mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 11:37:26 +00:00
Auto-Update: 2024-08-14T02:00:17.431079+00:00
This commit is contained in:
parent
5f1ed8eafd
commit
83beec8407
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-28986",
|
||||
"sourceIdentifier": "psirt@solarwinds.com",
|
||||
"published": "2024-08-13T23:15:16.627",
|
||||
"lastModified": "2024-08-13T23:15:16.627",
|
||||
"lastModified": "2024-08-14T00:15:06.323",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SolarWinds Web Help Desk was susceptible to a Java Deserialization Remote Code Execution that would allow access to run commands on the host machine."
|
||||
"value": "SolarWinds Web Help Desk was found to be susceptible to a Java Deserialization Remote Code Execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. \n\n\n\nWhile it was reported as an unauthenticated vulnerability, SolarWinds has been unable to reproduce it without authentication after thorough testing. \u00a0\n\n\n\nHowever, out of an abundance of caution, we recommend all Web Help Desk customers apply the patch, which is now available."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,9 +2,13 @@
|
||||
"id": "CVE-2024-38106",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-08-13T18:15:10.713",
|
||||
"lastModified": "2024-08-13T18:15:10.713",
|
||||
"lastModified": "2024-08-14T01:00:01.500",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-08-13",
|
||||
"cisaActionDue": "2024-09-03",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Microsoft Windows Kernel Privilege Escalation Vulnerability",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,9 +2,13 @@
|
||||
"id": "CVE-2024-38107",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-08-13T18:15:10.963",
|
||||
"lastModified": "2024-08-13T18:15:10.963",
|
||||
"lastModified": "2024-08-14T01:00:01.500",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-08-13",
|
||||
"cisaActionDue": "2024-09-03",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Microsoft Windows Power Dependency Coordinator Privilege Escalation Vulnerability",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-38109",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-08-13T18:15:11.490",
|
||||
"lastModified": "2024-08-13T22:15:06.230",
|
||||
"lastModified": "2024-08-14T00:15:06.577",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
|
56
CVE-2024/CVE-2024-381xx/CVE-2024-38163.json
Normal file
56
CVE-2024/CVE-2024-381xx/CVE-2024-38163.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-38163",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-08-14T00:15:07.453",
|
||||
"lastModified": "2024-08-14T00:15:07.453",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Update Stack Elevation of Privilege Vulnerability"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38163",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-38166",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-08-06T22:15:54.163",
|
||||
"lastModified": "2024-08-13T22:15:07.237",
|
||||
"lastModified": "2024-08-14T00:15:07.687",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
|
@ -2,9 +2,13 @@
|
||||
"id": "CVE-2024-38178",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-08-13T18:15:26.220",
|
||||
"lastModified": "2024-08-13T18:15:26.220",
|
||||
"lastModified": "2024-08-14T01:00:01.500",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-08-13",
|
||||
"cisaActionDue": "2024-09-03",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Microsoft Windows Scripting Engine Memory Corruption Vulnerability",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,9 +2,13 @@
|
||||
"id": "CVE-2024-38189",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-08-13T18:15:27.733",
|
||||
"lastModified": "2024-08-13T18:15:27.733",
|
||||
"lastModified": "2024-08-14T01:00:01.500",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-08-13",
|
||||
"cisaActionDue": "2024-09-03",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Microsoft Project Remote Code Execution Vulnerability ",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,9 +2,13 @@
|
||||
"id": "CVE-2024-38193",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-08-13T18:15:28.230",
|
||||
"lastModified": "2024-08-13T18:15:28.230",
|
||||
"lastModified": "2024-08-14T01:00:01.500",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-08-13",
|
||||
"cisaActionDue": "2024-09-03",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-38206",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-08-06T22:15:54.430",
|
||||
"lastModified": "2024-08-13T22:15:07.837",
|
||||
"lastModified": "2024-08-14T00:15:08.213",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
|
@ -2,9 +2,13 @@
|
||||
"id": "CVE-2024-38213",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-08-13T18:15:30.750",
|
||||
"lastModified": "2024-08-13T18:15:30.750",
|
||||
"lastModified": "2024-08-14T01:00:01.500",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-08-13",
|
||||
"cisaActionDue": "2024-09-03",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Microsoft Windows SmartScreen Security Feature Bypass Vulnerability",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
137
CVE-2024/CVE-2024-77xx/CVE-2024-7752.json
Normal file
137
CVE-2024/CVE-2024-77xx/CVE-2024-7752.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-7752",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-14T00:15:08.433",
|
||||
"lastModified": "2024-08-14T00:15:08.433",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in SourceCodester Clinics Patient Management System 1.0. It has been classified as problematic. This affects an unknown part of the file /update_medicine.php. The manipulation of the argument medicine_name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Wsstiger/cve/blob/main/Clinic's_xss.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.274371",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.274371",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.389305",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2024/CVE-2024-77xx/CVE-2024-7753.json
Normal file
137
CVE-2024/CVE-2024-77xx/CVE-2024-7753.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-7753",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-14T01:15:12.120",
|
||||
"lastModified": "2024-08-14T01:15:12.120",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in SourceCodester Clinics Patient Management System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /user_images/. The manipulation leads to direct request. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-425"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Wsstiger/cve/blob/main/Clinic's_Directory.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.274372",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.274372",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.389361",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2024/CVE-2024-77xx/CVE-2024-7754.json
Normal file
137
CVE-2024/CVE-2024-77xx/CVE-2024-7754.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-7754",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-14T01:15:12.417",
|
||||
"lastModified": "2024-08-14T01:15:12.417",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in SourceCodester Clinics Patient Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /ajax/check_medicine_name.php. The manipulation of the argument user_name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Wsstiger/cve/blob/main/Clinic's_sql3.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.274373",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.274373",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.389367",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
37
README.md
37
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-08-13T23:55:17.355925+00:00
|
||||
2024-08-14T02:00:17.431079+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-08-13T23:15:20.110000+00:00
|
||||
2024-08-14T01:15:12.417000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -27,36 +27,39 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2024-08-13T00:00:08.646570+00:00
|
||||
2024-08-14T00:00:08.642177+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
259865
|
||||
259869
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `5`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
- [CVE-2024-28986](CVE-2024/CVE-2024-289xx/CVE-2024-28986.json) (`2024-08-13T23:15:16.627`)
|
||||
- [CVE-2024-7748](CVE-2024/CVE-2024-77xx/CVE-2024-7748.json) (`2024-08-13T22:15:08.087`)
|
||||
- [CVE-2024-7749](CVE-2024/CVE-2024-77xx/CVE-2024-7749.json) (`2024-08-13T22:15:08.390`)
|
||||
- [CVE-2024-7750](CVE-2024/CVE-2024-77xx/CVE-2024-7750.json) (`2024-08-13T23:15:19.827`)
|
||||
- [CVE-2024-7751](CVE-2024/CVE-2024-77xx/CVE-2024-7751.json) (`2024-08-13T23:15:20.110`)
|
||||
- [CVE-2024-38163](CVE-2024/CVE-2024-381xx/CVE-2024-38163.json) (`2024-08-14T00:15:07.453`)
|
||||
- [CVE-2024-7752](CVE-2024/CVE-2024-77xx/CVE-2024-7752.json) (`2024-08-14T00:15:08.433`)
|
||||
- [CVE-2024-7753](CVE-2024/CVE-2024-77xx/CVE-2024-7753.json) (`2024-08-14T01:15:12.120`)
|
||||
- [CVE-2024-7754](CVE-2024/CVE-2024-77xx/CVE-2024-7754.json) (`2024-08-14T01:15:12.417`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `6`
|
||||
Recently modified CVEs: `10`
|
||||
|
||||
- [CVE-2024-38109](CVE-2024/CVE-2024-381xx/CVE-2024-38109.json) (`2024-08-13T22:15:06.230`)
|
||||
- [CVE-2024-38164](CVE-2024/CVE-2024-381xx/CVE-2024-38164.json) (`2024-08-13T23:15:19.427`)
|
||||
- [CVE-2024-38166](CVE-2024/CVE-2024-381xx/CVE-2024-38166.json) (`2024-08-13T22:15:07.237`)
|
||||
- [CVE-2024-38176](CVE-2024/CVE-2024-381xx/CVE-2024-38176.json) (`2024-08-13T23:15:19.540`)
|
||||
- [CVE-2024-38182](CVE-2024/CVE-2024-381xx/CVE-2024-38182.json) (`2024-08-13T23:15:19.657`)
|
||||
- [CVE-2024-38206](CVE-2024/CVE-2024-382xx/CVE-2024-38206.json) (`2024-08-13T22:15:07.837`)
|
||||
- [CVE-2024-28986](CVE-2024/CVE-2024-289xx/CVE-2024-28986.json) (`2024-08-14T00:15:06.323`)
|
||||
- [CVE-2024-38106](CVE-2024/CVE-2024-381xx/CVE-2024-38106.json) (`2024-08-14T01:00:01.500`)
|
||||
- [CVE-2024-38107](CVE-2024/CVE-2024-381xx/CVE-2024-38107.json) (`2024-08-14T01:00:01.500`)
|
||||
- [CVE-2024-38109](CVE-2024/CVE-2024-381xx/CVE-2024-38109.json) (`2024-08-14T00:15:06.577`)
|
||||
- [CVE-2024-38166](CVE-2024/CVE-2024-381xx/CVE-2024-38166.json) (`2024-08-14T00:15:07.687`)
|
||||
- [CVE-2024-38178](CVE-2024/CVE-2024-381xx/CVE-2024-38178.json) (`2024-08-14T01:00:01.500`)
|
||||
- [CVE-2024-38189](CVE-2024/CVE-2024-381xx/CVE-2024-38189.json) (`2024-08-14T01:00:01.500`)
|
||||
- [CVE-2024-38193](CVE-2024/CVE-2024-381xx/CVE-2024-38193.json) (`2024-08-14T01:00:01.500`)
|
||||
- [CVE-2024-38206](CVE-2024/CVE-2024-382xx/CVE-2024-38206.json) (`2024-08-14T00:15:08.213`)
|
||||
- [CVE-2024-38213](CVE-2024/CVE-2024-382xx/CVE-2024-38213.json) (`2024-08-14T01:00:01.500`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
38
_state.csv
38
_state.csv
@ -248862,7 +248862,7 @@ CVE-2024-2898,0,0,7dabbc345008f13b8373a1a2d71ee4344db041576d9ae3f0290950d4a3a3f3
|
||||
CVE-2024-28982,0,0,4cfbf3591cf96f37013314412d2a968313b4953b63ec28142d546cf8f6808f7e,2024-06-27T12:47:19.847000
|
||||
CVE-2024-28983,0,0,57b7369f9816fa1a55923b116dcbb27a793b7aad06b7761c68b9fcd8c194e8f4,2024-06-27T12:47:19.847000
|
||||
CVE-2024-28984,0,0,276bc8c54cf8ee7419930c3e9177a9acf5146d6167c989ef6d1387fafadac995,2024-06-27T12:47:19.847000
|
||||
CVE-2024-28986,1,1,d51ca786ff033043897ad5364abb6c8f79239a251aa6930b1a4e8dbae67a7bb2,2024-08-13T23:15:16.627000
|
||||
CVE-2024-28986,0,1,a8371254b04fdefe526ae3382994c4b109b0a11b2575a4a2c90b6d08b330c77d,2024-08-14T00:15:06.323000
|
||||
CVE-2024-2899,0,0,0be0fb50fdcc13228c9b49554460e4a306be4c6e83ee7f9bfb94b945f4f9e595,2024-05-17T02:38:36.220000
|
||||
CVE-2024-28992,0,0,696c70c13cdfd39478c05c8c040491fa3a08d2263d68b357789c3f03fee2f204,2024-07-18T12:28:43.707000
|
||||
CVE-2024-28993,0,0,929415671d938543e4980e176019e6c6553f30e59f81cf3d32505fa605110cfe,2024-07-18T12:28:43.707000
|
||||
@ -255019,10 +255019,10 @@ CVE-2024-38102,0,0,b8f3bed70811e842b10b0e44e049aa13327d439097a470d245182f818341d
|
||||
CVE-2024-38103,0,0,8d61fae077d92ec76899abed46ea2dbe921ece390d18d12a488e0d3b07b3a5ce,2024-07-30T15:35:25.923000
|
||||
CVE-2024-38104,0,0,934543cd72c92227418f82cc6731b22a50ac357f374ae5c93a97a0b40688cfaa,2024-07-11T18:32:06.187000
|
||||
CVE-2024-38105,0,0,5ee7b6bcc3f23b6c027ef1e20204ab9e08d3961eefc81a59082038a3ba1cd79b,2024-07-11T18:31:05.480000
|
||||
CVE-2024-38106,0,0,c42933988379a262c4f3e4e0f9d7f1f98a3c2788fff18332adf00970abb7f002,2024-08-13T18:15:10.713000
|
||||
CVE-2024-38107,0,0,21e19d6a777dcf81eb65771b44362ce74b5d4d71dda139302f253d122e2a163e,2024-08-13T18:15:10.963000
|
||||
CVE-2024-38106,0,1,16c1bdadbad583d43da2349c79b20e4069747c58fcb46c7c4a14489624d66063,2024-08-14T01:00:01.500000
|
||||
CVE-2024-38107,0,1,36c5c67a43d0ce8fb641b30629ffe3950af7b62d4ecbc787ac334c67cdab4fae,2024-08-14T01:00:01.500000
|
||||
CVE-2024-38108,0,0,974aac74146d94e9db2790bb89f3e3bedbaa461fa3a103e4d1a0de1301ea465a,2024-08-13T18:15:11.240000
|
||||
CVE-2024-38109,0,1,a0ff6bf5ff1ff69c63bbf5ae8b6e0dd26962f10f222b0eaa19e9d444d8368c50,2024-08-13T22:15:06.230000
|
||||
CVE-2024-38109,0,1,31e987a7cdba631c67dc3003fe52cc1938f45110ca21751630550750c3eb8a72,2024-08-14T00:15:06.577000
|
||||
CVE-2024-3811,0,0,7753fbebaa8d958ade5ff525a0ab8fa28bb6d42c662f58346b2bf00c9a2b2418,2024-05-20T13:00:34.807000
|
||||
CVE-2024-38112,0,0,f5d04dd24034822a51d80d554640736bed9f2c0a96bc6eed6acb547c42c42e9c,2024-07-13T00:15:04.950000
|
||||
CVE-2024-38114,0,0,fc6be8aeb72973d04cf821194812f0ad717b4ad459dd87bf0c25e9c6708f5fbf,2024-08-13T18:15:11.820000
|
||||
@ -255074,9 +255074,10 @@ CVE-2024-3816,0,0,75ffa648a8fdfd5e75d27a5c1f7d2535fe4ef8b6da1bbd82db22ae48c44378
|
||||
CVE-2024-38160,0,0,0901b1829b388b875c6937cbe5b4a96f0751712e2a8db319315b6e7078a42879,2024-08-13T18:15:23.207000
|
||||
CVE-2024-38161,0,0,a411ece2a51258b08f957b2b8ced858a3f01e2a31531bca517682fbf23db95dc,2024-08-13T18:15:23.437000
|
||||
CVE-2024-38162,0,0,45aa50d93cf9fd854bd60aac88f80f89dfc2d9a8d8cee7f1c5db520c1a0a85ae,2024-08-13T18:15:23.687000
|
||||
CVE-2024-38164,0,1,5dfe5497b159dc6d650c6ff37650e46a116acbd9d5ffab5078a712d0e4b04cba,2024-08-13T23:15:19.427000
|
||||
CVE-2024-38163,1,1,73fa1fdb30689b68773bbf8d72d018094de39ce8590ae4e29baa232bae1943f7,2024-08-14T00:15:07.453000
|
||||
CVE-2024-38164,0,0,5dfe5497b159dc6d650c6ff37650e46a116acbd9d5ffab5078a712d0e4b04cba,2024-08-13T23:15:19.427000
|
||||
CVE-2024-38165,0,0,692a4023381217757d24dda3766179bf93044d5f438504fd16cf4feda7fc25b3,2024-08-13T18:15:23.913000
|
||||
CVE-2024-38166,0,1,e2e5e54955e63345dc53b863a5f02a0a8ef4623611ec7781232cfb701df50dff,2024-08-13T22:15:07.237000
|
||||
CVE-2024-38166,0,1,0d6aa0db05dc6fc37adb0dfcc7266781bf49330da86bf3115a3388df5e4dbef0,2024-08-14T00:15:07.687000
|
||||
CVE-2024-38167,0,0,e887d79b2dee38f802fd34b2ff2cb40a7c96c4ef273383a676ec0b52c90ade98,2024-08-13T18:15:24.370000
|
||||
CVE-2024-38168,0,0,8335f41b1f983f2bf8a7d243fec783f3911da173d857dc58f27128a1a1d1b21e,2024-08-13T18:15:24.627000
|
||||
CVE-2024-38169,0,0,8a77823c9a0c0c3c7a76acfae0ecb0ae63d0d8912459af8c292007d4a0a344f2,2024-08-13T18:15:24.857000
|
||||
@ -255085,20 +255086,20 @@ CVE-2024-38170,0,0,3923523c651d0ba51c8f6cb69410d4a004fce42ead9895c105a7d9da9413d
|
||||
CVE-2024-38171,0,0,c9666bedadbfb085a60d1c86a737b19631101c3058ee0cff0fe853bc455eace8,2024-08-13T18:15:25.300000
|
||||
CVE-2024-38172,0,0,19a7fa728427b7e6096c5f20dfbda65dba033a6f150b22ca13b10cd673dec332,2024-08-13T18:15:25.530000
|
||||
CVE-2024-38173,0,0,542ec2edb915e69730d7696b530b8e946c5e175797f4031a84fd9751ab4554d5,2024-08-13T18:15:25.750000
|
||||
CVE-2024-38176,0,1,d026365cfa60427a2aa768447fd78b35c5b5d665c83edd557822602e0115dba8,2024-08-13T23:15:19.540000
|
||||
CVE-2024-38176,0,0,d026365cfa60427a2aa768447fd78b35c5b5d665c83edd557822602e0115dba8,2024-08-13T23:15:19.540000
|
||||
CVE-2024-38177,0,0,ab166044ca5bb6ef3f28b94fa21dac4d4898daea29081351d8f8a7533691498e,2024-08-13T18:15:25.987000
|
||||
CVE-2024-38178,0,0,e2c0b6b1f490d536d583aa0496228458f790aaa1d9d823a460929d33d5065398,2024-08-13T18:15:26.220000
|
||||
CVE-2024-38178,0,1,4d010c7f2d0bca9ab184c8d81e59b36ef2b4834df69aa753c3428f5c53537587,2024-08-14T01:00:01.500000
|
||||
CVE-2024-3818,0,0,b4c982a18364880791124fa7ba25840b7eb37a53aa1551fa23324d948b6ddd3f,2024-04-19T13:10:25.637000
|
||||
CVE-2024-38180,0,0,bf91c82bf87b502b33f82c9bbb60d5c3c58b9150a0ae28b950dfbea59306a62e,2024-08-13T18:15:26.463000
|
||||
CVE-2024-38182,0,1,a7e7d48d119dbb99a3d726dc4a8acec7a776a49bc59985c5f0bc4c0a335c69d9,2024-08-13T23:15:19.657000
|
||||
CVE-2024-38182,0,0,a7e7d48d119dbb99a3d726dc4a8acec7a776a49bc59985c5f0bc4c0a335c69d9,2024-08-13T23:15:19.657000
|
||||
CVE-2024-38184,0,0,8c61228bd2332e9ed0914be65545f2e305f16ad1550e91e212481d787357a318,2024-08-13T18:15:26.733000
|
||||
CVE-2024-38185,0,0,09a28ca203e59822fecf1305b4efe6b57cf8736d3ef0f86795a1aa43f7a6ae52,2024-08-13T18:15:26.970000
|
||||
CVE-2024-38186,0,0,4c242cea12afc97857ea55567a874a4dcad25c7b9035314137599bc7316d9d1c,2024-08-13T18:15:27.217000
|
||||
CVE-2024-38187,0,0,8fb7e3a19ee970cc433235fcfb2b122d99777ece83926c417adb709bd9eca8f0,2024-08-13T18:15:27.447000
|
||||
CVE-2024-38189,0,0,c94e4b60dedef9e3ef30a892f8f7cc07fee7a7a52f244c9b1ed5b8424344698d,2024-08-13T18:15:27.733000
|
||||
CVE-2024-38189,0,1,01445528544a2a576268b30ef09aaf7514e6b23966ecf23061a605051a83ceaf,2024-08-14T01:00:01.500000
|
||||
CVE-2024-3819,0,0,c25bdc543ba06fd05ac51b0b8912467c3fc6d8848be54d697bfdb5995b1a7e51,2024-05-02T18:00:37.360000
|
||||
CVE-2024-38191,0,0,f2d87a18b010ccc2c97bb17a5f5c6c8e3752ea45d9e5f00a6570ae2632f904f1,2024-08-13T18:15:27.977000
|
||||
CVE-2024-38193,0,0,fff342f0f0709d166fca49c0c01e67e53969bba9f5e5bee214b425feb38975ea,2024-08-13T18:15:28.230000
|
||||
CVE-2024-38193,0,1,3fd261a31fb6729d16b1019faa1bcdb02917feec087445e3f22a8fc569cf31eb,2024-08-14T01:00:01.500000
|
||||
CVE-2024-38195,0,0,989f9516911353ed226df8303a33d4a04a6c842836adb9bbf7dcf34ef33a4876,2024-08-13T18:15:28.470000
|
||||
CVE-2024-38196,0,0,6d32d5f27d4d27c2d5465aed64b34ee2c48f8eae17ec5920470094e1a799af4a,2024-08-13T18:15:28.710000
|
||||
CVE-2024-38197,0,0,3f3689f8b05e705a97921507891f469637ad32f7e7c9703ec6e1cb98fc676d2e,2024-08-13T18:15:28.957000
|
||||
@ -255108,10 +255109,10 @@ CVE-2024-3820,0,0,8985e7d1e7aecc5fe081b43705d723ec0ca067093ca4a65f30dd280cab8408
|
||||
CVE-2024-38200,0,0,d566a27ccd0b19f8229e9b6ce0a19c6b80662cfcd111693b799cdefa30455084,2024-08-13T18:15:29.720000
|
||||
CVE-2024-38201,0,0,dfea92a06d88e2cd469bfcb27fae053f221f3e6bccc76607c5d109dd86a0063b,2024-08-13T18:15:29.953000
|
||||
CVE-2024-38202,0,0,e2d641c476f9dc13a8d336a19bdebe9a3b3a110a87f90a532b99552457779a18,2024-08-13T18:15:30.203000
|
||||
CVE-2024-38206,0,1,568a3a99dd1b92e451afa7daaf5d6bfa79690bf062bfc04c54cbbcb02a746403,2024-08-13T22:15:07.837000
|
||||
CVE-2024-38206,0,1,159422281702f43b217eea303b5c7354ebb2179d51ac658c6c0c018b5ec16a40,2024-08-14T00:15:08.213000
|
||||
CVE-2024-3821,0,0,3ffbadbdaf34f564e9c498f1baa8fe758531e73989a1bbb861692bcbfdfc262c,2024-06-03T14:46:24.250000
|
||||
CVE-2024-38211,0,0,4130039db3014f8006fd0f770c7c8c1714450e0066bd6eaea1815f4f91aca431,2024-08-13T18:15:30.470000
|
||||
CVE-2024-38213,0,0,fe63c53b12f91f600d7c7108103f2de87f74deb442c6bdb53693e829e19387e6,2024-08-13T18:15:30.750000
|
||||
CVE-2024-38213,0,1,1e4c3bca67002c34680b1d4b2d10c4b8d2054c43e0e848842a26a426751a3623,2024-08-14T01:00:01.500000
|
||||
CVE-2024-38214,0,0,653a59c00f60f2f520e2d206e073ab31a9abae3cf7125249dbcdabf44c0482df,2024-08-13T18:15:30.983000
|
||||
CVE-2024-38215,0,0,dc63bfb811b08cf0eb1add182015da819d502b3885d7262e7500a5891604fa9a,2024-08-13T18:15:31.247000
|
||||
CVE-2024-38218,0,0,d8154113c709876f61605539852c344572b202f6d86619699565b8c3f572b9b4,2024-08-13T18:15:31.500000
|
||||
@ -259860,7 +259861,10 @@ CVE-2024-7741,0,0,64db8805abe7399258370822df6cb3cd5d66cd4b3f64dcf843bcca96441029
|
||||
CVE-2024-7742,0,0,0788a81f8016fcbc7967f57ded53cfdf2f9e434d4212461c0c0d0f71dc56cb70,2024-08-13T21:15:16.627000
|
||||
CVE-2024-7743,0,0,c2afeed689d9f90ba7b51a6cd110286fff67213e0376fd7d4b1ddaa474390a6a,2024-08-13T21:15:17.197000
|
||||
CVE-2024-7746,0,0,044d8677cf6b2af5249591875e67a177e20bc681af5642444c6a36878f418500,2024-08-13T17:11:53.553000
|
||||
CVE-2024-7748,1,1,ea3241382b6e064bd63c4a6b6e946c25339e474f79d0219c51c17ffc7328653f,2024-08-13T22:15:08.087000
|
||||
CVE-2024-7749,1,1,96cd68c33fc9d9fb095e2d016ea0ed123f47d4e6adb3f7bc1577ad9857add464,2024-08-13T22:15:08.390000
|
||||
CVE-2024-7750,1,1,f0f13ba02f2a487bb606ebf8f6da8c1c79a0e8396630eb5549a2a71493c0ad25,2024-08-13T23:15:19.827000
|
||||
CVE-2024-7751,1,1,a338e2ef7af6db08f4f56f135d62d0c3f18aab409a31e46e5bfe24e4f2d7d61f,2024-08-13T23:15:20.110000
|
||||
CVE-2024-7748,0,0,ea3241382b6e064bd63c4a6b6e946c25339e474f79d0219c51c17ffc7328653f,2024-08-13T22:15:08.087000
|
||||
CVE-2024-7749,0,0,96cd68c33fc9d9fb095e2d016ea0ed123f47d4e6adb3f7bc1577ad9857add464,2024-08-13T22:15:08.390000
|
||||
CVE-2024-7750,0,0,f0f13ba02f2a487bb606ebf8f6da8c1c79a0e8396630eb5549a2a71493c0ad25,2024-08-13T23:15:19.827000
|
||||
CVE-2024-7751,0,0,a338e2ef7af6db08f4f56f135d62d0c3f18aab409a31e46e5bfe24e4f2d7d61f,2024-08-13T23:15:20.110000
|
||||
CVE-2024-7752,1,1,561034a105798ba76af21d9a1a298eb318763005e696ca723a2a9ea84be808c1,2024-08-14T00:15:08.433000
|
||||
CVE-2024-7753,1,1,79d2f0f06d38b10e73a325241a864e20910422bc909eb7b27938e35aae03229f,2024-08-14T01:15:12.120000
|
||||
CVE-2024-7754,1,1,e84e166e1263c87ee14ee144ee12aadbc71460513ca456f8d688b40ccc1eaae8,2024-08-14T01:15:12.417000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user