From b14c55f4103248312cebdeb8b900a161f013cdee Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 15 Aug 2024 06:03:13 +0000 Subject: [PATCH] Auto-Update: 2024-08-15T06:00:16.900542+00:00 --- CVE-2024/CVE-2024-65xx/CVE-2024-6534.json | 60 ++++++++++ CVE-2024/CVE-2024-78xx/CVE-2024-7814.json | 133 +++++++++++++++++++++ CVE-2024/CVE-2024-78xx/CVE-2024-7815.json | 137 ++++++++++++++++++++++ README.md | 21 ++-- _state.csv | 23 ++-- 5 files changed, 350 insertions(+), 24 deletions(-) create mode 100644 CVE-2024/CVE-2024-65xx/CVE-2024-6534.json create mode 100644 CVE-2024/CVE-2024-78xx/CVE-2024-7814.json create mode 100644 CVE-2024/CVE-2024-78xx/CVE-2024-7815.json diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6534.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6534.json new file mode 100644 index 00000000000..6d47efd670b --- /dev/null +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6534.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-6534", + "sourceIdentifier": "help@fluidattacks.com", + "published": "2024-08-15T04:15:07.937", + "lastModified": "2024-08-15T04:15:07.937", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Directus v10.13.0 allows an authenticated external attacker to modify presets created by the same user to assign them to another user. This is possible because the application only validates the user parameter in the 'POST /presets'\u00a0request but not in the PATCH request. When chained with CVE-2024-6533, it could result in account takeover." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "help@fluidattacks.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "help@fluidattacks.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://directus.io/", + "source": "help@fluidattacks.com" + }, + { + "url": "https://fluidattacks.com/advisories/capaldi", + "source": "help@fluidattacks.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7814.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7814.json new file mode 100644 index 00000000000..da41886bf20 --- /dev/null +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7814.json @@ -0,0 +1,133 @@ +{ + "id": "CVE-2024-7814", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-15T04:15:08.590", + "lastModified": "2024-08-15T04:15:08.590", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, was found in CodeAstro Online Railway Reservation System 1.0. Affected is an unknown function of the file /admin/admin-add-employee.php of the component Add Employee Page. The manipulation of the argument emp_fname /emp_lname /emp_nat_idno/emp_addr leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 2.4, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 3.3 + }, + "baseSeverity": "LOW", + "exploitabilityScore": 6.4, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/CYB84/CVE_Writeup/blob/main/Online%20Railway%20Reservation%20System/Stored%20XSS.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274710", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274710", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7815.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7815.json new file mode 100644 index 00000000000..4c1a5161999 --- /dev/null +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7815.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7815", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-15T04:15:09.510", + "lastModified": "2024-08-15T04:15:09.510", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in CodeAstro Online Railway Reservation System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/admin-update-employee.php of the component Update Employee Page. The manipulation of the argument emp_fname /emp_lname /emp_nat_idno/emp_addr leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 2.4, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 3.3 + }, + "baseSeverity": "LOW", + "exploitabilityScore": 6.4, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/CYB84/CVE_Writeup/blob/main/Online%20Railway%20Reservation%20System/Stored%20XSS.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274711", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274711", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.391376", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 0e8ac0b19f6..98f22d4a9a6 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-08-15T04:00:17.071048+00:00 +2024-08-15T06:00:16.900542+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-08-15T03:15:06.140000+00:00 +2024-08-15T04:15:09.510000+00:00 ``` ### Last Data Feed Release @@ -33,23 +33,16 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -260082 +260085 ``` ### CVEs added in the last Commit -Recently added CVEs: `10` +Recently added CVEs: `3` -- [CVE-2024-25024](CVE-2024/CVE-2024-250xx/CVE-2024-25024.json) (`2024-08-15T03:15:04.353`) -- [CVE-2024-6533](CVE-2024/CVE-2024-65xx/CVE-2024-6533.json) (`2024-08-15T03:15:04.567`) -- [CVE-2024-7420](CVE-2024/CVE-2024-74xx/CVE-2024-7420.json) (`2024-08-15T03:15:04.830`) -- [CVE-2024-7624](CVE-2024/CVE-2024-76xx/CVE-2024-7624.json) (`2024-08-15T03:15:05.070`) -- [CVE-2024-7628](CVE-2024/CVE-2024-76xx/CVE-2024-7628.json) (`2024-08-15T03:15:05.310`) -- [CVE-2024-7809](CVE-2024/CVE-2024-78xx/CVE-2024-7809.json) (`2024-08-15T02:15:03.763`) -- [CVE-2024-7810](CVE-2024/CVE-2024-78xx/CVE-2024-7810.json) (`2024-08-15T02:15:04.087`) -- [CVE-2024-7811](CVE-2024/CVE-2024-78xx/CVE-2024-7811.json) (`2024-08-15T03:15:05.540`) -- [CVE-2024-7812](CVE-2024/CVE-2024-78xx/CVE-2024-7812.json) (`2024-08-15T03:15:05.847`) -- [CVE-2024-7813](CVE-2024/CVE-2024-78xx/CVE-2024-7813.json) (`2024-08-15T03:15:06.140`) +- [CVE-2024-6534](CVE-2024/CVE-2024-65xx/CVE-2024-6534.json) (`2024-08-15T04:15:07.937`) +- [CVE-2024-7814](CVE-2024/CVE-2024-78xx/CVE-2024-7814.json) (`2024-08-15T04:15:08.590`) +- [CVE-2024-7815](CVE-2024/CVE-2024-78xx/CVE-2024-7815.json) (`2024-08-15T04:15:09.510`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index 4d9bd8c77a5..9715d74f9ef 100644 --- a/_state.csv +++ b/_state.csv @@ -246064,7 +246064,7 @@ CVE-2024-25015,0,0,4c1212c8f769823bd4e7049fb129f848dc20c143fc1cc72b02abca5f7451e CVE-2024-25016,0,0,0e9311458b59df4142779e7a8b1d9bd170deea1a4bb4a555b03bbf822c263b92,2024-03-04T13:58:23.447000 CVE-2024-25021,0,0,8332f86306f4ceab760e5f5e3a003f3f5c62fd1b6b574c6e3af70a41de71cd64,2024-02-22T19:07:27.197000 CVE-2024-25023,0,0,3b6e01d80c9261e3c9d5f00ef664e0cb38b680e426f57b9aa0b21aa4414e149e,2024-07-11T13:05:54.930000 -CVE-2024-25024,1,1,7a38a967aaf7243f2096a6816bb956d8368fc922cb6f6665becf7c62e318bcea,2024-08-15T03:15:04.353000 +CVE-2024-25024,0,0,7a38a967aaf7243f2096a6816bb956d8368fc922cb6f6665becf7c62e318bcea,2024-08-15T03:15:04.353000 CVE-2024-25026,0,0,51187726c38059d92f52ec9be2e9837ba43ea1016581cd7fb52f8ca8d70895d6,2024-04-25T13:18:02.660000 CVE-2024-25027,0,0,119aec53d2012d07639e5485533be77b5b9837d2988927dbbb62ff5ba0a76624,2024-04-02T17:57:34.440000 CVE-2024-25029,0,0,73ebd4fbdc79e08bf51bbd35bffc00987416d5257a1f182e37909ac1996360e7,2024-04-08T18:48:40.217000 @@ -259360,7 +259360,8 @@ CVE-2024-6528,0,0,568c43fb32d79fc097335d9307aebc42d71a690423942e01ce8dbade6b5bed CVE-2024-6529,0,0,39f9da174065ddfb2f1cb6d88de520cca12e78f6992a8df9512aec7d73b21efd,2024-08-01T14:35:13.090000 CVE-2024-6531,0,0,1125a21608be8cb0502ea86867294670584ed16918c5bd752fdbbd37969404b8,2024-07-12T12:49:11.340000 CVE-2024-6532,0,0,21d26a8f00408d7c0c1c4ea0dfdffc81ca804ea427b5b751972725c0e03a2bc3,2024-08-14T13:00:37.107000 -CVE-2024-6533,1,1,870626826813ae89d38805ef90549afcf775ff28d463bc80c428941b966fd255,2024-08-15T03:15:04.567000 +CVE-2024-6533,0,0,870626826813ae89d38805ef90549afcf775ff28d463bc80c428941b966fd255,2024-08-15T03:15:04.567000 +CVE-2024-6534,1,1,e745d258c9eb106b31fa6fc622bf5a86ce09e8bda7ded28f8d05adc5ea51c3a0,2024-08-15T04:15:07.937000 CVE-2024-6535,0,0,d515bd0c9a2788945f1c070eede854437b7a1c58e6a79916f8d2b46233d5b6de,2024-07-25T16:15:04.583000 CVE-2024-6536,0,0,db3a8f54349ce01fbebd842277117fe6b2369b9af6752930ef3e5c8ea43f79f4,2024-07-30T13:32:45.943000 CVE-2024-6539,0,0,81a7a773476044a536e1904849aff55df114add8144e8265b917f8120b92d867,2024-07-11T14:56:20.733000 @@ -259882,7 +259883,7 @@ CVE-2024-7412,0,0,b2cec2bd274b261ef09607f2e770ed1c42b7cfc2487929d65308251b8ca5fb CVE-2024-7413,0,0,1e2e6e629ae076e767a4ed710c2f32c76d2bd71396701e30749c7812afe7edb9,2024-08-12T13:41:36.517000 CVE-2024-7414,0,0,75779b8687375e2d55d3e2d954892bdff56935440cca361ae4c6a6a0a4f3bed5,2024-08-12T13:41:36.517000 CVE-2024-7416,0,0,9f5565f11e96fff207b91fc0825d45934365835075928991c71489e2cad44813,2024-08-12T13:41:36.517000 -CVE-2024-7420,1,1,92ce24f5a1c9359fecdee27f7f4e7fc09e08d39f9811d469f9db415e34e786b2,2024-08-15T03:15:04.830000 +CVE-2024-7420,0,0,92ce24f5a1c9359fecdee27f7f4e7fc09e08d39f9811d469f9db415e34e786b2,2024-08-15T03:15:04.830000 CVE-2024-7436,0,0,4e5f8b4434de8d3be7545b252fde74866f6d1e15f143f31c26845d516524cae6,2024-08-05T12:41:45.957000 CVE-2024-7437,0,0,6536d7f97d7ad58b67ec8c23497b1bab63383020d43415bc5b4c83af23e0fa6d,2024-08-12T13:38:43.060000 CVE-2024-7438,0,0,e0751aac5a1208089fd3136e155c05769dcef78130a2d9c6fdc04c87ca92fb9a,2024-08-12T13:38:43.203000 @@ -259998,9 +259999,9 @@ CVE-2024-7614,0,0,d7cc9c45c708dde228724405eed42fed1e1e5a328ee0ca2886de1c39b6c0c7 CVE-2024-7615,0,0,6c5a3d2b322898b551bada40c532b08076a3798009e747124e833bfdffe0bb9a,2024-08-12T13:41:36.517000 CVE-2024-7616,0,0,240142a7cf93711d379b14c2a6284d004fd0a2d1c674fc02d32efdd57aa3e2bd,2024-08-13T16:59:39.517000 CVE-2024-7621,0,0,1acf6d4c2a821fce1e3f9264509576725bd5b71a2c3ef943afe6ab5d29351820,2024-08-12T13:41:36.517000 -CVE-2024-7624,1,1,51c49d9cca5de404dd6e528ec08e70693fd422859f98836ece6cc18378ed63b7,2024-08-15T03:15:05.070000 +CVE-2024-7624,0,0,51c49d9cca5de404dd6e528ec08e70693fd422859f98836ece6cc18378ed63b7,2024-08-15T03:15:05.070000 CVE-2024-7625,0,0,bd4d78da44cbfcc05049bba5d1a45318d7550ad4c5b31005b54b7918b4ae2ea0,2024-08-15T00:15:13.127000 -CVE-2024-7628,1,1,8516bb24e1f696eae87f8dbfd676fabbbf2400f0ea0795b2ee15b6dffe62a01b,2024-08-15T03:15:05.310000 +CVE-2024-7628,0,0,8516bb24e1f696eae87f8dbfd676fabbbf2400f0ea0795b2ee15b6dffe62a01b,2024-08-15T03:15:05.310000 CVE-2024-7633,0,0,3b1df1487eb71af2061753f656e2660f3fdd60b89404cd84fa2c01a4dff29ee6,2024-08-12T13:38:45.690000 CVE-2024-7635,0,0,330e4c31af06e1fa39a084a042067cc2714cfc9a1302a27b2cb8b725b37ba5f4,2024-08-12T13:41:36.517000 CVE-2024-7636,0,0,c4f4b71cbb74b70101cbb74c711b9665ce07671c635fe9367b91f52e05f765d3,2024-08-12T13:41:36.517000 @@ -260076,8 +260077,10 @@ CVE-2024-7798,0,0,d5ca38d812284eded3ed868a552ae7a7de802a9e0870389b06f2e9045c049a CVE-2024-7799,0,0,16ec0a0e8fc3790beaf7dfbe8c4dd9cdeb7dbbbbc5e228a27b6ff59b37b3a9b3,2024-08-15T00:15:14.040000 CVE-2024-7800,0,0,e60fbb3a0c909e811778589c5e1de98b10d7b42ba987703ee8a680466eb487b0,2024-08-15T00:15:14.327000 CVE-2024-7808,0,0,8211b84ea3b6bd48644cc9dbab1114e0f5309f40ba883ccd9a4d5d3dea4b8770,2024-08-15T01:15:12.150000 -CVE-2024-7809,1,1,b808e4d1ad2d71229ae04fe2a9e1c37e38d93e407443cca83fa1c448a7465d9a,2024-08-15T02:15:03.763000 -CVE-2024-7810,1,1,86623ad54461697d4452c21f6fb6887b7a99eab8ce5bd548e6fbcfe1f522a413,2024-08-15T02:15:04.087000 -CVE-2024-7811,1,1,3e5869b88d9c8689b9c0293adc97384a11b70be28fe01fa6879edff2417f73f3,2024-08-15T03:15:05.540000 -CVE-2024-7812,1,1,6907e18e252f45b30d3e5ee7b8a32156017db5e36485f1aaf8713ed4bbcb715d,2024-08-15T03:15:05.847000 -CVE-2024-7813,1,1,14e68100d29e8a14e338d7aa5afc34d11bf2edcc81e3fba724dd668fc31a2866,2024-08-15T03:15:06.140000 +CVE-2024-7809,0,0,b808e4d1ad2d71229ae04fe2a9e1c37e38d93e407443cca83fa1c448a7465d9a,2024-08-15T02:15:03.763000 +CVE-2024-7810,0,0,86623ad54461697d4452c21f6fb6887b7a99eab8ce5bd548e6fbcfe1f522a413,2024-08-15T02:15:04.087000 +CVE-2024-7811,0,0,3e5869b88d9c8689b9c0293adc97384a11b70be28fe01fa6879edff2417f73f3,2024-08-15T03:15:05.540000 +CVE-2024-7812,0,0,6907e18e252f45b30d3e5ee7b8a32156017db5e36485f1aaf8713ed4bbcb715d,2024-08-15T03:15:05.847000 +CVE-2024-7813,0,0,14e68100d29e8a14e338d7aa5afc34d11bf2edcc81e3fba724dd668fc31a2866,2024-08-15T03:15:06.140000 +CVE-2024-7814,1,1,947c074dd89dce7a2bb7f609c34bc66f07e406a3472c56d1d4256d57780d58a9,2024-08-15T04:15:08.590000 +CVE-2024-7815,1,1,6e089a2caf495632c5c74a3ce6aa6899acaed7f6dc3c536ae1ee262c1bbd2d69,2024-08-15T04:15:09.510000