Auto-Update: 2024-08-06T02:00:17.221235+00:00

This commit is contained in:
cad-safe-bot 2024-08-06 02:03:12 +00:00
parent 22640d54de
commit 6bd2238ace
18 changed files with 826 additions and 58 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-2427",
"sourceIdentifier": "security@android.com",
"published": "2016-04-18T00:59:33.383",
"lastModified": "2024-05-17T01:08:50.350",
"lastModified": "2024-08-06T00:15:21.467",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-4070",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-05-20T11:00:14.473",
"lastModified": "2024-05-17T01:09:32.300",
"lastModified": "2024-08-06T01:15:25.717",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -2,9 +2,13 @@
"id": "CVE-2018-0824",
"sourceIdentifier": "secure@microsoft.com",
"published": "2018-05-09T19:29:00.370",
"lastModified": "2019-03-12T16:55:17.263",
"lastModified": "2024-08-06T01:00:01.460",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2024-08-05",
"cisaActionDue": "2024-08-26",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Microsoft COM for Windows Deserialization of Untrusted Data Vulnerability",
"descriptions": [
{
"lang": "en",

View File

@ -2,13 +2,13 @@
"id": "CVE-2021-38578",
"sourceIdentifier": "infosec@edk2.groups.io",
"published": "2022-03-03T22:15:08.423",
"lastModified": "2023-08-02T17:24:44.513",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-06T01:15:43.310",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Existing CommBuffer checks in SmmEntryPoint will not catch underflow when computing BufferSize.\n\n"
"value": "Existing CommBuffer checks in SmmEntryPoint will not catch underflow when computing BufferSize."
},
{
"lang": "es",
@ -42,19 +42,19 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:L",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 10.0,
"baseSeverity": "CRITICAL"
"availabilityImpact": "LOW",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"exploitabilityScore": 0.8,
"impactScore": 6.0
}
],

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-7495",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-06T01:15:43.583",
"lastModified": "2024-08-06T01:15:43.583",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in itsourcecode Laravel Accounting System 1.0. This affects an unknown part of the file app/Http/Controllers/HomeController.php. The manipulation of the argument image leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273621 was assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://github.com/DeepMountains/Mirage/blob/main/CVE13-1.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.273621",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.273621",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.385829",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-7537",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-08-06T00:15:34.653",
"lastModified": "2024-08-06T00:15:34.653",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "oFono QMI SMS Handling Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows local attackers to disclose sensitive information on affected installations of oFono. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the processing of SMS message lists. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-23157."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1077/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-7538",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-08-06T00:15:34.860",
"lastModified": "2024-08-06T00:15:34.860",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "oFono CUSD AT Command Stack-based Buffer Overflow Code Execution Vulnerability. This vulnerability allows local attackers to execute arbitrary code on affected installations of oFono. An attacker must first obtain the ability to execute code on the target modem in order to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of responses from AT Commands. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-23190."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1078/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-7539",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-08-06T00:15:35.053",
"lastModified": "2024-08-06T00:15:35.053",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "oFono CUSD Stack-based Buffer Overflow Code Execution Vulnerability. This vulnerability allows local attackers to execute arbitrary code on affected installations of oFono. An attacker must first obtain the ability to execute code on the target modem in order to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of responses from AT+CUSD commands. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-23195."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1079/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-7540",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-08-06T00:15:35.270",
"lastModified": "2024-08-06T00:15:35.270",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "oFono AT CMGL Command Uninitialized Variable Information Disclosure Vulnerability. This vulnerability allows local attackers to disclose sensitive information on affected installations of oFono. An attacker must first obtain the ability to execute code on the target modem in order to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of responses from AT+CMGL commands. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-23307."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-457"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1080/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-7541",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-08-06T00:15:35.470",
"lastModified": "2024-08-06T00:15:35.470",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "oFono AT CMT Command Uninitialized Variable Information Disclosure Vulnerability. This vulnerability allows local attackers to disclose sensitive information on affected installations of oFono. An attacker must first obtain the ability to execute code on the target modem in order to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of responses from AT+CMT commands. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-23308."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-457"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1081/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-7542",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-08-06T00:15:35.663",
"lastModified": "2024-08-06T00:15:35.663",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "oFono AT CMGR Command Uninitialized Variable Information Disclosure Vulnerability. This vulnerability allows local attackers to disclose sensitive information on affected installations of oFono. An attacker must first obtain the ability to execute code on the target modem in order to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of responses from AT+CMGR commands. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-23309."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-457"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1082/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-7543",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-08-06T00:15:35.857",
"lastModified": "2024-08-06T00:15:35.857",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "oFono SimToolKit Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to execute arbitrary code on affected installations of oFono. An attacker must first obtain the ability to execute code on the target modem in order to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of STK command PDUs. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-23456."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1083/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-7544",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-08-06T00:15:36.050",
"lastModified": "2024-08-06T00:15:36.050",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "oFono SimToolKit Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to execute arbitrary code on affected installations of oFono. An attacker must first obtain the ability to execute code on the target modem in order to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of STK command PDUs. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-23457."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1084/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-7545",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-08-06T00:15:36.247",
"lastModified": "2024-08-06T00:15:36.247",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "oFono SimToolKit Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to execute arbitrary code on affected installations of oFono. An attacker must first obtain the ability to execute code on the target modem in order to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of STK command PDUs. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-23458."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1085/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-7546",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-08-06T00:15:36.450",
"lastModified": "2024-08-06T00:15:36.450",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "oFono SimToolKit Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to execute arbitrary code on affected installations of oFono. An attacker must first obtain the ability to execute code on the target modem in order to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of STK command PDUs. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-23459."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1086/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-7547",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-08-06T00:15:36.637",
"lastModified": "2024-08-06T00:15:36.637",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "oFono SMS Decoder Stack-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to execute arbitrary code on affected installations of oFono. An attacker must first obtain the ability to execute code on the target modem in order to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of SMS PDUs. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-23460."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1087/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-08-05T23:55:17.290205+00:00
2024-08-06T02:00:17.221235+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-08-05T23:15:41.653000+00:00
2024-08-06T01:15:43.583000+00:00
```
### Last Data Feed Release
@ -27,42 +27,41 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2024-08-05T00:00:08.638403+00:00
2024-08-06T00:00:08.671170+00:00
```
### Total Number of included CVEs
```plain
259015
259027
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `12`
- [CVE-2024-7494](CVE-2024/CVE-2024-74xx/CVE-2024-7494.json) (`2024-08-05T23:15:41.653`)
- [CVE-2024-7495](CVE-2024/CVE-2024-74xx/CVE-2024-7495.json) (`2024-08-06T01:15:43.583`)
- [CVE-2024-7537](CVE-2024/CVE-2024-75xx/CVE-2024-7537.json) (`2024-08-06T00:15:34.653`)
- [CVE-2024-7538](CVE-2024/CVE-2024-75xx/CVE-2024-7538.json) (`2024-08-06T00:15:34.860`)
- [CVE-2024-7539](CVE-2024/CVE-2024-75xx/CVE-2024-7539.json) (`2024-08-06T00:15:35.053`)
- [CVE-2024-7540](CVE-2024/CVE-2024-75xx/CVE-2024-7540.json) (`2024-08-06T00:15:35.270`)
- [CVE-2024-7541](CVE-2024/CVE-2024-75xx/CVE-2024-7541.json) (`2024-08-06T00:15:35.470`)
- [CVE-2024-7542](CVE-2024/CVE-2024-75xx/CVE-2024-7542.json) (`2024-08-06T00:15:35.663`)
- [CVE-2024-7543](CVE-2024/CVE-2024-75xx/CVE-2024-7543.json) (`2024-08-06T00:15:35.857`)
- [CVE-2024-7544](CVE-2024/CVE-2024-75xx/CVE-2024-7544.json) (`2024-08-06T00:15:36.050`)
- [CVE-2024-7545](CVE-2024/CVE-2024-75xx/CVE-2024-7545.json) (`2024-08-06T00:15:36.247`)
- [CVE-2024-7546](CVE-2024/CVE-2024-75xx/CVE-2024-7546.json) (`2024-08-06T00:15:36.450`)
- [CVE-2024-7547](CVE-2024/CVE-2024-75xx/CVE-2024-7547.json) (`2024-08-06T00:15:36.637`)
### CVEs modified in the last Commit
Recently modified CVEs: `16`
Recently modified CVEs: `4`
- [CVE-2017-18207](CVE-2017/CVE-2017-182xx/CVE-2017-18207.json) (`2024-08-05T22:15:21.810`)
- [CVE-2017-18343](CVE-2017/CVE-2017-183xx/CVE-2017-18343.json) (`2024-08-05T22:15:23.000`)
- [CVE-2017-18924](CVE-2017/CVE-2017-189xx/CVE-2017-18924.json) (`2024-08-05T22:15:27.853`)
- [CVE-2017-20011](CVE-2017/CVE-2017-200xx/CVE-2017-20011.json) (`2024-08-05T22:15:28.037`)
- [CVE-2017-20012](CVE-2017/CVE-2017-200xx/CVE-2017-20012.json) (`2024-08-05T22:15:28.160`)
- [CVE-2017-20013](CVE-2017/CVE-2017-200xx/CVE-2017-20013.json) (`2024-08-05T22:15:28.260`)
- [CVE-2017-20014](CVE-2017/CVE-2017-200xx/CVE-2017-20014.json) (`2024-08-05T22:15:28.367`)
- [CVE-2017-20015](CVE-2017/CVE-2017-200xx/CVE-2017-20015.json) (`2024-08-05T22:15:28.473`)
- [CVE-2017-20016](CVE-2017/CVE-2017-200xx/CVE-2017-20016.json) (`2024-08-05T22:15:28.590`)
- [CVE-2017-20158](CVE-2017/CVE-2017-201xx/CVE-2017-20158.json) (`2024-08-05T22:15:30.400`)
- [CVE-2017-20178](CVE-2017/CVE-2017-201xx/CVE-2017-20178.json) (`2024-08-05T22:15:30.823`)
- [CVE-2017-20185](CVE-2017/CVE-2017-201xx/CVE-2017-20185.json) (`2024-08-05T22:15:31.043`)
- [CVE-2017-20186](CVE-2017/CVE-2017-201xx/CVE-2017-20186.json) (`2024-08-05T22:15:31.163`)
- [CVE-2017-20187](CVE-2017/CVE-2017-201xx/CVE-2017-20187.json) (`2024-08-05T22:15:31.287`)
- [CVE-2017-20190](CVE-2017/CVE-2017-201xx/CVE-2017-20190.json) (`2024-08-05T22:15:31.440`)
- [CVE-2024-25736](CVE-2024/CVE-2024-257xx/CVE-2024-25736.json) (`2024-08-05T22:35:01.947`)
- [CVE-2016-2427](CVE-2016/CVE-2016-24xx/CVE-2016-2427.json) (`2024-08-06T00:15:21.467`)
- [CVE-2016-4070](CVE-2016/CVE-2016-40xx/CVE-2016-4070.json) (`2024-08-06T01:15:25.717`)
- [CVE-2018-0824](CVE-2018/CVE-2018-08xx/CVE-2018-0824.json) (`2024-08-06T01:00:01.460`)
- [CVE-2021-38578](CVE-2021/CVE-2021-385xx/CVE-2021-38578.json) (`2024-08-06T01:15:43.310`)
## Download and Usage

View File

@ -85768,7 +85768,7 @@ CVE-2016-2423,0,0,5911c2e133e61f0bc1b5950252c59d7806992768e25bdf25c58faabdbec3cb
CVE-2016-2424,0,0,cc78c02ac4f293b5e6742f3ace4ed8f46031764568b70b18ffdd5a7c07f2ea1c,2016-04-25T12:53:51.960000
CVE-2016-2425,0,0,0170cf01017c8ceb5cbd8b06d2e36ee7fcaaf3b634a66ded8edb57360d69a400,2016-04-25T13:17:43.750000
CVE-2016-2426,0,0,af27811a63a5a5c1370fb360ce4fbdfd00b00aac51a6cb219a11691e121dbca7,2016-04-25T12:50:30.013000
CVE-2016-2427,0,0,4e3db6963ca35845437760a82b0041a97987c88a746b8b0386ed7ac68b5089e4,2024-05-17T01:08:50.350000
CVE-2016-2427,0,1,dccbd247475235a6595d552298e64ee5487b33cad1138605fedae057efd6a078,2024-08-06T00:15:21.467000
CVE-2016-2428,0,0,6935935cf316c82aa2dcfe14a12a6e289266fb177fea1c0f12208979b9a1689e,2016-05-10T17:25:53.500000
CVE-2016-2429,0,0,85ab8c2a4e3a2a9da2bf331d971ee8416c2df85510da085d128e1913a05594d8,2016-05-10T17:27:09.553000
CVE-2016-2430,0,0,a6b21ccbc09ac8aa0f9b837690fca5d7d80449958c0fdf1de510de8ecb7e512d,2016-05-10T17:20:43.420000
@ -87313,7 +87313,7 @@ CVE-2016-4065,0,0,471740d5e385741c909af8e23639a1aa07c3112ec2a0dd219276977cfe646a
CVE-2016-4066,0,0,69491c109470520f3fe312a6b2167d98e8017c0bcf1552dd68694e91ed453476,2016-11-28T20:14:52.277000
CVE-2016-4068,0,0,baf1b7a499da5ef09d286caf839daa2a275d9cff7ade6e75617832c602d9a2fe,2018-10-30T16:27:37.467000
CVE-2016-4069,0,0,6ab8c1958aaafad6a76cf70dddc152a65a06a6289ab662ac1be12a8e891c52e4,2018-10-30T16:27:32.030000
CVE-2016-4070,0,0,6cddf2bcd8b9bf002b8cc959499214169d2f56ab3d6d6e335a8089e99fee429b,2024-05-17T01:09:32.300000
CVE-2016-4070,0,1,566256e1e3550093c6a0c8ca0b0ccbb14e126a9e2c0c36a5a261d7d10f7c5eaa,2024-08-06T01:15:25.717000
CVE-2016-4071,0,0,bc732cff1f3b5aabe74210b54394979956d480c134e97561a3e45df5e7f80a1b,2023-11-07T02:32:33.527000
CVE-2016-4072,0,0,084bc6ec948306a0adddbdb638d683cb5fb40a06a31bf53023ada70c5948463b,2023-11-07T02:32:33.650000
CVE-2016-4073,0,0,34467d8a4fcd77773b158122d8caac8d6dce34bb33b9f9e6ce37dbcac397d294,2023-11-07T02:32:33.757000
@ -101441,7 +101441,7 @@ CVE-2017-18203,0,0,7be9b53de3f7d89968d50c1eaad71512f187e8bb4262701714306dad9023c
CVE-2017-18204,0,0,7f1bdcef96ed52e49a43ef2455f19e6e6951f67ef104573f548438cd2704ae6b,2019-10-03T00:03:26.223000
CVE-2017-18205,0,0,c4a6c1218fb6f8a719cbd2cbdf61387675d1f757a8c14874db4d1756c0febceb,2018-10-31T10:29:11.577000
CVE-2017-18206,0,0,04009292d349a201045b656880b172c9e68ac5b178daa714eef89d0da77f8663,2020-12-01T07:15:11.060000
CVE-2017-18207,0,1,2c39bbfde00ca463f65fd7f6bb394700cf2ec366ea80c13222079758170417cb,2024-08-05T22:15:21.810000
CVE-2017-18207,0,0,2c39bbfde00ca463f65fd7f6bb394700cf2ec366ea80c13222079758170417cb,2024-08-05T22:15:21.810000
CVE-2017-18208,0,0,af6d88269313310ec978f7cca5e6cab4d2b45213a2b0a3d96ec5c67ccbb1fabe,2019-10-03T00:03:26.223000
CVE-2017-18209,0,0,c84d2d468d79fbbd4f47ccb25305f23d4f85c0078943676b8364ecb801de3114,2020-09-08T00:15:19.180000
CVE-2017-1821,0,0,835015848776717c2f32396e3855c40950258e1ba6d7b355ff99e910add07daa,2023-11-07T02:42:27.010000
@ -101589,7 +101589,7 @@ CVE-2017-1834,0,0,7a6b750b20276b7644dbef2b589fe8b85a94247c9d41d22c1c995e862d69b3
CVE-2017-18340,0,0,fdc24fd66c09e238e0e14a8ebf60f97d7f39f4ebe7296b7e87f4f930b4878d65,2023-11-07T02:41:53.780000
CVE-2017-18341,0,0,5dd4b0d89a87c3bde80ad13b27c853496877a22811943afbe66dc9df75832306,2023-11-07T02:41:54.013000
CVE-2017-18342,0,0,ba23411dc960422fa2b0f4dce7c7182fb4754c17c78d5726b362c42f826d23cb,2023-11-07T02:41:54.270000
CVE-2017-18343,0,1,190b2bb4274cc748ec0a72ddbe53d719fe789f6b86e7147b7a598f1b362a39fd,2024-08-05T22:15:23
CVE-2017-18343,0,0,190b2bb4274cc748ec0a72ddbe53d719fe789f6b86e7147b7a598f1b362a39fd,2024-08-05T22:15:23
CVE-2017-18344,0,0,cca5a6cebe649120bd1f4ca814224f14259013fcfccb5094a583653ce638d650,2020-10-15T13:28:10.487000
CVE-2017-18345,0,0,8fed8703951c1b95dc1173cbae1c883a9b0e49801a0d000c11f55a625cf87ee7,2018-11-06T13:20:30.580000
CVE-2017-18346,0,0,67c2e9221a784c7790481ce73bbef231496b306ee6c8e4542cfe6b9fcf02ceaf,2019-07-05T18:49:42.010000
@ -102205,7 +102205,7 @@ CVE-2017-18920,0,0,55082a79b87833d3164f152e67a4392cff574a549a12ab5999a17323e75b7
CVE-2017-18921,0,0,14b43a120c7135606a73e5104a1209289a7f33bf79e84cfd6df9bc31402f90d7,2020-06-24T17:57:59.937000
CVE-2017-18922,0,0,652b55854fe9d514326c3187902a46151049f2a540ff897a06b9373ffc97dc63,2023-11-07T02:41:59.110000
CVE-2017-18923,0,0,cc5679a496b61a234b3886648b5ecd66026bde3bf2be5a492a99d0c4535383bd,2020-08-05T15:44:41.857000
CVE-2017-18924,0,1,5ef9ecdb33ac99896419c27c6dfba1362043b5c780a3ef8dc3056b5aded5e8e5,2024-08-05T22:15:27.853000
CVE-2017-18924,0,0,5ef9ecdb33ac99896419c27c6dfba1362043b5c780a3ef8dc3056b5aded5e8e5,2024-08-05T22:15:27.853000
CVE-2017-18925,0,0,65b727fee208cdc8ea6ee9aad7a3c6394484706290370ba98079bc13ac196fba,2020-10-30T18:23:30.623000
CVE-2017-18926,0,0,2d8214603af0b5f9af02c9c38073dc25df49efa6895861322484d8f31fbaea0e,2023-11-07T02:41:59.383000
CVE-2017-1893,0,0,18085e9ce7f37f74041c3ef356cdb494096581b650acf6bbe44300d97a393913,2023-11-07T02:42:49.133000
@ -102325,12 +102325,12 @@ CVE-2017-20006,0,0,b4190fc9d85a8e72398babb9d5f1da7539ca3d3965f9649a0b876d556a39f
CVE-2017-20007,0,0,1271df8134f87bef833a5e4c9d224d89e2521c4c4020cc424b2e152c413931ed,2021-10-28T20:01:35.243000
CVE-2017-20008,0,0,0dc076dfd123ee6edf40907f798926a6df06b749f10186867fb0e568a36bd175,2021-11-29T19:29:06.613000
CVE-2017-2001,0,0,8e354aa5d1853f14898b78f336d9fe3e86b739d356ccfd2a62a194b59573f0b9,2023-11-07T02:43:26.440000
CVE-2017-20011,0,1,7c341bb31ff1506d21f936bcbcce4e3db761c3a2b01a186b9fcb8287fd8c624c,2024-08-05T22:15:28.037000
CVE-2017-20012,0,1,d4a1a8edc9f3f48324f74f57f530622ae83c970ac1078dde5444e3057047a3e6,2024-08-05T22:15:28.160000
CVE-2017-20013,0,1,6e6b91e6189a7ec1d82d3ea675d895d1a3117ee38391618261433966e60c85f9,2024-08-05T22:15:28.260000
CVE-2017-20014,0,1,b1cec30aa2526fde050d9693c60456f1453d922f836adb9715cfda9fe7db98c3,2024-08-05T22:15:28.367000
CVE-2017-20015,0,1,f8a3812de65caa86f6dbae6ff6df2fc41bfda4dc3b494d7935bf400a0f8f9230,2024-08-05T22:15:28.473000
CVE-2017-20016,0,1,ab26cf2d334b4c6538a73c52ec2ac63fd5e7c20de029e562cf22b449d495c7a6,2024-08-05T22:15:28.590000
CVE-2017-20011,0,0,7c341bb31ff1506d21f936bcbcce4e3db761c3a2b01a186b9fcb8287fd8c624c,2024-08-05T22:15:28.037000
CVE-2017-20012,0,0,d4a1a8edc9f3f48324f74f57f530622ae83c970ac1078dde5444e3057047a3e6,2024-08-05T22:15:28.160000
CVE-2017-20013,0,0,6e6b91e6189a7ec1d82d3ea675d895d1a3117ee38391618261433966e60c85f9,2024-08-05T22:15:28.260000
CVE-2017-20014,0,0,b1cec30aa2526fde050d9693c60456f1453d922f836adb9715cfda9fe7db98c3,2024-08-05T22:15:28.367000
CVE-2017-20015,0,0,f8a3812de65caa86f6dbae6ff6df2fc41bfda4dc3b494d7935bf400a0f8f9230,2024-08-05T22:15:28.473000
CVE-2017-20016,0,0,ab26cf2d334b4c6538a73c52ec2ac63fd5e7c20de029e562cf22b449d495c7a6,2024-08-05T22:15:28.590000
CVE-2017-20017,0,0,127d9f83192d862a403ffa8f0d928d84617d387843f8170f7b5ad4faa0370dd0,2022-06-14T19:12:11.747000
CVE-2017-20018,0,0,9faffd901bf4086fa68c93772bf1e2c7350b2d11419064794639aacd1f7eca78,2022-06-17T15:11:00.090000
CVE-2017-20019,0,0,97f02b245e2ba30985d0a8ea48e7ff4862618057dd38210239ab28cded97aa22,2022-06-17T23:19:48.870000
@ -102486,7 +102486,7 @@ CVE-2017-20154,0,0,d8a610656ca71d7d34f0fb596ceb5715fead331d47f097b02a7525607897e
CVE-2017-20155,0,0,a1a14eb87eb9a7874ad9e22ab8d89418ee97aa9e0cd9bccb9e7df46c829e00ad,2024-05-17T01:17:23.077000
CVE-2017-20156,0,0,ad99e1bc96a3516bc5f7a32d45c93e3812bac5441b19b61152aea68c6d4c1f4a,2024-05-17T01:17:23.197000
CVE-2017-20157,0,0,dcccc6aa8d8cc927a2261e57eb3d8a48d40cf21dda87129d85cad2a4955c5c36,2024-05-17T01:17:23.320000
CVE-2017-20158,0,1,927f05ce79f82ba61d88ffef8f8b4eeedc7a6118577c9e6e8a3066fa596038bb,2024-08-05T22:15:30.400000
CVE-2017-20158,0,0,927f05ce79f82ba61d88ffef8f8b4eeedc7a6118577c9e6e8a3066fa596038bb,2024-08-05T22:15:30.400000
CVE-2017-20159,0,0,ac032027c19cbe96f733edc6c632efc50d7143f36b3c4a8a81af2a840f51f48b,2024-05-17T01:17:23.580000
CVE-2017-2016,0,0,e8a68a4ba58458c3da0e9488d67712e74edfe8b5560c4c4c35e270216e3b9fa3,2023-11-07T02:43:29.970000
CVE-2017-20160,0,0,fdae568c7e05fb2634931e7ed375e20462364ffb88a209d02233223374b0f51b,2024-05-17T01:17:23.700000
@ -102508,7 +102508,7 @@ CVE-2017-20174,0,0,604748113c532c2ed5446e7e7ec7b3a25f7469fc895a5c6c8c9993493dd33
CVE-2017-20175,0,0,d60a76273bc9bf735eac55d16d896d7d5a7f2d348d0d10e7f393e7b3a19aaee7,2024-05-17T01:17:25.397000
CVE-2017-20176,0,0,5ecb8289e47c9c773229e509d9af5fbddcb83bea11c9bf70d7ceb4870d6bfdef,2024-05-17T01:17:25.510000
CVE-2017-20177,0,0,4ac1a0885ef3d56933e53693e18a9f9e58e80c532b0b9bf944c712dd5485a4d9,2024-05-17T01:17:25.630000
CVE-2017-20178,0,1,0360e875d2f5c748c41d6468906f723d4c840c14a7ef8e7a5d3f3abf4d17a01e,2024-08-05T22:15:30.823000
CVE-2017-20178,0,0,0360e875d2f5c748c41d6468906f723d4c840c14a7ef8e7a5d3f3abf4d17a01e,2024-08-05T22:15:30.823000
CVE-2017-20179,0,0,429e6761d5bd7e2063590e9eb88928c0583fdc39bbcb2b5bdf6786e3c2900f7a,2024-05-17T01:17:25.870000
CVE-2017-2018,0,0,6a55a04ed613d681bb7aa93ff3c115faab06bfe8f85b4da6e6b74ad72290e52d,2023-11-07T02:43:30.430000
CVE-2017-20180,0,0,60150ff4f27729b4fa0c3c2dcce555bbaec26940cf54dca30ce4e0dc1411386b,2024-05-17T01:17:25.980000
@ -102516,13 +102516,13 @@ CVE-2017-20181,0,0,88d3de2255772d9860c72d46a441f9365832deeaafff5fe000e1abb115ee1
CVE-2017-20182,0,0,d5cdc899eed693bb05ea0b7aec8b7779827652f47529231b0fcdbd4b7ea82bdf,2024-05-17T01:17:26.230000
CVE-2017-20183,0,0,033f1dc491a3b8a46a76018d0973eb716ed07222c5b4e102d5e0df2da96e35e4,2024-05-17T01:17:26.370000
CVE-2017-20184,0,0,095acc06d871dad770eec8f605f61ec3b9507b4bbd472c49252478c627abed28,2023-05-10T18:06:46.160000
CVE-2017-20185,0,1,262d2a87af5f4fc3f797f2b221c0a7f8a9d98ef665f1ad5abd0acb32e9813d03,2024-08-05T22:15:31.043000
CVE-2017-20186,0,1,a44e560bf593fc98f31e7b82fb116ad6ec0a2265c326e1efe815ddf0ef848017,2024-08-05T22:15:31.163000
CVE-2017-20187,0,1,439daba23cb231bf9a3a05cf84608ee08920e004d7fa3d5d3a05b0063643fdd8,2024-08-05T22:15:31.287000
CVE-2017-20185,0,0,262d2a87af5f4fc3f797f2b221c0a7f8a9d98ef665f1ad5abd0acb32e9813d03,2024-08-05T22:15:31.043000
CVE-2017-20186,0,0,a44e560bf593fc98f31e7b82fb116ad6ec0a2265c326e1efe815ddf0ef848017,2024-08-05T22:15:31.163000
CVE-2017-20187,0,0,439daba23cb231bf9a3a05cf84608ee08920e004d7fa3d5d3a05b0063643fdd8,2024-08-05T22:15:31.287000
CVE-2017-20188,0,0,329272b92a1630954b6e2d9259a2b0f82ef555ab5ce6524e8e685ef56f14514b,2024-05-17T01:17:26.920000
CVE-2017-20189,0,0,dce97d2fac31f8ad5a1ef7790c7ca57d8c8e31ae0f291f1158d33fc1a1e4dbdb,2024-01-30T23:01:53.763000
CVE-2017-2019,0,0,0503760b9e3a588a1928b34508ca8410ada27b38d1650c235dca432cc0f673d6,2023-11-07T02:43:30.710000
CVE-2017-20190,0,1,3cc0e3b102786de6c787afab3389382e2d2272de3da6aa41def1c4ee9906c349,2024-08-05T22:15:31.440000
CVE-2017-20190,0,0,3cc0e3b102786de6c787afab3389382e2d2272de3da6aa41def1c4ee9906c349,2024-08-05T22:15:31.440000
CVE-2017-20191,0,0,c82081004c307230c99856cdb3a9bea1dbe477fc9056adce103f7b0450353360,2024-05-17T01:17:27.427000
CVE-2017-2020,0,0,0176f89e76e77d17aff44beb265bbd6290607491912cdad54f562216e17fef40,2023-11-07T02:43:30.943000
CVE-2017-2021,0,0,76f10f5cd36e75a57c68367deb797f3f6432a879d0c98ef2f911f8615c163241,2023-11-07T02:43:31.170000
@ -110521,7 +110521,7 @@ CVE-2018-0820,0,0,37d589a7f7767da548742f43b26a7c38d523c69858e08b8d59487fdbeb3dfa
CVE-2018-0821,0,0,37dec9a7b0ae2ffd8a131f1a880202d0667df20584fc6dd4d2087710ee9368d0,2019-10-03T00:03:26.223000
CVE-2018-0822,0,0,c66251d7b34352211af4f5a1245ff2487d2b8b80cc2206f069acf1fd0551276c,2019-10-03T00:03:26.223000
CVE-2018-0823,0,0,ac2d84c2f389fa31c4d934d83621a09019f5c8716fb56f16749dd620acccf433,2019-10-03T00:03:26.223000
CVE-2018-0824,0,0,7f4f0b7f54ce2dfb8c7721634fda72943fd9390d98adc625b2e0ceacf5eb7fb9,2019-03-12T16:55:17.263000
CVE-2018-0824,0,1,eced6f1cbffe1f5b96b9bea7e681149493819c6e5b28b166af2eb9b8efc1bdf9,2024-08-06T01:00:01.460000
CVE-2018-0825,0,0,19d1e409c71f6bdd74f7307c0ca3ae6349435b385c177c0f107f15ffa26c9de1,2022-05-23T17:29:15.350000
CVE-2018-0826,0,0,0262a58d145e4ac0fc914edffbaef5cbfb5a2eb6406789cd178f229c4198538c,2019-10-03T00:03:26.223000
CVE-2018-0827,0,0,ea8505a0898212d1f009c625f74ba880dc432a66250be2699ee30b8136b4f69f,2019-10-03T00:03:26.223000
@ -180713,7 +180713,7 @@ CVE-2021-38574,0,0,3c030b0308b1fb07fa66ff1899f2845a5896c63aa88fc0194207c09913131
CVE-2021-38575,0,0,8f2f90bc92b2bf3c4c841799bba54a8c3736d0b37f4ac4a760deb6816faa6094,2023-11-07T03:37:26.800000
CVE-2021-38576,0,0,e2acc9cbb201a50de7fc18820ebf077a228ae35ce48903750985139c100b0355,2022-01-13T16:21:04.917000
CVE-2021-38577,0,0,68cd9f1dfdb0af9c1d72000e7ed97be8976c654ffe6b66d1fc0ec79499a7c020,2023-11-07T03:37:26.887000
CVE-2021-38578,0,0,4bc846b0d0ca03b043e15ca4ffab778a513e9bbcc6321c641fe7cbb2d9c09321,2023-08-02T17:24:44.513000
CVE-2021-38578,0,1,c74e92b5a8108861f742db628d3e860caa800cf94f5ef15eddc52ca1ee57b15a,2024-08-06T01:15:43.310000
CVE-2021-3858,0,0,c38d50d1152d238a270cf6ae662ae607abc8d6912f962bdad80967213d6616fc,2021-10-20T22:14:22.760000
CVE-2021-38583,0,0,a34a782b66633aa359c34727afd72105e250dfc484d32668a3dad6394f591027,2021-08-24T19:26:27.663000
CVE-2021-38584,0,0,ca3408c233e3b9c95e88eaf23e5d7a18cb00abd12574f2e912a26f9d59d250e3,2021-08-20T20:54:46.470000
@ -246373,7 +246373,7 @@ CVE-2024-25730,0,0,647dfa388dba8a416fd85c97d0cddc9a279ee817ae5e9e35100ede4054026
CVE-2024-25731,0,0,b66ecf83a3f22031891274bd77adc2362c09b771f3c2acdf7176838dfa70771a,2024-03-05T13:41:01.900000
CVE-2024-25734,0,0,4ee66182e097f4f56b6291ef1e6f0e392b286ce02b5247ef63df668ee1fb65d5,2024-03-27T12:29:30.307000
CVE-2024-25735,0,0,cae8c4216f00e80716e1e084a475b76404f7651bae48a9a4981b0f5837518a33,2024-03-27T12:29:30.307000
CVE-2024-25736,0,1,e656e37839c1ec7c7b63871d566a91468e6f49c6416723c6764b550ab05e5670,2024-08-05T22:35:01.947000
CVE-2024-25736,0,0,e656e37839c1ec7c7b63871d566a91468e6f49c6416723c6764b550ab05e5670,2024-08-05T22:35:01.947000
CVE-2024-25737,0,0,2e40edda2bf8f11be62e123472d611b88082a8433647751d6e9fa8369863db2e,2024-05-24T01:15:30.977000
CVE-2024-25738,0,0,27fee36ee7c623ae584d6f5e106ac421c5c75b8036960cd8a9acca121dc6748c,2024-05-24T01:15:30.977000
CVE-2024-25739,0,0,976dd73cb281097b08298328a4164e038521b14231c5653569f9d2458078f4f3,2024-06-27T13:15:55.520000
@ -259013,4 +259013,16 @@ CVE-2024-7467,0,0,ff2c458642bb69ffa5fbf6fbc868f009297d258d4c3fe22bd758097265d86b
CVE-2024-7468,0,0,fa9676f39d5df445608ae8d98be96b9e424d2582d33ca6670930427021ae2044,2024-08-05T12:41:45.957000
CVE-2024-7469,0,0,181137a5ee9950ad3b0af4a4c1d1fdf0de9e4ea699901bb34a4118b3a0809c78,2024-08-05T12:41:45.957000
CVE-2024-7470,0,0,7dfa1a4d3f2f644c3f2ad32286f6934d1c7ebc8cd78feb45141695ceb7d93935,2024-08-05T12:41:45.957000
CVE-2024-7494,1,1,69828a39bd384c043a1258a3a8290456d6088cdacfd1a5cf119916f49d412e97,2024-08-05T23:15:41.653000
CVE-2024-7494,0,0,69828a39bd384c043a1258a3a8290456d6088cdacfd1a5cf119916f49d412e97,2024-08-05T23:15:41.653000
CVE-2024-7495,1,1,bef4547ad16af87cc45f713dfe373703ecab513c6902980b144678a8cc22a316,2024-08-06T01:15:43.583000
CVE-2024-7537,1,1,2754597430b3398e50bf24aaa7d39e994c224c64952debab317f017a960bcb01,2024-08-06T00:15:34.653000
CVE-2024-7538,1,1,de29220cb377045c0459deaf6b69adeedda6f13b07a14f613cf81f8acd6354c8,2024-08-06T00:15:34.860000
CVE-2024-7539,1,1,eb9af53992225ab47d134bb6cf4c86798ffb792c4ea15fadf5eeb8e0c362f9fd,2024-08-06T00:15:35.053000
CVE-2024-7540,1,1,d98da361665500ae474e922a220490537cfae556ffcf7f3e16646d6d8b7344a3,2024-08-06T00:15:35.270000
CVE-2024-7541,1,1,02d7ed5fe111724a0784171a4cbde660aae01df776ec3d6023466a106f966744,2024-08-06T00:15:35.470000
CVE-2024-7542,1,1,ed8eb28de3a530ce79002921c46ef673429c5bb5371c1f2c08ac28cc80c825e7,2024-08-06T00:15:35.663000
CVE-2024-7543,1,1,e4cca98fd41ff5091e41c22bc986f7b38061de1c770fbdd7e1257a5dc93cdf50,2024-08-06T00:15:35.857000
CVE-2024-7544,1,1,080b0de39e8c8f2e6af2eaa3b14006dc3040de641ae6c032803cbfcd66ecd27c,2024-08-06T00:15:36.050000
CVE-2024-7545,1,1,573a5b23c77789a8b3edf118a7d564b619d6c9f61267341b46eaf87deada162c,2024-08-06T00:15:36.247000
CVE-2024-7546,1,1,07ae86c51ff9b6287b4773e81c46673e6fef7a1f35d7346bf06ddaef956f485d,2024-08-06T00:15:36.450000
CVE-2024-7547,1,1,b727ccd37ef13a960fd8492a150c0deba10508cd85a9c0f2241c9f7ddc1a02e9,2024-08-06T00:15:36.637000

Can't render this file because it is too large.