Auto-Update: 2024-08-06T20:00:17.827830+00:00

This commit is contained in:
cad-safe-bot 2024-08-06 20:03:15 +00:00
parent 733c5f5b33
commit 79a6e024bc
35 changed files with 1113 additions and 395 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2012-0039",
"sourceIdentifier": "secalert@redhat.com",
"published": "2012-01-14T17:55:01.257",
"lastModified": "2024-05-17T00:51:18.527",
"lastModified": "2024-08-06T18:15:17.080",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2012-0394",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-01-08T15:55:01.467",
"lastModified": "2024-05-17T00:51:27.483",
"lastModified": "2024-08-06T19:15:29.580",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2012-0693",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-01-14T03:57:27.213",
"lastModified": "2024-05-17T00:51:36.327",
"lastModified": "2024-08-06T19:15:34.723",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2012-0782",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-01-30T17:55:00.843",
"lastModified": "2024-05-17T00:51:38.620",
"lastModified": "2024-08-06T19:15:35.827",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2012-0937",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-01-30T17:55:01.330",
"lastModified": "2024-05-17T00:51:43.043",
"lastModified": "2024-08-06T19:15:38.577",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-6276",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-08-09T18:15:07.120",
"lastModified": "2024-05-17T00:57:06.843",
"lastModified": "2024-08-06T18:15:33.283",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-6357",
"sourceIdentifier": "cve@mitre.org",
"published": "2013-11-13T15:55:04.190",
"lastModified": "2024-05-17T00:57:08.847",
"lastModified": "2024-08-06T18:15:34.490",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-6999",
"sourceIdentifier": "cve@mitre.org",
"published": "2013-12-07T01:55:02.920",
"lastModified": "2024-05-17T00:57:26.193",
"lastModified": "2024-08-06T18:15:43.730",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-7030",
"sourceIdentifier": "cve@mitre.org",
"published": "2013-12-12T17:55:03.783",
"lastModified": "2024-06-18T19:15:53.980",
"lastModified": "2024-08-06T18:15:44.737",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-2209",
"sourceIdentifier": "hp-security-alert@hp.com",
"published": "2024-03-27T00:15:07.817",
"lastModified": "2024-03-27T12:29:30.307",
"lastModified": "2024-08-06T19:35:03.380",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Un usuario con privilegios administrativos puede crear un archivo dll comprometido con el mismo nombre que el dll original dentro del paquete Firmware Update Utility (FUU) de la impresora HP y colocarlo en el directorio de descargas predeterminado de Microsoft Windows, lo que puede conducir a una posible ejecuci\u00f3n de c\u00f3digo arbitrario."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_10354903-10354932-16",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-24336",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-19T21:15:07.667",
"lastModified": "2024-03-20T13:00:16.367",
"lastModified": "2024-08-06T18:35:01.670",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A multiple Cross-site scripting (XSS) vulnerability in the '/members/moremember.pl', and \u2018/members/members-home.pl\u2019 endpoints within Koha Library Management System version 23.05.05 and earlier allows malicious staff users to carry out CSRF attacks, including unauthorized changes to usernames and passwords of users visiting the affected page, via the 'Circulation note' and \u2018Patrons Restriction\u2019 components."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://nitipoom-jar.github.io/CVE-2024-24336/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26331",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-30T19:15:23.200",
"lastModified": "2024-04-30T19:35:36.960",
"lastModified": "2024-08-06T19:35:02.510",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "ReCrystallize Server 5.10.0.0 utiliza un mecanismo de autorizaci\u00f3n que se basa en el valor de una cookie, pero no vincula el valor de la cookie a una ID de sesi\u00f3n. Los atacantes pueden modificar f\u00e1cilmente el valor de la cookie, dentro de un navegador o implementando c\u00f3digo del lado del cliente fuera de un navegador. Los atacantes pueden eludir el mecanismo de autenticaci\u00f3n modificando la cookie para que contenga un valor esperado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://sensepost.com/blog/2024/from-discovery-to-disclosure-recrystallize-server-vulnerabilities/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-2628",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-03-20T17:15:07.570",
"lastModified": "2024-08-01T13:49:49.370",
"lastModified": "2024-08-06T19:35:04.207",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -42,20 +42,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
"impactScore": 1.4
}
]
},

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-28739",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-06T19:15:56.287",
"lastModified": "2024-08-06T19:15:56.287",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Koha ILS 23.05 and before allows a remote attacker to execute arbitrary code via a crafted script to the format parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://febin0x4e4a.wordpress.com/2024/03/07/xss-to-one-click-rce-in-koha-ils/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-28740",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-06T19:15:56.380",
"lastModified": "2024-08-06T19:15:56.380",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in Koha ILS 23.05 and before allows a remote attacker to execute arbitrary code via the additonal-contents.pl component."
}
],
"metrics": {},
"references": [
{
"url": "https://febin0x4e4a.wordpress.com/2023/01/11/xss-vulnerability-in-koha-integrated-library-system/",
"source": "cve@mitre.org"
},
{
"url": "https://febin0x4e4a.wordpress.com/2024/03/07/xss-to-one-click-rce-in-koha-ils/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-3838",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-04-17T08:15:10.383",
"lastModified": "2024-07-03T02:06:38.383",
"lastModified": "2024-08-06T19:35:06.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -42,15 +42,15 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
@ -69,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-358"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-3844",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-04-17T08:15:10.620",
"lastModified": "2024-07-03T02:06:42.643",
"lastModified": "2024-08-06T19:35:07.433",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -22,23 +22,35 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-358"
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-40464",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-31T21:15:17.640",
"lastModified": "2024-08-01T12:42:36.933",
"lastModified": "2024-08-06T18:35:03.237",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": " Un problema en beego v.2.2.0 y anteriores permite a un atacante remoto escalar privilegios a trav\u00e9s de la funci\u00f3n sendMail ubicada en el archivo beego/core/logs/smtp.go"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-599"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/nyxfqq/b53b0148b9aa040de63f58a68fd11445",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41260",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-01T16:15:06.453",
"lastModified": "2024-08-01T16:45:25.400",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-06T19:35:08.443",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "Un vector de inicializaci\u00f3n est\u00e1tico (IV) en la funci\u00f3n de cifrado de netbird v0.28.4 permite a los atacantes obtener informaci\u00f3n confidencial."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-321"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/nyxfqq/92232108ac153e95d538bb17fc5ad636",

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-41677",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-06T18:15:56.883",
"lastModified": "2024-08-06T18:15:56.883",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Qwik is a performance focused javascript framework. A potential mutation XSS vulnerability exists in Qwik for versions up to but not including 1.6.0. Qwik improperly escapes HTML on server-side rendering. It converts strings according to the rules found in the `render-ssr.ts` file. It sometimes causes the situation that the final DOM tree rendered on browsers is different from what Qwik expects on server-side rendering. This may be leveraged to perform XSS attacks, and a type of the XSS is known as mXSS (mutation XSS). This has been resolved in qwik version 1.6.0 and @builder.io/qwik version 1.7.3. All users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/QwikDev/qwik/blob/v1.5.5/packages/qwik/src/core/render/ssr/render-ssr.ts#L1182-L1208",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/QwikDev/qwik/commit/7e742eb3a1001542d795776c0317d47df8b9d64e",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/QwikDev/qwik/security/advisories/GHSA-2rwj-7xq8-4gx4",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-42347",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-06T18:15:57.103",
"lastModified": "2024-08-06T18:15:57.103",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "matrix-react-sdk is a react-based SDK for inserting a Matrix chat/voip client into a web page. A malicious homeserver could manipulate a user's account data to cause the client to enable URL previews in end-to-end encrypted rooms, in which case any URLs in encrypted messages would be sent to the server. This was patched in matrix-react-sdk 3.105.0. Deployments that trust their homeservers, as well as closed federations of trusted servers, are not affected. Users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-359"
}
]
}
],
"references": [
{
"url": "https://github.com/matrix-org/matrix-react-sdk/releases/tag/v3.105.1",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/matrix-org/matrix-react-sdk/security/advisories/GHSA-f83w-wqhc-cfp4",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-42393",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2024-08-06T19:15:56.640",
"lastModified": "2024-08-06T19:15:56.640",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There are vulnerabilities in the Soft AP Daemon Service which could allow a threat actor to execute an unauthenticated RCE attack. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system leading to complete system compromise."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://csaf.arubanetworks.com/2024/hpe_aruba_networking_-_hpesbnw04678.txt",
"source": "security-alert@hpe.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-42394",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2024-08-06T19:15:56.830",
"lastModified": "2024-08-06T19:15:56.830",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There are vulnerabilities in the Soft AP Daemon Service which could allow a threat actor to execute an unauthenticated RCE attack. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system leading to complete system compromise."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://csaf.arubanetworks.com/2024/hpe_aruba_networking_-_hpesbnw04678.txt",
"source": "security-alert@hpe.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-42395",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2024-08-06T19:15:57.017",
"lastModified": "2024-08-06T19:15:57.017",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There is a vulnerability in the AP Certificate Management Service which could allow a threat actor to execute an unauthenticated RCE attack. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system leading to complete system compromise."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://csaf.arubanetworks.com/2024/hpe_aruba_networking_-_hpesbnw04678.txt",
"source": "security-alert@hpe.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-42396",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2024-08-06T19:15:57.200",
"lastModified": "2024-08-06T19:15:57.200",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the AP Certificate Management daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://csaf.arubanetworks.com/2024/hpe_aruba_networking_-_hpesbnw04678.txt",
"source": "security-alert@hpe.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-42397",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2024-08-06T19:15:57.373",
"lastModified": "2024-08-06T19:15:57.373",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the AP Certificate Management daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://csaf.arubanetworks.com/2024/hpe_aruba_networking_-_hpesbnw04678.txt",
"source": "security-alert@hpe.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-4699",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-14T15:44:26.620",
"lastModified": "2024-08-01T21:15:48.283",
"lastModified": "2024-08-06T19:15:57.580",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4936",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-14T05:15:49.400",
"lastModified": "2024-06-17T12:42:04.623",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-06T18:29:27.013",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,51 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:canto:canto:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.0.9",
"matchCriteriaId": "B03965EF-F526-4A0F-8D56-4D900168F989"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/canto/trunk/includes/lib/sizes.php#L15",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/95a68ae0-36da-499b-a09d-4c91db8aa338?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch",
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-6772",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-07-16T22:15:06.810",
"lastModified": "2024-08-01T14:00:38.260",
"lastModified": "2024-08-06T19:35:10.307",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-358"
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop.html",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-6773",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-07-16T22:15:06.893",
"lastModified": "2024-08-01T14:00:38.483",
"lastModified": "2024-08-06T19:35:11.320",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-358"
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop.html",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-6988",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-08-06T16:15:49.877",
"lastModified": "2024-08-06T16:30:24.547",
"lastModified": "2024-08-06T18:35:04.950",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -11,7 +11,30 @@
"value": "Use after free in Downloads in Google Chrome on iOS prior to 127.0.6533.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "chrome-cve-admin@google.com",
@ -22,6 +45,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-6998",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-08-06T16:15:50.427",
"lastModified": "2024-08-06T16:30:24.547",
"lastModified": "2024-08-06T18:35:05.953",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -11,7 +11,30 @@
"value": "Use after free in User Education in Google Chrome prior to 127.0.6533.72 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "chrome-cve-admin@google.com",
@ -22,6 +45,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-7003",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-08-06T16:15:50.703",
"lastModified": "2024-08-06T16:35:20.180",
"lastModified": "2024-08-06T19:35:12.383",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -18,23 +18,35 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-358"
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop_23.html",

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-08-06T18:00:17.981543+00:00
2024-08-06T20:00:17.827830+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-08-06T17:47:12.660000+00:00
2024-08-06T19:35:12.383000+00:00
```
### Last Data Feed Release
@ -33,69 +33,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
259163
259172
```
### CVEs added in the last Commit
Recently added CVEs: `35`
Recently added CVEs: `9`
- [CVE-2024-39229](CVE-2024/CVE-2024-392xx/CVE-2024-39229.json) (`2024-08-06T17:15:54.027`)
- [CVE-2024-39751](CVE-2024/CVE-2024-397xx/CVE-2024-39751.json) (`2024-08-06T16:15:48.930`)
- [CVE-2024-41333](CVE-2024/CVE-2024-413xx/CVE-2024-41333.json) (`2024-08-06T16:15:49.180`)
- [CVE-2024-41616](CVE-2024/CVE-2024-416xx/CVE-2024-41616.json) (`2024-08-06T16:15:49.260`)
- [CVE-2024-42358](CVE-2024/CVE-2024-423xx/CVE-2024-42358.json) (`2024-08-06T17:15:54.103`)
- [CVE-2024-43111](CVE-2024/CVE-2024-431xx/CVE-2024-43111.json) (`2024-08-06T16:15:49.370`)
- [CVE-2024-43112](CVE-2024/CVE-2024-431xx/CVE-2024-43112.json) (`2024-08-06T16:15:49.437`)
- [CVE-2024-43113](CVE-2024/CVE-2024-431xx/CVE-2024-43113.json) (`2024-08-06T16:15:49.493`)
- [CVE-2024-6720](CVE-2024/CVE-2024-67xx/CVE-2024-6720.json) (`2024-08-06T16:15:49.817`)
- [CVE-2024-6988](CVE-2024/CVE-2024-69xx/CVE-2024-6988.json) (`2024-08-06T16:15:49.877`)
- [CVE-2024-6989](CVE-2024/CVE-2024-69xx/CVE-2024-6989.json) (`2024-08-06T16:15:49.957`)
- [CVE-2024-6991](CVE-2024/CVE-2024-69xx/CVE-2024-6991.json) (`2024-08-06T16:15:50.037`)
- [CVE-2024-6994](CVE-2024/CVE-2024-69xx/CVE-2024-6994.json) (`2024-08-06T16:15:50.113`)
- [CVE-2024-6995](CVE-2024/CVE-2024-69xx/CVE-2024-6995.json) (`2024-08-06T16:15:50.197`)
- [CVE-2024-6996](CVE-2024/CVE-2024-69xx/CVE-2024-6996.json) (`2024-08-06T16:15:50.250`)
- [CVE-2024-6997](CVE-2024/CVE-2024-69xx/CVE-2024-6997.json) (`2024-08-06T16:15:50.330`)
- [CVE-2024-6998](CVE-2024/CVE-2024-69xx/CVE-2024-6998.json) (`2024-08-06T16:15:50.427`)
- [CVE-2024-6999](CVE-2024/CVE-2024-69xx/CVE-2024-6999.json) (`2024-08-06T16:15:50.510`)
- [CVE-2024-7000](CVE-2024/CVE-2024-70xx/CVE-2024-7000.json) (`2024-08-06T16:15:50.567`)
- [CVE-2024-7001](CVE-2024/CVE-2024-70xx/CVE-2024-7001.json) (`2024-08-06T16:15:50.643`)
- [CVE-2024-7003](CVE-2024/CVE-2024-70xx/CVE-2024-7003.json) (`2024-08-06T16:15:50.703`)
- [CVE-2024-7004](CVE-2024/CVE-2024-70xx/CVE-2024-7004.json) (`2024-08-06T16:15:50.760`)
- [CVE-2024-7005](CVE-2024/CVE-2024-70xx/CVE-2024-7005.json) (`2024-08-06T16:15:50.837`)
- [CVE-2024-7502](CVE-2024/CVE-2024-75xx/CVE-2024-7502.json) (`2024-08-06T17:15:54.353`)
- [CVE-2024-7564](CVE-2024/CVE-2024-75xx/CVE-2024-7564.json) (`2024-08-06T16:15:51.000`)
- [CVE-2024-28739](CVE-2024/CVE-2024-287xx/CVE-2024-28739.json) (`2024-08-06T19:15:56.287`)
- [CVE-2024-28740](CVE-2024/CVE-2024-287xx/CVE-2024-28740.json) (`2024-08-06T19:15:56.380`)
- [CVE-2024-41677](CVE-2024/CVE-2024-416xx/CVE-2024-41677.json) (`2024-08-06T18:15:56.883`)
- [CVE-2024-42347](CVE-2024/CVE-2024-423xx/CVE-2024-42347.json) (`2024-08-06T18:15:57.103`)
- [CVE-2024-42393](CVE-2024/CVE-2024-423xx/CVE-2024-42393.json) (`2024-08-06T19:15:56.640`)
- [CVE-2024-42394](CVE-2024/CVE-2024-423xx/CVE-2024-42394.json) (`2024-08-06T19:15:56.830`)
- [CVE-2024-42395](CVE-2024/CVE-2024-423xx/CVE-2024-42395.json) (`2024-08-06T19:15:57.017`)
- [CVE-2024-42396](CVE-2024/CVE-2024-423xx/CVE-2024-42396.json) (`2024-08-06T19:15:57.200`)
- [CVE-2024-42397](CVE-2024/CVE-2024-423xx/CVE-2024-42397.json) (`2024-08-06T19:15:57.373`)
### CVEs modified in the last Commit
Recently modified CVEs: `224`
Recently modified CVEs: `24`
- [CVE-2024-7520](CVE-2024/CVE-2024-75xx/CVE-2024-7520.json) (`2024-08-06T16:35:20.863`)
- [CVE-2024-7521](CVE-2024/CVE-2024-75xx/CVE-2024-7521.json) (`2024-08-06T16:30:24.547`)
- [CVE-2024-7522](CVE-2024/CVE-2024-75xx/CVE-2024-7522.json) (`2024-08-06T16:30:24.547`)
- [CVE-2024-7523](CVE-2024/CVE-2024-75xx/CVE-2024-7523.json) (`2024-08-06T16:30:24.547`)
- [CVE-2024-7524](CVE-2024/CVE-2024-75xx/CVE-2024-7524.json) (`2024-08-06T16:30:24.547`)
- [CVE-2024-7525](CVE-2024/CVE-2024-75xx/CVE-2024-7525.json) (`2024-08-06T16:30:24.547`)
- [CVE-2024-7526](CVE-2024/CVE-2024-75xx/CVE-2024-7526.json) (`2024-08-06T16:30:24.547`)
- [CVE-2024-7527](CVE-2024/CVE-2024-75xx/CVE-2024-7527.json) (`2024-08-06T16:35:21.090`)
- [CVE-2024-7528](CVE-2024/CVE-2024-75xx/CVE-2024-7528.json) (`2024-08-06T16:30:24.547`)
- [CVE-2024-7529](CVE-2024/CVE-2024-75xx/CVE-2024-7529.json) (`2024-08-06T16:30:24.547`)
- [CVE-2024-7530](CVE-2024/CVE-2024-75xx/CVE-2024-7530.json) (`2024-08-06T16:30:24.547`)
- [CVE-2024-7531](CVE-2024/CVE-2024-75xx/CVE-2024-7531.json) (`2024-08-06T16:30:24.547`)
- [CVE-2024-7537](CVE-2024/CVE-2024-75xx/CVE-2024-7537.json) (`2024-08-06T16:30:24.547`)
- [CVE-2024-7538](CVE-2024/CVE-2024-75xx/CVE-2024-7538.json) (`2024-08-06T16:30:24.547`)
- [CVE-2024-7539](CVE-2024/CVE-2024-75xx/CVE-2024-7539.json) (`2024-08-06T16:30:24.547`)
- [CVE-2024-7540](CVE-2024/CVE-2024-75xx/CVE-2024-7540.json) (`2024-08-06T16:30:24.547`)
- [CVE-2024-7541](CVE-2024/CVE-2024-75xx/CVE-2024-7541.json) (`2024-08-06T16:30:24.547`)
- [CVE-2024-7542](CVE-2024/CVE-2024-75xx/CVE-2024-7542.json) (`2024-08-06T16:30:24.547`)
- [CVE-2024-7543](CVE-2024/CVE-2024-75xx/CVE-2024-7543.json) (`2024-08-06T16:30:24.547`)
- [CVE-2024-7544](CVE-2024/CVE-2024-75xx/CVE-2024-7544.json) (`2024-08-06T16:30:24.547`)
- [CVE-2024-7545](CVE-2024/CVE-2024-75xx/CVE-2024-7545.json) (`2024-08-06T16:30:24.547`)
- [CVE-2024-7546](CVE-2024/CVE-2024-75xx/CVE-2024-7546.json) (`2024-08-06T16:30:24.547`)
- [CVE-2024-7547](CVE-2024/CVE-2024-75xx/CVE-2024-7547.json) (`2024-08-06T16:30:24.547`)
- [CVE-2024-7551](CVE-2024/CVE-2024-75xx/CVE-2024-7551.json) (`2024-08-06T16:30:24.547`)
- [CVE-2024-7552](CVE-2024/CVE-2024-75xx/CVE-2024-7552.json) (`2024-08-06T16:30:24.547`)
- [CVE-2012-0039](CVE-2012/CVE-2012-00xx/CVE-2012-0039.json) (`2024-08-06T18:15:17.080`)
- [CVE-2012-0394](CVE-2012/CVE-2012-03xx/CVE-2012-0394.json) (`2024-08-06T19:15:29.580`)
- [CVE-2012-0693](CVE-2012/CVE-2012-06xx/CVE-2012-0693.json) (`2024-08-06T19:15:34.723`)
- [CVE-2012-0782](CVE-2012/CVE-2012-07xx/CVE-2012-0782.json) (`2024-08-06T19:15:35.827`)
- [CVE-2012-0937](CVE-2012/CVE-2012-09xx/CVE-2012-0937.json) (`2024-08-06T19:15:38.577`)
- [CVE-2013-6276](CVE-2013/CVE-2013-62xx/CVE-2013-6276.json) (`2024-08-06T18:15:33.283`)
- [CVE-2013-6357](CVE-2013/CVE-2013-63xx/CVE-2013-6357.json) (`2024-08-06T18:15:34.490`)
- [CVE-2013-6999](CVE-2013/CVE-2013-69xx/CVE-2013-6999.json) (`2024-08-06T18:15:43.730`)
- [CVE-2013-7030](CVE-2013/CVE-2013-70xx/CVE-2013-7030.json) (`2024-08-06T18:15:44.737`)
- [CVE-2024-2209](CVE-2024/CVE-2024-22xx/CVE-2024-2209.json) (`2024-08-06T19:35:03.380`)
- [CVE-2024-24336](CVE-2024/CVE-2024-243xx/CVE-2024-24336.json) (`2024-08-06T18:35:01.670`)
- [CVE-2024-2628](CVE-2024/CVE-2024-26xx/CVE-2024-2628.json) (`2024-08-06T19:35:04.207`)
- [CVE-2024-26331](CVE-2024/CVE-2024-263xx/CVE-2024-26331.json) (`2024-08-06T19:35:02.510`)
- [CVE-2024-3838](CVE-2024/CVE-2024-38xx/CVE-2024-3838.json) (`2024-08-06T19:35:06.410`)
- [CVE-2024-3844](CVE-2024/CVE-2024-38xx/CVE-2024-3844.json) (`2024-08-06T19:35:07.433`)
- [CVE-2024-40464](CVE-2024/CVE-2024-404xx/CVE-2024-40464.json) (`2024-08-06T18:35:03.237`)
- [CVE-2024-41260](CVE-2024/CVE-2024-412xx/CVE-2024-41260.json) (`2024-08-06T19:35:08.443`)
- [CVE-2024-4699](CVE-2024/CVE-2024-46xx/CVE-2024-4699.json) (`2024-08-06T19:15:57.580`)
- [CVE-2024-4936](CVE-2024/CVE-2024-49xx/CVE-2024-4936.json) (`2024-08-06T18:29:27.013`)
- [CVE-2024-6772](CVE-2024/CVE-2024-67xx/CVE-2024-6772.json) (`2024-08-06T19:35:10.307`)
- [CVE-2024-6773](CVE-2024/CVE-2024-67xx/CVE-2024-6773.json) (`2024-08-06T19:35:11.320`)
- [CVE-2024-6988](CVE-2024/CVE-2024-69xx/CVE-2024-6988.json) (`2024-08-06T18:35:04.950`)
- [CVE-2024-6998](CVE-2024/CVE-2024-69xx/CVE-2024-6998.json) (`2024-08-06T18:35:05.953`)
- [CVE-2024-7003](CVE-2024/CVE-2024-70xx/CVE-2024-7003.json) (`2024-08-06T19:35:12.383`)
## Download and Usage

File diff suppressed because it is too large Load Diff