Auto-Update: 2024-08-20T14:00:18.707768+00:00

This commit is contained in:
cad-safe-bot 2024-08-20 14:03:14 +00:00
parent 47ef3da4fa
commit 7c5fee732e
57 changed files with 2213 additions and 95 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48742",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-06-20T12:15:12.517",
"lastModified": "2024-06-20T12:43:25.663",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-20T13:44:57.483",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,167 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: rtnetlink: aseg\u00farese de actualizar master_dev/m_ops en __rtnl_newlink() Mientras observaba un error de syzbot no relacionado, encontr\u00e9 la l\u00f3gica de reproducci\u00f3n en __rtnl_newlink() para activar potencialmente el use-after-free. Es mejor borrar master_dev y m_ops dentro del bucle, en caso de que tengamos que reproducirlo."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.14",
"versionEndExcluding": "4.9.300",
"matchCriteriaId": "992A8983-3020-4403-A534-93A4971559F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10",
"versionEndExcluding": "4.14.265",
"matchCriteriaId": "4F849B5B-93E9-438A-AE05-0380EC168436"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.228",
"matchCriteriaId": "87288F16-8DE4-4680-95D9-8601B47620D7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.177",
"matchCriteriaId": "B42832A3-1D9B-4BE0-8D4C-3AF681B52D98"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.97",
"matchCriteriaId": "FB2BE440-BF07-4C49-9A0C-A63E4FA103A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.20",
"matchCriteriaId": "C68FC5B4-CC13-45E9-8050-EF9025F7A9B7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.16.6",
"matchCriteriaId": "6739D89E-32C3-479D-B5F6-6865C5061FA5"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/2cf180360d66bd657e606c1217e0e668e6faa303",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/36a9a0aee881940476b254e0352581401b23f210",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3bbe2019dd12b8d13671ee6cda055d49637b4c39",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7d9211678c0f0624f74cdff36117ab8316697bb8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a01e60a1ec6bef9be471fb7182a33c6d6f124e93",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/bd43771ee9759dd9dfae946bff190e2c5a120de5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c6f6f2444bdbe0079e41914a35081530d0409963",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/def5e7070079b2a214b3b1a2fbec623e6fbfe34a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48743",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-06-20T12:15:12.610",
"lastModified": "2024-06-20T12:43:25.663",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-20T13:54:00.933",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,167 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: amd-xgbe: corrige el desbordamiento de longitud de datos de skb. Se activar\u00e1 BUG_ON() en include/linux/skbuff.h, lo que provocar\u00e1 un p\u00e1nico intermitente en el kernel, cuando el desbordamiento de longitud de skb sea detectado. Solucione este problema descartando el paquete si se observan desbordamientos de longitud debido a inconsistencias en los descriptores de hardware."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.9.19",
"versionEndExcluding": "4.9.300",
"matchCriteriaId": "43BD120E-4853-49BE-A7FC-3345A55D0070"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.11",
"versionEndExcluding": "4.14.265",
"matchCriteriaId": "E303FBB2-9F13-4FBE-874A-B48C6A56A829"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.228",
"matchCriteriaId": "87288F16-8DE4-4680-95D9-8601B47620D7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.177",
"matchCriteriaId": "B42832A3-1D9B-4BE0-8D4C-3AF681B52D98"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.97",
"matchCriteriaId": "FB2BE440-BF07-4C49-9A0C-A63E4FA103A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.20",
"matchCriteriaId": "C68FC5B4-CC13-45E9-8050-EF9025F7A9B7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.16.6",
"matchCriteriaId": "6739D89E-32C3-479D-B5F6-6865C5061FA5"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/34aeb4da20f93ac80a6291a2dbe7b9c6460e9b26",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4d3fcfe8464838b3920bc2b939d888e0b792934e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5aac9108a180fc06e28d4e7fb00247ce603b72ee",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/617f9934bb37993b9813832516f318ba874bcb7d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9892742f035f7aa7dcd2bb0750effa486db89576",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9924c80bd484340191e586110ca22bff23a49f2e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/db6fd92316a254be2097556f01bccecf560e53ce",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e8f73f620fee5f52653ed2da360121e4446575c5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0171",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-06-25T16:15:24.197",
"lastModified": "2024-06-25T18:50:42.040",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-20T13:25:30.237",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.1,
"impactScore": 3.7
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
@ -51,10 +71,183 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:poweredge_r6615_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.8.3",
"matchCriteriaId": "8E330219-A0B2-4C66-B4BE-07CB5D21B819"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:poweredge_r6615:-:*:*:*:*:*:*:*",
"matchCriteriaId": "73077527-E12D-495C-AB91-C35109AE4C43"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:poweredge_r7615_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.8.3",
"matchCriteriaId": "304F6677-C563-402A-B0F1-2BBBBAF2E183"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:poweredge_r7615:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A74500E4-ADD2-4134-8D60-F4285C158F93"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:poweredge_r6625_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.8.3",
"matchCriteriaId": "40AB1808-81AA-460E-B6E7-FD54BB5735ED"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:poweredge_r6625:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09981777-C86C-4BC6-8834-97E8A2551897"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:poweredge_r7625_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.8.3",
"matchCriteriaId": "C7FE22FE-2AB9-4879-B0F5-F20E684ED024"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:poweredge_r7625:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F074158-252A-4C51-B80C-1B94E22A364A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:poweredge_c6615_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.3.3",
"matchCriteriaId": "AFAABA0C-5DD7-4928-9A91-A560366F3054"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:poweredge_c6615:-:*:*:*:*:*:*:*",
"matchCriteriaId": "788C678A-92CF-45BD-99D5-AF18394C9860"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:xc_core_xc7625_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.8.3",
"matchCriteriaId": "EE5A04A2-5525-4286-BB76-9FCA7BB1F58A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:xc_core_xc7625:-:*:*:*:*:*:*:*",
"matchCriteriaId": "575F1C0C-37A7-45CF-86B1-7F56E14D211C"
}
]
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000226253/dsa-2024-039-security-update-for-dell-amd-based-poweredge-server-vulnerability",
"source": "security_alert@emc.com"
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23897",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2024-01-24T18:15:09.370",
"lastModified": "2024-08-20T01:00:01.757",
"vulnStatus": "Modified",
"lastModified": "2024-08-20T13:34:22.773",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2024-08-19",
"cisaActionDue": "2024-09-09",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
"value": "CWE-22"
}
]
},
@ -143,7 +143,11 @@
},
{
"url": "https://www.sonarsource.com/blog/excessive-expansion-uncovering-critical-security-vulnerabilities-in-jenkins/",
"source": "jenkinsci-cert@googlegroups.com"
"source": "jenkinsci-cert@googlegroups.com",
"tags": [
"Exploit",
"Press/Media Coverage"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-25009",
"sourceIdentifier": "85b1779b-6ecd-4f52-bcc5-73eac4659dcf",
"published": "2024-08-20T12:15:04.667",
"lastModified": "2024-08-20T12:15:04.667",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Ericsson Packet Core Controller (PCC) contains a vulnerability in Access and Mobility Management Function (AMF) where improper input validation can lead to denial of service which may result in service degradation."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "85b1779b-6ecd-4f52-bcc5-73eac4659dcf",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "85b1779b-6ecd-4f52-bcc5-73eac4659dcf",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://www.ericsson.com/en/about-us/security/psirt/security-bulletin-ericsson-packet-core-controller-pcc-august-2024",
"source": "85b1779b-6ecd-4f52-bcc5-73eac4659dcf"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-41697",
"sourceIdentifier": "cna@cyber.gov.il",
"published": "2024-08-20T12:15:05.313",
"lastModified": "2024-08-20T12:15:05.313",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Priority -\u00a0CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@cyber.gov.il",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "cna@cyber.gov.il",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-80"
}
]
}
],
"references": [
{
"url": "https://www.gov.il/en/Departments/faq/cve_advisories",
"source": "cna@cyber.gov.il"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-41698",
"sourceIdentifier": "cna@cyber.gov.il",
"published": "2024-08-20T12:15:06.007",
"lastModified": "2024-08-20T12:15:06.007",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Priority \u2013 CWE-200: Exposure of Sensitive Information to an Unauthorized Actor"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@cyber.gov.il",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cna@cyber.gov.il",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://www.gov.il/en/Departments/faq/cve_advisories",
"source": "cna@cyber.gov.il"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-41699",
"sourceIdentifier": "cna@cyber.gov.il",
"published": "2024-08-20T12:15:06.650",
"lastModified": "2024-08-20T12:15:06.650",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Priority \u2013 CWE-552: Files or Directories Accessible to External Parties"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@cyber.gov.il",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.7,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "cna@cyber.gov.il",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-552"
}
]
}
],
"references": [
{
"url": "https://www.gov.il/en/Departments/faq/cve_advisories",
"source": "cna@cyber.gov.il"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-41700",
"sourceIdentifier": "cna@cyber.gov.il",
"published": "2024-08-20T12:15:07.143",
"lastModified": "2024-08-20T12:15:07.143",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Barix \u2013 CWE-200 Exposure of Sensitive Information to an Unauthorized Actor"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@cyber.gov.il",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "cna@cyber.gov.il",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://www.gov.il/en/Departments/faq/cve_advisories",
"source": "cna@cyber.gov.il"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-42334",
"sourceIdentifier": "cna@cyber.gov.il",
"published": "2024-08-20T13:15:04.930",
"lastModified": "2024-08-20T13:15:04.930",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Hargal - CWE-284: Improper Access Control"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@cyber.gov.il",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "cna@cyber.gov.il",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://www.gov.il/en/Departments/faq/cve_advisories",
"source": "cna@cyber.gov.il"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-42335",
"sourceIdentifier": "cna@cyber.gov.il",
"published": "2024-08-20T13:15:05.317",
"lastModified": "2024-08-20T13:15:05.317",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "7Twenty - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@cyber.gov.il",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "cna@cyber.gov.il",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.gov.il/en/Departments/faq/cve_advisories",
"source": "cna@cyber.gov.il"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-42336",
"sourceIdentifier": "cna@cyber.gov.il",
"published": "2024-08-20T13:15:05.617",
"lastModified": "2024-08-20T13:15:05.617",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Servision - CWE-287: Improper Authentication"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@cyber.gov.il",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "cna@cyber.gov.il",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://www.gov.il/en/Departments/faq/cve_advisories",
"source": "cna@cyber.gov.il"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42552",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T13:15:05.933",
"lastModified": "2024-08-20T13:15:05.933",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Hotel Management System commit 91caab8 was discovered to contain a SQL injection vulnerability via the book_id parameter at admin_room_history.php."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/topsky979/2386856df3f3ffa7bdc4738e24da4af3",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42553",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T13:15:06.073",
"lastModified": "2024-08-20T13:15:06.073",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Cross-Site Request Forgery (CSRF) in the component admin_room_added.php of Hotel Management System commit 91caab8 allows attackers to escalate privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/topsky979/4b22a22c73b16c7c22c06d4b3f033fdc",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42554",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T13:15:06.190",
"lastModified": "2024-08-20T13:15:06.190",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Hotel Management System commit 91caab8 was discovered to contain a SQL injection vulnerability via the room_type parameter at admin_room_added.php."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/topsky979/7d2ebfe6dfa87eecf8f3e6d4eefc48ba",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42555",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T13:15:06.303",
"lastModified": "2024-08-20T13:15:06.303",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Cross-Site Request Forgery (CSRF) in the component admin_room_removed.php of Hotel Management System commit 91caab8 allows attackers to escalate privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/topsky979/afd445b90e13a27a6422cea2f5ff0f64",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42556",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T13:15:06.420",
"lastModified": "2024-08-20T13:15:06.420",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Hotel Management System commit 91caab8 was discovered to contain a SQL injection vulnerability via the room_type parameter at admin_room_removed.php."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/topsky979/9688bcdd3e05ba79ebf4ff1042609b20",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42557",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T13:15:06.523",
"lastModified": "2024-08-20T13:15:06.523",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Cross-Site Request Forgery (CSRF) in the component admin_modify_room.php of Hotel Management System commit 91caab8 allows attackers to escalate privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/topsky979/0785597ae7abc8f10cd5c5537f5467b5",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42558",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T13:15:06.623",
"lastModified": "2024-08-20T13:15:06.623",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Hotel Management System commit 91caab8 was discovered to contain a SQL injection vulnerability via the book_id parameter at admin_modify_room.php."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/topsky979/9651b4977e86f5b1bcae7a8959ff3342",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42559",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T13:15:06.730",
"lastModified": "2024-08-20T13:15:06.730",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in the login component (process_login.php) of Hotel Management System commit 79d688 allows attackers to authenticate without providing a valid password."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/topsky979/99d2ebf7b5598ef227262ba1b2bb392f/edit",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42560",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T13:15:06.830",
"lastModified": "2024-08-20T13:15:06.830",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A cross-site scripting (XSS) vulnerability in the component update_page_details.php of Blood Bank And Donation Management System commit dc9e039 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Page Details parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/topsky979/4c05ee72ab4b365ef81c199aaa0558d0",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42561",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T13:15:06.920",
"lastModified": "2024-08-20T13:15:06.920",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Pharmacy Management System commit a2efc8 was discovered to contain a SQL injection vulnerability via the invoice_number parameter at sales_report.php."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/topsky979/5d2d9104dc4dd7f5dda99cbbd615a0b8",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42562",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T13:15:07.020",
"lastModified": "2024-08-20T13:15:07.020",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Pharmacy Management System commit a2efc8 was discovered to contain a SQL injection vulnerability via the invoice_number parameter at preview.php."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/topsky979/2dcca275bcc18e8058cefef714a2f61b",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42563",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T13:15:07.123",
"lastModified": "2024-08-20T13:15:07.123",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability in ERP commit 44bd04 allows attackers to execute arbitrary code via uploading a crafted HTML file."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/topsky979/f645f99661ff33aed44d65dfa49e36fe",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42564",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T13:15:07.243",
"lastModified": "2024-08-20T13:15:07.243",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ERP commit 44bd04 was discovered to contain a SQL injection vulnerability via the id parameter at /index.php/basedata/inventory/delete?action=delete."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/topsky979/8ccda41cac32fe781b89c6c0db245ab7",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42565",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T13:15:07.347",
"lastModified": "2024-08-20T13:15:07.347",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ERP commit 44bd04 was discovered to contain a SQL injection vulnerability via the id parameter at /index.php/basedata/contact/delete?action=delete."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/topsky979/648f2cd4f5e58560cbc9308d06e2f876",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42566",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T13:15:07.443",
"lastModified": "2024-08-20T13:15:07.443",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the password parameter at login.php"
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/topsky979/95a8f0d24f1d409a14df4c04e0a8c547",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42567",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T13:15:07.540",
"lastModified": "2024-08-20T13:15:07.540",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the sid parameter at /search.php?action=2."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/topsky979/96ba3f6ccd333480aa86e7078c4886d7",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42568",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T13:15:07.643",
"lastModified": "2024-08-20T13:15:07.643",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the transport parameter at vehicle.php."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/topsky979/38a30275374ef796ab860795f5df4dac",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42569",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T13:15:07.733",
"lastModified": "2024-08-20T13:15:07.733",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the medium parameter at paidclass.php."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/topsky979/20a81dbf47d371e1dabe08f350c8185d",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42570",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T13:15:07.830",
"lastModified": "2024-08-20T13:15:07.830",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the medium parameter at admininsert.php."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/topsky979/1d9ebca101fc5e30040436d70e522102",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42571",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T13:15:07.917",
"lastModified": "2024-08-20T13:15:07.917",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the medium parameter at insertattendance.php."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/topsky979/5c8e289fa66702fd3acbed558ee449dd",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42572",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T13:15:08.007",
"lastModified": "2024-08-20T13:15:08.007",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the medium parameter at unitmarks.php."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/topsky979/c4c9508b8b3ed11f098f716d46572295",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42573",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T13:15:08.097",
"lastModified": "2024-08-20T13:15:08.097",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the medium parameter at dtmarks.php."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/topsky979/d44aabca29c1a6a9845fde465b924e79",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42574",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T13:15:08.193",
"lastModified": "2024-08-20T13:15:08.193",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the medium parameter at attendance.php."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/topsky979/7064f8bbd3977ee665a098efcd0170c0",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42575",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T13:15:08.283",
"lastModified": "2024-08-20T13:15:08.283",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the medium parameter at substaff.php."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/topsky979/2fddc00b33b038cd778c1e4fb1936a15",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42576",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T13:15:08.377",
"lastModified": "2024-08-20T13:15:08.377",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Cross-Site Request Forgery (CSRF) in the component edit_categorie.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/topsky979/50a1d8ad7effd9ccd089952602c831d3",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42577",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T13:15:08.477",
"lastModified": "2024-08-20T13:15:08.477",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Cross-Site Request Forgery (CSRF) in the component add_product.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/topsky979/20ad7b251f2905db38e7a6566b1d46cc",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42578",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T13:15:08.573",
"lastModified": "2024-08-20T13:15:08.573",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Cross-Site Request Forgery (CSRF) in the component edit_product.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/topsky979/5eacc7e418e3b73b7ad1fa05d1a72aeb",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42579",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T13:15:08.687",
"lastModified": "2024-08-20T13:15:08.687",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Cross-Site Request Forgery (CSRF) in the component add_group.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/topsky979/ed59fb8b35a220dfa064a3a3cb1ecb1b",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42580",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T13:15:08.793",
"lastModified": "2024-08-20T13:15:08.793",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Cross-Site Request Forgery (CSRF) in the component edit_group.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/topsky979/8a05309486637d8c6ce8c6624ec1e897",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42581",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T13:15:08.890",
"lastModified": "2024-08-20T13:15:08.890",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Cross-Site Request Forgery (CSRF) in the component delete_group.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/topsky979/2bd26343ccdff7c759f62d332c8caff6",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42582",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T13:15:08.987",
"lastModified": "2024-08-20T13:15:08.987",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Cross-Site Request Forgery (CSRF) in the component delete_categorie.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/topsky979/c0d78b257ce1e661be30de1ce9551d27",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42583",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T13:15:09.077",
"lastModified": "2024-08-20T13:15:09.077",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Cross-Site Request Forgery (CSRF) in the component delete_user.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/topsky979/dac0206b8de14763bdbe2b6bb7020cdc",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42584",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T13:15:09.173",
"lastModified": "2024-08-20T13:15:09.173",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Cross-Site Request Forgery (CSRF) in the component delete_product.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/topsky979/6037eaac5749430c29cf15fdd9df0ba5",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42585",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T13:15:09.273",
"lastModified": "2024-08-20T13:15:09.273",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Cross-Site Request Forgery (CSRF) in the component delete_media.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/topsky979/33de7a4bd7a4517a26fa4e4911b7fb1d",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42586",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T13:15:09.367",
"lastModified": "2024-08-20T13:15:09.367",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Cross-Site Request Forgery (CSRF) in the component categorie.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/topsky979/533b962efb1779e397a241bf7a19643c",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5805",
"sourceIdentifier": "security@progress.com",
"published": "2024-06-25T15:15:15.603",
"lastModified": "2024-06-25T18:50:42.040",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-20T13:37:58.923",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
},
{
"source": "security@progress.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
},
{
"source": "security@progress.com",
"type": "Secondary",
@ -51,14 +81,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:moveit_gateway:2024.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2E1B8970-B2A2-413B-AE80-2372A147230F"
}
]
}
]
}
],
"references": [
{
"url": "https://community.progress.com/s/article/MOVEit-Gateway-Critical-Security-Alert-Bulletin-June-2024-CVE-2024-5805",
"source": "security@progress.com"
"source": "security@progress.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.progress.com/moveit",
"source": "security@progress.com"
"source": "security@progress.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6371",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-27T13:16:01.923",
"lastModified": "2024-06-27T18:15:21.690",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-20T13:21:59.600",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:janobe:pool_of_bethesda_online_reservation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9DE894B7-EE1B-4ABB-8881-CF3BA3911206"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/L1OudFd8cl09/CVE/blob/main/25_06_2024_b.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.269804",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.269804",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.364101",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6372",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-27T13:16:02.440",
"lastModified": "2024-06-27T17:11:52.390",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-20T13:31:40.793",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Galaxy-lrc/cve/issues/1",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.269805",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.269805",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.364752",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6373",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-27T13:16:02.893",
"lastModified": "2024-06-27T18:15:22.280",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-20T13:32:44.213",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kevinwong:online_food_ordering_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9E6AA4AA-216E-471B-9107-65E50C880042"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Abyssun/abyssun-/issues/1",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.269806",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.269806",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.364646",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-6918",
"sourceIdentifier": "cybersecurity@se.com",
"published": "2024-08-20T13:15:09.450",
"lastModified": "2024-08-20T13:15:09.450",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability\nexists that could cause a crash of the Accutech Manager when receiving a specially crafted\nrequest over port 2536/TCP."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cybersecurity@se.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "cybersecurity@se.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-226-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-226-01.pdf",
"source": "cybersecurity@se.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7683",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-12T13:38:56.333",
"lastModified": "2024-08-12T13:41:36.517",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-20T13:52:50.987",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,51 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mayurik:advocate_office_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D969EB85-DD8C-48DD-9D1F-58755EB5343A"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/samwbs/kortexcve/blob/main/xss_addcase_stage/xss_addcase_stage.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.274140",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.274140",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.389162",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7684",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-12T13:38:56.783",
"lastModified": "2024-08-12T13:41:36.517",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-20T13:53:24.447",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,51 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mayurik:advocate_office_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D969EB85-DD8C-48DD-9D1F-58755EB5343A"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/samwbs/kortexcve/blob/main/xss_add_act/XSS_add_act.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.274141",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.274141",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.389163",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7685",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-12T13:38:57.293",
"lastModified": "2024-08-12T13:41:36.517",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-20T13:53:51.947",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,51 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mayurik:advocate_office_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D969EB85-DD8C-48DD-9D1F-58755EB5343A"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/samwbs/kortexcve/blob/main/xss_adds/XSS_adds.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.274142",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.274142",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.389164",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-08-20T12:00:17.875105+00:00
2024-08-20T14:00:18.707768+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-08-20T11:54:57.010000+00:00
2024-08-20T13:54:00.933000+00:00
```
### Last Data Feed Release
@ -33,24 +33,55 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
260568
260612
```
### CVEs added in the last Commit
Recently added CVEs: `3`
Recently added CVEs: `44`
- [CVE-2024-21689](CVE-2024/CVE-2024-216xx/CVE-2024-21689.json) (`2024-08-20T10:15:04.103`)
- [CVE-2024-28829](CVE-2024/CVE-2024-288xx/CVE-2024-28829.json) (`2024-08-20T10:15:05.693`)
- [CVE-2024-7054](CVE-2024/CVE-2024-70xx/CVE-2024-7054.json) (`2024-08-20T11:15:03.540`)
- [CVE-2024-42563](CVE-2024/CVE-2024-425xx/CVE-2024-42563.json) (`2024-08-20T13:15:07.123`)
- [CVE-2024-42564](CVE-2024/CVE-2024-425xx/CVE-2024-42564.json) (`2024-08-20T13:15:07.243`)
- [CVE-2024-42565](CVE-2024/CVE-2024-425xx/CVE-2024-42565.json) (`2024-08-20T13:15:07.347`)
- [CVE-2024-42566](CVE-2024/CVE-2024-425xx/CVE-2024-42566.json) (`2024-08-20T13:15:07.443`)
- [CVE-2024-42567](CVE-2024/CVE-2024-425xx/CVE-2024-42567.json) (`2024-08-20T13:15:07.540`)
- [CVE-2024-42568](CVE-2024/CVE-2024-425xx/CVE-2024-42568.json) (`2024-08-20T13:15:07.643`)
- [CVE-2024-42569](CVE-2024/CVE-2024-425xx/CVE-2024-42569.json) (`2024-08-20T13:15:07.733`)
- [CVE-2024-42570](CVE-2024/CVE-2024-425xx/CVE-2024-42570.json) (`2024-08-20T13:15:07.830`)
- [CVE-2024-42571](CVE-2024/CVE-2024-425xx/CVE-2024-42571.json) (`2024-08-20T13:15:07.917`)
- [CVE-2024-42572](CVE-2024/CVE-2024-425xx/CVE-2024-42572.json) (`2024-08-20T13:15:08.007`)
- [CVE-2024-42573](CVE-2024/CVE-2024-425xx/CVE-2024-42573.json) (`2024-08-20T13:15:08.097`)
- [CVE-2024-42574](CVE-2024/CVE-2024-425xx/CVE-2024-42574.json) (`2024-08-20T13:15:08.193`)
- [CVE-2024-42575](CVE-2024/CVE-2024-425xx/CVE-2024-42575.json) (`2024-08-20T13:15:08.283`)
- [CVE-2024-42576](CVE-2024/CVE-2024-425xx/CVE-2024-42576.json) (`2024-08-20T13:15:08.377`)
- [CVE-2024-42577](CVE-2024/CVE-2024-425xx/CVE-2024-42577.json) (`2024-08-20T13:15:08.477`)
- [CVE-2024-42578](CVE-2024/CVE-2024-425xx/CVE-2024-42578.json) (`2024-08-20T13:15:08.573`)
- [CVE-2024-42579](CVE-2024/CVE-2024-425xx/CVE-2024-42579.json) (`2024-08-20T13:15:08.687`)
- [CVE-2024-42580](CVE-2024/CVE-2024-425xx/CVE-2024-42580.json) (`2024-08-20T13:15:08.793`)
- [CVE-2024-42581](CVE-2024/CVE-2024-425xx/CVE-2024-42581.json) (`2024-08-20T13:15:08.890`)
- [CVE-2024-42582](CVE-2024/CVE-2024-425xx/CVE-2024-42582.json) (`2024-08-20T13:15:08.987`)
- [CVE-2024-42583](CVE-2024/CVE-2024-425xx/CVE-2024-42583.json) (`2024-08-20T13:15:09.077`)
- [CVE-2024-42584](CVE-2024/CVE-2024-425xx/CVE-2024-42584.json) (`2024-08-20T13:15:09.173`)
- [CVE-2024-42585](CVE-2024/CVE-2024-425xx/CVE-2024-42585.json) (`2024-08-20T13:15:09.273`)
- [CVE-2024-42586](CVE-2024/CVE-2024-425xx/CVE-2024-42586.json) (`2024-08-20T13:15:09.367`)
- [CVE-2024-6918](CVE-2024/CVE-2024-69xx/CVE-2024-6918.json) (`2024-08-20T13:15:09.450`)
### CVEs modified in the last Commit
Recently modified CVEs: `2`
Recently modified CVEs: `11`
- [CVE-2020-7357](CVE-2020/CVE-2020-73xx/CVE-2020-7357.json) (`2024-08-20T11:54:57.010`)
- [CVE-2024-43202](CVE-2024/CVE-2024-432xx/CVE-2024-43202.json) (`2024-08-20T08:15:05.240`)
- [CVE-2022-48742](CVE-2022/CVE-2022-487xx/CVE-2022-48742.json) (`2024-08-20T13:44:57.483`)
- [CVE-2022-48743](CVE-2022/CVE-2022-487xx/CVE-2022-48743.json) (`2024-08-20T13:54:00.933`)
- [CVE-2024-0171](CVE-2024/CVE-2024-01xx/CVE-2024-0171.json) (`2024-08-20T13:25:30.237`)
- [CVE-2024-23897](CVE-2024/CVE-2024-238xx/CVE-2024-23897.json) (`2024-08-20T13:34:22.773`)
- [CVE-2024-5805](CVE-2024/CVE-2024-58xx/CVE-2024-5805.json) (`2024-08-20T13:37:58.923`)
- [CVE-2024-6371](CVE-2024/CVE-2024-63xx/CVE-2024-6371.json) (`2024-08-20T13:21:59.600`)
- [CVE-2024-6372](CVE-2024/CVE-2024-63xx/CVE-2024-6372.json) (`2024-08-20T13:31:40.793`)
- [CVE-2024-6373](CVE-2024/CVE-2024-63xx/CVE-2024-6373.json) (`2024-08-20T13:32:44.213`)
- [CVE-2024-7683](CVE-2024/CVE-2024-76xx/CVE-2024-7683.json) (`2024-08-20T13:52:50.987`)
- [CVE-2024-7684](CVE-2024/CVE-2024-76xx/CVE-2024-7684.json) (`2024-08-20T13:53:24.447`)
- [CVE-2024-7685](CVE-2024/CVE-2024-76xx/CVE-2024-7685.json) (`2024-08-20T13:53:51.947`)
## Download and Usage

View File

@ -162392,7 +162392,7 @@ CVE-2020-7352,0,0,afc6ee4cf18db2ed0456ede05649052adb58c120b557434e96b16354b7b1a8
CVE-2020-7354,0,0,f598c4ab4c8e0fc6e1fa1518c897e666502a41063fa43ef22528036e255b8a0e,2020-07-02T14:16:19.047000
CVE-2020-7355,0,0,21678348c6ab54bd647cb0adf24cbadf80a4e86307a0a93ab682f4751f2d3e81,2020-07-06T18:00:10.870000
CVE-2020-7356,0,0,c475bcad58cc418896a927dd04fbc402403e3108dc4ff2f5ff0e24a52b9866e9,2020-08-12T13:39:55.297000
CVE-2020-7357,0,1,bac4a7276d9f5d71ccc44054da41226cd390aff37577fe9ff7d3f99d691228a5,2024-08-20T11:54:57.010000
CVE-2020-7357,0,0,bac4a7276d9f5d71ccc44054da41226cd390aff37577fe9ff7d3f99d691228a5,2024-08-20T11:54:57.010000
CVE-2020-7358,0,0,d4d7bfd2ece7759444149b05a38b24ed8fd0f90837ce8c52cd20acf0eb7d49a6,2020-09-28T18:36:41.360000
CVE-2020-7360,0,0,5aa402d7a3007a8bc874c17b9213c25200a862b036297cf2dce435e8b34f5b8f,2020-08-19T21:26:02.727000
CVE-2020-7361,0,0,714be09efee1b86a48a42c5d0d463785915953295001fd0dd7eec0a6eec0925f,2020-08-10T16:57:02.577000
@ -212230,8 +212230,8 @@ CVE-2022-48739,0,0,00da9e79eba58b72da4eb9f5fe5c2b84557c8f37a2ad7a0724f316e8ecfe4
CVE-2022-4874,0,0,d259c1db6680ce288191bcc87dca743951302233b28b86107a9fa3c0b9ed4550,2023-11-07T03:59:09.523000
CVE-2022-48740,0,0,a7eb1a4fcfc2023fb44223bb3669f06339f2ab543ff2db91386fcf93c418fa7e,2024-08-19T17:03:31.843000
CVE-2022-48741,0,0,f7a9ce9b119d13af0b410c25cec09275b8f2fb2239b9abc03783d7e15ae6e5f9,2024-08-19T17:34:17.233000
CVE-2022-48742,0,0,47877914826bbcca848a5a88eb82fc6bd0070089fc81e4e2400d0b8e069d2cb2,2024-06-20T12:43:25.663000
CVE-2022-48743,0,0,210b0ade111d6b4df1d1747f8af54560ce03bf97e3f6d5414964b3b2b459b801,2024-06-20T12:43:25.663000
CVE-2022-48742,0,1,955f0c7fbe8c4fb04c29ac68d1923a29168477849bc7b7e7e1a38f90faa04e83,2024-08-20T13:44:57.483000
CVE-2022-48743,0,1,016aa198197a6069a5b600f7b75e21187063a616d0f2a55d2373780c15590e81,2024-08-20T13:54:00.933000
CVE-2022-48744,0,0,db97d2408a3729b8332ee7728404bcf0a8034b20ec9bb81fa52c25169879c043,2024-06-20T12:43:25.663000
CVE-2022-48745,0,0,41db11ed51a619f18bf8566d3a9646fcce3f1ca7e8c8d1b8f24a053db7635b13,2024-06-20T12:43:25.663000
CVE-2022-48746,0,0,e0fa12e9f2d5b9a8bc1db423dcc6c83d2f1745d072ea799cb50d0201d1a5ab3d,2024-06-20T12:43:25.663000
@ -241079,7 +241079,7 @@ CVE-2024-0167,0,0,744bc993f59ae73af2914a6819025a9b84a9608f7404a5affc347dddf19a56
CVE-2024-0168,0,0,b3ed681274021d4ad23f5d3a33ac337cf4d9042b0fec464247a45e1c1e71eb19,2024-02-16T13:40:44.663000
CVE-2024-0169,0,0,f3c67b7bc44e30be0f91d72e02de3315174c543380b368caf20e16a7ec6999a6,2024-08-14T10:15:05.883000
CVE-2024-0170,0,0,cad01b4a5afa824941a3be2fdd3602b85ef95f3075f06c5677f74bc8ee9b7c8f,2024-02-15T16:55:09.957000
CVE-2024-0171,0,0,ab9fa7c61d83383287bb7bbcd6eed02e80acab1958549a5d7b5fc932c5395629,2024-06-25T18:50:42.040000
CVE-2024-0171,0,1,2f3d7f2f1f78d639aa160b093e5b427e217b92a685ebc1ab123ac7afd9616a22,2024-08-20T13:25:30.237000
CVE-2024-0172,0,0,e309e09fe60408c3f84daa7e2d14db1e3ae80b43eddc40c52c9068b5a4d6e6ec,2024-04-03T12:38:04.840000
CVE-2024-0173,0,0,b886d64d4b6132c8c30f9fd36eab248afbbe9e679900ffa9aa922365ae506ae7,2024-03-13T18:15:58.530000
CVE-2024-0181,0,0,bf8c23eeb8eccfd67271292b6e90342c941acaef0e98a66f834ab435fd911b64,2024-05-17T02:34:22.837000
@ -243934,7 +243934,7 @@ CVE-2024-21684,0,0,59f12a4b04761da303d7e3a40c8e6edc45c41d4945c065d5a0ffea7371041
CVE-2024-21685,0,0,5660fcc85eb1dde5c65259d6d6205ae74624ad923dcf6470bb4f3577f99d7f00,2024-06-20T12:44:01.637000
CVE-2024-21686,0,0,4a77c3c56e7b5b00a78de09ce573bf8e0630b6f60379d0ccdce9209c8559bd43,2024-07-17T13:34:20.520000
CVE-2024-21687,0,0,376ba9a42cfc804d783dd58059d1accf85ade36be58bc6e24e95588c80302a09,2024-08-01T13:46:48.050000
CVE-2024-21689,1,1,f0f6270ad75f42f9e86f2978ae6cfad32cfccffa4225a56d905159e7cada06df,2024-08-20T10:15:04.103000
CVE-2024-21689,0,0,f0f6270ad75f42f9e86f2978ae6cfad32cfccffa4225a56d905159e7cada06df,2024-08-20T10:15:04.103000
CVE-2024-2169,0,0,25fcbf8b9d7008ea9954a41615969f4d36543f4a604eb878bcc8b4c5c18a9fe0,2024-08-02T17:35:41.760000
CVE-2024-2170,0,0,758d6332b5fccd657d38a7eddcc769e16fb72e0c1b6514443e29b8614302434a,2024-03-26T12:55:05.010000
CVE-2024-2171,0,0,e9c79cd9676afcf55166b18cc4887c5a70983811183f36611429f962ee8d8a26,2024-06-07T14:56:05.647000
@ -245466,7 +245466,7 @@ CVE-2024-23893,0,0,164d34330c45802f3294effcca33fdb409e7a0b03670023eb0749752670b7
CVE-2024-23894,0,0,889e17a969f38341fe271e7476c4c00ec7834f36aa4750d6b24eda8dbc65e9f9,2024-02-15T10:15:20.110000
CVE-2024-23895,0,0,63b9df77b0dfe3156d702037b8256c94f0310299e58028bb29ff7e75ab1ccefd,2024-02-15T10:15:20.403000
CVE-2024-23896,0,0,2d68c15af19ed8b045c5f16b74c7daadbb5e999aff70f245f4f1ca2defc4aa73,2024-02-15T10:15:20.657000
CVE-2024-23897,0,0,f0c0ebaa90565b9f4c7019324540779f3bbe5add1e7c9ec5f50a60cf3df1835e,2024-08-20T01:00:01.757000
CVE-2024-23897,0,1,c83d1994f6c073666478d860c9bb4da8143c864413f74371bcb20503700b1742,2024-08-20T13:34:22.773000
CVE-2024-23898,0,0,9962562a99e711a1d1b8fcb160c14631afd493f3a9f73290bf49c075765f73c8,2024-05-14T15:01:24.790000
CVE-2024-23899,0,0,ba79d7c391f656b46c5ad4456d441adc8729de1168ad27fcd60687a8d33b9157,2024-01-31T18:43:39.183000
CVE-2024-2390,0,0,593c8d31509ee966f2939016d9952aa22804413956e5e4bcfec8a17bd5fc173d,2024-03-18T19:40:00.173000
@ -246098,6 +246098,7 @@ CVE-2024-25004,0,0,b1eaa30b45a2beac602111a556e73283df1fde1d2d56447f15cd2e12b3d43
CVE-2024-25006,0,0,5b722f2e87bb2f2cd1327a954681e67bfe99d5442b01159ab458f524449bcffe,2024-08-01T13:47:32.460000
CVE-2024-25007,0,0,8168166db4b2b463b1c077994d5d41f318578553eda571604b31f6006eab6cd4,2024-04-29T19:48:09.017000
CVE-2024-25008,0,0,edae19780623ecb3fe0e59b27c808259dfd74c0b079a788dd904812d074243f7,2024-08-19T13:00:23.117000
CVE-2024-25009,1,1,fa4cf85f40c91db0865dc4774b98d0658d2f0fe65a309e270e7f0bbbf51ae6bc,2024-08-20T12:15:04.667000
CVE-2024-2501,0,0,6ce26352b8e14756a33573972eeb4c8a06096eee07ab0fb0ebb1c9238a943b1a,2024-04-10T13:23:38.787000
CVE-2024-25015,0,0,4c1212c8f769823bd4e7049fb129f848dc20c143fc1cc72b02abca5f7451e069,2024-05-01T19:50:25.633000
CVE-2024-25016,0,0,0e9311458b59df4142779e7a8b1d9bd170deea1a4bb4a555b03bbf822c263b92,2024-03-04T13:58:23.447000
@ -248839,7 +248840,7 @@ CVE-2024-28825,0,0,2060c8862968982d4a6159b0b62313dec95ecc020293b85f137ce41396383
CVE-2024-28826,0,0,ccabc68ae1502fb496d2010a22f66c953a12ff1a849372d7235937980a01c570,2024-05-29T13:02:09.280000
CVE-2024-28827,0,0,30d6d403e5c79dbab459dc4233554203969c32826737ea25dceb545e947896f1,2024-07-11T13:05:54.930000
CVE-2024-28828,0,0,f569edfaae2cfaafb15d4f5e29614839e3689bfe76be347c8b67efdf6d0be50b,2024-08-07T17:57:38.413000
CVE-2024-28829,1,1,a7fa399c45c4b30b83fa5874f8d0009a31e3673b80cb4e5fb7a82b85175ff469,2024-08-20T10:15:05.693000
CVE-2024-28829,0,0,a7fa399c45c4b30b83fa5874f8d0009a31e3673b80cb4e5fb7a82b85175ff469,2024-08-20T10:15:05.693000
CVE-2024-2883,0,0,4414164b8fa79ba498c6ddbb6ab7a825d3f0a39397b4604f63f00efe5e5aaa16,2024-07-03T01:53:37.420000
CVE-2024-28830,0,0,49bb68528483eea32fe70c10feda0199ddfef50b4330a9b74a5779b200dbf298,2024-06-26T12:44:29.693000
CVE-2024-28831,0,0,8b0cc22b019b2f22717d4926d7f18f8c0f1245da30fda97cee3d4dd670ef131d,2024-06-25T12:24:17.873000
@ -257064,7 +257065,11 @@ CVE-2024-41693,0,0,1ab2b4b7ed8f921d2bbd47d1a0a36dd7d080353c42c5a60fc142ad6c40def
CVE-2024-41694,0,0,2beb2cafa0b59f0afe42f2c196fff55bc2e400d880d35147a1b32c39271b6739,2024-07-30T13:32:45.943000
CVE-2024-41695,0,0,cfeced4f0e3fb4495c4233c92c745e7bccce82ccc90ae4a6ab56dbb48fdfcc87,2024-07-30T13:32:45.943000
CVE-2024-41696,0,0,35f7b98c6839466c4d2a4eebac08206f0700aa8aa3101c5b590c4468fe7a3828,2024-07-30T13:32:45.943000
CVE-2024-41697,1,1,0e39d709db8b7f128921881304ffa3c1d2e9ad61adc468350a8861246f4f9484,2024-08-20T12:15:05.313000
CVE-2024-41698,1,1,adba2018df2ddf73f23abafa04b53ddd04276a58e8e79a7798cb87c2d0ba6029,2024-08-20T12:15:06.007000
CVE-2024-41699,1,1,05d944ce148e0aac0790ef19169a095d029a6489f699528da28073c94cb7442b,2024-08-20T12:15:06.650000
CVE-2024-4170,0,0,62435f89f96f29247c44c5e589e7b97688efd61a202de53db89b1fe5fd4975dc,2024-06-04T19:20:31.883000
CVE-2024-41700,1,1,c0bc9c19ce12da233b94fb17cb0046d2d87acefe399d9f3b074bf0738db587d2,2024-08-20T12:15:07.143000
CVE-2024-41701,0,0,dd24aefcbab2e7aed118f6b42dbe2e651c1bc0fc56ceb2d95afa6932def1c843,2024-07-30T13:32:45.943000
CVE-2024-41702,0,0,f2f834cb62e19913572ef56e0684de02f9402451a44fa1f9eb0dac16f09c6db8,2024-08-08T20:31:10.510000
CVE-2024-41703,0,0,41c5e0de4e6f71abb99bf65b9b9d8795b6450a23d530f3b9308a194d3b5a310a,2024-08-01T13:59:05.890000
@ -257479,6 +257484,9 @@ CVE-2024-42320,0,0,3bb9745120c3e683aefbafbca3ae9140002adac221663a12333f744da45f1
CVE-2024-42321,0,0,1716db5db6c984bf2ebbd691b80440a9181fa253c6bc8c5d00954d830484e312,2024-08-19T12:59:59.177000
CVE-2024-42322,0,0,2accb2a45b605eba549de2a0c83236102f9dab689f1b61dc800f0c45a0f92db4,2024-08-19T12:59:59.177000
CVE-2024-4233,0,0,e3336c43dd885f8db6271cd8e49f7796169d1b724e733d53d39e8dcd56cab238,2024-05-08T17:05:24.083000
CVE-2024-42334,1,1,0335754e5d21a0f775db36029a4f55d3618ba3884b597925321a4edb0615c033,2024-08-20T13:15:04.930000
CVE-2024-42335,1,1,291822ab823c9db0538df30ba1730d3f1db294afc4e2b4c4af46bd191c8f8933,2024-08-20T13:15:05.317000
CVE-2024-42336,1,1,b2ac5ee23b1952f0577bf83940ba82689073cfdcfe6930e314d53947dbdb9437,2024-08-20T13:15:05.617000
CVE-2024-4234,0,0,18c98986f4d0c323ca7a76881b57d07f11d740fced15b647da44016411c790ed,2024-04-26T15:32:22.523000
CVE-2024-42347,0,0,9d56c3d6f460e2251d08d50a3e874b7efeb364cadb050367418d1be0b31e15cb,2024-08-12T18:52:08.163000
CVE-2024-42348,0,0,9049ba06c12fadbe924de4e1d7650091813be7f3a3306b9434f7ebd8620eed32,2024-08-05T12:41:45.957000
@ -257577,9 +257585,44 @@ CVE-2024-42545,0,0,f468a16273bd93e60bf7c85edbb037a37f95ddbef27d46e806b8081634956
CVE-2024-42546,0,0,fb60d203dacd557a0d6c3dd4a088a3933e203b772ae4b090e279b0a2f7b980c9,2024-08-15T16:35:15.603000
CVE-2024-42547,0,0,35eeb010fca94dc794f14fe3c29b0586f2dd6b453f1de383f4e89dde1cb85973,2024-08-13T17:08:12.543000
CVE-2024-4255,0,0,35fd058a4cc0a80e19d25400a3e944345c636d8ef400085f905d7b019af7edbf,2024-06-04T19:20:34.420000
CVE-2024-42552,1,1,edcea8350a649359608d878c2b9f374e5615388df7903f8b4ce3514a0c290caf,2024-08-20T13:15:05.933000
CVE-2024-42553,1,1,f2edb6eccb17b73a391844d865af522e7902b8df0649c2de6674aabdf33d0cd6,2024-08-20T13:15:06.073000
CVE-2024-42554,1,1,b08e6f968d01c8acb902c77f2be9dcab19447e5f54a5b8c2e4da91f07d8fd251,2024-08-20T13:15:06.190000
CVE-2024-42555,1,1,47bc194887cd8b6390fc9acd712e261d3c5a4217f31e29ddf6dd586fc47d9c5b,2024-08-20T13:15:06.303000
CVE-2024-42556,1,1,d7cbd1e745b515ba2e34fe26a6d0d7d2ecb79f041c1cd83ad01f4170629fcd9e,2024-08-20T13:15:06.420000
CVE-2024-42557,1,1,b81a7a178cbdce59e6dba516d5a565766a3aa2b4487dd1e24e6634232bc4f5f2,2024-08-20T13:15:06.523000
CVE-2024-42558,1,1,01bb61defe10b86cc9158a32a5eb5991d76053cc724aca2429bf2997981033e2,2024-08-20T13:15:06.623000
CVE-2024-42559,1,1,1f7bd4c6e1958008243cc068f6cd3e40893ed5832b9b444d10f8c0d6d2943cd2,2024-08-20T13:15:06.730000
CVE-2024-4256,0,0,2885dad709315de5112b738946979afcb06c4d717b1b754bf7bfd87477f08c3d,2024-06-04T19:20:34.517000
CVE-2024-42560,1,1,12353e342f59329ed9c9fe91ab39512396d50d91aaf497eb5d24ac7524a7c720,2024-08-20T13:15:06.830000
CVE-2024-42561,1,1,5cecc5cda05dbf2076b8c4d0d38dd974ea050be31e610808d0edb0fb56ef4e86,2024-08-20T13:15:06.920000
CVE-2024-42562,1,1,8d119a041f38e85845404483e034bb9d46494070ca6e87d934dc6f8e1caf3c1c,2024-08-20T13:15:07.020000
CVE-2024-42563,1,1,5aa10b11afb9919f02de91b6e4aa99211cc4e0b7e682d85cb6204eab3bd8a75f,2024-08-20T13:15:07.123000
CVE-2024-42564,1,1,4dd317755ddfe2b7c71508b028f3acf510537024d1a71c8cbe04814a882414f6,2024-08-20T13:15:07.243000
CVE-2024-42565,1,1,4108cca8c1090c4ed0a5c3e9c0a8fe9148e0a395ef8003dcd14c9e8b6ba96635,2024-08-20T13:15:07.347000
CVE-2024-42566,1,1,c13555238328ac423da93ae3145c0ea54c4417cee348ca178a07bff102620f59,2024-08-20T13:15:07.443000
CVE-2024-42567,1,1,fe67942dcb03efa4c7f3478f8c9c829ac9d7afad6e7b44232545f1f55a090bb7,2024-08-20T13:15:07.540000
CVE-2024-42568,1,1,3808fa7dec6020429d7767d7fb7167c3f8e6f7482bca343dd67b9d32b78add55,2024-08-20T13:15:07.643000
CVE-2024-42569,1,1,b1aef212df038e08c698364f08ba795d0d8cd4e25a882a360b7a5c1ee201faa7,2024-08-20T13:15:07.733000
CVE-2024-4257,0,0,e0d599f1bfc48408556261adebbc05066e8b6b86cdfabfa8d99484b6710fdc92,2024-05-17T02:40:21.330000
CVE-2024-42570,1,1,4f20e8c8db2ea3a78db4e51e47dc70a190f2638b1f475da04edfd9a62439e03c,2024-08-20T13:15:07.830000
CVE-2024-42571,1,1,8b769d1aa59c0a9917c3e1affaacd95cea49cfa6f87d2d48d152897523602d9f,2024-08-20T13:15:07.917000
CVE-2024-42572,1,1,5ba728d62fb8126fc5b604dd664f1e1cdab9ebb40124b7d0b0fa4c41aad345c8,2024-08-20T13:15:08.007000
CVE-2024-42573,1,1,36b7766d2befa06458bc9df75b45da1c94dd516e85d0136df243d520cd1082d2,2024-08-20T13:15:08.097000
CVE-2024-42574,1,1,81408df3f3a9e4b3bef1a2ccfc12929dd101ac417e32959cfb0c8a9c55695c15,2024-08-20T13:15:08.193000
CVE-2024-42575,1,1,c0624f67d52d8cdda4da33bf7de3e641daa258371888447e25e291eee4d3f57d,2024-08-20T13:15:08.283000
CVE-2024-42576,1,1,a022f7dab66e05f20c95e333526ea90cdcf8521df67acad012352fd634755e0d,2024-08-20T13:15:08.377000
CVE-2024-42577,1,1,1c91c08aa8a3f1c6ea256dbaaaa5fadb98103c334a5e4a1aa5cdb5635b84060a,2024-08-20T13:15:08.477000
CVE-2024-42578,1,1,fd8de019d32ee68409e62a28a6fb25068bc9612d20bd3f88237c7b6e29439c2f,2024-08-20T13:15:08.573000
CVE-2024-42579,1,1,807dfbdf86b6f636c9ba6898cb85ed86b8923975205727f24f4036b6a407be39,2024-08-20T13:15:08.687000
CVE-2024-4258,0,0,cedc452cf08b1d582601f74b54055702e4527b179d19ae6d21e1fa7a35e392d8,2024-06-17T12:42:04.623000
CVE-2024-42580,1,1,cf4406b29feee4b42daef4406433123a750a30983d173c68371bbc5b0b595004,2024-08-20T13:15:08.793000
CVE-2024-42581,1,1,737beb31e0a22db07565133cff1451e8670057a279deebb941fe77db88d12a96,2024-08-20T13:15:08.890000
CVE-2024-42582,1,1,6ea8063fedd5a5850315087616af0a1527fd14225fb6fca3a3fa646052e1bcfc,2024-08-20T13:15:08.987000
CVE-2024-42583,1,1,39d18898205ceb500e315d2db0193b06bcd17a26714c5d3098d7462d8be705c0,2024-08-20T13:15:09.077000
CVE-2024-42584,1,1,f6d7f32221e725ba6da2cd1474d6f47bd0d43de0f8fb21052de9240ee73b5d6d,2024-08-20T13:15:09.173000
CVE-2024-42585,1,1,916883996a52f9d565b60a9bcb14e2a5a3a08eaed88c0107d3670c989580d43c,2024-08-20T13:15:09.273000
CVE-2024-42586,1,1,bc084c3068820fdd0b6b81ff9ecc3502fee34b3c10a95bd22dc6621c64823539,2024-08-20T13:15:09.367000
CVE-2024-4260,0,0,16d46a0b5bcb66a093fc7ed1472e8a955d65f29368360dc29eff1d3d84145b9b,2024-08-01T13:59:29.547000
CVE-2024-4261,0,0,cad163d5402c8383e323c083e324c4342bcfec07494a0960d776456fb2ab221b,2024-05-22T14:30:41.953000
CVE-2024-4262,0,0,eb43fbaec8efb92a09683be8d89079c39bc088d0014f0d5047c7a435bf15c8e4,2024-05-22T12:46:53.887000
@ -257761,7 +257804,7 @@ CVE-2024-4318,0,0,7b0a62dc8691f5e6f2210e7e19a78c6d4d5c9f053f662e7593a96cdc8c097a
CVE-2024-4319,0,0,7ca0245a01df3d5ced472265b32f90c6f6a22a37af3715d5589379ecac1f6a24,2024-06-11T13:54:12.057000
CVE-2024-43199,0,0,94150f8459e19abf18625a946d8a507867275817cd3d9928084030fcb7fa8330,2024-08-12T12:59:48.253000
CVE-2024-4320,0,0,f21f873c3bfeb896c071276000f6bbe2ae4420d2f2c3184178334c98a666705b,2024-06-07T14:56:05.647000
CVE-2024-43202,0,1,403cde958a51af9acc480f0f95630c40baab10f0bbf6cb2b53237e18afff9101,2024-08-20T08:15:05.240000
CVE-2024-43202,0,0,403cde958a51af9acc480f0f95630c40baab10f0bbf6cb2b53237e18afff9101,2024-08-20T08:15:05.240000
CVE-2024-43207,0,0,e22c5710770b6cfc075b06ecdaad97a6d82c458382d84efdd62d5cddbde66f6b,2024-08-19T12:59:59.177000
CVE-2024-4321,0,0,9cab2a859d144dd765da27aaa03d49bb12083c0b11abfa900a9b065f4ea718e1,2024-05-16T13:03:05.353000
CVE-2024-43210,0,0,38b1ddd569737ddf84a414c75c09c54bffe5570d779b3b2b7d84160c7c88ff6c,2024-08-13T12:58:25.437000
@ -259197,7 +259240,7 @@ CVE-2024-5800,0,0,a1cb578d92a5ce21abf5c6c3a9df30d0f15dec959b83eaaecf5cab603de305
CVE-2024-5801,0,0,668584c28d68f34806b15aa23a003fb18ba18cb7fb2d24326345f03f0e3dd0a3,2024-08-12T13:41:36.517000
CVE-2024-5802,0,0,71daebe4bec626c1d71de5756a51cb35bdbb0ec81769b121e428d7e1cc0f8395,2024-07-12T15:20:14.610000
CVE-2024-5804,0,0,944c60e3868cb88abd10c74562e980fee4d055c47351e0f84fb7de6b37f889be,2024-07-22T13:00:53.287000
CVE-2024-5805,0,0,f734cfbda04e521c3e66e4ddc2a1025a96de47f7633c45b189fcc72ae4a4191a,2024-06-25T18:50:42.040000
CVE-2024-5805,0,1,c6bd0a254f95da4bac1aa9af34b5a1c8bce84a0c9ec724d2acad9f30a83ad74c,2024-08-20T13:37:58.923000
CVE-2024-5806,0,0,91588fb1cdb8115c3da665d3d031e599ad42ef712f85a57d764591dd0370421d,2024-06-26T00:15:11.293000
CVE-2024-5807,0,0,cbdacfcc550f188a645ebbcc0d5bed8a3afa99180c6adb698350c513e3814548,2024-08-01T13:59:59.787000
CVE-2024-5808,0,0,01bdb59c1a81eab4bdadd0e0da37734e46325f1f6405fb5bc4ad137cd56c547f,2024-08-01T13:59:59.967000
@ -259637,9 +259680,9 @@ CVE-2024-6367,0,0,0657e75ca91976d2d4beca477f8339cebb9a03d943acbd557f57c4bf89b577
CVE-2024-6368,0,0,e298d701aa6c568232c2a1685979818386124e299e97d71dced43164a82e13ff,2024-06-27T18:15:21.083000
CVE-2024-6369,0,0,8b09ff85e5acb66c2b30feef0f9adfffd0c06196dfcccda2083a0a13ec885594,2024-06-27T12:47:19.847000
CVE-2024-6370,0,0,72eb946b066b80cfc3f428b4eac85ce966f09241daddb8d4da0833577e90a737,2024-06-27T12:47:19.847000
CVE-2024-6371,0,0,5c453307ad6443c6875143a04a41537209c616a97b889570a269f093cbb82ff1,2024-06-27T18:15:21.690000
CVE-2024-6372,0,0,3a5e4046552450d7ff5fe0ecb13dd5f2a5cb3ce00156c82e4366ab91d3cb5535,2024-06-27T17:11:52.390000
CVE-2024-6373,0,0,d707342e63d932ce58020bc6bdb914165dbc13d5b4162b0bbb2c2611e541fbac,2024-06-27T18:15:22.280000
CVE-2024-6371,0,1,5f83f95dcceaa28d11c287dc71af5756afc095d68becb3e3a86bdf854c3c189a,2024-08-20T13:21:59.600000
CVE-2024-6372,0,1,175eedbe6c249e3955927cb279a01c191390828d0195bad6f245ad8466b584f8,2024-08-20T13:31:40.793000
CVE-2024-6373,0,1,e2b88eb3a63ea5c09c2c5241dee2a7883fb4754c8b06cd4990f2315b5466489d,2024-08-20T13:32:44.213000
CVE-2024-6374,0,0,f94841636056434d281b0adc40f21c7609c1c7ef70c052bfb7795df58f3d067b,2024-06-27T17:11:52.390000
CVE-2024-6375,0,0,2086f7a0dc16d184277c490b35389aec9b32cc5c6b68030b97b503ee789a3958,2024-07-03T14:54:52.427000
CVE-2024-6376,0,0,2eceea6553f0e47a0e34ab01650b7781a20682f6799be39f9cd1e64f3f19856f,2024-07-03T15:04:52.463000
@ -259972,6 +260015,7 @@ CVE-2024-6913,0,0,a7b65a58f468735b3782ca0a056db617c72da8825fc6f7975e6b5a68a6fa7e
CVE-2024-6915,0,0,414f9ee927dc9f475151b863854f151879a129420ab26b169b33952223f7672f,2024-08-06T16:30:24.547000
CVE-2024-6916,0,0,07530be58a74756ca63b407a63f3e63926b78ec1f0980442182c2c4ab60c9be4,2024-07-19T13:01:44.567000
CVE-2024-6917,0,0,4e02075ee95758cd510fbf6b3750273e9262615bb77e37c7873232af68d2c294,2024-08-13T17:14:51.100000
CVE-2024-6918,1,1,521b7d40df9f00de5aa0547dffce2b4999e52d976a15994b48aa5f7cdc11bf69,2024-08-20T13:15:09.450000
CVE-2024-6922,0,0,06f94107ca0d2a59d9bc293905aa46a216c7a8ead08ee7b0b3a0f5d8d9c7d0a8,2024-07-29T14:12:08.783000
CVE-2024-6923,0,0,5f80c19d7aba57d9ca3502e05808684f0f6d62047a1b2b6de15ae6be51d0a228,2024-08-07T15:15:56.337000
CVE-2024-6930,0,0,1339dcde2064efad12400b33b71bb10f58bb3894621d0a104ecb7e997db508bc,2024-08-08T20:06:49.207000
@ -260047,7 +260091,7 @@ CVE-2024-7029,0,0,5175bec03cf7f2378284f608514536d153bc0fcc9978511b168a2887b7029c
CVE-2024-7031,0,0,4808703a4cd0b97f67a773c5f222b01d69a2fff387801423358b3ea99670c83a,2024-08-05T12:41:45.957000
CVE-2024-7047,0,0,c626b8092c8533dfe4198c51e8e35d5946df1ed097b6fb1d01ca755685dc1b0d,2024-07-25T12:36:39.947000
CVE-2024-7050,0,0,f402c0a89ba2917236fe6639793bd54ee4751807250eba7a4dde84d4a362ffd7,2024-07-29T14:12:08.783000
CVE-2024-7054,1,1,43918e4682eea2254587dd6be24c57fd33f0a630b01e2ccb4238160b7399ff51,2024-08-20T11:15:03.540000
CVE-2024-7054,0,0,43918e4682eea2254587dd6be24c57fd33f0a630b01e2ccb4238160b7399ff51,2024-08-20T11:15:03.540000
CVE-2024-7055,0,0,b0e8b0793ccc61abbc70699af6d91421241877ab1f640f57d490cff121ecbcd0,2024-08-06T16:30:24.547000
CVE-2024-7057,0,0,e86292da776d8c2eee12db885a241ac453174252cdfea8e6058f6d373bd4dc19,2024-07-25T12:36:39.947000
CVE-2024-7060,0,0,2e0c92013c1ddde1bca0ad9e62aa50d23e69e1a598796a2170f54fccf61e7f4b,2024-07-25T12:36:39.947000
@ -260441,9 +260485,9 @@ CVE-2024-7678,0,0,7a80ac621ece570be5503c7435c87b024e4d34454346340a478740f49f0318
CVE-2024-7680,0,0,4742cee85d7df5fbe02ea5ecd61db4452ad7db3d8ef0db88ef67139768aab176,2024-08-15T18:08:52.780000
CVE-2024-7681,0,0,e6c1e7782509f60074b687569285020e895fcc1fd23e8fb399f4f22e032de697,2024-08-15T18:09:55.887000
CVE-2024-7682,0,0,8dbcf53cb3ad3a4e3e6c93fa0edfe498b656bd897e790189cda42acfe0f7b35c,2024-08-15T18:10:41.557000
CVE-2024-7683,0,0,db1468d6a918b5d9699222fb036b2f7c874d450f40763ac979489b89e963d4e7,2024-08-12T13:41:36.517000
CVE-2024-7684,0,0,0159f82fe6cc241e60660ae8524453cb40852163421468e904c03601bdf4a5a2,2024-08-12T13:41:36.517000
CVE-2024-7685,0,0,ee24f58f1e95e966593bf53c459d913ce2200cd63798cb5ac6cee30b9a4d96e1,2024-08-12T13:41:36.517000
CVE-2024-7683,0,1,0e60e4af191d77a965d4296d84a49c07e8af0f778b10dae064ea9d4491f47a8d,2024-08-20T13:52:50.987000
CVE-2024-7684,0,1,d5d03d6072e24fe97ebcaeddd6f0cfafbf610fe9d74f716df9c156507bb7719f,2024-08-20T13:53:24.447000
CVE-2024-7685,0,1,ef97cee3c3f9504d8f3d2a571167ba3304a1e5ad3165b46e778fa46938b19988,2024-08-20T13:53:51.947000
CVE-2024-7686,0,0,1f836816338e686ba2de1cb6f8ba7d877a0f6cb953d1322ca08f61be1eae3d40,2024-08-12T13:41:36.517000
CVE-2024-7693,0,0,f2cd1103366bcfd179be09779784b86ac2f98679921c4f629dd8dbd0c14eefbf,2024-08-12T13:41:36.517000
CVE-2024-7694,0,0,7ad6784b26040f06619a4364e66ebaeeebc13317865a5794a53c5e6dcb080aaf,2024-08-12T13:41:36.517000

Can't render this file because it is too large.