Auto-Update: 2024-08-14T02:00:17.431079+00:00

This commit is contained in:
cad-safe-bot 2024-08-14 02:03:14 +00:00
parent 5f1ed8eafd
commit 83beec8407
16 changed files with 543 additions and 45 deletions

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-28986",
"sourceIdentifier": "psirt@solarwinds.com",
"published": "2024-08-13T23:15:16.627",
"lastModified": "2024-08-13T23:15:16.627",
"lastModified": "2024-08-14T00:15:06.323",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SolarWinds Web Help Desk was susceptible to a Java Deserialization Remote Code Execution that would allow access to run commands on the host machine."
"value": "SolarWinds Web Help Desk was found to be susceptible to a Java Deserialization Remote Code Execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. \n\n\n\nWhile it was reported as an unauthenticated vulnerability, SolarWinds has been unable to reproduce it without authentication after thorough testing. \u00a0\n\n\n\nHowever, out of an abundance of caution, we recommend all Web Help Desk customers apply the patch, which is now available."
}
],
"metrics": {

View File

@ -2,9 +2,13 @@
"id": "CVE-2024-38106",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-08-13T18:15:10.713",
"lastModified": "2024-08-13T18:15:10.713",
"lastModified": "2024-08-14T01:00:01.500",
"vulnStatus": "Received",
"cveTags": [],
"cisaExploitAdd": "2024-08-13",
"cisaActionDue": "2024-09-03",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Microsoft Windows Kernel Privilege Escalation Vulnerability",
"descriptions": [
{
"lang": "en",

View File

@ -2,9 +2,13 @@
"id": "CVE-2024-38107",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-08-13T18:15:10.963",
"lastModified": "2024-08-13T18:15:10.963",
"lastModified": "2024-08-14T01:00:01.500",
"vulnStatus": "Received",
"cveTags": [],
"cisaExploitAdd": "2024-08-13",
"cisaActionDue": "2024-09-03",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Microsoft Windows Power Dependency Coordinator Privilege Escalation Vulnerability",
"descriptions": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-38109",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-08-13T18:15:11.490",
"lastModified": "2024-08-13T22:15:06.230",
"lastModified": "2024-08-14T00:15:06.577",
"vulnStatus": "Received",
"cveTags": [
{

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-38163",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-08-14T00:15:07.453",
"lastModified": "2024-08-14T00:15:07.453",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Update Stack Elevation of Privilege Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38163",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-38166",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-08-06T22:15:54.163",
"lastModified": "2024-08-13T22:15:07.237",
"lastModified": "2024-08-14T00:15:07.687",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -2,9 +2,13 @@
"id": "CVE-2024-38178",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-08-13T18:15:26.220",
"lastModified": "2024-08-13T18:15:26.220",
"lastModified": "2024-08-14T01:00:01.500",
"vulnStatus": "Received",
"cveTags": [],
"cisaExploitAdd": "2024-08-13",
"cisaActionDue": "2024-09-03",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Microsoft Windows Scripting Engine Memory Corruption Vulnerability",
"descriptions": [
{
"lang": "en",

View File

@ -2,9 +2,13 @@
"id": "CVE-2024-38189",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-08-13T18:15:27.733",
"lastModified": "2024-08-13T18:15:27.733",
"lastModified": "2024-08-14T01:00:01.500",
"vulnStatus": "Received",
"cveTags": [],
"cisaExploitAdd": "2024-08-13",
"cisaActionDue": "2024-09-03",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Microsoft Project Remote Code Execution Vulnerability ",
"descriptions": [
{
"lang": "en",

View File

@ -2,9 +2,13 @@
"id": "CVE-2024-38193",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-08-13T18:15:28.230",
"lastModified": "2024-08-13T18:15:28.230",
"lastModified": "2024-08-14T01:00:01.500",
"vulnStatus": "Received",
"cveTags": [],
"cisaExploitAdd": "2024-08-13",
"cisaActionDue": "2024-09-03",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability",
"descriptions": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-38206",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-08-06T22:15:54.430",
"lastModified": "2024-08-13T22:15:07.837",
"lastModified": "2024-08-14T00:15:08.213",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -2,9 +2,13 @@
"id": "CVE-2024-38213",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-08-13T18:15:30.750",
"lastModified": "2024-08-13T18:15:30.750",
"lastModified": "2024-08-14T01:00:01.500",
"vulnStatus": "Received",
"cveTags": [],
"cisaExploitAdd": "2024-08-13",
"cisaActionDue": "2024-09-03",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Microsoft Windows SmartScreen Security Feature Bypass Vulnerability",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-7752",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-14T00:15:08.433",
"lastModified": "2024-08-14T00:15:08.433",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Clinics Patient Management System 1.0. It has been classified as problematic. This affects an unknown part of the file /update_medicine.php. The manipulation of the argument medicine_name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/Wsstiger/cve/blob/main/Clinic's_xss.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.274371",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.274371",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.389305",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-7753",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-14T01:15:12.120",
"lastModified": "2024-08-14T01:15:12.120",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Clinics Patient Management System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /user_images/. The manipulation leads to direct request. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-425"
}
]
}
],
"references": [
{
"url": "https://github.com/Wsstiger/cve/blob/main/Clinic's_Directory.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.274372",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.274372",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.389361",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-7754",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-14T01:15:12.417",
"lastModified": "2024-08-14T01:15:12.417",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Clinics Patient Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /ajax/check_medicine_name.php. The manipulation of the argument user_name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/Wsstiger/cve/blob/main/Clinic's_sql3.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.274373",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.274373",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.389367",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-08-13T23:55:17.355925+00:00
2024-08-14T02:00:17.431079+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-08-13T23:15:20.110000+00:00
2024-08-14T01:15:12.417000+00:00
```
### Last Data Feed Release
@ -27,36 +27,39 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2024-08-13T00:00:08.646570+00:00
2024-08-14T00:00:08.642177+00:00
```
### Total Number of included CVEs
```plain
259865
259869
```
### CVEs added in the last Commit
Recently added CVEs: `5`
Recently added CVEs: `4`
- [CVE-2024-28986](CVE-2024/CVE-2024-289xx/CVE-2024-28986.json) (`2024-08-13T23:15:16.627`)
- [CVE-2024-7748](CVE-2024/CVE-2024-77xx/CVE-2024-7748.json) (`2024-08-13T22:15:08.087`)
- [CVE-2024-7749](CVE-2024/CVE-2024-77xx/CVE-2024-7749.json) (`2024-08-13T22:15:08.390`)
- [CVE-2024-7750](CVE-2024/CVE-2024-77xx/CVE-2024-7750.json) (`2024-08-13T23:15:19.827`)
- [CVE-2024-7751](CVE-2024/CVE-2024-77xx/CVE-2024-7751.json) (`2024-08-13T23:15:20.110`)
- [CVE-2024-38163](CVE-2024/CVE-2024-381xx/CVE-2024-38163.json) (`2024-08-14T00:15:07.453`)
- [CVE-2024-7752](CVE-2024/CVE-2024-77xx/CVE-2024-7752.json) (`2024-08-14T00:15:08.433`)
- [CVE-2024-7753](CVE-2024/CVE-2024-77xx/CVE-2024-7753.json) (`2024-08-14T01:15:12.120`)
- [CVE-2024-7754](CVE-2024/CVE-2024-77xx/CVE-2024-7754.json) (`2024-08-14T01:15:12.417`)
### CVEs modified in the last Commit
Recently modified CVEs: `6`
Recently modified CVEs: `10`
- [CVE-2024-38109](CVE-2024/CVE-2024-381xx/CVE-2024-38109.json) (`2024-08-13T22:15:06.230`)
- [CVE-2024-38164](CVE-2024/CVE-2024-381xx/CVE-2024-38164.json) (`2024-08-13T23:15:19.427`)
- [CVE-2024-38166](CVE-2024/CVE-2024-381xx/CVE-2024-38166.json) (`2024-08-13T22:15:07.237`)
- [CVE-2024-38176](CVE-2024/CVE-2024-381xx/CVE-2024-38176.json) (`2024-08-13T23:15:19.540`)
- [CVE-2024-38182](CVE-2024/CVE-2024-381xx/CVE-2024-38182.json) (`2024-08-13T23:15:19.657`)
- [CVE-2024-38206](CVE-2024/CVE-2024-382xx/CVE-2024-38206.json) (`2024-08-13T22:15:07.837`)
- [CVE-2024-28986](CVE-2024/CVE-2024-289xx/CVE-2024-28986.json) (`2024-08-14T00:15:06.323`)
- [CVE-2024-38106](CVE-2024/CVE-2024-381xx/CVE-2024-38106.json) (`2024-08-14T01:00:01.500`)
- [CVE-2024-38107](CVE-2024/CVE-2024-381xx/CVE-2024-38107.json) (`2024-08-14T01:00:01.500`)
- [CVE-2024-38109](CVE-2024/CVE-2024-381xx/CVE-2024-38109.json) (`2024-08-14T00:15:06.577`)
- [CVE-2024-38166](CVE-2024/CVE-2024-381xx/CVE-2024-38166.json) (`2024-08-14T00:15:07.687`)
- [CVE-2024-38178](CVE-2024/CVE-2024-381xx/CVE-2024-38178.json) (`2024-08-14T01:00:01.500`)
- [CVE-2024-38189](CVE-2024/CVE-2024-381xx/CVE-2024-38189.json) (`2024-08-14T01:00:01.500`)
- [CVE-2024-38193](CVE-2024/CVE-2024-381xx/CVE-2024-38193.json) (`2024-08-14T01:00:01.500`)
- [CVE-2024-38206](CVE-2024/CVE-2024-382xx/CVE-2024-38206.json) (`2024-08-14T00:15:08.213`)
- [CVE-2024-38213](CVE-2024/CVE-2024-382xx/CVE-2024-38213.json) (`2024-08-14T01:00:01.500`)
## Download and Usage

View File

@ -248862,7 +248862,7 @@ CVE-2024-2898,0,0,7dabbc345008f13b8373a1a2d71ee4344db041576d9ae3f0290950d4a3a3f3
CVE-2024-28982,0,0,4cfbf3591cf96f37013314412d2a968313b4953b63ec28142d546cf8f6808f7e,2024-06-27T12:47:19.847000
CVE-2024-28983,0,0,57b7369f9816fa1a55923b116dcbb27a793b7aad06b7761c68b9fcd8c194e8f4,2024-06-27T12:47:19.847000
CVE-2024-28984,0,0,276bc8c54cf8ee7419930c3e9177a9acf5146d6167c989ef6d1387fafadac995,2024-06-27T12:47:19.847000
CVE-2024-28986,1,1,d51ca786ff033043897ad5364abb6c8f79239a251aa6930b1a4e8dbae67a7bb2,2024-08-13T23:15:16.627000
CVE-2024-28986,0,1,a8371254b04fdefe526ae3382994c4b109b0a11b2575a4a2c90b6d08b330c77d,2024-08-14T00:15:06.323000
CVE-2024-2899,0,0,0be0fb50fdcc13228c9b49554460e4a306be4c6e83ee7f9bfb94b945f4f9e595,2024-05-17T02:38:36.220000
CVE-2024-28992,0,0,696c70c13cdfd39478c05c8c040491fa3a08d2263d68b357789c3f03fee2f204,2024-07-18T12:28:43.707000
CVE-2024-28993,0,0,929415671d938543e4980e176019e6c6553f30e59f81cf3d32505fa605110cfe,2024-07-18T12:28:43.707000
@ -255019,10 +255019,10 @@ CVE-2024-38102,0,0,b8f3bed70811e842b10b0e44e049aa13327d439097a470d245182f818341d
CVE-2024-38103,0,0,8d61fae077d92ec76899abed46ea2dbe921ece390d18d12a488e0d3b07b3a5ce,2024-07-30T15:35:25.923000
CVE-2024-38104,0,0,934543cd72c92227418f82cc6731b22a50ac357f374ae5c93a97a0b40688cfaa,2024-07-11T18:32:06.187000
CVE-2024-38105,0,0,5ee7b6bcc3f23b6c027ef1e20204ab9e08d3961eefc81a59082038a3ba1cd79b,2024-07-11T18:31:05.480000
CVE-2024-38106,0,0,c42933988379a262c4f3e4e0f9d7f1f98a3c2788fff18332adf00970abb7f002,2024-08-13T18:15:10.713000
CVE-2024-38107,0,0,21e19d6a777dcf81eb65771b44362ce74b5d4d71dda139302f253d122e2a163e,2024-08-13T18:15:10.963000
CVE-2024-38106,0,1,16c1bdadbad583d43da2349c79b20e4069747c58fcb46c7c4a14489624d66063,2024-08-14T01:00:01.500000
CVE-2024-38107,0,1,36c5c67a43d0ce8fb641b30629ffe3950af7b62d4ecbc787ac334c67cdab4fae,2024-08-14T01:00:01.500000
CVE-2024-38108,0,0,974aac74146d94e9db2790bb89f3e3bedbaa461fa3a103e4d1a0de1301ea465a,2024-08-13T18:15:11.240000
CVE-2024-38109,0,1,a0ff6bf5ff1ff69c63bbf5ae8b6e0dd26962f10f222b0eaa19e9d444d8368c50,2024-08-13T22:15:06.230000
CVE-2024-38109,0,1,31e987a7cdba631c67dc3003fe52cc1938f45110ca21751630550750c3eb8a72,2024-08-14T00:15:06.577000
CVE-2024-3811,0,0,7753fbebaa8d958ade5ff525a0ab8fa28bb6d42c662f58346b2bf00c9a2b2418,2024-05-20T13:00:34.807000
CVE-2024-38112,0,0,f5d04dd24034822a51d80d554640736bed9f2c0a96bc6eed6acb547c42c42e9c,2024-07-13T00:15:04.950000
CVE-2024-38114,0,0,fc6be8aeb72973d04cf821194812f0ad717b4ad459dd87bf0c25e9c6708f5fbf,2024-08-13T18:15:11.820000
@ -255074,9 +255074,10 @@ CVE-2024-3816,0,0,75ffa648a8fdfd5e75d27a5c1f7d2535fe4ef8b6da1bbd82db22ae48c44378
CVE-2024-38160,0,0,0901b1829b388b875c6937cbe5b4a96f0751712e2a8db319315b6e7078a42879,2024-08-13T18:15:23.207000
CVE-2024-38161,0,0,a411ece2a51258b08f957b2b8ced858a3f01e2a31531bca517682fbf23db95dc,2024-08-13T18:15:23.437000
CVE-2024-38162,0,0,45aa50d93cf9fd854bd60aac88f80f89dfc2d9a8d8cee7f1c5db520c1a0a85ae,2024-08-13T18:15:23.687000
CVE-2024-38164,0,1,5dfe5497b159dc6d650c6ff37650e46a116acbd9d5ffab5078a712d0e4b04cba,2024-08-13T23:15:19.427000
CVE-2024-38163,1,1,73fa1fdb30689b68773bbf8d72d018094de39ce8590ae4e29baa232bae1943f7,2024-08-14T00:15:07.453000
CVE-2024-38164,0,0,5dfe5497b159dc6d650c6ff37650e46a116acbd9d5ffab5078a712d0e4b04cba,2024-08-13T23:15:19.427000
CVE-2024-38165,0,0,692a4023381217757d24dda3766179bf93044d5f438504fd16cf4feda7fc25b3,2024-08-13T18:15:23.913000
CVE-2024-38166,0,1,e2e5e54955e63345dc53b863a5f02a0a8ef4623611ec7781232cfb701df50dff,2024-08-13T22:15:07.237000
CVE-2024-38166,0,1,0d6aa0db05dc6fc37adb0dfcc7266781bf49330da86bf3115a3388df5e4dbef0,2024-08-14T00:15:07.687000
CVE-2024-38167,0,0,e887d79b2dee38f802fd34b2ff2cb40a7c96c4ef273383a676ec0b52c90ade98,2024-08-13T18:15:24.370000
CVE-2024-38168,0,0,8335f41b1f983f2bf8a7d243fec783f3911da173d857dc58f27128a1a1d1b21e,2024-08-13T18:15:24.627000
CVE-2024-38169,0,0,8a77823c9a0c0c3c7a76acfae0ecb0ae63d0d8912459af8c292007d4a0a344f2,2024-08-13T18:15:24.857000
@ -255085,20 +255086,20 @@ CVE-2024-38170,0,0,3923523c651d0ba51c8f6cb69410d4a004fce42ead9895c105a7d9da9413d
CVE-2024-38171,0,0,c9666bedadbfb085a60d1c86a737b19631101c3058ee0cff0fe853bc455eace8,2024-08-13T18:15:25.300000
CVE-2024-38172,0,0,19a7fa728427b7e6096c5f20dfbda65dba033a6f150b22ca13b10cd673dec332,2024-08-13T18:15:25.530000
CVE-2024-38173,0,0,542ec2edb915e69730d7696b530b8e946c5e175797f4031a84fd9751ab4554d5,2024-08-13T18:15:25.750000
CVE-2024-38176,0,1,d026365cfa60427a2aa768447fd78b35c5b5d665c83edd557822602e0115dba8,2024-08-13T23:15:19.540000
CVE-2024-38176,0,0,d026365cfa60427a2aa768447fd78b35c5b5d665c83edd557822602e0115dba8,2024-08-13T23:15:19.540000
CVE-2024-38177,0,0,ab166044ca5bb6ef3f28b94fa21dac4d4898daea29081351d8f8a7533691498e,2024-08-13T18:15:25.987000
CVE-2024-38178,0,0,e2c0b6b1f490d536d583aa0496228458f790aaa1d9d823a460929d33d5065398,2024-08-13T18:15:26.220000
CVE-2024-38178,0,1,4d010c7f2d0bca9ab184c8d81e59b36ef2b4834df69aa753c3428f5c53537587,2024-08-14T01:00:01.500000
CVE-2024-3818,0,0,b4c982a18364880791124fa7ba25840b7eb37a53aa1551fa23324d948b6ddd3f,2024-04-19T13:10:25.637000
CVE-2024-38180,0,0,bf91c82bf87b502b33f82c9bbb60d5c3c58b9150a0ae28b950dfbea59306a62e,2024-08-13T18:15:26.463000
CVE-2024-38182,0,1,a7e7d48d119dbb99a3d726dc4a8acec7a776a49bc59985c5f0bc4c0a335c69d9,2024-08-13T23:15:19.657000
CVE-2024-38182,0,0,a7e7d48d119dbb99a3d726dc4a8acec7a776a49bc59985c5f0bc4c0a335c69d9,2024-08-13T23:15:19.657000
CVE-2024-38184,0,0,8c61228bd2332e9ed0914be65545f2e305f16ad1550e91e212481d787357a318,2024-08-13T18:15:26.733000
CVE-2024-38185,0,0,09a28ca203e59822fecf1305b4efe6b57cf8736d3ef0f86795a1aa43f7a6ae52,2024-08-13T18:15:26.970000
CVE-2024-38186,0,0,4c242cea12afc97857ea55567a874a4dcad25c7b9035314137599bc7316d9d1c,2024-08-13T18:15:27.217000
CVE-2024-38187,0,0,8fb7e3a19ee970cc433235fcfb2b122d99777ece83926c417adb709bd9eca8f0,2024-08-13T18:15:27.447000
CVE-2024-38189,0,0,c94e4b60dedef9e3ef30a892f8f7cc07fee7a7a52f244c9b1ed5b8424344698d,2024-08-13T18:15:27.733000
CVE-2024-38189,0,1,01445528544a2a576268b30ef09aaf7514e6b23966ecf23061a605051a83ceaf,2024-08-14T01:00:01.500000
CVE-2024-3819,0,0,c25bdc543ba06fd05ac51b0b8912467c3fc6d8848be54d697bfdb5995b1a7e51,2024-05-02T18:00:37.360000
CVE-2024-38191,0,0,f2d87a18b010ccc2c97bb17a5f5c6c8e3752ea45d9e5f00a6570ae2632f904f1,2024-08-13T18:15:27.977000
CVE-2024-38193,0,0,fff342f0f0709d166fca49c0c01e67e53969bba9f5e5bee214b425feb38975ea,2024-08-13T18:15:28.230000
CVE-2024-38193,0,1,3fd261a31fb6729d16b1019faa1bcdb02917feec087445e3f22a8fc569cf31eb,2024-08-14T01:00:01.500000
CVE-2024-38195,0,0,989f9516911353ed226df8303a33d4a04a6c842836adb9bbf7dcf34ef33a4876,2024-08-13T18:15:28.470000
CVE-2024-38196,0,0,6d32d5f27d4d27c2d5465aed64b34ee2c48f8eae17ec5920470094e1a799af4a,2024-08-13T18:15:28.710000
CVE-2024-38197,0,0,3f3689f8b05e705a97921507891f469637ad32f7e7c9703ec6e1cb98fc676d2e,2024-08-13T18:15:28.957000
@ -255108,10 +255109,10 @@ CVE-2024-3820,0,0,8985e7d1e7aecc5fe081b43705d723ec0ca067093ca4a65f30dd280cab8408
CVE-2024-38200,0,0,d566a27ccd0b19f8229e9b6ce0a19c6b80662cfcd111693b799cdefa30455084,2024-08-13T18:15:29.720000
CVE-2024-38201,0,0,dfea92a06d88e2cd469bfcb27fae053f221f3e6bccc76607c5d109dd86a0063b,2024-08-13T18:15:29.953000
CVE-2024-38202,0,0,e2d641c476f9dc13a8d336a19bdebe9a3b3a110a87f90a532b99552457779a18,2024-08-13T18:15:30.203000
CVE-2024-38206,0,1,568a3a99dd1b92e451afa7daaf5d6bfa79690bf062bfc04c54cbbcb02a746403,2024-08-13T22:15:07.837000
CVE-2024-38206,0,1,159422281702f43b217eea303b5c7354ebb2179d51ac658c6c0c018b5ec16a40,2024-08-14T00:15:08.213000
CVE-2024-3821,0,0,3ffbadbdaf34f564e9c498f1baa8fe758531e73989a1bbb861692bcbfdfc262c,2024-06-03T14:46:24.250000
CVE-2024-38211,0,0,4130039db3014f8006fd0f770c7c8c1714450e0066bd6eaea1815f4f91aca431,2024-08-13T18:15:30.470000
CVE-2024-38213,0,0,fe63c53b12f91f600d7c7108103f2de87f74deb442c6bdb53693e829e19387e6,2024-08-13T18:15:30.750000
CVE-2024-38213,0,1,1e4c3bca67002c34680b1d4b2d10c4b8d2054c43e0e848842a26a426751a3623,2024-08-14T01:00:01.500000
CVE-2024-38214,0,0,653a59c00f60f2f520e2d206e073ab31a9abae3cf7125249dbcdabf44c0482df,2024-08-13T18:15:30.983000
CVE-2024-38215,0,0,dc63bfb811b08cf0eb1add182015da819d502b3885d7262e7500a5891604fa9a,2024-08-13T18:15:31.247000
CVE-2024-38218,0,0,d8154113c709876f61605539852c344572b202f6d86619699565b8c3f572b9b4,2024-08-13T18:15:31.500000
@ -259860,7 +259861,10 @@ CVE-2024-7741,0,0,64db8805abe7399258370822df6cb3cd5d66cd4b3f64dcf843bcca96441029
CVE-2024-7742,0,0,0788a81f8016fcbc7967f57ded53cfdf2f9e434d4212461c0c0d0f71dc56cb70,2024-08-13T21:15:16.627000
CVE-2024-7743,0,0,c2afeed689d9f90ba7b51a6cd110286fff67213e0376fd7d4b1ddaa474390a6a,2024-08-13T21:15:17.197000
CVE-2024-7746,0,0,044d8677cf6b2af5249591875e67a177e20bc681af5642444c6a36878f418500,2024-08-13T17:11:53.553000
CVE-2024-7748,1,1,ea3241382b6e064bd63c4a6b6e946c25339e474f79d0219c51c17ffc7328653f,2024-08-13T22:15:08.087000
CVE-2024-7749,1,1,96cd68c33fc9d9fb095e2d016ea0ed123f47d4e6adb3f7bc1577ad9857add464,2024-08-13T22:15:08.390000
CVE-2024-7750,1,1,f0f13ba02f2a487bb606ebf8f6da8c1c79a0e8396630eb5549a2a71493c0ad25,2024-08-13T23:15:19.827000
CVE-2024-7751,1,1,a338e2ef7af6db08f4f56f135d62d0c3f18aab409a31e46e5bfe24e4f2d7d61f,2024-08-13T23:15:20.110000
CVE-2024-7748,0,0,ea3241382b6e064bd63c4a6b6e946c25339e474f79d0219c51c17ffc7328653f,2024-08-13T22:15:08.087000
CVE-2024-7749,0,0,96cd68c33fc9d9fb095e2d016ea0ed123f47d4e6adb3f7bc1577ad9857add464,2024-08-13T22:15:08.390000
CVE-2024-7750,0,0,f0f13ba02f2a487bb606ebf8f6da8c1c79a0e8396630eb5549a2a71493c0ad25,2024-08-13T23:15:19.827000
CVE-2024-7751,0,0,a338e2ef7af6db08f4f56f135d62d0c3f18aab409a31e46e5bfe24e4f2d7d61f,2024-08-13T23:15:20.110000
CVE-2024-7752,1,1,561034a105798ba76af21d9a1a298eb318763005e696ca723a2a9ea84be808c1,2024-08-14T00:15:08.433000
CVE-2024-7753,1,1,79d2f0f06d38b10e73a325241a864e20910422bc909eb7b27938e35aae03229f,2024-08-14T01:15:12.120000
CVE-2024-7754,1,1,e84e166e1263c87ee14ee144ee12aadbc71460513ca456f8d688b40ccc1eaae8,2024-08-14T01:15:12.417000

Can't render this file because it is too large.