From 7c5fee732e7e7d042b1e76e91fb7bb0d0e8b507c Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 20 Aug 2024 14:03:14 +0000 Subject: [PATCH] Auto-Update: 2024-08-20T14:00:18.707768+00:00 --- CVE-2022/CVE-2022-487xx/CVE-2022-48742.json | 150 +++++++++++++-- CVE-2022/CVE-2022-487xx/CVE-2022-48743.json | 150 +++++++++++++-- CVE-2024/CVE-2024-01xx/CVE-2024-0171.json | 199 +++++++++++++++++++- CVE-2024/CVE-2024-238xx/CVE-2024-23897.json | 12 +- CVE-2024/CVE-2024-250xx/CVE-2024-25009.json | 56 ++++++ CVE-2024/CVE-2024-416xx/CVE-2024-41697.json | 56 ++++++ CVE-2024/CVE-2024-416xx/CVE-2024-41698.json | 56 ++++++ CVE-2024/CVE-2024-416xx/CVE-2024-41699.json | 56 ++++++ CVE-2024/CVE-2024-417xx/CVE-2024-41700.json | 56 ++++++ CVE-2024/CVE-2024-423xx/CVE-2024-42334.json | 56 ++++++ CVE-2024/CVE-2024-423xx/CVE-2024-42335.json | 56 ++++++ CVE-2024/CVE-2024-423xx/CVE-2024-42336.json | 56 ++++++ CVE-2024/CVE-2024-425xx/CVE-2024-42552.json | 21 +++ CVE-2024/CVE-2024-425xx/CVE-2024-42553.json | 21 +++ CVE-2024/CVE-2024-425xx/CVE-2024-42554.json | 21 +++ CVE-2024/CVE-2024-425xx/CVE-2024-42555.json | 21 +++ CVE-2024/CVE-2024-425xx/CVE-2024-42556.json | 21 +++ CVE-2024/CVE-2024-425xx/CVE-2024-42557.json | 21 +++ CVE-2024/CVE-2024-425xx/CVE-2024-42558.json | 21 +++ CVE-2024/CVE-2024-425xx/CVE-2024-42559.json | 21 +++ CVE-2024/CVE-2024-425xx/CVE-2024-42560.json | 21 +++ CVE-2024/CVE-2024-425xx/CVE-2024-42561.json | 21 +++ CVE-2024/CVE-2024-425xx/CVE-2024-42562.json | 21 +++ CVE-2024/CVE-2024-425xx/CVE-2024-42563.json | 21 +++ CVE-2024/CVE-2024-425xx/CVE-2024-42564.json | 21 +++ CVE-2024/CVE-2024-425xx/CVE-2024-42565.json | 21 +++ CVE-2024/CVE-2024-425xx/CVE-2024-42566.json | 21 +++ CVE-2024/CVE-2024-425xx/CVE-2024-42567.json | 21 +++ CVE-2024/CVE-2024-425xx/CVE-2024-42568.json | 21 +++ CVE-2024/CVE-2024-425xx/CVE-2024-42569.json | 21 +++ CVE-2024/CVE-2024-425xx/CVE-2024-42570.json | 21 +++ CVE-2024/CVE-2024-425xx/CVE-2024-42571.json | 21 +++ CVE-2024/CVE-2024-425xx/CVE-2024-42572.json | 21 +++ CVE-2024/CVE-2024-425xx/CVE-2024-42573.json | 21 +++ CVE-2024/CVE-2024-425xx/CVE-2024-42574.json | 21 +++ CVE-2024/CVE-2024-425xx/CVE-2024-42575.json | 21 +++ CVE-2024/CVE-2024-425xx/CVE-2024-42576.json | 21 +++ CVE-2024/CVE-2024-425xx/CVE-2024-42577.json | 21 +++ CVE-2024/CVE-2024-425xx/CVE-2024-42578.json | 21 +++ CVE-2024/CVE-2024-425xx/CVE-2024-42579.json | 21 +++ CVE-2024/CVE-2024-425xx/CVE-2024-42580.json | 21 +++ CVE-2024/CVE-2024-425xx/CVE-2024-42581.json | 21 +++ CVE-2024/CVE-2024-425xx/CVE-2024-42582.json | 21 +++ CVE-2024/CVE-2024-425xx/CVE-2024-42583.json | 21 +++ CVE-2024/CVE-2024-425xx/CVE-2024-42584.json | 21 +++ CVE-2024/CVE-2024-425xx/CVE-2024-42585.json | 21 +++ CVE-2024/CVE-2024-425xx/CVE-2024-42586.json | 21 +++ CVE-2024/CVE-2024-58xx/CVE-2024-5805.json | 61 +++++- CVE-2024/CVE-2024-63xx/CVE-2024-6371.json | 62 +++++- CVE-2024/CVE-2024-63xx/CVE-2024-6372.json | 62 +++++- CVE-2024/CVE-2024-63xx/CVE-2024-6373.json | 63 ++++++- CVE-2024/CVE-2024-69xx/CVE-2024-6918.json | 56 ++++++ CVE-2024/CVE-2024-76xx/CVE-2024-7683.json | 61 +++++- CVE-2024/CVE-2024-76xx/CVE-2024-7684.json | 61 +++++- CVE-2024/CVE-2024-76xx/CVE-2024-7685.json | 61 +++++- README.md | 51 ++++- _state.csv | 76 ++++++-- 57 files changed, 2213 insertions(+), 95 deletions(-) create mode 100644 CVE-2024/CVE-2024-250xx/CVE-2024-25009.json create mode 100644 CVE-2024/CVE-2024-416xx/CVE-2024-41697.json create mode 100644 CVE-2024/CVE-2024-416xx/CVE-2024-41698.json create mode 100644 CVE-2024/CVE-2024-416xx/CVE-2024-41699.json create mode 100644 CVE-2024/CVE-2024-417xx/CVE-2024-41700.json create mode 100644 CVE-2024/CVE-2024-423xx/CVE-2024-42334.json create mode 100644 CVE-2024/CVE-2024-423xx/CVE-2024-42335.json create mode 100644 CVE-2024/CVE-2024-423xx/CVE-2024-42336.json create mode 100644 CVE-2024/CVE-2024-425xx/CVE-2024-42552.json create mode 100644 CVE-2024/CVE-2024-425xx/CVE-2024-42553.json create mode 100644 CVE-2024/CVE-2024-425xx/CVE-2024-42554.json create mode 100644 CVE-2024/CVE-2024-425xx/CVE-2024-42555.json create mode 100644 CVE-2024/CVE-2024-425xx/CVE-2024-42556.json create mode 100644 CVE-2024/CVE-2024-425xx/CVE-2024-42557.json create mode 100644 CVE-2024/CVE-2024-425xx/CVE-2024-42558.json create mode 100644 CVE-2024/CVE-2024-425xx/CVE-2024-42559.json create mode 100644 CVE-2024/CVE-2024-425xx/CVE-2024-42560.json create mode 100644 CVE-2024/CVE-2024-425xx/CVE-2024-42561.json create mode 100644 CVE-2024/CVE-2024-425xx/CVE-2024-42562.json create mode 100644 CVE-2024/CVE-2024-425xx/CVE-2024-42563.json create mode 100644 CVE-2024/CVE-2024-425xx/CVE-2024-42564.json create mode 100644 CVE-2024/CVE-2024-425xx/CVE-2024-42565.json create mode 100644 CVE-2024/CVE-2024-425xx/CVE-2024-42566.json create mode 100644 CVE-2024/CVE-2024-425xx/CVE-2024-42567.json create mode 100644 CVE-2024/CVE-2024-425xx/CVE-2024-42568.json create mode 100644 CVE-2024/CVE-2024-425xx/CVE-2024-42569.json create mode 100644 CVE-2024/CVE-2024-425xx/CVE-2024-42570.json create mode 100644 CVE-2024/CVE-2024-425xx/CVE-2024-42571.json create mode 100644 CVE-2024/CVE-2024-425xx/CVE-2024-42572.json create mode 100644 CVE-2024/CVE-2024-425xx/CVE-2024-42573.json create mode 100644 CVE-2024/CVE-2024-425xx/CVE-2024-42574.json create mode 100644 CVE-2024/CVE-2024-425xx/CVE-2024-42575.json create mode 100644 CVE-2024/CVE-2024-425xx/CVE-2024-42576.json create mode 100644 CVE-2024/CVE-2024-425xx/CVE-2024-42577.json create mode 100644 CVE-2024/CVE-2024-425xx/CVE-2024-42578.json create mode 100644 CVE-2024/CVE-2024-425xx/CVE-2024-42579.json create mode 100644 CVE-2024/CVE-2024-425xx/CVE-2024-42580.json create mode 100644 CVE-2024/CVE-2024-425xx/CVE-2024-42581.json create mode 100644 CVE-2024/CVE-2024-425xx/CVE-2024-42582.json create mode 100644 CVE-2024/CVE-2024-425xx/CVE-2024-42583.json create mode 100644 CVE-2024/CVE-2024-425xx/CVE-2024-42584.json create mode 100644 CVE-2024/CVE-2024-425xx/CVE-2024-42585.json create mode 100644 CVE-2024/CVE-2024-425xx/CVE-2024-42586.json create mode 100644 CVE-2024/CVE-2024-69xx/CVE-2024-6918.json diff --git a/CVE-2022/CVE-2022-487xx/CVE-2022-48742.json b/CVE-2022/CVE-2022-487xx/CVE-2022-48742.json index e8fe18c0acc..f12e68a7fa0 100644 --- a/CVE-2022/CVE-2022-487xx/CVE-2022-48742.json +++ b/CVE-2022/CVE-2022-487xx/CVE-2022-48742.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48742", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-20T12:15:12.517", - "lastModified": "2024-06-20T12:43:25.663", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-20T13:44:57.483", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,167 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: rtnetlink: aseg\u00farese de actualizar master_dev/m_ops en __rtnl_newlink() Mientras observaba un error de syzbot no relacionado, encontr\u00e9 la l\u00f3gica de reproducci\u00f3n en __rtnl_newlink() para activar potencialmente el use-after-free. Es mejor borrar master_dev y m_ops dentro del bucle, en caso de que tengamos que reproducirlo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.14", + "versionEndExcluding": "4.9.300", + "matchCriteriaId": "992A8983-3020-4403-A534-93A4971559F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.265", + "matchCriteriaId": "4F849B5B-93E9-438A-AE05-0380EC168436" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.228", + "matchCriteriaId": "87288F16-8DE4-4680-95D9-8601B47620D7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.177", + "matchCriteriaId": "B42832A3-1D9B-4BE0-8D4C-3AF681B52D98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.97", + "matchCriteriaId": "FB2BE440-BF07-4C49-9A0C-A63E4FA103A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.20", + "matchCriteriaId": "C68FC5B4-CC13-45E9-8050-EF9025F7A9B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.6", + "matchCriteriaId": "6739D89E-32C3-479D-B5F6-6865C5061FA5" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2cf180360d66bd657e606c1217e0e668e6faa303", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/36a9a0aee881940476b254e0352581401b23f210", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3bbe2019dd12b8d13671ee6cda055d49637b4c39", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7d9211678c0f0624f74cdff36117ab8316697bb8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a01e60a1ec6bef9be471fb7182a33c6d6f124e93", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bd43771ee9759dd9dfae946bff190e2c5a120de5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c6f6f2444bdbe0079e41914a35081530d0409963", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/def5e7070079b2a214b3b1a2fbec623e6fbfe34a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-487xx/CVE-2022-48743.json b/CVE-2022/CVE-2022-487xx/CVE-2022-48743.json index 6b17d5e8fde..a49a7956655 100644 --- a/CVE-2022/CVE-2022-487xx/CVE-2022-48743.json +++ b/CVE-2022/CVE-2022-487xx/CVE-2022-48743.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48743", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-20T12:15:12.610", - "lastModified": "2024-06-20T12:43:25.663", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-20T13:54:00.933", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,167 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: amd-xgbe: corrige el desbordamiento de longitud de datos de skb. Se activar\u00e1 BUG_ON() en include/linux/skbuff.h, lo que provocar\u00e1 un p\u00e1nico intermitente en el kernel, cuando el desbordamiento de longitud de skb sea detectado. Solucione este problema descartando el paquete si se observan desbordamientos de longitud debido a inconsistencias en los descriptores de hardware." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.9.19", + "versionEndExcluding": "4.9.300", + "matchCriteriaId": "43BD120E-4853-49BE-A7FC-3345A55D0070" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.11", + "versionEndExcluding": "4.14.265", + "matchCriteriaId": "E303FBB2-9F13-4FBE-874A-B48C6A56A829" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.228", + "matchCriteriaId": "87288F16-8DE4-4680-95D9-8601B47620D7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.177", + "matchCriteriaId": "B42832A3-1D9B-4BE0-8D4C-3AF681B52D98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.97", + "matchCriteriaId": "FB2BE440-BF07-4C49-9A0C-A63E4FA103A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.20", + "matchCriteriaId": "C68FC5B4-CC13-45E9-8050-EF9025F7A9B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.6", + "matchCriteriaId": "6739D89E-32C3-479D-B5F6-6865C5061FA5" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/34aeb4da20f93ac80a6291a2dbe7b9c6460e9b26", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4d3fcfe8464838b3920bc2b939d888e0b792934e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5aac9108a180fc06e28d4e7fb00247ce603b72ee", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/617f9934bb37993b9813832516f318ba874bcb7d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9892742f035f7aa7dcd2bb0750effa486db89576", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9924c80bd484340191e586110ca22bff23a49f2e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/db6fd92316a254be2097556f01bccecf560e53ce", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e8f73f620fee5f52653ed2da360121e4446575c5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0171.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0171.json index 89c18e36544..8890cffe91b 100644 --- a/CVE-2024/CVE-2024-01xx/CVE-2024-0171.json +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0171.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0171", "sourceIdentifier": "security_alert@emc.com", "published": "2024-06-25T16:15:24.197", - "lastModified": "2024-06-25T18:50:42.040", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-20T13:25:30.237", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.1, + "impactScore": 3.7 + }, { "source": "security_alert@emc.com", "type": "Secondary", @@ -51,10 +71,183 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r6615_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.8.3", + "matchCriteriaId": "8E330219-A0B2-4C66-B4BE-07CB5D21B819" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r6615:-:*:*:*:*:*:*:*", + "matchCriteriaId": "73077527-E12D-495C-AB91-C35109AE4C43" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r7615_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.8.3", + "matchCriteriaId": "304F6677-C563-402A-B0F1-2BBBBAF2E183" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r7615:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A74500E4-ADD2-4134-8D60-F4285C158F93" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r6625_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.8.3", + "matchCriteriaId": "40AB1808-81AA-460E-B6E7-FD54BB5735ED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r6625:-:*:*:*:*:*:*:*", + "matchCriteriaId": "09981777-C86C-4BC6-8834-97E8A2551897" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r7625_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.8.3", + "matchCriteriaId": "C7FE22FE-2AB9-4879-B0F5-F20E684ED024" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r7625:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F074158-252A-4C51-B80C-1B94E22A364A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_c6615_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3.3", + "matchCriteriaId": "AFAABA0C-5DD7-4928-9A91-A560366F3054" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_c6615:-:*:*:*:*:*:*:*", + "matchCriteriaId": "788C678A-92CF-45BD-99D5-AF18394C9860" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:xc_core_xc7625_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.8.3", + "matchCriteriaId": "EE5A04A2-5525-4286-BB76-9FCA7BB1F58A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:xc_core_xc7625:-:*:*:*:*:*:*:*", + "matchCriteriaId": "575F1C0C-37A7-45CF-86B1-7F56E14D211C" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000226253/dsa-2024-039-security-update-for-dell-amd-based-poweredge-server-vulnerability", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23897.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23897.json index c0acc1f29fc..ab93ca6573e 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23897.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23897.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23897", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-01-24T18:15:09.370", - "lastModified": "2024-08-20T01:00:01.757", - "vulnStatus": "Modified", + "lastModified": "2024-08-20T13:34:22.773", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2024-08-19", "cisaActionDue": "2024-09-09", @@ -70,7 +70,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-noinfo" + "value": "CWE-22" } ] }, @@ -143,7 +143,11 @@ }, { "url": "https://www.sonarsource.com/blog/excessive-expansion-uncovering-critical-security-vulnerabilities-in-jenkins/", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Exploit", + "Press/Media Coverage" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25009.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25009.json new file mode 100644 index 00000000000..558d6de3494 --- /dev/null +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25009.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-25009", + "sourceIdentifier": "85b1779b-6ecd-4f52-bcc5-73eac4659dcf", + "published": "2024-08-20T12:15:04.667", + "lastModified": "2024-08-20T12:15:04.667", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Ericsson Packet Core Controller (PCC) contains a vulnerability in Access and Mobility Management Function (AMF) where improper input validation can lead to denial of service which may result in service degradation." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "85b1779b-6ecd-4f52-bcc5-73eac4659dcf", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "85b1779b-6ecd-4f52-bcc5-73eac4659dcf", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://www.ericsson.com/en/about-us/security/psirt/security-bulletin-ericsson-packet-core-controller-pcc-august-2024", + "source": "85b1779b-6ecd-4f52-bcc5-73eac4659dcf" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41697.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41697.json new file mode 100644 index 00000000000..6bdeb31f0d3 --- /dev/null +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41697.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-41697", + "sourceIdentifier": "cna@cyber.gov.il", + "published": "2024-08-20T12:15:05.313", + "lastModified": "2024-08-20T12:15:05.313", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Priority -\u00a0CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@cyber.gov.il", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "cna@cyber.gov.il", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], + "references": [ + { + "url": "https://www.gov.il/en/Departments/faq/cve_advisories", + "source": "cna@cyber.gov.il" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41698.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41698.json new file mode 100644 index 00000000000..64c66c3c1e1 --- /dev/null +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41698.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-41698", + "sourceIdentifier": "cna@cyber.gov.il", + "published": "2024-08-20T12:15:06.007", + "lastModified": "2024-08-20T12:15:06.007", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Priority \u2013 CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@cyber.gov.il", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cna@cyber.gov.il", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://www.gov.il/en/Departments/faq/cve_advisories", + "source": "cna@cyber.gov.il" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41699.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41699.json new file mode 100644 index 00000000000..a936cfc2708 --- /dev/null +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41699.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-41699", + "sourceIdentifier": "cna@cyber.gov.il", + "published": "2024-08-20T12:15:06.650", + "lastModified": "2024-08-20T12:15:06.650", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Priority \u2013 CWE-552: Files or Directories Accessible to External Parties" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@cyber.gov.il", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cna@cyber.gov.il", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-552" + } + ] + } + ], + "references": [ + { + "url": "https://www.gov.il/en/Departments/faq/cve_advisories", + "source": "cna@cyber.gov.il" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41700.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41700.json new file mode 100644 index 00000000000..1c1fe11f76b --- /dev/null +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41700.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-41700", + "sourceIdentifier": "cna@cyber.gov.il", + "published": "2024-08-20T12:15:07.143", + "lastModified": "2024-08-20T12:15:07.143", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Barix \u2013 CWE-200 Exposure of Sensitive Information to an Unauthorized Actor" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@cyber.gov.il", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cna@cyber.gov.il", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://www.gov.il/en/Departments/faq/cve_advisories", + "source": "cna@cyber.gov.il" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-423xx/CVE-2024-42334.json b/CVE-2024/CVE-2024-423xx/CVE-2024-42334.json new file mode 100644 index 00000000000..c315bba5b09 --- /dev/null +++ b/CVE-2024/CVE-2024-423xx/CVE-2024-42334.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-42334", + "sourceIdentifier": "cna@cyber.gov.il", + "published": "2024-08-20T13:15:04.930", + "lastModified": "2024-08-20T13:15:04.930", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Hargal - CWE-284: Improper Access Control" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@cyber.gov.il", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "cna@cyber.gov.il", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://www.gov.il/en/Departments/faq/cve_advisories", + "source": "cna@cyber.gov.il" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-423xx/CVE-2024-42335.json b/CVE-2024/CVE-2024-423xx/CVE-2024-42335.json new file mode 100644 index 00000000000..3ae58ab5a8c --- /dev/null +++ b/CVE-2024/CVE-2024-423xx/CVE-2024-42335.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-42335", + "sourceIdentifier": "cna@cyber.gov.il", + "published": "2024-08-20T13:15:05.317", + "lastModified": "2024-08-20T13:15:05.317", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "7Twenty - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@cyber.gov.il", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "cna@cyber.gov.il", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.gov.il/en/Departments/faq/cve_advisories", + "source": "cna@cyber.gov.il" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-423xx/CVE-2024-42336.json b/CVE-2024/CVE-2024-423xx/CVE-2024-42336.json new file mode 100644 index 00000000000..f6b536f5a2a --- /dev/null +++ b/CVE-2024/CVE-2024-423xx/CVE-2024-42336.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-42336", + "sourceIdentifier": "cna@cyber.gov.il", + "published": "2024-08-20T13:15:05.617", + "lastModified": "2024-08-20T13:15:05.617", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Servision - CWE-287: Improper Authentication" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@cyber.gov.il", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "cna@cyber.gov.il", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://www.gov.il/en/Departments/faq/cve_advisories", + "source": "cna@cyber.gov.il" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42552.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42552.json new file mode 100644 index 00000000000..a227875163d --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42552.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42552", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T13:15:05.933", + "lastModified": "2024-08-20T13:15:05.933", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Hotel Management System commit 91caab8 was discovered to contain a SQL injection vulnerability via the book_id parameter at admin_room_history.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/topsky979/2386856df3f3ffa7bdc4738e24da4af3", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42553.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42553.json new file mode 100644 index 00000000000..0ea16b00dfa --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42553.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42553", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T13:15:06.073", + "lastModified": "2024-08-20T13:15:06.073", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Cross-Site Request Forgery (CSRF) in the component admin_room_added.php of Hotel Management System commit 91caab8 allows attackers to escalate privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/topsky979/4b22a22c73b16c7c22c06d4b3f033fdc", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42554.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42554.json new file mode 100644 index 00000000000..0c5c544b127 --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42554.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42554", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T13:15:06.190", + "lastModified": "2024-08-20T13:15:06.190", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Hotel Management System commit 91caab8 was discovered to contain a SQL injection vulnerability via the room_type parameter at admin_room_added.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/topsky979/7d2ebfe6dfa87eecf8f3e6d4eefc48ba", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42555.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42555.json new file mode 100644 index 00000000000..4a64da8e573 --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42555.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42555", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T13:15:06.303", + "lastModified": "2024-08-20T13:15:06.303", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Cross-Site Request Forgery (CSRF) in the component admin_room_removed.php of Hotel Management System commit 91caab8 allows attackers to escalate privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/topsky979/afd445b90e13a27a6422cea2f5ff0f64", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42556.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42556.json new file mode 100644 index 00000000000..cf099931d18 --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42556.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42556", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T13:15:06.420", + "lastModified": "2024-08-20T13:15:06.420", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Hotel Management System commit 91caab8 was discovered to contain a SQL injection vulnerability via the room_type parameter at admin_room_removed.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/topsky979/9688bcdd3e05ba79ebf4ff1042609b20", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42557.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42557.json new file mode 100644 index 00000000000..e78a9ab1a06 --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42557.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42557", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T13:15:06.523", + "lastModified": "2024-08-20T13:15:06.523", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Cross-Site Request Forgery (CSRF) in the component admin_modify_room.php of Hotel Management System commit 91caab8 allows attackers to escalate privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/topsky979/0785597ae7abc8f10cd5c5537f5467b5", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42558.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42558.json new file mode 100644 index 00000000000..170b963dcfa --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42558.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42558", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T13:15:06.623", + "lastModified": "2024-08-20T13:15:06.623", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Hotel Management System commit 91caab8 was discovered to contain a SQL injection vulnerability via the book_id parameter at admin_modify_room.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/topsky979/9651b4977e86f5b1bcae7a8959ff3342", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42559.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42559.json new file mode 100644 index 00000000000..6fc41c4316f --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42559.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42559", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T13:15:06.730", + "lastModified": "2024-08-20T13:15:06.730", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in the login component (process_login.php) of Hotel Management System commit 79d688 allows attackers to authenticate without providing a valid password." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/topsky979/99d2ebf7b5598ef227262ba1b2bb392f/edit", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42560.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42560.json new file mode 100644 index 00000000000..8c8f73f7ff4 --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42560.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42560", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T13:15:06.830", + "lastModified": "2024-08-20T13:15:06.830", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in the component update_page_details.php of Blood Bank And Donation Management System commit dc9e039 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Page Details parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/topsky979/4c05ee72ab4b365ef81c199aaa0558d0", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42561.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42561.json new file mode 100644 index 00000000000..d18aa45b677 --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42561.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42561", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T13:15:06.920", + "lastModified": "2024-08-20T13:15:06.920", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Pharmacy Management System commit a2efc8 was discovered to contain a SQL injection vulnerability via the invoice_number parameter at sales_report.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/topsky979/5d2d9104dc4dd7f5dda99cbbd615a0b8", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42562.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42562.json new file mode 100644 index 00000000000..8b5c072ae3e --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42562.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42562", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T13:15:07.020", + "lastModified": "2024-08-20T13:15:07.020", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Pharmacy Management System commit a2efc8 was discovered to contain a SQL injection vulnerability via the invoice_number parameter at preview.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/topsky979/2dcca275bcc18e8058cefef714a2f61b", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42563.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42563.json new file mode 100644 index 00000000000..d0076d26f47 --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42563.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42563", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T13:15:07.123", + "lastModified": "2024-08-20T13:15:07.123", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An arbitrary file upload vulnerability in ERP commit 44bd04 allows attackers to execute arbitrary code via uploading a crafted HTML file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/topsky979/f645f99661ff33aed44d65dfa49e36fe", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42564.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42564.json new file mode 100644 index 00000000000..bf0beef19fe --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42564.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42564", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T13:15:07.243", + "lastModified": "2024-08-20T13:15:07.243", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "ERP commit 44bd04 was discovered to contain a SQL injection vulnerability via the id parameter at /index.php/basedata/inventory/delete?action=delete." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/topsky979/8ccda41cac32fe781b89c6c0db245ab7", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42565.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42565.json new file mode 100644 index 00000000000..d8667a02d01 --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42565.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42565", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T13:15:07.347", + "lastModified": "2024-08-20T13:15:07.347", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "ERP commit 44bd04 was discovered to contain a SQL injection vulnerability via the id parameter at /index.php/basedata/contact/delete?action=delete." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/topsky979/648f2cd4f5e58560cbc9308d06e2f876", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42566.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42566.json new file mode 100644 index 00000000000..1e04c6f4bfa --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42566.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42566", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T13:15:07.443", + "lastModified": "2024-08-20T13:15:07.443", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the password parameter at login.php" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/topsky979/95a8f0d24f1d409a14df4c04e0a8c547", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42567.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42567.json new file mode 100644 index 00000000000..e43f0141405 --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42567.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42567", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T13:15:07.540", + "lastModified": "2024-08-20T13:15:07.540", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the sid parameter at /search.php?action=2." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/topsky979/96ba3f6ccd333480aa86e7078c4886d7", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42568.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42568.json new file mode 100644 index 00000000000..bace16d659b --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42568.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42568", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T13:15:07.643", + "lastModified": "2024-08-20T13:15:07.643", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the transport parameter at vehicle.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/topsky979/38a30275374ef796ab860795f5df4dac", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42569.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42569.json new file mode 100644 index 00000000000..3818f746986 --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42569.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42569", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T13:15:07.733", + "lastModified": "2024-08-20T13:15:07.733", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the medium parameter at paidclass.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/topsky979/20a81dbf47d371e1dabe08f350c8185d", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42570.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42570.json new file mode 100644 index 00000000000..46a1aed71b3 --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42570.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42570", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T13:15:07.830", + "lastModified": "2024-08-20T13:15:07.830", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the medium parameter at admininsert.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/topsky979/1d9ebca101fc5e30040436d70e522102", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42571.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42571.json new file mode 100644 index 00000000000..31507565c69 --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42571.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42571", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T13:15:07.917", + "lastModified": "2024-08-20T13:15:07.917", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the medium parameter at insertattendance.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/topsky979/5c8e289fa66702fd3acbed558ee449dd", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42572.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42572.json new file mode 100644 index 00000000000..e8ea17842f0 --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42572.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42572", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T13:15:08.007", + "lastModified": "2024-08-20T13:15:08.007", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the medium parameter at unitmarks.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/topsky979/c4c9508b8b3ed11f098f716d46572295", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42573.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42573.json new file mode 100644 index 00000000000..2c5b0fe2a11 --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42573.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42573", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T13:15:08.097", + "lastModified": "2024-08-20T13:15:08.097", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the medium parameter at dtmarks.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/topsky979/d44aabca29c1a6a9845fde465b924e79", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42574.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42574.json new file mode 100644 index 00000000000..8b1ca1e0e46 --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42574.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42574", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T13:15:08.193", + "lastModified": "2024-08-20T13:15:08.193", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the medium parameter at attendance.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/topsky979/7064f8bbd3977ee665a098efcd0170c0", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42575.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42575.json new file mode 100644 index 00000000000..973311a26e9 --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42575.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42575", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T13:15:08.283", + "lastModified": "2024-08-20T13:15:08.283", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the medium parameter at substaff.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/topsky979/2fddc00b33b038cd778c1e4fb1936a15", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42576.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42576.json new file mode 100644 index 00000000000..35496f0c066 --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42576.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42576", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T13:15:08.377", + "lastModified": "2024-08-20T13:15:08.377", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Cross-Site Request Forgery (CSRF) in the component edit_categorie.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/topsky979/50a1d8ad7effd9ccd089952602c831d3", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42577.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42577.json new file mode 100644 index 00000000000..05abb3f28e8 --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42577.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42577", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T13:15:08.477", + "lastModified": "2024-08-20T13:15:08.477", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Cross-Site Request Forgery (CSRF) in the component add_product.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/topsky979/20ad7b251f2905db38e7a6566b1d46cc", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42578.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42578.json new file mode 100644 index 00000000000..f306bcda390 --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42578.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42578", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T13:15:08.573", + "lastModified": "2024-08-20T13:15:08.573", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Cross-Site Request Forgery (CSRF) in the component edit_product.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/topsky979/5eacc7e418e3b73b7ad1fa05d1a72aeb", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42579.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42579.json new file mode 100644 index 00000000000..5357783bc1e --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42579.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42579", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T13:15:08.687", + "lastModified": "2024-08-20T13:15:08.687", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Cross-Site Request Forgery (CSRF) in the component add_group.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/topsky979/ed59fb8b35a220dfa064a3a3cb1ecb1b", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42580.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42580.json new file mode 100644 index 00000000000..18917938997 --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42580.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42580", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T13:15:08.793", + "lastModified": "2024-08-20T13:15:08.793", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Cross-Site Request Forgery (CSRF) in the component edit_group.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/topsky979/8a05309486637d8c6ce8c6624ec1e897", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42581.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42581.json new file mode 100644 index 00000000000..370d7ba29dc --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42581.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42581", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T13:15:08.890", + "lastModified": "2024-08-20T13:15:08.890", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Cross-Site Request Forgery (CSRF) in the component delete_group.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/topsky979/2bd26343ccdff7c759f62d332c8caff6", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42582.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42582.json new file mode 100644 index 00000000000..3fb314877e2 --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42582.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42582", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T13:15:08.987", + "lastModified": "2024-08-20T13:15:08.987", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Cross-Site Request Forgery (CSRF) in the component delete_categorie.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/topsky979/c0d78b257ce1e661be30de1ce9551d27", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42583.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42583.json new file mode 100644 index 00000000000..70baf7a160b --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42583.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42583", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T13:15:09.077", + "lastModified": "2024-08-20T13:15:09.077", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Cross-Site Request Forgery (CSRF) in the component delete_user.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/topsky979/dac0206b8de14763bdbe2b6bb7020cdc", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42584.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42584.json new file mode 100644 index 00000000000..93b3faccfa3 --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42584.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42584", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T13:15:09.173", + "lastModified": "2024-08-20T13:15:09.173", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Cross-Site Request Forgery (CSRF) in the component delete_product.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/topsky979/6037eaac5749430c29cf15fdd9df0ba5", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42585.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42585.json new file mode 100644 index 00000000000..6219bfbf58d --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42585.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42585", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T13:15:09.273", + "lastModified": "2024-08-20T13:15:09.273", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Cross-Site Request Forgery (CSRF) in the component delete_media.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/topsky979/33de7a4bd7a4517a26fa4e4911b7fb1d", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42586.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42586.json new file mode 100644 index 00000000000..3ae35293fe1 --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42586.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42586", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T13:15:09.367", + "lastModified": "2024-08-20T13:15:09.367", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Cross-Site Request Forgery (CSRF) in the component categorie.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/topsky979/533b962efb1779e397a241bf7a19643c", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5805.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5805.json index b9249ba18d1..4ee005c2eeb 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5805.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5805.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5805", "sourceIdentifier": "security@progress.com", "published": "2024-06-25T15:15:15.603", - "lastModified": "2024-06-25T18:50:42.040", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-20T13:37:58.923", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + }, { "source": "security@progress.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + }, { "source": "security@progress.com", "type": "Secondary", @@ -51,14 +81,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:progress:moveit_gateway:2024.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2E1B8970-B2A2-413B-AE80-2372A147230F" + } + ] + } + ] + } + ], "references": [ { "url": "https://community.progress.com/s/article/MOVEit-Gateway-Critical-Security-Alert-Bulletin-June-2024-CVE-2024-5805", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.progress.com/moveit", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6371.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6371.json index 47998442bd7..8c00a0bd54d 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6371.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6371.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6371", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-27T13:16:01.923", - "lastModified": "2024-06-27T18:15:21.690", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-20T13:21:59.600", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:pool_of_bethesda_online_reservation_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9DE894B7-EE1B-4ABB-8881-CF3BA3911206" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/L1OudFd8cl09/CVE/blob/main/25_06_2024_b.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.269804", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.269804", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.364101", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6372.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6372.json index 79859066d42..ec1ee18ec80 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6372.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6372.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6372", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-27T13:16:02.440", - "lastModified": "2024-06-27T17:11:52.390", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-20T13:31:40.793", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Galaxy-lrc/cve/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.269805", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.269805", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.364752", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6373.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6373.json index b3112f85bf5..493386d80dc 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6373.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6373.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6373", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-27T13:16:02.893", - "lastModified": "2024-06-27T18:15:22.280", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-20T13:32:44.213", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kevinwong:online_food_ordering_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9E6AA4AA-216E-471B-9107-65E50C880042" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Abyssun/abyssun-/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.269806", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.269806", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.364646", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-69xx/CVE-2024-6918.json b/CVE-2024/CVE-2024-69xx/CVE-2024-6918.json new file mode 100644 index 00000000000..a37ed23b14b --- /dev/null +++ b/CVE-2024/CVE-2024-69xx/CVE-2024-6918.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-6918", + "sourceIdentifier": "cybersecurity@se.com", + "published": "2024-08-20T13:15:09.450", + "lastModified": "2024-08-20T13:15:09.450", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability\nexists that could cause a crash of the Accutech Manager when receiving a specially crafted\nrequest over port 2536/TCP." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cybersecurity@se.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cybersecurity@se.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-226-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-226-01.pdf", + "source": "cybersecurity@se.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7683.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7683.json index 04e70b91c56..8f0b553e85f 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7683.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7683.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7683", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-12T13:38:56.333", - "lastModified": "2024-08-12T13:41:36.517", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-20T13:52:50.987", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,51 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:advocate_office_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D969EB85-DD8C-48DD-9D1F-58755EB5343A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/samwbs/kortexcve/blob/main/xss_addcase_stage/xss_addcase_stage.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.274140", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.274140", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.389162", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7684.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7684.json index 0a77c0e507b..fcb05b30b83 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7684.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7684.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7684", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-12T13:38:56.783", - "lastModified": "2024-08-12T13:41:36.517", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-20T13:53:24.447", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,51 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:advocate_office_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D969EB85-DD8C-48DD-9D1F-58755EB5343A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/samwbs/kortexcve/blob/main/xss_add_act/XSS_add_act.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.274141", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.274141", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.389163", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7685.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7685.json index fc7fb50a209..48295aad5e5 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7685.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7685.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7685", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-12T13:38:57.293", - "lastModified": "2024-08-12T13:41:36.517", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-20T13:53:51.947", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,51 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:advocate_office_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D969EB85-DD8C-48DD-9D1F-58755EB5343A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/samwbs/kortexcve/blob/main/xss_adds/XSS_adds.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.274142", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.274142", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.389164", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index d6d92cfee82..304e868a787 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-08-20T12:00:17.875105+00:00 +2024-08-20T14:00:18.707768+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-08-20T11:54:57.010000+00:00 +2024-08-20T13:54:00.933000+00:00 ``` ### Last Data Feed Release @@ -33,24 +33,55 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -260568 +260612 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `44` -- [CVE-2024-21689](CVE-2024/CVE-2024-216xx/CVE-2024-21689.json) (`2024-08-20T10:15:04.103`) -- [CVE-2024-28829](CVE-2024/CVE-2024-288xx/CVE-2024-28829.json) (`2024-08-20T10:15:05.693`) -- [CVE-2024-7054](CVE-2024/CVE-2024-70xx/CVE-2024-7054.json) (`2024-08-20T11:15:03.540`) +- [CVE-2024-42563](CVE-2024/CVE-2024-425xx/CVE-2024-42563.json) (`2024-08-20T13:15:07.123`) +- [CVE-2024-42564](CVE-2024/CVE-2024-425xx/CVE-2024-42564.json) (`2024-08-20T13:15:07.243`) +- [CVE-2024-42565](CVE-2024/CVE-2024-425xx/CVE-2024-42565.json) (`2024-08-20T13:15:07.347`) +- [CVE-2024-42566](CVE-2024/CVE-2024-425xx/CVE-2024-42566.json) (`2024-08-20T13:15:07.443`) +- [CVE-2024-42567](CVE-2024/CVE-2024-425xx/CVE-2024-42567.json) (`2024-08-20T13:15:07.540`) +- [CVE-2024-42568](CVE-2024/CVE-2024-425xx/CVE-2024-42568.json) (`2024-08-20T13:15:07.643`) +- [CVE-2024-42569](CVE-2024/CVE-2024-425xx/CVE-2024-42569.json) (`2024-08-20T13:15:07.733`) +- [CVE-2024-42570](CVE-2024/CVE-2024-425xx/CVE-2024-42570.json) (`2024-08-20T13:15:07.830`) +- [CVE-2024-42571](CVE-2024/CVE-2024-425xx/CVE-2024-42571.json) (`2024-08-20T13:15:07.917`) +- [CVE-2024-42572](CVE-2024/CVE-2024-425xx/CVE-2024-42572.json) (`2024-08-20T13:15:08.007`) +- [CVE-2024-42573](CVE-2024/CVE-2024-425xx/CVE-2024-42573.json) (`2024-08-20T13:15:08.097`) +- [CVE-2024-42574](CVE-2024/CVE-2024-425xx/CVE-2024-42574.json) (`2024-08-20T13:15:08.193`) +- [CVE-2024-42575](CVE-2024/CVE-2024-425xx/CVE-2024-42575.json) (`2024-08-20T13:15:08.283`) +- [CVE-2024-42576](CVE-2024/CVE-2024-425xx/CVE-2024-42576.json) (`2024-08-20T13:15:08.377`) +- [CVE-2024-42577](CVE-2024/CVE-2024-425xx/CVE-2024-42577.json) (`2024-08-20T13:15:08.477`) +- [CVE-2024-42578](CVE-2024/CVE-2024-425xx/CVE-2024-42578.json) (`2024-08-20T13:15:08.573`) +- [CVE-2024-42579](CVE-2024/CVE-2024-425xx/CVE-2024-42579.json) (`2024-08-20T13:15:08.687`) +- [CVE-2024-42580](CVE-2024/CVE-2024-425xx/CVE-2024-42580.json) (`2024-08-20T13:15:08.793`) +- [CVE-2024-42581](CVE-2024/CVE-2024-425xx/CVE-2024-42581.json) (`2024-08-20T13:15:08.890`) +- [CVE-2024-42582](CVE-2024/CVE-2024-425xx/CVE-2024-42582.json) (`2024-08-20T13:15:08.987`) +- [CVE-2024-42583](CVE-2024/CVE-2024-425xx/CVE-2024-42583.json) (`2024-08-20T13:15:09.077`) +- [CVE-2024-42584](CVE-2024/CVE-2024-425xx/CVE-2024-42584.json) (`2024-08-20T13:15:09.173`) +- [CVE-2024-42585](CVE-2024/CVE-2024-425xx/CVE-2024-42585.json) (`2024-08-20T13:15:09.273`) +- [CVE-2024-42586](CVE-2024/CVE-2024-425xx/CVE-2024-42586.json) (`2024-08-20T13:15:09.367`) +- [CVE-2024-6918](CVE-2024/CVE-2024-69xx/CVE-2024-6918.json) (`2024-08-20T13:15:09.450`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `11` -- [CVE-2020-7357](CVE-2020/CVE-2020-73xx/CVE-2020-7357.json) (`2024-08-20T11:54:57.010`) -- [CVE-2024-43202](CVE-2024/CVE-2024-432xx/CVE-2024-43202.json) (`2024-08-20T08:15:05.240`) +- [CVE-2022-48742](CVE-2022/CVE-2022-487xx/CVE-2022-48742.json) (`2024-08-20T13:44:57.483`) +- [CVE-2022-48743](CVE-2022/CVE-2022-487xx/CVE-2022-48743.json) (`2024-08-20T13:54:00.933`) +- [CVE-2024-0171](CVE-2024/CVE-2024-01xx/CVE-2024-0171.json) (`2024-08-20T13:25:30.237`) +- [CVE-2024-23897](CVE-2024/CVE-2024-238xx/CVE-2024-23897.json) (`2024-08-20T13:34:22.773`) +- [CVE-2024-5805](CVE-2024/CVE-2024-58xx/CVE-2024-5805.json) (`2024-08-20T13:37:58.923`) +- [CVE-2024-6371](CVE-2024/CVE-2024-63xx/CVE-2024-6371.json) (`2024-08-20T13:21:59.600`) +- [CVE-2024-6372](CVE-2024/CVE-2024-63xx/CVE-2024-6372.json) (`2024-08-20T13:31:40.793`) +- [CVE-2024-6373](CVE-2024/CVE-2024-63xx/CVE-2024-6373.json) (`2024-08-20T13:32:44.213`) +- [CVE-2024-7683](CVE-2024/CVE-2024-76xx/CVE-2024-7683.json) (`2024-08-20T13:52:50.987`) +- [CVE-2024-7684](CVE-2024/CVE-2024-76xx/CVE-2024-7684.json) (`2024-08-20T13:53:24.447`) +- [CVE-2024-7685](CVE-2024/CVE-2024-76xx/CVE-2024-7685.json) (`2024-08-20T13:53:51.947`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 3db8ffa54ec..8856868f386 100644 --- a/_state.csv +++ b/_state.csv @@ -162392,7 +162392,7 @@ CVE-2020-7352,0,0,afc6ee4cf18db2ed0456ede05649052adb58c120b557434e96b16354b7b1a8 CVE-2020-7354,0,0,f598c4ab4c8e0fc6e1fa1518c897e666502a41063fa43ef22528036e255b8a0e,2020-07-02T14:16:19.047000 CVE-2020-7355,0,0,21678348c6ab54bd647cb0adf24cbadf80a4e86307a0a93ab682f4751f2d3e81,2020-07-06T18:00:10.870000 CVE-2020-7356,0,0,c475bcad58cc418896a927dd04fbc402403e3108dc4ff2f5ff0e24a52b9866e9,2020-08-12T13:39:55.297000 -CVE-2020-7357,0,1,bac4a7276d9f5d71ccc44054da41226cd390aff37577fe9ff7d3f99d691228a5,2024-08-20T11:54:57.010000 +CVE-2020-7357,0,0,bac4a7276d9f5d71ccc44054da41226cd390aff37577fe9ff7d3f99d691228a5,2024-08-20T11:54:57.010000 CVE-2020-7358,0,0,d4d7bfd2ece7759444149b05a38b24ed8fd0f90837ce8c52cd20acf0eb7d49a6,2020-09-28T18:36:41.360000 CVE-2020-7360,0,0,5aa402d7a3007a8bc874c17b9213c25200a862b036297cf2dce435e8b34f5b8f,2020-08-19T21:26:02.727000 CVE-2020-7361,0,0,714be09efee1b86a48a42c5d0d463785915953295001fd0dd7eec0a6eec0925f,2020-08-10T16:57:02.577000 @@ -212230,8 +212230,8 @@ CVE-2022-48739,0,0,00da9e79eba58b72da4eb9f5fe5c2b84557c8f37a2ad7a0724f316e8ecfe4 CVE-2022-4874,0,0,d259c1db6680ce288191bcc87dca743951302233b28b86107a9fa3c0b9ed4550,2023-11-07T03:59:09.523000 CVE-2022-48740,0,0,a7eb1a4fcfc2023fb44223bb3669f06339f2ab543ff2db91386fcf93c418fa7e,2024-08-19T17:03:31.843000 CVE-2022-48741,0,0,f7a9ce9b119d13af0b410c25cec09275b8f2fb2239b9abc03783d7e15ae6e5f9,2024-08-19T17:34:17.233000 -CVE-2022-48742,0,0,47877914826bbcca848a5a88eb82fc6bd0070089fc81e4e2400d0b8e069d2cb2,2024-06-20T12:43:25.663000 -CVE-2022-48743,0,0,210b0ade111d6b4df1d1747f8af54560ce03bf97e3f6d5414964b3b2b459b801,2024-06-20T12:43:25.663000 +CVE-2022-48742,0,1,955f0c7fbe8c4fb04c29ac68d1923a29168477849bc7b7e7e1a38f90faa04e83,2024-08-20T13:44:57.483000 +CVE-2022-48743,0,1,016aa198197a6069a5b600f7b75e21187063a616d0f2a55d2373780c15590e81,2024-08-20T13:54:00.933000 CVE-2022-48744,0,0,db97d2408a3729b8332ee7728404bcf0a8034b20ec9bb81fa52c25169879c043,2024-06-20T12:43:25.663000 CVE-2022-48745,0,0,41db11ed51a619f18bf8566d3a9646fcce3f1ca7e8c8d1b8f24a053db7635b13,2024-06-20T12:43:25.663000 CVE-2022-48746,0,0,e0fa12e9f2d5b9a8bc1db423dcc6c83d2f1745d072ea799cb50d0201d1a5ab3d,2024-06-20T12:43:25.663000 @@ -241079,7 +241079,7 @@ CVE-2024-0167,0,0,744bc993f59ae73af2914a6819025a9b84a9608f7404a5affc347dddf19a56 CVE-2024-0168,0,0,b3ed681274021d4ad23f5d3a33ac337cf4d9042b0fec464247a45e1c1e71eb19,2024-02-16T13:40:44.663000 CVE-2024-0169,0,0,f3c67b7bc44e30be0f91d72e02de3315174c543380b368caf20e16a7ec6999a6,2024-08-14T10:15:05.883000 CVE-2024-0170,0,0,cad01b4a5afa824941a3be2fdd3602b85ef95f3075f06c5677f74bc8ee9b7c8f,2024-02-15T16:55:09.957000 -CVE-2024-0171,0,0,ab9fa7c61d83383287bb7bbcd6eed02e80acab1958549a5d7b5fc932c5395629,2024-06-25T18:50:42.040000 +CVE-2024-0171,0,1,2f3d7f2f1f78d639aa160b093e5b427e217b92a685ebc1ab123ac7afd9616a22,2024-08-20T13:25:30.237000 CVE-2024-0172,0,0,e309e09fe60408c3f84daa7e2d14db1e3ae80b43eddc40c52c9068b5a4d6e6ec,2024-04-03T12:38:04.840000 CVE-2024-0173,0,0,b886d64d4b6132c8c30f9fd36eab248afbbe9e679900ffa9aa922365ae506ae7,2024-03-13T18:15:58.530000 CVE-2024-0181,0,0,bf8c23eeb8eccfd67271292b6e90342c941acaef0e98a66f834ab435fd911b64,2024-05-17T02:34:22.837000 @@ -243934,7 +243934,7 @@ CVE-2024-21684,0,0,59f12a4b04761da303d7e3a40c8e6edc45c41d4945c065d5a0ffea7371041 CVE-2024-21685,0,0,5660fcc85eb1dde5c65259d6d6205ae74624ad923dcf6470bb4f3577f99d7f00,2024-06-20T12:44:01.637000 CVE-2024-21686,0,0,4a77c3c56e7b5b00a78de09ce573bf8e0630b6f60379d0ccdce9209c8559bd43,2024-07-17T13:34:20.520000 CVE-2024-21687,0,0,376ba9a42cfc804d783dd58059d1accf85ade36be58bc6e24e95588c80302a09,2024-08-01T13:46:48.050000 -CVE-2024-21689,1,1,f0f6270ad75f42f9e86f2978ae6cfad32cfccffa4225a56d905159e7cada06df,2024-08-20T10:15:04.103000 +CVE-2024-21689,0,0,f0f6270ad75f42f9e86f2978ae6cfad32cfccffa4225a56d905159e7cada06df,2024-08-20T10:15:04.103000 CVE-2024-2169,0,0,25fcbf8b9d7008ea9954a41615969f4d36543f4a604eb878bcc8b4c5c18a9fe0,2024-08-02T17:35:41.760000 CVE-2024-2170,0,0,758d6332b5fccd657d38a7eddcc769e16fb72e0c1b6514443e29b8614302434a,2024-03-26T12:55:05.010000 CVE-2024-2171,0,0,e9c79cd9676afcf55166b18cc4887c5a70983811183f36611429f962ee8d8a26,2024-06-07T14:56:05.647000 @@ -245466,7 +245466,7 @@ CVE-2024-23893,0,0,164d34330c45802f3294effcca33fdb409e7a0b03670023eb0749752670b7 CVE-2024-23894,0,0,889e17a969f38341fe271e7476c4c00ec7834f36aa4750d6b24eda8dbc65e9f9,2024-02-15T10:15:20.110000 CVE-2024-23895,0,0,63b9df77b0dfe3156d702037b8256c94f0310299e58028bb29ff7e75ab1ccefd,2024-02-15T10:15:20.403000 CVE-2024-23896,0,0,2d68c15af19ed8b045c5f16b74c7daadbb5e999aff70f245f4f1ca2defc4aa73,2024-02-15T10:15:20.657000 -CVE-2024-23897,0,0,f0c0ebaa90565b9f4c7019324540779f3bbe5add1e7c9ec5f50a60cf3df1835e,2024-08-20T01:00:01.757000 +CVE-2024-23897,0,1,c83d1994f6c073666478d860c9bb4da8143c864413f74371bcb20503700b1742,2024-08-20T13:34:22.773000 CVE-2024-23898,0,0,9962562a99e711a1d1b8fcb160c14631afd493f3a9f73290bf49c075765f73c8,2024-05-14T15:01:24.790000 CVE-2024-23899,0,0,ba79d7c391f656b46c5ad4456d441adc8729de1168ad27fcd60687a8d33b9157,2024-01-31T18:43:39.183000 CVE-2024-2390,0,0,593c8d31509ee966f2939016d9952aa22804413956e5e4bcfec8a17bd5fc173d,2024-03-18T19:40:00.173000 @@ -246098,6 +246098,7 @@ CVE-2024-25004,0,0,b1eaa30b45a2beac602111a556e73283df1fde1d2d56447f15cd2e12b3d43 CVE-2024-25006,0,0,5b722f2e87bb2f2cd1327a954681e67bfe99d5442b01159ab458f524449bcffe,2024-08-01T13:47:32.460000 CVE-2024-25007,0,0,8168166db4b2b463b1c077994d5d41f318578553eda571604b31f6006eab6cd4,2024-04-29T19:48:09.017000 CVE-2024-25008,0,0,edae19780623ecb3fe0e59b27c808259dfd74c0b079a788dd904812d074243f7,2024-08-19T13:00:23.117000 +CVE-2024-25009,1,1,fa4cf85f40c91db0865dc4774b98d0658d2f0fe65a309e270e7f0bbbf51ae6bc,2024-08-20T12:15:04.667000 CVE-2024-2501,0,0,6ce26352b8e14756a33573972eeb4c8a06096eee07ab0fb0ebb1c9238a943b1a,2024-04-10T13:23:38.787000 CVE-2024-25015,0,0,4c1212c8f769823bd4e7049fb129f848dc20c143fc1cc72b02abca5f7451e069,2024-05-01T19:50:25.633000 CVE-2024-25016,0,0,0e9311458b59df4142779e7a8b1d9bd170deea1a4bb4a555b03bbf822c263b92,2024-03-04T13:58:23.447000 @@ -248839,7 +248840,7 @@ CVE-2024-28825,0,0,2060c8862968982d4a6159b0b62313dec95ecc020293b85f137ce41396383 CVE-2024-28826,0,0,ccabc68ae1502fb496d2010a22f66c953a12ff1a849372d7235937980a01c570,2024-05-29T13:02:09.280000 CVE-2024-28827,0,0,30d6d403e5c79dbab459dc4233554203969c32826737ea25dceb545e947896f1,2024-07-11T13:05:54.930000 CVE-2024-28828,0,0,f569edfaae2cfaafb15d4f5e29614839e3689bfe76be347c8b67efdf6d0be50b,2024-08-07T17:57:38.413000 -CVE-2024-28829,1,1,a7fa399c45c4b30b83fa5874f8d0009a31e3673b80cb4e5fb7a82b85175ff469,2024-08-20T10:15:05.693000 +CVE-2024-28829,0,0,a7fa399c45c4b30b83fa5874f8d0009a31e3673b80cb4e5fb7a82b85175ff469,2024-08-20T10:15:05.693000 CVE-2024-2883,0,0,4414164b8fa79ba498c6ddbb6ab7a825d3f0a39397b4604f63f00efe5e5aaa16,2024-07-03T01:53:37.420000 CVE-2024-28830,0,0,49bb68528483eea32fe70c10feda0199ddfef50b4330a9b74a5779b200dbf298,2024-06-26T12:44:29.693000 CVE-2024-28831,0,0,8b0cc22b019b2f22717d4926d7f18f8c0f1245da30fda97cee3d4dd670ef131d,2024-06-25T12:24:17.873000 @@ -257064,7 +257065,11 @@ CVE-2024-41693,0,0,1ab2b4b7ed8f921d2bbd47d1a0a36dd7d080353c42c5a60fc142ad6c40def CVE-2024-41694,0,0,2beb2cafa0b59f0afe42f2c196fff55bc2e400d880d35147a1b32c39271b6739,2024-07-30T13:32:45.943000 CVE-2024-41695,0,0,cfeced4f0e3fb4495c4233c92c745e7bccce82ccc90ae4a6ab56dbb48fdfcc87,2024-07-30T13:32:45.943000 CVE-2024-41696,0,0,35f7b98c6839466c4d2a4eebac08206f0700aa8aa3101c5b590c4468fe7a3828,2024-07-30T13:32:45.943000 +CVE-2024-41697,1,1,0e39d709db8b7f128921881304ffa3c1d2e9ad61adc468350a8861246f4f9484,2024-08-20T12:15:05.313000 +CVE-2024-41698,1,1,adba2018df2ddf73f23abafa04b53ddd04276a58e8e79a7798cb87c2d0ba6029,2024-08-20T12:15:06.007000 +CVE-2024-41699,1,1,05d944ce148e0aac0790ef19169a095d029a6489f699528da28073c94cb7442b,2024-08-20T12:15:06.650000 CVE-2024-4170,0,0,62435f89f96f29247c44c5e589e7b97688efd61a202de53db89b1fe5fd4975dc,2024-06-04T19:20:31.883000 +CVE-2024-41700,1,1,c0bc9c19ce12da233b94fb17cb0046d2d87acefe399d9f3b074bf0738db587d2,2024-08-20T12:15:07.143000 CVE-2024-41701,0,0,dd24aefcbab2e7aed118f6b42dbe2e651c1bc0fc56ceb2d95afa6932def1c843,2024-07-30T13:32:45.943000 CVE-2024-41702,0,0,f2f834cb62e19913572ef56e0684de02f9402451a44fa1f9eb0dac16f09c6db8,2024-08-08T20:31:10.510000 CVE-2024-41703,0,0,41c5e0de4e6f71abb99bf65b9b9d8795b6450a23d530f3b9308a194d3b5a310a,2024-08-01T13:59:05.890000 @@ -257479,6 +257484,9 @@ CVE-2024-42320,0,0,3bb9745120c3e683aefbafbca3ae9140002adac221663a12333f744da45f1 CVE-2024-42321,0,0,1716db5db6c984bf2ebbd691b80440a9181fa253c6bc8c5d00954d830484e312,2024-08-19T12:59:59.177000 CVE-2024-42322,0,0,2accb2a45b605eba549de2a0c83236102f9dab689f1b61dc800f0c45a0f92db4,2024-08-19T12:59:59.177000 CVE-2024-4233,0,0,e3336c43dd885f8db6271cd8e49f7796169d1b724e733d53d39e8dcd56cab238,2024-05-08T17:05:24.083000 +CVE-2024-42334,1,1,0335754e5d21a0f775db36029a4f55d3618ba3884b597925321a4edb0615c033,2024-08-20T13:15:04.930000 +CVE-2024-42335,1,1,291822ab823c9db0538df30ba1730d3f1db294afc4e2b4c4af46bd191c8f8933,2024-08-20T13:15:05.317000 +CVE-2024-42336,1,1,b2ac5ee23b1952f0577bf83940ba82689073cfdcfe6930e314d53947dbdb9437,2024-08-20T13:15:05.617000 CVE-2024-4234,0,0,18c98986f4d0c323ca7a76881b57d07f11d740fced15b647da44016411c790ed,2024-04-26T15:32:22.523000 CVE-2024-42347,0,0,9d56c3d6f460e2251d08d50a3e874b7efeb364cadb050367418d1be0b31e15cb,2024-08-12T18:52:08.163000 CVE-2024-42348,0,0,9049ba06c12fadbe924de4e1d7650091813be7f3a3306b9434f7ebd8620eed32,2024-08-05T12:41:45.957000 @@ -257577,9 +257585,44 @@ CVE-2024-42545,0,0,f468a16273bd93e60bf7c85edbb037a37f95ddbef27d46e806b8081634956 CVE-2024-42546,0,0,fb60d203dacd557a0d6c3dd4a088a3933e203b772ae4b090e279b0a2f7b980c9,2024-08-15T16:35:15.603000 CVE-2024-42547,0,0,35eeb010fca94dc794f14fe3c29b0586f2dd6b453f1de383f4e89dde1cb85973,2024-08-13T17:08:12.543000 CVE-2024-4255,0,0,35fd058a4cc0a80e19d25400a3e944345c636d8ef400085f905d7b019af7edbf,2024-06-04T19:20:34.420000 +CVE-2024-42552,1,1,edcea8350a649359608d878c2b9f374e5615388df7903f8b4ce3514a0c290caf,2024-08-20T13:15:05.933000 +CVE-2024-42553,1,1,f2edb6eccb17b73a391844d865af522e7902b8df0649c2de6674aabdf33d0cd6,2024-08-20T13:15:06.073000 +CVE-2024-42554,1,1,b08e6f968d01c8acb902c77f2be9dcab19447e5f54a5b8c2e4da91f07d8fd251,2024-08-20T13:15:06.190000 +CVE-2024-42555,1,1,47bc194887cd8b6390fc9acd712e261d3c5a4217f31e29ddf6dd586fc47d9c5b,2024-08-20T13:15:06.303000 +CVE-2024-42556,1,1,d7cbd1e745b515ba2e34fe26a6d0d7d2ecb79f041c1cd83ad01f4170629fcd9e,2024-08-20T13:15:06.420000 +CVE-2024-42557,1,1,b81a7a178cbdce59e6dba516d5a565766a3aa2b4487dd1e24e6634232bc4f5f2,2024-08-20T13:15:06.523000 +CVE-2024-42558,1,1,01bb61defe10b86cc9158a32a5eb5991d76053cc724aca2429bf2997981033e2,2024-08-20T13:15:06.623000 +CVE-2024-42559,1,1,1f7bd4c6e1958008243cc068f6cd3e40893ed5832b9b444d10f8c0d6d2943cd2,2024-08-20T13:15:06.730000 CVE-2024-4256,0,0,2885dad709315de5112b738946979afcb06c4d717b1b754bf7bfd87477f08c3d,2024-06-04T19:20:34.517000 +CVE-2024-42560,1,1,12353e342f59329ed9c9fe91ab39512396d50d91aaf497eb5d24ac7524a7c720,2024-08-20T13:15:06.830000 +CVE-2024-42561,1,1,5cecc5cda05dbf2076b8c4d0d38dd974ea050be31e610808d0edb0fb56ef4e86,2024-08-20T13:15:06.920000 +CVE-2024-42562,1,1,8d119a041f38e85845404483e034bb9d46494070ca6e87d934dc6f8e1caf3c1c,2024-08-20T13:15:07.020000 +CVE-2024-42563,1,1,5aa10b11afb9919f02de91b6e4aa99211cc4e0b7e682d85cb6204eab3bd8a75f,2024-08-20T13:15:07.123000 +CVE-2024-42564,1,1,4dd317755ddfe2b7c71508b028f3acf510537024d1a71c8cbe04814a882414f6,2024-08-20T13:15:07.243000 +CVE-2024-42565,1,1,4108cca8c1090c4ed0a5c3e9c0a8fe9148e0a395ef8003dcd14c9e8b6ba96635,2024-08-20T13:15:07.347000 +CVE-2024-42566,1,1,c13555238328ac423da93ae3145c0ea54c4417cee348ca178a07bff102620f59,2024-08-20T13:15:07.443000 +CVE-2024-42567,1,1,fe67942dcb03efa4c7f3478f8c9c829ac9d7afad6e7b44232545f1f55a090bb7,2024-08-20T13:15:07.540000 +CVE-2024-42568,1,1,3808fa7dec6020429d7767d7fb7167c3f8e6f7482bca343dd67b9d32b78add55,2024-08-20T13:15:07.643000 +CVE-2024-42569,1,1,b1aef212df038e08c698364f08ba795d0d8cd4e25a882a360b7a5c1ee201faa7,2024-08-20T13:15:07.733000 CVE-2024-4257,0,0,e0d599f1bfc48408556261adebbc05066e8b6b86cdfabfa8d99484b6710fdc92,2024-05-17T02:40:21.330000 +CVE-2024-42570,1,1,4f20e8c8db2ea3a78db4e51e47dc70a190f2638b1f475da04edfd9a62439e03c,2024-08-20T13:15:07.830000 +CVE-2024-42571,1,1,8b769d1aa59c0a9917c3e1affaacd95cea49cfa6f87d2d48d152897523602d9f,2024-08-20T13:15:07.917000 +CVE-2024-42572,1,1,5ba728d62fb8126fc5b604dd664f1e1cdab9ebb40124b7d0b0fa4c41aad345c8,2024-08-20T13:15:08.007000 +CVE-2024-42573,1,1,36b7766d2befa06458bc9df75b45da1c94dd516e85d0136df243d520cd1082d2,2024-08-20T13:15:08.097000 +CVE-2024-42574,1,1,81408df3f3a9e4b3bef1a2ccfc12929dd101ac417e32959cfb0c8a9c55695c15,2024-08-20T13:15:08.193000 +CVE-2024-42575,1,1,c0624f67d52d8cdda4da33bf7de3e641daa258371888447e25e291eee4d3f57d,2024-08-20T13:15:08.283000 +CVE-2024-42576,1,1,a022f7dab66e05f20c95e333526ea90cdcf8521df67acad012352fd634755e0d,2024-08-20T13:15:08.377000 +CVE-2024-42577,1,1,1c91c08aa8a3f1c6ea256dbaaaa5fadb98103c334a5e4a1aa5cdb5635b84060a,2024-08-20T13:15:08.477000 +CVE-2024-42578,1,1,fd8de019d32ee68409e62a28a6fb25068bc9612d20bd3f88237c7b6e29439c2f,2024-08-20T13:15:08.573000 +CVE-2024-42579,1,1,807dfbdf86b6f636c9ba6898cb85ed86b8923975205727f24f4036b6a407be39,2024-08-20T13:15:08.687000 CVE-2024-4258,0,0,cedc452cf08b1d582601f74b54055702e4527b179d19ae6d21e1fa7a35e392d8,2024-06-17T12:42:04.623000 +CVE-2024-42580,1,1,cf4406b29feee4b42daef4406433123a750a30983d173c68371bbc5b0b595004,2024-08-20T13:15:08.793000 +CVE-2024-42581,1,1,737beb31e0a22db07565133cff1451e8670057a279deebb941fe77db88d12a96,2024-08-20T13:15:08.890000 +CVE-2024-42582,1,1,6ea8063fedd5a5850315087616af0a1527fd14225fb6fca3a3fa646052e1bcfc,2024-08-20T13:15:08.987000 +CVE-2024-42583,1,1,39d18898205ceb500e315d2db0193b06bcd17a26714c5d3098d7462d8be705c0,2024-08-20T13:15:09.077000 +CVE-2024-42584,1,1,f6d7f32221e725ba6da2cd1474d6f47bd0d43de0f8fb21052de9240ee73b5d6d,2024-08-20T13:15:09.173000 +CVE-2024-42585,1,1,916883996a52f9d565b60a9bcb14e2a5a3a08eaed88c0107d3670c989580d43c,2024-08-20T13:15:09.273000 +CVE-2024-42586,1,1,bc084c3068820fdd0b6b81ff9ecc3502fee34b3c10a95bd22dc6621c64823539,2024-08-20T13:15:09.367000 CVE-2024-4260,0,0,16d46a0b5bcb66a093fc7ed1472e8a955d65f29368360dc29eff1d3d84145b9b,2024-08-01T13:59:29.547000 CVE-2024-4261,0,0,cad163d5402c8383e323c083e324c4342bcfec07494a0960d776456fb2ab221b,2024-05-22T14:30:41.953000 CVE-2024-4262,0,0,eb43fbaec8efb92a09683be8d89079c39bc088d0014f0d5047c7a435bf15c8e4,2024-05-22T12:46:53.887000 @@ -257761,7 +257804,7 @@ CVE-2024-4318,0,0,7b0a62dc8691f5e6f2210e7e19a78c6d4d5c9f053f662e7593a96cdc8c097a CVE-2024-4319,0,0,7ca0245a01df3d5ced472265b32f90c6f6a22a37af3715d5589379ecac1f6a24,2024-06-11T13:54:12.057000 CVE-2024-43199,0,0,94150f8459e19abf18625a946d8a507867275817cd3d9928084030fcb7fa8330,2024-08-12T12:59:48.253000 CVE-2024-4320,0,0,f21f873c3bfeb896c071276000f6bbe2ae4420d2f2c3184178334c98a666705b,2024-06-07T14:56:05.647000 -CVE-2024-43202,0,1,403cde958a51af9acc480f0f95630c40baab10f0bbf6cb2b53237e18afff9101,2024-08-20T08:15:05.240000 +CVE-2024-43202,0,0,403cde958a51af9acc480f0f95630c40baab10f0bbf6cb2b53237e18afff9101,2024-08-20T08:15:05.240000 CVE-2024-43207,0,0,e22c5710770b6cfc075b06ecdaad97a6d82c458382d84efdd62d5cddbde66f6b,2024-08-19T12:59:59.177000 CVE-2024-4321,0,0,9cab2a859d144dd765da27aaa03d49bb12083c0b11abfa900a9b065f4ea718e1,2024-05-16T13:03:05.353000 CVE-2024-43210,0,0,38b1ddd569737ddf84a414c75c09c54bffe5570d779b3b2b7d84160c7c88ff6c,2024-08-13T12:58:25.437000 @@ -259197,7 +259240,7 @@ CVE-2024-5800,0,0,a1cb578d92a5ce21abf5c6c3a9df30d0f15dec959b83eaaecf5cab603de305 CVE-2024-5801,0,0,668584c28d68f34806b15aa23a003fb18ba18cb7fb2d24326345f03f0e3dd0a3,2024-08-12T13:41:36.517000 CVE-2024-5802,0,0,71daebe4bec626c1d71de5756a51cb35bdbb0ec81769b121e428d7e1cc0f8395,2024-07-12T15:20:14.610000 CVE-2024-5804,0,0,944c60e3868cb88abd10c74562e980fee4d055c47351e0f84fb7de6b37f889be,2024-07-22T13:00:53.287000 -CVE-2024-5805,0,0,f734cfbda04e521c3e66e4ddc2a1025a96de47f7633c45b189fcc72ae4a4191a,2024-06-25T18:50:42.040000 +CVE-2024-5805,0,1,c6bd0a254f95da4bac1aa9af34b5a1c8bce84a0c9ec724d2acad9f30a83ad74c,2024-08-20T13:37:58.923000 CVE-2024-5806,0,0,91588fb1cdb8115c3da665d3d031e599ad42ef712f85a57d764591dd0370421d,2024-06-26T00:15:11.293000 CVE-2024-5807,0,0,cbdacfcc550f188a645ebbcc0d5bed8a3afa99180c6adb698350c513e3814548,2024-08-01T13:59:59.787000 CVE-2024-5808,0,0,01bdb59c1a81eab4bdadd0e0da37734e46325f1f6405fb5bc4ad137cd56c547f,2024-08-01T13:59:59.967000 @@ -259637,9 +259680,9 @@ CVE-2024-6367,0,0,0657e75ca91976d2d4beca477f8339cebb9a03d943acbd557f57c4bf89b577 CVE-2024-6368,0,0,e298d701aa6c568232c2a1685979818386124e299e97d71dced43164a82e13ff,2024-06-27T18:15:21.083000 CVE-2024-6369,0,0,8b09ff85e5acb66c2b30feef0f9adfffd0c06196dfcccda2083a0a13ec885594,2024-06-27T12:47:19.847000 CVE-2024-6370,0,0,72eb946b066b80cfc3f428b4eac85ce966f09241daddb8d4da0833577e90a737,2024-06-27T12:47:19.847000 -CVE-2024-6371,0,0,5c453307ad6443c6875143a04a41537209c616a97b889570a269f093cbb82ff1,2024-06-27T18:15:21.690000 -CVE-2024-6372,0,0,3a5e4046552450d7ff5fe0ecb13dd5f2a5cb3ce00156c82e4366ab91d3cb5535,2024-06-27T17:11:52.390000 -CVE-2024-6373,0,0,d707342e63d932ce58020bc6bdb914165dbc13d5b4162b0bbb2c2611e541fbac,2024-06-27T18:15:22.280000 +CVE-2024-6371,0,1,5f83f95dcceaa28d11c287dc71af5756afc095d68becb3e3a86bdf854c3c189a,2024-08-20T13:21:59.600000 +CVE-2024-6372,0,1,175eedbe6c249e3955927cb279a01c191390828d0195bad6f245ad8466b584f8,2024-08-20T13:31:40.793000 +CVE-2024-6373,0,1,e2b88eb3a63ea5c09c2c5241dee2a7883fb4754c8b06cd4990f2315b5466489d,2024-08-20T13:32:44.213000 CVE-2024-6374,0,0,f94841636056434d281b0adc40f21c7609c1c7ef70c052bfb7795df58f3d067b,2024-06-27T17:11:52.390000 CVE-2024-6375,0,0,2086f7a0dc16d184277c490b35389aec9b32cc5c6b68030b97b503ee789a3958,2024-07-03T14:54:52.427000 CVE-2024-6376,0,0,2eceea6553f0e47a0e34ab01650b7781a20682f6799be39f9cd1e64f3f19856f,2024-07-03T15:04:52.463000 @@ -259972,6 +260015,7 @@ CVE-2024-6913,0,0,a7b65a58f468735b3782ca0a056db617c72da8825fc6f7975e6b5a68a6fa7e CVE-2024-6915,0,0,414f9ee927dc9f475151b863854f151879a129420ab26b169b33952223f7672f,2024-08-06T16:30:24.547000 CVE-2024-6916,0,0,07530be58a74756ca63b407a63f3e63926b78ec1f0980442182c2c4ab60c9be4,2024-07-19T13:01:44.567000 CVE-2024-6917,0,0,4e02075ee95758cd510fbf6b3750273e9262615bb77e37c7873232af68d2c294,2024-08-13T17:14:51.100000 +CVE-2024-6918,1,1,521b7d40df9f00de5aa0547dffce2b4999e52d976a15994b48aa5f7cdc11bf69,2024-08-20T13:15:09.450000 CVE-2024-6922,0,0,06f94107ca0d2a59d9bc293905aa46a216c7a8ead08ee7b0b3a0f5d8d9c7d0a8,2024-07-29T14:12:08.783000 CVE-2024-6923,0,0,5f80c19d7aba57d9ca3502e05808684f0f6d62047a1b2b6de15ae6be51d0a228,2024-08-07T15:15:56.337000 CVE-2024-6930,0,0,1339dcde2064efad12400b33b71bb10f58bb3894621d0a104ecb7e997db508bc,2024-08-08T20:06:49.207000 @@ -260047,7 +260091,7 @@ CVE-2024-7029,0,0,5175bec03cf7f2378284f608514536d153bc0fcc9978511b168a2887b7029c CVE-2024-7031,0,0,4808703a4cd0b97f67a773c5f222b01d69a2fff387801423358b3ea99670c83a,2024-08-05T12:41:45.957000 CVE-2024-7047,0,0,c626b8092c8533dfe4198c51e8e35d5946df1ed097b6fb1d01ca755685dc1b0d,2024-07-25T12:36:39.947000 CVE-2024-7050,0,0,f402c0a89ba2917236fe6639793bd54ee4751807250eba7a4dde84d4a362ffd7,2024-07-29T14:12:08.783000 -CVE-2024-7054,1,1,43918e4682eea2254587dd6be24c57fd33f0a630b01e2ccb4238160b7399ff51,2024-08-20T11:15:03.540000 +CVE-2024-7054,0,0,43918e4682eea2254587dd6be24c57fd33f0a630b01e2ccb4238160b7399ff51,2024-08-20T11:15:03.540000 CVE-2024-7055,0,0,b0e8b0793ccc61abbc70699af6d91421241877ab1f640f57d490cff121ecbcd0,2024-08-06T16:30:24.547000 CVE-2024-7057,0,0,e86292da776d8c2eee12db885a241ac453174252cdfea8e6058f6d373bd4dc19,2024-07-25T12:36:39.947000 CVE-2024-7060,0,0,2e0c92013c1ddde1bca0ad9e62aa50d23e69e1a598796a2170f54fccf61e7f4b,2024-07-25T12:36:39.947000 @@ -260441,9 +260485,9 @@ CVE-2024-7678,0,0,7a80ac621ece570be5503c7435c87b024e4d34454346340a478740f49f0318 CVE-2024-7680,0,0,4742cee85d7df5fbe02ea5ecd61db4452ad7db3d8ef0db88ef67139768aab176,2024-08-15T18:08:52.780000 CVE-2024-7681,0,0,e6c1e7782509f60074b687569285020e895fcc1fd23e8fb399f4f22e032de697,2024-08-15T18:09:55.887000 CVE-2024-7682,0,0,8dbcf53cb3ad3a4e3e6c93fa0edfe498b656bd897e790189cda42acfe0f7b35c,2024-08-15T18:10:41.557000 -CVE-2024-7683,0,0,db1468d6a918b5d9699222fb036b2f7c874d450f40763ac979489b89e963d4e7,2024-08-12T13:41:36.517000 -CVE-2024-7684,0,0,0159f82fe6cc241e60660ae8524453cb40852163421468e904c03601bdf4a5a2,2024-08-12T13:41:36.517000 -CVE-2024-7685,0,0,ee24f58f1e95e966593bf53c459d913ce2200cd63798cb5ac6cee30b9a4d96e1,2024-08-12T13:41:36.517000 +CVE-2024-7683,0,1,0e60e4af191d77a965d4296d84a49c07e8af0f778b10dae064ea9d4491f47a8d,2024-08-20T13:52:50.987000 +CVE-2024-7684,0,1,d5d03d6072e24fe97ebcaeddd6f0cfafbf610fe9d74f716df9c156507bb7719f,2024-08-20T13:53:24.447000 +CVE-2024-7685,0,1,ef97cee3c3f9504d8f3d2a571167ba3304a1e5ad3165b46e778fa46938b19988,2024-08-20T13:53:51.947000 CVE-2024-7686,0,0,1f836816338e686ba2de1cb6f8ba7d877a0f6cb953d1322ca08f61be1eae3d40,2024-08-12T13:41:36.517000 CVE-2024-7693,0,0,f2cd1103366bcfd179be09779784b86ac2f98679921c4f629dd8dbd0c14eefbf,2024-08-12T13:41:36.517000 CVE-2024-7694,0,0,7ad6784b26040f06619a4364e66ebaeeebc13317865a5794a53c5e6dcb080aaf,2024-08-12T13:41:36.517000