059db385c42ff804757be4b5dbd68c1d0b,2024-04-29T12:42:03.667000 -CVE-2024-33423,0,0,8f1fa788450514658e193af05941c337fea69ba60eb865ed38aa69b9043ad774,2024-05-02T13:27:25.103000 -CVE-2024-33424,0,0,f9f5a67bdb9ba9357f3c3d02a83c0c0f74287739a2e767e9629394effd459f52,2024-05-01T19:50:25.633000 +CVE-2024-33423,0,1,e30348028d65f1fa1b248a99417a0ba7b421367d631f6e80dc15c0ee0de5ee97,2024-07-03T01:58:09.100000 +CVE-2024-33424,0,1,660eebb0cde04d2bbec7f7bf4f9dc3045482b99c3b20b3a7ca5ede89aafcdc57,2024-07-03T01:58:09.857000 CVE-2024-33427,0,0,9476c5f9c8988b26166fe9f7a357839b1651ce10bb12a768ec8d4e52b65e45a2,2024-05-26T22:15:08.427000 CVE-2024-33428,0,0,405c7d4470f1c4c6a9da4790ad16769be5bbee6bc7cbd31bcf2800f3281bb40b,2024-05-01T19:50:25.633000 -CVE-2024-33429,0,0,a8c998123b524ea49b295a5500fc8c6d4ba14ca4f9af69ccfbc5cd4926bf1c96,2024-05-01T19:50:25.633000 +CVE-2024-33429,0,1,6250a357badd662aab990ce6b0b26247ba646ef32396387c4f5d15eb6a9b3303,2024-07-03T01:58:10.623000 CVE-2024-3343,0,0,c7ada54a8973c3f80fc415b1484b0c0d7aeb75e458012c05cd3c69dcc6f0e33f,2024-04-11T12:47:44.137000 -CVE-2024-33430,0,0,1bdac97a272b556d66774c83b6b8c517f39c5a8905e843160e381ea022d71681,2024-05-01T19:50:25.633000 -CVE-2024-33431,0,0,5986fe6c65cec4f439551162bddebc0d25402085e567befaeb51ade3480d9475,2024-05-01T19:50:25.633000 +CVE-2024-33430,0,1,993b3294050392fefcb9816964b718ba74e359b0ac7b5293f058fa179eaf350f,2024-07-03T01:58:11.383000 +CVE-2024-33431,0,1,a7c1a6301976b2d2e09da72a5c3e2e07719bfa5d761e3b3a064294c09c4ed2c9,2024-07-03T01:58:12.147000 CVE-2024-33433,0,0,198801a1e08f2deb1df11d88887470b8cf98a081b3a3c1a0457a553261569a24,2024-05-14T16:12:23.490000 -CVE-2024-33434,0,0,4ca21f536535ce30c441f8a143eea90cbf3a5921a0f0fa0ec4dfb8bae76be851,2024-05-07T20:07:58.737000 -CVE-2024-33435,0,0,3e0c971a04385b3ffb3c64bb77cb05b33804069513b05364eced055a4dc4fd72,2024-04-30T13:11:16.690000 +CVE-2024-33434,0,1,d3d9dd7556d381ed0616d5fd402213526363d7fa50ea2db29323c7c72d416248,2024-07-03T01:58:12.927000 +CVE-2024-33435,0,1,7db2665c6496dae0749e042f8d814063672abd8fcceac696d209fd93a501e9a4,2024-07-03T01:58:13.733000 CVE-2024-33436,0,0,701c454e4625ea3667a2a4c57b2b8813ef0906b2788ee031a4fb999b217c8733,2024-05-01T13:02:20.750000 CVE-2024-33437,0,0,1ec2ac47d7b1ab44be8b75609a46c1e8607276ea4a6f55841f41e488acd680a8,2024-05-01T13:02:20.750000 CVE-2024-33438,0,0,c2642f5df14f0f416201641b4a2e125cc0d2de857c51a031f5833f4693326023,2024-04-30T13:11:16.690000 CVE-2024-3344,0,0,9f0d30bf7471aa86a4cb4a703805df84e7338e4a65408c3f6ac2fd777c6250e1,2024-04-11T12:47:44.137000 -CVE-2024-33442,0,0,8147d4001197bd499583ae22c3efacc523ca5784e031cf8261e5fc5926495c18,2024-05-01T19:50:25.633000 -CVE-2024-33443,0,0,7f62cc637ddbcb31d4d27451ebd5ff31e1289fc0b12403902ee9379da64c7192,2024-04-30T13:11:16.690000 -CVE-2024-33444,0,0,dd8f738307cf7a98c771473a6747e7b5352188764c18ccbccd77e23af1117ede,2024-04-30T13:11:16.690000 -CVE-2024-33445,0,0,2adc5b1320c62f7d749fc302bf856c4946bcb2b6ed78c5da9933008a1fbfc075,2024-04-30T13:11:16.690000 +CVE-2024-33442,0,1,3bf0c7079aa4cdea0cf4fc3dc62abf7d3d6d92d11b677d6553e5342d569d6775,2024-07-03T01:58:14.593000 +CVE-2024-33443,0,1,35242e2b0082b15f0bb5de03b6dc07c30701907ec01624317337d782f850f813,2024-07-03T01:58:15.370000 +CVE-2024-33444,0,1,3ef8405d0701f5475dc75b10aec72e2f6b5a70303f405f10387e1aa41ce1da12,2024-07-03T01:58:15.583000 +CVE-2024-33445,0,1,6e7e4efc8ec4c00f5a4d8586fbcb92cabc92474cc1d9f3d59cf859cedc450f3b,2024-07-03T01:58:16.350000 CVE-2024-33449,0,0,82c0fe8439f268eedf63ed1da3eb3fb2ad29e68126122a5274369bbec0c38b68,2024-04-30T13:11:16.690000 CVE-2024-3345,0,0,014ffeb3c34b5125ba42dbaa2e64d2efabf27a52f406bfdb3d89eb78c163151f,2024-05-21T12:37:59.687000 CVE-2024-33450,0,0,b7d22d3ad1d31fe9b10e6d79608301db099b202296baa0ae2c3b81d6d1f79cfa,2024-05-29T13:02:09.280000 -CVE-2024-33454,0,0,af2458e2a92892beb63c1bf2d95ff7e9398d77f429fab02bbeabef831c2c6674,2024-05-14T16:12:23.490000 +CVE-2024-33454,0,1,74b0a1930570ffdd0fe139f1c45084400e123a1a6e46097c3427b727b87e14aa,2024-07-03T01:58:17.097000 CVE-2024-3346,0,0,884c16501a7a7f21b20c07cf3efdf5b4258ff945bba7c98f4920e8657cd7fe63,2024-06-04T19:20:19.553000 CVE-2024-33465,0,0,eadb6536921f299769dd28ca056127bee4ec0a5d9a79c4314362582bea14e967,2024-04-30T17:52:35.057000 CVE-2024-3347,0,0,dbd420f749e303adb57c18e6222d5e8f3e19b569039f37e1aa8e9e50efcf6fe9,2024-05-17T02:39:51.303000 CVE-2024-33470,0,0,49ee4c0d6360d68dd959668b81ea5e54f8cdcccd6cfce64e557ef9eaa0b46eb9,2024-05-24T18:09:20.027000 CVE-2024-33471,0,0,1e9306947f4d7124e4b6326ed79300bcb1af9bfa3f92267f388304603d70db4d,2024-05-28T12:39:42.673000 CVE-2024-3348,0,0,d67c078d7a8cc99abc9c1173eada8bc90e02ff0043f602641d85cbd7d5ed4572,2024-05-17T02:39:51.403000 -CVE-2024-33485,0,0,e86af5bb9fc8662e568301657d7f159de2c65f76217eb37d96a9d01bc5f94415,2024-05-14T19:17:55.627000 +CVE-2024-33485,0,1,545a3ddb2c081ca34ecb0c2a68c90fa3f095f3607dce687f15a518e34a732453,2024-07-03T01:58:17.873000 CVE-2024-33489,0,0,c5e9a158fd0f5dbe9fd624dac45162861bc4de2e877dfdbae462d2ef7d2738bb,2024-05-14T19:17:55.627000 CVE-2024-3349,0,0,9e77b3b7669a491e59b05b9ff3ff10ed5134887ec699846000601b364d0e0d87,2024-05-17T02:39:51.497000 CVE-2024-33490,0,0,14c7b872b5cf64f86ced5639dd06e3ee36db7ff983335042a00dbd2eba834e00,2024-05-14T19:17:55.627000 @@ -251124,24 +251124,24 @@ CVE-2024-33499,0,0,8cb0843c38b353e79b24fe74f6b05c8071b02f4b63b3bcb8893f4033cc9c6 CVE-2024-3350,0,0,2b8baf70bc71563420116bceae3da55f775969025d5793968d110aec63c6ad2b,2024-05-17T02:39:51.583000 CVE-2024-33500,0,0,c6295613b84990917f1a57c080fe27562d29b01b0e6d3200ab007d211e070981,2024-06-11T13:54:12.057000 CVE-2024-3351,0,0,9ad5e91d8f23e74b177e32892aec306da9ca113a4552ee690c2a76c864ee2562,2024-05-17T02:39:51.683000 -CVE-2024-33511,0,0,aa8e7496c2ea8f690a3806317c8ad9795f74f0370061b79b6d1346235736a158,2024-05-01T19:50:25.633000 -CVE-2024-33512,0,0,9f42b5e159d100405a3e9a02dc67dd0b3d0f8cdedf30119fca124f192d48c5cb,2024-05-01T19:50:25.633000 -CVE-2024-33513,0,0,716ce4a90e1f2414734b793c05537bcb45bf383bd8e83463402adb728796fb2f,2024-05-01T19:50:25.633000 -CVE-2024-33514,0,0,9f5894bd472fe181950170ddad13b6c24870b533c51fa58e7fd2b0642a0a4dd8,2024-05-01T19:50:25.633000 -CVE-2024-33515,0,0,79b0f1e7c42c75e77e81deb7db27c09e0dca9c1c35222338546ee40785b0c55a,2024-05-01T19:50:25.633000 -CVE-2024-33516,0,0,2f80bb7119fc6140dc28849b6adf259414fbec8e898c865ecfaf53d4597a0393,2024-05-01T19:50:25.633000 +CVE-2024-33511,0,1,fc70fe6b0a596d6a09769f1b8403860f36c39e5f9d265f34a0625ad60ef9eda2,2024-07-03T01:58:19.517000 +CVE-2024-33512,0,1,ed3fd30b2c7f54d5b77a7a17b80f11ae07a7c55c7ea654de4b6fe924d93e8a85,2024-07-03T01:58:20.207000 +CVE-2024-33513,0,1,9c20c2a1df7f9aef87f42ca5b5e1f373a326fbb0cd04a029a0444d0d17ed883a,2024-07-03T01:58:20.920000 +CVE-2024-33514,0,1,4aab893018a6a2404daaafa33312b00ab60231c8a7baeb1e63689eb6f4e7dcd6,2024-07-03T01:58:21.100000 +CVE-2024-33515,0,1,0a29698b566d1ce96badc6c9dd3f9a2648c522eb6b37724b52074d909a3a4bed,2024-07-03T01:58:21.780000 +CVE-2024-33516,0,1,2a125f75033a85309256af5b7bcbd9cab289bd0eb807ee2035c6ab7d5101ea26,2024-07-03T01:58:22.457000 CVE-2024-33517,0,0,4499de4ebe1f423e3234cee0e8f8c16d3a4ed4c1336ceb4afb74bc930260196d,2024-05-01T19:50:25.633000 -CVE-2024-33518,0,0,a108170f2e1680b2f8dbc295b01f7ca4d562d69a81654ec6ce930349bde31438,2024-05-01T19:50:25.633000 +CVE-2024-33518,0,1,84ccf326440e53cdc178e6fa27177ba3577a132315b02d47fe46572cfd6ace26,2024-07-03T01:58:23.150000 CVE-2024-3352,0,0,8d8116cce81ffc02b3d2f59517baad98542659fb6068576e268a365bf929b959,2024-05-17T02:39:51.777000 CVE-2024-33522,0,0,698c28a35bc69cffbbdcc528451b780b5020339e6e061f4789570701ef9577a2,2024-04-30T13:11:16.690000 -CVE-2024-33525,0,0,b6d079a03697f91dcdb6de513c15709a33ae65e4b13b01969f901eb91157f34e,2024-05-23T17:15:28.933000 +CVE-2024-33525,0,1,2e71eaad279c374a12f668d097a9cb7bb1826ead20d625216f803275f1d12777,2024-07-03T01:58:23.960000 CVE-2024-33526,0,0,1bf86d2025468f58f3259fa37536f4b45c8320ff99e9665e583ba93873ee7943,2024-05-23T17:15:29.020000 CVE-2024-33527,0,0,3aa4268b04e818d68b9981964d63adc6e021a5caa6806fc76a3e6e04e4e0d782,2024-05-23T17:15:29.103000 CVE-2024-33528,0,0,c64e3b1ff77d3562f26644714e92a8b6968829150e1cbafbe65986600efc0f6e,2024-05-23T17:15:29.213000 -CVE-2024-33529,0,0,1fbb4de274d5f20f9e85daa4abc72f288ff6653bbae56bc9839381acf6b5a67b,2024-05-23T17:15:29.293000 +CVE-2024-33529,0,1,91064aa32d9fedf772ab62f032798d695b5cf92350be4cf38e5a4910e6c665d5,2024-07-03T01:58:24.870000 CVE-2024-3353,0,0,2ddbc6535b793a0147a58343572c1b0e378c4cc25bcc9f8dccfa91f1a8c7260c,2024-05-17T02:39:51.867000 -CVE-2024-33530,0,0,751595441bab8b069ccfb432ce06432dd472d8d3dc9bf6ea51c901f83966c0c7,2024-05-02T18:00:37.360000 -CVE-2024-33531,0,0,71e7e7c369e07333ae7410b9238493e0b8e5a70255296aafd8bfae114b6e76d5,2024-04-24T13:39:42.883000 +CVE-2024-33530,0,1,06dbd90020910883fd649aabf3091f4012b6024bee39b35744993f4679188732,2024-07-03T01:58:25.043000 +CVE-2024-33531,0,1,b4f686a17b522487db106a979e75b685d2e11fa9abe95f79b3890bf766d3a008,2024-07-03T01:58:25.220000 CVE-2024-33537,0,0,2b759091e7063e22ebdb3d00e9c9cbe29f7897d413878e4f374a7f6892b2ba35,2024-04-29T12:42:03.667000 CVE-2024-33538,0,0,e7d86585abc433df63c34994a7b1a015734175492b100326db14778bb8d1f54e,2024-04-29T12:42:03.667000 CVE-2024-33539,0,0,87f154978a987e28cf100a131c9fad421daff9a6f4f5e6dbc40640de68db94cd,2024-04-29T12:42:03.667000 @@ -251208,8 +251208,8 @@ CVE-2024-33598,0,0,951d122bd41cb7218bd6ac7f6b225f4876d714fab2f67658757b81f4282e1 CVE-2024-33599,0,0,a5496f68bd03ec173dacb08f8bad400d5f78972808b33c7e0d2c6de710406c46,2024-06-30T15:15:09.713000 CVE-2024-3360,0,0,39157a34f099f0f6a23141aebb926dd32cd3bc7b4661c6e276ef587b3ffe440a,2024-06-04T19:20:19.660000 CVE-2024-33600,0,0,7cbd68d15c56d14c56708ef6915a64c9604d14691a940047f092aa8f253db52c,2024-06-30T15:15:09.827000 -CVE-2024-33601,0,0,26dfdce36101678871ff881ae547815721d5569be064f119220cc0762ad8db58,2024-06-30T15:15:09.900000 -CVE-2024-33602,0,0,90a6a41614ffb6b5cef21b72758dd406ac5b968c9552468c531cc2940c64e532,2024-06-30T15:15:09.973000 +CVE-2024-33601,0,1,ecd1144638f59655ea1ed59691bee8e7c1b397008cc72896f03377fba5109d21,2024-07-03T01:58:29.503000 +CVE-2024-33602,0,1,6cc16045ef5670839b402ad7345d2ed363889d512c0c1b43a378c069318e373c,2024-07-03T01:58:29.700000 CVE-2024-33604,0,0,3ab2c002c5d377b142c243de99829b91e6a82788bf0b2eb8f577e38ce442a06e,2024-05-08T17:05:24.083000 CVE-2024-33606,0,0,ebf9d8749ac3537ee5359461da4e05bc91414a0e3bcb9c11221bcf71e8ce61aa,2024-06-13T18:36:09.013000 CVE-2024-33608,0,0,75bd6a7cfea3f46ff885a646fe991c9389ed68527f615bf970851ddf524ca214,2024-05-08T17:05:24.083000 @@ -251227,7 +251227,7 @@ CVE-2024-33628,0,0,bd593525183e782eba9ed1d53c2c68cab7cced5143364e77f1a2ec527b353 CVE-2024-33629,0,0,9c289386a90a37d7a3105c6378e86670a64a304277cc6973b5fc7ab9cb833007,2024-04-29T12:42:03.667000 CVE-2024-3363,0,0,9fdb0cecdf98b246fd6b10b0b9413a6ea0e0487a81b8ecec11f5e8c4b9304459,2024-05-17T02:39:52.813000 CVE-2024-33630,0,0,7ad1e5626b9cc2115fea7ca091a964156b524174aed2afaf452662addb6899f7,2024-04-29T12:42:03.667000 -CVE-2024-33631,0,0,e346151b280a8b797c7fb48add2fe90de6c4601397d497bc865ec628bb7202dd,2024-04-29T12:42:03.667000 +CVE-2024-33631,0,1,6c3fd9d0d670586db3969fb2c1aceaaef794d4aac36932ff4b016ed610a8b9e0,2024-07-03T01:58:30.720000 CVE-2024-33632,0,0,09a1ebe0d3d46aa3fd940c75dff78c22a750303308e602db9817cd681c0e57c0,2024-04-29T12:42:03.667000 CVE-2024-33633,0,0,8bddc6e7297a79d6dd0f8f7ef19355460adb6240964b8d97c9fc24a67f5a5ffc,2024-04-29T12:42:03.667000 CVE-2024-33634,0,0,2317852d7911cdb8f927c7e1fc59f18ce357d05b95aaa8b99a2da4b010c6f118,2024-04-29T12:42:03.667000 @@ -251253,18 +251253,18 @@ CVE-2024-33651,0,0,1cefad65f2bec7e29ec0f3af20b45cba9167a66152171d6da2043875d9e6d CVE-2024-33652,0,0,f10385ddf63819e6bfc4cfd1af98d21aa48a5904778b552fb96e778ca7071131,2024-04-29T12:42:03.667000 CVE-2024-33655,0,0,2a1a57d16853f2dbeafe3a1d5d9bd7aba78e93864ecaf7bf30fb94862628a49d,2024-06-10T18:15:34.520000 CVE-2024-3366,0,0,cee4987ed8ff1f296ec0608c2f2a4293250401226181ff89b21a21c72172c537,2024-05-17T02:39:53.090000 -CVE-2024-33661,0,0,335b3962b8b35021f7d1525fb53b5e1ed72d069375d3f8ee59966d5db4f26d91,2024-04-26T12:58:17.720000 +CVE-2024-33661,0,1,1fe83f392b56cfa5102f5ff20013157b18140b66b95ef00cb93915789153e2d5,2024-07-03T01:58:33.073000 CVE-2024-33663,0,0,ec8e93da37d2d2637b8f6a349ca26f3f71e8cd5e6cb10be23a57d50df0caa826,2024-04-26T12:58:17.720000 CVE-2024-33664,0,0,ff700d0348622411a575b35a22930026c6a38bfb8414ff438507f717041fdd4a,2024-04-26T12:58:17.720000 CVE-2024-33665,0,0,c6eda2ef04663bc8651d265f2c3c62a4f9c0faef2b7b753d46b35081382cab0f,2024-05-17T02:39:27.117000 -CVE-2024-33666,0,0,4fbc347a4ccc11135052e7a189dc9d5be7cdbbc4b34cede05531a9a634cda3e3,2024-04-26T12:58:17.720000 +CVE-2024-33666,0,1,8e982c6a0c03f8b5d1cbd58e6d45d8ee40f43b5fb9ebc6cbaefdef7cc6467b9d,2024-07-03T01:58:33.837000 CVE-2024-33667,0,0,1d48df7eee913799310fcfbe30de7a5cde0336a13f3bdc5c6f50a501722e9880,2024-04-26T12:58:17.720000 -CVE-2024-33668,0,0,3c6fa8e88a4cb191f5dfbab3be46c78f1ecec9fb3f7cc96c7eacb6089eeba120,2024-04-26T12:58:17.720000 -CVE-2024-33669,0,0,3342b1241c2e74ead83abcdc0f86eb08d39cc4ce1ec181327afd112f7f2c75e5,2024-04-26T12:58:17.720000 +CVE-2024-33668,0,1,1057e9899f3d071fbe9469ff4d64f06b263f71484eb3414fb82aad54f0a342bc,2024-07-03T01:58:34.653000 +CVE-2024-33669,0,1,9f9e4923b29b77e4df7ed4bfab7ff189f9617396636ad12f3335720e7b3f148c,2024-07-03T01:58:35.420000 CVE-2024-3367,0,0,960603a26ef6b142509321d49e151f94a19b335f6f238fbeac2ae8c02d482fbe,2024-04-24T12:15:07.093000 -CVE-2024-33670,0,0,1c4b24c2dfedfae3d7e440f8f79ff98598867bd2170a3e93f140ed6fe6a04375,2024-04-26T12:58:17.720000 +CVE-2024-33670,0,1,3abc3d385958341e24c9eda52dec235106719c4d891dda10a7a17ff0ec58be16,2024-07-03T01:58:36.127000 CVE-2024-33671,0,0,09d6fe1494c08d25e3ebe0bd3df9b1f9b5ae6e2f75228545b8040649c20a8078,2024-04-26T12:58:17.720000 -CVE-2024-33672,0,0,27cb9a778a421fc0f4bd3c6e5a1838fb0d65d1e18facd09a7d97f25aeb6e82b3,2024-04-26T12:58:17.720000 +CVE-2024-33672,0,1,4f42606374298c39a17dbd38700642945b2e9bef08fd2b3fd4fad590404e973d,2024-07-03T01:58:36.807000 CVE-2024-33673,0,0,3d68e08b0d011322a43b1c482669ca841ae8a193a77f5ccbf9966098404f0c0f,2024-04-26T12:58:17.720000 CVE-2024-33677,0,0,923eddda39cd03a5bb517e05a480a9596b3c6c82a0ed2f89c09750c19ea74587,2024-04-26T12:58:17.720000 CVE-2024-33678,0,0,e29c82afa965b755a6e3188aace0a357ae40d5fe9b52b7f7177043f7792e9dd7,2024-04-26T12:58:17.720000 @@ -251291,59 +251291,59 @@ CVE-2024-33697,0,0,f1a322dee5ec8563df23e02e8d701179da9c0f74bc61aaadca8daa27bdd8a CVE-2024-3371,0,0,a0481e14f6cfcb9b0215a88c87fda086117ad0add8d553a83f1550e7381c3170,2024-04-26T15:15:49.357000 CVE-2024-3372,0,0,55bb1ec5f293fe57946b9b13f3d7b45f86f6f8820432c1f094bc02b6daa4faaf,2024-05-14T19:17:55.627000 CVE-2024-3374,0,0,688889bb860916d573f326620a51acbee74f00b2f0d7daeb9ea3d44a36bd146e,2024-05-14T19:17:55.627000 -CVE-2024-33748,0,0,65547b0068fcdb18970229295bba384cf5a27ef18d8380ea19b315c39c4251c3,2024-05-14T15:38:03.207000 +CVE-2024-33748,0,1,066f13e7dc76dff0529f136e64473f4bf178cc6b6f4c44f335cc233ab954b6f1,2024-07-03T01:58:38.810000 CVE-2024-33749,0,0,5eabad0a3484337336a9daf20c409978b4e97899a0ce60a223a003e76b4ef00f,2024-05-06T16:00:59.253000 CVE-2024-3375,0,0,855a143c26311248df944e6ebe7198b3e53ef3372f1cd77aa442c756b2c30d37,2024-04-29T12:42:03.667000 -CVE-2024-33752,0,0,a2f7fb11159811663443f8f1b5b98eb399f25a4bc08e3f52bfb9e16b106b8731,2024-05-06T16:00:59.253000 -CVE-2024-33753,0,0,f94682ba844683df9864eab99b2fd7e9dcecefb1c4d908f786d0c1fb3b2cd850,2024-05-06T12:44:56.377000 +CVE-2024-33752,0,1,1bc9f08a0011e44b90280ee1144c3d3bf7022be746c68e8063dce2331b55fc9a,2024-07-03T01:58:39.567000 +CVE-2024-33753,0,1,2fc447b40b2f762f051408e9969732ce9ebcb69b836d167fb124d965f0f02f03,2024-07-03T01:58:40.327000 CVE-2024-3376,0,0,82ac84b910b7dc2f09e1d55f24027febe1e7bd36215fa938391715d49257475b,2024-05-17T02:39:53.447000 -CVE-2024-33763,0,0,8ec9679b5af1ba89f32b32c45e05e45fc23e8e63124e1a55bc3800d24475073f,2024-05-01T13:02:20.750000 +CVE-2024-33763,0,1,a9dcdd69a9dcf4426ef125f4a4f55c3ca46d53315be497b3f8a99adcba4ad824,2024-07-03T01:58:41.113000 CVE-2024-33764,0,0,52d2c2eb4494a26cc013ede9086efdfad0e1887dedb298b992ba46d243575797,2024-06-10T18:46:38.557000 CVE-2024-33766,0,0,d1f11c4f1b2274fc2efdbb2baefea6e84d5aa930242e868d1481f540ffbe3a8f,2024-05-01T13:02:20.750000 CVE-2024-33767,0,0,6dcb3ef39402605f3b5845ece7cafb51f022eb1fdf766ffe6d574cac39dbc083,2024-05-01T13:02:20.750000 -CVE-2024-33768,0,0,0791da19a973c725c5712ab1092941eb1087a449fcb98acf7c76b570d62aa3b6,2024-05-01T13:02:20.750000 +CVE-2024-33768,0,1,b1c48e63fb04c842ea9858e17e5e39e3ff9e03db9d53c98333b940714f472142,2024-07-03T01:58:42.057000 CVE-2024-3377,0,0,8d762eb16aa3dcff8a27c53160e9e789c9ff93d63500e4f5ba3529a203799fb9,2024-05-17T02:39:53.543000 CVE-2024-33771,0,0,cfc0d9c2ac9c87b6047ec753801bb92fb60272050e10f70b6c0b1b6f7b95324e,2024-05-14T16:12:23.490000 -CVE-2024-33772,0,0,acc2fdcc8dee3304f77e628ec13326b10d723bd9cbd996f12336b810b0ae847c,2024-05-14T16:12:23.490000 +CVE-2024-33772,0,1,f0b993d69416991d779357f1c269614dbca746050b50a37f5428d607eb22cb25,2024-07-03T01:58:42.817000 CVE-2024-33773,0,0,ce807b4a5f9b87efef9508cbe9666e27df9c7ceab8a76549bffede3404d21ad6,2024-05-14T16:12:23.490000 CVE-2024-33774,0,0,6569fdec8a8dd40808e72cffa462e06be716a1cbfb9cd01e1ae4c73909a9000b,2024-05-14T16:12:23.490000 -CVE-2024-33775,0,0,ac6a91cce7dd410c87c357ff8a5fa6fd6e4ed140c42f5f7a0a578039144c916c,2024-05-02T16:15:08.243000 +CVE-2024-33775,0,1,7ea36af513c1579a89db448065ac36bc3c10f0e65b879ce7520d408ffbf766c8,2024-07-03T01:58:43.587000 CVE-2024-3378,0,0,ca2650af49c2de7462538e8f059378df3bc0abe66ece11195086b2cb821ec5db,2024-06-06T19:43:40.377000 -CVE-2024-33780,0,0,83d814dd703295dbbc8f2c645423c3defcb1b689fb2f7c001a418a42c3bbb795,2024-05-07T20:07:58.737000 -CVE-2024-33781,0,0,db9b63dee663204b3cb3c68b8f1bd20e2cc073f86c864265779ad5725b843eac,2024-05-07T20:07:58.737000 -CVE-2024-33782,0,0,01119b3eb2e287f959033dc4568db288382c5ccf031d74abc7dae804c207a50f,2024-05-07T20:07:58.737000 -CVE-2024-33783,0,0,e474490366582d8c878c3d50a3a6cc49c52f113a4a08583abb2fed814c365ef3,2024-05-07T20:07:58.737000 +CVE-2024-33780,0,1,c16faa38fa2e3cb315427d6e5330ce2610c63349f4a81ec54bc650473e873a60,2024-07-03T01:58:44.400000 +CVE-2024-33781,0,1,f92b3d1e80a012680436fd49e5bab657fd2a9b945e08254832c1c45257ab0ec0,2024-07-03T01:58:45.220000 +CVE-2024-33782,0,1,d54261586afd08a5185da8c98a333efe96e77b0a86120ba9d5a8acb87e82f8b3,2024-07-03T01:58:46.057000 +CVE-2024-33783,0,1,ab3a37415f38062c8c0433a787e71d9de7161e1a21f1c7c7424bb11f9e8ff724,2024-07-03T01:58:46.247000 CVE-2024-33786,0,0,95e7fe56c23e0e423edeb474f00c74d5ecc6d14f38a9a2816153585865c480e6,2024-05-03T14:17:53.690000 CVE-2024-33787,0,0,948faae9d117819d981385091574d66529210ae1e799083ff339db62a8add210,2024-05-03T14:17:53.690000 -CVE-2024-33788,0,0,3b190618a7cceac71807657e23b0a76937327e72238058820862f6f5a0dbb089,2024-05-06T16:00:59.253000 -CVE-2024-33789,0,0,541f5c2c69320331499e60fcae4ff8b9805c3ca02c1f93184d84ddff3f146534,2024-05-06T12:44:56.377000 -CVE-2024-33791,0,0,2786e7a8195c6ad972434c0d7a30a33f957fdd2fdd91aaac75f6ce3fbef54f05,2024-05-06T12:44:56.377000 -CVE-2024-33792,0,0,7e8694e2bb2a659e8d08c902362d29026ff1c04595111f0bccc0fd7b0663e1e1,2024-05-07T05:15:51.893000 -CVE-2024-33793,0,0,1bdbd66edb6a4ee81475ab628b3dbabe390dd8c440854dad95c22ae762967d37,2024-05-07T06:15:08.720000 +CVE-2024-33788,0,1,db496e414e9eacb69df835d7ad8cccbd3f6da6b6998f07eaab69cafc694fe336,2024-07-03T01:58:47 +CVE-2024-33789,0,1,1b705f261bdfdb3c7c0384a6685c74908e5e41969953d5575683a1d41efd63d5,2024-07-03T01:58:47.770000 +CVE-2024-33791,0,1,4a99a46cc9bc13330a58a77df6070e766b5a533f0015633cf295877892d64b94,2024-07-03T01:58:48.567000 +CVE-2024-33792,0,1,7c7c9a5cdc3e6c8c82320ec108a0ab3708c01bb96dfb27d34785495a231c6066,2024-07-03T01:58:49.357000 +CVE-2024-33793,0,1,657ddfb93c384e79c20456942320d557ebaeb8c427e62d4fba5eb78b0e45cbc0,2024-07-03T01:58:50.130000 CVE-2024-33799,0,0,d4703884563e5833cdb9648d7cc33f8705bd1497cf8e8aa164eac24bf9bafb3b,2024-05-28T17:11:47.007000 CVE-2024-3380,0,0,e3c517da057282c74d27c6e3988489004467d97a03962300cc409e3173bd2118,2024-06-07T17:15:51.487000 CVE-2024-33800,0,0,17bc2480cf1a294c4292319b62d955cef0134cc8b1bff7da4b78d7b55c06c171,2024-05-28T17:11:47.007000 -CVE-2024-33801,0,0,7d5808a6759ec671be301220903c9857fa8894e3933932ee218cb28f7df1991e,2024-05-28T17:11:47.007000 +CVE-2024-33801,0,1,383edbe255017d36a3f80e7a95d80ea991a96b279313ea8f636ba2617e7f4948,2024-07-03T01:58:50.903000 CVE-2024-33802,0,0,2476d398b8594ad323a8dcb8865ed3c9d1843ba4df856ae65611bc0b42c9b32c,2024-05-28T17:11:47.007000 CVE-2024-33803,0,0,99c652e38eb63da1d070f2217a40025de76c94a2564b78e9c93e5d493c01aca4,2024-05-28T17:11:47.007000 -CVE-2024-33804,0,0,0a244428ff253d38ff0873d443a9102800d3167ece1c3a389bca5f7162e437e3,2024-05-28T17:11:47.007000 -CVE-2024-33805,0,0,a3b947525fe59e53579305d15d26d9647bbb8b2eff1980fbcdfa7afe6b63d362,2024-05-28T17:11:47.007000 +CVE-2024-33804,0,1,6621966fba27f3dd0da67323c048a53a2b132469f199bc736e2057ed57961b5d,2024-07-03T01:58:51.660000 +CVE-2024-33805,0,1,58af49a7c74149ca9f823d30f922778154c6ecf6b330b510d828d2d1dcc56f01,2024-07-03T01:58:52.423000 CVE-2024-33806,0,0,9a5cdc220f2d34e935a67442cffe776d785994f07c76bd35aa2097502d557ed5,2024-05-28T17:11:47.007000 -CVE-2024-33807,0,0,8073186bbe04e91270beb6d77cd5a62341d21d2bce1ffdd6e9412d6379785e86,2024-05-28T17:11:47.007000 +CVE-2024-33807,0,1,2173c6521a5c18022682137c8c79fe1d718736f1b1f1ebd36d2009f7313e0327,2024-07-03T01:58:53.170000 CVE-2024-33808,0,0,c51d3bc7c243893234d482b83f321bccf552fb07b2c0e530f45d8a2d81e7175c,2024-05-28T17:11:47.007000 CVE-2024-33809,0,0,f49687bdb1b67c41dd6116fa038715d7519a4be0442fa47f5646ef61751e82cc,2024-05-24T18:09:20.027000 CVE-2024-3381,0,0,2675878f918c9740671fc065cc6afea6b859e07b3f755ce74555424e09b49f5d,2024-05-27T13:15:08.490000 CVE-2024-33818,0,0,fcf08ee825495c7c9196412d6a7ac485908da9a914b001b572e82e64bc2af5f7,2024-05-14T16:12:23.490000 CVE-2024-33819,0,0,27ebf543bf09f96d296185f9994673eb8c5aa230fac1ef1d22da8e6b7ccd2158,2024-05-14T16:12:23.490000 CVE-2024-3382,0,0,359ee56c09e0a2a64315ebc823efc4b55ab60390ccbf48a0550f896cf550e0d4,2024-04-10T19:49:51.183000 -CVE-2024-33820,0,0,308c14e306f517930841f173c51228dcefca57ccfd38fe84d02cbfcbc2055739,2024-05-01T19:50:25.633000 -CVE-2024-33829,0,0,42cb0da5c609a2e2e063c358a9277f5b48f955831cd7c226796f2b660e0d3f78,2024-05-06T16:00:59.253000 +CVE-2024-33820,0,1,1f4676a068bf8eef81b801f6edfe98ebc1889872789d97021fd443221fe898b4,2024-07-03T01:58:53.933000 +CVE-2024-33829,0,1,82376f1bb7b84688541c346599e7ab08e78978ce19e0fd4a8bd452996459b714,2024-07-03T01:58:54.750000 CVE-2024-3383,0,0,23294a2c02d282067f57807e610d19ad62151e7737eff1a2dbce91b2ce33a939,2024-04-10T19:49:51.183000 -CVE-2024-33830,0,0,4bec17a1ace431d40129f86a3decff5923e7758432d69e3320d95a816eb741f4,2024-05-06T16:00:59.253000 -CVE-2024-33831,0,0,98c1e02fb52cc885fef491b04fbf31cf74b7566005400cd91ab0d4a14f98e6eb,2024-04-30T19:35:36.960000 -CVE-2024-33832,0,0,e7d2cac687a99961b7eaca7437c17155c2c3f6529821c095b09e5161bda8425f,2024-04-30T19:35:36.960000 -CVE-2024-33835,0,0,b7a1ddab44d53e7f09c5ad58cb148033d556cb74ed3d7a19809aa297e0382c78,2024-05-01T13:01:51.263000 -CVE-2024-33836,0,0,56a0960aeb8039f6a242dc79de612ac8aaa2ca95d4d1f5ad6698e412435b641e,2024-06-20T12:43:25.663000 +CVE-2024-33830,0,1,fc6fa18894467c83b0848443851c7e78f7eba7d19fa4f8b67e04a58cc8829d7e,2024-07-03T01:58:55.540000 +CVE-2024-33831,0,1,91e2a95f17e19760b86b81244b402977c638bd6085319805d6a4540f23f9d8e6,2024-07-03T01:58:56.317000 +CVE-2024-33832,0,1,7b3e27b34a81a08591742eaf0380d56875457acf0d341656accd4bb7693f1793,2024-07-03T01:58:57.087000 +CVE-2024-33835,0,1,cffd31db3df6261e091005d9fb36253e75a61316a58e0e89b08946054d5f55ef,2024-07-03T01:58:57.853000 +CVE-2024-33836,0,1,ca4e61dbd315156f846a9cf4e6ecb006bd948e7b0e0ba1558760fe0d5dd0584d,2024-07-03T01:58:58.623000 CVE-2024-3384,0,0,f1db02aa38b819888be52a421a922174001b5f3c9e0abe3ab9082a168503f129,2024-04-10T19:49:51.183000 CVE-2024-33844,0,0,921cf446ac356d2881e6613aac60d162eae136862d065184d9b1201e02e62333,2024-06-10T18:45:09.903000 CVE-2024-33847,0,0,cec3102738820622f0167b7b117ab7c4d637fe3cf90cd38fd5f1921621ade8bc,2024-06-24T19:26:47.037000 @@ -251351,38 +251351,38 @@ CVE-2024-33849,0,0,3b4368a52b5ddf8a3c305c2346a67c77b86eca45d334812e664f6d20b43a3 CVE-2024-3385,0,0,dafd55987e5738b5d6ec37d523526a7e0269d60d96cd780933abafbc800645a8,2024-04-10T19:49:51.183000 CVE-2024-33850,0,0,158a3abac262aacbd4fb1eef86465f2f064c398c7b73e2e07333e2e0ee53ab9d,2024-06-11T13:54:12.057000 CVE-2024-33851,0,0,70fa6f94197d636021b1e88f06b3272bd3466c39938f37afc7083daec042598a,2024-04-29T12:42:03.667000 -CVE-2024-33856,0,0,e8b96c3676ebf8c2fe47c1bff3811d5c4c39d1323b375febe54b6e6f3eab8462,2024-05-07T20:07:58.737000 -CVE-2024-33857,0,0,46a02d2b7df87ae5a17a1bc93ac8a662cc6029aa59066174d8121a3c4a39e84b,2024-05-07T20:07:58.737000 +CVE-2024-33856,0,1,e1bc615af0caf524dcab77cf6cf6563129862468d325102417ce19fd73712644,2024-07-03T01:58:59.643000 +CVE-2024-33857,0,1,b9573703f999cbfa64c65ad4975e76915087495646b59661c3236ffafa92c9ce,2024-07-03T01:59:00.423000 CVE-2024-33858,0,0,908335cb5f6f9fce545a8d8e396c240343dfa0c627880c76928e0dfd92f71949,2024-05-07T20:07:58.737000 CVE-2024-33859,0,0,c39c79672554484e65368e295f5b8216c172323c2ed38b2ef6778fbe14be0853,2024-05-07T20:07:58.737000 CVE-2024-3386,0,0,d08d523d066834a85bfe06023f05a033d8631a6197479f66bfb86438af143c6d,2024-04-10T19:49:51.183000 -CVE-2024-33860,0,0,7a88c442cfda57c8856ad4a381cdefc3c2de0fbf80eb956bba1b35faa9c081dd,2024-05-07T20:07:58.737000 -CVE-2024-33863,0,0,4e52f2a2152b80f28a1092ad90ad4967d1526f27f90d9d357d007518abbcb785,2024-05-14T19:17:55.627000 -CVE-2024-33864,0,0,812fd60dbaed4389e97173f2464075c160d56ead677022bbd56b4fde82300623,2024-05-14T19:17:55.627000 +CVE-2024-33860,0,1,4edc8dec2f427c2816a0216d7c9e23f7b50c2414633de446e641048438fa012d,2024-07-03T01:59:01.367000 +CVE-2024-33863,0,1,c260069bf74562524b59f29e5ae47ab85abe94da31d2a1859218017be058cb0f,2024-07-03T01:59:02.140000 +CVE-2024-33864,0,1,61b38f0dc43ac9d0068f6da9de00a6e65ddc35f21838a32f075823f961986d6b,2024-07-03T01:59:02.930000 CVE-2024-33865,0,0,9f1dd99cceb321d30e7627b12a8d7830d5875309e5d742338b8087f86b779deb,2024-05-14T19:17:55.627000 CVE-2024-33866,0,0,85ae47904a3f92a316374427985280624457f9b9010b9d9f990ba9cbe15ad32d,2024-05-14T19:17:55.627000 -CVE-2024-33867,0,0,93413b974dfb478b871d6c6d88c6e9c702fd81c11750417dfd79cb09f759a2d0,2024-05-14T19:17:55.627000 -CVE-2024-33868,0,0,0a0488df8015cd4e7c3e35f293374d56f734581fca05e6b306bd90849a840dd5,2024-05-14T19:17:55.627000 +CVE-2024-33867,0,1,0f6e6b0818e1248c04a728bd3994286d3ee2c473217dff20f3ca244eaa919d7a,2024-07-03T01:59:03.697000 +CVE-2024-33868,0,1,4fc50ed4e32f87e9ba3d697ac3c0b062acf2b7d48dd2fe49590aadfcab9eb4eb,2024-07-03T01:59:04.490000 CVE-2024-3387,0,0,59a783d7f5a632f1312dc02ccd745e7c758f93e478c4554a0dbc9aba27d256c0,2024-04-10T19:49:51.183000 -CVE-2024-33873,0,0,fc2e1cdd10038acf8452ae14614b26c1fbced90a93a7e65f635bbd65857589fe,2024-05-14T16:12:23.490000 -CVE-2024-33874,0,0,bd9a950b9562a06537f4654180355d9d04df014ac63385f12e42e8e9d4a75bd9,2024-05-14T16:12:23.490000 +CVE-2024-33873,0,1,6ea1274dbe138465702444faa4e98a829d2dcf26c68796f03309e9049cdfe9b0,2024-07-03T01:59:05.293000 +CVE-2024-33874,0,1,d26fda7bcde0c687055ecb7e8a711b7b405c2f58134eb500396c86a8ce6f97a1,2024-07-03T01:59:06.100000 CVE-2024-33875,0,0,d56411f6b08dc38a7f7767c8da240cc0d8e5f0e9cd402439404e4aab3eaa845c,2024-05-14T16:12:23.490000 CVE-2024-33876,0,0,855e6f1a6953572bf2abcb9512e6b09150bd51d2ecf5c5bf346f500d7866eb87,2024-05-14T16:12:23.490000 -CVE-2024-33877,0,0,ef39c06f10245406350935c5cfc4e4509dcfa0fbf9f61f794331f96ec66f10de,2024-05-14T16:12:23.490000 +CVE-2024-33877,0,1,b4f1b95444f84dfcef907af7774009cf66d9af779662daf465f9739beafd3f6d,2024-07-03T01:59:06.870000 CVE-2024-33878,0,0,c933698b6a2548cf9b48c8259d80584290a037a34e4e04a28347b701e99d20c0,2024-05-14T15:38:10.657000 CVE-2024-33879,0,0,117309d498de43b6be44305c3d48f23c24045914c7d7039e16ab99e31775a4d8,2024-06-26T14:40:53.927000 CVE-2024-3388,0,0,9a13547aa29d2171bfe252870fb3dde44261a463a11a31d9062dc130e0f3c4f3,2024-04-10T19:49:51.183000 CVE-2024-33880,0,0,7756f13a44ee301d806ebdc3733aec2a801c10bb5020ba6d2d6b54997225f784,2024-06-26T14:42:00.533000 -CVE-2024-33881,0,0,f9e8b430b81d021cd959a4fe56a71ae2e7a46f1e92aae4927b0f8b8ad7e39eac,2024-06-26T14:42:27.170000 +CVE-2024-33881,0,1,e4d10f61fc565fc8bb5fef52d9f0697958357e8d77d4357eec47a5d0b1ff7b9d,2024-07-03T01:59:07.727000 CVE-2024-33883,0,0,c3d4ca3457f68fb83203c8f7576ab4f6d2af7e59b5901cd64501370e80dea4a9,2024-06-10T17:16:28.217000 -CVE-2024-33891,0,0,dbfd0a46c344c55dc0dc7b94e4bd09b3968a700bb28b10a9c34051909c1cf008,2024-04-29T12:42:03.667000 +CVE-2024-33891,0,1,1989e665b70cca966ca59362172b98f189cf8e652408c4337ef1f2abce15995f,2024-07-03T01:59:08.507000 CVE-2024-33898,0,0,fce817d892a67a37756f05aa1b381dbae2c15aaf04344df974a9160309f3b986,2024-06-25T12:24:17.873000 -CVE-2024-33899,0,0,a7d045f337995c763b9659e78955fd4f45f7736540a0f2de3af7e2f3a386fc9f,2024-05-21T17:15:08.907000 -CVE-2024-33900,0,0,22109cfa8453d6fac86d432cd9f4ebf584447af3cc6b5e9bb8f885da3aec714f,2024-06-06T18:15:16.170000 +CVE-2024-33899,0,1,215d012a0aeed617e9223e785f340f85e2514c39cf4a2326738c4b3613b1edd0,2024-07-03T01:59:09.200000 +CVE-2024-33900,0,1,03828701299297702ee936c4723ae70794f1d4664c7ca2f0322872e9a7b4d7d4,2024-07-03T01:59:09.967000 CVE-2024-33901,0,0,75e1f4bc73d73047b93bc18aaf649342f4e272c76affbb46aef808d0b0e62e7d,2024-05-21T17:15:09.143000 CVE-2024-33903,0,0,d2659cb95032f4bf4e82ec7ebb3e3a955a9eb80acf170b021644b79abb230380,2024-04-29T12:42:03.667000 CVE-2024-33904,0,0,4e23880abf5747270fb682428cdb1c8d9da3ad9f2ae0530104035f429e5a2c50,2024-04-29T12:42:03.667000 -CVE-2024-33905,0,0,4f2af541fd9603df50f92dd094e460dd4dcee3f568c1f2af9533e6ef2f5fb1b0,2024-05-01T18:15:24.390000 +CVE-2024-33905,0,1,8733ae06a94637e7c1c0ff0f997c7e4ea1263aeaf349b0ccb59c2d115d8380be,2024-07-03T01:59:10.763000 CVE-2024-33907,0,0,61fea348950e38683146d14305d27d67cff3f826a8055e478155b8c1d0ac0243,2024-05-07T13:39:32.710000 CVE-2024-33908,0,0,a88a69da4efefbaf00105bd137ff32d6ed2880bc8a96e30239b8820c98589ef1,2024-05-07T13:39:32.710000 CVE-2024-33910,0,0,74d376387ced889738dadc60e33e92e139a28a86011b172915a176ec8c222a4e,2024-05-06T19:53:38.797000 @@ -251430,18 +251430,18 @@ CVE-2024-33953,0,0,3b3356729af80b251661673310f8c56f44f10df5bf865f8c660a36c2bb489 CVE-2024-33954,0,0,c503ae766ab5514537a2f4c6d4b14a345a29e519b230f4073c9e782b0bbe69b4,2024-05-14T16:12:23.490000 CVE-2024-33955,0,0,2ca854ebde5acdbe9a0cbc52fdc48933a592e02407281f304c8b2d9d1c5c771f,2024-05-14T16:12:23.490000 CVE-2024-33956,0,0,a3addf39e4aabbdc7e441806152a9a1df58e40ee38caf2a4eb3a2e733fe2d75d,2024-05-14T16:12:23.490000 -CVE-2024-33996,0,0,f5cf19a228c52b4c5d509cb57ba77509346ef7a0b4b5ab78a6ab7d6628a5fa53,2024-06-03T14:46:24.250000 +CVE-2024-33996,0,1,3a1ccff7b15ef74d30247c0f7f73ffcc0dc644d71df2ad9a3b66250554292391,2024-07-03T01:59:14.897000 CVE-2024-33997,0,0,5b3612b220337f25b38467e1f212b70c162181eb47e4ddfb3415753caaffd55c,2024-06-03T14:46:24.250000 CVE-2024-33998,0,0,8e63d48b15f2262d35a843f7a9457e23af5aee5d3e86bbbc94e2e28ec7b3fa32,2024-06-03T14:46:24.250000 CVE-2024-33999,0,0,29bc13d19be6e74644ffe59df0021a7993dee82b6ee04438762d3af2a303cb95,2024-06-03T14:46:24.250000 CVE-2024-3400,0,0,ca612a9a9d0abd8952e404012cd7953d185fcc4b36e6c122ae2aa18b847a21b3,2024-05-29T16:00:24.093000 CVE-2024-34000,0,0,1b1400b3cd4799709e56e84cd96e17fe69958143350c73cc3953431c0cfbc9f1,2024-06-03T14:46:24.250000 -CVE-2024-34001,0,0,506ed2018e026c3696c1b94d77a0f5d08b76286c9186b394abdd615979f316fa,2024-06-03T14:46:24.250000 +CVE-2024-34001,0,1,f47716837d9d4b12395545e21b0b97bd8f96773591892a37286f525df4cfafaf,2024-07-03T01:59:15.240000 CVE-2024-34002,0,0,e20f7d66d4bb801f75c42da8485bbbac3c60286e9a30c92c02828980a462847e,2024-06-03T14:46:24.250000 -CVE-2024-34003,0,0,9cfcdaca126b2ab93eda8380cb22e57f60cad547d7d025cd259aef6101ddf4fb,2024-06-03T14:46:24.250000 +CVE-2024-34003,0,1,90a6a853bacd211ad5804ef76935f128bcaaaf61c4c03698fbfba711ec694089,2024-07-03T01:59:15.440000 CVE-2024-34004,0,0,c514bda174a2863f34ff466c3a19f37251b541102fe3a4c330e8c4883a7a54c2,2024-06-03T14:46:24.250000 CVE-2024-34005,0,0,100728f5097165a5959e76178c5d67a827841686e3af57acac8bc0c76f34715a,2024-06-03T14:46:24.250000 -CVE-2024-34006,0,0,efe89fc3ff42c4399155abe1dd2dc8d912048081bc181fbcd2781cba9784ebdc,2024-06-03T14:46:24.250000 +CVE-2024-34006,0,1,395648fff5e3bb9db979037721cab37ad30235177e6b8c53ee620b321ccc7d74,2024-07-03T01:59:15.730000 CVE-2024-34007,0,0,128bcc830b5d69de01e6d3263d335a3cdda7f94aac607ac9823d74e02f9b6c9c,2024-06-03T14:46:24.250000 CVE-2024-34008,0,0,edc66ba59c24fe86c5737696ef5e1beb12d9c8c54bd644a71789cd3b77a014b0,2024-06-03T14:46:24.250000 CVE-2024-34009,0,0,6ddbdcd2f8161372a9bcdefda9c8b3e3050867c707ff64c3c31650ed3f1f8522,2024-06-03T14:46:24.250000 @@ -251449,20 +251449,20 @@ CVE-2024-34010,0,0,c31f2f180475c1f3f2204c1feb2010c5ada948eb1b4d37517c54f97316341 CVE-2024-34011,0,0,4e2e0fb5d64e6e75da5ff3561c6f86ff1f891a3646e890e015512c561d328a58,2024-04-30T13:11:16.690000 CVE-2024-34012,0,0,f1411ce42e8800b234994197ea4049bb546138b11d36384d7fb2107e804a3455,2024-06-17T12:42:04.623000 CVE-2024-3402,0,0,e994f4abb2ec0efc27de74bd789f4b69dd0341c920e8e4136eb625b5fd69d8ce,2024-06-07T14:56:05.647000 -CVE-2024-34020,0,0,9d9b11f4db84c3770acd92b1150bad9b802c58de4fce781bba37a89c232e029f,2024-04-30T13:11:16.690000 +CVE-2024-34020,0,1,c4663f98778b76c33582b9d015039d06540b400c550bf7c9ee3e5b98d9ff425a,2024-07-03T01:59:16.227000 CVE-2024-34024,0,0,10e33d292073b520b667747f9d1f0728699da6905036151d86e343d924c712be,2024-06-20T12:44:01.637000 CVE-2024-34025,0,0,7910ed3f49f27cc3d6e29efd0456c14b8fa97ed1ac57b4183c41d497d3215ba0,2024-05-16T13:03:05.353000 CVE-2024-34027,0,0,e397fca17c7df014adc9f3ce444d12c38313597f0e3ff23bd3fd7d4b1959c585,2024-06-24T19:26:47.037000 CVE-2024-34029,0,0,4169ae74794d01d0e86a2d5b95da9173d7cd134e14e2c2e7fdcc6668ef8aab4e,2024-05-28T12:39:28.377000 CVE-2024-3403,0,0,351b7361a62b75fa01065ca2b4d00dead5236a2356f9f11be8885ee6cd82884b,2024-05-16T13:03:05.353000 -CVE-2024-34030,0,0,c6c8960988ea9bbfc6c463011e5e483cd257a63d923218a3c9c255cfeb9969db,2024-06-24T19:26:47.037000 +CVE-2024-34030,0,1,4aa6c6f880a939dd30e0afb4ad95dc9841c13fda89f46a9df825aad2f3b3008a,2024-07-03T01:59:17.300000 CVE-2024-34031,0,0,32832cbb1e8c12d82b1b4f0b17dd8da5298483e844da3b9dfde76f943f816f64,2024-05-03T12:50:34.250000 CVE-2024-34032,0,0,5a4c84545c086e02a753cbdc2a69955417aff416961e34fcc07fc6e9fddc4770,2024-05-03T12:50:34.250000 CVE-2024-34033,0,0,719a8ff9b4eb14602d2888920177741310f8b0330069ca799cf076b91625a4df,2024-05-03T12:50:34.250000 CVE-2024-3404,0,0,6e17c41fd2ac1693dde4618a5f61498fd7ee98f9bce0873b88bd7dd4dfede7da,2024-06-07T14:56:05.647000 CVE-2024-34043,0,0,7ca1282f168b2382fda735851194a0d4cf0b96b9e0efe68d472278215068d68e,2024-04-30T13:11:16.690000 CVE-2024-34044,0,0,1b80936b6f5ff7a9f74aadc7ee541de569f6d2545da0250429d475e804224350,2024-04-30T13:11:16.690000 -CVE-2024-34045,0,0,d9f65a975a467a35e54719953a77085842c3e12162c6a7fa01465023f7b2709c,2024-04-30T13:11:16.690000 +CVE-2024-34045,0,1,79bd65de67c0efbec24a2f08a1536c9cc87b90b692934d062800de780d7b669e,2024-07-03T01:59:18.230000 CVE-2024-34046,0,0,9255585df9d7a51a380efebf772692118266a4c64a9f939689e6f2a8d4a6a674,2024-04-30T13:11:16.690000 CVE-2024-34047,0,0,aacdfb21458e74a2fab076317c61bb2dde19e6dfaa3fa2d4b3b2228c3638b166,2024-04-30T13:11:16.690000 CVE-2024-34048,0,0,8c496f871a2c0d981af3777efae32f5c577cc3a739ddfa90d08b574a8ed636cf,2024-04-30T13:11:16.690000 @@ -251471,7 +251471,7 @@ CVE-2024-3405,0,0,168ec7f9b410ce208cd59ad1ea840c83def6fd83f8512f3bb62051f5ec3a0b CVE-2024-34050,0,0,12266ec53b888a39d080cf759ea4efcf86e297f4b6422a5e48e41cdfdabd201f,2024-04-30T13:11:16.690000 CVE-2024-34051,0,0,ac84f2fd7dd43d4574139c8cf26e6f74ad2fa41e2254272b15b5513f0e198e55,2024-06-04T16:57:41.057000 CVE-2024-34055,0,0,748778fa7056cb22d8c756b4b872bd19417a23dfc74d45fea46f818df71b0835,2024-06-14T06:15:11.650000 -CVE-2024-34058,0,0,859a5867c3261cbc3116f378e08c5280a9474e2ad72a0c908fe3c9d61944df2b,2024-06-10T17:16:28.297000 +CVE-2024-34058,0,1,cfbb8590d55f48cefc143414c8f3d439d56763f898de84d852e391cab57a6cc6,2024-07-03T01:59:19.210000 CVE-2024-3406,0,0,b05755db76fca4314b8e99a4179a31010371036c16427145226d1ec275309899,2024-05-15T16:40:19.330000 CVE-2024-34060,0,0,3a924f7009b7e35c5ed89c1ddd4a1ea338a526dc659a3f0f832e02177cf8d5cd,2024-05-24T01:15:30.977000 CVE-2024-34061,0,0,3ce76c3220f695556e9bc43d23c63a4d4d07710be053bec43ac41fe85d030b22,2024-05-02T18:00:37.360000 @@ -251504,9 +251504,9 @@ CVE-2024-34086,0,0,c6d9a7386c842d5c59ea9979eb5dbfe478217d9b6c600c2b728171f329aa0 CVE-2024-34088,0,0,6883a0b70d0dde6a9cd88ea6282b05e33733ec87c48078fd4a071d0cb0aef5b0,2024-04-30T19:35:36.960000 CVE-2024-34089,0,0,c4995c5899bf75c17002edf2297d054d02cbc010ded6b6614d0c1fcb408f32ea,2024-05-06T19:53:38.797000 CVE-2024-34090,0,0,73f27f58371a8666265526d07222810acdb885707b1b55123938a5e2539034cc,2024-05-06T19:53:38.797000 -CVE-2024-34091,0,0,70a30dbd3192646aee95560e088991088bfd360be9272880b76f6d0c49ad6fc3,2024-05-06T19:53:38.797000 +CVE-2024-34091,0,1,316b2e1c1466fafa03f21d7850553c09c4a77fce34562e440629956736be2b9a,2024-07-03T01:59:22.050000 CVE-2024-34092,0,0,079ea99bb21d4c1a138d545f7e5e5abbd38b83ad27446c874b351279df34c3ee,2024-05-06T19:53:38.797000 -CVE-2024-34093,0,0,a0f074d00436b49ca53556630e0d0ac1028fcb54a8c44a292fda62eb4d8b7b7c,2024-05-06T19:53:38.797000 +CVE-2024-34093,0,1,a3683f2cbbe3f4d2616fb123bbb1ded4218b58d2ed8c82d304f478e8d6150d29,2024-07-03T01:59:22.817000 CVE-2024-34094,0,0,c836e2e886b9fc0dadeaaa957653b7fdc02a907af4086f6d954d9c03245716a6,2024-05-15T16:40:19.330000 CVE-2024-34095,0,0,08f61da3eac92d19915475779f2e0cf8d56e67ffbd3cb3bacdeaea2c908570fc,2024-05-15T16:40:19.330000 CVE-2024-34096,0,0,b211b538fffe9abfd3a63762f76226325b711bcb377209279662a8a0721f8522,2024-05-15T16:40:19.330000 @@ -251540,11 +251540,11 @@ CVE-2024-34130,0,0,89584332f9dd3125064424fac4aabed722eb075df05ba25c9a02617aa8a68 CVE-2024-3414,0,0,69231815197d8c759df4a79a39950c8d4f6258471ea32f1c29be1a7038b6ec47,2024-05-17T02:39:54.160000 CVE-2024-34141,0,0,0328c765f70a818d854683e04e980b09961525d5dd8879ace860d192776bc00d,2024-06-25T12:24:17.873000 CVE-2024-34142,0,0,c526b1831039e375b135e55cb58a71752c1b1dd1103a82d9d4050eb194a5f7f7,2024-06-25T12:24:17.873000 -CVE-2024-34144,0,0,161e418bd2efea8731bcf0c84ef4939748aabfddbc9f310a20f204f2b5cb4158,2024-05-02T18:00:37.360000 -CVE-2024-34145,0,0,8976018515653d9edfc24ef743cee1c2f455c68450e5a16824609e8151c9f246,2024-05-02T18:00:37.360000 -CVE-2024-34146,0,0,57b55472d7ef8f36d24d72d33ce2a7a08770dabb111aaf45da4e0803162f240d,2024-05-02T18:00:37.360000 -CVE-2024-34147,0,0,e0a814855e823888678c4e878d4a98078e68f5a44e971780a8b89674893348e5,2024-05-02T18:00:37.360000 -CVE-2024-34148,0,0,a6587625a566b5b3fa150870642dc080066d10cf989bf99d18071766b6756a46,2024-05-02T18:00:37.360000 +CVE-2024-34144,0,1,8414704b34c6aee2b8d5e2cc339eba978cf28a03283509f435e5b0757f4efdfc,2024-07-03T01:59:25.760000 +CVE-2024-34145,0,1,38c44993a1dc70421d8e9284263c594effe0d087a5df7c7a4b3ac5e8c821ff86,2024-07-03T01:59:26.520000 +CVE-2024-34146,0,1,787b7a8aac402effb291b025d8f2aec84609a236cac974fe09cd7845739a936f,2024-07-03T01:59:27.270000 +CVE-2024-34147,0,1,d9d77d8f0db4502f689561e9042a311ab3573d6b584b25af82549f0ad3fc4dcb,2024-07-03T01:59:28.043000 +CVE-2024-34148,0,1,39bc79113db1a4cb24c1e032d2832991ff9777a6aea1f2d179dc9afdce78b080,2024-07-03T01:59:28.797000 CVE-2024-34149,0,0,6718ff54c28c47b83499c8438323ca646d2bd3d2cb77ff497c0ecd581cc61196,2024-05-17T02:39:31.800000 CVE-2024-3415,0,0,ac982b4864f8e4a7bf9d1d27366b734c59c6abb888535e3c9066ef082f3066d3,2024-05-17T02:39:54.247000 CVE-2024-34152,0,0,04467579c4bab25309b1030ce0ec0a344d1fe4e96fcb332263f7aeba2730f816,2024-05-28T12:39:28.377000 @@ -251557,70 +251557,70 @@ CVE-2024-3419,0,0,aeca19960cd1f95bdadc5c30b5b727390552e333abdda78cd3d5486ef78495 CVE-2024-34191,0,0,27b1c620282570c87b9d36cf383a2ab3527ffa825ce9edfd9e46e92b141fd915,2024-05-14T19:17:55.627000 CVE-2024-34193,0,0,d492fcf35655541322fc4447180a69459414c1b3edfb33067e06f67fde02568f,2024-05-20T19:34:58.277000 CVE-2024-34196,0,0,4e80cd162a6469d87fbc5160248bcd148f17d7e9ff6e8d925ea5afbae398c96d,2024-05-14T16:12:23.490000 -CVE-2024-34199,0,0,c4a5d1d1715931fb9852a66c79bbb3d851f28204f6828f81c97a43695e03fbea,2024-05-14T16:12:23.490000 +CVE-2024-34199,0,1,27f51e6e9a085d1edb0a1380e0bfff4433e52f8f9e25d5bec96a743b9a9ffd85,2024-07-03T01:59:29.647000 CVE-2024-3420,0,0,b23336ce8c63df177a870ef266a5c8c6a1f5d11f9f70c90daa106ac2bb4085f4,2024-05-17T02:39:54.717000 -CVE-2024-34200,0,0,ba4b2f640c6ff62ad82c05afb74e5bfccf3fd84a435ae6b40d7c480fde65101b,2024-05-14T16:12:23.490000 -CVE-2024-34201,0,0,aa6c295f0562f27e01abbb0970911cd4d9bfb052bd0f3d2d2aef7dfb4b3e572f,2024-05-14T16:12:23.490000 -CVE-2024-34202,0,0,b54ec64110ef4f7b2d7a0cd56a0498778ddd9191e5c094dff4f8a493a48e79ce,2024-05-14T16:12:23.490000 -CVE-2024-34203,0,0,3030295fe5bb90115851a92152cad06bb3944325542bb39d5624f7e2f3eda33c,2024-05-14T16:12:23.490000 +CVE-2024-34200,0,1,233f6ce04f4e95f03eaabab680c92f73f949e711725c4041d58add8301c7e04e,2024-07-03T01:59:30.427000 +CVE-2024-34201,0,1,331c15ea4d8678817fc4a039b90628979e4d12ceb52da635433fde95bd8259d3,2024-07-03T01:59:31.177000 +CVE-2024-34202,0,1,10e2af653aecf5939b67ff5397946eb97268ba48cfc20999e9653a29203a02fa,2024-07-03T01:59:31.937000 +CVE-2024-34203,0,1,7c4fea643e6e97753f9c8250ce54a3db82e8ad36a97a2537629259caa2f68d04,2024-07-03T01:59:32.703000 CVE-2024-34204,0,0,37f521335803858a894e2b0926e961c46c3fe90cc77031ddff770d0c70d2c42e,2024-05-14T16:12:23.490000 -CVE-2024-34205,0,0,76dd557dae579d7357c98efa7fe46b4a7ff77fbdc155097d0e00866ada267d93,2024-05-14T16:12:23.490000 -CVE-2024-34206,0,0,d4140f4fc3adf0de125f1495e9e3715550872523ddf589f797fd9369c0f58776,2024-05-14T16:12:23.490000 +CVE-2024-34205,0,1,5e6ec1f83f8df2b44ee77e87d09f991b3d26ad92e17843fda65dc4a06a8d8d48,2024-07-03T01:59:33.503000 +CVE-2024-34206,0,1,bf2b14d36cc1c2097afe17c99c0cac4b916ae816d9a6bfbf97f078b15fc27e67,2024-07-03T01:59:34.333000 CVE-2024-34207,0,0,a9d15ded434afef2ced0f4d6437effdde6ba5b08331af0ee1d355c5202afda0e,2024-05-14T16:12:23.490000 -CVE-2024-34209,0,0,13589f957ca2a347f10d6bda97059987765d639d37e849a0f6b35664f14edfd2,2024-05-14T16:12:23.490000 +CVE-2024-34209,0,1,4ad44bfcbcf039f986b2d526a19d98c15b5b8bb73456978475253049b47762bd,2024-07-03T01:59:35.650000 CVE-2024-3421,0,0,9c8199a47366d379daede939206537984d9bce885e546669d64fb80971a66b54,2024-05-17T02:39:54.817000 -CVE-2024-34210,0,0,86f49867156814d961ba78a534b302140e3c3975a146a72e8a3b8399a591374a,2024-05-14T16:12:23.490000 +CVE-2024-34210,0,1,02626780bed2bd793e39eb14595382898b75f6bd94088cfe6237dd06a298d5c6,2024-07-03T01:59:36.677000 CVE-2024-34211,0,0,2c2ca2aaccb13a7e146ada35a5ee76936b06e465ea24373a846c5619216e8b87,2024-05-14T16:12:23.490000 -CVE-2024-34212,0,0,8caa4e52b003ff3a1a8dc4db0b5633edb9a8f7fb022061a46c37fe202e446d09,2024-05-14T16:12:23.490000 -CVE-2024-34213,0,0,9e2a1b465b4f6394789d21405772d49ad43cfef8955021d7c705c80593578db9,2024-05-14T16:12:23.490000 -CVE-2024-34215,0,0,9c8934cb7bce7cf1bbe47bd6a1f136445fbe8f853d5ee08ffc1bae38a69b0a22,2024-05-14T16:12:23.490000 +CVE-2024-34212,0,1,349c5ceaae711c6c258753506e7441916ed8a606582e8e23b3a895f6369c1db5,2024-07-03T01:59:37.463000 +CVE-2024-34213,0,1,53d3ba806aa46d773a8e337fee7142388687e212bee6517408c0857d401b6448,2024-07-03T01:59:38.230000 +CVE-2024-34215,0,1,88585b38adcdb11fabddf85123f183f044f14feba5e8e740334272a1fa850701,2024-07-03T01:59:38.987000 CVE-2024-34217,0,0,3bf5a0bb48bcdfa6a9a074bdb05727ccace87ac6abb128f2eb080b8a8bf73b7e,2024-05-14T16:12:23.490000 -CVE-2024-34218,0,0,37b4791e13785ef3639eab3e5b10fbc6d938d7bcd45dedf85c9d937da02fd1c3,2024-05-14T16:12:23.490000 +CVE-2024-34218,0,1,aac6cf7cfc70c4cde8ce5f0ee80848f4ce2c2520c2faf83b08bd31ed75ca5c0d,2024-07-03T01:59:39.750000 CVE-2024-34219,0,0,032d69998a74aede4c60c30cf6d1f1ac164a1a7a95162073d56c7091c1ca3240,2024-05-14T16:12:23.490000 CVE-2024-3422,0,0,6dd3fc1591cb989cb039484a97f7d4d1b3fce2fb1b6c8e98440345fc7f164033,2024-05-17T02:39:54.907000 -CVE-2024-34220,0,0,74a10ec4f9f1390ee7a64a519fe60dcd36a32b984374bf667df339da5e8ff793,2024-05-14T16:12:23.490000 -CVE-2024-34221,0,0,e81cfaca48a524449eada56e943711f20c2e3bbb898d886f7a99e30a43dcfeff,2024-05-14T16:12:23.490000 -CVE-2024-34222,0,0,cd33e41034e3a88dde9c404df4be955d7999446631d83ed0a43ba32205ddee13,2024-05-14T16:12:23.490000 +CVE-2024-34220,0,1,664ae3f60d9d03fd7e09aca2b3c3f619f12a9aa76b48e9dbe80314480913931c,2024-07-03T01:59:40.530000 +CVE-2024-34221,0,1,b1a1df4238383ced5339c3a2ec6ba475623284464666a2d2287a54d486b49638,2024-07-03T01:59:41.290000 +CVE-2024-34222,0,1,c9254aeea26939ed840e05e8449aee7f6267f0c74101a29fff26f90fc72a21b5,2024-07-03T01:59:42.050000 CVE-2024-34223,0,0,fbeee087a582b9540d530eea3602e847dd91a3e89190044649c0a7b6b84a9916,2024-05-14T16:12:23.490000 CVE-2024-34224,0,0,89ccf4b53445891b1974d2ddc7c382dc7404fd435fa7a69e93cd1cb1cf5b6f22,2024-05-14T16:12:23.490000 -CVE-2024-34225,0,0,66a964c334ac9cf0370df8c193813f92eb85de3c8d53656511865b6c453b3064,2024-05-14T16:12:23.490000 +CVE-2024-34225,0,1,e08a9ad45b2661eed67570a87cb42ad712c6fe6e9c128f00e0736869ea473a7c,2024-07-03T01:59:42.910000 CVE-2024-34226,0,0,af86130198a1be41c1020d608a59584c729d17e5eedb09d523865704009de000,2024-05-14T16:12:23.490000 CVE-2024-3423,0,0,8665fcd9107d2ecb4cb52657beb8f12ab52765f88b392f57018d69a80a5785b3,2024-05-17T02:39:54.990000 CVE-2024-34230,0,0,d94278dd5be9b7072d77b40aa5803a04584269e9d8ed42fe3d845cd9db307679,2024-05-14T16:12:23.490000 CVE-2024-34231,0,0,f81ed1ca676437e260cf9aa5b5a801d7846623ebfddedb6871fdf9d1c15c449c,2024-05-14T16:12:23.490000 CVE-2024-3424,0,0,a54a43c6958e83ca08d926c6db53c591f33edbf26b4382a0bb0f2ec4f7ba0ad6,2024-05-17T02:39:55.073000 CVE-2024-34240,0,0,dfcda03bbf447d4c2dd1de139b6f1edab9ac275202c87fee372600fc9722ee04,2024-05-22T12:46:53.887000 -CVE-2024-34241,0,0,61574d9013218c920db5d6c216060b892e89f63c20661b47a2622e8e43f0ab1d,2024-05-17T18:35:35.070000 +CVE-2024-34241,0,1,dfcf8e51cf99490944ad55b4d7efbac771f91027fe853fbf51050e455e0ec2d6,2024-07-03T01:59:43.687000 CVE-2024-34243,0,0,3bcb56ac06c11871ed21e998c6490784523666679d058904e5eec3bac4649969,2024-05-14T19:17:55.627000 -CVE-2024-34244,0,0,a59f3ba3bbeafb30ac1a2f15bf8d0d0297ea93f2aeb9dd724ce57b38df41d68e,2024-05-09T13:05:45.620000 +CVE-2024-34244,0,1,a26bfd7a4c49ba50484ca76340a595b71efe617bcf4043b16d0002cb15e33d74,2024-07-03T01:59:44.530000 CVE-2024-34245,0,0,64a679ccac2bd1e7d810b4b5a11028c70ee810ea1bc383eda2361bf020aad3f8,2024-05-14T16:12:23.490000 -CVE-2024-34246,0,0,04f43a8de377f1beaca78c53b390c81129750a9ff914f0440d13e89271fc4e81,2024-05-06T19:53:38.797000 -CVE-2024-34249,0,0,53249c9f86ce82bda9f8b081b07e9ffe62d525e1a53e41db128d7405004f9519,2024-05-06T16:00:59.253000 +CVE-2024-34246,0,1,335d7e6142113fc73612fa11fce8ff9e0bed0ba29ee83e94c66b8177c509d2c4,2024-07-03T01:59:45.300000 +CVE-2024-34249,0,1,76288a8f8b73f43cdaccb9883116279113e529ae1b4481e6c10bf04ce9d0c49d,2024-07-03T01:59:46.180000 CVE-2024-3425,0,0,86d8ae517d4b4b8afbc91acb063674f44a9b392c3ea866179ce57420c243f0ae,2024-05-17T02:39:55.157000 -CVE-2024-34250,0,0,18b1ba2508bb2dc555e88eb071df09bac6a85b4c65e83fd84e25aae8c7c3ad77,2024-05-06T19:53:38.797000 -CVE-2024-34251,0,0,7c1d100f368e48d92d8d6a4aa3b90507de6e98fcddb1494e59d7e128866be24d,2024-05-06T19:53:38.797000 +CVE-2024-34250,0,1,f4b19ad9252772265d578a0ee4d340d1be61778ce996bf871f0e59f9069875d2,2024-07-03T01:59:47.113000 +CVE-2024-34251,0,1,25fee35991321980af574ec031ad1bf30dfcc5a1f1d3b6d4e81940757de9b231,2024-07-03T01:59:48.090000 CVE-2024-34252,0,0,31bb8a2950b6912074be7ee48fc32c61e907b50fb159aca156077c558dda1516,2024-05-06T16:00:59.253000 -CVE-2024-34255,0,0,aa81b3e93b788d40cca03cb1113af1a061380b320611631f8217a8b76ebb2e18,2024-05-08T13:15:17.563000 -CVE-2024-34256,0,0,4cfe4c028d7ed8a4aaa4a13effd9539101f424ab09f04a31a817332d420aa18a,2024-05-14T19:17:55.627000 +CVE-2024-34255,0,1,df9fc147599d4b56a58626b2e11d564dc5f867fdcafae7981130ab159cbdf4a2,2024-07-03T01:59:48.913000 +CVE-2024-34256,0,1,6220269db052ab81edb92c6f9acb6971b653bd049f7e6b4252582ddd7f8f1dc7,2024-07-03T01:59:49.690000 CVE-2024-34257,0,0,fbd84b9c65ecd13d768bb5975b92131a2fdb6999482cee32ad98ede789e75941,2024-05-21T19:15:10.090000 CVE-2024-3426,0,0,3fab9d5e13d65987226b3eacf3176bf8413014b60d8c9b42a797460ba9ed2de0,2024-05-17T02:39:55.250000 CVE-2024-3427,0,0,8ec8e862f797bb81b9d4ca614d2eae08e844bf2eeab6da619bcde489396cea28,2024-05-17T02:39:55.333000 CVE-2024-34273,0,0,9a2fb0e3f02cab13377b15bc3ebeb83f8916934fba1719cf7e91c12ce4f829c2,2024-05-17T18:36:31.297000 -CVE-2024-34274,0,0,ed7cc27ce0add2cec6f0eb075d72d9bc499f3881642a46a4b175be29efe29f5a,2024-05-22T12:46:53.887000 +CVE-2024-34274,0,1,04cf77661d40b20b86001188951fe9b60cb45ce0a3967bd1c023b7bfcd657c79,2024-07-03T01:59:50.460000 CVE-2024-3428,0,0,6bd12c0e792d3206173879dbc2d07d17480b1dc620de60ecd99e55318e421784,2024-05-17T02:39:55.420000 CVE-2024-3429,0,0,142a702623e51f7167cd4d2dfb301671577283ae70e145eca4d03920b0a9bcc1,2024-06-07T14:56:05.647000 CVE-2024-3430,0,0,26511d7640da51b7d570c3e3e64dcd51a1ae1a874f887e17d041871761404897,2024-05-17T02:39:55.503000 -CVE-2024-34308,0,0,a9106d3038ea0861ae87e336ed29b09bed158322011782013165b4fda14eb836,2024-05-14T16:12:23.490000 +CVE-2024-34308,0,1,5c6830d7ba39b77cbaffad44e790f498af6b587a6f9837b67570228055e4e3d7,2024-07-03T01:59:51.267000 CVE-2024-3431,0,0,455a9b01059963fcb0a3456cd2358856e44f5db237eb4ee1c03f1b9fc99bc502,2024-05-17T02:39:55.597000 CVE-2024-34310,0,0,66df9c89974c6825f0e7d33b795a4985a07b16f5413b2fe4d7327eaf5fe9cf52,2024-05-14T16:12:23.490000 CVE-2024-34312,0,0,42ebb218a5fc0e270a6fe4891325f23ff4f98cc82876e3ff17e1e916fd05efa1,2024-06-25T12:24:17.873000 -CVE-2024-34313,0,0,15128d3b92dd6f905ce9cb237344765c2f7b5ca6a8a27d077c1112c393fdd36d,2024-06-25T12:24:17.873000 +CVE-2024-34313,0,1,5e7685d85b9be01539c2df2509259cab02217b4b071e1347f30175d5b9d70a40,2024-07-03T01:59:52.040000 CVE-2024-34314,0,0,0107b5ea4eb283c867d7bcf45b9a1b1b8c09b93e02d17eb326a855e2eae22472,2024-05-07T20:07:58.737000 -CVE-2024-34315,0,0,36ad48654c2445849405bf408af6abf3947e9c641efabc13ad4dfd6e6d40c74e,2024-05-07T20:07:58.737000 +CVE-2024-34315,0,1,2da9a3f01679d1f45f0bab05fdfd699ff25c9ffa82f02a145c0a3654a4071435,2024-07-03T01:59:52.883000 CVE-2024-3432,0,0,c54577582bdbc3937c3144599074e1b9739b0a7ed62b33767d62fe9e77c22e2b,2024-05-17T02:39:55.693000 CVE-2024-3433,0,0,d8fe0ffd32e9fb3f3bfbfe278a5e952300a650397e5632010fbf07827a8c84d4,2024-05-17T02:39:55.780000 -CVE-2024-34332,0,0,786c5e669f9d023bec3f83c5534d12a7c9bea9df5835d905ba7c6f90a6c0cb86,2024-06-10T18:06:22.600000 -CVE-2024-34338,0,0,debf5da9fbe0a8760d82e62e72676be1d81646899f08ee08cbe3ffd4f298e443,2024-05-20T19:15:08.670000 +CVE-2024-34332,0,1,8f6c683335644bc93205234e59c96ea37a2e6389fa2dea8d8666173975a538e9,2024-07-03T01:59:53.650000 +CVE-2024-34338,0,1,0b7082b91aa78856b4b16b824fb5642c1377f61ea50b332ded8dd5ce396d2aa9,2024-07-03T01:59:54.407000 CVE-2024-3434,0,0,e5e1f6c3f83a330c95098e301aa118cb27dcfcb5f7977633532da07dcd9b5499,2024-05-17T02:39:55.870000 CVE-2024-34340,0,0,3716ef6a533c1fa5301121efa934b32a4483b996c3342b94e030572193ac6a5a,2024-06-10T17:16:28.827000 CVE-2024-34341,0,0,f37d69cf5bf50561e35500a7e90f2b7d080eebb75e274e57cc9fba16796bd69b,2024-05-07T20:07:58.737000 @@ -251682,12 +251682,12 @@ CVE-2024-34397,0,0,70854b1ad6ab06679e1af787bf84a8a6de29444e6873fb72f86f5216cc743 CVE-2024-3440,0,0,b6e021f0a39374e5963047ffe0e563b4f8644f79c10282228c1df76f022468ec,2024-05-17T02:39:56.370000 CVE-2024-34400,0,0,e8519dd13fbf5464c7676c8cf94fdad109e7bb0206ce725dc62d2fd8b95ef432,2024-06-26T12:44:29.693000 CVE-2024-34401,0,0,0cfb896ccce711bbc7db6c4bbd385298b085bc508f7ecdead1ed17bc160057da,2024-05-03T12:50:34.250000 -CVE-2024-34402,0,0,07f2f76782d12e6f122a9b732cd1dd6fe7d9eda4cbe8011f65dcaa034c10eae3,2024-06-10T17:16:29.087000 -CVE-2024-34403,0,0,b827cf042756a5c1d96ff977631d7c263d5dd53378a344d1a81844f92201b89b,2024-06-10T17:16:29.170000 +CVE-2024-34402,0,1,40c1c09e73a5e121ad069e420d9f5e2215153ab4f3ce6510830030c249155906,2024-07-03T01:59:58.723000 +CVE-2024-34403,0,1,a772c000336bb8be08b5529657346fe94b3dd49c540ea077515808f0de4e0beb,2024-07-03T01:59:59.493000 CVE-2024-34404,0,0,4cf79ec0e52c18a8578c4661fc10cbf04d041740040a70674bf6d5499a83f663,2024-05-03T12:50:34.250000 -CVE-2024-34405,0,0,06da2a2bc76fef125303361e4991f6226df3c7d3e1f069824029ea629867e2c1,2024-06-13T18:36:09.013000 +CVE-2024-34405,0,1,ef98b8f0239394151e55685ca5e6b90093a0ec1a4c0b84ee10f6283d58a6ba28,2024-07-03T02:00:00.383000 CVE-2024-34406,0,0,f06da877eafee71b3eab9bec17faad9d11b96416e1bd2e4c44970ff2ef3c2142,2024-06-13T18:36:09.013000 -CVE-2024-34408,0,0,733c2b919e5f65e1d02278f861cea03e8312fa53c36bd3aad88b61975db5a5bd,2024-05-03T12:48:41.067000 +CVE-2024-34408,0,1,abf017611e0417f256a7bd2b0f28d70e2a9494b10fc034d68f1ef92afd0fd7e0,2024-07-03T02:00:01.550000 CVE-2024-3441,0,0,8906c475fe42e8064f831b67da9a8acaf93111ca107044a302235d95883712ee,2024-05-17T02:39:56.467000 CVE-2024-34411,0,0,fbb1735a6de85c00d8e3a7ee46274d79cf469c7f7382d1755784e0c027375be5,2024-05-14T16:12:23.490000 CVE-2024-34412,0,0,ebf9aa81c46e7e18ab298c1d0c6caf18455f80ca2b2b5a9a0ef2a115d4e3e2c7,2024-05-06T19:53:38.797000 @@ -251733,9 +251733,9 @@ CVE-2024-34449,0,0,97d09fdadfd613905dbfd9871f1d974c32ae8fd0c469e4b64fe2252427eb7 CVE-2024-3445,0,0,2031eee497e177f244890449ab10d2f196dd08d103f846fc9b20779b1f74d465,2024-05-17T02:39:56.830000 CVE-2024-34451,0,0,e70710b537fe2eeb930751f9cb9f8206f6cd9179f5b8e341e64ba4d6bec23b04,2024-06-17T12:42:04.623000 CVE-2024-34452,0,0,1539d23d88439359c8056a55b62128368abc940cc3fe41e5eb768680fb4e9509,2024-06-24T12:57:36.513000 -CVE-2024-34453,0,0,9363deaf6a5ec68194d671cadb0973a2ba23402d3e2800c4f9eea6dbd677c5cd,2024-05-06T12:44:56.377000 -CVE-2024-34454,0,0,5a4e256350d1e944e58328b51d73ec47802d2b17d3b93d5d7c62570b2e291430,2024-05-28T12:39:28.377000 -CVE-2024-34455,0,0,cf6832f7361884f15470d2143d9f538281f7bb0657fc697433a93775fe331b3f,2024-05-07T18:15:08.417000 +CVE-2024-34453,0,1,47a7edffe635099f1bf55d077c40113fc9f5ba8dcdeec8da8790d14933d9ceb1,2024-07-03T02:00:06.540000 +CVE-2024-34454,0,1,9c41ced14bcda502a6d91e8242ee544d71d5283ff3511493207ec7805cdb48e7,2024-07-03T02:00:07.617000 +CVE-2024-34455,0,1,c191f5457e9d706ca3323355b6cb28301bf69c793f902f33757952929305bbe5,2024-07-03T02:00:08.547000 CVE-2024-34459,0,0,b190ab894bfa61268f2171d95b164182c7b97f2f25f3dedd03418dad2239c2df,2024-06-10T18:15:34.930000 CVE-2024-3446,0,0,d41b6ff09ba21a5a975268b5a0441447c6b2bcfd6bedfe0914b9c96867cd290f,2024-04-18T08:15:38.340000 CVE-2024-34460,0,0,99c6d0d412292b29abd0eb6b005513cae3139ce4a46c3a1130ade276e61e2a09,2024-05-06T12:44:56.377000 @@ -253040,7 +253040,7 @@ CVE-2024-36549,0,0,ede738893685493385854bf4f5b6680c7d976cf01bd2e0f64b85833020e8a CVE-2024-36550,0,0,affd201d52525b08fe9dc0ac43cf536ec50f780fc23bf861db62d86c798cfc86,2024-06-06T15:24:43.683000 CVE-2024-36568,0,0,f6757785c01c43727d227a9340ded7869db334138c1e07644080e388c657d4de,2024-06-03T14:46:24.250000 CVE-2024-36569,0,0,cc62a3b4fb5fe5cf7891883c6e12ba14de517f9765eb42867751af3c3e50f0ad,2024-06-03T14:46:24.250000 -CVE-2024-3657,0,1,cc8d5e168f89f0134207e085af69525a0d15c2797a50f745be104a59afa27c9f,2024-07-02T23:15:10.747000 +CVE-2024-3657,0,0,cc8d5e168f89f0134207e085af69525a0d15c2797a50f745be104a59afa27c9f,2024-07-02T23:15:10.747000 CVE-2024-36573,0,0,fe17576bb75552079566dd5d6c7a5851d1d43b2b8ea1d59b23b3fc0b98ec48b6,2024-06-20T12:44:22.977000 CVE-2024-36574,0,0,0848b880836181907f2f643113be33bf38b0f27e048a009439c6d54141479ec7,2024-06-20T12:44:22.977000 CVE-2024-36575,0,0,5088cc8230af34a6553ab5b03d7ac65d8e6dd090c538b3da6412c983cb2c9c3d,2024-06-20T12:44:22.977000 @@ -254495,7 +254495,7 @@ CVE-2024-4461,0,0,ad05f4e37257e33f27f784f842f8dfa34f685ff06dd273bc6842a04c51c93b CVE-2024-4462,0,0,c8f7490df4b9ef7118fdef5b7ade6db6ae196f6576f8cec5720233f982c7a0b4,2024-06-04T16:57:41.053000 CVE-2024-4463,0,0,aaa5b32073fcbc7160927d348961b4790302ca7b8c414e16cdb6cacefbfd98b3,2024-05-14T16:11:39.510000 CVE-2024-4466,0,0,d6c981370b54d7938faad670495d8ca5b736025a1a2ded921b62354a18385ccc,2024-05-03T12:48:41.067000 -CVE-2024-4467,0,0,8a66aac2733c4e9f85aa4f73b772814e7ba82ba02f8b67188b34e06a80e0f43e,2024-07-02T17:44:45.700000 +CVE-2024-4467,0,1,cdbc50db3bde7e6815023f83ab9f52bf00f2b867725367d3a16d42b11160a048,2024-07-03T00:15:02.313000 CVE-2024-4468,0,0,0ca1519b3786abed41420557bdcc900f05c07970f7b2d2d6a490ebaf1139dd06,2024-06-10T02:52:08.267000 CVE-2024-4469,0,0,38345c865c5feb52902e530671fff3d9d47caec782b7e2a3a7d5d275ffe98f44,2024-05-31T13:01:46.727000 CVE-2024-4470,0,0,a1486a2c35813e6b458e62c6cab3ba58a94b094bc9cbcdae130972a477a7e8d0,2024-05-21T12:37:59.687000 @@ -254705,7 +254705,7 @@ CVE-2024-4704,0,0,77378e98186724fe19847a6f6a69faba595c66ae1f99398832716c1d97a374 CVE-2024-4705,0,0,b45f335ad46575e30510e82573f02b490faa16d9b6ee89b66a9844ff390b53aa,2024-06-06T14:17:35.017000 CVE-2024-4706,0,0,a959e13293b1a5966007eb60c79cb973f34e4d1d8bd1c12986cac54d81ac9a3d,2024-05-24T01:15:30.977000 CVE-2024-4707,0,0,d6a01a1a459dfd9ab21945d56af40919cce44b311e282118c993194b130db955,2024-06-06T14:17:35.017000 -CVE-2024-4708,1,1,881acc94ff05eae7fdad05c92bb110770656a3e7dd6d7b37456f5fc591575004,2024-07-02T23:15:10.860000 +CVE-2024-4708,0,0,881acc94ff05eae7fdad05c92bb110770656a3e7dd6d7b37456f5fc591575004,2024-07-02T23:15:10.860000 CVE-2024-4709,0,0,c27b22c30c2569acd5c758eb82bd584c5ae09da5862ed28e288bc8b8f592259a,2024-05-20T13:00:34.807000 CVE-2024-4710,0,0,500a7d3af356181a474ebd9523b50fd3ae653f9a07ad01e5b7699589bd4ccc5d,2024-05-21T12:37:59.687000 CVE-2024-4711,0,0,5c0c1fdafdfc7c3555551e67a6280882d1277b637b3ccb31a4bc6994c2c7441c,2024-06-03T14:46:24.250000 @@ -254963,7 +254963,7 @@ CVE-2024-5025,0,0,d287dc9bcba0fba1784ec3f3fe4bf65eea235ed5e6f91d741018beb442d992 CVE-2024-5031,0,0,e598ebc5c9fa457f9bece560d72de6fc8851ac943a5e7908ec776eb9202f17df,2024-05-22T12:46:53.887000 CVE-2024-5035,0,0,04b94f66274e3d3d22c52a6f453c8b285ab22579cfad76ef028d6a110e1aa148,2024-05-29T05:16:08.793000 CVE-2024-5036,0,0,e3ae54d07fb41ce4fd356143d834c0744cccfcb0f7c15179bf5d5b0f79f65ca1,2024-06-20T12:43:25.663000 -CVE-2024-5037,0,0,5a13acce718f507f5063e90d1fbe76947aa8c069dd7062440b3d79f97548841b,2024-06-18T17:04:31.360000 +CVE-2024-5037,0,1,80c31b9bbe1b67fe35a2516a9112e42ea4127092cdc83d8c5b22e5fed7ba22ed,2024-07-03T00:15:02.640000 CVE-2024-5038,0,0,06b42bf2f2d8413cc0f40932a00eaaea0786a8ef2cd369c2d799d355c720323a,2024-06-11T17:41:37.883000 CVE-2024-5039,0,0,42959b486bf28971702f84d5d970f64301a550626d1348beb35b7505e0fa75c5,2024-05-29T15:18:26.427000 CVE-2024-5040,0,0,0ff887bafdff8fcd61409221ff18cf1da08d6038e0047c0178293c334ec34d62,2024-05-22T12:46:53.887000 @@ -255766,7 +255766,7 @@ CVE-2024-6375,0,0,63966b93eb46e16d023260fad8c0d7013b7249b4716b3dc1473565015805b6 CVE-2024-6376,0,0,5b1144f575b26ee71024cb47efd50b0c100b6444589a68c6e121da4ff25018c3,2024-07-01T16:37:39.040000 CVE-2024-6381,0,0,a09652e91088f2db66780ef34f86f48ba3a9585a4235bac448c9de5b7fb0f71a,2024-07-02T18:15:03.963000 CVE-2024-6382,0,0,7e5cb9f8ced547c25e3e6457ed9c604091d0375fe07946f8cc94b1c315e5b165,2024-07-02T18:15:04.337000 -CVE-2024-6387,0,1,119ee18e010eeb6813bd9453af4572ad493a465347159d3cd0f16d446db4e68a,2024-07-02T23:15:11.140000 +CVE-2024-6387,0,0,119ee18e010eeb6813bd9453af4572ad493a465347159d3cd0f16d446db4e68a,2024-07-02T23:15:11.140000 CVE-2024-6388,0,0,e641c9d869769d4291da87145b48d15b4f200c046d6b100142bc686375a84738,2024-06-27T17:11:52.390000 CVE-2024-6402,0,0,795485c4534407e246daec51c1daaa33b95f6651688fed743a8fb9054cdaedba,2024-07-01T12:37:24.220000 CVE-2024-6403,0,0,e44b9cfa8d9ae367e624a8cdf179ef52ea1e98c2115d7a956299d17747a6a56b,2024-07-01T12:37:24.220000 @@ -255784,4 +255784,4 @@ CVE-2024-6439,0,0,1bd5e2a149e15b87b2ec1d9e23e870c4f5a97c502c5089c3f0a60fbd028209 CVE-2024-6440,0,0,4db20ef0878ff896f7a92a0fb63819a7fd586b5cd61940caee4cf26cda6cf8f9,2024-07-02T17:58:15.410000 CVE-2024-6441,0,0,fadd9560f894739af460dd107a14c73f394f82b357796461abb110045106f46c,2024-07-02T17:44:45.700000 CVE-2024-6452,0,0,c5351dc5e4a17b0c64a0b82d5ad2914d7d7c7e83140585c70101988d17ac33d5,2024-07-02T20:15:06.860000 -CVE-2024-6453,1,1,0faafa7208671919c6d294f9fee866bd817dd1e7c1c0a93b7bcb8d4db53f82c5,2024-07-02T22:15:05.077000 +CVE-2024-6453,0,0,0faafa7208671919c6d294f9fee866bd817dd1e7c1c0a93b7bcb8d4db53f82c5,2024-07-02T22:15:05.077000