From 9a766ddc8c1ef990a58f0300c2d1e721fccc56f1 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 31 Jul 2024 10:03:12 +0000 Subject: [PATCH] Auto-Update: 2024-07-31T10:00:17.083746+00:00 --- CVE-2023/CVE-2023-280xx/CVE-2023-28074.json | 60 +++++++++ CVE-2024/CVE-2024-25xx/CVE-2024-2508.json | 60 +++++++++ CVE-2024/CVE-2024-328xx/CVE-2024-32857.json | 56 ++++++++ CVE-2024/CVE-2024-371xx/CVE-2024-37127.json | 56 ++++++++ CVE-2024/CVE-2024-371xx/CVE-2024-37129.json | 56 ++++++++ CVE-2024/CVE-2024-371xx/CVE-2024-37142.json | 56 ++++++++ CVE-2024/CVE-2024-72xx/CVE-2024-7264.json | 33 +++++ CVE-2024/CVE-2024-73xx/CVE-2024-7300.json | 4 + CVE-2024/CVE-2024-73xx/CVE-2024-7303.json | 141 ++++++++++++++++++++ CVE-2024/CVE-2024-73xx/CVE-2024-7306.json | 141 ++++++++++++++++++++ CVE-2024/CVE-2024-73xx/CVE-2024-7307.json | 137 +++++++++++++++++++ CVE-2024/CVE-2024-73xx/CVE-2024-7308.json | 137 +++++++++++++++++++ README.md | 35 +++-- _state.csv | 37 +++-- 14 files changed, 978 insertions(+), 31 deletions(-) create mode 100644 CVE-2023/CVE-2023-280xx/CVE-2023-28074.json create mode 100644 CVE-2024/CVE-2024-25xx/CVE-2024-2508.json create mode 100644 CVE-2024/CVE-2024-328xx/CVE-2024-32857.json create mode 100644 CVE-2024/CVE-2024-371xx/CVE-2024-37127.json create mode 100644 CVE-2024/CVE-2024-371xx/CVE-2024-37129.json create mode 100644 CVE-2024/CVE-2024-371xx/CVE-2024-37142.json create mode 100644 CVE-2024/CVE-2024-72xx/CVE-2024-7264.json create mode 100644 CVE-2024/CVE-2024-73xx/CVE-2024-7303.json create mode 100644 CVE-2024/CVE-2024-73xx/CVE-2024-7306.json create mode 100644 CVE-2024/CVE-2024-73xx/CVE-2024-7307.json create mode 100644 CVE-2024/CVE-2024-73xx/CVE-2024-7308.json diff --git a/CVE-2023/CVE-2023-280xx/CVE-2023-28074.json b/CVE-2023/CVE-2023-280xx/CVE-2023-28074.json new file mode 100644 index 00000000000..46cb706f825 --- /dev/null +++ b/CVE-2023/CVE-2023-280xx/CVE-2023-28074.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2023-28074", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-07-31T08:15:02.243", + "lastModified": "2024-07-31T08:15:02.243", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell BSAFE Crypto-C Micro Edition 4.1.5 and Dell BSAFE Micro Edition Suite, versions 4.0 through 4.6.1 and version 5.0 contain a buffer over-read vulnerability." + }, + { + "lang": "es", + "value": "Dell BSAFE Crypto-C Micro Edition 4.1.5 y Dell BSAFE Micro Edition Suite, versiones 4.0 a 4.6.1 y versi\u00f3n 5.0 contienen una vulnerabilidad de sobrelectura de b\u00fafer." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000212325/dsa-2023-120-dell-bsafe-micro-edition-suite-security-update", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2508.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2508.json new file mode 100644 index 00000000000..62818b45109 --- /dev/null +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2508.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-2508", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-07-31T09:15:02.707", + "lastModified": "2024-07-31T09:15:02.707", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The WP Mobile Menu plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the save_menu_item_icon function in all versions up to, and including, 2.8.4.4. This makes it possible for unauthenticated attackers to add the '_mobmenu_icon' post meta to arbitrary posts with an arbitrary (but sanitized) value. NOTE: Version 2.8.4.4 contains a partial fix for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?old_path=%2Fmobile-menu%2Ftrunk%2Fincludes%2Fclass-wp-mobile-menu-core.php&old=3125561&new_path=%2Fmobile-menu%2Ftrunk%2Fincludes%2Fclass-wp-mobile-menu-core.php&new=3125561&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3cd9569f-3cda-4482-8ccd-c3f362b4e651?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32857.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32857.json new file mode 100644 index 00000000000..84423c41a93 --- /dev/null +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32857.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-32857", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-07-31T09:15:03.297", + "lastModified": "2024-07-31T09:15:03.297", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell Peripheral Manager, versions prior to 1.7.6, contain an uncontrolled search path element vulnerability. An attacker could potentially exploit this vulnerability through preloading malicious DLL or symbolic link exploitation, leading to arbitrary code execution and escalation of privilege" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000225474/dsa-2024-242", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37127.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37127.json new file mode 100644 index 00000000000..b786ee77056 --- /dev/null +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37127.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-37127", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-07-31T09:15:03.840", + "lastModified": "2024-07-31T09:15:03.840", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell Peripheral Manager, versions prior to 1.7.6, contain an uncontrolled search path element vulnerability. An attacker could potentially exploit this vulnerability through preloading malicious DLL or symbolic link exploitation, leading to arbitrary code execution and escalation of privilege" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000225474/dsa-2024-242", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37129.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37129.json new file mode 100644 index 00000000000..50513035fd8 --- /dev/null +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37129.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-37129", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-07-31T09:15:04.290", + "lastModified": "2024-07-31T09:15:04.290", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell Inventory Collector, versions prior to 12.3.0.6 contains a Path Traversal vulnerability. A local authenticated malicious user could potentially exploit this vulnerability, leading to arbitrary code execution on the system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000225779/dsa-2024-263", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37142.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37142.json new file mode 100644 index 00000000000..979ac29b823 --- /dev/null +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37142.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-37142", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-07-31T09:15:04.700", + "lastModified": "2024-07-31T09:15:04.700", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell Peripheral Manager, versions prior to 1.7.6, contain an uncontrolled search path element vulnerability. An attacker could potentially exploit this vulnerability through preloading malicious DLL or symbolic link exploitation, leading to arbitrary code execution and escalation of privilege" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000225474/dsa-2024-242", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7264.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7264.json new file mode 100644 index 00000000000..bc673aab13d --- /dev/null +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7264.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-7264", + "sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9", + "published": "2024-07-31T08:15:02.657", + "lastModified": "2024-07-31T08:15:02.657", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "libcurl's ASN1 parser code has the `GTime2str()` function, used for parsing an\nASN.1 Generalized Time field. If given an syntactically incorrect field, the\nparser might end up using -1 for the length of the *time fraction*, leading to\na `strlen()` getting performed on a pointer to a heap buffer area that is not\n(purposely) null terminated.\n\nThis flaw most likely leads to a crash, but can also lead to heap contents\ngetting returned to the application when\n[CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html) is used." + }, + { + "lang": "es", + "value": "El c\u00f3digo del analizador ASN1 de libcurl tiene la funci\u00f3n `GTime2str()`, que se utiliza para analizar un campo de tiempo generalizado ASN.1. Si se proporciona un campo sint\u00e1cticamente incorrecto, el analizador puede terminar usando -1 para la longitud de la *time fraction*, lo que lleva a que se ejecute una `strlen()` en un puntero a un \u00e1rea de b\u00fafer de almacenamiento din\u00e1mico que no est\u00e1 (intencionadamente) terminada en nulo. Este fallo probablemente lleve a un bloqueo, pero tambi\u00e9n puede llevar a que se devuelvan contenidos del mont\u00f3n a la aplicaci\u00f3n cuando se utiliza [CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html)." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://curl.se/docs/CVE-2024-7264.html", + "source": "2499f714-1537-4658-8207-48ae4bb9eae9" + }, + { + "url": "https://curl.se/docs/CVE-2024-7264.json", + "source": "2499f714-1537-4658-8207-48ae4bb9eae9" + }, + { + "url": "https://hackerone.com/reports/2629968", + "source": "2499f714-1537-4658-8207-48ae4bb9eae9" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7300.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7300.json index 57fa18b5e46..10092525e29 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7300.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7300.json @@ -16,6 +16,10 @@ { "lang": "en", "value": "** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic has been found in Bolt CMS 3.7.1. Affected is an unknown function of the file /bolt/editcontent/showcases of the component Showcase Creation Handler. The manipulation of the argument textarea leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273168. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the affected release tree is end-of-life." + }, + { + "lang": "es", + "value": " ** NO SOPORTADO CUANDO SE ASIGN\u00d3 ** Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en Bolt CMS 3.7.1. Una funci\u00f3n desconocida del archivo /bolt/editcontent/showcases del componente Showcase Creation Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento textarea conduce a cross site scripting. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-273168. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el mantenedor. NOTA: Se contact\u00f3 al proveedor tempranamente y se confirm\u00f3 que el \u00e1rbol de lanzamiento afectado ha llegado al final de su vida \u00fatil." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7303.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7303.json new file mode 100644 index 00000000000..b98fed3e443 --- /dev/null +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7303.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-7303", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-07-31T08:15:02.780", + "lastModified": "2024-07-31T08:15:02.780", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in itsourcecode Online Blood Bank Management System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /request.php of the component Send Blood Request Page. The manipulation of the argument Address/bloodgroup leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273185 was assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en itsourcecode Online Blood Bank Management System 1.0. Se ha calificado como problem\u00e1tica. Este problema afecta a algunos procesos desconocidos del archivo /request.php del componente Send Blood Request Page. La manipulaci\u00f3n del argumento Address/bloodgroup conduce a cross site scripting. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se ha asignado el identificador VDB-273185 a esta vulnerabilidad." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/cl4irv0yance/CVEs/issues/1", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.273185", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.273185", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.382035", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7306.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7306.json new file mode 100644 index 00000000000..e30ee42e457 --- /dev/null +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7306.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-7306", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-07-31T08:15:03.067", + "lastModified": "2024-07-31T08:15:03.067", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in SourceCodester Establishment Billing Management System 1.0. Affected is an unknown function of the file /manage_block.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-273198 is the identifier assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en SourceCodester Establishment Billing Management System 1.0. Se ve afectada una funci\u00f3n desconocida del archivo /manage_block.php. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. VDB-273198 es el identificador asignado a esta vulnerabilidad." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://gist.github.com/topsky979/0d5ec3fac4f1fc895478344be5521575", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.273198", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.273198", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.382327", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7307.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7307.json new file mode 100644 index 00000000000..484b2a0301f --- /dev/null +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7307.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7307", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-07-31T09:15:05.120", + "lastModified": "2024-07-31T09:15:05.120", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in SourceCodester Establishment Billing Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /manage_billing.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-273199." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://gist.github.com/topsky979/df642bf14cce32c58d4805b6f6cf44e0", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.273199", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.273199", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.382328", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7308.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7308.json new file mode 100644 index 00000000000..4f390ecff4b --- /dev/null +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7308.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7308", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-07-31T09:15:05.690", + "lastModified": "2024-07-31T09:15:05.690", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Establishment Billing Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /view_bill.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273200." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://gist.github.com/topsky979/c11fd2c1b9027831031de2e58cbf5ff3", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.273200", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.273200", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.382329", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index e213297d412..d4c38bdf3c5 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-07-31T08:00:17.299661+00:00 +2024-07-31T10:00:17.083746+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-07-31T07:15:02.760000+00:00 +2024-07-31T09:15:05.690000+00:00 ``` ### Last Data Feed Release @@ -33,32 +33,31 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -258616 +258627 ``` ### CVEs added in the last Commit -Recently added CVEs: `13` +Recently added CVEs: `11` -- [CVE-2024-42381](CVE-2024/CVE-2024-423xx/CVE-2024-42381.json) (`2024-07-31T06:15:02.130`) -- [CVE-2024-6165](CVE-2024/CVE-2024-61xx/CVE-2024-6165.json) (`2024-07-31T06:15:03.373`) -- [CVE-2024-6272](CVE-2024/CVE-2024-62xx/CVE-2024-6272.json) (`2024-07-31T06:15:03.637`) -- [CVE-2024-6408](CVE-2024/CVE-2024-64xx/CVE-2024-6408.json) (`2024-07-31T06:15:03.913`) -- [CVE-2024-6412](CVE-2024/CVE-2024-64xx/CVE-2024-6412.json) (`2024-07-31T06:15:04.083`) -- [CVE-2024-6695](CVE-2024/CVE-2024-66xx/CVE-2024-6695.json) (`2024-07-31T06:15:04.237`) -- [CVE-2024-6770](CVE-2024/CVE-2024-67xx/CVE-2024-6770.json) (`2024-07-31T06:15:04.407`) -- [CVE-2024-6980](CVE-2024/CVE-2024-69xx/CVE-2024-6980.json) (`2024-07-31T07:15:02.053`) -- [CVE-2024-7205](CVE-2024/CVE-2024-72xx/CVE-2024-7205.json) (`2024-07-31T06:15:05.327`) -- [CVE-2024-7289](CVE-2024/CVE-2024-72xx/CVE-2024-7289.json) (`2024-07-31T06:15:06.313`) -- [CVE-2024-7290](CVE-2024/CVE-2024-72xx/CVE-2024-7290.json) (`2024-07-31T06:15:07.533`) -- [CVE-2024-7299](CVE-2024/CVE-2024-72xx/CVE-2024-7299.json) (`2024-07-31T07:15:02.377`) -- [CVE-2024-7300](CVE-2024/CVE-2024-73xx/CVE-2024-7300.json) (`2024-07-31T07:15:02.760`) +- [CVE-2023-28074](CVE-2023/CVE-2023-280xx/CVE-2023-28074.json) (`2024-07-31T08:15:02.243`) +- [CVE-2024-2508](CVE-2024/CVE-2024-25xx/CVE-2024-2508.json) (`2024-07-31T09:15:02.707`) +- [CVE-2024-32857](CVE-2024/CVE-2024-328xx/CVE-2024-32857.json) (`2024-07-31T09:15:03.297`) +- [CVE-2024-37127](CVE-2024/CVE-2024-371xx/CVE-2024-37127.json) (`2024-07-31T09:15:03.840`) +- [CVE-2024-37129](CVE-2024/CVE-2024-371xx/CVE-2024-37129.json) (`2024-07-31T09:15:04.290`) +- [CVE-2024-37142](CVE-2024/CVE-2024-371xx/CVE-2024-37142.json) (`2024-07-31T09:15:04.700`) +- [CVE-2024-7264](CVE-2024/CVE-2024-72xx/CVE-2024-7264.json) (`2024-07-31T08:15:02.657`) +- [CVE-2024-7303](CVE-2024/CVE-2024-73xx/CVE-2024-7303.json) (`2024-07-31T08:15:02.780`) +- [CVE-2024-7306](CVE-2024/CVE-2024-73xx/CVE-2024-7306.json) (`2024-07-31T08:15:03.067`) +- [CVE-2024-7307](CVE-2024/CVE-2024-73xx/CVE-2024-7307.json) (`2024-07-31T09:15:05.120`) +- [CVE-2024-7308](CVE-2024/CVE-2024-73xx/CVE-2024-7308.json) (`2024-07-31T09:15:05.690`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `1` +- [CVE-2024-7300](CVE-2024/CVE-2024-73xx/CVE-2024-7300.json) (`2024-07-31T07:15:02.760`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 87a710cc25b..625a6a1fe3e 100644 --- a/_state.csv +++ b/_state.csv @@ -220893,6 +220893,7 @@ CVE-2023-28070,0,0,6b06dac3e6645bdcdf2daa8669376f0eb71633f1db849c20838f9de3974a9 CVE-2023-28071,0,0,ac8ad066b4568a2740ef70c8b83380502d2da7385bb0318b9932a819e6b4c283,2023-06-30T21:17:54.033000 CVE-2023-28072,0,0,890c8c3e435d94e75601ba5f3f01cc951f80d11c3fba8ba23584cdbf9590ee73,2023-09-08T13:58:40.990000 CVE-2023-28073,0,0,c0805fe755dae08afe34203444849dc743ef82b285490ed67a8b997664d73c67,2023-06-30T21:17:26.547000 +CVE-2023-28074,1,1,e4f7f90cb63ace57cc45d6922123aa924b0c2ba48a37df9d653b232d42ae9004,2024-07-31T08:15:02.243000 CVE-2023-28075,0,0,263fb4056eae49bf0d178dd7eda3048b6eedb73f77bd02c9854e350cf9c199f0,2023-08-22T22:11:00.903000 CVE-2023-28076,0,0,49f73a0b782d30b42b8832cdfd6102bec5b80abbc6c6645b8949d1e69a2e7e37,2023-05-25T18:55:37.740000 CVE-2023-28077,0,0,864f1d99379daf3c5d006eb293792bffe251fd714ed14e7eec5fb2504cc09dd7,2024-02-15T18:40:41.303000 @@ -245924,6 +245925,7 @@ CVE-2024-25076,0,0,26f9af1ba1d1d6abf593ce5cb002ec7a5de923ee3f100a60b5eb1daeac203 CVE-2024-25077,0,0,7eac67ae98b31640cc323f8f90a86c0baf27eb357da01b5c4f82ab8eafeeba64,2024-07-11T13:05:54.930000 CVE-2024-25078,0,0,14ea593bbd760f1a861775a7e6100acb3fd7a8f88d884ae3f61694ec3c2b2927,2024-07-03T01:48:39.997000 CVE-2024-25079,0,0,df3a5b95b7f6f4370caee005112754774cb6bfa4fa30f82a6ed48ecf2a7fc17d,2024-07-03T01:48:40.830000 +CVE-2024-2508,1,1,971fb72f96417d21e0ecedd35f7e7c96678c146b1a9bf5dde8b01d4ff81ca928,2024-07-31T09:15:02.707000 CVE-2024-25080,0,0,18626c970f137cdb9398dd9a27a57c97c76048e9872d0484e7e3cc74df35e9d3,2024-04-01T12:49:00.877000 CVE-2024-25081,0,0,13600305b93f84e08309226bade4a86ad3c418fa1a97dd09629fdf9d241f21e9,2024-05-01T19:15:22.183000 CVE-2024-25082,0,0,c4024b086b0d99b44b3d9149e06878bd50b7e82765ae87c23c8e458108c36ef4,2024-05-01T19:15:22.237000 @@ -251432,6 +251434,7 @@ CVE-2024-32853,0,0,a1dca3d4bd42a909fb90bb63c4311872870004374a80c3f2c77a99712953a CVE-2024-32854,0,0,ca09015aea734c79d590c062091997f16b37e268e9b438da15806fb6d9439330,2024-07-03T17:59:14.203000 CVE-2024-32855,0,0,c49305c977dd2e708a0d316df4ef9be1d74cd331a1c2ffedbc125e28a10592cf,2024-06-25T12:24:17.873000 CVE-2024-32856,0,0,6d8137a0b9dec706e783082fa3a1037a7f0ce7ef4a6d1bed9d383583e1a8b038,2024-06-13T18:35:19.777000 +CVE-2024-32857,1,1,bda2a0a82d0c45b964ea4cbbfa14411d9a0aa793fe2185c65a57294fd3d635c9,2024-07-31T09:15:03.297000 CVE-2024-32858,0,0,bea038833c00e1cf5cd6721712641f32c5f903e89a9e6f9359da9d5e4bbbe75c,2024-06-13T18:35:19.777000 CVE-2024-32859,0,0,03cfa9128131e4e31b6c7a7857fb4f0bbd43d768e740100a365b65d50eaff363,2024-06-13T18:35:19.777000 CVE-2024-3286,0,0,f064673537255c8b5419193db861ab38d2aa66df0f5b7dffd2eb436b55f3980e,2024-05-17T18:36:31.297000 @@ -254096,6 +254099,8 @@ CVE-2024-37121,0,0,f38dd3795bb34ab592f0837185cc69e5390fe6be6ea0a7f8fed8aebfe54c3 CVE-2024-37122,0,0,b311939d15bf048863cce658485cfe0a8e332201062bbe989c7fc9c6113ec98e,2024-07-25T19:28:05.110000 CVE-2024-37124,0,0,36b2aea5b40210d79bc623ba24647826a1125982402ceccf247fbf8a08ffdaed,2024-07-03T02:04:07.457000 CVE-2024-37126,0,0,1f6046db51cdcb2727f4678a45f9e51ce9aa79ec8b1a1ad373e1661d9aaf1cda,2024-07-03T18:00:57.573000 +CVE-2024-37127,1,1,95306913304e13e7cf18a527d2736f8a418e6275610717e641efd424b9a041d8,2024-07-31T09:15:03.840000 +CVE-2024-37129,1,1,98448253a162c24a920b41f1e43bb018398c642d30743dffd0f003b85b01d596,2024-07-31T09:15:04.290000 CVE-2024-37130,0,0,cbd9dfc340def95265d907da6835c0ba032c0f95252bb398ce7a3b8c9a6f4189,2024-06-11T13:54:12.057000 CVE-2024-37131,0,0,1b53fe6698cfc8662ae4f6c0ed3f87f760fe2128440fb0619b7f2633753262fb,2024-06-13T18:35:19.777000 CVE-2024-37132,0,0,32a23a7a93e12576e3cef44acbc1e26d96ab3673ab3a48bd46dd4729adbaca95,2024-07-03T18:01:07.500000 @@ -254107,6 +254112,7 @@ CVE-2024-37139,0,0,8bcc51f0578107c550f57eda3e8f8169088ed87cca1e5fda916b143e22a12 CVE-2024-3714,0,0,4bcb0bea6568f5dfd8667c7519e5c32cf286da2de79c4bdf6bef9437b54c8d03,2024-05-20T13:00:34.807000 CVE-2024-37140,0,0,c0e59e0c3820f0b4a910e5eed0fb2eac2eba5c793659c906795da47f31c33278,2024-06-26T12:44:29.693000 CVE-2024-37141,0,0,4138154ff13405362c4f0fa9b34cca08a172e0f83625a1ab272957b9a58f67e5,2024-06-26T12:44:29.693000 +CVE-2024-37142,1,1,4d00f2f5e5084b2a3241c34d067be0c34efc1f4379a6d483f5f4cf517a8a8f3a,2024-07-31T09:15:04.700000 CVE-2024-37145,0,0,1222762eaa12a0e0a49c86b792d6f13bb19acede2c9bc472eb8e6da85dd8abda,2024-07-02T12:09:16.907000 CVE-2024-37146,0,0,c0ed63c770ec79d5a3ba66c3386d10a89c2cf22e01c61def1bf7a85931426fdf,2024-07-02T12:09:16.907000 CVE-2024-37147,0,0,ba8c50fbc8db39821634ae7e204809a5bbf05c4c8996a3abdce4e3ee027f0fca,2024-07-11T13:05:54.930000 @@ -256461,7 +256467,7 @@ CVE-2024-4235,0,0,f578447debade3af3e230e69e9dbc9d9ff3e97fecc115950bd6af5b863fac2 CVE-2024-4236,0,0,e2cdfe0d631cec0094aabd9e613a58fc530f718522481021cb8970e2da56a2c3,2024-06-04T19:20:32.960000 CVE-2024-4237,0,0,c38818d0c288b1eec57a9be9e655b05254cb3f3487787a1ecd91e69d9c20b38c,2024-05-17T02:40:19.580000 CVE-2024-4238,0,0,188cceccdce16b8df034bef32fee010a6dd0f801c6690e1589421c7cadfb521c,2024-06-04T19:20:33.063000 -CVE-2024-42381,1,1,39b7d8681fc25c5d7d29a0c0148b32fde4605ae198a447fe09f7a3a9c7cdd92d,2024-07-31T06:15:02.130000 +CVE-2024-42381,0,0,39b7d8681fc25c5d7d29a0c0148b32fde4605ae198a447fe09f7a3a9c7cdd92d,2024-07-31T06:15:02.130000 CVE-2024-4239,0,0,cecc2be82896f12bf6cdae75a3b125d58c075d387f3da865cfaf565a2c454897,2024-06-04T19:20:33.163000 CVE-2024-4240,0,0,c278b752586c1bf53091999087140c7ddb924945ab9e2c19f82d090171b2b4e6,2024-06-04T19:20:33.263000 CVE-2024-4241,0,0,1e8cfaace7e8ae3194846b1351a77e14aef6cd3a07b429e780198fa55ccad7c3,2024-05-17T02:40:19.957000 @@ -258030,7 +258036,7 @@ CVE-2024-6161,0,0,4874ef369326f57ebaead3e865a12df6057ceb7ec30e698c3deb9b52e2b100 CVE-2024-6162,0,0,58e77c96a091e21bc4222c97fd6c9956f581d56d70327ff91056071a087926f0,2024-07-25T21:15:11.677000 CVE-2024-6163,0,0,a7111efd9bbca18864edd7eac6469f395d4eb81bc59fa76c3e42cc0c59bc6e2c,2024-07-08T15:49:22.437000 CVE-2024-6164,0,0,614f49d1e735bb6e3edae2e7504c9e172f5564ab53752d92c142ee3a46cadc2e,2024-07-18T12:28:43.707000 -CVE-2024-6165,1,1,dc9a41ef51e650beadc4f23f833832ed913d994bfb331e6ea282de552837f4e9,2024-07-31T06:15:03.373000 +CVE-2024-6165,0,0,dc9a41ef51e650beadc4f23f833832ed913d994bfb331e6ea282de552837f4e9,2024-07-31T06:15:03.373000 CVE-2024-6166,0,0,c93093bf8454afe95675994fb929c06931906789a59088dfba4992e2491ed4c6,2024-07-12T14:23:53.600000 CVE-2024-6167,0,0,53411719c1d4f7c7e0b31dcbc40822727b85ab3cd28b45158c4db6b81cb57664,2024-07-09T18:19:14.047000 CVE-2024-6168,0,0,a9d8b124b0d612b4817eae957707544bf3f1e74cb49f5394cfd698c29b52bb54,2024-07-09T18:19:14.047000 @@ -258107,7 +258113,7 @@ CVE-2024-6267,0,0,693665502396a8f2760ff0a194782c5c48821dd90ed508792042af1972e2ad CVE-2024-6268,0,0,e3e35d0049e774331d2151e442525bd992cba867b327c069ba368c32d8bd87bf,2024-06-26T20:15:16.893000 CVE-2024-6269,0,0,5faaf462a19676e34593dd0a0afbe0cb206ebbb8a7e70c532ba34e4117e361f3,2024-06-26T19:15:14.483000 CVE-2024-6271,0,0,d024c16fd7c4b2b04328abf7d7f44dcfe36c0053b84c0bf959b0b51a37618966,2024-07-25T15:14:33.857000 -CVE-2024-6272,1,1,9cf4a7ffd9612da301b3a0a27333739a70c68c4219c3b6a3e1a2caffc2a797aa,2024-07-31T06:15:03.637000 +CVE-2024-6272,0,0,9cf4a7ffd9612da301b3a0a27333739a70c68c4219c3b6a3e1a2caffc2a797aa,2024-07-31T06:15:03.637000 CVE-2024-6273,0,0,ee5202b6a0bcfc7a40a266aa2aa86d2d546d7d0a335d210650da452fe4ac0950,2024-06-25T13:15:50.403000 CVE-2024-6274,0,0,5445e5244574eb35dee4d3a86757e63aa764a2dd3baf93da96725400aa49bff7,2024-06-24T12:57:36.513000 CVE-2024-6275,0,0,34263dcde8e1b5222af573d3152e1f6b3c783b399a6e9b4a2a7c05be9cba88fa,2024-06-25T16:15:25.923000 @@ -258198,11 +258204,11 @@ CVE-2024-6402,0,0,795485c4534407e246daec51c1daaa33b95f6651688fed743a8fb9054cdaed CVE-2024-6403,0,0,e44b9cfa8d9ae367e624a8cdf179ef52ea1e98c2115d7a956299d17747a6a56b,2024-07-01T12:37:24.220000 CVE-2024-6405,0,0,aeb7997c4465363fb3b56142b10f471ded7e1b160c931780f90562328efb5a26,2024-07-01T12:37:24.220000 CVE-2024-6407,0,0,12314028e09ddfd135bb748e0530e9ce4aee25dcaa6c2bae62524650d54b655f,2024-07-12T16:36:34.747000 -CVE-2024-6408,1,1,44922d0fb7ae368f84301005293b965a2490041021d6efd5896ed6b40c396d6b,2024-07-31T06:15:03.913000 +CVE-2024-6408,0,0,44922d0fb7ae368f84301005293b965a2490041021d6efd5896ed6b40c396d6b,2024-07-31T06:15:03.913000 CVE-2024-6409,0,0,40730f06fb7ebb7f1a7924edcad135a5b2e86e4e96c3650a4afd0b819bc01ed7,2024-07-24T21:15:12.700000 CVE-2024-6410,0,0,9db961a9e1824a35ea4ea0ac1b25800d120aafac2e5d4caf32d46e6051ad19d3,2024-07-11T13:05:54.930000 CVE-2024-6411,0,0,47c8df8c850420fccb0a9ac1089e4a10bdc49d8ecc38cd5ac33a449b2082a491,2024-07-11T13:05:54.930000 -CVE-2024-6412,1,1,a3a5ef3ddc3f9c2cd76069f9f7c6fde060858900aca0711426983fd1f3456ed9,2024-07-31T06:15:04.083000 +CVE-2024-6412,0,0,a3a5ef3ddc3f9c2cd76069f9f7c6fde060858900aca0711426983fd1f3456ed9,2024-07-31T06:15:04.083000 CVE-2024-6414,0,0,ae0d661be5f3239fdfe6f0d08030fef27c03212dc1e12675bcf532fd90369002,2024-07-01T12:37:24.220000 CVE-2024-6415,0,0,2d930efbf55d72578aa6f6117194938fd91dbe48efc49659be82131c011d6129,2024-07-01T12:37:24.220000 CVE-2024-6416,0,0,1d3038bca30e2041aec4c6f6e9ac2c7cb38b0b032dbc11dcdc7f3d31ad18d01f,2024-07-01T12:37:24.220000 @@ -258358,7 +258364,7 @@ CVE-2024-6680,0,0,131299d0989a76f846afb0c8ae15f4692f1a0fdd9931fad30c165660cd1232 CVE-2024-6681,0,0,fd87484dafd740c0f788720b14149eb40f6b6d8ce371416d0e039ce9acf82071,2024-07-11T18:09:58.777000 CVE-2024-6689,0,0,d40d4a6e022419e83ed34bb3a74eb0d24556e6d76f7b0a592f90775a9d52873c,2024-07-16T13:43:58.773000 CVE-2024-6694,0,0,7d61bbb6e4266a8c90354c9d0cb6da1ede156f667671ed3e7d5507b5e685e063,2024-07-22T13:00:53.287000 -CVE-2024-6695,1,1,b65bf0f51d53701881bdf7ea532778cd4f7f9a1652928966be35adc88301abd3,2024-07-31T06:15:04.237000 +CVE-2024-6695,0,0,b65bf0f51d53701881bdf7ea532778cd4f7f9a1652928966be35adc88301abd3,2024-07-31T06:15:04.237000 CVE-2024-6699,0,0,6e43517d823543b1bfe29f11155aa061b1b3007e0c0d0141333897dcac3700cf,2024-07-30T13:32:45.943000 CVE-2024-6703,0,0,58688b231f5fc6deacad90c54b9ce0876a71daf3ee0061b5562a2bcbb8052bf3,2024-07-29T14:12:08.783000 CVE-2024-6705,0,0,1e166467558902cf3ff2211f8b1aa347feb308f999c65053186e5a13806e8368,2024-07-18T12:28:43.707000 @@ -258397,7 +258403,7 @@ CVE-2024-6755,0,0,ab1b630d4d60f43a14793abf6a91e747f24cf32e85dd2f18d0c7fae990d484 CVE-2024-6756,0,0,f587e50343ba8d4d9984018181e54a04ca58befeaa1fc8ceb12c6bae56622e09,2024-07-24T12:55:13.223000 CVE-2024-6761,0,0,f38b3ccdc89aa0093bd659ba31741817a9ff74cb3bee1ce8404957bf0a35b578,2024-07-29T11:15:10.140000 CVE-2024-6765,0,0,582116fb1612a7c43e0b570dc3dd773f185a6bed827d147d00793764d2f2774e,2024-07-17T14:15:04.327000 -CVE-2024-6770,1,1,5c962fa499fe4c0fae45c84b2833e72c8518d2de49afe5528aef0631bfa0abcc,2024-07-31T06:15:04.407000 +CVE-2024-6770,0,0,5c962fa499fe4c0fae45c84b2833e72c8518d2de49afe5528aef0631bfa0abcc,2024-07-31T06:15:04.407000 CVE-2024-6772,0,0,cc08723700878586fe2b2cb702b9aeb8e7ff85837a231851739a99e842cb1c05,2024-07-17T13:34:20.520000 CVE-2024-6773,0,0,a5867869124c1a4b8949c923d047a73abaebfa5c6d8b0baadecd79e09f60d48f,2024-07-17T13:34:20.520000 CVE-2024-6774,0,0,b9aa3de8036d2e47ab5a62ba9fb48c855950418547b1d3607a9791164435ed5d,2024-07-17T13:34:20.520000 @@ -258487,7 +258493,7 @@ CVE-2024-6968,0,0,57675d10d151b515d8654e4a2d23336a097aabe29c179fc0cfbb72272365b2 CVE-2024-6969,0,0,2345a97b06e5d388bdf778f25c67289987f0f6d0622466c7c196f2cd07649113,2024-07-25T15:38:51.787000 CVE-2024-6970,0,0,4194a84f3c5724b9bace97395e0f8e6456cd70a8d0cf3d46afccc165b27983cb,2024-07-25T15:36:44.567000 CVE-2024-6972,0,0,136930c91bb85ebbdb27bc99dae627302f90363fa18ab987405ebabe27d12e99,2024-07-25T12:36:39.947000 -CVE-2024-6980,1,1,da7b35a3c988b3a672618fb6bd094d48c0a05a571e09ce34c6a2116355033259,2024-07-31T07:15:02.053000 +CVE-2024-6980,0,0,da7b35a3c988b3a672618fb6bd094d48c0a05a571e09ce34c6a2116355033259,2024-07-31T07:15:02.053000 CVE-2024-6984,0,0,5e471e68c1f9c8af4cd4126a693da97e089cde1a0fe72eca9e017c53446a32dc,2024-07-29T16:21:52.517000 CVE-2024-7007,0,0,d661b80f381c5e5a20762050cd26d7cdbc7442dd5816d04953c75c3bb9a2e0ae,2024-07-26T12:38:41.683000 CVE-2024-7014,0,0,bf4bcb57365a86d29a45ebd019245eec542daaec8aac5d2bd790565f954bcfee,2024-07-24T12:55:13.223000 @@ -258571,7 +258577,7 @@ CVE-2024-7199,0,0,1c38ae71600e9c4c0d209d192fce66196ad6d1d1454dfe95d9b268bf29c6a5 CVE-2024-7200,0,0,d21a4dd541acbc0094d3b150aee5dc57732e3b43b8983d68802bfc40bea446f0,2024-07-29T14:12:08.783000 CVE-2024-7201,0,0,ada84f4b903b0c95dc45be4013db2022612c9fdb66b840b2138f16a8a9061fa8,2024-07-29T14:12:08.783000 CVE-2024-7202,0,0,47ee30ff0ebecde915aadd7cf1bd702d0bebf04cac4786411e427c0fde39b1f2,2024-07-29T14:12:08.783000 -CVE-2024-7205,1,1,055498b07fc29043cccb0168311bdce18c0cf0dcb2b61aff57ef98d24231779b,2024-07-31T06:15:05.327000 +CVE-2024-7205,0,0,055498b07fc29043cccb0168311bdce18c0cf0dcb2b61aff57ef98d24231779b,2024-07-31T06:15:05.327000 CVE-2024-7208,0,0,46953efa12a5d662fff94e2c99734c2e20fbdfcfc741cd26c9caf517aab8eea2,2024-07-30T17:15:14.360000 CVE-2024-7209,0,0,981807f81ce86beb4f096cbcdb19b49a40a39636a3c8cf91886492003874ebb8,2024-07-30T17:15:14.450000 CVE-2024-7212,0,0,f6bebad6ae53838fdfc46656ae8fba28c66f127a824bd527778b34c8dcd63e65,2024-07-30T13:32:45.943000 @@ -258594,6 +258600,7 @@ CVE-2024-7249,0,0,b1c62b4f237d55dfb39f8f205e178006f9409a78ccfd426e79f2f98ca375d8 CVE-2024-7250,0,0,2ad6dc357ed437eabcd60fe2775245fd2e54c1167d56f0a56470e33155a5fc4c,2024-07-30T13:32:45.943000 CVE-2024-7251,0,0,56e37f41fcf38f76a5deb1629f8d7e708899009a1e9f2b615de298d4a45a835f,2024-07-30T13:32:45.943000 CVE-2024-7252,0,0,b11855d09d58123416b1c452f42a306230094dfbea0e43cbf3d1a4ad2d82d89e,2024-07-30T13:32:45.943000 +CVE-2024-7264,1,1,e086318ea6b429ab71bf8b4ea7ce86bf1f2fe6605eda3c9d0b2fa570872431c9,2024-07-31T08:15:02.657000 CVE-2024-7273,0,0,96ac7cdc7b0d4132cb85ff0c2e5f52cf75d02b34301d6b8ef1b0ed79592b5528,2024-07-30T21:15:10.110000 CVE-2024-7274,0,0,b57c3d31acd72479d0c9665e0d6fbb54fdae7dd490df9913f174ea98d2a960bb,2024-07-30T22:15:02.500000 CVE-2024-7275,0,0,50392863a3634838385afedbdca878dc149a56a1a7dd190b11bbf5e3ee0f96f3,2024-07-30T23:15:03.280000 @@ -258610,8 +258617,12 @@ CVE-2024-7285,0,0,dd41b1f5c45d708684103eb69e9ab9a39ef93e06ce8a773d78ed87c7d0c271 CVE-2024-7286,0,0,75f9876d47bbc461c22d83d829119e4ab85c9a27350e6baf6739c29b6ccac3c1,2024-07-31T04:15:06.837000 CVE-2024-7287,0,0,fbf7278acad0e96391559d6b15176dbbecb92e7788388ae658b5935c2ce9765e,2024-07-31T05:15:09.907000 CVE-2024-7288,0,0,a889d279b031c21fcc987793ad11e995397744f85cd99d55b4cb4602b6fc049c,2024-07-31T05:15:10.247000 -CVE-2024-7289,1,1,8162b46fee11e705c6d94b9177ff2c74cce16ddbc6b3feb9c7afadf13ca77bbf,2024-07-31T06:15:06.313000 -CVE-2024-7290,1,1,41a29a0d813db2af8fdad631964ebbfbd0ee10ee38dc78556ef5b78449870de5,2024-07-31T06:15:07.533000 +CVE-2024-7289,0,0,8162b46fee11e705c6d94b9177ff2c74cce16ddbc6b3feb9c7afadf13ca77bbf,2024-07-31T06:15:06.313000 +CVE-2024-7290,0,0,41a29a0d813db2af8fdad631964ebbfbd0ee10ee38dc78556ef5b78449870de5,2024-07-31T06:15:07.533000 CVE-2024-7297,0,0,2e874bfba57ad5ec5745065eab38f5876ea9fcd7307b48661cf2daf7f9f6b574,2024-07-30T17:15:14.513000 -CVE-2024-7299,1,1,3fb9f1bd94c66594f63b2cacff046186fb38c633caa0ac8386bda97d4dfe5638,2024-07-31T07:15:02.377000 -CVE-2024-7300,1,1,b3c7cdd075745bcb332425558cf2231190c9514333b35c605f4a02a71ba6cf2c,2024-07-31T07:15:02.760000 +CVE-2024-7299,0,0,3fb9f1bd94c66594f63b2cacff046186fb38c633caa0ac8386bda97d4dfe5638,2024-07-31T07:15:02.377000 +CVE-2024-7300,0,1,31d8d933a941e4311b2fc0d187199600c88c4927f788dd898236ed0fa05ae2e8,2024-07-31T07:15:02.760000 +CVE-2024-7303,1,1,7113ceea02bd7fd8e108db20e954449268a9eebf6ddda040c536f761d77376a8,2024-07-31T08:15:02.780000 +CVE-2024-7306,1,1,3e1f3466aff4b93c42d001cc6ca2bd349f09ab635f263b655318bc9d5b5bc247,2024-07-31T08:15:03.067000 +CVE-2024-7307,1,1,d26631c7f2b2beb856e308b77200d0ca4a6deb94f9f494fe9d95c09e42f56fe9,2024-07-31T09:15:05.120000 +CVE-2024-7308,1,1,2f212ab0f5376a780a44c5d61303d5fb8e21c94c1eed7e88aba27b4d6a00e77e,2024-07-31T09:15:05.690000