From 5f2511caf36d90071bdd51958fcdceec6d61df8b Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 13 Aug 2024 20:03:14 +0000 Subject: [PATCH] Auto-Update: 2024-08-13T20:00:17.749026+00:00 --- CVE-2011/CVE-2011-06xx/CVE-2011-0611.json | 4 +- CVE-2014/CVE-2014-1000xx/CVE-2014-100005.json | 26 +- CVE-2019/CVE-2019-72xx/CVE-2019-7256.json | 12 +- CVE-2020/CVE-2020-101xx/CVE-2020-10148.json | 4 +- CVE-2021/CVE-2021-286xx/CVE-2021-28663.json | 4 +- CVE-2023/CVE-2023-481xx/CVE-2023-48171.json | 39 ++- CVE-2024/CVE-2024-213xx/CVE-2024-21302.json | 4 +- CVE-2024/CVE-2024-228xx/CVE-2024-22871.json | 39 ++- CVE-2024/CVE-2024-239xx/CVE-2024-23946.json | 24 +- CVE-2024/CVE-2024-241xx/CVE-2024-24149.json | 34 +- CVE-2024/CVE-2024-258xx/CVE-2024-25830.json | 43 ++- CVE-2024/CVE-2024-293xx/CVE-2024-29309.json | 39 ++- CVE-2024/CVE-2024-299xx/CVE-2024-29995.json | 56 ++++ CVE-2024/CVE-2024-370xx/CVE-2024-37015.json | 39 ++- CVE-2024/CVE-2024-379xx/CVE-2024-37968.json | 56 ++++ CVE-2024/CVE-2024-380xx/CVE-2024-38063.json | 56 ++++ CVE-2024/CVE-2024-380xx/CVE-2024-38084.json | 56 ++++ CVE-2024/CVE-2024-380xx/CVE-2024-38098.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38106.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38107.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38108.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38109.json | 63 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38114.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38115.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38116.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38117.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38118.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38120.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38121.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38122.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38123.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38125.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38126.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38127.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38128.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38130.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38131.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38132.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38133.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38134.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38135.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38136.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38137.json | 60 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38138.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38140.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38141.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38142.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38143.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38144.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38145.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38146.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38147.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38148.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38150.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38151.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38152.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38153.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38154.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38155.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38157.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38158.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38159.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38160.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38161.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38162.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38165.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38166.json | 4 +- CVE-2024/CVE-2024-381xx/CVE-2024-38167.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38168.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38169.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38170.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38171.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38172.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38173.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38177.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38178.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38180.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38184.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38185.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38186.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38187.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38189.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38191.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38193.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38195.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38196.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38197.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38198.json | 56 ++++ CVE-2024/CVE-2024-381xx/CVE-2024-38199.json | 56 ++++ CVE-2024/CVE-2024-382xx/CVE-2024-38200.json | 46 +-- CVE-2024/CVE-2024-382xx/CVE-2024-38201.json | 56 ++++ CVE-2024/CVE-2024-382xx/CVE-2024-38202.json | 6 +- CVE-2024/CVE-2024-382xx/CVE-2024-38206.json | 4 +- CVE-2024/CVE-2024-382xx/CVE-2024-38211.json | 56 ++++ CVE-2024/CVE-2024-382xx/CVE-2024-38213.json | 56 ++++ CVE-2024/CVE-2024-382xx/CVE-2024-38214.json | 56 ++++ CVE-2024/CVE-2024-382xx/CVE-2024-38215.json | 56 ++++ CVE-2024/CVE-2024-382xx/CVE-2024-38218.json | 18 +- CVE-2024/CVE-2024-382xx/CVE-2024-38219.json | 20 +- CVE-2024/CVE-2024-382xx/CVE-2024-38223.json | 56 ++++ CVE-2024/CVE-2024-407xx/CVE-2024-40776.json | 6 +- CVE-2024/CVE-2024-407xx/CVE-2024-40779.json | 6 +- CVE-2024/CVE-2024-407xx/CVE-2024-40780.json | 6 +- CVE-2024/CVE-2024-425xx/CVE-2024-42543.json | 34 +- CVE-2024/CVE-2024-426xx/CVE-2024-42627.json | 34 +- CVE-2024/CVE-2024-426xx/CVE-2024-42631.json | 34 +- CVE-2024/CVE-2024-427xx/CVE-2024-42737.json | 34 +- CVE-2024/CVE-2024-427xx/CVE-2024-42743.json | 34 +- CVE-2024/CVE-2024-60xx/CVE-2024-6079.json | 78 +++++ CVE-2024/CVE-2024-75xx/CVE-2024-7567.json | 78 +++++ CVE-2024/CVE-2024-75xx/CVE-2024-7569.json | 60 ++++ CVE-2024/CVE-2024-75xx/CVE-2024-7570.json | 56 ++++ CVE-2024/CVE-2024-75xx/CVE-2024-7593.json | 60 ++++ CVE-2024/CVE-2024-77xx/CVE-2024-7733.json | 133 ++++++++ CVE-2024/CVE-2024-77xx/CVE-2024-7738.json | 141 ++++++++ CVE-2024/CVE-2024-77xx/CVE-2024-7739.json | 141 ++++++++ README.md | 110 +++--- _state.csv | 317 +++++++++++------- 118 files changed, 6071 insertions(+), 247 deletions(-) create mode 100644 CVE-2024/CVE-2024-299xx/CVE-2024-29995.json create mode 100644 CVE-2024/CVE-2024-379xx/CVE-2024-37968.json create mode 100644 CVE-2024/CVE-2024-380xx/CVE-2024-38063.json create mode 100644 CVE-2024/CVE-2024-380xx/CVE-2024-38084.json create mode 100644 CVE-2024/CVE-2024-380xx/CVE-2024-38098.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38106.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38107.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38108.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38109.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38114.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38115.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38116.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38117.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38118.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38120.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38121.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38122.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38123.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38125.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38126.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38127.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38128.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38130.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38131.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38132.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38133.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38134.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38135.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38136.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38137.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38138.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38140.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38141.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38142.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38143.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38144.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38145.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38146.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38147.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38148.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38150.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38151.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38152.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38153.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38154.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38155.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38157.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38158.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38159.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38160.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38161.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38162.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38165.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38167.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38168.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38169.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38170.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38171.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38172.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38173.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38177.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38178.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38180.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38184.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38185.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38186.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38187.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38189.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38191.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38193.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38195.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38196.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38197.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38198.json create mode 100644 CVE-2024/CVE-2024-381xx/CVE-2024-38199.json create mode 100644 CVE-2024/CVE-2024-382xx/CVE-2024-38201.json create mode 100644 CVE-2024/CVE-2024-382xx/CVE-2024-38211.json create mode 100644 CVE-2024/CVE-2024-382xx/CVE-2024-38213.json create mode 100644 CVE-2024/CVE-2024-382xx/CVE-2024-38214.json create mode 100644 CVE-2024/CVE-2024-382xx/CVE-2024-38215.json create mode 100644 CVE-2024/CVE-2024-382xx/CVE-2024-38223.json create mode 100644 CVE-2024/CVE-2024-60xx/CVE-2024-6079.json create mode 100644 CVE-2024/CVE-2024-75xx/CVE-2024-7567.json create mode 100644 CVE-2024/CVE-2024-75xx/CVE-2024-7569.json create mode 100644 CVE-2024/CVE-2024-75xx/CVE-2024-7570.json create mode 100644 CVE-2024/CVE-2024-75xx/CVE-2024-7593.json create mode 100644 CVE-2024/CVE-2024-77xx/CVE-2024-7733.json create mode 100644 CVE-2024/CVE-2024-77xx/CVE-2024-7738.json create mode 100644 CVE-2024/CVE-2024-77xx/CVE-2024-7739.json diff --git a/CVE-2011/CVE-2011-06xx/CVE-2011-0611.json b/CVE-2011/CVE-2011-06xx/CVE-2011-0611.json index 7131b00057b..0c458f67867 100644 --- a/CVE-2011/CVE-2011-06xx/CVE-2011-0611.json +++ b/CVE-2011/CVE-2011-06xx/CVE-2011-0611.json @@ -2,8 +2,8 @@ "id": "CVE-2011-0611", "sourceIdentifier": "psirt@adobe.com", "published": "2011-04-13T14:55:01.217", - "lastModified": "2024-07-03T01:35:09.403", - "vulnStatus": "Modified", + "lastModified": "2024-08-13T18:58:42.883", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2022-03-03", "cisaActionDue": "2022-03-24", diff --git a/CVE-2014/CVE-2014-1000xx/CVE-2014-100005.json b/CVE-2014/CVE-2014-1000xx/CVE-2014-100005.json index a09a5650180..43f94ec1ef0 100644 --- a/CVE-2014/CVE-2014-1000xx/CVE-2014-100005.json +++ b/CVE-2014/CVE-2014-1000xx/CVE-2014-100005.json @@ -2,8 +2,8 @@ "id": "CVE-2014-100005", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-13T11:59:04.477", - "lastModified": "2024-08-01T13:41:24.997", - "vulnStatus": "Modified", + "lastModified": "2024-08-13T19:12:35.933", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2024-05-16", "cisaActionDue": "2024-06-06", @@ -21,6 +21,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -111,7 +131,7 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, + "vulnerable": false, "criteria": "cpe:2.3:h:dlink:dir-600:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7A8637C-BD16-4B96-A1DA-34529F3169D3" } diff --git a/CVE-2019/CVE-2019-72xx/CVE-2019-7256.json b/CVE-2019/CVE-2019-72xx/CVE-2019-7256.json index fdcc34e3cbb..66d444b4ea1 100644 --- a/CVE-2019/CVE-2019-72xx/CVE-2019-7256.json +++ b/CVE-2019/CVE-2019-72xx/CVE-2019-7256.json @@ -2,8 +2,8 @@ "id": "CVE-2019-7256", "sourceIdentifier": "cve@mitre.org", "published": "2019-07-02T19:15:11.147", - "lastModified": "2024-07-03T01:36:04.380", - "vulnStatus": "Modified", + "lastModified": "2024-08-13T19:20:23.200", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2024-03-25", "cisaActionDue": "2024-04-15", @@ -26,20 +26,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", - "scope": "CHANGED", + "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 10.0, + "baseScore": 9.8, "baseSeverity": "CRITICAL" }, "exploitabilityScore": 3.9, - "impactScore": 6.0 + "impactScore": 5.9 }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", diff --git a/CVE-2020/CVE-2020-101xx/CVE-2020-10148.json b/CVE-2020/CVE-2020-101xx/CVE-2020-10148.json index d9dd2ecf6cd..f842c90d58f 100644 --- a/CVE-2020/CVE-2020-101xx/CVE-2020-10148.json +++ b/CVE-2020/CVE-2020-101xx/CVE-2020-10148.json @@ -2,8 +2,8 @@ "id": "CVE-2020-10148", "sourceIdentifier": "cret@cert.org", "published": "2020-12-29T22:15:12.327", - "lastModified": "2024-08-01T20:35:08.140", - "vulnStatus": "Modified", + "lastModified": "2024-08-13T19:22:06.523", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2022-05-03", diff --git a/CVE-2021/CVE-2021-286xx/CVE-2021-28663.json b/CVE-2021/CVE-2021-286xx/CVE-2021-28663.json index 06da597a8cb..e3eacc3e6dc 100644 --- a/CVE-2021/CVE-2021-286xx/CVE-2021-28663.json +++ b/CVE-2021/CVE-2021-286xx/CVE-2021-28663.json @@ -2,8 +2,8 @@ "id": "CVE-2021-28663", "sourceIdentifier": "cve@mitre.org", "published": "2021-05-10T15:15:07.557", - "lastModified": "2024-08-01T13:42:10.330", - "vulnStatus": "Modified", + "lastModified": "2024-08-13T19:45:46.977", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", diff --git a/CVE-2023/CVE-2023-481xx/CVE-2023-48171.json b/CVE-2023/CVE-2023-481xx/CVE-2023-48171.json index 8ef605e9395..d8d1ffbd641 100644 --- a/CVE-2023/CVE-2023-481xx/CVE-2023-48171.json +++ b/CVE-2023/CVE-2023-481xx/CVE-2023-48171.json @@ -2,7 +2,7 @@ "id": "CVE-2023-48171", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-12T20:15:08.213", - "lastModified": "2024-08-13T12:58:25.437", + "lastModified": "2024-08-13T19:35:01.050", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en OWASP DefectDojo anterior a v.1.5.3.1 permite a un atacante remoto escalar privilegios a trav\u00e9s del componente de permisos de usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://gccybermonks.com/posts/defectdojo/", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21302.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21302.json index 817cb613bb6..f70a0840de9 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21302.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21302.json @@ -2,13 +2,13 @@ "id": "CVE-2024-21302", "sourceIdentifier": "secure@microsoft.com", "published": "2024-08-08T02:15:37.827", - "lastModified": "2024-08-12T13:38:14.373", + "lastModified": "2024-08-13T18:15:09.160", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Summary:\nMicrosoft was notified that an elevation of privilege vulnerability exists in Windows based systems supporting Virtualization Based Security (VBS) including a subset of Azure Virtual Machine SKUS; enabling an attacker with administrator privileges to replace current versions of Windows system files with outdated versions. By exploiting this vulnerability, an attacker could reintroduce previously mitigated vulnerabilities, circumvent some features of VBS, and exfiltrate data protected by VBS. For more information on Windows versions and VM SKUs supporting VBS, reference: Virtualization-based Security (VBS) | Microsoft Learn..\nMicrosoft is developing a security update to mitigate this vulnerability, but it is not yet available. Guidance to help customers reduce the risks associated with this vulnerability and to protect their systems until the mitigation is available in a Windows security update is provided in the Recommended Actions section of this CVE.\nThis CVE will be updated when the mitigation is available in a Windows security update. We highly encourage customers to subscribe to Security Update Guide notifications to receive an alert when this update occurs.\nDetails:\nA security researcher informed Microsoft of an elevation of privilege vulnerability in Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022 , and a subset of Azure Virtual Machines (VM) SKUs with a Windows based guestOS supporting VBS.\nThe vulnerability enables an attacker with administrator privileges on the target system to replace current Windows system files with outdated versions. Successful exploitation provides an attacker with the ability to reintroduce previously mitigated vulnerabilities, circumvent VBS security features, and exfiltrate data protected by VBS.\nMicrosoft is developing a security update that will revoke outdated, unpatched VBS system files to mitigate this vulnerability, but it is not yet available. Due to the complexity of blocking such a large quantity of files, rigorous testing is required to avoid integration failures or regressions. This CVE will be updated with new information and links to the security updates once available. We highly encourage customers subscribe to Security Update Guide notifications to be alerted of updates. See Microsoft Technical Security Notifications and Security Update Guide Notification System News: Create your profile now \u2013 Microsoft Security Response Center.\nMicrosoft is not aware of any attempts to exploit this vulnerability. However, a public presentation regarding this vulnerability was hosted at BlackHat on August 07th, 2024. The presentation was appropriately coordinated with Microsoft but may change the threat landscape. Customers concerned with these risks should reference the guidance provided in the Recommended Actions section of this CVE to protect their systems.\nRecommended Actions:\nThe following recommendations do not mitigate the vulnerability but can be used to reduce the risk of exploitation until the security update is available.\n\nConfigure \u201cAudit Object Access\u201d settings to monitor attempts to access files, such as handle creation, read / write operations, or modifications to security descriptors.\n\nAudit File System - Windows 10 | Microsoft Learn\nApply a basic audit policy on a file or folder - Windows 10 | Microsoft Learn\n\n\nAuditing sensitive privileges used to identify access, modification, or replacement of VBS related files could help indicacte attempts to exploit this vulnerability.\n\nAudit Sensitive Privilege Use - Windows 10 | Microsoft Learn\n\n\nProtect your Azure tenant by investigating administrators and users flagged for risky sign-ins and rotating their credentials.\n\nInvestigate risk Microsoft Entra ID Protection - Microsoft Entra ID Protection | Microsoft Learn\n\n\nEnabling Multi-Factor Authentication can also help alleviate concerns about compromised accounts or exposure.\n\nEnforce multifactor..." + "value": "Summary:\nMicrosoft was notified that an elevation of privilege vulnerability exists in Windows based systems supporting Virtualization Based Security (VBS), including a subset of Azure Virtual Machine SKUS. This vulnerability enables an attacker with administrator privileges to replace current versions of Windows system files with outdated versions. By exploiting this vulnerability, an attacker could reintroduce previously mitigated vulnerabilities, circumvent some features of VBS, and exfiltrate data protected by VBS.\nMicrosoft is developing a security update to mitigate this threat, but it is not yet available. Guidance to help customers reduce the risks associated with this vulnerability and to protect their systems until the mitigation is available in a Windows security update is provided in the Recommended Actions section of this CVE.\nThis CVE will be updated when the mitigation is available in a Windows security update. We highly encourage customers to subscribe to Security Update Guide notifications to receive an alert when this update occurs.\nUpdate: August 13, 2024\nMicrosoft has released the August 2024 security updates that include an opt-in revocation policy mitigation to address this vulnerability. Customers running affected versions of Windows are encouraged to review KB5042562: Guidance for blocking rollback of virtualization-based security related updates to assess if this opt-in policy meets the needs of their environment before implementing this mitigation. There are risks associated with this mitigation that should be understood prior to applying it to your systems. Detailed information about these risks is also available in KB5042562.\nDetails:\nA security researcher informed Microsoft of an elevation of privilege vulnerability in Windows 10, Windows 11, Windows Server 2016, and higher based systems including Azure Virtual Machines (VM) that support VBS. For more information on Windows versions and VM SKUs supporting VBS, reference: Virtualization-based Security (VBS) | Microsoft Learn.\nThe vulnerability enables an attacker with administrator privileges on the target system to replace current Windows system files with outdated versions. Successful exploitation provides an attacker with the ability to reintroduce previously mitigated vulnerabilities, circumvent VBS security features, and exfiltrate data protected by VBS.\nMicrosoft is developing a security update that will revoke outdated, unpatched VBS system files to mitigate this vulnerability, but it is not yet available. Due to the complexity of blocking such a large quantity of files, rigorous testing is required to avoid integration failures or regressions. This CVE will be updated with new information and links to the security updates once available. We highly encourage customers subscribe to Security Update Guide notifications to be alerted of updates. For more information see Microsoft Technical Security Notifications and Security Update Guide Notification System News: Create your profile now \u2013 Microsoft Security Response Center\nMicrosoft is not aware of any attempts to exploit this vulnerability. However, a public presentation regarding this vulnerability was hosted at BlackHat on August 7, 2024. The presentation was appropriately coordinated with Microsoft but may change the threat landscape. Customers concerned with these risks should reference the guidance provided in the Recommended Actions section to protect their systems.\nRecommended Actions:\nMicrosoft has released an opt-in mitigation available as an interim solution to help protect customers concerned about this vulnerability until the final mitigation is available in a security update.\n\nFor Windows 10 1809 and later, Windows 11 version 21H2 and later, and Windows Server 2019 and later, administrators can deploy a Microsoft-signed revocation policy (SkuSiPolicy.p7b) to block vulnerable, unpatched versions of VBS system files from being loaded by the operating system. For more information, refer to KB5042562: Guidance for blocking rollback of virtualization-based security related..." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-228xx/CVE-2024-22871.json b/CVE-2024/CVE-2024-228xx/CVE-2024-22871.json index b2d5f661738..33cd8cb3aae 100644 --- a/CVE-2024/CVE-2024-228xx/CVE-2024-22871.json +++ b/CVE-2024/CVE-2024-228xx/CVE-2024-22871.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22871", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T02:15:09.410", - "lastModified": "2024-03-24T03:15:08.910", + "lastModified": "2024-08-13T19:35:03.443", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en las versiones 1.20 a 1.12.0-alpha5 de Clojure permite que un atacante provoque una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de la funci\u00f3n clojure.core$partial$fn__5920." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], "references": [ { "url": "https://hackmd.io/%40fe1w0/rymmJGida", diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23946.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23946.json index 77bcafe252e..dd74d3ca9d9 100644 --- a/CVE-2024/CVE-2024-239xx/CVE-2024-23946.json +++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23946.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23946", "sourceIdentifier": "security@apache.org", "published": "2024-02-29T01:44:11.227", - "lastModified": "2024-03-12T17:29:17.243", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-13T19:35:04.530", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, diff --git a/CVE-2024/CVE-2024-241xx/CVE-2024-24149.json b/CVE-2024/CVE-2024-241xx/CVE-2024-24149.json index 84b9688240d..4af77052b3c 100644 --- a/CVE-2024/CVE-2024-241xx/CVE-2024-24149.json +++ b/CVE-2024/CVE-2024-241xx/CVE-2024-24149.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24149", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T01:44:11.737", - "lastModified": "2024-03-12T14:57:32.097", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-13T19:35:04.837", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-401" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25830.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25830.json index f4d8e3c58f2..08b069a1a25 100644 --- a/CVE-2024/CVE-2024-258xx/CVE-2024-25830.json +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25830.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25830", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T01:44:16.533", - "lastModified": "2024-02-29T13:49:29.390", + "lastModified": "2024-08-13T19:35:05.710", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,46 @@ "value": "F-logic DataCube3 v1.0 es vulnerable a un control de acceso incorrecto debido a una restricci\u00f3n de acceso al directorio incorrecta. Un atacante remoto no autenticado puede aprovechar esto enviando un URI que contenga la ruta del archivo de configuraci\u00f3n. Un exploit exitoso podr\u00eda permitir al atacante extraer la contrase\u00f1a de root y de administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + }, + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://neroteam.com/blog/f-logic-datacube3-vulnerability-report", diff --git a/CVE-2024/CVE-2024-293xx/CVE-2024-29309.json b/CVE-2024/CVE-2024-293xx/CVE-2024-29309.json index 94600e28450..19c7f88e971 100644 --- a/CVE-2024/CVE-2024-293xx/CVE-2024-29309.json +++ b/CVE-2024/CVE-2024-293xx/CVE-2024-29309.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29309", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-02T16:15:07.810", - "lastModified": "2024-05-02T18:00:37.360", + "lastModified": "2024-08-13T18:35:02.870", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en Alfresco Content Services v.23.3.0.7 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del Servicio de Transferencia." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Siebene/c22e1a4a4a8b61067180475895e60858", diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29995.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29995.json new file mode 100644 index 00000000000..9318cb95eb6 --- /dev/null +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29995.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-29995", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:09.440", + "lastModified": "2024-08-13T18:15:09.440", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Kerberos Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-208" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29995", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37015.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37015.json index 8949ef0dd24..dc1533cf07a 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37015.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37015.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37015", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-13T17:15:23.553", - "lastModified": "2024-08-13T17:15:23.553", + "lastModified": "2024-08-13T19:35:06.800", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An issue was discovered in Ada Web Server 20.0. When configured to use SSL (which is not the default setting), the SSL/TLS used to establish connections to external services is done without proper hostname validation. This is exploitable by man-in-the-middle attackers." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-297" + } + ] + } + ], "references": [ { "url": "https://docs.adacore.com/corp/security-advisories/SEC.AWS-0031-v2.pdf", diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37968.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37968.json new file mode 100644 index 00000000000..7a8faf85338 --- /dev/null +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37968.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-37968", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:09.757", + "lastModified": "2024-08-13T18:15:09.757", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows DNS Spoofing Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-345" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37968", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38063.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38063.json new file mode 100644 index 00000000000..fb8a56c3650 --- /dev/null +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38063.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38063", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:10.007", + "lastModified": "2024-08-13T18:15:10.007", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows TCP/IP Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-191" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38063", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38084.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38084.json new file mode 100644 index 00000000000..d6f62b4b6c1 --- /dev/null +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38084.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38084", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:10.263", + "lastModified": "2024-08-13T18:15:10.263", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Microsoft OfficePlus Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38084", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38098.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38098.json new file mode 100644 index 00000000000..9e58808ecaf --- /dev/null +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38098.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38098", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:10.480", + "lastModified": "2024-08-13T18:15:10.480", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Azure Connected Machine Agent Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38098", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38106.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38106.json new file mode 100644 index 00000000000..f3f60b731c7 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38106.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38106", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:10.713", + "lastModified": "2024-08-13T18:15:10.713", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Kernel Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-591" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38106", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38107.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38107.json new file mode 100644 index 00000000000..e79356b1f02 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38107.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38107", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:10.963", + "lastModified": "2024-08-13T18:15:10.963", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Power Dependency Coordinator Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38107", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38108.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38108.json new file mode 100644 index 00000000000..4bae432de65 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38108.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38108", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:11.240", + "lastModified": "2024-08-13T18:15:11.240", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Azure Stack Hub Spoofing Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.3, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38108", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38109.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38109.json new file mode 100644 index 00000000000..0387dfc15a0 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38109.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2024-38109", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:11.490", + "lastModified": "2024-08-13T19:15:15.720", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "secure@microsoft.com", + "tags": [ + "exclusively-hosted-service" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "An authenticated attacker can exploit an Server-Side Request Forgery (SSRF) vulnerability in Microsoft Azure Health Bot to elevate privileges over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38109", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38114.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38114.json new file mode 100644 index 00000000000..832cf7658f8 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38114.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38114", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:11.820", + "lastModified": "2024-08-13T18:15:11.820", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows IP Routing Management Snapin Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38114", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38115.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38115.json new file mode 100644 index 00000000000..e50f9a76e1d --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38115.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38115", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:12.080", + "lastModified": "2024-08-13T18:15:12.080", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows IP Routing Management Snapin Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38115", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38116.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38116.json new file mode 100644 index 00000000000..fef64542c92 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38116.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38116", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:12.333", + "lastModified": "2024-08-13T18:15:12.333", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows IP Routing Management Snapin Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38116", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38117.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38117.json new file mode 100644 index 00000000000..e2b310948b7 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38117.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38117", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:12.570", + "lastModified": "2024-08-13T18:15:12.570", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "NTFS Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38117", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38118.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38118.json new file mode 100644 index 00000000000..61039ca533c --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38118.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38118", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:12.817", + "lastModified": "2024-08-13T18:15:12.817", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38118", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38120.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38120.json new file mode 100644 index 00000000000..ac43b75a45d --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38120.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38120", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:13.047", + "lastModified": "2024-08-13T18:15:13.047", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38120", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38121.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38121.json new file mode 100644 index 00000000000..510a456fa95 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38121.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38121", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:13.320", + "lastModified": "2024-08-13T18:15:13.320", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38121", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38122.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38122.json new file mode 100644 index 00000000000..8df6cf38cc9 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38122.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38122", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:13.613", + "lastModified": "2024-08-13T18:15:13.613", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38122", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38123.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38123.json new file mode 100644 index 00000000000..cf73f8c42be --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38123.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38123", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:13.860", + "lastModified": "2024-08-13T18:15:13.860", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Bluetooth Driver Information Disclosure Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38123", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38125.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38125.json new file mode 100644 index 00000000000..83ecc1855a7 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38125.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38125", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:14.080", + "lastModified": "2024-08-13T18:15:14.080", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-197" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38125", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38126.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38126.json new file mode 100644 index 00000000000..2bd6f8cde9e --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38126.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38126", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:14.353", + "lastModified": "2024-08-13T18:15:14.353", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Network Address Translation (NAT) Denial of Service Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38126", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38127.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38127.json new file mode 100644 index 00000000000..48a82f987fb --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38127.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38127", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:14.597", + "lastModified": "2024-08-13T18:15:14.597", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Hyper-V Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38127", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38128.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38128.json new file mode 100644 index 00000000000..9c20d8af29c --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38128.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38128", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:14.877", + "lastModified": "2024-08-13T18:15:14.877", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38128", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38130.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38130.json new file mode 100644 index 00000000000..4572faddd7c --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38130.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38130", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:15.580", + "lastModified": "2024-08-13T18:15:15.580", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38130", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38131.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38131.json new file mode 100644 index 00000000000..50d0389e6ff --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38131.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38131", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:15.833", + "lastModified": "2024-08-13T18:15:15.833", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Clipboard Virtual Channel Extension Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-591" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38131", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38132.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38132.json new file mode 100644 index 00000000000..88285ad77bc --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38132.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38132", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:16.067", + "lastModified": "2024-08-13T18:15:16.067", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Network Address Translation (NAT) Denial of Service Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38132", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38133.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38133.json new file mode 100644 index 00000000000..3444a6efad8 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38133.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38133", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:16.307", + "lastModified": "2024-08-13T18:15:16.307", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Kernel Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-138" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38133", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38134.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38134.json new file mode 100644 index 00000000000..579576fe93b --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38134.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38134", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:16.537", + "lastModified": "2024-08-13T18:15:16.537", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38134", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38135.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38135.json new file mode 100644 index 00000000000..6e1f31648ae --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38135.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38135", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:16.777", + "lastModified": "2024-08-13T18:15:16.777", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38135", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38136.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38136.json new file mode 100644 index 00000000000..79f9d58596d --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38136.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38136", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:16.993", + "lastModified": "2024-08-13T18:15:16.993", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38136", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38137.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38137.json new file mode 100644 index 00000000000..d085b7822e9 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38137.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-38137", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:17.230", + "lastModified": "2024-08-13T18:15:17.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + }, + { + "lang": "en", + "value": "CWE-591" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38137", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38138.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38138.json new file mode 100644 index 00000000000..f98002e7480 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38138.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38138", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:17.450", + "lastModified": "2024-08-13T18:15:17.450", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Deployment Services Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38138", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38140.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38140.json new file mode 100644 index 00000000000..309083f68e1 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38140.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38140", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:17.687", + "lastModified": "2024-08-13T18:15:17.687", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38140", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38141.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38141.json new file mode 100644 index 00000000000..485987538b2 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38141.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38141", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:17.953", + "lastModified": "2024-08-13T18:15:17.953", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38141", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38142.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38142.json new file mode 100644 index 00000000000..24b3abbcd54 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38142.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38142", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:18.200", + "lastModified": "2024-08-13T18:15:18.200", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Secure Kernel Mode Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38142", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38143.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38143.json new file mode 100644 index 00000000000..be1fb5b6c51 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38143.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38143", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:18.437", + "lastModified": "2024-08-13T18:15:18.437", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38143", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38144.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38144.json new file mode 100644 index 00000000000..e79471c2894 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38144.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38144", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:18.673", + "lastModified": "2024-08-13T18:15:18.673", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38144", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38145.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38145.json new file mode 100644 index 00000000000..d67ce27334a --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38145.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38145", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:18.913", + "lastModified": "2024-08-13T18:15:18.913", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38145", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38146.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38146.json new file mode 100644 index 00000000000..b28d980feb5 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38146.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38146", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:19.153", + "lastModified": "2024-08-13T18:15:19.153", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38146", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38147.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38147.json new file mode 100644 index 00000000000..3aaa0f1b850 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38147.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38147", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:19.407", + "lastModified": "2024-08-13T18:15:19.407", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Microsoft DWM Core Library Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38147", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38148.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38148.json new file mode 100644 index 00000000000..63771cadf47 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38148.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38148", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:19.653", + "lastModified": "2024-08-13T18:15:19.653", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Secure Channel Denial of Service Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38148", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38150.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38150.json new file mode 100644 index 00000000000..a5418efba75 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38150.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38150", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:19.887", + "lastModified": "2024-08-13T18:15:19.887", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows DWM Core Library Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38150", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38151.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38151.json new file mode 100644 index 00000000000..d5165eed96b --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38151.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38151", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:20.123", + "lastModified": "2024-08-13T18:15:20.123", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Kernel Information Disclosure Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38151", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38152.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38152.json new file mode 100644 index 00000000000..734e1c799e6 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38152.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38152", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:20.380", + "lastModified": "2024-08-13T18:15:20.380", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows OLE Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38152", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38153.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38153.json new file mode 100644 index 00000000000..7bb6bf85256 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38153.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38153", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:20.763", + "lastModified": "2024-08-13T18:15:20.763", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Kernel Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38153", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38154.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38154.json new file mode 100644 index 00000000000..75fdf292d34 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38154.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38154", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:21.273", + "lastModified": "2024-08-13T18:15:21.273", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38154", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38155.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38155.json new file mode 100644 index 00000000000..3d049662f3f --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38155.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38155", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:21.753", + "lastModified": "2024-08-13T18:15:21.753", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Security Center Broker Information Disclosure Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38155", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38157.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38157.json new file mode 100644 index 00000000000..1ceed6aa5bd --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38157.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38157", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:22.440", + "lastModified": "2024-08-13T18:15:22.440", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Azure IoT SDK Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38157", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38158.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38158.json new file mode 100644 index 00000000000..29dd055aa41 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38158.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38158", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:22.727", + "lastModified": "2024-08-13T18:15:22.727", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Azure IoT SDK Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38158", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38159.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38159.json new file mode 100644 index 00000000000..259a51a01da --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38159.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38159", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:22.950", + "lastModified": "2024-08-13T18:15:22.950", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Network Virtualization Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38159", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38160.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38160.json new file mode 100644 index 00000000000..864d8912be8 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38160.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38160", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:23.207", + "lastModified": "2024-08-13T18:15:23.207", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Network Virtualization Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38160", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38161.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38161.json new file mode 100644 index 00000000000..4fc1a5082cd --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38161.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38161", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:23.437", + "lastModified": "2024-08-13T18:15:23.437", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Mobile Broadband Driver Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38161", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38162.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38162.json new file mode 100644 index 00000000000..0b9978c5deb --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38162.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38162", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:23.687", + "lastModified": "2024-08-13T18:15:23.687", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Azure Connected Machine Agent Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38162", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38165.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38165.json new file mode 100644 index 00000000000..e35ff115c32 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38165.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38165", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:23.913", + "lastModified": "2024-08-13T18:15:23.913", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Compressed Folder Tampering Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-73" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38165", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38166.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38166.json index 98b9fb5c8c4..a86ed5ae873 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38166.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38166.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38166", "sourceIdentifier": "secure@microsoft.com", "published": "2024-08-06T22:15:54.163", - "lastModified": "2024-08-12T18:33:00.903", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-13T18:15:24.157", + "vulnStatus": "Modified", "cveTags": [ { "sourceIdentifier": "secure@microsoft.com", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38167.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38167.json new file mode 100644 index 00000000000..3e7072482d8 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38167.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38167", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:24.370", + "lastModified": "2024-08-13T18:15:24.370", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": ".NET and Visual Studio Information Disclosure Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38167", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38168.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38168.json new file mode 100644 index 00000000000..3f2fa6fcf8e --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38168.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38168", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:24.627", + "lastModified": "2024-08-13T18:15:24.627", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": ".NET and Visual Studio Denial of Service Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38168", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38169.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38169.json new file mode 100644 index 00000000000..d03f5cd1aa0 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38169.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38169", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:24.857", + "lastModified": "2024-08-13T18:15:24.857", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Office Visio Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38169", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38170.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38170.json new file mode 100644 index 00000000000..0a548df559f --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38170.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38170", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:25.070", + "lastModified": "2024-08-13T18:15:25.070", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Excel Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38170", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38171.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38171.json new file mode 100644 index 00000000000..0e5ce1f95cf --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38171.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38171", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:25.300", + "lastModified": "2024-08-13T18:15:25.300", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Microsoft PowerPoint Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38171", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38172.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38172.json new file mode 100644 index 00000000000..3d7d2073e0a --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38172.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38172", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:25.530", + "lastModified": "2024-08-13T18:15:25.530", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Excel Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38172", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38173.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38173.json new file mode 100644 index 00000000000..e5179594cc0 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38173.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38173", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:25.750", + "lastModified": "2024-08-13T18:15:25.750", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Outlook Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-73" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38173", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38177.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38177.json new file mode 100644 index 00000000000..033f816fa6e --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38177.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38177", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:25.987", + "lastModified": "2024-08-13T18:15:25.987", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows App Installer Spoofing Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-116" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38177", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38178.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38178.json new file mode 100644 index 00000000000..66a74814d47 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38178.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38178", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:26.220", + "lastModified": "2024-08-13T18:15:26.220", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Scripting Engine Memory Corruption Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38178", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38180.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38180.json new file mode 100644 index 00000000000..5aa446d57fa --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38180.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38180", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:26.463", + "lastModified": "2024-08-13T18:15:26.463", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows SmartScreen Security Feature Bypass Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38180", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38184.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38184.json new file mode 100644 index 00000000000..20a34772b49 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38184.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38184", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:26.733", + "lastModified": "2024-08-13T18:15:26.733", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Kernel-Mode Driver Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38184", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38185.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38185.json new file mode 100644 index 00000000000..125c896b1e5 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38185.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38185", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:26.970", + "lastModified": "2024-08-13T18:15:26.970", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Kernel-Mode Driver Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-822" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38185", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38186.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38186.json new file mode 100644 index 00000000000..910196a10d1 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38186.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38186", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:27.217", + "lastModified": "2024-08-13T18:15:27.217", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Kernel-Mode Driver Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38186", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38187.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38187.json new file mode 100644 index 00000000000..e520f8136df --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38187.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38187", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:27.447", + "lastModified": "2024-08-13T18:15:27.447", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Kernel-Mode Driver Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-822" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38187", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38189.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38189.json new file mode 100644 index 00000000000..99d6eb99734 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38189.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38189", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:27.733", + "lastModified": "2024-08-13T18:15:27.733", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Project Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38189", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38191.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38191.json new file mode 100644 index 00000000000..663568d2173 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38191.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38191", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:27.977", + "lastModified": "2024-08-13T18:15:27.977", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Kernel Streaming Service Driver Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38191", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38193.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38193.json new file mode 100644 index 00000000000..889084f2efc --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38193.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38193", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:28.230", + "lastModified": "2024-08-13T18:15:28.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38193", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38195.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38195.json new file mode 100644 index 00000000000..55f59688a18 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38195.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38195", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:28.470", + "lastModified": "2024-08-13T18:15:28.470", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Azure CycleCloud Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38195", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38196.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38196.json new file mode 100644 index 00000000000..d555d3776aa --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38196.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38196", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:28.710", + "lastModified": "2024-08-13T18:15:28.710", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Common Log File System Driver Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38196", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38197.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38197.json new file mode 100644 index 00000000000..a2758a4340e --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38197.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38197", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:28.957", + "lastModified": "2024-08-13T18:15:28.957", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Teams for iOS Spoofing Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-451" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38197", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38198.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38198.json new file mode 100644 index 00000000000..72122a4021e --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38198.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38198", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:29.193", + "lastModified": "2024-08-13T18:15:29.193", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Print Spooler Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-345" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38198", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38199.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38199.json new file mode 100644 index 00000000000..810511163b7 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38199.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38199", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:29.443", + "lastModified": "2024-08-13T18:15:29.443", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38199", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38200.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38200.json index a328018470f..204af0403b3 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38200.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38200.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38200", "sourceIdentifier": "secure@microsoft.com", "published": "2024-08-12T13:38:23.550", - "lastModified": "2024-08-13T13:43:16.403", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-13T18:15:29.720", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "nvd@nist.gov", + "source": "secure@microsoft.com", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", @@ -36,26 +56,6 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.2 - }, - { - "source": "secure@microsoft.com", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 7.5, - "baseSeverity": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38201.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38201.json new file mode 100644 index 00000000000..c8fcab5f04b --- /dev/null +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38201.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38201", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:29.953", + "lastModified": "2024-08-13T18:15:29.953", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Azure Stack Hub Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38201", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38202.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38202.json index 50fbea8667d..4952fac5f96 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38202.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38202.json @@ -2,13 +2,13 @@ "id": "CVE-2024-38202", "sourceIdentifier": "secure@microsoft.com", "published": "2024-08-08T02:15:38.180", - "lastModified": "2024-08-08T13:04:18.753", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-13T18:15:30.203", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Summary\nMicrosoft was notified that an elevation of privilege vulnerability exists in Windows Backup, potentially enabling an attacker with basic user privileges to reintroduce previously mitigated vulnerabilities or circumvent some features of Virtualization Based Security (VBS). However, an attacker attempting to exploit this vulnerability requires additional interaction by a privileged user to be successful.\nMicrosoft is developing a security update to mitigate this threat, but it is not yet available. Guidance to help customers reduce the risks associated with this vulnerability and to protect their systems until the mitigation is available in a Windows security update is provided in the Recommended Actions section of this CVE.\nThis CVE will be updated, and customers will be notified when the official mitigation is available in a Windows security update. We highly encourage customers to subscribe to Security Update Guide notifications to receive an alert when this update occurs.\nDetails\nA security researcher informed Microsoft of an elevation of privilege vulnerability in Windows Backup potentially enabling an attacker with basic user privileges to reintroduce previously mitigated vulnerabilities or circumvent some features of VBS. For exploitation to succeed, an attacker must trick or convince an Administrator or a user with delegated permissions into performing a system restore which inadvertently triggers the vulnerability.\nMicrosoft is developing a security update that will mitigate this vulnerability, but it is not yet available. This CVE will be updated with new information and links to the security updates once available. We highly encourage customers subscribe to Security Update Guide notifications to be alerted of updates. See Microsoft Technical Security Notifications and Security Update Guide Notification System News: Create your profile now \u2013 Microsoft Security Response Center.\nMicrosoft is not aware of any attempts to exploit this vulnerability. However, a public presentation regarding this vulnerability was hosted at BlackHat on August 7, 2024. The presentation was appropriately coordinated with Microsoft but may change the threat landscape. Customers concerned with these risks should reference the guidance provided in the Recommended Actions section to protect their systems.\nRecommended Actions\nThe following recommendations do not mitigate the vulnerability but can be used to reduce the risk of exploitation until the security update is available.\n\nConfigure \u201cAudit Object Access\u201d settings to monitor attempts to access files, such as handle creation, read / write operations, or modifications to security descriptors.\n\nAudit File System - Windows 10 | Microsoft Learn\nApply a basic audit policy on a file or folder - Windows 10 | Microsoft Learn\n\n\nAudit users with permission to perform Backup and Restore operations to ensure only the appropriate users can perform these operations.\n\nAudit: Audit the use of Backup and Restore privilege (Windows 10) - Windows 10 | Microsoft Learn\n\n\nImplement an Access Control List or Discretionary Access Control Lists to restrict the access or modification of Backup files and perform Restore operations to appropriate users, for example administrators only.\n\nAccess Control overview | Microsoft Learn\nDiscretionary Access Control Lists (DACL)\n\n\nAuditing sensitive privileges used to identify access, modification, or replacement of Backup related files could help indicate attempts to exploit this vulnerability.\n\nAudit Sensitive Privilege Use - Windows 10 | Microsoft Learn" + "value": "Summary\nMicrosoft was notified that an elevation of privilege vulnerability exists in Windows Update, potentially enabling an attacker with basic user privileges to reintroduce previously mitigated vulnerabilities or circumvent some features of Virtualization Based Security (VBS). However, an attacker attempting to exploit this vulnerability requires additional interaction by a privileged user to be successful.\nMicrosoft is developing a security update to mitigate this threat, but it is not yet available. Guidance to help customers reduce the risks associated with this vulnerability and to protect their systems until the mitigation is available in a Windows security update is provided in the Recommended Actions section of this CVE.\nThis CVE will be updated, and customers will be notified when the official mitigation is available in a Windows security update. We highly encourage customers to subscribe to Security Update Guide notifications to receive an alert when this update occurs.\nDetails\nA security researcher informed Microsoft of an elevation of privilege vulnerability in Windows Update potentially enabling an attacker with basic user privileges to reintroduce previously mitigated vulnerabilities or circumvent some features of VBS. For exploitation to succeed, an attacker must trick or convince an Administrator or a user with delegated permissions into performing a system restore which inadvertently triggers the vulnerability.\nMicrosoft is developing a security update that will mitigate this vulnerability, but it is not yet available. This CVE will be updated with new information and links to the security updates once available. We highly encourage customers subscribe to Security Update Guide notifications to be alerted of updates. See Microsoft Technical Security Notifications and Security Update Guide Notification System News: Create your profile now \u2013 Microsoft Security Response Center.\nMicrosoft is not aware of any attempts to exploit this vulnerability. However, a public presentation regarding this vulnerability was hosted at BlackHat on August 7, 2024. The presentation was appropriately coordinated with Microsoft but may change the threat landscape. Customers concerned with these risks should reference the guidance provided in the Recommended Actions section to protect their systems.\nRecommended Actions\nThe following recommendations do not mitigate the vulnerability but can be used to reduce the risk of exploitation until the security update is available.\n\nConfigure \u201cAudit Object Access\u201d settings to monitor attempts to access files, such as handle creation, read / write operations, or modifications to security descriptors.\n\nAudit File System - Windows 10 | Microsoft Learn\nApply a basic audit policy on a file or folder - Windows 10 | Microsoft Learn\n\n\nAudit users with permission to perform Update and Restore operations to ensure only the appropriate users can perform these operations.\n\nAudit: Audit the use of Backup and Restore privilege (Windows 10) - Windows 10 | Microsoft Learn\n\n\nImplement an Access Control List or Discretionary Access Control Lists to restrict the access or modification of Update files and perform Restore operations to appropriate users, for example administrators only.\n\nAccess Control overview | Microsoft Learn\nDiscretionary Access Control Lists (DACL)\n\n\nAuditing sensitive privileges used to identify access, modification, or replacement of Update related files could help indicate attempts to exploit this vulnerability.\n\nAudit Sensitive Privilege Use - Windows 10 | Microsoft Learn" }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38206.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38206.json index 110831cbc38..69caa3411d7 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38206.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38206.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38206", "sourceIdentifier": "secure@microsoft.com", "published": "2024-08-06T22:15:54.430", - "lastModified": "2024-08-12T18:33:38.273", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-13T18:15:30.350", + "vulnStatus": "Modified", "cveTags": [ { "sourceIdentifier": "secure@microsoft.com", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38211.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38211.json new file mode 100644 index 00000000000..c68ebed777e --- /dev/null +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38211.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38211", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:30.470", + "lastModified": "2024-08-13T18:15:30.470", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38211", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38213.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38213.json new file mode 100644 index 00000000000..51da2fb4be5 --- /dev/null +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38213.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38213", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:30.750", + "lastModified": "2024-08-13T18:15:30.750", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Mark of the Web Security Feature Bypass Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38213", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38214.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38214.json new file mode 100644 index 00000000000..dfb6d811f3c --- /dev/null +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38214.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38214", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:30.983", + "lastModified": "2024-08-13T18:15:30.983", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38214", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38215.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38215.json new file mode 100644 index 00000000000..84426db41e1 --- /dev/null +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38215.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38215", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:31.247", + "lastModified": "2024-08-13T18:15:31.247", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38215", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38218.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38218.json index 6257a1e146b..4d24df77cb6 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38218.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38218.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38218", "sourceIdentifier": "secure@microsoft.com", "published": "2024-08-12T13:38:23.933", - "lastModified": "2024-08-13T01:10:06.100", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-13T18:15:31.500", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Edge (HTML-based) Memory Corruption Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de corrupci\u00f3n de memoria de Microsoft Edge (basada en HTML)" } ], "metrics": { @@ -36,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38219.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38219.json index dc13733a57d..2364e2a7f01 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38219.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38219.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38219", "sourceIdentifier": "secure@microsoft.com", "published": "2024-08-12T13:38:24.123", - "lastModified": "2024-08-12T13:41:36.517", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-13T18:15:31.623", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Microsoft Edge (basado en Chromium)" } ], "metrics": { @@ -35,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38219", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38223.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38223.json new file mode 100644 index 00000000000..20b3060d56c --- /dev/null +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38223.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38223", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-13T18:15:31.810", + "lastModified": "2024-08-13T18:15:31.810", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Initial Machine Configuration Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38223", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40776.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40776.json index 6a52ab47ed9..6fec4974426 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40776.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40776.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40776", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:11.387", - "lastModified": "2024-07-30T13:32:45.943", + "lastModified": "2024-08-13T18:15:32.063", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -72,6 +72,10 @@ { "url": "https://support.apple.com/en-us/HT214124", "source": "product-security@apple.com" + }, + { + "url": "https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40779.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40779.json index 9d47ad594a9..f32161d3137 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40779.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40779.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40779", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:11.590", - "lastModified": "2024-07-30T13:32:45.943", + "lastModified": "2024-08-13T18:15:32.170", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -72,6 +72,10 @@ { "url": "https://support.apple.com/en-us/HT214124", "source": "product-security@apple.com" + }, + { + "url": "https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40780.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40780.json index 0c048e92259..22528e0c51e 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40780.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40780.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40780", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:11.660", - "lastModified": "2024-07-30T13:32:45.943", + "lastModified": "2024-08-13T18:15:32.257", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -72,6 +72,10 @@ { "url": "https://support.apple.com/en-us/HT214124", "source": "product-security@apple.com" + }, + { + "url": "https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42543.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42543.json index 36a2c340765..f9a354f3faf 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42543.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42543.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42543", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-12T18:15:12.423", - "lastModified": "2024-08-13T13:24:03.060", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-13T19:35:10.380", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42627.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42627.json index e335af16a93..33d52ec3c47 100644 --- a/CVE-2024/CVE-2024-426xx/CVE-2024-42627.json +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42627.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42627", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-12T17:15:18.343", - "lastModified": "2024-08-13T13:24:39.387", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-13T19:35:11.220", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42631.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42631.json index dea81b49218..821ce41978a 100644 --- a/CVE-2024/CVE-2024-426xx/CVE-2024-42631.json +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42631.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42631", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-12T16:15:17.143", - "lastModified": "2024-08-13T13:20:29.147", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-13T19:35:12.050", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42737.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42737.json index 19a414ccbac..fcdef1984c6 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42737.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42737.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42737", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-13T14:15:13.437", - "lastModified": "2024-08-13T17:36:45.023", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-13T18:35:07.950", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42743.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42743.json index 906fd3ac34e..73d673d86eb 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42743.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42743.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42743", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-12T20:15:09.027", - "lastModified": "2024-08-13T17:10:29.940", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-13T19:35:12.963", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6079.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6079.json new file mode 100644 index 00000000000..be885b94978 --- /dev/null +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6079.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-6079", + "sourceIdentifier": "PSIRT@rockwellautomation.com", + "published": "2024-08-13T18:15:32.443", + "lastModified": "2024-08-13T18:15:32.443", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability exists in the Rockwell Automation Emulate3D\u2122,\u00a0which could be leveraged to execute a DLL Hijacking attack. The application loads shared libraries, which are readable and writable by any user. If exploited, a malicious user could leverage a malicious dll and perform a remote code execution attack." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "weaknesses": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-610" + } + ] + } + ], + "references": [ + { + "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD%201683.html", + "source": "PSIRT@rockwellautomation.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7567.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7567.json new file mode 100644 index 00000000000..4d860e1b00a --- /dev/null +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7567.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-7567", + "sourceIdentifier": "PSIRT@rockwellautomation.com", + "published": "2024-08-13T18:15:32.680", + "lastModified": "2024-08-13T18:15:32.680", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A denial-of-service vulnerability exists via the CIP/Modbus port in the Rockwell Automation Micro850/870 (2080 -L50E/2080 -L70E). If exploited, the CIP/Modbus communication may be disrupted for short duration." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "weaknesses": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1684.html", + "source": "PSIRT@rockwellautomation.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7569.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7569.json new file mode 100644 index 00000000000..1baccd031f2 --- /dev/null +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7569.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-7569", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-08-13T19:15:16.443", + "lastModified": "2024-08-13T19:15:16.443", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An information disclosure vulnerability in Ivanti ITSM on-prem and Neurons for ITSM versions 2023.4 and earlier allows an unauthenticated attacker to obtain the OIDC client secret via debug information." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.6, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-215" + }, + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Neurons-for-ITSM-CVE-2024-7569-CVE-2024-7570", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7570.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7570.json new file mode 100644 index 00000000000..3f83d3944f1 --- /dev/null +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7570.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-7570", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-08-13T19:15:16.703", + "lastModified": "2024-08-13T19:15:16.703", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper certificate validation in Ivanti ITSM on-prem and Neurons for ITSM Versions 2023.4 and earlier allows a remote attacker in a MITM position to craft a token that would allow access to ITSM as any user." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Neurons-for-ITSM-CVE-2024-7569-CVE-2024-7570", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7593.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7593.json new file mode 100644 index 00000000000..e2ad2119098 --- /dev/null +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7593.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-7593", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-08-13T19:15:16.940", + "lastModified": "2024-08-13T19:15:16.940", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect implementation of an authentication algorithm in Ivanti vTM other than versions 22.2R1 or 22.7R2 allows a remote unauthenticated attacker to bypass authentication of the admin panel." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + }, + { + "lang": "en", + "value": "CWE-303" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Virtual-Traffic-Manager-vTM-CVE-2024-7593", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7733.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7733.json new file mode 100644 index 00000000000..79172f8228b --- /dev/null +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7733.json @@ -0,0 +1,133 @@ +{ + "id": "CVE-2024-7733", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-13T18:15:32.883", + "lastModified": "2024-08-13T18:15:32.883", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, was found in FastCMS up to 0.1.5. Affected is an unknown function of the component New Article Category Page. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://gitee.com/xjd2020/fastcms/issues/IAI8T6", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274350", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274350", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7738.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7738.json new file mode 100644 index 00000000000..03eb5de29d6 --- /dev/null +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7738.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-7738", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-13T19:15:17.217", + "lastModified": "2024-08-13T19:15:17.217", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, has been found in yzane vscode-markdown-pdf 1.5.0. Affected by this issue is some unknown functionality of the component Markdown File Handler. The manipulation leads to pathname traversal. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:L/Au:S/C:P/I:N/A:N", + "accessVector": "LOCAL", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 1.7 + }, + "baseSeverity": "LOW", + "exploitabilityScore": 3.1, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-21" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abhi-ingle/Vulnerability-Research/blob/main/POC/Arbitrary%20File%20Read/file_read_report.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/abhi-ingle/Vulnerability-Research/blob/main/POC/Arbitrary%20File%20Read/poc_arbitrary_file_read.mp4", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274358", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274358", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.385634", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7739.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7739.json new file mode 100644 index 00000000000..029c6523dfe --- /dev/null +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7739.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-7739", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-13T19:15:17.530", + "lastModified": "2024-08-13T19:15:17.530", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, was found in yzane vscode-markdown-pdf 1.5.0. This affects an unknown part. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 5.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abhi-ingle/Vulnerability-Research/blob/main/POC/Script%20Injection/poc_script_inject.mp4", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/abhi-ingle/Vulnerability-Research/blob/main/POC/Script%20Injection/script_injection_report.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274359", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274359", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.385635", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 6b3cda871d3..4bb8419a1bd 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-08-13T18:00:17.912966+00:00 +2024-08-13T20:00:17.749026+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-08-13T17:37:07.567000+00:00 +2024-08-13T19:45:46.977000+00:00 ``` ### Last Data Feed Release @@ -33,69 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -259766 +259855 ``` ### CVEs added in the last Commit -Recently added CVEs: `40` +Recently added CVEs: `89` -- [CVE-2023-20584](CVE-2023/CVE-2023-205xx/CVE-2023-20584.json) (`2024-08-13T17:15:19.713`) -- [CVE-2023-20591](CVE-2023/CVE-2023-205xx/CVE-2023-20591.json) (`2024-08-13T17:15:19.920`) -- [CVE-2023-26211](CVE-2023/CVE-2023-262xx/CVE-2023-26211.json) (`2024-08-13T16:15:08.220`) -- [CVE-2023-31304](CVE-2023/CVE-2023-313xx/CVE-2023-31304.json) (`2024-08-13T17:15:20.110`) -- [CVE-2023-31305](CVE-2023/CVE-2023-313xx/CVE-2023-31305.json) (`2024-08-13T17:15:20.303`) -- [CVE-2023-31307](CVE-2023/CVE-2023-313xx/CVE-2023-31307.json) (`2024-08-13T17:15:20.500`) -- [CVE-2023-31310](CVE-2023/CVE-2023-313xx/CVE-2023-31310.json) (`2024-08-13T17:15:20.683`) -- [CVE-2023-31339](CVE-2023/CVE-2023-313xx/CVE-2023-31339.json) (`2024-08-13T17:15:20.870`) -- [CVE-2023-31341](CVE-2023/CVE-2023-313xx/CVE-2023-31341.json) (`2024-08-13T17:15:21.087`) -- [CVE-2023-31348](CVE-2023/CVE-2023-313xx/CVE-2023-31348.json) (`2024-08-13T17:15:21.307`) -- [CVE-2023-31349](CVE-2023/CVE-2023-313xx/CVE-2023-31349.json) (`2024-08-13T17:15:21.500`) -- [CVE-2023-31356](CVE-2023/CVE-2023-313xx/CVE-2023-31356.json) (`2024-08-13T17:15:21.733`) -- [CVE-2023-31366](CVE-2023/CVE-2023-313xx/CVE-2023-31366.json) (`2024-08-13T17:15:21.913`) -- [CVE-2024-21757](CVE-2024/CVE-2024-217xx/CVE-2024-21757.json) (`2024-08-13T16:15:08.637`) -- [CVE-2024-21981](CVE-2024/CVE-2024-219xx/CVE-2024-21981.json) (`2024-08-13T17:15:22.920`) -- [CVE-2024-36446](CVE-2024/CVE-2024-364xx/CVE-2024-36446.json) (`2024-08-13T17:15:23.403`) -- [CVE-2024-36505](CVE-2024/CVE-2024-365xx/CVE-2024-36505.json) (`2024-08-13T16:15:08.970`) -- [CVE-2024-37015](CVE-2024/CVE-2024-370xx/CVE-2024-37015.json) (`2024-08-13T17:15:23.553`) -- [CVE-2024-41613](CVE-2024/CVE-2024-416xx/CVE-2024-41613.json) (`2024-08-13T17:15:23.927`) -- [CVE-2024-41614](CVE-2024/CVE-2024-416xx/CVE-2024-41614.json) (`2024-08-13T17:15:24.013`) -- [CVE-2024-41711](CVE-2024/CVE-2024-417xx/CVE-2024-41711.json) (`2024-08-13T17:15:24.237`) -- [CVE-2024-6618](CVE-2024/CVE-2024-66xx/CVE-2024-6618.json) (`2024-08-13T17:15:24.377`) -- [CVE-2024-6619](CVE-2024/CVE-2024-66xx/CVE-2024-6619.json) (`2024-08-13T17:15:24.517`) -- [CVE-2024-7113](CVE-2024/CVE-2024-71xx/CVE-2024-7113.json) (`2024-08-13T17:15:24.653`) -- [CVE-2024-7746](CVE-2024/CVE-2024-77xx/CVE-2024-7746.json) (`2024-08-13T16:15:09.573`) +- [CVE-2024-38185](CVE-2024/CVE-2024-381xx/CVE-2024-38185.json) (`2024-08-13T18:15:26.970`) +- [CVE-2024-38186](CVE-2024/CVE-2024-381xx/CVE-2024-38186.json) (`2024-08-13T18:15:27.217`) +- [CVE-2024-38187](CVE-2024/CVE-2024-381xx/CVE-2024-38187.json) (`2024-08-13T18:15:27.447`) +- [CVE-2024-38189](CVE-2024/CVE-2024-381xx/CVE-2024-38189.json) (`2024-08-13T18:15:27.733`) +- [CVE-2024-38191](CVE-2024/CVE-2024-381xx/CVE-2024-38191.json) (`2024-08-13T18:15:27.977`) +- [CVE-2024-38193](CVE-2024/CVE-2024-381xx/CVE-2024-38193.json) (`2024-08-13T18:15:28.230`) +- [CVE-2024-38195](CVE-2024/CVE-2024-381xx/CVE-2024-38195.json) (`2024-08-13T18:15:28.470`) +- [CVE-2024-38196](CVE-2024/CVE-2024-381xx/CVE-2024-38196.json) (`2024-08-13T18:15:28.710`) +- [CVE-2024-38197](CVE-2024/CVE-2024-381xx/CVE-2024-38197.json) (`2024-08-13T18:15:28.957`) +- [CVE-2024-38198](CVE-2024/CVE-2024-381xx/CVE-2024-38198.json) (`2024-08-13T18:15:29.193`) +- [CVE-2024-38199](CVE-2024/CVE-2024-381xx/CVE-2024-38199.json) (`2024-08-13T18:15:29.443`) +- [CVE-2024-38201](CVE-2024/CVE-2024-382xx/CVE-2024-38201.json) (`2024-08-13T18:15:29.953`) +- [CVE-2024-38211](CVE-2024/CVE-2024-382xx/CVE-2024-38211.json) (`2024-08-13T18:15:30.470`) +- [CVE-2024-38213](CVE-2024/CVE-2024-382xx/CVE-2024-38213.json) (`2024-08-13T18:15:30.750`) +- [CVE-2024-38214](CVE-2024/CVE-2024-382xx/CVE-2024-38214.json) (`2024-08-13T18:15:30.983`) +- [CVE-2024-38215](CVE-2024/CVE-2024-382xx/CVE-2024-38215.json) (`2024-08-13T18:15:31.247`) +- [CVE-2024-38223](CVE-2024/CVE-2024-382xx/CVE-2024-38223.json) (`2024-08-13T18:15:31.810`) +- [CVE-2024-6079](CVE-2024/CVE-2024-60xx/CVE-2024-6079.json) (`2024-08-13T18:15:32.443`) +- [CVE-2024-7567](CVE-2024/CVE-2024-75xx/CVE-2024-7567.json) (`2024-08-13T18:15:32.680`) +- [CVE-2024-7569](CVE-2024/CVE-2024-75xx/CVE-2024-7569.json) (`2024-08-13T19:15:16.443`) +- [CVE-2024-7570](CVE-2024/CVE-2024-75xx/CVE-2024-7570.json) (`2024-08-13T19:15:16.703`) +- [CVE-2024-7593](CVE-2024/CVE-2024-75xx/CVE-2024-7593.json) (`2024-08-13T19:15:16.940`) +- [CVE-2024-7733](CVE-2024/CVE-2024-77xx/CVE-2024-7733.json) (`2024-08-13T18:15:32.883`) +- [CVE-2024-7738](CVE-2024/CVE-2024-77xx/CVE-2024-7738.json) (`2024-08-13T19:15:17.217`) +- [CVE-2024-7739](CVE-2024/CVE-2024-77xx/CVE-2024-7739.json) (`2024-08-13T19:15:17.530`) ### CVEs modified in the last Commit -Recently modified CVEs: `50` +Recently modified CVEs: `27` -- [CVE-2024-42736](CVE-2024/CVE-2024-427xx/CVE-2024-42736.json) (`2024-08-13T17:11:53.553`) -- [CVE-2024-42737](CVE-2024/CVE-2024-427xx/CVE-2024-42737.json) (`2024-08-13T17:36:45.023`) -- [CVE-2024-42738](CVE-2024/CVE-2024-427xx/CVE-2024-42738.json) (`2024-08-13T17:36:38.913`) -- [CVE-2024-42739](CVE-2024/CVE-2024-427xx/CVE-2024-42739.json) (`2024-08-13T17:36:32.647`) -- [CVE-2024-42740](CVE-2024/CVE-2024-427xx/CVE-2024-42740.json) (`2024-08-13T17:11:53.553`) -- [CVE-2024-42741](CVE-2024/CVE-2024-427xx/CVE-2024-42741.json) (`2024-08-13T17:35:02.867`) -- [CVE-2024-42742](CVE-2024/CVE-2024-427xx/CVE-2024-42742.json) (`2024-08-13T17:10:49.093`) -- [CVE-2024-42743](CVE-2024/CVE-2024-427xx/CVE-2024-42743.json) (`2024-08-13T17:10:29.940`) -- [CVE-2024-42744](CVE-2024/CVE-2024-427xx/CVE-2024-42744.json) (`2024-08-13T17:10:12.157`) -- [CVE-2024-42745](CVE-2024/CVE-2024-427xx/CVE-2024-42745.json) (`2024-08-13T17:09:44.943`) -- [CVE-2024-42747](CVE-2024/CVE-2024-427xx/CVE-2024-42747.json) (`2024-08-13T17:35:04.540`) -- [CVE-2024-42748](CVE-2024/CVE-2024-427xx/CVE-2024-42748.json) (`2024-08-13T17:08:53.510`) -- [CVE-2024-4603](CVE-2024/CVE-2024-46xx/CVE-2024-4603.json) (`2024-08-13T16:35:05.013`) -- [CVE-2024-5849](CVE-2024/CVE-2024-58xx/CVE-2024-5849.json) (`2024-08-13T17:11:53.553`) -- [CVE-2024-6384](CVE-2024/CVE-2024-63xx/CVE-2024-6384.json) (`2024-08-13T17:11:53.553`) -- [CVE-2024-6788](CVE-2024/CVE-2024-67xx/CVE-2024-6788.json) (`2024-08-13T17:11:53.553`) -- [CVE-2024-6917](CVE-2024/CVE-2024-69xx/CVE-2024-6917.json) (`2024-08-13T17:14:51.100`) -- [CVE-2024-7273](CVE-2024/CVE-2024-72xx/CVE-2024-7273.json) (`2024-08-13T16:10:45.057`) -- [CVE-2024-7274](CVE-2024/CVE-2024-72xx/CVE-2024-7274.json) (`2024-08-13T16:10:42.520`) -- [CVE-2024-7275](CVE-2024/CVE-2024-72xx/CVE-2024-7275.json) (`2024-08-13T16:10:37.247`) -- [CVE-2024-7408](CVE-2024/CVE-2024-74xx/CVE-2024-7408.json) (`2024-08-13T16:06:08.213`) -- [CVE-2024-7557](CVE-2024/CVE-2024-75xx/CVE-2024-7557.json) (`2024-08-13T17:00:53.670`) -- [CVE-2024-7589](CVE-2024/CVE-2024-75xx/CVE-2024-7589.json) (`2024-08-13T16:58:08.793`) -- [CVE-2024-7616](CVE-2024/CVE-2024-76xx/CVE-2024-7616.json) (`2024-08-13T16:59:39.517`) -- [CVE-2024-7658](CVE-2024/CVE-2024-76xx/CVE-2024-7658.json) (`2024-08-13T17:00:19.800`) +- [CVE-2019-7256](CVE-2019/CVE-2019-72xx/CVE-2019-7256.json) (`2024-08-13T19:20:23.200`) +- [CVE-2020-10148](CVE-2020/CVE-2020-101xx/CVE-2020-10148.json) (`2024-08-13T19:22:06.523`) +- [CVE-2021-28663](CVE-2021/CVE-2021-286xx/CVE-2021-28663.json) (`2024-08-13T19:45:46.977`) +- [CVE-2023-48171](CVE-2023/CVE-2023-481xx/CVE-2023-48171.json) (`2024-08-13T19:35:01.050`) +- [CVE-2024-21302](CVE-2024/CVE-2024-213xx/CVE-2024-21302.json) (`2024-08-13T18:15:09.160`) +- [CVE-2024-22871](CVE-2024/CVE-2024-228xx/CVE-2024-22871.json) (`2024-08-13T19:35:03.443`) +- [CVE-2024-23946](CVE-2024/CVE-2024-239xx/CVE-2024-23946.json) (`2024-08-13T19:35:04.530`) +- [CVE-2024-24149](CVE-2024/CVE-2024-241xx/CVE-2024-24149.json) (`2024-08-13T19:35:04.837`) +- [CVE-2024-25830](CVE-2024/CVE-2024-258xx/CVE-2024-25830.json) (`2024-08-13T19:35:05.710`) +- [CVE-2024-29309](CVE-2024/CVE-2024-293xx/CVE-2024-29309.json) (`2024-08-13T18:35:02.870`) +- [CVE-2024-37015](CVE-2024/CVE-2024-370xx/CVE-2024-37015.json) (`2024-08-13T19:35:06.800`) +- [CVE-2024-38166](CVE-2024/CVE-2024-381xx/CVE-2024-38166.json) (`2024-08-13T18:15:24.157`) +- [CVE-2024-38200](CVE-2024/CVE-2024-382xx/CVE-2024-38200.json) (`2024-08-13T18:15:29.720`) +- [CVE-2024-38202](CVE-2024/CVE-2024-382xx/CVE-2024-38202.json) (`2024-08-13T18:15:30.203`) +- [CVE-2024-38206](CVE-2024/CVE-2024-382xx/CVE-2024-38206.json) (`2024-08-13T18:15:30.350`) +- [CVE-2024-38218](CVE-2024/CVE-2024-382xx/CVE-2024-38218.json) (`2024-08-13T18:15:31.500`) +- [CVE-2024-38219](CVE-2024/CVE-2024-382xx/CVE-2024-38219.json) (`2024-08-13T18:15:31.623`) +- [CVE-2024-40776](CVE-2024/CVE-2024-407xx/CVE-2024-40776.json) (`2024-08-13T18:15:32.063`) +- [CVE-2024-40779](CVE-2024/CVE-2024-407xx/CVE-2024-40779.json) (`2024-08-13T18:15:32.170`) +- [CVE-2024-40780](CVE-2024/CVE-2024-407xx/CVE-2024-40780.json) (`2024-08-13T18:15:32.257`) +- [CVE-2024-42543](CVE-2024/CVE-2024-425xx/CVE-2024-42543.json) (`2024-08-13T19:35:10.380`) +- [CVE-2024-42627](CVE-2024/CVE-2024-426xx/CVE-2024-42627.json) (`2024-08-13T19:35:11.220`) +- [CVE-2024-42631](CVE-2024/CVE-2024-426xx/CVE-2024-42631.json) (`2024-08-13T19:35:12.050`) +- [CVE-2024-42737](CVE-2024/CVE-2024-427xx/CVE-2024-42737.json) (`2024-08-13T18:35:07.950`) +- [CVE-2024-42743](CVE-2024/CVE-2024-427xx/CVE-2024-42743.json) (`2024-08-13T19:35:12.963`) ## Download and Usage diff --git a/_state.csv b/_state.csv index b6ddc365a03..57a127ca631 100644 --- a/_state.csv +++ b/_state.csv @@ -47501,7 +47501,7 @@ CVE-2011-0607,0,0,fcf6c18d6542ca50f8879fc0ad15fe638ff66635c40701c9f762838837061b CVE-2011-0608,0,0,824c30d3992f356ab66f880ae4b3506ffcdb78adc0868e53b326fcec76402350,2018-10-30T16:26:24.687000 CVE-2011-0609,0,0,d26d4363f8c440ef4d7a84dacf00d8b961324f342cff92f01dd5d12371f4ba24,2024-06-28T14:20:56.560000 CVE-2011-0610,0,0,bd59df391ac1495c2b4d4f0ebee4108f59818cd929f5670ddc798fd6e728cb3d,2017-09-19T01:32:07.817000 -CVE-2011-0611,0,0,46a90db973edaf687a6e15dfeaf375885621c958cff47f3dd33091b8fca97089,2024-07-03T01:35:09.403000 +CVE-2011-0611,0,1,fe36ab0691a57b2a3b659e4a8e4397932ade86b5c9c0ca69a6fa44b4aaff815d,2024-08-13T18:58:42.883000 CVE-2011-0612,0,0,0ce622d54f326b5a5eb831796008ad6993be5d61c712afdbb520cf776d424d54,2011-05-25T04:00:00 CVE-2011-0613,0,0,14423a52398baae6b89a4c6d7d6c464bf44797f6f5c73c8bac8799cf151c7786,2011-05-25T04:00:00 CVE-2011-0614,0,0,ee9485cf951313886ef95857d11a2840b7214880a2daf4a3ea5b2f915c2b5bd2,2011-09-22T03:28:33.693000 @@ -65432,7 +65432,7 @@ CVE-2014-100001,0,0,496d283e4077eb91781700470d529f28f56a9879d89873bb4bbe708a8f66 CVE-2014-100002,0,0,1fe07cb5580616868b609fab25539d322badf9ed4acaa13d89867111a168d0fe,2017-09-08T01:29:00.980000 CVE-2014-100003,0,0,535504af9f6d657d634bcdf619e1925599052cdfdd8e7318c585a59d4b34907d,2015-03-24T20:49:10.563000 CVE-2014-100004,0,0,385016359e044be489079162254f0709adbec8ec723092128f8d11cf5c0b3b7f,2018-10-09T19:42:19.983000 -CVE-2014-100005,0,0,43e6ef219d260f2090e734db662c671abef740ed8616b0583b532532db46c775,2024-08-01T13:41:24.997000 +CVE-2014-100005,0,1,1cdbe69d099b2464fa6f94ea0ec4e6061b92d893bc493a717cc5c44a32fb4f55,2024-08-13T19:12:35.933000 CVE-2014-100006,0,0,bcf5f7dbbf5e5cb3b9fb326d90b640ed92a3e165bcea5109a96f9a5b32827cfc,2017-09-08T01:29:01.153000 CVE-2014-100007,0,0,3be48e186ab7a25218ae6cfd191b523f12edae47ccd4b7f0680f2bd21ac96717,2017-09-08T01:29:01.197000 CVE-2014-100008,0,0,3d85995dfcf3a67ed6e45685004c57e8f9c0d5f0a79a63acf1bcbb76a1bb4184,2017-09-08T01:29:01.260000 @@ -141846,7 +141846,7 @@ CVE-2019-7252,0,0,41969ac509db3271bd85a372d4652150bb16bfd775efb6ddcea78f2d287526 CVE-2019-7253,0,0,6be7ba207e4fa7afe2d70c1a42012124fbf98f018462324e7887194e967c011c,2019-07-03T17:19:15.327000 CVE-2019-7254,0,0,e884ed518fd0de80d9a353f741b715288870524e00bb13980f75c9496db67758,2021-10-04T17:15:57.257000 CVE-2019-7255,0,0,cbf1429d7d91aa389a9c6f761dffb646e3567df7e2bbe50e26392e1ddce70631,2022-10-14T01:21:44.847000 -CVE-2019-7256,0,0,14b4138b3293797f26382877efae69f5fc1e1a68710e578d84f5e0f410906836,2024-07-03T01:36:04.380000 +CVE-2019-7256,0,1,013e1c8afad63aba2f749c0fb91ef3276f9f63aba51721a48369301579227da6,2024-08-13T19:20:23.200000 CVE-2019-7257,0,0,9cca1ca32bb4a419d033a033294ee205f34161dfdcd6797c262fc496a3a33787,2022-10-14T01:32:10.637000 CVE-2019-7258,0,0,70de8b5f40048feb5e0f1a18d4cf3e9036ba2a90132a7f58108c9720e2659b7a,2022-10-14T01:33:11.630000 CVE-2019-7259,0,0,ebc2ddced122e1e042b9ebc5ec798ae6872f42b37f3855901eeac3a6c23d7c07,2022-10-14T01:13:17.953000 @@ -145223,7 +145223,7 @@ CVE-2020-10140,0,0,00f94112f767ca07bc21bdbc144c60d88123a4d59654995eea4517726bb48 CVE-2020-10143,0,0,4345d84e0d15d8bccd33b925145b63dab180d3ba15811a08950499659308489c,2021-12-20T22:26:22.110000 CVE-2020-10145,0,0,601038ebbf76b3ba71f98b4035060774e23d640d362c5428e191f8770caeb98e,2022-08-05T15:21:30.510000 CVE-2020-10146,0,0,7f9a7196a06aa2d106a80bb9e2cf5dd6830133177ee68ff8040bf9f71bb9d660,2020-12-10T20:48:50.703000 -CVE-2020-10148,0,0,ec42aa1225b2d285d32a52c18ef190a25a2d33cbe5954eeab69f1d57943fe327,2024-08-01T20:35:08.140000 +CVE-2020-10148,0,1,770c0ea7d54b5417498c9254461214359c76999b3322cdf49af0a507582e4862,2024-08-13T19:22:06.523000 CVE-2020-1015,0,0,e36bd1d00bb7f068d55efffdb7c1462b1cf597567eb96c992021b8857222693e,2021-07-21T11:39:23.747000 CVE-2020-1016,0,0,d7a6abdc0b94b2b626a9edfb615afbc4f5024b321d121258bad32da9717e995e,2021-07-21T11:39:23.747000 CVE-2020-1017,0,0,d57349f18a524300e9c55fb6d37a079de46d4aa1754e95d6eb5c23a5c89d4c70,2021-07-21T11:39:23.747000 @@ -171753,7 +171753,7 @@ CVE-2021-26340,0,0,a9a2d2f3ae596013d351a83bcbc62d1661d6de78633836f4a45e8a842c3c7 CVE-2021-26341,0,0,64c77b44c48f9865fab1901c052a5a4124295bd514b4b7e904f9b7548afc2735,2023-08-08T14:22:24.967000 CVE-2021-26342,0,0,d18661157cf1422b6d36201ce3d5886b96cfeeaab914e3b8eb8624f414b119d1,2022-05-19T20:05:04.317000 CVE-2021-26343,0,0,73943aafa8a8925aace3a8cc06d6f6ea84282bfe4ec9c1bcc54e8474e9ca71a0,2023-11-07T03:31:42.390000 -CVE-2021-26344,1,1,b01e2f10e40827dfa903202c7dbb25b6c501867ec8087ebbf2113568b8e48bfa,2024-08-13T17:15:17.113000 +CVE-2021-26344,0,0,b01e2f10e40827dfa903202c7dbb25b6c501867ec8087ebbf2113568b8e48bfa,2024-08-13T17:15:17.113000 CVE-2021-26345,0,0,675448085b52579d866d828d2b292b39a8119e5bf32f80d9e2ab233b1528bf64,2024-06-18T19:15:54.837000 CVE-2021-26346,0,0,d36bab13abe34c3fedc993c20566c6d43f133890f5aaacdcfa062ba110fa23dc,2023-01-24T17:51:33.337000 CVE-2021-26347,0,0,0391bfb33bc61256a893b7e6d189fd3e2802aa991af43c6bd2bf008148a4231a,2023-08-08T14:21:49.707000 @@ -171775,7 +171775,7 @@ CVE-2021-26363,0,0,97cf6010789a8724eca591ea4ef719fb7cbf88d4d3c3b183bff6f8b0b06b2 CVE-2021-26364,0,0,a453ebea3e61c13f2289319e707a7d8c84d45ae2b9a5699ee3b1243e814ee218,2022-05-25T18:01:43.153000 CVE-2021-26365,0,0,ca85b07ffccdb11327a2c29bb8ca853c0718b61fcf261b5ee3ffc34ef02db3e5,2023-05-26T16:25:28.183000 CVE-2021-26366,0,0,f6fab7157bfd4c57e08c996085aa2ce1a81873ef7c5e1c34e8342c64622a88c0,2023-08-08T14:22:24.967000 -CVE-2021-26367,1,1,b4b52f60d7e2d1afbcf34f01387dad14a3abf259e034a6f87b5d843689a7ecfa,2024-08-13T17:15:17.360000 +CVE-2021-26367,0,0,b4b52f60d7e2d1afbcf34f01387dad14a3abf259e034a6f87b5d843689a7ecfa,2024-08-13T17:15:17.360000 CVE-2021-26368,0,0,3813e8d053e71df32617f585150b50a1bd56695769d623cb1c613027c06c62f2,2022-06-01T15:43:56.210000 CVE-2021-26369,0,0,881d29c936d11aab0dca9eecaf6fb08176b669558d35fde584f9d68fd3e0bfa9,2022-06-01T21:13:17.690000 CVE-2021-26370,0,0,cd8f360ba1cdb81478288211b911a112aece3e176ee912cdbd51cabf7f70ca9f,2022-05-18T15:47:49.957000 @@ -171791,7 +171791,7 @@ CVE-2021-26382,0,0,2619984e005bf5dfb9bf02d268b62c9de35d3b48b045fc49f40ab7ca09050 CVE-2021-26384,0,0,86857582aeacb169fedc31b2eed60e471712f9602d4766f0000c707ba3ce19f3,2023-08-08T14:21:49.707000 CVE-2021-26385,0,0,f2c8b7d9db601ac08dd018e8b3647ecdeba07aaa7932dabdf667e78be8806825,2023-11-07T03:31:43.570000 CVE-2021-26386,0,0,8f9efe3b31036cb87b0be0023f428f9a725cab75e1d54024482b257db12f8585,2023-08-08T14:21:49.707000 -CVE-2021-26387,1,1,c5bd9c979f2cbee450fd9ac4214a068a7891004b998a383cf35d7cd2f2efd5ca,2024-08-13T17:15:17.563000 +CVE-2021-26387,0,0,c5bd9c979f2cbee450fd9ac4214a068a7891004b998a383cf35d7cd2f2efd5ca,2024-08-13T17:15:17.563000 CVE-2021-26388,0,0,280678e189a8aa58a5cd382994aa504bd31b98f2239de3b1c9f45665d365595a,2023-08-08T14:22:24.967000 CVE-2021-26390,0,0,9aa39d537f73fce75398a5f84e6f7f957780d46911c94229c09ea2b4b0e2766a,2022-05-25T17:27:34.660000 CVE-2021-26391,0,0,47e8735ad01937d363965d6012f21c924faf94920adf8c3251095064212ab776,2022-11-23T14:00:15.610000 @@ -173322,7 +173322,7 @@ CVE-2021-28658,0,0,10240e8932be071f64b4d7ceed1e91e7f062e6003dbac0fc4e86da8e120c1 CVE-2021-28660,0,0,37dd1ac15f6bfc5905c8cee7cb65edb18da857d6aac9dd47852bf8d4c8fd5627,2023-11-09T14:44:33.733000 CVE-2021-28661,0,0,305c2bbe1579faf986356b3383f915c0a456f3474023c19856e9b6f20a6beaf4,2021-10-15T01:53:15 CVE-2021-28662,0,0,cea384b692d24de8092d9d160858a16e48ac42a91a4bc999dd6627163feb91ca,2023-11-07T03:32:18.137000 -CVE-2021-28663,0,0,d0a55f6399ee222a11872b9fb2da3cd962293fae06903070c65377b8e89709fb,2024-08-01T13:42:10.330000 +CVE-2021-28663,0,1,8cf6fd6b8e94221ffe81e8fa145928922c35dceb441c0d7a647b20f53c5aaa18,2024-08-13T19:45:46.977000 CVE-2021-28664,0,0,e5bcccc2bd506ab6b3600c389c3b4f5b03283589ad0db7b7f46fc6378cf228db,2024-07-25T17:59:50.377000 CVE-2021-28665,0,0,3bd907d3d23a03b2b014d35e71d71cd61a30be665ae5c6583c4556d40847301f,2022-07-12T17:42:04.277000 CVE-2021-28667,0,0,055fa8c06183fc89d048f9424e212a5e038d60254dfafa0d7be08895557719a4,2021-03-25T13:44:17.310000 @@ -186638,7 +186638,7 @@ CVE-2021-46741,0,0,0b40e8e32d29e0f96f0af2c276768a4ac016129ae4d863795d7a4af2661b4 CVE-2021-46742,0,0,13ff92c0902a8e3ccb77fb7b8c8327dfae3feb5c7ee87f870ba029a124b88197,2022-07-12T17:42:04.277000 CVE-2021-46743,0,0,7e258fae6545733572be15bf8f00b471c0183fe9feab8e30aa3e99cd00a61619,2022-04-08T15:14:50.130000 CVE-2021-46744,0,0,78589c41b7d92db5eaffce6d6a8851bc2287ed56c43eefd5ab65e59e830716c6,2023-08-08T14:22:24.967000 -CVE-2021-46746,1,1,49899ef227e1b1cd09ae664c898ee07563411326ae3264bd256130a4490516f8,2024-08-13T17:15:17.787000 +CVE-2021-46746,0,0,49899ef227e1b1cd09ae664c898ee07563411326ae3264bd256130a4490516f8,2024-08-13T17:15:17.787000 CVE-2021-46748,0,0,31c9dac1ff239e43a51a8186c85667ae15dfd1b24d0146589cf32b12385adf26,2023-11-27T19:03:01.993000 CVE-2021-46749,0,0,32b0321c9cac1f53241df70eefee71a55ba83baf5aabfc47646aa71e6dda16c7,2023-05-22T15:55:47.967000 CVE-2021-46753,0,0,389185adc5adbd69df72eaf6b406809e56d98b55bc10a477c0fbb10a2e142a9a,2023-05-22T15:55:38.593000 @@ -186659,7 +186659,7 @@ CVE-2021-46767,0,0,6cd8c1108446c411ce7029812f7dcf62d4b786072b3ce0963801a3eafdff4 CVE-2021-46768,0,0,f3491e608f48488a602bd23a5fea09b9bf74b5cedfb262474b610bc547bc3489,2023-11-07T03:40:03.620000 CVE-2021-46769,0,0,df9e56d4c29363361248ae32c917b9b58ea86199f05f9a93f77a15d51a8ebf70,2023-05-22T15:53:25.717000 CVE-2021-46771,0,0,bd3b4beb8c2eceba57952892b5d081e393cba0abc36d7a89e818253b17c3abe7,2022-05-16T16:34:44.603000 -CVE-2021-46772,1,1,ce120e9b964c8419c25d8ceea49dde1e80146b5e01a79ba1f7bb56d644540bb5,2024-08-13T17:15:17.993000 +CVE-2021-46772,0,0,ce120e9b964c8419c25d8ceea49dde1e80146b5e01a79ba1f7bb56d644540bb5,2024-08-13T17:15:17.993000 CVE-2021-46773,0,0,7bd679d16345f76136b1ca52f27befcb59e3e9e253ce6a4e1c4d75f12cec2171,2023-05-22T15:39:24.227000 CVE-2021-46774,0,0,d1f28bf59b804d9f95af92be70fbc52959917c592931a427dee54051ac18d891,2024-06-18T19:15:56.180000 CVE-2021-46775,0,0,f598e8133f7e6a9ae3137fd7c6d2e454be3ee56c09cb5c3dc84ac8330df648d1,2023-05-22T15:52:53.973000 @@ -192936,9 +192936,9 @@ CVE-2022-23810,0,0,6daf791e0cdde7f400e739c0b76181530495c3897218a8fd543018057808f CVE-2022-23812,0,0,76a67cc42f08c669892aa277f71c32f42fa1fd039fae47d1d05f42684796ddfa,2023-11-07T03:44:18.993000 CVE-2022-23813,0,0,967a9209243a4765e481f9e97a5d29dfdb6ebb6b0ab26ecd3a93eaf1f0655301,2023-11-07T03:44:19.077000 CVE-2022-23814,0,0,ba86e8e01129a54731a661922866566d0c24e9cb4d06c8201299204d30907e8c,2023-11-07T03:44:19.147000 -CVE-2022-23815,1,1,b2f5db79aeac1d6972511b10e58841a5794ad01ff78ed48e3f32379d8ad3245b,2024-08-13T17:15:18.197000 +CVE-2022-23815,0,0,b2f5db79aeac1d6972511b10e58841a5794ad01ff78ed48e3f32379d8ad3245b,2024-08-13T17:15:18.197000 CVE-2022-23816,0,0,b3e8a185ce7f00305c2d16541dec1c202970fddb180fd72b9358d6be7b074a1f,2023-11-07T03:44:19.220000 -CVE-2022-23817,1,1,e8d8570791041202504cf0bd282d6270d5038eb5dfb7b68663aefd5be745f601,2024-08-13T17:15:18.390000 +CVE-2022-23817,0,0,e8d8570791041202504cf0bd282d6270d5038eb5dfb7b68663aefd5be745f601,2024-08-13T17:15:18.390000 CVE-2022-23818,0,0,e697d2d315e0f13efee88ed0e3a8913eeeaf5d9838a9b3f34f53d3cb926f5cdb,2023-05-22T15:51:44.203000 CVE-2022-2382,0,0,2c4fa5a1b3e1d53c8fbec35e7e5f1af255e915e7487aeff76f856fc2d380322a,2023-06-30T18:55:47 CVE-2022-23820,0,0,7de5545b67573282ba8eeff7871d1e677d598e0c95b615acd85d493776508ef4,2024-06-18T19:15:56.563000 @@ -195979,7 +195979,7 @@ CVE-2022-27482,0,0,36b6f1b97ebba78c42fbca698ce9c45dd58b63814d39b8408a6e4f47c85c7 CVE-2022-27483,0,0,547cae1c29ba4c8e34ce2ca3485c07e3564bbb8ad0bc933f56fe2bc4cfd995a2,2022-07-27T07:18:54.910000 CVE-2022-27484,0,0,b70ab124e3868d4300a35fe9373862610a18fbb62290ce37b9943e259b6259b4,2023-08-08T14:21:49.707000 CVE-2022-27485,0,0,89c71954a05af3cb3fa20c6d9b6c24ac726da380f9e9c148dcc8373b207c974a,2023-11-07T03:45:20.327000 -CVE-2022-27486,1,1,4e3566956f7a36d21cf8e9dd30dfc6e37fe3f331a3012eb79d82d71dfbfaf2ce,2024-08-13T17:11:53.553000 +CVE-2022-27486,0,0,4e3566956f7a36d21cf8e9dd30dfc6e37fe3f331a3012eb79d82d71dfbfaf2ce,2024-08-13T17:11:53.553000 CVE-2022-27487,0,0,40352dcb6eab8d9a69c504241370e01f28a37002d1641a037d7821aac682f726,2023-11-07T03:45:20.453000 CVE-2022-27488,0,0,6e31ddd90d81cb2ce85c8657468174115b85ad3aef674059057db057dfb8f7e7,2024-01-18T15:48:06.043000 CVE-2022-27489,0,0,81b540b09f87c477cd65ccdf38f3c4e50b2037d1b2ce7272f3b17e5d12163420,2023-11-07T03:45:20.570000 @@ -210252,7 +210252,7 @@ CVE-2022-45859,0,0,e348c03f2d659f2f5386e4f909b6e1cb2796eaee095e3e655cb0987893244 CVE-2022-4586,0,0,0aa055d519b6e153850ccca55806ee707b733003747c3a50acc7fbfa7cffac55,2023-11-07T03:58:14.667000 CVE-2022-45860,0,0,19ff9249ce30a9b49b0ef71436486c56cd636a8a1ff2b9bc5fc6dacb75c5ac16,2023-11-07T03:54:54.520000 CVE-2022-45861,0,0,ce9a5217138c4f0b88d9c1f1c18264fd40036371397c206a84c6003fd1ed0947,2023-11-07T03:54:54.773000 -CVE-2022-45862,1,1,50ade549c4ed3652e690956a3e0c22d0ca27365d35924f3580f5e0786fa00c70,2024-08-13T17:11:53.553000 +CVE-2022-45862,0,0,50ade549c4ed3652e690956a3e0c22d0ca27365d35924f3580f5e0786fa00c70,2024-08-13T17:11:53.553000 CVE-2022-45866,0,0,d74e30c203376ee64b52bc0674dadc3d7e6655262995eb7d10ab3de283c1a2c3,2023-11-07T03:54:55.003000 CVE-2022-45867,0,0,9683286023a0db7745466ef67dbea5f2d24359816c975944697b49893f1ea929,2023-01-10T03:23:59.953000 CVE-2022-45868,0,0,c81f731922d209a11898651a91a4d106607ad1989f6cc83a36eca554d71b85d5,2024-08-03T15:15:31.327000 @@ -214642,12 +214642,12 @@ CVE-2023-2047,0,0,cffaecf8374ebb191af0f661ba6a6ae01114c895a3998ae75ad057d2324f91 CVE-2023-2048,0,0,3b96fdf8bf6bb1815e88259c23a8e8802bc71a7230a6980ba2168438ccf5766c,2024-05-17T02:22:36.683000 CVE-2023-2049,0,0,8dac22165dd378125a2d02dfc6c92bf36750623be7e8c8651944b5a13cfd2b96,2024-05-17T02:22:36.810000 CVE-2023-2050,0,0,52bd1ab7278b756f4e980be0c308c962c43732bbdb6944a3222ce1a25981c8ca,2024-05-17T02:22:36.920000 -CVE-2023-20509,1,1,fb9e3597ae339788521f14df3fee06acd05c49e6f69bc3d2b71b7ef0f3c055fa,2024-08-13T17:15:18.590000 +CVE-2023-20509,0,0,fb9e3597ae339788521f14df3fee06acd05c49e6f69bc3d2b71b7ef0f3c055fa,2024-08-13T17:15:18.590000 CVE-2023-2051,0,0,aae0b82e887061c7db66b0d038eeb5f5dd09f4b2acd07b8f05b78ea85d55a2f1,2024-05-17T02:22:37.033000 -CVE-2023-20510,1,1,f4a531400e1f5d1eed6981df45234c765c642470560f66492c89a162a88bc8e8,2024-08-13T17:15:18.777000 -CVE-2023-20512,1,1,5866d974c8e0b5c4000d77fd3c4e98f668f0ac78269e9d02e1f43a8f1b91b0b0,2024-08-13T17:15:18.957000 -CVE-2023-20513,1,1,ef9cbd9df22f8a4d984c719eefd04d3cdf517690a07880499046c6f5ca5ac41b,2024-08-13T17:15:19.150000 -CVE-2023-20518,1,1,8ab4b6b5018d55b077ee62c39fbc9518d2f6b1716c855d690ce8595cf4edbe45,2024-08-13T17:15:19.330000 +CVE-2023-20510,0,0,f4a531400e1f5d1eed6981df45234c765c642470560f66492c89a162a88bc8e8,2024-08-13T17:15:18.777000 +CVE-2023-20512,0,0,5866d974c8e0b5c4000d77fd3c4e98f668f0ac78269e9d02e1f43a8f1b91b0b0,2024-08-13T17:15:18.957000 +CVE-2023-20513,0,0,ef9cbd9df22f8a4d984c719eefd04d3cdf517690a07880499046c6f5ca5ac41b,2024-08-13T17:15:19.150000 +CVE-2023-20518,0,0,8ab4b6b5018d55b077ee62c39fbc9518d2f6b1716c855d690ce8595cf4edbe45,2024-08-13T17:15:19.330000 CVE-2023-20519,0,0,56bc283b215c337f135e3f89a4ebe5a0dc3c2788b2f6ae0b85cb9f259a5eee98,2023-11-21T20:27:42.837000 CVE-2023-2052,0,0,dcec65c7f2c455bd5f2a27def018d9efbaa0541c20520cdc4f00cc433a61fb13,2024-05-17T02:22:37.137000 CVE-2023-20520,0,0,e8503ad772a81c260bc455aa9cc4fd48e5ee62c6721e34f1768b4ada6c3848fb,2023-05-22T15:44:29.890000 @@ -214687,17 +214687,17 @@ CVE-2023-20570,0,0,dfe48ab7be186e12e0df2907f1611ee83f54971ec11802e508a83413b0802 CVE-2023-20571,0,0,96f212f661726a3c476a2fb295d8da706572d89ee10f136777356539fdf55e7c,2023-11-28T18:05:25.177000 CVE-2023-20573,0,0,ad0019707ea1d3be9aafe200900d990babb7fbdcc22ca2cce433aaa0fd946615,2024-01-18T17:39:02.430000 CVE-2023-20575,0,0,2e65bf0d5b77958c50a50d7734bf1302e45afedfe49795c175183e4bccf178d7,2023-07-19T18:32:04.807000 -CVE-2023-20578,1,1,d6869cfc4bd8e2ddf2436479963e79d41d3d373c927f982bc9239d1961f2cd4a,2024-08-13T17:15:19.510000 +CVE-2023-20578,0,0,d6869cfc4bd8e2ddf2436479963e79d41d3d373c927f982bc9239d1961f2cd4a,2024-08-13T17:15:19.510000 CVE-2023-20579,0,0,b4a70474e393f8888455713a6b442ef3e5379ac960e74bb0629b9958558f0077,2024-02-14T13:59:35.580000 CVE-2023-2058,0,0,0c817ab6ea98d27963a0bdd6b94d4e88089c1ee4704beb5ad1d7199dfd901fb8,2024-05-17T02:22:37.783000 CVE-2023-20583,0,0,a212d56af862f7656348d6c69619b40cd14646d40284557522dffd91a69163f7,2023-08-04T17:31:53.953000 -CVE-2023-20584,1,1,28a38ce4c21043b49e76540d59a42c8885a0cc2b68e256e3159afdbb4e9616af,2024-08-13T17:15:19.713000 +CVE-2023-20584,0,0,28a38ce4c21043b49e76540d59a42c8885a0cc2b68e256e3159afdbb4e9616af,2024-08-13T17:15:19.713000 CVE-2023-20586,0,0,2b96deb58718f7ac98b46d641c8379026fc9ad8a3de3893d34c8029b4aea3a20,2023-08-21T17:25:49.017000 CVE-2023-20587,0,0,72840db018c5fea3a5e9db6438f23b4a0e2250649184440959ee7a2a0b60406a,2024-02-14T13:59:35.580000 CVE-2023-20588,0,0,55d15a9af5a3f88e1385827d8231778b88a2978c761e134221ea75e0aaf71c2a,2024-06-10T18:15:19.940000 CVE-2023-20589,0,0,8f5169c7803605972ea983b305f7f4a772b29887c902f9b718a3f97d8c8a1ab3,2023-08-22T18:34:00.837000 CVE-2023-2059,0,0,0677a9a340cebf1ede4fa5405d77be76b826f28940ff2b5e0fd7dfe518b5d2d4,2024-05-17T02:22:37.890000 -CVE-2023-20591,1,1,81a597feaede6457f54da6ec51eb26984c25d16ad2dbd59afd8a8df6b65046c9,2024-08-13T17:15:19.920000 +CVE-2023-20591,0,0,81a597feaede6457f54da6ec51eb26984c25d16ad2dbd59afd8a8df6b65046c9,2024-08-13T17:15:19.920000 CVE-2023-20592,0,0,b0a06d1e3946cee9f0f28e7ed70215f197005399701a88546b468891da1b0cea,2023-11-28T18:04:11.733000 CVE-2023-20593,0,0,530d6596a07cbc314aa9738f5f27a912fa1e4a0638fe8dd3fac9dbd8b5f37664,2024-06-10T18:15:20.270000 CVE-2023-20594,0,0,1216232d26ab1c6c51b8b6cc614329be0442409fee752464c8c4238b36f64f7a,2023-09-22T19:16:57.037000 @@ -219503,7 +219503,7 @@ CVE-2023-26208,0,0,6d0f4dc6d724abcb907704fe533b579a8e93c30a273129ba89479b697be9d CVE-2023-26209,0,0,7d59b19062f3260362329b8fb9d5c15b2ae02a8836d5bca5cb172fc8c782b133,2023-11-07T04:09:30.447000 CVE-2023-2621,0,0,7f94a2689b6229804f06a0491733acc8b775ae9f925cf1e972b069fef12e261e,2023-11-08T20:24:04.207000 CVE-2023-26210,0,0,99c2d6b2b1b10e12d31bdc0b224bc3d023d9d7cc443b37d4e2e13fe1d6018bbf,2023-11-07T04:09:30.613000 -CVE-2023-26211,1,1,5997acd33f69e95fb77f19e8247aac7c30104e5403c6e9d4dc24a4183a8d0ccf,2024-08-13T17:11:53.553000 +CVE-2023-26211,0,0,5997acd33f69e95fb77f19e8247aac7c30104e5403c6e9d4dc24a4183a8d0ccf,2024-08-13T17:11:53.553000 CVE-2023-26213,0,0,9fca21a4f0ef9105b70445769c776c24e65be74243dac24bc6ee96342368114c,2023-03-10T14:53:13.973000 CVE-2023-26214,0,0,9e7b174c5aaea2917c7d88fd07688e669455d4f2f30624879fd03413171a17b0,2023-03-02T18:26:30.863000 CVE-2023-26215,0,0,79741706e0402cd903a56cce97eb88259c18de371ac6ef6ea150277ca6ac8145,2023-06-01T20:34:27.187000 @@ -223485,27 +223485,27 @@ CVE-2023-3130,0,0,ebfebbdee0a909a4baa4899df5c6a28ad3a7a04e265d15250b4d0c062e6eb4 CVE-2023-31300,0,0,c6a4108718dbef116ebe62862a40eb993a0f2f7732323f0332ebfa85216b3aaa,2024-01-08T12:52:27.867000 CVE-2023-31301,0,0,8b4aa9e0020370e9364f1514c1548d00f13f3a6f7e88a244d5ac3dcc0555465f,2024-01-04T21:53:26.990000 CVE-2023-31302,0,0,7db878fe5302d808bd5001becdb205fd1302d85ff5b5989c39244fbd498603b5,2024-01-08T13:04:07.097000 -CVE-2023-31304,1,1,b3eed2d4f06e02bbb7bad2c0e27af5b0ee2004f7c7f733efaac94688034291c3,2024-08-13T17:15:20.110000 -CVE-2023-31305,1,1,63fc25576f1111e534e39376f2bc8c606010fbe3cd497ca6afc764196f813584,2024-08-13T17:15:20.303000 -CVE-2023-31307,1,1,641ab7759917a9c3f0f19926edec9b39328e61022df7a29352e0442d0415599f,2024-08-13T17:15:20.500000 +CVE-2023-31304,0,0,b3eed2d4f06e02bbb7bad2c0e27af5b0ee2004f7c7f733efaac94688034291c3,2024-08-13T17:15:20.110000 +CVE-2023-31305,0,0,63fc25576f1111e534e39376f2bc8c606010fbe3cd497ca6afc764196f813584,2024-08-13T17:15:20.303000 +CVE-2023-31307,0,0,641ab7759917a9c3f0f19926edec9b39328e61022df7a29352e0442d0415599f,2024-08-13T17:15:20.500000 CVE-2023-3131,0,0,92b0e6ff89d88f5d5d16464713458f8b0d9ad7ab63634417462d4acc9effd23f,2023-11-07T04:17:57.837000 -CVE-2023-31310,1,1,8c8c6d69a3fa7b266d944060bdf438d60d558ca95740a2a5a2f8edbbf78c4a9d,2024-08-13T17:15:20.683000 -CVE-2023-31315,0,1,d17c2680f71b14f4b0870b96a06ec49aa645615149d8150ef81fa90cf6752787,2024-08-13T16:15:08.477000 +CVE-2023-31310,0,0,8c8c6d69a3fa7b266d944060bdf438d60d558ca95740a2a5a2f8edbbf78c4a9d,2024-08-13T17:15:20.683000 +CVE-2023-31315,0,0,d17c2680f71b14f4b0870b96a06ec49aa645615149d8150ef81fa90cf6752787,2024-08-13T16:15:08.477000 CVE-2023-3132,0,0,52ab34552d4912b51189535960f33c42d601a676c80cf99d393d54a820deb2f0,2023-11-07T04:17:58.010000 CVE-2023-31320,0,0,94626c9fd18f585c07331302f269c549777a5d34517f86a0946e1593aaaba7c1,2023-11-30T15:10:43.827000 CVE-2023-3133,0,0,003d70726348f1765d3e8bbdc7b1fe8c778d5248156227efcf8dfd6079b65e42,2023-11-07T04:17:58.197000 -CVE-2023-31339,1,1,bc5c1ceaab95e00d2fabe5ef8d0751d17017a7f124a549ccfe30822454ab08eb,2024-08-13T17:15:20.870000 +CVE-2023-31339,0,0,bc5c1ceaab95e00d2fabe5ef8d0751d17017a7f124a549ccfe30822454ab08eb,2024-08-13T17:15:20.870000 CVE-2023-3134,0,0,56071acdc7623a3f1e8c35f56a75d80cedbc311efc23e7ac51d208245195f557,2023-11-07T04:17:58.303000 -CVE-2023-31341,1,1,e356fabccb4e2f4c50e0e40d8342c4b67da7e9846f152ee5a78f5785cc8b34c2,2024-08-13T17:15:21.087000 +CVE-2023-31341,0,0,e356fabccb4e2f4c50e0e40d8342c4b67da7e9846f152ee5a78f5785cc8b34c2,2024-08-13T17:15:21.087000 CVE-2023-31346,0,0,fb91d6feb6afb0cbe0e766ab4beb996d6abc6e4e588496e59a212a252857db33,2024-02-14T13:59:35.580000 CVE-2023-31347,0,0,e7e5129e33b7857873337677dbd101a4ac8034b8cf7aba254ce6dd6d67a266a3,2024-02-14T13:59:35.580000 -CVE-2023-31348,1,1,12062d9cbc336d1fccc2afc92cd0568d6a7f04eb216d731896718a48a0a10055,2024-08-13T17:15:21.307000 -CVE-2023-31349,1,1,f3aef5411e58ed4cd86ace94f8e3fd5a45802425d1848bf51b812fd87eea3859,2024-08-13T17:15:21.500000 +CVE-2023-31348,0,0,12062d9cbc336d1fccc2afc92cd0568d6a7f04eb216d731896718a48a0a10055,2024-08-13T17:15:21.307000 +CVE-2023-31349,0,0,f3aef5411e58ed4cd86ace94f8e3fd5a45802425d1848bf51b812fd87eea3859,2024-08-13T17:15:21.500000 CVE-2023-3135,0,0,6bf4d178b889b1c4b1b5225d3bec9008408415fe638f98a0c794b0c27b2df020,2023-11-07T04:17:58.450000 CVE-2023-31355,0,0,710b94de3c93b6aa7d25aac899c1a18a9a5b69a7bd0c863785d8a2aecb06c01e,2024-08-06T16:30:24.547000 -CVE-2023-31356,1,1,4face49aed9f3c0cef51ad8bc85f3ad1844b9b0b0862737d67fd17eed6935d60,2024-08-13T17:15:21.733000 +CVE-2023-31356,0,0,4face49aed9f3c0cef51ad8bc85f3ad1844b9b0b0862737d67fd17eed6935d60,2024-08-13T17:15:21.733000 CVE-2023-3136,0,0,89749c73105b8a3b2f93105e2704853e3e122996e34e8067a103f24e2d5a7180,2023-11-07T04:17:58.613000 -CVE-2023-31366,1,1,0c6fb44ae53c61c4955e1b12ebcc6e08220f1b634da359cdc149ba641affeda4,2024-08-13T17:15:21.913000 +CVE-2023-31366,0,0,0c6fb44ae53c61c4955e1b12ebcc6e08220f1b634da359cdc149ba641affeda4,2024-08-13T17:15:21.913000 CVE-2023-3138,0,0,8f5ffff3673e8f74abc6225a3f21e8fa48e79b4bc3826a6eddcc46862b33415a,2023-12-08T19:15:07.580000 CVE-2023-3139,0,0,63da4e4c506673ff4b4b94c15b4d0285dc0dfef1076f2791ebbb5626e7d3bb6f,2023-11-07T04:17:58.783000 CVE-2023-3140,0,0,83445c1e28eed50d0564a2961426f98d0d9629256d1766c5b66f60dd49997477,2023-06-16T18:06:57.083000 @@ -235686,7 +235686,7 @@ CVE-2023-4816,0,0,90b20067076355462cea63668d7d1f70b5bce794b9c85a4b5247192748c982 CVE-2023-48161,0,0,5f227f88224a25f0981451dc3f6576e18f3ab0aeb112343704f86ed43d2a330d,2023-11-29T18:48:53.683000 CVE-2023-48166,0,0,64c113268e4ebd6cc8fb3ea7fc24c3bce04e60808f1e16bf9f7c84cc706bd030,2024-01-22T19:21:48.260000 CVE-2023-4817,0,0,66b9317b8b341b3c6f85e7870e90748e4d6a86dfea30b64fc5b4019933f60d15,2023-10-05T00:55:56.257000 -CVE-2023-48171,0,0,3b90eeb3bfcb911a9d9481be5562efc21e8c49d6ff8c2937232d65d92b3663c2,2024-08-13T12:58:25.437000 +CVE-2023-48171,0,1,89a2853931c612ef03e79651b11a0fb6ea3b51c8473c6885930059c475d95ee2,2024-08-13T19:35:01.050000 CVE-2023-48172,0,0,0e78c6c737f4aa94c295f39e3b2f6c04b05dd97deb3b6a7475ffc20424f8ee86,2023-12-09T04:46:27.490000 CVE-2023-48176,0,0,5229479ea70d793012d98b28f5832b18c29ca0585926ac2e2e1991c088531620,2023-11-30T20:21:54.850000 CVE-2023-4818,0,0,c99fef0e43e54a7e397a1f19b3703f45e3876ee2d790b03b384938f06570625f,2024-01-19T16:35:49.683000 @@ -240911,7 +240911,7 @@ CVE-2023-7245,0,0,a421df92ce644454fe097795d1da0ec80380ee5cbb65aae1a0ad296b590de0 CVE-2023-7246,0,0,050d4503ff5d2fc1e4ed53053f9ee9630c64fe69870c591a8ba326c5d224f69a,2024-08-05T16:35:04.410000 CVE-2023-7247,0,0,11dff8be09894b40cbed69114f71626bb57aa842b25cc2bedf8081784fe369f7,2024-08-12T14:35:03.053000 CVE-2023-7248,0,0,89fb0153d5d95a0d63adb7f25676b5b6c97388e661ba5f8924ac36ffce0f3f87,2024-07-26T19:11:49.893000 -CVE-2023-7249,0,1,edc651203a9405def51a7acf8d5e1ea94a3c703618e6136a6e052f78ab77b7a0,2024-08-13T17:13:50.917000 +CVE-2023-7249,0,0,edc651203a9405def51a7acf8d5e1ea94a3c703618e6136a6e052f78ab77b7a0,2024-08-13T17:13:50.917000 CVE-2023-7250,0,0,9a5f9775079474ddc45acce310e1f8cd06db79a566ee35ec7f63e8af33eee385,2024-07-02T23:15:10.377000 CVE-2023-7251,0,0,dd7a7df27ce68aab327ba0baa92251358ec7e4d2777ca1ea9021ce7d40f54021,2024-03-26T12:55:05.010000 CVE-2023-7252,0,0,a96b97f43999a9df13dd6b86a1c20c7b99309234cadd0538e19b9a3c2d31e5fc,2024-07-03T01:44:29.993000 @@ -242176,7 +242176,7 @@ CVE-2024-1390,0,0,f2a25975c3042e30a42c5fcd19f4c398992a4b35179f84e0b51a1c441a4e4d CVE-2024-1391,0,0,50e2fbe1cc7d386fd26fed3bf083598946d64d5314a6236ebb9200766cf4f837,2024-03-13T18:15:58.530000 CVE-2024-1392,0,0,8db7abe472b85e00e4ae726e30591de82c7d16f05d2f6d5459004c50d152a5c0,2024-03-13T18:15:58.530000 CVE-2024-1393,0,0,4f5797aa4dbf368118dda7b12f73418a8cf88d40cd13e8c8978941ce6c41ad41,2024-03-13T18:15:58.530000 -CVE-2024-1394,0,1,cbbaab8f591d6a3642a83b362ac3686de1858a0630e76934717d838f412ab1a2,2024-08-13T17:15:22.173000 +CVE-2024-1394,0,0,cbbaab8f591d6a3642a83b362ac3686de1858a0630e76934717d838f412ab1a2,2024-08-13T17:15:22.173000 CVE-2024-1395,0,0,9f5cead23576320934b06ae7650426cd28c58ea3927d599eb3ccbebbf15a3072,2024-07-03T01:45:14.570000 CVE-2024-1396,0,0,0697e623a8579806097bf49373d31640770e9cf97f78e16b0038cfa8bc55a349,2024-05-02T18:00:37.360000 CVE-2024-1397,0,0,8da6b20072e696017f2fea6d653b85b1ce227e84921025d1f452d353bbc1383a,2024-03-13T12:33:51.697000 @@ -242947,7 +242947,7 @@ CVE-2024-20404,0,0,9ff8f593f71d4a0ff7aecb6b668971610942799ed16450e68ad59cf7f0b9f CVE-2024-20405,0,0,2fa5b4e65c2f399507a2e57227d51876c94b3517d024d761ea8ec8bc4f4a8a91,2024-06-18T18:04:04.497000 CVE-2024-2041,0,0,7b4fc911113d944c485bed2a7f958b069e0536bf197811dc0e3dcb8018df3bd7,2024-05-06T14:15:07.747000 CVE-2024-20416,0,0,36fba5d0b9a663051d43c2072f34c721bf06b423d2ffa103fc7cf93ef9750d67,2024-07-18T12:28:43.707000 -CVE-2024-20419,0,1,0795f6e87845f9b46dc3400495c49fb48a047d8ed4e9d1842a04ff7724f0ad68,2024-08-13T17:15:22.787000 +CVE-2024-20419,0,0,0795f6e87845f9b46dc3400495c49fb48a047d8ed4e9d1842a04ff7724f0ad68,2024-08-13T17:15:22.787000 CVE-2024-2042,0,0,148bfce3b5f48e2144e9167826ed5f6f120e539bf15296a435b2ce580e8b1f74,2024-03-17T22:38:29.433000 CVE-2024-20429,0,0,f467ae3dedce5a1f38518317999bbc8fc79bc2960eb95679505ee1fcb992ae20,2024-07-18T12:28:43.707000 CVE-2024-2043,0,0,7a3896d230f6f1ae602a08f92e2eaaa644b5893021849dee8a675eb9b7c81e88,2024-05-02T18:00:37.360000 @@ -243544,7 +243544,7 @@ CVE-2024-2127,0,0,fee555ba22c69f33931ace66815b77d0a5796e2ad55c5d25b843a412734e73 CVE-2024-2128,0,0,ad241575873847a0cb8491370112d4603dbee504ed1e31d448d346ee3b31a6d6,2024-03-08T14:02:57.420000 CVE-2024-2129,0,0,4e7afd99b608981f119f3e5da184ba51484f21aa33b32d2a6446850d6a9f1652,2024-03-20T13:00:16.367000 CVE-2024-2130,0,0,949f4490e30f20ac86b94271cd74ebfff8857dc5306a19f843591857ffe5e5d6,2024-03-13T12:33:51.697000 -CVE-2024-21302,0,0,df8f48a708f29d6a063dc79d8f57f836f5c70be4e601cd7ad60ce5ad39a85126,2024-08-12T13:38:14.373000 +CVE-2024-21302,0,1,df2a420e8c0218dcd4c25a41a2dbb4f9a063539d3d52b868ebf16bc597bcf4ce,2024-08-13T18:15:09.160000 CVE-2024-21303,0,0,d58ef53ce2250cc88ff41c4958354d161d0e089fca6702a30570cf750b5a8215,2024-07-09T18:18:38.713000 CVE-2024-21304,0,0,aee35375e056bcda8357796076fddae312bf87811aac2cea1256e28fc4176e51,2024-06-11T15:15:58.253000 CVE-2024-21305,0,0,53ae725a4db9001e5894d4654d0d4d95d10acc8936d902ba245a4100e59e1d3e,2024-06-11T15:15:58.433000 @@ -243786,7 +243786,7 @@ CVE-2024-21527,0,0,5f68d3fcedc529f8c61b21687ff27d1dfc424d6b1048d7df4e422495549fd CVE-2024-2153,0,0,d3abacc4f79f5ae0d18412563134adcd72e3650da9619fcc6b902801eca849d9,2024-05-17T02:38:04.867000 CVE-2024-2154,0,0,ab5f0b39bb38e5c25606bad964d563e0edda059ff34db22b99ca2b3670b021ff,2024-05-17T02:38:04.970000 CVE-2024-2155,0,0,499612150b3a1be829ef430bb3388eb54a55d7bb52271f37f2a76ceb8af6c56f,2024-05-17T02:38:05.063000 -CVE-2024-21550,0,1,0a53a3a179cb6ecaf9ed04811bdf34ec295d6a8521b7681bf2ba3945e955d773,2024-08-13T17:33:13.537000 +CVE-2024-21550,0,0,0a53a3a179cb6ecaf9ed04811bdf34ec295d6a8521b7681bf2ba3945e955d773,2024-08-13T17:33:13.537000 CVE-2024-21552,0,0,cca88d3958ef8dbde43c3d8aa2af78ed997fde7ae88029225af47b23b037e5fa,2024-07-24T12:55:13.223000 CVE-2024-2156,0,0,3e156cd1519b9856caf676cc7af155ea1ba3901c226a3a379024601d5610634d,2024-05-17T02:38:05.157000 CVE-2024-21583,0,0,5ec658f3354d2fc39ca1e98c3b56c4da1b7944a9e0da47df38fc57405ca1a8ed,2024-07-19T13:01:44.567000 @@ -243926,7 +243926,7 @@ CVE-2024-21752,0,0,1c3f8b9711eb134dc24ac607b805147df44f1f88998d9833be077b129a214 CVE-2024-21754,0,0,b97eddd3100f107222ee5e32da6dcd88fb7b0ee9149673b247db14c9970fccbe,2024-06-13T18:36:45.417000 CVE-2024-21755,0,0,9a466316a66e45e4d0307d7e1708925f9ce7b32c6c8fd1a33c7d4ec0ae073e31,2024-04-10T13:24:22.187000 CVE-2024-21756,0,0,bfc7206c5a35bb9a2182cf343b6e246cc54f15a3cfdddaffd353644c2951bedd,2024-04-10T13:24:22.187000 -CVE-2024-21757,1,1,73e22cc233adaa8ec24f9910db60f4b8874067ca6921052b63b1a78e649077db,2024-08-13T17:11:53.553000 +CVE-2024-21757,0,0,73e22cc233adaa8ec24f9910db60f4b8874067ca6921052b63b1a78e649077db,2024-08-13T17:11:53.553000 CVE-2024-21759,0,0,6a61d7cb7523f60aeda71efe4ce4dc64f1500a7a1399f02108eff6d901e5e1da,2024-07-09T18:18:38.713000 CVE-2024-2176,0,0,2ba78cf020993deed98ae980ebb92c5b68a22bb08492374d068beaa29a78e2e2,2024-08-08T21:35:08.447000 CVE-2024-21761,0,0,2f2a716518ed143d836c780b247de3ae3910c7d7d968185283e0e6563fd7349d,2024-03-21T21:04:27.653000 @@ -244058,7 +244058,7 @@ CVE-2024-21978,0,0,bd0ca29172ff67905ab419fb6e0b63fad45bf4b2c53567c94e0d7e696a373 CVE-2024-21979,0,0,69d970687ec7fc10c2117ffd8a662f03f2976fe858767ebadf9aede1ce3bc7bd,2024-04-24T13:39:42.883000 CVE-2024-2198,0,0,1df4cff98d86f3bfed69b5c9a5afedec636b00bc821bafe7fe3fd5ac8b6e5483,2024-04-10T13:23:38.787000 CVE-2024-21980,0,0,872c791ef8c7889b400c55ed7647b05e1f6e6b8b113a22baf77aea9eef603777,2024-08-06T16:30:24.547000 -CVE-2024-21981,1,1,86c50e1d261bc1d460e71bd5a76ed71eda3b5b08c5cf622c11457273ed5d2ced,2024-08-13T17:15:22.920000 +CVE-2024-21981,0,0,86c50e1d261bc1d460e71bd5a76ed71eda3b5b08c5cf622c11457273ed5d2ced,2024-08-13T17:15:22.920000 CVE-2024-21982,0,0,a1d7a0b52867843a898049d8dcbdf321d190ddcdceaa8b86d96038ebb2885957,2024-01-18T20:16:20.420000 CVE-2024-21983,0,0,f2de681a28bdb7d62262b30d8ab0c99245f80036b39bf9cc43012d973caf3ccc,2024-02-20T19:51:05.510000 CVE-2024-21984,0,0,a1fe9457ebbd7ea2c6a9e3374de3f0d5563111fa5006f8920140df4132946c26,2024-02-20T19:51:05.510000 @@ -244640,7 +244640,7 @@ CVE-2024-22860,0,0,12aba2ab78136c3dffb8c67820fb9fd6a9e7cb57e51a620aabd742c3169a2 CVE-2024-22861,0,0,9cacdc9fc366085753e721aa46b3b084ae3dbffe24ea859625cbe3f5da030d3a,2024-02-02T23:38:20.193000 CVE-2024-22862,0,0,eb3cec84a50ecbd1f2593085196ae51690efa2186bc87e979b990178921ee7ad,2024-02-02T23:38:28.047000 CVE-2024-2287,0,0,abec32dfba04ba085d8a43f6774c64686f7c2db20882b8221dd750e42da37702,2024-04-10T13:23:38.787000 -CVE-2024-22871,0,0,76f68ecc0830ba6b69890ba5eaa84d2c9a43785988307c293d14904758db18b1,2024-03-24T03:15:08.910000 +CVE-2024-22871,0,1,63ab5ea037d8258d975db22f8b209c07fd620fb9776c3d0a9a24c80139462ebe,2024-08-13T19:35:03.443000 CVE-2024-22873,0,0,3e804664cc070ce55555c4a054f46b8aa2f31d8d94dcc162e42607997d87baae,2024-08-05T21:35:03.423000 CVE-2024-22876,0,0,2b681eac932c151f8b6d70661e354dac90a6846621aa7fbcc62aabd644cf5d8a,2024-01-25T18:19:25.647000 CVE-2024-22877,0,0,240f9475c4adad9f666e1dfbbc8f3731afeed11d7d0ecb60814db8666105f3c3,2024-01-25T17:45:50.770000 @@ -245115,7 +245115,7 @@ CVE-2024-23594,0,0,ad4b1f64283c5e9378e2c0a3470f94bbd567f24feab77ccac81605c25d540 CVE-2024-23595,0,0,eb244ed27fdfe9d5f180eef50b9fcc5bd2c4254d4c7f82d08d700f503f0c3d15,2024-06-07T19:15:23.570000 CVE-2024-23597,0,0,1044f570b239ea97c7bd0709961e0bc23dacfc3e4d46ca11165f61566b85cd58,2024-07-03T01:47:57.317000 CVE-2024-2360,0,0,de893c18178fb566d8af38f41adf3944ceb42b91c7ca132485a1e68a6c60ca3c,2024-06-07T14:56:05.647000 -CVE-2024-23600,0,1,4281e37fbd035293e9c6fcd43e6c5234fa722991aa3b52e2f1f7087ee3894b4e,2024-08-13T17:15:23.107000 +CVE-2024-23600,0,0,4281e37fbd035293e9c6fcd43e6c5234fa722991aa3b52e2f1f7087ee3894b4e,2024-08-13T17:15:23.107000 CVE-2024-23601,0,0,f71facaf0a87c7e2133a8f4784a8b1538e15e419619de2fb2ecdd5dec5e4df11,2024-06-10T16:15:11.993000 CVE-2024-23603,0,0,4e2bedacaf86e6d28c6fcd5ebf1822683ea4289e242d61b0a3583e9e01c0baa2,2024-02-14T18:04:45.380000 CVE-2024-23604,0,0,1fde5ceef283ba89170a46d650b31cb17e7e5acee66d644c9c3f08b699be1de6,2024-03-18T12:38:25.490000 @@ -245416,7 +245416,7 @@ CVE-2024-2394,0,0,601af7bb68f57fdb63dc28b1a3be4e92facb0bb452d0b42ad5d6937b933c3d CVE-2024-23940,0,0,1c0bdede0fd3b02e7f9ad21f2aa27ec6ae45825d094730a07bddf507f926c4e8,2024-02-06T19:19:33.920000 CVE-2024-23941,0,0,9709bab66e0af4d3dc69e9a86a5316f0273a5a15f2aac5ab4098dcbc1f12f8f7,2024-02-06T21:37:12.433000 CVE-2024-23944,0,0,a4577755ac8434d8001d5ca099627598af1709502b9a95ee3ffe1e5567b9fd5a,2024-05-01T17:15:29.330000 -CVE-2024-23946,0,0,10dbf0380efb08df9986cb178e1f86e9b3659734dd22456e67bce312a8b1d4d1,2024-03-12T17:29:17.243000 +CVE-2024-23946,0,1,84148e01db02d3b2895434dc823c0ae9f7d68159bffc3661e20f6a50ad8f107a,2024-08-13T19:35:04.530000 CVE-2024-23947,0,0,1b43998aed29857dd1e4a92954078f6f47907ebb41136612d597b54ebf732265,2024-06-10T17:16:19.513000 CVE-2024-23948,0,0,857b34d23def74a8136935341de0e448f0c93f2f46757187ac91997dca4cdefd,2024-06-10T17:16:19.623000 CVE-2024-23949,0,0,d63be6e3e978c9edb6d1fe4bcad68dd0f79583cf7cbbc5ceac0568804423b163,2024-06-10T17:16:19.727000 @@ -245509,7 +245509,7 @@ CVE-2024-24142,0,0,3131029e44bd277236f33bb07ed6e092941fa67495101909aa3bfb0b512cc CVE-2024-24146,0,0,9c2cf9272dc1c4cc753aeade919e09d1e623750808db8a2821060c90e942ffb8,2024-03-12T14:56:47.377000 CVE-2024-24147,0,0,21e124537bb7dea8595cea1457108442a033dc56051a368279fd9b2ee19242e0,2024-03-12T14:57:28.893000 CVE-2024-24148,0,0,a02156e49f720741f5d47ffecf3d295f680f99f45fd5e722459fdf6b3749f4c4,2024-02-29T13:49:47.277000 -CVE-2024-24149,0,0,e43057309079b7f6c1980b4ba5ecb6f785fe19b76fb82c9a301cbf473da31579,2024-03-12T14:57:32.097000 +CVE-2024-24149,0,1,88ecb47947af05614cae359d076a027f161e62a67519dba09a75672f5d1ee0a5,2024-08-13T19:35:04.837000 CVE-2024-2415,0,0,c558bdc444f1b504fdb58826094fd6354f995348e8626b08c069328ff4e39fde,2024-03-13T12:33:51.697000 CVE-2024-24150,0,0,57d27c8e6078b73446ecc07e4ad11630c532b92e8ab5a1cac8386f4fab70f142,2024-03-12T14:59:55.920000 CVE-2024-24155,0,0,2c63d7924f0cfbcec05c8391f1806e0f50aabfd2ca7e4c7b5af6f390f137d171,2024-02-29T13:49:29.390000 @@ -246490,7 +246490,7 @@ CVE-2024-25811,0,0,19975e07ecf1fabf59b175c7c29029eca5183606ae6164f55f4361c17d565 CVE-2024-25817,0,0,594e7944f467d2705810e71e76846a873167e65fb8715f24384d52ab7508e60a,2024-08-08T21:35:05.550000 CVE-2024-25828,0,0,b9208d07acefc5f8bb86b1c0a1d3e2fb74dd5ed4c91b559369b12aa7bea3504d,2024-02-22T19:07:27.197000 CVE-2024-2583,0,0,bad6d25a4e56375c530c1d9887ed4d49edf53513d5bb806a8b8436b2ac73bef6,2024-08-01T13:49:48.777000 -CVE-2024-25830,0,0,bac0044490e1e709c15b4ae97f78c483fec5c64b2ded09434a42484853de56a5,2024-02-29T13:49:29.390000 +CVE-2024-25830,0,1,71ac0259693b1e35aa4a4da1b197118a1a7a2d7250e15b0af091ae1d4d2bab0f,2024-08-13T19:35:05.710000 CVE-2024-25831,0,0,865d67a5eaea9aeb6dc34380b2f9339c6f4454b68228f5e0e1f349028c509484,2024-02-29T13:49:29.390000 CVE-2024-25832,0,0,a4448e0b7fded4d69ae19d5a812394b0dfee60300a31f6c0311dd994464f2ea8,2024-02-29T13:49:29.390000 CVE-2024-25833,0,0,9eade8ddd8e62f218449388bdffade4502b4ad7ecc9d7d4bee08e23a205616da,2024-02-29T13:49:29.390000 @@ -247916,8 +247916,8 @@ CVE-2024-27439,0,0,812b79355c05b1839f0b5adf30fc93a3b50c4e89eeb5494b84c7e9f25e1fc CVE-2024-2744,0,0,188126b761d1adc13d3573db2ecaebf3ad9dc6b00f329483cd98111bb221e3a5,2024-05-17T18:36:05.263000 CVE-2024-27440,0,0,222fe401370c5e6b38f7e38b434f6e7cc6adedc4a2417abf87261721e80970d8,2024-08-05T14:35:06.543000 CVE-2024-27441,0,0,8627ee176bbd8db9047f0ac2824f85227251736cca8356f59d7164883e7165ed,2024-03-13T15:15:52.083000 -CVE-2024-27442,0,1,5a6714ee12b36974ef00849f64ae5912e43c5937f6c447ff74b51191f3d9ecdf,2024-08-13T17:30:36.833000 -CVE-2024-27443,0,1,d07eb5625a7fc8d257c581f995010c4187e224e35f2f73b58426a3d39d0d2a0a,2024-08-13T17:20:53.960000 +CVE-2024-27442,0,0,5a6714ee12b36974ef00849f64ae5912e43c5937f6c447ff74b51191f3d9ecdf,2024-08-13T17:30:36.833000 +CVE-2024-27443,0,0,d07eb5625a7fc8d257c581f995010c4187e224e35f2f73b58426a3d39d0d2a0a,2024-08-13T17:20:53.960000 CVE-2024-27444,0,0,54cb997d6d9cda9b1d04431678fffc2ca7174de8974a9b13ccc3a98ef52117ae,2024-08-06T16:35:07.500000 CVE-2024-27447,0,0,3b7773fd2d03c5e4f17776fc3b7436eb3cc739bfd15835b19977b12318864384,2024-08-05T16:35:07.727000 CVE-2024-27448,0,0,52a4a9605cdc89d83a0f8cb7ff15b885c4717436d90825e54d7ddf3aa92ec7fa,2024-04-29T20:15:08.397000 @@ -249118,7 +249118,7 @@ CVE-2024-2930,0,0,2e48243b295a8e93d53a35219b2be0089b750f595ca7624319aaf969e99aaa CVE-2024-29301,0,0,fd6e891fb9a2f358e58da35cd58c20873301588e91f1b0a5190d88e70e1e8b21,2024-08-05T15:35:14.157000 CVE-2024-29302,0,0,d9abe707740065eb1e46de0ca659947f36c93421f8110011a7bf9bee8bf0d294,2024-08-02T19:35:34.507000 CVE-2024-29303,0,0,37679fb63bf9f38f4f9cc53651a73974a7164616369c7f1ab3afdb3ecf05cb90,2024-08-07T21:35:03.913000 -CVE-2024-29309,0,0,28b5b5646481cfe1402654926803b4a4fc5b7bab8968c4e1e82ac6be96825dfd,2024-05-02T18:00:37.360000 +CVE-2024-29309,0,1,5f16c8c5101bbe6a7fe340fed41cfd483ccf194ab5d9cef153ac339623cd5967,2024-08-13T18:35:02.870000 CVE-2024-2931,0,0,8681da4e6a98287d6793458554ab4ea24f94bf4e8afb9a8ac5d31dc0735ec9f9,2024-04-02T12:50:42.233000 CVE-2024-29316,0,0,bf79b73f40391754999830b90ca9fb7610ead48f76025066f6bbfd69a2114a92,2024-03-29T12:45:02.937000 CVE-2024-29318,0,0,3bd80ca4ed2a21d168ac76c12fc53877e0cf37b2c12f34546ddefc9f9e0a12f8,2024-07-08T16:39:39.810000 @@ -249507,6 +249507,7 @@ CVE-2024-29991,0,0,3f391e4ad2a598a748f34638b5e63fe8f9ddef624ddfc49c672dc425084a7 CVE-2024-29992,0,0,f3c94b95f1cee53ae575be5eaa52aa1d2f003be9fb8a4e190bc647545579f5b8,2024-04-10T13:24:00.070000 CVE-2024-29993,0,0,8b5ad55d14d69c6ae8a49e17c680423f8cc36d5ed0434da709cdec8f0bd4c554,2024-04-10T13:24:00.070000 CVE-2024-29994,0,0,f6119b598edfa94958d8aa078ef57bf6192acb924f5585f1f39377658fed2f75,2024-05-14T19:17:55.627000 +CVE-2024-29995,1,1,b5eff6b845d77af42d616db10079d2ccd830c0ac81e292e1618d443591e763a7,2024-08-13T18:15:09.440000 CVE-2024-29996,0,0,95e5daef965cdb4c45b4607fc068f9a5f01e66927519c0dd4a314aca578704ad,2024-05-14T19:17:55.627000 CVE-2024-29997,0,0,03d80d1c1a83280fa5c39c48a1d25c887c2287bdbf7d52e00b483e69f4b647ff,2024-05-23T15:50:29.970000 CVE-2024-29998,0,0,40b26208460f774ba73580ee354e01d1f6ac70e82e8a72152c9f89b13d0fea6e,2024-05-23T15:50:22.200000 @@ -250061,7 +250062,7 @@ CVE-2024-30585,0,0,96551bc458d5db42f46061bae1e9919916a14761a04e80e4824fb8b8309c1 CVE-2024-30586,0,0,8e755ffe70a3dbe961f7eb3bf161914532e2e9da13607d64f0ca9f6645075818,2024-03-28T16:07:30.893000 CVE-2024-30587,0,0,26212ffc265137b5577f89aa78a083bc0658db67b4db407e10f98531cc831f9b,2024-03-28T16:07:30.893000 CVE-2024-30588,0,0,08e16a935f9fee8841f929d18032525bac7add60ccde5932cbd5663b4480d43c,2024-08-01T15:35:10.357000 -CVE-2024-30589,0,1,c6b1c9cba15556f8da9ae1af68138bacf841ae1da95dafd281283439cde5b9ae,2024-08-13T16:35:00.980000 +CVE-2024-30589,0,0,c6b1c9cba15556f8da9ae1af68138bacf841ae1da95dafd281283439cde5b9ae,2024-08-13T16:35:00.980000 CVE-2024-3059,0,0,efb84c5280bb6d93917140ecb34e4d9d916e8aaa9c3b2370c96c352f4a530300,2024-07-03T02:05:57.660000 CVE-2024-30590,0,0,74e13fafb4ea3fa2c3367d4c745d913b8700a9f648c307a3b7eeb10d783ad4d0,2024-08-01T13:50:13.810000 CVE-2024-30591,0,0,e75a0dcfcb07a21c8d312cadcff98d8748de148e045209e07a96a4401e42a2fd,2024-03-28T16:07:30.893000 @@ -251961,9 +251962,9 @@ CVE-2024-33529,0,0,91064aa32d9fedf772ab62f032798d695b5cf92350be4cf38e5a4910e6c66 CVE-2024-3353,0,0,ce0bc328455f80cf14b93a65517c4acf833c7c445bb8d7418f958bb30757f2de,2024-08-01T13:56:31.790000 CVE-2024-33530,0,0,06dbd90020910883fd649aabf3091f4012b6024bee39b35744993f4679188732,2024-07-03T01:58:25.043000 CVE-2024-33531,0,0,b4f686a17b522487db106a979e75b685d2e11fa9abe95f79b3890bf766d3a008,2024-07-03T01:58:25.220000 -CVE-2024-33533,0,1,5d1f52e69d396f7a38daeb9931041c7af1bef08095580b3fed16e80e682ef47d,2024-08-13T17:20:47.593000 -CVE-2024-33535,0,1,2b9e9579f97fafee4f825cc765b942380088dfc8c6f84af917874e257f50657e,2024-08-13T17:20:39.890000 -CVE-2024-33536,0,1,130b24d050062af1fcffd63f7639bda7a8be3fd814621404ac559059ba53a5a5,2024-08-13T17:20:23.953000 +CVE-2024-33533,0,0,5d1f52e69d396f7a38daeb9931041c7af1bef08095580b3fed16e80e682ef47d,2024-08-13T17:20:47.593000 +CVE-2024-33535,0,0,2b9e9579f97fafee4f825cc765b942380088dfc8c6f84af917874e257f50657e,2024-08-13T17:20:39.890000 +CVE-2024-33536,0,0,130b24d050062af1fcffd63f7639bda7a8be3fd814621404ac559059ba53a5a5,2024-08-13T17:20:23.953000 CVE-2024-33537,0,0,998984db2770bafec92fa3ab30e5515c9a54bccbc523df8841567287c8cc6075,2024-04-29T12:42:03.667000 CVE-2024-33538,0,0,7865342cfad47c1b67d79be3df1ae1a1271e2b6d05a75c826f6a59608d5dacd9,2024-04-29T12:42:03.667000 CVE-2024-33539,0,0,2b37529553672d6e78be5b88182cc46dabda1debb810d75a4177cadc04beb2c6,2024-04-29T12:42:03.667000 @@ -253987,7 +253988,7 @@ CVE-2024-36434,0,0,8fba84c9c20ed6e9e38e371f6a7314cc80d9ab38ed1fc3ffdc1e7c8b52186 CVE-2024-36435,0,0,42aa941ee425d333c537ed403b5f168d15cf55caec805a299bb4c45521e1c947,2024-08-01T13:52:50.527000 CVE-2024-36438,0,0,fcbe2e02dbfe7753ae10ee196c2c3d66e08c15fdea4edc31b3da8e63f435a898,2024-08-01T13:52:51.240000 CVE-2024-3644,0,0,e904dffa636a621d1f1644a68a8bb26342dbf717ae684f12b60a37d102e4d87d,2024-05-16T13:03:05.353000 -CVE-2024-36446,1,1,a30bb8f6a94e71aad8ba09b5436d5e90e795f5566ff63ce975e6e5a6c85ffa2a,2024-08-13T17:15:23.403000 +CVE-2024-36446,0,0,a30bb8f6a94e71aad8ba09b5436d5e90e795f5566ff63ce975e6e5a6c85ffa2a,2024-08-13T17:15:23.403000 CVE-2024-36448,0,0,1175cc623301466e8a019bc6e0833d0f29d9f1c79b10495f6dc5ff5c39383d2f,2024-08-05T17:15:41.557000 CVE-2024-3645,0,0,ea45063aa3cff8d7bb517959f0685ad339f1e48c249e10e3851af9fbba289420,2024-04-22T19:24:12.920000 CVE-2024-36450,0,0,700527b7e7e1ebac8a4794e042f6b829b1a1f942eb0939907744fde9a0923a2e,2024-07-31T14:47:05.423000 @@ -254030,7 +254031,7 @@ CVE-2024-36500,0,0,32af1afd4bbbe42fa4488d4c1e5cc6ce476ad041bd1fdba49949cbef0ad81 CVE-2024-36501,0,0,e9cab9d7dda9a217e690001b6c798a6fbb4e54d85ebb6ee3110f4200709cc1e8,2024-07-16T16:25:49.413000 CVE-2024-36502,0,0,ce6106b712ac934aa3d46433d1d90bd69a47142ad6fe94c097ce1ae7a55cb590,2024-07-16T15:19:59.157000 CVE-2024-36503,0,0,cf0c7df8eb5d0563a3adb9382b90b37caa70a1002731797c28a41bd8794b11f6,2024-07-16T15:19:45.557000 -CVE-2024-36505,1,1,bdf6558e2fdbaf58e29d784a61b095e92dfc5a9a50592271c50ac7c080d7217a,2024-08-13T17:11:53.553000 +CVE-2024-36505,0,0,bdf6558e2fdbaf58e29d784a61b095e92dfc5a9a50592271c50ac7c080d7217a,2024-08-13T17:11:53.553000 CVE-2024-3651,0,0,3337eb59719c2f9e59e57f7ed588f3375e47160773d149a8aeb60c1398d8674e,2024-07-11T14:58:01.803000 CVE-2024-36518,0,0,9e255d90cbaa951a4f56e02878fc00109d62b1bfb91ac63b84ac72351707e336,2024-08-12T13:41:36.517000 CVE-2024-3652,0,0,df71e97982cfb8bbdea2c8b53979ee8792aae4a73aef6703ec1b621d3f12e772,2024-05-01T17:15:37.793000 @@ -254311,7 +254312,7 @@ CVE-2024-37006,0,0,ce197589ee3e9b9abc62e5ee278117c11ae961db1cdfe5fd87c2da96a0f55 CVE-2024-37007,0,0,0fc601714096f5d925a9dbadf52718e2d07645aad03229b4044d058f28f4c32f,2024-07-03T02:04:01.303000 CVE-2024-3701,0,0,9482cb82bbb13bb95a868bc6f96d983af9346a976a51739385a5b2bb2124b309,2024-08-01T13:56:39.127000 CVE-2024-37014,0,0,4d8eebb55f92fd637819ddb88e1adc8dcc510ce2876a7f33ecffd1498dc89404,2024-07-03T02:04:01.523000 -CVE-2024-37015,1,1,00727eb1cb083527db0a89e2f81d77a24f10657a9b41605369011e7929e5ce1e,2024-08-13T17:15:23.553000 +CVE-2024-37015,0,1,e932db1ef20a3048a12ca591d7af9e0ae64288f7281c16b7e0a2a3fb372b984b,2024-08-13T19:35:06.800000 CVE-2024-37016,0,0,071a19c5647d911f2366d429fe972b4b01f1c39b8cafdce75a7928d7f84ec6d5,2024-08-01T13:53:20.103000 CVE-2024-37017,0,0,bcf42a4afa4161d494ebe5be7e7f4777ee139dad62148a87a3f3aec02cb4dc1b,2024-07-03T02:04:02.337000 CVE-2024-37018,0,0,5c84c294f6633e4746e32fd18cb412c8579660145e88eac3a32eeb7275210f3b,2024-08-05T16:35:12.763000 @@ -254497,7 +254498,7 @@ CVE-2024-37265,0,0,15f68b41e4db6ae6ccda7f80b0a70abe19004015dbcf0d1246d37335388c5 CVE-2024-37266,0,0,f306a5e2ad401442cb409c7d61e85e756a658f2ffb85a90cbbbbc5543a190165,2024-07-09T18:19:14.047000 CVE-2024-37267,0,0,0d692f1d5fdd2443078b17f2b54167a732ba33e5479382e14b7e2bd4b6ec49a8,2024-07-25T13:47:43.833000 CVE-2024-37268,0,0,3ed75f71eb245fffa2f72817fa04519725ace840b74091a925a997ed8515bf4c,2024-07-09T18:19:14.047000 -CVE-2024-3727,0,1,db60e8166385f10211c2718c5bee0a37482c488d5e297dbcf62d143b9a845b73,2024-08-13T17:15:23.653000 +CVE-2024-3727,0,0,db60e8166385f10211c2718c5bee0a37482c488d5e297dbcf62d143b9a845b73,2024-08-13T17:15:23.653000 CVE-2024-37270,0,0,09adf8729d6feae3191994dc6f2b286449a8e4d910f8c343a3a9496ea050a29f,2024-07-11T13:05:54.930000 CVE-2024-37271,0,0,82adde283ff9dacc0f77be200c055ea2f2c58a80387c070880c7d1f2c1068d32,2024-07-25T13:46:39.273000 CVE-2024-37273,0,0,701ddd83e97e8ea6c808ca5d8f57033bb1466851ddfe669965d2b1947df1df2f,2024-06-11T14:12:23.210000 @@ -254907,6 +254908,7 @@ CVE-2024-37959,0,0,0a89e2045c7690120907a9b888ad211603cf619468902002241d7d50995a3 CVE-2024-3796,0,0,5bae4d416035885a0192c05970d5fd8edbaa05fe9b0acf97b8394b245a69cda0,2024-05-14T16:11:39.510000 CVE-2024-37960,0,0,3c6318ec1ea467a732d82947144c24731a59c656734309e75b89e5a2855fffd7,2024-07-22T13:00:53.287000 CVE-2024-37961,0,0,cc46a1213102885d827a0f2fc6c34682a46dc2095e70964ed0ff7df9b7479be9,2024-07-22T13:00:53.287000 +CVE-2024-37968,1,1,f33e1cca3387052341d6ff8cb2d392f44fa17585dd93a4ff6817fabca9e41232,2024-08-13T18:15:09.757000 CVE-2024-37969,0,0,9cda862f222f06c0ea4271cea0b4c27a650f00d5454026fb1e3657b35f8e92c3,2024-07-16T16:33:58.220000 CVE-2024-3797,0,0,151890f4e5d8e0d5473cf065c3613433333b9f328648ba8da91d4cb5eb80d846,2024-05-17T02:40:08.123000 CVE-2024-37970,0,0,f961697c7788754c6ab5d8c03485408f8bcc3bb1a7cce532aa01297f6de9ca2b,2024-07-16T16:34:31.423000 @@ -254973,6 +254975,7 @@ CVE-2024-3806,0,0,af8f4431a2c3374448aa2516e3544c757252464d4904a16caed46536ce90ef CVE-2024-38060,0,0,63c1c3f7b3555f8e8f2537c6ac81850aa546b86acab9677614886ea02cdd80c7,2024-07-11T17:09:20.017000 CVE-2024-38061,0,0,7b316201a092038cbe917d17f13bee010de1a73994041a34c798b3d7237ec87f,2024-07-11T17:08:40.157000 CVE-2024-38062,0,0,40fa3d5b9eed5c32991d4e6161d754e71be83a27294e7931a189d018073d0ac0,2024-07-11T17:08:22.053000 +CVE-2024-38063,1,1,97fd0dfdf7f5a07b7a9201b67b0ac0cfd24d15a64d26e864deb2e1e3faf71570,2024-08-13T18:15:10.007000 CVE-2024-38064,0,0,66a71bdea3896d59dd1c588b95f79879560414734406c558a726067d97909eeb,2024-07-11T17:07:36.783000 CVE-2024-38065,0,0,a6658c3d060612b2e03972415d16699a099ac39758805a3ac6fdc31eaf3c8d1c,2024-07-11T17:06:56.247000 CVE-2024-38066,0,0,0616ff48d36a94dc37983508e6217c9a8d1d633830884df503ea9631fdac1a9b,2024-07-11T16:59:19.463000 @@ -254994,6 +254997,7 @@ CVE-2024-38080,0,0,0b30162da9e985ccc862a1722fa27f1aee2c43036f0821b6ab829416dc832 CVE-2024-38081,0,0,9ec7a791a53b6047ba6a281b8f0ff49e361c538c20891eaddfbbb18457d24c69,2024-07-09T18:18:38.713000 CVE-2024-38082,0,0,23c6f123e64a1a12cf5b02d5d58cddce4aac695b84d4f46ea5b094849b0d14e3,2024-08-07T16:21:22.157000 CVE-2024-38083,0,0,3c2469ed2c873a64c64841f8f046f5b40612bd2c08b8213d90aa91d1b11e6c5b,2024-08-07T16:39:28.940000 +CVE-2024-38084,1,1,2a1fee4f5fc69fd52985452f92259c50fb6d4db4baac83343a9b74c17ae357c5,2024-08-13T18:15:10.263000 CVE-2024-38085,0,0,9b225805c27fe0d0f49cd4b33e0b85b6db3f312de1c827973638cc83fbf3b27e,2024-07-12T15:46:00.290000 CVE-2024-38086,0,0,4f4a5b4f26b1b47848469ccfcb494665e77622145d878e8bcca629184e833a43,2024-07-12T15:45:05.137000 CVE-2024-38087,0,0,e9389c577c197af0a86410125a64446456d804142f17e0af9a55d82f41522df2,2024-08-08T18:45:56.203000 @@ -255005,6 +255009,7 @@ CVE-2024-38092,0,0,fa52aaacdeeea4f553a80268533abc67279c4becb10c86c23506d5aee3ea5 CVE-2024-38093,0,0,075dd9daa56a96b357ca4934063a6c16d1ea30c840caecea5eb303d11b987d24,2024-08-07T16:28:38.140000 CVE-2024-38094,0,0,acf9b14cc18bf684a3807e3f8aab28f09790dad10479460ab41f157199bfc8c8,2024-07-11T18:27:53.843000 CVE-2024-38095,0,0,b0c4146c3c5698cffee7ab10e0a7873691f618c4c7b8c0ade94c4f51d88f93cd,2024-07-11T18:27:00.083000 +CVE-2024-38098,1,1,d8bc653bd8ebfddc9416e93f3874534a04f4a32f17870a16b8134369fb852542,2024-08-13T18:15:10.480000 CVE-2024-38099,0,0,7782db89a967b149d71a424fdb71c049e171d01d737658a72251691ef31a5e3e,2024-07-11T18:24:27.333000 CVE-2024-3810,0,0,4b9c7ead6ab7332e33f083e2f6cd125d9bb6a7d7cb025550c9e1df7b29084607,2024-05-20T13:00:34.807000 CVE-2024-38100,0,0,362baa65b60907783f71ef535888ecc651c6a6f88d46ab2740373fbba12147fc,2024-07-11T18:23:21.183000 @@ -255013,29 +255018,105 @@ CVE-2024-38102,0,0,b8f3bed70811e842b10b0e44e049aa13327d439097a470d245182f818341d CVE-2024-38103,0,0,8d61fae077d92ec76899abed46ea2dbe921ece390d18d12a488e0d3b07b3a5ce,2024-07-30T15:35:25.923000 CVE-2024-38104,0,0,934543cd72c92227418f82cc6731b22a50ac357f374ae5c93a97a0b40688cfaa,2024-07-11T18:32:06.187000 CVE-2024-38105,0,0,5ee7b6bcc3f23b6c027ef1e20204ab9e08d3961eefc81a59082038a3ba1cd79b,2024-07-11T18:31:05.480000 +CVE-2024-38106,1,1,c42933988379a262c4f3e4e0f9d7f1f98a3c2788fff18332adf00970abb7f002,2024-08-13T18:15:10.713000 +CVE-2024-38107,1,1,21e19d6a777dcf81eb65771b44362ce74b5d4d71dda139302f253d122e2a163e,2024-08-13T18:15:10.963000 +CVE-2024-38108,1,1,974aac74146d94e9db2790bb89f3e3bedbaa461fa3a103e4d1a0de1301ea465a,2024-08-13T18:15:11.240000 +CVE-2024-38109,1,1,820a08640155af28ed58201beb336eed99069d8b47f682e05cbe3ca48b296954,2024-08-13T19:15:15.720000 CVE-2024-3811,0,0,7753fbebaa8d958ade5ff525a0ab8fa28bb6d42c662f58346b2bf00c9a2b2418,2024-05-20T13:00:34.807000 CVE-2024-38112,0,0,f5d04dd24034822a51d80d554640736bed9f2c0a96bc6eed6acb547c42c42e9c,2024-07-13T00:15:04.950000 +CVE-2024-38114,1,1,fc6be8aeb72973d04cf821194812f0ad717b4ad459dd87bf0c25e9c6708f5fbf,2024-08-13T18:15:11.820000 +CVE-2024-38115,1,1,f0348506a5e3a50ef7463f72bd559fbe317f615729d289398ce4b2b1c83a5458,2024-08-13T18:15:12.080000 +CVE-2024-38116,1,1,5a30ae520193f3c7a5044e85509a88ecd5c9b6292e237731f82694d5fdb364a3,2024-08-13T18:15:12.333000 +CVE-2024-38117,1,1,868bf9a7944be196aafb038cb1a3707d70fe3b2fde753c85ccc2b08a0b2ed6da,2024-08-13T18:15:12.570000 +CVE-2024-38118,1,1,a08db7b6cf7bc59744b3b0cf53a97343b20477982bec78662df5edd7d38ac39f,2024-08-13T18:15:12.817000 CVE-2024-3812,0,0,aee0c212c8bdd18b48eb1b3684691508393eebae6c9908dea995a90b32a5da45,2024-05-20T13:00:34.807000 +CVE-2024-38120,1,1,274339a272a3917d588ac3ea63c93ad0e5babafd8fce18b2afc4fc077e4ec1a9,2024-08-13T18:15:13.047000 +CVE-2024-38121,1,1,7efa9d58104eabfc4da0650dc698f8d1288c6a92b58b6eaa9704dc787b9436fe,2024-08-13T18:15:13.320000 +CVE-2024-38122,1,1,4c165837fbd6f823e8208c262b1605faf144f0a4c6d75f21fc4969bb0caa359a,2024-08-13T18:15:13.613000 +CVE-2024-38123,1,1,00140d51bf72cc1250116c64fadea033c81a0fdbb74f586a424e2dd6cc96fe32,2024-08-13T18:15:13.860000 +CVE-2024-38125,1,1,671c3b7dce99b966532560a4e2eae0a7574aae2439573e864d468e0a6ca74a46,2024-08-13T18:15:14.080000 +CVE-2024-38126,1,1,3aeb26d7a5e5e9046e0b6dae6f00cf22f0804a3e25c26ce5c64713c016151cab,2024-08-13T18:15:14.353000 +CVE-2024-38127,1,1,a8ea0b77de2a42c6b5e61a50d839d3036fb36dbaaa9552206831137e1f19a928,2024-08-13T18:15:14.597000 +CVE-2024-38128,1,1,9c95b6bd793300c49f0d9c0f30d52185808ad340c2da9de39a94d2b0bd36373b,2024-08-13T18:15:14.877000 CVE-2024-3813,0,0,d80bc8b1e8c714a4f8827190dc103e9bc726aeafa665606cb93627ea2cb076a3,2024-08-07T15:45:23.793000 +CVE-2024-38130,1,1,3fe9077f62320c8e8fb936c3973810b6f45e9f6816f12905bcdb94ada2184361,2024-08-13T18:15:15.580000 +CVE-2024-38131,1,1,52b0c9320ae8ed7a25e45a02633dade0ecbe6b7d6877ed0694cc7edaf837c6ca,2024-08-13T18:15:15.833000 +CVE-2024-38132,1,1,482c6fc841e4ebb6216d2b3424cb998e9270c62fa89ed915788f9715271cf267,2024-08-13T18:15:16.067000 +CVE-2024-38133,1,1,2cfdeee5302ce28c378598334b56e35a535b0a37dd43fdc8821aa063f867f782,2024-08-13T18:15:16.307000 +CVE-2024-38134,1,1,9bf4ee1223472ce6fcd97fce478b77c10367ce964c0dc8204d7651022a5e68f2,2024-08-13T18:15:16.537000 +CVE-2024-38135,1,1,c29b2ae4005508d75bd2223b63c89d6625b139b4d6c5e0b0deea9fe9e52f5f45,2024-08-13T18:15:16.777000 +CVE-2024-38136,1,1,94db119ff5a8ede1d37d6bd3c280497b47493814e1e2455ddd18b50b2e36def8,2024-08-13T18:15:16.993000 +CVE-2024-38137,1,1,c6a25ebe26bd5ef1e2b681a534512283a2a4df536d729bb0e7fdcd4e18c91ce7,2024-08-13T18:15:17.230000 +CVE-2024-38138,1,1,effc7fc4dc309e5bc6d07841047297256be7159bdaca666af8d67a019c692207,2024-08-13T18:15:17.450000 CVE-2024-3814,0,0,4b11a7d4126e6e627365a6c09d49c5b79c42112fff3bef28a2dbbe621feb8e3e,2024-07-26T13:36:51.523000 +CVE-2024-38140,1,1,b6efa11f4b64b8001f555cb33f1ac17025c634b005c35bec56bfca5e6bcbe0fc,2024-08-13T18:15:17.687000 +CVE-2024-38141,1,1,8c4e1ee8df6e401101c86316f2ae2e65034fbb26c6a890ef49c72d8c87cf0a4b,2024-08-13T18:15:17.953000 +CVE-2024-38142,1,1,88889f8046bab72c3bcc0ce2b6b251702065849e9070add9b245cedab8388712,2024-08-13T18:15:18.200000 +CVE-2024-38143,1,1,87442915c208cf8469fe838dffc871560146d25ab93ab87705b171bd26ffdc30,2024-08-13T18:15:18.437000 +CVE-2024-38144,1,1,a96f7fda48c20e9f2f7005fa33abb3c963966df85c385946e9acf0f4880f87f9,2024-08-13T18:15:18.673000 +CVE-2024-38145,1,1,0e4354391c7550c0a0c699210ddc10bd5d4bf567e43df5e99492be1827cf2336,2024-08-13T18:15:18.913000 +CVE-2024-38146,1,1,3a3ddc51d9a63a4d948044a2370e53d111f4d0578b1c5564be08e4718b93d49e,2024-08-13T18:15:19.153000 +CVE-2024-38147,1,1,de871dc8e21a45a922853b7391afb60639acff2159865e3e4a7133df562eab49,2024-08-13T18:15:19.407000 +CVE-2024-38148,1,1,c6dd8046e1854538d6e2351259cfeb1cdab953da74ef800c5a1c780a14bebf0e,2024-08-13T18:15:19.653000 CVE-2024-3815,0,0,55e2d42c0e61accee69ffa342efcde0fddef3a4ea430c0440620925be3cd147a,2024-07-26T13:36:59.737000 +CVE-2024-38150,1,1,66df292e85a61cb89e2198cccc996ce43c8a57976bf989ac232f47996b3ae092,2024-08-13T18:15:19.887000 +CVE-2024-38151,1,1,0b2df5a201001d7fe26180767490b1994cdf79d1a268ba7c1923377cd66f2aa6,2024-08-13T18:15:20.123000 +CVE-2024-38152,1,1,e5e030c4513fabdd463379ea830322f4a69b8f303409f03d423bc5a16cd243ac,2024-08-13T18:15:20.380000 +CVE-2024-38153,1,1,e0da6e4fdeba2898c69bb8f9d0ba364ecc64b938e1a9ab98f547b778e8eafe01,2024-08-13T18:15:20.763000 +CVE-2024-38154,1,1,0ea3132dc8f3de3a16a24b8f1d4bf4aa08f3e9b5bb3b69d202c8ed4a75fc352d,2024-08-13T18:15:21.273000 +CVE-2024-38155,1,1,b76756467bdf1df78e3c3808095b9c8a4eb7a9dfcc69394c78eeb0d73ed227cd,2024-08-13T18:15:21.753000 CVE-2024-38156,0,0,b24436c85d01ced9aa10bffdcc3048064061e2106e9f06caaac14532dc6e9f6d,2024-07-19T13:01:44.567000 +CVE-2024-38157,1,1,4fb201d1f7e28ee3eb0034ca2dd4e47dc4daac7bca46621dabfb6da8b1a16a1f,2024-08-13T18:15:22.440000 +CVE-2024-38158,1,1,62355903d9b12da442f492c3afc3ba98559bc24e063b0486ef5260b3872b6a32,2024-08-13T18:15:22.727000 +CVE-2024-38159,1,1,323aac41340de7ad57725c8e306f5ddba8c8d991f2b5ad13eb02e135e4b4c800,2024-08-13T18:15:22.950000 CVE-2024-3816,0,0,75ffa648a8fdfd5e75d27a5c1f7d2535fe4ef8b6da1bbd82db22ae48c443785a,2024-08-01T13:56:42.403000 +CVE-2024-38160,1,1,0901b1829b388b875c6937cbe5b4a96f0751712e2a8db319315b6e7078a42879,2024-08-13T18:15:23.207000 +CVE-2024-38161,1,1,a411ece2a51258b08f957b2b8ced858a3f01e2a31531bca517682fbf23db95dc,2024-08-13T18:15:23.437000 +CVE-2024-38162,1,1,45aa50d93cf9fd854bd60aac88f80f89dfc2d9a8d8cee7f1c5db520c1a0a85ae,2024-08-13T18:15:23.687000 CVE-2024-38164,0,0,61f090a580db18da87c17a5aaaecf0d4c74a1627bb07a737232d22421913c30c,2024-08-02T04:17:24.557000 -CVE-2024-38166,0,0,099aea1f543e31656ca09d028c9d06e4b944c3318b02ee1a9c912ddd989e4320,2024-08-12T18:33:00.903000 +CVE-2024-38165,1,1,692a4023381217757d24dda3766179bf93044d5f438504fd16cf4feda7fc25b3,2024-08-13T18:15:23.913000 +CVE-2024-38166,0,1,2d6d71ccad67fc46e9a393ab1d92bc2e1a3bfe7a17513862775546d729c297b8,2024-08-13T18:15:24.157000 +CVE-2024-38167,1,1,e887d79b2dee38f802fd34b2ff2cb40a7c96c4ef273383a676ec0b52c90ade98,2024-08-13T18:15:24.370000 +CVE-2024-38168,1,1,8335f41b1f983f2bf8a7d243fec783f3911da173d857dc58f27128a1a1d1b21e,2024-08-13T18:15:24.627000 +CVE-2024-38169,1,1,8a77823c9a0c0c3c7a76acfae0ecb0ae63d0d8912459af8c292007d4a0a344f2,2024-08-13T18:15:24.857000 CVE-2024-3817,0,0,4cefb34eb15d4ef81a2470a00ac0f43601ef6263c0fd4425e7542c27d02dfa54,2024-04-18T13:04:28.900000 +CVE-2024-38170,1,1,3923523c651d0ba51c8f6cb69410d4a004fce42ead9895c105a7d9da9413d281,2024-08-13T18:15:25.070000 +CVE-2024-38171,1,1,c9666bedadbfb085a60d1c86a737b19631101c3058ee0cff0fe853bc455eace8,2024-08-13T18:15:25.300000 +CVE-2024-38172,1,1,19a7fa728427b7e6096c5f20dfbda65dba033a6f150b22ca13b10cd673dec332,2024-08-13T18:15:25.530000 +CVE-2024-38173,1,1,542ec2edb915e69730d7696b530b8e946c5e175797f4031a84fd9751ab4554d5,2024-08-13T18:15:25.750000 CVE-2024-38176,0,0,9b2b21b2ffaaf0c79ea2462db71750a351bbe8e9b4ac053f46219745b5043ccf,2024-08-02T04:17:24.717000 +CVE-2024-38177,1,1,ab166044ca5bb6ef3f28b94fa21dac4d4898daea29081351d8f8a7533691498e,2024-08-13T18:15:25.987000 +CVE-2024-38178,1,1,e2c0b6b1f490d536d583aa0496228458f790aaa1d9d823a460929d33d5065398,2024-08-13T18:15:26.220000 CVE-2024-3818,0,0,b4c982a18364880791124fa7ba25840b7eb37a53aa1551fa23324d948b6ddd3f,2024-04-19T13:10:25.637000 +CVE-2024-38180,1,1,bf91c82bf87b502b33f82c9bbb60d5c3c58b9150a0ae28b950dfbea59306a62e,2024-08-13T18:15:26.463000 CVE-2024-38182,0,0,b4d26c4f4cbe1c2272cffdb42dee316497d9ebef820b6332d9e510a850c3591f,2024-08-02T04:17:24.853000 +CVE-2024-38184,1,1,8c61228bd2332e9ed0914be65545f2e305f16ad1550e91e212481d787357a318,2024-08-13T18:15:26.733000 +CVE-2024-38185,1,1,09a28ca203e59822fecf1305b4efe6b57cf8736d3ef0f86795a1aa43f7a6ae52,2024-08-13T18:15:26.970000 +CVE-2024-38186,1,1,4c242cea12afc97857ea55567a874a4dcad25c7b9035314137599bc7316d9d1c,2024-08-13T18:15:27.217000 +CVE-2024-38187,1,1,8fb7e3a19ee970cc433235fcfb2b122d99777ece83926c417adb709bd9eca8f0,2024-08-13T18:15:27.447000 +CVE-2024-38189,1,1,c94e4b60dedef9e3ef30a892f8f7cc07fee7a7a52f244c9b1ed5b8424344698d,2024-08-13T18:15:27.733000 CVE-2024-3819,0,0,c25bdc543ba06fd05ac51b0b8912467c3fc6d8848be54d697bfdb5995b1a7e51,2024-05-02T18:00:37.360000 +CVE-2024-38191,1,1,f2d87a18b010ccc2c97bb17a5f5c6c8e3752ea45d9e5f00a6570ae2632f904f1,2024-08-13T18:15:27.977000 +CVE-2024-38193,1,1,fff342f0f0709d166fca49c0c01e67e53969bba9f5e5bee214b425feb38975ea,2024-08-13T18:15:28.230000 +CVE-2024-38195,1,1,989f9516911353ed226df8303a33d4a04a6c842836adb9bbf7dcf34ef33a4876,2024-08-13T18:15:28.470000 +CVE-2024-38196,1,1,6d32d5f27d4d27c2d5465aed64b34ee2c48f8eae17ec5920470094e1a799af4a,2024-08-13T18:15:28.710000 +CVE-2024-38197,1,1,3f3689f8b05e705a97921507891f469637ad32f7e7c9703ec6e1cb98fc676d2e,2024-08-13T18:15:28.957000 +CVE-2024-38198,1,1,ffe738707b8c700a4661f451390c14a43fabcca2bf0e423e6b25cef2bd0242e8,2024-08-13T18:15:29.193000 +CVE-2024-38199,1,1,bef12ce44f1d283ec21140bac1ccb5f76432958c9f07cec097574531eb1ccc52,2024-08-13T18:15:29.443000 CVE-2024-3820,0,0,8985e7d1e7aecc5fe081b43705d723ec0ca067093ca4a65f30dd280cab84082f,2024-06-03T14:46:24.250000 -CVE-2024-38200,0,0,9c8cc66a1f50b75708742d46d8c50dc698049462a03889a12013758dd3bcaa00,2024-08-13T13:43:16.403000 -CVE-2024-38202,0,0,5f1ef47a3badff97031fb210a5df27c56cf4132700b07b21ac067d757e50d1a2,2024-08-08T13:04:18.753000 -CVE-2024-38206,0,0,cb12af303c16bd7b14ab90d82849698a892f6215e2a01ea7e92b5cbb9057d49d,2024-08-12T18:33:38.273000 +CVE-2024-38200,0,1,d566a27ccd0b19f8229e9b6ce0a19c6b80662cfcd111693b799cdefa30455084,2024-08-13T18:15:29.720000 +CVE-2024-38201,1,1,dfea92a06d88e2cd469bfcb27fae053f221f3e6bccc76607c5d109dd86a0063b,2024-08-13T18:15:29.953000 +CVE-2024-38202,0,1,e2d641c476f9dc13a8d336a19bdebe9a3b3a110a87f90a532b99552457779a18,2024-08-13T18:15:30.203000 +CVE-2024-38206,0,1,fc9a672d005d7ead2d2d38b9ed830bd8d35abf18e303288a2b79a4888e74d38d,2024-08-13T18:15:30.350000 CVE-2024-3821,0,0,3ffbadbdaf34f564e9c498f1baa8fe758531e73989a1bbb861692bcbfdfc262c,2024-06-03T14:46:24.250000 -CVE-2024-38218,0,0,e7342866ef3a16926b143aa0008fc6184a292d9f61fe4cbeef73ff44ee02181a,2024-08-13T01:10:06.100000 -CVE-2024-38219,0,0,2fca9f35b77d67770864b68108bd122ee00786d86b3d46defa01ed91881911bc,2024-08-12T13:41:36.517000 +CVE-2024-38211,1,1,4130039db3014f8006fd0f770c7c8c1714450e0066bd6eaea1815f4f91aca431,2024-08-13T18:15:30.470000 +CVE-2024-38213,1,1,fe63c53b12f91f600d7c7108103f2de87f74deb442c6bdb53693e829e19387e6,2024-08-13T18:15:30.750000 +CVE-2024-38214,1,1,653a59c00f60f2f520e2d206e073ab31a9abae3cf7125249dbcdabf44c0482df,2024-08-13T18:15:30.983000 +CVE-2024-38215,1,1,dc63bfb811b08cf0eb1add182015da819d502b3885d7262e7500a5891604fa9a,2024-08-13T18:15:31.247000 +CVE-2024-38218,0,1,d8154113c709876f61605539852c344572b202f6d86619699565b8c3f572b9b4,2024-08-13T18:15:31.500000 +CVE-2024-38219,0,1,e14090e36cb268ebd4ddc662de283a811b72a0453a256d8c6fb64b84db762356,2024-08-13T18:15:31.623000 CVE-2024-3822,0,0,51b0f82a9028abb2f3a6ab312236a4c8392000a211092257ada320c541b18cc9,2024-05-15T16:40:19.330000 +CVE-2024-38223,1,1,00b94780d1eb9f106ca6c845428e70b57bb38005a01a9ac5772f21183d05199c,2024-08-13T18:15:31.810000 CVE-2024-3823,0,0,53ae63b27eb43a6740a92f1ff13f05ddd2a8941167fdfb2924cdfa6b561369e6,2024-05-15T16:40:19.330000 CVE-2024-3824,0,0,e8430e8e74668eaaf1515aab02bbd50450b435f6ff0c9f12ee70566d9f9578b4,2024-05-15T16:40:19.330000 CVE-2024-3825,0,0,0797baa725c3e17399d5d91a8de7a7a1a558d256247589a07a334c4f415b4b15,2024-04-17T15:31:50.160000 @@ -255180,8 +255261,8 @@ CVE-2024-38494,0,0,414fbd6d2851a15a9d78e377321cacdd692320d773acbcbc218c1cbcdf7a3 CVE-2024-38495,0,0,fea4dcb4fc2311116e216f5501bdcce029e8616b236558b22d9cb3670ca9e419,2024-07-16T13:43:58.773000 CVE-2024-38496,0,0,6e423c176a887ed5895ae7351498e6b63c7505283576ed5f43b90da3d939aeaf,2024-07-16T13:43:58.773000 CVE-2024-3850,0,0,2382357c8e4d6adda4f3540070cc5ea125c45aed93070563af82a0d626955695,2024-06-12T18:12:56.413000 -CVE-2024-38501,0,1,5802415a4ecee4908b92a91ebedd67938130f4a8cc453b834f2041d0e35f2759,2024-08-13T17:11:53.553000 -CVE-2024-38502,0,1,8b4b810cf3af6e63cb53b3f46aa6d158c123fd275bc586ededaf068560706dd4,2024-08-13T17:11:53.553000 +CVE-2024-38501,0,0,5802415a4ecee4908b92a91ebedd67938130f4a8cc453b834f2041d0e35f2759,2024-08-13T17:11:53.553000 +CVE-2024-38502,0,0,8b4b810cf3af6e63cb53b3f46aa6d158c123fd275bc586ededaf068560706dd4,2024-08-13T17:11:53.553000 CVE-2024-38503,0,0,57a42403e1de4dcbf683abc4eaadb7a1ac23c4ac22608d1c4298e8a1a0c607e4,2024-07-22T14:15:05.780000 CVE-2024-38504,0,0,4c5e9d4e31ce363d990483052f136d892b9e9d476c16b9ba9ffe4f7ab7d68bdb,2024-06-20T12:44:01.637000 CVE-2024-38505,0,0,b17f43381c815e52625008a26f98d511f617e1d606d0689fa471d4457a2ae811,2024-06-20T12:44:01.637000 @@ -255211,7 +255292,7 @@ CVE-2024-38527,0,0,d79f673f66de487942038a941e7146b053a6ddb1c998291462a54ca077215 CVE-2024-38528,0,0,abe62c0b36f96b72c42ae3a20756e7dee4cdc68dd98be36932d675c96e479202,2024-07-01T12:37:24.220000 CVE-2024-38529,0,0,89427744b91101a7259abd96d0f1b96d17dbdafc1c9344405bcbbba05a81e234,2024-07-29T16:21:52.517000 CVE-2024-3853,0,0,7e352b0debfe2ff1972966571472dc1ad9a92992dff183ce4b7132f5ac558f7a,2024-07-03T02:06:45.877000 -CVE-2024-38530,0,1,4bea39f5b8ecc1dad85eb27c6dccbd6f9699e0413948d6e28e5efa9c7b62dee6,2024-08-13T17:17:47.693000 +CVE-2024-38530,0,0,4bea39f5b8ecc1dad85eb27c6dccbd6f9699e0413948d6e28e5efa9c7b62dee6,2024-08-13T17:17:47.693000 CVE-2024-38531,0,0,b56de69adb9e29b508ff804eef5c2919280b3646aaf65838ea0969fdce8b1636,2024-07-01T12:37:24.220000 CVE-2024-38532,0,0,3a3b54122bd6780d32b0357101fa3b70c56bf5cfbd9b29132bcf407b07a6cf4a,2024-07-01T12:37:24.220000 CVE-2024-38533,0,0,bc3eb3ef979bf5295d109db19e6d12afcecc2e011ea06aeec96e0b38c48ef42a,2024-07-01T12:37:24.220000 @@ -255545,7 +255626,7 @@ CVE-2024-39072,0,0,59efd5c73004670f8c574450bf52f5ef6a3e1b857b7881899bb9399c02910 CVE-2024-3908,0,0,42c7c9b2b31f61816d945d69672e5e24b20e282cc849fd87286a4170779d810f,2024-06-04T19:20:26.660000 CVE-2024-3909,0,0,ea272c17ff869087d9799ba3efa606456d1ea78a711f72e5984479fd9f006e55,2024-06-04T19:20:26.763000 CVE-2024-39090,0,0,4ea45c01dc94b6a5905ea4f25d30b677051f8a6abd6f770805bb3d0f6dca7071,2024-08-01T13:55:23.317000 -CVE-2024-39091,0,1,55b1412477442e0e3b8e8d9282a2e773160ead8169ce78d357bd6feafd37a4e7,2024-08-13T17:12:43.403000 +CVE-2024-39091,0,0,55b1412477442e0e3b8e8d9282a2e773160ead8169ce78d357bd6feafd37a4e7,2024-08-13T17:12:43.403000 CVE-2024-3910,0,0,5517b92ffa84ce0352fdc1fcc785da8fc488f0a213ee6670945494d32f02de6a,2024-06-04T19:20:26.870000 CVE-2024-3911,0,0,554ab1929819d1eb25e95db5b6b72b7d88b66260392eaf976b13306fbbfd7fd3,2024-07-03T02:06:52.050000 CVE-2024-39118,0,0,c73221ddf1d7aabf1cde04e3cc8495d2b93ac9b8498b2f760ce56c4f1b9d2289,2024-07-11T18:30:13.010000 @@ -255556,7 +255637,7 @@ CVE-2024-39124,0,0,074b2440134f96fcb5e6403766335cbe851c245882b5084251dfb9a87ee9d CVE-2024-39125,0,0,ea222508082dda2f4140fd8cec40ec4cb568aeac21b16bf5850e5de1b8ed9df9,2024-08-02T19:45:07.057000 CVE-2024-39126,0,0,02a0af5813c985b7ccaba2afbb0690bd72e15528f1d0e97017c88410c682ae2a,2024-08-02T19:45:17.417000 CVE-2024-39129,0,0,e13cd843f644991726516520189fbff2f72df7163be6b1c91e840488eab8e98f,2024-06-28T10:27:00.920000 -CVE-2024-3913,0,1,59954be1b33e1d6d40e5571d1d04fab56ad7f2350ee52acdda44744257f4c0b5,2024-08-13T17:11:53.553000 +CVE-2024-3913,0,0,59954be1b33e1d6d40e5571d1d04fab56ad7f2350ee52acdda44744257f4c0b5,2024-08-13T17:11:53.553000 CVE-2024-39130,0,0,df5f818c69686396dd3eb68339897ebffa1b11bf7906d37001b874abe3136d64,2024-07-03T02:05:38.450000 CVE-2024-39132,0,0,f1e2ae8a4f82ac6b3eb2b1f084ee47ef357e0b4364889cfb0a92803ee3d26262,2024-08-12T18:35:40.733000 CVE-2024-39133,0,0,c0b156e43b5b006fb8a1a63a92ff8df19a3b9334b5434845fe916818d8f721fc,2024-07-03T02:05:39.283000 @@ -256258,12 +256339,12 @@ CVE-2024-40767,0,0,0f0f227d49db4f76a18af060eeadd57ea0ca5da0ccc7bd26ef12905f94537 CVE-2024-4077,0,0,d4f08c4fa42913c8d00f3fecbe96233f1448e9383bf97ebcbeca4cc0f2c8ae2b,2024-04-25T13:18:02.660000 CVE-2024-40774,0,0,f362e44a6513e9a7ad670a01f69c050dc7028489484160824ab1f96f580e42a0,2024-07-30T13:32:45.943000 CVE-2024-40775,0,0,1fdbbe2b554a0166a3b8a0cf31bf852c33e7d8e5242e045fa4d346d0613760b8,2024-07-30T13:32:45.943000 -CVE-2024-40776,0,0,fe6350c3b602fe0ddaec428eb9486c5a0abab3145ca6e8b9d06012f2e0f122a7,2024-07-30T13:32:45.943000 +CVE-2024-40776,0,1,a4ff13c39aff4cb8182e6f801cb3edcf53850779e6e8c7ac30fd11f69b2ca5eb,2024-08-13T18:15:32.063000 CVE-2024-40777,0,0,cd5278d926d6f988af1dac03f9f51dab9fbf246f9272703e05ee69de8d4e128d,2024-08-01T13:58:01.910000 CVE-2024-40778,0,0,35c17d775b6ae280af3874176f7cf5db440e83e10601c08aee1f4c8e9ab8f216,2024-07-30T13:32:45.943000 -CVE-2024-40779,0,0,301c32dc0356a897f3b483a796871246ec04c6946de993df96ed1084affffb32,2024-07-30T13:32:45.943000 +CVE-2024-40779,0,1,9a53663b0ff2b9b02a1c7803b3f6e11f74540e57d3062bef118a9d75315df805,2024-08-13T18:15:32.170000 CVE-2024-4078,0,0,4f6a573d2d42430a81000704c37318a2f1d7afadf71bcba45d97fec5f925233f,2024-05-16T13:03:05.353000 -CVE-2024-40780,0,0,88ccb236d4612b730bba81a246e29c492df839d8f1307be20813fde30010016e,2024-07-30T13:32:45.943000 +CVE-2024-40780,0,1,ca052b28cfe52457cd4861fe78867ce6d9a16251421c06cfa44e881bd539dadb,2024-08-13T18:15:32.257000 CVE-2024-40781,0,0,cb4f84ce4eadebc47da0b5f5ff07124e4bd80d915060c4c1ff718dd6931fbb24,2024-08-01T13:58:02.880000 CVE-2024-40782,0,0,df7481defca05955ddebd7ba4fd4f7f033a3cb7779bd31bccd946af5c5220707,2024-08-01T13:58:03.853000 CVE-2024-40783,0,0,86941936464a3149700244bf744f0d053d8d3ebfb9735c38cfcf426fbad2f6d0,2024-08-01T13:58:04.677000 @@ -256711,11 +256792,11 @@ CVE-2024-41603,0,0,274738d202695ad4f9eeac726dd842b3cdc47fbabba17edb5ee76c87292d7 CVE-2024-4161,0,0,818606f25cf93cd94814d58a9247fa25de635b9142e537f83382fb857b8b71ef,2024-04-25T13:18:13.537000 CVE-2024-41610,0,0,26e6066451c8a71988f997449d51b2538a9517f154afbfa7718a4bd3d7e1adb9,2024-08-01T13:58:58.120000 CVE-2024-41611,0,0,8ae08bbc5635b26df3869144a2b3bde07b8fa7e9c586a9249f8dfa55a99d468a,2024-08-01T13:58:58.890000 -CVE-2024-41613,1,1,639b45e73b43f881ca3bc2a14c57b4869c8865b5490cdc7f1349a159536ef530,2024-08-13T17:15:23.927000 -CVE-2024-41614,1,1,539e5033ed5e1ecaa18725e9b5e238dd5acef3eb688c547c5c679fac7c7c4a8c,2024-08-13T17:15:24.013000 +CVE-2024-41613,0,0,639b45e73b43f881ca3bc2a14c57b4869c8865b5490cdc7f1349a159536ef530,2024-08-13T17:15:23.927000 +CVE-2024-41614,0,0,539e5033ed5e1ecaa18725e9b5e238dd5acef3eb688c547c5c679fac7c7c4a8c,2024-08-13T17:15:24.013000 CVE-2024-41616,0,0,a87f80cfe19fdc1adad71691ba6015b314ae0892eefb4d086c289749db2f63df,2024-08-07T20:54:20.793000 CVE-2024-4162,0,0,1a4f39929c1df6d420ff35b2d8de51a57c5e5378a57b6e7a1a35abc1b5a3dc57,2024-05-08T13:15:00.690000 -CVE-2024-41623,0,1,958472a04a50f4bc36e68c985ebe0af1bc1258c9c309fd84bd4622b30f926747,2024-08-13T17:11:53.553000 +CVE-2024-41623,0,0,958472a04a50f4bc36e68c985ebe0af1bc1258c9c309fd84bd4622b30f926747,2024-08-13T17:11:53.553000 CVE-2024-41624,0,0,300a907d59c60bf938fbbe11abf1d1dd305a7cd2619bf29e5e11f38514dc3443,2024-07-29T16:21:52.517000 CVE-2024-41628,0,0,3f95419a732116ba5016aeec3d83a528b6096a3cc023e4d133c06f26311a9cae,2024-08-06T21:16:03.323000 CVE-2024-4163,0,0,69022c7df60536fa7bdfb20d2705efebe8d2d6c2c39bf59b2dcb5940921dba2c,2024-07-03T02:07:10.047000 @@ -256772,8 +256853,8 @@ CVE-2024-41706,0,0,eb9574b35e7aa157073ca1f400bb0d0353b8ac2c3e5aea70509848a41f087 CVE-2024-41707,0,0,46c44c2d7564627600555fe5a9d2b2412759a5e55f6187d39d18a309c54891ee,2024-07-30T20:31:59.030000 CVE-2024-41709,0,0,6713bfc73e81c65bc7923627db30413fcbe413ec587fff89449c3abd86e7e93b,2024-07-25T15:22:06.140000 CVE-2024-4171,0,0,87597e8caa4479ab69c883527c35fc22af72d614757313d16953f50dcfa107c2,2024-06-04T19:20:31.980000 -CVE-2024-41710,0,1,1fc2b643d41285ed1680932b3b049e712fbdfd2ad31160a3d0ae6894736cc017,2024-08-13T17:15:24.100000 -CVE-2024-41711,1,1,8b59907c0ae05629029436273c6ef827d9c593813963323e9824d94e5e9d4094,2024-08-13T17:15:24.237000 +CVE-2024-41710,0,0,1fc2b643d41285ed1680932b3b049e712fbdfd2ad31160a3d0ae6894736cc017,2024-08-13T17:15:24.100000 +CVE-2024-41711,0,0,8b59907c0ae05629029436273c6ef827d9c593813963323e9824d94e5e9d4094,2024-08-13T17:15:24.237000 CVE-2024-4172,0,0,ae5cefdd41ee745a5f3463347f20f3f77110439c81ed1ad285dedf4b40da1c57,2024-06-04T19:20:32.077000 CVE-2024-41720,0,0,51d8d22362ddab17d5ebf589fc7956caae3f208813d6f6c5afe48ee9de7d866c,2024-08-05T12:41:45.957000 CVE-2024-41726,0,0,e325c72cd77b10fa79a0c73cd0bce9d67f9472d40dd3ab04f6437f9f2b06b815,2024-08-01T13:59:09.707000 @@ -257083,7 +257164,7 @@ CVE-2024-42254,0,0,4c21db62b8fef15a8d4e2f4b1a5153b64df67323b2d9eda3f839d5b6b50bc CVE-2024-42255,0,0,fc422f8e4f441193acc70cb76260d4458bc236831fc1ac0e46e7857f3491b1e0,2024-08-08T13:04:18.753000 CVE-2024-42256,0,0,c93d1f5597bc678cda18929e1b987988db71de242a8bc859001c0ee64669f796,2024-08-08T13:04:18.753000 CVE-2024-42257,0,0,069b5a4e96675c66db46a639aa141686ff5530ef6ed9e06efaaa21582e67ad7d,2024-08-08T13:04:18.753000 -CVE-2024-42258,0,1,41eb98af50b23234ab7ed55029feea948f705bb89cdcfa13feaefff17d630343,2024-08-13T17:17:22.600000 +CVE-2024-42258,0,0,41eb98af50b23234ab7ed55029feea948f705bb89cdcfa13feaefff17d630343,2024-08-13T17:17:22.600000 CVE-2024-4226,0,0,5a1ca6b12b6f72b0f4206f29fce66dc2868959ed888bfbcbc74131b5725a94eb,2024-04-30T13:11:16.690000 CVE-2024-4228,0,0,22331e972270e81a8a4d9238da77e1f1eab8644e20c13e517da1e3ed609f3be8,2024-06-27T12:47:19.847000 CVE-2024-4231,0,0,c87a42b4dfede9046d13b34e260c0c7ec4e51f68f0fbfb8755010b78e39f405d,2024-08-01T13:59:28.843000 @@ -257160,10 +257241,10 @@ CVE-2024-4252,0,0,9237a844d9d9b4c175441eb52c39ce07fc14167f47531df4616e5c1079e2e9 CVE-2024-42520,0,0,64dffe6569e4f4099d9df2249ffa95a5cd3b2fdfe3c5c543c43632b62f26d14c,2024-08-13T15:35:16.110000 CVE-2024-4253,0,0,c9c68d543bb45de2537aab443ac18ac0d0ac2996dd48a0a792630e0df378eb1e,2024-06-04T16:57:41.053000 CVE-2024-4254,0,0,3b60c29b2fffc26e81ef054aaff64665b1e9fde72fa8de5968c25c437cecbbf1,2024-06-04T16:57:41.053000 -CVE-2024-42543,0,0,6ee50d274b8eef597024a9c9175c5d4c80a1fe2616bb4fe4bff27c10e0a6311a,2024-08-13T13:24:03.060000 +CVE-2024-42543,0,1,89bf04af083c2e91e2e9ba214be5b3aa8827ce84405f38705010996fc0353810,2024-08-13T19:35:10.380000 CVE-2024-42545,0,0,f468a16273bd93e60bf7c85edbb037a37f95ddbef27d46e806b8081634956ff0,2024-08-13T15:35:16.993000 -CVE-2024-42546,0,1,a2880921d8fec551f033f97525a883f7d6a9f450c3f6b1b2afb939b9a7fa09a7,2024-08-13T17:08:30.107000 -CVE-2024-42547,0,1,35eeb010fca94dc794f14fe3c29b0586f2dd6b453f1de383f4e89dde1cb85973,2024-08-13T17:08:12.543000 +CVE-2024-42546,0,0,a2880921d8fec551f033f97525a883f7d6a9f450c3f6b1b2afb939b9a7fa09a7,2024-08-13T17:08:30.107000 +CVE-2024-42547,0,0,35eeb010fca94dc794f14fe3c29b0586f2dd6b453f1de383f4e89dde1cb85973,2024-08-13T17:08:12.543000 CVE-2024-4255,0,0,35fd058a4cc0a80e19d25400a3e944345c636d8ef400085f905d7b019af7edbf,2024-06-04T19:20:34.420000 CVE-2024-4256,0,0,2885dad709315de5112b738946979afcb06c4d717b1b754bf7bfd87477f08c3d,2024-06-04T19:20:34.517000 CVE-2024-4257,0,0,e0d599f1bfc48408556261adebbc05066e8b6b86cdfabfa8d99484b6710fdc92,2024-05-17T02:40:21.330000 @@ -257173,14 +257254,14 @@ CVE-2024-4261,0,0,cad163d5402c8383e323c083e324c4342bcfec07494a0960d776456fb2ab22 CVE-2024-4262,0,0,eb43fbaec8efb92a09683be8d89079c39bc088d0014f0d5047c7a435bf15c8e4,2024-05-22T12:46:53.887000 CVE-2024-42623,0,0,99a6aaf6801397834ccadcfb03d3715137de2aa0dd38613e1baf274f894ff205,2024-08-13T13:24:59.710000 CVE-2024-42624,0,0,ec841bafb7e9aeedb21c49859383b729fbe686d2ed7814525f5ad995afa66c4b,2024-08-13T13:24:48.877000 -CVE-2024-42625,0,1,a336ad04b717d78488d075fbe4f05189cb75b4a8481071a35a5b1b1eee244b14,2024-08-13T17:37:07.567000 +CVE-2024-42625,0,0,a336ad04b717d78488d075fbe4f05189cb75b4a8481071a35a5b1b1eee244b14,2024-08-13T17:37:07.567000 CVE-2024-42626,0,0,2719b95cb2b2da8055e44b617f6bc8b518937c6439f02bf103b37b68507f4891,2024-08-13T15:35:20.987000 -CVE-2024-42627,0,0,dc791f47059eb1d24e79dd8e86fcf1207e5c824c40b28dc7346c3e407b50043d,2024-08-13T13:24:39.387000 +CVE-2024-42627,0,1,6a82cfd4db29a715c71b73c3242f7479208b08be04e0e80aab8a77ece4108156,2024-08-13T19:35:11.220000 CVE-2024-42628,0,0,ae77e6dbb0fb6b78416c59be322943b3e27d1177389d59cf5f49d0df9ff8842d,2024-08-13T13:18:32.317000 -CVE-2024-42629,0,1,a973b8a5d96247dcc768ad375bb80fa362e4a36179f265afcb23021b6b10cb87,2024-08-13T17:02:57.890000 +CVE-2024-42629,0,0,a973b8a5d96247dcc768ad375bb80fa362e4a36179f265afcb23021b6b10cb87,2024-08-13T17:02:57.890000 CVE-2024-4263,0,0,ca3576d1d67e220dba5bd29258a281021ffe39453fa0c4f20e91ad0ccbfbb40c,2024-05-16T13:03:05.353000 CVE-2024-42630,0,0,4fff96f7d5cfbd5e5589e0968506019fde3792b2edc6b60a8aaf8334fc6488be,2024-08-13T15:35:22.433000 -CVE-2024-42631,0,0,f1ea0c17046a6f6d297c1add3f27908219f87fa9c102984850c5a597fb24dc01,2024-08-13T13:20:29.147000 +CVE-2024-42631,0,1,1f47f8877d49e8628a42d74c73cac60b8f382fa6d5b7f60da5c7487aa880aef0,2024-08-13T19:35:12.050000 CVE-2024-42632,0,0,6db2b07353e1fe8433bb94ce7c82367301221ecd513a59df2e5f1960150683fd,2024-08-13T15:35:23.410000 CVE-2024-4264,0,0,aceade487dcdf82d5a23a178a070b3c07d4cce69337175854977fa24341a320c,2024-05-20T13:00:34.807000 CVE-2024-4265,0,0,674cb78ce8c95e07c05495b52772b5d4a079c608362a6e67c2dfb567e6b8517a,2024-05-02T18:00:37.360000 @@ -257192,19 +257273,19 @@ CVE-2024-4270,0,0,17133812b9c812b17ff2909d738c8b5ae6f8cc2b39eef016edec8cd05359b1 CVE-2024-4271,0,0,264c116f07aa10a920ca78d5e9c58bba0fe1e2b31cb4f2cfd0a7a609be29751f,2024-07-03T02:07:19.577000 CVE-2024-4272,0,0,c6d51ebaf4553eb5c8964297a8a6646c1c8e34e58f8be34bef185e25a27d5cec,2024-08-01T13:59:29.913000 CVE-2024-4273,0,0,5b125871d487c3efbe3e6c153d4b19bf711348e838f76308254a9b0be85a18c9,2024-06-04T16:57:41.053000 -CVE-2024-42736,0,1,4ec05264aa8892b0b3b18f6f1978b37dbe1fb399847313b007d5e4d1fafb8500,2024-08-13T17:11:53.553000 -CVE-2024-42737,0,1,25ec99c07d8df034f54115296b51513ae1ec495339795fc748cb5a4d9d0b3254,2024-08-13T17:36:45.023000 -CVE-2024-42738,0,1,da7ff5a889af237238cbcafdda5111f472a3160b89cce7fa6dc29365a19a811d,2024-08-13T17:36:38.913000 -CVE-2024-42739,0,1,411cb7f53ea2cd350d222ec82dd953a5e224de551896cbdf7eb60c8373beaae8,2024-08-13T17:36:32.647000 +CVE-2024-42736,0,0,4ec05264aa8892b0b3b18f6f1978b37dbe1fb399847313b007d5e4d1fafb8500,2024-08-13T17:11:53.553000 +CVE-2024-42737,0,1,53f0237f1b91c87222d8e0f84c6db0fda9ef09b90c7ec20e9709cc7bbfc4d065,2024-08-13T18:35:07.950000 +CVE-2024-42738,0,0,da7ff5a889af237238cbcafdda5111f472a3160b89cce7fa6dc29365a19a811d,2024-08-13T17:36:38.913000 +CVE-2024-42739,0,0,411cb7f53ea2cd350d222ec82dd953a5e224de551896cbdf7eb60c8373beaae8,2024-08-13T17:36:32.647000 CVE-2024-4274,0,0,75b03607f21ad1e6106012193c68fc94ebbedd9ebdaa49b327f299429c0ef078,2024-06-04T16:57:41.053000 -CVE-2024-42740,0,1,39569bd5167f0f47a44ebbe4ecc5aa9c5e8e01d7a3ccd0a81beaed4c0b73a40e,2024-08-13T17:11:53.553000 -CVE-2024-42741,0,1,c3d54f2d55431f18f2fe2689eea0c75eda9e73bc676a6cdf4fda83be8048dd21,2024-08-13T17:35:02.867000 -CVE-2024-42742,0,1,28eb0e13c2ae89084b4daf67b648cefa3863a581a43337e7a268c4f9ddc24bdc,2024-08-13T17:10:49.093000 -CVE-2024-42743,0,1,cd1872fd32b84c7d87b2d571fae675ee55692cbd8e243d73be68c9c6c28e9cd7,2024-08-13T17:10:29.940000 -CVE-2024-42744,0,1,9d65b457ba80e3bacb8cbde537c1ae1de7fa2e5e5f601337f60d5c89a5a01599,2024-08-13T17:10:12.157000 -CVE-2024-42745,0,1,d2f467113cda4cc30e7255dcf19a80218eafc314dce633f11469c2e4a02cafc7,2024-08-13T17:09:44.943000 -CVE-2024-42747,0,1,4d1c99e860bf6905b5d644799ef0c78895a722730457e9c7bd1d214b39f83bc6,2024-08-13T17:35:04.540000 -CVE-2024-42748,0,1,52e6e14746af30f6f3124891b89bbdbe775ebb6c4232d3347332f267006d05fd,2024-08-13T17:08:53.510000 +CVE-2024-42740,0,0,39569bd5167f0f47a44ebbe4ecc5aa9c5e8e01d7a3ccd0a81beaed4c0b73a40e,2024-08-13T17:11:53.553000 +CVE-2024-42741,0,0,c3d54f2d55431f18f2fe2689eea0c75eda9e73bc676a6cdf4fda83be8048dd21,2024-08-13T17:35:02.867000 +CVE-2024-42742,0,0,28eb0e13c2ae89084b4daf67b648cefa3863a581a43337e7a268c4f9ddc24bdc,2024-08-13T17:10:49.093000 +CVE-2024-42743,0,1,d538c66af9d70f40192fc77d1cf4c1d752037b7e0e55925fdbf9bc80a15b551d,2024-08-13T19:35:12.963000 +CVE-2024-42744,0,0,9d65b457ba80e3bacb8cbde537c1ae1de7fa2e5e5f601337f60d5c89a5a01599,2024-08-13T17:10:12.157000 +CVE-2024-42745,0,0,d2f467113cda4cc30e7255dcf19a80218eafc314dce633f11469c2e4a02cafc7,2024-08-13T17:09:44.943000 +CVE-2024-42747,0,0,4d1c99e860bf6905b5d644799ef0c78895a722730457e9c7bd1d214b39f83bc6,2024-08-13T17:35:04.540000 +CVE-2024-42748,0,0,52e6e14746af30f6f3124891b89bbdbe775ebb6c4232d3347332f267006d05fd,2024-08-13T17:08:53.510000 CVE-2024-4275,0,0,c229bc373f94c5248df137d0b0d9ca9d61bf79f845040a419335cc081cba5e27,2024-05-14T16:11:39.510000 CVE-2024-4277,0,0,ec975a6ab8cd435ccab2b915965095df8c992e1e8e765cf73bc6d545aa3b1e0a,2024-05-14T16:11:39.510000 CVE-2024-4279,0,0,dfbad3c4052d0097199e5a57f42abb52975c0de3af4475a04c90870b0d97f015,2024-05-16T13:03:05.353000 @@ -257555,7 +257636,7 @@ CVE-2024-4599,0,0,97a585846a1cde14c82c7df8029410945eada1b1651bcc856b8e29367f63ec CVE-2024-4600,0,0,078ff1a3ce0c016ebe4abdef878e85c422e5d3e27f924ee561699d3a699695bb,2024-05-07T13:39:32.710000 CVE-2024-4601,0,0,f0cf92b01a71b6ce5239836875c0fea83fe5cefcc9c9a95787d845c600418862,2024-05-07T13:39:32.710000 CVE-2024-4602,0,0,2d8504f508e1d4f718d8c666850c307b85c9596de2a8b2f0ab0bc138c9da4ca4,2024-08-01T13:59:32.233000 -CVE-2024-4603,0,1,9adeb744a04b6e7c726b04f4a24faa6c0957c052c2ef086f262a131e3ba07cc4,2024-08-13T16:35:05.013000 +CVE-2024-4603,0,0,9adeb744a04b6e7c726b04f4a24faa6c0957c052c2ef086f262a131e3ba07cc4,2024-08-13T16:35:05.013000 CVE-2024-4604,0,0,a39c956f080c616b17936b03ed62fbdee5080806b0deef5fc7741779c0bf0ec7,2024-06-27T12:47:19.847000 CVE-2024-4605,0,0,cc5939dfa5bb0891c69db66e562cc6696594a6a88efe746332f5ec8ead5152ae,2024-05-14T16:11:39.510000 CVE-2024-4606,0,0,1762c1d15ebc2ec60093a6d78e47c2427107d80c6a65abde0809dacb63c557b9,2024-05-14T16:11:39.510000 @@ -258605,7 +258686,7 @@ CVE-2024-5844,0,0,cb741198deb8b5f70d2d0ce9c33e3416f6a940b998b67b99e17d7bffff2c68 CVE-2024-5845,0,0,23de9b938edaad5f473a2b639120a3c8d86f1b1045f6e52453cfa63e2bd47f75,2024-07-03T02:09:29.493000 CVE-2024-5846,0,0,0b2d8f18d514785edc16bc8a9875d408ec093858a0edbb60b84e2acabc32d1b0,2024-07-03T02:09:30.583000 CVE-2024-5847,0,0,af863962a64ba64b748fc267021bdca1358cb53ef73ef1a0e2073c98890c9fa1,2024-07-03T02:09:31.730000 -CVE-2024-5849,0,1,b0a2bd699c8f5649ded3caef74e7510f65fc4c746d0494a653ebec2d1b0beb94,2024-08-13T17:11:53.553000 +CVE-2024-5849,0,0,b0a2bd699c8f5649ded3caef74e7510f65fc4c746d0494a653ebec2d1b0beb94,2024-08-13T17:11:53.553000 CVE-2024-5851,0,0,d34c335450811da4c8dbeb823a49b4fedf64cc8a5affcfcc32e2d9d5897f0dc8,2024-06-13T18:36:09.013000 CVE-2024-5852,0,0,17ae123c3ebaa5002b861453d278a4e3499e2a8a6baca11a20783ec79d4cdcf1,2024-08-07T22:19:34.977000 CVE-2024-5853,0,0,fce39775d007fbc741a3f2bc4fb52875073a382bd362c86e3cd6e44d0a9e6207,2024-06-20T12:44:01.637000 @@ -258762,6 +258843,7 @@ CVE-2024-6073,0,0,e03ebd767ac590d74109e38897ba792c96f7f9dfee79b1fa5bd262c10ac25e CVE-2024-6074,0,0,915dc1a478b1dc63b8eb0116a9c01d91f3bc138019e7c4a3ebc47481b04905bc,2024-08-01T14:00:10.323000 CVE-2024-6075,0,0,1cd7e5569456a26c7768214306daa7e1d9ce1093889f04b8131e5ae79338cd6f,2024-08-01T14:00:10.553000 CVE-2024-6076,0,0,f75c5e0cd2d3ad9cf3dc79d2ee6835febd9e3e1415fea3908528543dbed7f72e,2024-08-01T14:00:10.780000 +CVE-2024-6079,1,1,59a2d4a0913436356e0b09da4f7ce1e06fcd8683a35615c71ea223ee0b33149e,2024-08-13T18:15:32.443000 CVE-2024-6080,0,0,2ad08bb329dff2f5ca525640c8314d702413aec2eadc0af776454094a000e617,2024-08-06T07:15:46.460000 CVE-2024-6082,0,0,276cd87669a06de72f4fd7da1f295faff84e8d70a51e1d99184ac4c2e8bf8b0f,2024-06-20T19:15:50.437000 CVE-2024-6083,0,0,a8e42b758c673e09d4e24ea193e5640feaaf3b5eee44f78d141a0b2276184907,2024-06-20T12:44:01.637000 @@ -258998,7 +259080,7 @@ CVE-2024-6376,0,0,2eceea6553f0e47a0e34ab01650b7781a20682f6799be39f9cd1e64f3f1985 CVE-2024-6381,0,0,2822fb12d769fe1cca32125b45cae52ba3e5807419213b6087c6db8de8d2b326,2024-07-03T12:53:24.977000 CVE-2024-6382,0,0,9f140af24f460b4413fa844f95383cc153754360a136939b8743c2d8327ebf99,2024-07-03T12:53:24.977000 CVE-2024-6383,0,0,4622f4fc90fbde51d6570a14e2ee494e3e71659c68201475e4e4eb659c036ac0,2024-07-05T12:55:51.367000 -CVE-2024-6384,0,1,583805e9cb6edee480ffb588d19a6167ac04ad3d28a7d955c18ca9e167db9db1,2024-08-13T17:11:53.553000 +CVE-2024-6384,0,0,583805e9cb6edee480ffb588d19a6167ac04ad3d28a7d955c18ca9e167db9db1,2024-08-13T17:11:53.553000 CVE-2024-6385,0,0,13d2095bcd11ed43b6c47262c7b96c8a9e162b20cb975895bc98c3af67d39ff6,2024-07-12T16:49:14.047000 CVE-2024-6387,0,0,db893df8e717a9bd82383b1c159531d9bd008b0dedb866ba3b332081811995f1,2024-07-30T02:15:08.387000 CVE-2024-6388,0,0,0ce37f83493b5d79bb3fdc963327390bc09266ac17f5f1de660cf43d4cdce70d,2024-06-27T17:11:52.390000 @@ -259147,8 +259229,8 @@ CVE-2024-6612,0,0,d34a2e10bc1c43655aa28f997fd8d7918b9d5919fcfded6bd9a7bc48a40520 CVE-2024-6613,0,0,2c9248a7ca42e8738ab702e9dc188d19870d6e260e6ad7403e7b1f4010624eaa,2024-07-16T18:15:09.747000 CVE-2024-6614,0,0,92c74753eb3da74f24a895083a8e9cff7c2fc2f9bf400831c94c14936544ed9b,2024-07-16T18:15:09.813000 CVE-2024-6615,0,0,21e70ce6d005932fad51efb1cef43277a3ff57e367ed55aea5460b226c9f9ba8,2024-07-16T18:15:09.893000 -CVE-2024-6618,1,1,1c44dacd3274384608201501dd4f9d2203a239e463a52c403cccdb79abaae60f,2024-08-13T17:15:24.377000 -CVE-2024-6619,1,1,a0c27326441c9ad54090e67e79dc26fb2ee80eb69c52b4439f7c6efcb8635224,2024-08-13T17:15:24.517000 +CVE-2024-6618,0,0,1c44dacd3274384608201501dd4f9d2203a239e463a52c403cccdb79abaae60f,2024-08-13T17:15:24.377000 +CVE-2024-6619,0,0,a0c27326441c9ad54090e67e79dc26fb2ee80eb69c52b4439f7c6efcb8635224,2024-08-13T17:15:24.517000 CVE-2024-6620,0,0,64e06f08829405566592b044b4a90e5d81b7212d27ff82e69e11d8e82efebda8,2024-07-30T13:33:30.653000 CVE-2024-6621,0,0,71019530e7c55904f5b2394b1c9d479065b5c59dd563b9ca2f648901520dca49,2024-08-07T22:17:37.553000 CVE-2024-6624,0,0,d641d0598d5f0d62f69b2f0bb30153f1263b9aa17a64dd7567b42517a1bc6027,2024-07-12T16:51:31.487000 @@ -259259,7 +259341,7 @@ CVE-2024-6780,0,0,54fc3efeb973ca2f40f04f54d5a723685bcfaff31befba604fec0242bd088a CVE-2024-6781,0,0,e24636cf8aa31acaa4171fe3fd81abcf69649ed380806bfafc0afca571326c8f,2024-08-06T16:30:24.547000 CVE-2024-6782,0,0,623508ea52e56d6a6e227168366ca2cd7770a1a0850e95e080f5f12fc915b728,2024-08-06T16:30:24.547000 CVE-2024-6783,0,0,02ffa81303e2d0b2c8d5ada15cd1c5a0e17971825cf42319819acea737c80823,2024-07-24T12:55:13.223000 -CVE-2024-6788,0,1,83f90dc66f65e138337a37de3c72eb14eff308d024da33c72aced52f6d602574,2024-08-13T17:11:53.553000 +CVE-2024-6788,0,0,83f90dc66f65e138337a37de3c72eb14eff308d024da33c72aced52f6d602574,2024-08-13T17:11:53.553000 CVE-2024-6791,0,0,530a9e011d938f884a817484b487117900f43c2f83e7c51084019bfb404fc80f,2024-07-24T12:55:13.223000 CVE-2024-6793,0,0,d3b7076c1491770aa57006b0fda0ca29233a316fd768110e179dab36334b145c,2024-07-24T12:55:13.223000 CVE-2024-6794,0,0,deb0448edb68525192d212a4a5bb7cd3beda8036c6e71adf051ab04617417890,2024-07-24T12:55:13.223000 @@ -259311,7 +259393,7 @@ CVE-2024-6912,0,0,b579ffc43dbaf89f50f93b1659dc012bb7b84a2d36bcb32b984560565416f5 CVE-2024-6913,0,0,a7b65a58f468735b3782ca0a056db617c72da8825fc6f7975e6b5a68a6fa7e93,2024-07-24T12:55:13.223000 CVE-2024-6915,0,0,414f9ee927dc9f475151b863854f151879a129420ab26b169b33952223f7672f,2024-08-06T16:30:24.547000 CVE-2024-6916,0,0,07530be58a74756ca63b407a63f3e63926b78ec1f0980442182c2c4ab60c9be4,2024-07-19T13:01:44.567000 -CVE-2024-6917,0,1,4e02075ee95758cd510fbf6b3750273e9262615bb77e37c7873232af68d2c294,2024-08-13T17:14:51.100000 +CVE-2024-6917,0,0,4e02075ee95758cd510fbf6b3750273e9262615bb77e37c7873232af68d2c294,2024-08-13T17:14:51.100000 CVE-2024-6922,0,0,06f94107ca0d2a59d9bc293905aa46a216c7a8ead08ee7b0b3a0f5d8d9c7d0a8,2024-07-29T14:12:08.783000 CVE-2024-6923,0,0,5f80c19d7aba57d9ca3502e05808684f0f6d62047a1b2b6de15ae6be51d0a228,2024-08-07T15:15:56.337000 CVE-2024-6930,0,0,1339dcde2064efad12400b33b71bb10f58bb3894621d0a104ecb7e997db508bc,2024-08-08T20:06:49.207000 @@ -259410,7 +259492,7 @@ CVE-2024-7100,0,0,dcfec02e0ae4a6f64f97ae0297c66dfbc0aebe11e663bfc596e9b5b147ad74 CVE-2024-7101,0,0,5454c1208509de59c11b3527ed3914e0b9b453785a2425c8a2e412da33d0d539,2024-07-26T12:38:41.683000 CVE-2024-7105,0,0,a997b2c0e4e91d96626adcc721c978e22c9883ba6b9b8f61b29dff1a03ad516f,2024-07-26T12:38:41.683000 CVE-2024-7106,0,0,ff3ffd817a427576052bad31a6af61e50bfb0473d392446ac87a1106350f920d,2024-08-13T14:15:31.030000 -CVE-2024-7113,1,1,fdb27e93425ec33e8db33170d1552c92058e158599cfdcb73dab3b172d6f13a3,2024-08-13T17:15:24.653000 +CVE-2024-7113,0,0,fdb27e93425ec33e8db33170d1552c92058e158599cfdcb73dab3b172d6f13a3,2024-08-13T17:15:24.653000 CVE-2024-7114,0,0,63b5a866782f89fc9f6ac1d30b03e6de66da2ca9dd341d6c07330fc52fb56b69,2024-07-26T12:38:41.683000 CVE-2024-7115,0,0,d198b7c0d1a7a67e83535bd15c8ec8b27ae3282d7abe6e695fb34b6781238fb3,2024-08-08T19:06:00.017000 CVE-2024-7116,0,0,b2ab9f3dee8f843c737ebbc08aa3d5031cd0525c38c25d9a8f184157df5d144a,2024-08-08T19:08:18.813000 @@ -259512,9 +259594,9 @@ CVE-2024-7265,0,0,b8acefabc570cba3338fbcc031201c451674349cab85dfd61e02fb2e8f5c7f CVE-2024-7266,0,0,40ec5b3f4d10f4b6f3816acd7da5d1c216bf118efd4b627aae50abb96a0696e6,2024-08-07T15:17:46.717000 CVE-2024-7267,0,0,e8d85bd26709e9a7a3dc4e8006f3b5201faefcb4aaf4ea4c1f6b8820dbe896ef,2024-08-07T15:17:46.717000 CVE-2024-7272,0,0,a75598507b088cf5d38e53c97b1d09abbaa1cacf367aa16e740665d3e61a447d,2024-08-13T15:16:23.837000 -CVE-2024-7273,0,1,a61ca64a6342f77fae831271fd2a6739b41d99aa7d580eadbf400f237355e05e,2024-08-13T16:10:45.057000 -CVE-2024-7274,0,1,42267a3d3600167277031a12316bb396bcb62aa3302bf81726cca9e052e280df,2024-08-13T16:10:42.520000 -CVE-2024-7275,0,1,313fe9575e6790ea9741c019b6674da7f817aa63e7643c948eb61a90875558be,2024-08-13T16:10:37.247000 +CVE-2024-7273,0,0,a61ca64a6342f77fae831271fd2a6739b41d99aa7d580eadbf400f237355e05e,2024-08-13T16:10:45.057000 +CVE-2024-7274,0,0,42267a3d3600167277031a12316bb396bcb62aa3302bf81726cca9e052e280df,2024-08-13T16:10:42.520000 +CVE-2024-7275,0,0,313fe9575e6790ea9741c019b6674da7f817aa63e7643c948eb61a90875558be,2024-08-13T16:10:37.247000 CVE-2024-7276,0,0,a277960bca5d831a928fa683ca27cd5e0f80dfef07b8475eaf01f736e513b6db,2024-08-08T20:25:32.643000 CVE-2024-7277,0,0,d07c1eb268c7c274994ec109c99051eb3a213fccffe945d0053bb23d3584d464,2024-08-08T20:07:38.717000 CVE-2024-7278,0,0,5267f7cc9b490f8ce43fbd3c5c727548e8d87d921907a5839886258517fd2c0e,2024-08-08T20:07:50.303000 @@ -259603,7 +259685,7 @@ CVE-2024-7395,0,0,6b93b6db07480e26c0ae715f45aa50cef676fc9c19ea641f155805eb4429ff CVE-2024-7396,0,0,4ebde91c8a3429e260812e0a142900e161f2137833db297002231fa5cfafb30a,2024-08-06T16:31:05.780000 CVE-2024-7397,0,0,6d2f711820d3e2f3c7573fc7d4d971b3f755ab6406b8b6440f8e39ce24e2f3e7,2024-08-06T16:31:05.780000 CVE-2024-7399,0,0,94de8cab81b119f815fa73c008811f38562f3609d3da13634aecbd720ea861e6,2024-08-13T15:30:52.337000 -CVE-2024-7408,0,1,a5191010d29cd8fd3daea07e74870b9bf130ede8610ab518fb24ce3a11a386f4,2024-08-13T16:06:08.213000 +CVE-2024-7408,0,0,a5191010d29cd8fd3daea07e74870b9bf130ede8610ab518fb24ce3a11a386f4,2024-08-13T16:06:08.213000 CVE-2024-7409,0,0,fe0e27b90db802bc9518336b034685fa4c799cf8d0788ebbf26f89b44bf0ec6f,2024-08-06T16:31:05.780000 CVE-2024-7410,0,0,247c090cb12333e31f3a0efea00d18747dfe5a3d5c256e6005fe0d4e1c4d1667,2024-08-12T13:41:36.517000 CVE-2024-7412,0,0,b2cec2bd274b261ef09607f2e770ed1c42b7cfc2487929d65308251b8ca5fb1a,2024-08-12T13:41:36.517000 @@ -259696,10 +259778,13 @@ CVE-2024-7551,0,0,b186fc017c389d319de7d861b1d913a84a5458cd5dbd51c140f542d4aff6a7 CVE-2024-7552,0,0,811aa90d2d18bb406f73befc3765a8f78539782307b57a4dcd481925c3ed1f73,2024-08-07T21:29:57.417000 CVE-2024-7553,0,0,423c29f04f0f081a0c5d9465a918cf0ed131ece97e02d2f5996269c83101214a,2024-08-07T15:17:46.717000 CVE-2024-7554,0,0,4a573fb2ab24355a17092729215e215195bfd8edf91c08645b945dde25aae201,2024-08-08T13:04:18.753000 -CVE-2024-7557,0,1,689a9daa3ab546590d7c99bd152e6a8f70602c50080585be6131605a7c141656,2024-08-13T17:00:53.670000 +CVE-2024-7557,0,0,689a9daa3ab546590d7c99bd152e6a8f70602c50080585be6131605a7c141656,2024-08-13T17:00:53.670000 CVE-2024-7560,0,0,69bf0d3c1d2353061d3a66813d4df2a8a02417391648b6018a10fb1d777785c6,2024-08-08T13:04:18.753000 CVE-2024-7561,0,0,4f145ac8bff9e09f18481f098864cf0c68d07bfaa0facd60438519477eaf9cd1,2024-08-08T13:04:18.753000 CVE-2024-7564,0,0,9647575e3fbd33f04dc9f7112e25f0abbbf3e6266c5fe28f9ec18868dfbd0106,2024-08-07T19:59:36.240000 +CVE-2024-7567,1,1,358d34398af486b96db81618fc57a1def28cf0fe99e5266231c39d3ad6cdfd1d,2024-08-13T18:15:32.680000 +CVE-2024-7569,1,1,ea497f99481442c3b901dd4cada6b08f6a61ca5c72505be94d322e95cb46c155,2024-08-13T19:15:16.443000 +CVE-2024-7570,1,1,792a5e4b67aeefb869975c45eefe5893e4571cf4abbefd6fe744f0c8aa15a88e,2024-08-13T19:15:16.703000 CVE-2024-7574,0,0,4cba2fbcd53a26b5f07236e3f6d8e2e24cb14d9ca03c37d251c45b6b1172a6a8,2024-08-12T13:41:36.517000 CVE-2024-7578,0,0,6775b71bfb147f33ac75e26864dff0d49501fe87846b04dfe823255ec77604d5,2024-08-07T15:17:46.717000 CVE-2024-7579,0,0,889817c5384ba36003787d6aa90c4889164dbbf7f4fbfe5c6f0287e20d3cf6ed,2024-08-07T15:17:46.717000 @@ -259709,13 +259794,14 @@ CVE-2024-7582,0,0,b5d30de3379d4f1314d865a318bcbb3d58683288c246ed462b107435220335 CVE-2024-7583,0,0,b2c70b6258cd9101ea44bd72a9a7bee40fdef17b5833e45029641b6b1054cda6,2024-08-08T20:54:35.117000 CVE-2024-7584,0,0,88e393ed083253249958807c1b676f862629edacea69fa08e833cacac796d57a,2024-08-07T19:09:46.290000 CVE-2024-7585,0,0,5e2ff565ca20d01ef68f8422fbeb35a8929478e27cc3f0f142481fee7317e65c,2024-08-07T19:09:46.290000 -CVE-2024-7589,0,1,aa1647eb6c306ec7b876b5795f9775a883f5cc7b06ae7ba418ac0c8e49665270,2024-08-13T16:58:08.793000 +CVE-2024-7589,0,0,aa1647eb6c306ec7b876b5795f9775a883f5cc7b06ae7ba418ac0c8e49665270,2024-08-13T16:58:08.793000 CVE-2024-7590,0,0,c52a6d4cf8dfd970a8fe3a13dd0d7de54ec6ad3618ea0cc5513929656d029f44,2024-08-13T12:58:25.437000 +CVE-2024-7593,1,1,28086c3aedd2abcf2ae9ba63529d87383cc7fbc40eab98bfe80519ed0c545fda,2024-08-13T19:15:16.940000 CVE-2024-7610,0,0,a10689bea1d0fbdec4f1b8819e74182773158d5010cb9fbea2ce46532922c645,2024-08-08T13:04:18.753000 CVE-2024-7613,0,0,51cb787f464113bd96bef73c3a1496b2c8fdb1709edd4dc30393e6a61466a202,2024-08-12T13:41:36.517000 CVE-2024-7614,0,0,d7cc9c45c708dde228724405eed42fed1e1e5a328ee0ca2886de1c39b6c0c7dc,2024-08-12T13:41:36.517000 CVE-2024-7615,0,0,6c5a3d2b322898b551bada40c532b08076a3798009e747124e833bfdffe0bb9a,2024-08-12T13:41:36.517000 -CVE-2024-7616,0,1,240142a7cf93711d379b14c2a6284d004fd0a2d1c674fc02d32efdd57aa3e2bd,2024-08-13T16:59:39.517000 +CVE-2024-7616,0,0,240142a7cf93711d379b14c2a6284d004fd0a2d1c674fc02d32efdd57aa3e2bd,2024-08-13T16:59:39.517000 CVE-2024-7621,0,0,1acf6d4c2a821fce1e3f9264509576725bd5b71a2c3ef943afe6ab5d29351820,2024-08-12T13:41:36.517000 CVE-2024-7633,0,0,3b1df1487eb71af2061753f656e2660f3fdd60b89404cd84fa2c01a4dff29ee6,2024-08-12T13:38:45.690000 CVE-2024-7635,0,0,330e4c31af06e1fa39a084a042067cc2714cfc9a1302a27b2cb8b725b37ba5f4,2024-08-12T13:41:36.517000 @@ -259732,7 +259818,7 @@ CVE-2024-7645,0,0,b152ddbcd4425ac1d44a420ec07eeb17055fa188376b5255d5c3f2006ed77d CVE-2024-7648,0,0,8d0848f3c912d45507f2515d657c3145304e9beedf27145e13d7372b35504285,2024-08-12T13:41:36.517000 CVE-2024-7649,0,0,71a050c23b49b2bf89e78f71215149381b0d79d78392c26dd3fc2a8745df9a5b,2024-08-12T13:41:36.517000 CVE-2024-7657,0,0,7357c1bc93f9a709f8b06e884fd3c0f42c2b2b2014ed65ebd233a5a1a23e8b32,2024-08-12T13:41:36.517000 -CVE-2024-7658,0,1,832a65f53a452b2fa1561cdaae82b94e5ac7d59bc491a09b3cdc773f704d8588,2024-08-13T17:00:19.800000 +CVE-2024-7658,0,0,832a65f53a452b2fa1561cdaae82b94e5ac7d59bc491a09b3cdc773f704d8588,2024-08-13T17:00:19.800000 CVE-2024-7659,0,0,040a09b3f31070d5196c99fc605162a62530ad9378007de9005e76d64fe2722b,2024-08-12T13:41:36.517000 CVE-2024-7660,0,0,cc5ac4ee5919f40ef0846508b6964256de615eaf415ee50d9ba90e94f96f956b,2024-08-12T13:41:36.517000 CVE-2024-7661,0,0,a2d7e427887a28613990288416ed7d3e55c875ae06f096c455e444486d94e830,2024-08-12T13:41:36.517000 @@ -259764,4 +259850,7 @@ CVE-2024-7706,0,0,1056fcaa3affff4b3f9a6b703c011337d2adc8c6bdf71227e8310823081947 CVE-2024-7707,0,0,08017af054a9aea4cbec493bee72603fd26524b137f48eec425b10e1c9a2c5ce,2024-08-13T12:58:25.437000 CVE-2024-7709,0,0,9890807a1991d90435fddd18848992ba127ee8603dc9d09cd6e46bfbc80702ff,2024-08-13T12:58:25.437000 CVE-2024-7715,0,0,643ae05734832b0ffcf6472f2acff2b54708732000601789527e246cea7413e5,2024-08-13T12:58:25.437000 -CVE-2024-7746,1,1,044d8677cf6b2af5249591875e67a177e20bc681af5642444c6a36878f418500,2024-08-13T17:11:53.553000 +CVE-2024-7733,1,1,5d726ed2f52a7b292d7032f3e931cde5bf61f68433965af87aaa4cc2bd11119b,2024-08-13T18:15:32.883000 +CVE-2024-7738,1,1,ab96ef290144d804909c71a00a70c0aad73dd2e71053f6de0f5347625db78ae7,2024-08-13T19:15:17.217000 +CVE-2024-7739,1,1,2207fa8dc824984ff75b29a4966109aef5de36899af7737c672e87354483dd1e,2024-08-13T19:15:17.530000 +CVE-2024-7746,0,0,044d8677cf6b2af5249591875e67a177e20bc681af5642444c6a36878f418500,2024-08-13T17:11:53.553000