diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7367.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7367.json index 55089edc1a2..37cc7615af3 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7367.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7367.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7367", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-01T21:16:05.613", - "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-09T11:27:19.727", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:simple_realtime_quiz_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9CD96ADA-789B-4BC5-BFE7-60A4957F65A6" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/topsky979/03ae83fd32a94c85f910c8e3a85fa056", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.273351", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.273351", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.383515", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7374.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7374.json index 091cb2bd795..fbf1e35f23c 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7374.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7374.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7374", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-02T01:16:01.027", - "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-09T11:25:11.177", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:simple_realtime_quiz_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9CD96ADA-789B-4BC5-BFE7-60A4957F65A6" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/topsky979/94ae61ff3fc760ac985dcd5e64da06c4", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.273358", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.273358", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.383522", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7375.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7375.json index 6139a4ab33f..844807f8859 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7375.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7375.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7375", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-02T01:16:01.313", - "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-09T11:24:09.533", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:simple_realtime_quiz_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9CD96ADA-789B-4BC5-BFE7-60A4957F65A6" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/topsky979/840587360c33d53efb359ff314f7ea24", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.273359", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.273359", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.383523", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7376.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7376.json index 16e823a97db..d71bc6da308 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7376.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7376.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7376", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-02T02:15:47.570", - "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-09T11:22:53.947", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -109,6 +129,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +150,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:simple_realtime_quiz_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9CD96ADA-789B-4BC5-BFE7-60A4957F65A6" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/topsky979/8c36e6a899fc02e8054f67b94e34f6c6", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.273360", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.273360", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.383524", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7377.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7377.json index ac0ce7a5a90..edd7da5bff7 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7377.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7377.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7377", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-02T02:15:47.850", - "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-09T11:22:18.483", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:simple_realtime_quiz_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9CD96ADA-789B-4BC5-BFE7-60A4957F65A6" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/topsky979/4415a08deadd16356484d5ff540e60f9", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.273361", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.273361", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.383525", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7378.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7378.json index 2e4eb9f5b2b..69cd761de9c 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7378.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7378.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7378", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-02T03:15:52.753", - "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-09T11:19:25.363", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:simple_realtime_quiz_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9CD96ADA-789B-4BC5-BFE7-60A4957F65A6" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/topsky979/d4cb58afc5fb41f647b1021d1364d846", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.273362", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.273362", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.383526", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index cbc7a2efe8b..9929f1ad546 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-08-08T23:55:16.781307+00:00 +2024-08-09T12:00:16.895669+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-08-08T22:35:01.020000+00:00 +2024-08-09T11:27:19.727000+00:00 ``` ### Last Data Feed Release @@ -27,7 +27,7 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-08-08T00:00:08.658289+00:00 +2024-08-09T00:00:08.655534+00:00 ``` ### Total Number of included CVEs @@ -44,9 +44,14 @@ Recently added CVEs: `0` ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `6` -- [CVE-2024-22398](CVE-2024/CVE-2024-223xx/CVE-2024-22398.json) (`2024-08-08T22:35:01.020`) +- [CVE-2024-7367](CVE-2024/CVE-2024-73xx/CVE-2024-7367.json) (`2024-08-09T11:27:19.727`) +- [CVE-2024-7374](CVE-2024/CVE-2024-73xx/CVE-2024-7374.json) (`2024-08-09T11:25:11.177`) +- [CVE-2024-7375](CVE-2024/CVE-2024-73xx/CVE-2024-7375.json) (`2024-08-09T11:24:09.533`) +- [CVE-2024-7376](CVE-2024/CVE-2024-73xx/CVE-2024-7376.json) (`2024-08-09T11:22:53.947`) +- [CVE-2024-7377](CVE-2024/CVE-2024-73xx/CVE-2024-7377.json) (`2024-08-09T11:22:18.483`) +- [CVE-2024-7378](CVE-2024/CVE-2024-73xx/CVE-2024-7378.json) (`2024-08-09T11:19:25.363`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 957d157dacd..abfdbe65e97 100644 --- a/_state.csv +++ b/_state.csv @@ -244361,7 +244361,7 @@ CVE-2024-22394,0,0,ff5d094c82b627ed23cbc9e3d21e923a656eaed78e78037950e31bab38d65 CVE-2024-22395,0,0,0d29784f93066fed6298e77c63a9a7ba15d287ad4907fe05e0ebf699a961fc21,2024-02-26T13:42:22.567000 CVE-2024-22396,0,0,a5f00b94b83832b467db4300982cd3b6b686890c80cea01a13cc610352a5b12f,2024-07-03T01:47:17.270000 CVE-2024-22397,0,0,a22476279a0935a827e77ac005c3f79785c215cd6755d834d6f6f936f670c7bd,2024-03-14T12:52:09.877000 -CVE-2024-22398,0,1,ba44b0d25e7b758fa53c63cdc26c43f1429982b9cc2c5eed3635a95b6d6d99db,2024-08-08T22:35:01.020000 +CVE-2024-22398,0,0,ba44b0d25e7b758fa53c63cdc26c43f1429982b9cc2c5eed3635a95b6d6d99db,2024-08-08T22:35:01.020000 CVE-2024-22400,0,0,a82e5833eed07db4e1d5b948553237fd45742883181539baca74084d8a75ef26,2024-01-26T20:55:37.543000 CVE-2024-22401,0,0,d5240a6aa4666ee81a03ffa69aad185ad0ebf9697996427b5aa87a5ad00f95f1,2024-01-26T14:42:35.147000 CVE-2024-22402,0,0,86847dbd3139546d75935634479a7b84727e69a7a4ecf53533475274b18a3d48,2024-01-26T14:11:30.677000 @@ -259267,18 +259267,18 @@ CVE-2024-7363,0,0,83409dd306711eecd70748b7fad71784f7a54fdc9bc5abe850831565a09c82 CVE-2024-7364,0,0,82b7e488043bcbd91f0432641238a49239a21bb77aa72c339a0bc3b842a6b408,2024-08-02T12:59:43.990000 CVE-2024-7365,0,0,57c39736717e4c4d84557b16c55457bc8006baba5d2c954f2f1f2f950e0ebb3f,2024-08-02T12:59:43.990000 CVE-2024-7366,0,0,85232956a9ed750d40da4498f3ea9b9a83137981e4552248a960fb2cde4cfd53,2024-08-02T12:59:43.990000 -CVE-2024-7367,0,0,08b5160fd62de88fadaf85d3610ad611f2030f2e8d41a8ceeaa56e7a06246c4c,2024-08-02T12:59:43.990000 +CVE-2024-7367,0,1,bd75c54c036596a7e984bdba53f5bf22b639ac314ededd87d61972f330b3e1e5,2024-08-09T11:27:19.727000 CVE-2024-7368,0,0,aab08644c08718c0114e7d07ce8e07844fe0421ed096872b72b920429a44e715,2024-08-07T19:03:47.213000 CVE-2024-7369,0,0,7dd9a7b02212f80bf8c0eb194cee5a1eb0c2f25ae126d8a5fc944a8828400553,2024-08-07T19:03:26.293000 CVE-2024-7370,0,0,8aa99c05ffa36f4f300918927a9192768f73567c0af28b63b21bf37d2d4ae3be,2024-08-07T18:51:50.920000 CVE-2024-7371,0,0,68fa56d9de1dbd846a984bc06602f563bf0f5243e3a8e57b3446678f7874b63b,2024-08-07T18:48:47.103000 CVE-2024-7372,0,0,77193ab6bb7fd59dcec776c7764f95d87f79b4ef78bbba1b40e23a912ebc5ae8,2024-08-07T18:47:16.910000 CVE-2024-7373,0,0,58299d3777c5d4fa03bd4e351e16b0a14bb0ea18dc305a3a1b033c5da26a76d3,2024-08-07T18:45:29.873000 -CVE-2024-7374,0,0,b1757dcf36a81fa7b189c57f93588b7eec41b1b303dd6a7fb26b1b239a23baed,2024-08-02T12:59:43.990000 -CVE-2024-7375,0,0,34e1bd107d2aecd6493421c4d3ab7a413fcec3731eb80185a4092f9ab654b192,2024-08-02T12:59:43.990000 -CVE-2024-7376,0,0,13c26267c4eb798d77a069115917b306a73c1051ac2cdd324720ad494f5f9add,2024-08-02T12:59:43.990000 -CVE-2024-7377,0,0,893275c8bb4a238cbfa8084a52310ea354a964d2355f34b461a91167cae84e43,2024-08-02T12:59:43.990000 -CVE-2024-7378,0,0,e031589c928455427b120173a422978fb12eba7655a2c6ad16165b36bee1f758,2024-08-02T12:59:43.990000 +CVE-2024-7374,0,1,f19e116f97db26f879ca5070cfbe569725f949fe27a0b9a79320ac70f206f3b0,2024-08-09T11:25:11.177000 +CVE-2024-7375,0,1,28bb47d4b9853eaa90b578de46ee4931868a9172df342b2f5aaa2627a308884f,2024-08-09T11:24:09.533000 +CVE-2024-7376,0,1,6a8239d148373b81ff417f2f5b853294092602786d672e55874e9d15579ca5e1,2024-08-09T11:22:53.947000 +CVE-2024-7377,0,1,36e56aac53023f827b914b5a997e5857db515082cb379daae4b49f84fe230f27,2024-08-09T11:22:18.483000 +CVE-2024-7378,0,1,4660382211ec1d3019061588c841e586a94d2ce616261678ca4d8a3644da536e,2024-08-09T11:19:25.363000 CVE-2024-7383,0,0,e9e41ebbc97601346bb675225ba79de921d0c65e55a076ffc6c52d62374e6a9a,2024-08-06T16:31:05.780000 CVE-2024-7389,0,0,a5776290ae762be985431158def3f2d002b265ca6a95ce830d8f46206854f21a,2024-08-02T12:59:43.990000 CVE-2024-7394,0,0,e251d76b1d6cc83c1cfdea51bdbc268e0da61a740aadd1fc89615c49cceeae2c,2024-08-08T18:55:19.180000