From 6197594d4c0f45136e426f46c930417e5debd639 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 15 Aug 2024 18:03:30 +0000 Subject: [PATCH] Auto-Update: 2024-08-15T18:00:33.030202+00:00 --- CVE-2023/CVE-2023-372xx/CVE-2023-37228.json | 16 + CVE-2023/CVE-2023-505xx/CVE-2023-50569.json | 83 +---- CVE-2023/CVE-2023-525xx/CVE-2023-52539.json | 39 ++- CVE-2024/CVE-2024-08xx/CVE-2024-0801.json | 14 +- CVE-2024/CVE-2024-200xx/CVE-2024-20029.json | 39 ++- CVE-2024/CVE-2024-254xx/CVE-2024-25458.json | 39 ++- CVE-2024/CVE-2024-257xx/CVE-2024-25743.json | 27 +- CVE-2024/CVE-2024-273xx/CVE-2024-27372.json | 34 +- CVE-2024/CVE-2024-285xx/CVE-2024-28547.json | 39 ++- CVE-2024/CVE-2024-285xx/CVE-2024-28584.json | 39 ++- CVE-2024/CVE-2024-308xx/CVE-2024-30801.json | 39 ++- CVE-2024/CVE-2024-308xx/CVE-2024-30889.json | 34 +- CVE-2024/CVE-2024-316xx/CVE-2024-31610.json | 39 ++- CVE-2024/CVE-2024-317xx/CVE-2024-31798.json | 25 ++ CVE-2024/CVE-2024-317xx/CVE-2024-31799.json | 25 ++ CVE-2024/CVE-2024-318xx/CVE-2024-31800.json | 25 ++ CVE-2024/CVE-2024-319xx/CVE-2024-31905.json | 60 ++++ CVE-2024/CVE-2024-319xx/CVE-2024-31994.json | 32 +- CVE-2024/CVE-2024-329xx/CVE-2024-32917.json | 39 ++- CVE-2024/CVE-2024-332xx/CVE-2024-33220.json | 39 ++- CVE-2024/CVE-2024-333xx/CVE-2024-33308.json | 39 ++- CVE-2024/CVE-2024-339xx/CVE-2024-33957.json | 46 ++- CVE-2024/CVE-2024-339xx/CVE-2024-33958.json | 46 ++- CVE-2024/CVE-2024-339xx/CVE-2024-33975.json | 46 ++- CVE-2024/CVE-2024-339xx/CVE-2024-33976.json | 46 ++- CVE-2024/CVE-2024-339xx/CVE-2024-33977.json | 46 ++- CVE-2024/CVE-2024-339xx/CVE-2024-33978.json | 46 ++- CVE-2024/CVE-2024-339xx/CVE-2024-33982.json | 51 ++- CVE-2024/CVE-2024-339xx/CVE-2024-33983.json | 51 ++- CVE-2024/CVE-2024-339xx/CVE-2024-33984.json | 51 ++- CVE-2024/CVE-2024-339xx/CVE-2024-33985.json | 51 ++- CVE-2024/CVE-2024-339xx/CVE-2024-33986.json | 51 ++- CVE-2024/CVE-2024-339xx/CVE-2024-33987.json | 51 ++- CVE-2024/CVE-2024-339xx/CVE-2024-33988.json | 51 ++- CVE-2024/CVE-2024-339xx/CVE-2024-33989.json | 46 ++- CVE-2024/CVE-2024-339xx/CVE-2024-33990.json | 56 +++- CVE-2024/CVE-2024-339xx/CVE-2024-33991.json | 46 ++- CVE-2024/CVE-2024-339xx/CVE-2024-33992.json | 46 ++- CVE-2024/CVE-2024-339xx/CVE-2024-33993.json | 46 ++- CVE-2024/CVE-2024-341xx/CVE-2024-34118.json | 64 +++- CVE-2024/CVE-2024-341xx/CVE-2024-34133.json | 52 ++- CVE-2024/CVE-2024-341xx/CVE-2024-34134.json | 74 ++++- CVE-2024/CVE-2024-341xx/CVE-2024-34135.json | 52 ++- CVE-2024/CVE-2024-341xx/CVE-2024-34136.json | 52 ++- CVE-2024/CVE-2024-341xx/CVE-2024-34137.json | 52 ++- CVE-2024/CVE-2024-341xx/CVE-2024-34138.json | 52 ++- CVE-2024/CVE-2024-349xx/CVE-2024-34948.json | 27 +- CVE-2024/CVE-2024-361xx/CVE-2024-36136.json | 153 ++++++++- CVE-2024/CVE-2024-362xx/CVE-2024-36246.json | 39 ++- CVE-2024/CVE-2024-367xx/CVE-2024-36789.json | 39 ++- CVE-2024/CVE-2024-368xx/CVE-2024-36877.json | 4 +- CVE-2024/CVE-2024-373xx/CVE-2024-37373.json | 153 ++++++++- CVE-2024/CVE-2024-373xx/CVE-2024-37399.json | 153 ++++++++- CVE-2024/CVE-2024-375xx/CVE-2024-37568.json | 32 +- CVE-2024/CVE-2024-381xx/CVE-2024-38134.json | 119 ++++++- CVE-2024/CVE-2024-386xx/CVE-2024-38652.json | 153 ++++++++- CVE-2024/CVE-2024-386xx/CVE-2024-38653.json | 153 ++++++++- CVE-2024/CVE-2024-389xx/CVE-2024-38953.json | 64 +++- CVE-2024/CVE-2024-392xx/CVE-2024-39225.json | 9 +- CVE-2024/CVE-2024-392xx/CVE-2024-39226.json | 13 +- CVE-2024/CVE-2024-392xx/CVE-2024-39227.json | 13 +- CVE-2024/CVE-2024-392xx/CVE-2024-39228.json | 11 +- CVE-2024/CVE-2024-392xx/CVE-2024-39229.json | 11 +- CVE-2024/CVE-2024-394xx/CVE-2024-39420.json | 95 +++++- CVE-2024/CVE-2024-394xx/CVE-2024-39422.json | 73 +++- CVE-2024/CVE-2024-394xx/CVE-2024-39423.json | 73 +++- CVE-2024/CVE-2024-394xx/CVE-2024-39424.json | 83 ++++- CVE-2024/CVE-2024-394xx/CVE-2024-39425.json | 73 +++- CVE-2024/CVE-2024-394xx/CVE-2024-39426.json | 73 +++- CVE-2024/CVE-2024-397xx/CVE-2024-39708.json | 6 +- CVE-2024/CVE-2024-407xx/CVE-2024-40704.json | 60 ++++ CVE-2024/CVE-2024-407xx/CVE-2024-40705.json | 60 ++++ CVE-2024/CVE-2024-407xx/CVE-2024-40779.json | 258 ++++++++++++++- CVE-2024/CVE-2024-407xx/CVE-2024-40780.json | 258 ++++++++++++++- CVE-2024/CVE-2024-407xx/CVE-2024-40785.json | 253 +++++++++++++- CVE-2024/CVE-2024-407xx/CVE-2024-40786.json | 141 +++++++- CVE-2024/CVE-2024-408xx/CVE-2024-40806.json | 213 ++++++++++-- CVE-2024/CVE-2024-408xx/CVE-2024-40807.json | 109 +++++- CVE-2024/CVE-2024-408xx/CVE-2024-40809.json | 195 ++++++++++- CVE-2024/CVE-2024-408xx/CVE-2024-40812.json | 188 ++++++++++- CVE-2024/CVE-2024-408xx/CVE-2024-40813.json | 95 +++++- CVE-2024/CVE-2024-408xx/CVE-2024-40815.json | 150 ++++++++- CVE-2024/CVE-2024-408xx/CVE-2024-40816.json | 109 +++++- CVE-2024/CVE-2024-408xx/CVE-2024-40817.json | 134 +++++++- CVE-2024/CVE-2024-408xx/CVE-2024-40818.json | 158 ++++++++- CVE-2024/CVE-2024-408xx/CVE-2024-40822.json | 139 +++++++- CVE-2024/CVE-2024-408xx/CVE-2024-40823.json | 109 +++++- CVE-2024/CVE-2024-418xx/CVE-2024-41830.json | 73 +++- CVE-2024/CVE-2024-418xx/CVE-2024-41831.json | 73 +++- CVE-2024/CVE-2024-418xx/CVE-2024-41832.json | 73 +++- CVE-2024/CVE-2024-418xx/CVE-2024-41833.json | 73 +++- CVE-2024/CVE-2024-418xx/CVE-2024-41834.json | 73 +++- CVE-2024/CVE-2024-418xx/CVE-2024-41835.json | 83 ++++- CVE-2024/CVE-2024-425xx/CVE-2024-42546.json | 34 +- CVE-2024/CVE-2024-426xx/CVE-2024-42624.json | 34 +- CVE-2024/CVE-2024-426xx/CVE-2024-42628.json | 34 +- CVE-2024/CVE-2024-426xx/CVE-2024-42676.json | 41 ++- CVE-2024/CVE-2024-426xx/CVE-2024-42677.json | 4 +- CVE-2024/CVE-2024-426xx/CVE-2024-42678.json | 4 +- CVE-2024/CVE-2024-426xx/CVE-2024-42679.json | 4 +- CVE-2024/CVE-2024-426xx/CVE-2024-42680.json | 4 +- CVE-2024/CVE-2024-426xx/CVE-2024-42681.json | 21 ++ CVE-2024/CVE-2024-428xx/CVE-2024-42843.json | 21 ++ CVE-2024/CVE-2024-429xx/CVE-2024-42940.json | 21 ++ CVE-2024/CVE-2024-429xx/CVE-2024-42941.json | 21 ++ CVE-2024/CVE-2024-429xx/CVE-2024-42942.json | 21 ++ CVE-2024/CVE-2024-429xx/CVE-2024-42943.json | 21 ++ CVE-2024/CVE-2024-429xx/CVE-2024-42944.json | 21 ++ CVE-2024/CVE-2024-429xx/CVE-2024-42945.json | 21 ++ CVE-2024/CVE-2024-429xx/CVE-2024-42946.json | 21 ++ CVE-2024/CVE-2024-429xx/CVE-2024-42947.json | 21 ++ CVE-2024/CVE-2024-429xx/CVE-2024-42948.json | 21 ++ CVE-2024/CVE-2024-429xx/CVE-2024-42949.json | 21 ++ CVE-2024/CVE-2024-429xx/CVE-2024-42950.json | 21 ++ CVE-2024/CVE-2024-429xx/CVE-2024-42951.json | 21 ++ CVE-2024/CVE-2024-429xx/CVE-2024-42952.json | 21 ++ CVE-2024/CVE-2024-429xx/CVE-2024-42953.json | 21 ++ CVE-2024/CVE-2024-429xx/CVE-2024-42954.json | 21 ++ CVE-2024/CVE-2024-429xx/CVE-2024-42955.json | 21 ++ CVE-2024/CVE-2024-429xx/CVE-2024-42966.json | 21 ++ CVE-2024/CVE-2024-429xx/CVE-2024-42967.json | 21 ++ CVE-2024/CVE-2024-429xx/CVE-2024-42968.json | 21 ++ CVE-2024/CVE-2024-429xx/CVE-2024-42969.json | 21 ++ CVE-2024/CVE-2024-429xx/CVE-2024-42973.json | 21 ++ CVE-2024/CVE-2024-429xx/CVE-2024-42974.json | 21 ++ CVE-2024/CVE-2024-429xx/CVE-2024-42976.json | 21 ++ CVE-2024/CVE-2024-429xx/CVE-2024-42977.json | 21 ++ CVE-2024/CVE-2024-429xx/CVE-2024-42978.json | 21 ++ CVE-2024/CVE-2024-429xx/CVE-2024-42979.json | 21 ++ CVE-2024/CVE-2024-429xx/CVE-2024-42980.json | 21 ++ CVE-2024/CVE-2024-429xx/CVE-2024-42981.json | 21 ++ CVE-2024/CVE-2024-429xx/CVE-2024-42982.json | 21 ++ CVE-2024/CVE-2024-429xx/CVE-2024-42983.json | 21 ++ CVE-2024/CVE-2024-429xx/CVE-2024-42984.json | 21 ++ CVE-2024/CVE-2024-429xx/CVE-2024-42985.json | 21 ++ CVE-2024/CVE-2024-429xx/CVE-2024-42986.json | 21 ++ CVE-2024/CVE-2024-429xx/CVE-2024-42987.json | 21 ++ CVE-2024/CVE-2024-433xx/CVE-2024-43373.json | 4 +- CVE-2024/CVE-2024-60xx/CVE-2024-6041.json | 65 +++- CVE-2024/CVE-2024-60xx/CVE-2024-6042.json | 66 +++- CVE-2024/CVE-2024-60xx/CVE-2024-6050.json | 72 +++- CVE-2024/CVE-2024-63xx/CVE-2024-6347.json | 4 +- CVE-2024/CVE-2024-64xx/CVE-2024-6417.json | 65 +++- CVE-2024/CVE-2024-64xx/CVE-2024-6418.json | 76 ++++- CVE-2024/CVE-2024-64xx/CVE-2024-6419.json | 65 +++- CVE-2024/CVE-2024-72xx/CVE-2024-7262.json | 4 +- CVE-2024/CVE-2024-72xx/CVE-2024-7263.json | 4 +- CVE-2024/CVE-2024-76xx/CVE-2024-7645.json | 68 +++- CVE-2024/CVE-2024-76xx/CVE-2024-7657.json | 64 +++- CVE-2024/CVE-2024-76xx/CVE-2024-7659.json | 74 ++++- CVE-2024/CVE-2024-76xx/CVE-2024-7660.json | 79 ++++- CVE-2024/CVE-2024-76xx/CVE-2024-7661.json | 69 +++- CVE-2024/CVE-2024-76xx/CVE-2024-7662.json | 70 +++- CVE-2024/CVE-2024-76xx/CVE-2024-7663.json | 70 +++- CVE-2024/CVE-2024-76xx/CVE-2024-7664.json | 80 ++++- CVE-2024/CVE-2024-77xx/CVE-2024-7748.json | 69 +++- CVE-2024/CVE-2024-77xx/CVE-2024-7749.json | 69 +++- CVE-2024/CVE-2024-77xx/CVE-2024-7750.json | 69 +++- CVE-2024/CVE-2024-77xx/CVE-2024-7751.json | 70 +++- CVE-2024/CVE-2024-77xx/CVE-2024-7752.json | 70 +++- CVE-2024/CVE-2024-77xx/CVE-2024-7753.json | 70 +++- CVE-2024/CVE-2024-77xx/CVE-2024-7754.json | 70 +++- CVE-2024/CVE-2024-78xx/CVE-2024-7828.json | 6 +- CVE-2024/CVE-2024-78xx/CVE-2024-7829.json | 6 +- CVE-2024/CVE-2024-78xx/CVE-2024-7830.json | 6 +- CVE-2024/CVE-2024-78xx/CVE-2024-7831.json | 6 +- CVE-2024/CVE-2024-78xx/CVE-2024-7832.json | 8 +- CVE-2024/CVE-2024-78xx/CVE-2024-7833.json | 4 +- README.md | 96 +++--- _state.csv | 347 +++++++++++--------- 170 files changed, 8769 insertions(+), 846 deletions(-) create mode 100644 CVE-2023/CVE-2023-372xx/CVE-2023-37228.json create mode 100644 CVE-2024/CVE-2024-317xx/CVE-2024-31798.json create mode 100644 CVE-2024/CVE-2024-317xx/CVE-2024-31799.json create mode 100644 CVE-2024/CVE-2024-318xx/CVE-2024-31800.json create mode 100644 CVE-2024/CVE-2024-319xx/CVE-2024-31905.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40704.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40705.json create mode 100644 CVE-2024/CVE-2024-426xx/CVE-2024-42681.json create mode 100644 CVE-2024/CVE-2024-428xx/CVE-2024-42843.json create mode 100644 CVE-2024/CVE-2024-429xx/CVE-2024-42940.json create mode 100644 CVE-2024/CVE-2024-429xx/CVE-2024-42941.json create mode 100644 CVE-2024/CVE-2024-429xx/CVE-2024-42942.json create mode 100644 CVE-2024/CVE-2024-429xx/CVE-2024-42943.json create mode 100644 CVE-2024/CVE-2024-429xx/CVE-2024-42944.json create mode 100644 CVE-2024/CVE-2024-429xx/CVE-2024-42945.json create mode 100644 CVE-2024/CVE-2024-429xx/CVE-2024-42946.json create mode 100644 CVE-2024/CVE-2024-429xx/CVE-2024-42947.json create mode 100644 CVE-2024/CVE-2024-429xx/CVE-2024-42948.json create mode 100644 CVE-2024/CVE-2024-429xx/CVE-2024-42949.json create mode 100644 CVE-2024/CVE-2024-429xx/CVE-2024-42950.json create mode 100644 CVE-2024/CVE-2024-429xx/CVE-2024-42951.json create mode 100644 CVE-2024/CVE-2024-429xx/CVE-2024-42952.json create mode 100644 CVE-2024/CVE-2024-429xx/CVE-2024-42953.json create mode 100644 CVE-2024/CVE-2024-429xx/CVE-2024-42954.json create mode 100644 CVE-2024/CVE-2024-429xx/CVE-2024-42955.json create mode 100644 CVE-2024/CVE-2024-429xx/CVE-2024-42966.json create mode 100644 CVE-2024/CVE-2024-429xx/CVE-2024-42967.json create mode 100644 CVE-2024/CVE-2024-429xx/CVE-2024-42968.json create mode 100644 CVE-2024/CVE-2024-429xx/CVE-2024-42969.json create mode 100644 CVE-2024/CVE-2024-429xx/CVE-2024-42973.json create mode 100644 CVE-2024/CVE-2024-429xx/CVE-2024-42974.json create mode 100644 CVE-2024/CVE-2024-429xx/CVE-2024-42976.json create mode 100644 CVE-2024/CVE-2024-429xx/CVE-2024-42977.json create mode 100644 CVE-2024/CVE-2024-429xx/CVE-2024-42978.json create mode 100644 CVE-2024/CVE-2024-429xx/CVE-2024-42979.json create mode 100644 CVE-2024/CVE-2024-429xx/CVE-2024-42980.json create mode 100644 CVE-2024/CVE-2024-429xx/CVE-2024-42981.json create mode 100644 CVE-2024/CVE-2024-429xx/CVE-2024-42982.json create mode 100644 CVE-2024/CVE-2024-429xx/CVE-2024-42983.json create mode 100644 CVE-2024/CVE-2024-429xx/CVE-2024-42984.json create mode 100644 CVE-2024/CVE-2024-429xx/CVE-2024-42985.json create mode 100644 CVE-2024/CVE-2024-429xx/CVE-2024-42986.json create mode 100644 CVE-2024/CVE-2024-429xx/CVE-2024-42987.json diff --git a/CVE-2023/CVE-2023-372xx/CVE-2023-37228.json b/CVE-2023/CVE-2023-372xx/CVE-2023-37228.json new file mode 100644 index 00000000000..0e41e645bb4 --- /dev/null +++ b/CVE-2023/CVE-2023-372xx/CVE-2023-37228.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2023-37228", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T16:15:16.890", + "lastModified": "2024-08-15T16:15:16.890", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-505xx/CVE-2023-50569.json b/CVE-2023/CVE-2023-505xx/CVE-2023-50569.json index 7a4a981761a..11d75f2a8d5 100644 --- a/CVE-2023/CVE-2023-505xx/CVE-2023-50569.json +++ b/CVE-2023/CVE-2023-505xx/CVE-2023-50569.json @@ -2,88 +2,15 @@ "id": "CVE-2023-50569", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-22T11:15:07.840", - "lastModified": "2023-12-29T06:23:17.293", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-15T16:15:17.360", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Reflected Cross Site Scripting (XSS) vulnerability in Cacti v1.2.25, allows remote attackers to escalate privileges when uploading an xml template file via templates_import.php." - }, - { - "lang": "es", - "value": "Vulnerabilidad de Cross Site Scripting (XSS) reflejado en Cacti v1.2.25, permite a atacantes remotos escalar privilegios al cargar un archivo de plantilla xml a trav\u00e9s de templates_import.php." + "value": "Rejected reason: DO NOT USE THIS CVE RECORD. Consult IDs: CVE-2023-50250. Reason: This record is a reservation duplicate of CVE-2023-50250. Notes: All CVE users should reference CVE-2023-50250 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "CHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 6.1, - "baseSeverity": "MEDIUM" - }, - "exploitabilityScore": 2.8, - "impactScore": 2.7 - } - ] - }, - "weaknesses": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-79" - } - ] - } - ], - "configurations": [ - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cacti:cacti:1.2.25:*:*:*:*:*:*:*", - "matchCriteriaId": "EF5814EC-CFCB-4066-9260-FF78B45E2089" - } - ] - } - ] - } - ], - "references": [ - { - "url": "https://gist.github.com/ISHGARD-2/a6b57de899f977e2af41780e7428b4bf", - "source": "cve@mitre.org", - "tags": [ - "Exploit", - "Third Party Advisory" - ] - }, - { - "url": "https://github.com/Cacti/cacti/security/advisories/GHSA-xwqc-7jc4-xm73", - "source": "cve@mitre.org", - "tags": [ - "Exploit", - "Vendor Advisory" - ] - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52539.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52539.json index f72753f70f8..9f0f1dc1e3e 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52539.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52539.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52539", "sourceIdentifier": "psirt@huawei.com", "published": "2024-04-08T09:15:08.500", - "lastModified": "2024-04-08T18:48:40.217", + "lastModified": "2024-08-15T17:35:01.503", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de verificaci\u00f3n de permisos en el m\u00f3dulo de Configuraci\u00f3n. Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/", diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0801.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0801.json index fd037c3b17d..7956d24d1a7 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0801.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0801.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0801", "sourceIdentifier": "vulnreport@tenable.com", "published": "2024-03-13T19:15:46.943", - "lastModified": "2024-03-14T12:52:21.763", + "lastModified": "2024-08-15T17:35:02.350", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-75" + } + ] + } + ], "references": [ { "url": "https://www.tenable.com/security/research/tra-2024-07", diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20029.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20029.json index bd312caf4e3..5bdfe0a38a0 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20029.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20029.json @@ -2,7 +2,7 @@ "id": "CVE-2024-20029", "sourceIdentifier": "security@mediatek.com", "published": "2024-03-04T03:15:07.453", - "lastModified": "2024-03-04T13:58:23.447", + "lastModified": "2024-08-15T17:35:03.250", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el firmware WLAN, existe una posible escritura fuera de los l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08477406; ID del problema: MSV-1010." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/March-2024", diff --git a/CVE-2024/CVE-2024-254xx/CVE-2024-25458.json b/CVE-2024/CVE-2024-254xx/CVE-2024-25458.json index de883065a4d..d6e4da84238 100644 --- a/CVE-2024/CVE-2024-254xx/CVE-2024-25458.json +++ b/CVE-2024/CVE-2024-254xx/CVE-2024-25458.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25458", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T19:15:22.333", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-08-15T16:35:03.913", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en el firmware de la c\u00e1mara CYCZCAM, SHIX ZHAO, SHIXCAM A9 (identificador de placa de circuito A9-48B-V1.0) v.CYCAM_48B_BC01_v87_0903 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de una solicitud manipulada a un puerto UDP." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://tanzhuyin.com/posts/cve-2024-25458/", diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25743.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25743.json index 665280607eb..f94bade6df1 100644 --- a/CVE-2024/CVE-2024-257xx/CVE-2024-25743.json +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25743.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25743", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-15T18:15:10.837", - "lastModified": "2024-05-17T22:15:07.310", + "lastModified": "2024-08-15T16:35:04.743", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux hasta 6.7.2, un hipervisor que no es de confianza puede inyectar interrupciones virtuales 0 y 14 en cualquier momento y puede activar el controlador de se\u00f1ales SIGFPE en aplicaciones de espacio de usuario. Esto afecta a AMD SEV-SNP y AMD SEV-ES." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, "references": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270836", diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27372.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27372.json index cdd5bd22d21..472d11578dd 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27372.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27372.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27372", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-05T19:15:12.893", - "lastModified": "2024-06-27T16:41:21.603", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-15T16:35:04.970", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -37,6 +37,26 @@ "exploitabilityScore": 1.8, "impactScore": 5.9 }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + }, { "source": "cve@mitre.org", "type": "Secondary", @@ -69,6 +89,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28547.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28547.json index 887cffae4f1..33f65d03b8c 100644 --- a/CVE-2024/CVE-2024-285xx/CVE-2024-28547.json +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28547.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28547", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-18T14:15:10.010", - "lastModified": "2024-03-18T19:40:00.173", + "lastModified": "2024-08-15T17:35:04.350", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Tenda AC18 V15.03.05.05 tiene una vulnerabilidad de desbordamiento de pila en el par\u00e1metro firewallEn de la funci\u00f3n formSetFirewallCfg." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/formSetFirewallCfg.md", diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28584.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28584.json index 08596215c91..3cbf534b786 100644 --- a/CVE-2024/CVE-2024-285xx/CVE-2024-28584.json +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28584.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28584", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T06:15:12.247", - "lastModified": "2024-05-01T18:15:17.567", + "lastModified": "2024-08-15T16:35:06.133", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de desreferencia de puntero nulo en open source FreeImage v.3.19.0 [r1909] permite que un atacante local provoque una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de la funci\u00f3n J2KImageToFIBITMAP() al leer im\u00e1genes en formato J2K." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/04/11/10", diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30801.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30801.json index c80ffd3050b..a62de541240 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30801.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30801.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30801", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:23:52.670", - "lastModified": "2024-05-14T16:13:02.773", + "lastModified": "2024-08-15T17:35:05.230", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en Cloud based customer service management platform v.1.0.0 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado para el componente Login.asp." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "http://cloud.com", diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30889.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30889.json index e0c1e519c58..c28057be258 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30889.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30889.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30889", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-04T22:15:10.243", - "lastModified": "2024-06-06T19:09:09.840", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-15T16:35:07.067", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-316xx/CVE-2024-31610.json b/CVE-2024/CVE-2024-316xx/CVE-2024-31610.json index 977ab63cc67..00d8b5fb653 100644 --- a/CVE-2024/CVE-2024-316xx/CVE-2024-31610.json +++ b/CVE-2024/CVE-2024-316xx/CVE-2024-31610.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31610", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-25T22:15:08.993", - "lastModified": "2024-04-26T12:58:17.720", + "lastModified": "2024-08-15T16:35:07.883", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de carga de archivos en la funci\u00f3n para que los empleados carguen avatares en Code-Projects Simple School Management System v1.0 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la carga de un archivo manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://github.com/ss122-0ss/School/blob/main/readme.md", diff --git a/CVE-2024/CVE-2024-317xx/CVE-2024-31798.json b/CVE-2024/CVE-2024-317xx/CVE-2024-31798.json new file mode 100644 index 00000000000..5583cba80d6 --- /dev/null +++ b/CVE-2024/CVE-2024-317xx/CVE-2024-31798.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-31798", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:17.013", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Identical Hardcoded Root Password for All Devices in GNCC's GC2 Indoor Security Camera 1080P allows an attacker with physical access to retrieve the root password for all similar devices" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gncchome.com/collections/indoor-camera/products/c2-indoor-security-camera-1080p", + "source": "cve@mitre.org" + }, + { + "url": "https://www.nsideattacklogic.de/advisories/NSIDE-SA-2024-001", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-317xx/CVE-2024-31799.json b/CVE-2024/CVE-2024-317xx/CVE-2024-31799.json new file mode 100644 index 00000000000..e28cfe0edfb --- /dev/null +++ b/CVE-2024/CVE-2024-317xx/CVE-2024-31799.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-31799", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:17.127", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Information Disclosure in GNCC's GC2 Indoor Security Camera 1080P allows an attacker with physical access to read the WiFi passphrase via the UART Debugging Port." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gncchome.com/collections/indoor-camera/products/c2-indoor-security-camera-1080p", + "source": "cve@mitre.org" + }, + { + "url": "https://www.nsideattacklogic.de/advisories/NSIDE-SA-2024-001", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31800.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31800.json new file mode 100644 index 00000000000..9e82e864c8c --- /dev/null +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31800.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-31800", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:17.220", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Authentication Bypass in GNCC's GC2 Indoor Security Camera 1080P allows an attacker with physical access to gain a privileged command shell via the UART Debugging Port." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gncchome.com/collections/indoor-camera/products/c2-indoor-security-camera-1080p", + "source": "cve@mitre.org" + }, + { + "url": "https://www.nsideattacklogic.de/advisories/NSIDE-SA-2024-001", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31905.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31905.json new file mode 100644 index 00000000000..128f740f3fb --- /dev/null +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31905.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-31905", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-08-15T17:15:17.310", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM QRadar Network Packet Capture 7.5 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 289858." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-311" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/289858", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7160961", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31994.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31994.json index 4c9c2b7db08..d0fae82ff86 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31994.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31994.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31994", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-19T22:15:07.747", - "lastModified": "2024-04-22T13:28:43.747", + "lastModified": "2024-08-15T16:35:08.717", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.0, "impactScore": 4.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.0, + "impactScore": 4.0 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-400" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32917.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32917.json index 42c678644dc..5550d78991f 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32917.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32917.json @@ -2,7 +2,7 @@ "id": "CVE-2024-32917", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:55.603", - "lastModified": "2024-06-17T12:43:31.090", + "lastModified": "2024-08-15T16:35:09.653", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En pl330_dma_from_peri_start() de fp_spi_dma.c, hay una posible escritura fuera de los l\u00edmites debido a una comprobaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33220.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33220.json index 01c236930a6..9c0e4e51791 100644 --- a/CVE-2024/CVE-2024-332xx/CVE-2024-33220.json +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33220.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33220", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-22T15:15:28.780", - "lastModified": "2024-05-22T18:59:20.240", + "lastModified": "2024-08-15T17:35:06.067", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en el componente AslO3_64.sys de ASUSTeK Computer Inc AISuite3 v3.03.36 3.03.36 permite a los atacantes escalar privilegios y ejecutar c\u00f3digo arbitrario mediante el env\u00edo de solicitudes IOCTL manipuladas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-782" + } + ] + } + ], "references": [ { "url": "https://github.com/DriverHunter/Win-Driver-EXP/tree/main/CVE-2024-33220", diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33308.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33308.json index acd091bb593..4353b80073e 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33308.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33308.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33308", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T15:15:53.240", - "lastModified": "2024-08-02T03:15:26.030", + "lastModified": "2024-08-15T16:35:10.703", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -22,7 +22,42 @@ "value": "Un problema en TVS Motor Company Limited TVS Connet Android v.4.5.1 e iOS v.5.0.0 permite a un atacante remoto escalar privilegios a trav\u00e9s de la funci\u00f3n de contacto de emergencia." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://github.com/aaravavi/TVS-Connect-Application-VAPT", diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33957.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33957.json index 8ed95405b7d..41e25ad53fb 100644 --- a/CVE-2024/CVE-2024-339xx/CVE-2024-33957.json +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33957.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33957", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-08-06T11:16:04.443", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T16:47:12.787", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -51,10 +71,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:young_entrepreneur_e-negosyo_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "95465CC0-716F-4500-A34E-394A8CE3C505" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33958.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33958.json index 763422d2ff3..76250631324 100644 --- a/CVE-2024/CVE-2024-339xx/CVE-2024-33958.json +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33958.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33958", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-08-06T11:16:04.920", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T16:49:23.533", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -51,10 +71,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:young_entrepreneur_e-negosyo_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "95465CC0-716F-4500-A34E-394A8CE3C505" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33975.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33975.json index 3c80cdb7b31..099dbbb2959 100644 --- a/CVE-2024/CVE-2024-339xx/CVE-2024-33975.json +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33975.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33975", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-08-06T11:16:05.343", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T16:50:35.723", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -51,10 +71,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:young_entrepreneur_e-negosyo_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "95465CC0-716F-4500-A34E-394A8CE3C505" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33976.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33976.json index 335cde183b8..09694e03a85 100644 --- a/CVE-2024/CVE-2024-339xx/CVE-2024-33976.json +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33976.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33976", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-08-06T11:16:05.580", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T16:51:02.450", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -51,10 +71,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:young_entrepreneur_e-negosyo_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "95465CC0-716F-4500-A34E-394A8CE3C505" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33977.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33977.json index dbdef873c89..d4576d0e9e0 100644 --- a/CVE-2024/CVE-2024-339xx/CVE-2024-33977.json +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33977.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33977", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-08-06T11:16:05.793", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T16:53:04.110", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -51,10 +71,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:young_entrepreneur_e-negosyo_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "95465CC0-716F-4500-A34E-394A8CE3C505" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33978.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33978.json index 38e683cd848..4fce045390b 100644 --- a/CVE-2024/CVE-2024-339xx/CVE-2024-33978.json +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33978.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33978", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-08-06T11:16:06.017", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T16:54:57.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -51,10 +71,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:young_entrepreneur_e-negosyo_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "95465CC0-716F-4500-A34E-394A8CE3C505" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33982.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33982.json index 6d58aea3ade..a01691008b9 100644 --- a/CVE-2024/CVE-2024-339xx/CVE-2024-33982.json +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33982.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33982", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-08-06T13:15:53.257", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-15T16:55:41.983", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -51,10 +71,35 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:school_attendence_monitoring_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9E6B8938-87CD-4605-98EF-F9830FE8EC3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:school_event_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7C436FF2-199A-4964-9C5A-600289DC83C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33983.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33983.json index 0b28c68cdc8..dd5142dc32c 100644 --- a/CVE-2024/CVE-2024-339xx/CVE-2024-33983.json +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33983.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33983", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-08-06T13:15:53.480", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-15T16:56:21.197", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -51,10 +71,35 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:school_attendence_monitoring_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9E6B8938-87CD-4605-98EF-F9830FE8EC3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:school_event_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7C436FF2-199A-4964-9C5A-600289DC83C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33984.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33984.json index 3d588fdaa88..cab76dd96c8 100644 --- a/CVE-2024/CVE-2024-339xx/CVE-2024-33984.json +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33984.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33984", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-08-06T13:15:53.693", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-15T16:56:33.433", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -51,10 +71,35 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:school_attendence_monitoring_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9E6B8938-87CD-4605-98EF-F9830FE8EC3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:school_event_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7C436FF2-199A-4964-9C5A-600289DC83C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33985.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33985.json index 04f4c34e8fc..c13d0ea6491 100644 --- a/CVE-2024/CVE-2024-339xx/CVE-2024-33985.json +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33985.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33985", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-08-06T13:15:53.907", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-15T16:57:29.493", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -51,10 +71,35 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:school_attendence_monitoring_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9E6B8938-87CD-4605-98EF-F9830FE8EC3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:school_event_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7C436FF2-199A-4964-9C5A-600289DC83C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33986.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33986.json index f425d85985f..4a860925d2a 100644 --- a/CVE-2024/CVE-2024-339xx/CVE-2024-33986.json +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33986.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33986", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-08-06T13:15:54.123", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-15T16:57:09.407", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -51,10 +71,35 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:school_attendence_monitoring_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9E6B8938-87CD-4605-98EF-F9830FE8EC3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:school_event_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7C436FF2-199A-4964-9C5A-600289DC83C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33987.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33987.json index b3860a19812..49d4f1ea108 100644 --- a/CVE-2024/CVE-2024-339xx/CVE-2024-33987.json +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33987.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33987", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-08-06T13:15:54.327", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-15T16:57:00.150", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -51,10 +71,35 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:school_attendence_monitoring_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9E6B8938-87CD-4605-98EF-F9830FE8EC3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:school_event_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7C436FF2-199A-4964-9C5A-600289DC83C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33988.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33988.json index 78994c1934d..4d7161c8468 100644 --- a/CVE-2024/CVE-2024-339xx/CVE-2024-33988.json +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33988.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33988", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-08-06T13:15:54.547", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-15T16:56:51.767", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -51,10 +71,35 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:school_attendence_monitoring_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9E6B8938-87CD-4605-98EF-F9830FE8EC3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:school_event_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7C436FF2-199A-4964-9C5A-600289DC83C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33989.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33989.json index 1c7c997e0c9..f3546971568 100644 --- a/CVE-2024/CVE-2024-339xx/CVE-2024-33989.json +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33989.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33989", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-08-06T13:15:54.757", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-15T16:58:03.693", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -51,10 +71,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:school_event_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7C436FF2-199A-4964-9C5A-600289DC83C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33990.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33990.json index 9e1b5a754de..dba6daea201 100644 --- a/CVE-2024/CVE-2024-339xx/CVE-2024-33990.json +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33990.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33990", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-08-06T13:15:54.973", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-15T16:58:21.570", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -51,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:school_event_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7C436FF2-199A-4964-9C5A-600289DC83C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33991.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33991.json index 38b46c1eab9..841439ef0da 100644 --- a/CVE-2024/CVE-2024-339xx/CVE-2024-33991.json +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33991.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33991", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-08-06T13:15:55.250", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-15T16:58:42.497", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -51,10 +71,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:school_event_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7C436FF2-199A-4964-9C5A-600289DC83C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33992.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33992.json index 34d6cd5c1ed..7d76b33c0c6 100644 --- a/CVE-2024/CVE-2024-339xx/CVE-2024-33992.json +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33992.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33992", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-08-06T13:15:55.487", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-15T16:58:58.480", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -51,10 +71,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:school_event_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7C436FF2-199A-4964-9C5A-600289DC83C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33993.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33993.json index aabf684107d..fb2a2e51ca8 100644 --- a/CVE-2024/CVE-2024-339xx/CVE-2024-33993.json +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33993.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33993", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-08-06T13:15:55.693", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-15T16:59:06.307", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -51,10 +71,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:school_event_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7C436FF2-199A-4964-9C5A-600289DC83C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34118.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34118.json index 33d3f1349df..65a055d0274 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34118.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34118.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34118", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:18.657", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T16:48:41.250", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -37,8 +37,18 @@ }, "weaknesses": [ { - "source": "psirt@adobe.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "psirt@adobe.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -47,10 +57,56 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "27.0.0", + "versionEndExcluding": "27.9.5", + "matchCriteriaId": "AAA22FF1-4262-476F-A57F-2140A9C66F70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "28.0", + "versionEndExcluding": "28.6", + "matchCriteriaId": "0CAA6BF3-38F6-4E33-9D80-66CE521775AA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/illustrator/apsb24-45.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34133.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34133.json index d2911357f27..ace9b0f1343 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34133.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34133.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34133", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:19.867", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T16:48:11.847", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -47,10 +47,56 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "27.0.0", + "versionEndExcluding": "27.9.5", + "matchCriteriaId": "AAA22FF1-4262-476F-A57F-2140A9C66F70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "28.0", + "versionEndExcluding": "28.6", + "matchCriteriaId": "0CAA6BF3-38F6-4E33-9D80-66CE521775AA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/illustrator/apsb24-45.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34134.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34134.json index 4219d156841..5d0e1e66d92 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34134.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34134.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34134", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:20.107", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T16:47:51.770", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -14,8 +14,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "psirt@adobe.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, + { + "source": "psirt@adobe.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L", @@ -47,10 +67,56 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "27.0.0", + "versionEndExcluding": "27.9.5", + "matchCriteriaId": "AAA22FF1-4262-476F-A57F-2140A9C66F70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "28.0", + "versionEndExcluding": "28.6", + "matchCriteriaId": "0CAA6BF3-38F6-4E33-9D80-66CE521775AA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/illustrator/apsb24-45.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34135.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34135.json index 326f36f1ba9..68a30d125c2 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34135.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34135.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34135", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:20.347", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T16:47:32.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -47,10 +47,56 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "27.0.0", + "versionEndExcluding": "27.9.5", + "matchCriteriaId": "AAA22FF1-4262-476F-A57F-2140A9C66F70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "28.0", + "versionEndExcluding": "28.6", + "matchCriteriaId": "0CAA6BF3-38F6-4E33-9D80-66CE521775AA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/illustrator/apsb24-45.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34136.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34136.json index 7f08b0fdcef..a68f3c4fffd 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34136.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34136.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34136", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:20.570", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T16:42:26.677", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -47,10 +47,56 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "27.0.0", + "versionEndExcluding": "27.9.5", + "matchCriteriaId": "AAA22FF1-4262-476F-A57F-2140A9C66F70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "28.0", + "versionEndExcluding": "28.6", + "matchCriteriaId": "0CAA6BF3-38F6-4E33-9D80-66CE521775AA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/illustrator/apsb24-45.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34137.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34137.json index a0d06e7968d..add0ddf362a 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34137.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34137.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34137", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:20.793", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T16:42:15.847", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -47,10 +47,56 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "27.0.0", + "versionEndExcluding": "27.9.5", + "matchCriteriaId": "AAA22FF1-4262-476F-A57F-2140A9C66F70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "28.0", + "versionEndExcluding": "28.6", + "matchCriteriaId": "0CAA6BF3-38F6-4E33-9D80-66CE521775AA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/illustrator/apsb24-45.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34138.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34138.json index 5effd8228c3..ad2c69c92af 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34138.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34138.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34138", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:21.040", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T16:36:24.433", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -47,10 +47,56 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "27.0.0", + "versionEndExcluding": "27.9.5", + "matchCriteriaId": "AAA22FF1-4262-476F-A57F-2140A9C66F70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "28.0", + "versionEndExcluding": "28.6", + "matchCriteriaId": "0CAA6BF3-38F6-4E33-9D80-66CE521775AA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/illustrator/apsb24-45.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34948.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34948.json index b024faa2bcb..6f7bc852287 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34948.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34948.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34948", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-20T17:15:09.600", - "lastModified": "2024-05-20T19:34:58.277", + "lastModified": "2024-08-15T17:35:06.870", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Un problema en Quanxun Huiju Network Technology (Beijing) Co., Ltd IK-Q3000 3.7.10 x64 Build202401261655 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) al intentar realizar conexiones TCP." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://gist.github.com/wuyuhang422/8de771b0b4538eb6fa23cf8282061209", diff --git a/CVE-2024/CVE-2024-361xx/CVE-2024-36136.json b/CVE-2024/CVE-2024-361xx/CVE-2024-36136.json index ae01cef8e93..9edd286b7f1 100644 --- a/CVE-2024/CVE-2024-361xx/CVE-2024-36136.json +++ b/CVE-2024/CVE-2024-361xx/CVE-2024-36136.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36136", "sourceIdentifier": "support@hackerone.com", "published": "2024-08-14T03:15:04.390", - "lastModified": "2024-08-14T14:35:25.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-15T17:31:15.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "support@hackerone.com", @@ -40,6 +62,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-193" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +83,125 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.1:*:*:*:premise:*:*:*", + "matchCriteriaId": "6060540C-A977-4E2A-8E1B-41CC3C3E92ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.1.1507:*:*:*:premise:*:*:*", + "matchCriteriaId": "771C1447-6F5E-45DE-BDE6-8FFBB4708D67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "778D9C09-12BB-47FC-B74B-DC114AE3A540" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.2:*:*:*:*:windows:*:*", + "matchCriteriaId": "617DA85C-5FCE-4650-99AA-A1052E690B2C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.2:*:*:*:premise:*:*:*", + "matchCriteriaId": "44ABD265-3F8F-415A-96B3-16975661CDEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.2.3490:*:*:*:*:*:*:*", + "matchCriteriaId": "CF93250C-0754-4B87-9BBE-DDF255EEB157" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.2.3490:*:*:*:premise:*:*:*", + "matchCriteriaId": "521CD0B6-8348-41D6-8AD8-79F884F4F10F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "3162335B-9FA4-4AC3-85F0-BD34F859EDFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.3:*:*:*:premise:*:*:*", + "matchCriteriaId": "03E7F6CA-8A72-4A3E-A281-2A7653162FB3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.3.101:*:*:*:*:*:*:*", + "matchCriteriaId": "E2AB421E-C976-4CFF-93F9-40354CB579C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.3.101:*:*:*:premise:*:*:*", + "matchCriteriaId": "4C581973-06B3-4E16-B37C-41FE7B4388CB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "FE9E1AF8-A8ED-4E49-B25F-E27AD4B61E7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.4:*:*:*:premise:*:*:*", + "matchCriteriaId": "3CC6AA75-22CD-4588-A1F9-574D7E7698CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.4.153:*:*:*:premise:*:*:*", + "matchCriteriaId": "F5A7D50A-DD35-40B6-B4AD-8703DB016E90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1196CC8F-4D46-4258-9997-1C7E9954A8D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "DF9D82B4-4AF6-4E14-AACE-56982D4F8969" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.4.1:*:*:*:premise:*:*:*", + "matchCriteriaId": "5FA149E2-AF10-4D3A-9F6C-8AF74110DEF8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.4.1.207:*:*:*:premise:*:*:*", + "matchCriteriaId": "CC521F86-4E3F-4217-836D-235B1D9E8876" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.4.1.236:*:*:*:premise:*:*:*", + "matchCriteriaId": "45AA1E4F-2B38-42A3-A99C-F7ED17067E00" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.4.2:*:*:*:premise:*:*:*", + "matchCriteriaId": "78794BF3-682E-4256-92DA-D669BF78A297" + } + ] + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Avalanche-6-4-4-CVE-2024-38652-CVE-2024-38653-CVE-2024-36136-CVE-2024-37399-CVE-2024-37373", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36246.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36246.json index 3607a228a9f..acbbc57f8a9 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36246.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36246.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36246", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-05-31T06:15:12.407", - "lastModified": "2024-05-31T13:01:46.727", + "lastModified": "2024-08-15T17:35:07.080", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Existe una vulnerabilidad de autorizaci\u00f3n faltante en Unifier y Unifier Cast versi\u00f3n 5.0 o posterior, y el parche \"20240527\" no se aplic\u00f3. Si se explota esta vulnerabilidad, se puede ejecutar c\u00f3digo arbitrario con privilegios LocalSystem. Como resultado, se puede instalar un programa malicioso y se pueden modificar o eliminar datos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/jp/JVN17680667/", diff --git a/CVE-2024/CVE-2024-367xx/CVE-2024-36789.json b/CVE-2024/CVE-2024-367xx/CVE-2024-36789.json index 6cb971bf0da..d7ce94d2abc 100644 --- a/CVE-2024/CVE-2024-367xx/CVE-2024-36789.json +++ b/CVE-2024/CVE-2024-367xx/CVE-2024-36789.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36789", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-07T15:15:50.323", - "lastModified": "2024-06-07T19:24:09.243", + "lastModified": "2024-08-15T16:35:11.633", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en Netgear WNR614 JNR1010V2/N300-V1.1.0.54_1.0.1 permite a los atacantes crear contrase\u00f1as que no se ajustan a los est\u00e1ndares de seguridad definidos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-521" + } + ] + } + ], "references": [ { "url": "https://redfoxsec.com/blog/security-advisory-multiple-vulnerabilities-in-netgear-wnr614-router/", diff --git a/CVE-2024/CVE-2024-368xx/CVE-2024-36877.json b/CVE-2024/CVE-2024-368xx/CVE-2024-36877.json index 0ec3a402402..9ddd9bf7647 100644 --- a/CVE-2024/CVE-2024-368xx/CVE-2024-36877.json +++ b/CVE-2024/CVE-2024-368xx/CVE-2024-36877.json @@ -2,13 +2,13 @@ "id": "CVE-2024-36877", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-12T16:15:15.300", - "lastModified": "2024-08-13T20:35:10.353", + "lastModified": "2024-08-15T16:15:19.160", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Micro-Star International Z-series motherboards (Z590, Z490, and Z790) and B-series motherboards (B760, B560, B660, and B460) with firmware 7D25v14, 7D25v17 to 7D25v19, and 7D25v1A to 7D25v1H was discovered to contain a write-what-where condition in the in the SW handler for SMI 0xE3." + "value": "Micro-Star International Z-series motherboards (Z590, Z490, and Z790) and B-series motherboards (B760, B560, B660, and B460) with firmware 7D25v14, 7D25v17 to 7D25v19, and 7D25v1A to 7D25v1H was discovered to contain a write-what-where condition in the in the SW handler for SMI 0xE3. Motherboard's with the following chipsets are affected: Intel 300, Intel 400, Intel 500, Intel 600, Intel 700, AMD 300, AMD 400, AMD 500, AMD 600 and AMD 700." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37373.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37373.json index 15c2af960f2..dac1fe51a8e 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37373.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37373.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37373", "sourceIdentifier": "support@hackerone.com", "published": "2024-08-14T03:15:04.667", - "lastModified": "2024-08-14T14:35:26.827", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-15T17:31:32.407", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "support@hackerone.com", @@ -40,6 +62,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +83,125 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.1:*:*:*:premise:*:*:*", + "matchCriteriaId": "6060540C-A977-4E2A-8E1B-41CC3C3E92ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.1.1507:*:*:*:premise:*:*:*", + "matchCriteriaId": "771C1447-6F5E-45DE-BDE6-8FFBB4708D67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "778D9C09-12BB-47FC-B74B-DC114AE3A540" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.2:*:*:*:*:windows:*:*", + "matchCriteriaId": "617DA85C-5FCE-4650-99AA-A1052E690B2C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.2:*:*:*:premise:*:*:*", + "matchCriteriaId": "44ABD265-3F8F-415A-96B3-16975661CDEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.2.3490:*:*:*:*:*:*:*", + "matchCriteriaId": "CF93250C-0754-4B87-9BBE-DDF255EEB157" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.2.3490:*:*:*:premise:*:*:*", + "matchCriteriaId": "521CD0B6-8348-41D6-8AD8-79F884F4F10F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "3162335B-9FA4-4AC3-85F0-BD34F859EDFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.3:*:*:*:premise:*:*:*", + "matchCriteriaId": "03E7F6CA-8A72-4A3E-A281-2A7653162FB3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.3.101:*:*:*:*:*:*:*", + "matchCriteriaId": "E2AB421E-C976-4CFF-93F9-40354CB579C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.3.101:*:*:*:premise:*:*:*", + "matchCriteriaId": "4C581973-06B3-4E16-B37C-41FE7B4388CB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "FE9E1AF8-A8ED-4E49-B25F-E27AD4B61E7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.4:*:*:*:premise:*:*:*", + "matchCriteriaId": "3CC6AA75-22CD-4588-A1F9-574D7E7698CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.4.153:*:*:*:premise:*:*:*", + "matchCriteriaId": "F5A7D50A-DD35-40B6-B4AD-8703DB016E90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1196CC8F-4D46-4258-9997-1C7E9954A8D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "DF9D82B4-4AF6-4E14-AACE-56982D4F8969" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.4.1:*:*:*:premise:*:*:*", + "matchCriteriaId": "5FA149E2-AF10-4D3A-9F6C-8AF74110DEF8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.4.1.207:*:*:*:premise:*:*:*", + "matchCriteriaId": "CC521F86-4E3F-4217-836D-235B1D9E8876" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.4.1.236:*:*:*:premise:*:*:*", + "matchCriteriaId": "45AA1E4F-2B38-42A3-A99C-F7ED17067E00" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.4.2:*:*:*:premise:*:*:*", + "matchCriteriaId": "78794BF3-682E-4256-92DA-D669BF78A297" + } + ] + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Avalanche-6-4-4-CVE-2024-38652-CVE-2024-38653-CVE-2024-36136-CVE-2024-37399-CVE-2024-37373", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37399.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37399.json index c5bf90f398d..866ab74e127 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37399.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37399.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37399", "sourceIdentifier": "support@hackerone.com", "published": "2024-08-14T03:15:04.850", - "lastModified": "2024-08-14T14:35:28.153", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-15T17:31:49.067", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "support@hackerone.com", @@ -40,6 +62,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +83,125 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.1:*:*:*:premise:*:*:*", + "matchCriteriaId": "6060540C-A977-4E2A-8E1B-41CC3C3E92ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.1.1507:*:*:*:premise:*:*:*", + "matchCriteriaId": "771C1447-6F5E-45DE-BDE6-8FFBB4708D67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "778D9C09-12BB-47FC-B74B-DC114AE3A540" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.2:*:*:*:*:windows:*:*", + "matchCriteriaId": "617DA85C-5FCE-4650-99AA-A1052E690B2C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.2:*:*:*:premise:*:*:*", + "matchCriteriaId": "44ABD265-3F8F-415A-96B3-16975661CDEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.2.3490:*:*:*:*:*:*:*", + "matchCriteriaId": "CF93250C-0754-4B87-9BBE-DDF255EEB157" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.2.3490:*:*:*:premise:*:*:*", + "matchCriteriaId": "521CD0B6-8348-41D6-8AD8-79F884F4F10F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "3162335B-9FA4-4AC3-85F0-BD34F859EDFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.3:*:*:*:premise:*:*:*", + "matchCriteriaId": "03E7F6CA-8A72-4A3E-A281-2A7653162FB3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.3.101:*:*:*:*:*:*:*", + "matchCriteriaId": "E2AB421E-C976-4CFF-93F9-40354CB579C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.3.101:*:*:*:premise:*:*:*", + "matchCriteriaId": "4C581973-06B3-4E16-B37C-41FE7B4388CB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "FE9E1AF8-A8ED-4E49-B25F-E27AD4B61E7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.4:*:*:*:premise:*:*:*", + "matchCriteriaId": "3CC6AA75-22CD-4588-A1F9-574D7E7698CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.4.153:*:*:*:premise:*:*:*", + "matchCriteriaId": "F5A7D50A-DD35-40B6-B4AD-8703DB016E90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1196CC8F-4D46-4258-9997-1C7E9954A8D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "DF9D82B4-4AF6-4E14-AACE-56982D4F8969" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.4.1:*:*:*:premise:*:*:*", + "matchCriteriaId": "5FA149E2-AF10-4D3A-9F6C-8AF74110DEF8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.4.1.207:*:*:*:premise:*:*:*", + "matchCriteriaId": "CC521F86-4E3F-4217-836D-235B1D9E8876" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.4.1.236:*:*:*:premise:*:*:*", + "matchCriteriaId": "45AA1E4F-2B38-42A3-A99C-F7ED17067E00" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.4.2:*:*:*:premise:*:*:*", + "matchCriteriaId": "78794BF3-682E-4256-92DA-D669BF78A297" + } + ] + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Avalanche-6-4-4-CVE-2024-38652-CVE-2024-38653-CVE-2024-36136-CVE-2024-37399-CVE-2024-37373", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37568.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37568.json index 45757cb0f3a..51040d8b538 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37568.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37568.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37568", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-09T19:15:52.323", - "lastModified": "2024-07-25T18:15:03.717", + "lastModified": "2024-08-15T16:35:12.900", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-347" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38134.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38134.json index 4c5439191c5..e02b7c2898b 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38134.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38134.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38134", "sourceIdentifier": "secure@microsoft.com", "published": "2024-08-13T18:15:16.537", - "lastModified": "2024-08-14T02:07:05.410", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T17:43:41.003", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios del controlador del servicio Thunk WOW de transmisi\u00f3n del kernel" } ], "metrics": { @@ -47,10 +51,119 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.20751", + "matchCriteriaId": "7E76B107-D977-41BE-8E5C-6A9B52C6EBDE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7259", + "matchCriteriaId": "6808A3F0-AC0E-4825-A582-5D7841F4870F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6189", + "matchCriteriaId": "C0893DB0-24BA-41A1-907E-8B6F66741A0E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4780", + "matchCriteriaId": "8D75E5B4-14B7-4D0F-96B5-2B9C270B7F98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4780", + "matchCriteriaId": "3F9C3ED0-C639-42B9-8512-5CAD50B7095B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.3147", + "matchCriteriaId": "66EC161E-9908-4511-933C-727D46A8271E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4037", + "matchCriteriaId": "EE5B452D-B921-4E5F-9C79-360447CD3BF8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4037", + "matchCriteriaId": "B56F0E20-88FD-4A42-B5DE-06A6D2FAC6FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.1457", + "matchCriteriaId": "3C7E2433-4D16-40E5-973A-42F651779A47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7259", + "matchCriteriaId": "7CA31F69-6718-4968-8B0D-88728179F3CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6189", + "matchCriteriaId": "A2267317-26DF-4EB8-A7EA-EA467727DA71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2655", + "matchCriteriaId": "8E3975C0-EA3C-4B85-94BC-43BA94474FCA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1085", + "matchCriteriaId": "094C36FE-9CCB-4148-AA0F-5727D6933768" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38134", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-386xx/CVE-2024-38652.json b/CVE-2024/CVE-2024-386xx/CVE-2024-38652.json index c6e5339a96a..a0b77ce4b6e 100644 --- a/CVE-2024/CVE-2024-386xx/CVE-2024-38652.json +++ b/CVE-2024/CVE-2024-386xx/CVE-2024-38652.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38652", "sourceIdentifier": "support@hackerone.com", "published": "2024-08-14T03:15:05.020", - "lastModified": "2024-08-14T14:35:31.657", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-15T17:32:39.067", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ], "cvssMetricV30": [ { "source": "support@hackerone.com", @@ -40,6 +62,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +83,125 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.1:*:*:*:premise:*:*:*", + "matchCriteriaId": "6060540C-A977-4E2A-8E1B-41CC3C3E92ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.1.1507:*:*:*:premise:*:*:*", + "matchCriteriaId": "771C1447-6F5E-45DE-BDE6-8FFBB4708D67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "778D9C09-12BB-47FC-B74B-DC114AE3A540" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.2:*:*:*:*:windows:*:*", + "matchCriteriaId": "617DA85C-5FCE-4650-99AA-A1052E690B2C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.2:*:*:*:premise:*:*:*", + "matchCriteriaId": "44ABD265-3F8F-415A-96B3-16975661CDEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.2.3490:*:*:*:*:*:*:*", + "matchCriteriaId": "CF93250C-0754-4B87-9BBE-DDF255EEB157" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.2.3490:*:*:*:premise:*:*:*", + "matchCriteriaId": "521CD0B6-8348-41D6-8AD8-79F884F4F10F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "3162335B-9FA4-4AC3-85F0-BD34F859EDFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.3:*:*:*:premise:*:*:*", + "matchCriteriaId": "03E7F6CA-8A72-4A3E-A281-2A7653162FB3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.3.101:*:*:*:*:*:*:*", + "matchCriteriaId": "E2AB421E-C976-4CFF-93F9-40354CB579C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.3.101:*:*:*:premise:*:*:*", + "matchCriteriaId": "4C581973-06B3-4E16-B37C-41FE7B4388CB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "FE9E1AF8-A8ED-4E49-B25F-E27AD4B61E7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.4:*:*:*:premise:*:*:*", + "matchCriteriaId": "3CC6AA75-22CD-4588-A1F9-574D7E7698CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.4.153:*:*:*:premise:*:*:*", + "matchCriteriaId": "F5A7D50A-DD35-40B6-B4AD-8703DB016E90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1196CC8F-4D46-4258-9997-1C7E9954A8D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "DF9D82B4-4AF6-4E14-AACE-56982D4F8969" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.4.1:*:*:*:premise:*:*:*", + "matchCriteriaId": "5FA149E2-AF10-4D3A-9F6C-8AF74110DEF8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.4.1.207:*:*:*:premise:*:*:*", + "matchCriteriaId": "CC521F86-4E3F-4217-836D-235B1D9E8876" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.4.1.236:*:*:*:premise:*:*:*", + "matchCriteriaId": "45AA1E4F-2B38-42A3-A99C-F7ED17067E00" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.4.2:*:*:*:premise:*:*:*", + "matchCriteriaId": "78794BF3-682E-4256-92DA-D669BF78A297" + } + ] + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Avalanche-6-4-4-CVE-2024-38652-CVE-2024-38653-CVE-2024-36136-CVE-2024-37399-CVE-2024-37373", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-386xx/CVE-2024-38653.json b/CVE-2024/CVE-2024-386xx/CVE-2024-38653.json index ac361066f31..f843af1a091 100644 --- a/CVE-2024/CVE-2024-386xx/CVE-2024-38653.json +++ b/CVE-2024/CVE-2024-386xx/CVE-2024-38653.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38653", "sourceIdentifier": "support@hackerone.com", "published": "2024-08-14T03:15:05.200", - "lastModified": "2024-08-14T14:35:32.550", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-15T17:32:57.587", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "support@hackerone.com", @@ -40,6 +62,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +83,125 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.1:*:*:*:premise:*:*:*", + "matchCriteriaId": "6060540C-A977-4E2A-8E1B-41CC3C3E92ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.1.1507:*:*:*:premise:*:*:*", + "matchCriteriaId": "771C1447-6F5E-45DE-BDE6-8FFBB4708D67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "778D9C09-12BB-47FC-B74B-DC114AE3A540" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.2:*:*:*:*:windows:*:*", + "matchCriteriaId": "617DA85C-5FCE-4650-99AA-A1052E690B2C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.2:*:*:*:premise:*:*:*", + "matchCriteriaId": "44ABD265-3F8F-415A-96B3-16975661CDEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.2.3490:*:*:*:*:*:*:*", + "matchCriteriaId": "CF93250C-0754-4B87-9BBE-DDF255EEB157" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.2.3490:*:*:*:premise:*:*:*", + "matchCriteriaId": "521CD0B6-8348-41D6-8AD8-79F884F4F10F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "3162335B-9FA4-4AC3-85F0-BD34F859EDFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.3:*:*:*:premise:*:*:*", + "matchCriteriaId": "03E7F6CA-8A72-4A3E-A281-2A7653162FB3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.3.101:*:*:*:*:*:*:*", + "matchCriteriaId": "E2AB421E-C976-4CFF-93F9-40354CB579C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.3.101:*:*:*:premise:*:*:*", + "matchCriteriaId": "4C581973-06B3-4E16-B37C-41FE7B4388CB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "FE9E1AF8-A8ED-4E49-B25F-E27AD4B61E7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.4:*:*:*:premise:*:*:*", + "matchCriteriaId": "3CC6AA75-22CD-4588-A1F9-574D7E7698CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.3.4.153:*:*:*:premise:*:*:*", + "matchCriteriaId": "F5A7D50A-DD35-40B6-B4AD-8703DB016E90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1196CC8F-4D46-4258-9997-1C7E9954A8D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "DF9D82B4-4AF6-4E14-AACE-56982D4F8969" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.4.1:*:*:*:premise:*:*:*", + "matchCriteriaId": "5FA149E2-AF10-4D3A-9F6C-8AF74110DEF8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.4.1.207:*:*:*:premise:*:*:*", + "matchCriteriaId": "CC521F86-4E3F-4217-836D-235B1D9E8876" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.4.1.236:*:*:*:premise:*:*:*", + "matchCriteriaId": "45AA1E4F-2B38-42A3-A99C-F7ED17067E00" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:6.4.2:*:*:*:premise:*:*:*", + "matchCriteriaId": "78794BF3-682E-4256-92DA-D669BF78A297" + } + ] + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Avalanche-6-4-4-CVE-2024-38652-CVE-2024-38653-CVE-2024-36136-CVE-2024-37399-CVE-2024-37373", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38953.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38953.json index a68e23a60d7..54a06a95bdd 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38953.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38953.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38953", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T14:15:05.600", - "lastModified": "2024-07-01T16:37:39.040", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-15T17:19:19.663", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,67 @@ "value": "phpok 6.4.003 contiene una vulnerabilidad de cross-site scripting (XSS) en el m\u00e9todo ok_f() en el archivo framework/api/upload_control.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpok:phpok:6.4.003:*:*:*:*:*:*:*", + "matchCriteriaId": "BE377B1F-6F96-47F2-A732-EF6A068CAA71" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/qinggan/phpok/issues/17", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39225.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39225.json index e6dc050f226..f69cea3cd71 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39225.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39225.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39225", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-06T16:15:48.647", - "lastModified": "2024-08-08T15:35:16.513", + "lastModified": "2024-08-15T16:15:19.317", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -840,13 +840,6 @@ } ], "references": [ - { - "url": "http://ar750ar750sar300mar300m16mt300n-v2b1300mt1300sft1200x750.com", - "source": "cve@mitre.org", - "tags": [ - "Broken Link" - ] - }, { "url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Bypass%20the%20login%20mechanism.md", "source": "cve@mitre.org", diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39226.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39226.json index 4892422e5e4..6b9b690686a 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39226.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39226.json @@ -2,13 +2,13 @@ "id": "CVE-2024-39226", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-06T16:15:48.757", - "lastModified": "2024-08-07T20:55:49.350", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-15T16:15:19.493", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain insecure permissions in the endpoint /cgi-bin/glc. This vulnerability allows unauthenticated attackers to execute arbitrary code or possibly a directory traversal via crafted JSON data." + "value": "GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a vulnerability can be exploited to manipulate routers by passing malicious shell commands through the s2s API." }, { "lang": "es", @@ -810,13 +810,6 @@ } ], "references": [ - { - "url": "http://ar750ar750sar300mar300m16mt300n-v2b1300mt1300sft1200x750.com", - "source": "cve@mitre.org", - "tags": [ - "Broken Link" - ] - }, { "url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/s2s%20interface%20shell%20injection.md", "source": "cve@mitre.org", diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39227.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39227.json index 875dedf3f8b..c17ada745fc 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39227.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39227.json @@ -2,13 +2,13 @@ "id": "CVE-2024-39227", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-06T17:15:53.943", - "lastModified": "2024-08-12T18:46:54.240", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-15T16:15:19.650", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a shell injection vulnerability via the interface check_ovpn_client_config." + "value": "GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain insecure permissions in the endpoint /cgi-bin/glc. This vulnerability allows unauthenticated attackers to execute arbitrary code or possibly a directory traversal via crafted JSON data." }, { "lang": "es", @@ -840,13 +840,6 @@ } ], "references": [ - { - "url": "http://ar750ar750sar300mar300m16mt300n-v2b1300mt1300sft1200x750.com", - "source": "cve@mitre.org", - "tags": [ - "Broken Link" - ] - }, { "url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Access%20to%20the%20C%20library%20without%20logging%20in.md", "source": "cve@mitre.org", diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39228.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39228.json index 5a5e2e78fa0..966f1b8df71 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39228.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39228.json @@ -2,13 +2,13 @@ "id": "CVE-2024-39228", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-06T16:15:48.850", - "lastModified": "2024-08-08T15:35:17.417", + "lastModified": "2024-08-15T16:15:19.800", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, XE3000/X3000 v4, and B2200/MV1000/MV1000W/USB150/N300/SF1200 v3.216 were discovered to contain a shell injection vulnerability via the interface check_config." + "value": "GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a shell injection vulnerability via the interface check_ovpn_client_config and check_config." }, { "lang": "es", @@ -840,13 +840,6 @@ } ], "references": [ - { - "url": "http://ar750ar750sar300mar300m16mt300n-v2b1300mt1300sft1200x750.com", - "source": "cve@mitre.org", - "tags": [ - "Broken Link" - ] - }, { "url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Ovpn%20interface%20shell%20injection.md", "source": "cve@mitre.org", diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39229.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39229.json index d9682723558..f7c6700ddba 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39229.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39229.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39229", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-06T17:15:54.027", - "lastModified": "2024-08-12T18:48:44.923", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-15T16:15:19.953", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -810,13 +810,6 @@ } ], "references": [ - { - "url": "http://ar750ar750sar300mar300m16mt300n-v2b1300mt1300sft1200x750.com", - "source": "cve@mitre.org", - "tags": [ - "Broken Link" - ] - }, { "url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/DDNS%20data%20is%20not%20encrypted.md", "source": "cve@mitre.org", diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39420.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39420.json index 559b61ef36d..c959f523874 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39420.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39420.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39420", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:24.960", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T17:26:28.973", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -14,8 +14,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "psirt@adobe.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + }, + { + "source": "psirt@adobe.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -47,10 +67,77 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndExcluding": "20.005.30655", + "matchCriteriaId": "B9311FEC-D9CC-421C-8E5E-8131E460FC42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "24.001.20604", + "versionEndExcluding": "24.001.30159", + "matchCriteriaId": "1A09E4B8-DB3B-45EC-B441-2C9549D299B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "24.002.21005", + "matchCriteriaId": "D555A6CB-9EDF-4CA2-B8E5-04A9D212FD8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.3005", + "versionEndExcluding": "20.005.30655", + "matchCriteriaId": "883444C8-35EB-4BDF-A14C-C4C5BF97239A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "24.002.21005", + "matchCriteriaId": "9CE03784-4780-4313-A27A-37B265BF3F9D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-57.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39422.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39422.json index f8a1cb96352..8f5b2be2cf8 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39422.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39422.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39422", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:25.187", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T17:25:54.750", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -47,10 +47,77 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndExcluding": "20.005.30655", + "matchCriteriaId": "B9311FEC-D9CC-421C-8E5E-8131E460FC42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "24.001.20604", + "versionEndExcluding": "24.001.30159", + "matchCriteriaId": "1A09E4B8-DB3B-45EC-B441-2C9549D299B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "24.002.21005", + "matchCriteriaId": "D555A6CB-9EDF-4CA2-B8E5-04A9D212FD8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.3005", + "versionEndExcluding": "20.005.30655", + "matchCriteriaId": "883444C8-35EB-4BDF-A14C-C4C5BF97239A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "24.002.21005", + "matchCriteriaId": "9CE03784-4780-4313-A27A-37B265BF3F9D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-57.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39423.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39423.json index 4005352d5a0..b718dbdbc83 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39423.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39423.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39423", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:25.427", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T17:25:41.800", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -47,10 +47,77 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndExcluding": "20.005.30655", + "matchCriteriaId": "B9311FEC-D9CC-421C-8E5E-8131E460FC42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "24.001.20604", + "versionEndExcluding": "24.001.30159", + "matchCriteriaId": "1A09E4B8-DB3B-45EC-B441-2C9549D299B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "24.002.21005", + "matchCriteriaId": "D555A6CB-9EDF-4CA2-B8E5-04A9D212FD8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.3005", + "versionEndExcluding": "20.005.30655", + "matchCriteriaId": "883444C8-35EB-4BDF-A14C-C4C5BF97239A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "24.002.21005", + "matchCriteriaId": "9CE03784-4780-4313-A27A-37B265BF3F9D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-57.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39424.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39424.json index c094f65fd49..ebdfec15606 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39424.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39424.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39424", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:25.640", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T17:25:25.787", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + }, { "source": "psirt@adobe.com", "type": "Secondary", @@ -47,10 +57,77 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndExcluding": "20.005.30655", + "matchCriteriaId": "B9311FEC-D9CC-421C-8E5E-8131E460FC42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "24.001.20604", + "versionEndExcluding": "24.001.30159", + "matchCriteriaId": "1A09E4B8-DB3B-45EC-B441-2C9549D299B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "24.002.21005", + "matchCriteriaId": "D555A6CB-9EDF-4CA2-B8E5-04A9D212FD8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.3005", + "versionEndExcluding": "20.005.30655", + "matchCriteriaId": "883444C8-35EB-4BDF-A14C-C4C5BF97239A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "24.002.21005", + "matchCriteriaId": "9CE03784-4780-4313-A27A-37B265BF3F9D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-57.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39425.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39425.json index aac78ee7e3d..0a77548848a 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39425.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39425.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39425", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:25.883", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T17:17:59.783", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -47,10 +47,77 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndExcluding": "20.005.30655", + "matchCriteriaId": "B9311FEC-D9CC-421C-8E5E-8131E460FC42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "24.001.20604", + "versionEndExcluding": "24.001.30159", + "matchCriteriaId": "1A09E4B8-DB3B-45EC-B441-2C9549D299B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "24.002.21005", + "matchCriteriaId": "D555A6CB-9EDF-4CA2-B8E5-04A9D212FD8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.3005", + "versionEndExcluding": "20.005.30655", + "matchCriteriaId": "883444C8-35EB-4BDF-A14C-C4C5BF97239A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "24.002.21005", + "matchCriteriaId": "9CE03784-4780-4313-A27A-37B265BF3F9D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-57.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39426.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39426.json index 451fb61cdfe..14be27337de 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39426.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39426.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39426", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:26.113", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T17:17:38.680", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -47,10 +47,77 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndExcluding": "20.005.30655", + "matchCriteriaId": "B9311FEC-D9CC-421C-8E5E-8131E460FC42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "24.001.20604", + "versionEndExcluding": "24.001.30159", + "matchCriteriaId": "1A09E4B8-DB3B-45EC-B441-2C9549D299B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "24.002.21005", + "matchCriteriaId": "D555A6CB-9EDF-4CA2-B8E5-04A9D212FD8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.3005", + "versionEndExcluding": "20.005.30655", + "matchCriteriaId": "883444C8-35EB-4BDF-A14C-C4C5BF97239A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "24.002.21005", + "matchCriteriaId": "9CE03784-4780-4313-A27A-37B265BF3F9D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-57.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39708.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39708.json index 0e2fb6dc59f..f0a6eb1a639 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39708.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39708.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39708", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-28T01:15:08.793", - "lastModified": "2024-06-28T10:27:00.920", + "lastModified": "2024-08-15T16:15:20.100", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -43,6 +43,10 @@ { "url": "https://docs.delinea.com/online-help/privilege-manager/release-notes/12.0.1-combined.htm", "source": "cve@mitre.org" + }, + { + "url": "https://www.cyberark.com/resources/threat-research-blog/identity-crisis-the-curious-case-of-a-delinea-local-privilege-escalation-vulnerability", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40704.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40704.json new file mode 100644 index 00000000000..f036ef92c8d --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40704.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-40704", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-08-15T17:15:17.697", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM InfoSphere Information Server 11.7 could allow a privileged user to obtain sensitive information from authentication request headers. IBM X-Force ID: 298277." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/298277", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7160853", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40705.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40705.json new file mode 100644 index 00000000000..b70547b44bc --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40705.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-40705", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-08-15T17:15:17.967", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM InfoSphere Information Server could allow an authenticated user to consume file space resources due to unrestricted file uploads. IBM X-Force ID: 298279." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-405" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/298279", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7160855", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40779.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40779.json index f32161d3137..af39b71394e 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40779.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40779.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40779", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:11.590", - "lastModified": "2024-08-13T18:15:32.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T16:07:27.437", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,67 +15,289 @@ "value": " Se solucion\u00f3 una lectura fuera de los l\u00edmites con una verificaci\u00f3n de l\u00edmites mejorada. Este problema se solucion\u00f3 en iOS 16.7.9 y iPadOS 16.7.9, Safari 17.6, iOS 17.6 y iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. El procesamiento de contenido web creado con fines malintencionados puede provocar un fallo inesperado del proceso." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.9", + "matchCriteriaId": "1ACEA981-1D96-49F1-8048-74D21D71FD39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.6", + "matchCriteriaId": "34E8C966-19C7-4376-A0C3-A242720F62DF" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.9", + "matchCriteriaId": "29A9994D-AE71-45E0-8CC5-E6219420F7E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.6", + "matchCriteriaId": "B191C80F-3801-4AD0-9A63-EB294A029D7C" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.6", + "matchCriteriaId": "A7AF9041-5C4F-42CB-99E5-5276DB6AC07C" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.6", + "matchCriteriaId": "035D8460-BD6F-4696-9D7B-BA571A994FD0" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.6", + "matchCriteriaId": "9FB1D28B-EF0E-4CA0-90F7-073A85D001E5" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3", + "matchCriteriaId": "CDBCE187-329C-4B1C-89B7-7D45A7946AF4" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.6", + "matchCriteriaId": "687902EF-637F-4537-B419-15A1695370B9" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/15", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/16", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/17", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/18", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/21", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/22", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/23", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214116", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214117", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214119", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214121", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214122", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214123", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214124", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40780.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40780.json index 22528e0c51e..e6b4e74fb87 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40780.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40780.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40780", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:11.660", - "lastModified": "2024-08-13T18:15:32.257", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T16:47:58.510", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,67 +15,289 @@ "value": " Se solucion\u00f3 una lectura fuera de los l\u00edmites con una verificaci\u00f3n de l\u00edmites mejorada. Este problema se solucion\u00f3 en iOS 16.7.9 y iPadOS 16.7.9, Safari 17.6, iOS 17.6 y iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. El procesamiento de contenido web creado con fines malintencionados puede provocar un fallo inesperado del proceso." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.9", + "matchCriteriaId": "1ACEA981-1D96-49F1-8048-74D21D71FD39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.6", + "matchCriteriaId": "34E8C966-19C7-4376-A0C3-A242720F62DF" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.9", + "matchCriteriaId": "29A9994D-AE71-45E0-8CC5-E6219420F7E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.6", + "matchCriteriaId": "B191C80F-3801-4AD0-9A63-EB294A029D7C" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.6", + "matchCriteriaId": "A7AF9041-5C4F-42CB-99E5-5276DB6AC07C" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.6", + "matchCriteriaId": "035D8460-BD6F-4696-9D7B-BA571A994FD0" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.6", + "matchCriteriaId": "9FB1D28B-EF0E-4CA0-90F7-073A85D001E5" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3", + "matchCriteriaId": "CDBCE187-329C-4B1C-89B7-7D45A7946AF4" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.6", + "matchCriteriaId": "687902EF-637F-4537-B419-15A1695370B9" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/15", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/16", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/17", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/18", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/21", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/22", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/23", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214116", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214117", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214119", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214121", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214122", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214123", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214124", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40785.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40785.json index 57ac01383d7..90988e45c65 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40785.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40785.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40785", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:11.997", - "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T16:46:16.290", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,63 +15,282 @@ "value": "Este problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en iOS 16.7.9 y iPadOS 16.7.9, Safari 17.6, iOS 17.6 y iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. El procesamiento de contenido web creado con fines malintencionados puede provocar un ataque de Cross Site Scripting." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.9", + "matchCriteriaId": "1ACEA981-1D96-49F1-8048-74D21D71FD39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.6", + "matchCriteriaId": "34E8C966-19C7-4376-A0C3-A242720F62DF" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.9", + "matchCriteriaId": "29A9994D-AE71-45E0-8CC5-E6219420F7E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.6", + "matchCriteriaId": "B191C80F-3801-4AD0-9A63-EB294A029D7C" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.6", + "matchCriteriaId": "A7AF9041-5C4F-42CB-99E5-5276DB6AC07C" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.6", + "matchCriteriaId": "035D8460-BD6F-4696-9D7B-BA571A994FD0" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.6", + "matchCriteriaId": "9FB1D28B-EF0E-4CA0-90F7-073A85D001E5" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3", + "matchCriteriaId": "CDBCE187-329C-4B1C-89B7-7D45A7946AF4" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.6", + "matchCriteriaId": "687902EF-637F-4537-B419-15A1695370B9" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/15", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/16", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/17", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/18", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/21", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/22", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/23", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214116", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214117", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214119", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214121", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214122", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214123", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214124", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40786.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40786.json index eb7dbb421c5..7a0fc5c8990 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40786.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40786.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40786", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:12.070", - "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T16:44:31.820", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,154 @@ "value": " Esta cuesti\u00f3n se abord\u00f3 mediante una mejor gesti\u00f3n estatal. Este problema se solucion\u00f3 en iOS 17.6 y iPadOS 17.6, iOS 16.7.9 y iPadOS 16.7.9, macOS Ventura 13.6.8. Un atacante puede ser capaz de ver informaci\u00f3n confidencial del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.9", + "matchCriteriaId": "29A9994D-AE71-45E0-8CC5-E6219420F7E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.6", + "matchCriteriaId": "B191C80F-3801-4AD0-9A63-EB294A029D7C" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.9", + "matchCriteriaId": "1ACEA981-1D96-49F1-8048-74D21D71FD39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.6", + "matchCriteriaId": "34E8C966-19C7-4376-A0C3-A242720F62DF" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.6.8", + "matchCriteriaId": "70D16512-F797-4C1B-8612-FCB4B6039C2C" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/16", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/17", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/19", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214116", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214117", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214120", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40806.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40806.json index 08a0d3669aa..a52731e404f 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40806.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40806.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40806", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:13.083", - "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T16:42:08.780", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,71 +15,246 @@ "value": "Se solucion\u00f3 un problema de lectura fuera de los l\u00edmites con una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en iOS 16.7.9 y iPadOS 16.7.9, macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 y iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Procesar un archivo creado con fines malintencionados puede provocar la finalizaci\u00f3n inesperada de la aplicaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.9", + "matchCriteriaId": "29A9994D-AE71-45E0-8CC5-E6219420F7E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.6", + "matchCriteriaId": "B191C80F-3801-4AD0-9A63-EB294A029D7C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.9", + "matchCriteriaId": "1ACEA981-1D96-49F1-8048-74D21D71FD39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.6", + "matchCriteriaId": "34E8C966-19C7-4376-A0C3-A242720F62DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.7.6", + "matchCriteriaId": "3556C7C3-14B6-4846-B3E8-FE07A503155F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.6.8", + "matchCriteriaId": "7008225C-B5B9-4F87-9392-DD2080717E9A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.4", + "matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.6", + "matchCriteriaId": "9FB1D28B-EF0E-4CA0-90F7-073A85D001E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3", + "matchCriteriaId": "CDBCE187-329C-4B1C-89B7-7D45A7946AF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.6", + "matchCriteriaId": "035D8460-BD6F-4696-9D7B-BA571A994FD0" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/16", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/17", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/18", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/19", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/20", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/21", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/22", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/23", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214116", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214117", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214118", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214119", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214120", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214122", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214123", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214124", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40807.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40807.json index a148ae8eed4..80ff513c896 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40807.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40807.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40807", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:13.147", - "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T16:35:50.210", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,122 @@ "value": " Se solucion\u00f3 un problema de l\u00f3gica con controles mejorados. Este problema se solucion\u00f3 en macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. Un acceso directo puede utilizar datos confidenciales con determinadas acciones sin avisar al usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.7.6", + "matchCriteriaId": "3556C7C3-14B6-4846-B3E8-FE07A503155F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.6.8", + "matchCriteriaId": "7008225C-B5B9-4F87-9392-DD2080717E9A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.6", + "matchCriteriaId": "51E2E93B-C5A3-4C83-B806-2EC555AD45FE" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/18", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/19", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/20", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214118", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214119", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214120", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40809.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40809.json index 514ec86d242..c1e60c528f7 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40809.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40809.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40809", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:13.207", - "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T16:26:51.523", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,63 +15,224 @@ "value": "Se solucion\u00f3 un problema de l\u00f3gica con controles mejorados. Este problema se solucion\u00f3 en iOS 16.7.9 y iPadOS 16.7.9, macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 y iPadOS 17.6, watchOS 10.6, visionOS 1.3, macOS Sonoma 14.6. Un atajo puede evitar los requisitos de permiso de Internet." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.9", + "matchCriteriaId": "29A9994D-AE71-45E0-8CC5-E6219420F7E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.6", + "matchCriteriaId": "B191C80F-3801-4AD0-9A63-EB294A029D7C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.9", + "matchCriteriaId": "1ACEA981-1D96-49F1-8048-74D21D71FD39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.6", + "matchCriteriaId": "34E8C966-19C7-4376-A0C3-A242720F62DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.7.6", + "matchCriteriaId": "3556C7C3-14B6-4846-B3E8-FE07A503155F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.6.8", + "matchCriteriaId": "7008225C-B5B9-4F87-9392-DD2080717E9A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.6", + "matchCriteriaId": "51E2E93B-C5A3-4C83-B806-2EC555AD45FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3", + "matchCriteriaId": "CDBCE187-329C-4B1C-89B7-7D45A7946AF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.6", + "matchCriteriaId": "035D8460-BD6F-4696-9D7B-BA571A994FD0" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/16", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/17", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/18", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/19", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/20", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/21", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/23", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214116", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214117", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214118", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214119", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214120", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214123", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214124", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40812.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40812.json index f360d0cd440..8d876076962 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40812.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40812.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40812", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:13.330", - "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T16:26:53.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,63 +15,217 @@ "value": "Se solucion\u00f3 un problema de l\u00f3gica con controles mejorados. Este problema se solucion\u00f3 en iOS 16.7.9 y iPadOS 16.7.9, macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 y iPadOS 17.6, watchOS 10.6, visionOS 1.3, macOS Sonoma 14.6. Un atajo puede evitar los requisitos de permiso de Internet." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.9", + "matchCriteriaId": "29A9994D-AE71-45E0-8CC5-E6219420F7E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.6", + "matchCriteriaId": "B191C80F-3801-4AD0-9A63-EB294A029D7C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.9", + "matchCriteriaId": "1ACEA981-1D96-49F1-8048-74D21D71FD39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.6", + "matchCriteriaId": "34E8C966-19C7-4376-A0C3-A242720F62DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.7.6", + "matchCriteriaId": "3556C7C3-14B6-4846-B3E8-FE07A503155F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndIncluding": "14.6", + "matchCriteriaId": "ABFFD29A-309D-4C1D-BC33-2EC407363FAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3", + "matchCriteriaId": "CDBCE187-329C-4B1C-89B7-7D45A7946AF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.6", + "matchCriteriaId": "035D8460-BD6F-4696-9D7B-BA571A994FD0" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/16", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/17", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/18", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/19", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/20", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/21", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/23", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214116", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214117", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214118", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214119", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214120", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214123", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214124", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40813.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40813.json index ac28889192f..f4b3ab2c805 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40813.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40813.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40813", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:13.397", - "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T16:15:52.613", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,104 @@ "value": " Se solucion\u00f3 un problema de la pantalla de bloqueo con una gesti\u00f3n de estado mejorada. Este problema se solucion\u00f3 en watchOS 10.6, iOS 17.6 y iPadOS 17.6. Un atacante con acceso f\u00edsico puede utilizar Siri para acceder a datos confidenciales del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.6", + "matchCriteriaId": "A8A1B228-89B1-470E-9B6E-8553E561E062" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.6", + "matchCriteriaId": "1E393815-B3B5-4FF9-9D1D-AA3EA9C5D352" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.6", + "matchCriteriaId": "035D8460-BD6F-4696-9D7B-BA571A994FD0" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/16", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/21", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214117", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214124", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40815.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40815.json index 8b9a600c2cb..f18535a28fd 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40815.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40815.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40815", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:13.523", - "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T16:14:17.030", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,47 +15,171 @@ "value": " Se abord\u00f3 una condici\u00f3n de ejecuci\u00f3n con validaci\u00f3n adicional. Este problema se solucion\u00f3 en macOS Ventura 13.6.8, iOS 17.6 y iPadOS 17.6, watchOS 10.6, tvOS 17.6, macOS Sonoma 14.6. Un atacante malicioso con capacidad de lectura y escritura arbitraria puede omitir la autenticaci\u00f3n de puntero." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.6", + "matchCriteriaId": "A8A1B228-89B1-470E-9B6E-8553E561E062" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.6", + "matchCriteriaId": "1E393815-B3B5-4FF9-9D1D-AA3EA9C5D352" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.6.8", + "matchCriteriaId": "70D16512-F797-4C1B-8612-FCB4B6039C2C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.6", + "matchCriteriaId": "51E2E93B-C5A3-4C83-B806-2EC555AD45FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.6", + "matchCriteriaId": "9FB1D28B-EF0E-4CA0-90F7-073A85D001E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.6", + "matchCriteriaId": "035D8460-BD6F-4696-9D7B-BA571A994FD0" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/16", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/18", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/19", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/21", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/22", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214117", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214119", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214120", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214122", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214124", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40816.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40816.json index ccd54edbaef..6d941e9cee7 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40816.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40816.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40816", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:13.583", - "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T16:10:13.147", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,122 @@ "value": "Se solucion\u00f3 una lectura fuera de los l\u00edmites con una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. Un atacante local puede provocar un apagado inesperado del sistema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.7.6", + "matchCriteriaId": "3556C7C3-14B6-4846-B3E8-FE07A503155F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0.0", + "versionEndExcluding": "13.6.8", + "matchCriteriaId": "A9913D3D-BA40-4C2B-860C-A3439BCF069E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.6", + "matchCriteriaId": "51E2E93B-C5A3-4C83-B806-2EC555AD45FE" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/18", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/19", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/20", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214118", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214119", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214120", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40817.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40817.json index dcd127c1841..8719a8533eb 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40817.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40817.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40817", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:13.647", - "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T17:10:15.093", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,43 +15,153 @@ "value": " El problema se solucion\u00f3 mejorando el manejo de la interfaz de usuario. Este problema se solucion\u00f3 en macOS Sonoma 14.6, Safari 17.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. Visitar un sitio web que enmarque contenido malicioso puede provocar una suplantaci\u00f3n de la interfaz de usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1021" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.6", + "matchCriteriaId": "A7AF9041-5C4F-42CB-99E5-5276DB6AC07C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0", + "versionEndExcluding": "12.7.6", + "matchCriteriaId": "EA924D87-8FAE-4E34-83F7-A5E25C7450E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.6.8", + "matchCriteriaId": "7008225C-B5B9-4F87-9392-DD2080717E9A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.6", + "matchCriteriaId": "51E2E93B-C5A3-4C83-B806-2EC555AD45FE" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/15", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/18", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/19", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/20", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214118", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214119", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214120", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214121", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/kb/HT214121", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40818.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40818.json index 3abbf296853..05faa6d35a4 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40818.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40818.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40818", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:13.703", - "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T17:08:50.430", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,47 +15,179 @@ "value": " Este problema se solucion\u00f3 restringiendo las opciones ofrecidas en un dispositivo bloqueado. Este problema se solucion\u00f3 en iOS 16.7.9 y iPadOS 16.7.9, macOS Ventura 13.6.8, iOS 17.6 y iPadOS 17.6, watchOS 10.6, macOS Sonoma 14.6. Un atacante con acceso f\u00edsico puede utilizar Siri para acceder a datos confidenciales del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.9", + "matchCriteriaId": "29A9994D-AE71-45E0-8CC5-E6219420F7E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.6", + "matchCriteriaId": "B191C80F-3801-4AD0-9A63-EB294A029D7C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.9", + "matchCriteriaId": "1ACEA981-1D96-49F1-8048-74D21D71FD39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.6", + "matchCriteriaId": "34E8C966-19C7-4376-A0C3-A242720F62DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.6.8", + "matchCriteriaId": "70D16512-F797-4C1B-8612-FCB4B6039C2C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.6", + "matchCriteriaId": "51E2E93B-C5A3-4C83-B806-2EC555AD45FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.6", + "matchCriteriaId": "035D8460-BD6F-4696-9D7B-BA571A994FD0" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/16", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/17", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/18", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/19", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/21", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214116", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214117", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214119", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214120", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214124", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40822.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40822.json index 12d31b73032..6050ae39141 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40822.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40822.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40822", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:13.840", - "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T17:06:23.417", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,156 @@ "value": " Este problema se solucion\u00f3 restringiendo las opciones ofrecidas en un dispositivo bloqueado. Este problema se solucion\u00f3 en watchOS 10.6, macOS Sonoma 14.6, iOS 17.6 y iPadOS 17.6, iOS 16.7.9 y iPadOS 16.7.9. Un atacante con acceso f\u00edsico a un dispositivo puede acceder a los contactos desde la pantalla de bloqueo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.4, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.9", + "matchCriteriaId": "29A9994D-AE71-45E0-8CC5-E6219420F7E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.6", + "matchCriteriaId": "B191C80F-3801-4AD0-9A63-EB294A029D7C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.9", + "matchCriteriaId": "1ACEA981-1D96-49F1-8048-74D21D71FD39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.6", + "matchCriteriaId": "34E8C966-19C7-4376-A0C3-A242720F62DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.6", + "matchCriteriaId": "687902EF-637F-4537-B419-15A1695370B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.6", + "matchCriteriaId": "035D8460-BD6F-4696-9D7B-BA571A994FD0" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/16", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/17", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/18", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/21", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214116", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214117", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214119", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214124", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40823.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40823.json index d9814c2e796..bb96edeb401 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40823.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40823.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40823", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:13.920", - "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T17:08:03.857", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,122 @@ "value": " El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.7.6", + "matchCriteriaId": "3556C7C3-14B6-4846-B3E8-FE07A503155F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.6.8", + "matchCriteriaId": "7008225C-B5B9-4F87-9392-DD2080717E9A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.6", + "matchCriteriaId": "51E2E93B-C5A3-4C83-B806-2EC555AD45FE" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/18", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/19", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/20", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214118", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214119", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214120", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41830.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41830.json index 8258f784cec..8a8f98a75ff 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41830.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41830.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41830", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:28.087", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T17:17:23.687", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -47,10 +47,77 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndExcluding": "20.005.30655", + "matchCriteriaId": "B9311FEC-D9CC-421C-8E5E-8131E460FC42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "24.001.20604", + "versionEndExcluding": "24.001.30159", + "matchCriteriaId": "1A09E4B8-DB3B-45EC-B441-2C9549D299B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "24.002.21005", + "matchCriteriaId": "D555A6CB-9EDF-4CA2-B8E5-04A9D212FD8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.3005", + "versionEndExcluding": "20.005.30655", + "matchCriteriaId": "883444C8-35EB-4BDF-A14C-C4C5BF97239A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "24.002.21005", + "matchCriteriaId": "9CE03784-4780-4313-A27A-37B265BF3F9D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-57.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41831.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41831.json index 144d3206c8c..4e93e48a934 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41831.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41831.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41831", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:28.307", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T17:17:07.897", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -47,10 +47,77 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndExcluding": "20.005.30655", + "matchCriteriaId": "B9311FEC-D9CC-421C-8E5E-8131E460FC42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "24.001.20604", + "versionEndExcluding": "24.001.30159", + "matchCriteriaId": "1A09E4B8-DB3B-45EC-B441-2C9549D299B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "24.002.21005", + "matchCriteriaId": "D555A6CB-9EDF-4CA2-B8E5-04A9D212FD8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.3005", + "versionEndExcluding": "20.005.30655", + "matchCriteriaId": "883444C8-35EB-4BDF-A14C-C4C5BF97239A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "24.002.21005", + "matchCriteriaId": "9CE03784-4780-4313-A27A-37B265BF3F9D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-57.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41832.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41832.json index b484c8bdc44..5fd4ee9bbd8 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41832.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41832.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41832", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:28.530", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T17:16:41.400", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -47,10 +47,77 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndExcluding": "20.005.30655", + "matchCriteriaId": "B9311FEC-D9CC-421C-8E5E-8131E460FC42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "24.001.20604", + "versionEndExcluding": "24.001.30159", + "matchCriteriaId": "1A09E4B8-DB3B-45EC-B441-2C9549D299B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "24.002.21005", + "matchCriteriaId": "D555A6CB-9EDF-4CA2-B8E5-04A9D212FD8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.3005", + "versionEndExcluding": "20.005.30655", + "matchCriteriaId": "883444C8-35EB-4BDF-A14C-C4C5BF97239A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "24.002.21005", + "matchCriteriaId": "9CE03784-4780-4313-A27A-37B265BF3F9D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-57.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41833.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41833.json index 40ecec04689..8177edefe0c 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41833.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41833.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41833", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:28.757", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T17:16:37.090", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -47,10 +47,77 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndExcluding": "20.005.30655", + "matchCriteriaId": "B9311FEC-D9CC-421C-8E5E-8131E460FC42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "24.001.20604", + "versionEndExcluding": "24.001.30159", + "matchCriteriaId": "1A09E4B8-DB3B-45EC-B441-2C9549D299B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "24.002.21005", + "matchCriteriaId": "D555A6CB-9EDF-4CA2-B8E5-04A9D212FD8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.3005", + "versionEndExcluding": "20.005.30655", + "matchCriteriaId": "883444C8-35EB-4BDF-A14C-C4C5BF97239A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "24.002.21005", + "matchCriteriaId": "9CE03784-4780-4313-A27A-37B265BF3F9D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-57.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41834.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41834.json index 0531056effa..44dd158541c 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41834.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41834.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41834", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:28.983", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T17:13:25.090", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -47,10 +47,77 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndExcluding": "20.005.30655", + "matchCriteriaId": "B9311FEC-D9CC-421C-8E5E-8131E460FC42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "24.001.20604", + "versionEndExcluding": "24.001.30159", + "matchCriteriaId": "1A09E4B8-DB3B-45EC-B441-2C9549D299B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "24.002.21005", + "matchCriteriaId": "D555A6CB-9EDF-4CA2-B8E5-04A9D212FD8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.3005", + "versionEndExcluding": "20.005.30655", + "matchCriteriaId": "883444C8-35EB-4BDF-A14C-C4C5BF97239A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "24.002.21005", + "matchCriteriaId": "9CE03784-4780-4313-A27A-37B265BF3F9D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-57.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41835.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41835.json index ecb3de16b4f..49a7bc8f68b 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41835.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41835.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41835", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:29.207", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T17:13:11.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + }, { "source": "psirt@adobe.com", "type": "Secondary", @@ -47,10 +57,77 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndExcluding": "20.005.30655", + "matchCriteriaId": "B9311FEC-D9CC-421C-8E5E-8131E460FC42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "24.001.20604", + "versionEndExcluding": "24.001.30159", + "matchCriteriaId": "1A09E4B8-DB3B-45EC-B441-2C9549D299B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "24.002.21005", + "matchCriteriaId": "D555A6CB-9EDF-4CA2-B8E5-04A9D212FD8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.3005", + "versionEndExcluding": "20.005.30655", + "matchCriteriaId": "883444C8-35EB-4BDF-A14C-C4C5BF97239A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "24.002.21005", + "matchCriteriaId": "9CE03784-4780-4313-A27A-37B265BF3F9D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-57.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42546.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42546.json index eb141a1e2ca..4d2042d1bbb 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42546.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42546.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42546", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-12T19:15:16.940", - "lastModified": "2024-08-13T17:08:30.107", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-15T16:35:15.603", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42624.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42624.json index ddddeaf7d84..994bdd9457d 100644 --- a/CVE-2024/CVE-2024-426xx/CVE-2024-42624.json +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42624.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42624", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-12T17:15:18.063", - "lastModified": "2024-08-13T13:24:48.877", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-15T17:35:08.070", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42628.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42628.json index 0f593165c0d..5c5791b79e0 100644 --- a/CVE-2024/CVE-2024-426xx/CVE-2024-42628.json +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42628.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42628", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-12T16:15:16.887", - "lastModified": "2024-08-13T13:18:32.317", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-15T17:35:08.840", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42676.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42676.json index 23eabb8263a..7c2055b3f76 100644 --- a/CVE-2024/CVE-2024-426xx/CVE-2024-42676.json +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42676.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42676", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-15T14:15:10.683", - "lastModified": "2024-08-15T14:15:10.683", - "vulnStatus": "Received", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "File Upload vulnerability in Huizhi enterprise resource management system v.1.0 and before allows a remote attacker to execute arbitrary code via the /nssys/common/Upload. Aspx? Action=DNPageAjaxPostBack component" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://github.com/WarmBrew/web_vul/blob/main/HZ-cve/HZupload.md", diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42677.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42677.json index 78cac721268..96d5a444389 100644 --- a/CVE-2024/CVE-2024-426xx/CVE-2024-42677.json +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42677.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42677", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-15T14:15:10.813", - "lastModified": "2024-08-15T14:15:10.813", - "vulnStatus": "Received", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42678.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42678.json index a4a0db047fa..a6108524147 100644 --- a/CVE-2024/CVE-2024-426xx/CVE-2024-42678.json +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42678.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42678", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-15T14:15:10.910", - "lastModified": "2024-08-15T15:35:13.793", - "vulnStatus": "Received", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42679.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42679.json index 087876b784d..5c39d85e02e 100644 --- a/CVE-2024/CVE-2024-426xx/CVE-2024-42679.json +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42679.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42679", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-15T14:15:11.003", - "lastModified": "2024-08-15T14:15:11.003", - "vulnStatus": "Received", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42680.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42680.json index 399ffd5527c..3238ec14df0 100644 --- a/CVE-2024/CVE-2024-426xx/CVE-2024-42680.json +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42680.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42680", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-15T14:15:11.107", - "lastModified": "2024-08-15T14:15:11.107", - "vulnStatus": "Received", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42681.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42681.json new file mode 100644 index 00000000000..35015f938f3 --- /dev/null +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42681.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42681", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:18.303", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insecure Permissions vulnerability in xxl-job v.2.4.1 allows a remote attacker to execute arbitrary code via the Sub-Task ID component." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/xuxueli/xxl-job/issues/3516", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-428xx/CVE-2024-42843.json b/CVE-2024/CVE-2024-428xx/CVE-2024-42843.json new file mode 100644 index 00000000000..ce8c36be5f6 --- /dev/null +++ b/CVE-2024/CVE-2024-428xx/CVE-2024-42843.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42843", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:18.400", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Projectworlds Online Examination System v1.0 is vulnerable to SQL Injection via the subject parameter in feed.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/ganzhi-qcy/cve/issues/6", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42940.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42940.json new file mode 100644 index 00000000000..25b34a8b929 --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42940.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42940", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:18.500", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the page parameter in the fromP2pListFilter function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1201/fromP2pListFilter.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42941.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42941.json new file mode 100644 index 00000000000..ae6d456e2c1 --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42941.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42941", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:18.603", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the wanmode parameter in the fromAdvSetWan function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1201/fromAdvSetWan_pptpPPW.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42942.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42942.json new file mode 100644 index 00000000000..a2baea58b89 --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42942.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42942", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:18.703", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the page parameter in the frmL7ImForm function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1201/frmL7ImForm.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42943.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42943.json new file mode 100644 index 00000000000..cdb1f4831f9 --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42943.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42943", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:18.800", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the PPPOEPassword parameter in the fromAdvSetWan function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1201/fromAdvSetWan_PPPOEPassword.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42944.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42944.json new file mode 100644 index 00000000000..6dc26085c28 --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42944.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42944", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:18.903", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the page parameter in the fromNatlimit function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1201/fromNatlimit.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42945.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42945.json new file mode 100644 index 00000000000..c6f549675ea --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42945.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42945", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:19.007", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the page parameter in the fromAddressNat function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1201/fromAddressNat_page.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42946.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42946.json new file mode 100644 index 00000000000..03f5ab43885 --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42946.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42946", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:19.097", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the page parameter in the fromVirtualSer function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1201/fromVirtualSer.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42947.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42947.json new file mode 100644 index 00000000000..0a3f3d6ef98 --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42947.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42947", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:19.187", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in the handler function in /goform/telnet of Tenda FH1201 v1.2.0.14 (408) allows attackers to execute arbitrary commands via a crafted HTTP request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1201/telnet.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42948.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42948.json new file mode 100644 index 00000000000..cce5e8582ff --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42948.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42948", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:19.287", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the delno parameter in the fromPptpUserSetting function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1201/fromPptpUserSetting.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42949.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42949.json new file mode 100644 index 00000000000..00dac9b6f2b --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42949.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42949", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:19.383", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the qos parameter in the fromqossetting function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1201/fromqossetting_qos.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42950.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42950.json new file mode 100644 index 00000000000..70c619dc6bb --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42950.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42950", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:19.497", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the Go parameter in the fromSafeClientFilter function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1201/fromSafeClientFilter_Go.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42951.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42951.json new file mode 100644 index 00000000000..9c35c36ba78 --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42951.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42951", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:19.593", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the mit_pptpusrpw parameter in the fromWizardHandle function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1201/fromWizardHandle_mit_pptpusrpw.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42952.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42952.json new file mode 100644 index 00000000000..1edb576be37 --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42952.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42952", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:19.690", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the page parameter in the fromqossetting function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1201/fromqossetting_page.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42953.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42953.json new file mode 100644 index 00000000000..3fc44231a60 --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42953.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42953", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:19.790", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the PPW parameter in the fromWizardHandle function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1201/fromWizardHandle_PPW.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42954.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42954.json new file mode 100644 index 00000000000..7b1a3e2478d --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42954.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42954", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:19.900", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the page parameter in the fromwebExcptypemanFilter function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1201/fromwebExcptypemanFilter.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42955.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42955.json new file mode 100644 index 00000000000..a50cad24a05 --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42955.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42955", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:19.990", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the page parameter in the fromSafeClientFilter function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1201/fromSafeClientFilter_page.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42966.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42966.json new file mode 100644 index 00000000000..6118103f718 --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42966.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42966", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:20.130", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect access control in TOTOLINK N350RT V9.3.5u.6139_B20201216 allows attackers to obtain the apmib configuration file, which contains the username and the password, via a crafted request to /cgi-bin/ExportSettings.sh." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/TOTOLINK/N350R/ExportSettings.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42967.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42967.json new file mode 100644 index 00000000000..ad64148f6c8 --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42967.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42967", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:20.273", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect access control in TOTOLINK LR350 V9.3.5u.6369_B20220309 allows attackers to obtain the apmib configuration file, which contains the username and the password, via a crafted request to /cgi-bin/ExportSettings.sh." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/TOTOLINK/LR350/ExportSettings.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42968.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42968.json new file mode 100644 index 00000000000..dc976c7b253 --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42968.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42968", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:20.373", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1206 v02.03.01.35 was discovered to contain a stack overflow via the Go parameter in the fromSafeUrlFilter function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1206/fromSafeMacFilter_Go.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42969.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42969.json new file mode 100644 index 00000000000..614af001c4b --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42969.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42969", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:20.480", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1206 v02.03.01.35 was discovered to contain a stack overflow via the page parameter in the fromSafeUrlFilter function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1206/fromSafeMacFilter%20_page.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42973.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42973.json new file mode 100644 index 00000000000..f739ff52bc6 --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42973.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42973", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:20.573", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1206 v02.03.01.35 was discovered to contain a stack overflow via the page parameter in the fromSetlpBind function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1206/fromSetIpBind.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42974.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42974.json new file mode 100644 index 00000000000..6e55d00cf7f --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42974.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42974", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:20.667", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1206 v02.03.01.35 was discovered to contain a stack overflow via the page parameter in the fromwebExcptypemanFilter function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1206/fromwebExcptypemanFilter.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42976.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42976.json new file mode 100644 index 00000000000..7d229486575 --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42976.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42976", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:20.767", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1206 v02.03.01.35 was discovered to contain a stack overflow via the page parameter in the fromSafeClientFilter function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1206/fromSafeClientFilter_page.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42977.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42977.json new file mode 100644 index 00000000000..7979968759b --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42977.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42977", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:20.860", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1206 v02.03.01.35 was discovered to contain a stack overflow via the qos parameter in the fromqossetting function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1206/fromqossetting_qos.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42978.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42978.json new file mode 100644 index 00000000000..8418b56d614 --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42978.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42978", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:20.960", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in the handler function in /goform/telnet of Tenda FH1206 v02.03.01.35 allows attackers to execute arbitrary commands via a crafted HTTP request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1206/telnet.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42979.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42979.json new file mode 100644 index 00000000000..ca9c37abf8f --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42979.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42979", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:21.057", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1206 v02.03.01.35 was discovered to contain a stack overflow via the page parameter in the frmL7ProtForm function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1206/frmL7ProtForm.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42980.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42980.json new file mode 100644 index 00000000000..ca3d9d02612 --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42980.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42980", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:21.147", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1206 v02.03.01.35 was discovered to contain a stack overflow via the page parameter in the frmL7ImForm function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1206/frmL7ImForm.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42981.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42981.json new file mode 100644 index 00000000000..37f88eac395 --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42981.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42981", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:21.240", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1206 v02.03.01.35 was discovered to contain a stack overflow via the delno parameter in the fromPptpUserSetting function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1206/fromPptpUserSetting.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42982.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42982.json new file mode 100644 index 00000000000..e7d149032cf --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42982.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42982", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:21.337", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1206 v02.03.01.35 was discovered to contain a stack overflow via the page parameter in the fromVirtualSer function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1206/fromVirtualSer.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42983.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42983.json new file mode 100644 index 00000000000..1ed8d85c532 --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42983.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42983", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:21.433", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1206 v02.03.01.35 was discovered to contain a stack overflow via the pptpPPW parameter in the fromAdvSetWan function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1206/fromAdvSetWan_pptpPPW.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42984.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42984.json new file mode 100644 index 00000000000..08024e552f9 --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42984.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42984", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:21.523", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1206 v02.03.01.35 was discovered to contain a stack overflow via the page parameter in the fromP2pListFilter function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1206/fromP2pListFilter.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42985.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42985.json new file mode 100644 index 00000000000..5061a66cf26 --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42985.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42985", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:21.623", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1206 v02.03.01.35 was discovered to contain a stack overflow via the page parameter in the fromNatlimit function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1206/fromNatlimit.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42986.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42986.json new file mode 100644 index 00000000000..8350ccd2ba4 --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42986.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42986", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:21.717", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1206 v02.03.01.35 was discovered to contain a stack overflow via the PPPOEPassword parameter in the fromAdvSetWan function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1206/fromAdvSetWan_PPPOEPassword.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42987.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42987.json new file mode 100644 index 00000000000..f9eb7b95f1d --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42987.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42987", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-15T17:15:21.820", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1206 v02.03.01.35 was discovered to contain a stack overflow via the modino parameter in the fromPptpUserAdd function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1206/fromPptpUserAdd.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43373.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43373.json index 7d9b22b83f8..f3c446b697c 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43373.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43373.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43373", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-15T15:15:21.217", - "lastModified": "2024-08-15T15:15:21.217", - "vulnStatus": "Received", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6041.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6041.json index 8178b23b056..0a8b1062393 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6041.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6041.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6041", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-16T23:15:49.417", - "lastModified": "2024-06-17T14:15:12.733", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-15T17:08:11.093", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:admerc:gym_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "959641DE-44CC-4870-AEDF-5E73A4BC5687" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ssiicckk/cve/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.268765", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.268765", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.357816", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6042.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6042.json index 809a7e241df..bbc85763d3b 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6042.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6042.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6042", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-17T00:15:09.323", - "lastModified": "2024-06-17T12:42:04.623", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T17:13:52.290", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:angeljudesuarez:real_estate_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "89CC775B-6E0F-474F-AE02-7D933814C0ED" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Cormac315/cve/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.268766", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.268766", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.357851", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6050.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6050.json index 0d45d74bd7c..65f27198588 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6050.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6050.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6050", "sourceIdentifier": "cvd@cert.pl", "published": "2024-07-01T14:15:05.893", - "lastModified": "2024-07-01T16:37:39.040", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-15T17:21:21.920", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,9 +59,41 @@ "baseSeverity": "MEDIUM" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "cvd@cert.pl", "type": "Secondary", @@ -73,14 +105,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sokrates:sowa_opac:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0", + "versionEndExcluding": "4.9.10", + "matchCriteriaId": "CF0045B8-0040-4270-9AF8-F72CFCEAF07D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sokrates:sowa_opac:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0", + "versionEndExcluding": "6.2.12", + "matchCriteriaId": "562ACEC4-A802-4A0C-BE9E-ECEDE028E52C" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert.pl/en/posts/2024/07/CVE-2024-6050/", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://cert.pl/posts/2024/07/CVE-2024-6050/", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6347.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6347.json index 6cfa1d36d34..7f7cf7ee8b5 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6347.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6347.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6347", "sourceIdentifier": "cve@asrg.io", "published": "2024-08-15T15:15:22.093", - "lastModified": "2024-08-15T15:15:22.093", - "vulnStatus": "Received", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6417.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6417.json index aaa3ae1edd6..8007397885d 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6417.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6417.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6417", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-30T23:15:02.680", - "lastModified": "2024-07-01T12:37:24.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T17:16:17.793", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:simple_online_bidding_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0BDDF483-CE42-4DCA-95DC-47AF1F9FB9CF" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/xyj123a/cve/blob/main/sql.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.270008", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.270008", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.365234", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6418.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6418.json index 739dd302aa5..13f8394191f 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6418.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6418.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6418", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-30T23:15:02.953", - "lastModified": "2024-07-01T12:37:24.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T17:18:04.637", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -109,6 +129,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +150,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:medicine_tracker_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "44A35599-C92F-4A69-B7B1-C768223118FD" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/jadu101/CVE/blob/main/SourceCodester_Medicine_Tracker_System_Users_php_sqli.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.270009", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.270009", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.365240", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6419.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6419.json index 74057d08bea..53cb26fc88d 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6419.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6419.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6419", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-01T00:15:01.950", - "lastModified": "2024-07-01T12:37:24.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T17:18:53.077", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:medicine_tracker_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "44A35599-C92F-4A69-B7B1-C768223118FD" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/jadu101/CVE/blob/main/SourceCodester_Medicine_Tracker_System_Master_php_sqli.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.270010", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.270010", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.365247", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7262.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7262.json index d6d77754c7b..83768acab9e 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7262.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7262.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7262", "sourceIdentifier": "security@eset.com", "published": "2024-08-15T15:15:22.290", - "lastModified": "2024-08-15T15:15:22.290", - "vulnStatus": "Received", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7263.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7263.json index a2c27c9564b..73ae3bdfaca 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7263.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7263.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7263", "sourceIdentifier": "security@eset.com", "published": "2024-08-15T15:15:22.453", - "lastModified": "2024-08-15T15:15:22.453", - "vulnStatus": "Received", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7645.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7645.json index 97f2d55cb45..6ad6e895109 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7645.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7645.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7645", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-12T13:38:48.607", - "lastModified": "2024-08-12T13:41:36.517", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T17:43:58.627", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Clinics Patient Management System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file users.php of the component User Page. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Clinics Patient Management System 1.0. Ha sido declarada problem\u00e1tica. Esta vulnerabilidad afecta a un c\u00f3digo desconocido del archivo users.php del componente User Page. La manipulaci\u00f3n conduce a Cross-Site Request Forgery. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -116,22 +140,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:clinics_patient_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "495417C1-C3B3-4728-8257-DD16BA4C63CA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ddChenA/cve/blob/main/csrf.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.274066", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.274066", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.387399", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7657.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7657.json index 7e821ddbb43..d6b3c71c645 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7657.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7657.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7657", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-12T13:38:49.340", - "lastModified": "2024-08-12T13:41:36.517", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T17:48:20.920", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic was found in Gila CMS 1.10.9. This vulnerability affects unknown code of the file /cm/update_rows/page?id=2 of the component HTTP POST Request Handler. The manipulation of the argument content leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en Gila CMS 1.10.9 y clasificada como problem\u00e1tica. Esta vulnerabilidad afecta a c\u00f3digo desconocido del archivo /cm/update_rows/page?id=2 del componente HTTP POST Request Handler. La manipulaci\u00f3n del contenido del argumento conduce a cross site scripting. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -116,18 +140,48 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gilacms:gila_cms:1.10.9:*:*:*:*:*:*:*", + "matchCriteriaId": "6805BD25-8FA0-4122-853F-1BFFF636E069" + } + ] + } + ] + } + ], "references": [ { "url": "https://vuldb.com/?ctiid.274114", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.274114", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.384630", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7659.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7659.json index c6a6c3bd87a..025281aad42 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7659.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7659.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7659", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-12T13:38:49.920", - "lastModified": "2024-08-12T13:41:36.517", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T17:49:42.667", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in projectsend up to r1605. Affected is the function generate_random_string of the file includes/functions.php of the component Password Reset Token Handler. The manipulation leads to insufficiently random values. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version r1720 is able to address this issue. The name of the patch is aa27eb97edc2ff2b203f97e6675d7b5ba0a22a17. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en proyectos hasta r1605 y clasificada como problem\u00e1tica. La funci\u00f3n generate_random_string del archivo include/functions.php del componente Password Reset Token Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a valores insuficientemente aleatorios. Es posible lanzar el ataque de forma remota. La complejidad de un ataque es bastante alta. Se dice que la explotabilidad es dif\u00edcil. La actualizaci\u00f3n a la versi\u00f3n r1720 puede solucionar este problema. El nombre del parche es aa27eb97edc2ff2b203f97e6675d7b5ba0a22a17. Se recomienda actualizar el componente afectado." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -116,26 +140,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:projectsend:projectsend:*:*:*:*:*:*:*:*", + "versionEndExcluding": "r1720", + "matchCriteriaId": "7595D81C-8332-4FF5-A6B6-DF6203DEF6A5" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/projectsend/projectsend/commit/aa27eb97edc2ff2b203f97e6675d7b5ba0a22a17", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/projectsend/projectsend/releases/tag/r1720", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://vuldb.com/?ctiid.274116", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.274116", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.385004", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7660.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7660.json index b8d6c098aca..e028690f516 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7660.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7660.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7660", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-12T13:38:50.210", - "lastModified": "2024-08-12T13:41:36.517", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T17:50:39.307", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in SourceCodester File Manager App 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Add File Handler. The manipulation of the argument File Title/Uploaded By leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en la aplicaci\u00f3n SourceCodester File Manager 1.0 y se clasific\u00f3 como problem\u00e1tica. Una funci\u00f3n desconocida del componente Add File Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento T\u00edtulo del archivo/Subido por conduce a cross site scripting. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -105,6 +129,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -116,22 +150,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rems:file_manager_app:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "6934521D-2D4F-420D-8ED0-985B79738EFB" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.google.com/document/d/19jCrr48SwP9dkOAaf8HAgg0fxK7PjE4ZWbPSFU4zqKE/edit?usp=sharing", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.274117", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.274117", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.388434", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7661.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7661.json index 3e52b7ee404..f393f2c9d41 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7661.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7661.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7661", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-12T13:38:50.527", - "lastModified": "2024-08-12T13:41:36.517", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T17:51:39.870", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Car Driving School Management System 1.0. It has been classified as problematic. This affects the function save_users of the file admin/user/index.php. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Car Driving School Management System 1.0. Ha sido clasificada como problem\u00e1tica. Esto afecta a la funci\u00f3n save_users del archivo admin/user/index.php. La manipulaci\u00f3n conduce a Cross-Site Request Forgery. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -116,22 +140,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:car_driving_school_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "227C699A-1CA9-4101-8867-969988C2E03C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/BFS-Lab/BFSDV/blob/main/Sourcecodester%20Online%20Catering%20Reservation%20System%20CSRF-1.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.274119", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.274119", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.388765", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7662.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7662.json index 5d03791c26d..e0b491c607d 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7662.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7662.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7662", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-12T13:38:50.820", - "lastModified": "2024-08-12T13:41:36.517", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T17:54:26.217", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Car Driving School Management System 1.0. It has been declared as problematic. This vulnerability affects the function save_package of the file admin/packages/manag_package.php. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Car Driving School Management System 1.0. Ha sido declarada problem\u00e1tica. Esta vulnerabilidad afecta a la funci\u00f3n save_package del archivo admin/packages/manag_package.php. La manipulaci\u00f3n conduce a Cross-Site Request Forgery. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -116,22 +140,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:car_driving_school_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "227C699A-1CA9-4101-8867-969988C2E03C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/BFS-Lab/BFSDV/blob/main/Sourcecodester%20Online%20Catering%20Reservation%20System%20CSRF-2.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.274120", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.274120", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.388766", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7663.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7663.json index 083f42728e0..9bce540acd5 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7663.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7663.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7663", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-12T13:38:51.097", - "lastModified": "2024-08-12T13:41:36.517", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-15T17:56:43.847", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Car Driving School Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file manage_user.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Car Driving School Management System 1.0. Ha sido calificada como cr\u00edtica. Este problema afecta un procesamiento desconocido del archivo Manage_user.php. La manipulaci\u00f3n del argumento id conduce a la inyecci\u00f3n de SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -116,22 +140,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:car_driving_school_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "227C699A-1CA9-4101-8867-969988C2E03C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/BFS-Lab/BFSDV/blob/main/Sourcecodester%20Online%20Catering%20Reservation%20System%20SQL%20Injection-1.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.274121", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.274121", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.388767", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7664.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7664.json index bace47bf39a..7fd6472d18e 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7664.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7664.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7664", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-12T13:38:51.397", - "lastModified": "2024-08-12T13:41:36.517", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-15T17:57:57.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in SourceCodester Car Driving School Management System 1.0. Affected is an unknown function of the file view_details.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en SourceCodester Car Driving School Management System 1.0 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo view_details.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento id conduce a la inyecci\u00f3n de SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -105,6 +129,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -116,22 +150,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:car_driving_school_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "227C699A-1CA9-4101-8867-969988C2E03C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/BFS-Lab/BFSDV/blob/main/Sourcecodester%20Online%20Catering%20Reservation%20System%20SQL%20Injection-2.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.274122", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.274122", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.388768", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7748.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7748.json index c358f625bac..151f1412e4a 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7748.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7748.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7748", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-13T22:15:08.087", - "lastModified": "2024-08-14T02:07:05.410", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T17:22:53.340", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in SourceCodester Accounts Manager App 1.0. This issue affects some unknown processing of the file /endpoint/delete-account.php. The manipulation of the argument account leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en SourceCodester Accounts Manager App 1.0 y clasificada como cr\u00edtica. Este problema afecta un procesamiento desconocido del archivo /endpoint/delete-account.php. La manipulaci\u00f3n del argumento cuenta conduce a la inyecci\u00f3n de SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -116,22 +140,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rems:accounts_manager_app:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "17629DBC-9D8D-48B5-BFF8-B1394F51E13F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/joinia/webray.com.cn/blob/main/Accounts-Manager-App/Accounts-Manager-Appsql.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.274367", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.274367", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.389358", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7749.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7749.json index 8bc219eadf6..73d09dd8685 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7749.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7749.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7749", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-13T22:15:08.390", - "lastModified": "2024-08-14T02:07:05.410", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T17:23:28.410", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in SourceCodester Accounts Manager App 1.0. Affected is an unknown function of the file /endpoint/add-account.php. The manipulation of the argument account_name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en SourceCodester Accounts Manager App 1.0 y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo /endpoint/add-account.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento nombre_cuenta conduce a cross site scripting. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -116,22 +140,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rems:accounts_manager_app:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "17629DBC-9D8D-48B5-BFF8-B1394F51E13F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/joinia/webray.com.cn/blob/main/Accounts-Manager-App/Accounts-Manager-Appxss.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.274368", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.274368", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.389359", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7750.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7750.json index 9059a1a757d..1ff3f53e054 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7750.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7750.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7750", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-13T23:15:19.827", - "lastModified": "2024-08-14T02:07:05.410", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T17:24:54.153", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in SourceCodester Clinics Patient Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /medicines.php. The manipulation of the argument medicine_name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en SourceCodester Clinics Patient Management System 1.0 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo /medicines.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento nombre_medicamento conduce a la inyecci\u00f3n SQL. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -116,22 +140,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:clinics_patient_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "495417C1-C3B3-4728-8257-DD16BA4C63CA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Wsstiger/cve/blob/main/Clinic's_sql.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.274369", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.274369", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.389293", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7751.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7751.json index a2d6db2963f..23e377ba0a9 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7751.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7751.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7751", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-13T23:15:20.110", - "lastModified": "2024-08-14T02:07:05.410", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T17:26:09.083", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Clinics Patient Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /update_medicine.php. The manipulation of the argument hidden_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en SourceCodester Clinics Patient Management System 1.0 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo /update_medicine.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento id_oculto conduce a la inyecci\u00f3n de SQL. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -116,22 +140,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:clinics_patient_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "495417C1-C3B3-4728-8257-DD16BA4C63CA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Wsstiger/cve/blob/main/Clinic's_sql2.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.274370", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.274370", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.389295", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7752.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7752.json index 8a1f6948863..d8f70444c87 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7752.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7752.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7752", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-14T00:15:08.433", - "lastModified": "2024-08-14T02:07:05.410", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T17:27:13.183", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Clinics Patient Management System 1.0. It has been classified as problematic. This affects an unknown part of the file /update_medicine.php. The manipulation of the argument medicine_name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Clinics Patient Management System 1.0. Ha sido clasificada como problem\u00e1tica. Esto afecta a una parte desconocida del archivo /update_medicine.php. La manipulaci\u00f3n del argumento nombre_medicamento conduce a cross site scripting. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -116,22 +140,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:clinics_patient_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "495417C1-C3B3-4728-8257-DD16BA4C63CA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Wsstiger/cve/blob/main/Clinic's_xss.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.274371", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.274371", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.389305", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7753.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7753.json index 51d7c346197..c6f30bcb081 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7753.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7753.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7753", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-14T01:15:12.120", - "lastModified": "2024-08-14T02:07:05.410", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T17:28:49.587", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Clinics Patient Management System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /user_images/. The manipulation leads to direct request. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Clinics Patient Management System 1.0. Ha sido declarada problem\u00e1tica. Esta vulnerabilidad afecta a c\u00f3digo desconocido del archivo /user_images/. La manipulaci\u00f3n conduce a una solicitud directa. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -116,22 +140,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:clinics_patient_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "495417C1-C3B3-4728-8257-DD16BA4C63CA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Wsstiger/cve/blob/main/Clinic's_Directory.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.274372", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.274372", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.389361", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7754.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7754.json index da32d5efde6..bb981156b58 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7754.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7754.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7754", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-14T01:15:12.417", - "lastModified": "2024-08-14T02:07:05.410", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-15T17:30:41.807", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Clinics Patient Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /ajax/check_medicine_name.php. The manipulation of the argument user_name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Clinics Patient Management System 1.0. Ha sido calificada como cr\u00edtica. Este problema afecta un procesamiento desconocido del archivo /ajax/check_medicine_name.php. La manipulaci\u00f3n del argumento nombre_usuario conduce a la inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -116,22 +140,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:clinics_patient_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "495417C1-C3B3-4728-8257-DD16BA4C63CA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Wsstiger/cve/blob/main/Clinic's_sql3.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.274373", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.274373", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.389367", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7828.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7828.json index 415492fb123..65e2deb4aa9 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7828.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7828.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7828", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-15T13:15:13.197", - "lastModified": "2024-08-15T13:33:37.047", + "lastModified": "2024-08-15T16:15:23.897", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -128,6 +128,10 @@ "url": "https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_set_cover.md", "source": "cna@vuldb.com" }, + { + "url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383", + "source": "cna@vuldb.com" + }, { "url": "https://vuldb.com/?ctiid.274726", "source": "cna@vuldb.com" diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7829.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7829.json index efa69d5b89f..ab845b8fb2b 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7829.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7829.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7829", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-15T13:15:14.107", - "lastModified": "2024-08-15T14:15:13.560", + "lastModified": "2024-08-15T16:15:24.677", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -128,6 +128,10 @@ "url": "https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_del_photo.md", "source": "cna@vuldb.com" }, + { + "url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383", + "source": "cna@vuldb.com" + }, { "url": "https://vuldb.com/?ctiid.274727", "source": "cna@vuldb.com" diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7830.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7830.json index 7f8705a3635..d5b2afc7bc9 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7830.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7830.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7830", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-15T13:15:14.617", - "lastModified": "2024-08-15T15:15:25.340", + "lastModified": "2024-08-15T16:15:25.330", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -128,6 +128,10 @@ "url": "https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_move_photo.md", "source": "cna@vuldb.com" }, + { + "url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383", + "source": "cna@vuldb.com" + }, { "url": "https://vuldb.com/?ctiid.274728", "source": "cna@vuldb.com" diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7831.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7831.json index d71483c8677..f12ccc0a0b4 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7831.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7831.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7831", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-15T13:15:15.107", - "lastModified": "2024-08-15T15:15:25.947", + "lastModified": "2024-08-15T16:15:25.957", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -128,6 +128,10 @@ "url": "https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_get_cooliris.md", "source": "cna@vuldb.com" }, + { + "url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383", + "source": "cna@vuldb.com" + }, { "url": "https://vuldb.com/?ctiid.274729", "source": "cna@vuldb.com" diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7832.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7832.json index 43a406b0bc2..5bf85d31890 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7832.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7832.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7832", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-15T14:15:14.210", - "lastModified": "2024-08-15T14:15:14.210", - "vulnStatus": "Received", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", @@ -128,6 +128,10 @@ "url": "https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_get_fullscreen_photos.md", "source": "cna@vuldb.com" }, + { + "url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383", + "source": "cna@vuldb.com" + }, { "url": "https://vuldb.com/?ctiid.274730", "source": "cna@vuldb.com" diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7833.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7833.json index fb681179fd6..563abe335e6 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7833.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7833.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7833", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-15T14:15:14.720", - "lastModified": "2024-08-15T14:15:14.720", - "vulnStatus": "Received", + "lastModified": "2024-08-15T17:34:07.033", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/README.md b/README.md index f79ba2537d2..bd4d09676fb 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-08-15T16:00:29.207261+00:00 +2024-08-15T18:00:33.030202+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-08-15T15:35:14.590000+00:00 +2024-08-15T17:57:57.097000+00:00 ``` ### Last Data Feed Release @@ -33,55 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -260104 +260147 ``` ### CVEs added in the last Commit -Recently added CVEs: `11` +Recently added CVEs: `43` -- [CVE-2024-42676](CVE-2024/CVE-2024-426xx/CVE-2024-42676.json) (`2024-08-15T14:15:10.683`) -- [CVE-2024-42677](CVE-2024/CVE-2024-426xx/CVE-2024-42677.json) (`2024-08-15T14:15:10.813`) -- [CVE-2024-42678](CVE-2024/CVE-2024-426xx/CVE-2024-42678.json) (`2024-08-15T14:15:10.910`) -- [CVE-2024-42679](CVE-2024/CVE-2024-426xx/CVE-2024-42679.json) (`2024-08-15T14:15:11.003`) -- [CVE-2024-42680](CVE-2024/CVE-2024-426xx/CVE-2024-42680.json) (`2024-08-15T14:15:11.107`) -- [CVE-2024-43373](CVE-2024/CVE-2024-433xx/CVE-2024-43373.json) (`2024-08-15T15:15:21.217`) -- [CVE-2024-6347](CVE-2024/CVE-2024-63xx/CVE-2024-6347.json) (`2024-08-15T15:15:22.093`) -- [CVE-2024-7262](CVE-2024/CVE-2024-72xx/CVE-2024-7262.json) (`2024-08-15T15:15:22.290`) -- [CVE-2024-7263](CVE-2024/CVE-2024-72xx/CVE-2024-7263.json) (`2024-08-15T15:15:22.453`) -- [CVE-2024-7832](CVE-2024/CVE-2024-78xx/CVE-2024-7832.json) (`2024-08-15T14:15:14.210`) -- [CVE-2024-7833](CVE-2024/CVE-2024-78xx/CVE-2024-7833.json) (`2024-08-15T14:15:14.720`) +- [CVE-2024-42949](CVE-2024/CVE-2024-429xx/CVE-2024-42949.json) (`2024-08-15T17:15:19.383`) +- [CVE-2024-42950](CVE-2024/CVE-2024-429xx/CVE-2024-42950.json) (`2024-08-15T17:15:19.497`) +- [CVE-2024-42951](CVE-2024/CVE-2024-429xx/CVE-2024-42951.json) (`2024-08-15T17:15:19.593`) +- [CVE-2024-42952](CVE-2024/CVE-2024-429xx/CVE-2024-42952.json) (`2024-08-15T17:15:19.690`) +- [CVE-2024-42953](CVE-2024/CVE-2024-429xx/CVE-2024-42953.json) (`2024-08-15T17:15:19.790`) +- [CVE-2024-42954](CVE-2024/CVE-2024-429xx/CVE-2024-42954.json) (`2024-08-15T17:15:19.900`) +- [CVE-2024-42955](CVE-2024/CVE-2024-429xx/CVE-2024-42955.json) (`2024-08-15T17:15:19.990`) +- [CVE-2024-42966](CVE-2024/CVE-2024-429xx/CVE-2024-42966.json) (`2024-08-15T17:15:20.130`) +- [CVE-2024-42967](CVE-2024/CVE-2024-429xx/CVE-2024-42967.json) (`2024-08-15T17:15:20.273`) +- [CVE-2024-42968](CVE-2024/CVE-2024-429xx/CVE-2024-42968.json) (`2024-08-15T17:15:20.373`) +- [CVE-2024-42969](CVE-2024/CVE-2024-429xx/CVE-2024-42969.json) (`2024-08-15T17:15:20.480`) +- [CVE-2024-42973](CVE-2024/CVE-2024-429xx/CVE-2024-42973.json) (`2024-08-15T17:15:20.573`) +- [CVE-2024-42974](CVE-2024/CVE-2024-429xx/CVE-2024-42974.json) (`2024-08-15T17:15:20.667`) +- [CVE-2024-42976](CVE-2024/CVE-2024-429xx/CVE-2024-42976.json) (`2024-08-15T17:15:20.767`) +- [CVE-2024-42977](CVE-2024/CVE-2024-429xx/CVE-2024-42977.json) (`2024-08-15T17:15:20.860`) +- [CVE-2024-42978](CVE-2024/CVE-2024-429xx/CVE-2024-42978.json) (`2024-08-15T17:15:20.960`) +- [CVE-2024-42979](CVE-2024/CVE-2024-429xx/CVE-2024-42979.json) (`2024-08-15T17:15:21.057`) +- [CVE-2024-42980](CVE-2024/CVE-2024-429xx/CVE-2024-42980.json) (`2024-08-15T17:15:21.147`) +- [CVE-2024-42981](CVE-2024/CVE-2024-429xx/CVE-2024-42981.json) (`2024-08-15T17:15:21.240`) +- [CVE-2024-42982](CVE-2024/CVE-2024-429xx/CVE-2024-42982.json) (`2024-08-15T17:15:21.337`) +- [CVE-2024-42983](CVE-2024/CVE-2024-429xx/CVE-2024-42983.json) (`2024-08-15T17:15:21.433`) +- [CVE-2024-42984](CVE-2024/CVE-2024-429xx/CVE-2024-42984.json) (`2024-08-15T17:15:21.523`) +- [CVE-2024-42985](CVE-2024/CVE-2024-429xx/CVE-2024-42985.json) (`2024-08-15T17:15:21.623`) +- [CVE-2024-42986](CVE-2024/CVE-2024-429xx/CVE-2024-42986.json) (`2024-08-15T17:15:21.717`) +- [CVE-2024-42987](CVE-2024/CVE-2024-429xx/CVE-2024-42987.json) (`2024-08-15T17:15:21.820`) ### CVEs modified in the last Commit -Recently modified CVEs: `30` +Recently modified CVEs: `125` -- [CVE-2024-25196](CVE-2024/CVE-2024-251xx/CVE-2024-25196.json) (`2024-08-15T14:35:01.030`) -- [CVE-2024-28066](CVE-2024/CVE-2024-280xx/CVE-2024-28066.json) (`2024-08-15T15:35:07.070`) -- [CVE-2024-28741](CVE-2024/CVE-2024-287xx/CVE-2024-28741.json) (`2024-08-15T15:35:08.427`) -- [CVE-2024-32901](CVE-2024/CVE-2024-329xx/CVE-2024-32901.json) (`2024-08-15T15:35:09.947`) -- [CVE-2024-33228](CVE-2024/CVE-2024-332xx/CVE-2024-33228.json) (`2024-08-15T15:35:10.277`) -- [CVE-2024-33960](CVE-2024/CVE-2024-339xx/CVE-2024-33960.json) (`2024-08-15T14:08:32.490`) -- [CVE-2024-33979](CVE-2024/CVE-2024-339xx/CVE-2024-33979.json) (`2024-08-15T14:07:24.257`) -- [CVE-2024-33980](CVE-2024/CVE-2024-339xx/CVE-2024-33980.json) (`2024-08-15T14:07:53.217`) -- [CVE-2024-33981](CVE-2024/CVE-2024-339xx/CVE-2024-33981.json) (`2024-08-15T14:08:13.003`) -- [CVE-2024-37273](CVE-2024/CVE-2024-372xx/CVE-2024-37273.json) (`2024-08-15T14:35:03.053`) -- [CVE-2024-37849](CVE-2024/CVE-2024-378xx/CVE-2024-37849.json) (`2024-08-15T15:35:11.593`) -- [CVE-2024-39549](CVE-2024/CVE-2024-395xx/CVE-2024-39549.json) (`2024-08-15T14:15:56.800`) -- [CVE-2024-41256](CVE-2024/CVE-2024-412xx/CVE-2024-41256.json) (`2024-08-15T14:27:18.487`) -- [CVE-2024-41258](CVE-2024/CVE-2024-412xx/CVE-2024-41258.json) (`2024-08-15T14:30:16.687`) -- [CVE-2024-4187](CVE-2024/CVE-2024-41xx/CVE-2024-4187.json) (`2024-08-15T14:45:27.797`) -- [CVE-2024-41955](CVE-2024/CVE-2024-419xx/CVE-2024-41955.json) (`2024-08-15T14:10:40.157`) -- [CVE-2024-42477](CVE-2024/CVE-2024-424xx/CVE-2024-42477.json) (`2024-08-15T14:02:23.130`) -- [CVE-2024-42478](CVE-2024/CVE-2024-424xx/CVE-2024-42478.json) (`2024-08-15T14:03:32.867`) -- [CVE-2024-42479](CVE-2024/CVE-2024-424xx/CVE-2024-42479.json) (`2024-08-15T14:03:53.203`) -- [CVE-2024-42744](CVE-2024/CVE-2024-427xx/CVE-2024-42744.json) (`2024-08-15T15:35:14.590`) -- [CVE-2024-6392](CVE-2024/CVE-2024-63xx/CVE-2024-6392.json) (`2024-08-15T14:56:16.490`) -- [CVE-2024-7715](CVE-2024/CVE-2024-77xx/CVE-2024-7715.json) (`2024-08-15T15:15:22.690`) -- [CVE-2024-7829](CVE-2024/CVE-2024-78xx/CVE-2024-7829.json) (`2024-08-15T14:15:13.560`) -- [CVE-2024-7830](CVE-2024/CVE-2024-78xx/CVE-2024-7830.json) (`2024-08-15T15:15:25.340`) -- [CVE-2024-7831](CVE-2024/CVE-2024-78xx/CVE-2024-7831.json) (`2024-08-15T15:15:25.947`) +- [CVE-2024-6418](CVE-2024/CVE-2024-64xx/CVE-2024-6418.json) (`2024-08-15T17:18:04.637`) +- [CVE-2024-6419](CVE-2024/CVE-2024-64xx/CVE-2024-6419.json) (`2024-08-15T17:18:53.077`) +- [CVE-2024-7262](CVE-2024/CVE-2024-72xx/CVE-2024-7262.json) (`2024-08-15T17:34:07.033`) +- [CVE-2024-7263](CVE-2024/CVE-2024-72xx/CVE-2024-7263.json) (`2024-08-15T17:34:07.033`) +- [CVE-2024-7645](CVE-2024/CVE-2024-76xx/CVE-2024-7645.json) (`2024-08-15T17:43:58.627`) +- [CVE-2024-7657](CVE-2024/CVE-2024-76xx/CVE-2024-7657.json) (`2024-08-15T17:48:20.920`) +- [CVE-2024-7659](CVE-2024/CVE-2024-76xx/CVE-2024-7659.json) (`2024-08-15T17:49:42.667`) +- [CVE-2024-7660](CVE-2024/CVE-2024-76xx/CVE-2024-7660.json) (`2024-08-15T17:50:39.307`) +- [CVE-2024-7661](CVE-2024/CVE-2024-76xx/CVE-2024-7661.json) (`2024-08-15T17:51:39.870`) +- [CVE-2024-7662](CVE-2024/CVE-2024-76xx/CVE-2024-7662.json) (`2024-08-15T17:54:26.217`) +- [CVE-2024-7663](CVE-2024/CVE-2024-76xx/CVE-2024-7663.json) (`2024-08-15T17:56:43.847`) +- [CVE-2024-7664](CVE-2024/CVE-2024-76xx/CVE-2024-7664.json) (`2024-08-15T17:57:57.097`) +- [CVE-2024-7748](CVE-2024/CVE-2024-77xx/CVE-2024-7748.json) (`2024-08-15T17:22:53.340`) +- [CVE-2024-7749](CVE-2024/CVE-2024-77xx/CVE-2024-7749.json) (`2024-08-15T17:23:28.410`) +- [CVE-2024-7750](CVE-2024/CVE-2024-77xx/CVE-2024-7750.json) (`2024-08-15T17:24:54.153`) +- [CVE-2024-7751](CVE-2024/CVE-2024-77xx/CVE-2024-7751.json) (`2024-08-15T17:26:09.083`) +- [CVE-2024-7752](CVE-2024/CVE-2024-77xx/CVE-2024-7752.json) (`2024-08-15T17:27:13.183`) +- [CVE-2024-7753](CVE-2024/CVE-2024-77xx/CVE-2024-7753.json) (`2024-08-15T17:28:49.587`) +- [CVE-2024-7754](CVE-2024/CVE-2024-77xx/CVE-2024-7754.json) (`2024-08-15T17:30:41.807`) +- [CVE-2024-7828](CVE-2024/CVE-2024-78xx/CVE-2024-7828.json) (`2024-08-15T16:15:23.897`) +- [CVE-2024-7829](CVE-2024/CVE-2024-78xx/CVE-2024-7829.json) (`2024-08-15T16:15:24.677`) +- [CVE-2024-7830](CVE-2024/CVE-2024-78xx/CVE-2024-7830.json) (`2024-08-15T16:15:25.330`) +- [CVE-2024-7831](CVE-2024/CVE-2024-78xx/CVE-2024-7831.json) (`2024-08-15T16:15:25.957`) +- [CVE-2024-7832](CVE-2024/CVE-2024-78xx/CVE-2024-7832.json) (`2024-08-15T17:34:07.033`) +- [CVE-2024-7833](CVE-2024/CVE-2024-78xx/CVE-2024-7833.json) (`2024-08-15T17:34:07.033`) ## Download and Usage diff --git a/_state.csv b/_state.csv index e08859b8a8e..fb45487012c 100644 --- a/_state.csv +++ b/_state.csv @@ -224736,7 +224736,7 @@ CVE-2023-3291,0,0,00fc96abca2c8a545f91e8bae7ebecfa7718dc43d0e1342f2015e152babb98 CVE-2023-3292,0,0,b8ef5306ce74b9329b1620092abdf02378458b4d99143d5d695cd947fdd9bb06,2023-11-07T04:18:24.753000 CVE-2023-3293,0,0,72720dc679e6136c56dea1818ea89a7c6e888dfcb7dd739b8f7bb9a85a705eb5,2023-06-22T21:30:35.250000 CVE-2023-3294,0,0,1b4b00e0f705616d410fa9b39e1092447f9eed6300fb3dc7ef135392d7ad651f,2023-06-23T21:26:49.927000 -CVE-2023-3295,0,1,704c26997561313920882ef0f5ef791d87fe1841ab000824e92df70b9b0fb48f,2024-08-15T14:29:56.513000 +CVE-2023-3295,0,0,704c26997561313920882ef0f5ef791d87fe1841ab000824e92df70b9b0fb48f,2024-08-15T14:29:56.513000 CVE-2023-32955,0,0,61d0e49080cedd0522d34227a5c22e22b65390bc79180c9847f44956574b84ba,2023-11-07T04:14:43.563000 CVE-2023-32956,0,0,6d79fbebbb8abd430f92328682c7425ff22687ac72560487627c14368840946b,2023-11-07T04:14:43.633000 CVE-2023-32957,0,0,b9c2446981231de3a55c46ec344d8368a4af380806615df14b0a4cff6b315c3d,2023-11-21T01:05:39.910000 @@ -227763,6 +227763,7 @@ CVE-2023-37222,0,0,1fbdeb8eb7a4e2d78e6a1b8c62ff798f54346848df8aa204eb582fb9c8fea CVE-2023-37223,0,0,d0235be5a4062402ff483e36fc907b2056e60453658d9454bd48cfdcbc910813,2023-07-26T17:31:44.957000 CVE-2023-37224,0,0,56757c3d318e5ccdefbc3606fc1b70199839f3440746a029a61956009615528e,2023-07-26T17:19:57.800000 CVE-2023-37225,0,0,6c6fc5523358fc5c31dfe4302415c9111d78bb8c86af38b6363cadfecba42f1f,2023-12-29T18:38:05.730000 +CVE-2023-37228,1,1,643ba6d022c49330496a6c23ea43a1b4794516f1d1a88ce155ebc80364021378,2024-08-15T16:15:16.890000 CVE-2023-37237,0,0,29a5f3af5199aad5af4f0fdd6511141f4d2b435f709fd260dd5041911ad086ec,2023-07-07T16:00:14.390000 CVE-2023-37238,0,0,8c5d217b62a8efe0c30f15bea3a5d6293d9c6e0abe28ac04e3704ef99c34ccb0,2023-07-12T22:51:22.043000 CVE-2023-37239,0,0,2a2a4e372334e66e5f41ce012a4e3ce6edee956c498345781b72b50751b6e2f3,2023-07-12T18:57:30.653000 @@ -237433,7 +237434,7 @@ CVE-2023-50563,0,0,c0949a7803a78e6bdccaf158722f9f5ef648f63b62a2f9b2dd07b712d53ac CVE-2023-50564,0,0,2fe33553a67c53bffc26ebb1380252caf59e7ec42cbd1de7316ceef8418b3856,2023-12-18T19:49:40.313000 CVE-2023-50565,0,0,029c18972243cdbeacdccb769910b874abc335ae45d5bfdaa56bc3ad4e17c907,2023-12-18T19:48:40 CVE-2023-50566,0,0,7200a7f7a9f3c342ab6eaac55fd785cd40074045d8cf9ea9ee9abf54685ef508,2023-12-27T19:33:05.677000 -CVE-2023-50569,0,0,eea97190e818d122ceff3260b925f41d6b1af74f7d3e23ebbbac05ca57317d94,2023-12-29T06:23:17.293000 +CVE-2023-50569,0,1,867c7b6348a088e402df901906c79c1e617d0d1056d26bbddc129bdd3fdf5a3c,2024-08-15T16:15:17.360000 CVE-2023-5057,0,0,10ed35caf6a2f269b52dfa746e514c573131dfbdec39da8847659101a82b32f3,2023-11-07T04:23:25.100000 CVE-2023-50570,0,0,75d8ee2098bc60b945b3fc34e2ee58f08d63f4e18ed75d3ca541f86520b0e845,2024-08-02T23:15:29.770000 CVE-2023-50571,0,0,bfca5f76d8c9bc34b96718654ff5eaad656f6b5aa01914088be8d2eb3827275a,2024-01-05T18:16:34.950000 @@ -238788,7 +238789,7 @@ CVE-2023-52535,0,0,fe6b3187a44c437c26ab3318b1139c9091f6bec389d5c218d94a801b45cfd CVE-2023-52536,0,0,31a4fc764ec17dfd98dd3f2041aa9cf3362d0496d5ba27ab57e1ac620a9f85cd,2024-04-08T18:48:40.217000 CVE-2023-52537,0,0,2559d90b1b1794296f22fc0badef4074c5581bcf37f52502d595b11857600810,2024-08-01T14:35:02.953000 CVE-2023-52538,0,0,9c269667a219bd0a186db35ef8e2818d381c8926a2b266c9f2e28d3c047bb2ee,2024-08-01T13:45:38.693000 -CVE-2023-52539,0,0,9b4786ab6d7c6f09efb40cf2f8e983776253f66b1d7a2b2bc6f8734a04aa2d41,2024-04-08T18:48:40.217000 +CVE-2023-52539,0,1,b821de3cf6dac9b6ca9186886c6757cf361cf7e1b3be10c27145c9e496b92b49,2024-08-15T17:35:01.503000 CVE-2023-5254,0,0,5f7cee797c6f86eb738b8a7c6816dfcd5a4e6f8647e76dd5bd92cb5b95399be3,2023-11-07T04:23:40.643000 CVE-2023-52540,0,0,6043f7b2833db7ef103b97561cb4ef82751086dbea7d4957ecb9ee6908b9f107,2024-04-08T18:48:40.217000 CVE-2023-52541,0,0,409f3f87e5ebdf3dd03445509a239e1d1acdefd3224de23169c507e030878ab4,2024-04-08T18:48:40.217000 @@ -241631,7 +241632,7 @@ CVE-2024-0797,0,0,ac52bd8819712b2bf131565a21e96df820da6f5dc8293ddeb68b78d311c206 CVE-2024-0798,0,0,66f72d2bff6be6d09efcfc02384d71af935f8a0c802fb47c30402e0770a846ec,2024-04-16T12:15:09.113000 CVE-2024-0799,0,0,5bfcb05725599dc2564ea81ef4e67618230a161641e5763cac5abd4f4e767f89,2024-03-14T12:52:21.763000 CVE-2024-0800,0,0,36ba3aba2919c8bb263435aa2e72c9a81a592b9595ee7957da17e781d9a32188,2024-03-14T12:52:21.763000 -CVE-2024-0801,0,0,4dd7a4f98d3589a91e7013423d221ef33b68afd41c8de4a33601dfa3909a6c02,2024-03-14T12:52:21.763000 +CVE-2024-0801,0,1,1df1c006248b7064e220fb949675080eb2b8969213fc4ebc28e085ab6ddbb354,2024-08-15T17:35:02.350000 CVE-2024-0802,0,0,12cae16a0f40fe7827d059d1277cea358fd340a72605394f366351ab4e18f952,2024-03-15T12:53:06.423000 CVE-2024-0803,0,0,307ad9bfe95b6cc9fe426432f8e4c15769c39c90f61ba997d9e7d35e1d16b9d7,2024-03-15T12:53:06.423000 CVE-2024-0804,0,0,e8799241727d94d4a1644eddadbc7574c20495b4fb6f0354cb521a2550311908,2024-01-29T14:29:25.953000 @@ -242772,7 +242773,7 @@ CVE-2024-20025,0,0,47e15a7ddf4a93a1f67f16f7b41159792bb8de344e0b811377a0a1f83c75f CVE-2024-20026,0,0,ed800331684227c8cb6eef8a299085ff35357d20165c3fbe70fc71f0772c4645,2024-03-04T13:58:23.447000 CVE-2024-20027,0,0,1e87a5ce444fde6917e601e7f1ba4c6df82feaec2ef698b25f20ceaf70694d54,2024-08-06T15:35:07.420000 CVE-2024-20028,0,0,cfbf4d0a5e915e0bee3fad17577f931af15ec4fffb945f6759a6ae86484e677f,2024-07-03T01:45:48.410000 -CVE-2024-20029,0,0,5b7ec0868e4b45674158a00b46fc6ebdfeb103f2ba924485057a5965b1353952,2024-03-04T13:58:23.447000 +CVE-2024-20029,0,1,300e2a16b32603e85951405016cd0ad99decc73bf824d3dbd2e092054e66ea35,2024-08-15T17:35:03.250000 CVE-2024-2003,0,0,d83e6e497d0f4e0abfc3183df264ca9948c9b590f8e46873b90f110587a4b083,2024-06-21T11:22:01.687000 CVE-2024-20030,0,0,4564a52c508e2c51224e56269454000087748259b04954ce69ca40c2dda951b2,2024-03-04T13:58:23.447000 CVE-2024-20031,0,0,684c7c82c0cda73fa88a103df6688166e90ffc9e03ff330efb733ba906795c33,2024-03-04T13:58:23.447000 @@ -243420,7 +243421,7 @@ CVE-2024-21063,0,0,73270d165bc0b9fbb9db2ba8819a13b23a6c11f25a3f1c5d26effd3bfb361 CVE-2024-21064,0,0,5b2971adc59d71b4aaa5c906c9a4f9e6fc91222b1a769debcd275580759920af,2024-07-03T01:46:28.883000 CVE-2024-21065,0,0,1c4717813b1a034170a9d85c7f01f49a9a6817cd44eb3976adb8d53a84de595b,2024-04-17T12:48:31.863000 CVE-2024-21066,0,0,75a7d2ca04151ae301b20afa61195ac0f69e1c6988e947105f46ee0037cd9d3d,2024-04-17T12:48:31.863000 -CVE-2024-21067,0,1,3c1db72abc041e4cd640c75884818bbbf8c687caa8093bb33878c33da44b6b4d,2024-08-15T15:35:02.413000 +CVE-2024-21067,0,0,3c1db72abc041e4cd640c75884818bbbf8c687caa8093bb33878c33da44b6b4d,2024-08-15T15:35:02.413000 CVE-2024-21068,0,0,5397ed6276bc380474002ef2f826d2dbb33ae28ef93eb95352209ca8f93abe8f,2024-04-26T09:15:11.273000 CVE-2024-21069,0,0,e8fb038125081aee0289d623e5836cee4ae9c0f693a34e8e6777594462628a90,2024-04-26T09:15:11.350000 CVE-2024-2107,0,0,902766287c54c3e88a205ae58fbc93817b4ac63ce16c76170f3874ff8989f8ce,2024-03-13T12:33:51.697000 @@ -243464,15 +243465,15 @@ CVE-2024-21103,0,0,2f3299fda2cbf8e902f3515fd0d48b9d8de5702ec09ff6c5557d6ae05b059 CVE-2024-21104,0,0,eebfe4dd9b21aaa35ec722f534d9449bff2c7a22cb7852b7fed566ff1ff264ce,2024-04-17T12:48:31.863000 CVE-2024-21105,0,0,a025937dea1ddbc18632fa98b68490251974c0a63176360144d7d1a06954f7bb,2024-04-17T12:48:31.863000 CVE-2024-21106,0,0,ab50f512ef43406c6bec553aae7f9997284c506ca99d62550b6d1b274cae0f7e,2024-04-17T12:48:31.863000 -CVE-2024-21107,0,1,8b22c366b8e56e1eace3e0c72769115530475e44eb4f180061f1d02595110799,2024-08-15T15:35:03.743000 +CVE-2024-21107,0,0,8b22c366b8e56e1eace3e0c72769115530475e44eb4f180061f1d02595110799,2024-08-15T15:35:03.743000 CVE-2024-21108,0,0,457a95edc17f2d19406b77901b0315a9c16fbc7197ac7f42787f9b5f2f03b290,2024-04-17T12:48:07.510000 CVE-2024-21109,0,0,13d20bf3677261be2a53b120554676e417e029919531127b8331decaf3e0f066,2024-04-17T12:48:07.510000 CVE-2024-2111,0,0,6adfb64278e268a55141857a7e32fae75bf1ecf0e5097a377cb5910d9bfa0b89,2024-03-28T12:42:56.150000 -CVE-2024-21110,0,1,2fb76e40bdb06e3e3079fd1da0264d6fd11a04c3085a1e1767dcd00caebab0fc,2024-08-15T15:35:04.813000 +CVE-2024-21110,0,0,2fb76e40bdb06e3e3079fd1da0264d6fd11a04c3085a1e1767dcd00caebab0fc,2024-08-15T15:35:04.813000 CVE-2024-21111,0,0,a4bd64a6248fb685a1f5cd3f64253f1bc5d465a5d8c33da50a6b56c616fbffc7,2024-04-17T12:48:07.510000 CVE-2024-21112,0,0,3843b79307daf90b6a1d0b5fe81ebf05f9b8f1c6159511f73ad1005727089ea0,2024-04-17T12:48:07.510000 CVE-2024-21113,0,0,27396ff3e441e5311fb8ad3fdb1a14daec1460b787f5096e64cb0d17049922ca,2024-04-17T12:48:07.510000 -CVE-2024-21114,0,1,0880b4b822c0833beb112d172fe417240b3cb185b690f6da3505b6f7c47508fd,2024-08-15T15:35:05.830000 +CVE-2024-21114,0,0,0880b4b822c0833beb112d172fe417240b3cb185b690f6da3505b6f7c47508fd,2024-08-15T15:35:05.830000 CVE-2024-21115,0,0,b1c90510e7789603a593fb63cf663c692bc761a2febc313e5f2e11a678db9f6e,2024-04-17T12:48:07.510000 CVE-2024-21116,0,0,72e72f8f571890e066dee87876aa4475cbba55214ef3d60e82bbaa99711e97c4,2024-04-17T12:48:07.510000 CVE-2024-21117,0,0,c00c4008bc12621d52c01b8472214c0be8ae4e9de0cb223458bb38ef939dfb04,2024-04-17T12:48:07.510000 @@ -246182,7 +246183,7 @@ CVE-2024-25189,0,0,877bbe35db73d3ea174dbc6f324dcb523b6e20a064afb2e87ac0944b71bf3 CVE-2024-2519,0,0,eb14bc0f40cc4481fcfca7e958fe17ad792ad1814e9d752d8e87eadfd574ac80,2024-05-17T02:38:16.610000 CVE-2024-25190,0,0,5e7fcee6e1d49c76382f955314af222553d106a1254553833783057b6c9de687,2024-02-15T05:03:08.533000 CVE-2024-25191,0,0,a79a6f6dac299c349e2de385c864fbf66ec48043f058d11d55221ed1f7cad150,2024-02-15T05:03:05.180000 -CVE-2024-25196,0,1,4e1523df7155bcca6a8e3ac35657f04bf40ec93a62ac21976dc74cbf4e73e9ca,2024-08-15T14:35:01.030000 +CVE-2024-25196,0,0,4e1523df7155bcca6a8e3ac35657f04bf40ec93a62ac21976dc74cbf4e73e9ca,2024-08-15T14:35:01.030000 CVE-2024-25197,0,0,ca56aa502aafa76f9e203f1bfea1c7e7bb5407645a514e5c3184e8ae0b1b850e,2024-02-20T19:50:53.960000 CVE-2024-25198,0,0,8aa0d37f4bf223abe553de23cb491c2673e155f232b262f589f7488596dbdbf5,2024-08-01T13:47:35.120000 CVE-2024-25199,0,0,80cf865856345425a1255aaeff9a118b47eca4bf7d8e991fd2be82a76d5447fd,2024-02-20T19:50:53.960000 @@ -246327,7 +246328,7 @@ CVE-2024-25451,0,0,b67f7e05891197894720d9d3975f43ca92b7ad9650aeabeea17b80016b662 CVE-2024-25452,0,0,14ab9be527a93b53ebe5896fd2b3d560f28b002763db98c853f71c1a303e665c,2024-02-12T21:38:36.037000 CVE-2024-25453,0,0,6c26623f3a213339d332369aa2196301f829be136c6f86125273e619866f9383,2024-02-12T21:38:53.453000 CVE-2024-25454,0,0,8ab63453c76a5630b02c9a4acc28cd19e727677c1ac1b8b1e1b94ff8d701b7fe,2024-02-12T21:39:19.300000 -CVE-2024-25458,0,0,c8c38a2e4b52e0093321ceb52d4521c01cde4ffec22bd3b6f6f66bc29eeb4f1d,2024-05-01T19:50:25.633000 +CVE-2024-25458,0,1,883238ad1910abf3be131d65578a9146b081aa618c9d002b21ea014aab5330f3,2024-08-15T16:35:03.913000 CVE-2024-2546,0,0,08a8dee38ee812f84c4c40bdcc0668312236b55abd93840557efb145295c9cba,2024-05-17T02:38:18.283000 CVE-2024-25461,0,0,f79828e5cdd5c8b1566d8a280a104a52fda1e59174912b34a7899227cff3aab1,2024-02-22T19:07:27.197000 CVE-2024-25466,0,0,4f8ddadef0f0c470fac1d08a20c254a296296fab619f433d46a2ccdc8a4b306f,2024-02-16T13:37:51.433000 @@ -246515,7 +246516,7 @@ CVE-2024-2574,0,0,0663b3bf620e7eaea35e1b3237dc263b6d897527ed31c7e8166e509390c6cb CVE-2024-25740,0,0,6ba085d5463d39f02fcd8a1bcb6b0d08f943a0acf58c18d3b1c39a6a03f005b3,2024-02-26T21:11:27.837000 CVE-2024-25741,0,0,fa774b03cf2ebe73114d17fe942f33d91843719d380f7003343f1feba56a5c5f,2024-02-12T14:20:03.287000 CVE-2024-25742,0,0,64a7e49ba77fe66b1f40220a562db53fca6672cb5535d529c8b5770ce2d5e19b,2024-05-20T13:00:34.807000 -CVE-2024-25743,0,0,49217532595c3374ef31de09ebdc4b483c3c170a46fe6ac8ec49623d34a3fde8,2024-05-17T22:15:07.310000 +CVE-2024-25743,0,1,1c0eddf9ff39c172b1917b2af6c386627e5412677b9092ed1b4c80ec112bb6af,2024-08-15T16:35:04.743000 CVE-2024-25744,0,0,fc000ffd12e257e2403c7531be849ad7ae284e04e5faaeff0bd3c4b1bee1e1f6,2024-02-12T14:20:03.287000 CVE-2024-25746,0,0,aff52edf515c4bb2be3d1c40746c76af6ee680ba5675ccdda5ccab353d740e3d,2024-02-23T02:42:54.547000 CVE-2024-25748,0,0,9695611fe06c6e9b93fbd1431628cb47d8b27d680e5e9e22412df114dd60e72e,2024-02-23T02:42:54.547000 @@ -247901,7 +247902,7 @@ CVE-2024-27362,0,0,9d431a1116edfb20ae4c799537e5e9f5d11ebb0847e9e8bdd27f35d143873 CVE-2024-27363,0,0,f6352d5e26499e6478b31ffa535bfa444a95ad102dd84d5e4c2e7b2372cfbda9,2024-07-11T13:06:13.187000 CVE-2024-27370,0,0,af71653a5acde106e0a7f3b8567bdf172132e897f7d02cfcedd2c7171b14a2ca,2024-06-27T16:42:33.073000 CVE-2024-27371,0,0,cbd643b16c6615db0b8df3b1d24b685d593f91f66066c3d76c853e9bd5bf2edd,2024-06-27T16:40:45.063000 -CVE-2024-27372,0,0,348c9b914a545f6c8499381738cc7321ffbb27cee3268dfecbd73f13aae5bd3e,2024-06-27T16:41:21.603000 +CVE-2024-27372,0,1,8907778c9fe6bbf87ab271d97dfb25ffd83018598cb715d55ddafede9aab4b45,2024-08-15T16:35:04.970000 CVE-2024-27373,0,0,926b1693c40cbc7615a0104dedd662ab64cdcfcf8165af55d6f5779ef02107a9,2024-06-27T16:41:34.797000 CVE-2024-27374,0,0,3b34220f69671b36a06fb2439f20f7eba7d2c207b7eb01a9af38b33fbd61591b,2024-07-03T01:50:34.903000 CVE-2024-27375,0,0,fecb205b5b6f46b8b824fca91884f06a503a37afa56527415e1bb5b9087f41ad,2024-06-27T16:23:15.020000 @@ -248376,7 +248377,7 @@ CVE-2024-28061,0,0,69ae8c16e1b63fd4290855dfe7823169455b79a10f705efce789e14ccfaa8 CVE-2024-28063,0,0,8b4daa0dfe18458d1d4f0e0079b8409dd79607264a48fce0d64909485ac7a6e2,2024-07-03T01:51:26.370000 CVE-2024-28064,0,0,f454583b636a828554dbb6ac6e6f380d26d3ae9df36559678c0289b609fca957,2024-08-01T13:48:58.547000 CVE-2024-28065,0,0,e0f1de1046eacd4012e9d6249d2050e67e395f04094ef510445210074f331722,2024-04-08T18:49:25.863000 -CVE-2024-28066,0,1,c2a2736221464f46eb769fe0b6456e8f036fffd40dc0d59a61172bd4b1ad730b,2024-08-15T15:35:07.070000 +CVE-2024-28066,0,0,c2a2736221464f46eb769fe0b6456e8f036fffd40dc0d59a61172bd4b1ad730b,2024-08-15T15:35:07.070000 CVE-2024-28067,0,0,87f8f4904932894fbb80fce767ebf619e7e55e28806f6fe43c6dfd5af113cbe6,2024-07-12T14:57:36.897000 CVE-2024-28068,0,0,bc3074d56d7203ab69c965398848e97ee8558e2f286e7ec5251e1ecf155f732a,2024-07-11T13:06:13.187000 CVE-2024-28069,0,0,c685346bb55bf7387451d2fbf1405ced89c60d435f78a40193e6458bfa4c25b5,2024-08-02T21:35:20.240000 @@ -248645,7 +248646,7 @@ CVE-2024-28535,0,0,b3d344cd79be8d85dbbdedf90a4aca4a63b5679340011f1e54eaf1af4f8bc CVE-2024-28537,0,0,a1b289879a7e37eeb256b0155a9bf07c4755d98e64b0810b5b45c7e328ef254b,2024-03-18T19:40:00.173000 CVE-2024-2854,0,0,c1c542fca188c35518ba79a264f89406944bf1f786d85f84048d2cb537d11189,2024-05-17T02:38:34.440000 CVE-2024-28545,0,0,e9a4e3ca98799d0101f083d2aeb4e48f2d5da7cbf73a3832ee738e6e37caad1e,2024-08-06T14:35:08.207000 -CVE-2024-28547,0,0,7e81a6a5e32cfa4864b5bc09764b2b5baaf467a0f82788b3d1943e7a59e2091d,2024-03-18T19:40:00.173000 +CVE-2024-28547,0,1,6c303f8f5613978f1a0a818439df37889df3d74dbcbb9a87f20cfa2eecd135e7,2024-08-15T17:35:04.350000 CVE-2024-2855,0,0,bf67a061be15a32c70da5cfde311a22d39981d3eb08b5dfae3a254bfe3ca6e82,2024-05-17T02:38:34.570000 CVE-2024-28550,0,0,e57300171200da6138bca7c12faed1257d5a1ced8bcd637b3699d9ed4209df2a,2024-08-02T17:35:34.613000 CVE-2024-28551,0,0,c28fe5afcd679c3aa0a3784905b4c05c433762c4432fa1ed2b44c099adba75a4,2024-08-05T20:35:07.203000 @@ -248680,7 +248681,7 @@ CVE-2024-28580,0,0,dcfba5ba26abe3633d2cb397f0b193efd8cd40fa63fdb35a8729b737295cc CVE-2024-28581,0,0,751998c13f0f3b4912a9b5840b020eaf629f3ac6e0579483e5f8b424a776edd1,2024-08-02T19:35:32.690000 CVE-2024-28582,0,0,07714b816f6cea27cbaeed61c7a34a8549b3f48b988174c802fe73b974416155,2024-08-02T19:35:33.543000 CVE-2024-28583,0,0,c50dbed0562dfacbb674c7718f0ced726fbccebfa73bed4edf17a8a5f2a5babf,2024-08-05T18:35:15.813000 -CVE-2024-28584,0,0,7e195d8460271436a238e3083d5d571c24596d55b31fa43f7b5e39a74de45a89,2024-05-01T18:15:17.567000 +CVE-2024-28584,0,1,e20b63709b7b4674406235a1eb7c89cfa74fcbad1723044d3b3afd6939c05e7c,2024-08-15T16:35:06.133000 CVE-2024-28589,0,0,b66eede795a00f4b0e2e204a9cf88f1852abc341145eb3db72506b72341d3af9,2024-08-01T13:49:10.093000 CVE-2024-2859,0,0,bafc6fbac9167165f0e9f3436109d788f5070653afb075f2a33513a8544a14d7,2024-08-01T13:49:55.310000 CVE-2024-28593,0,0,386f7584615dbd06bce0d2890654b96180b7240f382d5dfb6184dc4e00226988,2024-08-02T01:15:50.050000 @@ -248741,7 +248742,7 @@ CVE-2024-28736,0,0,b18e265ab9079a090b10f2fe5a13acf391230f937283b97c645741a4ee888 CVE-2024-28739,0,0,36caa1134a8a7b2783edbb7df33b4da4cf1e215d5eea570ae15bc02fd363246e,2024-08-12T18:18:17.717000 CVE-2024-2874,0,0,80b110f5e4061aa4b7108ad521bebbe850331343538d6ef70c9be87fbdfcd4cf,2024-05-24T01:15:30.977000 CVE-2024-28740,0,0,828c63e17a66fa4cadbb23231d1ca9181a080d393e3a1f53175371eb551af743,2024-08-12T18:19:33.337000 -CVE-2024-28741,0,1,795f862a6d9ed04b0207def6b2b416a0cc650c64f2309e9860cb5b0d520d30f6,2024-08-15T15:35:08.427000 +CVE-2024-28741,0,0,795f862a6d9ed04b0207def6b2b416a0cc650c64f2309e9860cb5b0d520d30f6,2024-08-15T15:35:08.427000 CVE-2024-28744,0,0,6de1af81e457c114bae7b1738d6658348e92bf9c2953cae361b0b30d06e054f6,2024-08-01T13:49:15.900000 CVE-2024-28745,0,0,da878c5f5cc0e7f2e4abb5594a05991a98129a08d42ab910eae7e36c68d7e661,2024-03-18T12:38:25.490000 CVE-2024-28746,0,0,28e0f82b5245c8fee772a7fa2b89a2e8a2df0c79bfc4434d8d6d416163396ab6,2024-05-01T19:15:22.510000 @@ -250254,7 +250255,7 @@ CVE-2024-3079,0,0,f1f95675216f703c162f7205baecbbd680e7e08a69a3f6cb5ab9f6df26e36e CVE-2024-30799,0,0,d0be2d0f006d2c4f92e204846e2ae37ca4e292273d3e14437b5fe8a98380dd9a,2024-07-03T01:54:13.747000 CVE-2024-3080,0,0,6986301309c9922bc02fa19392bc6067c49e953b2f624eb66756f4ffea7fbe9a,2024-06-17T12:43:31.090000 CVE-2024-30800,0,0,c159abf1d20ef9221dca0ce07749c41b848d269f6d72d244107e748c6895169d,2024-08-01T13:50:26.523000 -CVE-2024-30801,0,0,b9e13476cd40c68a77fd97380504b5cd75decad73d6599b5a61dc71509c3272a,2024-05-14T16:13:02.773000 +CVE-2024-30801,0,1,79037a49ae58d0454d89f94ba313d584f276e2894821b324a5e75dde95008219,2024-08-15T17:35:05.230000 CVE-2024-30802,0,0,37683b49f88fa426fcec7397572b9c76113c55e23f5ab472e56f33731e38df96,2024-05-14T16:13:02.773000 CVE-2024-30804,0,0,c8ff423e3540a19b0faa1f1a1a616d5872ea6369d2742217c6f7bd92e390eb83,2024-04-29T12:42:03.667000 CVE-2024-30806,0,0,69d03451e34851319586e66efe84d4aaaa1374f82acfc9b49736cd881cce5ca7,2024-04-02T20:31:58.463000 @@ -250296,7 +250297,7 @@ CVE-2024-30883,0,0,797b2441b715707191740c9fa7df6d1b293fbe4a72a5d05afa9b676f71d49 CVE-2024-30884,0,0,453cca54472a26a8ca3d84c4d89a94e0d61ec7afc409128696362f32ae3d409b,2024-08-01T13:50:32.180000 CVE-2024-30885,0,0,825f7aae44feadfc4199050283e8cd02df667be35770719d5832f7a196d5ce12,2024-04-11T12:47:44.137000 CVE-2024-30886,0,0,3f62f85f345458e571bc5d6599576ec911abf1641e0ba6b07f58563bdc308215,2024-08-07T15:35:01.500000 -CVE-2024-30889,0,0,42fe86ae379e30ddc3bbc82898a87f8f925148622d04de1fff61b07999c16695,2024-06-06T19:09:09.840000 +CVE-2024-30889,0,1,4055363c9710582a93e9c4afde24f53fb76bf450d1c6c8e60ffc2b185aa7ed09,2024-08-15T16:35:07.067000 CVE-2024-3089,0,0,f50243477e19a0c473b8d22e5ff97c5e0852740c2af46b357e2e30b0b527a41c,2024-06-10T19:15:54.210000 CVE-2024-30890,0,0,70cd6656f6551d3fbf1d211e5aa4de5732e110f0e7820ed44ca9141eadf4b5b1,2024-07-03T01:54:15.373000 CVE-2024-30891,0,0,4f494bee46d389b2763a9e0a5cc6080a590a297e24ef8f2135ff7d6a9a1c2df9,2024-04-05T12:40:52.763000 @@ -250787,7 +250788,7 @@ CVE-2024-3160,0,0,eb558de094dfa7da7614cbb12e7e0f52fccf4666023f58f794338b59adb924 CVE-2024-31601,0,0,2ecfeeb206954a268db2f5b2e562c9815f588a2044ba1904266c145bee62eabe,2024-08-01T13:51:00.487000 CVE-2024-31609,0,0,fae7dc20cbed60c4a9ac4dc64e5b7d82da62be1a3c274018ad6ee2763de928dd,2024-08-01T13:51:01.270000 CVE-2024-3161,0,0,cb1d741ba2940c183ffb95823cf44b340276dacb5b80290f88304f9e200c7a69,2024-05-02T18:00:37.360000 -CVE-2024-31610,0,0,7e150f787445b25f112068bc71b671af16bbf8dbb09fe942ca8b605e6bc05f28,2024-04-26T12:58:17.720000 +CVE-2024-31610,0,1,8d12739de6da38dfcfa2458401e3c67444fca5d03ee501d4c6c239a7b86abdc9,2024-08-15T16:35:07.883000 CVE-2024-31611,0,0,922c068e1b8fa15f4d68c71058c16061c333a9f74f3b60f54aa9aaeaee657115,2024-08-01T13:51:02.050000 CVE-2024-31612,0,0,15c2e47d08cf4c3040b81a039dadf1f4f0af6413e9d788fcdb817dc6998b4789,2024-06-12T18:10:30.587000 CVE-2024-31613,0,0,b0b5b8479d0a02bfd478dd615b1866827cfc5a7cd6faf8622773f7f73500ac9b,2024-06-10T18:06:22.600000 @@ -250851,7 +250852,10 @@ CVE-2024-3178,0,0,724b5b9b62dd4e92f1f229f9f28fcb0bddf71f92c79c0b94c18fdb2af7074b CVE-2024-31783,0,0,dea8534fc1b6933b26cda6217a1982520e5d50556b9ff7b4e3fbbb8c80f4a35b,2024-04-16T13:24:07.103000 CVE-2024-31784,0,0,872beb17d1c68d7ed92a4188cf9514602c2aada50c10052ecdc3a0e44dff88ee,2024-08-01T13:51:07.627000 CVE-2024-3179,0,0,464d285bc972fdb5e95f8aa4a77b96bdfaeed1940a229e7762cb456353d6a4b4,2024-04-04T12:48:41.700000 +CVE-2024-31798,1,1,a65665c81bbde1cc4425a0e7fe5f9c2f042ae3716be1e1a96472134ce8b41409,2024-08-15T17:34:07.033000 +CVE-2024-31799,1,1,9c5e9f8b47c839c569f6cf17352b69f8667d49cb8d93113be08508a650b55d97,2024-08-15T17:34:07.033000 CVE-2024-3180,0,0,5bb7af5f4cf3797fd0e13fd61c5a120e857e3a7924c7f2a1b54e6cd1ca4c495c,2024-08-08T17:15:19.223000 +CVE-2024-31800,1,1,dd95211950f50097de0b3e68a33198707fd3a51656eb80975168feb72bda72f9,2024-08-15T17:34:07.033000 CVE-2024-31801,0,0,167787a1907cdf000af60fbe9b5f7402195ddc6d583a2566e586e08b836488bc,2024-07-03T01:55:21.550000 CVE-2024-31802,0,0,dd0b491f4b4a8abc2eb95691f4e0d78bda6718f8c1d907d0d856648428006edd,2024-06-28T10:27:00.920000 CVE-2024-31803,0,0,c10736ae7840b016061b5af4491c529b00b1b223c27ecb8bbf60562274c0f243,2024-08-01T13:51:08.687000 @@ -250930,6 +250934,7 @@ CVE-2024-31898,0,0,98b5fee92aa3e78db3b92a2045655a85910d78a165cc0fc0eb03d45c453d3 CVE-2024-3190,0,0,59b4ce24fb505a0884244f905c395c98b38f50a3b44829542252bc93265789b6,2024-05-30T13:15:41.297000 CVE-2024-31902,0,0,792ebd92048a7d574f1f4f622d29c5adae49f7f37a902660c4b217f76bba207a,2024-07-31T19:20:04.903000 CVE-2024-31904,0,0,77f4db6cab579901d99ba6c75def744c8e9197f1a2c93d4ffef011323b61b3cc,2024-05-24T01:15:30.977000 +CVE-2024-31905,1,1,b1561cd59d8678b465f308c9a097ab9e6add1633f7993c8841a70433ac45b085,2024-08-15T17:34:07.033000 CVE-2024-31907,0,0,e57043b034702621fcca13eaf542da6f92ff5842c4e903e12746e460db136786,2024-05-31T19:14:47.793000 CVE-2024-31908,0,0,747fd2c58000cd25913c25e42d3852e7dcfd29b11f273ad346d09720c57822b0,2024-05-31T19:14:47.793000 CVE-2024-3191,0,0,4b64737c2ba1d5381e6e70a6c028bdab456c548a9bdfe30ed67e35d729ec88f8,2024-05-17T02:39:45.973000 @@ -251008,7 +251013,7 @@ CVE-2024-31990,0,0,72cb5cc313e4561a05fc6fc85ec9ccda61e5a6eb3e7e23249a97cf8d4c46c CVE-2024-31991,0,0,e0b67c6835ae7078f05f5ffbd42a809f9c19aebd3ea8ac6a5ca8acc810f57775,2024-04-22T13:28:50.310000 CVE-2024-31992,0,0,37118cd26e9418699402e7004b2b0a2514cbb927a1eb33ec749eb997567a656b,2024-04-22T13:28:50.310000 CVE-2024-31993,0,0,0e8bafb998d558fb89ad7c62802dae18f3e9fbe2d7e3203cb2593213fe9353a4,2024-04-22T13:28:50.310000 -CVE-2024-31994,0,0,adb28a0251b267ca139100bc6a49a51d62af5a8b263096ebab4d248e39892631,2024-04-22T13:28:43.747000 +CVE-2024-31994,0,1,ef8c765927c65a562013951aca165202b1642f8ed98e51d4ed20c9cdc3fce570,2024-08-15T16:35:08.717000 CVE-2024-31995,0,0,602bd03775c89a6cb4e10470ceb1298f833e8948d6090002643943868c01e068,2024-04-11T12:47:44.137000 CVE-2024-31996,0,0,d4a1c5956655b3691b734adb2cb789f7840abf7ea392691d056f3eeb40cd8aea,2024-04-11T12:47:44.137000 CVE-2024-31997,0,0,e22174bdf45016db847f83f67a9d66c204301d7e1d4c9d7c29d7666820ceb71c,2024-04-11T12:47:44.137000 @@ -251705,7 +251710,7 @@ CVE-2024-32898,0,0,a1164d1f13a42749bf96f7e0b3ba86ae7d47aa4b6dca1eac9925e7f634794 CVE-2024-32899,0,0,74d49a0c054c70b6782d3d17817d354b539c7fc1885677c696b3943279ac6319,2024-08-08T14:35:04.040000 CVE-2024-3290,0,0,e37941463fbcfeca19f06c6ff95de33721080f43186b5a4e3649d38706662f8a,2024-05-17T18:35:35.070000 CVE-2024-32900,0,0,f3fcf6c6b161054d4b70c688a26df4960499cb9e7985675c1f9e0f52edc8445d,2024-07-11T14:22:34.243000 -CVE-2024-32901,0,1,0396668e4055b6cf30063754945d8be1d532a6ec0e47e38129ed67921f73e173,2024-08-15T15:35:09.947000 +CVE-2024-32901,0,0,0396668e4055b6cf30063754945d8be1d532a6ec0e47e38129ed67921f73e173,2024-08-15T15:35:09.947000 CVE-2024-32902,0,0,1fbd0dd08d9bd5e977338d384aea2714e29c13de9c12a031106e742a6a47a2bf,2024-07-16T14:57:42.527000 CVE-2024-32903,0,0,aaeb38f7d3b59ab9144fa4e43bf721b3198a6bd2ece544fac74a73168645b438,2024-07-11T15:15:02.090000 CVE-2024-32904,0,0,3961c2a580b4e2b2979bdb22f632f77b910e660ceef5325c42d6a6fa26d552d7,2024-07-11T15:14:41.203000 @@ -251722,7 +251727,7 @@ CVE-2024-32913,0,0,85ea46e35c517a515c6d16ed1cc6aeb8b067f9c863decdf1d17321b091caf CVE-2024-32914,0,0,cbed74c6bf4e90dfcc109de77f32486ffc4a1bf4af82a04c39b30a381f81c36e,2024-06-17T12:43:31.090000 CVE-2024-32915,0,0,ce3c0f63e7c4b15b4980a52ade118f9c0799ed8303c4569ce9e259a0da82edf0,2024-06-17T12:43:31.090000 CVE-2024-32916,0,0,b886661caf70d7fd3c261e90c0f590c6eca5af4ee25ade8b0972d2baebb2ff9c,2024-06-17T12:43:31.090000 -CVE-2024-32917,0,0,08f391494a3376dda1649b3bc4f3af1d617f4eefee77b1afb26b1c79958a698a,2024-06-17T12:43:31.090000 +CVE-2024-32917,0,1,6d583d8ab79c5333a5d03cc2ab6bba8eb02ee95c890cd04661d7dbc4855b1773,2024-08-15T16:35:09.653000 CVE-2024-32918,0,0,2a2c8a8c7d4b363845694cbf190176d55749936bbf41bcb406340187abded385,2024-06-17T12:43:31.090000 CVE-2024-32919,0,0,f0aa26802459bcc1e57c74adfaef7d72c48e702e9fd1db0d49dae70c6bb3b2a9,2024-08-01T13:51:40.153000 CVE-2024-3292,0,0,07318f8f2185b7ffadc020ce54f4218255ee206d16b74c44d805183e4ce99eaf,2024-05-17T18:35:35.070000 @@ -251878,7 +251883,7 @@ CVE-2024-33217,0,0,931f6caed27deca16afe48992fe19ff3bc360241c91b6cd818528eeb486c2 CVE-2024-33218,0,0,ee7d69983b37f9c6bf7e7a7a1874f78caedf9c878645e11206579f136a2c86ea,2024-08-01T13:51:46.453000 CVE-2024-33219,0,0,2dfa02749f2dc3cae0573cb558653331cc8a76159ec20cf26150e2c7103356aa,2024-05-22T18:59:20.240000 CVE-2024-3322,0,0,e55b514365f4edfd08d32461dca85dba678afa08e3277cfa12a38dc6ce7e86b6,2024-06-07T14:56:05.647000 -CVE-2024-33220,0,0,4c042634f5eec83f599df9e164edf362eff9644cfe22377788ce1325222774ae,2024-05-22T18:59:20.240000 +CVE-2024-33220,0,1,94878fc1442fb742de617743986fbb0ae7d177efb074829742c5a4e187579f4f,2024-08-15T17:35:06.067000 CVE-2024-33221,0,0,4c13ec1b720b7ec2ce94f445e942c2447ba67f3bae626d7dba251fb8b3437798,2024-08-01T13:51:47.243000 CVE-2024-33222,0,0,826b88c0df0010107f0595e8bf718ff48038d9c2823c40b87f1e329d93d630c8,2024-08-01T13:51:48.023000 CVE-2024-33223,0,0,bd16de328c282f1aa1b7015361c590473a5b6bf3caa6b0c34867ec1e542d4f9a,2024-05-22T18:59:20.240000 @@ -251886,7 +251891,7 @@ CVE-2024-33224,0,0,ea562c47166b9ccee59aa37caec5e01025be0e30460cf86b89874eb41ddf1 CVE-2024-33225,0,0,20ea8cc6ddfb6cfd8258351119e0796feeaade6c50f1b0404fcf51caf0bfa6d3,2024-05-22T18:59:20.240000 CVE-2024-33226,0,0,f3fb4ee69f05f27f81b817914fa93a341a77a038a9407ec5a7a16217f3ea6498,2024-05-22T18:59:20.240000 CVE-2024-33227,0,0,28dd1771db477989c0572e57f26fd3346bd032b5331c9baa2149840f310b32df,2024-05-22T18:59:20.240000 -CVE-2024-33228,0,1,85cdbd71550aee88b5f9d8549e2c2f09f274676ddc09487eba7cc0a4fad357e8,2024-08-15T15:35:10.277000 +CVE-2024-33228,0,0,85cdbd71550aee88b5f9d8549e2c2f09f274676ddc09487eba7cc0a4fad357e8,2024-08-15T15:35:10.277000 CVE-2024-3323,0,0,35a6027c28bfec2d03f21e8dc2fb44053ba20d6734735309aeaba44e533a0061,2024-07-03T02:06:09.693000 CVE-2024-33247,0,0,40a5fef5b7dc3488c3170d87b3d0b3fdeccf50a4efd249dd8f1c8814c02594a3,2024-04-25T13:18:02.660000 CVE-2024-3325,0,0,eba92195eac782e585c88625ca97b48ddac98c797259bb726a1fc19af0b8d9a8,2024-07-12T16:11:57.460000 @@ -251919,7 +251924,7 @@ CVE-2024-33304,0,0,c69b7491366f4c957f408f15c91213d3a30f1301fa5b95f5233347233c728 CVE-2024-33305,0,0,9456b591799e836fd99c84c1fde49824c89d04ed858b129a95eda7b4d82dbd13,2024-07-03T01:57:49.460000 CVE-2024-33306,0,0,9a9d23042570962300a30645ba4d19f889c5273037a417c4e7c74745e1c6a309,2024-07-03T01:57:50.153000 CVE-2024-33307,0,0,6c947497667732c5aa9255428c2c2392102c90a0fe012dfb1a418e3506ae11ac,2024-05-02T13:27:25.103000 -CVE-2024-33308,0,0,8f50c856af1e8779a85ff92e8286d2c2691623236df559d79cde2de9e272f684,2024-08-02T03:15:26.030000 +CVE-2024-33308,0,1,e5e1f47b890f0e27fcbe8ea30af52f44a2a82c5a40f93e9a49d8e75ed3188d93,2024-08-15T16:35:10.703000 CVE-2024-33309,0,0,c041f296538b9939b288c97f9a52de99d19ada8180944e33a96b1355534bb929,2024-08-06T20:35:02.633000 CVE-2024-3331,0,0,67b99dbb764f63f65a2479b132a72bdad66daa17c02e69fb84e087ad67670417,2024-06-27T19:25:12.067000 CVE-2024-3332,0,0,6475dd8615470e05caa4cfca0bde81007e5136e29693035b9a6ba3bc47d4e7b4,2024-07-05T12:55:51.367000 @@ -252336,10 +252341,10 @@ CVE-2024-33953,0,0,63e46ea726d37d8745ea34fab8c10792202a96224f50f42661862439d0baa CVE-2024-33954,0,0,56971cf7819e69848d3a992a0087660ba05ca96712d3a36deca39fdf2a1bac6b,2024-05-14T16:12:23.490000 CVE-2024-33955,0,0,74cb745cdb62a336c3f876a0fd00b4b23bbd1044d9dae83da460a24660cf3426,2024-05-14T16:12:23.490000 CVE-2024-33956,0,0,92ede81a948fcf5a2df4670aeb0def8a77bc1add850b4acbb2c9c5d6e0cc712f,2024-05-14T16:12:23.490000 -CVE-2024-33957,0,0,0e1e5f4730a34b23552c2231c245e18108db52e780fcaa99c647a1ead4fde0f9,2024-08-06T16:30:24.547000 -CVE-2024-33958,0,0,b573d372b0d7ecaf1ad956ff6d0a05063e98ba29cfc5e03db4b15bd271dc6f01,2024-08-06T16:30:24.547000 +CVE-2024-33957,0,1,851dd3d709a92f88f89c0402a2e8b6d3cc1c1c4dc1f4d40dd243307107c3bf20,2024-08-15T16:47:12.787000 +CVE-2024-33958,0,1,679eb072b66e3f66d75be1eaaaa26c85ab3e1c933a80bb926441ea1cd4b37c07,2024-08-15T16:49:23.533000 CVE-2024-33959,0,0,7c0cd3b349dca2c5025b80d137d364d4b069eb5d0a51d215a853a38c247c583c,2024-08-08T21:02:25.943000 -CVE-2024-33960,0,1,345b70b65d026ebd294cd6f28decbfa8d641a9e026fde662cbe189d3e2ab9a61,2024-08-15T14:08:32.490000 +CVE-2024-33960,0,0,345b70b65d026ebd294cd6f28decbfa8d641a9e026fde662cbe189d3e2ab9a61,2024-08-15T14:08:32.490000 CVE-2024-33961,0,0,187629ed99c5897491a2a921c1ade8963799907fad5e490c0d4f43b69dbfd91e,2024-08-08T15:28:36.957000 CVE-2024-33962,0,0,e897407fdd17a9b2d16f278c5507ecaf565ac0a0fccce4b5a02e7684c73d8ccb,2024-08-08T15:29:37.537000 CVE-2024-33963,0,0,7b2ea757d18c83ff1944815cc2e202a03e9537a07a76c5aeb78e0eabda293f3b,2024-08-08T15:29:09.743000 @@ -252354,25 +252359,25 @@ CVE-2024-33971,0,0,a7859046d8372a909dcb2b37a15cf3347b7e31d10dadb7980f4c9fb8d7cb9 CVE-2024-33972,0,0,42dee7a80c44684711acc9909b4734c5fb83b699be5ad7e45fa494c43db80c3d,2024-08-08T15:25:18.450000 CVE-2024-33973,0,0,0a583261d2674aa7d4e2f3bbf7680a44773ad150514a793eca996581b9e8bd33,2024-08-08T15:24:35.547000 CVE-2024-33974,0,0,d280489cb050a80c8bcc0878f3de7456d028053d751ad633a2e500fbf3c9b3f8,2024-08-07T17:44:17.477000 -CVE-2024-33975,0,0,24d9f8b7189c6e049a2d195b8e70f6d865af89b6e07e97dd7c966c273f1ab8ce,2024-08-06T16:30:24.547000 -CVE-2024-33976,0,0,67f5f835747af0987a350b4d42b3bce1f04168a323132a627d10afd7d71c4f21,2024-08-06T16:30:24.547000 -CVE-2024-33977,0,0,405178aa69e8c523d5255a40363518e9f3def64819b4c1b13860e42870541184,2024-08-06T16:30:24.547000 -CVE-2024-33978,0,0,d9fa5afc6af12f1b1775f97e83f5db2f011fa6bd1262b6c0199a8a9aeedc346a,2024-08-06T16:30:24.547000 -CVE-2024-33979,0,1,b23f4bb2f30d829ac2b8337cbc397ab525114fa50ab62ece57b2e0097ce56196,2024-08-15T14:07:24.257000 -CVE-2024-33980,0,1,4cc48478ea1d3758bfbc31648e401c46fb3a2b5528e5044fc92305300898eb87,2024-08-15T14:07:53.217000 -CVE-2024-33981,0,1,8ca9e43815221320ccf66237d8bdbf16507b4f0cfcab2dfe65108c8b4c13f496,2024-08-15T14:08:13.003000 -CVE-2024-33982,0,0,a5a400641b1905999f31649b77caed7e5463d643fd1a494924a5db164364e9b4,2024-08-06T16:30:24.547000 -CVE-2024-33983,0,0,a83a104a81a24ca7cfe520571c3e6d45ba9414fc29d7ee2d6ed46d045aaab087,2024-08-06T16:30:24.547000 -CVE-2024-33984,0,0,80dbb8d6d0ae9c62edcd055d5bea689800e85b11af62d3cc2fcb35e6df78c974,2024-08-06T16:30:24.547000 -CVE-2024-33985,0,0,bf2f15be93b1dfe5fb7c133507f5743a253ac4bb7b4a8ac7b4eca4e6857d1709,2024-08-06T16:30:24.547000 -CVE-2024-33986,0,0,b40a70fbfc3542817e0fcda7c0df2f0fad439aacf751ab9b76370f519c8aedb3,2024-08-06T16:30:24.547000 -CVE-2024-33987,0,0,442917ed3b76a8b815b40eba92b173487a3bf9fd55468d9157fe5125ed48015f,2024-08-06T16:30:24.547000 -CVE-2024-33988,0,0,baf8dcf2f418a796c4c9249ae00df9c2a14ea7e17323bb1f16d786860d575c72,2024-08-06T16:30:24.547000 -CVE-2024-33989,0,0,179076eb0dd27848282d0b40d13f98582890aaf84191086f322dc0becdb20600,2024-08-06T16:30:24.547000 -CVE-2024-33990,0,0,1ce5ef26ddcbfdd1a66c6664dcb5b9093de430fa35811c02bb876b1af9c3cf69,2024-08-06T16:30:24.547000 -CVE-2024-33991,0,0,e1e285a73ae060087c6b580e1d5356fcac59712e178cc0ae53c6e06da232adc5,2024-08-06T16:30:24.547000 -CVE-2024-33992,0,0,1094f36c0b2c52b12d07fb9e530d7f058ddb66a13df932a0b297760f2f29fa9f,2024-08-06T16:30:24.547000 -CVE-2024-33993,0,0,cff83475a11e398277644959537a2ea849a75ab4593074ae6afe1077f119f004,2024-08-06T16:30:24.547000 +CVE-2024-33975,0,1,b949c8285ea6e17b48d7d3c97fcf5faa433807aebc3ba98b521fecce3e4278a0,2024-08-15T16:50:35.723000 +CVE-2024-33976,0,1,63a4c017d11aa750c1b95299388f6c52105db540cf2edc4f5cc737c695311ea4,2024-08-15T16:51:02.450000 +CVE-2024-33977,0,1,9115ad9942b9fe3706b8e6a8a329c641f25d35d0ba87f9d1e1e6be7b6b1af39e,2024-08-15T16:53:04.110000 +CVE-2024-33978,0,1,ea3061f177fe541fbdcf638d742622999f04d8864d0961902a0120314e902f6e,2024-08-15T16:54:57.620000 +CVE-2024-33979,0,0,b23f4bb2f30d829ac2b8337cbc397ab525114fa50ab62ece57b2e0097ce56196,2024-08-15T14:07:24.257000 +CVE-2024-33980,0,0,4cc48478ea1d3758bfbc31648e401c46fb3a2b5528e5044fc92305300898eb87,2024-08-15T14:07:53.217000 +CVE-2024-33981,0,0,8ca9e43815221320ccf66237d8bdbf16507b4f0cfcab2dfe65108c8b4c13f496,2024-08-15T14:08:13.003000 +CVE-2024-33982,0,1,fd8be6c9831ead03bf5fd2e9fd6e940937e6dea0507d4c0d47db4ec6e06ca99c,2024-08-15T16:55:41.983000 +CVE-2024-33983,0,1,eaa89da749744e289c6b613091c1ecf9bd1b5cf680bf5b9a5d40429b019c82bb,2024-08-15T16:56:21.197000 +CVE-2024-33984,0,1,b33a7c0eae35dee0b73df70d59d7e8efbc23d35e873ba236b6fdc90db42b981d,2024-08-15T16:56:33.433000 +CVE-2024-33985,0,1,1e3b54a7b65b4a847973fe3f2bc7fd9cd47307f3bdb480651c3d4ecfb44fa88b,2024-08-15T16:57:29.493000 +CVE-2024-33986,0,1,3a2b7d632ccbffeefd6e1a74784dd1ddfef7022ea5d353d0e3412f69e7bc11bd,2024-08-15T16:57:09.407000 +CVE-2024-33987,0,1,a87517d9e82ea1fd4dab400e84c948a823ff5416260d990992f9e85f521f0187,2024-08-15T16:57:00.150000 +CVE-2024-33988,0,1,18f7f9c247ee9cc876fd6ed63e5bcaebd1240c2dc5e379071ed0135d767e4a37,2024-08-15T16:56:51.767000 +CVE-2024-33989,0,1,9b91f27ed9adf0948e2018f571d2f7b1d87a3ef5480a75ccd83989497f884137,2024-08-15T16:58:03.693000 +CVE-2024-33990,0,1,567719d122f51b38aae99691b60db0913e7a5e1332d497975411a3d238463074,2024-08-15T16:58:21.570000 +CVE-2024-33991,0,1,1455bb5a72dfbaf00d545b8c65b379987053ca004316de54e3e8c41cbbf777db,2024-08-15T16:58:42.497000 +CVE-2024-33992,0,1,b6030ec33428504b268579d5f9be0c04ce88875bd5265979c8eb36806212d61c,2024-08-15T16:58:58.480000 +CVE-2024-33993,0,1,35d0a43b6edc10b922a24990aec69a3aec309c693a8cdd4cb82ec24e28987bb3,2024-08-15T16:59:06.307000 CVE-2024-33994,0,0,cfa1f4ffdf424be2e7316b2ba25a909707d9c2673ea7b674d51f162d464b48aa,2024-08-06T16:30:24.547000 CVE-2024-33996,0,0,3a1ccff7b15ef74d30247c0f7f73ffcc0dc644d71df2ad9a3b66250554292391,2024-07-03T01:59:14.897000 CVE-2024-33997,0,0,a1b67f9141e983abbb533434dc38928810b4315794a01f73fb3845b5ec77f911,2024-06-03T14:46:24.250000 @@ -252478,7 +252483,7 @@ CVE-2024-34113,0,0,a2e9f7ac8776392f6be8ef1204f1c90f02f8da5b4c386f27bfe6c53f96f39 CVE-2024-34115,0,0,cc8b9b55a33ad4e137b074effd11699dd96f8494f93e6413f33a6c251661c876,2024-07-19T18:02:32.427000 CVE-2024-34116,0,0,4851ab33470ffca4c1046ad0fdbe4ebf66556d22cc3b975d80dd125226b02f02,2024-08-07T15:15:54.863000 CVE-2024-34117,0,0,494d2f11b73e8874c7519e9287c8b557c81195fc330252c6259deab1ef5bcc24,2024-08-14T17:49:14.177000 -CVE-2024-34118,0,0,f13d989cccc55a07c933fcfd5f49c88919ae0c8ecf176305d4944944a309965d,2024-08-14T17:49:14.177000 +CVE-2024-34118,0,1,d4f2f15270df7241d7a48515b535e21ae3b1c774debc182665e0a41a0fd7bc55,2024-08-15T16:48:41.250000 CVE-2024-34119,0,0,b18bee7f46141710c36322baeea2f2f79cc2cfb9042e189f93a16a755c8d108c,2024-06-14T20:03:08.293000 CVE-2024-3412,0,0,e50c7e3ae6f10b261f3da66fd6437a79038925b3952464be81ac0e7b8712c198,2024-05-29T13:02:09.280000 CVE-2024-34120,0,0,59b2d9c769f5e7837181f42b948f1f4d6a71599cbcd1b502e5c0f6b22b12ebe5,2024-06-14T20:02:45.567000 @@ -252492,12 +252497,12 @@ CVE-2024-34128,0,0,c97915102dfd0e38974bf97aab68fa646e656f1eb3dd71f8dec0f1259a6cd CVE-2024-34129,0,0,c47df7ddf934177974799de9912c4e8ae1e6353624749fd9b063535c8cf739aa,2024-08-07T15:15:55.070000 CVE-2024-3413,0,0,393490437f33ce616f0a6848540c1c0d3eed8ed2038327f28efd50e305f3828b,2024-05-17T02:39:54.073000 CVE-2024-34130,0,0,29b15cda4f7383fc7738011069e5f5981ecee8f8ebe6f1acd48c5ae17439fbe8,2024-08-07T15:15:55.287000 -CVE-2024-34133,0,0,c87b814a687bb818b153ac7945bf2da135fbe2b6b4ed89b874246a69a125815f,2024-08-14T17:49:14.177000 -CVE-2024-34134,0,0,9e365b3034f307782761cc8bb567946cd4bf5d531d5b8a13ff08b582ad774eaf,2024-08-14T17:49:14.177000 -CVE-2024-34135,0,0,17322ac1fec5b909a4772d5108bb05b83bad48872f432d6010a30392c28f3991,2024-08-14T17:49:14.177000 -CVE-2024-34136,0,0,27ef6c6c8c476f60245f532efa5e0a79aa84fc25c3ef20a62046338eeb40b930,2024-08-14T17:49:14.177000 -CVE-2024-34137,0,0,f11739c55dd4f631dcf7bcbc698817520fdb3656942317c00f812531c1b42313,2024-08-14T17:49:14.177000 -CVE-2024-34138,0,0,a66bd30cccb3f8021a60e44d09d9a4a25c05cba8470cec88b2ebc6afb83ec1bb,2024-08-14T17:49:14.177000 +CVE-2024-34133,0,1,3e3ff84bce8e72b3159cf4683b615988c6ea9db7c078459a0e8e6b8339439454,2024-08-15T16:48:11.847000 +CVE-2024-34134,0,1,7a839c58893f5fadfd710f4054c928014606ecb3eaddc559c224131b1187f833,2024-08-15T16:47:51.770000 +CVE-2024-34135,0,1,c1cff6b3713861f666d39dc14450d9187434c6c17360d34bd7bd4c5db9cb81ae,2024-08-15T16:47:32.560000 +CVE-2024-34136,0,1,a3fcf792939d2e36ba7058d8f89acefd25dcb3994609d875575d5c515343c8a5,2024-08-15T16:42:26.677000 +CVE-2024-34137,0,1,45c0018cb9f77ff6d29c2a2402617c749242ce64e86d6808a390c96a37f4dbf0,2024-08-15T16:42:15.847000 +CVE-2024-34138,0,1,97edea195059a0060d3ef56af54b0e54c835f5f0967846815408449f6ee2c3f1,2024-08-15T16:36:24.433000 CVE-2024-34139,0,0,ecfed81b989642faf7d6f5c1fba486f76641136619e29104c708ded3b536150c,2024-08-02T21:20:57.803000 CVE-2024-3414,0,0,85e73a02de53c5bccb3cd76452d1972fd78b5413987e018bf8d64db8ededd514,2024-05-17T02:39:54.160000 CVE-2024-34140,0,0,1269aab015181060e989f57b7ad7dc54b6e75ed6e5d455f61eea1d3b26960d6d,2024-08-02T21:23:27.143000 @@ -253018,7 +253023,7 @@ CVE-2024-34944,0,0,0cc726bd49c90758e4019a5ee8cf9a19958a1674ce4cf71d03ff6a2346878 CVE-2024-34945,0,0,bd887865baa11222c5471f83f64ee50937d3f1c1cfa2d234bd4834ddeb94df5d,2024-07-03T02:01:00.147000 CVE-2024-34946,0,0,bc37c91351bb9de539bebc2edf6ca00a5506257a85c0193f030841ee78b07113,2024-07-03T02:01:00.960000 CVE-2024-34947,0,0,1639e64ad64e3efff06c97dd9d715badbd33e6d8d7c52e5aa73aac445f5ce021,2024-05-20T19:34:58.277000 -CVE-2024-34948,0,0,1be0e178d75a75458d35d0a783016b73f5729bb8efeb1fbecd8e8099d4e24c7a,2024-05-20T19:34:58.277000 +CVE-2024-34948,0,1,df6cbd6bc290a474122249ff224542f11fc34eaa4b942caf57452628541cff09,2024-08-15T17:35:06.870000 CVE-2024-34949,0,0,153f526975e57cbda3da567b214cb11ac9a77a410da95e9aba96a02a87ca6108,2024-08-08T15:35:11.187000 CVE-2024-3495,0,0,2d01763d9fd00934d213846ccfe97dfaae5495029603a64e4efbf7d1d6ec8266,2024-05-22T12:46:53.887000 CVE-2024-34950,0,0,4b8267007ff70ad214b66a8a544774886740823c745cf811c7b1935620d9a19e,2024-07-03T02:01:01.753000 @@ -253851,7 +253856,7 @@ CVE-2024-3613,0,0,26f9ac2543805748959db0b5d9b33039cf66eba7396fc9c5a9d8ce8ca1f82b CVE-2024-36130,0,0,4671d62b05ac637a601468320fbde1254b9e1ab2c793e3e63f9ae03e57d902ad,2024-08-12T18:52:50.947000 CVE-2024-36131,0,0,feb0f364ef759fb8d3eea9eac580e0d008d6e955a292e95acc00c4f3036190f9,2024-08-12T18:53:18.077000 CVE-2024-36132,0,0,1dce30d4e49190a42dd771e2cd02fc7bcd0f0b6c2d4894583a88755ab208fd59,2024-08-12T18:53:28.710000 -CVE-2024-36136,0,0,2c8812e4abcf75a12bfa8dfaccbc54816c75315e66b0a1b02ab161e5e53824c4,2024-08-14T14:35:25.547000 +CVE-2024-36136,0,1,5d95909c13f0d8392324a7365478397dba5326ae554d2812281ea77aabac6cfb,2024-08-15T17:31:15.880000 CVE-2024-3614,0,0,7d52e3588cbb3715dc858d110e11a928859b665db7d4d54abdbcae84467ecd9e,2024-05-17T02:40:01.707000 CVE-2024-36141,0,0,18db6c112ccc0d71f5b13b30aecab0a5f2370100cf994f0af07b87507f970796,2024-06-14T20:02:18.553000 CVE-2024-36142,0,0,6ae7dd3b3d84d3e60ab36df1a1df499d7a9063449a2d0a679757a0e6ad8f4e57,2024-06-14T20:00:46.803000 @@ -253962,7 +253967,7 @@ CVE-2024-3624,0,0,af8bc198a1edb70d7feacc6f3d2793c7e8656f5800282a4e0dce44ca2e727e CVE-2024-36241,0,0,b4fd0c32db9ad6a0b3feb22ac73a4f053b381b184e4f898e9ee2d7a50f7f8ebe,2024-05-28T12:39:28.377000 CVE-2024-36243,0,0,916c2d0af88319a3c66ef191fe98ff423dd4debdaa001681c1c8384b768fbd54,2024-07-03T18:02:07.793000 CVE-2024-36244,0,0,72ec9199c50b58fba1710bd51385a13f86b624ab2159e939e6a1444afbe8dfc0,2024-06-21T11:22:01.687000 -CVE-2024-36246,0,0,4446486c0a4f811380df67ffd828bfbb8b84884734616fb70dc1198a4f0c64c5,2024-05-31T13:01:46.727000 +CVE-2024-36246,0,1,d22d56b3ac190fbff4b5b820bf9253b2e2f7fd0137ac45e12945d45896804b68,2024-08-15T17:35:07.080000 CVE-2024-3625,0,0,fb0a948a4b5da0bdab04bf1595a286af67dd68466c0feac9aee7f6c3556ca9e2,2024-04-26T12:58:17.720000 CVE-2024-36252,0,0,4edf18ae557d8c3498076af1a69a7b853e545554a27b9b0b40bcb780d22c50d6,2024-07-03T02:02:59.060000 CVE-2024-36255,0,0,a469b4be0a60fb4a2e32368cbd9ff1f41eb30d9e30ebf5e64783accfe9b2d73a,2024-05-28T12:39:28.377000 @@ -254232,7 +254237,7 @@ CVE-2024-36782,0,0,a26ba637b3d65bc93f6cef8eab2e486cb22e0f173ff0b09ffa5f5054e7e91 CVE-2024-36783,0,0,dbc11dc9218015de97a73e96cb005d8a036c1d720a02ae2fb7f59dd28b9e4117,2024-08-01T13:53:16.600000 CVE-2024-36787,0,0,26b242769047937307c486de3dde435edbd1d09662a165684d61f83fd541fbdd,2024-08-01T13:53:17.367000 CVE-2024-36788,0,0,ce421f00af3050883a12bce11fefd1ad9628128d70c1a012c0032b203b9673fd,2024-06-07T19:24:09.243000 -CVE-2024-36789,0,0,66680e480c24497cf5e272fd39ed9d33d6d18494e9620da29843a2ce28fa6be8,2024-06-07T19:24:09.243000 +CVE-2024-36789,0,1,e3781e3969948bd92ae74a8bb78c5b0d32bc5708516429d524b2a965c1c4e0b5,2024-08-15T16:35:11.633000 CVE-2024-36790,0,0,f8247224261f96e31ccf08410164dd4379381055fde60fa853baf6df22465be3,2024-08-14T20:35:14.473000 CVE-2024-36792,0,0,fabceb2ff375c58d64c9553c86e9784f4de9e6f1c14eeb688305657805693eab,2024-07-03T02:03:37.690000 CVE-2024-36795,0,0,46ba20e8747072af55f2caab9b0b2156e34c43ea304c19f325bf4da1095d48e5,2024-06-07T14:56:05.647000 @@ -254260,7 +254265,7 @@ CVE-2024-36857,0,0,a3957f20952d5f831d537cb81d4dc06ce5ec4152a9e930178e7fb48d5d56e CVE-2024-36858,0,0,bf952cd9ddab2a4c534851d95449ac4e2ed1c44a5763e3b560caa5613bebe64c,2024-08-14T19:35:23.693000 CVE-2024-3686,0,0,4edaa8377de4644f957d15220cb91ea9e071a6615200cbf20f58f4b97f92967e,2024-05-17T02:40:03.933000 CVE-2024-3687,0,0,0790df61296b0929bb9b469121387dd5b7cd2b562eeab594414896ab3fb872c8,2024-05-17T02:40:04.027000 -CVE-2024-36877,0,0,fd04a6f38a712b445aff10168a564346a5af4b96f15d7a2b7e530b8a6cefb04d,2024-08-13T20:35:10.353000 +CVE-2024-36877,0,1,fb3a2ad7e0cda628050a16e7622b1d0d259b14fce2ceaae888658e10a286c5d3,2024-08-15T16:15:19.160000 CVE-2024-3688,0,0,fd7741416f20e86cc9ace0c3d1680a96020807dd7ba69d4b2d23070e23e95bee,2024-06-04T19:20:23.107000 CVE-2024-36880,0,0,2b0302be5dbda2a151ebafe5b0e4ed1edd1c138757440601b5f7ee782f06f5e4,2024-05-30T18:18:58.870000 CVE-2024-36881,0,0,462fdd40c8930daf000297e318f0ca45e554b77fd5b7375bf9db7855ebe0f739,2024-05-30T18:18:58.870000 @@ -254588,7 +254593,7 @@ CVE-2024-37268,0,0,3ed75f71eb245fffa2f72817fa04519725ace840b74091a925a997ed8515b CVE-2024-3727,0,0,db60e8166385f10211c2718c5bee0a37482c488d5e297dbcf62d143b9a845b73,2024-08-13T17:15:23.653000 CVE-2024-37270,0,0,09adf8729d6feae3191994dc6f2b286449a8e4d910f8c343a3a9496ea050a29f,2024-07-11T13:05:54.930000 CVE-2024-37271,0,0,82adde283ff9dacc0f77be200c055ea2f2c58a80387c070880c7d1f2c1068d32,2024-07-25T13:46:39.273000 -CVE-2024-37273,0,1,2a85b1da0ca6e483bcfb6dea755537146c70a6967cba53f16b02bbb377a77813,2024-08-15T14:35:03.053000 +CVE-2024-37273,0,0,2a85b1da0ca6e483bcfb6dea755537146c70a6967cba53f16b02bbb377a77813,2024-08-15T14:35:03.053000 CVE-2024-37275,0,0,ed16fc8bc6c608f35a8b7d5acc4e01aceb7115e810ed76f0ef20187fdb243170,2024-07-24T02:52:01.253000 CVE-2024-37278,0,0,f099ad6e686108b7aa0982a8f779de2fbae21e6d456841af0260dad64229b388,2024-07-24T02:51:37.857000 CVE-2024-37279,0,0,31cbe3e974fd27b1c5c854af28b34c2989a9118ebf3b3e54bb5c16795495edb9,2024-06-13T18:35:19.777000 @@ -254668,7 +254673,7 @@ CVE-2024-37369,0,0,4a0e873966c59da3f94ba1e845b6380e279da692e22304116efbf6efc4fb0 CVE-2024-3737,0,0,26f370727648bebdbdb4484feb8794c0f4f6f501db44738bd488af3fc5030bc5,2024-05-17T02:40:05.887000 CVE-2024-37370,0,0,8a7076b3e8e134b661d21db6f90c7a50b93b1e481cf692861b0a2c3450767bad,2024-07-01T12:37:24.220000 CVE-2024-37371,0,0,70d55bf05c2eee0a9f3b94ddc604e302a9c39f7d842ab9266b20a4c2d600c9ba,2024-07-01T12:37:24.220000 -CVE-2024-37373,0,0,bdc83b92bfdbeb1ee4ea20484c39c95d53e8674224b9e12d1d627bd1fac123d1,2024-08-14T14:35:26.827000 +CVE-2024-37373,0,1,26dc5e4538b7cd09464c61fb65e8031c578a3247488f84f82c407880c1c7486b,2024-08-15T17:31:32.407000 CVE-2024-3738,0,0,cebdf6c67207ccd8240919e9596b8485c51e6607a12a8dcdfff13f6ddbdbfe32,2024-05-17T02:40:05.977000 CVE-2024-37380,0,0,4ce1330fb679655262ab3b818cd133f9eef1b7c4341268f445fa1434d34f9951,2024-07-24T12:55:13.223000 CVE-2024-37381,0,0,9fe6fde53d8260503255e878e5a3cad14d0e0ad42f178326952eb9a7c509519f,2024-08-01T13:53:31.757000 @@ -254683,7 +254688,7 @@ CVE-2024-37389,0,0,27f7927000cd6a2429ab617761c45ffb27c2f3c3199f49f01b1eda02927e3 CVE-2024-3739,0,0,ba8b07349fdcbf4927f1d53be7924c0ba58d0f09900d65fe34757229d7b34b0f,2024-05-17T02:40:06.067000 CVE-2024-37391,0,0,e99f92be626b4b841a6b299b2728912f45fefbd409010bfee05135471d62af01,2024-07-31T18:33:47.383000 CVE-2024-37393,0,0,b93d796f3c4283b87dfd22c20f36a8116f582a381c44650f39c5ea43e6b806f2,2024-07-03T02:04:18.707000 -CVE-2024-37399,0,0,37e62a74278914728b77a70861d8cdcb5129c1c70851f950c7a6c7aeebd587d7,2024-08-14T14:35:28.153000 +CVE-2024-37399,0,1,308e730bcc199d112d6cfe8bdbdbf7120fa96451bfff020b7962dbf1afddf5e4,2024-08-15T17:31:49.067000 CVE-2024-3740,0,0,cf4cd6bcfe639a4f771a19ddc36f820864da86f0d9d9f91c68694d8633fab251,2024-05-17T02:40:06.170000 CVE-2024-37403,0,0,82a2fe28b07e6e9fe5e86dff02fa8c242d19ac626eea029ca875aeaf76338b4d,2024-08-12T18:55:15.890000 CVE-2024-37405,0,0,a7f42023569aa18cbb4863def372451bd6a310533c03fc36f82684a5a0e2908a,2024-08-01T13:53:37.273000 @@ -254803,7 +254808,7 @@ CVE-2024-37562,0,0,0b83d786f66e9de9e373226ccd98c836d30e495b18960d2b202d15b8c7cdc CVE-2024-37563,0,0,8ee59654d68a17208e1e6fb0e234f309fd10e95101fa1fbf47cdd01bc38d29aa,2024-07-22T13:00:31.330000 CVE-2024-37564,0,0,38c1f4f7f0e2a429ae8032228a5d335f02708c3ba71c1f459f9aa282c15bca2b,2024-07-12T16:34:58.687000 CVE-2024-37565,0,0,e464b9f5d1b6751d8f05b2f30904029569bd814d202d52a27f0ddb9877153e7b,2024-07-22T13:00:31.330000 -CVE-2024-37568,0,0,10bb742dc66b6b359832e76ba7fcecda00069e1d77b4246d2c5e39d11e77602c,2024-07-25T18:15:03.717000 +CVE-2024-37568,0,1,f2cf556c58317250bc2c2e32d55d7d2250f892a6ccdb5a364803d78d5a6c2fd9,2024-08-15T16:35:12.900000 CVE-2024-37569,0,0,d72ceb83b037eeec35f3e81abfdf503a49618e4aba004fb3f45e6970df347f2e,2024-07-03T02:04:20.517000 CVE-2024-3757,0,0,d3e75f8205a45aeb6c1cb5b9efd4d99998e027f23a100dabf40ce218744ea3e8,2024-05-07T13:39:32.710000 CVE-2024-37570,0,0,c193fee7dc1a9f16da69c8e0950cd823d6e1aa62ce8d8888b2d1531f1f227667,2024-08-01T13:53:45.687000 @@ -254910,7 +254915,7 @@ CVE-2024-3784,0,0,f0c80c77a0788aa17bf80578f54749ae490fe23c5161f7f9c165d9871caa60 CVE-2024-37840,0,0,1ea05f0cae39cea91919dabf259bc43d4d53a339aa6352e9633c1155c24e02e9,2024-07-03T02:04:49.190000 CVE-2024-37843,0,0,b2b97625cfd8538b070daf88e20efea752488fb698343ba1b69e8a5a31a226a9,2024-08-01T13:54:21.843000 CVE-2024-37848,0,0,b9654691620e5501baad2d1771338ac2aedaf89f42fcedfa6b269a2de242ad76,2024-07-03T02:04:49.977000 -CVE-2024-37849,0,1,7a15b5118e0a895a8306b103c51dd029b756d9600db3bef6c7132e3f601ee351,2024-08-15T15:35:11.593000 +CVE-2024-37849,0,0,7a15b5118e0a895a8306b103c51dd029b756d9600db3bef6c7132e3f601ee351,2024-08-15T15:35:11.593000 CVE-2024-3785,0,0,e84209989b24c941d7c6f3eae4d5a1283a6975747744d670fcd7c761c7276a68,2024-04-15T19:12:25.887000 CVE-2024-37855,0,0,f1f3ecfbab7ca802e055151d5420d5f7ca02cdfc7b7912208150b9a33ddd284c,2024-07-03T02:04:50.817000 CVE-2024-37856,0,0,3b2c5fbeccee511c1f982fae5c819d203e5df06806ae143d685413cbae07336d,2024-07-30T13:33:30.653000 @@ -255133,7 +255138,7 @@ CVE-2024-38130,0,0,acfbaf83d943c44816859ea59c4dea1c45f234119a1db9d1342deead198c2 CVE-2024-38131,0,0,eb8c01f40fa5460fafd2d2c4686a694493594d0624a20ed5722e3e10ab06fdc9,2024-08-14T02:07:05.410000 CVE-2024-38132,0,0,7432e5fd7d4c7272648384fe6916fe7c683c9c9e37b89806d99eebf727518214,2024-08-14T02:07:05.410000 CVE-2024-38133,0,0,fd703e90dff63bda462a56bc9f93db296bfa7a36ab7a8cb30bc15a5843d6a6a4,2024-08-14T02:07:05.410000 -CVE-2024-38134,0,0,d2f9bb1de1beb1a89a6ced79b7668c62b3acc9db0682499e486dbeb23acbd1e5,2024-08-14T02:07:05.410000 +CVE-2024-38134,0,1,b6bca1691f34ce239423b1778ddba4932cca47dfb244ff22d58ba4b41cb300da,2024-08-15T17:43:41.003000 CVE-2024-38135,0,0,541b98ef9b1d9b280d1aaf414c6e5e443c3247e8e6f9f65626945498f0999744,2024-08-14T02:07:05.410000 CVE-2024-38136,0,0,afef4d400cf24196edbed15a4ab73f87f5665a8d20f1ddaba9951b75e44ee6d8,2024-08-14T02:07:05.410000 CVE-2024-38137,0,0,27b65dcf4c179a933a28ecd842b3d35f74bad4aee676c152b252bf6051abce1f,2024-08-14T02:07:05.410000 @@ -255504,8 +255509,8 @@ CVE-2024-38636,0,0,39fe2743512ad3bce5f80041cae8719a346f16bdf419751542e29e8318105 CVE-2024-38637,0,0,73dfe838ab3a4a3bdef26c72205f7e2908e62b38c42443b0d3887f952bc61af5,2024-07-15T07:15:14.093000 CVE-2024-3864,0,0,c7c600ab2d47995fde4727e677425dc294b0dc7019ce4f56ba3ea3d46f02c40c,2024-08-12T17:35:09.733000 CVE-2024-3865,0,0,d6f5dd3766d85f1a043ebf5d3172442b73d2c19e5b446b7220941e0632bb3f23,2024-04-17T12:48:31.863000 -CVE-2024-38652,0,0,04c99414a15ea5926eeb171b15ef98ea5d3f3b1e51c4dd376d96fdb2f99afb05,2024-08-14T14:35:31.657000 -CVE-2024-38653,0,0,b710d3f4ab76d820805c12243de7115a478aae4635e1c65cb596f5128244e4e9,2024-08-14T14:35:32.550000 +CVE-2024-38652,0,1,c09b7df399ce36bfa6f99e496912789d409fa436d96980e8d3bf3eedfe5b5878,2024-08-15T17:32:39.067000 +CVE-2024-38653,0,1,c8ed77058a52701b560001b5f44bd7270c8687b6c4890948d6b9eaf03edfd74d,2024-08-15T17:32:57.587000 CVE-2024-38659,0,0,7f018343721f0a1816fbc1d0de6ee38bcc05d21743970bb8a1218031b26bafff,2024-07-15T07:15:14.163000 CVE-2024-38661,0,0,b032ab35a3535059aadbe94298691231b9c402b611efa81b633478c3528450c0,2024-06-25T18:50:42.040000 CVE-2024-38662,0,0,587269b0aade9b66f2b27453b59929a1dd57dcfa88975eb87dd718f6e7386b22,2024-06-24T18:34:17.547000 @@ -255662,7 +255667,7 @@ CVE-2024-3895,0,0,f1c1a204b725be702c93f4b9fc036bb365050aae2160c5f507be071f13b946 CVE-2024-38950,0,0,ea2ed3b4c47d23612b4c6e6df56ef3d2e3152a0312e925c3c6f7376c6c21b2ac,2024-08-12T18:35:38.337000 CVE-2024-38951,0,0,68f3f4da755e62c58899a1c14a3bba19a0238b69cfd8361c9d435e588ebf0c01,2024-06-25T18:50:42.040000 CVE-2024-38952,0,0,4aac85e2e346e91f93243e51e6ba8e05f2bfa46b0da6e2a8358e8a9bb08dcdcd,2024-08-14T20:35:20.377000 -CVE-2024-38953,0,0,09fa972a2f90ff9ced571b39bbd0f6e8c2197cf8a1aa4ddb946388a81deded0a,2024-07-01T16:37:39.040000 +CVE-2024-38953,0,1,d7d56be81bac2b3458aacdeea9f0f28d3c89cbab746f4c84e46c829f257ad72e,2024-08-15T17:19:19.663000 CVE-2024-38959,0,0,cfec0ef25838165e6aeb5c8d3c664ec76927671369d600966c63c52c96a40800,2024-07-11T15:06:03.203000 CVE-2024-3896,0,0,f3d4ad57a1cf51c4743b52edc7b019af4ec979be4adfcc4256aae23d08f6902b,2024-07-26T12:40:58.473000 CVE-2024-38963,0,0,d919d9d308426b636be55ca100e53822e276f721bd65a6d6c4d8ce665dba3767,2024-08-01T13:55:10.347000 @@ -255771,11 +255776,11 @@ CVE-2024-39211,0,0,2097c1c66ba59a15383c9353c96916ab9a5680eac99b1f2a60f6c4879ed46 CVE-2024-3922,0,0,d93b594e75035330ffbe6c52b35218aa3c4c95531df86f73f7a2c93c08b19be8,2024-07-18T19:33:55.580000 CVE-2024-39220,0,0,cffdc7781bb5a48c8af1f6973408b621ad60d81fad4d0ce74cb4feeeca56b86d,2024-07-09T16:22:52.750000 CVE-2024-39223,0,0,883c34699a9736998d96a24eca81d41004d2627c06ccc61484d0f3062b934079,2024-07-09T16:22:53.590000 -CVE-2024-39225,0,0,93ec07be332c0fbc08f4cc605af38a214d7821d7542b5861ecdd39a33713e3a2,2024-08-08T15:35:16.513000 -CVE-2024-39226,0,0,65538f67cb196596a8cfb9513b9dfa6fe8eec2180b85ecc10f4d7ce6bc6a8c80,2024-08-07T20:55:49.350000 -CVE-2024-39227,0,0,cb506382b0b118c2f873f063d82a4ce1335b49a283521af9dea791cf21ab7937,2024-08-12T18:46:54.240000 -CVE-2024-39228,0,0,8b1f3c0005e0842107b7f0c645c21a9762591a4fc4cf4f38347830d4f20d016f,2024-08-08T15:35:17.417000 -CVE-2024-39229,0,0,75d82ef1b181fc2539893388d11f2e48cb3ff2c19548f67e7df5657e8322ce9a,2024-08-12T18:48:44.923000 +CVE-2024-39225,0,1,967bd0a79163136bba6e3e394c24ab42a107f2cade4053bebd45ebbe7a971cdb,2024-08-15T16:15:19.317000 +CVE-2024-39226,0,1,795af5d2bfe7e0b32f75745d1bcb51aae69a7d95811f3267e75c2594cf597057,2024-08-15T16:15:19.493000 +CVE-2024-39227,0,1,9b9dd0fff6f6efe1b1b7968ed33a92edd9262d57a609d9726e0c0ac59c14becb,2024-08-15T16:15:19.650000 +CVE-2024-39228,0,1,77a80a8a1bc69fecf027e961f4d8b2052c1f2e33e082a913fa56c2ae65ea23b1,2024-08-15T16:15:19.800000 +CVE-2024-39229,0,1,b4b3823124f3bc9ea90ea2bf51960fefa03fffb294236ab9c3c28ca969852c64,2024-08-15T16:15:19.953000 CVE-2024-3923,0,0,c2a620888229e913021be3366cfd9f75cdf87c5d652acf18a88f48f7b1cc1363,2024-05-14T16:11:39.510000 CVE-2024-39236,0,0,0c0b177de9b0c166027d70b91204b432604c3a2330076ae498cc541e78a8a520,2024-08-02T05:15:33.677000 CVE-2024-3924,0,0,235edb1f62c7ed0711c125c27cb00d729af2f8ac46c7bf2f24b9a6a03738d7f9,2024-05-30T18:19:11.743000 @@ -255894,12 +255899,12 @@ CVE-2024-39417,0,0,c621b5c359a6eba0fc4538331b90b959414f87e25f1d10286d6fbaa84fd85 CVE-2024-39418,0,0,2720141c8d7fd22862327eff817b3d7db223ad1df862bd178bf2022cd892c3ea,2024-08-14T14:32:59.893000 CVE-2024-39419,0,0,28a8d18744b82212c0f272656dd7090330ea3541a29d1020bcaf1c75a6bc3d67,2024-08-14T14:25:31.337000 CVE-2024-3942,0,0,b71832d6733f7f5db02eb3f159a58495ac978b495e9bfda57b6845f95312f30a,2024-05-02T18:00:37.360000 -CVE-2024-39420,0,0,a84d0cad42b3201b995d1734d119044d30aca6a142601f7a4f541dcc70bd473e,2024-08-14T17:49:14.177000 -CVE-2024-39422,0,0,a5ed1bd201ddb33101a53ba212f9db8cb1b6803b3c7d7c41b72ed59d5dbf4897,2024-08-14T17:49:14.177000 -CVE-2024-39423,0,0,5d26ffcea59adb272ad549c28cb430ce30605a2e6d2fa3a5d252be44d8658e15,2024-08-14T17:49:14.177000 -CVE-2024-39424,0,0,c1487bcf78e88d1abb891009f6cc62ca9ceb8cc547854d494f763814d4e4be7f,2024-08-14T17:49:14.177000 -CVE-2024-39425,0,0,fc6cb8923bf808519abf20f73966b0e6c63be0a8a447d583bf8d535429643164,2024-08-14T17:49:14.177000 -CVE-2024-39426,0,0,c203985258477ccbee0c3ae6a333da9cf0523a3b6a2ee0c65621f8e4377abbba,2024-08-14T17:49:14.177000 +CVE-2024-39420,0,1,c92663a0d913a4ba9d8ff1eddd1c6f4e2095e26934f5f50227f4eebf6c966e82,2024-08-15T17:26:28.973000 +CVE-2024-39422,0,1,099bcb321e59272e01f3f91599280734ff2fd0d71c8b14b5326e6b02ee2fbf51,2024-08-15T17:25:54.750000 +CVE-2024-39423,0,1,a19cc26e8b95e1b61b464cc5bdf9cd757743a11515b0b859cfb1998b68543fb1,2024-08-15T17:25:41.800000 +CVE-2024-39424,0,1,dc03a3561fd31f42fd422735ae0f28b774661fe7159db092f63b333bec220092,2024-08-15T17:25:25.787000 +CVE-2024-39425,0,1,8fcec55285f2b390586d0020b2d477ff294b08ca375622bf9ec78148ff157310,2024-08-15T17:17:59.783000 +CVE-2024-39426,0,1,c6e15dabaa32694bf5b6f3a54c1bd066c0918a5f4fb89df6452d6fa8a9e6b696,2024-08-15T17:17:38.680000 CVE-2024-39427,0,0,78160e98483fcc3aec226f5c047b3b1c0e863dcf72104b16f54bef5ce01d8702,2024-07-01T12:37:24.220000 CVE-2024-39428,0,0,c278d22063c70f7bf9c06407a2b45919d470d1d910aa9da6476a8683a3973a23,2024-07-01T12:37:24.220000 CVE-2024-39429,0,0,c0f0ea0961d667a14523724c8241b9d1f206aa304e922487a3184313c2bdef41,2024-07-01T12:37:24.220000 @@ -255996,7 +256001,7 @@ CVE-2024-39543,0,0,aaaad3e02df0b0d6d56ce697644f4ead0224422eef8d860010b2b8a0e7c3b CVE-2024-39545,0,0,1eb5c972b938ca677d55ad154dd167ed070fc69afd56e645990ea5adac9fd888,2024-07-11T18:09:58.777000 CVE-2024-39546,0,0,e16dcfa4fc66ceb6eb147443dbf92ba41be6e9e538dcfdb9345e3a289eefbf1c,2024-07-12T16:11:53.397000 CVE-2024-39548,0,0,f508a41c267f71c0128d6c49ba38f3ffa926a8d4647ec725429fd94a8d643cbd,2024-07-11T18:09:58.777000 -CVE-2024-39549,0,1,35f2c1bcd8c81702a00421faf40f87e7195f0ae100c438acf9bee22328a96831,2024-08-15T14:15:56.800000 +CVE-2024-39549,0,0,35f2c1bcd8c81702a00421faf40f87e7195f0ae100c438acf9bee22328a96831,2024-08-15T14:15:56.800000 CVE-2024-3955,0,0,1980afc805b9b5d168ea6a08c34d1a9d581fd505fecdd9c097016e585c054b35,2024-07-03T02:06:56.087000 CVE-2024-39550,0,0,5bb40c1c6118db31096ceb73a5335d2e11deae5cbb65f13e233b49f728e16419,2024-07-11T19:15:12.157000 CVE-2024-39551,0,0,36bf61155e3a3db50c94319d239c2bdb1bd13565a0d3a2d4d881f71cf975abe6,2024-07-11T19:15:12.260000 @@ -256110,7 +256115,7 @@ CVE-2024-39701,0,0,879aa58f50a7d5b18bfb505718bd80f7c1e443b3ef3725ff1457799d3d8b8 CVE-2024-39702,0,0,26972dcfed4a9e2d13857f82734cd85677a01fa267564ba6286c42935ec6e373,2024-07-24T12:55:13.223000 CVE-2024-39704,0,0,1d59c065d69d465eb86bf6114b5299aaf44c728f69d6748df6b6bd65077d4590,2024-07-03T14:32:56.510000 CVE-2024-39705,0,0,91d39f33d5bd2d9618d124407e406b5aefb3921b0f0d526c128476a4653583c8,2024-07-03T02:05:51.507000 -CVE-2024-39708,0,0,000cfabacce752db3861ff9f8f3b1c505cd90f739471d05927bcaf43cab3bb6e,2024-06-28T10:27:00.920000 +CVE-2024-39708,0,1,2eafb164d29e8efc470b1c615a7a961efa5060a31edd6795a1174fbb57cde7b9,2024-08-15T16:15:20.100000 CVE-2024-3971,0,0,232de18e9e74ddfe0c81af44fc47161b6db81bcc698685ef24ea3f7084d9ef87,2024-07-29T16:51:34.570000 CVE-2024-39713,0,0,99e8a316dad486c18bb302062018548767182c9767b7c9ef5e1c3b6a3cdb13f2,2024-08-05T12:41:45.957000 CVE-2024-3972,0,0,0caddd7b34d493c3554c875afe72275890f23d83038241874e85ef811a9076b6,2024-08-01T13:56:47.637000 @@ -256447,6 +256452,8 @@ CVE-2024-4069,0,0,fc5a2986d6746eec6d2dc8871a19fd31bd3dae122b27ac5ac325372fce08ed CVE-2024-40690,0,0,288f59aa1afbad71e8a264760a25606f0765322027457660d06b06f1220570f0,2024-07-12T19:04:57.907000 CVE-2024-40697,0,0,bebf3d413c945a3b35cf93ef4b95b34b89f9c389fda4792714ebafea2974c936,2024-08-13T12:58:25.437000 CVE-2024-4070,0,0,f50441c69b27e00682c793729b411e41b0ab8839510e28fbeccbd72a35bcaeb5,2024-06-04T19:20:29.567000 +CVE-2024-40704,1,1,cf1a6bf1c98efc6b003c3662998595e57fe5a182136e10ea043a042d6f514ef6,2024-08-15T17:34:07.033000 +CVE-2024-40705,1,1,2efc7b230f2c8856fa8b8fc1b84b7800405da58827f05b4570dc21020279edd5,2024-08-15T17:34:07.033000 CVE-2024-4071,0,0,5f6b5ae6c8e3d6e0ce3e89718b14a6bb17b22a46ae9131966ebec62404b12da9,2024-05-17T02:40:14.747000 CVE-2024-40719,0,0,b6da62d4912c9bd07427fa16443cd7668b6b1bac31228d96cfe2dfe539bd5688,2024-08-09T14:36:32.300000 CVE-2024-4072,0,0,5325ee2ea26a58f6ec285799bb6ee6c62eeadace5f641482183f3a76d39bf009,2024-05-17T02:40:14.847000 @@ -256486,15 +256493,15 @@ CVE-2024-40775,0,0,1fdbbe2b554a0166a3b8a0cf31bf852c33e7d8e5242e045fa4d346d061376 CVE-2024-40776,0,0,a4ff13c39aff4cb8182e6f801cb3edcf53850779e6e8c7ac30fd11f69b2ca5eb,2024-08-13T18:15:32.063000 CVE-2024-40777,0,0,cd5278d926d6f988af1dac03f9f51dab9fbf246f9272703e05ee69de8d4e128d,2024-08-01T13:58:01.910000 CVE-2024-40778,0,0,35c17d775b6ae280af3874176f7cf5db440e83e10601c08aee1f4c8e9ab8f216,2024-07-30T13:32:45.943000 -CVE-2024-40779,0,0,9a53663b0ff2b9b02a1c7803b3f6e11f74540e57d3062bef118a9d75315df805,2024-08-13T18:15:32.170000 +CVE-2024-40779,0,1,99b1388f0787b3d66e8466b19be5a36ec3ad00dbf1a137f8d5a77f6832b5d4d1,2024-08-15T16:07:27.437000 CVE-2024-4078,0,0,4f6a573d2d42430a81000704c37318a2f1d7afadf71bcba45d97fec5f925233f,2024-05-16T13:03:05.353000 -CVE-2024-40780,0,0,ca052b28cfe52457cd4861fe78867ce6d9a16251421c06cfa44e881bd539dadb,2024-08-13T18:15:32.257000 +CVE-2024-40780,0,1,7df2c05388cee8ef8e1637ad6be199018d1d3a404025ad1b1a0b245e95f22197,2024-08-15T16:47:58.510000 CVE-2024-40781,0,0,cb4f84ce4eadebc47da0b5f5ff07124e4bd80d915060c4c1ff718dd6931fbb24,2024-08-01T13:58:02.880000 CVE-2024-40782,0,0,df7481defca05955ddebd7ba4fd4f7f033a3cb7779bd31bccd946af5c5220707,2024-08-01T13:58:03.853000 CVE-2024-40783,0,0,86941936464a3149700244bf744f0d053d8d3ebfb9735c38cfcf426fbad2f6d0,2024-08-01T13:58:04.677000 CVE-2024-40784,0,0,e38e594a43f301e87ed53b54d6dd79f7976dcdfa626e2977c4678a10ad43a530,2024-08-01T13:58:05.490000 -CVE-2024-40785,0,0,a6d92402de4b62b6873214265eb669cc66b99d4fc63ca5fd3609e5d40050a834,2024-07-30T13:32:45.943000 -CVE-2024-40786,0,0,2c7f6dba8f18bc43f1ed48a096a2193e90e25fdfa83e9b15e92fb8dcce8b88b9,2024-07-30T13:32:45.943000 +CVE-2024-40785,0,1,0ebfce5c55bfee438659b0a5ff21c26489a17105755c9acc95a453360d4cf66e,2024-08-15T16:46:16.290000 +CVE-2024-40786,0,1,1d5a22dc485257f61ad56f387446230ed28d8c6d76c2d4bb7e66185337af2307,2024-08-15T16:44:31.820000 CVE-2024-40787,0,0,5fb33d089922e96d0a9f5b028cf20ac8d3e2ca70e7c2ce76064a53e614698def,2024-07-30T13:32:45.943000 CVE-2024-40788,0,0,3ab0b681f2e6ff524b1a070d28f4a3ddfc36db9cdde8ce43f25cfd6cc37d6325,2024-07-30T13:32:45.943000 CVE-2024-40789,0,0,e7a6e8542f4ff31df4b7b56668b7b06c4c1ec8fcca46cc3a7d0397d4d8b94e0c,2024-07-30T13:32:45.943000 @@ -256511,22 +256518,22 @@ CVE-2024-40802,0,0,2f077053b399c3f7f7833d620863c41648e3e5560dfd43fbc619d567c4540 CVE-2024-40803,0,0,ec6169a8b95e6ddba5b83cef53d59be8e47d612bd153bd8bc2439c4bb67fde37,2024-07-30T13:32:45.943000 CVE-2024-40804,0,0,c588b30d20a2e2021d6911b2c11e2a43eb9e49336357922d2d9441fbaf401dce,2024-07-30T13:32:45.943000 CVE-2024-40805,0,0,4c83496c1a4cb9a07935586f696b204e1383baaded642bf1ae2b05e48dccd547,2024-08-01T13:58:08.603000 -CVE-2024-40806,0,0,cee6c70e2e64610c0680c94d7989f2f85adbaf8a9c5c3baed4039dc5941afe66,2024-07-30T13:32:45.943000 -CVE-2024-40807,0,0,5aef189dcb1cabf84707e18643b463121be9beaf274c8762520853076e9cf238,2024-07-30T13:32:45.943000 -CVE-2024-40809,0,0,03bbed09a3d4f7b984718adc8bdbb2365a807b7df03d91286ecc5d65b4fb67a6,2024-07-30T13:32:45.943000 +CVE-2024-40806,0,1,de19bdc26ad947be78b25439a4c081cef03a9ac0cf8596ce40e06ed6659063cd,2024-08-15T16:42:08.780000 +CVE-2024-40807,0,1,a57ec3a3bb089ed252f2f8c175043165750e676422e4f67fbb537c1821f4ad1a,2024-08-15T16:35:50.210000 +CVE-2024-40809,0,1,9737181761f09811942af1648871be698e164a1e26e2d7cb09625587b1583d46,2024-08-15T16:26:51.523000 CVE-2024-4081,0,0,ec57e0133e64417322d14482f588518f8d5e70bfac2335ec1d22f99346ae0a79,2024-07-24T12:55:13.223000 CVE-2024-40811,0,0,58a2466a72dd67097326f2c18b9b99f24e15edfadd201715f3a11dc5fe430f0a,2024-08-01T13:58:09.693000 -CVE-2024-40812,0,0,7d329a3036e7c4083349d8e81e3e74e7078d1adfbe1917380813c087ee96bd07,2024-07-30T13:32:45.943000 -CVE-2024-40813,0,0,da8a22a1dbc1fe389e6ce3e1f16ddd1cc96f0b70a19396e98754ec581a49847f,2024-07-30T13:32:45.943000 +CVE-2024-40812,0,1,c246dcffc924270886f6bb5d99cc189e11e554cbf0acf5a0b6d7c76bf5b7cabf,2024-08-15T16:26:53.560000 +CVE-2024-40813,0,1,eaec9d679620cbe04b5224752ba0981027a92f3e1bca89f18faeb08b9aaf1ce7,2024-08-15T16:15:52.613000 CVE-2024-40814,0,0,c126f0b9e8e8796d75df680c2e8b06823cba6fa6a03437fea71610eb89801a14,2024-08-01T13:58:10.717000 -CVE-2024-40815,0,0,27f7fb67d3f78d38247d08ba5c05aaadf05cc266a3647ad96a64335b9458acb6,2024-07-30T13:32:45.943000 -CVE-2024-40816,0,0,96104bac416295c026b71f0dd9f7387a03bec8143c23a25c1e4cb9951f4715ef,2024-07-30T13:32:45.943000 -CVE-2024-40817,0,0,29d29aa671094c30851655cd03d9441a3d927e01f2fcb7e20dda4b0089e1f9da,2024-07-30T13:32:45.943000 -CVE-2024-40818,0,0,f216f1bc6dad7ff419b41dd87bd7e9308d9e8c4f28ccf6ece61a3f72c52c65e2,2024-07-30T13:32:45.943000 +CVE-2024-40815,0,1,9881ba7934d8053e627bc026ab2c113423044ccc8504576de9447ff6b84874fb,2024-08-15T16:14:17.030000 +CVE-2024-40816,0,1,1e11e220b6420b71a35fd3746057b38982c8a2d7592a74caf9f087046ded6b32,2024-08-15T16:10:13.147000 +CVE-2024-40817,0,1,3b6c92edab8949cb0ad5104683d2d4dc0b8222110ba35df6a5a37c0416740d01,2024-08-15T17:10:15.093000 +CVE-2024-40818,0,1,5edf94ae7e540dddb1df5e869997a16f69238214b3b194a8c88f5fa4318d78d3,2024-08-15T17:08:50.430000 CVE-2024-4082,0,0,02264cef46dbd3bc30b90eb0e358643df5f32c233cd928965c67d2a95fa3306a,2024-05-14T16:11:39.510000 CVE-2024-40821,0,0,487abc636b37954dfecb8c888cfc309cb83072f61f6b16a4997ec310f327007f,2024-08-01T13:58:11.907000 -CVE-2024-40822,0,0,59d21235b1931165aaad97b436358f0b8058fe6d815884188cf7ad85ca2a9488,2024-07-30T13:32:45.943000 -CVE-2024-40823,0,0,4c3873eb01ed37c3e7304b9ae3a64b9f875f953cec32797d1e64a7cde60efef7,2024-07-30T13:32:45.943000 +CVE-2024-40822,0,1,bb4dda0f197923f13f28883f6d166542a31444c99bd5734a02cac506a8ead59e,2024-08-15T17:06:23.417000 +CVE-2024-40823,0,1,67c48af0288d424c08a10899b8005bb32663e89913418e94f646262e5d0a3bd0,2024-08-15T17:08:03.857000 CVE-2024-40824,0,0,f7238499f6070a1c6bcd15f8bf3e89f1de8d2d27cbbecc98c8a027de77cf1ec1,2024-08-01T13:58:12.907000 CVE-2024-40827,0,0,d332d5a33249856370c0defb2f65802c9bcf97ce0f4d821fddc849357ea19b3a,2024-07-30T13:32:45.943000 CVE-2024-40828,0,0,fb7cd21b5df82c55cfc24f9118f5ae0e27252cbbe3373763d0e4e9ed672ae982,2024-08-01T13:58:13.833000 @@ -256838,8 +256845,8 @@ CVE-2024-41252,0,0,6f7260587fe3d806095bb900d28d021360c8fa8615ba7755fc4b11adcc410 CVE-2024-41253,0,0,1d15e693bee8ec7e0d17946828828bb61ca6ab7c564466339f09f66ca369a555,2024-08-01T13:58:25.153000 CVE-2024-41254,0,0,f212e1634835b1fd96f85fe8003b7cfe4c7c22a05d9dcb9e60d767469bc03438,2024-08-15T13:15:29.170000 CVE-2024-41255,0,0,7cc2545787669f116d3dff916e600823ce1d7be3e6c14b4dba9c7bef750d7295,2024-08-01T15:35:18.570000 -CVE-2024-41256,0,1,491cd68a00bcf62a1e4266f260b99772e9ecb5d3fe1acae9bf2653c92a9cc1d5,2024-08-15T14:27:18.487000 -CVE-2024-41258,0,1,a0ffce639d49eabf0a263282d26fc952b91860246deee0783640dbbfce6238d6,2024-08-15T14:30:16.687000 +CVE-2024-41256,0,0,491cd68a00bcf62a1e4266f260b99772e9ecb5d3fe1acae9bf2653c92a9cc1d5,2024-08-15T14:27:18.487000 +CVE-2024-41258,0,0,a0ffce639d49eabf0a263282d26fc952b91860246deee0783640dbbfce6238d6,2024-08-15T14:30:16.687000 CVE-2024-41259,0,0,8e959022d59e60bc0e97cf4bf2cb7de172a51f6107bba66dcfedab192a1fccf6,2024-08-02T16:35:51.213000 CVE-2024-4126,0,0,eeea001e03fa6fec03fbd996718e983ff172445a96f3b74ca8247477394c3911,2024-06-04T19:20:30.860000 CVE-2024-41260,0,0,3b736a5e72a084b867bc1f8a67734020228a90a35c7407c8f5897185d84f7415,2024-08-06T19:35:08.443000 @@ -257051,12 +257058,12 @@ CVE-2024-41827,0,0,dd07e0044373d41286520a934dd4c589cf3d101f877b5542d8da663a27cbc CVE-2024-41828,0,0,bac6542986659ecedf163ca506403cb725b474d45711d85a2777e2af865a5494,2024-08-07T20:38:22.280000 CVE-2024-41829,0,0,4fe5f70a5634ee3a6d744a1008137745862e77e5d8d3838b453467b0203f1cbb,2024-08-14T19:04:49.480000 CVE-2024-4183,0,0,c95eeb02531c25674be296e55025a1bd3e47bb47f078fa8bff79c7eea74c4268,2024-04-26T12:58:17.720000 -CVE-2024-41830,0,0,7af36c52019cf845d27e94c11930efb47bbdc8a78aaec5e594132005f381f01d,2024-08-14T17:49:14.177000 -CVE-2024-41831,0,0,017cfa17f402ede987ae0fc1b3afeaa1427ee6ad0c70ab28c3d4f7a9f7b4b643,2024-08-14T17:49:14.177000 -CVE-2024-41832,0,0,1536306b86c29e04a7fc7a4a54a661fdd9560086b2feaece580224b249a36847,2024-08-14T17:49:14.177000 -CVE-2024-41833,0,0,37c466551c4862f062b9f3b63b41c7f587c988bdf07e66b14364d99f01a87fb4,2024-08-14T17:49:14.177000 -CVE-2024-41834,0,0,cddb56ea121122d96d83a5fa0f765ebdd3e91130cd076d85ff86664d21f33fae,2024-08-14T17:49:14.177000 -CVE-2024-41835,0,0,9603abb3ac42b0e1966510804d6c658b812eb5c3e5334b7939c0b0a100d8abb3,2024-08-14T17:49:14.177000 +CVE-2024-41830,0,1,4d75f0af1e19119d92f9989e6b0da2d374b788f9365ca37dec8e05adea6d7a7a,2024-08-15T17:17:23.687000 +CVE-2024-41831,0,1,9e0dfb8a2e3efde84678d280d1c55c12384fca69294b66ebdba4e443262fe564,2024-08-15T17:17:07.897000 +CVE-2024-41832,0,1,c7f1e8b005cca4c4c4bec4d84ea30d57ce903ee924f13c470863811ae28c0bee,2024-08-15T17:16:41.400000 +CVE-2024-41833,0,1,f8d7329253c6419e2b73ee1f804b119c177404d3dba8426bb5ad1935311f1c90,2024-08-15T17:16:37.090000 +CVE-2024-41834,0,1,4b027eaf6705188293ef007387b718351eeae1107c4e0c463fd1678646a51b06,2024-08-15T17:13:25.090000 +CVE-2024-41835,0,1,9d590050b2e4b59c1a5720c7e54d47847344e7821377dd05c298d224846f4626,2024-08-15T17:13:11.837000 CVE-2024-41836,0,0,447eeb0d32c0b3fbb708b5b9d75636c09225896b7443055b6e14477ceb9e8a2d,2024-07-24T12:55:13.223000 CVE-2024-41839,0,0,5fe8ccf2e82b1dbd1e8f5be23a4b35f149d0ed119de3feeae98a9459138645a8,2024-07-24T12:55:13.223000 CVE-2024-41840,0,0,68e291ff42282719337ed46a5db23c72c8d6af719d2bbcd599e859e7257e739c,2024-08-14T17:49:14.177000 @@ -257076,7 +257083,7 @@ CVE-2024-41863,0,0,5218352b95081c6795db623527af60036ab1b1d152dab66fc1f92aa7277f6 CVE-2024-41864,0,0,59e830b96a597bc93dcda9cbef385e1fdf95773045c5f29bc0bb9381e7cb3adf,2024-08-14T18:20:36.710000 CVE-2024-41865,0,0,1c9d0b02e42a91c1b2481279c221e04b60cecfc41a7fc125ed37cdc3f4660a28,2024-08-14T17:49:14.177000 CVE-2024-41866,0,0,a425f2bc051ad8982696461ab1b5de2a60d8bc87ff38cd9f8c5725fb049e77fb,2024-08-14T17:49:14.177000 -CVE-2024-4187,0,1,59e73639acf686e0c0fe315911f8a7728baeee66452eb3299dce70437688c22e,2024-08-15T14:45:27.797000 +CVE-2024-4187,0,0,59e73639acf686e0c0fe315911f8a7728baeee66452eb3299dce70437688c22e,2024-08-15T14:45:27.797000 CVE-2024-4188,0,0,5459733739e7d5773814c2ce2922cf5b8b26c5398a641d72cfafdd22a4667489,2024-07-31T12:57:02.300000 CVE-2024-41880,0,0,fb22214cf23b63ecac791ad54f65d75460df9fd80fc112c0736bcd80f342f363,2024-08-01T13:59:12.507000 CVE-2024-41881,0,0,649cc07cf7de21549ce70eef1f2f35714a84b1ff95e773c0e75090d3c6d27c2e,2024-08-01T13:59:13.313000 @@ -257122,7 +257129,7 @@ CVE-2024-41951,0,0,910c7c4704e08c3f5b0d889d255d1be4f852c58d3205446fe8bb45ac562a1 CVE-2024-41952,0,0,a2a2d5c0bd3ad0150caa88e61ff72fdc96306c7692a8efbe895ab20341c07bae,2024-08-01T12:42:36.933000 CVE-2024-41953,0,0,3ffcc67e099bb316ff94f5a9cc1845c210666241b20cca92f52aec30809b8fe6,2024-08-01T12:42:36.933000 CVE-2024-41954,0,0,93352fab81d54ba7d01179899803c8640d36e5f65730e1a9dce8a0309247dc87,2024-08-01T12:42:36.933000 -CVE-2024-41955,0,1,5ad0263667cf66f8813b7d99a3968b8a2424832b6c51b00aba139fada06ab3c1,2024-08-15T14:10:40.157000 +CVE-2024-41955,0,0,5ad0263667cf66f8813b7d99a3968b8a2424832b6c51b00aba139fada06ab3c1,2024-08-15T14:10:40.157000 CVE-2024-41956,0,0,b72cd1a22a28d2303229b868afdc5fd2adbef42d25416f48e13276835bed80e5,2024-08-02T12:59:43.990000 CVE-2024-41957,0,0,f207a653c0f0f9d782c3e5585f7eb5df8054bd1cd710ccb1397440f0e840612a,2024-08-09T14:14:01.190000 CVE-2024-41958,0,0,ac2d465ee5b5b310612655a7cc0163ff8c5d740ff2b286b950528d6c8e63af4d,2024-08-06T16:30:24.547000 @@ -257405,9 +257412,9 @@ CVE-2024-4247,0,0,e85864e661a2b1d9942e48a3c52bc53fc949e702c33b68de4ade6b9cd86f67 CVE-2024-42470,0,0,c2337f1ff190575de6395575b084daf7bce25ccaf9e3e76f2820207f899cd76d,2024-08-12T13:41:36.517000 CVE-2024-42473,0,0,4ed1851fb406b4127fd12c2bea40398eaaed7991df0df7d58ed2677a68f6e622,2024-08-12T13:41:36.517000 CVE-2024-42474,0,0,4857cb5e72d8ea0d32d5af9cf7ffd6ae8ca8513ca577f0cc8130743d345121e8,2024-08-12T18:57:17.383000 -CVE-2024-42477,0,1,fcae5018af2bef05676d648639d61eec426950973c911608bb1d16f397cf37dd,2024-08-15T14:02:23.130000 -CVE-2024-42478,0,1,cdf48197e3348474fc63d3659602086723564e2de2d520434b1a86401eda413e,2024-08-15T14:03:32.867000 -CVE-2024-42479,0,1,919a4727e7b8c44b8fb7de183faba90f9bbe38a8002d5847cf0037ef02b3958f,2024-08-15T14:03:53.203000 +CVE-2024-42477,0,0,fcae5018af2bef05676d648639d61eec426950973c911608bb1d16f397cf37dd,2024-08-15T14:02:23.130000 +CVE-2024-42478,0,0,cdf48197e3348474fc63d3659602086723564e2de2d520434b1a86401eda413e,2024-08-15T14:03:32.867000 +CVE-2024-42479,0,0,919a4727e7b8c44b8fb7de183faba90f9bbe38a8002d5847cf0037ef02b3958f,2024-08-15T14:03:53.203000 CVE-2024-4248,0,0,ae8e3a45d49ca48b9dcec0ca557a7d91d483e50d5e5d3f5d5f7e2c0dd6ffe3de,2024-06-04T19:20:34 CVE-2024-42480,0,0,d6ef3c6db5a498c7b4cc4b77be4e0c4132e9804f02867681cb2b417c4a3c017c,2024-08-12T18:57:29.247000 CVE-2024-42481,0,0,ad34942ce8111bc952fcd265a37f1d388b31063c4018bd73b3f6d858abc1a1ad,2024-08-12T18:57:29.247000 @@ -257424,7 +257431,7 @@ CVE-2024-4253,0,0,c9c68d543bb45de2537aab443ac18ac0d0ac2996dd48a0a792630e0df378eb CVE-2024-4254,0,0,3b60c29b2fffc26e81ef054aaff64665b1e9fde72fa8de5968c25c437cecbbf1,2024-06-04T16:57:41.053000 CVE-2024-42543,0,0,89bf04af083c2e91e2e9ba214be5b3aa8827ce84405f38705010996fc0353810,2024-08-13T19:35:10.380000 CVE-2024-42545,0,0,f468a16273bd93e60bf7c85edbb037a37f95ddbef27d46e806b8081634956ff0,2024-08-13T15:35:16.993000 -CVE-2024-42546,0,0,a2880921d8fec551f033f97525a883f7d6a9f450c3f6b1b2afb939b9a7fa09a7,2024-08-13T17:08:30.107000 +CVE-2024-42546,0,1,fb60d203dacd557a0d6c3dd4a088a3933e203b772ae4b090e279b0a2f7b980c9,2024-08-15T16:35:15.603000 CVE-2024-42547,0,0,35eeb010fca94dc794f14fe3c29b0586f2dd6b453f1de383f4e89dde1cb85973,2024-08-13T17:08:12.543000 CVE-2024-4255,0,0,35fd058a4cc0a80e19d25400a3e944345c636d8ef400085f905d7b019af7edbf,2024-06-04T19:20:34.420000 CVE-2024-4256,0,0,2885dad709315de5112b738946979afcb06c4d717b1b754bf7bfd87477f08c3d,2024-06-04T19:20:34.517000 @@ -257434,11 +257441,11 @@ CVE-2024-4260,0,0,16d46a0b5bcb66a093fc7ed1472e8a955d65f29368360dc29eff1d3d84145b CVE-2024-4261,0,0,cad163d5402c8383e323c083e324c4342bcfec07494a0960d776456fb2ab221b,2024-05-22T14:30:41.953000 CVE-2024-4262,0,0,eb43fbaec8efb92a09683be8d89079c39bc088d0014f0d5047c7a435bf15c8e4,2024-05-22T12:46:53.887000 CVE-2024-42623,0,0,bc6ed2a4c8b4194e95ad5cff4494c1d77b65b6e029288a20eb974c9e2fd7502c,2024-08-13T20:35:12.777000 -CVE-2024-42624,0,0,ec841bafb7e9aeedb21c49859383b729fbe686d2ed7814525f5ad995afa66c4b,2024-08-13T13:24:48.877000 +CVE-2024-42624,0,1,13a200a50303b94ee2a9c0f889b5dc513260afbf05e91cf9385719f04ea77284,2024-08-15T17:35:08.070000 CVE-2024-42625,0,0,a336ad04b717d78488d075fbe4f05189cb75b4a8481071a35a5b1b1eee244b14,2024-08-13T17:37:07.567000 CVE-2024-42626,0,0,2719b95cb2b2da8055e44b617f6bc8b518937c6439f02bf103b37b68507f4891,2024-08-13T15:35:20.987000 CVE-2024-42627,0,0,6a82cfd4db29a715c71b73c3242f7479208b08be04e0e80aab8a77ece4108156,2024-08-13T19:35:11.220000 -CVE-2024-42628,0,0,ae77e6dbb0fb6b78416c59be322943b3e27d1177389d59cf5f49d0df9ff8842d,2024-08-13T13:18:32.317000 +CVE-2024-42628,0,1,cee09b2fe976a522183919495ccebc2a6bc881262cf728d1d0fb11719606d690,2024-08-15T17:35:08.840000 CVE-2024-42629,0,0,a973b8a5d96247dcc768ad375bb80fa362e4a36179f265afcb23021b6b10cb87,2024-08-13T17:02:57.890000 CVE-2024-4263,0,0,ca3576d1d67e220dba5bd29258a281021ffe39453fa0c4f20e91ad0ccbfbb40c,2024-05-16T13:03:05.353000 CVE-2024-42630,0,0,4fff96f7d5cfbd5e5589e0968506019fde3792b2edc6b60a8aaf8334fc6488be,2024-08-13T15:35:22.433000 @@ -257448,12 +257455,13 @@ CVE-2024-4264,0,0,aceade487dcdf82d5a23a178a070b3c07d4cce69337175854977fa24341a32 CVE-2024-4265,0,0,674cb78ce8c95e07c05495b52772b5d4a079c608362a6e67c2dfb567e6b8517a,2024-05-02T18:00:37.360000 CVE-2024-4266,0,0,4e57f554a9a502210e7298e86f8a93b4c9fd8085f966eca22533475a40566a21,2024-06-11T13:54:12.057000 CVE-2024-4267,0,0,b21b1be134b642d147ee55ecb619e0382fab4366c661a291e53904c7941658dd,2024-05-24T01:15:30.977000 -CVE-2024-42676,1,1,e9a5daa3dd8eccdd2f2a29dabe9972486a96dd991b5aee3e3e2779d5a44ae843,2024-08-15T14:15:10.683000 -CVE-2024-42677,1,1,921bcc4c68a42e8030a468d3c0661dcdb643fbc8b518c216389c7e6a0f4b2840,2024-08-15T14:15:10.813000 -CVE-2024-42678,1,1,a46e0301f5dde2b9b8e8931a7229a2fad19a83ec9b835894cd9980418af8c70d,2024-08-15T15:35:13.793000 -CVE-2024-42679,1,1,da0c1490e731425e36401900a4ed9f9051b7dd800a91db162d52ad313ebd63f7,2024-08-15T14:15:11.003000 +CVE-2024-42676,0,1,6462c5b9e705fb576d48df065b05ac7d932b76c583789a5ec71ff79b3202fb91,2024-08-15T17:34:07.033000 +CVE-2024-42677,0,1,61514ce4e384d908767016f5368fbc2cc1fd3b8f576d7d088539ea532d89ba80,2024-08-15T17:34:07.033000 +CVE-2024-42678,0,1,f0e0fef23444e16d094f030f670776b1516d0545e65129c4a41bfa4bfc8a743d,2024-08-15T17:34:07.033000 +CVE-2024-42679,0,1,f35e3de4330ce0f3781d4ee0bff67c74288c93f5e91f53f50b8dcdd6bb32297f,2024-08-15T17:34:07.033000 CVE-2024-4268,0,0,ed1b7008ff1a2549bc2f685279352d3a8f5b6d435592b2f29fd10fa9328ca71d,2024-07-02T18:08:17.817000 -CVE-2024-42680,1,1,d1b04f5abc334e70c942b6c701a6201458f2d279b9d7d2762603a80d10cdfac9,2024-08-15T14:15:11.107000 +CVE-2024-42680,0,1,84b9afe2398c182a65035375db67803e1d5943920b2c3812eb6bfbd298032b79,2024-08-15T17:34:07.033000 +CVE-2024-42681,1,1,527850aefe8393558b7968e9e2ec6c7858aaee56c3f36475a101d0f58030cf59,2024-08-15T17:34:07.033000 CVE-2024-4269,0,0,3a0e07c5dbf72b66f7c37e018ba2f8991c2e2b5c26c8f2d595b33767cdbe4e7e,2024-08-01T13:59:29.737000 CVE-2024-4270,0,0,17133812b9c812b17ff2909d738c8b5ae6f8cc2b39eef016edec8cd05359b195,2024-07-29T16:31:09.117000 CVE-2024-4271,0,0,264c116f07aa10a920ca78d5e9c58bba0fe1e2b31cb4f2cfd0a7a609be29751f,2024-07-03T02:07:19.577000 @@ -257468,7 +257476,7 @@ CVE-2024-42740,0,0,39569bd5167f0f47a44ebbe4ecc5aa9c5e8e01d7a3ccd0a81beaed4c0b73a CVE-2024-42741,0,0,c3d54f2d55431f18f2fe2689eea0c75eda9e73bc676a6cdf4fda83be8048dd21,2024-08-13T17:35:02.867000 CVE-2024-42742,0,0,c6d47b1b37e493a627cc13143aae4e00b72c25b4505c3a339eb6ba0a1660d2da,2024-08-13T20:35:14.063000 CVE-2024-42743,0,0,d538c66af9d70f40192fc77d1cf4c1d752037b7e0e55925fdbf9bc80a15b551d,2024-08-13T19:35:12.963000 -CVE-2024-42744,0,1,b5fdf12fd1c18150140d8a7482237b3fe88e9f65b6d8de0140d30bbf81117cb5,2024-08-15T15:35:14.590000 +CVE-2024-42744,0,0,b5fdf12fd1c18150140d8a7482237b3fe88e9f65b6d8de0140d30bbf81117cb5,2024-08-15T15:35:14.590000 CVE-2024-42745,0,0,d2f467113cda4cc30e7255dcf19a80218eafc314dce633f11469c2e4a02cafc7,2024-08-13T17:09:44.943000 CVE-2024-42747,0,0,4d1c99e860bf6905b5d644799ef0c78895a722730457e9c7bd1d214b39f83bc6,2024-08-13T17:35:04.540000 CVE-2024-42748,0,0,52e6e14746af30f6f3124891b89bbdbe775ebb6c4232d3347332f267006d05fd,2024-08-13T17:08:53.510000 @@ -257478,6 +257486,7 @@ CVE-2024-4279,0,0,dfbad3c4052d0097199e5a57f42abb52975c0de3af4475a04c90870b0d97f0 CVE-2024-4280,0,0,f46c38f13eff52b4d020fb374e18f92e6528a4bade2042627b2165ccf7b62772,2024-05-14T16:11:39.510000 CVE-2024-4281,0,0,cb48c26c252b1c83fb4810210335ce05e1fcbd94e5804419418b4f73b9d5c028,2024-05-08T13:15:00.690000 CVE-2024-4284,0,0,4fbe27a80563712e41b6422ac48754a31c657da862cab89b959335ecaf13d90e,2024-05-20T13:00:04.957000 +CVE-2024-42843,1,1,6c5529b2e8379148b8d921f552b85e2ec0213e88fb9120231d5a468adb0f08ee,2024-08-15T17:34:07.033000 CVE-2024-4286,0,0,4b983e074dfcf6df9bba7e92a07b4865c0022e26c41bba4144154cfeae541d31,2024-05-28T12:39:28.377000 CVE-2024-4287,0,0,e4eaa9cc0eedd48e962bf47bbdeb2988e2d50ccd6011525ef3609c758b0c263c,2024-05-20T15:17:54.513000 CVE-2024-4288,0,0,98dba4b61502f5abd6b75fde706ee82a9bae31a5b0be7db458ed8cfdf0d8bfc6,2024-05-16T13:03:05.353000 @@ -257487,10 +257496,44 @@ CVE-2024-4291,0,0,3555454673f17bb302e51e81ea2fe7cd049aabde203c094d5792666ddbcea9 CVE-2024-4292,0,0,3da8afef6eac3f0e74c17cae2760dab77b8f6d77627214b0783fc9bf5f2f59b0,2024-06-04T19:20:35.097000 CVE-2024-4293,0,0,32ea35cbc5ba91cf83ff71be9c2b19347dd1b3b0949ec88573415a66fabe3aec,2024-06-04T19:20:35.203000 CVE-2024-4294,0,0,0a6adde2b8f93d4c8d3c3070f48f62e5ef1709fd02553117d08b35488342d14f,2024-06-04T19:20:35.300000 +CVE-2024-42940,1,1,935f71f49c8b06ec194fedb9e67809a60c354e24e5b00b534a0131390796935e,2024-08-15T17:34:07.033000 +CVE-2024-42941,1,1,ce309a85387ee1536eb51cc1efe1b135c38ed24393c414a786fad461ce504909,2024-08-15T17:34:07.033000 +CVE-2024-42942,1,1,ac8d76dbb9ab7683325e67480e9c115010bdbfc3cbbdacb557d51792e671da1a,2024-08-15T17:34:07.033000 +CVE-2024-42943,1,1,b23cc7e790e35ba700d895f43062f7d636b5da7f26bbb8ac00a8c264ddd6f65d,2024-08-15T17:34:07.033000 +CVE-2024-42944,1,1,39fa23745396bbba06c312f2718e03aaf0fbd002375e9aee718c75b2cda65049,2024-08-15T17:34:07.033000 +CVE-2024-42945,1,1,4bb22aa812f44f9b14796fe389c1b5b85a0e17b1c0be5781847fbb0d83bc32a0,2024-08-15T17:34:07.033000 +CVE-2024-42946,1,1,3b5f760ded799b559514655e80a2d4da17131262950800389571ed80961c672f,2024-08-15T17:34:07.033000 +CVE-2024-42947,1,1,f42bc46add20d44771b56145fee731c1ddc38654b99b066f8df3372fea34b28f,2024-08-15T17:34:07.033000 +CVE-2024-42948,1,1,992bd6cbf5ea0f6902f05c311fd77296763f0c3157190c650ce9deb943af9b4c,2024-08-15T17:34:07.033000 +CVE-2024-42949,1,1,6127dea1a3946d8edb344e7804d1fd19ad07d8b2eceffc0382573b69145ca191,2024-08-15T17:34:07.033000 CVE-2024-4295,0,0,848d1af2676088d8bdb79c5f7e3bd4f81684dc40347bc492c56560372b53041d,2024-06-11T17:15:18.997000 +CVE-2024-42950,1,1,8dbeb2600941455eed3dda54ab0b3d8b4bc0382a0ae20be9f4835732ce96623c,2024-08-15T17:34:07.033000 +CVE-2024-42951,1,1,22f540ecc4033becab9fb6d512d9a3b77dc16a0fa99031944b0833a3d4975d3d,2024-08-15T17:34:07.033000 +CVE-2024-42952,1,1,ffb542f59ab0361e7ba990eb7379c34800b4ffaebe31fc01d5af1fdaee48e94c,2024-08-15T17:34:07.033000 +CVE-2024-42953,1,1,a46c6be219c49af8861d1fad17ab53380b510ef7e1e3d58cccb151287a544eb8,2024-08-15T17:34:07.033000 +CVE-2024-42954,1,1,50d2c860156681e85f520163d70368f64a776239d85cfc5a91cbe5865bc5a8d7,2024-08-15T17:34:07.033000 +CVE-2024-42955,1,1,3601d262f11c5e567127925c3e34b8181c8ce470d6c2f8c49a9c475e7ba4edb6,2024-08-15T17:34:07.033000 CVE-2024-4296,0,0,052b4ea8fe5e477de9d37ee5afe4ea95ec74241a638e1e02dda20e9782a7e237,2024-04-29T12:42:03.667000 +CVE-2024-42966,1,1,7036dbdf7da9b7158f74fdec9e3f9843fb38b3fb3db5bcb2d5a5e5aabf1b56eb,2024-08-15T17:34:07.033000 +CVE-2024-42967,1,1,5c6ddff043edb9f64de457e7c85cad51d59eabcef112c7839a0cb8ad985ed120,2024-08-15T17:34:07.033000 +CVE-2024-42968,1,1,4856d2508876e70d2d26d0d18f71049d8de6d041884546b721fff0739cde4afb,2024-08-15T17:34:07.033000 +CVE-2024-42969,1,1,dab713097fbe2947e59a0176f16b8e27764ab16d6facc62d76c163a189a81644,2024-08-15T17:34:07.033000 CVE-2024-4297,0,0,391cde32595a6f10054c7e99797c9f48482f1c612a355cb934b7ce023c8828d7,2024-04-29T12:42:03.667000 +CVE-2024-42973,1,1,ea1ff598981d810212fd28fc5d92b292eed7b8f14f874f30d82c9ec687594b16,2024-08-15T17:34:07.033000 +CVE-2024-42974,1,1,19020ba9bc5d3e8164e9f635744fb7c1bc2d86433c218abdd0ec50c24f391839,2024-08-15T17:34:07.033000 +CVE-2024-42976,1,1,d165d33fb1b82c5e775ee0c65e2c10b26a90558e47fb27e5e58d08c1dbc0c1da,2024-08-15T17:34:07.033000 +CVE-2024-42977,1,1,216d08b83eb897d4c82c26b1613e1467dfd8ebeaf8e443b8a8e7d153bdb5f0c2,2024-08-15T17:34:07.033000 +CVE-2024-42978,1,1,445b492eb8eef775e4a64681b6fb4e1eecf6f10d9e0f2c1f4066ab3e8606a4f2,2024-08-15T17:34:07.033000 +CVE-2024-42979,1,1,258e1f8a6f7dbe59b9e38ba55d4db45b18985d6734be4537b3a904bfcb72a5c2,2024-08-15T17:34:07.033000 CVE-2024-4298,0,0,56c11c4140998e5277d32b17cd52d40fe299fce95de1be0aa962947b44aa372d,2024-07-03T21:15:04.183000 +CVE-2024-42980,1,1,dc163a69e8d5c3f861d4f427507fadb0cc55c39c971f41ea09320319bfccf444,2024-08-15T17:34:07.033000 +CVE-2024-42981,1,1,87895a5069b3dc548585bf01f286cc66421c91858c24a113a62f709091d7298e,2024-08-15T17:34:07.033000 +CVE-2024-42982,1,1,93843ee8c658c74b2a9ffc628d9fd29095f015d941629c4b5dc7ba3ff8d636ee,2024-08-15T17:34:07.033000 +CVE-2024-42983,1,1,ea85331c4f96a3ed577af680caa29264adce1acb2b5e9d0847a932b612833118,2024-08-15T17:34:07.033000 +CVE-2024-42984,1,1,131e5be97b87091e14ce6825bbae556bac99ce51b76e03afce4960c9168bc779,2024-08-15T17:34:07.033000 +CVE-2024-42985,1,1,7f62f88eba2c019f1e1b26c0b33d7843e72bfa968e58169dbe10df937551f153,2024-08-15T17:34:07.033000 +CVE-2024-42986,1,1,8d53b407a9850298a10bc61660fa7b954a46af6a6bb93a6c1615e6d9021b549a,2024-08-15T17:34:07.033000 +CVE-2024-42987,1,1,91a85ec7e84c61060a1de30fd69339f4a10b02e9d13b96f093136cee79498a8c,2024-08-15T17:34:07.033000 CVE-2024-4299,0,0,2eb1fe754d25d4fca4f14435247c4dce7f2aa132c3677595429d39db730cdde4,2024-07-03T21:15:04.313000 CVE-2024-4300,0,0,9683d559686bc261042c0ad86aeb3d06ca0ebb649bc8d0eaba9f4d32c108bd00,2024-04-29T12:42:03.667000 CVE-2024-4301,0,0,218172685a71d9dc14b7de60ac62731c757d7801c2c506799e72286e245e5cdd,2024-04-29T12:42:03.667000 @@ -257586,7 +257629,7 @@ CVE-2024-4336,0,0,c134d6edc5435f42ac06617edd246079dd96557f1185ced7c01e0aea0bd59b CVE-2024-43360,0,0,5e83697ea820bba28f28ac74c16eaa49368718cf4d29d0f4eeaac44e95899ac3,2024-08-13T12:58:25.437000 CVE-2024-43368,0,0,bc8404f29bdb04258d364b3952f9782a6581bd81b6fee1a7f290b39a6cca9c9f,2024-08-15T13:01:10.150000 CVE-2024-4337,0,0,87f9a4f489ef032776e3da435c02385147be0cf8fdf2fdcc393190f8f887eca5,2024-04-30T13:11:16.690000 -CVE-2024-43373,1,1,ed8a992aa058440c637b3dc2bbcf107e169a847d01fcfdc3684d410eea4545c0,2024-08-15T15:15:21.217000 +CVE-2024-43373,0,1,69d56183bd2a33523e74549d732339012a778a169f9424729adc89709a9fb8e3,2024-08-15T17:34:07.033000 CVE-2024-4339,0,0,240ed7230e0a6e458ae0cd6534f1dc024d6c16f3537e0357643e823e6aa09596,2024-05-14T16:11:39.510000 CVE-2024-4340,0,0,47279ef0860b5c8c8bd0a3697c64eecb43c1be11e1b93224b8fe23143c960d81,2024-04-30T17:52:35.057000 CVE-2024-4341,0,0,60a5b39ccdef4d059dc8073670ab0aea750a7880bf4e71543025f3d18b32ff1e,2024-07-08T15:49:22.437000 @@ -259004,15 +259047,15 @@ CVE-2024-6037,0,0,6693b31ec7c6312863697d20bd04a1bdff52b0f0104cd13eb0277621b82257 CVE-2024-6038,0,0,4807c09415696120707d8114a37a205bc4f3b855697eebb2268af32cdef6d3c9,2024-06-27T19:25:12.067000 CVE-2024-6039,0,0,f8c984250d04a7659b926b5f5e3b365c15c8af8d222ab387cdb752767559d964,2024-06-17T14:15:12.620000 CVE-2024-6040,0,0,6a9c4144365634994ba43a8add9c13dbdf1bbd1570489b8639d9e032f2336e4e,2024-08-01T16:45:25.400000 -CVE-2024-6041,0,0,0bba41a7973df28ebdaef99f4f4bb154528af053016671ff9df5d8dd516a53fb,2024-06-17T14:15:12.733000 -CVE-2024-6042,0,0,8aeb993fe6979be9c567452d4d33791380e98a9ad6d703b5e29eea21301f6d67,2024-06-17T12:42:04.623000 +CVE-2024-6041,0,1,92efd7a17c065b70be549e53ceedb9d064d764ccd26b9ca8d8b9c2364f8da7bf,2024-08-15T17:08:11.093000 +CVE-2024-6042,0,1,283b4384a7db17fcb736e72a79d56eaff8b425e8cdc09133875467b277d4cbaa,2024-08-15T17:13:52.290000 CVE-2024-6043,0,0,134d97ce84b44f4b35faf92e34e089d208422ab36351d068a836626bdb7ccb80,2024-06-17T14:15:12.833000 CVE-2024-6044,0,0,4f21043ce144607b18656c689e724820f609703d237d24dbe17227d3f52b49e9,2024-06-17T12:42:04.623000 CVE-2024-6045,0,0,efe3be755dfb936847ff2e63b0d55993a7f058e00e5d0482b37d4da99ee94266,2024-06-17T12:42:04.623000 CVE-2024-6046,0,0,7dad2a883b5a6da9c2e106a85fbceea037db3e317153d640ef723443f1cc0680,2024-06-18T11:15:52.513000 CVE-2024-6047,0,0,85682382a3873811b400f354140b032b3237064163e98177d5be59d88a26c9c1,2024-08-01T22:15:39.020000 CVE-2024-6048,0,0,c67416098261daba4fbb7cd933140c3939f890be764cfd8ea2022f29e8208654,2024-06-17T12:42:04.623000 -CVE-2024-6050,0,0,fd028ccd5dbbb52fd62ce5cf61096dcc35b49e2bacbad5bd90cd713d5568adf3,2024-07-01T16:37:39.040000 +CVE-2024-6050,0,1,977e3c1d954bb2d407afb4f807be75a02157bd9cd72111a32e132ff13e7f9262,2024-08-15T17:21:21.920000 CVE-2024-6052,0,0,9d100b5523a4d1cbcdb510a0143b4a10e19adddd8504e766934ce961d6d1c643,2024-07-12T13:15:21.680000 CVE-2024-6054,0,0,dbd3e49036b5938301871d5a6c67ee17ba89370e3288082b00ca89a51a1f06ed,2024-06-28T13:11:58.810000 CVE-2024-6055,0,0,69ea90ebaa7aa8fe33baa786beceb3ec128eecc80f960a60b64b4cba1327c031,2024-06-20T12:44:22.977000 @@ -259249,7 +259292,7 @@ CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdca CVE-2024-6344,0,0,ddc89c494afe0b7b80a518e0bed96070c096d29b8a0f403bdd242f60ce193de2,2024-06-27T00:15:13.360000 CVE-2024-6345,0,0,fc166d5e44485020c9b016f580b4f1c78befbdae01a9e6ec8b7e6b8d01a2e1ea,2024-07-15T13:00:34.853000 CVE-2024-6346,0,0,dd2451b3228a249be11318435f5e384b8c60f44f7f9b400e6ba532a21de9b77f,2024-08-01T12:42:36.933000 -CVE-2024-6347,1,1,ac2682842f660bd3f09be4cdb04a773fadc44f3437bd090b7f3fadeae99f373b,2024-08-15T15:15:22.093000 +CVE-2024-6347,0,1,3a169b414bf39a400087a9787ab375fdda853df4184d6a43eddb1e8ab4063b0f,2024-08-15T17:34:07.033000 CVE-2024-6349,0,0,427eeb1c49748085f9d6a97a6add4281bc215342d4df9759ae2f609f0d24cf9a,2024-06-26T15:15:20.690000 CVE-2024-6353,0,0,3e7ee1ed054bc0661b7c1f2f3de9fe2ed8be61a7a777eee50734c66af6748302,2024-07-12T12:49:07.030000 CVE-2024-6354,0,0,c9410e2fdcd521ee7fa5aea0abe57bbff6ce1153eea9fc9c27ad647524c61c5c,2024-07-03T02:09:53.917000 @@ -259281,7 +259324,7 @@ CVE-2024-6387,0,0,db893df8e717a9bd82383b1c159531d9bd008b0dedb866ba3b332081811995 CVE-2024-6388,0,0,0ce37f83493b5d79bb3fdc963327390bc09266ac17f5f1de660cf43d4cdce70d,2024-06-27T17:11:52.390000 CVE-2024-6390,0,0,a350381d3f247972bbe468db9ec2332b3c135e89cdf36bdf1358f9f5965e67ff,2024-08-05T14:35:08.267000 CVE-2024-6391,0,0,f39301e9680e09028795caddd1f0219ac421e8fbe3773aa2e024531728c8f9e1,2024-07-09T18:19:14.047000 -CVE-2024-6392,0,1,edc3ee0e5658afb33c71de43cf2ca6ea07650ea12323a6b995125316053d44cb,2024-08-15T14:56:16.490000 +CVE-2024-6392,0,0,edc3ee0e5658afb33c71de43cf2ca6ea07650ea12323a6b995125316053d44cb,2024-08-15T14:56:16.490000 CVE-2024-6395,0,0,1966cf71699330f1b667831d53a0cb914c964c7509fe8ae4316297f8fa4eb9b4,2024-07-17T13:34:20.520000 CVE-2024-6396,0,0,9e4b547b4d90c33704c90a7cfe67a136b4a49a6d0168d4ba570b6960a74fd1cc,2024-07-12T12:49:07.030000 CVE-2024-6397,0,0,69c6adc6e74f8320b438655fc21122936f7ec03e924b3cf51bf011308451b2af,2024-07-12T17:02:56.110000 @@ -259298,9 +259341,9 @@ CVE-2024-6412,0,0,ac3e0b4dd9dc421ed7bc50bb0eaac729f5a46e72227bdeb5f2fc2db7ccb483 CVE-2024-6414,0,0,ae0d661be5f3239fdfe6f0d08030fef27c03212dc1e12675bcf532fd90369002,2024-07-01T12:37:24.220000 CVE-2024-6415,0,0,2d930efbf55d72578aa6f6117194938fd91dbe48efc49659be82131c011d6129,2024-07-01T12:37:24.220000 CVE-2024-6416,0,0,1d3038bca30e2041aec4c6f6e9ac2c7cb38b0b032dbc11dcdc7f3d31ad18d01f,2024-07-01T12:37:24.220000 -CVE-2024-6417,0,0,29f9a4ce41522fa0140910babecf0fc99e85f4d49ac0eb1b6a99dc830b0f22e3,2024-07-01T12:37:24.220000 -CVE-2024-6418,0,0,b63bb78bc20fc7c9074df0590cf44ede2aa2ea9145f7e2ea976342cbbc9ede3c,2024-07-01T12:37:24.220000 -CVE-2024-6419,0,0,e1f22570d75c49fa5726171947ce4e56ea60b543707fecfaebe18f84b2ff48d5,2024-07-01T12:37:24.220000 +CVE-2024-6417,0,1,6e48cdc342303ad3979da22d973620652c6e86e6096b57c31f35e162cd788f69,2024-08-15T17:16:17.793000 +CVE-2024-6418,0,1,3726fd1702ff9a949688831dda28151bc049d46e9dc8f8e1694335dadae342a2,2024-08-15T17:18:04.637000 +CVE-2024-6419,0,1,d1125fdea940518955d1a32cee03991a6482ba7897a625dcd2db437f7c0a164f,2024-08-15T17:18:53.077000 CVE-2024-6420,0,0,7f0d40c7ab5728df02346c9cfb247ebee6aa204ac7d8c9979e31822e624cbe16,2024-08-01T14:00:22.580000 CVE-2024-6421,0,0,98b5319ebdc67a3a8de540a977d3424c9b227b8694c1c8da93e49a4ad86f1bd5,2024-07-11T13:05:54.930000 CVE-2024-6422,0,0,e1aac1f04e50002f6adeb7613d16ec85ba239decc5dbe8b4da8a4789edaa7f18,2024-07-11T13:05:54.930000 @@ -259789,8 +259832,8 @@ CVE-2024-7252,0,0,b11855d09d58123416b1c452f42a306230094dfbea0e43cbf3d1a4ad2d82d8 CVE-2024-7255,0,0,fd2a8f993022fe32cb5a87546341ab7eeda32776ebc3f07d5c930f36c0483b95,2024-08-02T12:59:43.990000 CVE-2024-7256,0,0,28c6c5405ca0661376f4706f7e75647b14826bc648847c0c2ef29d4ee5bafea0,2024-08-03T18:35:04.003000 CVE-2024-7257,0,0,e6ef266df52e25692b132cfb6522d79defb5eb3e548daae54be1d69b0c3ab16e,2024-08-05T12:41:45.957000 -CVE-2024-7262,1,1,868a4f896dec783318f2ee208cc5c7c3b5f461076ab76497b65d05b176a41ea9,2024-08-15T15:15:22.290000 -CVE-2024-7263,1,1,bf4791f07300a049e277c5537894dd2593766db96c421b0c9d7bbf1b4065b2b3,2024-08-15T15:15:22.453000 +CVE-2024-7262,0,1,16c3e9b23c6a2c37a29ce523f07979e910ee2e56be7543634d7e6efdf2afd45a,2024-08-15T17:34:07.033000 +CVE-2024-7263,0,1,71acef8a4c5697f07ebf990e0137d208351c107be51654de3168c97cdbfa4b02,2024-08-15T17:34:07.033000 CVE-2024-7264,0,0,12a75b53a7f63996bb7b4af3d1a6b7462e167bb63f5a12a5607f29e5ee63586a,2024-08-12T17:30:51.880000 CVE-2024-7265,0,0,b8acefabc570cba3338fbcc031201c451674349cab85dfd61e02fb2e8f5c7f19,2024-08-08T15:15:18.970000 CVE-2024-7266,0,0,40ec5b3f4d10f4b6f3816acd7da5d1c216bf118efd4b627aae50abb96a0696e6,2024-08-07T15:17:46.717000 @@ -260026,17 +260069,17 @@ CVE-2024-7641,0,0,03fa25aa37341196cabd8b1daf86234f4e5804ab6ec7da94a6f750820c8ad6 CVE-2024-7642,0,0,a80b68df076256e2382946107c1dcd30b5ca3af8cd860d940dc2ef7075b201d1,2024-08-12T13:41:36.517000 CVE-2024-7643,0,0,747051de7ea3526843a76b422928f95e74211274906a89155eedbf6381e90db1,2024-08-12T13:41:36.517000 CVE-2024-7644,0,0,69069343bf60194181229970ae23b0a247b1b3a66d13d02d18d86f11bba31d94,2024-08-12T13:41:36.517000 -CVE-2024-7645,0,0,b152ddbcd4425ac1d44a420ec07eeb17055fa188376b5255d5c3f2006ed77df0,2024-08-12T13:41:36.517000 +CVE-2024-7645,0,1,5907fa67844d9e7166c08ec4cacd3d4b0081da6e8a85d6ebbe1b0401ec39e9c0,2024-08-15T17:43:58.627000 CVE-2024-7648,0,0,8d0848f3c912d45507f2515d657c3145304e9beedf27145e13d7372b35504285,2024-08-12T13:41:36.517000 CVE-2024-7649,0,0,71a050c23b49b2bf89e78f71215149381b0d79d78392c26dd3fc2a8745df9a5b,2024-08-12T13:41:36.517000 -CVE-2024-7657,0,0,7357c1bc93f9a709f8b06e884fd3c0f42c2b2b2014ed65ebd233a5a1a23e8b32,2024-08-12T13:41:36.517000 +CVE-2024-7657,0,1,b71ee6cae903ac873f30f4d097ac987c873f0095983bc9620eda1ffab659d5b8,2024-08-15T17:48:20.920000 CVE-2024-7658,0,0,832a65f53a452b2fa1561cdaae82b94e5ac7d59bc491a09b3cdc773f704d8588,2024-08-13T17:00:19.800000 -CVE-2024-7659,0,0,040a09b3f31070d5196c99fc605162a62530ad9378007de9005e76d64fe2722b,2024-08-12T13:41:36.517000 -CVE-2024-7660,0,0,cc5ac4ee5919f40ef0846508b6964256de615eaf415ee50d9ba90e94f96f956b,2024-08-12T13:41:36.517000 -CVE-2024-7661,0,0,a2d7e427887a28613990288416ed7d3e55c875ae06f096c455e444486d94e830,2024-08-12T13:41:36.517000 -CVE-2024-7662,0,0,1465f157bd49d42b30fd1ad144cc4f84a28fabd1dae164c19943517c3d07ea39,2024-08-12T13:41:36.517000 -CVE-2024-7663,0,0,a7af1bcc23685fdb06a1c940f1e3968171a8ac751d6abde4d02cb06ff30d4409,2024-08-12T13:41:36.517000 -CVE-2024-7664,0,0,fe59fb219679d05707a283e2234def3313501c84316d5e8a31c7c874ba6f5977,2024-08-12T13:41:36.517000 +CVE-2024-7659,0,1,3cb22096bf2f6ca2aa4f8495c729121ab87c6bf294191fb47bc11d37c76e5c86,2024-08-15T17:49:42.667000 +CVE-2024-7660,0,1,05bd0cf5af5a431133e6854041de301f5fbb0933f6a400404fe4bc85644e0369,2024-08-15T17:50:39.307000 +CVE-2024-7661,0,1,fb8b7e61ebaacab9d71504bbbb5267d6837e683d49fbdb711d2e02f04662a1ab,2024-08-15T17:51:39.870000 +CVE-2024-7662,0,1,d449c4e04c3e7f00f5c0d8835d9ad3e59e9a73a9b2e853be04645c4f8895ffbb,2024-08-15T17:54:26.217000 +CVE-2024-7663,0,1,d3c4e012b4d672e569a299d353c685fb77c3652b8bbf0bc152ae248460d3e418,2024-08-15T17:56:43.847000 +CVE-2024-7664,0,1,f693ce60204eafc2cee48485c91b9d10da6fc37dbe3272f970cd4336f572651b,2024-08-15T17:57:57.097000 CVE-2024-7665,0,0,e4b23464cdfe06a161f128f6d5c0e5b142370a15921348610f565ffe8ad86333,2024-08-12T13:41:36.517000 CVE-2024-7666,0,0,91bd4b935f117b3d179b04234ed804b3ada0d0c1db239bdb734fa7f40f1723bc,2024-08-12T13:41:36.517000 CVE-2024-7667,0,0,5eb06bc20b6a88f576b6d9b5a73a97ecfa508b078e2bb6273d199f3548d37fc5,2024-08-12T13:41:36.517000 @@ -260061,7 +260104,7 @@ CVE-2024-7705,0,0,a3429c66c8f2f4d9e27d0928f48e140883704bb780896a841b0634c11d32b5 CVE-2024-7706,0,0,1056fcaa3affff4b3f9a6b703c011337d2adc8c6bdf71227e831082308194760,2024-08-13T12:58:25.437000 CVE-2024-7707,0,0,08017af054a9aea4cbec493bee72603fd26524b137f48eec425b10e1c9a2c5ce,2024-08-13T12:58:25.437000 CVE-2024-7709,0,0,9890807a1991d90435fddd18848992ba127ee8603dc9d09cd6e46bfbc80702ff,2024-08-13T12:58:25.437000 -CVE-2024-7715,0,1,cce2a99e52ea07f4f42d2501434c3e0483cd57d931341a557261d628f3236d39,2024-08-15T15:15:22.690000 +CVE-2024-7715,0,0,cce2a99e52ea07f4f42d2501434c3e0483cd57d931341a557261d628f3236d39,2024-08-15T15:15:22.690000 CVE-2024-7728,0,0,6e291d9f53263e2fb59ac76ca77cbca952de50403aadce3c0e948994f87ca9a9,2024-08-14T13:00:37.107000 CVE-2024-7729,0,0,2bbcc23121d3cbbbfd7b7747e3325c391cd14964f404891acd614a24c4694f71,2024-08-14T13:00:37.107000 CVE-2024-7731,0,0,cc7ade0dcc3d2cb1ff1cf78974d45c78ed00c279543f0c65387d34f0cb1eab8c,2024-08-14T13:00:37.107000 @@ -260074,13 +260117,13 @@ CVE-2024-7741,0,0,bf97a19e2146c86c9fd1cba13d839b51430b41b7e303f802faf1db6c3507c8 CVE-2024-7742,0,0,fd7432f0700cd3351d7067ea4b61c37cd5a8cfd43ff3bc62c46e9591160ab741,2024-08-14T02:07:05.410000 CVE-2024-7743,0,0,e494e6c48d80eaa11af0fd6aed73bf672a1c9e402483401131b52a9bbe0ce61b,2024-08-14T02:07:05.410000 CVE-2024-7746,0,0,044d8677cf6b2af5249591875e67a177e20bc681af5642444c6a36878f418500,2024-08-13T17:11:53.553000 -CVE-2024-7748,0,0,3523f9601462e6654d0f2e73aa9c9e53927c766f7f8ee9bd235c115cf96fda6b,2024-08-14T02:07:05.410000 -CVE-2024-7749,0,0,1f5e6e5188e6a62259e3b6f3906ad79b2c3d20936d06f4b3d3896be17d3889d5,2024-08-14T02:07:05.410000 -CVE-2024-7750,0,0,28c08106afd3332e0fca76959919a68a648eec7c071faac8836f3694b150e5c2,2024-08-14T02:07:05.410000 -CVE-2024-7751,0,0,eead12058ec2b4a63b2b95032dba91e73b698d60d25e541a82225cafc8438197,2024-08-14T02:07:05.410000 -CVE-2024-7752,0,0,73e4b629405febd909a20d2bdf05bd801ba948b04dee94f179170b3e935ffe19,2024-08-14T02:07:05.410000 -CVE-2024-7753,0,0,b0db6f3a14d1f7e0243db2086cbbc3f8d47517418efcb595a5b9d08613529d8e,2024-08-14T02:07:05.410000 -CVE-2024-7754,0,0,cfa4970703cb089ea87b128d9ab797dcab545ca14743c8dcbadbff8f256ecc1b,2024-08-14T02:07:05.410000 +CVE-2024-7748,0,1,19a9780c8c3e3580e0507d6a06dfe151328aa44e58ebe3ad1d40e684712edce7,2024-08-15T17:22:53.340000 +CVE-2024-7749,0,1,b1dd92bb0312fc7ae82ed3bd4baca9ef6dbf65c2cbb7e0f4fc4cc1353892f66e,2024-08-15T17:23:28.410000 +CVE-2024-7750,0,1,e7d58f00392ca9c0b285da227f0a7911970a501cb40c773d28af04fb36b17de5,2024-08-15T17:24:54.153000 +CVE-2024-7751,0,1,5ffbeef0f29a5d3acea7b9cad606044fbdd6f7557bd31e6c9f93b9db2c4483d9,2024-08-15T17:26:09.083000 +CVE-2024-7752,0,1,0018512bb715a8d37d7ad167a8bbdd2c304f6784a1fc47bd7feeaa25ed354f18,2024-08-15T17:27:13.183000 +CVE-2024-7753,0,1,587fab64a7de39fb071ef300841065c2921649dd37e811ca98c16268383ed13c,2024-08-15T17:28:49.587000 +CVE-2024-7754,0,1,6b181e99920d55695bb5e9120038e413e8647ac94eeb5fda2e697b59b43bfd33,2024-08-15T17:30:41.807000 CVE-2024-7790,0,0,995e22accad9ea677c3614d140f7dba69e4478a2921b11a76ef2d56b76f294d0,2024-08-14T17:49:14.177000 CVE-2024-7792,0,0,4a8c00c31db08f09baf6ed34c1b3ad3dae493e58a839f1a0126bae9e368c13ea,2024-08-15T13:01:10.150000 CVE-2024-7793,0,0,1f0938f35d4e1e27e7025be92cc91d543f53c450db227a4ef64d84646bb99c4b,2024-08-15T13:01:10.150000 @@ -260097,9 +260140,9 @@ CVE-2024-7812,0,0,a3986f3d0ea729b27440d86fddb3a732a73f5c5198d35b4f4bacbca1bacca3 CVE-2024-7813,0,0,953a25de285d44c4a971712737f1cc4009963bd327015e45e35f975addbe57d2,2024-08-15T13:01:10.150000 CVE-2024-7814,0,0,ff83e4fbbf4c876ed888c2f2666e7e83313eae76aaf20a7131ca66c74ac76422,2024-08-15T13:01:10.150000 CVE-2024-7815,0,0,13c82cc57f404c9d32b7bb30767131d4be6771d137706dc927f3ce9c3db1b281,2024-08-15T13:01:10.150000 -CVE-2024-7828,0,0,c9aa1fe820074c1de5a697818041dda7c44348235ee25472acec728572bfee55,2024-08-15T13:33:37.047000 -CVE-2024-7829,0,1,5770f365a076f0accdd49fc395aceacc3d7e37f29f31a33c88a490ae2215ff45,2024-08-15T14:15:13.560000 -CVE-2024-7830,0,1,09bf2efa57c08deecac5c8f70d836daf289b589bae48bb7e9a20c84698e5fffa,2024-08-15T15:15:25.340000 -CVE-2024-7831,0,1,17b0b6c3d57879abf71f38d44669866ee80a59178d7b071aa3edd65998b13828,2024-08-15T15:15:25.947000 -CVE-2024-7832,1,1,e5b3e136a62ba0d72936cf11873f8e282a81203098d2a4f7c5def63fbeb240a3,2024-08-15T14:15:14.210000 -CVE-2024-7833,1,1,1328273c7443c3d89c66c2ced7ab889fa0872b017ee58c09b6bca7e3cc6c267a,2024-08-15T14:15:14.720000 +CVE-2024-7828,0,1,02efad96244e81192adb58de89a902a1ef2fda3df66e54fa2c488ad491be5d74,2024-08-15T16:15:23.897000 +CVE-2024-7829,0,1,bf2facf5b4b0a5dd7ce5e237a116b210be83f15b3479d8e5064d205e2b9f044e,2024-08-15T16:15:24.677000 +CVE-2024-7830,0,1,45175212ec7bdf20d19dd48afd4b20ecd81d3922aa2b6b23e80ca74b4822c207,2024-08-15T16:15:25.330000 +CVE-2024-7831,0,1,6b336f36e84f924efd73293c9c063709dd72cbe1db48e780f4be49ea64db2706,2024-08-15T16:15:25.957000 +CVE-2024-7832,0,1,00d2014761e47bd40d6e682a4ee12fe2eb058ba3b7621c75452dfb99e80b88e1,2024-08-15T17:34:07.033000 +CVE-2024-7833,0,1,41a645ce5af3bb29e8224b7a5935f3873d565966d12ccc5e0059eebfd7ee4d00,2024-08-15T17:34:07.033000