From 9623dbd83778a3e3924f28b87fc42ce2ef7937e0 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 20 Aug 2024 16:03:15 +0000 Subject: [PATCH] Auto-Update: 2024-08-20T16:00:18.583404+00:00 --- CVE-2021/CVE-2021-275xx/CVE-2021-27506.json | 6 +- CVE-2021/CVE-2021-286xx/CVE-2021-28665.json | 10 +- CVE-2021/CVE-2021-289xx/CVE-2021-28962.json | 18 +- CVE-2021/CVE-2021-316xx/CVE-2021-31617.json | 18 +- CVE-2021/CVE-2021-33xx/CVE-2021-3384.json | 22 +- CVE-2022/CVE-2022-12xx/CVE-2022-1206.json | 8 +- CVE-2022/CVE-2022-239xx/CVE-2022-23989.json | 18 +- CVE-2022/CVE-2022-278xx/CVE-2022-27812.json | 18 +- CVE-2022/CVE-2022-302xx/CVE-2022-30279.json | 6 +- CVE-2022/CVE-2022-325xx/CVE-2022-32506.json | 39 +- CVE-2023/CVE-2023-260xx/CVE-2023-26095.json | 10 +- CVE-2023/CVE-2023-286xx/CVE-2023-28616.json | 14 +- CVE-2023/CVE-2023-350xx/CVE-2023-35022.json | 64 ++- CVE-2023/CVE-2023-438xx/CVE-2023-43848.json | 39 +- CVE-2023/CVE-2023-468xx/CVE-2023-46870.json | 39 +- CVE-2023/CVE-2023-470xx/CVE-2023-47091.json | 14 +- CVE-2024/CVE-2024-214xx/CVE-2024-21449.json | 46 +- CVE-2024/CVE-2024-216xx/CVE-2024-21689.json | 8 +- CVE-2024/CVE-2024-220xx/CVE-2024-22095.json | 12 +- CVE-2024/CVE-2024-230xx/CVE-2024-23084.json | 39 +- CVE-2024/CVE-2024-232xx/CVE-2024-23299.json | 34 +- CVE-2024/CVE-2024-242xx/CVE-2024-24293.json | 39 +- CVE-2024/CVE-2024-250xx/CVE-2024-25009.json | 4 +- CVE-2024/CVE-2024-272xx/CVE-2024-27281.json | 39 +- CVE-2024/CVE-2024-277xx/CVE-2024-27728.json | 39 +- CVE-2024/CVE-2024-278xx/CVE-2024-27882.json | 109 ++++- CVE-2024/CVE-2024-278xx/CVE-2024-27883.json | 109 ++++- CVE-2024/CVE-2024-278xx/CVE-2024-27884.json | 199 ++++++++- CVE-2024/CVE-2024-278xx/CVE-2024-27887.json | 71 +++- CVE-2024/CVE-2024-280xx/CVE-2024-28087.json | 39 +- CVE-2024/CVE-2024-287xx/CVE-2024-28795.json | 52 ++- CVE-2024/CVE-2024-288xx/CVE-2024-28829.json | 8 +- CVE-2024/CVE-2024-291xx/CVE-2024-29159.json | 39 +- CVE-2024/CVE-2024-292xx/CVE-2024-29276.json | 39 +- CVE-2024/CVE-2024-296xx/CVE-2024-29651.json | 39 +- CVE-2024/CVE-2024-309xx/CVE-2024-30949.json | 29 ++ CVE-2024/CVE-2024-310xx/CVE-2024-31011.json | 39 +- CVE-2024/CVE-2024-322xx/CVE-2024-32269.json | 39 +- CVE-2024/CVE-2024-323xx/CVE-2024-32351.json | 39 +- CVE-2024/CVE-2024-326xx/CVE-2024-32617.json | 39 +- CVE-2024/CVE-2024-326xx/CVE-2024-32621.json | 39 +- CVE-2024/CVE-2024-326xx/CVE-2024-32622.json | 39 +- CVE-2024/CVE-2024-332xx/CVE-2024-33219.json | 39 +- CVE-2024/CVE-2024-338xx/CVE-2024-33806.json | 39 +- CVE-2024/CVE-2024-338xx/CVE-2024-33872.json | 21 + CVE-2024/CVE-2024-341xx/CVE-2024-34193.json | 39 +- CVE-2024/CVE-2024-342xx/CVE-2024-34240.json | 39 +- CVE-2024/CVE-2024-344xx/CVE-2024-34458.json | 21 + CVE-2024/CVE-2024-349xx/CVE-2024-34934.json | 39 +- CVE-2024/CVE-2024-350xx/CVE-2024-35010.json | 39 +- CVE-2024/CVE-2024-350xx/CVE-2024-35079.json | 39 +- CVE-2024/CVE-2024-352xx/CVE-2024-35205.json | 39 +- CVE-2024/CVE-2024-352xx/CVE-2024-35256.json | 46 +- CVE-2024/CVE-2024-352xx/CVE-2024-35271.json | 46 +- CVE-2024/CVE-2024-352xx/CVE-2024-35272.json | 46 +- CVE-2024/CVE-2024-353xx/CVE-2024-35374.json | 39 +- CVE-2024/CVE-2024-354xx/CVE-2024-35409.json | 39 +- CVE-2024/CVE-2024-355xx/CVE-2024-35538.json | 49 ++- CVE-2024/CVE-2024-355xx/CVE-2024-35539.json | 8 +- CVE-2024/CVE-2024-355xx/CVE-2024-35540.json | 21 + CVE-2024/CVE-2024-355xx/CVE-2024-35556.json | 39 +- CVE-2024/CVE-2024-355xx/CVE-2024-35580.json | 39 +- CVE-2024/CVE-2024-355xx/CVE-2024-35582.json | 39 +- CVE-2024/CVE-2024-355xx/CVE-2024-35592.json | 39 +- CVE-2024/CVE-2024-360xx/CVE-2024-36052.json | 39 +- CVE-2024/CVE-2024-360xx/CVE-2024-36079.json | 39 +- CVE-2024/CVE-2024-367xx/CVE-2024-36734.json | 39 +- CVE-2024/CVE-2024-373xx/CVE-2024-37318.json | 46 +- CVE-2024/CVE-2024-373xx/CVE-2024-37319.json | 46 +- CVE-2024/CVE-2024-373xx/CVE-2024-37320.json | 46 +- CVE-2024/CVE-2024-373xx/CVE-2024-37321.json | 46 +- CVE-2024/CVE-2024-373xx/CVE-2024-37322.json | 46 +- CVE-2024/CVE-2024-373xx/CVE-2024-37323.json | 46 +- CVE-2024/CVE-2024-373xx/CVE-2024-37324.json | 46 +- CVE-2024/CVE-2024-373xx/CVE-2024-37326.json | 46 +- CVE-2024/CVE-2024-373xx/CVE-2024-37327.json | 46 +- CVE-2024/CVE-2024-373xx/CVE-2024-37328.json | 46 +- CVE-2024/CVE-2024-373xx/CVE-2024-37329.json | 46 +- CVE-2024/CVE-2024-373xx/CVE-2024-37330.json | 46 +- CVE-2024/CVE-2024-373xx/CVE-2024-37331.json | 46 +- CVE-2024/CVE-2024-373xx/CVE-2024-37332.json | 46 +- CVE-2024/CVE-2024-373xx/CVE-2024-37333.json | 46 +- CVE-2024/CVE-2024-373xx/CVE-2024-37336.json | 46 +- CVE-2024/CVE-2024-378xx/CVE-2024-37856.json | 75 +++- CVE-2024/CVE-2024-380xx/CVE-2024-38087.json | 46 +- CVE-2024/CVE-2024-380xx/CVE-2024-38088.json | 46 +- CVE-2024/CVE-2024-388xx/CVE-2024-38808.json | 8 +- CVE-2024/CVE-2024-388xx/CVE-2024-38810.json | 8 +- CVE-2024/CVE-2024-390xx/CVE-2024-39094.json | 29 ++ CVE-2024/CVE-2024-392xx/CVE-2024-39277.json | 34 +- CVE-2024/CVE-2024-394xx/CVE-2024-39495.json | 34 +- CVE-2024/CVE-2024-396xx/CVE-2024-39690.json | 60 +++ CVE-2024/CVE-2024-407xx/CVE-2024-40774.json | 209 ++++++++- CVE-2024/CVE-2024-407xx/CVE-2024-40775.json | 109 ++++- CVE-2024/CVE-2024-407xx/CVE-2024-40776.json | 258 ++++++++++- CVE-2024/CVE-2024-409xx/CVE-2024-40902.json | 34 +- CVE-2024/CVE-2024-416xx/CVE-2024-41697.json | 4 +- CVE-2024/CVE-2024-416xx/CVE-2024-41698.json | 4 +- CVE-2024/CVE-2024-416xx/CVE-2024-41699.json | 4 +- CVE-2024/CVE-2024-417xx/CVE-2024-41700.json | 4 +- CVE-2024/CVE-2024-420xx/CVE-2024-42006.json | 21 + CVE-2024/CVE-2024-423xx/CVE-2024-42334.json | 4 +- CVE-2024/CVE-2024-423xx/CVE-2024-42335.json | 4 +- CVE-2024/CVE-2024-423xx/CVE-2024-42336.json | 4 +- CVE-2024/CVE-2024-423xx/CVE-2024-42369.json | 60 +++ CVE-2024/CVE-2024-425xx/CVE-2024-42552.json | 4 +- CVE-2024/CVE-2024-425xx/CVE-2024-42553.json | 4 +- CVE-2024/CVE-2024-425xx/CVE-2024-42554.json | 41 +- CVE-2024/CVE-2024-425xx/CVE-2024-42555.json | 4 +- CVE-2024/CVE-2024-425xx/CVE-2024-42556.json | 4 +- CVE-2024/CVE-2024-425xx/CVE-2024-42557.json | 4 +- CVE-2024/CVE-2024-425xx/CVE-2024-42558.json | 4 +- CVE-2024/CVE-2024-425xx/CVE-2024-42559.json | 4 +- CVE-2024/CVE-2024-425xx/CVE-2024-42560.json | 4 +- CVE-2024/CVE-2024-425xx/CVE-2024-42561.json | 41 +- CVE-2024/CVE-2024-425xx/CVE-2024-42562.json | 4 +- CVE-2024/CVE-2024-425xx/CVE-2024-42563.json | 4 +- CVE-2024/CVE-2024-425xx/CVE-2024-42564.json | 4 +- CVE-2024/CVE-2024-425xx/CVE-2024-42565.json | 4 +- CVE-2024/CVE-2024-425xx/CVE-2024-42566.json | 4 +- CVE-2024/CVE-2024-425xx/CVE-2024-42567.json | 4 +- CVE-2024/CVE-2024-425xx/CVE-2024-42568.json | 4 +- CVE-2024/CVE-2024-425xx/CVE-2024-42569.json | 4 +- CVE-2024/CVE-2024-425xx/CVE-2024-42570.json | 4 +- CVE-2024/CVE-2024-425xx/CVE-2024-42571.json | 41 +- CVE-2024/CVE-2024-425xx/CVE-2024-42572.json | 4 +- CVE-2024/CVE-2024-425xx/CVE-2024-42573.json | 4 +- CVE-2024/CVE-2024-425xx/CVE-2024-42574.json | 4 +- CVE-2024/CVE-2024-425xx/CVE-2024-42575.json | 4 +- CVE-2024/CVE-2024-425xx/CVE-2024-42576.json | 4 +- CVE-2024/CVE-2024-425xx/CVE-2024-42577.json | 4 +- CVE-2024/CVE-2024-425xx/CVE-2024-42578.json | 41 +- CVE-2024/CVE-2024-425xx/CVE-2024-42579.json | 4 +- CVE-2024/CVE-2024-425xx/CVE-2024-42580.json | 4 +- CVE-2024/CVE-2024-425xx/CVE-2024-42581.json | 4 +- CVE-2024/CVE-2024-425xx/CVE-2024-42582.json | 4 +- CVE-2024/CVE-2024-425xx/CVE-2024-42583.json | 4 +- CVE-2024/CVE-2024-425xx/CVE-2024-42584.json | 4 +- CVE-2024/CVE-2024-425xx/CVE-2024-42585.json | 4 +- CVE-2024/CVE-2024-425xx/CVE-2024-42586.json | 4 +- CVE-2024/CVE-2024-426xx/CVE-2024-42603.json | 21 + CVE-2024/CVE-2024-426xx/CVE-2024-42604.json | 21 + CVE-2024/CVE-2024-426xx/CVE-2024-42605.json | 21 + CVE-2024/CVE-2024-426xx/CVE-2024-42606.json | 21 + CVE-2024/CVE-2024-426xx/CVE-2024-42607.json | 21 + CVE-2024/CVE-2024-426xx/CVE-2024-42608.json | 21 + CVE-2024/CVE-2024-426xx/CVE-2024-42609.json | 21 + CVE-2024/CVE-2024-426xx/CVE-2024-42610.json | 21 + CVE-2024/CVE-2024-426xx/CVE-2024-42611.json | 21 + CVE-2024/CVE-2024-426xx/CVE-2024-42613.json | 21 + CVE-2024/CVE-2024-426xx/CVE-2024-42616.json | 21 + CVE-2024/CVE-2024-426xx/CVE-2024-42617.json | 21 + CVE-2024/CVE-2024-426xx/CVE-2024-42618.json | 21 + CVE-2024/CVE-2024-426xx/CVE-2024-42621.json | 21 + CVE-2024/CVE-2024-426xx/CVE-2024-42633.json | 45 +- CVE-2024/CVE-2024-426xx/CVE-2024-42657.json | 45 +- CVE-2024/CVE-2024-426xx/CVE-2024-42662.json | 25 ++ CVE-2024/CVE-2024-427xx/CVE-2024-42757.json | 39 +- CVE-2024/CVE-2024-428xx/CVE-2024-42812.json | 8 +- CVE-2024/CVE-2024-428xx/CVE-2024-42813.json | 8 +- CVE-2024/CVE-2024-428xx/CVE-2024-42815.json | 8 +- CVE-2024/CVE-2024-432xx/CVE-2024-43202.json | 29 +- CVE-2024/CVE-2024-433xx/CVE-2024-43311.json | 8 +- CVE-2024/CVE-2024-433xx/CVE-2024-43317.json | 8 +- CVE-2024/CVE-2024-433xx/CVE-2024-43326.json | 8 +- CVE-2024/CVE-2024-433xx/CVE-2024-43328.json | 8 +- CVE-2024/CVE-2024-433xx/CVE-2024-43345.json | 8 +- CVE-2024/CVE-2024-433xx/CVE-2024-43354.json | 8 +- CVE-2024/CVE-2024-433xx/CVE-2024-43376.json | 60 +++ CVE-2024/CVE-2024-433xx/CVE-2024-43377.json | 60 +++ CVE-2024/CVE-2024-433xx/CVE-2024-43397.json | 68 +++ CVE-2024/CVE-2024-434xx/CVE-2024-43404.json | 72 ++++ CVE-2024/CVE-2024-434xx/CVE-2024-43406.json | 60 +++ CVE-2024/CVE-2024-434xx/CVE-2024-43409.json | 60 +++ CVE-2024/CVE-2024-436xx/CVE-2024-43688.json | 8 +- CVE-2024/CVE-2024-47xx/CVE-2024-4785.json | 8 +- CVE-2024/CVE-2024-50xx/CVE-2024-5062.json | 54 ++- CVE-2024/CVE-2024-55xx/CVE-2024-5576.json | 8 +- CVE-2024/CVE-2024-57xx/CVE-2024-5763.json | 8 +- CVE-2024/CVE-2024-59xx/CVE-2024-5932.json | 8 +- CVE-2024/CVE-2024-59xx/CVE-2024-5939.json | 8 +- CVE-2024/CVE-2024-59xx/CVE-2024-5940.json | 8 +- CVE-2024/CVE-2024-59xx/CVE-2024-5941.json | 8 +- CVE-2024/CVE-2024-63xx/CVE-2024-6377.json | 56 +++ CVE-2024/CVE-2024-63xx/CVE-2024-6378.json | 56 +++ CVE-2024/CVE-2024-63xx/CVE-2024-6379.json | 56 +++ CVE-2024/CVE-2024-64xx/CVE-2024-6405.json | 66 ++- CVE-2024/CVE-2024-65xx/CVE-2024-6575.json | 8 +- CVE-2024/CVE-2024-65xx/CVE-2024-6578.json | 50 ++- CVE-2024/CVE-2024-68xx/CVE-2024-6847.json | 8 +- CVE-2024/CVE-2024-68xx/CVE-2024-6864.json | 8 +- CVE-2024/CVE-2024-69xx/CVE-2024-6918.json | 4 +- CVE-2024/CVE-2024-70xx/CVE-2024-7054.json | 8 +- CVE-2024/CVE-2024-72xx/CVE-2024-7248.json | 59 ++- CVE-2024/CVE-2024-72xx/CVE-2024-7249.json | 59 ++- CVE-2024/CVE-2024-72xx/CVE-2024-7250.json | 58 ++- CVE-2024/CVE-2024-72xx/CVE-2024-7251.json | 58 ++- CVE-2024/CVE-2024-72xx/CVE-2024-7252.json | 58 ++- CVE-2024/CVE-2024-73xx/CVE-2024-7305.json | 8 +- CVE-2024/CVE-2024-74xx/CVE-2024-7453.json | 70 ++- CVE-2024/CVE-2024-76xx/CVE-2024-7686.json | 71 +++- CVE-2024/CVE-2024-77xx/CVE-2024-7702.json | 8 +- CVE-2024/CVE-2024-77xx/CVE-2024-7775.json | 8 +- CVE-2024/CVE-2024-77xx/CVE-2024-7777.json | 8 +- CVE-2024/CVE-2024-77xx/CVE-2024-7780.json | 8 +- CVE-2024/CVE-2024-77xx/CVE-2024-7782.json | 8 +- CVE-2024/CVE-2024-78xx/CVE-2024-7827.json | 8 +- CVE-2024/CVE-2024-78xx/CVE-2024-7850.json | 8 +- CVE-2024/CVE-2024-79xx/CVE-2024-7926.json | 8 +- CVE-2024/CVE-2024-79xx/CVE-2024-7927.json | 8 +- CVE-2024/CVE-2024-79xx/CVE-2024-7928.json | 8 +- CVE-2024/CVE-2024-79xx/CVE-2024-7929.json | 8 +- CVE-2024/CVE-2024-79xx/CVE-2024-7930.json | 8 +- CVE-2024/CVE-2024-79xx/CVE-2024-7931.json | 8 +- CVE-2024/CVE-2024-79xx/CVE-2024-7933.json | 8 +- CVE-2024/CVE-2024-79xx/CVE-2024-7934.json | 8 +- CVE-2024/CVE-2024-79xx/CVE-2024-7935.json | 8 +- CVE-2024/CVE-2024-79xx/CVE-2024-7936.json | 8 +- CVE-2024/CVE-2024-79xx/CVE-2024-7937.json | 8 +- CVE-2024/CVE-2024-79xx/CVE-2024-7942.json | 8 +- CVE-2024/CVE-2024-79xx/CVE-2024-7943.json | 8 +- CVE-2024/CVE-2024-79xx/CVE-2024-7944.json | 8 +- CVE-2024/CVE-2024-79xx/CVE-2024-7945.json | 8 +- CVE-2024/CVE-2024-79xx/CVE-2024-7946.json | 8 +- CVE-2024/CVE-2024-79xx/CVE-2024-7947.json | 8 +- CVE-2024/CVE-2024-79xx/CVE-2024-7948.json | 8 +- CVE-2024/CVE-2024-79xx/CVE-2024-7949.json | 8 +- CVE-2024/CVE-2024-80xx/CVE-2024-8003.json | 145 +++++++ CVE-2024/CVE-2024-80xx/CVE-2024-8005.json | 149 +++++++ README.md | 96 +++-- _state.csv | 446 +++++++++++--------- 231 files changed, 6294 insertions(+), 1132 deletions(-) create mode 100644 CVE-2024/CVE-2024-309xx/CVE-2024-30949.json create mode 100644 CVE-2024/CVE-2024-338xx/CVE-2024-33872.json create mode 100644 CVE-2024/CVE-2024-344xx/CVE-2024-34458.json create mode 100644 CVE-2024/CVE-2024-355xx/CVE-2024-35540.json create mode 100644 CVE-2024/CVE-2024-390xx/CVE-2024-39094.json create mode 100644 CVE-2024/CVE-2024-396xx/CVE-2024-39690.json create mode 100644 CVE-2024/CVE-2024-420xx/CVE-2024-42006.json create mode 100644 CVE-2024/CVE-2024-423xx/CVE-2024-42369.json create mode 100644 CVE-2024/CVE-2024-426xx/CVE-2024-42603.json create mode 100644 CVE-2024/CVE-2024-426xx/CVE-2024-42604.json create mode 100644 CVE-2024/CVE-2024-426xx/CVE-2024-42605.json create mode 100644 CVE-2024/CVE-2024-426xx/CVE-2024-42606.json create mode 100644 CVE-2024/CVE-2024-426xx/CVE-2024-42607.json create mode 100644 CVE-2024/CVE-2024-426xx/CVE-2024-42608.json create mode 100644 CVE-2024/CVE-2024-426xx/CVE-2024-42609.json create mode 100644 CVE-2024/CVE-2024-426xx/CVE-2024-42610.json create mode 100644 CVE-2024/CVE-2024-426xx/CVE-2024-42611.json create mode 100644 CVE-2024/CVE-2024-426xx/CVE-2024-42613.json create mode 100644 CVE-2024/CVE-2024-426xx/CVE-2024-42616.json create mode 100644 CVE-2024/CVE-2024-426xx/CVE-2024-42617.json create mode 100644 CVE-2024/CVE-2024-426xx/CVE-2024-42618.json create mode 100644 CVE-2024/CVE-2024-426xx/CVE-2024-42621.json create mode 100644 CVE-2024/CVE-2024-426xx/CVE-2024-42662.json create mode 100644 CVE-2024/CVE-2024-433xx/CVE-2024-43376.json create mode 100644 CVE-2024/CVE-2024-433xx/CVE-2024-43377.json create mode 100644 CVE-2024/CVE-2024-433xx/CVE-2024-43397.json create mode 100644 CVE-2024/CVE-2024-434xx/CVE-2024-43404.json create mode 100644 CVE-2024/CVE-2024-434xx/CVE-2024-43406.json create mode 100644 CVE-2024/CVE-2024-434xx/CVE-2024-43409.json create mode 100644 CVE-2024/CVE-2024-63xx/CVE-2024-6377.json create mode 100644 CVE-2024/CVE-2024-63xx/CVE-2024-6378.json create mode 100644 CVE-2024/CVE-2024-63xx/CVE-2024-6379.json create mode 100644 CVE-2024/CVE-2024-80xx/CVE-2024-8003.json create mode 100644 CVE-2024/CVE-2024-80xx/CVE-2024-8005.json diff --git a/CVE-2021/CVE-2021-275xx/CVE-2021-27506.json b/CVE-2021/CVE-2021-275xx/CVE-2021-27506.json index c681f407c8b..1ee4995162d 100644 --- a/CVE-2021/CVE-2021-275xx/CVE-2021-27506.json +++ b/CVE-2021/CVE-2021-275xx/CVE-2021-27506.json @@ -2,7 +2,7 @@ "id": "CVE-2021-27506", "sourceIdentifier": "cve@mitre.org", "published": "2021-03-19T15:15:12.650", - "lastModified": "2022-07-01T12:02:37.977", + "lastModified": "2024-08-20T14:58:54.607", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -92,10 +92,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:stormshield:network_security:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "versionStartIncluding": "1.0", "versionEndIncluding": "4.2.0", - "matchCriteriaId": "C497E1B0-4FE7-4D06-8617-332391247B4E" + "matchCriteriaId": "20C1A2CD-7802-4497-B87D-8D49506B7BCB" } ] } diff --git a/CVE-2021/CVE-2021-286xx/CVE-2021-28665.json b/CVE-2021/CVE-2021-286xx/CVE-2021-28665.json index 8d37d2f5b56..d0121e57e90 100644 --- a/CVE-2021/CVE-2021-286xx/CVE-2021-28665.json +++ b/CVE-2021/CVE-2021-286xx/CVE-2021-28665.json @@ -2,7 +2,7 @@ "id": "CVE-2021-28665", "sourceIdentifier": "cve@mitre.org", "published": "2021-05-06T20:15:09.820", - "lastModified": "2022-07-12T17:42:04.277", + "lastModified": "2024-08-20T14:58:54.607", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -92,17 +92,17 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:stormshield:network_security:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.8.0", "versionEndExcluding": "3.11.5", - "matchCriteriaId": "2C3FF973-E0A0-4727-8B12-116FBEEBA4B3" + "matchCriteriaId": "EB1687AD-8D46-4CBC-8EE5-AEA384B7A1DE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:stormshield:network_security:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.1.5", - "matchCriteriaId": "52C25A6F-35A5-4CE1-9EFF-1F1D93680A78" + "matchCriteriaId": "268FCC1D-500C-4F39-B688-96130AA60D16" } ] } diff --git a/CVE-2021/CVE-2021-289xx/CVE-2021-28962.json b/CVE-2021/CVE-2021-289xx/CVE-2021-28962.json index 826892199c5..df6ab3b51ef 100644 --- a/CVE-2021/CVE-2021-289xx/CVE-2021-28962.json +++ b/CVE-2021/CVE-2021-289xx/CVE-2021-28962.json @@ -2,7 +2,7 @@ "id": "CVE-2021-28962", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-31T14:15:07.610", - "lastModified": "2022-07-12T17:42:04.277", + "lastModified": "2024-08-20T14:58:54.607", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -85,31 +85,31 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:stormshield:network_security:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.5.0", "versionEndExcluding": "2.7.9", - "matchCriteriaId": "77D326B0-B6FE-4E7A-9328-9899EA7F9B1D" + "matchCriteriaId": "16197356-0088-4B6B-94D5-1B64802AC302" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:stormshield:network_security:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.8.0", "versionEndExcluding": "3.7.21", - "matchCriteriaId": "22139CFC-BAD0-4245-B425-B26E3126CE26" + "matchCriteriaId": "A44D782B-3A9B-45C7-A8C3-0E6159D83B71" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:stormshield:network_security:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.8.0", "versionEndExcluding": "3.11.9", - "matchCriteriaId": "979C633B-6DD9-42A4-A3CE-215F626D27C9" + "matchCriteriaId": "580720E6-CD62-432E-8B4D-A68DA7459BDB" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:stormshield:network_security:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.2", - "matchCriteriaId": "7982EF71-685F-44FE-B6E3-B2262D2F4CE0" + "matchCriteriaId": "293C9DE4-4CA5-4F14-886E-99A987E2C396" } ] } diff --git a/CVE-2021/CVE-2021-316xx/CVE-2021-31617.json b/CVE-2021/CVE-2021-316xx/CVE-2021-31617.json index 8bd0fd76ef6..ead29f18d68 100644 --- a/CVE-2021/CVE-2021-316xx/CVE-2021-31617.json +++ b/CVE-2021/CVE-2021-316xx/CVE-2021-31617.json @@ -2,7 +2,7 @@ "id": "CVE-2021-31617", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-31T16:15:09.793", - "lastModified": "2022-02-07T19:34:52.797", + "lastModified": "2024-08-20T14:58:54.607", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -85,31 +85,31 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:stormshield:network_security:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "versionStartIncluding": "1.0.0", "versionEndExcluding": "2.7.9", - "matchCriteriaId": "AC28942E-8BEB-411A-9E6F-B06215EF32E3" + "matchCriteriaId": "3D98E742-1D45-4E68-B59C-15DE3B8CDF75" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:stormshield:network_security:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.8.0", "versionEndExcluding": "3.7.21", - "matchCriteriaId": "22139CFC-BAD0-4245-B425-B26E3126CE26" + "matchCriteriaId": "A44D782B-3A9B-45C7-A8C3-0E6159D83B71" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:stormshield:network_security:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.8.0", "versionEndExcluding": "3.11.9", - "matchCriteriaId": "979C633B-6DD9-42A4-A3CE-215F626D27C9" + "matchCriteriaId": "580720E6-CD62-432E-8B4D-A68DA7459BDB" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:stormshield:network_security:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.1", "versionEndExcluding": "4.2.3", - "matchCriteriaId": "4373C347-6FA2-4114-91CA-64B7D0D9F726" + "matchCriteriaId": "804BF818-9B25-41F7-809E-E39DCCE246E7" } ] } diff --git a/CVE-2021/CVE-2021-33xx/CVE-2021-3384.json b/CVE-2021/CVE-2021-33xx/CVE-2021-3384.json index a0411da0d14..d32884a55a8 100644 --- a/CVE-2021/CVE-2021-33xx/CVE-2021-3384.json +++ b/CVE-2021/CVE-2021-33xx/CVE-2021-3384.json @@ -2,7 +2,7 @@ "id": "CVE-2021-3384", "sourceIdentifier": "cve@mitre.org", "published": "2021-03-02T18:15:15.977", - "lastModified": "2021-03-09T18:30:22.780", + "lastModified": "2024-08-20T14:58:54.607", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -85,38 +85,38 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:stormshield:network_security:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.0.0", "versionEndExcluding": "2.7.8", - "matchCriteriaId": "724ECE02-8234-424F-B196-B2B382CF032C" + "matchCriteriaId": "1963DE20-CE8C-4776-B355-541A682B32A4" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:stormshield:network_security:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.8.0", "versionEndIncluding": "2.16.0", - "matchCriteriaId": "FA2F0DF2-5D80-452D-A83A-3066B159A301" + "matchCriteriaId": "EBAB743F-89C0-4152-A4E7-1633E4492B51" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:stormshield:network_security:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0.0", "versionEndIncluding": "3.7.17", - "matchCriteriaId": "3877C161-A065-44FD-B341-15A32E0303B2" + "matchCriteriaId": "A7C6C367-2B85-4F65-8E36-E9F791DE3256" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:stormshield:network_security:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.8.0", "versionEndIncluding": "3.11.5", - "matchCriteriaId": "485E8DA2-F482-4F29-AE8A-0F60AD2B0C03" + "matchCriteriaId": "6B359EE3-CFBF-4F12-9E07-FCBCEB41CAB8" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:stormshield:network_security:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.1.5", - "matchCriteriaId": "52C25A6F-35A5-4CE1-9EFF-1F1D93680A78" + "matchCriteriaId": "268FCC1D-500C-4F39-B688-96130AA60D16" } ] } diff --git a/CVE-2022/CVE-2022-12xx/CVE-2022-1206.json b/CVE-2022/CVE-2022-12xx/CVE-2022-1206.json index 4175efd97ae..657e1151981 100644 --- a/CVE-2022/CVE-2022-12xx/CVE-2022-1206.json +++ b/CVE-2022/CVE-2022-12xx/CVE-2022-1206.json @@ -2,13 +2,17 @@ "id": "CVE-2022-1206", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-20T04:15:06.787", - "lastModified": "2024-08-20T04:15:06.787", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The AdRotate Banner Manager \u2013 The only ad manager you'll need plugin for WordPress is vulnerable to arbitrary file uploads due to missing file extension sanitization in the adrotate_insert_media() function in all versions up to, and including, 5.13.2. This makes it possible for authenticated attackers, with administrator-level access and above, to upload arbitrary files with double extensions on the affected site's server which may make remote code execution possible. This is only exploitable on select instances where the configuration will execute the first extension present." + }, + { + "lang": "es", + "value": "El complemento AdRotate Banner Manager \u2013 The only ad manager you'll need para WordPress es vulnerable a cargas arbitrarias de archivos debido a la falta de desinfecci\u00f3n de extensiones de archivos en la funci\u00f3n adrotate_insert_media() en todas las versiones hasta la 5.13.2 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de administrador y superior, carguen archivos arbitrarios con extensiones dobles en el servidor del sitio afectado, lo que puede hacer posible la ejecuci\u00f3n remota de c\u00f3digo. Esto solo se puede explotar en casos seleccionados donde la configuraci\u00f3n ejecutar\u00e1 la primera extensi\u00f3n presente." } ], "metrics": { diff --git a/CVE-2022/CVE-2022-239xx/CVE-2022-23989.json b/CVE-2022/CVE-2022-239xx/CVE-2022-23989.json index 89840fda4de..7ba536daff8 100644 --- a/CVE-2022/CVE-2022-239xx/CVE-2022-23989.json +++ b/CVE-2022/CVE-2022-239xx/CVE-2022-23989.json @@ -2,7 +2,7 @@ "id": "CVE-2022-23989", "sourceIdentifier": "cve@mitre.org", "published": "2022-03-15T21:15:09.603", - "lastModified": "2022-03-24T20:24:41.953", + "lastModified": "2024-08-20T14:58:54.607", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -85,31 +85,31 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:stormshield:network_security:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0.0", "versionEndExcluding": "3.7.25", - "matchCriteriaId": "3B796566-AC85-486F-B961-E541E1159BD6" + "matchCriteriaId": "6BA930F8-6221-4492-86A4-5B3F8DEF8E3D" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:stormshield:network_security:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.8.0", "versionEndExcluding": "3.11.13", - "matchCriteriaId": "8DAF9A3F-2B07-4148-80A8-96ADBBD1937E" + "matchCriteriaId": "FE02CCA4-5C58-4165-BB15-178CC80FA567" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:stormshield:network_security:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.10", - "matchCriteriaId": "008F3752-0F64-4B4E-9A81-7351490403C0" + "matchCriteriaId": "A26B3C9D-67B6-420D-975C-561A9B2F22AE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:stormshield:network_security:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.3.0", "versionEndExcluding": "4.3.5", - "matchCriteriaId": "5FF8B9D6-09C1-4A0E-8A45-AA3CD3A40355" + "matchCriteriaId": "E7A3CBF2-016A-4EBB-B98F-EDFA075DCA81" } ] } diff --git a/CVE-2022/CVE-2022-278xx/CVE-2022-27812.json b/CVE-2022/CVE-2022-278xx/CVE-2022-27812.json index 8121016673d..3efec4ad549 100644 --- a/CVE-2022/CVE-2022-278xx/CVE-2022-27812.json +++ b/CVE-2022/CVE-2022-278xx/CVE-2022-27812.json @@ -2,7 +2,7 @@ "id": "CVE-2022-27812", "sourceIdentifier": "cve@mitre.org", "published": "2022-08-24T12:15:08.433", - "lastModified": "2023-08-08T14:22:24.967", + "lastModified": "2024-08-20T14:58:54.607", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -60,31 +60,31 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:stormshield:network_security:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.7.0", "versionEndExcluding": "3.7.30", - "matchCriteriaId": "8C50DD87-764D-456F-A788-B89B8B1CB058" + "matchCriteriaId": "0ED3E958-C6DD-4534-84D8-8C9F9220F091" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:stormshield:network_security:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.11.0", "versionEndExcluding": "3.11.18", - "matchCriteriaId": "3CC26C37-109C-4260-8F7C-DD63D4CEDD1C" + "matchCriteriaId": "E3046184-CE10-4A23-9E05-F5173E9BCE5F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:stormshield:network_security:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.2.0", "versionEndExcluding": "4.2.11", - "matchCriteriaId": "AA603F8D-C46E-423C-8A86-88F55CE40D35" + "matchCriteriaId": "F0AF8CBA-E40F-4E62-8024-52D8855A3563" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:stormshield:network_security:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.3.0", "versionEndExcluding": "4.3.7", - "matchCriteriaId": "D7AC7E7E-B95A-4CF7-A879-B9E08F7A20AB" + "matchCriteriaId": "6BE777F7-6AFE-4060-AD7D-6A4E87073094" } ] } diff --git a/CVE-2022/CVE-2022-302xx/CVE-2022-30279.json b/CVE-2022/CVE-2022-302xx/CVE-2022-30279.json index a0827cc8bb4..1f525bc948a 100644 --- a/CVE-2022/CVE-2022-302xx/CVE-2022-30279.json +++ b/CVE-2022/CVE-2022-302xx/CVE-2022-30279.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30279", "sourceIdentifier": "cve@mitre.org", "published": "2022-05-12T15:15:08.847", - "lastModified": "2022-05-20T18:33:56.557", + "lastModified": "2024-08-20T14:58:54.607", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -85,10 +85,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:stormshield:network_security:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.3.3", "versionEndExcluding": "4.3.8", - "matchCriteriaId": "74E521BB-184A-400F-A673-8871168C4C00" + "matchCriteriaId": "B2B91285-D421-42DA-BA7B-2DEF9A3958C6" } ] } diff --git a/CVE-2022/CVE-2022-325xx/CVE-2022-32506.json b/CVE-2022/CVE-2022-325xx/CVE-2022-32506.json index 0d87c453c13..4714b36841c 100644 --- a/CVE-2022/CVE-2022-325xx/CVE-2022-32506.json +++ b/CVE-2022/CVE-2022-325xx/CVE-2022-32506.json @@ -2,7 +2,7 @@ "id": "CVE-2022-32506", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T10:43:41.587", - "lastModified": "2024-05-14T16:13:02.773", + "lastModified": "2024-08-20T14:35:01.103", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se ha descubierto un problema en determinados dispositivos de Nuki Home Solutions. Un atacante con acceso f\u00edsico a la placa de circuito podr\u00eda utilizar las funciones de depuraci\u00f3n del SWD para controlar la ejecuci\u00f3n de c\u00f3digo en el procesador y depurar el firmware, as\u00ed como leer o alterar el contenido de la memoria flash interna y externa. Esto afecta a Nuki Smart Lock 3.0 anterior a 3.3.5, Nuki Smart Lock 2.0 anterior a 2.12.4, as\u00ed como a Nuki Bridge v1 anterior a 1.22.0 y v2 anterior a 2.13.2." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1263" + } + ] + } + ], "references": [ { "url": "https://latesthackingnews.com/2022/07/28/multiple-security-flaws-found-in-nuki-smart-locks/", diff --git a/CVE-2023/CVE-2023-260xx/CVE-2023-26095.json b/CVE-2023/CVE-2023-260xx/CVE-2023-26095.json index 2fd629d1d6f..1c3a30b76b4 100644 --- a/CVE-2023/CVE-2023-260xx/CVE-2023-26095.json +++ b/CVE-2023/CVE-2023-260xx/CVE-2023-26095.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26095", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-28T12:15:08.940", - "lastModified": "2023-08-31T18:58:14.647", + "lastModified": "2024-08-20T14:58:54.607", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -56,15 +56,15 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:stormshield:network_security:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.6.0", "versionEndExcluding": "4.6.3", - "matchCriteriaId": "36CA672B-C31F-4111-8412-792D8B0DCD7E" + "matchCriteriaId": "DF87CF3B-17D9-4B12-86FD-DD1633177BA9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:stormshield:network_security:4.3.15:*:*:*:*:*:*:*", - "matchCriteriaId": "89BD846F-87FC-40AA-83BF-0451374BC958" + "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:4.3.15:*:*:*:*:*:*:*", + "matchCriteriaId": "D2E690AD-A6BB-49A0-B21E-25138E49548D" } ] } diff --git a/CVE-2023/CVE-2023-286xx/CVE-2023-28616.json b/CVE-2023/CVE-2023-286xx/CVE-2023-28616.json index 49981cd0a3d..46c6f2f881d 100644 --- a/CVE-2023/CVE-2023-286xx/CVE-2023-28616.json +++ b/CVE-2023/CVE-2023-286xx/CVE-2023-28616.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28616", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-26T04:15:07.790", - "lastModified": "2024-01-04T15:28:24.317", + "lastModified": "2024-08-20T14:58:54.607", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -60,22 +60,22 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:stormshield:network_security:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.7.0", "versionEndExcluding": "4.3.17", - "matchCriteriaId": "C2ED1896-6DA3-413F-B5A1-AC1EE41470A6" + "matchCriteriaId": "77BB677B-09F8-4CB6-A65B-D596EF7598EC" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:stormshield:network_security:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.4.0", "versionEndExcluding": "4.6.4", - "matchCriteriaId": "601A3438-4E6E-46B6-B596-082C6EA8B1D1" + "matchCriteriaId": "77BAC9BA-B215-490F-9202-617B1B4E7C8A" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:stormshield:network_security:4.7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5CEA8D81-9EC9-4285-9A9F-B60CE3A12ABA" + "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:4.7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "41064506-1A8B-462B-B0CC-935467EB80CA" } ] } diff --git a/CVE-2023/CVE-2023-350xx/CVE-2023-35022.json b/CVE-2023/CVE-2023-350xx/CVE-2023-35022.json index 4925d964fde..d3c91d94731 100644 --- a/CVE-2023/CVE-2023-350xx/CVE-2023-35022.json +++ b/CVE-2023/CVE-2023-350xx/CVE-2023-35022.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35022", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-06-30T16:15:02.600", - "lastModified": "2024-07-01T12:37:24.220", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-20T14:13:16.427", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "psirt@us.ibm.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "psirt@us.ibm.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*", + "matchCriteriaId": "4CED2F00-89E3-4BA9-A8FB-D43B308A59A8" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/258254", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7158447", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-438xx/CVE-2023-43848.json b/CVE-2023/CVE-2023-438xx/CVE-2023-43848.json index 430aa451cd7..d8b8b955c9a 100644 --- a/CVE-2023/CVE-2023-438xx/CVE-2023-43848.json +++ b/CVE-2023/CVE-2023-438xx/CVE-2023-43848.json @@ -2,7 +2,7 @@ "id": "CVE-2023-43848", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T19:15:09.587", - "lastModified": "2024-05-29T13:02:09.280", + "lastModified": "2024-08-20T15:35:01.247", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El control de acceso incorrecto en la funci\u00f3n de administraci\u00f3n del firewall de la interfaz web en Aten PE6208 2.3.228 y 2.4.232 permite a los usuarios autenticados remotamente modificar la configuraci\u00f3n del firewall local del dispositivo como si fueran el administrador mediante una solicitud HTTP POST." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://github.com/setersora/pe6208", diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46870.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46870.json index 32d6fa6bc08..4957d683e35 100644 --- a/CVE-2023/CVE-2023-468xx/CVE-2023-46870.json +++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46870.json @@ -2,7 +2,7 @@ "id": "CVE-2023-46870", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T13:54:34.163", - "lastModified": "2024-05-14T16:13:02.773", + "lastModified": "2024-08-20T14:35:03.573", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "extcap/nrf_sniffer_ble.py, extcap/nrf_sniffer_ble.sh, extcap/SnifferAPI/*.py en Nordic Semiconductor nRF Sniffer para Bluetooth LE 3.0.0, 3.1.0, 4.0.0, 4.1.0 y 4.1.1 tienen una configuraci\u00f3n incorrecta permiso de archivo, que permite a los atacantes ejecutar c\u00f3digo a trav\u00e9s de scripts bash y python modificados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://github.com/Chapoly1305/CVE-2023-46870", diff --git a/CVE-2023/CVE-2023-470xx/CVE-2023-47091.json b/CVE-2023/CVE-2023-470xx/CVE-2023-47091.json index 2a463ab77ac..3c501bff34b 100644 --- a/CVE-2023/CVE-2023-470xx/CVE-2023-47091.json +++ b/CVE-2023/CVE-2023-470xx/CVE-2023-47091.json @@ -2,7 +2,7 @@ "id": "CVE-2023-47091", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-25T07:15:09.537", - "lastModified": "2024-01-04T01:15:58.840", + "lastModified": "2024-08-20T14:58:54.607", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -60,24 +60,24 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:stormshield:network_security:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.3.13", "versionEndExcluding": "4.3.23", - "matchCriteriaId": "56C988A8-017F-4B5F-945D-50A8F54FC618" + "matchCriteriaId": "4D293505-FDC0-4B2B-B7D4-8371A9142A0F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:stormshield:network_security:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.6.0", "versionEndExcluding": "4.6.10", - "matchCriteriaId": "BB9EC8BF-9FFC-4F3E-B8D2-578582478D14" + "matchCriteriaId": "7BA3CFA3-AA12-4347-AE99-91D28021E6F0" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:stormshield:network_security:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.7.0", "versionEndExcluding": "4.7.2", - "matchCriteriaId": "F45A8EFF-2702-4D2E-98F1-B87434FA0AE2" + "matchCriteriaId": "459D63A0-291E-4B60-94A7-4FDB3A381C61" } ] } diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21449.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21449.json index b2cb319206f..ef264a866c0 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21449.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21449.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21449", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:14.177", - "lastModified": "2024-08-08T18:50:39.357", + "lastModified": "2024-08-20T15:48:51.190", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -70,43 +70,55 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*", - "matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.0.6441.1", + "matchCriteriaId": "B958A8F2-7B51-4A68-8E58-CF91ADF5D067" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7037.1", + "matchCriteriaId": "13AD7527-DD44-45C5-AC2F-F0FC657C12E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.0.2056.2", + "matchCriteriaId": "F706C3CC-0C04-40E7-AA52-9B98DF7CFB2D" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*", - "matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0.3456.2", + "versionEndExcluding": "14.0.3471.2", + "matchCriteriaId": "0FBD2AAD-6635-4840-A4A0-8C04AB50BA8F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*", - "matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.0.2116.2", + "matchCriteriaId": "8AE7C7AB-2B2B-4822-98BE-D1E7E53FFB4A" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0.4375.4", + "versionEndExcluding": "15.0.4382.1", + "matchCriteriaId": "AA37D611-EA4F-4D4F-A79B-FE65726DE7E1" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*", - "matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.0.1121.4", + "matchCriteriaId": "A14154AC-1DC3-42B7-B45A-916C9ACFD237" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.4125.3", + "versionEndExcluding": "16.0.4131.2", + "matchCriteriaId": "7391BD2B-431E-4F65-878A-1BE8D389B3FE" } ] } diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21689.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21689.json index 5e693783749..408a207c214 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21689.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21689.json @@ -2,13 +2,17 @@ "id": "CVE-2024-21689", "sourceIdentifier": "security@atlassian.com", "published": "2024-08-20T10:15:04.103", - "lastModified": "2024-08-20T10:15:04.103", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This High severity RCE (Remote Code Execution) vulnerability CVE-2024-21689\u00a0 was introduced in versions 9.1.0, 9.2.0, 9.3.0, 9.4.0, 9.5.0, and 9.6.0 of Bamboo Data Center and Server.\r\n\r\nThis RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.6, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction.\r\n\r\nAtlassian recommends that Bamboo Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:\r\n Bamboo Data Center and Server 9.2: Upgrade to a release greater than or equal to 9.2.17\r\n\r\n Bamboo Data Center and Server 9.6: Upgrade to a release greater than or equal to 9.6.5\r\n\r\nSee the release notes ([https://confluence.atlassian.com/bambooreleases/bamboo-release-notes-1189793869.html]). You can download the latest version of Bamboo Data Center and Server from the download center ([https://www.atlassian.com/software/bamboo/download-archives]).\r\n\r\nThis vulnerability was reported via our Bug Bounty program." + }, + { + "lang": "es", + "value": "Esta vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) de alta gravedad, CVE-2024-21689, se introdujo en las versiones 9.1.0, 9.2.0, 9.3.0, 9.4.0, 9.5.0 y 9.6.0 de Bamboo Data Center and Server. Esta vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE), con una puntuaci\u00f3n CVSS de 7,6, permite a un atacante autenticado ejecutar c\u00f3digo arbitrario que tiene un alto impacto en la confidencialidad, la integridad y la disponibilidad, y requiere la interacci\u00f3n del usuario. Atlassian recomienda que los clientes de Bamboo Data Center and Server actualicen a la \u00faltima versi\u00f3n. Si no puede hacerlo, actualice su instancia a una de las versiones corregidas compatibles especificadas: Bamboo Data Center and Server 9.2: actualice a una versi\u00f3n mayor o igual a 9.2.17 Bamboo Data Center and Server 9.6: actualice a una versi\u00f3n mayor o igual a 9.6.5 Consulte las notas de la versi\u00f3n ([https://confluence.atlassian.com/bambooreleases/bamboo-release-notes-1189793869.html]). Puede descargar la \u00faltima versi\u00f3n de Bamboo Data Center and Server desde el centro de descargas ([https://www.atlassian.com/software/bamboo/download-archives]). Esta vulnerabilidad se inform\u00f3 a trav\u00e9s de nuestro programa Bug Bounty." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22095.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22095.json index 410ce5359b6..afba5bc7304 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22095.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22095.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22095", "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:16:06.320", - "lastModified": "2024-07-03T01:47:03.793", + "lastModified": "2024-08-20T15:35:02.417", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -49,16 +49,6 @@ "value": "CWE-20" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-20" - } - ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-230xx/CVE-2024-23084.json b/CVE-2024/CVE-2024-230xx/CVE-2024-23084.json index cd29f11a79d..5f6540fa0ac 100644 --- a/CVE-2024/CVE-2024-230xx/CVE-2024-23084.json +++ b/CVE-2024/CVE-2024-230xx/CVE-2024-23084.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23084", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T23:15:07.803", - "lastModified": "2024-08-01T23:15:40.503", + "lastModified": "2024-08-20T15:35:02.813", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -22,7 +22,42 @@ "value": "Se descubri\u00f3 que Apfloat v1.10.1 conten\u00eda una excepci\u00f3n ArrayIndexOutOfBoundsException a trav\u00e9s del componente org.apfloat.internal.DoubleCRTMath::add(double[], double[])." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] + } + ], "references": [ { "url": "http://apfloat.com", diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23299.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23299.json index ef8659e36bf..04cf794676b 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23299.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23299.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23299", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T20:15:13.107", - "lastModified": "2024-06-12T18:03:36.960", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-20T15:35:03.893", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-250" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-242xx/CVE-2024-24293.json b/CVE-2024/CVE-2024-242xx/CVE-2024-24293.json index f9ab1c88f6b..27dff95cdd4 100644 --- a/CVE-2024/CVE-2024-242xx/CVE-2024-24293.json +++ b/CVE-2024/CVE-2024-242xx/CVE-2024-24293.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24293", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-20T18:15:10.193", - "lastModified": "2024-05-20T19:34:58.277", + "lastModified": "2024-08-20T14:35:04.827", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Un problema de contaminaci\u00f3n de prototipo en MiguelCastillo @bit/loader v.10.0.3 permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n M y el argumento en index.js." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/tariqhawis/986fb1c9da6be526fb2656ba8d194b7f", diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25009.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25009.json index 558d6de3494..02303adb937 100644 --- a/CVE-2024/CVE-2024-250xx/CVE-2024-25009.json +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25009.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25009", "sourceIdentifier": "85b1779b-6ecd-4f52-bcc5-73eac4659dcf", "published": "2024-08-20T12:15:04.667", - "lastModified": "2024-08-20T12:15:04.667", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27281.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27281.json index 957c5d8b6bc..29e63ecdf94 100644 --- a/CVE-2024/CVE-2024-272xx/CVE-2024-27281.json +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27281.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27281", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:11:57.250", - "lastModified": "2024-05-14T16:13:02.773", + "lastModified": "2024-08-20T14:35:05.757", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en RDoc 6.3.3 a 6.6.2, tal como se distribuye en Ruby 3.x a 3.3.0. Al analizar .rdoc_options (utilizado para la configuraci\u00f3n en RDoc) como un archivo YAML, la inyecci\u00f3n de objetos y la ejecuci\u00f3n remota de c\u00f3digo resultante son posibles porque no hay restricciones en las clases que se pueden restaurar. (Al cargar el cach\u00e9 de documentaci\u00f3n, la inyecci\u00f3n de objetos y la ejecuci\u00f3n remota de c\u00f3digo resultante tambi\u00e9n son posibles si hubiera un cach\u00e9 manipulado). La versi\u00f3n principal fija es 6.6.3.1. Para los usuarios de Ruby 3.0, una versi\u00f3n fija es rdoc 6.3.4.1. Para los usuarios de Ruby 3.1, una versi\u00f3n fija es rdoc 6.4.1.1. Para los usuarios de Ruby 3.2, una versi\u00f3n fija es rdoc 6.5.1.1." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], "references": [ { "url": "https://hackerone.com/reports/1187477", diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27728.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27728.json index 3fd569dd1c3..1cfb837c1d2 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27728.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27728.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27728", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-15T19:15:18.477", - "lastModified": "2024-08-19T13:00:23.117", + "lastModified": "2024-08-20T14:35:06.747", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " La vulnerabilidad de Cross Site Scripting en Friendica v.2023.12 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro text de la funci\u00f3n de depuraci\u00f3n de Babel." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/friendica/friendica/pull/13927", diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27882.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27882.json index 547fbaadcdd..242ff430f8a 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27882.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27882.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27882", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:10.877", - "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-20T15:05:39.703", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,122 @@ "value": " Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema se solucion\u00f3 en macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del sistema de archivos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.7.6", + "matchCriteriaId": "3556C7C3-14B6-4846-B3E8-FE07A503155F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.6.8", + "matchCriteriaId": "7008225C-B5B9-4F87-9392-DD2080717E9A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.6", + "matchCriteriaId": "51E2E93B-C5A3-4C83-B806-2EC555AD45FE" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/18", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/19", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/20", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214118", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214119", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214120", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27883.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27883.json index 9caf94b4c9f..4d89cecb1aa 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27883.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27883.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27883", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:10.940", - "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-20T15:06:34.580", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,122 @@ "value": " Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema se solucion\u00f3 en macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del sistema de archivos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.7.6", + "matchCriteriaId": "3556C7C3-14B6-4846-B3E8-FE07A503155F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.6.8", + "matchCriteriaId": "7008225C-B5B9-4F87-9392-DD2080717E9A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.6", + "matchCriteriaId": "51E2E93B-C5A3-4C83-B806-2EC555AD45FE" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/18", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/19", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/20", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214118", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214119", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214120", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27884.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27884.json index f86349786bc..cf9e9e6322a 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27884.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27884.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27884", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:11.010", - "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-20T15:07:50.547", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,47 +15,220 @@ "value": " Esta cuesti\u00f3n se abord\u00f3 con un nuevo derecho. Este problema se solucion\u00f3 en macOS Sonoma 14.5, watchOS 10.5, visionOS 1.2, tvOS 17.5, iOS 17.5 y iPadOS 17.5. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.5", + "matchCriteriaId": "E9C4B45E-AF58-4D7C-B73A-618B06AED56E" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.5", + "matchCriteriaId": "E7F2E11C-4A7D-4E71-BFAA-396B0549F649" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.5", + "matchCriteriaId": "018F7001-D2CD-4A28-853F-749408A7D1AF" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.5", + "matchCriteriaId": "CC4B1E01-BE73-48F8-9BD5-32F7C57EB45A" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.2", + "matchCriteriaId": "20FA533E-AA15-4561-AAF1-F8C3F5283C88" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.5", + "matchCriteriaId": "003383BF-F06C-4300-908D-D1C8498C6BCD" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/HT214101", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214102", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214104", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214106", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214108", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/kb/HT214101", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/kb/HT214102", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/kb/HT214104", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/kb/HT214106", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/kb/HT214108", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27887.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27887.json index 1b13f286a9c..a2dd27be8ab 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27887.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27887.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27887", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:11.127", - "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-20T15:08:53.127", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,76 @@ "value": "Se solucion\u00f3 un problema de manejo de rutas con una validaci\u00f3n mejorada. Este problema se solucion\u00f3 en macOS Sonoma 14.4. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.4", + "matchCriteriaId": "58227FD1-0619-45F6-AD19-25831899376A" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/HT214084", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/kb/HT214084", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28087.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28087.json index 793a03958dc..99ab886b7c7 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28087.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28087.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28087", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-15T17:15:10.643", - "lastModified": "2024-05-15T18:35:11.453", + "lastModified": "2024-08-20T14:35:07.653", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En la edici\u00f3n Community de Bonitasoft runtime, la falta de permisos din\u00e1micos provoca una vulnerabilidad IDOR. Los permisos din\u00e1micos solo exist\u00edan en la edici\u00f3n Suscripci\u00f3n y ahora se han restaurado en la edici\u00f3n Comunidad, donde no son personalizables." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://documentation.bonitasoft.com/bonita/latest/release-notes#_fixes_in_bonita_2024_1_2024_04_11", diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28795.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28795.json index e8f32bb6f00..f3c71700828 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28795.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28795.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28795", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-06-30T16:15:02.987", - "lastModified": "2024-07-01T12:37:24.220", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-20T14:13:46.593", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*", + "matchCriteriaId": "4CED2F00-89E3-4BA9-A8FB-D43B308A59A8" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/286832", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7158408", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28829.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28829.json index 9772957fe57..3debc476080 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28829.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28829.json @@ -2,13 +2,17 @@ "id": "CVE-2024-28829", "sourceIdentifier": "security@checkmk.com", "published": "2024-08-20T10:15:05.693", - "lastModified": "2024-08-20T10:15:05.693", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Least privilege violation and reliance on untrusted inputs in the mk_informix Checkmk agent plugin before Checkmk 2.3.0p12, 2.2.0p32, 2.1.0p47 and 2.0.0 (EOL) allows local users to escalate privileges." + }, + { + "lang": "es", + "value": "La violaci\u00f3n de privilegios m\u00ednimos y la dependencia de entradas no confiables en el complemento del agente Checkmk mk_informix anterior a Checkmk 2.3.0p12, 2.2.0p32, 2.1.0p47 y 2.0.0 (EOL) permite que los usuarios locales escalen privilegios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29159.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29159.json index d0a1c47c89c..c5b52fbbee4 100644 --- a/CVE-2024/CVE-2024-291xx/CVE-2024-29159.json +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29159.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29159", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:15:32.000", - "lastModified": "2024-05-14T16:13:02.773", + "lastModified": "2024-08-20T14:35:13.163", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "HDF5 hasta 1.14.3 contiene un desbordamiento de b\u00fafer en H5Z__filter_scaleoffset, lo que provoca la corrupci\u00f3n del puntero de instrucci\u00f3n y provoca denegaci\u00f3n de servicio o posible ejecuci\u00f3n de c\u00f3digo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29276.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29276.json index d02a6c937fa..7e29e0fc9ea 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29276.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29276.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29276", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-02T07:15:45.577", - "lastModified": "2024-04-02T12:50:42.233", + "lastModified": "2024-08-20T15:35:05.580", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en seeyonOA versi\u00f3n 8, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s del m\u00e9todo importProcess en el componente WorkFlowDesignerController.class." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://www.cnblogs.com/Rainy-Day/p/18061399", diff --git a/CVE-2024/CVE-2024-296xx/CVE-2024-29651.json b/CVE-2024/CVE-2024-296xx/CVE-2024-29651.json index f90cbb60b0b..f3f13e18afb 100644 --- a/CVE-2024/CVE-2024-296xx/CVE-2024-29651.json +++ b/CVE-2024/CVE-2024-296xx/CVE-2024-29651.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29651", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-20T18:15:10.270", - "lastModified": "2024-05-20T19:34:58.277", + "lastModified": "2024-08-20T14:35:13.967", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Un problema de contaminaci\u00f3n de prototipos en API Dev Tools json-schema-ref-parser v.11.0.0 y v.11.1.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de bundle()`, `parse()`, `resolve( )`, `funciones de desreferencia()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/tariqhawis/5db76b38112bba756615b688c32409ad", diff --git a/CVE-2024/CVE-2024-309xx/CVE-2024-30949.json b/CVE-2024/CVE-2024-309xx/CVE-2024-30949.json new file mode 100644 index 00000000000..863b80c0ca4 --- /dev/null +++ b/CVE-2024/CVE-2024-309xx/CVE-2024-30949.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-30949", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T15:15:20.400", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in newlib v.4.3.0 allows an attacker to execute arbitrary code via the time unit scaling in the _gettimeofday function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/visitorckw/6b26e599241ea80210ea136b28441661", + "source": "cve@mitre.org" + }, + { + "url": "https://inbox.sourceware.org/newlib/20231129035714.469943-1-visitorckw%40gmail.com/", + "source": "cve@mitre.org" + }, + { + "url": "https://sourceware.org/git/?p=newlib-cygwin.git%3Ba=commit%3Bh=5f15d7c5817b07a6b18cbab17342c95cb7b42be4", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31011.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31011.json index 9a0d69bdea4..0b6f7035042 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31011.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31011.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31011", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-03T05:15:48.010", - "lastModified": "2024-04-03T12:38:04.840", + "lastModified": "2024-08-20T15:35:06.517", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de escritura arbitraria en archivos en beescms v.4.0, permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de una ruta de archivo que no estaba aislada y el sufijo no estaba verificado en admin_template.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/ss122-0ss/beescms/blob/main/readme.md", diff --git a/CVE-2024/CVE-2024-322xx/CVE-2024-32269.json b/CVE-2024/CVE-2024-322xx/CVE-2024-32269.json index 4f4b4d15894..43000a0f8e8 100644 --- a/CVE-2024/CVE-2024-322xx/CVE-2024-32269.json +++ b/CVE-2024/CVE-2024-322xx/CVE-2024-32269.json @@ -2,7 +2,7 @@ "id": "CVE-2024-32269", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T17:15:19.130", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-08-20T14:35:14.740", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en Yonganda YAD-LOJ V3.0.561 permite que un atacante remoto provoque una denegaci\u00f3n de servicio a trav\u00e9s de un paquete manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://github.com/kzLiu2017/Tuya_Cam_CVE_Doc/blob/main/YAD-LOJ-Camera.pdf", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32351.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32351.json index c31fd477e4c..bb4371d9f56 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32351.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32351.json @@ -2,7 +2,7 @@ "id": "CVE-2024-32351", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T16:17:02.800", - "lastModified": "2024-05-14T19:17:55.627", + "lastModified": "2024-08-20T15:35:07.350", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK X5000R V9.1.0cu.2350_B20230313 contiene una vulnerabilidad de ejecuci\u00f3n remota de comandos (RCE) autenticada a trav\u00e9s del par\u00e1metro \"mru\" en el binario \"cstecgi.cgi\"." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://github.com/1s1and123/Vulnerabilities/blob/main/device/ToToLink/X5000R/TOTOLink_X5000R_RCE.md", diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32617.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32617.json index feef268bb8d..ca89d29d450 100644 --- a/CVE-2024/CVE-2024-326xx/CVE-2024-32617.json +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32617.json @@ -2,7 +2,7 @@ "id": "CVE-2024-32617", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:36:46.893", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-08-20T14:35:15.603", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La librer\u00eda HDF5 hasta 1.14.3 contiene una sobrelectura del b\u00fafer basado en mont\u00f3n causada por el uso inseguro de strdup en H5MM_xstrdup en H5MM.c (llamado desde H5G__ent_to_link en H5Glink.c)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32621.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32621.json index 1f96456ef35..dacdeeb6877 100644 --- a/CVE-2024/CVE-2024-326xx/CVE-2024-32621.json +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32621.json @@ -2,7 +2,7 @@ "id": "CVE-2024-32621", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:36:47.690", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-08-20T14:35:16.373", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La librer\u00eda HDF5 hasta 1.14.3 contiene un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en H5HG_read en H5HG.c (llamado desde H5VL__native_blob_get en H5VLnative_blob.c), lo que resulta en la corrupci\u00f3n del puntero de instrucci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32622.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32622.json index acb1b72e2ab..87e25bdc8a4 100644 --- a/CVE-2024/CVE-2024-326xx/CVE-2024-32622.json +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32622.json @@ -2,7 +2,7 @@ "id": "CVE-2024-32622", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:36:47.797", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-08-20T14:35:17.140", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La librer\u00eda HDF5 hasta 1.14.3 contiene una operaci\u00f3n de lectura fuera de los l\u00edmites en H5FL_arr_malloc en H5FL.c (llamada desde H5S_set_extent_simple en H5S.c)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33219.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33219.json index 2aaa3436121..b8de4c14dc4 100644 --- a/CVE-2024/CVE-2024-332xx/CVE-2024-33219.json +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33219.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33219", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-22T15:15:28.680", - "lastModified": "2024-05-22T18:59:20.240", + "lastModified": "2024-08-20T15:35:08.557", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en el componente AsIO64.sys de ASUSTeK Computer Inc ASUS SABERTOOTH X99 Driver v1.0.1.0 permite a los atacantes escalar privilegios y ejecutar c\u00f3digo arbitrario mediante el env\u00edo de solicitudes IOCTL manipuladas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-782" + } + ] + } + ], "references": [ { "url": "https://github.com/DriverHunter/Win-Driver-EXP/tree/main/CVE-2024-33219", diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33806.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33806.json index 0e3a1ceac9d..9f5d65da2c1 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33806.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33806.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33806", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T16:15:16.620", - "lastModified": "2024-05-28T17:11:47.007", + "lastModified": "2024-08-20T15:35:09.913", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n SQL en /model/get_grade.php en campcodes Complete Web-Based School Management System 1.0 permite a un atacante ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro id." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2012.pdf", diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33872.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33872.json new file mode 100644 index 00000000000..073edfed6cb --- /dev/null +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33872.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-33872", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T14:15:08.750", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Keyfactor Command 10.5.x before 10.5.1 and 11.5.x before 11.5.1 allows SQL Injection which could result in code execution and escalation of privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://trust.keyfactor.com/?itemUid=d73921fd-bc9e-4e35-a974-cfb628e6a226&source=click", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34193.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34193.json index c3081b709ef..cb67cd35858 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34193.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34193.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34193", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-20T18:15:10.400", - "lastModified": "2024-05-20T19:34:58.277", + "lastModified": "2024-08-20T15:35:11.077", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " smanga 3.2.7 no filtra el par\u00e1metro file en la interfaz PHP/get file flow.php, lo que resulta en una vulnerabilidad de path traversal que puede provocar la lectura arbitraria de archivos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://github.com/vulreport3r/cve-reports/blob/main/Smanga_has_an_arbitrary_file_read_vulnerability/report.md", diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34240.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34240.json index a30ecc3e1fc..e20b8b87a5e 100644 --- a/CVE-2024/CVE-2024-342xx/CVE-2024-34240.json +++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34240.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34240", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-21T18:15:09.650", - "lastModified": "2024-05-22T12:46:53.887", + "lastModified": "2024-08-20T15:35:12.167", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "QDOCS Smart School 7.0.0 es vulnerable a Cross Site Scripting (XSS), lo que resulta en la ejecuci\u00f3n de c\u00f3digo arbitrario en funciones administrativas relacionadas con la adici\u00f3n o actualizaci\u00f3n de registros." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://grumpz.net/cve-2024-34240-latest-stored-xss-0day-vulnerability-unveiled", diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34458.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34458.json new file mode 100644 index 00000000000..b5baf9c7419 --- /dev/null +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34458.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-34458", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T14:15:08.873", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Keyfactor Command 10.5.x before 10.5.1 and 11.5.x before 11.5.1 allows SQL Injection which could result in information disclosure." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://trust.keyfactor.com/?itemUid=d73921fd-bc9e-4e35-a974-cfb628e6a226&source=click", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34934.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34934.json index d2ab96b9934..d3209cca367 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34934.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34934.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34934", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-23T17:15:30.197", - "lastModified": "2024-05-24T01:15:30.977", + "lastModified": "2024-08-20T15:35:13.137", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n SQL en /view/emarks_range_grade_update_form.php en Campcodes Complete Web-Based School Management System 1.0 permite a un atacante ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro conversation_id." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2028.pdf", diff --git a/CVE-2024/CVE-2024-350xx/CVE-2024-35010.json b/CVE-2024/CVE-2024-350xx/CVE-2024-35010.json index 5656a3f5195..494461abbd2 100644 --- a/CVE-2024/CVE-2024-350xx/CVE-2024-35010.json +++ b/CVE-2024/CVE-2024-350xx/CVE-2024-35010.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35010", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T16:17:30.877", - "lastModified": "2024-05-14T19:17:55.627", + "lastModified": "2024-08-20T14:35:18.007", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que idccms v1.35 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /admin/banner_deal.php?mudi=del&dataType=&dataTypeCN=%E5%9B%BE%E7%89%87%E5%B9% BF%E5%91%8A&theme=cs&dataID=6." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/Thirtypenny77/cms/blob/main/6.md", diff --git a/CVE-2024/CVE-2024-350xx/CVE-2024-35079.json b/CVE-2024/CVE-2024-350xx/CVE-2024-35079.json index 429f741cdaf..309946037ef 100644 --- a/CVE-2024/CVE-2024-350xx/CVE-2024-35079.json +++ b/CVE-2024/CVE-2024-350xx/CVE-2024-35079.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35079", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-23T19:16:01.357", - "lastModified": "2024-05-24T01:15:30.977", + "lastModified": "2024-08-20T15:35:13.923", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de carga de archivos arbitrarios en el m\u00e9todo uploadAudio de inxedu v2024.4 permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo .jsp manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/35079.txt", diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35205.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35205.json index de245d0cad2..a196a1bc34a 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35205.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35205.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35205", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:39:43.030", - "lastModified": "2024-05-14T16:11:39.510", + "lastModified": "2024-08-20T14:35:21.557", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La aplicaci\u00f3n WPS Office (tambi\u00e9n conocida como cn.wps.moffice_eng) anterior a 17.0.0 para Android no sanitiza adecuadamente los nombres de los archivos antes de procesarlos a trav\u00e9s de interacciones de aplicaciones externas, lo que genera una forma de Path Traversal. Potencialmente, esto permite que cualquier aplicaci\u00f3n env\u00ede un archivo de librer\u00eda manipulado, con el objetivo de sobrescribir una librer\u00eda nativa existente utilizada por WPS Office. La explotaci\u00f3n exitosa podr\u00eda resultar en la ejecuci\u00f3n de comandos arbitrarios bajo la apariencia del ID de la aplicaci\u00f3n de WPS Office." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://www.microsoft.com/en-us/security/blog/2024/05/01/dirty-stream-attack-discovering-and-mitigating-a-common-vulnerability-pattern-in-android-apps/", diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35256.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35256.json index 98ff3b3956c..a6d2c6d64e1 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35256.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35256.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35256", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:17.623", - "lastModified": "2024-08-08T18:50:56.197", + "lastModified": "2024-08-20T15:48:42.910", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -70,43 +70,55 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*", - "matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.0.6441.1", + "matchCriteriaId": "B958A8F2-7B51-4A68-8E58-CF91ADF5D067" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7037.1", + "matchCriteriaId": "13AD7527-DD44-45C5-AC2F-F0FC657C12E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.0.2056.2", + "matchCriteriaId": "F706C3CC-0C04-40E7-AA52-9B98DF7CFB2D" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*", - "matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0.3456.2", + "versionEndExcluding": "14.0.3471.2", + "matchCriteriaId": "0FBD2AAD-6635-4840-A4A0-8C04AB50BA8F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*", - "matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.0.2116.2", + "matchCriteriaId": "8AE7C7AB-2B2B-4822-98BE-D1E7E53FFB4A" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0.4375.4", + "versionEndExcluding": "15.0.4382.1", + "matchCriteriaId": "AA37D611-EA4F-4D4F-A79B-FE65726DE7E1" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*", - "matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.0.1121.4", + "matchCriteriaId": "A14154AC-1DC3-42B7-B45A-916C9ACFD237" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.4125.3", + "versionEndExcluding": "16.0.4131.2", + "matchCriteriaId": "7391BD2B-431E-4F65-878A-1BE8D389B3FE" } ] } diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35271.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35271.json index 34b0e4ecffb..37d3f752408 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35271.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35271.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35271", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:19.023", - "lastModified": "2024-08-08T18:51:09.090", + "lastModified": "2024-08-20T15:47:07.247", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -70,43 +70,55 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*", - "matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.0.6441.1", + "matchCriteriaId": "B958A8F2-7B51-4A68-8E58-CF91ADF5D067" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7037.1", + "matchCriteriaId": "13AD7527-DD44-45C5-AC2F-F0FC657C12E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.0.2056.2", + "matchCriteriaId": "F706C3CC-0C04-40E7-AA52-9B98DF7CFB2D" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*", - "matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0.3456.2", + "versionEndExcluding": "14.0.3471.2", + "matchCriteriaId": "0FBD2AAD-6635-4840-A4A0-8C04AB50BA8F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*", - "matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.0.2116.2", + "matchCriteriaId": "8AE7C7AB-2B2B-4822-98BE-D1E7E53FFB4A" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0.4375.4", + "versionEndExcluding": "15.0.4382.1", + "matchCriteriaId": "AA37D611-EA4F-4D4F-A79B-FE65726DE7E1" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*", - "matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.0.1121.4", + "matchCriteriaId": "A14154AC-1DC3-42B7-B45A-916C9ACFD237" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.4125.3", + "versionEndExcluding": "16.0.4131.2", + "matchCriteriaId": "7391BD2B-431E-4F65-878A-1BE8D389B3FE" } ] } diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35272.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35272.json index c47a68c2519..a0f1f9fce28 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35272.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35272.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35272", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:19.217", - "lastModified": "2024-08-08T18:33:14.440", + "lastModified": "2024-08-20T15:47:09.880", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -70,43 +70,55 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*", - "matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.0.6441.1", + "matchCriteriaId": "B958A8F2-7B51-4A68-8E58-CF91ADF5D067" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7037.1", + "matchCriteriaId": "13AD7527-DD44-45C5-AC2F-F0FC657C12E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.0.2056.2", + "matchCriteriaId": "F706C3CC-0C04-40E7-AA52-9B98DF7CFB2D" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*", - "matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0.3456.2", + "versionEndExcluding": "14.0.3471.2", + "matchCriteriaId": "0FBD2AAD-6635-4840-A4A0-8C04AB50BA8F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*", - "matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.0.2116.2", + "matchCriteriaId": "8AE7C7AB-2B2B-4822-98BE-D1E7E53FFB4A" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0.4375.4", + "versionEndExcluding": "15.0.4382.1", + "matchCriteriaId": "AA37D611-EA4F-4D4F-A79B-FE65726DE7E1" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*", - "matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.0.1121.4", + "matchCriteriaId": "A14154AC-1DC3-42B7-B45A-916C9ACFD237" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.4125.3", + "versionEndExcluding": "16.0.4131.2", + "matchCriteriaId": "7391BD2B-431E-4F65-878A-1BE8D389B3FE" } ] } diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35374.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35374.json index 45867d5cd6d..141186ce5b8 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35374.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35374.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35374", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-24T21:15:59.793", - "lastModified": "2024-05-28T17:15:10.937", + "lastModified": "2024-08-20T15:35:14.870", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Mocodo Mocodo Online 4.2.6 y versiones anteriores no desinfecta adecuadamente el campo de entrada sql_case en /web/generate.php, lo que permite a atacantes remotos ejecutar comandos SQL arbitrarios y potencialmente inyecci\u00f3n de comandos, lo que lleva a la ejecuci\u00f3n remota de c\u00f3digo (RCE) bajo ciertas condiciones." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://chocapikk.com/posts/2024/mocodo-vulnerabilities/", diff --git a/CVE-2024/CVE-2024-354xx/CVE-2024-35409.json b/CVE-2024/CVE-2024-354xx/CVE-2024-35409.json index 8b55003b016..b7a48c2507c 100644 --- a/CVE-2024/CVE-2024-354xx/CVE-2024-35409.json +++ b/CVE-2024/CVE-2024-354xx/CVE-2024-35409.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35409", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-22T14:15:08.760", - "lastModified": "2024-05-22T14:30:41.953", + "lastModified": "2024-08-20T15:35:15.637", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "WeBid 1.1.2 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de admin/tax.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/ixpqxi/CVE_LIST/blob/master/WeBid_sqli/WeBid_v1.1.2_sql_injection_vulnerability.md", diff --git a/CVE-2024/CVE-2024-355xx/CVE-2024-35538.json b/CVE-2024/CVE-2024-355xx/CVE-2024-35538.json index eab91118e0d..5758b227c8d 100644 --- a/CVE-2024/CVE-2024-355xx/CVE-2024-35538.json +++ b/CVE-2024/CVE-2024-355xx/CVE-2024-35538.json @@ -2,16 +2,59 @@ "id": "CVE-2024-35538", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-19T21:15:09.850", - "lastModified": "2024-08-19T21:15:09.850", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Typecho v1.3.0 was discovered to contain a Client IP Spoofing vulnerability, which allows attackers to falsify their IP addresses by specifying an arbitrary IP as value of X-Forwarded-For or Client-Ip headers while performing HTTP requests." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Typecho v1.3.0 contiene una vulnerabilidad de suplantaci\u00f3n de IP del cliente, que permite a los atacantes falsificar sus direcciones IP especificando una IP arbitraria como valor de los encabezados X-Forwarded-For o Client-Ip mientras realizan solicitudes HTTP." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + }, + { + "lang": "en", + "value": "CWE-444" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://cyberaz0r.info/2024/08/typecho-multiple-vulnerabilities/", diff --git a/CVE-2024/CVE-2024-355xx/CVE-2024-35539.json b/CVE-2024/CVE-2024-355xx/CVE-2024-35539.json index 561ced25b89..a9517172476 100644 --- a/CVE-2024/CVE-2024-355xx/CVE-2024-35539.json +++ b/CVE-2024/CVE-2024-355xx/CVE-2024-35539.json @@ -2,13 +2,17 @@ "id": "CVE-2024-35539", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-19T21:15:09.913", - "lastModified": "2024-08-19T21:15:09.913", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Typecho v1.3.0 was discovered to contain a race condition vulnerability in the post commenting function. This vulnerability allows attackers to post several comments before the spam protection checks if the comments are posted too frequently." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Typecho v1.3.0 conten\u00eda una vulnerabilidad de condici\u00f3n de ejecuci\u00f3n en la funci\u00f3n de comentarios de publicaciones. Esta vulnerabilidad permite a los atacantes publicar varios comentarios antes de que la protecci\u00f3n contra spam compruebe si los comentarios se publican con demasiada frecuencia." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-355xx/CVE-2024-35540.json b/CVE-2024/CVE-2024-355xx/CVE-2024-35540.json new file mode 100644 index 00000000000..ef30ab9bc79 --- /dev/null +++ b/CVE-2024/CVE-2024-355xx/CVE-2024-35540.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-35540", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T15:15:21.103", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A stored cross-site scripting (XSS) vulnerability in Typecho v1.3.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://cyberaz0r.info/2024/08/typecho-multiple-vulnerabilities/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-355xx/CVE-2024-35556.json b/CVE-2024/CVE-2024-355xx/CVE-2024-35556.json index aa61b53a7d7..47fb31516eb 100644 --- a/CVE-2024/CVE-2024-355xx/CVE-2024-35556.json +++ b/CVE-2024/CVE-2024-355xx/CVE-2024-35556.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35556", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-22T14:15:09.467", - "lastModified": "2024-05-22T14:30:41.953", + "lastModified": "2024-08-20T15:35:16.417", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que idccms v1.35 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /admin/vpsSys_deal.php?mudi=infoSet." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/bearman113/1.md/blob/main/26/csrf.md", diff --git a/CVE-2024/CVE-2024-355xx/CVE-2024-35580.json b/CVE-2024/CVE-2024-355xx/CVE-2024-35580.json index 823f7eb0524..796d0b20aef 100644 --- a/CVE-2024/CVE-2024-355xx/CVE-2024-35580.json +++ b/CVE-2024/CVE-2024-355xx/CVE-2024-35580.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35580", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-20T18:15:10.777", - "lastModified": "2024-05-20T19:34:58.277", + "lastModified": "2024-08-20T14:35:23.113", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Tenda AX1806 v1.0.0.1 contiene un desbordamiento de pila a trav\u00e9s del par\u00e1metro adv.iptv.stbpvid en la funci\u00f3n formSetIptv." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://detailed-stetson-767.notion.site/Tenda-AX1806-Buffer-Overflow-in-formSetIptv-cebf9202122a4582ae86c5253b3f6da3?pvs=4", diff --git a/CVE-2024/CVE-2024-355xx/CVE-2024-35582.json b/CVE-2024/CVE-2024-355xx/CVE-2024-35582.json index 985adba40cd..5c60278618f 100644 --- a/CVE-2024/CVE-2024-355xx/CVE-2024-35582.json +++ b/CVE-2024/CVE-2024-355xx/CVE-2024-35582.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35582", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T20:16:36.037", - "lastModified": "2024-05-29T13:02:09.280", + "lastModified": "2024-08-20T15:35:17.183", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de Cross-site scripting (XSS) en Sourcecodester Laboratory Management System v1.0 permite a los atacantes ejecutar scripts web o HTML arbitrario a trav\u00e9s de un payload manipulado que se inyecta en el campo de entrada del Departamento." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/r04i7/CVE/blob/main/CVE-2024-35582.md", diff --git a/CVE-2024/CVE-2024-355xx/CVE-2024-35592.json b/CVE-2024/CVE-2024-355xx/CVE-2024-35592.json index 8cd184c5c87..c87cc202927 100644 --- a/CVE-2024/CVE-2024-355xx/CVE-2024-35592.json +++ b/CVE-2024/CVE-2024-355xx/CVE-2024-35592.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35592", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-24T14:15:17.287", - "lastModified": "2024-05-24T18:09:20.027", + "lastModified": "2024-08-20T15:35:17.980", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de carga de archivos arbitraria en la funci\u00f3n de carga de Box-IM v2.0 permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo PDF manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.6, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/Joying-C/Cross-site-scripting-vulnerability/blob/main/BOX-IM_Cross_site%20_scripting%20_vulnerability/BOX-IM_Cross_site%20_scripting%20_vulnerability.pdf", diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36052.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36052.json index 09656879c60..97cb190c4d0 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36052.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36052.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36052", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-21T17:15:09.250", - "lastModified": "2024-05-22T12:46:53.887", + "lastModified": "2024-08-20T15:35:18.753", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " RARLAB WinRAR anterior a 7.00, en Windows, permite a los atacantes falsificar la salida de la pantalla mediante secuencias de escape ANSI, un problema diferente al CVE-2024-33899." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-150" + } + ] + } + ], "references": [ { "url": "https://sdushantha.medium.com/ansi-escape-injection-vulnerability-in-winrar-a2cbfac4b983", diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36079.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36079.json index c55fea0b043..42540f301ed 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36079.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36079.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36079", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-24T22:15:08.413", - "lastModified": "2024-05-28T12:39:42.673", + "lastModified": "2024-08-20T14:35:24.033", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en Vaultize 21.07.27. Al cargar archivos, no se verifica que el par\u00e1metro de nombre de archivo sea correcto. Como resultado, se crear\u00e1 un archivo temporal fuera del directorio especificado cuando se descargue el archivo. Para aprovechar esto, un usuario autenticado cargar\u00eda un archivo con un nombre incorrecto y luego lo descargar\u00eda." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://github.com/DxRvs/vaultize_CVE-2024-36079", diff --git a/CVE-2024/CVE-2024-367xx/CVE-2024-36734.json b/CVE-2024/CVE-2024-367xx/CVE-2024-36734.json index 4da4eb79863..fd2f41d92e7 100644 --- a/CVE-2024/CVE-2024-367xx/CVE-2024-36734.json +++ b/CVE-2024/CVE-2024-367xx/CVE-2024-36734.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36734", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-06T19:15:58.030", - "lastModified": "2024-06-07T14:56:05.647", + "lastModified": "2024-08-20T14:35:24.830", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Validaci\u00f3n de entrada incorrecta en OneFlow-Inc. Oneflow v0.9.1 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) ingresando un valor negativo en el par\u00e1metro tenue." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Redmept1on/7420cd59f30defda07cf7bb4bf4a92cd", diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37318.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37318.json index fc22f6d6230..5a091681a0a 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37318.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37318.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37318", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:19.520", - "lastModified": "2024-08-08T18:36:54.347", + "lastModified": "2024-08-20T15:47:12.723", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -70,43 +70,55 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*", - "matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.0.6441.1", + "matchCriteriaId": "B958A8F2-7B51-4A68-8E58-CF91ADF5D067" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7037.1", + "matchCriteriaId": "13AD7527-DD44-45C5-AC2F-F0FC657C12E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.0.2056.2", + "matchCriteriaId": "F706C3CC-0C04-40E7-AA52-9B98DF7CFB2D" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*", - "matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0.3456.2", + "versionEndExcluding": "14.0.3471.2", + "matchCriteriaId": "0FBD2AAD-6635-4840-A4A0-8C04AB50BA8F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*", - "matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.0.2116.2", + "matchCriteriaId": "8AE7C7AB-2B2B-4822-98BE-D1E7E53FFB4A" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0.4375.4", + "versionEndExcluding": "15.0.4382.1", + "matchCriteriaId": "AA37D611-EA4F-4D4F-A79B-FE65726DE7E1" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*", - "matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.0.1121.4", + "matchCriteriaId": "A14154AC-1DC3-42B7-B45A-916C9ACFD237" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.4125.3", + "versionEndExcluding": "16.0.4131.2", + "matchCriteriaId": "7391BD2B-431E-4F65-878A-1BE8D389B3FE" } ] } diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37319.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37319.json index 1404c86e631..cd42daf88d1 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37319.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37319.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37319", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:19.757", - "lastModified": "2024-08-08T18:39:41.537", + "lastModified": "2024-08-20T15:47:14.840", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -70,43 +70,55 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*", - "matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.0.6441.1", + "matchCriteriaId": "B958A8F2-7B51-4A68-8E58-CF91ADF5D067" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7037.1", + "matchCriteriaId": "13AD7527-DD44-45C5-AC2F-F0FC657C12E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.0.2056.2", + "matchCriteriaId": "F706C3CC-0C04-40E7-AA52-9B98DF7CFB2D" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*", - "matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0.3456.2", + "versionEndExcluding": "14.0.3471.2", + "matchCriteriaId": "0FBD2AAD-6635-4840-A4A0-8C04AB50BA8F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*", - "matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.0.2116.2", + "matchCriteriaId": "8AE7C7AB-2B2B-4822-98BE-D1E7E53FFB4A" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0.4375.4", + "versionEndExcluding": "15.0.4382.1", + "matchCriteriaId": "AA37D611-EA4F-4D4F-A79B-FE65726DE7E1" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*", - "matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.0.1121.4", + "matchCriteriaId": "A14154AC-1DC3-42B7-B45A-916C9ACFD237" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.4125.3", + "versionEndExcluding": "16.0.4131.2", + "matchCriteriaId": "7391BD2B-431E-4F65-878A-1BE8D389B3FE" } ] } diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37320.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37320.json index c1fe695ce02..d1cfb4374f8 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37320.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37320.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37320", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:19.973", - "lastModified": "2024-08-08T18:40:08.887", + "lastModified": "2024-08-20T15:47:17.147", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -70,43 +70,55 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*", - "matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.0.6441.1", + "matchCriteriaId": "B958A8F2-7B51-4A68-8E58-CF91ADF5D067" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7037.1", + "matchCriteriaId": "13AD7527-DD44-45C5-AC2F-F0FC657C12E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.0.2056.2", + "matchCriteriaId": "F706C3CC-0C04-40E7-AA52-9B98DF7CFB2D" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*", - "matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0.3456.2", + "versionEndExcluding": "14.0.3471.2", + "matchCriteriaId": "0FBD2AAD-6635-4840-A4A0-8C04AB50BA8F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*", - "matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.0.2116.2", + "matchCriteriaId": "8AE7C7AB-2B2B-4822-98BE-D1E7E53FFB4A" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0.4375.4", + "versionEndExcluding": "15.0.4382.1", + "matchCriteriaId": "AA37D611-EA4F-4D4F-A79B-FE65726DE7E1" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*", - "matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.0.1121.4", + "matchCriteriaId": "A14154AC-1DC3-42B7-B45A-916C9ACFD237" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.4125.3", + "versionEndExcluding": "16.0.4131.2", + "matchCriteriaId": "7391BD2B-431E-4F65-878A-1BE8D389B3FE" } ] } diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37321.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37321.json index 6b18bc4e1cf..b8e01aeeb90 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37321.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37321.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37321", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:20.180", - "lastModified": "2024-08-08T18:40:27.350", + "lastModified": "2024-08-20T15:47:20.880", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -70,43 +70,55 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*", - "matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.0.6441.1", + "matchCriteriaId": "B958A8F2-7B51-4A68-8E58-CF91ADF5D067" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7037.1", + "matchCriteriaId": "13AD7527-DD44-45C5-AC2F-F0FC657C12E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.0.2056.2", + "matchCriteriaId": "F706C3CC-0C04-40E7-AA52-9B98DF7CFB2D" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*", - "matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0.3456.2", + "versionEndExcluding": "14.0.3471.2", + "matchCriteriaId": "0FBD2AAD-6635-4840-A4A0-8C04AB50BA8F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*", - "matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.0.2116.2", + "matchCriteriaId": "8AE7C7AB-2B2B-4822-98BE-D1E7E53FFB4A" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0.4375.4", + "versionEndExcluding": "15.0.4382.1", + "matchCriteriaId": "AA37D611-EA4F-4D4F-A79B-FE65726DE7E1" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*", - "matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.0.1121.4", + "matchCriteriaId": "A14154AC-1DC3-42B7-B45A-916C9ACFD237" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.4125.3", + "versionEndExcluding": "16.0.4131.2", + "matchCriteriaId": "7391BD2B-431E-4F65-878A-1BE8D389B3FE" } ] } diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37322.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37322.json index 5edcc6d2831..e65833708d7 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37322.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37322.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37322", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:20.390", - "lastModified": "2024-08-08T18:41:20.253", + "lastModified": "2024-08-20T15:47:23.830", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -70,43 +70,55 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*", - "matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.0.6441.1", + "matchCriteriaId": "B958A8F2-7B51-4A68-8E58-CF91ADF5D067" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7037.1", + "matchCriteriaId": "13AD7527-DD44-45C5-AC2F-F0FC657C12E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.0.2056.2", + "matchCriteriaId": "F706C3CC-0C04-40E7-AA52-9B98DF7CFB2D" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*", - "matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0.3456.2", + "versionEndExcluding": "14.0.3471.2", + "matchCriteriaId": "0FBD2AAD-6635-4840-A4A0-8C04AB50BA8F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*", - "matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.0.2116.2", + "matchCriteriaId": "8AE7C7AB-2B2B-4822-98BE-D1E7E53FFB4A" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0.4375.4", + "versionEndExcluding": "15.0.4382.1", + "matchCriteriaId": "AA37D611-EA4F-4D4F-A79B-FE65726DE7E1" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*", - "matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.0.1121.4", + "matchCriteriaId": "A14154AC-1DC3-42B7-B45A-916C9ACFD237" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.4125.3", + "versionEndExcluding": "16.0.4131.2", + "matchCriteriaId": "7391BD2B-431E-4F65-878A-1BE8D389B3FE" } ] } diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37323.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37323.json index 4525d7ad5d7..8203a56f682 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37323.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37323.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37323", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:20.603", - "lastModified": "2024-08-08T18:41:44.730", + "lastModified": "2024-08-20T15:47:26.383", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -70,43 +70,55 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*", - "matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.0.6441.1", + "matchCriteriaId": "B958A8F2-7B51-4A68-8E58-CF91ADF5D067" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7037.1", + "matchCriteriaId": "13AD7527-DD44-45C5-AC2F-F0FC657C12E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.0.2056.2", + "matchCriteriaId": "F706C3CC-0C04-40E7-AA52-9B98DF7CFB2D" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*", - "matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0.3456.2", + "versionEndExcluding": "14.0.3471.2", + "matchCriteriaId": "0FBD2AAD-6635-4840-A4A0-8C04AB50BA8F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*", - "matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.0.2116.2", + "matchCriteriaId": "8AE7C7AB-2B2B-4822-98BE-D1E7E53FFB4A" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0.4375.4", + "versionEndExcluding": "15.0.4382.1", + "matchCriteriaId": "AA37D611-EA4F-4D4F-A79B-FE65726DE7E1" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*", - "matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.0.1121.4", + "matchCriteriaId": "A14154AC-1DC3-42B7-B45A-916C9ACFD237" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.4125.3", + "versionEndExcluding": "16.0.4131.2", + "matchCriteriaId": "7391BD2B-431E-4F65-878A-1BE8D389B3FE" } ] } diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37324.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37324.json index 4252feab286..1ac535e1a9a 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37324.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37324.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37324", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:20.797", - "lastModified": "2024-08-08T18:42:10.850", + "lastModified": "2024-08-20T15:47:29.147", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -70,43 +70,55 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*", - "matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.0.6441.1", + "matchCriteriaId": "B958A8F2-7B51-4A68-8E58-CF91ADF5D067" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7037.1", + "matchCriteriaId": "13AD7527-DD44-45C5-AC2F-F0FC657C12E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.0.2056.2", + "matchCriteriaId": "F706C3CC-0C04-40E7-AA52-9B98DF7CFB2D" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*", - "matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0.3456.2", + "versionEndExcluding": "14.0.3471.2", + "matchCriteriaId": "0FBD2AAD-6635-4840-A4A0-8C04AB50BA8F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*", - "matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.0.2116.2", + "matchCriteriaId": "8AE7C7AB-2B2B-4822-98BE-D1E7E53FFB4A" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0.4375.4", + "versionEndExcluding": "15.0.4382.1", + "matchCriteriaId": "AA37D611-EA4F-4D4F-A79B-FE65726DE7E1" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*", - "matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.0.1121.4", + "matchCriteriaId": "A14154AC-1DC3-42B7-B45A-916C9ACFD237" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.4125.3", + "versionEndExcluding": "16.0.4131.2", + "matchCriteriaId": "7391BD2B-431E-4F65-878A-1BE8D389B3FE" } ] } diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37326.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37326.json index c08b9c033b7..3320239cc4d 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37326.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37326.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37326", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:20.997", - "lastModified": "2024-08-08T18:42:31.443", + "lastModified": "2024-08-20T15:47:31.987", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -70,43 +70,55 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*", - "matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.0.6441.1", + "matchCriteriaId": "B958A8F2-7B51-4A68-8E58-CF91ADF5D067" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7037.1", + "matchCriteriaId": "13AD7527-DD44-45C5-AC2F-F0FC657C12E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.0.2056.2", + "matchCriteriaId": "F706C3CC-0C04-40E7-AA52-9B98DF7CFB2D" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*", - "matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0.3456.2", + "versionEndExcluding": "14.0.3471.2", + "matchCriteriaId": "0FBD2AAD-6635-4840-A4A0-8C04AB50BA8F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*", - "matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.0.2116.2", + "matchCriteriaId": "8AE7C7AB-2B2B-4822-98BE-D1E7E53FFB4A" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0.4375.4", + "versionEndExcluding": "15.0.4382.1", + "matchCriteriaId": "AA37D611-EA4F-4D4F-A79B-FE65726DE7E1" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*", - "matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.0.1121.4", + "matchCriteriaId": "A14154AC-1DC3-42B7-B45A-916C9ACFD237" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.4125.3", + "versionEndExcluding": "16.0.4131.2", + "matchCriteriaId": "7391BD2B-431E-4F65-878A-1BE8D389B3FE" } ] } diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37327.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37327.json index 324d5b7227c..4003b6a63f3 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37327.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37327.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37327", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:21.190", - "lastModified": "2024-08-08T18:42:50.373", + "lastModified": "2024-08-20T15:47:34.730", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -70,43 +70,55 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*", - "matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.0.6441.1", + "matchCriteriaId": "B958A8F2-7B51-4A68-8E58-CF91ADF5D067" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7037.1", + "matchCriteriaId": "13AD7527-DD44-45C5-AC2F-F0FC657C12E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.0.2056.2", + "matchCriteriaId": "F706C3CC-0C04-40E7-AA52-9B98DF7CFB2D" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*", - "matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0.3456.2", + "versionEndExcluding": "14.0.3471.2", + "matchCriteriaId": "0FBD2AAD-6635-4840-A4A0-8C04AB50BA8F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*", - "matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.0.2116.2", + "matchCriteriaId": "8AE7C7AB-2B2B-4822-98BE-D1E7E53FFB4A" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0.4375.4", + "versionEndExcluding": "15.0.4382.1", + "matchCriteriaId": "AA37D611-EA4F-4D4F-A79B-FE65726DE7E1" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*", - "matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.0.1121.4", + "matchCriteriaId": "A14154AC-1DC3-42B7-B45A-916C9ACFD237" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.4125.3", + "versionEndExcluding": "16.0.4131.2", + "matchCriteriaId": "7391BD2B-431E-4F65-878A-1BE8D389B3FE" } ] } diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37328.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37328.json index 8a911c664a5..54974b69707 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37328.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37328.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37328", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:21.387", - "lastModified": "2024-08-08T18:43:07.557", + "lastModified": "2024-08-20T15:47:37.937", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -70,43 +70,55 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*", - "matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.0.6441.1", + "matchCriteriaId": "B958A8F2-7B51-4A68-8E58-CF91ADF5D067" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7037.1", + "matchCriteriaId": "13AD7527-DD44-45C5-AC2F-F0FC657C12E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.0.2056.2", + "matchCriteriaId": "F706C3CC-0C04-40E7-AA52-9B98DF7CFB2D" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*", - "matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0.3456.2", + "versionEndExcluding": "14.0.3471.2", + "matchCriteriaId": "0FBD2AAD-6635-4840-A4A0-8C04AB50BA8F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*", - "matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.0.2116.2", + "matchCriteriaId": "8AE7C7AB-2B2B-4822-98BE-D1E7E53FFB4A" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0.4375.4", + "versionEndExcluding": "15.0.4382.1", + "matchCriteriaId": "AA37D611-EA4F-4D4F-A79B-FE65726DE7E1" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*", - "matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.0.1121.4", + "matchCriteriaId": "A14154AC-1DC3-42B7-B45A-916C9ACFD237" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.4125.3", + "versionEndExcluding": "16.0.4131.2", + "matchCriteriaId": "7391BD2B-431E-4F65-878A-1BE8D389B3FE" } ] } diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37329.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37329.json index d4a13cc5aaa..74eb9078d7a 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37329.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37329.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37329", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:21.660", - "lastModified": "2024-08-08T18:43:34.633", + "lastModified": "2024-08-20T15:48:13.367", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -70,43 +70,55 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*", - "matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.0.6441.1", + "matchCriteriaId": "B958A8F2-7B51-4A68-8E58-CF91ADF5D067" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7037.1", + "matchCriteriaId": "13AD7527-DD44-45C5-AC2F-F0FC657C12E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.0.2056.2", + "matchCriteriaId": "F706C3CC-0C04-40E7-AA52-9B98DF7CFB2D" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*", - "matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0.3456.2", + "versionEndExcluding": "14.0.3471.2", + "matchCriteriaId": "0FBD2AAD-6635-4840-A4A0-8C04AB50BA8F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*", - "matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.0.2116.2", + "matchCriteriaId": "8AE7C7AB-2B2B-4822-98BE-D1E7E53FFB4A" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0.4375.4", + "versionEndExcluding": "15.0.4382.1", + "matchCriteriaId": "AA37D611-EA4F-4D4F-A79B-FE65726DE7E1" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*", - "matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.0.1121.4", + "matchCriteriaId": "A14154AC-1DC3-42B7-B45A-916C9ACFD237" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.4125.3", + "versionEndExcluding": "16.0.4131.2", + "matchCriteriaId": "7391BD2B-431E-4F65-878A-1BE8D389B3FE" } ] } diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37330.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37330.json index c21ce6cc095..f829ad5f97b 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37330.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37330.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37330", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:21.910", - "lastModified": "2024-08-08T18:43:52.897", + "lastModified": "2024-08-20T15:48:22.567", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -70,43 +70,55 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*", - "matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.0.6441.1", + "matchCriteriaId": "B958A8F2-7B51-4A68-8E58-CF91ADF5D067" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7037.1", + "matchCriteriaId": "13AD7527-DD44-45C5-AC2F-F0FC657C12E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.0.2056.2", + "matchCriteriaId": "F706C3CC-0C04-40E7-AA52-9B98DF7CFB2D" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*", - "matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0.3456.2", + "versionEndExcluding": "14.0.3471.2", + "matchCriteriaId": "0FBD2AAD-6635-4840-A4A0-8C04AB50BA8F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*", - "matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.0.2116.2", + "matchCriteriaId": "8AE7C7AB-2B2B-4822-98BE-D1E7E53FFB4A" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0.4375.4", + "versionEndExcluding": "15.0.4382.1", + "matchCriteriaId": "AA37D611-EA4F-4D4F-A79B-FE65726DE7E1" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*", - "matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.0.1121.4", + "matchCriteriaId": "A14154AC-1DC3-42B7-B45A-916C9ACFD237" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.4125.3", + "versionEndExcluding": "16.0.4131.2", + "matchCriteriaId": "7391BD2B-431E-4F65-878A-1BE8D389B3FE" } ] } diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37331.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37331.json index f2a6a43bc2d..d672eb933d0 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37331.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37331.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37331", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:22.113", - "lastModified": "2024-08-08T18:44:18.053", + "lastModified": "2024-08-20T15:48:27.130", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -70,43 +70,55 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*", - "matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.0.6441.1", + "matchCriteriaId": "B958A8F2-7B51-4A68-8E58-CF91ADF5D067" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7037.1", + "matchCriteriaId": "13AD7527-DD44-45C5-AC2F-F0FC657C12E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.0.2056.2", + "matchCriteriaId": "F706C3CC-0C04-40E7-AA52-9B98DF7CFB2D" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*", - "matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0.3456.2", + "versionEndExcluding": "14.0.3471.2", + "matchCriteriaId": "0FBD2AAD-6635-4840-A4A0-8C04AB50BA8F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*", - "matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.0.2116.2", + "matchCriteriaId": "8AE7C7AB-2B2B-4822-98BE-D1E7E53FFB4A" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0.4375.4", + "versionEndExcluding": "15.0.4382.1", + "matchCriteriaId": "AA37D611-EA4F-4D4F-A79B-FE65726DE7E1" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*", - "matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.0.1121.4", + "matchCriteriaId": "A14154AC-1DC3-42B7-B45A-916C9ACFD237" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.4125.3", + "versionEndExcluding": "16.0.4131.2", + "matchCriteriaId": "7391BD2B-431E-4F65-878A-1BE8D389B3FE" } ] } diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37332.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37332.json index 07dc89048c1..39b3f8eeb4b 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37332.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37332.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37332", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:22.313", - "lastModified": "2024-08-08T18:44:37.320", + "lastModified": "2024-08-20T15:48:28.910", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -70,43 +70,55 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*", - "matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.0.6441.1", + "matchCriteriaId": "B958A8F2-7B51-4A68-8E58-CF91ADF5D067" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7037.1", + "matchCriteriaId": "13AD7527-DD44-45C5-AC2F-F0FC657C12E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.0.2056.2", + "matchCriteriaId": "F706C3CC-0C04-40E7-AA52-9B98DF7CFB2D" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*", - "matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0.3456.2", + "versionEndExcluding": "14.0.3471.2", + "matchCriteriaId": "0FBD2AAD-6635-4840-A4A0-8C04AB50BA8F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*", - "matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.0.2116.2", + "matchCriteriaId": "8AE7C7AB-2B2B-4822-98BE-D1E7E53FFB4A" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0.4375.4", + "versionEndExcluding": "15.0.4382.1", + "matchCriteriaId": "AA37D611-EA4F-4D4F-A79B-FE65726DE7E1" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*", - "matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.0.1121.4", + "matchCriteriaId": "A14154AC-1DC3-42B7-B45A-916C9ACFD237" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.4125.3", + "versionEndExcluding": "16.0.4131.2", + "matchCriteriaId": "7391BD2B-431E-4F65-878A-1BE8D389B3FE" } ] } diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37333.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37333.json index 34c2ae1c335..0ae8bd3935d 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37333.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37333.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37333", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:22.523", - "lastModified": "2024-08-08T18:44:55.343", + "lastModified": "2024-08-20T15:48:30.967", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -70,43 +70,55 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*", - "matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.0.6441.1", + "matchCriteriaId": "B958A8F2-7B51-4A68-8E58-CF91ADF5D067" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7037.1", + "matchCriteriaId": "13AD7527-DD44-45C5-AC2F-F0FC657C12E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.0.2056.2", + "matchCriteriaId": "F706C3CC-0C04-40E7-AA52-9B98DF7CFB2D" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*", - "matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0.3456.2", + "versionEndExcluding": "14.0.3471.2", + "matchCriteriaId": "0FBD2AAD-6635-4840-A4A0-8C04AB50BA8F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*", - "matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.0.2116.2", + "matchCriteriaId": "8AE7C7AB-2B2B-4822-98BE-D1E7E53FFB4A" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0.4375.4", + "versionEndExcluding": "15.0.4382.1", + "matchCriteriaId": "AA37D611-EA4F-4D4F-A79B-FE65726DE7E1" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*", - "matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.0.1121.4", + "matchCriteriaId": "A14154AC-1DC3-42B7-B45A-916C9ACFD237" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.4125.3", + "versionEndExcluding": "16.0.4131.2", + "matchCriteriaId": "7391BD2B-431E-4F65-878A-1BE8D389B3FE" } ] } diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37336.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37336.json index 1aac8898640..50f9f79910b 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37336.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37336.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37336", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:22.927", - "lastModified": "2024-08-08T18:45:37.537", + "lastModified": "2024-08-20T15:48:32.967", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -70,43 +70,55 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*", - "matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.0.6441.1", + "matchCriteriaId": "B958A8F2-7B51-4A68-8E58-CF91ADF5D067" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7037.1", + "matchCriteriaId": "13AD7527-DD44-45C5-AC2F-F0FC657C12E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.0.2056.2", + "matchCriteriaId": "F706C3CC-0C04-40E7-AA52-9B98DF7CFB2D" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*", - "matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0.3456.2", + "versionEndExcluding": "14.0.3471.2", + "matchCriteriaId": "0FBD2AAD-6635-4840-A4A0-8C04AB50BA8F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*", - "matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.0.2116.2", + "matchCriteriaId": "8AE7C7AB-2B2B-4822-98BE-D1E7E53FFB4A" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0.4375.4", + "versionEndExcluding": "15.0.4382.1", + "matchCriteriaId": "AA37D611-EA4F-4D4F-A79B-FE65726DE7E1" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*", - "matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.0.1121.4", + "matchCriteriaId": "A14154AC-1DC3-42B7-B45A-916C9ACFD237" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.4125.3", + "versionEndExcluding": "16.0.4131.2", + "matchCriteriaId": "7391BD2B-431E-4F65-878A-1BE8D389B3FE" } ] } diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37856.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37856.json index 8e8d32f39b5..289a3df88db 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37856.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37856.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37856", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-29T19:15:12.177", - "lastModified": "2024-07-30T13:33:30.653", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-20T14:46:55.027", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,82 @@ "value": " La vulnerabilidad de Cross Site Scripting en Lost and Found Information System 1.0 permite a un atacante remoto escalar privilegios a trav\u00e9s de los campos de first, last y middle name en la p\u00e1gina de perfil de usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:lost_and_found_information_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "14CF403B-DF0C-4796-8B10-689075DC8A35" + } + ] + } + ] + } + ], "references": [ { "url": "http://lost.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable", + "Product" + ] }, { "url": "https://packetstormsecurity.com/files/179078/Lost-And-Found-Information-System-1.0-Cross-Site-Scripting.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38087.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38087.json index 3cfc07e40df..5a7432bb209 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38087.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38087.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38087", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:44.673", - "lastModified": "2024-08-08T18:45:56.203", + "lastModified": "2024-08-20T15:48:35.217", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -70,43 +70,55 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*", - "matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.0.6441.1", + "matchCriteriaId": "B958A8F2-7B51-4A68-8E58-CF91ADF5D067" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7037.1", + "matchCriteriaId": "13AD7527-DD44-45C5-AC2F-F0FC657C12E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.0.2056.2", + "matchCriteriaId": "F706C3CC-0C04-40E7-AA52-9B98DF7CFB2D" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*", - "matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0.3456.2", + "versionEndExcluding": "14.0.3471.2", + "matchCriteriaId": "0FBD2AAD-6635-4840-A4A0-8C04AB50BA8F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*", - "matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.0.2116.2", + "matchCriteriaId": "8AE7C7AB-2B2B-4822-98BE-D1E7E53FFB4A" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0.4375.4", + "versionEndExcluding": "15.0.4382.1", + "matchCriteriaId": "AA37D611-EA4F-4D4F-A79B-FE65726DE7E1" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*", - "matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.0.1121.4", + "matchCriteriaId": "A14154AC-1DC3-42B7-B45A-916C9ACFD237" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.4125.3", + "versionEndExcluding": "16.0.4131.2", + "matchCriteriaId": "7391BD2B-431E-4F65-878A-1BE8D389B3FE" } ] } diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38088.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38088.json index ac4a74844c7..1445f86ea49 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38088.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38088.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38088", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:44.933", - "lastModified": "2024-08-08T18:31:54.827", + "lastModified": "2024-08-20T15:48:38.620", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -70,43 +70,55 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*", - "matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.0.6441.1", + "matchCriteriaId": "B958A8F2-7B51-4A68-8E58-CF91ADF5D067" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541" + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7037.1", + "matchCriteriaId": "13AD7527-DD44-45C5-AC2F-F0FC657C12E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.0.2056.2", + "matchCriteriaId": "F706C3CC-0C04-40E7-AA52-9B98DF7CFB2D" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*", - "matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5" + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0.3456.2", + "versionEndExcluding": "14.0.3471.2", + "matchCriteriaId": "0FBD2AAD-6635-4840-A4A0-8C04AB50BA8F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*", - "matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.0.2116.2", + "matchCriteriaId": "8AE7C7AB-2B2B-4822-98BE-D1E7E53FFB4A" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F" + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0.4375.4", + "versionEndExcluding": "15.0.4382.1", + "matchCriteriaId": "AA37D611-EA4F-4D4F-A79B-FE65726DE7E1" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*", - "matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.0.1121.4", + "matchCriteriaId": "A14154AC-1DC3-42B7-B45A-916C9ACFD237" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF" + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.4125.3", + "versionEndExcluding": "16.0.4131.2", + "matchCriteriaId": "7391BD2B-431E-4F65-878A-1BE8D389B3FE" } ] } diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38808.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38808.json index 3f88fddc5ef..3e77242961b 100644 --- a/CVE-2024/CVE-2024-388xx/CVE-2024-38808.json +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38808.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38808", "sourceIdentifier": "security@vmware.com", "published": "2024-08-20T08:15:05.023", - "lastModified": "2024-08-20T08:15:05.023", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Spring Framework versions 5.3.0 - 5.3.38 and older unsupported versions, it is possible for a user to provide a specially crafted Spring Expression Language (SpEL) expression that may cause a denial of service (DoS) condition.\n\nSpecifically, an application is vulnerable when the following is true:\n\n * The application evaluates user-supplied SpEL expressions." + }, + { + "lang": "es", + "value": "En las versiones de Spring Framework 5.3.0 - 5.3.38 y versiones anteriores no compatibles, es posible que un usuario proporcione una expresi\u00f3n Spring Expression Language (SpEL) especialmente manipulada que puede causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Espec\u00edficamente, una aplicaci\u00f3n es vulnerable cuando se cumple lo siguiente: * La aplicaci\u00f3n eval\u00faa expresiones SpEL proporcionadas por el usuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38810.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38810.json index ec14ca99c9d..95e0f68d94c 100644 --- a/CVE-2024/CVE-2024-388xx/CVE-2024-38810.json +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38810.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38810", "sourceIdentifier": "security@vmware.com", "published": "2024-08-20T04:15:07.993", - "lastModified": "2024-08-20T04:15:07.993", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization When Using @AuthorizeReturnObject in Spring Security 6.3.0 and 6.3.1 allows attacker to render security annotations inaffective." + }, + { + "lang": "es", + "value": "La falta de autorizaci\u00f3n al usar @AuthorizeReturnObject en Spring Security 6.3.0 y 6.3.1 permite al atacante hacer que las anotaciones de seguridad sean inefectivas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39094.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39094.json new file mode 100644 index 00000000000..7c208bf6651 --- /dev/null +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39094.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-39094", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T14:15:09.330", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Friendica 2024.03 is vulnerable to Cross Site Scripting (XSS) in settings/profile via the homepage, xmpp, and matrix parameters." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://friendi.ca/2024/08/17/friendica-2024-08-released/", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/friendica/friendica/issues/14220", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/friendica/friendica/releases/tag/2024.08", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39277.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39277.json index c5b67f7c0e5..f94160c60ef 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39277.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39277.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39277", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-21T12:15:11.330", - "lastModified": "2024-06-24T19:17:48.380", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-20T14:35:25.887", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39495.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39495.json index c1703cf463e..359e185c884 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39495.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39495.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39495", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-12T13:15:12.183", - "lastModified": "2024-07-24T19:04:38.953", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-20T15:35:19.527", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39690.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39690.json new file mode 100644 index 00000000000..79243dfc360 --- /dev/null +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39690.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-39690", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-20T15:15:21.340", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Capsule is a multi-tenancy and policy-based framework for Kubernetes. In Capsule v0.7.0 and earlier, the tenant-owner can patch any arbitrary namespace that has not been taken over by a tenant (i.e., namespaces without the ownerReference field), thereby gaining control of that namespace." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.7, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/projectcapsule/capsule/commit/d620b0457ddec01616b8eab8512a10611611f584", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/projectcapsule/capsule/security/advisories/GHSA-mq69-4j5w-3qwp", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40774.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40774.json index 6382b3add65..b29213c3201 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40774.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40774.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40774", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:11.250", - "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-20T15:16:40.210", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,55 +15,234 @@ "value": "Se solucion\u00f3 un problema de degradaci\u00f3n con restricciones adicionales de firma de c\u00f3digo. Este problema se solucion\u00f3 en macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 y iPadOS 17.6, watchOS 10.6, tvOS 17.6, macOS Sonoma 14.6. Es posible que una aplicaci\u00f3n pueda omitir las preferencias de privacidad." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.7.6", + "matchCriteriaId": "3556C7C3-14B6-4846-B3E8-FE07A503155F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.6.8", + "matchCriteriaId": "7008225C-B5B9-4F87-9392-DD2080717E9A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.6", + "matchCriteriaId": "51E2E93B-C5A3-4C83-B806-2EC555AD45FE" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.6", + "matchCriteriaId": "1E393815-B3B5-4FF9-9D1D-AA3EA9C5D352" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.6", + "matchCriteriaId": "A8A1B228-89B1-470E-9B6E-8553E561E062" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.6", + "matchCriteriaId": "035D8460-BD6F-4696-9D7B-BA571A994FD0" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.6", + "matchCriteriaId": "9FB1D28B-EF0E-4CA0-90F7-073A85D001E5" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/16", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/18", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/19", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/20", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/21", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/22", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214117", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214118", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214119", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214120", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214122", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214124", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40775.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40775.json index 250d806de9e..7996ba40dad 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40775.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40775.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40775", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:11.317", - "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-20T15:17:36.110", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,122 @@ "value": " Se solucion\u00f3 un problema de degradaci\u00f3n con restricciones adicionales de firma de c\u00f3digo. Este problema se solucion\u00f3 en macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. Es posible que una aplicaci\u00f3n pueda filtrar informaci\u00f3n confidencial del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.7.6", + "matchCriteriaId": "3556C7C3-14B6-4846-B3E8-FE07A503155F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.6.8", + "matchCriteriaId": "7008225C-B5B9-4F87-9392-DD2080717E9A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.6", + "matchCriteriaId": "51E2E93B-C5A3-4C83-B806-2EC555AD45FE" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/18", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/19", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/20", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214118", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214119", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214120", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40776.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40776.json index 124b8ac1c90..43ed1dbfdba 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40776.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40776.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40776", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:11.387", - "lastModified": "2024-08-13T18:15:32.063", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-20T15:19:59.547", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,67 +15,289 @@ "value": "Se solucion\u00f3 un problema de use after free con una gesti\u00f3n de memoria mejorada. Este problema se solucion\u00f3 en iOS 16.7.9 y iPadOS 16.7.9, Safari 17.6, iOS 17.6 y iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. El procesamiento de contenido web creado con fines malintencionados puede provocar un fallo inesperado del proceso." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.9", + "matchCriteriaId": "1ACEA981-1D96-49F1-8048-74D21D71FD39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.6", + "matchCriteriaId": "34E8C966-19C7-4376-A0C3-A242720F62DF" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.9", + "matchCriteriaId": "29A9994D-AE71-45E0-8CC5-E6219420F7E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.6", + "matchCriteriaId": "B191C80F-3801-4AD0-9A63-EB294A029D7C" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.6", + "matchCriteriaId": "687902EF-637F-4537-B419-15A1695370B9" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.6", + "matchCriteriaId": "A7AF9041-5C4F-42CB-99E5-5276DB6AC07C" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndIncluding": "10.6", + "matchCriteriaId": "EAD3816E-78FB-420B-9D78-5EE610FFC1ED" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.6", + "matchCriteriaId": "9FB1D28B-EF0E-4CA0-90F7-073A85D001E5" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3", + "matchCriteriaId": "CDBCE187-329C-4B1C-89B7-7D45A7946AF4" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/15", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/16", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/17", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/18", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/21", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/22", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/23", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214116", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214117", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214119", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214121", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214122", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214123", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214124", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-409xx/CVE-2024-40902.json b/CVE-2024/CVE-2024-409xx/CVE-2024-40902.json index 0606899760d..8fcf8913ad4 100644 --- a/CVE-2024/CVE-2024-409xx/CVE-2024-40902.json +++ b/CVE-2024/CVE-2024-409xx/CVE-2024-40902.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40902", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-12T13:15:13.583", - "lastModified": "2024-07-24T18:52:23.540", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-20T14:35:26.807", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41697.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41697.json index 6bdeb31f0d3..4b4aef3097c 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41697.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41697.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41697", "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-08-20T12:15:05.313", - "lastModified": "2024-08-20T12:15:05.313", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41698.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41698.json index 64c66c3c1e1..dee22a0dd03 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41698.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41698.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41698", "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-08-20T12:15:06.007", - "lastModified": "2024-08-20T12:15:06.007", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41699.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41699.json index a936cfc2708..586d6d194b4 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41699.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41699.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41699", "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-08-20T12:15:06.650", - "lastModified": "2024-08-20T12:15:06.650", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41700.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41700.json index 1c1fe11f76b..f5a0b70feee 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41700.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41700.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41700", "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-08-20T12:15:07.143", - "lastModified": "2024-08-20T12:15:07.143", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42006.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42006.json new file mode 100644 index 00000000000..4ddaf807307 --- /dev/null +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42006.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42006", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T14:15:09.540", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Keyfactor AWS Orchestrator through 2.0 allows Information Disclosure." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://trust.keyfactor.com/?itemUid=d73921fd-bc9e-4e35-a974-cfb628e6a226&source=click", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-423xx/CVE-2024-42334.json b/CVE-2024/CVE-2024-423xx/CVE-2024-42334.json index c315bba5b09..ca2c370c83b 100644 --- a/CVE-2024/CVE-2024-423xx/CVE-2024-42334.json +++ b/CVE-2024/CVE-2024-423xx/CVE-2024-42334.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42334", "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-08-20T13:15:04.930", - "lastModified": "2024-08-20T13:15:04.930", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-423xx/CVE-2024-42335.json b/CVE-2024/CVE-2024-423xx/CVE-2024-42335.json index 3ae58ab5a8c..82e43c339ff 100644 --- a/CVE-2024/CVE-2024-423xx/CVE-2024-42335.json +++ b/CVE-2024/CVE-2024-423xx/CVE-2024-42335.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42335", "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-08-20T13:15:05.317", - "lastModified": "2024-08-20T13:15:05.317", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-423xx/CVE-2024-42336.json b/CVE-2024/CVE-2024-423xx/CVE-2024-42336.json index f6b536f5a2a..fcb61f1d2e4 100644 --- a/CVE-2024/CVE-2024-423xx/CVE-2024-42336.json +++ b/CVE-2024/CVE-2024-423xx/CVE-2024-42336.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42336", "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-08-20T13:15:05.617", - "lastModified": "2024-08-20T13:15:05.617", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-423xx/CVE-2024-42369.json b/CVE-2024/CVE-2024-423xx/CVE-2024-42369.json new file mode 100644 index 00000000000..10106a5ccd1 --- /dev/null +++ b/CVE-2024/CVE-2024-423xx/CVE-2024-42369.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-42369", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-20T15:15:21.540", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "matrix-js-sdk is a Matrix messaging protocol Client-Server SDK for JavaScript. A malicious homeserver can craft a room or room structure such that the predecessors form a cycle. The matrix-js-sdk's getRoomUpgradeHistory function will infinitely recurse in this case, causing the code to hang. This method is public but also called by the 'leaveRoomChain()' method, so leaving a room will also trigger the bug. This was patched in matrix-js-sdk 34.3.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-674" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/matrix-org/matrix-js-sdk/commit/a0efed8b881b3db6c9f2c71d6a6e74c2828978c6", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-vhr5-g3pm-49fm", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42552.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42552.json index a227875163d..437bd802108 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42552.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42552.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42552", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:05.933", - "lastModified": "2024-08-20T13:15:05.933", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42553.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42553.json index 0ea16b00dfa..86f9682a888 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42553.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42553.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42553", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:06.073", - "lastModified": "2024-08-20T13:15:06.073", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42554.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42554.json index 0c5c544b127..4cbc4e89176 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42554.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42554.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42554", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:06.190", - "lastModified": "2024-08-20T13:15:06.190", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "Hotel Management System commit 91caab8 was discovered to contain a SQL injection vulnerability via the room_type parameter at admin_room_added.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/topsky979/7d2ebfe6dfa87eecf8f3e6d4eefc48ba", diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42555.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42555.json index 4a64da8e573..af9560d9cf7 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42555.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42555.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42555", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:06.303", - "lastModified": "2024-08-20T13:15:06.303", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42556.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42556.json index cf099931d18..97737c98058 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42556.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42556.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42556", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:06.420", - "lastModified": "2024-08-20T13:15:06.420", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42557.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42557.json index e78a9ab1a06..b04a82e25c0 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42557.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42557.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42557", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:06.523", - "lastModified": "2024-08-20T13:15:06.523", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42558.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42558.json index 170b963dcfa..4ed56d706b2 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42558.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42558.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42558", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:06.623", - "lastModified": "2024-08-20T13:15:06.623", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42559.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42559.json index 6fc41c4316f..d845cc14033 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42559.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42559.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42559", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:06.730", - "lastModified": "2024-08-20T13:15:06.730", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42560.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42560.json index 8c8f73f7ff4..92ab2cbd3a0 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42560.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42560.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42560", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:06.830", - "lastModified": "2024-08-20T13:15:06.830", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42561.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42561.json index d18aa45b677..ec9b16c317f 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42561.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42561.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42561", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:06.920", - "lastModified": "2024-08-20T13:15:06.920", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "Pharmacy Management System commit a2efc8 was discovered to contain a SQL injection vulnerability via the invoice_number parameter at sales_report.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/topsky979/5d2d9104dc4dd7f5dda99cbbd615a0b8", diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42562.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42562.json index 8b5c072ae3e..7e877d9d580 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42562.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42562.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42562", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:07.020", - "lastModified": "2024-08-20T13:15:07.020", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42563.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42563.json index d0076d26f47..fac7e71d98f 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42563.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42563.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42563", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:07.123", - "lastModified": "2024-08-20T13:15:07.123", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42564.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42564.json index bf0beef19fe..e1d60c588b9 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42564.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42564.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42564", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:07.243", - "lastModified": "2024-08-20T13:15:07.243", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42565.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42565.json index d8667a02d01..fc42d061ded 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42565.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42565.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42565", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:07.347", - "lastModified": "2024-08-20T13:15:07.347", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42566.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42566.json index 1e04c6f4bfa..a76fb574b1c 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42566.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42566.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42566", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:07.443", - "lastModified": "2024-08-20T13:15:07.443", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42567.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42567.json index e43f0141405..1e333edb438 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42567.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42567.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42567", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:07.540", - "lastModified": "2024-08-20T13:15:07.540", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42568.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42568.json index bace16d659b..4d8e613c8ed 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42568.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42568.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42568", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:07.643", - "lastModified": "2024-08-20T13:15:07.643", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42569.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42569.json index 3818f746986..67ea137508c 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42569.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42569.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42569", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:07.733", - "lastModified": "2024-08-20T13:15:07.733", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42570.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42570.json index 46a1aed71b3..351badb75aa 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42570.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42570.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42570", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:07.830", - "lastModified": "2024-08-20T13:15:07.830", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42571.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42571.json index 31507565c69..370eb4e2fff 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42571.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42571.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42571", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:07.917", - "lastModified": "2024-08-20T13:15:07.917", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the medium parameter at insertattendance.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/topsky979/5c8e289fa66702fd3acbed558ee449dd", diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42572.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42572.json index e8ea17842f0..5224710b406 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42572.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42572.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42572", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:08.007", - "lastModified": "2024-08-20T13:15:08.007", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42573.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42573.json index 2c5b0fe2a11..ed734afc66b 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42573.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42573.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42573", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:08.097", - "lastModified": "2024-08-20T13:15:08.097", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42574.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42574.json index 8b1ca1e0e46..8b8868bbe12 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42574.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42574.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42574", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:08.193", - "lastModified": "2024-08-20T13:15:08.193", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42575.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42575.json index 973311a26e9..74de45e985a 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42575.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42575.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42575", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:08.283", - "lastModified": "2024-08-20T13:15:08.283", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42576.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42576.json index 35496f0c066..090144f2735 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42576.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42576.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42576", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:08.377", - "lastModified": "2024-08-20T13:15:08.377", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42577.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42577.json index 05abb3f28e8..ff5975b3f50 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42577.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42577.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42577", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:08.477", - "lastModified": "2024-08-20T13:15:08.477", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42578.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42578.json index f306bcda390..dd68af7ddb9 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42578.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42578.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42578", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:08.573", - "lastModified": "2024-08-20T13:15:08.573", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "A Cross-Site Request Forgery (CSRF) in the component edit_product.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/topsky979/5eacc7e418e3b73b7ad1fa05d1a72aeb", diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42579.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42579.json index 5357783bc1e..66e7c2675ca 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42579.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42579.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42579", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:08.687", - "lastModified": "2024-08-20T13:15:08.687", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42580.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42580.json index 18917938997..20959873b13 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42580.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42580.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42580", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:08.793", - "lastModified": "2024-08-20T13:15:08.793", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42581.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42581.json index 370d7ba29dc..ff561003394 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42581.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42581.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42581", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:08.890", - "lastModified": "2024-08-20T13:15:08.890", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42582.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42582.json index 3fb314877e2..59985cd69c2 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42582.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42582.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42582", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:08.987", - "lastModified": "2024-08-20T13:15:08.987", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42583.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42583.json index 70baf7a160b..64e01d90a62 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42583.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42583.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42583", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:09.077", - "lastModified": "2024-08-20T13:15:09.077", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42584.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42584.json index 93b3faccfa3..b0ddd05bc0b 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42584.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42584.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42584", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:09.173", - "lastModified": "2024-08-20T13:15:09.173", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42585.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42585.json index 6219bfbf58d..d0a5b78ae0a 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42585.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42585.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42585", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:09.273", - "lastModified": "2024-08-20T13:15:09.273", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42586.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42586.json index 3ae35293fe1..ba5e39a3992 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42586.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42586.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42586", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:09.367", - "lastModified": "2024-08-20T13:15:09.367", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42603.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42603.json new file mode 100644 index 00000000000..f493cfc38d7 --- /dev/null +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42603.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42603", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T15:15:21.857", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_backup.php?dobackup=clearall" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/jinwu1234567890/cms2/tree/main/10/readme.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42604.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42604.json new file mode 100644 index 00000000000..ebff8038591 --- /dev/null +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42604.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42604", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T15:15:21.940", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_group.php?mode=delete&group_id=3" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/jinwu1234567890/cms2/tree/main/1/readme.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42605.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42605.json new file mode 100644 index 00000000000..d4f20c21670 --- /dev/null +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42605.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42605", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T15:15:22.020", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/edit_page.php?link_id=1" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/jinwu1234567890/cms2/tree/main/3/readme.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42606.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42606.json new file mode 100644 index 00000000000..3c1764fcdd6 --- /dev/null +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42606.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42606", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T15:15:22.100", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_log.php?clear=1" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/jinwu1234567890/cms2/tree/main/6/readme.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42607.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42607.json new file mode 100644 index 00000000000..2901f2810f4 --- /dev/null +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42607.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42607", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T15:15:22.213", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_backup.php?dobackup=database" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/jinwu1234567890/cms2/tree/main/9/readme.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42608.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42608.json new file mode 100644 index 00000000000..8541928f79c --- /dev/null +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42608.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42608", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T14:15:09.697", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/submit_page.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/jinwu1234567890/cms2/tree/main/2/readme.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42609.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42609.json new file mode 100644 index 00000000000..fcc89154d8b --- /dev/null +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42609.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42609", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T15:15:22.357", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_backup.php?dobackup=avatars" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/jinwu1234567890/cms2/tree/main/8/readme.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42610.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42610.json new file mode 100644 index 00000000000..9591af7c7a8 --- /dev/null +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42610.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42610", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T15:15:22.437", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_backup.php?dobackup=files" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/jinwu1234567890/cms2/tree/main/7/readme.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42611.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42611.json new file mode 100644 index 00000000000..9e2ff365ca7 --- /dev/null +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42611.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42611", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T15:15:22.517", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) via admin/admin_page.php?link_id=1&mode=delete" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/jinwu1234567890/cms2/tree/main/4/readme.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42613.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42613.json new file mode 100644 index 00000000000..df24b2981ca --- /dev/null +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42613.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42613", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T15:15:22.600", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_widgets.php?action=install&widget=akismet" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/jinwu1234567890/cms2/tree/main/14/readme.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42616.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42616.json new file mode 100644 index 00000000000..c2b887191ce --- /dev/null +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42616.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42616", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T15:15:22.690", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_widgets.php?action=remove&widget=Statistics" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/jinwu1234567890/cms2/tree/main/13/readme.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42617.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42617.json new file mode 100644 index 00000000000..287fbc466fb --- /dev/null +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42617.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42617", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T15:15:22.777", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_config.php?action=save&var_id=32" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/jinwu1234567890/cms2/tree/main/11/readme.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42618.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42618.json new file mode 100644 index 00000000000..754b4eac26b --- /dev/null +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42618.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42618", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T15:15:22.853", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /module.php?module=karma" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/jinwu1234567890/cms2/tree/main/16/readme.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42621.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42621.json new file mode 100644 index 00000000000..31690b6e16e --- /dev/null +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42621.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42621", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T15:15:22.933", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_editor.php" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/jinwu1234567890/cms2/tree/main/12/readme.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42633.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42633.json index 67a53c507fc..dee4fb0ede4 100644 --- a/CVE-2024/CVE-2024-426xx/CVE-2024-42633.json +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42633.json @@ -2,16 +2,55 @@ "id": "CVE-2024-42633", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-19T16:15:08.740", - "lastModified": "2024-08-19T18:36:20.123", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-20T15:35:22.763", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Command Injection vulnerability exists in the do_upgrade_post function of the httpd binary in Linksys E1500 v1.0.06.001. As a result, an authenticated attacker can execute OS commands with root privileges." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos en la funci\u00f3n do_upgrade_post del binario httpd en Linksys E1500 v1.0.06.001. Como resultado, un atacante autenticado puede ejecutar comandos del sistema operativo con privilegios de root." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/goldds96/Report/blob/main/Linksys/E1500/CI.md", diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42657.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42657.json index 3d070505ca6..6d9631ade8d 100644 --- a/CVE-2024/CVE-2024-426xx/CVE-2024-42657.json +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42657.json @@ -2,16 +2,55 @@ "id": "CVE-2024-42657", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-19T17:15:07.967", - "lastModified": "2024-08-19T18:36:20.123", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-20T15:35:23.980", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0 allows a remote attacker to obtain sensitive information via the lack of encryption during login process" + }, + { + "lang": "es", + "value": "Un problema en el enrutador Wifi Wishnet Nepstech NTPL-XPON1GFEVN v1.0 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de la falta de cifrado durante el proceso de inicio de sesi\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/sudo-subho/CVE-2024-42657", diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42662.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42662.json new file mode 100644 index 00000000000..40c932a1d64 --- /dev/null +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42662.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-42662", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-20T15:15:23.090", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in apollocongif apollo v.2.2.0 allows a remote attacker to obtain sensitive information via a crafted request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/len0m0/f0886d579de6c075506ab543e054dc7d", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/len0m0/Apolloinfo/blob/main/README.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42757.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42757.json index 01c0afd5987..1ebdb14f37a 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42757.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42757.json @@ -2,7 +2,7 @@ "id": "CVE-2024-42757", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-15T19:15:19.977", - "lastModified": "2024-08-19T13:00:23.117", + "lastModified": "2024-08-20T15:35:25.190", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Vulnerabilidad de inyecci\u00f3n de comando en Asus RT-N15U 3.0.0.4.376_3754 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de la p\u00e1gina de funci\u00f3n netstat." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://github.com/Nop3z/CVE/blob/main/Asus/FW_RT_N15U_30043763754/FW_RT_N15U_30043763754%20RCE.md", diff --git a/CVE-2024/CVE-2024-428xx/CVE-2024-42812.json b/CVE-2024/CVE-2024-428xx/CVE-2024-42812.json index efc0d86810c..d01c4d5c2b5 100644 --- a/CVE-2024/CVE-2024-428xx/CVE-2024-42812.json +++ b/CVE-2024/CVE-2024-428xx/CVE-2024-42812.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42812", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-19T20:15:07.070", - "lastModified": "2024-08-19T20:15:07.070", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In D-Link DIR-860L v2.03, there is a buffer overflow vulnerability due to the lack of length verification for the SID field in gena.cgi. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands." + }, + { + "lang": "es", + "value": "En D-Link DIR-860L v2.03, existe una vulnerabilidad de desbordamiento del b\u00fafer debido a la falta de verificaci\u00f3n de longitud para el campo SID en gena.cgi. Los atacantes que explotan con \u00e9xito esta vulnerabilidad pueden provocar que el dispositivo de destino remoto falle o ejecute comandos arbitrarios." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-428xx/CVE-2024-42813.json b/CVE-2024/CVE-2024-428xx/CVE-2024-42813.json index a29efb422c1..0ca502f4638 100644 --- a/CVE-2024/CVE-2024-428xx/CVE-2024-42813.json +++ b/CVE-2024/CVE-2024-428xx/CVE-2024-42813.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42813", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-19T20:15:07.147", - "lastModified": "2024-08-19T21:35:07.210", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In TRENDnet TEW-752DRU FW1.03B01, there is a buffer overflow vulnerability due to the lack of length verification for the service field in gena.cgi. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands." + }, + { + "lang": "es", + "value": "En TRENDnet TEW-752DRU FW1.03B01, existe una vulnerabilidad de desbordamiento del b\u00fafer debido a la falta de verificaci\u00f3n de longitud para el campo de servicio en gena.cgi. Los atacantes que explotan con \u00e9xito esta vulnerabilidad pueden provocar que el dispositivo de destino remoto falle o ejecute comandos arbitrarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-428xx/CVE-2024-42815.json b/CVE-2024/CVE-2024-428xx/CVE-2024-42815.json index a169728f0c3..633a414bf15 100644 --- a/CVE-2024/CVE-2024-428xx/CVE-2024-42815.json +++ b/CVE-2024/CVE-2024-428xx/CVE-2024-42815.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42815", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-19T20:15:07.193", - "lastModified": "2024-08-19T20:15:07.193", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the TP-Link RE365 V1_180213, there is a buffer overflow vulnerability due to the lack of length verification for the USER_AGENT field in /usr/bin/httpd. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands." + }, + { + "lang": "es", + "value": "En TP-Link RE365 V1_180213, existe una vulnerabilidad de desbordamiento del b\u00fafer debido a la falta de verificaci\u00f3n de longitud para el campo USER_AGENT en /usr/bin/httpd. Los atacantes que explotan con \u00e9xito esta vulnerabilidad pueden provocar que el dispositivo de destino remoto falle o ejecute comandos arbitrarios." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43202.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43202.json index c423ebe2108..6a727af808d 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43202.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43202.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43202", "sourceIdentifier": "security@apache.org", "published": "2024-08-20T08:15:05.240", - "lastModified": "2024-08-20T08:15:05.240", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,30 @@ "value": "Exposici\u00f3n de la ejecuci\u00f3n remota de c\u00f3digo en Apache Dolphinscheduler. Este problema afecta a Apache DolphinScheduler: versiones anteriores a 3.2.2. Recomendamos a los usuarios que actualicen Apache DolphinScheduler a la versi\u00f3n 3.2.2, que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43311.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43311.json index f4644689cf0..e281c4d114c 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43311.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43311.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43311", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-19T20:15:07.283", - "lastModified": "2024-08-19T20:15:07.283", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Privilege Management vulnerability in Geek Code Lab Login As Users allows Privilege Escalation.This issue affects Login As Users: from n/a through 1.4.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de gesti\u00f3n de privilegios inadecuada en Geek Code Lab Login As Users permite la escalada de privilegios. Este problema afecta a Login As Users: desde n/a hasta 1.4.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43317.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43317.json index e50c5e2c834..0b3d39f45b3 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43317.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43317.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43317", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-19T20:15:07.480", - "lastModified": "2024-08-19T20:15:07.480", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Metagauss User Registration Team RegistrationMagic allows Cross-Site Scripting (XSS).This issue affects RegistrationMagic: from n/a through 6.0.1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Metagauss User Registration Team RegistrationMagic permite Cross-Site Scripting (XSS). Este problema afecta a RegistrationMagic: desde n/a hasta 6.0.1.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43326.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43326.json index f5a984613fa..50cd5d59afe 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43326.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43326.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43326", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-19T20:15:07.667", - "lastModified": "2024-08-19T20:15:07.667", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Jamie Bergen Plugin Notes Plus allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Plugin Notes Plus: from n/a through 1.2.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Jamie Bergen Plugin Notes Plus permite acceder a la funcionalidad no restringida adecuadamente por las ACL. Este problema afecta a Plugin Notes Plus: desde n/a hasta 1.2.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43328.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43328.json index 9231e6da109..f1aa7dfa752 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43328.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43328.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43328", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-19T20:15:07.853", - "lastModified": "2024-08-19T20:15:07.853", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in WPDeveloper EmbedPress allows PHP Local File Inclusion.This issue affects EmbedPress: from n/a through 4.0.9." + }, + { + "lang": "es", + "value": "La limitaci\u00f3n inadecuada de un nombre de ruta a una vulnerabilidad de directorio restringido (\"Path Traversal\") en WPDeveloper EmbedPress permite la inclusi\u00f3n de archivos locales PHP. Este problema afecta a EmbedPress: desde n/a hasta 4.0.9." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43345.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43345.json index 051505f32b5..a9fee6befa1 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43345.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43345.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43345", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-19T20:15:08.047", - "lastModified": "2024-08-19T20:15:08.047", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in PluginOps Landing Page Builder allows PHP Local File Inclusion.This issue affects Landing Page Builder: from n/a through 1.5.2.0." + }, + { + "lang": "es", + "value": "La limitaci\u00f3n inadecuada de un nombre de ruta a una vulnerabilidad de directorio restringido (\"Path Traversal\") en PluginOps Landing Page Builder permite la inclusi\u00f3n de archivos locales PHP. Este problema afecta al Landing Page Builder: desde n/a hasta 1.5.2.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43354.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43354.json index 683b955ab3b..a4b3dff49f1 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43354.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43354.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43354", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-19T20:15:08.233", - "lastModified": "2024-08-19T20:15:08.233", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in myCred allows Object Injection.This issue affects myCred: from n/a through 2.7.2." + }, + { + "lang": "es", + "value": "La deserializaci\u00f3n de la vulnerabilidad de datos no confiables en myCred permite la inyecci\u00f3n de objetos. Este problema afecta a myCred: desde n/a hasta 2.7.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43376.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43376.json new file mode 100644 index 00000000000..d93a109d833 --- /dev/null +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43376.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-43376", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-20T15:15:23.277", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Umbraco is an ASP.NET CMS. Some endpoints in the Management API can return stack trace information, even when Umbraco is not in debug mode. This vulnerability is fixed in 14.1.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-209" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/umbraco/Umbraco-CMS/commit/b76070c794925932cb159ef50b851db6e966a004", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-77gj-crhp-3gvx", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43377.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43377.json new file mode 100644 index 00000000000..68cd966ccb2 --- /dev/null +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43377.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-43377", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-20T15:15:23.490", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Umbraco CMS is an ASP.NET CMS. An authenticated user can access a few unintended endpoints. This issue is fixed in 14.1.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/umbraco/Umbraco-CMS/commit/72bef8861d94a39d5cc9530a04c4797b91fcbecf", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-hrww-x3fq-xcvh", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43397.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43397.json new file mode 100644 index 00000000000..8b99f022552 --- /dev/null +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43397.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-43397", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-20T15:15:23.673", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Apollo is a configuration management system. A vulnerability exists in the synchronization configuration feature that allows users to craft specific requests to bypass permission checks. This exploit enables them to modify a namespace without the necessary permissions. The issue was addressed with an input parameter check which was released in version 2.3.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/apolloconfig/apollo/commit/f55b419145bf9d4f2f51dd4cd45108229e8d97ed", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/apolloconfig/apollo/pull/5192", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/apolloconfig/apollo/releases/tag/v2.3.0", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/apolloconfig/apollo/security/advisories/GHSA-c6c3-h4f7-3962", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43404.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43404.json new file mode 100644 index 00000000000..e4e31fc9e6a --- /dev/null +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43404.json @@ -0,0 +1,72 @@ +{ + "id": "CVE-2024-43404", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-20T15:15:23.867", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "MEGABOT is a fully customized Discord bot for learning and fun. The `/math` command and functionality of MEGABOT versions < 1.5.0 contains a remote code execution vulnerability due to a Python `eval()`. The vulnerability allows an attacker to inject Python code into the `expression` parameter when using `/math` in any Discord channel. This vulnerability impacts any discord guild utilizing MEGABOT. This vulnerability was fixed in release version 1.5.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-95" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/NicPWNs/MEGABOT/commit/71e79e5581ea36313700385b112d863053fb7ed6", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/NicPWNs/MEGABOT/issues/137", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/NicPWNs/MEGABOT/pull/138", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/NicPWNs/MEGABOT/releases/tag/v1.5.0", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/NicPWNs/MEGABOT/security/advisories/GHSA-vhxp-4hwq-w3p2", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43406.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43406.json new file mode 100644 index 00000000000..71790d02d25 --- /dev/null +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43406.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-43406", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-20T15:15:24.070", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "LF Edge eKuiper is a lightweight IoT data analytics and stream processing engine running on resource-constraint edge devices. A user could utilize and exploit SQL Injection to allow the execution of malicious SQL query via Get method in sqlKvStore. This vulnerability is fixed in 1.14.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/lf-edge/ekuiper/commit/1a9c745649438feaac357d282959687012b65503", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/lf-edge/ekuiper/security/advisories/GHSA-r5ph-4jxm-6j9p", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43409.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43409.json new file mode 100644 index 00000000000..8153a3bca2c --- /dev/null +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43409.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-43409", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-20T15:15:24.270", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Ghost is a Node.js content management system. Improper authentication on some endpoints used for member actions would allow an attacker to perform member-only actions, and read member information. This security vulnerability is present in Ghost v4.46.0-v5.89.4. v5.89.5 contains a fix for this issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/TryGhost/Ghost/commit/dac25612520b571f58679764ecc27109e641d1db", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/TryGhost/Ghost/security/advisories/GHSA-78x2-cwp9-5j42", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43688.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43688.json index 0a61905f69b..fef487e0a59 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43688.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43688.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43688", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T06:15:04.983", - "lastModified": "2024-08-20T06:15:04.983", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "cron/entry.c in vixie cron before 9cc8ab1, as used in OpenBSD 7.4 and 7.5, allows a heap-based buffer underflow and memory corruption. NOTE: this issue was introduced during a May 2023 refactoring." + }, + { + "lang": "es", + "value": "cron/entry.c en vixie cron anterior a 9cc8ab1, como se usa en OpenBSD 7.4 y 7.5, permite un desbordamiento del b\u00fafer basado en mont\u00f3n y corrupci\u00f3n de memoria. NOTA: este problema se introdujo durante una refactorizaci\u00f3n de mayo de 2023." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4785.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4785.json index 21200f4886d..f346f607213 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4785.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4785.json @@ -2,13 +2,17 @@ "id": "CVE-2024-4785", "sourceIdentifier": "vulnerabilities@zephyrproject.org", "published": "2024-08-19T22:15:05.893", - "lastModified": "2024-08-19T22:15:05.893", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "BT: Missing Check in LL_CONNECTION_UPDATE_IND Packet Leads to Division by Zero" + }, + { + "lang": "es", + "value": "BT: la comprobaci\u00f3n faltante en el paquete LL_CONNECTION_UPDATE_IND conduce a la divisi\u00f3n por cero" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5062.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5062.json index f44ca2740e2..7933fba527b 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5062.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5062.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5062", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-30T16:15:03.217", - "lastModified": "2024-07-01T12:37:24.220", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-20T14:14:35.717", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -51,14 +73,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zenml:zenml:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.58.0", + "matchCriteriaId": "C38B4091-A6B6-4996-BAE6-C670ED09D268" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/zenml-io/zenml/commit/21edd863c0ba53c1110b6f018a07c2d6853cf6d4", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/ceddd3c1-a9da-4d6c-85c4-41d4d1e1102f", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5576.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5576.json index 8a2cf7613e3..569eb76eb4f 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5576.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5576.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5576", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-20T06:15:05.153", - "lastModified": "2024-08-20T06:15:05.153", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Tutor LMS Elementor Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'course_carousel_skin' attribute within the plugin's Course Carousel widget in all versions up to, and including, 2.1.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Tutor LMS Elementor Addons para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del atributo 'course_carousel_skin' dentro del widget Course Carousel del complemento en todas las versiones hasta la 2.1.4 incluida debido a una desinfecci\u00f3n de entrada y un escape de salida insuficiente en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5763.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5763.json index 3f3d21d042d..1feb99ec055 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5763.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5763.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5763", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-20T04:15:08.590", - "lastModified": "2024-08-20T04:15:08.590", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The The Plus Addons for Elementor \u2013 Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the video_date attribute within the plugin's Video widget in all versions up to, and including, 5.6.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "Los complementos The Plus Addons for Elementor \u2013 Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce para WordPress son vulnerables a Cross-Site Scripting Almacenado a trav\u00e9s del atributo video_date dentro del widget de video del complemento en todas las versiones hasta la 5.6.2 incluida debido a una desinfecci\u00f3n insuficiente de los insumos y al escape de los productos. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5932.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5932.json index 5664112ea2a..feb0c400045 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5932.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5932.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5932", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-20T02:15:04.240", - "lastModified": "2024-08-20T02:15:04.240", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The GiveWP \u2013 Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.14.1 via deserialization of untrusted input from the 'give_title' parameter. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to execute code remotely, and to delete arbitrary files." + }, + { + "lang": "es", + "value": "El complemento GiveWP \u2013 Donation Plugin and Fundraising Platform para WordPress es vulnerable a la inyecci\u00f3n de objetos PHP en todas las versiones hasta la 3.14.1 incluida a trav\u00e9s de la deserializaci\u00f3n de entradas no confiables del par\u00e1metro 'give_title'. Esto hace posible que atacantes no autenticados inyecten un objeto PHP. La presencia adicional de una cadena POP permite a los atacantes ejecutar c\u00f3digo de forma remota y eliminar archivos arbitrarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5939.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5939.json index 63a14708d28..3a206e4f8ad 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5939.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5939.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5939", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-20T02:15:04.590", - "lastModified": "2024-08-20T02:15:04.590", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The GiveWP \u2013 Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'setup_wizard' function in all versions up to, and including, 3.13.0. This makes it possible for unauthenticated attackers to read the setup wizard administrative pages." + }, + { + "lang": "es", + "value": "El complemento GiveWP \u2013 Donation Plugin and Fundraising Platform para WordPress es vulnerable al acceso no autorizado a los datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n 'setup_wizard' en todas las versiones hasta la 3.13.0 incluida. Esto hace posible que atacantes no autenticados lean las p\u00e1ginas administrativas del asistente de configuraci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5940.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5940.json index 02271e3b39f..980e852f9be 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5940.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5940.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5940", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-20T02:15:04.793", - "lastModified": "2024-08-20T02:15:04.793", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The GiveWP \u2013 Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'handle_request' function in all versions up to, and including, 3.13.0. This makes it possible for unauthenticated attackers to edit event ticket settings if the Events beta feature is enabled." + }, + { + "lang": "es", + "value": "El complemento GiveWP \u2013 Donation Plugin and Fundraising Platform para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n 'handle_request' en todas las versiones hasta la 3.13.0 incluida. Esto hace posible que atacantes no autenticados editen la configuraci\u00f3n de entradas de eventos si la funci\u00f3n beta de Eventos est\u00e1 habilitada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5941.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5941.json index 8fe99f5e364..13ac416d30b 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5941.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5941.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5941", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-20T02:15:05.017", - "lastModified": "2024-08-20T02:15:05.017", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The GiveWP \u2013 Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to unauthorized access and deletion of data due to a missing capability check on the 'handle_request' function in all versions up to, and including, 3.14.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read attachment paths and delete attachment files." + }, + { + "lang": "es", + "value": "El complemento GiveWP \u2013 Donation Plugin and Fundraising Platform para WordPress es vulnerable al acceso no autorizado y a la eliminaci\u00f3n de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n 'handle_request' en todas las versiones hasta la 3.14.1 incluida. Esto hace posible que los atacantes autenticados, con acceso de nivel de suscriptor y superior, lean las rutas de los archivos adjuntos y los eliminen." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6377.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6377.json new file mode 100644 index 00000000000..3c32b5d860b --- /dev/null +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6377.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-6377", + "sourceIdentifier": "3DS.Information-Security@3ds.com", + "published": "2024-08-20T14:15:09.917", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A reflected Cross-site Scripting (XSS) vulnerability affecting 3DSwymer from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x allows an attacker to execute arbitrary script code in user's browser session." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3DS.Information-Security@3ds.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "3DS.Information-Security@3ds.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.3ds.com/vulnerability/advisories", + "source": "3DS.Information-Security@3ds.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6378.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6378.json new file mode 100644 index 00000000000..bbe460385b7 --- /dev/null +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6378.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-6378", + "sourceIdentifier": "3DS.Information-Security@3ds.com", + "published": "2024-08-20T14:15:10.127", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A reflected Cross-site Scripting (XSS) vulnerability affecting ENOVIA Collaborative Industry Innovator from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x allows an attacker to execute arbitrary script code in user's browser session." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3DS.Information-Security@3ds.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "3DS.Information-Security@3ds.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.3ds.com/vulnerability/advisories", + "source": "3DS.Information-Security@3ds.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6379.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6379.json new file mode 100644 index 00000000000..43126aed392 --- /dev/null +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6379.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-6379", + "sourceIdentifier": "3DS.Information-Security@3ds.com", + "published": "2024-08-20T14:15:10.323", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An URL redirection to untrusted site (open redirect) vulnerability affecting 3DPassport in 3DSwymer from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x allows an attacker to redirect users to an arbitrary website via a crafted URL." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3DS.Information-Security@3ds.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "3DS.Information-Security@3ds.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "references": [ + { + "url": "https://www.3ds.com/vulnerability/advisories", + "source": "3DS.Information-Security@3ds.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6405.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6405.json index c9186f6d375..142ba2f1774 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6405.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6405.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6405", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-29T02:15:02.223", - "lastModified": "2024-07-01T12:37:24.220", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-20T14:00:07.663", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", @@ -39,14 +59,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:varniinfotech:floating_social_buttons:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.5", + "matchCriteriaId": "89873003-9A4B-47FF-A8AA-9ADD7245D501" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/floating-social-buttons/trunk/floating-social-buttons.php#L230", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/befe5e99-204e-470e-bbbb-285b5ba0b1fb?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6575.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6575.json index 4657c0e7f4e..90d70740f9f 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6575.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6575.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6575", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-20T04:15:08.987", - "lastModified": "2024-08-20T04:15:08.987", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The The Plus Addons for Elementor \u2013 Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018res_width_value\u2019 parameter within the plugin's tp_page_scroll widget in all versions up to, and including, 5.6.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "Los complementos The Plus Addons for Elementor \u2013 Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce para WordPress son vulnerables a cross site scripting almacenado a trav\u00e9s del par\u00e1metro 'res_width_value' dentro del widget tp_page_scroll del complemento en todas las versiones hasta, e incluyendo, 5.6.2 debido a una desinfecci\u00f3n insuficiente de los insumos y escapes de los productos. Esto hace posible que atacantes autenticados, con acceso de nivel de Colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6578.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6578.json index 6edbe01d79e..d1b90345bed 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6578.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6578.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6578", "sourceIdentifier": "security@huntr.dev", "published": "2024-07-29T19:15:13.170", - "lastModified": "2024-07-30T13:33:30.653", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-20T14:51:08.483", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -51,10 +73,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:aimstack:aim:3.19.3:*:*:*:*:*:*:*", + "matchCriteriaId": "3385F0DE-BFDD-45D6-A0DF-3175FF3A4805" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/5b1ebc67-5346-44aa-b8b8-3c1c09d79680", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6847.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6847.json index c15aaf459d7..ec5e668d183 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6847.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6847.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6847", "sourceIdentifier": "contact@wpscan.com", "published": "2024-08-20T06:15:05.470", - "lastModified": "2024-08-20T06:15:05.470", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Chatbot with ChatGPT WordPress plugin before 2.4.5 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by unauthenticated users when submitting messages to the chatbot." + }, + { + "lang": "es", + "value": "El complemento Chatbot with ChatGPT de WordPress anterior a 2.4.5 no desinfecta ni escapa adecuadamente un par\u00e1metro antes de usarlo en una declaraci\u00f3n SQL, lo que genera una inyecci\u00f3n de SQL explotable por usuarios no autenticados al enviar mensajes al chatbot." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6864.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6864.json index 47803bf5bfd..60fd29fe665 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6864.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6864.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6864", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-20T05:15:12.137", - "lastModified": "2024-08-20T05:15:12.137", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Last Modified Info plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018template\u2019 attribute of the lmt-post-modified-info shortcode in all versions up to, and including, 1.9.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento WP Last Modified Info para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del atributo 'template' del shortcode lmt-post-modified-info en todas las versiones hasta la 1.9.0 inclusive debido a una desinfecci\u00f3n de entrada y un escape de salida insuficiente. Esto hace posible que atacantes autenticados, con acceso de nivel de Colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-69xx/CVE-2024-6918.json b/CVE-2024/CVE-2024-69xx/CVE-2024-6918.json index a37ed23b14b..96d7017b801 100644 --- a/CVE-2024/CVE-2024-69xx/CVE-2024-6918.json +++ b/CVE-2024/CVE-2024-69xx/CVE-2024-6918.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6918", "sourceIdentifier": "cybersecurity@se.com", "published": "2024-08-20T13:15:09.450", - "lastModified": "2024-08-20T13:15:09.450", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7054.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7054.json index db1b07019ae..a0cac1a1182 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7054.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7054.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7054", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-20T11:15:03.540", - "lastModified": "2024-08-20T11:15:03.540", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Popup Maker \u2013 Boost Sales, Conversions, Optins, Subscribers with the Ultimate WP Popups Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018close_text\u2019 parameter in all versions up to, and including, 1.19.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Popup Maker \u2013 Boost Sales, Conversions, Optins, Subscribers with the Ultimate WP Popups Builder para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro \u2018close_text\u2019 en todas las versiones hasta la 1.19.0 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7248.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7248.json index 0070046ee0a..0e5c9ee6ef7 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7248.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7248.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7248", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-07-29T22:15:05.553", - "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-20T14:56:01.897", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -40,6 +62,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, { "source": "zdi-disclosures@trendmicro.com", "type": "Secondary", @@ -51,10 +83,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:comodo:internet_security:12.2.4.8032:*:*:*:pro:*:*:*", + "matchCriteriaId": "AB11501D-6C2C-481C-BD79-E902E8BB88FE" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-953/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7249.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7249.json index f87a6e8b4bd..c335b6e1700 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7249.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7249.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7249", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-07-29T22:15:05.817", - "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-20T14:58:15.320", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -40,6 +62,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + }, { "source": "zdi-disclosures@trendmicro.com", "type": "Secondary", @@ -51,10 +83,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:comodo:firewall:12.2.2.8012:*:*:*:*:*:*:*", + "matchCriteriaId": "B7029415-DB3E-4754-973A-516F13EC14C5" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-954/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7250.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7250.json index 4124613b057..f17c0c530ca 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7250.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7250.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7250", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-07-29T22:15:06.100", - "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-20T14:58:56.213", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -40,6 +62,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + }, { "source": "zdi-disclosures@trendmicro.com", "type": "Secondary", @@ -51,10 +83,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:comodo:internet_security:12.2.4.8032:*:*:*:pro:*:*:*", + "matchCriteriaId": "AB11501D-6C2C-481C-BD79-E902E8BB88FE" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-955/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7251.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7251.json index fe8da9ebff7..633381f5a99 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7251.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7251.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7251", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-07-29T22:15:06.283", - "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-20T15:00:02.603", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -40,6 +62,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + }, { "source": "zdi-disclosures@trendmicro.com", "type": "Secondary", @@ -51,10 +83,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:comodo:internet_security:12.2.4.8032:*:*:*:pro:*:*:*", + "matchCriteriaId": "AB11501D-6C2C-481C-BD79-E902E8BB88FE" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-956/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7252.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7252.json index 3dc8a5f9f59..722e6f2388c 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7252.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7252.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7252", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-07-29T22:15:06.497", - "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-20T15:00:39.470", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -40,6 +62,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + }, { "source": "zdi-disclosures@trendmicro.com", "type": "Secondary", @@ -51,10 +83,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:comodo:internet_security:12.2.4.8032:*:*:*:pro:*:*:*", + "matchCriteriaId": "AB11501D-6C2C-481C-BD79-E902E8BB88FE" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-957/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7305.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7305.json index f99827a09f3..b6993f0b1d1 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7305.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7305.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7305", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-08-20T00:15:04.003", - "lastModified": "2024-08-20T00:15:04.003", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted DWF file, when parsed in AdDwfPdk.dll through Autodesk AutoCAD, can force an Out-of-Bounds Write. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process." + }, + { + "lang": "es", + "value": "Un archivo DWF creado con fines malintencionados, cuando se analiza en AdDwfPdk.dll a trav\u00e9s de Autodesk AutoCAD, puede forzar una escritura fuera de los l\u00edmites. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, leer datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7453.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7453.json index 12da0a01608..c8df50fcf13 100644 --- a/CVE-2024/CVE-2024-74xx/CVE-2024-7453.json +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7453.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7453", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-04T05:16:09.523", - "lastModified": "2024-08-05T12:41:45.957", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-20T15:50:32.013", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fastadmin:fastadmin:1.5.0.20240328:*:*:*:*:*:*:*", + "matchCriteriaId": "C48F655F-EFFC-4DAE-88D9-BEABE6CD3EF7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Hebing123/cve/issues/65", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/Hebing123/cve/issues/66", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.273544", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.273544", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.384320", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7686.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7686.json index 1720405778f..0f6daff6568 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7686.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7686.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7686", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-12T13:38:57.730", - "lastModified": "2024-08-12T13:41:36.517", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-20T14:03:12.533", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -109,6 +129,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +150,51 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:advocate_office_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D969EB85-DD8C-48DD-9D1F-58755EB5343A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/samwbs/kortexcve/blob/main/xss_register_case/XSS_register_case.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.274143", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.274143", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.389165", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7702.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7702.json index 9f2623a0173..ede5df7f2c0 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7702.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7702.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7702", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-20T04:15:09.540", - "lastModified": "2024-08-20T04:15:09.540", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to generic SQL Injection via the entryID parameter in versions 2.0 to 2.13.9 due to insufficient escaping on the user-supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries to already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder para WordPress es vulnerable a la inyecci\u00f3n SQL gen\u00e9rica a trav\u00e9s del par\u00e1metro EntryID en las versiones 2.0 a 2.13.9 debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que atacantes autenticados, con acceso de nivel de administrador y superior, agreguen consultas SQL adicionales a consultas ya existentes que pueden usarse para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7775.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7775.json index 3c308d2b28b..591cf5d78de 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7775.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7775.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7775", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-20T04:15:10.033", - "lastModified": "2024-08-20T04:15:10.033", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to arbitrary JavaScript file uploads due to missing input validation in the addCustomCode function in versions 2.0 to 2.13.9. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary JavaScript files to the affected site's server." + }, + { + "lang": "es", + "value": "El complemento Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder para WordPress es vulnerable a cargas arbitrarias de archivos JavaScript debido a la falta de validaci\u00f3n de entrada en la funci\u00f3n addCustomCode en las versiones 2.0 a 2.13.9. Esto hace posible que atacantes autenticados, con acceso de nivel de administrador y superior, carguen archivos JavaScript arbitrarios en el servidor del sitio afectado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7777.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7777.json index beb5c6d86e4..940c1909add 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7777.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7777.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7777", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-20T04:15:10.363", - "lastModified": "2024-08-20T04:15:10.363", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to arbitrary file read and deletion due to insufficient file path validation in multiple functions in versions 2.0 to 2.13.9. This makes it possible for authenticated attackers, with Administrator-level access and above, to read and delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php)." + }, + { + "lang": "es", + "value": "El complemento Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder para WordPress es vulnerable a la lectura y eliminaci\u00f3n arbitraria de archivos debido a una validaci\u00f3n insuficiente de la ruta del archivo en m\u00faltiples funciones en las versiones 2.0 a 2.13.9. Esto hace posible que atacantes autenticados, con acceso de nivel de administrador y superior, lean y eliminen archivos arbitrarios en el servidor, lo que puede conducir f\u00e1cilmente a la ejecuci\u00f3n remota de c\u00f3digo cuando se elimina el archivo correcto (como wp-config.php)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7780.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7780.json index 946871f9c39..3a8b76e3282 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7780.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7780.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7780", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-20T04:15:10.737", - "lastModified": "2024-08-20T04:15:10.737", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to generic SQL Injection via the id parameter in versions 2.0 to 2.13.9 due to insufficient escaping on the user-supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder para WordPress es vulnerable a la inyecci\u00f3n SQL gen\u00e9rica a trav\u00e9s del par\u00e1metro id en las versiones 2.0 a 2.13.9 debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que atacantes autenticados, con acceso de nivel de administrador y superior, agreguen consultas SQL adicionales a consultas ya existentes que pueden usarse para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7782.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7782.json index 641a98278f7..6b6dd334292 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7782.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7782.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7782", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-20T04:15:11.203", - "lastModified": "2024-08-20T04:15:11.203", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the iconRemove function in versions 2.0 to 2.13.4. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php)." + }, + { + "lang": "es", + "value": "El complemento Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder para WordPress es vulnerable a la eliminaci\u00f3n arbitraria de archivos debido a una validaci\u00f3n insuficiente de la ruta del archivo en la funci\u00f3n iconRemove en las versiones 2.0 a 2.13.4. Esto hace posible que atacantes autenticados, con acceso de nivel de administrador y superior, eliminen archivos arbitrarios en el servidor, lo que puede conducir f\u00e1cilmente a la ejecuci\u00f3n remota de c\u00f3digo cuando se elimina el archivo correcto (como wp-config.php)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7827.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7827.json index f289d2732fc..ccdf9446809 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7827.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7827.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7827", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-20T02:15:05.220", - "lastModified": "2024-08-20T02:15:05.220", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Shopping Cart & eCommerce Store plugin for WordPress is vulnerable to boolean-based SQL Injection via the \u2018model_number\u2019 parameter in all versions up to, and including, 5.7.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Shopping Cart & eCommerce Store para WordPress es vulnerable a la inyecci\u00f3n SQL basada en booleanos a trav\u00e9s del par\u00e1metro 'model_number' en todas las versiones hasta la 5.7.2 incluida debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que los atacantes autenticados, con acceso de nivel de colaborador y superior, agreguen consultas SQL adicionales a consultas ya existentes que pueden usarse para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7850.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7850.json index 80504fc3aab..212c19eb99b 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7850.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7850.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7850", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-20T02:15:05.410", - "lastModified": "2024-08-20T02:15:05.410", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The BP Profile Search plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.7.5. This is due to missing or incorrect nonce validation on the bps_ajax_field_selector(), bps_ajax_template_options(), and bps_ajax_field_row() functions. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento BP Profile Search para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 5.7.5 incluida. Esto se debe a una validaci\u00f3n nonce faltante o incorrecta en las funciones bps_ajax_field_selector(), bps_ajax_template_options() y bps_ajax_field_row(). Esto hace posible que atacantes no autenticados inyecten scripts web maliciosos a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7926.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7926.json index f646f637e86..3e16a354911 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7926.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7926.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7926", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-19T20:15:08.447", - "lastModified": "2024-08-19T20:15:08.447", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in ZZCMS 2023. Affected is an unknown function of the file /admin/about_edit.php?action=modify. The manipulation of the argument skin leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en ZZCMS 2023 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo /admin/about_edit.php?action=modify es afectada por esta vulnerabilidad. La manipulaci\u00f3n del aspecto del argumento conduce al path traversal. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7927.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7927.json index 4b6023a1a33..9857b373342 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7927.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7927.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7927", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-19T20:15:08.680", - "lastModified": "2024-08-19T20:15:08.680", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in ZZCMS 2023. Affected by this vulnerability is an unknown functionality of the file /admin/class.php?dowhat=modifyclass. The manipulation of the argument skin[] leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en ZZCMS 2023 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo /admin/class.php?dowhat=modifyclass es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento skin[] conduce a un path traversal. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7928.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7928.json index 2f4cd0226d7..68f1776ad4b 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7928.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7928.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7928", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-19T22:15:06.203", - "lastModified": "2024-08-19T22:15:06.203", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in FastAdmin up to 1.3.3.20220121. Affected by this issue is some unknown functionality of the file /index/ajax/lang. The manipulation of the argument lang leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.4.20220530 is able to address this issue. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en FastAdmin hasta 1.3.3.20220121 y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo /index/ajax/lang es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento lang conduce al path traversal. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. La actualizaci\u00f3n a la versi\u00f3n 1.3.4.20220530 puede solucionar este problema. Se recomienda actualizar el componente afectado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7929.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7929.json index b694af80eda..3136222c509 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7929.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7929.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7929", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-19T22:15:06.470", - "lastModified": "2024-08-19T22:15:06.470", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in SourceCodester Simple Forum Website 1.0. This affects an unknown part of the file /registration.php of the component Signup Page. The manipulation of the argument username leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en SourceCodester Simple Forum Website 1.0 y clasificada como problem\u00e1tica. Una parte desconocida del archivo /registration.php del componente Signup Page afecta a una parte desconocida. La manipulaci\u00f3n del argumento nombre de usuario conduce a cross site scripting. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7930.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7930.json index cddd6e33865..4a53ed4cabb 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7930.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7930.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7930", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-19T22:15:06.720", - "lastModified": "2024-08-19T22:15:06.720", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in SourceCodester Clinics Patient Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /pms/ajax/get_packings.php. The manipulation of the argument medicine_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en SourceCodester Clinics Patient Management System 1.0 y clasificada como cr\u00edtica. Esta vulnerabilidad afecta a c\u00f3digo desconocido del archivo /pms/ajax/get_packings.php. La manipulaci\u00f3n del argumento medicine_id conduce a la inyecci\u00f3n SQL. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7931.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7931.json index 98141bcf326..16f85caf68d 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7931.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7931.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7931", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-19T22:15:06.980", - "lastModified": "2024-08-19T22:15:06.980", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Online Graduate Tracer System 1.0 and classified as critical. This issue affects some unknown processing of the file /tracking/admin/view_csprofile.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en SourceCodester Online Graduate Tracer System 1.0 y clasificada como cr\u00edtica. Este problema afecta un procesamiento desconocido del archivo /tracking/admin/view_csprofile.php. La manipulaci\u00f3n del argumento id conduce a la inyecci\u00f3n de SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7933.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7933.json index a469d9d47a2..4bea9358015 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7933.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7933.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7933", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-19T23:15:04.980", - "lastModified": "2024-08-19T23:15:04.980", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in itsourcecode Project Expense Monitoring System 1.0. It has been classified as critical. Affected is an unknown function of the file login1.php of the component Backend Login. The manipulation of the argument user leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en el c\u00f3digo fuente Project Expense Monitoring System 1.0. Ha sido clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo login1.php del componente Backend Login es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento usuario conduce a la inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7934.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7934.json index 3a510e8ed6b..81c62e92b89 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7934.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7934.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7934", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-19T23:15:05.233", - "lastModified": "2024-08-19T23:15:05.233", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in itsourcecode Project Expense Monitoring System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file execute.php. The manipulation of the argument code leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en el c\u00f3digo fuente Project Expense Monitoring System 1.0. Ha sido declarada cr\u00edtico. Una funci\u00f3n desconocida del archivo execute.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del c\u00f3digo del argumento conduce a la inyecci\u00f3n de SQL. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7935.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7935.json index 45c44fec694..49264144655 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7935.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7935.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7935", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-19T23:15:05.480", - "lastModified": "2024-08-19T23:15:05.480", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in itsourcecode Project Expense Monitoring System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file print.php. The manipulation of the argument map_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en el c\u00f3digo fuente Project Expense Monitoring System 1.0. Ha sido calificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo print.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento map_id conduce a la inyecci\u00f3n de SQL. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7936.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7936.json index b5a3980f379..03b4b20f1a1 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7936.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7936.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7936", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-20T00:15:04.213", - "lastModified": "2024-08-20T00:15:04.213", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in itsourcecode Project Expense Monitoring System 1.0. This affects an unknown part of the file transferred_report.php. The manipulation of the argument start/end/employee leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en el c\u00f3digo fuente Project Expense Monitoring System 1.0 y clasificada como cr\u00edtica. Esto afecta a una parte desconocida del archivo transfer_report.php. La manipulaci\u00f3n del argumento inicio/fin/empleado conduce a la inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7937.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7937.json index e1b507b24b0..0d4176c14c5 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7937.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7937.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7937", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-20T01:15:10.930", - "lastModified": "2024-08-20T01:15:10.930", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in itsourcecode Project Expense Monitoring System 1.0. This vulnerability affects unknown code of the file printtransfer.php. The manipulation of the argument transfer_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en itsourcecode Project Expense Monitoring System 1.0 y clasificada como cr\u00edtica. Esta vulnerabilidad afecta a un c\u00f3digo desconocido del archivo printtransfer.php. La manipulaci\u00f3n del argumento transfer_id conduce a la inyecci\u00f3n de SQL. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7942.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7942.json index 1a1f4b47d96..62c46555ef7 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7942.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7942.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7942", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-20T01:15:11.180", - "lastModified": "2024-08-20T01:15:11.180", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in SourceCodester Leads Manager Tool 1.0 and classified as problematic. This vulnerability affects unknown code of the file update-leads.php. The manipulation of the argument phone_number leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en SourceCodester Leads Manager Tool 1.0 y clasificada como problem\u00e1tica. Esta vulnerabilidad afecta a un c\u00f3digo desconocido del archivo update-leads.php. La manipulaci\u00f3n del argumento phone_number conduce a cross site scripting. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7943.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7943.json index 5750d69be55..4dbe7c42b23 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7943.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7943.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7943", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-20T01:15:11.420", - "lastModified": "2024-08-20T01:15:11.420", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in itsourcecode Laravel Property Management System 1.0 and classified as critical. This issue affects the function upload of the file PropertiesController.php. The manipulation of the argument file leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en el c\u00f3digo fuente Laravel Property Management System 1.0 y clasificada como cr\u00edtica. Este problema afecta la funci\u00f3n de carga del archivo PropertiesController.php. La manipulaci\u00f3n del archivo de argumentos conduce a una carga sin restricciones. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7944.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7944.json index 20e4fa98cb5..d5ba8a4ddd0 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7944.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7944.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7944", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-20T02:15:05.610", - "lastModified": "2024-08-20T02:15:05.610", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in itsourcecode Laravel Property Management System 1.0. It has been classified as critical. Affected is the function UpdateDocumentsRequest of the file DocumentsController.php. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en su c\u00f3digo fuente Laravel Property Management System 1.0. Ha sido clasificada como cr\u00edtica. La funci\u00f3n UpdateDocumentsRequest del archivo DocumentsController.php es afectada por la vulnerabilidad. La manipulaci\u00f3n conduce a una carga sin restricciones. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7945.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7945.json index 6f4959bb8a5..b19cf305132 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7945.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7945.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7945", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-20T02:15:05.860", - "lastModified": "2024-08-20T02:15:05.860", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in itsourcecode Laravel Property Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/notes/create of the component Notes Page. The manipulation of the argument Note text leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en el c\u00f3digo fuente Laravel Property Management System 1.0. Ha sido declarada problem\u00e1tica. Una funci\u00f3n desconocida del archivo /admin/notes/create del componente Notes Page es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento Texto de la nota conduce a cross site scripting. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7946.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7946.json index 7d81d4d6c7a..fceee857791 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7946.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7946.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7946", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-20T02:15:06.097", - "lastModified": "2024-08-20T02:15:06.097", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in itsourcecode Online Blood Bank Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file register.php of the component User Signup. The manipulation of the argument user leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en el c\u00f3digo fuente Online Blood Bank Management System 1.0. Ha sido calificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo Register.php del componente User Signup es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento usuario conduce a la inyecci\u00f3n SQL. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7947.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7947.json index e514ab2aece..cb58dd08709 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7947.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7947.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7947", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-20T02:15:06.337", - "lastModified": "2024-08-20T02:15:06.337", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in SourceCodester Point of Sales and Inventory Management System 1.0. This affects an unknown part of the file login.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en SourceCodester Point of Sales and Inventory Management System 1.0 y clasificada como cr\u00edtica. Una parte desconocida del archivo login.php afecta a esta vulnerabilidad. La manipulaci\u00f3n del argumento email conduce a la inyecci\u00f3n de SQL. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7948.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7948.json index b6fceda61b2..d210699d031 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7948.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7948.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7948", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-20T02:15:06.573", - "lastModified": "2024-08-20T02:15:06.573", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic was found in SourceCodester Accounts Manager App 1.0. This vulnerability affects unknown code of the file update-account.php of the component Update Account Page. The manipulation of the argument Account Name/Username/Password/Link leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en SourceCodester Accounts Manager App 1.0 y clasificada como problem\u00e1tica. Esta vulnerabilidad afecta a un c\u00f3digo desconocido del archivo update-account.php del componente Update Account Page. La manipulaci\u00f3n del argumento Nombre de cuenta/Nombre de usuario/Contrase\u00f1a/Enlace conduce a cross site scripting. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7949.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7949.json index dbb80422c29..e1360d8c07b 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7949.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7949.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7949", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-20T02:15:06.817", - "lastModified": "2024-08-20T02:15:06.817", - "vulnStatus": "Received", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in SourceCodester Online Graduate Tracer System up to 1.0. Affected is an unknown function of the file /tracking/admin/fetch_genderit.php. The manipulation of the argument request leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en SourceCodester Online Graduate Tracer System hasta 1.0 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo /tracking/admin/fetch_genderit.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n de la solicitud de argumento conduce a la inyecci\u00f3n de SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8003.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8003.json new file mode 100644 index 00000000000..ce5cfa90291 --- /dev/null +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8003.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2024-8003", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-20T14:15:10.767", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Go-Tribe gotribe-admin 1.0 and classified as problematic. Affected by this issue is the function InitRoutes of the file internal/app/routes/routes.go of the component Log Handler. The manipulation leads to deserialization. The patch is identified as 45ac90d6d1f82716f77dbcdf8e7309c229080e3c. It is recommended to apply a patch to fix this issue." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:A/AC:L/Au:S/C:P/I:N/A:N", + "accessVector": "ADJACENT_NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.7 + }, + "baseSeverity": "LOW", + "exploitabilityScore": 5.1, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Go-Tribe/gotribe-admin/commit/45ac90d6d1f82716f77dbcdf8e7309c229080e3c", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Go-Tribe/gotribe-admin/issues/1", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Go-Tribe/gotribe-admin/issues/1#issuecomment-2298187923", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.275198", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.275198", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.393987", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8005.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8005.json new file mode 100644 index 00000000000..d94af89c575 --- /dev/null +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8005.json @@ -0,0 +1,149 @@ +{ + "id": "CVE-2024-8005", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-20T14:15:11.130", + "lastModified": "2024-08-20T15:44:20.567", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in demozx gf_cms 1.0/1.0.1. It has been classified as critical. This affects the function init of the file internal/logic/auth/auth.go of the component JWT Authentication. The manipulation leads to hard-coded credentials. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.2 is able to address this issue. The patch is named be702ada7cb6fdabc02689d90b38139c827458a5. It is recommended to upgrade the affected component." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/demozx/gf_cms/commit/be702ada7cb6fdabc02689d90b38139c827458a5", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/demozx/gf_cms/commit/de51cc57a96ccca905c837ef925c2cc3a5241383", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/demozx/gf_cms/issues/5", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/demozx/gf_cms/issues/5#issuecomment-2296590417", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.275199", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.275199", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.393981", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 304e868a787..cb70f82d5ef 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-08-20T14:00:18.707768+00:00 +2024-08-20T16:00:18.583404+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-08-20T13:54:00.933000+00:00 +2024-08-20T15:50:32.013000+00:00 ``` ### Last Data Feed Release @@ -33,55 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -260612 +260646 ``` ### CVEs added in the last Commit -Recently added CVEs: `44` +Recently added CVEs: `34` -- [CVE-2024-42563](CVE-2024/CVE-2024-425xx/CVE-2024-42563.json) (`2024-08-20T13:15:07.123`) -- [CVE-2024-42564](CVE-2024/CVE-2024-425xx/CVE-2024-42564.json) (`2024-08-20T13:15:07.243`) -- [CVE-2024-42565](CVE-2024/CVE-2024-425xx/CVE-2024-42565.json) (`2024-08-20T13:15:07.347`) -- [CVE-2024-42566](CVE-2024/CVE-2024-425xx/CVE-2024-42566.json) (`2024-08-20T13:15:07.443`) -- [CVE-2024-42567](CVE-2024/CVE-2024-425xx/CVE-2024-42567.json) (`2024-08-20T13:15:07.540`) -- [CVE-2024-42568](CVE-2024/CVE-2024-425xx/CVE-2024-42568.json) (`2024-08-20T13:15:07.643`) -- [CVE-2024-42569](CVE-2024/CVE-2024-425xx/CVE-2024-42569.json) (`2024-08-20T13:15:07.733`) -- [CVE-2024-42570](CVE-2024/CVE-2024-425xx/CVE-2024-42570.json) (`2024-08-20T13:15:07.830`) -- [CVE-2024-42571](CVE-2024/CVE-2024-425xx/CVE-2024-42571.json) (`2024-08-20T13:15:07.917`) -- [CVE-2024-42572](CVE-2024/CVE-2024-425xx/CVE-2024-42572.json) (`2024-08-20T13:15:08.007`) -- [CVE-2024-42573](CVE-2024/CVE-2024-425xx/CVE-2024-42573.json) (`2024-08-20T13:15:08.097`) -- [CVE-2024-42574](CVE-2024/CVE-2024-425xx/CVE-2024-42574.json) (`2024-08-20T13:15:08.193`) -- [CVE-2024-42575](CVE-2024/CVE-2024-425xx/CVE-2024-42575.json) (`2024-08-20T13:15:08.283`) -- [CVE-2024-42576](CVE-2024/CVE-2024-425xx/CVE-2024-42576.json) (`2024-08-20T13:15:08.377`) -- [CVE-2024-42577](CVE-2024/CVE-2024-425xx/CVE-2024-42577.json) (`2024-08-20T13:15:08.477`) -- [CVE-2024-42578](CVE-2024/CVE-2024-425xx/CVE-2024-42578.json) (`2024-08-20T13:15:08.573`) -- [CVE-2024-42579](CVE-2024/CVE-2024-425xx/CVE-2024-42579.json) (`2024-08-20T13:15:08.687`) -- [CVE-2024-42580](CVE-2024/CVE-2024-425xx/CVE-2024-42580.json) (`2024-08-20T13:15:08.793`) -- [CVE-2024-42581](CVE-2024/CVE-2024-425xx/CVE-2024-42581.json) (`2024-08-20T13:15:08.890`) -- [CVE-2024-42582](CVE-2024/CVE-2024-425xx/CVE-2024-42582.json) (`2024-08-20T13:15:08.987`) -- [CVE-2024-42583](CVE-2024/CVE-2024-425xx/CVE-2024-42583.json) (`2024-08-20T13:15:09.077`) -- [CVE-2024-42584](CVE-2024/CVE-2024-425xx/CVE-2024-42584.json) (`2024-08-20T13:15:09.173`) -- [CVE-2024-42585](CVE-2024/CVE-2024-425xx/CVE-2024-42585.json) (`2024-08-20T13:15:09.273`) -- [CVE-2024-42586](CVE-2024/CVE-2024-425xx/CVE-2024-42586.json) (`2024-08-20T13:15:09.367`) -- [CVE-2024-6918](CVE-2024/CVE-2024-69xx/CVE-2024-6918.json) (`2024-08-20T13:15:09.450`) +- [CVE-2024-42604](CVE-2024/CVE-2024-426xx/CVE-2024-42604.json) (`2024-08-20T15:15:21.940`) +- [CVE-2024-42605](CVE-2024/CVE-2024-426xx/CVE-2024-42605.json) (`2024-08-20T15:15:22.020`) +- [CVE-2024-42606](CVE-2024/CVE-2024-426xx/CVE-2024-42606.json) (`2024-08-20T15:15:22.100`) +- [CVE-2024-42607](CVE-2024/CVE-2024-426xx/CVE-2024-42607.json) (`2024-08-20T15:15:22.213`) +- [CVE-2024-42608](CVE-2024/CVE-2024-426xx/CVE-2024-42608.json) (`2024-08-20T14:15:09.697`) +- [CVE-2024-42609](CVE-2024/CVE-2024-426xx/CVE-2024-42609.json) (`2024-08-20T15:15:22.357`) +- [CVE-2024-42610](CVE-2024/CVE-2024-426xx/CVE-2024-42610.json) (`2024-08-20T15:15:22.437`) +- [CVE-2024-42611](CVE-2024/CVE-2024-426xx/CVE-2024-42611.json) (`2024-08-20T15:15:22.517`) +- [CVE-2024-42613](CVE-2024/CVE-2024-426xx/CVE-2024-42613.json) (`2024-08-20T15:15:22.600`) +- [CVE-2024-42616](CVE-2024/CVE-2024-426xx/CVE-2024-42616.json) (`2024-08-20T15:15:22.690`) +- [CVE-2024-42617](CVE-2024/CVE-2024-426xx/CVE-2024-42617.json) (`2024-08-20T15:15:22.777`) +- [CVE-2024-42618](CVE-2024/CVE-2024-426xx/CVE-2024-42618.json) (`2024-08-20T15:15:22.853`) +- [CVE-2024-42621](CVE-2024/CVE-2024-426xx/CVE-2024-42621.json) (`2024-08-20T15:15:22.933`) +- [CVE-2024-42662](CVE-2024/CVE-2024-426xx/CVE-2024-42662.json) (`2024-08-20T15:15:23.090`) +- [CVE-2024-43376](CVE-2024/CVE-2024-433xx/CVE-2024-43376.json) (`2024-08-20T15:15:23.277`) +- [CVE-2024-43377](CVE-2024/CVE-2024-433xx/CVE-2024-43377.json) (`2024-08-20T15:15:23.490`) +- [CVE-2024-43397](CVE-2024/CVE-2024-433xx/CVE-2024-43397.json) (`2024-08-20T15:15:23.673`) +- [CVE-2024-43404](CVE-2024/CVE-2024-434xx/CVE-2024-43404.json) (`2024-08-20T15:15:23.867`) +- [CVE-2024-43406](CVE-2024/CVE-2024-434xx/CVE-2024-43406.json) (`2024-08-20T15:15:24.070`) +- [CVE-2024-43409](CVE-2024/CVE-2024-434xx/CVE-2024-43409.json) (`2024-08-20T15:15:24.270`) +- [CVE-2024-6377](CVE-2024/CVE-2024-63xx/CVE-2024-6377.json) (`2024-08-20T14:15:09.917`) +- [CVE-2024-6378](CVE-2024/CVE-2024-63xx/CVE-2024-6378.json) (`2024-08-20T14:15:10.127`) +- [CVE-2024-6379](CVE-2024/CVE-2024-63xx/CVE-2024-6379.json) (`2024-08-20T14:15:10.323`) +- [CVE-2024-8003](CVE-2024/CVE-2024-80xx/CVE-2024-8003.json) (`2024-08-20T14:15:10.767`) +- [CVE-2024-8005](CVE-2024/CVE-2024-80xx/CVE-2024-8005.json) (`2024-08-20T14:15:11.130`) ### CVEs modified in the last Commit -Recently modified CVEs: `11` +Recently modified CVEs: `195` -- [CVE-2022-48742](CVE-2022/CVE-2022-487xx/CVE-2022-48742.json) (`2024-08-20T13:44:57.483`) -- [CVE-2022-48743](CVE-2022/CVE-2022-487xx/CVE-2022-48743.json) (`2024-08-20T13:54:00.933`) -- [CVE-2024-0171](CVE-2024/CVE-2024-01xx/CVE-2024-0171.json) (`2024-08-20T13:25:30.237`) -- [CVE-2024-23897](CVE-2024/CVE-2024-238xx/CVE-2024-23897.json) (`2024-08-20T13:34:22.773`) -- [CVE-2024-5805](CVE-2024/CVE-2024-58xx/CVE-2024-5805.json) (`2024-08-20T13:37:58.923`) -- [CVE-2024-6371](CVE-2024/CVE-2024-63xx/CVE-2024-6371.json) (`2024-08-20T13:21:59.600`) -- [CVE-2024-6372](CVE-2024/CVE-2024-63xx/CVE-2024-6372.json) (`2024-08-20T13:31:40.793`) -- [CVE-2024-6373](CVE-2024/CVE-2024-63xx/CVE-2024-6373.json) (`2024-08-20T13:32:44.213`) -- [CVE-2024-7683](CVE-2024/CVE-2024-76xx/CVE-2024-7683.json) (`2024-08-20T13:52:50.987`) -- [CVE-2024-7684](CVE-2024/CVE-2024-76xx/CVE-2024-7684.json) (`2024-08-20T13:53:24.447`) -- [CVE-2024-7685](CVE-2024/CVE-2024-76xx/CVE-2024-7685.json) (`2024-08-20T13:53:51.947`) +- [CVE-2024-7775](CVE-2024/CVE-2024-77xx/CVE-2024-7775.json) (`2024-08-20T15:44:20.567`) +- [CVE-2024-7777](CVE-2024/CVE-2024-77xx/CVE-2024-7777.json) (`2024-08-20T15:44:20.567`) +- [CVE-2024-7780](CVE-2024/CVE-2024-77xx/CVE-2024-7780.json) (`2024-08-20T15:44:20.567`) +- [CVE-2024-7782](CVE-2024/CVE-2024-77xx/CVE-2024-7782.json) (`2024-08-20T15:44:20.567`) +- [CVE-2024-7827](CVE-2024/CVE-2024-78xx/CVE-2024-7827.json) (`2024-08-20T15:44:20.567`) +- [CVE-2024-7850](CVE-2024/CVE-2024-78xx/CVE-2024-7850.json) (`2024-08-20T15:44:20.567`) +- [CVE-2024-7926](CVE-2024/CVE-2024-79xx/CVE-2024-7926.json) (`2024-08-20T15:44:20.567`) +- [CVE-2024-7927](CVE-2024/CVE-2024-79xx/CVE-2024-7927.json) (`2024-08-20T15:44:20.567`) +- [CVE-2024-7928](CVE-2024/CVE-2024-79xx/CVE-2024-7928.json) (`2024-08-20T15:44:20.567`) +- [CVE-2024-7929](CVE-2024/CVE-2024-79xx/CVE-2024-7929.json) (`2024-08-20T15:44:20.567`) +- [CVE-2024-7930](CVE-2024/CVE-2024-79xx/CVE-2024-7930.json) (`2024-08-20T15:44:20.567`) +- [CVE-2024-7931](CVE-2024/CVE-2024-79xx/CVE-2024-7931.json) (`2024-08-20T15:44:20.567`) +- [CVE-2024-7933](CVE-2024/CVE-2024-79xx/CVE-2024-7933.json) (`2024-08-20T15:44:20.567`) +- [CVE-2024-7934](CVE-2024/CVE-2024-79xx/CVE-2024-7934.json) (`2024-08-20T15:44:20.567`) +- [CVE-2024-7935](CVE-2024/CVE-2024-79xx/CVE-2024-7935.json) (`2024-08-20T15:44:20.567`) +- [CVE-2024-7936](CVE-2024/CVE-2024-79xx/CVE-2024-7936.json) (`2024-08-20T15:44:20.567`) +- [CVE-2024-7937](CVE-2024/CVE-2024-79xx/CVE-2024-7937.json) (`2024-08-20T15:44:20.567`) +- [CVE-2024-7942](CVE-2024/CVE-2024-79xx/CVE-2024-7942.json) (`2024-08-20T15:44:20.567`) +- [CVE-2024-7943](CVE-2024/CVE-2024-79xx/CVE-2024-7943.json) (`2024-08-20T15:44:20.567`) +- [CVE-2024-7944](CVE-2024/CVE-2024-79xx/CVE-2024-7944.json) (`2024-08-20T15:44:20.567`) +- [CVE-2024-7945](CVE-2024/CVE-2024-79xx/CVE-2024-7945.json) (`2024-08-20T15:44:20.567`) +- [CVE-2024-7946](CVE-2024/CVE-2024-79xx/CVE-2024-7946.json) (`2024-08-20T15:44:20.567`) +- [CVE-2024-7947](CVE-2024/CVE-2024-79xx/CVE-2024-7947.json) (`2024-08-20T15:44:20.567`) +- [CVE-2024-7948](CVE-2024/CVE-2024-79xx/CVE-2024-7948.json) (`2024-08-20T15:44:20.567`) +- [CVE-2024-7949](CVE-2024/CVE-2024-79xx/CVE-2024-7949.json) (`2024-08-20T15:44:20.567`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 8856868f386..f4e98f78030 100644 --- a/_state.csv +++ b/_state.csv @@ -172587,7 +172587,7 @@ CVE-2021-27502,0,0,adbef70cd62059da1ce97481c160f5372d176d270011f114313f7507656dd CVE-2021-27503,0,0,fe26ecc3728dfe405f69a2ed58d0a7534866693cb181e262da02f1af90a54cde,2021-08-11T14:40:08.287000 CVE-2021-27504,0,0,a32366d8d601fe7091f93dfefe0ed9f4bfe82351b858c673402fef1a6d26fac1,2023-12-01T20:16:23.093000 CVE-2021-27505,0,0,f7b5707666de151d819caeeaeeea60dd971ff6da3de93a51c15dc9ea7789d8e7,2022-05-24T20:41:07.180000 -CVE-2021-27506,0,0,da0d451241d4e010dea1c551f68eb4df7da8c0b78f4b004e77c84fd1848fa0fe,2022-07-01T12:02:37.977000 +CVE-2021-27506,0,1,78f486d5ea7d4ea00ed02264075c4f6b01340962b8e01c58ce27a5eca059ac71,2024-08-20T14:58:54.607000 CVE-2021-27509,0,0,1b7331ab58654cc416f67dbde4a14913fa61239de8833ed96c3baa05b130d4aa,2021-03-01T15:02:54.723000 CVE-2021-27513,0,0,2a29e242ae26e94f431da94456549a1502da28552384a8b43ee66720c512dcd7,2021-02-26T19:58:24.367000 CVE-2021-27514,0,0,7a66d06dbf7b77508c78e0a97862a84ecb38254f50c20d2a0342efd647234f30,2021-02-26T20:04:06.097000 @@ -173324,7 +173324,7 @@ CVE-2021-28661,0,0,305c2bbe1579faf986356b3383f915c0a456f3474023c19856e9b6f20a6be CVE-2021-28662,0,0,cea384b692d24de8092d9d160858a16e48ac42a91a4bc999dd6627163feb91ca,2023-11-07T03:32:18.137000 CVE-2021-28663,0,0,8cf6fd6b8e94221ffe81e8fa145928922c35dceb441c0d7a647b20f53c5aaa18,2024-08-13T19:45:46.977000 CVE-2021-28664,0,0,e5bcccc2bd506ab6b3600c389c3b4f5b03283589ad0db7b7f46fc6378cf228db,2024-07-25T17:59:50.377000 -CVE-2021-28665,0,0,3bd907d3d23a03b2b014d35e71d71cd61a30be665ae5c6583c4556d40847301f,2022-07-12T17:42:04.277000 +CVE-2021-28665,0,1,6c68c1b94b523d6ff0b2e7a3c78c737feee091437ecd4c51b6052f23a7155dec,2024-08-20T14:58:54.607000 CVE-2021-28667,0,0,055fa8c06183fc89d048f9424e212a5e038d60254dfafa0d7be08895557719a4,2021-03-25T13:44:17.310000 CVE-2021-28668,0,0,ed7dcf87e75b8ae4d7b382fdbb2de958df5ce187a5a6bfaaa53419dfa817c185,2021-04-01T18:30:27.737000 CVE-2021-28669,0,0,8cd37ef7147dfee284b4e565d70c1d57d72defdcad18fd57a5863c0dd6fd474c,2021-04-01T14:08:39.913000 @@ -173479,7 +173479,7 @@ CVE-2021-28958,0,0,0cade42be67baf07e2484327ffd30150c707d12bcd602b0a1d329f2c2ffe1 CVE-2021-28959,0,0,969d153d606765610668b679d971dcdf83a6dca745a664d86ed69cf149c4295a,2021-05-11T13:12:49.600000 CVE-2021-28960,0,0,c8b1e7111aef635c82e250cf3051e011d9213bea8900e0163a949dd75e748bdc,2021-11-28T23:15:41.973000 CVE-2021-28961,0,0,33562216f7fa3804b2621f4681b58d12c415cf181cdb35cec784afe7037614cb,2023-05-24T15:01:02.763000 -CVE-2021-28962,0,0,f0f8b7383070b5c27e26b82ad4b9fa136f311bfe50111265bebf1602fdad7c94,2022-07-12T17:42:04.277000 +CVE-2021-28962,0,1,4c2e965120c253e055c216778b303b8fee50d46e4a943c22efeadd8f1458db9f,2024-08-20T14:58:54.607000 CVE-2021-28963,0,0,298ddb227dea41a305c3a7a68749a823efeaf825b3ea5b47d46f10b286aa5dbc,2023-11-07T03:32:25.013000 CVE-2021-28964,0,0,b47a3d7a3236b09b0554b2d2f86049b5a809e3fc2c006c1006e625959678d462,2023-11-07T03:32:25.077000 CVE-2021-28965,0,0,6856fd18bfcf556e6d5d920b0277c35a9c49c3867fa45293eac4b3d3954e2dca,2023-11-07T03:32:25.160000 @@ -175580,7 +175580,7 @@ CVE-2021-31612,0,0,3b2b85408565dc1de270dcff11238d04b952f6ec0091ec4076110ed4f6887 CVE-2021-31613,0,0,816a0978704ce5195ac4370cb1c2167304b6f69c6856859731858ecfa51e083b,2021-09-09T22:55:59.477000 CVE-2021-31615,0,0,57b489e230e302b337fc58b00637ee1f6549ae73ef9609e1309505b123050bc7,2022-07-12T17:42:04.277000 CVE-2021-31616,0,0,711a8ec8a2538dd7251a396c81dd96ff54d1d0a90c3167f6ee66bebdb5e1852d,2022-05-03T16:04:40.443000 -CVE-2021-31617,0,0,1e020f2e03831ac583d6d5dd50b3bd0e0f68e2c0a93a0758b9109f0e4d0d84e3,2022-02-07T19:34:52.797000 +CVE-2021-31617,0,1,9f37d22e8cb36fee510ab9b59b42255a2af0a0e59df214e3be37ca4d42b28798,2024-08-20T14:58:54.607000 CVE-2021-31618,0,0,73d7e89ab608128df4530a3e31dcc9f38d0019ebbcf13ed27a6c07f673284f8e,2024-05-01T17:15:24.167000 CVE-2021-3162,0,0,91aa628f46c6f1edfcf47e9c1ae768fe2f228cb6afcaa514d0af2f66f854a3b4,2022-07-12T17:42:04.277000 CVE-2021-31624,0,0,f9bb064f6b75a55ae23dbaab9b493874f3477bdd756e005d28e0ddd202fa3dd8,2021-11-02T17:11:52.207000 @@ -177259,7 +177259,7 @@ CVE-2021-33833,0,0,4c9b7feef353af6015b4037c6e8364c70eedda71aac896bf9f36903fbab7b CVE-2021-33834,0,0,2c81a690470f1070734a615b315da289cf856119c08a7040230446ad66433a72,2023-09-13T02:12:12.100000 CVE-2021-33838,0,0,c85907aeac221dc1b6bf348539c72f5f422fa4b8dac54b2a7c8b4e6f46c6b340,2023-08-08T14:22:24.967000 CVE-2021-33839,0,0,e9385e847452e02ad2a82cd494832c46fb7d88366d23136b9872ab70011ff937,2021-06-07T18:08:25.837000 -CVE-2021-3384,0,0,f479ea0f4e9e093e7700be0a1d96151f22a8a3980f36e966305f60711eb368b8,2021-03-09T18:30:22.780000 +CVE-2021-3384,0,1,42cc96206f93dc10c695738c2cad91f7b6510412f8f9f46a616324277141f6b7,2024-08-20T14:58:54.607000 CVE-2021-33840,0,0,e96b56aac1fd80b8d63f40fceec73ae584e2c0429cc18f0df28c13b5156525c7,2022-07-12T17:42:04.277000 CVE-2021-33841,0,0,7f005017126ae77da6a3e2beaf45ad809c46456aee3d65571fb4fa0e8a59ce04,2023-11-22T13:15:07.610000 CVE-2021-33842,0,0,8bb0e0310c014109533dc4bf6b5687dcf21f7ca34b7a6b8aaa4724b068811b1c,2023-11-23T14:15:07.440000 @@ -188578,7 +188578,7 @@ CVE-2022-1202,0,0,da99f7a29b7da1246bb2b4c8d20201532a02cdbabc3a3254c1f3cbdd4f59ec CVE-2022-1203,0,0,03bc0c7f2fdf10c5985d11ea77722d858ae46fb423fbbc4105bd1ca0c25425fe,2023-11-07T03:41:48.553000 CVE-2022-1204,0,0,16b9dca6135c1ade85510ea14ce22bb8c24ac93743fb94aed65ad16bd4a263fd,2022-09-02T19:41:56.797000 CVE-2022-1205,0,0,77b85e0f2252f05ff2b361f724e0886cc3c4dddfb3c7ab0a69cd3ba0adfd48b2,2023-11-07T03:41:48.840000 -CVE-2022-1206,0,0,76ceee133b709a1797758bf768fb76b3ebf43157e10cd437b50abb2ceb970948,2024-08-20T04:15:06.787000 +CVE-2022-1206,0,1,6c996497dafa30bd02df1311a511ca778b865e7632f2ebdfde81b0f6ca13d12e,2024-08-20T15:44:20.567000 CVE-2022-1207,0,0,92b9c3cf9baaa953ab0c8283cde6c13c25b48dc477254f67daaf20c22da8eb5b,2022-04-08T16:53:51.460000 CVE-2022-1208,0,0,27093a0cf6f997d6c0a41191176d41d29782f41d4ab8206ec0c2e222b3c5bdb7,2024-01-11T09:15:43.483000 CVE-2022-1209,0,0,89230af6a4010ea5af8e479d1e9147dcc7e576c775a3ee32cda8ffcd205a9e12,2024-01-11T09:15:43.603000 @@ -193071,7 +193071,7 @@ CVE-2022-23985,0,0,21998c7bddae189c755e5d1f63f672108acb0012ab9ef4d1e4c4760598acc CVE-2022-23986,0,0,35688522f51e1083895b021cee8f3534f4d0e6ad08c6bc1bed1718a9b26313e3,2022-03-02T18:01:33.423000 CVE-2022-23987,0,0,4e47c7d77954e1a538bd35df7a2f069a597fc519abee499ddd2fd4805c6183fd,2022-03-08T17:19:40.040000 CVE-2022-23988,0,0,d815e0f0259c75353b949b8ef37a4144bead2bcc046455de6e978cc6f3efd6b3,2022-03-08T17:25:20.053000 -CVE-2022-23989,0,0,de1b1377c125ce3734911aeeae04c6c2657a5454edc6cb3d36dccdaf81825498,2022-03-24T20:24:41.953000 +CVE-2022-23989,0,1,acbddbf8a977b5437867f5adb039c74ccc09d224a2bf0fa08a0b6ec3579c3ebf,2024-08-20T14:58:54.607000 CVE-2022-2399,0,0,b536d0b5aafe549caca1b47dc5b1a32ddcc6148e571e88fbd8191ba5708205de,2022-08-02T20:57:51.820000 CVE-2022-23990,0,0,729716b4c18343b25a7a19c590b67fb8f993c2411b83d552fe71d02f1bbdca15,2023-11-07T03:44:21.590000 CVE-2022-23992,0,0,5b11fdc6a0cf63cafa973b970f231adc71c310a4869d2490d94b5a7c23aeec25,2023-08-08T14:22:24.967000 @@ -196206,7 +196206,7 @@ CVE-2022-27808,0,0,c0abde6ed57ba197d98cb1df9a74b9b07089d6253e3cf54f896c924a4da3f CVE-2022-2781,0,0,5e034df11fa7d34b93d9a4095c3c50beff22c91dd5e3e7402a50ede83bb05685,2023-08-08T14:22:24.967000 CVE-2022-27810,0,0,110d6530f2cf6771805623a297208b43da69f564dc1b855953711cc7e82c7b6a,2022-10-11T17:58:08.583000 CVE-2022-27811,0,0,ab741b561132884f15084a580b2ddedaeb7af890153a11510bb5c56736fbd606,2023-11-22T20:58:13.203000 -CVE-2022-27812,0,0,c45eed78f524926416bf7256987c2d5e44930a5344d27fcbf466959de1218e02,2023-08-08T14:22:24.967000 +CVE-2022-27812,0,1,36b45eb70248aa978683285eb0c9c858ba64d9291de229d6ab492509cf6e2d3c,2024-08-20T14:58:54.607000 CVE-2022-27813,0,0,8069ad076e47e7f40061f163c685450572743e786d576c066b64c62c42b4ac72,2023-11-07T03:45:29.027000 CVE-2022-27814,0,0,61984cc08914adc9d89c4bf9f86f40476c9e350520f8019602f951b8eb1ca4f5,2023-08-08T14:22:24.967000 CVE-2022-27815,0,0,2585fe9dc408206084f9b1aee6000a153319b5637c9cec1e20bec957b04794f8,2022-10-06T16:01:40.537000 @@ -198262,7 +198262,7 @@ CVE-2022-30275,0,0,daa5f10d5cbdf7fd429cade303fe6b0a45e184c2f7dae0e34805559aada62 CVE-2022-30276,0,0,e52b584d02d81f04a4f5d213b5dea2ec2a6a4457e20df7b8bb3022d91bfec5bc,2024-02-13T16:25:57.067000 CVE-2022-30277,0,0,58bbff7e0b58662717e9d4720a41b76f3788dc94e46552e2f427abec994b6806,2022-06-10T02:14:46.963000 CVE-2022-30278,0,0,bf9627494c4091f8642fbfbe028a5298e2fba24bc3e304830eee606e452f1319,2022-05-18T16:38:17.787000 -CVE-2022-30279,0,0,decabe1e1df05655057a7cc29e71a838a857d480817df766fa954098269ac7dd,2022-05-20T18:33:56.557000 +CVE-2022-30279,0,1,0237b5639406178e7f00f2da02201a2db7a82d6b9ce25c747844086062fe4b34,2024-08-20T14:58:54.607000 CVE-2022-3028,0,0,ecfd878d7d69dbb09bafe0cf4ad9d87531e48343edf054a2fdf03ab201d40e0a,2023-11-07T03:50:42.843000 CVE-2022-30280,0,0,0d78481e20a23653c7a64c83d28a57aec0f9522b52e115bf8e52f47e235d340b,2023-08-02T01:01:05.877000 CVE-2022-30283,0,0,cbdafc4c75540aaff6f9b85c0a21d03b4e497ca8719e4c4e47764b9f7ae883bc,2022-11-23T16:33:52.647000 @@ -200094,7 +200094,7 @@ CVE-2022-32502,0,0,8043bd7b67ea0539b415e98c4f691c3c17aca58cf56f8cb93f7ff0987225b CVE-2022-32503,0,0,f57183dbef2543b9f63dcf473a4267a67a4ba901286e8bc05468ac8a81f43f5a,2024-07-03T01:38:31.060000 CVE-2022-32504,0,0,f985a28466775169224400eb27b21a7a82a049f055b74ee3fe4261e86e2a23c4,2024-07-03T01:38:31.860000 CVE-2022-32505,0,0,d68338a48cb6379b7959ddbe908e7d1fc8f4608362b59573f8ed193723734aef,2024-08-19T17:35:04.330000 -CVE-2022-32506,0,0,945d8d593d51aa0fa18a86d7f596f36c3b2f053cf1846c7fd73efcc537697064,2024-05-14T16:13:02.773000 +CVE-2022-32506,0,1,7c3872e68b41f5c55b555638bfe7bcc9ff215c45bf9f77b0ea11d0b9c47308db,2024-08-20T14:35:01.103000 CVE-2022-32507,0,0,1438fd6973ef98c64de8bb4f28b81155df795d93958b2f8ab2841cf67afabcb6,2024-08-14T19:35:01.077000 CVE-2022-32508,0,0,a82e6070d51429707c08716a8f4c6bc4c23bc87bd713671d9f9c95e952ee7b45,2024-07-03T01:38:32.660000 CVE-2022-32509,0,0,a0ad22ecb79862c5f36fcd456e7ebe0c71b6c9035c2021ed572b8785a7934b90,2024-08-14T19:35:02.523000 @@ -212230,8 +212230,8 @@ CVE-2022-48739,0,0,00da9e79eba58b72da4eb9f5fe5c2b84557c8f37a2ad7a0724f316e8ecfe4 CVE-2022-4874,0,0,d259c1db6680ce288191bcc87dca743951302233b28b86107a9fa3c0b9ed4550,2023-11-07T03:59:09.523000 CVE-2022-48740,0,0,a7eb1a4fcfc2023fb44223bb3669f06339f2ab543ff2db91386fcf93c418fa7e,2024-08-19T17:03:31.843000 CVE-2022-48741,0,0,f7a9ce9b119d13af0b410c25cec09275b8f2fb2239b9abc03783d7e15ae6e5f9,2024-08-19T17:34:17.233000 -CVE-2022-48742,0,1,955f0c7fbe8c4fb04c29ac68d1923a29168477849bc7b7e7e1a38f90faa04e83,2024-08-20T13:44:57.483000 -CVE-2022-48743,0,1,016aa198197a6069a5b600f7b75e21187063a616d0f2a55d2373780c15590e81,2024-08-20T13:54:00.933000 +CVE-2022-48742,0,0,955f0c7fbe8c4fb04c29ac68d1923a29168477849bc7b7e7e1a38f90faa04e83,2024-08-20T13:44:57.483000 +CVE-2022-48743,0,0,016aa198197a6069a5b600f7b75e21187063a616d0f2a55d2373780c15590e81,2024-08-20T13:54:00.933000 CVE-2022-48744,0,0,db97d2408a3729b8332ee7728404bcf0a8034b20ec9bb81fa52c25169879c043,2024-06-20T12:43:25.663000 CVE-2022-48745,0,0,41db11ed51a619f18bf8566d3a9646fcce3f1ca7e8c8d1b8f24a053db7635b13,2024-06-20T12:43:25.663000 CVE-2022-48746,0,0,e0fa12e9f2d5b9a8bc1db423dcc6c83d2f1745d072ea799cb50d0201d1a5ab3d,2024-06-20T12:43:25.663000 @@ -219433,7 +219433,7 @@ CVE-2023-2609,0,0,24b183eaa7887b4ba3fb2571039591f2f814eba7b30fe7805c34ea62f4edfb CVE-2023-26091,0,0,1f39ccaac8d2dcf8021310e98c45ade2aeb3aeb94be83750fe3aef47f4c29b2f,2023-03-07T19:02:05.750000 CVE-2023-26092,0,0,bbb299d456a7d23321a5f656478294e23aae42561f393b86e688a037f642690f,2023-02-28T19:58:05 CVE-2023-26093,0,0,4ddb86d7f61e5594c65bca8fe928eeff0472dd5f7cfc5b3cc95ca131b5cff1f2,2023-02-28T19:57:24.340000 -CVE-2023-26095,0,0,50e059fd3e89bad3ce77e045ecc5c22a1fe20f39e40de08bfab3dcbddbcb6655,2023-08-31T18:58:14.647000 +CVE-2023-26095,0,1,019ba8a771b13ad0b024633bad1f4187413a2aa972a6638a203f3545b3b7c2aa,2024-08-20T14:58:54.607000 CVE-2023-26097,0,0,5306c7a76d85cdc4edb3994cd3fccbb606e5f1a763a68c5d285f9c0b19ad3811,2023-05-03T15:44:39.657000 CVE-2023-26098,0,0,468f992c5d3cd7458167aded12359ec4f2423307160f2af081ee92d93e54a2db,2023-05-04T18:47:35.130000 CVE-2023-26099,0,0,45d2eb0cd28e38eb3d2f99a8c5029e40026ee7fa4c89db26aef20c7ff86dbb24,2023-05-03T15:46:52.087000 @@ -221453,7 +221453,7 @@ CVE-2023-28610,0,0,49b47a3919be318bd35b4067b84030eb8382d5c90395fd894fa96687402de CVE-2023-28611,0,0,bb9a81eaf7d4af87f03cdf8498b27a64468af88d147fa832a2a77249f03cdd96,2023-03-28T20:29:28.217000 CVE-2023-28613,0,0,33c4235412e42edb9ec30e559bef8c01943f199c6230677b96a19bff1ab84f0d,2023-05-05T19:15:15.513000 CVE-2023-28614,0,0,b1b67dc2c65b42a235addea48c38cd782df16326adfb97a1d103b608acf07654,2023-09-20T16:54:18.473000 -CVE-2023-28616,0,0,bfa0db8a620e3936e111f315cca9d55b0b2bef513b8d9e401a1acbd92b774dc6,2024-01-04T15:28:24.317000 +CVE-2023-28616,0,1,02f90a80570219154ddb58599a483fca1ba648500c999c58a1c6f9598e2f6902,2024-08-20T14:58:54.607000 CVE-2023-28617,0,0,d105b9f18a0a4c4b988d3aa1326ef2b9cb6cfed7547fe38e55449ace1d549f27,2023-11-07T04:10:44.183000 CVE-2023-28618,0,0,4ad52d5e69e6c064b3e411c139e99dbdcc71b192ce34a3ddce9e7bd0c27d458c,2023-11-16T17:42:45.977000 CVE-2023-2862,0,0,3a76ca30f35a84ff93689cdb8490198d3c0ae3dfc876bb35139b741695d27ac4,2024-05-17T02:23:18.983000 @@ -226269,7 +226269,7 @@ CVE-2023-35018,0,0,6d336ce3e2614937180971b4858c079e9a4762f40daaf2f592acb48025066 CVE-2023-35019,0,0,1291349f3b1d1d4adf1c92cac15e5df37965c90cdb3e3c741c73d93303d641a0,2023-08-04T17:23:56.413000 CVE-2023-3502,0,0,74be66f33660d5a960e431317df48fb842e4013315111e826f94f24e7bf2f927,2024-05-17T02:27:32.370000 CVE-2023-35020,0,0,ad9d714b38fc8dfafebf526e5bcd88bda4558e15578975a719df5c9198c79c30,2024-01-24T21:38:11.280000 -CVE-2023-35022,0,0,33e02475c5109f5e91d42aac13b9b467a496a3bd3a8e57df046c865975e4ae02,2024-07-01T12:37:24.220000 +CVE-2023-35022,0,1,d5f23bc16e5c4f8268ac77331c232fcd8b44fdbdf1378d750d9156b59071a091,2024-08-20T14:13:16.427000 CVE-2023-35024,0,0,b99623d62fd61cec8b42feb7692d36a2dddfce4725f8455d7ba260278fc27d1c,2023-10-18T21:04:02.917000 CVE-2023-35029,0,0,e92935d889ee7a18e80a49707d3023b26a55365680006a3e5edfac7046aa802e,2023-06-22T16:51:23.137000 CVE-2023-3503,0,0,9899b3a06c9c6b85f8b5fdfd6303f5bfb45d62bdf6dce68bc15f1326d515bc23,2024-05-17T02:27:32.480000 @@ -232868,7 +232868,7 @@ CVE-2023-43844,0,0,aa0cd59b83effa93acbfce005198f4cf37e8fc86576a6cf7d023f3952cbe3 CVE-2023-43845,0,0,d8c84d9afe0ac5a8afc98f0447d8c6711d3b8b032d2ae653c041ead4ab58d994,2024-07-03T01:41:41.020000 CVE-2023-43846,0,0,fb3201cf7e6c0f2741576b6bdf0ad5f80553de1de784098b61d62597e5d839be,2024-05-29T13:02:09.280000 CVE-2023-43847,0,0,28c6e47ec33c1957d51359e438da5dfff5700e365d5de705396d6276e82a5e1e,2024-05-29T13:02:09.280000 -CVE-2023-43848,0,0,a4129acff872b01dffca41dc27d54f41804f72fd13ced8507e1c648e26a2a024,2024-05-29T13:02:09.280000 +CVE-2023-43848,0,1,966c4d3097d699fb3c697113cdfd2123c20f48ba0018120b5a3b5a086a38c721,2024-08-20T15:35:01.247000 CVE-2023-43849,0,0,0542c1a5b859a23e3f0c4124d7360d8baeed305004e92fadb08a463b761b77ea,2024-08-14T20:35:03.723000 CVE-2023-4385,0,0,b5bb3c59916cebc3c4ff676af8b75b048d7e53ae9df9c8d27d2a9f6e967ad4e8,2023-11-07T04:22:29.887000 CVE-2023-43850,0,0,557cbaf540a83f8bec4b3979b28ccab7cdd58f6d8c9c9d59451a75743f20a434,2024-05-29T13:02:09.280000 @@ -234923,7 +234923,7 @@ CVE-2023-46865,0,0,38b35a547c71e0822d2fa6a9b71468ee761745bd759ebfe3e079e1d86f22c CVE-2023-46866,0,0,3e3907a7074aea4a8d85a65b2cea0bf5eda0a287624688797311613c5914e780,2023-11-04T03:23:43.990000 CVE-2023-46867,0,0,3345de97ced7ac50f0bb96ab193935cdacc3141442a9af9a5c2c9b16c80bb2eb,2023-11-04T03:23:36.290000 CVE-2023-4687,0,0,354f0681027854970a7f0f0533bc3851ddac446f09d1cbaeefe24a425dff4d4a,2023-11-07T04:22:50.293000 -CVE-2023-46870,0,0,ed3d794c86b5eaa9970b587743ddb60d207b457fda5dae57a1b4fc1c462cda6a,2024-05-14T16:13:02.773000 +CVE-2023-46870,0,1,ff18f06b6c4d39998df5f876e3bd0b3d5c3cee594f43c4568fd49a4689d51e0b,2024-08-20T14:35:03.573000 CVE-2023-46871,0,0,cc2b23a2a7c0d7957b39709ec8c2aa588579f2c75f2b7fdd7c7f3d3e75ed4b10,2023-12-12T20:19:53.150000 CVE-2023-4688,0,0,985476e8d06e20422659b9d794536014224e53fcc3c17d4243bfab5155c29d50,2023-09-06T20:45:12.027000 CVE-2023-46886,0,0,b203c4f31661b6385b16f32ae599f556bf0f1ac3bf629827b03deea7d1699a90,2023-12-05T13:02:07.903000 @@ -235054,7 +235054,7 @@ CVE-2023-47080,0,0,08016b9cc4c5c595a8fe46acd3540c41d56f20eef61756841e2c76e98c231 CVE-2023-47081,0,0,07d466abc537a6cb66553fc578dd423953f9d62c5c504153c3418eb4d193bdb5,2023-12-15T15:06:41.627000 CVE-2023-4709,0,0,77adfb086ee1ac1be91f8683da8a6a0af2683417dd5855b51baac483ca759be1,2024-05-17T02:31:44.027000 CVE-2023-47090,0,0,735950d7ff3bda503443d862231ca43fa53b0b774912234f3340a2d295dccb35,2023-11-08T00:15:54.567000 -CVE-2023-47091,0,0,bba15077c18dff99b3e99d94b0421473c4a45610c4e528cf907b84b8ad436b99,2024-01-04T01:15:58.840000 +CVE-2023-47091,0,1,0f00ba7fcb72c349af84602a3b3ae786e8377e2f17c4f50c4b710f54ddff0ca9,2024-08-20T14:58:54.607000 CVE-2023-47092,0,0,e010a225016e2bcd2a5415e2b2bce349530d592ebc251fe771501fbee733ba62,2024-01-18T21:15:08.177000 CVE-2023-47093,0,0,e291a2b84249b4be7547306dfb9b9181695905dd70d1609bb0c7fefaf10f84e3,2023-12-29T16:53:29.980000 CVE-2023-47094,0,0,a98818270e29f245f2df18e413169318c2262ace4deaff8034aeb7b14b18c57f,2023-11-06T17:59:03.860000 @@ -241079,7 +241079,7 @@ CVE-2024-0167,0,0,744bc993f59ae73af2914a6819025a9b84a9608f7404a5affc347dddf19a56 CVE-2024-0168,0,0,b3ed681274021d4ad23f5d3a33ac337cf4d9042b0fec464247a45e1c1e71eb19,2024-02-16T13:40:44.663000 CVE-2024-0169,0,0,f3c67b7bc44e30be0f91d72e02de3315174c543380b368caf20e16a7ec6999a6,2024-08-14T10:15:05.883000 CVE-2024-0170,0,0,cad01b4a5afa824941a3be2fdd3602b85ef95f3075f06c5677f74bc8ee9b7c8f,2024-02-15T16:55:09.957000 -CVE-2024-0171,0,1,2f3d7f2f1f78d639aa160b093e5b427e217b92a685ebc1ab123ac7afd9616a22,2024-08-20T13:25:30.237000 +CVE-2024-0171,0,0,2f3d7f2f1f78d639aa160b093e5b427e217b92a685ebc1ab123ac7afd9616a22,2024-08-20T13:25:30.237000 CVE-2024-0172,0,0,e309e09fe60408c3f84daa7e2d14db1e3ae80b43eddc40c52c9068b5a4d6e6ec,2024-04-03T12:38:04.840000 CVE-2024-0173,0,0,b886d64d4b6132c8c30f9fd36eab248afbbe9e679900ffa9aa922365ae506ae7,2024-03-13T18:15:58.530000 CVE-2024-0181,0,0,bf8c23eeb8eccfd67271292b6e90342c941acaef0e98a66f834ab435fd911b64,2024-05-17T02:34:22.837000 @@ -243749,7 +243749,7 @@ CVE-2024-21445,0,0,1e9644529a4c09a7e7b867fd24131ae695337874b20e05fc2c8f29a74f020 CVE-2024-21446,0,0,d91af89ff77312fee55a3cb5f9839f37302d10ad728d89077b6cfd938f9718c3,2024-04-11T20:15:32.857000 CVE-2024-21447,0,0,bcb33d59d4cc54b7944f70b43838b78d2de28c13052766332282f9f8eec5b1e5,2024-04-10T13:24:00.070000 CVE-2024-21448,0,0,40142b83431d484ca38acbb788d7523f2721d5755a5a237be8e19334b7e92f0f,2024-05-29T00:15:36.470000 -CVE-2024-21449,0,0,fff61c3bafc8b68912dea981e752397a37789f3c781b7739d1962849387eb766,2024-08-08T18:50:39.357000 +CVE-2024-21449,0,1,27f3d582dff3d2bb33572fa82e89104038d6a5ee6fed407b847c3b8beb7fca5c,2024-08-20T15:48:51.190000 CVE-2024-2145,0,0,827ab96169cf8c47e9ce401a991ae891b3ddee0c4e3c5089f0bba0550e86a7e8,2024-05-17T02:38:04.100000 CVE-2024-21450,0,0,25401a86ed4cf6aee58f7dc7ff8bede6f2584b071ad1edcb27bf966a0a91c76a,2024-04-11T20:15:33.050000 CVE-2024-21451,0,0,fda859879476242f447364ed932f4e097d32ef677cea24910429c5be2e67982f,2024-04-11T20:15:33.143000 @@ -243934,7 +243934,7 @@ CVE-2024-21684,0,0,59f12a4b04761da303d7e3a40c8e6edc45c41d4945c065d5a0ffea7371041 CVE-2024-21685,0,0,5660fcc85eb1dde5c65259d6d6205ae74624ad923dcf6470bb4f3577f99d7f00,2024-06-20T12:44:01.637000 CVE-2024-21686,0,0,4a77c3c56e7b5b00a78de09ce573bf8e0630b6f60379d0ccdce9209c8559bd43,2024-07-17T13:34:20.520000 CVE-2024-21687,0,0,376ba9a42cfc804d783dd58059d1accf85ade36be58bc6e24e95588c80302a09,2024-08-01T13:46:48.050000 -CVE-2024-21689,0,0,f0f6270ad75f42f9e86f2978ae6cfad32cfccffa4225a56d905159e7cada06df,2024-08-20T10:15:04.103000 +CVE-2024-21689,0,1,d8a79405abcb9c8abfdb03520e41049c9522145c88e975847ada5aebd53c39e7,2024-08-20T15:44:20.567000 CVE-2024-2169,0,0,25fcbf8b9d7008ea9954a41615969f4d36543f4a604eb878bcc8b4c5c18a9fe0,2024-08-02T17:35:41.760000 CVE-2024-2170,0,0,758d6332b5fccd657d38a7eddcc769e16fb72e0c1b6514443e29b8614302434a,2024-03-26T12:55:05.010000 CVE-2024-2171,0,0,e9c79cd9676afcf55166b18cc4887c5a70983811183f36611429f962ee8d8a26,2024-06-07T14:56:05.647000 @@ -244199,7 +244199,7 @@ CVE-2024-2209,0,0,50916ada1cacf96d43a1d972ecfda3bad0e1ec46375d0c8cbc94f5904c9b4f CVE-2024-22091,0,0,83ad318ff7eb72e11885fe8311e3c69c9ac72ebfcb366ca77c60c176fd9b8ab7,2024-04-26T12:58:17.720000 CVE-2024-22092,0,0,66ebe933684ad6f566ec7e76e39114c3d857e2ce89b42c11e803d7754031e4c4,2024-04-02T12:50:42.233000 CVE-2024-22093,0,0,78737c5a5a041bf2971052ea66d504da3052933bac50f20cde92ec3ec6864183,2024-02-14T18:04:45.380000 -CVE-2024-22095,0,0,626bfaf44345bbe4e9983a24af7501d010f455b3385d9a6f62ce99af00466cf4,2024-07-03T01:47:03.793000 +CVE-2024-22095,0,1,36ee8f5efcf5eed2b656dc93fefa48f3fffa535f8acf02234f65939ba05f0fad,2024-08-20T15:35:02.417000 CVE-2024-22096,0,0,d2aabc5baf4e1944731bbe14dc56c70c7730b32b8eafc8fca432ae6c9418f5d6,2024-02-07T17:33:26.800000 CVE-2024-22097,0,0,c52c04bcb911e2f1fbdba88150f915908cd262e8c6984450364777d94040938e,2024-04-02T15:15:52.733000 CVE-2024-22098,0,0,904f0b117dc704a8b010c2bb8cc2484cf85bb081982e71724bda610eda9fb22f,2024-04-02T12:50:42.233000 @@ -244784,7 +244784,7 @@ CVE-2024-23080,0,0,1958b4de983bbdffc65821d6463ae99b1b4a9a2ad366b007290df05b55ff0 CVE-2024-23081,0,0,870c1c4df2360c6a0bcdcbbc7e7323672b70deea175c507823f8849ab5657624,2024-08-01T23:15:40.290000 CVE-2024-23082,0,0,7f8e37bde125a04a1eaaf3decfef35e1714f1ae930ca7f44a95252121f38b18b,2024-08-01T23:15:40.357000 CVE-2024-23083,0,0,713a3a31bf1b16621652d130f79628db8361d2685688b49ccf5933491f8dd58c,2024-08-01T23:15:40.430000 -CVE-2024-23084,0,0,f277ffef2808b71ee81115ff1cb4f188dee4659bf4a7ead284f09486269b1e5d,2024-08-01T23:15:40.503000 +CVE-2024-23084,0,1,ccaed5be16fc1a52374972400141acaca3aa08f2280ed991e42060e59b806c64,2024-08-20T15:35:02.813000 CVE-2024-23085,0,0,c2d4a833e275adaea75d4721a85180117d94ed467e962dd33323527ca073d13c,2024-08-01T23:15:40.570000 CVE-2024-23086,0,0,89628d19c526ab52b9632a83c3b6f0fe544645afa7ae6ca603f80e9a673376ff,2024-08-01T23:15:40.650000 CVE-2024-2309,0,0,b4bab766083001057d63d861d742eba6fb7b051d100b953adf8a9460cad67846,2024-07-03T01:53:08.927000 @@ -244978,7 +244978,7 @@ CVE-2024-23295,0,0,f60b5b481bcc709a0e07818ec60448a8b8255b454dac1f32e5ff0b3a39055 CVE-2024-23296,0,0,4c1c20e10d440a721ea56c440f9f9d49de01279fc6b58c55156def98607c7416,2024-08-14T19:32:48.817000 CVE-2024-23297,0,0,dfd56967bab57b4e450ebc4d5ffd5b8e085c43f2dc7ce30d6472eb920ff02a80,2024-03-13T22:15:11.520000 CVE-2024-23298,0,0,a565b18965c275606ac8348acd9993cb8bd15ff52c9c70b79da019a948d277e6,2024-03-17T22:38:29.433000 -CVE-2024-23299,0,0,c511e81be43ab0bab76e86bc6db7a8fc5840f12996fc93f1ff034882f594ee51,2024-06-12T18:03:36.960000 +CVE-2024-23299,0,1,fe4dd82d5102073a81be0172f4d91c213b490a3370bedc852ed979e38d0840d6,2024-08-20T15:35:03.893000 CVE-2024-2330,0,0,9ae945264bb052d68e9c213073b32e3a9e8de8241b1a06dd279470149a8f98ca,2024-05-17T02:38:10.540000 CVE-2024-23300,0,0,7e1caa6fe553583588e73d8cf5caa79d80d218f85cc1a33b34688bc3b7c6c49a,2024-03-13T22:15:11.643000 CVE-2024-23301,0,0,a646d4df741b42c2dc0e4cbabf6dc5f956c04b320d79355488193a17c0d15054,2024-02-21T03:15:08.950000 @@ -245466,7 +245466,7 @@ CVE-2024-23893,0,0,164d34330c45802f3294effcca33fdb409e7a0b03670023eb0749752670b7 CVE-2024-23894,0,0,889e17a969f38341fe271e7476c4c00ec7834f36aa4750d6b24eda8dbc65e9f9,2024-02-15T10:15:20.110000 CVE-2024-23895,0,0,63b9df77b0dfe3156d702037b8256c94f0310299e58028bb29ff7e75ab1ccefd,2024-02-15T10:15:20.403000 CVE-2024-23896,0,0,2d68c15af19ed8b045c5f16b74c7daadbb5e999aff70f245f4f1ca2defc4aa73,2024-02-15T10:15:20.657000 -CVE-2024-23897,0,1,c83d1994f6c073666478d860c9bb4da8143c864413f74371bcb20503700b1742,2024-08-20T13:34:22.773000 +CVE-2024-23897,0,0,c83d1994f6c073666478d860c9bb4da8143c864413f74371bcb20503700b1742,2024-08-20T13:34:22.773000 CVE-2024-23898,0,0,9962562a99e711a1d1b8fcb160c14631afd493f3a9f73290bf49c075765f73c8,2024-05-14T15:01:24.790000 CVE-2024-23899,0,0,ba79d7c391f656b46c5ad4456d441adc8729de1168ad27fcd60687a8d33b9157,2024-01-31T18:43:39.183000 CVE-2024-2390,0,0,593c8d31509ee966f2939016d9952aa22804413956e5e4bcfec8a17bd5fc173d,2024-03-18T19:40:00.173000 @@ -245642,7 +245642,7 @@ CVE-2024-24279,0,0,d6aa4883ec9752c8cbfad9bfaa7a087e80b33df7185a899352a75bf8b8985 CVE-2024-2428,0,0,f184833127d40a3257c1a8462b863bcb6fd84f065fdcd9226171beea0b538ed9,2024-04-10T13:23:38.787000 CVE-2024-2429,0,0,bb9579e5fb707a5112fccfd7e64c52901e3e44384ceafa5a0281658740d435e7,2024-08-09T20:35:03.443000 CVE-2024-24291,0,0,f9a99cce2d5669fe488c53da57cec1a603932ca409a68a957e4a3be597d5560e,2024-02-13T20:13:26.593000 -CVE-2024-24293,0,0,773227dbc7ce53f8a6dcd14b8b0a0c218560b0d6384e5030dad9fe7e55f27c2c,2024-05-20T19:34:58.277000 +CVE-2024-24293,0,1,c875e8188ccf3b7557555abd825e181af9a9ca32c0aff4644dac65d414c40eba,2024-08-20T14:35:04.827000 CVE-2024-24294,0,0,fb53dd3f3a0181debfcca619f6a3363f362852d8c93652ea4617fd4b0661a31c,2024-07-03T01:48:14.450000 CVE-2024-2430,0,0,c79cca8eeb2327c37f864866fd920048670109f57492fac8de77c9e62b23498e,2024-08-01T13:49:46.040000 CVE-2024-24300,0,0,388744db6c38cccadb0f3dab4d8ce8dfab7613b9109ff67770c2e72952f5ecca,2024-08-16T19:35:04.613000 @@ -246098,7 +246098,7 @@ CVE-2024-25004,0,0,b1eaa30b45a2beac602111a556e73283df1fde1d2d56447f15cd2e12b3d43 CVE-2024-25006,0,0,5b722f2e87bb2f2cd1327a954681e67bfe99d5442b01159ab458f524449bcffe,2024-08-01T13:47:32.460000 CVE-2024-25007,0,0,8168166db4b2b463b1c077994d5d41f318578553eda571604b31f6006eab6cd4,2024-04-29T19:48:09.017000 CVE-2024-25008,0,0,edae19780623ecb3fe0e59b27c808259dfd74c0b079a788dd904812d074243f7,2024-08-19T13:00:23.117000 -CVE-2024-25009,1,1,fa4cf85f40c91db0865dc4774b98d0658d2f0fe65a309e270e7f0bbbf51ae6bc,2024-08-20T12:15:04.667000 +CVE-2024-25009,0,1,966b7327d30054a5ec169d9f0377c04b074be52c6507dde80977682b21b1cb42,2024-08-20T15:44:20.567000 CVE-2024-2501,0,0,6ce26352b8e14756a33573972eeb4c8a06096eee07ab0fb0ebb1c9238a943b1a,2024-04-10T13:23:38.787000 CVE-2024-25015,0,0,4c1212c8f769823bd4e7049fb129f848dc20c143fc1cc72b02abca5f7451e069,2024-05-01T19:50:25.633000 CVE-2024-25016,0,0,0e9311458b59df4142779e7a8b1d9bd170deea1a4bb4a555b03bbf822c263b92,2024-03-04T13:58:23.447000 @@ -247855,7 +247855,7 @@ CVE-2024-27278,0,0,7e076b94bb346aa71a90c33bb12c519e49b2bf85e0c9c8c5e64524bb6308a CVE-2024-27279,0,0,25e76b48db9e541084b8b1f041be7e5bed145e75da72a0fa7da4b1fa0a0fcfeb,2024-03-12T12:40:13.500000 CVE-2024-2728,0,0,894b3321a99e458969cde3c150a59b05eb4a60d79495148d5d2320daac930a32,2024-03-22T15:34:43.663000 CVE-2024-27280,0,0,06be16cf339e78f4b79ae71bca9b88fd97cb5e827ebeaaec64aef2e8ba93add4,2024-07-03T01:50:29.333000 -CVE-2024-27281,0,0,ee83f356dc92f03936930b567fcf24a3bc1963f88b3b623d8cf7a4a47e762e49,2024-05-14T16:13:02.773000 +CVE-2024-27281,0,1,7f2b0f122766f676aed91ef9250b5865f45069fd8c6cab642c57fb3b624ebb3f,2024-08-20T14:35:05.757000 CVE-2024-27282,0,0,f669cfc684d64012ac673e23e33d53feb594d1f7a791cf168d4f1b5ba5e9d336,2024-05-14T16:13:02.773000 CVE-2024-27283,0,0,fdbc894980293705e171221d68f90a1ff1ab870564c26395a8794e3b1fa7abdb,2024-02-22T19:07:27.197000 CVE-2024-27284,0,0,241491a708be706e7f2c13ff6e90e676355e3e9263bb0e5d018a757f3dac5346,2024-02-29T13:49:29.390000 @@ -248140,7 +248140,7 @@ CVE-2024-27717,0,0,24b56efd365305b6bc14b31a5e0ebd3ded5b43adf71ab9f369b01e76538e6 CVE-2024-27718,0,0,348ef178d7c72ea2bf9561abf13cadc3c1ef45743840695e6b53f9dba8489836,2024-03-05T13:41:01.900000 CVE-2024-27719,0,0,cc91452d4b82f581b97b47b20481d35d29255b9662a7f1b32120fdd873effa3d,2024-03-28T20:53:20.813000 CVE-2024-2772,0,0,4f628774d2d7059c1b5e8149bfb8c52f3d89a27d409bd2ff21a4dab1c3e0c74d,2024-05-20T13:00:34.807000 -CVE-2024-27728,0,0,e7c0d38189c2eea4ecdc9bcd1a30d0a17ffaaa0a038630a46e173de341693113,2024-08-19T13:00:23.117000 +CVE-2024-27728,0,1,60809830dda72755597fa9fd74cfe701dd5e424bcaf4e985376fe34c8dec441f,2024-08-20T14:35:06.747000 CVE-2024-27729,0,0,ebfc21812e929fc7a4596a0d8e7f868174feb579c24c8114e70bb1b1da144d44,2024-08-19T13:00:23.117000 CVE-2024-2773,0,0,33c85832b0bc105a89445abc4897cecb571d3be80bbcd7cdf96b1db070b9a733,2024-05-17T02:38:29.487000 CVE-2024-27730,0,0,82b96d0d6f0f9b69196bf99ad3fe2d0ba16b7f0a2b1ba49b6b00d0024d7b68bc,2024-08-19T13:00:23.117000 @@ -248258,12 +248258,12 @@ CVE-2024-27877,0,0,f267e4e9b2c15ea5212cd96d8b790eca5b3bdc1ce3ab48286d7c0d66eea29 CVE-2024-27878,0,0,0c018d0060dfa2d1e866f6f95570e39bac870f1d62334bf4a576f22fb4e08910,2024-08-01T14:35:06.007000 CVE-2024-2788,0,0,fae17eccf9cd9e59e0540a9ad532e11d3f58404c6459f605cc04b4c55f908408,2024-04-10T13:23:38.787000 CVE-2024-27881,0,0,ecd3b41ffcf84a1b769c2ce9b805a207566f7e84b913888f092b35189f2e87e8,2024-08-16T17:37:25.757000 -CVE-2024-27882,0,0,215f70f7fe0f120b9a90658480d04b82bb910bef0649bf3a3695b372662a22c8,2024-07-30T13:32:45.943000 -CVE-2024-27883,0,0,00e562d87bb2cee05c5d05a587cc0f60b173fcdf8da584ec4f3bc688b6a40396,2024-07-30T13:32:45.943000 -CVE-2024-27884,0,0,9163e1019a5f9a74a6e203151bba2295557ee823669eab130f17ade0687ddad9,2024-07-30T13:32:45.943000 +CVE-2024-27882,0,1,5ddf2334142d0bee4ddfa2f398cb632ecb7d93b8ecf3478fdf0f165645bf7677,2024-08-20T15:05:39.703000 +CVE-2024-27883,0,1,5c8407bb3533667d9c8babdd5f7216ed0bdeb839d4e78b45e22424db69d8306d,2024-08-20T15:06:34.580000 +CVE-2024-27884,0,1,1ffcb45064d2afeb41a5c21df2f288d852219a4078fd83d8e5df7856bdba472a,2024-08-20T15:07:50.547000 CVE-2024-27885,0,0,e3765a253be02afcb43d4bff90a02eb9cc8683032aa7319a1325bda028b43ed5,2024-07-03T15:44:29.397000 CVE-2024-27886,0,0,ad31e0740b43310393e342341268d0e92dd59ebc6085cf85f528e58105ea7b83,2024-08-01T13:48:53.140000 -CVE-2024-27887,0,0,5a899a07f40b93d343fc212a9957f37fdbcaad3705465eaee989b13ab612493c,2024-07-30T13:32:45.943000 +CVE-2024-27887,0,1,2ff5882aa7c5a764082f306386732f84e203b72bfd9d3fea5e7c9306ba38d751,2024-08-20T15:08:53.127000 CVE-2024-27888,0,0,d03f8a9313606c0d2620cd7f82f60b5166304a45344c6f96cd60a7020c51b7f8,2024-08-01T13:48:54.013000 CVE-2024-27889,0,0,7117aad45d32aeaef1ee1fabf03a8eb1a99ce1846aae926fc9cdd323c7a5b8ea,2024-03-05T13:41:01.900000 CVE-2024-2789,0,0,34742259502804c5b95d3d9e3233d720754fd74f45f9568c62dc8f4e6bc9ffb3,2024-04-10T13:23:38.787000 @@ -248437,7 +248437,7 @@ CVE-2024-28076,0,0,7c257d304897e65890bc306f57dddbb8d08174369e3efd3f8b92793bad3c8 CVE-2024-2808,0,0,e0d3d3b9e325ca6ee7276bd88e3baf37c479e9082bd582fafdd638b137fbd54f,2024-05-17T02:38:31.233000 CVE-2024-28084,0,0,0adeb03c9958c0a142a2b711719e67fc11a910aa963939e76d45a1c62626692a,2024-03-23T03:15:11.583000 CVE-2024-28085,0,0,554d2434ae074519e2f585875f6b1adc962e2a4e8943b3aea63917c9326b32bb,2024-06-10T17:16:24.370000 -CVE-2024-28087,0,0,0f81f2a7efbdffefa164fe86f5be9b3e313d2abe46b50b640c99a0b5ae7ebe7d,2024-05-15T18:35:11.453000 +CVE-2024-28087,0,1,a8c4832eda657cc0d8018b3ce0a9acbfe5de138c01b7547503479ec3cae0cd6a,2024-08-20T14:35:07.653000 CVE-2024-28088,0,0,d733a55d08563448fb2af3f9c7eae0af238ba0d35b6bebaaed972aa3b77bead2,2024-03-13T21:16:00.380000 CVE-2024-28089,0,0,8dcfc5f0af6bda2c62c3d6583b98af8806f63e5c3b009d2d4c4b9e591fef1377,2024-08-19T20:35:09.170000 CVE-2024-2809,0,0,82a495e20989f000a99f2c2b597fd459041cdf90f3f5905ac9eb213a6d9d3a11,2024-05-17T02:38:31.340000 @@ -248820,7 +248820,7 @@ CVE-2024-28787,0,0,ae2fe056558612ea54f7786b2749d8c7eb4b79c4855a2500ae63276f0936f CVE-2024-2879,0,0,dbdb53723be18fbee30aefddb98b892cc05662454ff0dc284d9d7d7d767dab47,2024-04-08T22:49:41.533000 CVE-2024-28793,0,0,7d414f92d43f30000a62dc37a0c80fadf87a5ffc630bb3c26c9945f0e8b7cdb0,2024-06-10T18:15:29.983000 CVE-2024-28794,0,0,c10da1b41da7071b80498b87abd9d687769c0fa94b037b7ebb3faa4084e98fd8,2024-07-31T16:45:28.247000 -CVE-2024-28795,0,0,925632b730be7fc60b182fff4d5d02866b4010bddb97677013338fd3a6f87507,2024-07-01T12:37:24.220000 +CVE-2024-28795,0,1,f736e56121f9e7ebf2951b32e296586930b34c2b92901741a56f804684721218,2024-08-20T14:13:46.593000 CVE-2024-28796,0,0,9309b95ff28ad61ded45c96b0ce61eb28e84237793000fa8c06bf713a7309924,2024-07-18T12:28:43.707000 CVE-2024-28797,0,0,215c6e5211c115cb8a1dd99529c7ef7d500087d4643915a223453edd582d1174,2024-07-31T18:57:00.313000 CVE-2024-28798,0,0,a6356458c4f4311bbbb434bcb07b82d4a8232904c746806c3a615b0a524813c1,2024-07-31T19:33:56.337000 @@ -248840,7 +248840,7 @@ CVE-2024-28825,0,0,2060c8862968982d4a6159b0b62313dec95ecc020293b85f137ce41396383 CVE-2024-28826,0,0,ccabc68ae1502fb496d2010a22f66c953a12ff1a849372d7235937980a01c570,2024-05-29T13:02:09.280000 CVE-2024-28827,0,0,30d6d403e5c79dbab459dc4233554203969c32826737ea25dceb545e947896f1,2024-07-11T13:05:54.930000 CVE-2024-28828,0,0,f569edfaae2cfaafb15d4f5e29614839e3689bfe76be347c8b67efdf6d0be50b,2024-08-07T17:57:38.413000 -CVE-2024-28829,0,0,a7fa399c45c4b30b83fa5874f8d0009a31e3673b80cb4e5fb7a82b85175ff469,2024-08-20T10:15:05.693000 +CVE-2024-28829,0,1,e305f6efb7d898a0ff30783cf29e56094e75fa2dd6dffb8f303a59f53400f681,2024-08-20T15:44:20.567000 CVE-2024-2883,0,0,4414164b8fa79ba498c6ddbb6ab7a825d3f0a39397b4604f63f00efe5e5aaa16,2024-07-03T01:53:37.420000 CVE-2024-28830,0,0,49bb68528483eea32fe70c10feda0199ddfef50b4330a9b74a5779b200dbf298,2024-06-26T12:44:29.693000 CVE-2024-28831,0,0,8b0cc22b019b2f22717d4926d7f18f8c0f1245da30fda97cee3d4dd670ef131d,2024-06-25T12:24:17.873000 @@ -249133,7 +249133,7 @@ CVE-2024-29154,0,0,c24b7a65a861ab0fbc7efb2f7b0dd4677efe572e0b22b8bb6ebb0d687fe6c CVE-2024-29156,0,0,595d020a34dc3c63329ef492697be54cca90adb54515cbfada40f26153450f3f,2024-03-18T12:38:25.490000 CVE-2024-29157,0,0,3110ca8118b2c924b316fb8b417f719cf20fff49178f5804090215ed711693f7,2024-08-16T16:35:08.877000 CVE-2024-29158,0,0,233df1a8f6bd60efc553c6b930d261c8562f8385a13b7e3a3998e2d044729790,2024-07-03T01:52:08.880000 -CVE-2024-29159,0,0,9a119fb563b8f74a63294a27b73a89cf8c5215b9d36b48948639d3bb01780b26,2024-05-14T16:13:02.773000 +CVE-2024-29159,0,1,3493bcc7f9d9390f3f39a450ed64dd3d27402b9a0ffdb92b11cb6e4b32496299,2024-08-20T14:35:13.163000 CVE-2024-2916,0,0,62a74d7777ba9b78e45dbd8edaf3903a6d88704541ec72ec8eada5e4f7d122b9,2024-05-17T02:38:37.200000 CVE-2024-29160,0,0,14277773ec9d53ace5a45e8738713a751d526d84ef2e04b16fc3cf3277fe88fb,2024-07-03T01:52:09.797000 CVE-2024-29161,0,0,5cfd8761d51385bcfe894c39c7820fc9a0931c36e498ce8b651dd3852cb6eb8b,2024-07-03T01:52:10.720000 @@ -249225,7 +249225,7 @@ CVE-2024-29271,0,0,b4d3906e78736be6eca15d6469d3358952e211c417b217d384055581eda6b CVE-2024-29272,0,0,b270e02cad18e4df92dae6e1cbf164c1906a980efefcc9e36d9450cec32eecab,2024-08-01T19:36:05.820000 CVE-2024-29273,0,0,4c07339fa5d18aa28a649c4ec236dc58314e6c0e5cafb23e7bb0325d1434eeb2,2024-03-22T12:45:36.130000 CVE-2024-29275,0,0,019299934d2875a3343e07edeed968a51219f7dc129478a92947831a4c668c96,2024-08-01T13:49:27.553000 -CVE-2024-29276,0,0,fd33b5fb0ca767faf8e9db5f80d97841f83395003d4a98fe75c3e265d0839e4b,2024-04-02T12:50:42.233000 +CVE-2024-29276,0,1,3fe0ff3115a6de0b961257e7bc711a82773397cfe1f1f315880654f9d5c4ac13,2024-08-20T15:35:05.580000 CVE-2024-29278,0,0,1c7d83867b262b09f27588e31bf9841e3af6bdfc0d72746f40dee1d45734adfd,2024-08-01T13:49:28.357000 CVE-2024-2928,0,0,3c94f78fdc9693c8d4fbabf25517e239d8aeb55c719006a8f637d8f4c525f953,2024-06-07T14:56:05.647000 CVE-2024-2929,0,0,513249311f09defaddca00249c92a4d2f3037014552979e20d0e342694062636,2024-03-26T17:09:53.043000 @@ -249341,7 +249341,7 @@ CVE-2024-29640,0,0,a54790ba2b7cb079e0b2a0116aa04e440cc656e156f794122dac80e58328a CVE-2024-29644,0,0,8f85f2ee54dea78f450e0a34d8d144c380c8a4c7a954f54ad9e505caffbc88b6,2024-08-05T17:35:10.887000 CVE-2024-2965,0,0,695a2f4a5898798fb311965c87e04355b559271ed2851691e85a6cb305dd485e,2024-06-25T11:15:49.873000 CVE-2024-29650,0,0,32230dc7c100b4d45992d9916209ac72d3ba4f4a88f0a390b7772dee0091b547,2024-08-01T16:35:08.160000 -CVE-2024-29651,0,0,5a1f415b68fc3f46b7185d8ff5ad3871575de5345b87c667d5c59de8fd5ccfce,2024-05-20T19:34:58.277000 +CVE-2024-29651,0,1,10ced44f5f76b0e20af308caf370e6cc4fceca5031ea22581c3d1437b439d8e2,2024-08-20T14:35:13.967000 CVE-2024-2966,0,0,400ebec10c52dfe133448a888edcb5c95faf833eae277c5e987b3dc9ba62c6f2,2024-04-11T12:47:44.137000 CVE-2024-29660,0,0,92c6a0243a2c1471ce3712ba9ce2ea71347605bcd635b1e9cc6bc9d49c7bb0d5,2024-07-03T01:52:29.550000 CVE-2024-29661,0,0,88ef154f0ac81ededf103463c2b4906b746fd4986090980f76c4c2bc2515ed30,2024-08-01T13:49:32.940000 @@ -250370,6 +250370,7 @@ CVE-2024-30938,0,0,29b8e40617dee21c8890e6dc6801cc20a4d0cd635b3d627aba79e0fa49cbd CVE-2024-30939,0,0,533ddd8e3c3323adc4540b47a20f0ad2914d0e15fa0a4366e01edaff34cffd58,2024-04-26T12:58:17.720000 CVE-2024-3094,0,0,98d623c51c3718f594d063257facb535556f13c6eb9aedf81f112b165abed8fb,2024-05-01T19:15:27.340000 CVE-2024-30946,0,0,7c64f57becf760e1029c7f17f5554dd3b55e452eafcf4a611ce8a9042ae36380,2024-07-03T01:54:24.920000 +CVE-2024-30949,1,1,f4269413bffdfd7c110eb018216d4b2de939e887a2d74a172f217061293d3723,2024-08-20T15:44:20.567000 CVE-2024-3095,0,0,1dc2be507d2862bd5ada87d1bae78a2793983ea84c525f6d54bb8610a95deb10,2024-06-07T14:56:05.647000 CVE-2024-30950,0,0,19fcf7a45168a789955b2198c0713f1a1ef707cd5bb1de038ced1b6154c32fe1,2024-07-03T01:54:25.763000 CVE-2024-30951,0,0,9b092a5976ea47ae9ce6ac6665423991363b55ee54764d7a78a3d2ce95cbd3aa,2024-07-03T01:54:26.557000 @@ -250403,7 +250404,7 @@ CVE-2024-31008,0,0,a974f67fc051176587797d68bd7b8f7fe117012e84496a743cd76182b8fe1 CVE-2024-31009,0,0,3077bfb383403641b21b3b69eff09950c4c56bae68058cba13568ddd6189034f,2024-08-01T13:50:39.423000 CVE-2024-3101,0,0,1fd5146e9cab2be40be9d13d1b212c0046155814cf3f9775411d080d25406f87,2024-04-10T19:49:51.183000 CVE-2024-31010,0,0,50d72a628a998ce24996b17a1abb2ea140f353a3cac2e0be5c534b2a597a6491,2024-08-14T20:35:10.347000 -CVE-2024-31011,0,0,c52737aeca85c35c7482037cc2da41eee9878f5e3873fa6e176e7a4d19947059,2024-04-03T12:38:04.840000 +CVE-2024-31011,0,1,0c33284f804930c14c50cb008bf7c23c7b47af354b75abc23cf3e146495b5db3,2024-08-20T15:35:06.517000 CVE-2024-31012,0,0,ad29bbd0b94faf76dc619f91628d5426bf4af8e806ebef2aed88b1cbb982c08f,2024-07-03T01:54:33.790000 CVE-2024-31013,0,0,bb000ff328032a4f208d94fb503825f394fb805157b8cf8e3eb34f87d47ca3d9,2024-08-01T13:50:40.203000 CVE-2024-3102,0,0,b23588dfddb3d82632a71207907da6ef98bd35bc4bfa522f8686e7f4473229c0,2024-06-07T14:56:05.647000 @@ -251221,7 +251222,7 @@ CVE-2024-32256,0,0,d73ccc721413fd8760cf4b0bafcea5475f35ae263cabc205ad24f200b9e29 CVE-2024-32258,0,0,5dae54230a1765016eb565e9e25d82cfb7f4d23860857f1e9a3317d31d41442b,2024-07-03T01:55:56.647000 CVE-2024-3226,0,0,ec3ef7f04eda709a41c6882e051ba63d6f97210f0092ab0d07f256b6e32ea9c3,2024-05-17T02:39:47.900000 CVE-2024-32268,0,0,f1e176f354d2a721a3d03d34d04aff542fd4d5a3ceb8bd6d31f1fe050fbb883e,2024-04-30T13:11:16.690000 -CVE-2024-32269,0,0,87999e215a4c10f78a5a7d4d8471034bcfca9abe37085e0acad5eb98341375e1,2024-04-30T13:11:16.690000 +CVE-2024-32269,0,1,75c1d049a0a3a93977b99902fd5abf7090233eff3cf7ce63131086bb2771759c,2024-08-20T14:35:14.740000 CVE-2024-3227,0,0,be4e38a7bb6280447d7ff753841210d73248c8711719159edb408b234fc6c3a6,2024-05-17T02:39:47.993000 CVE-2024-3228,0,0,552345bceb07510f666ecb7600c889202fa5865bef7c43374b8be96e73ec188e,2024-08-07T12:33:21.833000 CVE-2024-32281,0,0,2089769d5a8dd576a3c4cba2a6d21b0b986a7a5b7c0a620f0513ace1e68a0f46,2024-07-03T01:55:57.420000 @@ -251278,7 +251279,7 @@ CVE-2024-32345,0,0,e0be9b7aaaddfaff09d7f0da62200edfad0f9dfd9fafabc086d22866c36a1 CVE-2024-32349,0,0,e8628d661ed4f9b016ce895b07c4b1f81e2396ad94ad86dbdc5dd19bb212f985,2024-07-03T01:56:20.913000 CVE-2024-3235,0,0,06f37ba0984e94ee993a6f525e3479843682ef457e4c6a6b183ff5436101e1cf,2024-04-10T13:23:38.787000 CVE-2024-32350,0,0,dbbb89c3361c631418c156338387babdd5ac0c5ea664769170c4374e84f5826c,2024-05-14T19:17:55.627000 -CVE-2024-32351,0,0,f1a787142dafacab2f12230069534a66b5fcdb6065a005f42feb4911ecb9ede9,2024-05-14T19:17:55.627000 +CVE-2024-32351,0,1,b5436c87ccaf28bf509590d7795199a2b2716466be1643041b4221e9c7134cfa,2024-08-20T15:35:07.350000 CVE-2024-32352,0,0,d332e53ad000ad8435c81c28241440757adaa084990611f8a2796504f9f9ebea,2024-07-03T01:56:21.743000 CVE-2024-32353,0,0,95056727f707fc243928d89d790259f229ec041cac954a579b9099dbee969c0b,2024-07-03T01:56:22.500000 CVE-2024-32354,0,0,7a51f481a311ea6ef8a37cf0ab90a70652431f14a7a615163cc4248af79f2619,2024-07-03T01:56:23.250000 @@ -251495,13 +251496,13 @@ CVE-2024-32613,0,0,f1f41ebc1e4e31cd144adfcffbfbbd261f6ca4f784d07dcc93c9e3cf30492 CVE-2024-32614,0,0,0586f7e2db361ba016a10a7d05822a68e00bab4a467fb3c2cc530efcd3b5819c,2024-07-03T01:56:47.230000 CVE-2024-32615,0,0,eed0625c47474188933c85f87c3961846e531f538a59e0623622ab217be95b75,2024-07-03T01:56:48.017000 CVE-2024-32616,0,0,3470660bc21c15733b68c010ee9c1a1f6e6a37d50582163cfc4fb2ca8bf712a0,2024-07-03T01:56:48.773000 -CVE-2024-32617,0,0,639d838d714a58e1e26fee9a8d5b87a6b376d8aeec63ee6262630340d922cc22,2024-05-14T16:12:23.490000 +CVE-2024-32617,0,1,9808be4dd950599e3382ef2e43dc1ef6572adf7dec30285db7d549529012275c,2024-08-20T14:35:15.603000 CVE-2024-32618,0,0,56dab34cac4614715d8aac7022fd1103f44443bc68e99df871e1adb6c0e5eb8d,2024-07-03T01:56:49.560000 CVE-2024-32619,0,0,6ef2911538be2a3043e9cc5c5d55b0b987376f6227128d41d873c541e2af6ec3,2024-07-03T01:56:50.330000 CVE-2024-3262,0,0,73d3499574567e132da96dab69b609fd52df0d56491f238b90ef5cc79dac8614,2024-04-04T12:48:22.650000 CVE-2024-32620,0,0,85e9859841ce948d1529bf9265c5b199e10e1e938238ea78ce808ec9455f9d22,2024-07-03T01:56:51.087000 -CVE-2024-32621,0,0,806b79c7ca5f50b9fa1d18f42f83a60186d0b7d94afcd8c845a9bca37bec5584,2024-05-14T16:12:23.490000 -CVE-2024-32622,0,0,cf9770a1b9df9f6f1a800e40872a5efcbb4c06250c59cadaf82c9c48d2e3b950,2024-05-14T16:12:23.490000 +CVE-2024-32621,0,1,b1900a49fead6eb32fe461bd3265b97b4ed2c3ae5a90c692b810325856615d62,2024-08-20T14:35:16.373000 +CVE-2024-32622,0,1,11de3ee1edaecbf49c410076f38c65a348eee5ce1d4c310c723f224988aa4cab,2024-08-20T14:35:17.140000 CVE-2024-32623,0,0,a94c23c0c8f9c3e6770fcdb3523a72ba3a6a1e1fcaadb35697fb50c3e33015a8,2024-07-03T01:56:51.853000 CVE-2024-32624,0,0,86e096c2049d0b80094b488954ab97fce68d8a6249b2af872f018934e88b002d,2024-08-08T18:35:04.250000 CVE-2024-32625,0,0,3133aab50841c8a349d70e4488dcb72f990b76173b72979ba8d18b0c9cc689ee,2024-04-16T13:24:07.103000 @@ -251932,7 +251933,7 @@ CVE-2024-33214,0,0,8e181eaf2c411bd8942ecfd3d2eed2d851824edcd9b22698bc6806bfcacc1 CVE-2024-33215,0,0,f9635f87bc059511c8393decbd9afdfc8c1adc67d76d6bf1ee0f441704979663,2024-07-03T01:57:37.763000 CVE-2024-33217,0,0,931f6caed27deca16afe48992fe19ff3bc360241c91b6cd818528eeb486c2c41,2024-08-07T16:35:04.690000 CVE-2024-33218,0,0,ee7d69983b37f9c6bf7e7a7a1874f78caedf9c878645e11206579f136a2c86ea,2024-08-01T13:51:46.453000 -CVE-2024-33219,0,0,2dfa02749f2dc3cae0573cb558653331cc8a76159ec20cf26150e2c7103356aa,2024-05-22T18:59:20.240000 +CVE-2024-33219,0,1,88db41ff645af4eb9aa3c0f9c25ab5a9fdf513c3fdf3a77e4c6808a67dc97b30,2024-08-20T15:35:08.557000 CVE-2024-3322,0,0,e55b514365f4edfd08d32461dca85dba678afa08e3277cfa12a38dc6ce7e86b6,2024-06-07T14:56:05.647000 CVE-2024-33220,0,0,94878fc1442fb742de617743986fbb0ae7d177efb074829742c5a4e187579f4f,2024-08-15T17:35:06.067000 CVE-2024-33221,0,0,4c13ec1b720b7ec2ce94f445e942c2447ba67f3bae626d7dba251fb8b3437798,2024-08-01T13:51:47.243000 @@ -252279,7 +252280,7 @@ CVE-2024-33802,0,0,f7e8f11f0f50e76cb80d887fcc8efc43ff16481323dfc06befaf6248f4626 CVE-2024-33803,0,0,3903110335c3f4a5555b9c75678d77501a3d508f001cfefe41ceb0fe3e59d047,2024-05-28T17:11:47.007000 CVE-2024-33804,0,0,6621966fba27f3dd0da67323c048a53a2b132469f199bc736e2057ed57961b5d,2024-07-03T01:58:51.660000 CVE-2024-33805,0,0,58af49a7c74149ca9f823d30f922778154c6ecf6b330b510d828d2d1dcc56f01,2024-07-03T01:58:52.423000 -CVE-2024-33806,0,0,8f20726ccb5adf03520b9d9bf07b90b162a803e606b3520626059142e0fe2fed,2024-05-28T17:11:47.007000 +CVE-2024-33806,0,1,cd37d24c5641912eb3eb7cbcda0ba766c42dac09f73c57888f9150ea991d2a36,2024-08-20T15:35:09.913000 CVE-2024-33807,0,0,2173c6521a5c18022682137c8c79fe1d718736f1b1f1ebd36d2009f7313e0327,2024-07-03T01:58:53.170000 CVE-2024-33808,0,0,6f39d1fde083a58a3dbbe3e92427a29caed98b799e7f73c14d761c305227b5c1,2024-05-28T17:11:47.007000 CVE-2024-33809,0,0,edff1298649e2a5ae7152f9d6f3a259aa8604676595abb8c1afc89471f835fa2,2024-05-24T18:09:20.027000 @@ -252319,6 +252320,7 @@ CVE-2024-33869,0,0,4f0b8e6cca6f9d32a51fb68c703d08999317fde4e1158f2e4b634052839b1 CVE-2024-3387,0,0,b6c52fc8bd53ed03dce6ce87fb2e3918fe997bf17bb459dc0ae53a4015a8c210,2024-04-10T19:49:51.183000 CVE-2024-33870,0,0,6aab1c2dce9666081caef7bc83c709784103f6ae03f40bf6f9b61a08ab839221,2024-07-05T12:55:51.367000 CVE-2024-33871,0,0,6ef1078e0ab851992d6f76ec41fcc0f1160d67fe72b7159cf03aaec7c63364be,2024-07-08T14:18:32.130000 +CVE-2024-33872,1,1,d9583a12976db29af91f98d43d4d94b44c0f81fa7d8dfa525a30375266e2442a,2024-08-20T15:44:20.567000 CVE-2024-33873,0,0,6ea1274dbe138465702444faa4e98a829d2dcf26c68796f03309e9049cdfe9b0,2024-07-03T01:59:05.293000 CVE-2024-33874,0,0,d26fda7bcde0c687055ecb7e8a711b7b405c2f58134eb500396c86a8ce6f97a1,2024-07-03T01:59:06.100000 CVE-2024-33875,0,0,961d0a6c6b6d4c52575d84274296f310505d580e4184903458febffa26176afd,2024-05-14T16:12:23.490000 @@ -252575,7 +252577,7 @@ CVE-2024-34171,0,0,c11d75efd1e3db81369447a70f71be2cc6b80f6bf0101a0af8950c5eb1137 CVE-2024-3418,0,0,502fc54d23469afbe964523306f6a78a43aa4bbda684d42d8a15714665a9197f,2024-05-17T02:39:54.520000 CVE-2024-3419,0,0,55e9e939cce7031c82bff2b248ad3247eb5f6b71fadfe890fcd9e67ed87233e2,2024-05-17T02:39:54.607000 CVE-2024-34191,0,0,dbd580573375fd2d1820adc0049af00ef94f1f54fcce834415d344bda1271c56,2024-05-14T19:17:55.627000 -CVE-2024-34193,0,0,001a9af6af4a066c69d0539418b6580b3e6d54a33e58c9729bb8e9f56780642d,2024-05-20T19:34:58.277000 +CVE-2024-34193,0,1,e28053bd0a22d022848badc9c3f75e2fb164790fa29e948e479e4871e120d21a,2024-08-20T15:35:11.077000 CVE-2024-34196,0,0,fa10f060dde56de72ad527f194a43f50d5d3befcfd4eea3294712a1774de38b0,2024-08-01T13:52:15.947000 CVE-2024-34199,0,0,27f51e6e9a085d1edb0a1380e0bfff4433e52f8f9e25d5bec96a743b9a9ffd85,2024-07-03T01:59:29.647000 CVE-2024-3420,0,0,4a79874e63037882cf5f1fcd7dd6a1cad0c790500da420cf829e4ec3a26df5fc,2024-05-17T02:39:54.717000 @@ -252609,7 +252611,7 @@ CVE-2024-3423,0,0,5df33203eaf14342db1ae141cfe06e52884cff2f7dfa5b3fcca2ff4c13d5ee CVE-2024-34230,0,0,a05a38a79741a72c9d6f5456446d713ef2ea9e7cfac29bb555039d0657084814,2024-08-08T16:35:11.040000 CVE-2024-34231,0,0,bc89f3c9bb61baf29d2d35dc13499882fd5aa1b8a06439e514ae7d635339b6f7,2024-08-01T13:52:18.070000 CVE-2024-3424,0,0,c4f58681c753d20af997e7344afbac06ec6a3371ca686fb7c9b49ad5c93b94a2,2024-05-17T02:39:55.073000 -CVE-2024-34240,0,0,0bd91146d8fc729ed5df9e4184632c68ef13b96fc0c02f7c671568de44e3b0a0,2024-05-22T12:46:53.887000 +CVE-2024-34240,0,1,4c766c603139db83eee212af02e91b2b8554a40e193051836ca9ee0ef44c81ee,2024-08-20T15:35:12.167000 CVE-2024-34241,0,0,dfcf8e51cf99490944ad55b4d7efbac771f91027fe853fbf51050e455e0ec2d6,2024-07-03T01:59:43.687000 CVE-2024-34243,0,0,a8713b22a2b63c2d4ea22c2d96bbc20d582254e0dad56e70459fa42d0764251c,2024-05-14T19:17:55.627000 CVE-2024-34244,0,0,a26bfd7a4c49ba50484ca76340a595b71efe617bcf4043b16d0002cb15e33d74,2024-07-03T01:59:44.530000 @@ -252761,6 +252763,7 @@ CVE-2024-34453,0,0,47a7edffe635099f1bf55d077c40113fc9f5ba8dcdeec8da8790d14933d9c CVE-2024-34454,0,0,9c41ced14bcda502a6d91e8242ee544d71d5283ff3511493207ec7805cdb48e7,2024-07-03T02:00:07.617000 CVE-2024-34455,0,0,c191f5457e9d706ca3323355b6cb28301bf69c793f902f33757952929305bbe5,2024-07-03T02:00:08.547000 CVE-2024-34457,0,0,b14d1b09a16733cbe8e237801f72eb2ee4d363ca08aadfa585a48dbe12e38c8f,2024-07-22T14:15:04.883000 +CVE-2024-34458,1,1,4f4f90b054f8f1192a8674e928c96437c64d6fff40a28b6e682bd77b16c11b4b,2024-08-20T15:44:20.567000 CVE-2024-34459,0,0,e23f2c7438f4601aa9a56de6db52d8787783787763d585bc066caf2ee41c958d,2024-06-10T18:15:34.930000 CVE-2024-3446,0,0,cb97091f9e4759b1c0912bd51a56b30e45443e03748f74b42eff2bfcc530cf53,2024-04-18T08:15:38.340000 CVE-2024-34460,0,0,441531d0808bd0543a3084d408b6b9ab77342b046b0f375a6d08c1971aedd3c7,2024-05-06T12:44:56.377000 @@ -253075,7 +253078,7 @@ CVE-2024-34930,0,0,9fb3b8964b5cccf698fe1af2c09b9ebbf2bbb61e30f2dd6c2b71de12b8d3c CVE-2024-34931,0,0,6450b229b3dcc76dd273a176e1d510aa697ab04ac79bf201d0e27ca4c52bc840,2024-05-24T01:15:30.977000 CVE-2024-34932,0,0,b6b50cffd902136cf64d7ca4507205d651e9df6e7dcd5eead3801eac200721c8,2024-05-24T01:15:30.977000 CVE-2024-34933,0,0,c3dbf950f435984b9b33f4f97b61de10305ed6619e3cc02c8a837894fcd24d4d,2024-07-03T02:00:58.450000 -CVE-2024-34934,0,0,91033aed47bbfeafba36473be7fc14422234407fdb57dacebb401b976b43b78e,2024-05-24T01:15:30.977000 +CVE-2024-34934,0,1,c952d1ae16fc59b4ad6a305c684ff2ae339875de2313f11687526116a6f6a313,2024-08-20T15:35:13.137000 CVE-2024-34935,0,0,42663e6f26362b7ff61277b99a542a862a8644dcdaf267511fb39a33d8f4245c,2024-08-01T13:52:27.497000 CVE-2024-34936,0,0,8edb055c2e80e0324b4bcba4cb55226affc069e205c0fafde60f980bb5eadd74,2024-08-07T21:35:05.650000 CVE-2024-3494,0,0,18f9b9bd36d8a43e8f4c6da36d532e779d9d98429c42e261e00b97ab82c89568,2024-05-08T13:15:00.690000 @@ -253114,7 +253117,7 @@ CVE-2024-34995,0,0,c5ae887edb3d68f5b17625c821aa1f4eef9c82bfd086996cef9a6f896adae CVE-2024-34997,0,0,f1e18585236e7f0a59fe769dd2659091355a2fe62bd1315f5027e11c678faa34,2024-08-02T03:15:48.413000 CVE-2024-3500,0,0,65f7cd29cdae6ff6308db5dac7c1e408d4ae13919a645c3f45d14d5a6eb829b1,2024-05-02T18:00:37.360000 CVE-2024-35009,0,0,3fe7a6685d547c8f13c78e6aa6b52334336d0dbec9afe2301a9c305ba9814939,2024-08-08T15:35:12.080000 -CVE-2024-35010,0,0,d24eb37231999ffbf1e461e69272836338e2106e037fb208bca0adcf07905054,2024-05-14T19:17:55.627000 +CVE-2024-35010,0,1,6e4b79d2c02224bc0070ffd30b8ebbf9821b5f9a967abd7e45b682dfed020dc3,2024-08-20T14:35:18.007000 CVE-2024-35011,0,0,20c56ae7701ad2e917dd6b2ccceeffea8e94a8ddd9a2b2ca02beb893f0a0b7e1,2024-08-19T17:35:16.943000 CVE-2024-35012,0,0,c8bd09796e971cbd360d6bb5909687d1917c7ee2369b2a3730c7a0355d3c5511,2024-07-03T02:01:12.127000 CVE-2024-35039,0,0,16789b799d84c4b57ca393e0c1f64a27f89bdf5208029185a91c381dd5f853e1,2024-07-03T02:01:12.907000 @@ -253130,7 +253133,7 @@ CVE-2024-35059,0,0,dfcf8d668815ccc0d32854da2c20a083e119b7332e8581c76bd10f4eac9a5 CVE-2024-35060,0,0,afba2b727938592df1bdc4e63013255006d044a72a697f992c598613bec84c11,2024-07-17T16:15:04.813000 CVE-2024-35061,0,0,0df2890e20c38a1c44b9989903bccbfb46c27c7aacdaa254a5eaf724f2825eba,2024-07-17T16:15:04.877000 CVE-2024-3507,0,0,e1e1d417278f9c0917e2f747f1a5409d7cbe66638a172abe25b5d37d3cb7fea7,2024-05-09T09:15:09.623000 -CVE-2024-35079,0,0,e84edcd2514df6046335465f030b9492060083fdead2f3e795ca695702202f46,2024-05-24T01:15:30.977000 +CVE-2024-35079,0,1,17d2b5f929ecb69204994e9f016f485442c4a9a5dcd82045a61fa12836a834bf,2024-08-20T15:35:13.923000 CVE-2024-3508,0,0,2b43f9e122cbb6c5d0ee83530dba132ab3fde8d83c6c2582c0a69215807219e4,2024-07-03T02:06:18.367000 CVE-2024-35080,0,0,c9a211365cbd542cdef0b29d59f3b2dfae2b1b61359fa8769a673763d1c1edb3,2024-07-03T02:01:19.997000 CVE-2024-35081,0,0,5f351d35a7c4bf1c7c66c04741787cf7f264d0978d7069822794634f96e6d2d6,2024-07-03T02:01:20.817000 @@ -253205,7 +253208,7 @@ CVE-2024-35199,0,0,10d88a39b30b98eb1ab39fdfe91d64eca78a834d79f0e8d397aca33bb33c4 CVE-2024-3520,0,0,4d2ca8beda165968cfea3b64e955c18436397c1b54474f7a64b510b5eacd13fe,2024-05-02T18:00:37.360000 CVE-2024-35200,0,0,4e081bc266f3339c234fd0d9836610e298ca5ba3771760c1147fa5a32be6afdb,2024-06-10T18:15:34.983000 CVE-2024-35204,0,0,0248f812c6eb240110c4167110975a2b8317634bb6300a9657da495b3589cfbb,2024-07-03T02:01:28.703000 -CVE-2024-35205,0,0,a2e57cfbac4b8021374b26305b7394500fe6ce597517b80b00d88da379a98821,2024-05-14T16:11:39.510000 +CVE-2024-35205,0,1,b114736c6ce96d182acaf33482dfa6527b14733d7c35394119539255eedf2feb,2024-08-20T14:35:21.557000 CVE-2024-35206,0,0,2d45311ddac58ab7849b5dcc4f34358defb99853941e437129eca208b1798608,2024-08-06T15:02:05.777000 CVE-2024-35207,0,0,d2635c7366e1ebe2e4894fe79457104ee16f907d65baaf982977b483f755a034,2024-08-06T15:02:16.163000 CVE-2024-35208,0,0,c327ea7feda1657783c8f89d88776276d84096f0d4b51a5404de61ecb0c1687b,2024-08-06T15:08:17.727000 @@ -253251,7 +253254,7 @@ CVE-2024-35252,0,0,abc4118fdb4313c77e0013cc66829f0782a05e427a95a903d7de17d02f4f0 CVE-2024-35253,0,0,4860462cf567d507b35b85f1b338fbe5c52fffbd9f14118ce4fe8c63db46011a,2024-06-20T17:13:17.437000 CVE-2024-35254,0,0,45ef78e7aab61785b60639ab749398d66c1fb5a7b87988e5d821011437a5eefa,2024-06-20T16:16:47.070000 CVE-2024-35255,0,0,dd2820217033d300b334ae05889b3c3f413c0da4e96707fa039fcafe96b24ff2,2024-06-20T16:31:46.127000 -CVE-2024-35256,0,0,d5a6ae58fc78f0ff4992cb812a54fe658aa14b0129af650e09b305e064058e54,2024-08-08T18:50:56.197000 +CVE-2024-35256,0,1,188bdc643151f39de4a17f861157c38e6eefa48b0ca1783625f64a637491c896,2024-08-20T15:48:42.910000 CVE-2024-3526,0,0,3b86e48cdd64c94b1957dd961f1ea8a5609328c0a5fd236d499daf2f49d2a875,2024-05-17T02:39:59.067000 CVE-2024-35260,0,0,ade48aea1e03059f4c6e4bf7d0aa3b52cede73bf846ea05896b4e57d53575ded,2024-08-02T03:15:50.793000 CVE-2024-35261,0,0,9d9063b6e7979be3a79ef13bd9cc70b3fb0340950dd44d60d9d3d687415ebbe0,2024-07-17T15:48:39.097000 @@ -253261,8 +253264,8 @@ CVE-2024-35265,0,0,66f306784b0cec4cac480e0b04ab07434b85a607c811d4eded9bc25afd0a6 CVE-2024-35266,0,0,72f85b66607ed3ec09a2f90bfb8b5421fbcbe1083bf3c8d31d5232091779c5c4,2024-07-17T15:03:10.610000 CVE-2024-35267,0,0,8d2f4a11b808fec8563f241fc658cf43f5e54d7aaadc09b793c2bc37e252ec9d,2024-07-17T15:02:22.937000 CVE-2024-35270,0,0,d1dc880d5375baa19c5c22ae22578f8e8a49aa76e4f7bae55a316a718926e765,2024-07-17T15:00:46.870000 -CVE-2024-35271,0,0,cdbfc4395a8e92fe3a40b1fd22607b93e804de72bc708206a369eda6febd9bdc,2024-08-08T18:51:09.090000 -CVE-2024-35272,0,0,21cbcac35a76cf2546e4b5eabe4cf122629a8c90c7e6d4aea0ac66e3d7194dea,2024-08-08T18:33:14.440000 +CVE-2024-35271,0,1,3f199c76ff3f5650b64bac70365416389832a7a31f0f804814fbf23ea034da6e,2024-08-20T15:47:07.247000 +CVE-2024-35272,0,1,4c1a47b56d7417b088998b4603214b936945d403bf6190e9e2c7cd926cf7a2a4,2024-08-20T15:47:09.880000 CVE-2024-3528,0,0,c96e1e132295c243d4fa4a90d8abf77e41d771305ddbcf81d644bca2cdde7da0,2024-05-17T02:39:59.157000 CVE-2024-35283,0,0,517940d61eca1185fcc5d68a59f62111cbe8fdc81301b4e7c0610afefcc22645,2024-05-29T19:50:25.303000 CVE-2024-35284,0,0,3a94c448d00dd5059f3fd361118e6cd65d80e9412861f2d6774f390c6aa71d9d,2024-05-29T19:50:25.303000 @@ -253320,7 +253323,7 @@ CVE-2024-35361,0,0,94079fbeae6f3e32a28e0bb042dbf7a904fcf03ef2f5fc193b1b6ac0fc4c2 CVE-2024-35362,0,0,234501ffddb96c378ce0415c69c86b74ffa92255e774ec0584c4ec784483afc1,2024-05-22T18:59:20.240000 CVE-2024-3537,0,0,7295965fffde5e283abb275e5228fcf2f24e25d29556dedbad478c14243435cd,2024-05-17T02:39:59.987000 CVE-2024-35373,0,0,014fa23f7024d690cb16f55fa9fe5c207924e838da0219b265271af9723dff82,2024-08-19T18:35:12.200000 -CVE-2024-35374,0,0,71bf5143a935358076633b16ef6d586d6b493af4d13be33b4867bf136b6a604a,2024-05-28T17:15:10.937000 +CVE-2024-35374,0,1,aa83a1884752e38a4efa40b8d631e010f03947873314106502ec442b10442cd7,2024-08-20T15:35:14.870000 CVE-2024-35375,0,0,ed34ddd9d512918cc00e937f04fcc44b2e98fec270008373eac869e7c2125c2d,2024-05-24T01:15:30.977000 CVE-2024-3538,0,0,9615e321c043201a8d062641e6113a127ad070f2c61985bcd402bdf4990165ec,2024-05-17T02:40:00.087000 CVE-2024-35384,0,0,80c459d6b8b92f35efd27c83c865d17dc86005bdbc1e6e04541d28ddd40786f0,2024-08-01T13:52:39.203000 @@ -253338,7 +253341,7 @@ CVE-2024-3540,0,0,186925567bcf9baf46d3085185099882e7fa1b9d0d70f71c95c65e0aa39f03 CVE-2024-35400,0,0,99f66df5ed6c7fc0ac7ebda8ce86e4f32af2422cba938b231e49eaec8c41244f,2024-05-28T17:11:55.903000 CVE-2024-35401,0,0,e20c7deeda0300f83b1078cc4b3716ac7ed24c4deff40921468ca6f87181fae3,2024-05-29T13:02:09.280000 CVE-2024-35403,0,0,4d9a98843a184aa3f7fed28ea2e26cfcf04b1cff379a69b2f7e72017e9a927ab,2024-07-03T02:01:44.377000 -CVE-2024-35409,0,0,304d708bfe4184b7d6ca360533ea99ab73a36ee47eb2efd3c699d72ff19f5761,2024-05-22T14:30:41.953000 +CVE-2024-35409,0,1,c1e09f17fc040d1a54c6ca919b4e6df91e3a03195ff96673036c48a4d8f8f539,2024-08-20T15:35:15.637000 CVE-2024-3541,0,0,14abae851d976e531eb89e36d00e68f1b4222a58cf78e09467f8f13cc823ff73,2024-05-17T02:40:00.373000 CVE-2024-3542,0,0,5a8537177eac38ffc4c0459430c529ffd4234d4390bfe331be843583f4e31e36,2024-06-26T18:15:15.750000 CVE-2024-35428,0,0,3c09284a2d1421b49e443adf71c33cb44461617fe2c22ed9a85a4142b030cc7e,2024-07-18T16:52:56.760000 @@ -253371,9 +253374,10 @@ CVE-2024-35526,0,0,45f791392c66ed8c499767ccc3e4221d8293b29407aac62d7317c3cd0f64f CVE-2024-35527,0,0,72600462defbad3d94b9b914561cd106abcd4f14940c552d4d0bd67292ce0acb,2024-08-12T19:35:08.817000 CVE-2024-3553,0,0,d92b272ac91b29131b7e7854674ae1f210f8268a2cb6312d80e7312af083b77c,2024-05-02T18:00:37.360000 CVE-2024-35537,0,0,5d87fa9d71542082a5117fd75bd541152a38491d14562b96fe74b3627bb4d282,2024-06-24T19:40:04.190000 -CVE-2024-35538,0,0,1b0560b7245d7b2b5ed17ac54a5db96d69933d6353ee932c7288fbe3f314b5ed,2024-08-19T21:15:09.850000 -CVE-2024-35539,0,0,16ccfc5c127f43006c1fe9ed53eec144452a877a3dfe593d55cc44952e099cbb,2024-08-19T21:15:09.913000 +CVE-2024-35538,0,1,ed04b7d932d0abc622d3f5e76f1c9f5ff5c97c7b20099e46279f32f369e5223d,2024-08-20T15:44:20.567000 +CVE-2024-35539,0,1,1e9db600909dab86e22375fd984c806996170a18584aedf3b711e2cc9f245536,2024-08-20T15:44:20.567000 CVE-2024-3554,0,0,cc60bd735986056555560436c7b58f65485299a8475c11d30802709a9ea4095c,2024-05-02T18:00:37.360000 +CVE-2024-35540,1,1,8a181d3e66a0af1e49ef86a92e589cfecf6990eace3a585cdb9c1b3611c012d8,2024-08-20T15:44:20.567000 CVE-2024-35545,0,0,bc697f72b53789e21cd5d8ac45caf67cd064397c19ab7b48462104e593b9785f,2024-06-27T12:47:19.847000 CVE-2024-35548,0,0,27743d34ac7e82f8c9c7eae383a15382d5ad0f4949e113942667401ad6f68173,2024-08-02T04:15:55.577000 CVE-2024-3555,0,0,70e8594716c631628b2245556d17090b4d4ee8454e4dfa9b7f7905554c7aadd3,2024-06-04T16:57:41.053000 @@ -253383,7 +253387,7 @@ CVE-2024-35552,0,0,5da61d30cefec62b02eeadba1c669aedac74de537006f3b95f682d1b1a646 CVE-2024-35553,0,0,c857d68352282158466678f96b1c496200ed8ff2848f3d43568e03a13031f686,2024-08-01T13:52:41.867000 CVE-2024-35554,0,0,59e9b71b9bc9c32e32fdf267c50239bbb5cfe71a605af00d13cb11c63fed59dc,2024-07-03T02:01:49.550000 CVE-2024-35555,0,0,53add4f9a2ccd19a2ac12920308039f42bc69f18f4655c871d756b3733167823,2024-07-03T02:01:50.260000 -CVE-2024-35556,0,0,45c3d6306738bca44a3b8a088647241d3d6cf0e3f5777d545aac86e652a1c86a,2024-05-22T14:30:41.953000 +CVE-2024-35556,0,1,2b3c1a6544e2b4e1adf1bc47c4f4bd02b8bc27d8e54db277c3b2516f5a48cf85,2024-08-20T15:35:16.417000 CVE-2024-35557,0,0,3ca463097e0f9293244e3113fad94495aea18ea959c1328f2783f5db3f727021,2024-07-03T02:01:51.060000 CVE-2024-35558,0,0,e3fd2a49061dcf165a9f23ddbb89ab4aad5c6769021a7ee059a07965cb38ae28,2024-07-03T02:01:51.867000 CVE-2024-35559,0,0,567b6880d14443b1ae9f48b92c8e2230d656fdae8fe7665c8cab362d07c935a8,2024-07-03T02:01:52.063000 @@ -253398,13 +253402,13 @@ CVE-2024-35576,0,0,4cf028a111dcdddf7b60054ad17a0fe8aad691fef93220823224c4163d503 CVE-2024-35578,0,0,fd79be27425584c76cc2d4b545495b232268e5d494b2fd2516c8d9eaac2f6939,2024-08-01T13:52:42.763000 CVE-2024-35579,0,0,37bfb499a88acccf42bbe9e75a181bacd08a79a39311b6039233619c973ca1d4,2024-08-08T15:35:12.957000 CVE-2024-3558,0,0,f9fa909e69165819ae496c8acd1ccdd67c7ef5aa9a5c6af8d01fcec23b3946f3,2024-07-11T02:52:17.780000 -CVE-2024-35580,0,0,0387db6917a36212f88347cae7a6aab7914a4db72f7693d46d262f85e8b4bfe1,2024-05-20T19:34:58.277000 +CVE-2024-35580,0,1,a43fd10e129fd9e146689cfa2d63929069dd287ced1e3cf39c84ed52a8ef4b5b,2024-08-20T14:35:23.113000 CVE-2024-35581,0,0,f44263214f42e721dd7c3dc00efbb15dd18e867b1fcd80955bdfd7a6cc44bd29,2024-07-03T02:01:55.113000 -CVE-2024-35582,0,0,c8e7a41bc458b4e3122cbc97591153cfd49fcf7d308574391f7c29ac17ee542b,2024-05-29T13:02:09.280000 +CVE-2024-35582,0,1,2219b5579a19c25f0f78733ea0e4d22e0bdafa0a58bb93c103fdebb267edde75,2024-08-20T15:35:17.183000 CVE-2024-35583,0,0,b5c80f126e7aedb5091bd213ec23d58eb7894ac75a15e7c2f39695f5e3fa2ab6,2024-08-01T13:52:43.587000 CVE-2024-3559,0,0,6795a97a10669b581ec15fc558119e6f23b6f2221caf66e80800086dfa7b2bd5,2024-06-13T18:36:09.013000 CVE-2024-35591,0,0,297164a1c967b7eddb21902c9581f5e4cbc525ca943cad4b4c59d356124146c5,2024-05-24T18:09:20.027000 -CVE-2024-35592,0,0,72c678ca31e4ec93bf22d8a1535979b48daec0d6d17d31e168e052fbb672759f,2024-05-24T18:09:20.027000 +CVE-2024-35592,0,1,c1fef65873ac1061d41e08db42afc69241a1ccc24e746aa460028428ca90ae7f,2024-08-20T15:35:17.980000 CVE-2024-35593,0,0,5a7a9fd646183a9cfe0e8b357ffc98e8641fa2decf7b0d864f537dba3ee77a7b,2024-05-24T18:09:20.027000 CVE-2024-35595,0,0,1c0caac8b66ea50c55b6a38567b8221cce1fb5534ed6ea6fa786e54a9487b678,2024-07-03T02:01:55.937000 CVE-2024-3560,0,0,db76ccbf181e1e5da7ff674678a92955a50aac899b842cbcce7ee4c6ed92892a,2024-04-19T13:10:25.637000 @@ -253866,7 +253870,7 @@ CVE-2024-36048,0,0,5a5a6da2bab77110717de4a83cf2fd38c948b3573f3cee73605d8d6a5534f CVE-2024-36049,0,0,51d271179b773ae975431c0c021fa3b0015024baa0aaf9431319b88ebb604829,2024-05-24T18:09:20.027000 CVE-2024-3605,0,0,905473bba2f4b1f833e3696e0eb3a1556acdfbc79f67c22a9c6f82f499950cc7,2024-07-15T17:12:36.967000 CVE-2024-36050,0,0,c50ac6e5d9529aacb1e334d114a2f6f4418d441c20a736ae9e48551abc3029b2,2024-05-22T16:15:10.777000 -CVE-2024-36052,0,0,022010471f20b33cdbb9c0f6e926c1a4caaff0d72570a4d1a2abd38ceffab587,2024-05-22T12:46:53.887000 +CVE-2024-36052,0,1,083dfa6efec8c8b05eaad2f1b8dc2dc652acb748c2d4396b452843d815f40c28,2024-08-20T15:35:18.753000 CVE-2024-36053,0,0,2b26adadb1e10190c0e2e5708c64683c631febead0f4dd9529189a0425d50810,2024-07-03T02:02:43.043000 CVE-2024-36054,0,0,573acf3e9153a838a6bd1e03653f71db08e33e3b8f5328f3fb3cc099e632a6e2,2024-08-19T19:35:07.003000 CVE-2024-36055,0,0,9a65ac3e65fa237426eeec0a5393b74ddf0f405783f600502382f8e03d635757,2024-05-28T12:39:28.377000 @@ -253883,7 +253887,7 @@ CVE-2024-36075,0,0,552ff6b500ffd77937539cdbbf1913236727ad42b7eb03fee9fccc739ae3d CVE-2024-36076,0,0,095e5a8223ddf00346b27a38d3816d5070afb43ba53217d9f4c5235422924fd9,2024-07-03T02:02:46.290000 CVE-2024-36077,0,0,dd4f3e87dbff21add73a266278ac055e49b2117e2fd83b28a0ab86a0527993cc,2024-07-03T02:02:47.107000 CVE-2024-36078,0,0,82760eab7701e5c572c3669adb7bca9f1d77c52b4416e7ef2f3d4f8d4f198477,2024-07-03T02:02:47.847000 -CVE-2024-36079,0,0,1e2dcd2fe0cc0022dd8426ccc07dbea151a33827bd6b4942f04e6d514f334920,2024-05-28T12:39:42.673000 +CVE-2024-36079,0,1,c1c3f90d76e8fea129e6a3d2d8b6537ccb13af6493e9a0206b09271ee41d31f8,2024-08-20T14:35:24.033000 CVE-2024-3608,0,0,75396bd996e12a3ce8a9ff63abbadebbd8d739cc9bf3ff2fa94cd5f3927fb0bc,2024-07-09T18:19:14.047000 CVE-2024-36080,0,0,da30944dd5f9aaf294ce90387953495c39dbdb27b4381b7b68cb89306c216ee7,2024-05-20T13:00:04.957000 CVE-2024-36081,0,0,c544e7869c5ec75fe9184642046715e701981d636db6ea51043baf583a03d0a7,2024-05-20T13:00:04.957000 @@ -254278,7 +254282,7 @@ CVE-2024-36728,0,0,685c6307c04e58fb91aa1cd3d8196094b317c76e0e4421d5d65d9f3c42021 CVE-2024-36729,0,0,d45877829f45f72a36efe808f4ab30639504f5ee409a1f4bbca4482bbbc7cd52,2024-07-03T02:03:34.353000 CVE-2024-36730,0,0,64a3dffa7bbe9fe7e69b7699e79bca595a078505b7c29c8334f44bb856a96c39,2024-06-07T14:56:05.647000 CVE-2024-36732,0,0,89ef79acf914e7fa79f0997bbb77dd27a533cae855c7319e0da9cc89d060d11c,2024-08-01T13:53:14.287000 -CVE-2024-36734,0,0,78caa628b70b20027e0747c6b2f4bbff04deed4a29e98a2858424a546bd5fde8,2024-06-07T14:56:05.647000 +CVE-2024-36734,0,1,37607296c2114d18eb9371884ac39d9c7abe072eefba87ba6dd89607d9b61cc6,2024-08-20T14:35:24.830000 CVE-2024-36735,0,0,77219f23e41303fab14d55459858c38b6f21ffff484d41fa2056fc07bdcb508f,2024-06-07T14:56:05.647000 CVE-2024-36736,0,0,b20d2ef797aa6fbbca71cb0c7c6886935927b9ada97126f8e3cbe4efcdbdd655,2024-06-07T14:56:05.647000 CVE-2024-36737,0,0,4cf60f234f52f5b0202bd739dcb99ce837f78d7b1128c09622cdd4eeba9630dc,2024-06-07T14:56:05.647000 @@ -254696,26 +254700,26 @@ CVE-2024-37314,0,0,f12ff71c38b7717fdd7e5e9f4865b5f2a4d0e11306998c4a7309f7e193ab0 CVE-2024-37315,0,0,78d1052b31ae41f56b435a7566552773a5c40ebb59f83a745739357048c084e1,2024-08-08T16:35:23.750000 CVE-2024-37316,0,0,fa55f12c1c6b94364ef958cbd9bd8ac1444f1c8abe27920becc6ebe00cf9924e,2024-08-19T15:31:28.043000 CVE-2024-37317,0,0,bf6f5201fa0e6db8291edaaa7cb5ee1ff5eb5f2cad35f046dc845dc59cffda27,2024-08-19T15:42:54.980000 -CVE-2024-37318,0,0,82690cfe11e6e50a30476df05f4f79df9c950fc779c797746222a6d5488f788f,2024-08-08T18:36:54.347000 -CVE-2024-37319,0,0,3686b9b3e7ab1d2d1ae743a102fa0469b7c5ebec5d9019efe44c141c29c0c334,2024-08-08T18:39:41.537000 +CVE-2024-37318,0,1,38afd4370285dfd6a0bd5c8732b582a44dc316206bb8fb965fc5324270529256,2024-08-20T15:47:12.723000 +CVE-2024-37319,0,1,67b56f77c248f67df7a3585826289343060de8c61823f26ae408656bd3b2048b,2024-08-20T15:47:14.840000 CVE-2024-3732,0,0,1e5e3029c64a5f725486d32a5d97f2bbd597392012dab477d1543e258f8bb4ef,2024-04-23T12:52:09.397000 -CVE-2024-37320,0,0,52cd5355310316c3c1d8ff3bfc1866f0c347a376cdcf040d922cb358cfc3c899,2024-08-08T18:40:08.887000 -CVE-2024-37321,0,0,3a191e9479e5b6b71ab06432cc1bba0fed6c761564675196ff63873f3627dcd5,2024-08-08T18:40:27.350000 -CVE-2024-37322,0,0,7890c12be3fc7ae6a0de8c762fd62014d3b44321fc99235fe85b2912fa1528d3,2024-08-08T18:41:20.253000 -CVE-2024-37323,0,0,3d88d918c2c47bc73a6a00947073f9fb66d566f56aa316d54e38c00b62ca69fc,2024-08-08T18:41:44.730000 -CVE-2024-37324,0,0,308640419ddff319167bcd6bae859950697f66511d4cb578be7f78476e67f053,2024-08-08T18:42:10.850000 +CVE-2024-37320,0,1,5e509a1b66d3487de29897306d8342f47e514cb0494e32636085e8a1261daca0,2024-08-20T15:47:17.147000 +CVE-2024-37321,0,1,e43d264e800a81e0d6029e42f0d44c2c5a3a79449b2b0be508db95416510ea5c,2024-08-20T15:47:20.880000 +CVE-2024-37322,0,1,d2c3e4ead54adc24099fd08e32c15f700d67b352b7a8bd2d3b4bfc1ce21a81e9,2024-08-20T15:47:23.830000 +CVE-2024-37323,0,1,4d91cfc2869ee17646bfec1969f43f1ccc3bb5b998368edbb19a54f7b2235add,2024-08-20T15:47:26.383000 +CVE-2024-37324,0,1,abc8ac852770b9e6c0196ac0f888a778413aab684c72411dcdd7abfdca6af10e,2024-08-20T15:47:29.147000 CVE-2024-37325,0,0,1d87585535a572046f3269d4a6e53e39d113df4fc37e43ad494b3059408daa64,2024-06-13T18:36:09.013000 -CVE-2024-37326,0,0,9773c953cba0c27a0b048f1b26ec2c714fe23b316770567e128d392682f706a8,2024-08-08T18:42:31.443000 -CVE-2024-37327,0,0,4e41c0148a719afc92c9ab685c007c508f37245b341e1c36c572de2d60cfe4ff,2024-08-08T18:42:50.373000 -CVE-2024-37328,0,0,66b0ddf99d4267d2ddf5b3d9432cf694c4efbd6ffd867ca686aa9fee93d4f03d,2024-08-08T18:43:07.557000 -CVE-2024-37329,0,0,da1d1e1082bcbf5e1b9ff358dc5e13de5addd1dfba2a9ae1e82a265419b97fc9,2024-08-08T18:43:34.633000 +CVE-2024-37326,0,1,ac7472d1fb1d18503007a35e6fe41ee1151b7dc6ef627e10a11e757c5664ebf5,2024-08-20T15:47:31.987000 +CVE-2024-37327,0,1,6d3d3ead5193ba04066eb6050d2d8a7e0a77d229a7111950b5a3609d911907f0,2024-08-20T15:47:34.730000 +CVE-2024-37328,0,1,76f8e407d4325cd98c4d4d2117be19b060f62c1c032de62e6462543f2d8b8dac,2024-08-20T15:47:37.937000 +CVE-2024-37329,0,1,3e07ff17e2e84e93a16fab59194e403fcf9269f10b31fd70980efe91d1a1c3b4,2024-08-20T15:48:13.367000 CVE-2024-3733,0,0,f46a385e0f079b92b4bf82f6537b2845f94de0d4fb1f51bc91c30d173674e880,2024-04-25T13:18:13.537000 -CVE-2024-37330,0,0,43ad8b020e1e2e7b836653135e5107ad1d0f4a4422f58044f21423488370fde0,2024-08-08T18:43:52.897000 -CVE-2024-37331,0,0,9acb6285e6150f47119d04fb2b425d99c3b0a44d48638f0dc5531dfd938d127c,2024-08-08T18:44:18.053000 -CVE-2024-37332,0,0,dfaca3f139be3bf36b4d761904308c7fabbd1ce73099f361a0efe436652e8d13,2024-08-08T18:44:37.320000 -CVE-2024-37333,0,0,709816ae2e1d3bfc31eeaf82e258fdd783bc74b18447a1f705ce3e32db349c74,2024-08-08T18:44:55.343000 +CVE-2024-37330,0,1,a0e64dfb313523112dbd0b3f5e43b99c1f83a9061bbe36c1e3a28d9f8a48e6b1,2024-08-20T15:48:22.567000 +CVE-2024-37331,0,1,2b8d64d1c58d00bb8060c242fe652d9d182db4bd06b4278a1e340d7a4c6b02c6,2024-08-20T15:48:27.130000 +CVE-2024-37332,0,1,c8dad8a7c35be592dd976dbbe753a0fa043c3eaab2043c2d00812dc83a108bb8,2024-08-20T15:48:28.910000 +CVE-2024-37333,0,1,116de8a85ed94cabfaa62e95d97eec42d584b115331bddd8a227c28c8617994a,2024-08-20T15:48:30.967000 CVE-2024-37334,0,0,a531893ffc7dfef3aa639178f6e0f4c9da955e0bb53a80c9725b887255dc631a,2024-08-09T17:01:53.590000 -CVE-2024-37336,0,0,410dea8adcf769dbf6c99783ee79e4122996ff2be4f030bf685fe648f50e8121,2024-08-08T18:45:37.537000 +CVE-2024-37336,0,1,d7e5ad8c9228a8818f983a38e4799774008b5b45573ec89cb37e071787296dfd,2024-08-20T15:48:32.967000 CVE-2024-3734,0,0,1fa8bbb57ad3bce01ae853c22daddc26dfe02917c61007dac4955ee2123008cc,2024-05-02T18:00:37.360000 CVE-2024-37343,0,0,9822edef5552dcf3d43fa2bee27bf9a4a8f63ea4d7138b0de867a8810cd5a703,2024-08-06T13:48:32.297000 CVE-2024-37344,0,0,aabf0e402dbd52c1aa2993f072213b9b1a8b4d49253f8eb436c6f5af2aa88369,2024-08-06T13:49:14.817000 @@ -254984,7 +254988,7 @@ CVE-2024-37848,0,0,b9654691620e5501baad2d1771338ac2aedaf89f42fcedfa6b269a2de242a CVE-2024-37849,0,0,7a15b5118e0a895a8306b103c51dd029b756d9600db3bef6c7132e3f601ee351,2024-08-15T15:35:11.593000 CVE-2024-3785,0,0,e84209989b24c941d7c6f3eae4d5a1283a6975747744d670fcd7c761c7276a68,2024-04-15T19:12:25.887000 CVE-2024-37855,0,0,f1f3ecfbab7ca802e055151d5420d5f7ca02cdfc7b7912208150b9a33ddd284c,2024-07-03T02:04:50.817000 -CVE-2024-37856,0,0,3b2c5fbeccee511c1f982fae5c819d203e5df06806ae143d685413cbae07336d,2024-07-30T13:33:30.653000 +CVE-2024-37856,0,1,aa21591df52866b4d36873a7c84497f6b48135ac6dce1a276524171d9fb8fcab,2024-08-20T14:46:55.027000 CVE-2024-37857,0,0,bbbf66c5ae4e5b03452facf52d12302119ab17f8211a271346d66e2be4704782,2024-08-01T13:54:22.703000 CVE-2024-37858,0,0,145fe3af0cfa4378739729061c766f5fc42f47de0fdaa3c5429a9c029f707705,2024-08-01T13:54:23.510000 CVE-2024-37859,0,0,f5d379e1ba1283dae4ab2dc1c57e5283f78e28f480e0128f7f21d0c8376c4bed,2024-08-01T13:54:24.283000 @@ -255161,8 +255165,8 @@ CVE-2024-38083,0,0,3c2469ed2c873a64c64841f8f046f5b40612bd2c08b8213d90aa91d1b11e6 CVE-2024-38084,0,0,93b36fb5773c86aa7598a5e01d52bf9fb3b5fd024105ba9a2e726961c6b4e128,2024-08-16T20:54:25.520000 CVE-2024-38085,0,0,9b225805c27fe0d0f49cd4b33e0b85b6db3f312de1c827973638cc83fbf3b27e,2024-07-12T15:46:00.290000 CVE-2024-38086,0,0,4f4a5b4f26b1b47848469ccfcb494665e77622145d878e8bcca629184e833a43,2024-07-12T15:45:05.137000 -CVE-2024-38087,0,0,e9389c577c197af0a86410125a64446456d804142f17e0af9a55d82f41522df2,2024-08-08T18:45:56.203000 -CVE-2024-38088,0,0,75112efcb71a9f477730c0c9a37a767c54ff44dcc9d07440920c4abad9f3faa6,2024-08-08T18:31:54.827000 +CVE-2024-38087,0,1,66ba66a5be91550d8640e668ccc3211a4558879fd75dfcd6fa790c3d2a3cd705,2024-08-20T15:48:35.217000 +CVE-2024-38088,0,1,0ced4da1fd4385bb9a0afe1792b7785a4a46f983252d987674ad9e20cbcb4784,2024-08-20T15:48:38.620000 CVE-2024-38089,0,0,f43516e20a67775fdb300c6589bec8c27ea499a370a6240ad0d19a7cb49660e2,2024-07-12T15:42:39.127000 CVE-2024-3809,0,0,e9699ccf97d1a77cdd5a51c26652206ae829b76e33be88373519642da681c26d,2024-05-14T16:11:39.510000 CVE-2024-38091,0,0,a9751e3868c0a113eedbccdcd34b91f06a8adaf90dbd1405bbcc8c2a2900f94c,2024-07-12T15:35:41.100000 @@ -255683,9 +255687,9 @@ CVE-2024-3879,0,0,a6db760401fb215a79d8f48992cc838e1a5c23839a86defd39dd342ef1c5f8 CVE-2024-38791,0,0,5a7109970d4cb90cfbe2865705276e5511d9a261f6cba475b72302a204ad6517,2024-08-02T12:59:43.990000 CVE-2024-3880,0,0,6dd5da57a8412b823038a64a32d07af4547e4dfdd637b54b90b4556bfd34431d,2024-06-04T19:20:26 CVE-2024-38806,0,0,aa1ff0885d521aab036aaf6506258a484aa869322b524482869e0e1df3ac4a48,2024-07-19T13:01:44.567000 -CVE-2024-38808,0,0,bb0e6b8344eeed7e26d70817f6d4edf7cb31c986018adba6a163f9247ea03ce1,2024-08-20T08:15:05.023000 +CVE-2024-38808,0,1,53d74bad70081ff05a1300457357e667e449199d0759115b64cb9ca097eeea3f,2024-08-20T15:44:20.567000 CVE-2024-3881,0,0,3699310594a82ce285b52bf9c21755fa8173160a66408c76064512e538b3fcc8,2024-05-17T02:40:10.360000 -CVE-2024-38810,0,0,a603a78d398d7cf9548f67c3689d42cf7b8c56de9aeed74307fe9000f806a658,2024-08-20T04:15:07.993000 +CVE-2024-38810,0,1,a8d05ba61ad79ab8e573251f3391c7e33071f14ecb67883defa939520cad5b0a,2024-08-20T15:44:20.567000 CVE-2024-3882,0,0,8cf286ca42c3a62eccb821d9ac0678dabad594eee248c127390ddaf169987d46,2024-05-17T02:40:10.457000 CVE-2024-3883,0,0,e6bda202b9fd54c10f25f29dd8ae0cebb83b1538aee636944c2fd66bf4045fff,2024-05-02T13:27:25.103000 CVE-2024-3885,0,0,9b28a2ee85edfe77753e71858fb1438bd68a9b6ee299843f3a5752cca4753d01,2024-05-02T18:00:37.360000 @@ -255794,6 +255798,7 @@ CVE-2024-3908,0,0,42c7c9b2b31f61816d945d69672e5e24b20e282cc849fd87286a4170779d81 CVE-2024-3909,0,0,ea272c17ff869087d9799ba3efa606456d1ea78a711f72e5984479fd9f006e55,2024-06-04T19:20:26.763000 CVE-2024-39090,0,0,4ea45c01dc94b6a5905ea4f25d30b677051f8a6abd6f770805bb3d0f6dca7071,2024-08-01T13:55:23.317000 CVE-2024-39091,0,0,f4a8f0933c6d25f598eacdb963a85c2dcd7a3357118123548313549391b5d7d0,2024-08-13T21:35:02.617000 +CVE-2024-39094,1,1,de22017251a33b96f73dab86fc1a649c22660fc7149e3d8b505bd367896cc213,2024-08-20T15:44:20.567000 CVE-2024-3910,0,0,5517b92ffa84ce0352fdc1fcc785da8fc488f0a213ee6670945494d32f02de6a,2024-06-04T19:20:26.870000 CVE-2024-3911,0,0,554ab1929819d1eb25e95db5b6b72b7d88b66260392eaf976b13306fbbfd7fd3,2024-07-03T02:06:52.050000 CVE-2024-39118,0,0,c73221ddf1d7aabf1cde04e3cc8495d2b93ac9b8498b2f760ce56c4f1b9d2289,2024-07-11T18:30:13.010000 @@ -255864,7 +255869,7 @@ CVE-2024-3926,0,0,5b04461367e6759c792ebfb9ad8f25b57b29be658a49f3088676d8721c7c2f CVE-2024-3927,0,0,c053c5f2098184ebda7812ad9ad17f8e9bcb0fa48f3cf62ccbd3c0beff2bc975,2024-05-22T12:46:53.887000 CVE-2024-39274,0,0,e6293a55fc2e07d4badaf0b6ab097c48e8ef50320910d51d55d3f365db2ffa3c,2024-08-01T16:45:25.400000 CVE-2024-39276,0,0,6f0f039dcabac20e005cba2452b1ca645538948e13817be1991e8b89038bb468,2024-06-25T18:50:42.040000 -CVE-2024-39277,0,0,da44e9f6b14f33e5d22339f98a1af8621d431ecd39b0e0bcdb259c56dded4baa,2024-06-24T19:17:48.380000 +CVE-2024-39277,0,1,19274852af9a44581ed7b5da931e969f3e8eeda9b8a06df6105e4982b2efa2f4,2024-08-20T14:35:25.887000 CVE-2024-3928,0,0,3771bfd5d61bb660489266159da597b0f2838c8fcc0fdb41f660ee68264744db,2024-06-06T20:15:13.813000 CVE-2024-39283,0,0,7e83a28d459584a18fad7bc6f4a90edde32d7c5d57455883e60a94eb392f2afb,2024-08-14T17:49:14.177000 CVE-2024-39287,0,0,3866b98246a17928edc319695455d791c225269ac0799e186aed4a8cab730e7c,2024-08-08T18:55:19.180000 @@ -256021,7 +256026,7 @@ CVE-2024-39491,0,0,af25979e19919d2c32f2a4545b8f16aa1b2a079fea20c3993dde8a730fddf CVE-2024-39492,0,0,625213f757b099ac014e1ec8aa2bfb66b87e041fe2911867f1bfe6984535b4b6,2024-07-11T13:05:54.930000 CVE-2024-39493,0,0,1e9db7e81ec34cee90fac11925a12057887fa787e4909a68e8233bca0ebf86c1,2024-07-31T15:38:54.880000 CVE-2024-39494,0,0,cd5b98761898c18d5798c0adfe37b87761d11b3a6881346f26e7cf24a0210e13,2024-07-24T19:17:25.057000 -CVE-2024-39495,0,0,5f2b306056792f1d74b23afd1a1654b401fffd98eba66c1e3da089b7156ac6f4,2024-07-24T19:04:38.953000 +CVE-2024-39495,0,1,882ab91a71cdaa0b14beca48f2b2546ecf350f5bc761609487e97f811c1f052c,2024-08-20T15:35:19.527000 CVE-2024-39496,0,0,f3e0050f9f6d4172355944986adc84657f7bcf89e594796ec2a4a696594f9b81,2024-07-24T19:02:36.660000 CVE-2024-39497,0,0,2d6d1942d32951f62bed9c7f2b517cbb03d4fdefc867fdac7e0afd61c8c01f96,2024-07-12T16:34:58.687000 CVE-2024-39498,0,0,06e845e5de946a201f3f5ec4d08d83e4ee56c45943b0facff867fb70de094147,2024-07-12T16:34:58.687000 @@ -256171,6 +256176,7 @@ CVE-2024-39687,0,0,1f0dde45c697bd142eb547e4c25395e40bc6f58804b4b24f10fa4126a251a CVE-2024-39688,0,0,dccea6cc179f4688243addc0514825c9dd13727763645739ebeb475d416db47a,2024-07-24T12:55:13.223000 CVE-2024-39689,0,0,86295f6760848f0b510226e65028fed1b62502a931685ba6acf948103d5d29cb,2024-07-08T15:49:22.437000 CVE-2024-3969,0,0,017089a8e0e25cc18c41dde22c453ecf92ec4c4a53bf3304535dbfbcbb40fc3d,2024-05-28T17:11:55.903000 +CVE-2024-39690,1,1,84be1dc15d4558b1a1f0e0827896ca9422a203fd1acd8a1df897400847ae00a2,2024-08-20T15:44:20.567000 CVE-2024-39691,0,0,5b1b13e200d826d3f40f75a75371b183af197da1146b1c1721e666feddcea9c6,2024-07-08T15:49:22.437000 CVE-2024-39693,0,0,3aed4b78b258f1f000b7104a802f9a4117c3d840404e28cf8e3ca8b4234aedba,2024-07-11T13:05:54.930000 CVE-2024-39694,0,0,381b8ab296ca7ac884a99d2ccce1d7cd1ffc3e5e3c8e60b132c7b247508328e4,2024-08-01T12:42:36.933000 @@ -256558,9 +256564,9 @@ CVE-2024-4076,0,0,3600a7160ba6cb63d73da78d982aeb737757fd1783e0b44697873d9ae49c2d CVE-2024-40764,0,0,ab85577e2cb5d9a786ef6b191ba8264da7952ad06ab8f1b0e070c99f55710d56,2024-08-01T13:58:00.227000 CVE-2024-40767,0,0,0f0f227d49db4f76a18af060eeadd57ea0ca5da0ccc7bd26ef12905f9453740a,2024-07-30T19:19:40.767000 CVE-2024-4077,0,0,d4f08c4fa42913c8d00f3fecbe96233f1448e9383bf97ebcbeca4cc0f2c8ae2b,2024-04-25T13:18:02.660000 -CVE-2024-40774,0,0,483e12f808c531a14958b63b18c7b808a1a2dc4eea454596ca9f8af390db8f68,2024-07-30T13:32:45.943000 -CVE-2024-40775,0,0,ec50cfc3cd0d30f65e2041e53d8486457bf2cd050c9af791a783a25e92c91eba,2024-07-30T13:32:45.943000 -CVE-2024-40776,0,0,ca1c476d5b6fc0d7f4324dd7746cfb293a238a36aa88bf4a3efb507bcf5ae58c,2024-08-13T18:15:32.063000 +CVE-2024-40774,0,1,20f4c2f88088010929acd58158f18d58b2de8f6cd0c1c18a2a116c0b40766ad5,2024-08-20T15:16:40.210000 +CVE-2024-40775,0,1,8aef9d109dbb0d780ec4813a97b4bf6f73e438a8664a8d41daaf0d3da2c64c66,2024-08-20T15:17:36.110000 +CVE-2024-40776,0,1,bde28e5ce522100b1947b28e83fe26259fd8f81a796b9faa3009da5263d3ba0d,2024-08-20T15:19:59.547000 CVE-2024-40777,0,0,cd5278d926d6f988af1dac03f9f51dab9fbf246f9272703e05ee69de8d4e128d,2024-08-01T13:58:01.910000 CVE-2024-40778,0,0,805751bd30b6edd2e2069ca4076d787379e4932e01d376de666b7a6538c40407,2024-07-30T13:32:45.943000 CVE-2024-40779,0,0,99b1388f0787b3d66e8466b19be5a36ec3ad00dbf1a137f8d5a77f6832b5d4d1,2024-08-15T16:07:27.437000 @@ -256631,7 +256637,7 @@ CVE-2024-40899,0,0,e950acc969e56b6fc4b2198a92989ebcef19e4b4c9a9c8ad08fee90da2bba CVE-2024-4090,0,0,bd5db9aa43fdf043c385c9f06c114ad9fbfb60a7cd8406c1329f0be062b40775,2024-08-01T14:35:12.593000 CVE-2024-40900,0,0,d5b683c8350615b20febf47a29bbffae93edd0a350147e3cd873aa7a5a37926c,2024-07-12T16:34:58.687000 CVE-2024-40901,0,0,e26097fb6f292c0ef621a3948768a962501ab86f3daa859d54d1945bd865aa16,2024-07-12T16:34:58.687000 -CVE-2024-40902,0,0,2f7d4ca94747f48550a0025dcb58bda474d1a7adef8eacd89e2d7ec7535468d0,2024-07-24T18:52:23.540000 +CVE-2024-40902,0,1,4e014392b4dbdf4c3eaa1eaf547c1f15e32d34ee0d2ed889e6560c95939bec29,2024-08-20T14:35:26.807000 CVE-2024-40903,0,0,651b7373d15f2926785ce0de2df21ae36288d984de87f3f47e275557d5da218e,2024-07-24T19:01:54.317000 CVE-2024-40904,0,0,9aa568b0e026595888acd360a993289314f39d24eb5e574eafaa70b28e216bd9,2024-07-12T16:34:58.687000 CVE-2024-40905,0,0,96eb254d5f8b6d07fa83b1d2229752059acc8f42da01741b8cbd4eaae04230ff,2024-07-12T16:34:58.687000 @@ -257065,11 +257071,11 @@ CVE-2024-41693,0,0,1ab2b4b7ed8f921d2bbd47d1a0a36dd7d080353c42c5a60fc142ad6c40def CVE-2024-41694,0,0,2beb2cafa0b59f0afe42f2c196fff55bc2e400d880d35147a1b32c39271b6739,2024-07-30T13:32:45.943000 CVE-2024-41695,0,0,cfeced4f0e3fb4495c4233c92c745e7bccce82ccc90ae4a6ab56dbb48fdfcc87,2024-07-30T13:32:45.943000 CVE-2024-41696,0,0,35f7b98c6839466c4d2a4eebac08206f0700aa8aa3101c5b590c4468fe7a3828,2024-07-30T13:32:45.943000 -CVE-2024-41697,1,1,0e39d709db8b7f128921881304ffa3c1d2e9ad61adc468350a8861246f4f9484,2024-08-20T12:15:05.313000 -CVE-2024-41698,1,1,adba2018df2ddf73f23abafa04b53ddd04276a58e8e79a7798cb87c2d0ba6029,2024-08-20T12:15:06.007000 -CVE-2024-41699,1,1,05d944ce148e0aac0790ef19169a095d029a6489f699528da28073c94cb7442b,2024-08-20T12:15:06.650000 +CVE-2024-41697,0,1,7783775d1013d7e957d577002032c70eaa058363036b6b7bb077a7b2ee378866,2024-08-20T15:44:20.567000 +CVE-2024-41698,0,1,e40475862588902a5e009eb99645c8d2e3e2dd117efa431603c9b6967e1e9929,2024-08-20T15:44:20.567000 +CVE-2024-41699,0,1,f2401b6777b0a11e8f5490dbedeeb9afcf03478de82dbc698878e6eed4bc593b,2024-08-20T15:44:20.567000 CVE-2024-4170,0,0,62435f89f96f29247c44c5e589e7b97688efd61a202de53db89b1fe5fd4975dc,2024-06-04T19:20:31.883000 -CVE-2024-41700,1,1,c0bc9c19ce12da233b94fb17cb0046d2d87acefe399d9f3b074bf0738db587d2,2024-08-20T12:15:07.143000 +CVE-2024-41700,0,1,3462462fad0fddef375740da32d232c879628b29f2cdae5057660af90196a0e0,2024-08-20T15:44:20.567000 CVE-2024-41701,0,0,dd24aefcbab2e7aed118f6b42dbe2e651c1bc0fc56ceb2d95afa6932def1c843,2024-07-30T13:32:45.943000 CVE-2024-41702,0,0,f2f834cb62e19913572ef56e0684de02f9402451a44fa1f9eb0dac16f09c6db8,2024-08-08T20:31:10.510000 CVE-2024-41703,0,0,41c5e0de4e6f71abb99bf65b9b9d8795b6450a23d530f3b9308a194d3b5a310a,2024-08-01T13:59:05.890000 @@ -257226,6 +257232,7 @@ CVE-2024-41995,0,0,79638f0d10c16b237f07db3242d98d294e87bf4205be8c6d9c3c7b9079070 CVE-2024-4200,0,0,4cd240b08c44457e11ab7d0e46f05e7d4edddbc268bf54e61982ff7b6b50f3a4,2024-05-15T18:35:11.453000 CVE-2024-42001,0,0,4178167c5884ba9b865d78b76d46373d2c2af76307324b0a18aafab1961fb4ee,2024-08-12T13:41:36.517000 CVE-2024-42005,0,0,a7f5615408f39d5455fecdacdea4974d1dedbdfa4135e3f25797c09478531f93,2024-08-07T20:48:00.083000 +CVE-2024-42006,1,1,7c9ea4325bde54cb0392559d0cf8d02dbee33e07c543ed3907cca47637f09739,2024-08-20T15:44:20.567000 CVE-2024-42007,0,0,e1546757cdc0e5c84d17bb4943631a838464f4ec8f81323b11df4d863b67b3f8,2024-08-01T13:59:16.630000 CVE-2024-42008,0,0,54c5efe7cc13cbb13be4a33dc9811a7d441226bfd6f8fc26ec0019f7ccb6db29,2024-08-06T16:30:24.547000 CVE-2024-42009,0,0,b6a6b7e03bd3d7f2ada73a4d7d0bdaecb6dc8a9c6d65a8f836b258bd083ab66f,2024-08-06T16:30:24.547000 @@ -257484,9 +257491,9 @@ CVE-2024-42320,0,0,3bb9745120c3e683aefbafbca3ae9140002adac221663a12333f744da45f1 CVE-2024-42321,0,0,1716db5db6c984bf2ebbd691b80440a9181fa253c6bc8c5d00954d830484e312,2024-08-19T12:59:59.177000 CVE-2024-42322,0,0,2accb2a45b605eba549de2a0c83236102f9dab689f1b61dc800f0c45a0f92db4,2024-08-19T12:59:59.177000 CVE-2024-4233,0,0,e3336c43dd885f8db6271cd8e49f7796169d1b724e733d53d39e8dcd56cab238,2024-05-08T17:05:24.083000 -CVE-2024-42334,1,1,0335754e5d21a0f775db36029a4f55d3618ba3884b597925321a4edb0615c033,2024-08-20T13:15:04.930000 -CVE-2024-42335,1,1,291822ab823c9db0538df30ba1730d3f1db294afc4e2b4c4af46bd191c8f8933,2024-08-20T13:15:05.317000 -CVE-2024-42336,1,1,b2ac5ee23b1952f0577bf83940ba82689073cfdcfe6930e314d53947dbdb9437,2024-08-20T13:15:05.617000 +CVE-2024-42334,0,1,36d922c7aff1cbc406d7d1b44890a9833509e3e270339a0dfa4e888751ed0cea,2024-08-20T15:44:20.567000 +CVE-2024-42335,0,1,a5ed85480f5d7ad18009700b8af13efde681e0f7cd9008cca9a4d118664b8840,2024-08-20T15:44:20.567000 +CVE-2024-42336,0,1,9d50c356f0d4adf09aca00c9c846bf696f6bb56ab685e11cd2eb3baef191e723,2024-08-20T15:44:20.567000 CVE-2024-4234,0,0,18c98986f4d0c323ca7a76881b57d07f11d740fced15b647da44016411c790ed,2024-04-26T15:32:22.523000 CVE-2024-42347,0,0,9d56c3d6f460e2251d08d50a3e874b7efeb364cadb050367418d1be0b31e15cb,2024-08-12T18:52:08.163000 CVE-2024-42348,0,0,9049ba06c12fadbe924de4e1d7650091813be7f3a3306b9434f7ebd8620eed32,2024-08-05T12:41:45.957000 @@ -257506,6 +257513,7 @@ CVE-2024-42365,0,0,cd9316acef63aa01c9388716e86faa1c498776bc0209be92960fb577e4f0b CVE-2024-42366,0,0,26d79ce86c657c865adda744afaa0f4e93052091893cacc16340b64f87dbee28,2024-08-08T18:55:19.180000 CVE-2024-42367,0,0,78b96b1f30a7354fdfb7431aa08d9784ec8c3726b77126448b6109517286436c,2024-08-12T13:41:36.517000 CVE-2024-42368,0,0,de4f48ab04f32dd7f3db383df19cc416867f89e8ecae60c2fdd0bef001ee0d34,2024-08-14T02:07:05.410000 +CVE-2024-42369,1,1,8a933389f3d26cb55a043d5173c573c8ee7309a659b6254a355b5d9c91a9c398,2024-08-20T15:44:20.567000 CVE-2024-4237,0,0,c38818d0c288b1eec57a9be9e655b05254cb3f3487787a1ecd91e69d9c20b38c,2024-05-17T02:40:19.580000 CVE-2024-42370,0,0,62e839a91edcd64bb21dabf32c60522dd52dc9540883662a6d8c03c0ecbecadd,2024-08-12T13:41:36.517000 CVE-2024-42373,0,0,295f57d389a740d58ca7f1197ba4847ae8998d712f5bf5435ce1e4024bfbdcde,2024-08-13T12:58:25.437000 @@ -257585,47 +257593,61 @@ CVE-2024-42545,0,0,f468a16273bd93e60bf7c85edbb037a37f95ddbef27d46e806b8081634956 CVE-2024-42546,0,0,fb60d203dacd557a0d6c3dd4a088a3933e203b772ae4b090e279b0a2f7b980c9,2024-08-15T16:35:15.603000 CVE-2024-42547,0,0,35eeb010fca94dc794f14fe3c29b0586f2dd6b453f1de383f4e89dde1cb85973,2024-08-13T17:08:12.543000 CVE-2024-4255,0,0,35fd058a4cc0a80e19d25400a3e944345c636d8ef400085f905d7b019af7edbf,2024-06-04T19:20:34.420000 -CVE-2024-42552,1,1,edcea8350a649359608d878c2b9f374e5615388df7903f8b4ce3514a0c290caf,2024-08-20T13:15:05.933000 -CVE-2024-42553,1,1,f2edb6eccb17b73a391844d865af522e7902b8df0649c2de6674aabdf33d0cd6,2024-08-20T13:15:06.073000 -CVE-2024-42554,1,1,b08e6f968d01c8acb902c77f2be9dcab19447e5f54a5b8c2e4da91f07d8fd251,2024-08-20T13:15:06.190000 -CVE-2024-42555,1,1,47bc194887cd8b6390fc9acd712e261d3c5a4217f31e29ddf6dd586fc47d9c5b,2024-08-20T13:15:06.303000 -CVE-2024-42556,1,1,d7cbd1e745b515ba2e34fe26a6d0d7d2ecb79f041c1cd83ad01f4170629fcd9e,2024-08-20T13:15:06.420000 -CVE-2024-42557,1,1,b81a7a178cbdce59e6dba516d5a565766a3aa2b4487dd1e24e6634232bc4f5f2,2024-08-20T13:15:06.523000 -CVE-2024-42558,1,1,01bb61defe10b86cc9158a32a5eb5991d76053cc724aca2429bf2997981033e2,2024-08-20T13:15:06.623000 -CVE-2024-42559,1,1,1f7bd4c6e1958008243cc068f6cd3e40893ed5832b9b444d10f8c0d6d2943cd2,2024-08-20T13:15:06.730000 +CVE-2024-42552,0,1,05029fbe912027602aebaf8833cf288ec3cd361d07011e6c98e55751bb0bdc6e,2024-08-20T15:44:20.567000 +CVE-2024-42553,0,1,a130f818cc35af215bb4f9ff5cbd2c965ae429d27ae742dd82ae61c53713023f,2024-08-20T15:44:20.567000 +CVE-2024-42554,0,1,e7093d400617647f295578e1e2a0acba43985e714edb761c848d698d7a6942ea,2024-08-20T15:44:20.567000 +CVE-2024-42555,0,1,ac88e73c097975aea321550d05a3edfa3d9ed7277738f9a643a004cb9a3c6eab,2024-08-20T15:44:20.567000 +CVE-2024-42556,0,1,b286d781ca4217f09767061e338f1832e727edabf2570c00a0b4398fa64ac107,2024-08-20T15:44:20.567000 +CVE-2024-42557,0,1,e02af384cbf4fcc983c541e561ec4a31ffa2ceb039568e1dee77a1c459bebde7,2024-08-20T15:44:20.567000 +CVE-2024-42558,0,1,371e1b475363ca9ab0ef1a0631c2d4ba1c617e2a9233b416a9af8296f5102f38,2024-08-20T15:44:20.567000 +CVE-2024-42559,0,1,4d45ddf400474390817a8ac1a2ff0963d53cdb9a9bd84676cb100d92654ffd45,2024-08-20T15:44:20.567000 CVE-2024-4256,0,0,2885dad709315de5112b738946979afcb06c4d717b1b754bf7bfd87477f08c3d,2024-06-04T19:20:34.517000 -CVE-2024-42560,1,1,12353e342f59329ed9c9fe91ab39512396d50d91aaf497eb5d24ac7524a7c720,2024-08-20T13:15:06.830000 -CVE-2024-42561,1,1,5cecc5cda05dbf2076b8c4d0d38dd974ea050be31e610808d0edb0fb56ef4e86,2024-08-20T13:15:06.920000 -CVE-2024-42562,1,1,8d119a041f38e85845404483e034bb9d46494070ca6e87d934dc6f8e1caf3c1c,2024-08-20T13:15:07.020000 -CVE-2024-42563,1,1,5aa10b11afb9919f02de91b6e4aa99211cc4e0b7e682d85cb6204eab3bd8a75f,2024-08-20T13:15:07.123000 -CVE-2024-42564,1,1,4dd317755ddfe2b7c71508b028f3acf510537024d1a71c8cbe04814a882414f6,2024-08-20T13:15:07.243000 -CVE-2024-42565,1,1,4108cca8c1090c4ed0a5c3e9c0a8fe9148e0a395ef8003dcd14c9e8b6ba96635,2024-08-20T13:15:07.347000 -CVE-2024-42566,1,1,c13555238328ac423da93ae3145c0ea54c4417cee348ca178a07bff102620f59,2024-08-20T13:15:07.443000 -CVE-2024-42567,1,1,fe67942dcb03efa4c7f3478f8c9c829ac9d7afad6e7b44232545f1f55a090bb7,2024-08-20T13:15:07.540000 -CVE-2024-42568,1,1,3808fa7dec6020429d7767d7fb7167c3f8e6f7482bca343dd67b9d32b78add55,2024-08-20T13:15:07.643000 -CVE-2024-42569,1,1,b1aef212df038e08c698364f08ba795d0d8cd4e25a882a360b7a5c1ee201faa7,2024-08-20T13:15:07.733000 +CVE-2024-42560,0,1,c0799c598305de35440da631e485f642a443916feaebcc7c30becf9d638f912b,2024-08-20T15:44:20.567000 +CVE-2024-42561,0,1,851b224ad04a9881247fc5fa1c3fb46325b04d8a33b689b57f61279bf963ea10,2024-08-20T15:44:20.567000 +CVE-2024-42562,0,1,13e649eedf16c223074c629f9b222066606e26e4c8804ba1b7f06a0d4ef59116,2024-08-20T15:44:20.567000 +CVE-2024-42563,0,1,40129ab7d8048132e234dd5b3a3d8048368dc40b360ab46b202db5c49bfeff90,2024-08-20T15:44:20.567000 +CVE-2024-42564,0,1,d11dd74cdbc88c75461941d9a4470126fb867541e46ed51b0c7bf5d3da3ec994,2024-08-20T15:44:20.567000 +CVE-2024-42565,0,1,c46a985428c5e4995f85fb7e943a9edcd2e1467024d9c70fb26a35143c205198,2024-08-20T15:44:20.567000 +CVE-2024-42566,0,1,f7c4193b6e25675f1fd9795bdcfaf6f6e14fecf748df40210753a66a25da34ea,2024-08-20T15:44:20.567000 +CVE-2024-42567,0,1,68377933341179df3a476ae91cba855a4b18ba137fb8c56fb636bf9c3df148d6,2024-08-20T15:44:20.567000 +CVE-2024-42568,0,1,01ccc6dcc47dc5700cf3cc130beef5afa932e01c0bddd838d26a2642c7293ed9,2024-08-20T15:44:20.567000 +CVE-2024-42569,0,1,f76f3abedf3ad947132c58c545fc465fdb5188ea36ce8163ffa521a1f6ff273c,2024-08-20T15:44:20.567000 CVE-2024-4257,0,0,e0d599f1bfc48408556261adebbc05066e8b6b86cdfabfa8d99484b6710fdc92,2024-05-17T02:40:21.330000 -CVE-2024-42570,1,1,4f20e8c8db2ea3a78db4e51e47dc70a190f2638b1f475da04edfd9a62439e03c,2024-08-20T13:15:07.830000 -CVE-2024-42571,1,1,8b769d1aa59c0a9917c3e1affaacd95cea49cfa6f87d2d48d152897523602d9f,2024-08-20T13:15:07.917000 -CVE-2024-42572,1,1,5ba728d62fb8126fc5b604dd664f1e1cdab9ebb40124b7d0b0fa4c41aad345c8,2024-08-20T13:15:08.007000 -CVE-2024-42573,1,1,36b7766d2befa06458bc9df75b45da1c94dd516e85d0136df243d520cd1082d2,2024-08-20T13:15:08.097000 -CVE-2024-42574,1,1,81408df3f3a9e4b3bef1a2ccfc12929dd101ac417e32959cfb0c8a9c55695c15,2024-08-20T13:15:08.193000 -CVE-2024-42575,1,1,c0624f67d52d8cdda4da33bf7de3e641daa258371888447e25e291eee4d3f57d,2024-08-20T13:15:08.283000 -CVE-2024-42576,1,1,a022f7dab66e05f20c95e333526ea90cdcf8521df67acad012352fd634755e0d,2024-08-20T13:15:08.377000 -CVE-2024-42577,1,1,1c91c08aa8a3f1c6ea256dbaaaa5fadb98103c334a5e4a1aa5cdb5635b84060a,2024-08-20T13:15:08.477000 -CVE-2024-42578,1,1,fd8de019d32ee68409e62a28a6fb25068bc9612d20bd3f88237c7b6e29439c2f,2024-08-20T13:15:08.573000 -CVE-2024-42579,1,1,807dfbdf86b6f636c9ba6898cb85ed86b8923975205727f24f4036b6a407be39,2024-08-20T13:15:08.687000 +CVE-2024-42570,0,1,aad81ca000a18e735d4201af7e7e3f7d9b0d622114e545963a2a6b86685037f9,2024-08-20T15:44:20.567000 +CVE-2024-42571,0,1,1c554bb814a228d2952a27acace697648b5faf72b3d0b65c235a3480b0e47c2a,2024-08-20T15:44:20.567000 +CVE-2024-42572,0,1,126962f7ac97dfad95cc268dbc268718fa32df05ca10c4b5ff2c9c3a32c2a74b,2024-08-20T15:44:20.567000 +CVE-2024-42573,0,1,1e21888771d4b7d45592dfe8c5f31922c592bd2540bb3ae3fada72d76e0e6cce,2024-08-20T15:44:20.567000 +CVE-2024-42574,0,1,1f59b8e56a101692f7a854b0c254c160c2a00ff5df11d13d1b7b1f8c05a93fb0,2024-08-20T15:44:20.567000 +CVE-2024-42575,0,1,71f34ae57daeb8877d3a30e16bc2eedd6a9a8de1429f29c8c70b51d1a42df955,2024-08-20T15:44:20.567000 +CVE-2024-42576,0,1,9e9eee3e539e1c8cb2f349516e67ff6f1695aef6e625313baf1aef5135a99989,2024-08-20T15:44:20.567000 +CVE-2024-42577,0,1,84a2e11bebf6320927bda4a0681e6c2f8b953c02ff4eadfe92c943b500781a83,2024-08-20T15:44:20.567000 +CVE-2024-42578,0,1,e49e6d1eec15d8971d4646a9d9f4fa585ff2792aff3d9892d55116d7caa208d1,2024-08-20T15:44:20.567000 +CVE-2024-42579,0,1,0585538f9b5f24884fdac13436bd67d1fd5829c1b74794210d8b0c050a31b4bc,2024-08-20T15:44:20.567000 CVE-2024-4258,0,0,cedc452cf08b1d582601f74b54055702e4527b179d19ae6d21e1fa7a35e392d8,2024-06-17T12:42:04.623000 -CVE-2024-42580,1,1,cf4406b29feee4b42daef4406433123a750a30983d173c68371bbc5b0b595004,2024-08-20T13:15:08.793000 -CVE-2024-42581,1,1,737beb31e0a22db07565133cff1451e8670057a279deebb941fe77db88d12a96,2024-08-20T13:15:08.890000 -CVE-2024-42582,1,1,6ea8063fedd5a5850315087616af0a1527fd14225fb6fca3a3fa646052e1bcfc,2024-08-20T13:15:08.987000 -CVE-2024-42583,1,1,39d18898205ceb500e315d2db0193b06bcd17a26714c5d3098d7462d8be705c0,2024-08-20T13:15:09.077000 -CVE-2024-42584,1,1,f6d7f32221e725ba6da2cd1474d6f47bd0d43de0f8fb21052de9240ee73b5d6d,2024-08-20T13:15:09.173000 -CVE-2024-42585,1,1,916883996a52f9d565b60a9bcb14e2a5a3a08eaed88c0107d3670c989580d43c,2024-08-20T13:15:09.273000 -CVE-2024-42586,1,1,bc084c3068820fdd0b6b81ff9ecc3502fee34b3c10a95bd22dc6621c64823539,2024-08-20T13:15:09.367000 +CVE-2024-42580,0,1,9cf41da90fbdf51a3f673847853f71a604dad474a366d7dd7be6abc1543ba0e1,2024-08-20T15:44:20.567000 +CVE-2024-42581,0,1,c9494f6cd260798eb0e639ba83b178aaa60937cfc2073d404322a352e262af1c,2024-08-20T15:44:20.567000 +CVE-2024-42582,0,1,e9b9b9c92763f2234a9cee391ffdb6bcc4f64fb2da1ecd0653de5ebb7fe6a707,2024-08-20T15:44:20.567000 +CVE-2024-42583,0,1,cae321b49a199240f8739c2a2c1ed8ce22de180e37aec176c9b71bd43db717ba,2024-08-20T15:44:20.567000 +CVE-2024-42584,0,1,547db4345dafdee39ffaa64277c067b846e6b23f555b2f488f71b1ed2e7a12a3,2024-08-20T15:44:20.567000 +CVE-2024-42585,0,1,4799b3e21ee7e2d4d89d04795313ca3814f3b8a00c3a0ff277b89f0a79fc56a6,2024-08-20T15:44:20.567000 +CVE-2024-42586,0,1,72b86089870de6ed13ce0ead5aff1c07a6a654758adb3046d0bd22699fd96ecd,2024-08-20T15:44:20.567000 CVE-2024-4260,0,0,16d46a0b5bcb66a093fc7ed1472e8a955d65f29368360dc29eff1d3d84145b9b,2024-08-01T13:59:29.547000 +CVE-2024-42603,1,1,7d9d43155587aedac460a5d1ab64d0def887d83bb672ef6602d0f228595e0cbd,2024-08-20T15:44:20.567000 +CVE-2024-42604,1,1,c9c8978a1ff0508c491960cd28ceae738b52daeffde14edbe507cd264dd6399f,2024-08-20T15:44:20.567000 +CVE-2024-42605,1,1,7477524def7f7df3e6386c0be2e5c2a86d654ef30074ab37dd3e43bda96faa9c,2024-08-20T15:44:20.567000 +CVE-2024-42606,1,1,de007737c8b6561af0c53a0aa78c8b8b97f9aa5b673afb35e514ac52dd4fcf93,2024-08-20T15:44:20.567000 +CVE-2024-42607,1,1,201ff192335ce150d8828361c21967cf06c2bbf71c188908e5a048fbe5becbd0,2024-08-20T15:44:20.567000 +CVE-2024-42608,1,1,8ead7d3513622cd9cafe6103807b025cedcbbac585441bda0ed3d95a857e9389,2024-08-20T15:44:20.567000 +CVE-2024-42609,1,1,75dca10ad410fc7fc5276778c712afa0d90093a4c45f4e47443e24fabe59e5d7,2024-08-20T15:44:20.567000 CVE-2024-4261,0,0,cad163d5402c8383e323c083e324c4342bcfec07494a0960d776456fb2ab221b,2024-05-22T14:30:41.953000 +CVE-2024-42610,1,1,50410fbf8cc245dcd783f5fdaff20ea6e5d19138947ff473772a8802bf6aa5c7,2024-08-20T15:44:20.567000 +CVE-2024-42611,1,1,4b46a68de0f26cb8582e64cbb2affc3b4f5188ce18f0e7180ebd3413b5a05711,2024-08-20T15:44:20.567000 +CVE-2024-42613,1,1,f028630859a0633ed1e1bb92756851e83682b631cfd4be75469b42dde2eeec51,2024-08-20T15:44:20.567000 +CVE-2024-42616,1,1,90ebc0bebd55c5801efb817a3e7ab17f558c021b69a36235e165fb7a039f647d,2024-08-20T15:44:20.567000 +CVE-2024-42617,1,1,997511794c2c60ead90a7b2a6b16625f6b87f89611cb63eb97754d678eb3e6ed,2024-08-20T15:44:20.567000 +CVE-2024-42618,1,1,a890970fd198a552c3dafcca8d918c1f2bd54f3082ac0303219d0ba9289b2f71,2024-08-20T15:44:20.567000 CVE-2024-4262,0,0,eb43fbaec8efb92a09683be8d89079c39bc088d0014f0d5047c7a435bf15c8e4,2024-05-22T12:46:53.887000 +CVE-2024-42621,1,1,901864535dc10fd17bef7a16472cb6221e82046b753a7f8f30b413cb6704c4ca,2024-08-20T15:44:20.567000 CVE-2024-42623,0,0,bc6ed2a4c8b4194e95ad5cff4494c1d77b65b6e029288a20eb974c9e2fd7502c,2024-08-13T20:35:12.777000 CVE-2024-42624,0,0,13a200a50303b94ee2a9c0f889b5dc513260afbf05e91cf9385719f04ea77284,2024-08-15T17:35:08.070000 CVE-2024-42625,0,0,a336ad04b717d78488d075fbe4f05189cb75b4a8481071a35a5b1b1eee244b14,2024-08-13T17:37:07.567000 @@ -257637,16 +257659,17 @@ CVE-2024-4263,0,0,ca3576d1d67e220dba5bd29258a281021ffe39453fa0c4f20e91ad0ccbfbb4 CVE-2024-42630,0,0,4fff96f7d5cfbd5e5589e0968506019fde3792b2edc6b60a8aaf8334fc6488be,2024-08-13T15:35:22.433000 CVE-2024-42631,0,0,1f47f8877d49e8628a42d74c73cac60b8f382fa6d5b7f60da5c7487aa880aef0,2024-08-13T19:35:12.050000 CVE-2024-42632,0,0,6db2b07353e1fe8433bb94ce7c82367301221ecd513a59df2e5f1960150683fd,2024-08-13T15:35:23.410000 -CVE-2024-42633,0,0,126c15d16c7bea8f5f0fd28b3aed8972f01d9a4964f8b2518721f48b17c481ca,2024-08-19T18:36:20.123000 +CVE-2024-42633,0,1,724ee4a5ccbcae174eb0098106711ea1f2598ce5fcef047128187b28a6431ef9,2024-08-20T15:35:22.763000 CVE-2024-42634,0,0,6658d1cc4139c37b2ef0667c6ab1d67862bb441366a987a8fc3849f65e0dd18f,2024-08-19T13:00:23.117000 CVE-2024-42637,0,0,91efd00f3a0c93af0bfc6d360416502bb044589161185dddb1564bcf24f65c8f,2024-08-19T13:00:23.117000 CVE-2024-42638,0,0,f8a971101f7cdf9fa56d822dabf1a1d2d2e6eccbd0431f9555d3577ca133854c,2024-08-19T13:00:23.117000 CVE-2024-42639,0,0,1a5c2259211b7b8d7a3c9ad7a85700d339edaffc744195b682680689ea5c39c4,2024-08-19T18:35:13.310000 CVE-2024-4264,0,0,aceade487dcdf82d5a23a178a070b3c07d4cce69337175854977fa24341a320c,2024-05-20T13:00:34.807000 CVE-2024-4265,0,0,674cb78ce8c95e07c05495b52772b5d4a079c608362a6e67c2dfb567e6b8517a,2024-05-02T18:00:37.360000 -CVE-2024-42657,0,0,9189d652a51cff209c28ecabe9400e739d91fda304e5796d6780bd977277adf7,2024-08-19T18:36:20.123000 +CVE-2024-42657,0,1,b71a35267d2dcff86020e5479b86ef29c7ee0782e2571f9625702557c6f5f4bd,2024-08-20T15:35:23.980000 CVE-2024-42658,0,0,ebcb04a44ee6ff12cd57d411c4d84c51e828425675a45b111c40a36fe5a58823,2024-08-19T18:36:20.123000 CVE-2024-4266,0,0,4e57f554a9a502210e7298e86f8a93b4c9fd8085f966eca22533475a40566a21,2024-06-11T13:54:12.057000 +CVE-2024-42662,1,1,62954e8bb39d9c50722d31504cd50d3c759986e7cb4e3fba00aff21ff92bc7fa,2024-08-20T15:44:20.567000 CVE-2024-4267,0,0,b21b1be134b642d147ee55ecb619e0382fab4366c661a291e53904c7941658dd,2024-05-24T01:15:30.977000 CVE-2024-42675,0,0,92c6b6457955ed616d1577d62ebea7dcf172d2ecdd66922f34ded7a7ee2d3b6e,2024-08-19T09:15:04.283000 CVE-2024-42676,0,0,ee04f7bab8ee13bdc864d5bc2a4a11bd3644007d71c7b1c26d6531bc1196494f,2024-08-19T16:11:33.843000 @@ -257675,15 +257698,15 @@ CVE-2024-42745,0,0,d2f467113cda4cc30e7255dcf19a80218eafc314dce633f11469c2e4a02ca CVE-2024-42747,0,0,4d1c99e860bf6905b5d644799ef0c78895a722730457e9c7bd1d214b39f83bc6,2024-08-13T17:35:04.540000 CVE-2024-42748,0,0,52e6e14746af30f6f3124891b89bbdbe775ebb6c4232d3347332f267006d05fd,2024-08-13T17:08:53.510000 CVE-2024-4275,0,0,c229bc373f94c5248df137d0b0d9ca9d61bf79f845040a419335cc081cba5e27,2024-05-14T16:11:39.510000 -CVE-2024-42757,0,0,95625a6e50c27ce340e8acfc982700097d9fc83730e49a1ee849ddb378ae13da,2024-08-19T13:00:23.117000 +CVE-2024-42757,0,1,7f6ba25a82908bfc7acb20e761fdbba6f23f597232f39843fc1cc43949e3074d,2024-08-20T15:35:25.190000 CVE-2024-42758,0,0,78591070e9343c09b0ea814d5b331b967691862f9b02d6e8c624fb011530a86d,2024-08-19T18:35:14.237000 CVE-2024-4277,0,0,ec975a6ab8cd435ccab2b915965095df8c992e1e8e765cf73bc6d545aa3b1e0a,2024-05-14T16:11:39.510000 CVE-2024-4279,0,0,dfbad3c4052d0097199e5a57f42abb52975c0de3af4475a04c90870b0d97f015,2024-05-16T13:03:05.353000 CVE-2024-4280,0,0,f46c38f13eff52b4d020fb374e18f92e6528a4bade2042627b2165ccf7b62772,2024-05-14T16:11:39.510000 CVE-2024-4281,0,0,cb48c26c252b1c83fb4810210335ce05e1fcbd94e5804419418b4f73b9d5c028,2024-05-08T13:15:00.690000 -CVE-2024-42812,0,0,50e8adee2bf3236ea63b95458622b06ce0fc233a32c6dc2af63faa949dd1d699,2024-08-19T20:15:07.070000 -CVE-2024-42813,0,0,924f25d6a737e9d8299317af6541fb3dac7cc9fa1fb49c20e3f455632a6861ea,2024-08-19T21:35:07.210000 -CVE-2024-42815,0,0,ba908a9c445dbb07df360dbc293a923793c9fa93ec50501c96ffd3e8f0459947,2024-08-19T20:15:07.193000 +CVE-2024-42812,0,1,d754a1b3fa22845b1ec28a5e3b423343f3a09420e9ed62b3cb19e2fa117c33b2,2024-08-20T15:44:20.567000 +CVE-2024-42813,0,1,ac2ce0206860ac49c7a00dc981456912113a83f39c5bd8ad9fc9aeb5495f6bf9,2024-08-20T15:44:20.567000 +CVE-2024-42815,0,1,9051c382ebd1f29c26e246d2f3f62493123d2bbc60db2e29fe5c1c945861f223,2024-08-20T15:44:20.567000 CVE-2024-4284,0,0,4fbe27a80563712e41b6422ac48754a31c657da862cab89b959335ecaf13d90e,2024-05-20T13:00:04.957000 CVE-2024-42843,0,0,147a94e278dd08ceb9ff0b00f505eb868d7a1e59c01ddecc9d1420e344e9ec86,2024-08-19T19:35:09.180000 CVE-2024-42849,0,0,476a8b05abd0e5119b7af3cdc63ecacc25e4b753be03084352759f8b34a540b8,2024-08-19T13:00:23.117000 @@ -257804,7 +257827,7 @@ CVE-2024-4318,0,0,7b0a62dc8691f5e6f2210e7e19a78c6d4d5c9f053f662e7593a96cdc8c097a CVE-2024-4319,0,0,7ca0245a01df3d5ced472265b32f90c6f6a22a37af3715d5589379ecac1f6a24,2024-06-11T13:54:12.057000 CVE-2024-43199,0,0,94150f8459e19abf18625a946d8a507867275817cd3d9928084030fcb7fa8330,2024-08-12T12:59:48.253000 CVE-2024-4320,0,0,f21f873c3bfeb896c071276000f6bbe2ae4420d2f2c3184178334c98a666705b,2024-06-07T14:56:05.647000 -CVE-2024-43202,0,0,403cde958a51af9acc480f0f95630c40baab10f0bbf6cb2b53237e18afff9101,2024-08-20T08:15:05.240000 +CVE-2024-43202,0,1,9ce3457395226f6b2d3e3ae28bae28adde4e9867d0df01a0022666c3aba587f5,2024-08-20T15:44:20.567000 CVE-2024-43207,0,0,e22c5710770b6cfc075b06ecdaad97a6d82c458382d84efdd62d5cddbde66f6b,2024-08-19T12:59:59.177000 CVE-2024-4321,0,0,9cab2a859d144dd765da27aaa03d49bb12083c0b11abfa900a9b065f4ea718e1,2024-05-16T13:03:05.353000 CVE-2024-43210,0,0,38b1ddd569737ddf84a414c75c09c54bffe5570d779b3b2b7d84160c7c88ff6c,2024-08-13T12:58:25.437000 @@ -257873,19 +257896,19 @@ CVE-2024-43307,0,0,756435dd685e6ec1730a305e988ba2e01786ffce6cef7ad1c53c4b8372b4d CVE-2024-43308,0,0,69d0620714881b9844f3cfb48d168468350ec94f18e61edc0e6e8e74a91b1458,2024-08-19T12:59:59.177000 CVE-2024-43309,0,0,ae9ffc5777a2ca9fc1d6ae36a20dcccfb7bd846279b2270069c08a95bc60ba1f,2024-08-19T12:59:59.177000 CVE-2024-4331,0,0,f83a1d11dfb2c744e38bc97e75352f54247538f697e111d3b125724e343ab75a,2024-07-03T02:07:25.070000 -CVE-2024-43311,0,0,d82e383c4b076f47597b45188e29fdc1277768934a5c4f19c7c0b04440cf6838,2024-08-19T20:15:07.283000 +CVE-2024-43311,0,1,a0f8b12007c335b7c931dc515cccbc7b0ce9a673d7ae4a860b8788ba11cdc88d,2024-08-20T15:44:20.567000 CVE-2024-43313,0,0,c53c97bdb9b1fa19aab2af1cb1b43fa0465e27a5f29b44731ef613ebedef081d,2024-08-19T12:59:59.177000 CVE-2024-43315,0,0,e6014d85dffd349f3b2ce7320cc3098b6f662e4bd5c45fdcd4617c84b6eaae10,2024-08-19T12:59:59.177000 -CVE-2024-43317,0,0,ef003ac3654690b8a1b975d5ca5417c797debeebd38a26bf062481a5d1881ef2,2024-08-19T20:15:07.480000 +CVE-2024-43317,0,1,deae729303ac5b60aa6b622a0415dd60fbdfaaee209a8500c7d589c2c68b55ac,2024-08-20T15:44:20.567000 CVE-2024-43318,0,0,79a8e26aa72eb11eb023e3b493d059563983e38893c3fe6e33721b1cd776d8b8,2024-08-19T12:59:59.177000 CVE-2024-4332,0,0,229e2a44f62342d9fecf4d77bd1ae1368633da9c89a437515cafc4b1ffcbd9b7,2024-06-03T19:23:17.807000 CVE-2024-43320,0,0,ccee38afc2a835bb009830c4531368282e9727bc0052e4d4c17d31bfd55ad002,2024-08-19T12:59:59.177000 CVE-2024-43321,0,0,bb703b2de13a267b8724635b0dde06893a82d0524de00aebee7a6b84161b8d61,2024-08-19T12:59:59.177000 CVE-2024-43322,0,0,e2ca647ab771c590c5e49dd4792b17cb2a82d2c1efaab05806782389dbebd2e3,2024-08-19T12:59:59.177000 CVE-2024-43324,0,0,33fee068f1fdc9b6c272e60c8c07be2143ad8b3f7322d5fc2bc8d91bb1530540,2024-08-19T12:59:59.177000 -CVE-2024-43326,0,0,6d6e2a2749f7699db5527ceb8f84a94e9927740050e8e0749253275d3a75dcfc,2024-08-19T20:15:07.667000 +CVE-2024-43326,0,1,4b4201c18581215a5b56fb12e75b3d09f6bbdb92546d9bf78577651d9ba94f8c,2024-08-20T15:44:20.567000 CVE-2024-43327,0,0,a8f936582a6b445f01bc77c962aca7769e9a1c49bc866607b819b7c4fd48f5ab,2024-08-19T12:59:59.177000 -CVE-2024-43328,0,0,0d19fba9649d0768398fa613065548a086906237cb6292217dbf0ddf1af60583,2024-08-19T20:15:07.853000 +CVE-2024-43328,0,1,45b76704130d3d162b10a10d0e1610ea82761ed70e22ff8c701dd47566965f65,2024-08-20T15:44:20.567000 CVE-2024-43329,0,0,26a74de26b02346cc9aef959a49d84425cfcd1e61c70d1d7eb5550839aec98ac,2024-08-19T12:59:59.177000 CVE-2024-4333,0,0,640575820e0b30891814a5a9385bc808a4cb1fa6f8846116192c877d2f9953e9,2024-05-14T19:17:55.627000 CVE-2024-43330,0,0,18c9cc1b418e02c0186c70603a33b75d4945832a6fdc2ddcfc149e88ac786f4b,2024-08-19T12:59:59.177000 @@ -257893,7 +257916,7 @@ CVE-2024-43335,0,0,dde6dc17375e74f502f7f2bfa9005d811d4652c2ebc27ff9b5ef099712712 CVE-2024-4334,0,0,0bbc9e9de57a0c229384d6d19ec0f1942ba088838a67e65a09daa4455a2054dd,2024-05-02T18:00:37.360000 CVE-2024-43342,0,0,ee642e0e72d4e0e4ec6b9a91be938e0b4b5b569cf7ce0c2f528a0acbf756353e,2024-08-19T12:59:59.177000 CVE-2024-43344,0,0,379496d95a40a85d8ca980cbd671a249672d41d04bb66c9b9dcaac6246ede174,2024-08-19T12:59:59.177000 -CVE-2024-43345,0,0,8309cfbab18da12cc26abd14bff061c306958dba686f1a69ec1ffc2bbeb300a3,2024-08-19T20:15:08.047000 +CVE-2024-43345,0,1,556fa7350890a25a21bcc01fdb9aa5e355db1c5d283d4a3a13c75236275d6c79,2024-08-20T15:44:20.567000 CVE-2024-43346,0,0,570d0cbe7918a4fb4c0a3bd9c07365439742f024e036e2f65c29c7f9160e1fea,2024-08-19T12:59:59.177000 CVE-2024-43347,0,0,a069bfc58b83fe59c8005c1de81afd5aa4891713ad4051f4fc9cde4e734ceceb,2024-08-19T12:59:59.177000 CVE-2024-43348,0,0,4e587a486ab64b74f27c7a0d66471182d7fcb8dfc3a2efb9e38ff5b79c569ce9,2024-08-19T12:59:59.177000 @@ -257903,7 +257926,7 @@ CVE-2024-43350,0,0,9cb5938cb418224b70fa131bbeefb55bb31a9bddc4e871598a5180ebb0340 CVE-2024-43351,0,0,4f1a44dd0b092b1cbc40294ea3c1e20ba66e414acc7c7ec139aec5d1c68e6c14,2024-08-19T12:59:59.177000 CVE-2024-43352,0,0,07311db07e42253e292f873208eb8f7da45aad78c36050ff71f1c14b42155a03,2024-08-19T12:59:59.177000 CVE-2024-43353,0,0,63ba11fd8c07de3459ae027affa4265b156cbb90703f59d7d8cf9f7e3e549de4,2024-08-19T12:59:59.177000 -CVE-2024-43354,0,0,fb004d96e3443dd2f4b64dda1f0f14d7858998ca65a32e9e30f8530fe47f3b23,2024-08-19T20:15:08.233000 +CVE-2024-43354,0,1,7fe0d70c3381bc58752b4a1e37f29b9d4db102b7222c66e8c7dfaaf7ee6ee2c9,2024-08-20T15:44:20.567000 CVE-2024-43357,0,0,843c188c76220c12bbff3ab3d1983437698ada4d60a6933ff05615bf550f6a01,2024-08-19T13:00:23.117000 CVE-2024-43358,0,0,fbf8fe905c3ca9abb9115b42cc5614eccd0cebf28f3e14adb9347834e27ffc3a,2024-08-13T12:58:25.437000 CVE-2024-43359,0,0,65d4fabedd6480e45a35d791ca8acdefa39599f7f2c5dac0d8096fc11d685101,2024-08-13T12:58:25.437000 @@ -257918,16 +257941,22 @@ CVE-2024-43370,0,0,63a4b6e00d1567d9d6f653490e2b73cb49023bb731b98d8f0b3fa5d3f581b CVE-2024-43372,0,0,a043dcae2b6cd795ef3b53e2a2297979218d8f1c42273b50d63478eed641cb64,2024-08-19T14:15:23.140000 CVE-2024-43373,0,0,db91654b81ea063be92db1e222d81162a2c449df0cbfa02fb41874b948a4c8f0,2024-08-16T21:46:08.440000 CVE-2024-43374,0,0,985df10ab42e21b923c86b553c9d031d32672b2cc13ac7d069fd0fa1d25bd2e8,2024-08-19T13:00:23.117000 +CVE-2024-43376,1,1,ad23541b381294fa5ed81f446c7a00cb43da818fefe222ccedb6694674b9577d,2024-08-20T15:44:20.567000 +CVE-2024-43377,1,1,b06dfadc8661f012b9345444232386a24e2cadd0116f1734d754c1230ab2d9c8,2024-08-20T15:44:20.567000 CVE-2024-43378,0,0,b201eb55fcf5e1b333e5fc1b76defa675188abfea665e05ed68f738cfa202d67,2024-08-19T13:00:23.117000 CVE-2024-43379,0,0,2274510657d95ffcc48a92770730410821cfe34d62852c5631ab582d27d295cf,2024-08-19T18:36:20.123000 CVE-2024-43380,0,0,8e4600010954207ddca63fc28edeb1cd291abe3badd6cde0e059ea5db707d614,2024-08-19T18:36:20.123000 CVE-2024-43381,0,0,a01674578db7c1648bbba4f532305ea57cf2109d65478c5f7b839cc278dc42fc,2024-08-19T13:00:23.117000 CVE-2024-4339,0,0,240ed7230e0a6e458ae0cd6534f1dc024d6c16f3537e0357643e823e6aa09596,2024-05-14T16:11:39.510000 CVE-2024-43395,0,0,e2392bf6475b12db51f31adf2ecd9f40f62cf7ccf326ac732a93b8b209786a49,2024-08-19T13:00:23.117000 +CVE-2024-43397,1,1,264c2f81cd99428d5aa158f1dc2af7c3c349186ea362901e061722c9a7a0394f,2024-08-20T15:44:20.567000 CVE-2024-43399,0,0,99ea03d4cb51d89848626678b95b950069c5e7694cc6c47ad014346b9029f738,2024-08-19T18:36:20.123000 CVE-2024-4340,0,0,47279ef0860b5c8c8bd0a3697c64eecb43c1be11e1b93224b8fe23143c960d81,2024-04-30T17:52:35.057000 CVE-2024-43400,0,0,948d99d3226e07bed979bae346a84e40ea844c2594a77d0a0cad612ad3cc8bc0,2024-08-19T18:36:07.297000 CVE-2024-43401,0,0,9aa398b025131392ce8a6f0e796ef6d970be06489ef92f0ee874b8751775b22e,2024-08-19T18:36:07.297000 +CVE-2024-43404,1,1,20af26cd731b3ba8b34b0057b5259bd09cfea8cca89a07a9d1aba2ec472dceb0,2024-08-20T15:44:20.567000 +CVE-2024-43406,1,1,73b0ba9348d7fda79585237be1ca1a5ac69ce938ffa97f7ec991727d16bb5e34,2024-08-20T15:44:20.567000 +CVE-2024-43409,1,1,936bb6be49fd3f1a52856d091099b7d0ee01c9becc80fdf8cce500121c258f30,2024-08-20T15:44:20.567000 CVE-2024-4341,0,0,60a5b39ccdef4d059dc8073670ab0aea750a7880bf4e71543025f3d18b32ff1e,2024-07-08T15:49:22.437000 CVE-2024-4342,0,0,2403af0b003f5953a3d2a1b74bf46d64f4a354bc628b01d2ea5f60de4a4002c6,2024-06-03T14:46:24.250000 CVE-2024-4344,0,0,0e21345ffbddb43f0000901c1c1f7a4c33b525c68a381cd32a35ab8e755aa5fd,2024-06-03T14:46:24.250000 @@ -257956,7 +257985,7 @@ CVE-2024-4365,0,0,63c2db9b70aba81bf4acd057c8457c31612ae1811b001c9773701935bfb8f5 CVE-2024-4366,0,0,bbfa79c99a69a6ab3a1454de708e5610ad18f6066e78d9171ac36b6f6e6eece9,2024-05-24T13:03:05.093000 CVE-2024-4367,0,0,53b2562feb1cef4dfbc75c878e502bbc54b7cf80f87613aa8d663f88e3c74ce6,2024-06-10T17:16:33.380000 CVE-2024-4368,0,0,ebedd608e412600f3409256680729c82fcf5015495435afd7648389243e696e1,2024-07-03T02:07:28.557000 -CVE-2024-43688,0,0,1068839caa9387b68572a7543fc7e73126882927c09ed06aa1c722c6dc16d1ba,2024-08-20T06:15:04.983000 +CVE-2024-43688,0,1,92b7e1cdc82297319c60db4f63f97b603b4d70c4801569e1ba7bdd590168d15a,2024-08-20T15:44:20.567000 CVE-2024-4369,0,0,9bcc319f475d5802b53d6dedcfa6ead4761cbf7c42adde8daf6f3ff8c0c17af2,2024-06-19T18:15:11.820000 CVE-2024-4370,0,0,3c1f5b342c087fc6587c8bc9012541b58d80e50fdee9d14eea44daecdec82901,2024-05-15T16:40:19.330000 CVE-2024-4371,0,0,a0b0e0fb8c98057b2328743d7da5c32e9a585001a67e08f1632ceab0df487dfa,2024-07-15T16:42:39.107000 @@ -258386,7 +258415,7 @@ CVE-2024-4781,0,0,75b4bbbeaedf32c6df964ae89a5896455d04ecbdf24f849877528cd42d17cf CVE-2024-4782,0,0,37dcdb14f7d23ae467b62646ac8eb504448e2a7781e3c175892c72dc54d3aebf,2024-08-19T13:00:23.117000 CVE-2024-4783,0,0,413c0436e6758a988a0c847533b21e34b17a9d936626eba8cda1a5d1f87e0181,2024-05-24T01:15:30.977000 CVE-2024-4784,0,0,9aaebc683fa580787b3fd96a509a375fe0be341d6b1720ff572edca3637a16b2,2024-08-08T13:04:18.753000 -CVE-2024-4785,0,0,6807571c57e25f60d9900567ce393f3ac6092bf534f879691c39b4a82c6899f7,2024-08-19T22:15:05.893000 +CVE-2024-4785,0,1,86459565331431d4effe5c5baf904159b952a2a7d490db9da0fcd3795764e799,2024-08-20T15:44:20.567000 CVE-2024-4786,0,0,bbc8c5b9b549878acd4ee1e5896d7add0ba995b55e84e619083dd37cca26f8f1,2024-07-29T14:12:08.783000 CVE-2024-4787,0,0,6e9b8652de9328ef9248746b2fe52f715cb97566c59048ae6277a1aaed304f45,2024-06-20T12:44:01.637000 CVE-2024-4788,0,0,036e4ce9e476328c73022572d41365684f416f1f77ea3a1f5e72bdd2454ce2ec,2024-08-05T20:23:52.467000 @@ -258616,7 +258645,7 @@ CVE-2024-5056,0,0,e1d03c88d872cdf904f996ddd0c44a42c46c29f4f47c658c86206a3f64af2f CVE-2024-5058,0,0,d66647bea5b47dc02b284e54d31404fc6795bd8a11a408fc146959769533c076,2024-06-24T19:18:35.517000 CVE-2024-5059,0,0,b0901ef33b8b4d50fbd07542bb49b954ef3e45e5d8bea77c76cb9c3c21bd9422,2024-06-24T18:49:29.467000 CVE-2024-5060,0,0,70a4b23a22f78db2884c1ce0fa906b767ee25d155e7de23427bff751940319e4,2024-05-24T13:03:05.093000 -CVE-2024-5062,0,0,78f2bfeb3a24fd55e50e85deafb66d73fd5459a887051a3f963aaa1316e5d806,2024-07-01T12:37:24.220000 +CVE-2024-5062,0,1,1dce1f93ce1b9242e76ae9cf090eb76ee6afadb656622c6eb5a578a5eb76013f,2024-08-20T14:14:35.717000 CVE-2024-5063,0,0,3ea00cb3f53084b2393e5a818811e5957f116b348338ce87a59f64292b187a9f,2024-06-04T19:20:57.760000 CVE-2024-5064,0,0,d857d2e0ee5316e135c4045ce3a7ab1579933a9b029d66480995681ffcc21c71,2024-06-04T19:20:57.870000 CVE-2024-5065,0,0,0430cc7c42876b1507fe619bbbc6ece1ba2c878f57a5564022a1efa295cd852d,2024-06-04T19:20:57.977000 @@ -259065,7 +259094,7 @@ CVE-2024-5571,0,0,c5656d92123399f657b6e24b44e300308aef779837a4ed7761c4afb3c16bfa CVE-2024-5573,0,0,7ceea6b12b7d23aaf8833561ef8c88372a72278f234f087262af664b087eec6c,2024-08-01T13:59:54.013000 CVE-2024-5574,0,0,e718295307eca06b04fb56f70dfb8daf0ce4b10163936e86fc3b21a6f71a4423,2024-06-20T12:44:01.637000 CVE-2024-5575,0,0,1d8c4bc7bfefa9359f03236311a531b02997d0972adc424dea9dbc344e7a3ded,2024-08-01T13:59:54.197000 -CVE-2024-5576,0,0,46f3183fca153a160a5d42081ef252300c631eda81894a40d1555a638eff32db,2024-08-20T06:15:05.153000 +CVE-2024-5576,0,1,fb4e227ac1bca19b4b9b0346951bcae4e9457605b7b3160f8ccda6cb8cea0d35,2024-08-20T15:44:20.567000 CVE-2024-5577,0,0,5dd16baf94f18e7abae39f40d89c75af3dba9492f2b1af50e3d8516c5413b1e4,2024-06-17T12:42:04.623000 CVE-2024-5582,0,0,3868d6c914880d2428453bd960a7aeb89cb5bb99f0fc09b9de444e14a34c6012,2024-07-19T16:05:10.290000 CVE-2024-5584,0,0,7705ff7ae1b4fd1342d12756cedf379ac85bb5a3b8398b6b986f5e220e43afde,2024-06-11T13:54:12.057000 @@ -259206,7 +259235,7 @@ CVE-2024-5757,0,0,5cb8c18a619114307d2634441346064118b79a7aeac4723897e195eaa5132d CVE-2024-5758,0,0,c078716fbf80b259c8ceac06415d3d039d4ef773f8ae701649c6b0b1483ee99e,2024-06-13T21:15:57.543000 CVE-2024-5759,0,0,63cf4f5f11600a3e2abf833e3aff1a738015e39c1ce27037c94f84f83452efea,2024-07-19T18:40:53.863000 CVE-2024-5761,0,0,1fdad964c86313b412878f67fac5999c9a1ea015b844614bc58b000414661a53,2024-06-07T19:15:24.467000 -CVE-2024-5763,0,0,5b1f4bf8811eab702290a1ff2f286d959eb83e85d5825980cb11b85cff0ff9ee,2024-08-20T04:15:08.590000 +CVE-2024-5763,0,1,d5a17677db04dab40e7ba46a3004731b252dfa637f97a1e637824a196a22c6e9,2024-08-20T15:44:20.567000 CVE-2024-5765,0,0,79117abfade54ce3ab13d72bbbbedb2fc58ed3797b29d0ebf953e2abb4b24073,2024-08-01T13:59:59.193000 CVE-2024-5766,0,0,1263d0917882c36f131e194bb6b44630da06ab1a17b9faa93d76c1b934e8029c,2024-06-10T02:52:08.267000 CVE-2024-5767,0,0,8d9d357fa8f1e1cae5533e88ea0736375963b6a4fbe13fa9a151a36ba280f19a,2024-07-09T16:23:07.280000 @@ -259240,7 +259269,7 @@ CVE-2024-5800,0,0,a1cb578d92a5ce21abf5c6c3a9df30d0f15dec959b83eaaecf5cab603de305 CVE-2024-5801,0,0,668584c28d68f34806b15aa23a003fb18ba18cb7fb2d24326345f03f0e3dd0a3,2024-08-12T13:41:36.517000 CVE-2024-5802,0,0,71daebe4bec626c1d71de5756a51cb35bdbb0ec81769b121e428d7e1cc0f8395,2024-07-12T15:20:14.610000 CVE-2024-5804,0,0,944c60e3868cb88abd10c74562e980fee4d055c47351e0f84fb7de6b37f889be,2024-07-22T13:00:53.287000 -CVE-2024-5805,0,1,c6bd0a254f95da4bac1aa9af34b5a1c8bce84a0c9ec724d2acad9f30a83ad74c,2024-08-20T13:37:58.923000 +CVE-2024-5805,0,0,c6bd0a254f95da4bac1aa9af34b5a1c8bce84a0c9ec724d2acad9f30a83ad74c,2024-08-20T13:37:58.923000 CVE-2024-5806,0,0,91588fb1cdb8115c3da665d3d031e599ad42ef712f85a57d764591dd0370421d,2024-06-26T00:15:11.293000 CVE-2024-5807,0,0,cbdacfcc550f188a645ebbcc0d5bed8a3afa99180c6adb698350c513e3814548,2024-08-01T13:59:59.787000 CVE-2024-5808,0,0,01bdb59c1a81eab4bdadd0e0da37734e46325f1f6405fb5bc4ad137cd56c547f,2024-08-01T13:59:59.967000 @@ -259334,16 +259363,16 @@ CVE-2024-5924,0,0,4b7e4b611121f550bcb0fd877a4f853b37b9df78f8237b70038811b9cca802 CVE-2024-5925,0,0,e946172587053e70c75c453600b6000de540319095aebb04cea6cd10cd2597bf,2024-06-28T10:27:00.920000 CVE-2024-5926,0,0,c0270df40bf1e286ad8957d3baf72bffff8cfb079896c2cd70dab328142b04f1,2024-07-12T08:15:11.797000 CVE-2024-5927,0,0,1b7b6c83db008ddacf60314208106fd6b62f6e315f688ea9bb13e1efdd6d20e3,2024-06-13T11:15:48.917000 -CVE-2024-5932,0,0,05478f783e5a65021f809be0f0de25dc72a5d3449717c486e3e44afc6e80bd0d,2024-08-20T02:15:04.240000 +CVE-2024-5932,0,1,39314038664af0ba6a59940f14f6f4752329a2f5be1b3f0fdde557c7381d5472,2024-08-20T15:44:20.567000 CVE-2024-5933,0,0,4b5b8ee984dca52e93a5c74fef0bbbf1e4141af006167bcc3f0d3b5bd5eb1afc,2024-08-19T21:07:56.627000 CVE-2024-5934,0,0,16721403d72b0462a70f000841eb683fbbdcd68e0952cf56add7902c00813b6e,2024-06-14T16:15:14.647000 CVE-2024-5935,0,0,d873c2fb0d6ab83afab61b44853fabc44b82fc2acb633797561e5182f89995f3,2024-08-19T21:08:52.097000 CVE-2024-5936,0,0,e2323b28e2dc5842b2496ff11e24a4c05c687e44cc94008f23990b03437dd0e3,2024-06-27T19:25:12.067000 CVE-2024-5937,0,0,51e02db0c012e8abf29c205fa293326baf9f1716cc7d665366a7580a75792510,2024-07-09T18:19:14.047000 CVE-2024-5938,0,0,cb9458c48aba8db651d9dffddd7092d96350e7e331bc06e4be8ccddeb7b09d02,2024-07-05T14:25:03.107000 -CVE-2024-5939,0,0,e872eb78f7542627779648a5d054664e461f54a7aefd6cd814ecc001cb99ed37,2024-08-20T02:15:04.590000 -CVE-2024-5940,0,0,90aa7ce2bbe313419389f9b72861869fe175127b530960bcd35fb941124a4d51,2024-08-20T02:15:04.793000 -CVE-2024-5941,0,0,dce101554be16916c48d22da704ffd90aae8a35c613a00e03fa5ef548f13d299,2024-08-20T02:15:05.017000 +CVE-2024-5939,0,1,b3c7827d3b4e8f1c7dadc6cb67e0b8f47511f4fa84365c9c9171912e236933de,2024-08-20T15:44:20.567000 +CVE-2024-5940,0,1,e2609ddfedb712613878b96fdbaa49694afbb16f452b44c78033510cf887dba7,2024-08-20T15:44:20.567000 +CVE-2024-5941,0,1,c16818be51f362a3b8996f20145356e1e9eb9f625ef959a8208b71b4cd1d254b,2024-08-20T15:44:20.567000 CVE-2024-5942,0,0,113cc7beeb08d524b60a394c0c59242af2ffb5f606d529aae03da21992ee2fbd,2024-07-09T16:02:08.180000 CVE-2024-5943,0,0,43d6e7eaee5cf473c82f61329f5b629440390732fa8dcc1ef57a07502bd93742,2024-07-05T17:22:13.547000 CVE-2024-5945,0,0,a8ec237fbd27a5c84c4e08640ab34c25a666ff13a56d8ff8f5f6d1f86ddcb89a,2024-06-24T19:24:00.433000 @@ -259680,12 +259709,15 @@ CVE-2024-6367,0,0,0657e75ca91976d2d4beca477f8339cebb9a03d943acbd557f57c4bf89b577 CVE-2024-6368,0,0,e298d701aa6c568232c2a1685979818386124e299e97d71dced43164a82e13ff,2024-06-27T18:15:21.083000 CVE-2024-6369,0,0,8b09ff85e5acb66c2b30feef0f9adfffd0c06196dfcccda2083a0a13ec885594,2024-06-27T12:47:19.847000 CVE-2024-6370,0,0,72eb946b066b80cfc3f428b4eac85ce966f09241daddb8d4da0833577e90a737,2024-06-27T12:47:19.847000 -CVE-2024-6371,0,1,5f83f95dcceaa28d11c287dc71af5756afc095d68becb3e3a86bdf854c3c189a,2024-08-20T13:21:59.600000 -CVE-2024-6372,0,1,175eedbe6c249e3955927cb279a01c191390828d0195bad6f245ad8466b584f8,2024-08-20T13:31:40.793000 -CVE-2024-6373,0,1,e2b88eb3a63ea5c09c2c5241dee2a7883fb4754c8b06cd4990f2315b5466489d,2024-08-20T13:32:44.213000 +CVE-2024-6371,0,0,5f83f95dcceaa28d11c287dc71af5756afc095d68becb3e3a86bdf854c3c189a,2024-08-20T13:21:59.600000 +CVE-2024-6372,0,0,175eedbe6c249e3955927cb279a01c191390828d0195bad6f245ad8466b584f8,2024-08-20T13:31:40.793000 +CVE-2024-6373,0,0,e2b88eb3a63ea5c09c2c5241dee2a7883fb4754c8b06cd4990f2315b5466489d,2024-08-20T13:32:44.213000 CVE-2024-6374,0,0,f94841636056434d281b0adc40f21c7609c1c7ef70c052bfb7795df58f3d067b,2024-06-27T17:11:52.390000 CVE-2024-6375,0,0,2086f7a0dc16d184277c490b35389aec9b32cc5c6b68030b97b503ee789a3958,2024-07-03T14:54:52.427000 CVE-2024-6376,0,0,2eceea6553f0e47a0e34ab01650b7781a20682f6799be39f9cd1e64f3f19856f,2024-07-03T15:04:52.463000 +CVE-2024-6377,1,1,99bec8522b8d60ebad70fe78564cbee11dbf3aeae353e4f765186fd3e6890751,2024-08-20T15:44:20.567000 +CVE-2024-6378,1,1,8d4e166d78dfa3c2e50b85bcfdd100a2ce359a3e06a5911e8fc3e03324133fdd,2024-08-20T15:44:20.567000 +CVE-2024-6379,1,1,59056527ef315f312e95de504f11584a0c95656d12711b329222ffae4c0e0496,2024-08-20T15:44:20.567000 CVE-2024-6381,0,0,2822fb12d769fe1cca32125b45cae52ba3e5807419213b6087c6db8de8d2b326,2024-07-03T12:53:24.977000 CVE-2024-6382,0,0,9f140af24f460b4413fa844f95383cc153754360a136939b8743c2d8327ebf99,2024-07-03T12:53:24.977000 CVE-2024-6383,0,0,4622f4fc90fbde51d6570a14e2ee494e3e71659c68201475e4e4eb659c036ac0,2024-07-05T12:55:51.367000 @@ -259702,7 +259734,7 @@ CVE-2024-6397,0,0,69c6adc6e74f8320b438655fc21122936f7ec03e924b3cf51bf011308451b2 CVE-2024-6398,0,0,5e78ff46f697643e5cc753102552fe7954080f3b71babda50e4591659f0fb988,2024-07-19T18:25:44.247000 CVE-2024-6402,0,0,795485c4534407e246daec51c1daaa33b95f6651688fed743a8fb9054cdaedba,2024-07-01T12:37:24.220000 CVE-2024-6403,0,0,e44b9cfa8d9ae367e624a8cdf179ef52ea1e98c2115d7a956299d17747a6a56b,2024-07-01T12:37:24.220000 -CVE-2024-6405,0,0,aeb7997c4465363fb3b56142b10f471ded7e1b160c931780f90562328efb5a26,2024-07-01T12:37:24.220000 +CVE-2024-6405,0,1,2f2aaf52bab49b757e1ad90b974deb9c303ecc0ebed2850b0a99dd7bdb5e4a9a,2024-08-20T14:00:07.663000 CVE-2024-6407,0,0,12314028e09ddfd135bb748e0530e9ce4aee25dcaa6c2bae62524650d54b655f,2024-07-12T16:36:34.747000 CVE-2024-6408,0,0,560f6344922c296035b0717025e77a13b366c296a6767546b7234de1c853f80b,2024-08-01T14:00:21.483000 CVE-2024-6409,0,0,669489850a7d87e3ef2482600fbd8b36d268cd79528fcacdf08853d04b12da56,2024-08-07T17:15:51.910000 @@ -259820,9 +259852,9 @@ CVE-2024-6570,0,0,1c2083317d49d5094b93c672429fe80fa3944fba8c36de7f1f2403e55beb6b CVE-2024-6571,0,0,78a981d5a6d937e0ba878714ecb6e9c0e22f79c4ebbc143a02b12bb91eae6bff,2024-08-14T19:24:59.063000 CVE-2024-6573,0,0,eec8b8537f493346698f7e9346611d53ae9a4a9981bcfb08980cc8315ebb4c8d,2024-07-29T14:12:08.783000 CVE-2024-6574,0,0,63009fc3946aa6aa37035c823fc25710c373929512d42b52b922f4cc721537b8,2024-07-15T13:00:34.853000 -CVE-2024-6575,0,0,f75bed59edcb0eaa99774064131b736dfdf27f45469555c78317d8753cba113f,2024-08-20T04:15:08.987000 +CVE-2024-6575,0,1,da3839c5ae5db37e2b09cfc5406c687541cd846c7c925b24549a2e53e3534ae9,2024-08-20T15:44:20.567000 CVE-2024-6576,0,0,173ec86e8bf671719ebb8c23252d7cacd934d3a530ec0d1cd90d8e5a216070ff,2024-07-29T16:21:52.517000 -CVE-2024-6578,0,0,93a96ee1a320fb95ed34fac92f5f2d70d185ebfa88b318de204eab5f166d9aec,2024-07-30T13:33:30.653000 +CVE-2024-6578,0,1,8257f7484236e424ea5fc80479c626bf5a4575b6af53231a1ef13b8f880d14c5,2024-08-20T14:51:08.483000 CVE-2024-6579,0,0,70ddc19f754f7cb2643cde5cc84c5570c5648bfc6d8e404da6cc6aa9bb2155c8,2024-07-16T13:43:58.773000 CVE-2024-6580,0,0,d43dfa58651574c4447e8f323f3cb1f6a00d6bdef0613d5834aefccecf968c5d,2024-07-09T18:19:14.047000 CVE-2024-6588,0,0,67672e854c20766f2e15151fa1e111ec8310b7083a57f535c99159d2ce6e5af7,2024-07-12T12:49:07.030000 @@ -259979,9 +260011,9 @@ CVE-2024-6833,0,0,b0ea48d29166f6347ac218b4f9f93d3f7fc599fd932b64c35cfa55e5a1a946 CVE-2024-6834,0,0,23e85f57c9b7230818a4425261a24fd150d79ea72676d6bce04d47efdd69630e,2024-08-01T14:00:44.750000 CVE-2024-6836,0,0,94c1bcaa18f7036265464de8eba36ccdaae9b63d5d20f60a8cc42904bb485160,2024-07-29T20:20:30.867000 CVE-2024-6843,0,0,8fef894e2384f8645515841961e4072de1d777c867ccea5d4b735ba4242f90ae,2024-08-19T12:59:59.177000 -CVE-2024-6847,0,0,b54fb8ff4028648c7515bc64dad8a9d53d1cbe5a7e9c05c31e496d5be21972d8,2024-08-20T06:15:05.470000 +CVE-2024-6847,0,1,e9c4fdde5c611c485af237b536f78d2b4a3bc765533b06cd6bd9884510a0bb06,2024-08-20T15:44:20.567000 CVE-2024-6848,0,0,e171c12c58967922126feefb09977b436bb9e206684562a37899ca6ed3e35d20,2024-07-22T13:00:31.330000 -CVE-2024-6864,0,0,2d76ac334d3eee5b0b1eba0af2d483d4a5a9efba7ce3314f5d6643c1d3224a40,2024-08-20T05:15:12.137000 +CVE-2024-6864,0,1,25a84b435d49ce11c1c73a942909d4d326ce5027935626546ef4f0b2e3fcaea1,2024-08-20T15:44:20.567000 CVE-2024-6865,0,0,cb8e3c3258edaecfb2408f04adfa69a3419179f287cf4fd0248689bfb8e952c7,2024-08-05T14:15:34.847000 CVE-2024-6869,0,0,cc765e0741eb808a23e90ee3171ba570febcbdba6db7038c79938ac8aebc9baa,2024-08-08T13:04:18.753000 CVE-2024-6872,0,0,9eb628e3a6d1ea0380e94dd099512f5a2f74ddb0ba75bf9a102e83ab13e260f5,2024-08-05T12:41:45.957000 @@ -260015,7 +260047,7 @@ CVE-2024-6913,0,0,a7b65a58f468735b3782ca0a056db617c72da8825fc6f7975e6b5a68a6fa7e CVE-2024-6915,0,0,414f9ee927dc9f475151b863854f151879a129420ab26b169b33952223f7672f,2024-08-06T16:30:24.547000 CVE-2024-6916,0,0,07530be58a74756ca63b407a63f3e63926b78ec1f0980442182c2c4ab60c9be4,2024-07-19T13:01:44.567000 CVE-2024-6917,0,0,4e02075ee95758cd510fbf6b3750273e9262615bb77e37c7873232af68d2c294,2024-08-13T17:14:51.100000 -CVE-2024-6918,1,1,521b7d40df9f00de5aa0547dffce2b4999e52d976a15994b48aa5f7cdc11bf69,2024-08-20T13:15:09.450000 +CVE-2024-6918,0,1,32617e74cad1800236a330f5d8fc69f0099009b74ddd0e56ba3042a2ff77c383,2024-08-20T15:44:20.567000 CVE-2024-6922,0,0,06f94107ca0d2a59d9bc293905aa46a216c7a8ead08ee7b0b3a0f5d8d9c7d0a8,2024-07-29T14:12:08.783000 CVE-2024-6923,0,0,5f80c19d7aba57d9ca3502e05808684f0f6d62047a1b2b6de15ae6be51d0a228,2024-08-07T15:15:56.337000 CVE-2024-6930,0,0,1339dcde2064efad12400b33b71bb10f58bb3894621d0a104ecb7e997db508bc,2024-08-08T20:06:49.207000 @@ -260091,7 +260123,7 @@ CVE-2024-7029,0,0,5175bec03cf7f2378284f608514536d153bc0fcc9978511b168a2887b7029c CVE-2024-7031,0,0,4808703a4cd0b97f67a773c5f222b01d69a2fff387801423358b3ea99670c83a,2024-08-05T12:41:45.957000 CVE-2024-7047,0,0,c626b8092c8533dfe4198c51e8e35d5946df1ed097b6fb1d01ca755685dc1b0d,2024-07-25T12:36:39.947000 CVE-2024-7050,0,0,f402c0a89ba2917236fe6639793bd54ee4751807250eba7a4dde84d4a362ffd7,2024-07-29T14:12:08.783000 -CVE-2024-7054,0,0,43918e4682eea2254587dd6be24c57fd33f0a630b01e2ccb4238160b7399ff51,2024-08-20T11:15:03.540000 +CVE-2024-7054,0,1,c2f192d88d8b2a817d17540b8fda16fcd38e463cdb3b6d5e52e3cf243830add6,2024-08-20T15:44:20.567000 CVE-2024-7055,0,0,b0e8b0793ccc61abbc70699af6d91421241877ab1f640f57d490cff121ecbcd0,2024-08-06T16:30:24.547000 CVE-2024-7057,0,0,e86292da776d8c2eee12db885a241ac453174252cdfea8e6058f6d373bd4dc19,2024-07-25T12:36:39.947000 CVE-2024-7060,0,0,2e0c92013c1ddde1bca0ad9e62aa50d23e69e1a598796a2170f54fccf61e7f4b,2024-07-25T12:36:39.947000 @@ -260211,11 +260243,11 @@ CVE-2024-7225,0,0,f6b7a5a2ac3e59704ed6ff994e447ad38c84eed49d8cb19f1c1208cd01aab3 CVE-2024-7226,0,0,7be6f6e57b1777b742474ebcd204597686d04a1987b04bb682ec599818c11481,2024-08-13T14:19:04.147000 CVE-2024-7246,0,0,b268ee120ca92b4c7d0a004d06b39e1ba37d5fd50d8d0e082e72d2daefd1725e,2024-08-06T16:30:24.547000 CVE-2024-7247,0,0,0bfab6752d98ec5fb14ca6f2f4efb9293c75276b6f23c9f8a9f95883c0953a42,2024-08-13T12:58:25.437000 -CVE-2024-7248,0,0,ebc2727ef1ac7b5ee7b71368a85d91d1db59260dc970f86f7476ace25fb5fea3,2024-07-30T13:32:45.943000 -CVE-2024-7249,0,0,b1c62b4f237d55dfb39f8f205e178006f9409a78ccfd426e79f2f98ca375d833,2024-07-30T13:32:45.943000 -CVE-2024-7250,0,0,2ad6dc357ed437eabcd60fe2775245fd2e54c1167d56f0a56470e33155a5fc4c,2024-07-30T13:32:45.943000 -CVE-2024-7251,0,0,56e37f41fcf38f76a5deb1629f8d7e708899009a1e9f2b615de298d4a45a835f,2024-07-30T13:32:45.943000 -CVE-2024-7252,0,0,b11855d09d58123416b1c452f42a306230094dfbea0e43cbf3d1a4ad2d82d89e,2024-07-30T13:32:45.943000 +CVE-2024-7248,0,1,47aeecc04fc2532426e2856ff208a4764b664ce690502e70306fd9b68cb718e8,2024-08-20T14:56:01.897000 +CVE-2024-7249,0,1,73974231501387b12eacc736781f51c9d8ec8d78fa61d8eb72875d86090b0d40,2024-08-20T14:58:15.320000 +CVE-2024-7250,0,1,2714d196410008034281d23fd2726bb5d251b721e04c2e3643d0ed11cf2d609a,2024-08-20T14:58:56.213000 +CVE-2024-7251,0,1,e880a7a9378bf8b927f40852329063562fbba4ad5a97a9957dc1093c25591f2f,2024-08-20T15:00:02.603000 +CVE-2024-7252,0,1,490536b1b267bc05e09f33c429c150806f5477f059597f5cad78d37cad62a66a,2024-08-20T15:00:39.470000 CVE-2024-7255,0,0,a4eb887a2aa91b61ced64af6faa636cef124d2fd1032af5abcd1e986918698ff,2024-08-16T15:23:19.167000 CVE-2024-7256,0,0,28c6c5405ca0661376f4706f7e75647b14826bc648847c0c2ef29d4ee5bafea0,2024-08-03T18:35:04.003000 CVE-2024-7257,0,0,e6ef266df52e25692b132cfb6522d79defb5eb3e548daae54be1d69b0c3ab16e,2024-08-05T12:41:45.957000 @@ -260251,7 +260283,7 @@ CVE-2024-7300,0,0,ec5bc420e71b7c17438e33b04329f442535c8be80d5b4025cfe5a0c36aea8b CVE-2024-7301,0,0,6b622cf82f175e4420a14e0711b01cd703c5db56ffca3c66c2a47c7fdd329e04,2024-08-19T13:00:23.117000 CVE-2024-7302,0,0,3e3978a555cf8f7617492d06d41673a59c5323c552cb9b37b079247ec7c0af88,2024-08-01T12:42:36.933000 CVE-2024-7303,0,0,9520f852975600abd145b384cdd7bd5ee8f54af62f4a78fc6dcf9ca25a845304,2024-08-12T16:47:04.740000 -CVE-2024-7305,0,0,ef109ee3e13a9be9df970a813285b16fabd39ff5fda53d6fe580452ebff544cf,2024-08-20T00:15:04.003000 +CVE-2024-7305,0,1,bc4f7fc15f7537b59107986ff5b86d7153bfc4c1a03b077c94709217d9e52136,2024-08-20T15:44:20.567000 CVE-2024-7306,0,0,3c865c91ac7fc6c8c32a68429064dd89f6391277f467a5bdc571f15092dbadd4,2024-08-12T16:33:51.090000 CVE-2024-7307,0,0,480862c25d62bf3086f9355b511b9f3605564a857f38684f6972ff45c488e191,2024-08-13T14:55:05.840000 CVE-2024-7308,0,0,ff0d49d6715bec6a8fa55cef81ae277660d9ae735dc8eb5d8914001060fb3804,2024-08-13T14:57:18.157000 @@ -260345,7 +260377,7 @@ CVE-2024-7449,0,0,297f4c3dac3fe7682a436b0d9b63f8bd563160fe5bbdc7914db4fa732bf7b0 CVE-2024-7450,0,0,f36a88ecb7cf7b37b6090837acfb29fe52cc382469b7cf045e11a727c85c93f7,2024-08-09T15:33:58.153000 CVE-2024-7451,0,0,6c3c74a805aba0686ff087a4aeedf52269a2704aceeaba8fd15f2602a7b0b5b8,2024-08-09T15:33:56.027000 CVE-2024-7452,0,0,9b0d7a5910a43cd09bce0b4f25c71bf821fcb49ab8aff5df5dd61e0e89344b20,2024-08-09T15:33:53.797000 -CVE-2024-7453,0,0,0029f271a1f309f630c23134b7acc83430f1dcf711ae28db68ad9f435986d9bb,2024-08-05T12:41:45.957000 +CVE-2024-7453,0,1,f2c4667c8170dc75e7077d140353e4eeaf477c703ac59ccb9e7527c380af5025,2024-08-20T15:50:32.013000 CVE-2024-7454,0,0,8e5a8fd42e45f3016f27594d775a7938d8490e35323cf0f97bd8d1a42cbd210f,2024-08-05T12:41:45.957000 CVE-2024-7455,0,0,046881407edba5d5518c2b947bd1e836539fd80ab5ae5a2c4772eb47da44c350,2024-08-05T12:41:45.957000 CVE-2024-7458,0,0,2c9d4dd630ee9d646df3107c9eafd0e6cad217e61388b41410f8713d27f85974,2024-08-06T17:12:28.250000 @@ -260485,15 +260517,15 @@ CVE-2024-7678,0,0,7a80ac621ece570be5503c7435c87b024e4d34454346340a478740f49f0318 CVE-2024-7680,0,0,4742cee85d7df5fbe02ea5ecd61db4452ad7db3d8ef0db88ef67139768aab176,2024-08-15T18:08:52.780000 CVE-2024-7681,0,0,e6c1e7782509f60074b687569285020e895fcc1fd23e8fb399f4f22e032de697,2024-08-15T18:09:55.887000 CVE-2024-7682,0,0,8dbcf53cb3ad3a4e3e6c93fa0edfe498b656bd897e790189cda42acfe0f7b35c,2024-08-15T18:10:41.557000 -CVE-2024-7683,0,1,0e60e4af191d77a965d4296d84a49c07e8af0f778b10dae064ea9d4491f47a8d,2024-08-20T13:52:50.987000 -CVE-2024-7684,0,1,d5d03d6072e24fe97ebcaeddd6f0cfafbf610fe9d74f716df9c156507bb7719f,2024-08-20T13:53:24.447000 -CVE-2024-7685,0,1,ef97cee3c3f9504d8f3d2a571167ba3304a1e5ad3165b46e778fa46938b19988,2024-08-20T13:53:51.947000 -CVE-2024-7686,0,0,1f836816338e686ba2de1cb6f8ba7d877a0f6cb953d1322ca08f61be1eae3d40,2024-08-12T13:41:36.517000 +CVE-2024-7683,0,0,0e60e4af191d77a965d4296d84a49c07e8af0f778b10dae064ea9d4491f47a8d,2024-08-20T13:52:50.987000 +CVE-2024-7684,0,0,d5d03d6072e24fe97ebcaeddd6f0cfafbf610fe9d74f716df9c156507bb7719f,2024-08-20T13:53:24.447000 +CVE-2024-7685,0,0,ef97cee3c3f9504d8f3d2a571167ba3304a1e5ad3165b46e778fa46938b19988,2024-08-20T13:53:51.947000 +CVE-2024-7686,0,1,f064743866c554c4f2e90ed0b10058d3ac9c7fa057a74b3ddc10388a40d22334,2024-08-20T14:03:12.533000 CVE-2024-7693,0,0,f2cd1103366bcfd179be09779784b86ac2f98679921c4f629dd8dbd0c14eefbf,2024-08-12T13:41:36.517000 CVE-2024-7694,0,0,7ad6784b26040f06619a4364e66ebaeeebc13317865a5794a53c5e6dcb080aaf,2024-08-12T13:41:36.517000 CVE-2024-7697,0,0,86f38a2ec81d6dd175dacb6d02f5a3a1a354fb4dfe19ab907d3389b4bd3a3025,2024-08-12T15:35:07.293000 CVE-2024-7700,0,0,3e081f65a743f7c2243d16cda14609415c7128fbdf01790b4350a9589b48c796,2024-08-12T18:57:17.383000 -CVE-2024-7702,0,0,ab557aa8ed8176e2992c21678284aa9209ce6fc101e401be039189a500f4e462,2024-08-20T04:15:09.540000 +CVE-2024-7702,0,1,e27f5381e9bb8a84bfa26aea9f03ffdd10a0850905e3e50b7398b3507d10ce49,2024-08-20T15:44:20.567000 CVE-2024-7703,0,0,4fed134c1a88e3f28368f1aeb0423ea22cd742b65dcb7d77a318829e8e6bb6ba,2024-08-19T12:59:59.177000 CVE-2024-7704,0,0,e58413fccd16c05c85207978d3387c57f50b93fb7a427c48c6f401c695307c8f,2024-08-13T12:58:25.437000 CVE-2024-7705,0,0,ba2446d549e3c4265501aacae0f49b053f84e0be1e1ff6443743a7ef69ec83bb,2024-08-13T12:58:25.437000 @@ -260520,10 +260552,10 @@ CVE-2024-7751,0,0,3d4779511baf725a6e5d9f65d6769396fd6275e830b17a69e8bf93efeb313e CVE-2024-7752,0,0,a2329e23410b1feec53d6ea38469016e280edd824b17c574fc21bf18179470a9,2024-08-19T17:48:25.793000 CVE-2024-7753,0,0,8d87f0b2095698ec5201c016f27ad170e6b85d6a83cdb1acca64ef97e59384ac,2024-08-19T17:47:49.083000 CVE-2024-7754,0,0,aa642088260d14c06ef027c5ebe72633a842f86ac8e6448a2c0c42d526be8fa5,2024-08-19T17:48:15.203000 -CVE-2024-7775,0,0,9e667570c97b77aa0b38715257675d72f23ef07984a9cb4393a748d8eef89542,2024-08-20T04:15:10.033000 -CVE-2024-7777,0,0,48048981f58aefb30926fa1d6d71ede5c97f74d42537b4f1eb8ed898694e3d6d,2024-08-20T04:15:10.363000 -CVE-2024-7780,0,0,3b1a4679231e84c4755ed91f7783f0461fb46c718564a0730c99fabed9fc1955,2024-08-20T04:15:10.737000 -CVE-2024-7782,0,0,b4d7c6464f5723726228686ead7b288b0f594b8b6d9eb37d05320ae3889ccf85,2024-08-20T04:15:11.203000 +CVE-2024-7775,0,1,e3301a5d8f77ad443eb31f53865c4d76f2f8fe202d331dbc3155c9382724cc8e,2024-08-20T15:44:20.567000 +CVE-2024-7777,0,1,71bd18c058a843cc648eaac1d1574a0ec472525bb01fac803805d8a41dba271b,2024-08-20T15:44:20.567000 +CVE-2024-7780,0,1,d93ffb279aea8f39f6fd963d66033ac1d11eb19c0e769bfec592ca965c19db92,2024-08-20T15:44:20.567000 +CVE-2024-7782,0,1,8f8c7ec0917c77b4eac4d0691ad6fd872581e8976dc54163f3db95fe52f021ae,2024-08-20T15:44:20.567000 CVE-2024-7790,0,0,de624b84b425469d8968a7638e184d821831162387748e3efe2ea228bbbb34bb,2024-08-14T17:49:14.177000 CVE-2024-7792,0,0,7d3f3c07d41892a0d0321fd066142bcd5acf123ab60b0c0966ac419cc49f752e,2024-08-15T13:01:10.150000 CVE-2024-7793,0,0,bb4d13faa2c61a286b24cee75d87f2b6ca9a8400f7f1f86af9de88e306f04a14,2024-08-19T16:25:22.220000 @@ -260540,7 +260572,7 @@ CVE-2024-7812,0,0,7d23c7651a18766135526d086e05755f7342e9775f0f39e533e1590484eb2e CVE-2024-7813,0,0,660725c7439a0ec1a8a527e4f36d939d7005bd8e1713b07e4bd27cf3728c3f7f,2024-08-19T18:16:48.327000 CVE-2024-7814,0,0,77d672b90a1329b486901cf23b6e584004769dc821cc49b3c03fcd61d7b51c38,2024-08-19T18:31:16.473000 CVE-2024-7815,0,0,414a9ddc4da9ca2a40da2f6f1d9c0348a16eb40238a0ca5a655b1ae9bc8cc665,2024-08-19T18:32:00.617000 -CVE-2024-7827,0,0,6212cbb30924a024123d6c49afbcf385c22abe6019ac8250efc49295898aa564,2024-08-20T02:15:05.220000 +CVE-2024-7827,0,1,20afe3aa4a313fb97b1d97a1cbf5257a0701f273bd3d99d4148b86bfbef51981,2024-08-20T15:44:20.567000 CVE-2024-7828,0,0,e3115575bb7dae7cb27cdf5edd1f5d03fa0744cba105509a33368f4e132d9ca7,2024-08-19T18:33:17.583000 CVE-2024-7829,0,0,c3cc2e26bac7b68e3fabf3f591217b419b1c20cb19d25c24cc8b101a28c94a8b,2024-08-19T18:34:00.040000 CVE-2024-7830,0,0,15816e5591b0055e413556de4122a2d11e287a96847234968b58cf6b2bb80f88,2024-08-19T18:34:36.987000 @@ -260555,7 +260587,7 @@ CVE-2024-7843,0,0,b225e3e73de15f6d60b8901f2783f6fa1e04b6e464a4da789732b7d24dd9ea CVE-2024-7844,0,0,a978525f7c5338c00fd1e65328954b310b11e6a4623886307ceb80e753c2f492,2024-08-19T13:00:23.117000 CVE-2024-7845,0,0,a27541ca47acd484f46c609f3698b7013802437eb8a6a96b9ef6a93b64b0256f,2024-08-19T13:00:23.117000 CVE-2024-7849,0,0,e63d24df06d5f4555672e0892a25c4e5c95ca031f7861c25398c177add1bd8f5,2024-08-19T13:00:23.117000 -CVE-2024-7850,0,0,05176d2fa39df7b46194d311be0b4ff77bfb72e83520ee2f8562c7285a72f4d9,2024-08-20T02:15:05.410000 +CVE-2024-7850,0,1,eac62d06d40978b154610fb0b8829f684d203615f4f5ebfcbc586877034ad096,2024-08-20T15:44:20.567000 CVE-2024-7851,0,0,a3f499a96b03d0001447f268138d29dda5356c0889ebe13c4e09da447417c59f,2024-08-19T13:00:23.117000 CVE-2024-7852,0,0,d81b5371e4f0add1d395c3b1194a942c6ec099c1cdc2d46560d4b57bf5d930b7,2024-08-19T13:00:23.117000 CVE-2024-7853,0,0,602b79ace26812f03f94bfc9d8a0781cb4744715aed03debdd7aa8ad39738b45,2024-08-19T13:00:23.117000 @@ -260591,23 +260623,25 @@ CVE-2024-7921,0,0,373fc8493a42dec9024075bfa6d26cd35595f3ee4bbd93f8a4d782f94f96ad CVE-2024-7922,0,0,b9a52276ef0e4b4e0a811fa837019df24b09b6e9a0ad97caa8b416fc4ac9a3e3,2024-08-19T18:36:20.123000 CVE-2024-7924,0,0,26e80ca5a6c3d5242f65253bd49607d64ce3c4f3d838752c2baea16ef867ef89,2024-08-19T18:36:07.297000 CVE-2024-7925,0,0,f91a011a841c4359c403a134e1dd493039b70a163d3e50145ae97ad8d71d5ebe,2024-08-19T18:36:07.297000 -CVE-2024-7926,0,0,70ed1b45e7fed7c8943930ceb1db4b6d34d95fe3d55e22c7644ab2d1c7ae8699,2024-08-19T20:15:08.447000 -CVE-2024-7927,0,0,0771d0a8bd672e949fa96a772aebae8f3734a2f3fac503ef0f21148f9a511516,2024-08-19T20:15:08.680000 -CVE-2024-7928,0,0,0046e698aee98f02a06b890c35c578440e9b8311533047d5ecee3030d328c730,2024-08-19T22:15:06.203000 -CVE-2024-7929,0,0,385c28cffcd226c5f70dee2bf59f9940da7744b223e98852f94457e8d670bbc2,2024-08-19T22:15:06.470000 -CVE-2024-7930,0,0,f9f031db293b0fb3e6354ddd9dbd340e1ee5aa2578a00bb063be08d1588f81a1,2024-08-19T22:15:06.720000 -CVE-2024-7931,0,0,48693e7aa0ffa8de80a33d907e38f58c9e48503984635911ffd4bb2add87a715,2024-08-19T22:15:06.980000 -CVE-2024-7933,0,0,a53e5293d0d86ddfd97070a16927a15b8e0373ef526c45485cf672c2b74c2187,2024-08-19T23:15:04.980000 -CVE-2024-7934,0,0,b601c8fe0e66a6182f4a3e6389a032a39d64e367efb29ac33d1c5589e2444302,2024-08-19T23:15:05.233000 -CVE-2024-7935,0,0,72c2e1db5c7666d8bbeae4e1b56de362afb44cc28f050e23b7fee72e796f54fe,2024-08-19T23:15:05.480000 -CVE-2024-7936,0,0,b14d9d7342314e7d08b92bef373a31226a0a7f7dd1e69f5c657c2aac3c8cfb19,2024-08-20T00:15:04.213000 -CVE-2024-7937,0,0,c42d26f0d5bc0bc0a0f8d71f253a03001455567b61d7d9ef7e8efd343f8d3fa1,2024-08-20T01:15:10.930000 -CVE-2024-7942,0,0,b34a91509d756147270feb117f106ca03be95be07582acb94f54f52e63c8d1d6,2024-08-20T01:15:11.180000 -CVE-2024-7943,0,0,1b95499d339d69e5cc1f6668cc6b77ac6d938fe3211b0412e9514d3ee17a6c0d,2024-08-20T01:15:11.420000 -CVE-2024-7944,0,0,8a7a5d99e5810f4b94a67a6287a7c68d9ce6c0d492ef2ade4cd2a22861e6af26,2024-08-20T02:15:05.610000 -CVE-2024-7945,0,0,92870a734e74202ef32c13ae9eaca26729b74437cd41aab348d4da019a83cd3f,2024-08-20T02:15:05.860000 -CVE-2024-7946,0,0,651fa541409434f20861568d182cfb6fc6785868b59c0b28661aa8f8342b238b,2024-08-20T02:15:06.097000 -CVE-2024-7947,0,0,74341fe570297d1643be657c94e237883ec8509801710f85c49e8439798994af,2024-08-20T02:15:06.337000 -CVE-2024-7948,0,0,a2b8918e4b2dd783cba504cf2241b92e6b57aaad06c536f7dcb93c5c38ab2fcf,2024-08-20T02:15:06.573000 -CVE-2024-7949,0,0,f6da521bf66a24f1e2e65f813597e7c65c7948639f9b805a51093e09824ebb6d,2024-08-20T02:15:06.817000 +CVE-2024-7926,0,1,96fa4895d6c7573e91e2a98dde52944f42d7ba88cdd8d8bade11bc21ef00bfee,2024-08-20T15:44:20.567000 +CVE-2024-7927,0,1,4a78d5081726f9d44b080fe7d011b0c0d4fe7d0db089023fb075b65099c4303f,2024-08-20T15:44:20.567000 +CVE-2024-7928,0,1,671a039a8258001c6ef11e23ca79fcb6be7f38f136ccb6e85345eff1e57a6325,2024-08-20T15:44:20.567000 +CVE-2024-7929,0,1,3bce83743bcd4323b2c554304cd5967c8e40ee8abfdc50d65b267211e069130c,2024-08-20T15:44:20.567000 +CVE-2024-7930,0,1,7ac0690429282e6ce5e02c773e06bcfc911350e07e5382e78b0ed8d5d85e33fb,2024-08-20T15:44:20.567000 +CVE-2024-7931,0,1,af418ec7a22c4fd04bb084eef689bf659bd39f3ecee18772a66d7e660300f647,2024-08-20T15:44:20.567000 +CVE-2024-7933,0,1,bd97967bf86da61714b16426b6353963e9607e818bdfc7d66fbd25bec1050a41,2024-08-20T15:44:20.567000 +CVE-2024-7934,0,1,0de99fdaf90b3723f8cc449fcce42a661448535d6c50386a3d2b0fbb725b1702,2024-08-20T15:44:20.567000 +CVE-2024-7935,0,1,574989ecf9a77b96f4e243d212e206ad1b2f7cf3109f812bd999eaafc2581a98,2024-08-20T15:44:20.567000 +CVE-2024-7936,0,1,cf4365fe1d0752346fd362041feab4848729c5ce67cb542c05b95010d5242c1e,2024-08-20T15:44:20.567000 +CVE-2024-7937,0,1,bfd626110b4738097d3eecc17d410635b5492a7f6c8b4af76523530d264a7d87,2024-08-20T15:44:20.567000 +CVE-2024-7942,0,1,5b31cb5e8458774e5fec47eb01ab09f3b7e76a9f352de27f599173dde8e64b06,2024-08-20T15:44:20.567000 +CVE-2024-7943,0,1,84fd281936993964831a8456f79f6df290184647869e7054aff52b4493acaea1,2024-08-20T15:44:20.567000 +CVE-2024-7944,0,1,663610bd19af05baccff8ed30fdea4b6dad68a15a9d16879945ad27f07010894,2024-08-20T15:44:20.567000 +CVE-2024-7945,0,1,2d203c1c29b024f88ee3b7227e338cd5142a37f19827f0958a6e660fe56a81e2,2024-08-20T15:44:20.567000 +CVE-2024-7946,0,1,fd037b5d720e856aa0df6446c4d5f261cd9338836a0b89bc8a3e66c91172da0a,2024-08-20T15:44:20.567000 +CVE-2024-7947,0,1,55a17b777c2727a9d5198f18e7cd79d1e697fa58892c329bf2c0ae50fc239784,2024-08-20T15:44:20.567000 +CVE-2024-7948,0,1,f86f46af4e10433dfdbb63175cf759444d87e68853678aab74d0579f8baaa6ae,2024-08-20T15:44:20.567000 +CVE-2024-7949,0,1,d28736f5bd3ae6cac0b634f14aa71a195aeb3974f7e232436da0812de0906ff8,2024-08-20T15:44:20.567000 CVE-2024-7958,0,0,483ea949f242fd0880547068782264d397026329e525a14dcbacca7c22e7bcec,2024-08-19T20:15:08.907000 +CVE-2024-8003,1,1,758a1d14516c7281f099a97088179c2e30fef28a491033cc2c207616771ff8ed,2024-08-20T15:44:20.567000 +CVE-2024-8005,1,1,fb303ce9b5523956d31743af9e352f3e80929fff92324ad367dffd602076c37d,2024-08-20T15:44:20.567000