From baa8b8c1bc16287df4cc41740e8ac5c2f7ae2bba Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 29 Jul 2024 02:03:12 +0000 Subject: [PATCH] Auto-Update: 2024-07-29T02:00:17.532937+00:00 --- CVE-2006/CVE-2006-50xx/CVE-2006-5051.json | 6 +- CVE-2024/CVE-2024-71xx/CVE-2024-7173.json | 137 ++++++++++++++++++++++ CVE-2024/CVE-2024-71xx/CVE-2024-7174.json | 137 ++++++++++++++++++++++ CVE-2024/CVE-2024-71xx/CVE-2024-7175.json | 137 ++++++++++++++++++++++ README.md | 17 +-- _state.csv | 11 +- 6 files changed, 432 insertions(+), 13 deletions(-) create mode 100644 CVE-2024/CVE-2024-71xx/CVE-2024-7173.json create mode 100644 CVE-2024/CVE-2024-71xx/CVE-2024-7174.json create mode 100644 CVE-2024/CVE-2024-71xx/CVE-2024-7175.json diff --git a/CVE-2006/CVE-2006-50xx/CVE-2006-5051.json b/CVE-2006/CVE-2006-50xx/CVE-2006-5051.json index 500466060e2..317c2808a98 100644 --- a/CVE-2006/CVE-2006-50xx/CVE-2006-5051.json +++ b/CVE-2006/CVE-2006-50xx/CVE-2006-5051.json @@ -2,7 +2,7 @@ "id": "CVE-2006-5051", "sourceIdentifier": "secalert@redhat.com", "published": "2006-09-27T23:07:00.000", - "lastModified": "2024-07-28T21:15:09.887", + "lastModified": "2024-07-29T01:15:09.520", "vulnStatus": "Modified", "cveTags": [], "evaluatorImpact": "Successful code execution exploitation requires that GSSAPI authentication is enabled.", @@ -570,6 +570,10 @@ "tags": [ "Broken Link" ] + }, + { + "url": "https://www.openwall.com/lists/oss-security/2024/07/28/3", + "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7173.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7173.json new file mode 100644 index 00000000000..3667d4f3084 --- /dev/null +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7173.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7173", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-07-29T00:15:02.030", + "lastModified": "2024-07-29T00:15:02.030", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in TOTOLINK A3600R 4.1.2cu.5182_B20201102. Affected by this issue is the function loginauth of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument password/http_host leads to buffer overflow. The attack may be launched remotely. VDB-272594 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3600R/loginauth.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.272594", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.272594", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.378040", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7174.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7174.json new file mode 100644 index 00000000000..74d23bcedb9 --- /dev/null +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7174.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7174", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-07-29T00:15:02.320", + "lastModified": "2024-07-29T00:15:02.320", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in TOTOLINK A3600R 4.1.2cu.5182_B20201102. This affects the function setdeviceName of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument deviceMac/deviceName leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272595. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3600R/setDeviceName.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.272595", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.272595", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.378041", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7175.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7175.json new file mode 100644 index 00000000000..1bc16a591f8 --- /dev/null +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7175.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7175", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-07-29T01:15:09.830", + "lastModified": "2024-07-29T01:15:09.830", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in TOTOLINK A3600R 4.1.2cu.5182_B20201102 and classified as critical. This vulnerability affects the function setDiagnosisCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ipDoamin leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-272596. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3600R/setDiagnosisCfg.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.272596", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.272596", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.378042", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 3cc92e6ae75..04e2e5c7a63 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-07-28T23:55:16.569074+00:00 +2024-07-29T02:00:17.532937+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-07-28T23:15:10.117000+00:00 +2024-07-29T01:15:09.830000+00:00 ``` ### Last Data Feed Release @@ -27,28 +27,29 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-07-28T00:00:08.659586+00:00 +2024-07-29T00:00:08.645196+00:00 ``` ### Total Number of included CVEs ```plain -258113 +258116 ``` ### CVEs added in the last Commit Recently added CVEs: `3` -- [CVE-2024-7170](CVE-2024/CVE-2024-71xx/CVE-2024-7170.json) (`2024-07-28T22:15:01.820`) -- [CVE-2024-7171](CVE-2024/CVE-2024-71xx/CVE-2024-7171.json) (`2024-07-28T23:15:09.837`) -- [CVE-2024-7172](CVE-2024/CVE-2024-71xx/CVE-2024-7172.json) (`2024-07-28T23:15:10.117`) +- [CVE-2024-7173](CVE-2024/CVE-2024-71xx/CVE-2024-7173.json) (`2024-07-29T00:15:02.030`) +- [CVE-2024-7174](CVE-2024/CVE-2024-71xx/CVE-2024-7174.json) (`2024-07-29T00:15:02.320`) +- [CVE-2024-7175](CVE-2024/CVE-2024-71xx/CVE-2024-7175.json) (`2024-07-29T01:15:09.830`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `1` +- [CVE-2006-5051](CVE-2006/CVE-2006-50xx/CVE-2006-5051.json) (`2024-07-29T01:15:09.520`) ## Download and Usage diff --git a/_state.csv b/_state.csv index a04821cdca6..5ca81b1c509 100644 --- a/_state.csv +++ b/_state.csv @@ -20755,7 +20755,7 @@ CVE-2006-5047,0,0,05360f460fb58072f9d80078b857a03321b12e3d7e9bc2bb6dae42f3c32a0a CVE-2006-5048,0,0,9405b8e583bd6d3a8b59ae8a2ff88c416ef60f270fa044f1799898cc538f8f0e,2023-11-07T01:59:26.660000 CVE-2006-5049,0,0,2ca4bcaae51df075387c2a7a0c3db245d550acd36b22b32ee8ccb636223c0cda,2023-11-07T01:59:26.727000 CVE-2006-5050,0,0,225b9793fc5e160a90bff9584e3bc37ab24125c4fb325c09f3e8c7f38f43bccb,2018-10-17T21:40:54.733000 -CVE-2006-5051,0,0,8ae91899033ed2f81214f03621d83031635055940e16f5be0131beb2a86c9e5e,2024-07-28T21:15:09.887000 +CVE-2006-5051,0,1,1a1ac8fb26a54b0b61e813544d3158e6416cc2fd23628aa9c7cf4586a02348ed,2024-07-29T01:15:09.520000 CVE-2006-5052,0,0,1b9f03733b17cdc0468133d160c8eddd2dea54542f8ad20f3ae3a6b288a9747f,2018-10-17T21:40:55.013000 CVE-2006-5053,0,0,2d10c3dec1c40c8e6b1fb6dbefd3bf6e4ed410fc3f08842bd3cfe9dc15721a25,2017-10-19T01:29:28.517000 CVE-2006-5054,0,0,801d924153eed994db0ee427f2c3292f937ac6dfe941beb8cfa9fdd0aeb7ae8a,2017-10-19T01:29:28.580000 @@ -258109,6 +258109,9 @@ CVE-2024-7166,0,0,214c1cb988bb77b97e34dbab593e349f82d85e02eb1319554a3cfe91290aec CVE-2024-7167,0,0,414df381b84603a8a6e855d293659c9444b1bf41e89dddb552f745827b1f27ce,2024-07-28T19:15:10.697000 CVE-2024-7168,0,0,12f38d99b2927640de4a3421acd94ba64943387e05be840f669c87a0aea2a562,2024-07-28T19:15:11.007000 CVE-2024-7169,0,0,9f1b45509a23ccf222d7104c51c66a34143e10bed2884c00fa9e73c4040a060f,2024-07-28T20:15:01.903000 -CVE-2024-7170,1,1,56be3a455f7d97346b7f96f42c1ea852d79ed554a2984962d6a7a9c3bd2a8bbc,2024-07-28T22:15:01.820000 -CVE-2024-7171,1,1,80fea255434ea736ed2127d5addc87627fe2454200d3905dc648a0ed127ad101,2024-07-28T23:15:09.837000 -CVE-2024-7172,1,1,2b53968e6b5fd05292ac2cd324e8c18d4b50f486576062dd79c068aa40a8d6ca,2024-07-28T23:15:10.117000 +CVE-2024-7170,0,0,56be3a455f7d97346b7f96f42c1ea852d79ed554a2984962d6a7a9c3bd2a8bbc,2024-07-28T22:15:01.820000 +CVE-2024-7171,0,0,80fea255434ea736ed2127d5addc87627fe2454200d3905dc648a0ed127ad101,2024-07-28T23:15:09.837000 +CVE-2024-7172,0,0,2b53968e6b5fd05292ac2cd324e8c18d4b50f486576062dd79c068aa40a8d6ca,2024-07-28T23:15:10.117000 +CVE-2024-7173,1,1,29b7873ddfe574fa23febc5ab611b3a97aba7b37dabbaaf245bb7f2b918cadaf,2024-07-29T00:15:02.030000 +CVE-2024-7174,1,1,5023081295b1fa1dea32ce74885e1c3dabc9f7aaf77573e3c76b0a75dc8db3e2,2024-07-29T00:15:02.320000 +CVE-2024-7175,1,1,ac76eaf6357300020e6e09fe9fb2a1169a26fad02e87cbd42664940f82e83e72,2024-07-29T01:15:09.830000