Auto-Update: 2024-08-09T16:00:17.574530+00:00

This commit is contained in:
cad-safe-bot 2024-08-09 16:03:13 +00:00
parent ab7543d541
commit 535c6210f2
33 changed files with 1917 additions and 207 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22278",
"sourceIdentifier": "security@vmware.com",
"published": "2024-08-02T01:15:23.077",
"lastModified": "2024-08-02T12:59:43.990",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-09T14:04:28.257",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "security@vmware.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "security@vmware.com",
"type": "Secondary",
@ -51,10 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:linuxfoundation:harbor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.9.5",
"matchCriteriaId": "5E90E376-D680-4DB6-90B9-81B7144C287F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:linuxfoundation:harbor:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.10.0",
"versionEndExcluding": "2.10.3",
"matchCriteriaId": "3BFE92EA-3C83-4C23-BDB3-FDDCAF9A6BA8"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/goharbor/harbor/security/advisories/GHSA-hw28-333w-qxp3",
"source": "security@vmware.com"
"source": "security@vmware.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24246",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-29T20:15:41.407",
"lastModified": "2024-04-01T15:32:10.190",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-09T15:35:01.597",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25770",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-26T18:15:07.810",
"lastModified": "2024-02-26T22:10:40.463",
"lastModified": "2024-08-09T15:35:02.783",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "libming 0.4.8 contiene una vulnerabilidad de p\u00e9rdida de memoria en /libming/src/actioncompiler/listaction.c."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"references": [
{
"url": "https://github.com/LuMingYinDetect/libming_defects/blob/main/libming_detect_1.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-30973",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-06T22:15:08.687",
"lastModified": "2024-05-07T13:39:32.710",
"lastModified": "2024-08-09T15:35:03.983",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Un problema en V-SOL G/EPON ONU HG323AC-B con la versi\u00f3n de firmware V2.0.08-210715 permite a un atacante ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s de una solicitud POST manipulada para /boaform/getASPdata/formFirewall, /boaform/getASPdata/formAcc ."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/Athos-Zago/CVE-2024-30973/tree/main",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-32307",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T13:15:08.340",
"lastModified": "2024-04-17T15:31:50.160",
"lastModified": "2024-08-09T15:35:04.790",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "El firmware Tenda FH1205 V2.0.0.7(775) tiene una vulnerabilidad de desbordamiento de pila ubicada a trav\u00e9s del par\u00e1metro PPW en la funci\u00f3n fromWizardHandle."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/fromWizardHandle.md",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40719",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-08-02T10:16:00.470",
"lastModified": "2024-08-02T12:59:43.990",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-09T14:36:32.300",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:changingtec:tcb_servisign:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "1.0.24.0318",
"matchCriteriaId": "4F2A798C-915D-4A62-A562-5B1AFE7899A9"
}
]
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-7970-e8ac5-2.html",
"source": "twcert@cert.org.tw"
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-7964-5b266-1.html",
"source": "twcert@cert.org.tw"
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40720",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-08-02T11:16:42.763",
"lastModified": "2024-08-02T12:59:43.990",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-09T14:36:35.047",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "twcert@cert.org.tw",
"type": "Secondary",
@ -41,8 +61,18 @@
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "twcert@cert.org.tw",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:changingtec:tcb_servisign:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "1.0.24.0318",
"matchCriteriaId": "4F2A798C-915D-4A62-A562-5B1AFE7899A9"
}
]
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-7971-d9584-2.html",
"source": "twcert@cert.org.tw"
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-7965-8285d-1.html",
"source": "twcert@cert.org.tw"
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40721",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-08-02T11:16:43.020",
"lastModified": "2024-08-02T12:59:43.990",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-09T14:36:58.623",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -41,8 +41,18 @@
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "twcert@cert.org.tw",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,14 +61,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:changingtec:tcb_servisign:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "1.0.24.0318",
"matchCriteriaId": "4F2A798C-915D-4A62-A562-5B1AFE7899A9"
}
]
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-7972-01a6e-2.html",
"source": "twcert@cert.org.tw"
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-7966-8c6c3-1.html",
"source": "twcert@cert.org.tw"
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40722",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-08-02T11:16:43.283",
"lastModified": "2024-08-02T12:59:43.990",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-09T14:39:28.157",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -41,8 +41,18 @@
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "twcert@cert.org.tw",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,14 +61,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:changingtec:tcb_servisign:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "1.0.24.0318",
"matchCriteriaId": "4F2A798C-915D-4A62-A562-5B1AFE7899A9"
}
]
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-7973-e10c6-2.html",
"source": "twcert@cert.org.tw"
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-7967-9efdf-1.html",
"source": "twcert@cert.org.tw"
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40723",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-08-02T11:16:43.520",
"lastModified": "2024-08-02T12:59:43.990",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-09T14:44:01.907",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "twcert@cert.org.tw",
"type": "Secondary",
@ -51,14 +61,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:changingtec:hwatai_servisign:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "1.0.24.0219",
"matchCriteriaId": "358A34CE-1E5F-47F3-AC1E-A2370EEA2C89"
}
]
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-7974-0562f-2.html",
"source": "twcert@cert.org.tw"
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-7968-ce2ef-1.html",
"source": "twcert@cert.org.tw"
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41957",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-01T22:15:29.367",
"lastModified": "2024-08-02T12:59:43.990",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-09T14:14:01.190",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-415"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.1.0647",
"matchCriteriaId": "E45F378C-A666-4E59-AE67-FD0B7BEC9D24"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/vim/vim/commit/8a0bbe7b8aad6f8da28dee218c01bc8a0185a",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/vim/vim/security/advisories/GHSA-f9cr-gv85-hcr4",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41965",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-01T22:15:29.567",
"lastModified": "2024-08-02T12:59:43.990",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-09T14:09:32.507",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 3.4
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-415"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.1.0648",
"matchCriteriaId": "4220739E-D0C8-4511-8023-B73AB5731DF1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/vim/vim/commit/b29f4abcd4b3382fa746edd1d0562b7b48c",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/vim/vim/security/advisories/GHSA-46pw-v7qw-xc2f",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42152",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-30T08:15:06.763",
"lastModified": "2024-07-30T13:32:45.943",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-09T14:55:35.753",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,136 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nvmet: corrige una posible fuga al destruir un ctrl durante el establecimiento de qp En nvmet_sq_destroy capturamos sq->ctrl temprano y si no es NULL sabemos que se asign\u00f3 un ctrl (en el controlador de solicitudes de conexi\u00f3n de administrador) y necesitamos liberar los AER pendientes, borrar ctrl->sqs y sq->ctrl (principalmente para nvme-loop) y eliminar la referencia final en ctrl. Sin embargo, es posible una peque\u00f1a ventana donde se inicia nvmet_sq_destroy (como resultado de que el cliente se rinde y se desconecta) al mismo tiempo que el cmd de conexi\u00f3n del administrador de nvme (que puede estar en una etapa inicial). Pero *antes* de kill_and_confirm de sq->ref (es decir, la conexi\u00f3n del administrador logr\u00f3 obtener una referencia en vivo de sq). En este caso, se asign\u00f3 sq->ctrl sin embargo despu\u00e9s de ser capturado en una variable local en nvmet_sq_destroy. Esto evit\u00f3 la ca\u00edda de la referencia final en Ctrl. Resuelva esto volviendo a capturar sq->ctrl despu\u00e9s de que se hayan completado todas las solicitudes en curso, donde con seguridad la referencia sq->ctrl es definitiva, y avance en funci\u00f3n de eso. Este problema se observ\u00f3 en un entorno con muchos hosts que conectaban m\u00faltiples controles simult\u00e1neamente, lo que creaba un retraso en la asignaci\u00f3n de un control que conduc\u00eda a esta ventana de ejecuci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.8",
"versionEndExcluding": "5.10.222",
"matchCriteriaId": "6A024C9F-1F70-4EB4-B7D0-432011590CAB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.163",
"matchCriteriaId": "A97DEB09-4927-40F8-B5C6-F5BD5EAE0CFD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.98",
"matchCriteriaId": "E09E92A5-27EF-40E4-926A-B1CDC8270551"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.39",
"matchCriteriaId": "29E894E4-668F-4DB0-81F7-4FB5F698E970"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.9",
"matchCriteriaId": "ADCC1407-0CB3-4C8F-B4C5-07F682CD7085"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
"matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/2f3c22b1d3d7e86712253244797a651998c141fa",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5502c1f1d0d7472706cc1f201aecf1c935d302d1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/818004f2a380420c19872171be716174d4985e33",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/940a71f08ef153ef807f751310b0648d1fa5d0da",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b4fed1443a6571d49c6ffe7d97af3bbe5ee6dff5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c758b77d4a0a0ed3a1292b3fd7a2aeccd1a169a4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7335",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-01T02:15:02.900",
"lastModified": "2024-08-01T12:42:36.933",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-09T14:05:30.013",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -109,6 +129,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +150,67 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:ex200_firmware:4.0.3c.7646_b20201211:*:*:*:*:*:*:*",
"matchCriteriaId": "DFAA2333-6AF0-4F2C-8695-0DE2024C634E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:ex200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CCFDF09E-D255-4F5B-A099-71EE37A56492"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/EX200/getSaveConfig.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.273258",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.273258",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.379313",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7336",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-01T03:15:01.717",
"lastModified": "2024-08-01T12:42:36.933",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-09T14:38:01.050",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,68 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:ex200_firmware:4.0.3c.7646_b20201211:*:*:*:*:*:*:*",
"matchCriteriaId": "DFAA2333-6AF0-4F2C-8695-0DE2024C634E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:ex200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CCFDF09E-D255-4F5B-A099-71EE37A56492"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/EX200/loginauth.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.273259",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.273259",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.379314",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7337",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-01T03:15:01.987",
"lastModified": "2024-08-01T12:42:36.933",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-09T14:15:19.283",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -109,6 +129,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +150,68 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:ex1200l_firmware:9.3.5u.6146_b20201023:*:*:*:*:*:*:*",
"matchCriteriaId": "F2A5A448-0444-4DA7-8C74-66AA5300D40D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:ex1200l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A4BC1501-2EAC-43B7-83E0-04FBA874D29D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/EX1200/loginauth.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.273260",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.273260",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.379315",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7338",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-01T04:15:05.017",
"lastModified": "2024-08-01T12:42:36.933",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-09T14:51:45.677",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,68 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:ex1200l_firmware:9.3.5u.6146_b20201023:*:*:*:*:*:*:*",
"matchCriteriaId": "F2A5A448-0444-4DA7-8C74-66AA5300D40D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:ex1200l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A4BC1501-2EAC-43B7-83E0-04FBA874D29D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/EX1200/setParentalRules.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.273261",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.273261",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.379316",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7359",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-01T17:16:09.923",
"lastModified": "2024-08-02T12:59:43.990",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-09T14:23:27.307",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oretnom23:tracking_monitoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AF7C4E2B-537C-4D3F-9B62-BFA33B679416"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/topsky979/6fbd27f1942d76f0392d883dfd8fef10",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.273338",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.273338",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.383494",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7360",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-01T18:15:26.880",
"lastModified": "2024-08-02T12:59:43.990",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-09T14:24:36.037",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oretnom23:tracking_monitoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AF7C4E2B-537C-4D3F-9B62-BFA33B679416"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/topsky979/ac97a335ed9fcf4eefe3c952928a6d0e",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.273339",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.273339",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.383495",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7361",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-01T18:15:27.140",
"lastModified": "2024-08-02T12:59:43.990",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-09T14:25:08.850",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oretnom23:tracking_monitoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AF7C4E2B-537C-4D3F-9B62-BFA33B679416"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/topsky979/f01eca07fce854bf5de96588126cdd7e",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.273340",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.273340",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.383496",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7362",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-01T19:15:52.513",
"lastModified": "2024-08-02T12:59:43.990",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-09T14:25:51.857",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oretnom23:tracking_monitoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AF7C4E2B-537C-4D3F-9B62-BFA33B679416"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/topsky979/96f43bd9f1477a56d1c8f8e08f0e5449",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.273341",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.273341",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.383497",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7363",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-01T19:15:52.770",
"lastModified": "2024-08-02T12:59:43.990",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-09T14:26:21.597",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oretnom23:tracking_monitoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AF7C4E2B-537C-4D3F-9B62-BFA33B679416"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/topsky979/69455a114e8718af6c611c86fbdc78b5",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.273342",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.273342",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.383498",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7364",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-01T20:15:32.467",
"lastModified": "2024-08-02T12:59:43.990",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-09T14:26:52.407",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oretnom23:tracking_monitoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AF7C4E2B-537C-4D3F-9B62-BFA33B679416"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/topsky979/b507afabd4e3da39e7eca6103435ba3a",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.273343",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.273343",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.383499",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7365",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-01T20:15:32.747",
"lastModified": "2024-08-02T12:59:43.990",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-09T14:27:35.003",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oretnom23:tracking_monitoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AF7C4E2B-537C-4D3F-9B62-BFA33B679416"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/topsky979/18a15150a99566009476d918d79a0bf9",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.273344",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.273344",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.383500",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7366",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-01T21:16:05.327",
"lastModified": "2024-08-02T12:59:43.990",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-09T14:16:32.443",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oretnom23:tracking_monitoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AF7C4E2B-537C-4D3F-9B62-BFA33B679416"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/topsky979/c0efd2f3e6e146eb9e110e5e63cb5fbb",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.273345",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.273345",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.383501",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7445",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-03T20:15:39.257",
"lastModified": "2024-08-05T12:41:45.957",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-09T15:36:06.757",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:emiloimagtolis:ticket_reservation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B210DD67-3AD3-4BE6-A789-DDD7D451D14D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/DeepMountains/Mirage/blob/main/CVE10-2.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.273530",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.273530",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.383644",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7446",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-03T21:15:39.830",
"lastModified": "2024-08-05T12:41:45.957",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-09T15:36:35.453",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:emiloimagtolis:ticket_reservation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B210DD67-3AD3-4BE6-A789-DDD7D451D14D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/DeepMountains/Mirage/blob/main/CVE10-3.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.273531",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.273531",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.383645",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7450",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-04T03:15:38.690",
"lastModified": "2024-08-05T12:41:45.957",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-09T15:33:58.153",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,48 @@
],
"metrics": {
"cvssMetricV40": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.7,
"baseSeverity": "HIGH"
}
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -61,6 +103,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +182,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:angeljudesuarez:placement_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F16A2F97-B41C-433C-B6F1-B14880A5F029"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/DeepMountains/Mirage/blob/main/CVE11-2.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.273541",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.273541",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.383860",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7451",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-04T04:17:03.547",
"lastModified": "2024-08-05T12:41:45.957",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-09T15:33:56.027",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,48 @@
],
"metrics": {
"cvssMetricV40": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.7,
"baseSeverity": "HIGH"
}
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -61,6 +103,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +182,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:angeljudesuarez:placement_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F16A2F97-B41C-433C-B6F1-B14880A5F029"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/DeepMountains/Mirage/blob/main/CVE11-3.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.273542",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.273542",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.383864",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7452",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-04T04:17:04.530",
"lastModified": "2024-08-05T12:41:45.957",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-09T15:33:53.797",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,48 @@
],
"metrics": {
"cvssMetricV40": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.7,
"baseSeverity": "HIGH"
}
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -61,6 +103,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +182,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:angeljudesuarez:placement_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F16A2F97-B41C-433C-B6F1-B14880A5F029"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/DeepMountains/Mirage/blob/main/CVE11-4.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.273543",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.273543",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.383865",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-7528",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-08-06T13:15:57.600",
"lastModified": "2024-08-06T23:16:00.250",
"lastModified": "2024-08-09T15:35:06.313",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect garbage collection interaction in IndexedDB could have led to a use-after-free. This vulnerability affects Firefox < 129, Firefox ESR < 128.1, and Thunderbird < 128.1."
},
{
"lang": "es",
"value": "La interacci\u00f3n incorrecta de recolecci\u00f3n de basura en IndexedDB podr\u00eda haber dado lugar a un use-after-free. Esta vulnerabilidad afecta a Firefox &lt; 129, Firefox ESR &lt; 128.1 y Thunderbird &lt; 128.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1895951",

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-08-09T14:00:16.699862+00:00
2024-08-09T16:00:17.574530+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-08-09T13:57:55.233000+00:00
2024-08-09T15:36:35.453000+00:00
```
### Last Data Feed Release
@ -44,17 +44,33 @@ Recently added CVEs: `0`
### CVEs modified in the last Commit
Recently modified CVEs: `9`
Recently modified CVEs: `31`
- [CVE-2024-32503](CVE-2024/CVE-2024-325xx/CVE-2024-32503.json) (`2024-08-09T13:34:04.417`)
- [CVE-2024-5506](CVE-2024/CVE-2024-55xx/CVE-2024-5506.json) (`2024-08-09T13:30:46.827`)
- [CVE-2024-5507](CVE-2024/CVE-2024-55xx/CVE-2024-5507.json) (`2024-08-09T13:30:39.467`)
- [CVE-2024-5508](CVE-2024/CVE-2024-55xx/CVE-2024-5508.json) (`2024-08-09T13:30:49.043`)
- [CVE-2024-5509](CVE-2024/CVE-2024-55xx/CVE-2024-5509.json) (`2024-08-09T13:30:36.887`)
- [CVE-2024-5690](CVE-2024/CVE-2024-56xx/CVE-2024-5690.json) (`2024-08-09T13:43:37.807`)
- [CVE-2024-7332](CVE-2024/CVE-2024-73xx/CVE-2024-7332.json) (`2024-08-09T13:55:52.587`)
- [CVE-2024-7333](CVE-2024/CVE-2024-73xx/CVE-2024-7333.json) (`2024-08-09T13:56:43.783`)
- [CVE-2024-7334](CVE-2024/CVE-2024-73xx/CVE-2024-7334.json) (`2024-08-09T13:57:55.233`)
- [CVE-2024-40720](CVE-2024/CVE-2024-407xx/CVE-2024-40720.json) (`2024-08-09T14:36:35.047`)
- [CVE-2024-40721](CVE-2024/CVE-2024-407xx/CVE-2024-40721.json) (`2024-08-09T14:36:58.623`)
- [CVE-2024-40722](CVE-2024/CVE-2024-407xx/CVE-2024-40722.json) (`2024-08-09T14:39:28.157`)
- [CVE-2024-40723](CVE-2024/CVE-2024-407xx/CVE-2024-40723.json) (`2024-08-09T14:44:01.907`)
- [CVE-2024-41957](CVE-2024/CVE-2024-419xx/CVE-2024-41957.json) (`2024-08-09T14:14:01.190`)
- [CVE-2024-41965](CVE-2024/CVE-2024-419xx/CVE-2024-41965.json) (`2024-08-09T14:09:32.507`)
- [CVE-2024-42152](CVE-2024/CVE-2024-421xx/CVE-2024-42152.json) (`2024-08-09T14:55:35.753`)
- [CVE-2024-7335](CVE-2024/CVE-2024-73xx/CVE-2024-7335.json) (`2024-08-09T14:05:30.013`)
- [CVE-2024-7336](CVE-2024/CVE-2024-73xx/CVE-2024-7336.json) (`2024-08-09T14:38:01.050`)
- [CVE-2024-7337](CVE-2024/CVE-2024-73xx/CVE-2024-7337.json) (`2024-08-09T14:15:19.283`)
- [CVE-2024-7338](CVE-2024/CVE-2024-73xx/CVE-2024-7338.json) (`2024-08-09T14:51:45.677`)
- [CVE-2024-7359](CVE-2024/CVE-2024-73xx/CVE-2024-7359.json) (`2024-08-09T14:23:27.307`)
- [CVE-2024-7360](CVE-2024/CVE-2024-73xx/CVE-2024-7360.json) (`2024-08-09T14:24:36.037`)
- [CVE-2024-7361](CVE-2024/CVE-2024-73xx/CVE-2024-7361.json) (`2024-08-09T14:25:08.850`)
- [CVE-2024-7362](CVE-2024/CVE-2024-73xx/CVE-2024-7362.json) (`2024-08-09T14:25:51.857`)
- [CVE-2024-7363](CVE-2024/CVE-2024-73xx/CVE-2024-7363.json) (`2024-08-09T14:26:21.597`)
- [CVE-2024-7364](CVE-2024/CVE-2024-73xx/CVE-2024-7364.json) (`2024-08-09T14:26:52.407`)
- [CVE-2024-7365](CVE-2024/CVE-2024-73xx/CVE-2024-7365.json) (`2024-08-09T14:27:35.003`)
- [CVE-2024-7366](CVE-2024/CVE-2024-73xx/CVE-2024-7366.json) (`2024-08-09T14:16:32.443`)
- [CVE-2024-7445](CVE-2024/CVE-2024-74xx/CVE-2024-7445.json) (`2024-08-09T15:36:06.757`)
- [CVE-2024-7446](CVE-2024/CVE-2024-74xx/CVE-2024-7446.json) (`2024-08-09T15:36:35.453`)
- [CVE-2024-7450](CVE-2024/CVE-2024-74xx/CVE-2024-7450.json) (`2024-08-09T15:33:58.153`)
- [CVE-2024-7451](CVE-2024/CVE-2024-74xx/CVE-2024-7451.json) (`2024-08-09T15:33:56.027`)
- [CVE-2024-7452](CVE-2024/CVE-2024-74xx/CVE-2024-7452.json) (`2024-08-09T15:33:53.797`)
- [CVE-2024-7528](CVE-2024/CVE-2024-75xx/CVE-2024-7528.json) (`2024-08-09T15:35:06.313`)
## Download and Usage

View File

@ -244257,7 +244257,7 @@ CVE-2024-22274,0,0,87361af428d962de76a852670d2cc5984c82c5471ebe2a2d40c0bfba59a3e
CVE-2024-22275,0,0,4e0b17231c07cc777231dbb9d62f6bfa759cfc82db650243f36e18a0ee106c1b,2024-05-22T12:46:53.887000
CVE-2024-22276,0,0,419203f50311fd388fe713fe6b9bd9748f16b9b808692bb6bb617d18f1b85850,2024-06-28T10:27:00.920000
CVE-2024-22277,0,0,df1070c2ee97a5142cf7d246346e6f4b881b400ac527c2ddf38c129b4d9a4ead,2024-07-05T12:55:51.367000
CVE-2024-22278,0,0,10e8fcad4298dc3ac5cf9f6b276529bbe4c084d6ecb1d68c293be7bf2298c036,2024-08-02T12:59:43.990000
CVE-2024-22278,0,1,b19ad5495871b198c91de96fe18bd2e768daf538ec292eb0574670a6bca7f198,2024-08-09T14:04:28.257000
CVE-2024-22279,0,0,5d8aa0dbd91af7dcc363b8a8ffff6d2d8af807d5702d0e6e6114610449201025,2024-06-12T18:04:20.147000
CVE-2024-2228,0,0,4ca7747914203ad7b21ad0d53afc1cc8d90ca3afc5fa0d3e8fdef13a47d40ae2,2024-03-22T19:02:10.300000
CVE-2024-22280,0,0,3da3aabe176d318c08d6891e24f9a02048e4a39b0f9e5e399bf16a98c62585bd,2024-07-12T17:01:29.947000
@ -245485,7 +245485,7 @@ CVE-2024-2423,0,0,a5394662ca83323158ee69f166f44b43cd55ba926d3a289c30331252a3a3bb
CVE-2024-24230,0,0,82c71df4bfb9110317959a74b9fd72520684df83f39f2438f50b8837f8628a57,2024-08-02T18:35:26.297000
CVE-2024-2424,0,0,7e59966569a6642847fefe83beeef062ca6c17bf06e36b66681d11734c20748e,2024-04-16T13:24:07.103000
CVE-2024-24245,0,0,c5abb7d763daf2bc28465e043c1ed9f24f9e09495edd1f4ad6ff69036cf3ea84,2024-04-10T13:23:38.787000
CVE-2024-24246,0,0,07c6b535860e6fa67a7c0203085a3c0fdb0f634ef07f086159413bc87de96162,2024-04-01T15:32:10.190000
CVE-2024-24246,0,1,66df927313dfb2fe51ec7b1761b0f9876821113027121d655169e20e29fad181,2024-08-09T15:35:01.597000
CVE-2024-2425,0,0,5244503cb81f1535e5c26158f97c8ff5a0be1d108c008e859e8897a136ecd780,2024-03-26T12:55:05.010000
CVE-2024-24254,0,0,aa3e1e0113c1afb51d7c9ea40615c9f0ca117924787150a26ed63a73b49e27db,2024-02-15T18:46:57.737000
CVE-2024-24255,0,0,e76da96580c60a9eda41d1841209285ca4cff39dd4bb1ea645c35657b9851939,2024-02-15T18:46:41.247000
@ -246422,7 +246422,7 @@ CVE-2024-25763,0,0,527ce834ff91f364b0013949e6109de63ef1042bc91655a30b46c39de5dad
CVE-2024-25767,0,0,7fd811ba1201f6655a3fbd7e748a4e8dfcc7818c47b528456b52f71eec5ecd66,2024-02-26T22:10:40.463000
CVE-2024-25768,0,0,77c5bddf19cd27d51d947d72155fdd253a3fd4ca2d11712c7122306c1f452967,2024-02-26T22:10:40.463000
CVE-2024-2577,0,0,13ec5808d3d6d083e7c3e4b4ec8e8c618b37402f83ef68e1b0b22282ae26419d,2024-05-17T02:38:20.810000
CVE-2024-25770,0,0,5d4de03f6d29a6a954f491ce179e79895121b0ad6d28c75049ec3ca0bd8c9209,2024-02-26T22:10:40.463000
CVE-2024-25770,0,1,e8b6b72098f9f513763e0f6c4ff9163c79127b6b69075ca40a3444dc863bfeeb,2024-08-09T15:35:02.783000
CVE-2024-2578,0,0,0a9a760b0e95eba3e084425ffbc6c35fcacf81d3fe78ca7d4da72936fcaf57ed,2024-03-21T19:47:03.943000
CVE-2024-2579,0,0,3e2ac9285c805214de809b153e0f16bcd56ebe6adfc4df4e86808858edb81c9b,2024-03-21T19:47:03.943000
CVE-2024-2580,0,0,f1dd66fbf84d74580d929f75d3e5a752178d849505161b5daa24286248a8e976,2024-03-21T19:47:03.943000
@ -250199,7 +250199,7 @@ CVE-2024-30953,0,0,6d921cd6fd90184e6ad5174bce664f22cb22e40d44f91e20fb09119d4bedb
CVE-2024-3096,0,0,08c210d34b66fd02c4ce1db2facd39aba301685ae9b186e10dfb370afa961257,2024-06-10T18:15:36.050000
CVE-2024-30965,0,0,4c562abc1070b2e5650b14ad7d5d2a0f4b08c19f7cf7aa86c4dd98678b46b2ed,2024-04-02T18:12:16.283000
CVE-2024-3097,0,0,03b3e7564267ff07f8cace13ef2c68ecb9fd2e91e4d1ffef233c9c406915f0c8,2024-04-26T15:56:40.820000
CVE-2024-30973,0,0,db33409cb251336dfa2ea63d0601c6e43be1b7f7bb5f1222b94218ef77cf5375,2024-05-07T13:39:32.710000
CVE-2024-30973,0,1,bbddf1428f657ee3dd8694d858bfeebf1e082677ce9eaa5b99522934461dee34,2024-08-09T15:35:03.983000
CVE-2024-30974,0,0,58d798e5f49d558922aa7ff1fef01b969ff326cf30be128717719a7efa0d452a,2024-07-03T01:54:28.233000
CVE-2024-30977,0,0,9b376b5c5f8a7d223f02e67924cfe92b95db4973b1a024096b86e14bd3b11f55,2024-08-01T13:50:33.723000
CVE-2024-30979,0,0,24f82048641520e72e58ea7aed78bf2b0f6627b87f46428b11f3023d9bb8bc03,2024-08-01T13:50:34.503000
@ -251057,7 +251057,7 @@ CVE-2024-32302,0,0,bd1ac90688cfcc6be84f8824a7ca0d43ddb624d319b101804bb272446e0e3
CVE-2024-32303,0,0,f0bc1654c3d620aa1be591d810cc4b864298fb65d4403b208969a299da948b54,2024-08-01T13:51:28.717000
CVE-2024-32305,0,0,54019115d1050a8e7a6d5cd1d49afa66fdb4c41b3a834537b9695d1e6b1d3b78,2024-07-03T01:56:04.160000
CVE-2024-32306,0,0,3216c07ec117e1fbeaffcf62eac6a3e3d7a0764d75335094f2ef3b1b39747031,2024-07-03T01:56:04.840000
CVE-2024-32307,0,0,a0ec48cb4d82bcb4c775e66aa6ae222384a8c9091d177924d3544562641dcebc,2024-04-17T15:31:50.160000
CVE-2024-32307,0,1,c14b05e00d92ae79fe5540e9799479f963d5751864afc7788062931c71c6d33d,2024-08-09T15:35:04.790000
CVE-2024-3231,0,0,3511a6a7488625c2f4a97dbe34eef1ca4f8a0580ca0395f7e856f22a73e9af38,2024-05-17T18:36:05.263000
CVE-2024-32310,0,0,a0709c2800acb9e751ede7ba3cd488172de75efe82b0caf38f4891399f643c0e,2024-08-01T13:51:29.533000
CVE-2024-32311,0,0,a7536302fbabb4b529b5593329bec7f2cf36802ec4f1587ed01bada9d7c32320,2024-07-03T01:56:05.617000
@ -251189,7 +251189,7 @@ CVE-2024-32493,0,0,ffb6c116d41e9a5c89f19db9ee55928315a8849f99630d88960b7d23ca7c5
CVE-2024-32498,0,0,906a6af4f331d76dafce3172b342bad5a72acec04065280273f5a351dbe47aff,2024-07-08T16:43:34.677000
CVE-2024-3250,0,0,c5f4cddd48066fbb0c4e0be3eeb988cdfc41e3f2cb53a12d5a0c784e567df5aa,2024-04-04T22:15:09.350000
CVE-2024-32502,0,0,6c01a3b4b5868656f3d57f70bafd56da976a1e8c28c0eec374ff444b607fb7d0,2024-08-08T15:35:08.940000
CVE-2024-32503,0,1,b109f79cc97540c3275c9174107db5e182bcead4424f549c08c667110e9fcbac,2024-08-09T13:34:04.417000
CVE-2024-32503,0,0,b109f79cc97540c3275c9174107db5e182bcead4424f549c08c667110e9fcbac,2024-08-09T13:34:04.417000
CVE-2024-32504,0,0,3994b5718a6a88903126308cc0ea3df60ba5aeb7ee0f236d9b16b618e0fabb55,2024-07-16T14:59:17.967000
CVE-2024-32505,0,0,a50cedf26eb8bc3e2fc8813f61518049bc267a075d7ee53541957942fde52858,2024-04-17T12:48:07.510000
CVE-2024-32506,0,0,ab7937a89837db72a85c843077cacdcf367df7503b5d84856a66209dd80930ff,2024-04-17T12:48:07.510000
@ -256092,12 +256092,12 @@ CVE-2024-4069,0,0,fc5a2986d6746eec6d2dc8871a19fd31bd3dae122b27ac5ac325372fce08ed
CVE-2024-40690,0,0,288f59aa1afbad71e8a264760a25606f0765322027457660d06b06f1220570f0,2024-07-12T19:04:57.907000
CVE-2024-4070,0,0,f50441c69b27e00682c793729b411e41b0ab8839510e28fbeccbd72a35bcaeb5,2024-06-04T19:20:29.567000
CVE-2024-4071,0,0,5f6b5ae6c8e3d6e0ce3e89718b14a6bb17b22a46ae9131966ebec62404b12da9,2024-05-17T02:40:14.747000
CVE-2024-40719,0,0,6d4c1d57c01955803a84191ed9470dd02675c198a7ec6a13aaf692a0eac74a3d,2024-08-02T12:59:43.990000
CVE-2024-40719,0,1,b6da62d4912c9bd07427fa16443cd7668b6b1bac31228d96cfe2dfe539bd5688,2024-08-09T14:36:32.300000
CVE-2024-4072,0,0,5325ee2ea26a58f6ec285799bb6ee6c62eeadace5f641482183f3a76d39bf009,2024-05-17T02:40:14.847000
CVE-2024-40720,0,0,6c8de2020e05d63d4141a2e856c867872b6f8ff56ac9cd3eeae4a717e054bd0c,2024-08-02T12:59:43.990000
CVE-2024-40721,0,0,b328d1bf2246376dc2bcfaf254ac8cf27e4edc1837c9304a39b544baa0b56e56,2024-08-02T12:59:43.990000
CVE-2024-40722,0,0,06cd326bcb6684c0890c2241f4f6f40e04f887cfa28a9135b667f347d3df522f,2024-08-02T12:59:43.990000
CVE-2024-40723,0,0,9d62d22ec78b8eb92b3797a68076ca4fda5d2d8c3d34b61c5e25d9e7b6ff5190,2024-08-02T12:59:43.990000
CVE-2024-40720,0,1,e3c4e07a5ade01e9d26666cc5005a1336c172439685cd3e2319312a77895564d,2024-08-09T14:36:35.047000
CVE-2024-40721,0,1,e925b9407604ba1cd45dcb152cbb5c51e61b8964f6bec2135a5763eab76a2f6f,2024-08-09T14:36:58.623000
CVE-2024-40722,0,1,3f4f7e149a4eb425a0e28fef9d1b50a8bebfa8863debf3c2b799a570ae99ce9f,2024-08-09T14:39:28.157000
CVE-2024-40723,0,1,e04f296cec18624b17999f7835fdbf784e5f656a5baf868ac5f6b3b681e3a875,2024-08-09T14:44:01.907000
CVE-2024-40724,0,0,7760c39c7ea9cd43ce07bb58fee4f3b8fbd5ff3c12d0d2faca499135b3db5d70,2024-08-07T20:15:57.773000
CVE-2024-40725,0,0,27ddf61295cd28078b1f9de55f307855293b185f22be05b7367bb4d1ccd08bdd,2024-07-18T12:28:43.707000
CVE-2024-40726,0,0,763881d353b2a872c395d06db8ff47aa2480183ffa56c57536446e062ec43bc5,2024-07-11T15:06:22.967000
@ -256702,14 +256702,14 @@ CVE-2024-41953,0,0,3ffcc67e099bb316ff94f5a9cc1845c210666241b20cca92f52aec30809b8
CVE-2024-41954,0,0,93352fab81d54ba7d01179899803c8640d36e5f65730e1a9dce8a0309247dc87,2024-08-01T12:42:36.933000
CVE-2024-41955,0,0,5cc7c41b3793b9bfbfffe5ce80cc2ba3b224b9e2e273665abd77af2754fbe18c,2024-08-01T12:42:36.933000
CVE-2024-41956,0,0,b72cd1a22a28d2303229b868afdc5fd2adbef42d25416f48e13276835bed80e5,2024-08-02T12:59:43.990000
CVE-2024-41957,0,0,6cec11ed397a63c2089d6f43e54fda609eed3700b56505b26d7c31e16a62a695,2024-08-02T12:59:43.990000
CVE-2024-41957,0,1,f207a653c0f0f9d782c3e5585f7eb5df8054bd1cd710ccb1397440f0e840612a,2024-08-09T14:14:01.190000
CVE-2024-41958,0,0,ac2d465ee5b5b310612655a7cc0163ff8c5d740ff2b286b950528d6c8e63af4d,2024-08-06T16:30:24.547000
CVE-2024-41959,0,0,135bc4bf1338241a775bbfd3e5799793f19819d1fb2e41bc46b5a8bdc385fe51,2024-08-06T16:30:24.547000
CVE-2024-4196,0,0,2bee927395e72028cfccdf65300c6a2b8979e20b943a96185278ab936245f10e,2024-06-25T12:24:17.873000
CVE-2024-41960,0,0,c90236af24fb252306d67097fab9fe370c116a0fe898aae960bb109a3075d5cd,2024-08-06T16:30:24.547000
CVE-2024-41961,0,0,3c3cbde88cd825de8bae83de9e23bceebed48c0b620332721ebe0297499b9cbf,2024-08-01T16:45:25.400000
CVE-2024-41962,0,0,a42e5c6a5a1b3aff5b6cba30b7dbafa96411265920aa021d515ff4195ac31125,2024-08-02T12:59:43.990000
CVE-2024-41965,0,0,744da138649373c91e2d5048d78adcc6a9461c3a3df3b2d3193826fb19936838,2024-08-02T12:59:43.990000
CVE-2024-41965,0,1,2d1c3b12d760b98aa2eaba7bc040a10a4b90c52e44f9dfa32fdcb4160559d799,2024-08-09T14:09:32.507000
CVE-2024-4197,0,0,45da0b07f911473fe59b939894a184bd20b4010bb74cc514ccd6533e9d15c77b,2024-06-25T12:24:17.873000
CVE-2024-4198,0,0,10694c0c68dfe4c7db6b33a26dfbe4eb44c2b4223bfed9be5285208f068f86b9,2024-04-26T12:58:17.720000
CVE-2024-41989,0,0,e902f47b7607adc4839df00802ec4b9f801f5195050e557f24fe6e1b06bacb3c,2024-08-08T20:35:11.140000
@ -256844,7 +256844,7 @@ CVE-2024-42149,0,0,649ede760b2b7270506bd2e8f6e94a8f5d04fb5a4016b73e8b26514807ad0
CVE-2024-4215,0,0,9e7e3a04514a4f3c8325efbee683d76ee50f1989bb723741735a5cc60f766fa9,2024-08-01T13:59:27.703000
CVE-2024-42150,0,0,b0367ccbbd7e8c81c36eb7016e076190b057ac84efe63dcc25d8aac079dad32d,2024-07-30T13:32:45.943000
CVE-2024-42151,0,0,fdb3fba7028cbe28580e674b99b9030e1b9e9a62c2e7f59da9e900cf53455fd9,2024-07-30T13:32:45.943000
CVE-2024-42152,0,0,cf7897733bea0728a109fc5e6bd10f12dc7e878ac6bdef95ec146d648e8c50e6,2024-07-30T13:32:45.943000
CVE-2024-42152,0,1,f9b1bdbb9770cb880c8e4f665160afe152a7dd9b4afb734b9f478a046b3eefc2,2024-08-09T14:55:35.753000
CVE-2024-42153,0,0,fcc644e98f47bf80a615aace1a6ace900e6f19b9ce88641e6a917689ff1d51b4,2024-08-08T12:51:49.873000
CVE-2024-42154,0,0,5a5c96e428c438e1f3dced31d05704a5d2c2ea208c7b4d00317e93a93e699f79,2024-08-08T15:02:01.050000
CVE-2024-42155,0,0,95a42d84399f0f115a34ecfd921658f3d7af5446b3cada02cd7d7dba29b77291,2024-08-08T15:01:33.093000
@ -258055,10 +258055,10 @@ CVE-2024-5501,0,0,26070cb64be69726a3e53d21c4a7b37433e6fc5848925edeefa1dca5b1a345
CVE-2024-5503,0,0,1cb7ec9812df8ec09d21a8b50ab54c8421f9f9a3696399f8cf01057ff5629e64,2024-07-17T13:53:37.643000
CVE-2024-5504,0,0,c9387f8cc727d3178a2e16ac3c8996c4ce5ec1145aa8a5124e81e8cb3cf535a8,2024-07-05T14:46:38.860000
CVE-2024-5505,0,0,1c3992bc63f7227d162e21046bb65e254ca8028b79f3c4549059f0cdf09e2564,2024-06-07T14:56:05.647000
CVE-2024-5506,0,1,a39671e78235b40037509107b8c421fae2ab16362444587707c25560f1578156,2024-08-09T13:30:46.827000
CVE-2024-5507,0,1,25b7ab5155252ca6c92d8fe7bfa1cedb021cca01f945599561ed2a09d85f7e8f,2024-08-09T13:30:39.467000
CVE-2024-5508,0,1,2b850c2308fdad40eba67dafab3c18f5e4849c085d14c12319395964a2a53adc,2024-08-09T13:30:49.043000
CVE-2024-5509,0,1,2e30a15434541b356e22fc61761747d187978075b4c210fe7f0d0405d6372e8f,2024-08-09T13:30:36.887000
CVE-2024-5506,0,0,a39671e78235b40037509107b8c421fae2ab16362444587707c25560f1578156,2024-08-09T13:30:46.827000
CVE-2024-5507,0,0,25b7ab5155252ca6c92d8fe7bfa1cedb021cca01f945599561ed2a09d85f7e8f,2024-08-09T13:30:39.467000
CVE-2024-5508,0,0,2b850c2308fdad40eba67dafab3c18f5e4849c085d14c12319395964a2a53adc,2024-08-09T13:30:49.043000
CVE-2024-5509,0,0,2e30a15434541b356e22fc61761747d187978075b4c210fe7f0d0405d6372e8f,2024-08-09T13:30:36.887000
CVE-2024-5514,0,0,833e991f0e6be90b2237e59745237181caa44e2bd9d3a544d7919a263fb2690a,2024-05-30T13:15:41.297000
CVE-2024-5515,0,0,4678a2be8c70b7477a92ff0be2440ca33d4803d8173344aa517704fd754394de,2024-06-04T19:21:09.717000
CVE-2024-5516,0,0,d9e4106066ccff650b208a23a361cef7969f556246b95e24218cffd8f065e4ba,2024-06-04T19:21:09.817000
@ -258195,7 +258195,7 @@ CVE-2024-5686,0,0,cbff644a511c56c86a9bc5a9eadb1558b8ef31726954231e162a4de347930b
CVE-2024-5687,0,0,20e940b5eb34eeb2ca33bc2ed1420b0aebfdd0f1b1da393415c2caf461a27a49,2024-07-03T02:09:09.507000
CVE-2024-5688,0,0,378fe065c1c96c80f8fcd92ad9e23dd5031fac1fb881139af57f2ca0f8af6f7d,2024-07-03T02:09:10.300000
CVE-2024-5689,0,0,4a110f75db5aeecb8ba897daed59c54700fc78a15415c63a015a6e971aa1956d,2024-06-11T13:54:12.057000
CVE-2024-5690,0,1,d97da1ed16aadcb18dbcdccf4095ed3e100e24ec0426a177c2c96faa76e14b0a,2024-08-09T13:43:37.807000
CVE-2024-5690,0,0,d97da1ed16aadcb18dbcdccf4095ed3e100e24ec0426a177c2c96faa76e14b0a,2024-08-09T13:43:37.807000
CVE-2024-5691,0,0,48afec26d6506c59677ec0a7d4e63413cc5741e7dd0feb6f92e5e5c2dbab4cba,2024-06-19T10:15:11.280000
CVE-2024-5692,0,0,da86a3e71defc1a5762f0a215e21c8d6ad0bb48702dddd9796e84e537e21cbce,2024-08-01T13:59:56.967000
CVE-2024-5693,0,0,0c0efe07ae7eccba3dbeb9fe7241e864745aeb8b41f02dc5d33a8371321e7469,2024-07-03T02:09:11.353000
@ -259241,13 +259241,13 @@ CVE-2024-7328,0,0,d7a3331bca731f76c4abaa1cc5cdfd3af91da16a0035eba7b48c86ad7eb687
CVE-2024-7329,0,0,f2ada99243d0f575b81eec21f3148ca66fce3d9559ae9316ecf85d94bc4c0b72,2024-08-01T12:42:36.933000
CVE-2024-7330,0,0,a0d90f27df0d1d8acc92db1ac146dc79ec66c02483d0fbebb438d850d8cdcf9e,2024-08-01T12:42:36.933000
CVE-2024-7331,0,0,b740f062346a9fa2712074e24c9e0d1ce4d148884dac19c4cc72ee657acd38b6,2024-08-01T17:42:09.417000
CVE-2024-7332,0,1,3089497ba846bc4a9cbab4bce145eb3ea3ed052e66e6684a180cc65ac853dc18,2024-08-09T13:55:52.587000
CVE-2024-7333,0,1,298f2e2e03c22f1f74c3e7734b77671a2b905a2effef838cf20a3e983f6f559a,2024-08-09T13:56:43.783000
CVE-2024-7334,0,1,3a04da7a495e8a8d214c9f9a1dbfafc1add73cfc220022c126d78fdc55df4d5d,2024-08-09T13:57:55.233000
CVE-2024-7335,0,0,ea2e7f4e97d4eb37eda5cee3101adfd83f8680ffcf4023b0d1b714cd789ed180,2024-08-01T12:42:36.933000
CVE-2024-7336,0,0,1e7e5297ea867ee09674e1f2f655feb58eb1d6034c5b9d78677a2634764acdc8,2024-08-01T12:42:36.933000
CVE-2024-7337,0,0,abdf88b89f18b0bfe89f885285308aae4c494af19bd7488de0e43e517362fa3e,2024-08-01T12:42:36.933000
CVE-2024-7338,0,0,900487bade652abeffed8d740657af80643a0645713b0752d7dde8b898a5b8a0,2024-08-01T12:42:36.933000
CVE-2024-7332,0,0,3089497ba846bc4a9cbab4bce145eb3ea3ed052e66e6684a180cc65ac853dc18,2024-08-09T13:55:52.587000
CVE-2024-7333,0,0,298f2e2e03c22f1f74c3e7734b77671a2b905a2effef838cf20a3e983f6f559a,2024-08-09T13:56:43.783000
CVE-2024-7334,0,0,3a04da7a495e8a8d214c9f9a1dbfafc1add73cfc220022c126d78fdc55df4d5d,2024-08-09T13:57:55.233000
CVE-2024-7335,0,1,50bba08337bc3f518f338a3ebdc255b86c516e721d876b56eff7a6174bdc7856,2024-08-09T14:05:30.013000
CVE-2024-7336,0,1,7039a792519f9f6bfd944e76e753e4868d6e66e426315a5e2732b19e5d26adfa,2024-08-09T14:38:01.050000
CVE-2024-7337,0,1,bb4e29754f24508ee03646d09f02a9e9792b2bdc0b40ad3f742f7daf359e305a,2024-08-09T14:15:19.283000
CVE-2024-7338,0,1,40f9236687cb1fba08bae47e5bce5fdf8596baa7faf10b9e6c7a335576e73829,2024-08-09T14:51:45.677000
CVE-2024-7339,0,0,b22bc8c3b0525a6c98a03e6df13c491f10ced24284b84aa3889a1e52c55f16a5,2024-08-01T12:42:36.933000
CVE-2024-7340,0,0,a3f98c82759b3c1463da2160a8c456e9c18de4cdd89227049824622069589bfd,2024-08-01T14:01:07.677000
CVE-2024-7342,0,0,b2aae5a9033c72e024dcd6167950e24730a1a54d1040d58948e1e0708313f38d,2024-08-01T12:42:36.933000
@ -259259,14 +259259,14 @@ CVE-2024-7355,0,0,77eb32dc1810199d8dfd56b790a0cc073bb577f44b08cc26474823d677f5cf
CVE-2024-7356,0,0,422e8f0e5351e2aaa94610787f75fca2971bce2e8243e94e1dab25149b00bf15,2024-08-05T12:41:45.957000
CVE-2024-7357,0,0,676709a5ed7eee4761639da6bebba6e85a1f66e54db8a0d1e3440582cc707fb4,2024-08-07T14:15:33.230000
CVE-2024-7358,0,0,d0d3bbadf8d959881fb1ac3e2ef5c9a3fa1992957990fec2aa7880f237382301,2024-08-01T16:45:25.400000
CVE-2024-7359,0,0,e4157cf13226a6af7e8af651561772b532766fc461a201f711d37e21eb607965,2024-08-02T12:59:43.990000
CVE-2024-7360,0,0,e5c147ccf2a4c7e1bf16edb55c3b9d708b671cb7247e1f8dcacfdbfd64c237c0,2024-08-02T12:59:43.990000
CVE-2024-7361,0,0,00d0b277c00d4384f6edcdd4372f264d87365fa1cef210eee06bab0ad3297b5a,2024-08-02T12:59:43.990000
CVE-2024-7362,0,0,631381b7e38606068b6482f833151d810d62425249f690c71fabfae3e1b457af,2024-08-02T12:59:43.990000
CVE-2024-7363,0,0,83409dd306711eecd70748b7fad71784f7a54fdc9bc5abe850831565a09c824c,2024-08-02T12:59:43.990000
CVE-2024-7364,0,0,82b7e488043bcbd91f0432641238a49239a21bb77aa72c339a0bc3b842a6b408,2024-08-02T12:59:43.990000
CVE-2024-7365,0,0,57c39736717e4c4d84557b16c55457bc8006baba5d2c954f2f1f2f950e0ebb3f,2024-08-02T12:59:43.990000
CVE-2024-7366,0,0,85232956a9ed750d40da4498f3ea9b9a83137981e4552248a960fb2cde4cfd53,2024-08-02T12:59:43.990000
CVE-2024-7359,0,1,cd0b52677d59da64e610cecdb84a7da87ffa59f4285a62c9868c018730a16de9,2024-08-09T14:23:27.307000
CVE-2024-7360,0,1,6be09dc27638be6e8405202faec13845aebab4e18d4666c1cde1350760f5ed8f,2024-08-09T14:24:36.037000
CVE-2024-7361,0,1,4fdbb484d7dd06d1f4e60d148b6ebb313c7cc82465e18199d658f78a6a6c1217,2024-08-09T14:25:08.850000
CVE-2024-7362,0,1,93eb9d3face47e6bdef0e2dad0e186b5937e616e94b4d72465b08e00b127fcd7,2024-08-09T14:25:51.857000
CVE-2024-7363,0,1,e5571ab97e40757e0ca536ca3b4093f7c667e960b77aea72fb5f6f0e2fb6c602,2024-08-09T14:26:21.597000
CVE-2024-7364,0,1,2611f00d2de1eff98d4c5f6caa4354f25faec7c42a3459ab504dbb3f481af08d,2024-08-09T14:26:52.407000
CVE-2024-7365,0,1,00bc08e41bb3b87d357559ba3083b835be3e3089e0dadaa0f9e4a1d88452119e,2024-08-09T14:27:35.003000
CVE-2024-7366,0,1,53bb665d505b8ab9bb2d3938f6f7688fd36d29c8d0fca73bf4fc5a19ae24d8b9,2024-08-09T14:16:32.443000
CVE-2024-7367,0,0,bd75c54c036596a7e984bdba53f5bf22b639ac314ededd87d61972f330b3e1e5,2024-08-09T11:27:19.727000
CVE-2024-7368,0,0,aab08644c08718c0114e7d07ce8e07844fe0421ed096872b72b920429a44e715,2024-08-07T19:03:47.213000
CVE-2024-7369,0,0,7dd9a7b02212f80bf8c0eb194cee5a1eb0c2f25ae126d8a5fc944a8828400553,2024-08-07T19:03:26.293000
@ -259295,12 +259295,12 @@ CVE-2024-7441,0,0,4a0da838a1c1d69cab93448630a4051d1882c4be56020df53067927eac550e
CVE-2024-7442,0,0,272c8e76d88f6f0a2e21eba30e1db85a28ca7838620513e3d3bbb8b30bf58ad9,2024-08-06T17:45:39.703000
CVE-2024-7443,0,0,6fd967d6e919ba4fd37dfeb9ebba86f65e44a71c337f483ada629ef65359269a,2024-08-06T17:47:12.660000
CVE-2024-7444,0,0,445c51d35a97ae1e9e8d8fa4cc69e5c419c07b62f65263a1c9f9f5400538dfb2,2024-08-05T12:41:45.957000
CVE-2024-7445,0,0,636fd15f947ad646d71c3c49b74e31a09539f2dd6bd341e4f633645006e90da8,2024-08-05T12:41:45.957000
CVE-2024-7446,0,0,c0c2a75e2b4a050e40cb790d624e8beab322ce723a31c0256b34b8337f0b574f,2024-08-05T12:41:45.957000
CVE-2024-7445,0,1,cfdc75d4fec77cd886589c658aa3dd464f31452c81f68546e40e8c22e50a8eed,2024-08-09T15:36:06.757000
CVE-2024-7446,0,1,e26be21c8dbcfe67dfe123a70d3d827309d2b8d2fde731242ee6ec383c477df8,2024-08-09T15:36:35.453000
CVE-2024-7449,0,0,88c72f12f3bfea710c1f57a71890e448337f097b49465cb14783d7c417c9adc5,2024-08-05T12:41:45.957000
CVE-2024-7450,0,0,4d09a64b1ee2cd240a8e5b429efc0ede6dc0d3d283cb5d353c414e0ed48e570e,2024-08-05T12:41:45.957000
CVE-2024-7451,0,0,8358dede7763f6281832a1581e2dfbe7a8841ed2365f1a56eace48478781dd8a,2024-08-05T12:41:45.957000
CVE-2024-7452,0,0,8afd95bd04275e7bbebd9fa18117c1d8b2eb1c901226f30a2b2ee117c7591e32,2024-08-05T12:41:45.957000
CVE-2024-7450,0,1,f36a88ecb7cf7b37b6090837acfb29fe52cc382469b7cf045e11a727c85c93f7,2024-08-09T15:33:58.153000
CVE-2024-7451,0,1,6c3c74a805aba0686ff087a4aeedf52269a2704aceeaba8fd15f2602a7b0b5b8,2024-08-09T15:33:56.027000
CVE-2024-7452,0,1,9b0d7a5910a43cd09bce0b4f25c71bf821fcb49ab8aff5df5dd61e0e89344b20,2024-08-09T15:33:53.797000
CVE-2024-7453,0,0,624107cf8a94f8b2aabc451a329c4efb87e006ba2f7fef925bca963789aaec98,2024-08-05T12:41:45.957000
CVE-2024-7454,0,0,7b533ec876b8603967c2785115d44d60861a9ec18ffffde35e324a9f61bf6c8b,2024-08-05T12:41:45.957000
CVE-2024-7455,0,0,9a324a28925ea27d884924289a2178f63ea8026023542926ab4fe0e965576461,2024-08-05T12:41:45.957000
@ -259344,7 +259344,7 @@ CVE-2024-7524,0,0,07a71bf262380d8c7908b6af8aedab2300b78cb30b40198df3e8d289589265
CVE-2024-7525,0,0,5fd9dfbbd9f6275593c22928d26dda0f3c930c37af4b3bb59cc2fdc6afd8c61a,2024-08-06T23:16:00.030000
CVE-2024-7526,0,0,b7dc1769424faeb68068ce309d6d3523a91a1d4fb4a85465f17d0f1c4d8fc8b5,2024-08-07T21:35:13.907000
CVE-2024-7527,0,0,5726c5c54faa1bf1781147fed2e22e549db6ab22b4878ce6040da6bad2504c69,2024-08-06T23:16:00.177000
CVE-2024-7528,0,0,b6e9413f9a86c458f79f2237a9adb5674eec1ad41e68eb793e2d9ec404600ca8,2024-08-06T23:16:00.250000
CVE-2024-7528,0,1,be8e71fd0f17d389323324dc26a8ec8e7767e0b66d4026ffc4caff629d8c56c3,2024-08-09T15:35:06.313000
CVE-2024-7529,0,0,b88dacd4622bcc7a40dd32b4177b18e58f7bcd9368595fc01c5e421f17f8855a,2024-08-06T23:16:00.317000
CVE-2024-7530,0,0,b8218ebe8f8f7d0c60c64f6951f7d0958715ecc66bafe38a6940afb55d245bb6,2024-08-08T18:35:06.897000
CVE-2024-7531,0,0,a6ff05a5a66ff77c501f3337329e6ee8c78879bff77c09716ca0c6a78826c209,2024-08-06T16:30:24.547000

Can't render this file because it is too large.