diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3295.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3295.json index fb5e176444d..00d4f732605 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3295.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3295.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3295", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-17T02:15:08.917", - "lastModified": "2024-08-12T13:38:11.290", - "vulnStatus": "Modified", + "lastModified": "2024-08-15T14:29:56.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -56,6 +56,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + }, { "source": "security@wordfence.com", "type": "Secondary", diff --git a/CVE-2024/CVE-2024-210xx/CVE-2024-21067.json b/CVE-2024/CVE-2024-210xx/CVE-2024-21067.json index d212cf0c233..f6465102f33 100644 --- a/CVE-2024/CVE-2024-210xx/CVE-2024-21067.json +++ b/CVE-2024/CVE-2024-210xx/CVE-2024-21067.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21067", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:25.123", - "lastModified": "2024-04-17T12:48:31.863", + "lastModified": "2024-08-15T15:35:02.413", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuapr2024.html", diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21107.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21107.json index 8d7aa38956f..95f70db72cc 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21107.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21107.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21107", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:32.110", - "lastModified": "2024-04-17T12:48:07.510", + "lastModified": "2024-08-15T15:35:03.743", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuapr2024.html", diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21110.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21110.json index fb877e2a7a5..5c4f1be3968 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21110.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21110.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21110", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:32.617", - "lastModified": "2024-04-17T12:48:07.510", + "lastModified": "2024-08-15T15:35:04.813", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuapr2024.html", diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21114.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21114.json index f300f9ebdb6..eefab4bf708 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21114.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21114.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21114", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:33.300", - "lastModified": "2024-04-17T12:48:07.510", + "lastModified": "2024-08-15T15:35:05.830", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuapr2024.html", diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25196.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25196.json index efacac608c9..42382837393 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25196.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25196.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25196", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-20T14:15:09.160", - "lastModified": "2024-02-20T19:50:53.960", + "lastModified": "2024-08-15T14:35:01.030", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que las versiones humildes de Open Robotics Robotic Operating Sytstem 2 (ROS2) y Nav2 conten\u00edan un desbordamiento de b\u00fafer a trav\u00e9s del proceso nav2_controller. Esta vulnerabilidad se activa mediante el env\u00edo de un archivo .yaml manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/ros-planning/navigation2/issues/4005", diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28066.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28066.json index 6cde7701878..e007e78bbe3 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28066.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28066.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28066", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T13:15:08.247", - "lastModified": "2024-04-08T18:48:40.217", + "lastModified": "2024-08-15T15:35:07.070", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,46 @@ "value": "En el firmware 1.10.4.3 de Unify CP IP Phone, se utilizan credenciales d\u00e9biles (una contrase\u00f1a ra\u00edz codificada)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1391" + }, + { + "lang": "en", + "value": "CWE-259" + } + ] + } + ], "references": [ { "url": "https://syss.de", diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28741.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28741.json index 700b6c387af..858ba64b3bd 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28741.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28741.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28741", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-06T19:15:07.247", - "lastModified": "2024-04-08T18:48:40.217", + "lastModified": "2024-08-15T15:35:08.427", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de cross-site scripting en EginDemirbilek NorthStar C2 v1 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente login.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://blog.chebuya.com/posts/discovering-cve-2024-28741-remote-code-execution-on-northstar-c2-agents-via-pre-auth-stored-xss/", diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32901.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32901.json index 0fefa9964b5..49ae95b2b6a 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32901.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32901.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32901", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:54.430", - "lastModified": "2024-07-11T14:23:01.377", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-15T15:35:09.947", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33228.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33228.json index 7a2b1a97909..867d8a3ca61 100644 --- a/CVE-2024/CVE-2024-332xx/CVE-2024-33228.json +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33228.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33228", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-22T16:15:10.490", - "lastModified": "2024-05-22T18:59:20.240", + "lastModified": "2024-08-15T15:35:10.277", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en el componente segwindrvx64.sys de Insyde Software Corp SEG Windows Driver v100.00.07.02 permite a los atacantes escalar privilegios y ejecutar c\u00f3digo arbitrario mediante el env\u00edo de solicitudes IOCTL manipuladas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/DriverHunter/Win-Driver-EXP/tree/main/CVE-2024-33228", diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33960.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33960.json index 33ad29b693f..b37d17249b9 100644 --- a/CVE-2024/CVE-2024-339xx/CVE-2024-33960.json +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33960.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33960", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-08-06T12:15:49.130", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T14:08:32.490", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -51,10 +81,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:credit_card:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "10CC4BF0-06E7-433F-9902-A807B816240D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:debit_card_payment:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "EAEEFF8B-8B26-4A87-8337-845D03FBEBCF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:paypal:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1DF7E11E-26AF-4E84-AD88-110350D9D25C" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33979.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33979.json index 6a38503bd48..f8293d6a5f6 100644 --- a/CVE-2024/CVE-2024-339xx/CVE-2024-33979.json +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33979.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33979", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-08-06T11:16:06.223", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T14:07:24.257", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -51,10 +71,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:credit_card:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "10CC4BF0-06E7-433F-9902-A807B816240D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:debit_card_payment:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "EAEEFF8B-8B26-4A87-8337-845D03FBEBCF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:paypal:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1DF7E11E-26AF-4E84-AD88-110350D9D25C" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33980.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33980.json index 76ceecd8484..f9b2247b119 100644 --- a/CVE-2024/CVE-2024-339xx/CVE-2024-33980.json +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33980.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33980", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-08-06T11:16:06.477", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T14:07:53.217", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -51,10 +71,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:credit_card:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "10CC4BF0-06E7-433F-9902-A807B816240D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:debit_card_payment:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "EAEEFF8B-8B26-4A87-8337-845D03FBEBCF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:paypal:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1DF7E11E-26AF-4E84-AD88-110350D9D25C" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33981.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33981.json index e5a34251861..e3eb7ed13e0 100644 --- a/CVE-2024/CVE-2024-339xx/CVE-2024-33981.json +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33981.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33981", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-08-06T11:16:06.733", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-15T14:08:13.003", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -51,10 +71,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:credit_card:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "10CC4BF0-06E7-433F-9902-A807B816240D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:debit_card_payment:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "EAEEFF8B-8B26-4A87-8337-845D03FBEBCF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:paypal:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1DF7E11E-26AF-4E84-AD88-110350D9D25C" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37273.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37273.json index 5ef87314aae..89a55121178 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37273.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37273.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37273", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-04T19:20:15.363", - "lastModified": "2024-06-11T14:12:23.210", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-15T14:35:03.053", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37849.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37849.json index 58f92ab4eff..5340307be41 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37849.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37849.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37849", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-13T14:15:13.300", - "lastModified": "2024-08-01T18:41:11.900", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-15T15:35:11.593", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39549.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39549.json index 3418f3ed6ff..07e406c83f9 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39549.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39549.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39549", "sourceIdentifier": "sirt@juniper.net", "published": "2024-07-11T17:15:15.433", - "lastModified": "2024-07-11T18:09:58.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T14:15:56.800", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -84,6 +84,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + }, { "source": "sirt@juniper.net", "type": "Secondary", @@ -95,10 +105,757 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", + "versionEndIncluding": "21.1", + "matchCriteriaId": "6137CE1A-C9AC-4FDE-801F-E40249F902BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*", + "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "2307BF56-640F-49A8-B060-6ACB0F653A61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "737DDF96-7B1D-44E2-AD0F-E2F50858B2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s7:*:*:*:*:*:*", + "matchCriteriaId": "35E0BB39-18AE-4FAD-A528-FDFF6222DDE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*", + "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "3B457616-2D91-4913-9A7D-038BBF8F1F66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "C470FB4E-A927-4AF3-ACB0-AD1E264218B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "44E98BC3-1D43-481A-AB09-FFA502C36AAF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s7:*:*:*:*:*:*", + "matchCriteriaId": "1A0DA88F-6C61-4FEA-ABF3-99F7DD43DB0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*", + "matchCriteriaId": "06156CD6-09D3-4A05-9C5E-BC64A70640F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "786F993E-32CB-492A-A7CC-A7E4F48EA8B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "60CEA89D-BAC4-41CD-A1D1-AA5EDDEBD54A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "BC449CC7-B2D6-41CB-8D6C-81DE89E79520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*", + "matchCriteriaId": "CEB98E3F-B0A9-488F-ACFC-56B9485E7C9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "574730B0-56C8-4A03-867B-1737148ED9B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "20EBC676-1B26-4A71-8326-0F892124290A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r3:*:*:*:*:*:*", + "matchCriteriaId": "FB4C0FBF-8813-44E5-B71A-22CBAA603E2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "8BCDE58C-80CC-4C5A-9667-8A4468D8D76C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "19326769-2F08-4E61-8246-CCE7AE4483F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1379EF30-AF04-4F98-8328-52A631F24737" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "28E42A41-7965-456B-B0AF-9D3229CE4D4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "CB1A77D6-D3AD-481B-979C-8F778530B175" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "3A064B6B-A99B-4D8D-A62D-B00C7870BC30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "40813417-A938-4F74-A419-8C5188A35486" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "7FC1BA1A-DF0E-4B15-86BA-24C60E546732" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "EBB967BF-3495-476D-839A-9DBFCBE69F91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "7E5688D6-DCA4-4550-9CD1-A3D792252129" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "8494546C-00EA-49B6-B6FA-FDE42CA5B1FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "8BB98579-FA33-4E41-A162-A46E9709FBD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:-:*:*:*:*:*:*", + "matchCriteriaId": "1A78CC80-E8B1-4CDA-BB35-A61833657FA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "4B3B2FE1-C228-46BE-AC76-70C2687050AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "F1B16FF0-900F-4AEE-B670-A537139F6909" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "B227E831-30FF-4BE1-B8B2-31829A5610A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "1ADA814B-EF98-45B1-AF7A-0C89688F7CA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.4:-:*:*:*:*:*:*", + "matchCriteriaId": "78481ABC-3620-410D-BC78-334657E0BB75" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "BE8A5BA3-87BD-473A-B229-2AAB2C797005" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "8B74AC3E-8FC9-400A-A176-4F7F21F10756" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:24.2:-:*:*:*:*:*:*", + "matchCriteriaId": "89524D6D-0B22-4952-AD8E-8072C5A05D5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:24.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "AD69A194-1B03-44EA-8092-79BD10C6F729" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*", + "versionEndIncluding": "21.1", + "matchCriteriaId": "C8404916-D496-41C8-896B-24BAFE956C11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:*", + "matchCriteriaId": "620B0CDD-5566-472E-B96A-31D2C12E3120" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "3EA3DC63-B290-4D15-BEF9-21DEF36CA2EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "7E1E57AF-979B-4022-8AD6-B3558E06B718" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "144730FB-7622-4B3D-9C47-D1B7A7FB7EB0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "7BA246F0-154E-4F44-A97B-690D22FA73DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "25D6C07C-F96E-4523-BB54-7FEABFE1D1ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "2B70C784-534B-4FAA-A5ED-3709656E2B97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "60448FFB-568E-4280-9261-ADD65244F31A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "2B770C52-7E3E-4B92-9138-85DEC56F3B22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "E88AC378-461C-4EFA-A04B-5786FF21FE03" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "3B0AFB30-81DC-465C-9F63-D1B15EA4809A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "2035F0AC-29E7-478A-A9D0-BAA3A88B3413" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "C34ABD4B-B045-4046-9641-66E3B2082A25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "6D5DC04F-18DE-403B-BE93-2251F3332C1C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s7:*:*:*:*:*:*", + "matchCriteriaId": "909FC378-EBFE-4BA9-8393-0C8301438020" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*", + "matchCriteriaId": "2E907193-075E-45BC-9257-9607DB790D71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "8B73A41D-3FF5-4E53-83FF-74DF58E0D6C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "CEDF46A8-FC3A-4779-B695-2CA11D045AEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "39809219-9F87-4583-9DAD-9415DD320B36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "DB299492-A919-4EBA-A62A-B3CF02FC0A95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "74ED0939-D5F8-4334-9838-40F29DE3597F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "C6937069-8C19-4B01-8415-ED7E9EAE2CE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "97DB6DD5-F5DD-4AE1-AF2F-8DB9E18FF882" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "21DF05B8-EF7E-422F-8831-06904160714C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "492FCE45-68A1-4378-85D4-C4034FE0D836" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "522114CC-1505-4205-B4B8-797DE1BD833B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "C9D664AB-0FA7-49C7-B6E1-69C77652FBEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "9DB01252-2F11-41DB-9023-C74FD723334E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "F91450D5-F8CE-42EA-BB7E-312FCE024CD1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s7:*:*:*:*:*:*", + "matchCriteriaId": "4E616550-8711-4282-A8A1-11BD5974E650" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:-:*:*:*:*:*:*", + "matchCriteriaId": "A3CA3365-F9AF-40DF-8700-30AD4BC58E27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "D77A072D-350A-42F2-8324-7D3AC1711BF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "83AE395C-A651-4568-88E3-3600544BF799" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "C7FEFD0A-A969-4F53-8668-1231FD675D6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "B3BE1FD4-DAD9-4357-A2E9-20E5826B0D5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "81CC3480-4B65-4588-8D46-FA80A8F6D143" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "F7E76F5F-DB37-4B7F-9247-3CEB4EBD7696" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "C63DBEE5-B0C2-498F-A672-B6596C89B0A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "9370C46D-3AA1-4562-B67F-DF6EA10F209B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "1FD8C240-A7FE-4FD5-ADCC-289C1BC461BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "2FB9F20B-7683-4B0D-8D2B-5569414EBC29" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:-:*:*:*:*:*:*", + "matchCriteriaId": "BE2EF84D-55A9-41DC-A324-69E1DC426D0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "433631CA-3AC4-4D66-9B46-AEA4209347F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "6E4CD8AD-277A-4FC5-A102-3E151060C216" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "4BC09BAC-83E7-48CE-B571-ED49277B2987" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "FA4481D2-F693-48A5-8DBC-E86430987A25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "136CA584-2475-4A14-9771-F367180201D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "4546776C-A657-42E3-9A36-47F9F59A88AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r3:*:*:*:*:*:*", + "matchCriteriaId": "156DD8ED-CE6E-48C0-9E67-16B04767D62E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "10F9C2B1-BD81-4EDC-ADF5-4B0F39001C7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "61F649B0-0121-4760-9432-5F57214EFC2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:-:*:*:*:*:*:*", + "matchCriteriaId": "0A33C425-921F-4795-B834-608C8F1597E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "93887799-F62C-4A4A-BCF5-004D0B4D4154" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "62C473D2-2612-4480-82D8-8A24D0687BBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "7FB4C5CA-A709-4B13-A9E0-372098A72AD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "04CE952D-E3C1-4B34-9E65-EC52BFE887AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "8AE9D1A7-4721-4E1D-B965-FDC38126B1DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "A8643AA3-29EF-48A7-B033-CB60988E214B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "9800BA03-E6BF-4212-B2E7-69C0FD27D294" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "ACCA655D-C542-44F1-B183-4C864CFF2D4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "6D499B19-A91A-4B76-B1CB-6A07A4CB212B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:-:*:*:*:*:*:*", + "matchCriteriaId": "6DEAA7FD-385F-4221-907E-65ABC16BE4BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "DDEC008A-3137-48D1-8ABC-6DB0EFC40E50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "558D234D-BC50-415F-86D6-8E19D6C3ACE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "33F4EEEE-77E9-4973-A770-99E7BA2F05F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "A4BB6910-B994-45FD-8153-5EC00EE842E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.4:-:*:*:*:*:*:*", + "matchCriteriaId": "9D7F0D73-85EE-4A07-B51B-6BF52ECBA75E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "FE777A1F-9CD9-426E-AF1C-FBE01EB9A4A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "7147BA60-30A5-4CED-9AAF-F6BEA0528B89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:24.2:-:*:*:*:*:*:*", + "matchCriteriaId": "0DD89AAD-C615-42AF-B8AF-E6067862F0F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:24.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "28AFF11D-E418-4A76-B557-F60622602537" + } + ] + } + ] + } + ], "references": [ { "url": "https://supportportal.juniper.net/JSA83011", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-412xx/CVE-2024-41256.json b/CVE-2024/CVE-2024-412xx/CVE-2024-41256.json index 0f14f98faca..96327f623ce 100644 --- a/CVE-2024/CVE-2024-412xx/CVE-2024-41256.json +++ b/CVE-2024/CVE-2024-412xx/CVE-2024-41256.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41256", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-31T21:15:18.117", - "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-15T14:27:18.487", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,67 @@ "value": "Las configuraciones predeterminadas en la funci\u00f3n ShareProofVerifier de filestash v0.4 hacen que la aplicaci\u00f3n omita el proceso de verificaci\u00f3n del certificado TLS al enviar c\u00f3digos de verificaci\u00f3n por correo electr\u00f3nico, lo que posiblemente permita a los atacantes acceder a datos confidenciales a trav\u00e9s de un ataque de man-in-the-middle." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:filestash:filestash:*:*:*:*:*:*:*:*", + "versionEndIncluding": "0.4", + "matchCriteriaId": "F46510CC-65D9-41B7-885E-42CB8CE49494" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/nyxfqq/a6da3fe6128b978ea1aaa5df639d5f98", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-412xx/CVE-2024-41258.json b/CVE-2024/CVE-2024-412xx/CVE-2024-41258.json index 629c3fb362b..812b29b4510 100644 --- a/CVE-2024/CVE-2024-412xx/CVE-2024-41258.json +++ b/CVE-2024/CVE-2024-412xx/CVE-2024-41258.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41258", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-31T21:15:18.200", - "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-15T14:30:16.687", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,67 @@ "value": " Se descubri\u00f3 un problema en filestash v0.4. El uso de ssh.InsecureIgnoreHostKey() deshabilita la verificaci\u00f3n de la clave del host, lo que posiblemente permita a los atacantes obtener informaci\u00f3n confidencial a trav\u00e9s de un ataque de man-in-the-middle." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-347" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:filestash:filestash:*:*:*:*:*:*:*:*", + "versionEndIncluding": "0.4", + "matchCriteriaId": "F46510CC-65D9-41B7-885E-42CB8CE49494" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/nyxfqq/ed8c2ba3398c9e28cd8dbf0902bd8edf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41955.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41955.json index e749cfa6752..3f88e32e09a 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41955.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41955.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41955", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-31T20:15:06.793", - "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-15T14:10:40.157", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,14 +81,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:opensecurity:mobile_security_framework:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.0.5", + "matchCriteriaId": "1379CCAF-9D62-4D48-869D-09D6FB3D4326" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/MobSF/Mobile-Security-Framework-MobSF/commit/fdaad81314f393d324c1ede79627e9d47986c8c8", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-8m9j-2f32-2vx4", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4187.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4187.json index 9db63823675..3a5a48849f1 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4187.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4187.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4187", "sourceIdentifier": "security@opentext.com", "published": "2024-07-31T21:15:18.320", - "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-15T14:45:27.797", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,9 +59,41 @@ "baseSeverity": "LOW" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "security@opentext.com", "type": "Secondary", @@ -73,10 +105,35 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:opentext:filr:24.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "2F0872B0-D841-491D-8442-4DA5441EF1DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:opentext:filr:24.2:*:*:*:*:*:*:*", + "matchCriteriaId": "55F710C5-B6B3-4D8E-8B0D-A9891DAF5650" + } + ] + } + ] + } + ], "references": [ { "url": "https://portal.microfocus.com/s/article/KM000032291", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42477.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42477.json index 02582badb4a..129b4c8c611 100644 --- a/CVE-2024/CVE-2024-424xx/CVE-2024-42477.json +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42477.json @@ -2,17 +2,41 @@ "id": "CVE-2024-42477", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-12T15:15:21.050", - "lastModified": "2024-08-12T18:57:29.247", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T14:02:23.130", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "llama.cpp provides LLM inference in C/C++. The unsafe `type` member in the `rpc_tensor` structure can cause `global-buffer-overflow`. This vulnerability may lead to memory data leakage. The vulnerability is fixed in b3561." + }, + { + "lang": "es", + "value": "llama.cpp proporciona inferencia LLM en C/C++. El miembro \"tipo\" inseguro en la estructura \"rpc_tensor\" puede provocar un \"desbordamiento de b\u00fafer global\". Esta vulnerabilidad puede provocar una p\u00e9rdida de datos de la memoria. La vulnerabilidad est\u00e1 solucionada en b3561." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -47,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ggerganov:llama.cpp:*:*:*:*:*:*:*:*", + "versionEndExcluding": "b3561", + "matchCriteriaId": "959A4095-3418-4510-B812-74AC693D3DAC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ggerganov/llama.cpp/commit/b72942fac998672a79a1ae3c03b340f7e629980b", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/ggerganov/llama.cpp/security/advisories/GHSA-mqp6-7pv6-fqjf", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42478.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42478.json index 0fae48d3ad2..d28de136ab2 100644 --- a/CVE-2024/CVE-2024-424xx/CVE-2024-42478.json +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42478.json @@ -2,17 +2,41 @@ "id": "CVE-2024-42478", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-12T15:15:21.277", - "lastModified": "2024-08-12T18:57:29.247", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T14:03:32.867", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "llama.cpp provides LLM inference in C/C++. The unsafe `data` pointer member in the `rpc_tensor` structure can cause arbitrary address reading. This vulnerability is fixed in b3561." + }, + { + "lang": "es", + "value": "llama.cpp proporciona inferencia LLM en C/C++. El miembro puntero \"datos\" inseguro en la estructura \"rpc_tensor\" puede provocar una lectura de direcci\u00f3n arbitraria. Esta vulnerabilidad se soluciona en b3561." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -47,14 +81,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ggerganov:llama.cpp:*:*:*:*:*:*:*:*", + "versionEndExcluding": "b3561", + "matchCriteriaId": "959A4095-3418-4510-B812-74AC693D3DAC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ggerganov/llama.cpp/commit/b72942fac998672a79a1ae3c03b340f7e629980b", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/ggerganov/llama.cpp/security/advisories/GHSA-5vm9-p64x-gqw9", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42479.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42479.json index 46d7cb11c87..6ea86189000 100644 --- a/CVE-2024/CVE-2024-424xx/CVE-2024-42479.json +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42479.json @@ -2,17 +2,41 @@ "id": "CVE-2024-42479", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-12T15:15:21.490", - "lastModified": "2024-08-12T18:57:29.247", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T14:03:53.203", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "llama.cpp provides LLM inference in C/C++. The unsafe `data` pointer member in the `rpc_tensor` structure can cause arbitrary address writing. This vulnerability is fixed in b3561." + }, + { + "lang": "es", + "value": "llama.cpp proporciona inferencia LLM en C/C++. El miembro puntero \"datos\" inseguro en la estructura \"rpc_tensor\" puede provocar la escritura de direcciones arbitrarias. Esta vulnerabilidad se soluciona en b3561." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -47,14 +81,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ggerganov:llama.cpp:*:*:*:*:*:*:*:*", + "versionEndExcluding": "b3561", + "matchCriteriaId": "959A4095-3418-4510-B812-74AC693D3DAC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ggerganov/llama.cpp/commit/b72942fac998672a79a1ae3c03b340f7e629980b", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/ggerganov/llama.cpp/security/advisories/GHSA-wcr5-566p-9cwj", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42676.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42676.json new file mode 100644 index 00000000000..23eabb8263a --- /dev/null +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42676.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42676", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T14:15:10.683", + "lastModified": "2024-08-15T14:15:10.683", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "File Upload vulnerability in Huizhi enterprise resource management system v.1.0 and before allows a remote attacker to execute arbitrary code via the /nssys/common/Upload. Aspx? Action=DNPageAjaxPostBack component" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/WarmBrew/web_vul/blob/main/HZ-cve/HZupload.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42677.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42677.json new file mode 100644 index 00000000000..78cac721268 --- /dev/null +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42677.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42677", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T14:15:10.813", + "lastModified": "2024-08-15T14:15:10.813", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in Huizhi enterprise resource management system v.1.0 and before allows a local attacker to obtain sensitive information via the /nssys/common/filehandle. Aspx component" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/WarmBrew/web_vul/blob/main/HZ-cve/HZlfi.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42678.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42678.json new file mode 100644 index 00000000000..a4a0db047fa --- /dev/null +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42678.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-42678", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T14:15:10.910", + "lastModified": "2024-08-15T15:35:13.793", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Scripting vulnerability in Super easy enterprise management system v.1.0.0 and before allows a local attacker to execute arbitrary code via a crafted script to the /WebSet/DlgGridSet.html component." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/WarmBrew/web_vul/blob/main/CYGLXT/CYxss.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42679.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42679.json new file mode 100644 index 00000000000..087876b784d --- /dev/null +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42679.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42679", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T14:15:11.003", + "lastModified": "2024-08-15T14:15:11.003", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Injection vulnerability in Super easy enterprise management system v.1.0.0 and before allows a local attacker to execute arbitrary code via a crafted script to the/ajax/Login.ashx component." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/WarmBrew/web_vul/blob/main/CYGLXT/CYsqli.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42680.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42680.json new file mode 100644 index 00000000000..399ffd5527c --- /dev/null +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42680.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42680", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T14:15:11.107", + "lastModified": "2024-08-15T14:15:11.107", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in Super easy enterprise management system v.1.0.0 and before allows a local attacker to obtain the server absolute path by entering a single quotation mark." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/WarmBrew/web_vul/blob/main/CYGLXT/CYinfo.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42744.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42744.json index c55326a4407..9a6b0954eb0 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42744.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42744.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42744", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-12T20:15:09.110", - "lastModified": "2024-08-13T17:10:12.157", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-15T15:35:14.590", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43373.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43373.json new file mode 100644 index 00000000000..7d9b22b83f8 --- /dev/null +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43373.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-43373", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-15T15:15:21.217", + "lastModified": "2024-08-15T15:15:21.217", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "webcrack is a tool for reverse engineering javascript. An arbitrary file write vulnerability exists in the webcrack module when processing specifically crafted malicious code on Windows systems. This vulnerability is triggered when using the unpack bundles feature in conjunction with the saving feature. If a module name includes a path traversal sequence with Windows path separators, an attacker can exploit this to overwrite files on the host system. This vulnerability allows an attacker to write arbitrary `.js` files to the host system, which can be leveraged to hijack legitimate Node.js modules to gain arbitrary code execution. This vulnerability has been patched in version 2.14.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.3 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + }, + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/j4k0xb/webcrack/blob/241f9469e6401f3dabc6373233d85a5e76966b54/packages/webcrack/src/unpack/bundle.ts#L79", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/j4k0xb/webcrack/commit/4bc5c6f353012ee7edc2cb39d01a728ab7426999", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/j4k0xb/webcrack/security/advisories/GHSA-ccqh-278p-xq6w", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6347.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6347.json new file mode 100644 index 00000000000..6cfa1d36d34 --- /dev/null +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6347.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2024-6347", + "sourceIdentifier": "cve@asrg.io", + "published": "2024-08-15T15:15:22.093", + "lastModified": "2024-08-15T15:15:22.093", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "* Unprotected privileged mode access through UDS session in the Blind Spot Detection Sensor ECU firmware in Nissan Altima (2022) allows attackers to trigger denial-of-service (DoS) by unauthorized access to the ECU's programming session.\n * No preconditions implemented for ECU management functionality through UDS session in the Blind Spot Detection Sensor ECU in Nissan Altima (2022) allows attackers to disrupt normal ECU operations by triggering a control command without authentication." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cve@asrg.io", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:X/V:D/RE:H/U:X", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "YES", + "recovery": "NOT_DEFINED", + "valueDensity": "DIFFUSE", + "vulnerabilityResponseEffort": "HIGH", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "weaknesses": [ + { + "source": "cve@asrg.io", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + }, + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "references": [ + { + "url": "https://asrg.io/security-advisories/CVE-2024-6347", + "source": "cve@asrg.io" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6392.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6392.json index 33765b0c376..f53b05e0317 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6392.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6392.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6392", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-11T22:15:02.820", - "lastModified": "2024-07-12T12:49:07.030", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-15T14:56:16.490", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,18 +39,57 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sirv:sirv:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "7.2.8", + "matchCriteriaId": "479CF10B-EE73-452F-BA16-3E26143812EE" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/sirv/tags/7.2.6/sirv.php#L5197", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/sirv/tags/7.2.6/sirv.php#L5338", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/229490c3-d820-4831-b105-a429512c2c60?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7262.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7262.json new file mode 100644 index 00000000000..d6d77754c7b --- /dev/null +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7262.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-7262", + "sourceIdentifier": "security@eset.com", + "published": "2024-08-15T15:15:22.290", + "lastModified": "2024-08-15T15:15:22.290", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper path validation in promecefpluginhost.exe in Kingsoft WPS Office version ranging from 12.2.0.13110 to 12.2.0.13489 on Windows allows an attacker to load an arbitrary Windows library.\nUsing the MHTML format allows an attacker to automatically deliver a malicious library on opening the document and a single user click on a crafted hyperlink leads to the execution of the library." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@eset.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:L/U:X", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NO", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "LOW", + "providerUrgency": "NOT_DEFINED", + "baseScore": 9.3, + "baseSeverity": "CRITICAL" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@eset.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://www.wps.com/whatsnew/pc/20240422/", + "source": "security@eset.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7263.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7263.json new file mode 100644 index 00000000000..a2c27c9564b --- /dev/null +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7263.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-7263", + "sourceIdentifier": "security@eset.com", + "published": "2024-08-15T15:15:22.453", + "lastModified": "2024-08-15T15:15:22.453", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper path validation in promecefpluginhost.exe in Kingsoft WPS Office version ranging from 12.2.0.13110 to 12.2.0.13489 on Windows allows an attacker to load an arbitrary Windows library.\nThe patch released in version 12.2.0.16909 to mitigate CVE-2024-7262 was not restrictive enough. Another hyperlink parameter was not properly sanitized which leads to the execution of an arbitrary Windows library." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@eset.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NO", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 9.3, + "baseSeverity": "CRITICAL" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@eset.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://www.wps.com/whatsnew/pc/20240422/", + "source": "security@eset.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7715.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7715.json index 338e9b67961..817ebe59e55 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7715.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7715.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7715", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-13T07:15:13.677", - "lastModified": "2024-08-14T21:15:17.320", + "lastModified": "2024-08-15T15:15:22.690", "vulnStatus": "Awaiting Analysis", "cveTags": [ { diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7829.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7829.json index bc92259097b..efa69d5b89f 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7829.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7829.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7829", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-15T13:15:14.107", - "lastModified": "2024-08-15T13:33:37.047", + "lastModified": "2024-08-15T14:15:13.560", "vulnStatus": "Awaiting Analysis", "cveTags": [ { diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7830.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7830.json index a49439aeb3b..7f8705a3635 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7830.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7830.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7830", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-15T13:15:14.617", - "lastModified": "2024-08-15T13:33:37.047", + "lastModified": "2024-08-15T15:15:25.340", "vulnStatus": "Awaiting Analysis", "cveTags": [ { diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7831.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7831.json index a2bffc45ec5..d71483c8677 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7831.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7831.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7831", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-15T13:15:15.107", - "lastModified": "2024-08-15T13:33:37.047", + "lastModified": "2024-08-15T15:15:25.947", "vulnStatus": "Awaiting Analysis", "cveTags": [ { diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7832.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7832.json new file mode 100644 index 00000000000..43a406b0bc2 --- /dev/null +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7832.json @@ -0,0 +1,144 @@ +{ + "id": "CVE-2024-7832", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-15T14:15:14.210", + "lastModified": "2024-08-15T14:15:14.210", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cna@vuldb.com", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814 and classified as critical. Affected by this issue is the function cgi_get_fullscreen_photos of the file /cgi-bin/photocenter_mgr.cgi. The manipulation of the argument user leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_get_fullscreen_photos.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274730", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274730", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.390120", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7833.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7833.json new file mode 100644 index 00000000000..fb681179fd6 --- /dev/null +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7833.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7833", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-15T14:15:14.720", + "lastModified": "2024-08-15T14:15:14.720", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in D-Link DI-8100 16.07. It has been classified as critical. This affects the function upgrade_filter_asp of the file upgrade_filter.asp. The manipulation of the argument path leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/aLtEr6/pdf/blob/main/3.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274731", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274731", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.385338", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index b49e9fd42d9..f79ba2537d2 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-08-15T14:00:17.410441+00:00 +2024-08-15T16:00:29.207261+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-08-15T13:59:35.813000+00:00 +2024-08-15T15:35:14.590000+00:00 ``` ### Last Data Feed Release @@ -33,48 +33,55 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -260093 +260104 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `11` -- [CVE-2024-7828](CVE-2024/CVE-2024-78xx/CVE-2024-7828.json) (`2024-08-15T13:15:13.197`) -- [CVE-2024-7829](CVE-2024/CVE-2024-78xx/CVE-2024-7829.json) (`2024-08-15T13:15:14.107`) -- [CVE-2024-7830](CVE-2024/CVE-2024-78xx/CVE-2024-7830.json) (`2024-08-15T13:15:14.617`) -- [CVE-2024-7831](CVE-2024/CVE-2024-78xx/CVE-2024-7831.json) (`2024-08-15T13:15:15.107`) +- [CVE-2024-42676](CVE-2024/CVE-2024-426xx/CVE-2024-42676.json) (`2024-08-15T14:15:10.683`) +- [CVE-2024-42677](CVE-2024/CVE-2024-426xx/CVE-2024-42677.json) (`2024-08-15T14:15:10.813`) +- [CVE-2024-42678](CVE-2024/CVE-2024-426xx/CVE-2024-42678.json) (`2024-08-15T14:15:10.910`) +- [CVE-2024-42679](CVE-2024/CVE-2024-426xx/CVE-2024-42679.json) (`2024-08-15T14:15:11.003`) +- [CVE-2024-42680](CVE-2024/CVE-2024-426xx/CVE-2024-42680.json) (`2024-08-15T14:15:11.107`) +- [CVE-2024-43373](CVE-2024/CVE-2024-433xx/CVE-2024-43373.json) (`2024-08-15T15:15:21.217`) +- [CVE-2024-6347](CVE-2024/CVE-2024-63xx/CVE-2024-6347.json) (`2024-08-15T15:15:22.093`) +- [CVE-2024-7262](CVE-2024/CVE-2024-72xx/CVE-2024-7262.json) (`2024-08-15T15:15:22.290`) +- [CVE-2024-7263](CVE-2024/CVE-2024-72xx/CVE-2024-7263.json) (`2024-08-15T15:15:22.453`) +- [CVE-2024-7832](CVE-2024/CVE-2024-78xx/CVE-2024-7832.json) (`2024-08-15T14:15:14.210`) +- [CVE-2024-7833](CVE-2024/CVE-2024-78xx/CVE-2024-7833.json) (`2024-08-15T14:15:14.720`) ### CVEs modified in the last Commit -Recently modified CVEs: `65` +Recently modified CVEs: `30` -- [CVE-2024-7462](CVE-2024/CVE-2024-74xx/CVE-2024-7462.json) (`2024-08-15T13:16:26.113`) -- [CVE-2024-7463](CVE-2024/CVE-2024-74xx/CVE-2024-7463.json) (`2024-08-15T13:15:55.170`) -- [CVE-2024-7464](CVE-2024/CVE-2024-74xx/CVE-2024-7464.json) (`2024-08-15T13:15:28.367`) -- [CVE-2024-7465](CVE-2024/CVE-2024-74xx/CVE-2024-7465.json) (`2024-08-15T13:11:59.413`) -- [CVE-2024-7507](CVE-2024/CVE-2024-75xx/CVE-2024-7507.json) (`2024-08-15T13:01:10.150`) -- [CVE-2024-7513](CVE-2024/CVE-2024-75xx/CVE-2024-7513.json) (`2024-08-15T13:01:10.150`) -- [CVE-2024-7515](CVE-2024/CVE-2024-75xx/CVE-2024-7515.json) (`2024-08-15T13:01:10.150`) -- [CVE-2024-7624](CVE-2024/CVE-2024-76xx/CVE-2024-7624.json) (`2024-08-15T13:01:10.150`) -- [CVE-2024-7625](CVE-2024/CVE-2024-76xx/CVE-2024-7625.json) (`2024-08-15T13:01:10.150`) -- [CVE-2024-7628](CVE-2024/CVE-2024-76xx/CVE-2024-7628.json) (`2024-08-15T13:01:10.150`) -- [CVE-2024-7792](CVE-2024/CVE-2024-77xx/CVE-2024-7792.json) (`2024-08-15T13:01:10.150`) -- [CVE-2024-7793](CVE-2024/CVE-2024-77xx/CVE-2024-7793.json) (`2024-08-15T13:01:10.150`) -- [CVE-2024-7794](CVE-2024/CVE-2024-77xx/CVE-2024-7794.json) (`2024-08-15T13:01:10.150`) -- [CVE-2024-7797](CVE-2024/CVE-2024-77xx/CVE-2024-7797.json) (`2024-08-15T13:01:10.150`) -- [CVE-2024-7798](CVE-2024/CVE-2024-77xx/CVE-2024-7798.json) (`2024-08-15T13:01:10.150`) -- [CVE-2024-7799](CVE-2024/CVE-2024-77xx/CVE-2024-7799.json) (`2024-08-15T13:01:10.150`) -- [CVE-2024-7800](CVE-2024/CVE-2024-78xx/CVE-2024-7800.json) (`2024-08-15T13:01:10.150`) -- [CVE-2024-7808](CVE-2024/CVE-2024-78xx/CVE-2024-7808.json) (`2024-08-15T13:01:10.150`) -- [CVE-2024-7809](CVE-2024/CVE-2024-78xx/CVE-2024-7809.json) (`2024-08-15T13:01:10.150`) -- [CVE-2024-7810](CVE-2024/CVE-2024-78xx/CVE-2024-7810.json) (`2024-08-15T13:01:10.150`) -- [CVE-2024-7811](CVE-2024/CVE-2024-78xx/CVE-2024-7811.json) (`2024-08-15T13:01:10.150`) -- [CVE-2024-7812](CVE-2024/CVE-2024-78xx/CVE-2024-7812.json) (`2024-08-15T13:01:10.150`) -- [CVE-2024-7813](CVE-2024/CVE-2024-78xx/CVE-2024-7813.json) (`2024-08-15T13:01:10.150`) -- [CVE-2024-7814](CVE-2024/CVE-2024-78xx/CVE-2024-7814.json) (`2024-08-15T13:01:10.150`) -- [CVE-2024-7815](CVE-2024/CVE-2024-78xx/CVE-2024-7815.json) (`2024-08-15T13:01:10.150`) +- [CVE-2024-25196](CVE-2024/CVE-2024-251xx/CVE-2024-25196.json) (`2024-08-15T14:35:01.030`) +- [CVE-2024-28066](CVE-2024/CVE-2024-280xx/CVE-2024-28066.json) (`2024-08-15T15:35:07.070`) +- [CVE-2024-28741](CVE-2024/CVE-2024-287xx/CVE-2024-28741.json) (`2024-08-15T15:35:08.427`) +- [CVE-2024-32901](CVE-2024/CVE-2024-329xx/CVE-2024-32901.json) (`2024-08-15T15:35:09.947`) +- [CVE-2024-33228](CVE-2024/CVE-2024-332xx/CVE-2024-33228.json) (`2024-08-15T15:35:10.277`) +- [CVE-2024-33960](CVE-2024/CVE-2024-339xx/CVE-2024-33960.json) (`2024-08-15T14:08:32.490`) +- [CVE-2024-33979](CVE-2024/CVE-2024-339xx/CVE-2024-33979.json) (`2024-08-15T14:07:24.257`) +- [CVE-2024-33980](CVE-2024/CVE-2024-339xx/CVE-2024-33980.json) (`2024-08-15T14:07:53.217`) +- [CVE-2024-33981](CVE-2024/CVE-2024-339xx/CVE-2024-33981.json) (`2024-08-15T14:08:13.003`) +- [CVE-2024-37273](CVE-2024/CVE-2024-372xx/CVE-2024-37273.json) (`2024-08-15T14:35:03.053`) +- [CVE-2024-37849](CVE-2024/CVE-2024-378xx/CVE-2024-37849.json) (`2024-08-15T15:35:11.593`) +- [CVE-2024-39549](CVE-2024/CVE-2024-395xx/CVE-2024-39549.json) (`2024-08-15T14:15:56.800`) +- [CVE-2024-41256](CVE-2024/CVE-2024-412xx/CVE-2024-41256.json) (`2024-08-15T14:27:18.487`) +- [CVE-2024-41258](CVE-2024/CVE-2024-412xx/CVE-2024-41258.json) (`2024-08-15T14:30:16.687`) +- [CVE-2024-4187](CVE-2024/CVE-2024-41xx/CVE-2024-4187.json) (`2024-08-15T14:45:27.797`) +- [CVE-2024-41955](CVE-2024/CVE-2024-419xx/CVE-2024-41955.json) (`2024-08-15T14:10:40.157`) +- [CVE-2024-42477](CVE-2024/CVE-2024-424xx/CVE-2024-42477.json) (`2024-08-15T14:02:23.130`) +- [CVE-2024-42478](CVE-2024/CVE-2024-424xx/CVE-2024-42478.json) (`2024-08-15T14:03:32.867`) +- [CVE-2024-42479](CVE-2024/CVE-2024-424xx/CVE-2024-42479.json) (`2024-08-15T14:03:53.203`) +- [CVE-2024-42744](CVE-2024/CVE-2024-427xx/CVE-2024-42744.json) (`2024-08-15T15:35:14.590`) +- [CVE-2024-6392](CVE-2024/CVE-2024-63xx/CVE-2024-6392.json) (`2024-08-15T14:56:16.490`) +- [CVE-2024-7715](CVE-2024/CVE-2024-77xx/CVE-2024-7715.json) (`2024-08-15T15:15:22.690`) +- [CVE-2024-7829](CVE-2024/CVE-2024-78xx/CVE-2024-7829.json) (`2024-08-15T14:15:13.560`) +- [CVE-2024-7830](CVE-2024/CVE-2024-78xx/CVE-2024-7830.json) (`2024-08-15T15:15:25.340`) +- [CVE-2024-7831](CVE-2024/CVE-2024-78xx/CVE-2024-7831.json) (`2024-08-15T15:15:25.947`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 6c12c960e55..e08859b8a8e 100644 --- a/_state.csv +++ b/_state.csv @@ -38965,7 +38965,7 @@ CVE-2009-2342,0,0,bd361e0c361ffcb58198046b104cd344fec855308751fbf9b8543fb20662ad CVE-2009-2343,0,0,36fa2598eb0d1daa450bf98f137eb9c3b109069bf3f5f91006700edc944a5db8,2009-07-09T04:00:00 CVE-2009-2344,0,0,9ab1c363a1f2e2e922458f65185e385879b1d11cd6551608da71910a7f97e130,2018-10-10T19:39:42.070000 CVE-2009-2345,0,0,a03c3c886f0080334a3b487fc57f64ff1f299c447418e92da4613f0e0e750174,2009-07-08T04:00:00 -CVE-2009-2346,0,1,07d715f1f1489a7912845d12e53de3399a78ab09a7a308f742ffa2875013dddb,2024-08-15T12:44:24.983000 +CVE-2009-2346,0,0,07d715f1f1489a7912845d12e53de3399a78ab09a7a308f742ffa2875013dddb,2024-08-15T12:44:24.983000 CVE-2009-2347,0,0,0bfda6df611f0dae5b28e14e6839bd58dc25a5eb7d7cb4bb0f298f9cfb066304,2018-10-10T19:39:43.400000 CVE-2009-2348,0,0,bff53c90c61cbd6c88f363956b7bc5d7ce5b7d7ff52c9b1f4d39936b3922858b,2023-11-07T02:04:06.660000 CVE-2009-2350,0,0,ad3ea17c88643ef0b133a72a8f8b77e72961684cb137ca7189445614d9b44687,2018-10-10T19:39:47.587000 @@ -40316,7 +40316,7 @@ CVE-2009-3719,0,0,11975cf9055b3e784b5c65acee70145bf160b50d3cec2aca9993dc6c427ba3 CVE-2009-3720,0,0,e71e0c5edea7c31da12665b1c02a1ca0df518b2c8b5a3b7bffe471c157566195,2024-02-22T03:40:48.837000 CVE-2009-3721,0,0,71db801e2c9f36d381b0654132fb6baf92502a3dd9534cb18b869f1ba816b497,2021-06-04T15:34:14.673000 CVE-2009-3722,0,0,c74f9d22c998b93361153712fadd90e24d74f26c7dc35e38984a88d80fcd4cae,2023-02-13T01:17:49.517000 -CVE-2009-3723,0,1,afe7b6ea46b5d2e05afad857c72ec74ce1b77724f0cfdca4fcc12da5be54a612,2024-08-15T12:44:24.983000 +CVE-2009-3723,0,0,afe7b6ea46b5d2e05afad857c72ec74ce1b77724f0cfdca4fcc12da5be54a612,2024-08-15T12:44:24.983000 CVE-2009-3724,0,0,8963981ad474f106cf02c7b0b8b68158e13442ec2db6ed2a176b696c861a2e56,2020-01-16T17:56:50.210000 CVE-2009-3725,0,0,6bd8b6865c7e2f3b6831f91a849ea4c829483fcd913ee73613ead3ee798fd4fd,2018-11-16T15:46:38.050000 CVE-2009-3726,0,0,d73858dbb3a7004621a28fa2df49b6c4647b8b9f4d61b249e7fb7cd87a0c5ca1,2023-02-13T02:20:32.797000 @@ -53818,7 +53818,7 @@ CVE-2012-2181,0,0,12b117fa503f2cee6c0dbb1cf3c70f9bbea4d04a441cd5bc6b9ba84e603cf0 CVE-2012-2183,0,0,d0032a3297bb3c070d3dae1d16fd7e73b6f3fd1f89aca8f233fb19d0bcaeccd4,2017-08-29T01:31:33.100000 CVE-2012-2184,0,0,22b090b918f6c2bedd96509827f3f9f210893317595f207d931ed745c9367085,2017-08-29T01:31:33.147000 CVE-2012-2185,0,0,474e8caf44f427bab3f656c21ad6c4a5cd481231df2278da9e07fe87c671e31b,2017-08-29T01:31:33.210000 -CVE-2012-2186,0,1,d735d6061ce9251a18cb3830b02d927b631dddc82ba309bf0b1c7b630268ef78,2024-08-15T12:44:24.983000 +CVE-2012-2186,0,0,d735d6061ce9251a18cb3830b02d927b631dddc82ba309bf0b1c7b630268ef78,2024-08-15T12:44:24.983000 CVE-2012-2187,0,0,d158e18f6afc338349731ff747fa2d6323158b84f52ea312eac46527fb875a96,2013-02-12T05:08:29.460000 CVE-2012-2188,0,0,9ac7776acbcde4fb27c51cfc3ae6ee100436645aacfc1889f9dd6700c1da51d3,2017-08-29T01:31:33.290000 CVE-2012-2190,0,0,b3030aa86774d8d9a8e64981329b18597344c5f658700d2f57bf3ade64fca8a7,2017-08-29T01:31:33.350000 @@ -54478,7 +54478,7 @@ CVE-2012-2943,0,0,0767499135c00b9fd412a866c41e5fb1ec2995fb36c21f3d7557320e102fc9 CVE-2012-2944,0,0,422e394f62a6c6efcdd756412ae6b3808b7a86f7cdb77d582b3ba7d01c151a21,2018-01-05T02:29:32.837000 CVE-2012-2945,0,0,a0cbeccbe1b74716a39e13cc040f5c6d9e4724c522dfae1e2ca86a5e2d3bbf4c,2019-10-31T01:09:56.767000 CVE-2012-2947,0,0,589189191f132548c7419c1b1d8f949215801bc7e15542e0f0e1bcd1ac30d997,2017-11-13T16:44:23.247000 -CVE-2012-2948,0,1,8492072bd0443dce647824926aa625e3846f32176f24d3aaac2e7bcbf9979981,2024-08-15T12:44:24.983000 +CVE-2012-2948,0,0,8492072bd0443dce647824926aa625e3846f32176f24d3aaac2e7bcbf9979981,2024-08-15T12:44:24.983000 CVE-2012-2949,0,0,f162bd7a8ce3c5740295d8654ac1648063fb445e9c7cdeae7efe869bae08ed9b,2023-11-07T02:11:28.320000 CVE-2012-2950,0,0,7999b62e856fcaa9952cf2ddd7b772b30aab5f4cb3c2ddd057c3023a6eeb1357,2020-01-22T20:32:54.300000 CVE-2012-2951,0,0,10b13d4c37cc98202bf612867cec5c480c17a7ca662582155b9f66749fd011d1,2023-11-07T02:11:28.380000 @@ -109162,7 +109162,7 @@ CVE-2017-9353,0,0,77ae59d89b3447288f6b49e12f88473541447ca5b59ecf2d6cf0b8df8ce8aa CVE-2017-9354,0,0,74bbea4f38aa38b1d500ede1eb09ebbee7152879053608afcb71182b73744196,2023-11-07T02:50:45.430000 CVE-2017-9355,0,0,02dff81f45a6ca2763e2c32f680838df88d807f7a0bbbd608ef51e28cc51fef8,2017-08-13T01:29:23.523000 CVE-2017-9356,0,0,4749a20821d119bd219794fe7f7a983ce4f45d0a3ed9b7355cf2ad2ec330d3bd,2017-07-03T14:22:15.027000 -CVE-2017-9358,0,1,4258e2ed4b3e6695e1ecad914e48af27c0b537a6af0deb81776563836e518100,2024-08-15T12:44:24.983000 +CVE-2017-9358,0,0,4258e2ed4b3e6695e1ecad914e48af27c0b537a6af0deb81776563836e518100,2024-08-15T12:44:24.983000 CVE-2017-9359,0,0,2368321c04ceb311f621a1797010d5c1e4caec96be51d83047a784b9e629856f,2017-11-05T01:29:02.927000 CVE-2017-9360,0,0,27af1527e8bd8cb56bf2337ef3112354ffc971aeee812bae89f132b10193e916,2017-06-06T20:24:18.207000 CVE-2017-9361,0,0,7e2dadd9afff52eb2d5eb35231870617f265bf9fb44ebe5e2297f75681ffafef,2017-06-06T20:22:01.503000 @@ -113221,7 +113221,7 @@ CVE-2018-12222,0,0,cd594ade51c94d0f99c34c14f8add57c93e4d3db7f36434a71ca1947b30de CVE-2018-12223,0,0,2a195e3a8b8184df110572fc1870d7c2c5cbe4ffe1ea713b5062d1b4a7564646,2019-10-03T00:03:26.223000 CVE-2018-12224,0,0,962c04fd6b14f784f6830c7b1410be9e1be28ddf64a003e6aca217329378b58a,2019-04-04T19:29:01.197000 CVE-2018-12227,0,0,e3dc78a26288f1ec7ee409d718263fc2f9d76c11c03ed4914627c73f2bb75876,2019-03-29T16:22:30.603000 -CVE-2018-12228,0,1,9b43e2e7a7d7b2cd95d3264f52a35577e70170220eacfc60b2345eb23a196fe2,2024-08-15T12:44:24.983000 +CVE-2018-12228,0,0,9b43e2e7a7d7b2cd95d3264f52a35577e70170220eacfc60b2345eb23a196fe2,2024-08-15T12:44:24.983000 CVE-2018-12229,0,0,25183f6fb4e14d66039ab1217619d8e91e185df98f3098342ce6974b7841295c,2018-08-08T18:32:54.820000 CVE-2018-1223,0,0,7241c05835c252b2e511784df2672a05abace94e20818ac4eff57055d327105f,2020-03-09T13:45:00.793000 CVE-2018-12230,0,0,949409450595b73389c4fb9a6505293c7e02d87eb32957efe4e3f6a66ef687c6,2018-09-11T12:03:15.493000 @@ -156697,7 +156697,7 @@ CVE-2020-28221,0,0,b11d94bc598da000ee9b78f24e2814eb8c0c04f20c200e02f257adb800ce4 CVE-2020-2823,0,0,6b68b4bbe504bd86d617b8c125a3a1ceca54ef19c0f43738de3a8c82409f9112,2020-04-17T16:13:29.850000 CVE-2020-2824,0,0,180a2152fd5c33c4ccc27b192f0d24b040b80007cae66423829dbad240e887f0,2020-04-17T15:48:59.597000 CVE-2020-28241,0,0,4ca96ae72dcaba86c7464f7628625868cb320e96f441934f45770a98fdc59388,2023-11-07T03:21:08.773000 -CVE-2020-28242,0,1,070b828b2605ab0855888bd7f0deb32282a00ff152c4ce89f27a5f211bd6b359,2024-08-15T12:44:24.983000 +CVE-2020-28242,0,0,070b828b2605ab0855888bd7f0deb32282a00ff152c4ce89f27a5f211bd6b359,2024-08-15T12:44:24.983000 CVE-2020-28243,0,0,ff545549e2630bab3a1ae46b88c90b9340db8e930c79e67f90052cce6f11f301,2023-12-21T18:31:01.147000 CVE-2020-28246,0,0,920a15c00fde9dba9eef987095ad655f584207e7e2e5552e4bcc4fb5e0f9bede,2024-08-04T17:15:36.533000 CVE-2020-28247,0,0,ed4051a79440da97fc22222cf7fdc82e25006815ee2f79f479d486711bda5fd0,2021-01-29T01:00:46.653000 @@ -156773,7 +156773,7 @@ CVE-2020-28323,0,0,0279ea3556e7bb10a45900b2665d842e0cd7ec34817a16271c11abce46b85 CVE-2020-28324,0,0,4c3da1c0a596b6978bf1d7c3b41b14a088a58cd5c0310f7f04a7df27f27d1f43,2023-11-07T03:21:19.213000 CVE-2020-28325,0,0,2266b22dd81c5e68286c4a64367eb1fc60323d8d718ac805b66c00371a2a0286,2023-11-07T03:21:19.453000 CVE-2020-28326,0,0,27cae8c50e4c1de97c5d9d314379f52f5de9609b63408f6f180947df66bdc139,2023-11-07T03:21:19.687000 -CVE-2020-28327,0,1,0c504b9213de0da76a43c443b8c2eb38db819606e565b20795bd81ad31ca56d2,2024-08-15T12:44:24.983000 +CVE-2020-28327,0,0,0c504b9213de0da76a43c443b8c2eb38db819606e565b20795bd81ad31ca56d2,2024-08-15T12:44:24.983000 CVE-2020-28328,0,0,fed7b032c0d9d4c0dc0bdfd701dafd144718e9468ae6f60c2482e1307a36c77d,2021-12-02T19:23:31.560000 CVE-2020-28329,0,0,662780921005238035baea1eb3d4b8c93202351f28686648d059bfd5ccf76613,2020-12-04T18:30:39.837000 CVE-2020-2833,0,0,3d3fc2dae6d5321a3c7f51c3a73e20d9bd91a7ce445b10c0714b2b803210f78f,2020-04-17T17:12:25.927000 @@ -224736,7 +224736,7 @@ CVE-2023-3291,0,0,00fc96abca2c8a545f91e8bae7ebecfa7718dc43d0e1342f2015e152babb98 CVE-2023-3292,0,0,b8ef5306ce74b9329b1620092abdf02378458b4d99143d5d695cd947fdd9bb06,2023-11-07T04:18:24.753000 CVE-2023-3293,0,0,72720dc679e6136c56dea1818ea89a7c6e888dfcb7dd739b8f7bb9a85a705eb5,2023-06-22T21:30:35.250000 CVE-2023-3294,0,0,1b4b00e0f705616d410fa9b39e1092447f9eed6300fb3dc7ef135392d7ad651f,2023-06-23T21:26:49.927000 -CVE-2023-3295,0,0,e779ba829a6c7d52ccc35560a769470cd0c0a23af3caba3e359a5d5a3ab56dc1,2024-08-12T13:38:11.290000 +CVE-2023-3295,0,1,704c26997561313920882ef0f5ef791d87fe1841ab000824e92df70b9b0fb48f,2024-08-15T14:29:56.513000 CVE-2023-32955,0,0,61d0e49080cedd0522d34227a5c22e22b65390bc79180c9847f44956574b84ba,2023-11-07T04:14:43.563000 CVE-2023-32956,0,0,6d79fbebbb8abd430f92328682c7425ff22687ac72560487627c14368840946b,2023-11-07T04:14:43.633000 CVE-2023-32957,0,0,b9c2446981231de3a55c46ec344d8368a4af380806615df14b0a4cff6b315c3d,2023-11-21T01:05:39.910000 @@ -237313,7 +237313,7 @@ CVE-2023-5031,0,0,04bef1332046fe66f966e350e278e31343a5f3babd618b80f6a69200c058eb CVE-2023-50311,0,0,6177f328b2324f302b8dcb8eb103523617a5f63e530ec910874929d15a42e5be,2024-04-02T17:55:47.107000 CVE-2023-50312,0,0,2bad74315adc5a15838005e613036a33cb3767df680b81a37071695206496d89,2024-03-01T14:04:26.010000 CVE-2023-50313,0,0,0ff1dc09ff0045844fa80710a45c5539f6e888446fbdc5db21cb236b97018b79,2024-04-08T22:48:41.757000 -CVE-2023-50314,0,1,58ff5c4254e01fd320ec534ada600ba8e9bd8a2e2bf78bca8828c6872b3e9a11,2024-08-15T13:01:10.150000 +CVE-2023-50314,0,0,58ff5c4254e01fd320ec534ada600ba8e9bd8a2e2bf78bca8828c6872b3e9a11,2024-08-15T13:01:10.150000 CVE-2023-50315,0,0,5d3fec02d3b831b7b70560b22ddccb82fe7001024adf6eb01c8c771bd87dece9,2024-08-14T17:49:14.177000 CVE-2023-5032,0,0,073a37b539bb398cfe7e631454583736447513e57b785dbc4f679f0eb520eef2,2024-05-17T02:32:48.020000 CVE-2023-50324,0,0,aab919cee62264c7fcf8e9369fe91cee7492eb240d5eac088e531a759730137d,2024-03-01T14:04:26.010000 @@ -243420,7 +243420,7 @@ CVE-2024-21063,0,0,73270d165bc0b9fbb9db2ba8819a13b23a6c11f25a3f1c5d26effd3bfb361 CVE-2024-21064,0,0,5b2971adc59d71b4aaa5c906c9a4f9e6fc91222b1a769debcd275580759920af,2024-07-03T01:46:28.883000 CVE-2024-21065,0,0,1c4717813b1a034170a9d85c7f01f49a9a6817cd44eb3976adb8d53a84de595b,2024-04-17T12:48:31.863000 CVE-2024-21066,0,0,75a7d2ca04151ae301b20afa61195ac0f69e1c6988e947105f46ee0037cd9d3d,2024-04-17T12:48:31.863000 -CVE-2024-21067,0,0,14100e98ff6c7ada8a3a74706f71a77e94987159ae2a72c4d36cb1d8662c05f2,2024-04-17T12:48:31.863000 +CVE-2024-21067,0,1,3c1db72abc041e4cd640c75884818bbbf8c687caa8093bb33878c33da44b6b4d,2024-08-15T15:35:02.413000 CVE-2024-21068,0,0,5397ed6276bc380474002ef2f826d2dbb33ae28ef93eb95352209ca8f93abe8f,2024-04-26T09:15:11.273000 CVE-2024-21069,0,0,e8fb038125081aee0289d623e5836cee4ae9c0f693a34e8e6777594462628a90,2024-04-26T09:15:11.350000 CVE-2024-2107,0,0,902766287c54c3e88a205ae58fbc93817b4ac63ce16c76170f3874ff8989f8ce,2024-03-13T12:33:51.697000 @@ -243464,15 +243464,15 @@ CVE-2024-21103,0,0,2f3299fda2cbf8e902f3515fd0d48b9d8de5702ec09ff6c5557d6ae05b059 CVE-2024-21104,0,0,eebfe4dd9b21aaa35ec722f534d9449bff2c7a22cb7852b7fed566ff1ff264ce,2024-04-17T12:48:31.863000 CVE-2024-21105,0,0,a025937dea1ddbc18632fa98b68490251974c0a63176360144d7d1a06954f7bb,2024-04-17T12:48:31.863000 CVE-2024-21106,0,0,ab50f512ef43406c6bec553aae7f9997284c506ca99d62550b6d1b274cae0f7e,2024-04-17T12:48:31.863000 -CVE-2024-21107,0,0,77905ed9b866b77f6f0af4fbc5291636afef9848fc7fd96fa27fb48c9e9eee32,2024-04-17T12:48:07.510000 +CVE-2024-21107,0,1,8b22c366b8e56e1eace3e0c72769115530475e44eb4f180061f1d02595110799,2024-08-15T15:35:03.743000 CVE-2024-21108,0,0,457a95edc17f2d19406b77901b0315a9c16fbc7197ac7f42787f9b5f2f03b290,2024-04-17T12:48:07.510000 CVE-2024-21109,0,0,13d20bf3677261be2a53b120554676e417e029919531127b8331decaf3e0f066,2024-04-17T12:48:07.510000 CVE-2024-2111,0,0,6adfb64278e268a55141857a7e32fae75bf1ecf0e5097a377cb5910d9bfa0b89,2024-03-28T12:42:56.150000 -CVE-2024-21110,0,0,64a8bccdd00c64791f3effdeb7c25b8f08a3042308c089ce392b19fc811bd013,2024-04-17T12:48:07.510000 +CVE-2024-21110,0,1,2fb76e40bdb06e3e3079fd1da0264d6fd11a04c3085a1e1767dcd00caebab0fc,2024-08-15T15:35:04.813000 CVE-2024-21111,0,0,a4bd64a6248fb685a1f5cd3f64253f1bc5d465a5d8c33da50a6b56c616fbffc7,2024-04-17T12:48:07.510000 CVE-2024-21112,0,0,3843b79307daf90b6a1d0b5fe81ebf05f9b8f1c6159511f73ad1005727089ea0,2024-04-17T12:48:07.510000 CVE-2024-21113,0,0,27396ff3e441e5311fb8ad3fdb1a14daec1460b787f5096e64cb0d17049922ca,2024-04-17T12:48:07.510000 -CVE-2024-21114,0,0,a68db21f071867d460d9ecb7787f01d140df4d7b01a2a39927ac583583cfba60,2024-04-17T12:48:07.510000 +CVE-2024-21114,0,1,0880b4b822c0833beb112d172fe417240b3cb185b690f6da3505b6f7c47508fd,2024-08-15T15:35:05.830000 CVE-2024-21115,0,0,b1c90510e7789603a593fb63cf663c692bc761a2febc313e5f2e11a678db9f6e,2024-04-17T12:48:07.510000 CVE-2024-21116,0,0,72e72f8f571890e066dee87876aa4475cbba55214ef3d60e82bbaa99711e97c4,2024-04-17T12:48:07.510000 CVE-2024-21117,0,0,c00c4008bc12621d52c01b8472214c0be8ae4e9de0cb223458bb38ef939dfb04,2024-04-17T12:48:07.510000 @@ -246064,7 +246064,7 @@ CVE-2024-25015,0,0,4c1212c8f769823bd4e7049fb129f848dc20c143fc1cc72b02abca5f7451e CVE-2024-25016,0,0,0e9311458b59df4142779e7a8b1d9bd170deea1a4bb4a555b03bbf822c263b92,2024-03-04T13:58:23.447000 CVE-2024-25021,0,0,8332f86306f4ceab760e5f5e3a003f3f5c62fd1b6b574c6e3af70a41de71cd64,2024-02-22T19:07:27.197000 CVE-2024-25023,0,0,3b6e01d80c9261e3c9d5f00ef664e0cb38b680e426f57b9aa0b21aa4414e149e,2024-07-11T13:05:54.930000 -CVE-2024-25024,0,1,cef2cf5d8bdafc1d79b6529f73e186659217d4df27ac33f172a4460da159b308,2024-08-15T13:01:10.150000 +CVE-2024-25024,0,0,cef2cf5d8bdafc1d79b6529f73e186659217d4df27ac33f172a4460da159b308,2024-08-15T13:01:10.150000 CVE-2024-25026,0,0,51187726c38059d92f52ec9be2e9837ba43ea1016581cd7fb52f8ca8d70895d6,2024-04-25T13:18:02.660000 CVE-2024-25027,0,0,119aec53d2012d07639e5485533be77b5b9837d2988927dbbb62ff5ba0a76624,2024-04-02T17:57:34.440000 CVE-2024-25029,0,0,73ebd4fbdc79e08bf51bbd35bffc00987416d5257a1f182e37909ac1996360e7,2024-04-08T18:48:40.217000 @@ -246182,7 +246182,7 @@ CVE-2024-25189,0,0,877bbe35db73d3ea174dbc6f324dcb523b6e20a064afb2e87ac0944b71bf3 CVE-2024-2519,0,0,eb14bc0f40cc4481fcfca7e958fe17ad792ad1814e9d752d8e87eadfd574ac80,2024-05-17T02:38:16.610000 CVE-2024-25190,0,0,5e7fcee6e1d49c76382f955314af222553d106a1254553833783057b6c9de687,2024-02-15T05:03:08.533000 CVE-2024-25191,0,0,a79a6f6dac299c349e2de385c864fbf66ec48043f058d11d55221ed1f7cad150,2024-02-15T05:03:05.180000 -CVE-2024-25196,0,0,71b1b8c21e9030e7bad7b4e709c1cfc6025ee6669c3270f4efb2777d247006f5,2024-02-20T19:50:53.960000 +CVE-2024-25196,0,1,4e1523df7155bcca6a8e3ac35657f04bf40ec93a62ac21976dc74cbf4e73e9ca,2024-08-15T14:35:01.030000 CVE-2024-25197,0,0,ca56aa502aafa76f9e203f1bfea1c7e7bb5407645a514e5c3184e8ae0b1b850e,2024-02-20T19:50:53.960000 CVE-2024-25198,0,0,8aa0d37f4bf223abe553de23cb491c2673e155f232b262f589f7488596dbdbf5,2024-08-01T13:47:35.120000 CVE-2024-25199,0,0,80cf865856345425a1255aaeff9a118b47eca4bf7d8e991fd2be82a76d5447fd,2024-02-20T19:50:53.960000 @@ -247669,7 +247669,7 @@ CVE-2024-27109,0,0,d3f8df7e2e16d6aee5f99946bcfb2fb0ff8c289ba8999eb65f0360c55dca0 CVE-2024-2711,0,0,50ffd1863952a28cb20d757a1f3a8a646342dad98b8dd38660e5f27155377268,2024-05-17T02:38:26.583000 CVE-2024-27110,0,0,cbd5f20a9295447075c0d9ddae39d8a0518f51482cf9653676931acac4a2af17,2024-05-14T19:17:55.627000 CVE-2024-2712,0,0,12d5f119117cab5321059a19687d0b6e7d22fe860cd65815723e1f9810583e44,2024-06-27T19:15:13.167000 -CVE-2024-27120,0,1,fe4cfa7158f309e965bd60f4141486001c7b54e134bc8dc5feb572e42289e515,2024-08-15T13:01:10.150000 +CVE-2024-27120,0,0,fe4cfa7158f309e965bd60f4141486001c7b54e134bc8dc5feb572e42289e515,2024-08-15T13:01:10.150000 CVE-2024-27121,0,0,a143f37592e6d07ec906ccaf9ea9992751c531fdc28e20e87ec32ec9de043968,2024-03-12T12:40:13.500000 CVE-2024-27124,0,0,26db67db3453e1dd267c91698f9b1417c8d160e52aa7cf62e0f7bdbf1310db55,2024-07-03T01:50:21.947000 CVE-2024-27127,0,0,9db4e520391111d0d952131fd607fdbcf8e683f9c38cfdc16ee36395b41e60cb,2024-05-21T16:53:56.550000 @@ -248376,7 +248376,7 @@ CVE-2024-28061,0,0,69ae8c16e1b63fd4290855dfe7823169455b79a10f705efce789e14ccfaa8 CVE-2024-28063,0,0,8b4daa0dfe18458d1d4f0e0079b8409dd79607264a48fce0d64909485ac7a6e2,2024-07-03T01:51:26.370000 CVE-2024-28064,0,0,f454583b636a828554dbb6ac6e6f380d26d3ae9df36559678c0289b609fca957,2024-08-01T13:48:58.547000 CVE-2024-28065,0,0,e0f1de1046eacd4012e9d6249d2050e67e395f04094ef510445210074f331722,2024-04-08T18:49:25.863000 -CVE-2024-28066,0,0,85b2ab7ba2d9e65bbfe9842581e7e71a43b5d7c51a5dfddd95c5c977ea9d5e9b,2024-04-08T18:48:40.217000 +CVE-2024-28066,0,1,c2a2736221464f46eb769fe0b6456e8f036fffd40dc0d59a61172bd4b1ad730b,2024-08-15T15:35:07.070000 CVE-2024-28067,0,0,87f8f4904932894fbb80fce767ebf619e7e55e28806f6fe43c6dfd5af113cbe6,2024-07-12T14:57:36.897000 CVE-2024-28068,0,0,bc3074d56d7203ab69c965398848e97ee8558e2f286e7ec5251e1ecf155f732a,2024-07-11T13:06:13.187000 CVE-2024-28069,0,0,c685346bb55bf7387451d2fbf1405ced89c60d435f78a40193e6458bfa4c25b5,2024-08-02T21:35:20.240000 @@ -248741,7 +248741,7 @@ CVE-2024-28736,0,0,b18e265ab9079a090b10f2fe5a13acf391230f937283b97c645741a4ee888 CVE-2024-28739,0,0,36caa1134a8a7b2783edbb7df33b4da4cf1e215d5eea570ae15bc02fd363246e,2024-08-12T18:18:17.717000 CVE-2024-2874,0,0,80b110f5e4061aa4b7108ad521bebbe850331343538d6ef70c9be87fbdfcd4cf,2024-05-24T01:15:30.977000 CVE-2024-28740,0,0,828c63e17a66fa4cadbb23231d1ca9181a080d393e3a1f53175371eb551af743,2024-08-12T18:19:33.337000 -CVE-2024-28741,0,0,3bc89e24ccc97e59e30e4828003cace9f36d1730b364ef896439edd9448aa78f,2024-04-08T18:48:40.217000 +CVE-2024-28741,0,1,795f862a6d9ed04b0207def6b2b416a0cc650c64f2309e9860cb5b0d520d30f6,2024-08-15T15:35:08.427000 CVE-2024-28744,0,0,6de1af81e457c114bae7b1738d6658348e92bf9c2953cae361b0b30d06e054f6,2024-08-01T13:49:15.900000 CVE-2024-28745,0,0,da878c5f5cc0e7f2e4abb5594a05991a98129a08d42ab910eae7e36c68d7e661,2024-03-18T12:38:25.490000 CVE-2024-28746,0,0,28e0f82b5245c8fee772a7fa2b89a2e8a2df0c79bfc4434d8d6d416163396ab6,2024-05-01T19:15:22.510000 @@ -250856,7 +250856,7 @@ CVE-2024-31801,0,0,167787a1907cdf000af60fbe9b5f7402195ddc6d583a2566e586e08b83648 CVE-2024-31802,0,0,dd0b491f4b4a8abc2eb95691f4e0d78bda6718f8c1d907d0d856648428006edd,2024-06-28T10:27:00.920000 CVE-2024-31803,0,0,c10736ae7840b016061b5af4491c529b00b1b223c27ecb8bbf60562274c0f243,2024-08-01T13:51:08.687000 CVE-2024-31804,0,0,98ebf6123ba640ba12fc884ba3b75b6a9171ce60bb03787ca27a89dc86a8de4b,2024-07-03T01:55:22.410000 -CVE-2024-31805,0,1,6699d756bac943267782c342726fc7b8e1467259d7db700128f1c6fb49e3e5be,2024-08-15T13:35:01.687000 +CVE-2024-31805,0,0,6699d756bac943267782c342726fc7b8e1467259d7db700128f1c6fb49e3e5be,2024-08-15T13:35:01.687000 CVE-2024-31806,0,0,0d23d3a16c910921a17f301055f98f9b17ff477b46facd9fbf2663ed7a6ab3c1,2024-08-01T13:51:09.630000 CVE-2024-31807,0,0,f1a9413060f21c220e1cb5e48db6f606b506243c0f13c9e1b8f8ac68e26c4bf4,2024-08-13T15:35:10.810000 CVE-2024-31808,0,0,4ca3797160f40a508a2f1647ee565c7f4dfaebc9f383eaea19fce840eda829f7,2024-08-01T13:51:09.823000 @@ -250916,7 +250916,7 @@ CVE-2024-31878,0,0,c6557222267c2e9c166ed275e7cc9327cfea0693e0a8976b187deb7865aac CVE-2024-31879,0,0,3d520028d5f0055139f730dd4a6eb2d11b7ab38a082798764c43108749c5b618,2024-05-20T13:00:34.807000 CVE-2024-3188,0,0,0566f9bb8e826930c137ba20908e573874a3f34d7900cbdeff699f1e3434f595,2024-07-08T14:19:01.160000 CVE-2024-31881,0,0,b3692d17c2d4f662273dec610556097ee0b8856656ac8f4835c5e840eb8a6228,2024-08-07T16:59:15.627000 -CVE-2024-31882,0,1,52eff0bcd5e6ba4a1336c357afeb83ec6fcf68993a4df9af1c5ae222ccb729aa,2024-08-15T13:01:10.150000 +CVE-2024-31882,0,0,52eff0bcd5e6ba4a1336c357afeb83ec6fcf68993a4df9af1c5ae222ccb729aa,2024-08-15T13:01:10.150000 CVE-2024-31883,0,0,c4a2241ac7ebf5ea1afff59f8bf762360ac7a99942ee729cf3d03ae8864dc6f3,2024-08-02T15:06:08.297000 CVE-2024-31887,0,0,ca1dcd6dc6fe353a02ec0a4cea716a53938c4b835e7c6779724d1f7fe8375c4c,2024-04-17T12:48:07.510000 CVE-2024-31889,0,0,551bcd3e36a73e2bb38d2c501766c5b52ca7977e525b06f960ceabe308a1516f,2024-05-31T19:14:47.793000 @@ -251705,7 +251705,7 @@ CVE-2024-32898,0,0,a1164d1f13a42749bf96f7e0b3ba86ae7d47aa4b6dca1eac9925e7f634794 CVE-2024-32899,0,0,74d49a0c054c70b6782d3d17817d354b539c7fc1885677c696b3943279ac6319,2024-08-08T14:35:04.040000 CVE-2024-3290,0,0,e37941463fbcfeca19f06c6ff95de33721080f43186b5a4e3649d38706662f8a,2024-05-17T18:35:35.070000 CVE-2024-32900,0,0,f3fcf6c6b161054d4b70c688a26df4960499cb9e7985675c1f9e0f52edc8445d,2024-07-11T14:22:34.243000 -CVE-2024-32901,0,0,a3552a7ee6d0836f928936581a297ba1f653d939cb18fc905df3f090c2fd1257,2024-07-11T14:23:01.377000 +CVE-2024-32901,0,1,0396668e4055b6cf30063754945d8be1d532a6ec0e47e38129ed67921f73e173,2024-08-15T15:35:09.947000 CVE-2024-32902,0,0,1fbd0dd08d9bd5e977338d384aea2714e29c13de9c12a031106e742a6a47a2bf,2024-07-16T14:57:42.527000 CVE-2024-32903,0,0,aaeb38f7d3b59ab9144fa4e43bf721b3198a6bd2ece544fac74a73168645b438,2024-07-11T15:15:02.090000 CVE-2024-32904,0,0,3961c2a580b4e2b2979bdb22f632f77b910e660ceef5325c42d6a6fa26d552d7,2024-07-11T15:14:41.203000 @@ -251886,7 +251886,7 @@ CVE-2024-33224,0,0,ea562c47166b9ccee59aa37caec5e01025be0e30460cf86b89874eb41ddf1 CVE-2024-33225,0,0,20ea8cc6ddfb6cfd8258351119e0796feeaade6c50f1b0404fcf51caf0bfa6d3,2024-05-22T18:59:20.240000 CVE-2024-33226,0,0,f3fb4ee69f05f27f81b817914fa93a341a77a038a9407ec5a7a16217f3ea6498,2024-05-22T18:59:20.240000 CVE-2024-33227,0,0,28dd1771db477989c0572e57f26fd3346bd032b5331c9baa2149840f310b32df,2024-05-22T18:59:20.240000 -CVE-2024-33228,0,0,6fddfa2ac54ffbc147f4f4abcb25def40af05edc7dcd5b21e72e2f55460a7aff,2024-05-22T18:59:20.240000 +CVE-2024-33228,0,1,85cdbd71550aee88b5f9d8549e2c2f09f274676ddc09487eba7cc0a4fad357e8,2024-08-15T15:35:10.277000 CVE-2024-3323,0,0,35a6027c28bfec2d03f21e8dc2fb44053ba20d6734735309aeaba44e533a0061,2024-07-03T02:06:09.693000 CVE-2024-33247,0,0,40a5fef5b7dc3488c3170d87b3d0b3fdeccf50a4efd249dd8f1c8814c02594a3,2024-04-25T13:18:02.660000 CVE-2024-3325,0,0,eba92195eac782e585c88625ca97b48ddac98c797259bb726a1fc19af0b8d9a8,2024-07-12T16:11:57.460000 @@ -252339,7 +252339,7 @@ CVE-2024-33956,0,0,92ede81a948fcf5a2df4670aeb0def8a77bc1add850b4acbb2c9c5d6e0cc7 CVE-2024-33957,0,0,0e1e5f4730a34b23552c2231c245e18108db52e780fcaa99c647a1ead4fde0f9,2024-08-06T16:30:24.547000 CVE-2024-33958,0,0,b573d372b0d7ecaf1ad956ff6d0a05063e98ba29cfc5e03db4b15bd271dc6f01,2024-08-06T16:30:24.547000 CVE-2024-33959,0,0,7c0cd3b349dca2c5025b80d137d364d4b069eb5d0a51d215a853a38c247c583c,2024-08-08T21:02:25.943000 -CVE-2024-33960,0,0,2ad498d81eba49f4a5e7a393b8038b75bde51710a29054d602c822280c14c088,2024-08-06T16:30:24.547000 +CVE-2024-33960,0,1,345b70b65d026ebd294cd6f28decbfa8d641a9e026fde662cbe189d3e2ab9a61,2024-08-15T14:08:32.490000 CVE-2024-33961,0,0,187629ed99c5897491a2a921c1ade8963799907fad5e490c0d4f43b69dbfd91e,2024-08-08T15:28:36.957000 CVE-2024-33962,0,0,e897407fdd17a9b2d16f278c5507ecaf565ac0a0fccce4b5a02e7684c73d8ccb,2024-08-08T15:29:37.537000 CVE-2024-33963,0,0,7b2ea757d18c83ff1944815cc2e202a03e9537a07a76c5aeb78e0eabda293f3b,2024-08-08T15:29:09.743000 @@ -252358,9 +252358,9 @@ CVE-2024-33975,0,0,24d9f8b7189c6e049a2d195b8e70f6d865af89b6e07e97dd7c966c273f1ab CVE-2024-33976,0,0,67f5f835747af0987a350b4d42b3bce1f04168a323132a627d10afd7d71c4f21,2024-08-06T16:30:24.547000 CVE-2024-33977,0,0,405178aa69e8c523d5255a40363518e9f3def64819b4c1b13860e42870541184,2024-08-06T16:30:24.547000 CVE-2024-33978,0,0,d9fa5afc6af12f1b1775f97e83f5db2f011fa6bd1262b6c0199a8a9aeedc346a,2024-08-06T16:30:24.547000 -CVE-2024-33979,0,0,dfed535c5c088c982cc982c913db9bd03e95887458fb5c6e3b8f8a5513af823d,2024-08-06T16:30:24.547000 -CVE-2024-33980,0,0,4eba04bc64e562fbf0ace4bc2913382276d1832c7c9b0e2ad3ab93144fab8dd8,2024-08-06T16:30:24.547000 -CVE-2024-33981,0,0,e3eb316303f7a79daf960db918660586a68c7c4b30a224b6c6a147302290c8cd,2024-08-06T16:30:24.547000 +CVE-2024-33979,0,1,b23f4bb2f30d829ac2b8337cbc397ab525114fa50ab62ece57b2e0097ce56196,2024-08-15T14:07:24.257000 +CVE-2024-33980,0,1,4cc48478ea1d3758bfbc31648e401c46fb3a2b5528e5044fc92305300898eb87,2024-08-15T14:07:53.217000 +CVE-2024-33981,0,1,8ca9e43815221320ccf66237d8bdbf16507b4f0cfcab2dfe65108c8b4c13f496,2024-08-15T14:08:13.003000 CVE-2024-33982,0,0,a5a400641b1905999f31649b77caed7e5463d643fd1a494924a5db164364e9b4,2024-08-06T16:30:24.547000 CVE-2024-33983,0,0,a83a104a81a24ca7cfe520571c3e6d45ba9414fc29d7ee2d6ed46d045aaab087,2024-08-06T16:30:24.547000 CVE-2024-33984,0,0,80dbb8d6d0ae9c62edcd055d5bea689800e85b11af62d3cc2fcb35e6df78c974,2024-08-06T16:30:24.547000 @@ -253084,7 +253084,7 @@ CVE-2024-35119,0,0,0e35a45c77b11b12852790cdf89b3d7024286bc6ab2025f024aa0adc87ff1 CVE-2024-3512,0,0,d94170bf3eeacc29f71f3655c6497a6a8a80969c9ad074c1a71bef4e5d51d46d,2024-04-25T13:15:51.663000 CVE-2024-35124,0,0,eebade4e344820896ada54a221712227782e55a7cb2e2d641368b18349f7b717,2024-08-13T12:58:25.437000 CVE-2024-3513,0,0,6ae7ede11126213bb060be770e97c10b68188b12ba1d1172b48d8935fa9e965c,2024-07-05T14:25:33.193000 -CVE-2024-35136,0,1,78b438c3be398b6caabee193a52ce1a71734e3871e784820d98c4079f2e843ed,2024-08-15T13:01:10.150000 +CVE-2024-35136,0,0,78b438c3be398b6caabee193a52ce1a71734e3871e784820d98c4079f2e843ed,2024-08-15T13:01:10.150000 CVE-2024-35137,0,0,77d476f5836ab7384f0bcce22116f35eb05878c239523b7719df59e2f7ac06d3,2024-07-31T20:48:10.727000 CVE-2024-35139,0,0,b5d718d7cbc653a303c73da7348779dc88225aa141c22d6520f3ad7270cc6a42,2024-08-01T17:27:13.030000 CVE-2024-3514,0,0,3ed2667128afb9e047ea43d977eb1ed71e90bed358f504ad5e2322f1a22b1903,2024-04-24T17:15:47.423000 @@ -253092,7 +253092,7 @@ CVE-2024-35140,0,0,f651bda48ef3720086b4e55e66eab6a11168ee8b067c959fc6ebc63397794 CVE-2024-35142,0,0,eff9915c7a0945f0e06d680eabc808e5d5a4e4e1bca0bc89129e9dc0c0bf4eef,2024-05-31T19:14:47.793000 CVE-2024-35143,0,0,157edc929067584960228800256bf7e4e656c8fe568bfebf09213a67a4e1ab8c,2024-08-05T12:41:45.957000 CVE-2024-3515,0,0,8fd4dcadec7780b53436525af06eb6126290740e496ba02261842790bcfc4cf4,2024-07-03T02:06:19.180000 -CVE-2024-35152,0,1,7bad72ae24123d07d5dae8008de53f4f5fbd9eaddf4dbef1423bde613b4ed2f3,2024-08-15T13:01:10.150000 +CVE-2024-35152,0,0,7bad72ae24123d07d5dae8008de53f4f5fbd9eaddf4dbef1423bde613b4ed2f3,2024-08-15T13:01:10.150000 CVE-2024-35153,0,0,bceffddb04f303a203c6bdd6ad6ed1855809c9b42c9ff2e40956bbe7b4fb3c29,2024-08-02T15:24:29.190000 CVE-2024-35154,0,0,7c994b7a6d7158efefd5e2d9a1e0bdd18fbe7152cacfbfaf67e2a7f91ec1260c,2024-07-11T13:05:54.930000 CVE-2024-35155,0,0,371571e1aae62a09e601d6099b5578266a4a707997394118a0b1e39997d5568b,2024-08-01T17:56:03.997000 @@ -254588,7 +254588,7 @@ CVE-2024-37268,0,0,3ed75f71eb245fffa2f72817fa04519725ace840b74091a925a997ed8515b CVE-2024-3727,0,0,db60e8166385f10211c2718c5bee0a37482c488d5e297dbcf62d143b9a845b73,2024-08-13T17:15:23.653000 CVE-2024-37270,0,0,09adf8729d6feae3191994dc6f2b286449a8e4d910f8c343a3a9496ea050a29f,2024-07-11T13:05:54.930000 CVE-2024-37271,0,0,82adde283ff9dacc0f77be200c055ea2f2c58a80387c070880c7d1f2c1068d32,2024-07-25T13:46:39.273000 -CVE-2024-37273,0,0,701ddd83e97e8ea6c808ca5d8f57033bb1466851ddfe669965d2b1947df1df2f,2024-06-11T14:12:23.210000 +CVE-2024-37273,0,1,2a85b1da0ca6e483bcfb6dea755537146c70a6967cba53f16b02bbb377a77813,2024-08-15T14:35:03.053000 CVE-2024-37275,0,0,ed16fc8bc6c608f35a8b7d5acc4e01aceb7115e810ed76f0ef20187fdb243170,2024-07-24T02:52:01.253000 CVE-2024-37278,0,0,f099ad6e686108b7aa0982a8f779de2fbae21e6d456841af0260dad64229b388,2024-07-24T02:51:37.857000 CVE-2024-37279,0,0,31cbe3e974fd27b1c5c854af28b34c2989a9118ebf3b3e54bb5c16795495edb9,2024-06-13T18:35:19.777000 @@ -254767,7 +254767,7 @@ CVE-2024-37521,0,0,e9aebf31c63791ab4f95255134c2db65267eec1085288684d0f21a4a1118f CVE-2024-37522,0,0,8d0ca9ac1272094da7900aa5aa9c5ded401dd6ca5f585f197834c48735f10240,2024-07-22T13:00:31.330000 CVE-2024-37523,0,0,13bb725e58e999cc176a750d097aad585b673654b57d0f90da08bbd8099664ec,2024-07-22T13:00:31.330000 CVE-2024-37528,0,0,9c6980ff0d1442c5b7fd4f5e3f8ba4ae579879f3db1ec83280b9bd21a4726381,2024-07-11T14:49:28.177000 -CVE-2024-37529,0,1,771cf9fe059d76f79b4eff421ffd3e496a6273cc96100c8769dab2ed7617195e,2024-08-15T13:01:10.150000 +CVE-2024-37529,0,0,771cf9fe059d76f79b4eff421ffd3e496a6273cc96100c8769dab2ed7617195e,2024-08-15T13:01:10.150000 CVE-2024-3753,0,0,84eff4df8db1a00368e62ddb5ee92a92d75f6c87384a685b642620e2007cf84f,2024-08-01T13:56:41.100000 CVE-2024-37532,0,0,45919b76fbf8caed85c6eed116f206909b848d159e913e9fa67d2f60af5f6be6,2024-06-20T16:07:50.417000 CVE-2024-37533,0,0,d82586c3abd351c16093df491355c34e8750e635410a84408441a8e9ff8b85a0,2024-07-25T12:36:39.947000 @@ -254910,7 +254910,7 @@ CVE-2024-3784,0,0,f0c80c77a0788aa17bf80578f54749ae490fe23c5161f7f9c165d9871caa60 CVE-2024-37840,0,0,1ea05f0cae39cea91919dabf259bc43d4d53a339aa6352e9633c1155c24e02e9,2024-07-03T02:04:49.190000 CVE-2024-37843,0,0,b2b97625cfd8538b070daf88e20efea752488fb698343ba1b69e8a5a31a226a9,2024-08-01T13:54:21.843000 CVE-2024-37848,0,0,b9654691620e5501baad2d1771338ac2aedaf89f42fcedfa6b269a2de242ad76,2024-07-03T02:04:49.977000 -CVE-2024-37849,0,0,e72cb95ec5b2547b0995574b6fc0f48f3b1fcec22199ffd15599733145952607,2024-08-01T18:41:11.900000 +CVE-2024-37849,0,1,7a15b5118e0a895a8306b103c51dd029b756d9600db3bef6c7132e3f601ee351,2024-08-15T15:35:11.593000 CVE-2024-3785,0,0,e84209989b24c941d7c6f3eae4d5a1283a6975747744d670fcd7c761c7276a68,2024-04-15T19:12:25.887000 CVE-2024-37855,0,0,f1f3ecfbab7ca802e055151d5420d5f7ca02cdfc7b7912208150b9a33ddd284c,2024-07-03T02:04:50.817000 CVE-2024-37856,0,0,3b2c5fbeccee511c1f982fae5c819d203e5df06806ae143d685413cbae07336d,2024-07-30T13:33:30.653000 @@ -255996,7 +255996,7 @@ CVE-2024-39543,0,0,aaaad3e02df0b0d6d56ce697644f4ead0224422eef8d860010b2b8a0e7c3b CVE-2024-39545,0,0,1eb5c972b938ca677d55ad154dd167ed070fc69afd56e645990ea5adac9fd888,2024-07-11T18:09:58.777000 CVE-2024-39546,0,0,e16dcfa4fc66ceb6eb147443dbf92ba41be6e9e538dcfdb9345e3a289eefbf1c,2024-07-12T16:11:53.397000 CVE-2024-39548,0,0,f508a41c267f71c0128d6c49ba38f3ffa926a8d4647ec725429fd94a8d643cbd,2024-07-11T18:09:58.777000 -CVE-2024-39549,0,0,83b6facd1e2147b716054939f8174b72223d922c2afe4d889562b9eddf228d33,2024-07-11T18:09:58.777000 +CVE-2024-39549,0,1,35f2c1bcd8c81702a00421faf40f87e7195f0ae100c438acf9bee22328a96831,2024-08-15T14:15:56.800000 CVE-2024-3955,0,0,1980afc805b9b5d168ea6a08c34d1a9d581fd505fecdd9c097016e585c054b35,2024-07-03T02:06:56.087000 CVE-2024-39550,0,0,5bb40c1c6118db31096ceb73a5335d2e11deae5cbb65f13e233b49f728e16419,2024-07-11T19:15:12.157000 CVE-2024-39551,0,0,36bf61155e3a3db50c94319d239c2bdb1bd13565a0d3a2d4d881f71cf975abe6,2024-07-11T19:15:12.260000 @@ -256337,20 +256337,20 @@ CVE-2024-4045,0,0,2ae0d8f233b2cc7f6d27d9d81b74b74fd6cc2876f88a425dbeb60d35e4802b CVE-2024-40455,0,0,2b4af03841b1088e106e2c8470bdfc3454c77a8d4b576f687e8da463b4385ab7,2024-08-01T13:57:29.287000 CVE-2024-40456,0,0,f1acaf3e46ce38cdd4b72320186132bab37cc38f6f4c796e31eaece0545a5e4c,2024-08-01T13:57:29.487000 CVE-2024-4046,0,0,b162bb54ae31ac06a54238ce430265f513a39f78ee0aa36d5d6ff941168dcdb1,2024-05-14T16:11:39.510000 -CVE-2024-40464,0,1,566a84364894c87cd293e303f1f3b91278da64a57babcc563f0c2d0eca7b55aa,2024-08-15T13:02:33 -CVE-2024-40465,0,1,d1f805e9dd9512e63091b4cd71cf57cffa5f52934bb1bfd71a75623426707138,2024-08-15T13:11:07.570000 -CVE-2024-40472,0,1,7d325ed778605ea62befe2fe23f0c336d0e6ecc42db2791564a81ce5488761f0,2024-08-15T13:25:05.657000 -CVE-2024-40473,0,1,fae125d6208bbe8cec385e28019f920962566f6a2e33ffb0f8e49b21974c8449,2024-08-15T13:39:29.240000 -CVE-2024-40474,0,1,608fb1da7112466987ad716b155df271639c9ca00e9a1670f54e4e537b829b18,2024-08-15T13:40:01.357000 -CVE-2024-40475,0,1,6162a5c8d3daa8216ee02133ff4675036e80bfee4a81755e45213e41dccbebda,2024-08-15T13:40:54.810000 -CVE-2024-40476,0,1,f9287e4de79741df61fb3063574b5ffbc3a40e7aba2a9ae7b1c9a4ed2d244203,2024-08-15T13:43:32.047000 +CVE-2024-40464,0,0,566a84364894c87cd293e303f1f3b91278da64a57babcc563f0c2d0eca7b55aa,2024-08-15T13:02:33 +CVE-2024-40465,0,0,d1f805e9dd9512e63091b4cd71cf57cffa5f52934bb1bfd71a75623426707138,2024-08-15T13:11:07.570000 +CVE-2024-40472,0,0,7d325ed778605ea62befe2fe23f0c336d0e6ecc42db2791564a81ce5488761f0,2024-08-15T13:25:05.657000 +CVE-2024-40473,0,0,fae125d6208bbe8cec385e28019f920962566f6a2e33ffb0f8e49b21974c8449,2024-08-15T13:39:29.240000 +CVE-2024-40474,0,0,608fb1da7112466987ad716b155df271639c9ca00e9a1670f54e4e537b829b18,2024-08-15T13:40:01.357000 +CVE-2024-40475,0,0,6162a5c8d3daa8216ee02133ff4675036e80bfee4a81755e45213e41dccbebda,2024-08-15T13:40:54.810000 +CVE-2024-40476,0,0,f9287e4de79741df61fb3063574b5ffbc3a40e7aba2a9ae7b1c9a4ed2d244203,2024-08-15T13:43:32.047000 CVE-2024-40477,0,0,0ebd8b8f59a35dda2b3e292f3675b27eb6ffc42149072e05c13180f024ce3e21,2024-08-13T01:13:46.877000 CVE-2024-40478,0,0,c52d89ab86aaf3f734a40597d5b00313c948fc2e1e77e0656955644084643dfa,2024-08-12T13:41:36.517000 CVE-2024-40479,0,0,0e859692d2dcdb68471916e06e469ab263533fd2f9afcecfe52d53c988a5da77,2024-08-13T01:13:47.860000 -CVE-2024-40480,0,1,8a5587d0c52b3e2bab6e37cd2c4376f46191977b095b6fb4b6027fa3bdca9dcc,2024-08-15T13:47:50.450000 -CVE-2024-40481,0,1,4827ebaf038f9227afaa10ae59d01fa6610f2bcdbbe677b5840a09b2a19855a4,2024-08-15T13:58:16.033000 +CVE-2024-40480,0,0,8a5587d0c52b3e2bab6e37cd2c4376f46191977b095b6fb4b6027fa3bdca9dcc,2024-08-15T13:47:50.450000 +CVE-2024-40481,0,0,4827ebaf038f9227afaa10ae59d01fa6610f2bcdbbe677b5840a09b2a19855a4,2024-08-15T13:58:16.033000 CVE-2024-40482,0,0,9a3a01b5782aa51ef209e482e70f047b430b9828561a94171012474df4d532a4,2024-08-13T01:13:50.130000 -CVE-2024-40484,0,1,450f717e0dcf79c0d7625633ec58aab189af6e628b95e324782e3205e6fde516,2024-08-15T13:59:35.813000 +CVE-2024-40484,0,0,450f717e0dcf79c0d7625633ec58aab189af6e628b95e324782e3205e6fde516,2024-08-15T13:59:35.813000 CVE-2024-40486,0,0,206068d4d3a686bb79ffe5f57501930cd1fe13ada3eb39bb4b41ff953c8c8a8c,2024-08-13T01:13:52.383000 CVE-2024-40487,0,0,005a09265ebc099b9fcb5976da33b894e6213384a847e53e8ae4a2bd87b7e372,2024-08-12T13:41:36.517000 CVE-2024-40488,0,0,29149e46f549d6c8fa1979da87e45c07630bc970cf31d75d73d9d6723dc075d0,2024-08-13T01:13:53.230000 @@ -256413,9 +256413,9 @@ CVE-2024-4061,0,0,3d64526f6b4051e690acf87533a742bc5fa8b9683de463655fd6184fe7fa5b CVE-2024-40614,0,0,5a8c90c94f1b0dc56355424420ebae65c618d536c580acb4e248f7802de2136c,2024-07-10T13:15:10.833000 CVE-2024-40617,0,0,7e202d6e3a6a7f1f99f642a0ac78e8a414409382efde0e52849f3dc8f46222c1,2024-07-17T13:34:20.520000 CVE-2024-40618,0,0,339cc634a42e8a7db54f4bb39e56482affa65b57dfd2765250a61f2e694456da,2024-07-12T16:12:00.597000 -CVE-2024-40619,0,1,ea93e4171451f548208f044dfab4f4efb10b5f11d3d61496f079a8f705287721,2024-08-15T13:01:10.150000 +CVE-2024-40619,0,0,ea93e4171451f548208f044dfab4f4efb10b5f11d3d61496f079a8f705287721,2024-08-15T13:01:10.150000 CVE-2024-4062,0,0,695b7b6d53140e91ee1c447f6f5acafad0b73fbbd2558cb89ae9d4c0c7616ec0,2024-06-04T19:20:29.007000 -CVE-2024-40620,0,1,71713fcfb38141fbf2f0a69f3f32bf9f9dd02aa1317d107db78803e36c2e64e8,2024-08-15T13:01:10.150000 +CVE-2024-40620,0,0,71713fcfb38141fbf2f0a69f3f32bf9f9dd02aa1317d107db78803e36c2e64e8,2024-08-15T13:01:10.150000 CVE-2024-40624,0,0,4a20911ba5017c22f7067e7eea43b4f5d49d24af0046266156676a49862c806b,2024-07-16T13:43:58.773000 CVE-2024-40626,0,0,a78d44649981609909e27d22ccb6346946292f7107bba7f84553b3eaa01a5871,2024-07-16T18:00:02.110000 CVE-2024-40627,0,0,9135682f430d5bd3e848a020970fdae52f5ba66833f8d323b6fb81718428c2a6,2024-07-16T13:43:58.773000 @@ -256836,10 +256836,10 @@ CVE-2024-41250,0,0,ed2ec7774a8ec7b69d0fb8bbb5a6282e439116063707acc8ce2b97cfaf8b3 CVE-2024-41251,0,0,da008bc6dc7814b48f867f21af4633a6806e17edefa70e303dbf35845dd6cab0,2024-08-08T20:35:09.980000 CVE-2024-41252,0,0,6f7260587fe3d806095bb900d28d021360c8fa8615ba7755fc4b11adcc410d82,2024-08-08T15:04:56.287000 CVE-2024-41253,0,0,1d15e693bee8ec7e0d17946828828bb61ca6ab7c564466339f09f66ca369a555,2024-08-01T13:58:25.153000 -CVE-2024-41254,0,1,f212e1634835b1fd96f85fe8003b7cfe4c7c22a05d9dcb9e60d767469bc03438,2024-08-15T13:15:29.170000 +CVE-2024-41254,0,0,f212e1634835b1fd96f85fe8003b7cfe4c7c22a05d9dcb9e60d767469bc03438,2024-08-15T13:15:29.170000 CVE-2024-41255,0,0,7cc2545787669f116d3dff916e600823ce1d7be3e6c14b4dba9c7bef750d7295,2024-08-01T15:35:18.570000 -CVE-2024-41256,0,0,1bf0b121e504fbd022f127340154e7cb8fcfb04505e0f7d02e6472303f883868,2024-08-01T12:42:36.933000 -CVE-2024-41258,0,0,76b722665ab6223e41ba7e3d8945bf1a36e3d6ce75d31b29574bb0e37bab2587,2024-08-01T12:42:36.933000 +CVE-2024-41256,0,1,491cd68a00bcf62a1e4266f260b99772e9ecb5d3fe1acae9bf2653c92a9cc1d5,2024-08-15T14:27:18.487000 +CVE-2024-41258,0,1,a0ffce639d49eabf0a263282d26fc952b91860246deee0783640dbbfce6238d6,2024-08-15T14:30:16.687000 CVE-2024-41259,0,0,8e959022d59e60bc0e97cf4bf2cb7de172a51f6107bba66dcfedab192a1fccf6,2024-08-02T16:35:51.213000 CVE-2024-4126,0,0,eeea001e03fa6fec03fbd996718e983ff172445a96f3b74ca8247477394c3911,2024-06-04T19:20:30.860000 CVE-2024-41260,0,0,3b736a5e72a084b867bc1f8a67734020228a90a35c7407c8f5897185d84f7415,2024-08-06T19:35:08.443000 @@ -257076,7 +257076,7 @@ CVE-2024-41863,0,0,5218352b95081c6795db623527af60036ab1b1d152dab66fc1f92aa7277f6 CVE-2024-41864,0,0,59e830b96a597bc93dcda9cbef385e1fdf95773045c5f29bc0bb9381e7cb3adf,2024-08-14T18:20:36.710000 CVE-2024-41865,0,0,1c9d0b02e42a91c1b2481279c221e04b60cecfc41a7fc125ed37cdc3f4660a28,2024-08-14T17:49:14.177000 CVE-2024-41866,0,0,a425f2bc051ad8982696461ab1b5de2a60d8bc87ff38cd9f8c5725fb049e77fb,2024-08-14T17:49:14.177000 -CVE-2024-4187,0,0,6e41c1b7087e8ddcfaf3801328e1ee1bd29a767b33bcf1748327754d0e784ada,2024-08-01T12:42:36.933000 +CVE-2024-4187,0,1,59e73639acf686e0c0fe315911f8a7728baeee66452eb3299dce70437688c22e,2024-08-15T14:45:27.797000 CVE-2024-4188,0,0,5459733739e7d5773814c2ce2922cf5b8b26c5398a641d72cfafdd22a4667489,2024-07-31T12:57:02.300000 CVE-2024-41880,0,0,fb22214cf23b63ecac791ad54f65d75460df9fd80fc112c0736bcd80f342f363,2024-08-01T13:59:12.507000 CVE-2024-41881,0,0,649cc07cf7de21549ce70eef1f2f35714a84b1ff95e773c0e75090d3c6d27c2e,2024-08-01T13:59:13.313000 @@ -257122,7 +257122,7 @@ CVE-2024-41951,0,0,910c7c4704e08c3f5b0d889d255d1be4f852c58d3205446fe8bb45ac562a1 CVE-2024-41952,0,0,a2a2d5c0bd3ad0150caa88e61ff72fdc96306c7692a8efbe895ab20341c07bae,2024-08-01T12:42:36.933000 CVE-2024-41953,0,0,3ffcc67e099bb316ff94f5a9cc1845c210666241b20cca92f52aec30809b8fe6,2024-08-01T12:42:36.933000 CVE-2024-41954,0,0,93352fab81d54ba7d01179899803c8640d36e5f65730e1a9dce8a0309247dc87,2024-08-01T12:42:36.933000 -CVE-2024-41955,0,0,5cc7c41b3793b9bfbfffe5ce80cc2ba3b224b9e2e273665abd77af2754fbe18c,2024-08-01T12:42:36.933000 +CVE-2024-41955,0,1,5ad0263667cf66f8813b7d99a3968b8a2424832b6c51b00aba139fada06ab3c1,2024-08-15T14:10:40.157000 CVE-2024-41956,0,0,b72cd1a22a28d2303229b868afdc5fd2adbef42d25416f48e13276835bed80e5,2024-08-02T12:59:43.990000 CVE-2024-41957,0,0,f207a653c0f0f9d782c3e5585f7eb5df8054bd1cd710ccb1397440f0e840612a,2024-08-09T14:14:01.190000 CVE-2024-41958,0,0,ac2d465ee5b5b310612655a7cc0163ff8c5d740ff2b286b950528d6c8e63af4d,2024-08-06T16:30:24.547000 @@ -257347,14 +257347,14 @@ CVE-2024-42349,0,0,7c83a1a3a31095b7c061367c56e1e2185d3951ede9de2f7c2b93de9707413 CVE-2024-4235,0,0,f578447debade3af3e230e69e9dbc9d9ff3e97fecc115950bd6af5b863fac2d3,2024-06-04T19:20:32.857000 CVE-2024-42350,0,0,41e03c0efb90d720b1c8cb3232ef6c7cb3628d75ba24650e7a94fc79624a1e0c,2024-08-06T16:30:24.547000 CVE-2024-42352,0,0,c0479ec0c76b813a7203da737c4719c60d3f36382909bc4066a937b282774165,2024-08-06T16:30:24.547000 -CVE-2024-42353,0,1,b9621cd8763f88a53f5b098ec4fa4089ac4eb4f9bb7ec8eb962c2fc710d76fef,2024-08-15T13:01:10.150000 +CVE-2024-42353,0,0,b9621cd8763f88a53f5b098ec4fa4089ac4eb4f9bb7ec8eb962c2fc710d76fef,2024-08-15T13:01:10.150000 CVE-2024-42354,0,0,530679279c657883c4b35ba657ab96e7283f524459574665a6f69e940f2dd9b1,2024-08-12T15:49:58.230000 CVE-2024-42355,0,0,4d53406f017c64f607be0598b7dd1b3fb3451e70edad6092c759f1ac9d9afdaf,2024-08-12T15:40:32.777000 CVE-2024-42356,0,0,71e7dc9901543344eaef3df0bcbcdd32b411ba29d6c2531b0f605cb85111defa,2024-08-12T15:34:08.190000 CVE-2024-42357,0,0,7b039f202cf78cd0431d1a42b63791f2941347495cf765d1f5a63b93271755ea,2024-08-12T15:26:19.520000 CVE-2024-42358,0,0,3235df447217095f8cbf5213ea3a6f300e00850291878619ee95d2566fd638a9,2024-08-12T18:50:20.967000 CVE-2024-4236,0,0,e2cdfe0d631cec0094aabd9e613a58fc530f718522481021cb8970e2da56a2c3,2024-06-04T19:20:32.960000 -CVE-2024-42360,0,1,dc4f22d979b7665e0b696984f4c37e2c0c9ca0048a6560c57c6062a410b59017,2024-08-15T13:01:10.150000 +CVE-2024-42360,0,0,dc4f22d979b7665e0b696984f4c37e2c0c9ca0048a6560c57c6062a410b59017,2024-08-15T13:01:10.150000 CVE-2024-42365,0,0,cd9316acef63aa01c9388716e86faa1c498776bc0209be92960fb577e4f0b965,2024-08-08T18:55:19.180000 CVE-2024-42366,0,0,26d79ce86c657c865adda744afaa0f4e93052091893cacc16340b64f87dbee28,2024-08-08T18:55:19.180000 CVE-2024-42367,0,0,e076a02bf03f8a97e18817904e3d95718772a1dffa8b800d6df36352b8b88cb0,2024-08-12T13:41:36.517000 @@ -257405,9 +257405,9 @@ CVE-2024-4247,0,0,e85864e661a2b1d9942e48a3c52bc53fc949e702c33b68de4ade6b9cd86f67 CVE-2024-42470,0,0,c2337f1ff190575de6395575b084daf7bce25ccaf9e3e76f2820207f899cd76d,2024-08-12T13:41:36.517000 CVE-2024-42473,0,0,4ed1851fb406b4127fd12c2bea40398eaaed7991df0df7d58ed2677a68f6e622,2024-08-12T13:41:36.517000 CVE-2024-42474,0,0,4857cb5e72d8ea0d32d5af9cf7ffd6ae8ca8513ca577f0cc8130743d345121e8,2024-08-12T18:57:17.383000 -CVE-2024-42477,0,0,c9e466b6dcdc98b8129d2dff7534d12d9b68a0ebf35a40d8abf91f60f8e6e66c,2024-08-12T18:57:29.247000 -CVE-2024-42478,0,0,c45f4b766a17c049fa7f539e1f8f8bc32b69a7c8613b459d523974652a5255af,2024-08-12T18:57:29.247000 -CVE-2024-42479,0,0,d3e65535755420e1ca917686e20a3c508950a99193115c9d799f72dbe453c8d1,2024-08-12T18:57:29.247000 +CVE-2024-42477,0,1,fcae5018af2bef05676d648639d61eec426950973c911608bb1d16f397cf37dd,2024-08-15T14:02:23.130000 +CVE-2024-42478,0,1,cdf48197e3348474fc63d3659602086723564e2de2d520434b1a86401eda413e,2024-08-15T14:03:32.867000 +CVE-2024-42479,0,1,919a4727e7b8c44b8fb7de183faba90f9bbe38a8002d5847cf0037ef02b3958f,2024-08-15T14:03:53.203000 CVE-2024-4248,0,0,ae8e3a45d49ca48b9dcec0ca557a7d91d483e50d5e5d3f5d5f7e2c0dd6ffe3de,2024-06-04T19:20:34 CVE-2024-42480,0,0,d6ef3c6db5a498c7b4cc4b77be4e0c4132e9804f02867681cb2b417c4a3c017c,2024-08-12T18:57:29.247000 CVE-2024-42481,0,0,ad34942ce8111bc952fcd265a37f1d388b31063c4018bd73b3f6d858abc1a1ad,2024-08-12T18:57:29.247000 @@ -257448,7 +257448,12 @@ CVE-2024-4264,0,0,aceade487dcdf82d5a23a178a070b3c07d4cce69337175854977fa24341a32 CVE-2024-4265,0,0,674cb78ce8c95e07c05495b52772b5d4a079c608362a6e67c2dfb567e6b8517a,2024-05-02T18:00:37.360000 CVE-2024-4266,0,0,4e57f554a9a502210e7298e86f8a93b4c9fd8085f966eca22533475a40566a21,2024-06-11T13:54:12.057000 CVE-2024-4267,0,0,b21b1be134b642d147ee55ecb619e0382fab4366c661a291e53904c7941658dd,2024-05-24T01:15:30.977000 +CVE-2024-42676,1,1,e9a5daa3dd8eccdd2f2a29dabe9972486a96dd991b5aee3e3e2779d5a44ae843,2024-08-15T14:15:10.683000 +CVE-2024-42677,1,1,921bcc4c68a42e8030a468d3c0661dcdb643fbc8b518c216389c7e6a0f4b2840,2024-08-15T14:15:10.813000 +CVE-2024-42678,1,1,a46e0301f5dde2b9b8e8931a7229a2fad19a83ec9b835894cd9980418af8c70d,2024-08-15T15:35:13.793000 +CVE-2024-42679,1,1,da0c1490e731425e36401900a4ed9f9051b7dd800a91db162d52ad313ebd63f7,2024-08-15T14:15:11.003000 CVE-2024-4268,0,0,ed1b7008ff1a2549bc2f685279352d3a8f5b6d435592b2f29fd10fa9328ca71d,2024-07-02T18:08:17.817000 +CVE-2024-42680,1,1,d1b04f5abc334e70c942b6c701a6201458f2d279b9d7d2762603a80d10cdfac9,2024-08-15T14:15:11.107000 CVE-2024-4269,0,0,3a0e07c5dbf72b66f7c37e018ba2f8991c2e2b5c26c8f2d595b33767cdbe4e7e,2024-08-01T13:59:29.737000 CVE-2024-4270,0,0,17133812b9c812b17ff2909d738c8b5ae6f8cc2b39eef016edec8cd05359b195,2024-07-29T16:31:09.117000 CVE-2024-4271,0,0,264c116f07aa10a920ca78d5e9c58bba0fe1e2b31cb4f2cfd0a7a609be29751f,2024-07-03T02:07:19.577000 @@ -257463,7 +257468,7 @@ CVE-2024-42740,0,0,39569bd5167f0f47a44ebbe4ecc5aa9c5e8e01d7a3ccd0a81beaed4c0b73a CVE-2024-42741,0,0,c3d54f2d55431f18f2fe2689eea0c75eda9e73bc676a6cdf4fda83be8048dd21,2024-08-13T17:35:02.867000 CVE-2024-42742,0,0,c6d47b1b37e493a627cc13143aae4e00b72c25b4505c3a339eb6ba0a1660d2da,2024-08-13T20:35:14.063000 CVE-2024-42743,0,0,d538c66af9d70f40192fc77d1cf4c1d752037b7e0e55925fdbf9bc80a15b551d,2024-08-13T19:35:12.963000 -CVE-2024-42744,0,0,9d65b457ba80e3bacb8cbde537c1ae1de7fa2e5e5f601337f60d5c89a5a01599,2024-08-13T17:10:12.157000 +CVE-2024-42744,0,1,b5fdf12fd1c18150140d8a7482237b3fe88e9f65b6d8de0140d30bbf81117cb5,2024-08-15T15:35:14.590000 CVE-2024-42745,0,0,d2f467113cda4cc30e7255dcf19a80218eafc314dce633f11469c2e4a02cafc7,2024-08-13T17:09:44.943000 CVE-2024-42747,0,0,4d1c99e860bf6905b5d644799ef0c78895a722730457e9c7bd1d214b39f83bc6,2024-08-13T17:35:04.540000 CVE-2024-42748,0,0,52e6e14746af30f6f3124891b89bbdbe775ebb6c4232d3347332f267006d05fd,2024-08-13T17:08:53.510000 @@ -257566,7 +257571,7 @@ CVE-2024-4324,0,0,fc63521759a8641132ed78ae3099f2b2ca0952db3d329b9ead7b1b38a39cf6 CVE-2024-4325,0,0,76d9bad54216516dac1d03211c486bb781521a024ebba7e9a0e98047a78d0bf5,2024-06-07T14:56:05.647000 CVE-2024-4326,0,0,d965aff3554882d9e9e5ba1861fcd18121a605b5a6347dc41a19bd090bda9a65,2024-05-16T13:03:05.353000 CVE-2024-4327,0,0,9a5f942b6958d2271ac79f44a3dfa6f019a91702ea5bf4b7c110b804ce763bfb,2024-05-17T02:40:22.673000 -CVE-2024-43275,0,1,60012973451639aeede903a3fd93051c27ce3689ec19e72785c5fe853166efc8,2024-08-15T13:01:10.150000 +CVE-2024-43275,0,0,60012973451639aeede903a3fd93051c27ce3689ec19e72785c5fe853166efc8,2024-08-15T13:01:10.150000 CVE-2024-4328,0,0,243566e1cc6bca4cb71823d7b7f30591e3ccaa89bb4c9ba718cf8de1f025e822,2024-06-12T19:33:00.527000 CVE-2024-4329,0,0,915fdd462793e35dddcb6a188ef6774a9ebc56a526b1b0698bddaf3c23ba3b77,2024-05-14T16:11:39.510000 CVE-2024-4330,0,0,fc15b5e6e8f2f0c0d6f88562ddea62a293dcb49ee86f17536355ec11fc8680c3,2024-05-30T18:19:11.743000 @@ -257579,8 +257584,9 @@ CVE-2024-43358,0,0,fbf8fe905c3ca9abb9115b42cc5614eccd0cebf28f3e14adb9347834e27ff CVE-2024-43359,0,0,65d4fabedd6480e45a35d791ca8acdefa39599f7f2c5dac0d8096fc11d685101,2024-08-13T12:58:25.437000 CVE-2024-4336,0,0,c134d6edc5435f42ac06617edd246079dd96557f1185ced7c01e0aea0bd59b88,2024-04-30T13:11:16.690000 CVE-2024-43360,0,0,5e83697ea820bba28f28ac74c16eaa49368718cf4d29d0f4eeaac44e95899ac3,2024-08-13T12:58:25.437000 -CVE-2024-43368,0,1,bc8404f29bdb04258d364b3952f9782a6581bd81b6fee1a7f290b39a6cca9c9f,2024-08-15T13:01:10.150000 +CVE-2024-43368,0,0,bc8404f29bdb04258d364b3952f9782a6581bd81b6fee1a7f290b39a6cca9c9f,2024-08-15T13:01:10.150000 CVE-2024-4337,0,0,87f9a4f489ef032776e3da435c02385147be0cf8fdf2fdcc393190f8f887eca5,2024-04-30T13:11:16.690000 +CVE-2024-43373,1,1,ed8a992aa058440c637b3dc2bbcf107e169a847d01fcfdc3684d410eea4545c0,2024-08-15T15:15:21.217000 CVE-2024-4339,0,0,240ed7230e0a6e458ae0cd6534f1dc024d6c16f3537e0357643e823e6aa09596,2024-05-14T16:11:39.510000 CVE-2024-4340,0,0,47279ef0860b5c8c8bd0a3697c64eecb43c1be11e1b93224b8fe23143c960d81,2024-04-30T17:52:35.057000 CVE-2024-4341,0,0,60a5b39ccdef4d059dc8073670ab0aea750a7880bf4e71543025f3d18b32ff1e,2024-07-08T15:49:22.437000 @@ -259030,7 +259036,7 @@ CVE-2024-6073,0,0,e03ebd767ac590d74109e38897ba792c96f7f9dfee79b1fa5bd262c10ac25e CVE-2024-6074,0,0,915dc1a478b1dc63b8eb0116a9c01d91f3bc138019e7c4a3ebc47481b04905bc,2024-08-01T14:00:10.323000 CVE-2024-6075,0,0,1cd7e5569456a26c7768214306daa7e1d9ce1093889f04b8131e5ae79338cd6f,2024-08-01T14:00:10.553000 CVE-2024-6076,0,0,f75c5e0cd2d3ad9cf3dc79d2ee6835febd9e3e1415fea3908528543dbed7f72e,2024-08-01T14:00:10.780000 -CVE-2024-6078,0,1,ab5ff4b9880bb2c597cf25a64a3bcf823d1e7a4d5b8fdbad8abe275837e77a97,2024-08-15T13:01:10.150000 +CVE-2024-6078,0,0,ab5ff4b9880bb2c597cf25a64a3bcf823d1e7a4d5b8fdbad8abe275837e77a97,2024-08-15T13:01:10.150000 CVE-2024-6079,0,0,ddff24cc98f45a02150b04530825a9b6e0cde9a4b6c677c473ea8a9f1baa2f50,2024-08-14T02:07:05.410000 CVE-2024-6080,0,0,2ad08bb329dff2f5ca525640c8314d702413aec2eadc0af776454094a000e617,2024-08-06T07:15:46.460000 CVE-2024-6082,0,0,276cd87669a06de72f4fd7da1f295faff84e8d70a51e1d99184ac4c2e8bf8b0f,2024-06-20T19:15:50.437000 @@ -259243,6 +259249,7 @@ CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdca CVE-2024-6344,0,0,ddc89c494afe0b7b80a518e0bed96070c096d29b8a0f403bdd242f60ce193de2,2024-06-27T00:15:13.360000 CVE-2024-6345,0,0,fc166d5e44485020c9b016f580b4f1c78befbdae01a9e6ec8b7e6b8d01a2e1ea,2024-07-15T13:00:34.853000 CVE-2024-6346,0,0,dd2451b3228a249be11318435f5e384b8c60f44f7f9b400e6ba532a21de9b77f,2024-08-01T12:42:36.933000 +CVE-2024-6347,1,1,ac2682842f660bd3f09be4cdb04a773fadc44f3437bd090b7f3fadeae99f373b,2024-08-15T15:15:22.093000 CVE-2024-6349,0,0,427eeb1c49748085f9d6a97a6add4281bc215342d4df9759ae2f609f0d24cf9a,2024-06-26T15:15:20.690000 CVE-2024-6353,0,0,3e7ee1ed054bc0661b7c1f2f3de9fe2ed8be61a7a777eee50734c66af6748302,2024-07-12T12:49:07.030000 CVE-2024-6354,0,0,c9410e2fdcd521ee7fa5aea0abe57bbff6ce1153eea9fc9c27ad647524c61c5c,2024-07-03T02:09:53.917000 @@ -259274,7 +259281,7 @@ CVE-2024-6387,0,0,db893df8e717a9bd82383b1c159531d9bd008b0dedb866ba3b332081811995 CVE-2024-6388,0,0,0ce37f83493b5d79bb3fdc963327390bc09266ac17f5f1de660cf43d4cdce70d,2024-06-27T17:11:52.390000 CVE-2024-6390,0,0,a350381d3f247972bbe468db9ec2332b3c135e89cdf36bdf1358f9f5965e67ff,2024-08-05T14:35:08.267000 CVE-2024-6391,0,0,f39301e9680e09028795caddd1f0219ac421e8fbe3773aa2e024531728c8f9e1,2024-07-09T18:19:14.047000 -CVE-2024-6392,0,0,59a0778055c9ae4fa55c964a2a449c5eba0adacd372cf3ba0a728f148d4da23a,2024-07-12T12:49:07.030000 +CVE-2024-6392,0,1,edc3ee0e5658afb33c71de43cf2ca6ea07650ea12323a6b995125316053d44cb,2024-08-15T14:56:16.490000 CVE-2024-6395,0,0,1966cf71699330f1b667831d53a0cb914c964c7509fe8ae4316297f8fa4eb9b4,2024-07-17T13:34:20.520000 CVE-2024-6396,0,0,9e4b547b4d90c33704c90a7cfe67a136b4a49a6d0168d4ba570b6960a74fd1cc,2024-07-12T12:49:07.030000 CVE-2024-6397,0,0,69c6adc6e74f8320b438655fc21122936f7ec03e924b3cf51bf011308451b2af,2024-07-12T17:02:56.110000 @@ -259361,8 +259368,8 @@ CVE-2024-6528,0,0,568c43fb32d79fc097335d9307aebc42d71a690423942e01ce8dbade6b5bed CVE-2024-6529,0,0,39f9da174065ddfb2f1cb6d88de520cca12e78f6992a8df9512aec7d73b21efd,2024-08-01T14:35:13.090000 CVE-2024-6531,0,0,1125a21608be8cb0502ea86867294670584ed16918c5bd752fdbbd37969404b8,2024-07-12T12:49:11.340000 CVE-2024-6532,0,0,21d26a8f00408d7c0c1c4ea0dfdffc81ca804ea427b5b751972725c0e03a2bc3,2024-08-14T13:00:37.107000 -CVE-2024-6533,0,1,1fe3821a4fa82ece523eea342a341b31032ad8dc40900963216e4d33ee848dce,2024-08-15T13:01:10.150000 -CVE-2024-6534,0,1,e155de078d07184e703430b5c5ab1829307a03b153b3dfcf3e36447afb88a4b8,2024-08-15T13:01:10.150000 +CVE-2024-6533,0,0,1fe3821a4fa82ece523eea342a341b31032ad8dc40900963216e4d33ee848dce,2024-08-15T13:01:10.150000 +CVE-2024-6534,0,0,e155de078d07184e703430b5c5ab1829307a03b153b3dfcf3e36447afb88a4b8,2024-08-15T13:01:10.150000 CVE-2024-6535,0,0,d515bd0c9a2788945f1c070eede854437b7a1c58e6a79916f8d2b46233d5b6de,2024-07-25T16:15:04.583000 CVE-2024-6536,0,0,db3a8f54349ce01fbebd842277117fe6b2369b9af6752930ef3e5c8ea43f79f4,2024-07-30T13:32:45.943000 CVE-2024-6539,0,0,81a7a773476044a536e1904849aff55df114add8144e8265b917f8120b92d867,2024-07-11T14:56:20.733000 @@ -259665,8 +259672,8 @@ CVE-2024-7057,0,0,e86292da776d8c2eee12db885a241ac453174252cdfea8e6058f6d373bd4dc CVE-2024-7060,0,0,2e0c92013c1ddde1bca0ad9e62aa50d23e69e1a598796a2170f54fccf61e7f4b,2024-07-25T12:36:39.947000 CVE-2024-7061,0,0,686447eb073761a4f06d26ef5139931ec89b27cf41fe306832f1b298f86de885,2024-08-07T19:09:46.290000 CVE-2024-7062,0,0,d6f409aeb13130ff6f4252d4a7aadcbcfc3eecb0d68f9e3338eff0add9df7d66,2024-07-26T12:38:41.683000 -CVE-2024-7063,0,1,95ad8099aab95a9dde7fc37042b2cc7e5a2b9ad07519f93346e3b69c18acff02,2024-08-15T13:01:10.150000 -CVE-2024-7064,0,1,e3a211bb9c50180254bebd2ee2b1ef5aa24a2d62eccbaf522e0ed9fe23e0e26d,2024-08-15T13:01:10.150000 +CVE-2024-7063,0,0,95ad8099aab95a9dde7fc37042b2cc7e5a2b9ad07519f93346e3b69c18acff02,2024-08-15T13:01:10.150000 +CVE-2024-7064,0,0,e3a211bb9c50180254bebd2ee2b1ef5aa24a2d62eccbaf522e0ed9fe23e0e26d,2024-08-15T13:01:10.150000 CVE-2024-7065,0,0,861ad9f4a94f327ec6cfd0f89d5da23664e863601bc1e4fe87c301d15a9d3692,2024-07-24T12:55:13.223000 CVE-2024-7066,0,0,f0b9597030c216e17a91b9bbd330c3ccd1220fd3a9abefaf98fb6df981dc96f4,2024-07-24T12:55:13.223000 CVE-2024-7067,0,0,edbddb223a917ac8e1a9e4a55d4a5029d93724357fc61dc50ee8384e13f8f4e7,2024-07-26T13:14:31.417000 @@ -259782,6 +259789,8 @@ CVE-2024-7252,0,0,b11855d09d58123416b1c452f42a306230094dfbea0e43cbf3d1a4ad2d82d8 CVE-2024-7255,0,0,fd2a8f993022fe32cb5a87546341ab7eeda32776ebc3f07d5c930f36c0483b95,2024-08-02T12:59:43.990000 CVE-2024-7256,0,0,28c6c5405ca0661376f4706f7e75647b14826bc648847c0c2ef29d4ee5bafea0,2024-08-03T18:35:04.003000 CVE-2024-7257,0,0,e6ef266df52e25692b132cfb6522d79defb5eb3e548daae54be1d69b0c3ab16e,2024-08-05T12:41:45.957000 +CVE-2024-7262,1,1,868a4f896dec783318f2ee208cc5c7c3b5f461076ab76497b65d05b176a41ea9,2024-08-15T15:15:22.290000 +CVE-2024-7263,1,1,bf4791f07300a049e277c5537894dd2593766db96c421b0c9d7bbf1b4065b2b3,2024-08-15T15:15:22.453000 CVE-2024-7264,0,0,12a75b53a7f63996bb7b4af3d1a6b7462e167bb63f5a12a5607f29e5ee63586a,2024-08-12T17:30:51.880000 CVE-2024-7265,0,0,b8acefabc570cba3338fbcc031201c451674349cab85dfd61e02fb2e8f5c7f19,2024-08-08T15:15:18.970000 CVE-2024-7266,0,0,40ec5b3f4d10f4b6f3816acd7da5d1c216bf118efd4b627aae50abb96a0696e6,2024-08-07T15:17:46.717000 @@ -259882,12 +259891,12 @@ CVE-2024-7399,0,0,94de8cab81b119f815fa73c008811f38562f3609d3da13634aecbd720ea861 CVE-2024-7408,0,0,a5191010d29cd8fd3daea07e74870b9bf130ede8610ab518fb24ce3a11a386f4,2024-08-13T16:06:08.213000 CVE-2024-7409,0,0,fe0e27b90db802bc9518336b034685fa4c799cf8d0788ebbf26f89b44bf0ec6f,2024-08-06T16:31:05.780000 CVE-2024-7410,0,0,247c090cb12333e31f3a0efea00d18747dfe5a3d5c256e6005fe0d4e1c4d1667,2024-08-12T13:41:36.517000 -CVE-2024-7411,0,1,941e8becce5edb70d6342923f39c1a594a9a6c9bbd15bb37cc29f8ece3cbe3d3,2024-08-15T13:01:10.150000 +CVE-2024-7411,0,0,941e8becce5edb70d6342923f39c1a594a9a6c9bbd15bb37cc29f8ece3cbe3d3,2024-08-15T13:01:10.150000 CVE-2024-7412,0,0,b2cec2bd274b261ef09607f2e770ed1c42b7cfc2487929d65308251b8ca5fb1a,2024-08-12T13:41:36.517000 CVE-2024-7413,0,0,1e2e6e629ae076e767a4ed710c2f32c76d2bd71396701e30749c7812afe7edb9,2024-08-12T13:41:36.517000 CVE-2024-7414,0,0,75779b8687375e2d55d3e2d954892bdff56935440cca361ae4c6a6a0a4f3bed5,2024-08-12T13:41:36.517000 CVE-2024-7416,0,0,9f5565f11e96fff207b91fc0825d45934365835075928991c71489e2cad44813,2024-08-12T13:41:36.517000 -CVE-2024-7420,0,1,900b53573d93f498a815ef6b5a664e0852d0bc5883291fa6f9b7211ca7e3509a,2024-08-15T13:01:10.150000 +CVE-2024-7420,0,0,900b53573d93f498a815ef6b5a664e0852d0bc5883291fa6f9b7211ca7e3509a,2024-08-15T13:01:10.150000 CVE-2024-7436,0,0,4e5f8b4434de8d3be7545b252fde74866f6d1e15f143f31c26845d516524cae6,2024-08-05T12:41:45.957000 CVE-2024-7437,0,0,6536d7f97d7ad58b67ec8c23497b1bab63383020d43415bc5b4c83af23e0fa6d,2024-08-12T13:38:43.060000 CVE-2024-7438,0,0,e0751aac5a1208089fd3136e155c05769dcef78130a2d9c6fdc04c87ca92fb9a,2024-08-12T13:38:43.203000 @@ -259910,10 +259919,10 @@ CVE-2024-7458,0,0,2c9d4dd630ee9d646df3107c9eafd0e6cad217e61388b41410f8713d27f859 CVE-2024-7459,0,0,53c79cef732ccbff6adb36bb342854abc83915346c054d98b70903c7c6347372,2024-08-06T17:14:16.667000 CVE-2024-7460,0,0,d48d1421ea3ce9fda403f952725d01106181045f180d1b45462656996088205d,2024-08-06T17:19:25.597000 CVE-2024-7461,0,0,189ae990a8c2eef74fc9b600d565c2ec70cc463fa8cf230cacb55e0adada7e7a,2024-08-05T12:41:45.957000 -CVE-2024-7462,0,1,2cac77ec17ae20c4dc4e5d7bf53769fdd387d45adec5f3f229688e30e8ff78fc,2024-08-15T13:16:26.113000 -CVE-2024-7463,0,1,638cc4f7f70495dee2d171348ad4cef985451fd3918228f4f52868fcb07733ed,2024-08-15T13:15:55.170000 -CVE-2024-7464,0,1,139bb5dec916abceb981b7aebc3328ff09288b94e952f0c1eb1a4e05e89a7bfa,2024-08-15T13:15:28.367000 -CVE-2024-7465,0,1,e4a77acfac37d1d12f779d53367e4990aef64c3303266545f002bc3ed60f6dda,2024-08-15T13:11:59.413000 +CVE-2024-7462,0,0,2cac77ec17ae20c4dc4e5d7bf53769fdd387d45adec5f3f229688e30e8ff78fc,2024-08-15T13:16:26.113000 +CVE-2024-7463,0,0,638cc4f7f70495dee2d171348ad4cef985451fd3918228f4f52868fcb07733ed,2024-08-15T13:15:55.170000 +CVE-2024-7464,0,0,139bb5dec916abceb981b7aebc3328ff09288b94e952f0c1eb1a4e05e89a7bfa,2024-08-15T13:15:28.367000 +CVE-2024-7465,0,0,e4a77acfac37d1d12f779d53367e4990aef64c3303266545f002bc3ed60f6dda,2024-08-15T13:11:59.413000 CVE-2024-7466,0,0,4a7493679a7686875f96443bb29dcb52f0aca6db65eafd0ddf5cfb55fbb78713,2024-08-06T17:27:55.297000 CVE-2024-7467,0,0,1635aa1540733ea32e6f2c1b73b541d5af5dfcd94c3797172bd89de0083b5639,2024-08-06T17:31:58.323000 CVE-2024-7468,0,0,beaf0f0ce0713b119a6aad075faba99ddbbf9b51410059760701d7a29a28a4df,2024-08-06T17:35:40.080000 @@ -259937,10 +259946,10 @@ CVE-2024-7502,0,0,400715e8cd7f13a2a067bad8525237ee0b427d91f26288ec69911983b1e213 CVE-2024-7503,0,0,e784b3ab46a1e81c39e310fabae0c1eb2177c76661481ff0b29d2e5ba473397f,2024-08-12T13:41:36.517000 CVE-2024-7505,0,0,aecd8f77bf4729577cedcf26eddaf42651063906380e7519311f6a7e624532e3,2024-08-06T16:30:24.547000 CVE-2024-7506,0,0,83bf779e76b2f1cdbd01b68e2c6cb45ed4862a6d64f57c3f27fd8241cef70031,2024-08-06T16:30:24.547000 -CVE-2024-7507,0,1,7516958446779a101827a9fd290cdb6c733b72b0427bb2888dd2b3a09e0ccfd2,2024-08-15T13:01:10.150000 +CVE-2024-7507,0,0,7516958446779a101827a9fd290cdb6c733b72b0427bb2888dd2b3a09e0ccfd2,2024-08-15T13:01:10.150000 CVE-2024-7512,0,0,b63cf02b54f6a1c55700caf6b213a1220f80db8363689f29712535d27562382e,2024-08-12T13:41:36.517000 -CVE-2024-7513,0,1,e7288ee9c1b72d0a4fe1140edf2cf41064546a13fddc0f9d6e58908f93e8b342,2024-08-15T13:01:10.150000 -CVE-2024-7515,0,1,d2cf9fc86090e834de1b7a8b9924a3e4acb7ae490203dd64ba71e33843de016b,2024-08-15T13:01:10.150000 +CVE-2024-7513,0,0,e7288ee9c1b72d0a4fe1140edf2cf41064546a13fddc0f9d6e58908f93e8b342,2024-08-15T13:01:10.150000 +CVE-2024-7515,0,0,d2cf9fc86090e834de1b7a8b9924a3e4acb7ae490203dd64ba71e33843de016b,2024-08-15T13:01:10.150000 CVE-2024-7518,0,0,0273ca4eeb92697ec5dfc38e32e28b00efa9adf5d48621c9ed57564620a11777,2024-08-06T23:15:59.653000 CVE-2024-7519,0,0,d6b76960785055c5e3c2658ffad1f8ba4c01f9383c9459dab1efa4da32737657,2024-08-12T16:04:20 CVE-2024-7520,0,0,f9e9090d09f3e3bdf7bb5b1e415fd5962f71ad30fc0e4e64eb0eb80aba152203,2024-08-12T16:04:46.790000 @@ -260003,9 +260012,9 @@ CVE-2024-7614,0,0,d7cc9c45c708dde228724405eed42fed1e1e5a328ee0ca2886de1c39b6c0c7 CVE-2024-7615,0,0,6c5a3d2b322898b551bada40c532b08076a3798009e747124e833bfdffe0bb9a,2024-08-12T13:41:36.517000 CVE-2024-7616,0,0,240142a7cf93711d379b14c2a6284d004fd0a2d1c674fc02d32efdd57aa3e2bd,2024-08-13T16:59:39.517000 CVE-2024-7621,0,0,1acf6d4c2a821fce1e3f9264509576725bd5b71a2c3ef943afe6ab5d29351820,2024-08-12T13:41:36.517000 -CVE-2024-7624,0,1,fe880bbf70f7d6e0e0d7959fc4667ae33cede9b405a9b87471b54fc1288842d6,2024-08-15T13:01:10.150000 -CVE-2024-7625,0,1,f8c051bee159f37ecabf1edf8939b9aaaa1199377d2392fdca002a4a5223d380,2024-08-15T13:01:10.150000 -CVE-2024-7628,0,1,3ea535a326d0197b5259672683acf97672f398fa364ea0c9846f4657432fb454,2024-08-15T13:01:10.150000 +CVE-2024-7624,0,0,fe880bbf70f7d6e0e0d7959fc4667ae33cede9b405a9b87471b54fc1288842d6,2024-08-15T13:01:10.150000 +CVE-2024-7625,0,0,f8c051bee159f37ecabf1edf8939b9aaaa1199377d2392fdca002a4a5223d380,2024-08-15T13:01:10.150000 +CVE-2024-7628,0,0,3ea535a326d0197b5259672683acf97672f398fa364ea0c9846f4657432fb454,2024-08-15T13:01:10.150000 CVE-2024-7633,0,0,3b1df1487eb71af2061753f656e2660f3fdd60b89404cd84fa2c01a4dff29ee6,2024-08-12T13:38:45.690000 CVE-2024-7635,0,0,330e4c31af06e1fa39a084a042067cc2714cfc9a1302a27b2cb8b725b37ba5f4,2024-08-12T13:41:36.517000 CVE-2024-7636,0,0,c4f4b71cbb74b70101cbb74c711b9665ce07671c635fe9367b91f52e05f765d3,2024-08-12T13:41:36.517000 @@ -260052,7 +260061,7 @@ CVE-2024-7705,0,0,a3429c66c8f2f4d9e27d0928f48e140883704bb780896a841b0634c11d32b5 CVE-2024-7706,0,0,1056fcaa3affff4b3f9a6b703c011337d2adc8c6bdf71227e831082308194760,2024-08-13T12:58:25.437000 CVE-2024-7707,0,0,08017af054a9aea4cbec493bee72603fd26524b137f48eec425b10e1c9a2c5ce,2024-08-13T12:58:25.437000 CVE-2024-7709,0,0,9890807a1991d90435fddd18848992ba127ee8603dc9d09cd6e46bfbc80702ff,2024-08-13T12:58:25.437000 -CVE-2024-7715,0,0,8fd48723a372436c32560fa2c7f60e4a655a01d974d6761ea5587918aaffe0b1,2024-08-14T21:15:17.320000 +CVE-2024-7715,0,1,cce2a99e52ea07f4f42d2501434c3e0483cd57d931341a557261d628f3236d39,2024-08-15T15:15:22.690000 CVE-2024-7728,0,0,6e291d9f53263e2fb59ac76ca77cbca952de50403aadce3c0e948994f87ca9a9,2024-08-14T13:00:37.107000 CVE-2024-7729,0,0,2bbcc23121d3cbbbfd7b7747e3325c391cd14964f404891acd614a24c4694f71,2024-08-14T13:00:37.107000 CVE-2024-7731,0,0,cc7ade0dcc3d2cb1ff1cf78974d45c78ed00c279543f0c65387d34f0cb1eab8c,2024-08-14T13:00:37.107000 @@ -260073,22 +260082,24 @@ CVE-2024-7752,0,0,73e4b629405febd909a20d2bdf05bd801ba948b04dee94f179170b3e935ffe CVE-2024-7753,0,0,b0db6f3a14d1f7e0243db2086cbbc3f8d47517418efcb595a5b9d08613529d8e,2024-08-14T02:07:05.410000 CVE-2024-7754,0,0,cfa4970703cb089ea87b128d9ab797dcab545ca14743c8dcbadbff8f256ecc1b,2024-08-14T02:07:05.410000 CVE-2024-7790,0,0,995e22accad9ea677c3614d140f7dba69e4478a2921b11a76ef2d56b76f294d0,2024-08-14T17:49:14.177000 -CVE-2024-7792,0,1,4a8c00c31db08f09baf6ed34c1b3ad3dae493e58a839f1a0126bae9e368c13ea,2024-08-15T13:01:10.150000 -CVE-2024-7793,0,1,1f0938f35d4e1e27e7025be92cc91d543f53c450db227a4ef64d84646bb99c4b,2024-08-15T13:01:10.150000 -CVE-2024-7794,0,1,6f3a8a08e9f61a0e7ffc01db42f62c87c58b44d0ab4239aff4c85f93a0e1b319,2024-08-15T13:01:10.150000 -CVE-2024-7797,0,1,e81db4ef7da18ef45d1b5cd227ea6ed7c8a1cfc90bba7050edabf442fc2ddafc,2024-08-15T13:01:10.150000 -CVE-2024-7798,0,1,b523ccda91c54e13c0e3719a111f6d5c1668d7248a513bee770cb78cfce439d2,2024-08-15T13:01:10.150000 -CVE-2024-7799,0,1,bb0f3e65fc22e7956fa07aa27cb5f6fa6cc6cee4cec465ec9d0a0fcbce3d269b,2024-08-15T13:01:10.150000 -CVE-2024-7800,0,1,d625b4d58fe73772a07815131cb3fbf3e97bffd1ca27993579233c951fb4dcfb,2024-08-15T13:01:10.150000 -CVE-2024-7808,0,1,fa0a480985c4934803737fc40c57e849076368131bfbff09ddc334a37efcda92,2024-08-15T13:01:10.150000 -CVE-2024-7809,0,1,ff36b17915dd1631b65674fd0e00724b10b0894fec6c62c95281d1c5d75264e9,2024-08-15T13:01:10.150000 -CVE-2024-7810,0,1,392e668e89d495b6bdf6597a4d362c469e13069cb0d78e1957c34dceeb745bad,2024-08-15T13:01:10.150000 -CVE-2024-7811,0,1,eb904307eba2fc1102d9324cefc63fe631672e44b86c85338b8d95e8fbd5faa0,2024-08-15T13:01:10.150000 -CVE-2024-7812,0,1,a3986f3d0ea729b27440d86fddb3a732a73f5c5198d35b4f4bacbca1bacca3ee,2024-08-15T13:01:10.150000 -CVE-2024-7813,0,1,953a25de285d44c4a971712737f1cc4009963bd327015e45e35f975addbe57d2,2024-08-15T13:01:10.150000 -CVE-2024-7814,0,1,ff83e4fbbf4c876ed888c2f2666e7e83313eae76aaf20a7131ca66c74ac76422,2024-08-15T13:01:10.150000 -CVE-2024-7815,0,1,13c82cc57f404c9d32b7bb30767131d4be6771d137706dc927f3ce9c3db1b281,2024-08-15T13:01:10.150000 -CVE-2024-7828,1,1,c9aa1fe820074c1de5a697818041dda7c44348235ee25472acec728572bfee55,2024-08-15T13:33:37.047000 -CVE-2024-7829,1,1,878c7f6f66b26b66b174d63cbe8def0e767862f24e6fcb8c92a836c6b091a2e8,2024-08-15T13:33:37.047000 -CVE-2024-7830,1,1,f5b300e117f60478f18e2ba725c948108cebaa8d52844b24cad00a52caf896ae,2024-08-15T13:33:37.047000 -CVE-2024-7831,1,1,e1c6ca38b2b70b83ba4044d3a6e779562a550061ac52551db9fc03b3da51afe2,2024-08-15T13:33:37.047000 +CVE-2024-7792,0,0,4a8c00c31db08f09baf6ed34c1b3ad3dae493e58a839f1a0126bae9e368c13ea,2024-08-15T13:01:10.150000 +CVE-2024-7793,0,0,1f0938f35d4e1e27e7025be92cc91d543f53c450db227a4ef64d84646bb99c4b,2024-08-15T13:01:10.150000 +CVE-2024-7794,0,0,6f3a8a08e9f61a0e7ffc01db42f62c87c58b44d0ab4239aff4c85f93a0e1b319,2024-08-15T13:01:10.150000 +CVE-2024-7797,0,0,e81db4ef7da18ef45d1b5cd227ea6ed7c8a1cfc90bba7050edabf442fc2ddafc,2024-08-15T13:01:10.150000 +CVE-2024-7798,0,0,b523ccda91c54e13c0e3719a111f6d5c1668d7248a513bee770cb78cfce439d2,2024-08-15T13:01:10.150000 +CVE-2024-7799,0,0,bb0f3e65fc22e7956fa07aa27cb5f6fa6cc6cee4cec465ec9d0a0fcbce3d269b,2024-08-15T13:01:10.150000 +CVE-2024-7800,0,0,d625b4d58fe73772a07815131cb3fbf3e97bffd1ca27993579233c951fb4dcfb,2024-08-15T13:01:10.150000 +CVE-2024-7808,0,0,fa0a480985c4934803737fc40c57e849076368131bfbff09ddc334a37efcda92,2024-08-15T13:01:10.150000 +CVE-2024-7809,0,0,ff36b17915dd1631b65674fd0e00724b10b0894fec6c62c95281d1c5d75264e9,2024-08-15T13:01:10.150000 +CVE-2024-7810,0,0,392e668e89d495b6bdf6597a4d362c469e13069cb0d78e1957c34dceeb745bad,2024-08-15T13:01:10.150000 +CVE-2024-7811,0,0,eb904307eba2fc1102d9324cefc63fe631672e44b86c85338b8d95e8fbd5faa0,2024-08-15T13:01:10.150000 +CVE-2024-7812,0,0,a3986f3d0ea729b27440d86fddb3a732a73f5c5198d35b4f4bacbca1bacca3ee,2024-08-15T13:01:10.150000 +CVE-2024-7813,0,0,953a25de285d44c4a971712737f1cc4009963bd327015e45e35f975addbe57d2,2024-08-15T13:01:10.150000 +CVE-2024-7814,0,0,ff83e4fbbf4c876ed888c2f2666e7e83313eae76aaf20a7131ca66c74ac76422,2024-08-15T13:01:10.150000 +CVE-2024-7815,0,0,13c82cc57f404c9d32b7bb30767131d4be6771d137706dc927f3ce9c3db1b281,2024-08-15T13:01:10.150000 +CVE-2024-7828,0,0,c9aa1fe820074c1de5a697818041dda7c44348235ee25472acec728572bfee55,2024-08-15T13:33:37.047000 +CVE-2024-7829,0,1,5770f365a076f0accdd49fc395aceacc3d7e37f29f31a33c88a490ae2215ff45,2024-08-15T14:15:13.560000 +CVE-2024-7830,0,1,09bf2efa57c08deecac5c8f70d836daf289b589bae48bb7e9a20c84698e5fffa,2024-08-15T15:15:25.340000 +CVE-2024-7831,0,1,17b0b6c3d57879abf71f38d44669866ee80a59178d7b071aa3edd65998b13828,2024-08-15T15:15:25.947000 +CVE-2024-7832,1,1,e5b3e136a62ba0d72936cf11873f8e282a81203098d2a4f7c5def63fbeb240a3,2024-08-15T14:15:14.210000 +CVE-2024-7833,1,1,1328273c7443c3d89c66c2ced7ab889fa0872b017ee58c09b6bca7e3cc6c267a,2024-08-15T14:15:14.720000