From bd2e1f5811f687e0d470776b2ba2a709785d44b6 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 29 Jul 2024 10:03:14 +0000 Subject: [PATCH] Auto-Update: 2024-07-29T10:00:17.674964+00:00 --- CVE-2024/CVE-2024-266xx/CVE-2024-26621.json | 6 +- CVE-2024/CVE-2024-411xx/CVE-2024-41139.json | 25 ++++ CVE-2024/CVE-2024-411xx/CVE-2024-41143.json | 25 ++++ CVE-2024/CVE-2024-417xx/CVE-2024-41726.json | 25 ++++ CVE-2024/CVE-2024-418xx/CVE-2024-41881.json | 29 +++++ CVE-2024/CVE-2024-63xx/CVE-2024-6387.json | 6 +- CVE-2024/CVE-2024-71xx/CVE-2024-7189.json | 137 ++++++++++++++++++++ CVE-2024/CVE-2024-71xx/CVE-2024-7190.json | 137 ++++++++++++++++++++ CVE-2024/CVE-2024-71xx/CVE-2024-7191.json | 137 ++++++++++++++++++++ CVE-2024/CVE-2024-71xx/CVE-2024-7192.json | 137 ++++++++++++++++++++ README.md | 47 +++---- _state.csv | 66 +++++----- 12 files changed, 714 insertions(+), 63 deletions(-) create mode 100644 CVE-2024/CVE-2024-411xx/CVE-2024-41139.json create mode 100644 CVE-2024/CVE-2024-411xx/CVE-2024-41143.json create mode 100644 CVE-2024/CVE-2024-417xx/CVE-2024-41726.json create mode 100644 CVE-2024/CVE-2024-418xx/CVE-2024-41881.json create mode 100644 CVE-2024/CVE-2024-71xx/CVE-2024-7189.json create mode 100644 CVE-2024/CVE-2024-71xx/CVE-2024-7190.json create mode 100644 CVE-2024/CVE-2024-71xx/CVE-2024-7191.json create mode 100644 CVE-2024/CVE-2024-71xx/CVE-2024-7192.json diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26621.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26621.json index 52cf143021e..e0ed1754117 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26621.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26621.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26621", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-02T22:15:50.340", - "lastModified": "2024-07-16T02:15:12.500", + "lastModified": "2024-07-29T09:15:02.400", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -97,6 +97,10 @@ "url": "http://www.openwall.com/lists/oss-security/2024/07/16/2", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/07/29/2", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/4ef9ad19e17676b9ef071309bc62020e2373705d", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41139.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41139.json new file mode 100644 index 00000000000..4c0c8d1c763 --- /dev/null +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41139.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-41139", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2024-07-29T09:15:02.563", + "lastModified": "2024-07-29T09:15:02.563", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect privilege assignment vulnerability exists in SKYSEA Client View Ver.6.010.06 to Ver.19.210.04e. If a user who can log in to the PC where the product's Windows client is installed places a specially crafted DLL file in a specific folder, arbitrary code may be executed with SYSTEM privilege." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://jvn.jp/en/jp/JVN84326763/", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://www.skyseaclientview.net/news/240729_02/", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41143.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41143.json new file mode 100644 index 00000000000..0271e810212 --- /dev/null +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41143.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-41143", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2024-07-29T09:15:02.640", + "lastModified": "2024-07-29T09:15:02.640", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Origin validation error vulnerability exists in SKYSEA Client View Ver.3.013.00 to Ver.19.210.04e. If this vulnerability is exploited, an arbitrary process may be executed with SYSTEM privilege by a user who can log in to the PC where the product's Windows client is installed." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://jvn.jp/en/jp/JVN84326763/", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://www.skyseaclientview.net/news/240729_02/", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41726.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41726.json new file mode 100644 index 00000000000..7952bb5042a --- /dev/null +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41726.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-41726", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2024-07-29T09:15:02.703", + "lastModified": "2024-07-29T09:15:02.703", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Path traversal vulnerability exists in SKYSEA Client View Ver.3.013.00 to Ver.19.210.04e. If this vulnerability is exploited, an arbitrary executable file may be executed by a user who can log in to the PC where the product's Windows client is installed." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://jvn.jp/en/jp/JVN84326763/", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://www.skyseaclientview.net/news/240729_02/", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41881.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41881.json new file mode 100644 index 00000000000..5e9aae013a4 --- /dev/null +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41881.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-41881", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2024-07-29T09:15:02.773", + "lastModified": "2024-07-29T09:15:02.773", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SDoP versions prior to 1.11 fails to handle appropriately some parameters inside the input data, resulting in a stack-based buffer overflow vulnerability. When a user of the affected product is tricked to process a specially crafted XML file, arbitrary code may be executed on the user's environment." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/PhilipHazel/SDoP", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://github.com/PhilipHazel/SDoP/commit/ff83d851b4b39ff2fd37ab2ab14365649515b023", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://jvn.jp/en/jp/JVN16420523/", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6387.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6387.json index 643d04f6209..e0f91e48c6b 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6387.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6387.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6387", "sourceIdentifier": "secalert@redhat.com", "published": "2024-07-01T13:15:06.467", - "lastModified": "2024-07-28T21:15:10.480", + "lastModified": "2024-07-29T09:15:02.853", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -864,6 +864,10 @@ "Third Party Advisory" ] }, + { + "url": "https://santandersecurityresearch.github.io/blog/sshing_the_masses.html", + "source": "secalert@redhat.com" + }, { "url": "https://security-tracker.debian.org/tracker/CVE-2024-6387", "source": "secalert@redhat.com", diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7189.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7189.json new file mode 100644 index 00000000000..cd45c5cbc1d --- /dev/null +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7189.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7189", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-07-29T08:15:01.703", + "lastModified": "2024-07-29T08:15:01.703", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in itsourcecode Online Food Ordering System 1.0. Affected is an unknown function of the file editproduct.php. The manipulation of the argument photo leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-272610 is the identifier assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/L1OudFd8cl09/CVE/blob/main/25_07_2024_a.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.272610", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.272610", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.380209", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7190.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7190.json new file mode 100644 index 00000000000..74903b7f44e --- /dev/null +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7190.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7190", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-07-29T08:15:02.010", + "lastModified": "2024-07-29T08:15:02.010", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in itsourcecode Society Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/get_price.php. The manipulation of the argument expenses_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272611." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/DeepMountains/Mirage/blob/main/CVE7-4.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.272611", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.272611", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.380385", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7191.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7191.json new file mode 100644 index 00000000000..80ce5e5a01b --- /dev/null +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7191.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7191", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-07-29T09:15:03.410", + "lastModified": "2024-07-29T09:15:03.410", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in itsourcecode Society Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/get_balance.php. The manipulation of the argument student_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-272612." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/DeepMountains/Mirage/blob/main/CVE7-5.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.272612", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.272612", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.380386", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7192.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7192.json new file mode 100644 index 00000000000..e8d7eb3f56d --- /dev/null +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7192.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7192", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-07-29T09:15:03.693", + "lastModified": "2024-07-29T09:15:03.693", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in itsourcecode Society Management System 1.0. This affects an unknown part of the file /admin/student.php. The manipulation of the argument image leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-272613 was assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/DeepMountains/Mirage/blob/main/CVE7-6.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.272613", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.272613", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.380387", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 36544bcedfd..5244084a22b 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-07-29T08:00:17.958199+00:00 +2024-07-29T10:00:17.674964+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-07-29T07:15:08.713000+00:00 +2024-07-29T09:15:03.693000+00:00 ``` ### Last Data Feed Release @@ -33,46 +33,29 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -258151 +258159 ``` ### CVEs added in the last Commit -Recently added CVEs: `22` +Recently added CVEs: `8` -- [CVE-2024-37381](CVE-2024/CVE-2024-373xx/CVE-2024-37381.json) (`2024-07-29T06:15:01.827`) -- [CVE-2024-41013](CVE-2024/CVE-2024-410xx/CVE-2024-41013.json) (`2024-07-29T07:15:05.430`) -- [CVE-2024-41014](CVE-2024/CVE-2024-410xx/CVE-2024-41014.json) (`2024-07-29T07:15:05.810`) -- [CVE-2024-41015](CVE-2024/CVE-2024-410xx/CVE-2024-41015.json) (`2024-07-29T07:15:06.033`) -- [CVE-2024-41016](CVE-2024/CVE-2024-410xx/CVE-2024-41016.json) (`2024-07-29T07:15:06.293`) -- [CVE-2024-41017](CVE-2024/CVE-2024-410xx/CVE-2024-41017.json) (`2024-07-29T07:15:06.523`) -- [CVE-2024-41018](CVE-2024/CVE-2024-410xx/CVE-2024-41018.json) (`2024-07-29T07:15:06.790`) -- [CVE-2024-41019](CVE-2024/CVE-2024-410xx/CVE-2024-41019.json) (`2024-07-29T07:15:07.023`) -- [CVE-2024-41090](CVE-2024/CVE-2024-410xx/CVE-2024-41090.json) (`2024-07-29T07:15:07.287`) -- [CVE-2024-41091](CVE-2024/CVE-2024-410xx/CVE-2024-41091.json) (`2024-07-29T07:15:07.553`) -- [CVE-2024-41637](CVE-2024/CVE-2024-416xx/CVE-2024-41637.json) (`2024-07-29T06:15:02.267`) -- [CVE-2024-4483](CVE-2024/CVE-2024-44xx/CVE-2024-4483.json) (`2024-07-29T06:15:02.357`) -- [CVE-2024-5285](CVE-2024/CVE-2024-52xx/CVE-2024-5285.json) (`2024-07-29T06:15:02.463`) -- [CVE-2024-5882](CVE-2024/CVE-2024-58xx/CVE-2024-5882.json) (`2024-07-29T06:15:02.547`) -- [CVE-2024-5883](CVE-2024/CVE-2024-58xx/CVE-2024-5883.json) (`2024-07-29T06:15:02.627`) -- [CVE-2024-6362](CVE-2024/CVE-2024-63xx/CVE-2024-6362.json) (`2024-07-29T06:15:02.700`) -- [CVE-2024-6366](CVE-2024/CVE-2024-63xx/CVE-2024-6366.json) (`2024-07-29T06:15:02.790`) -- [CVE-2024-6487](CVE-2024/CVE-2024-64xx/CVE-2024-6487.json) (`2024-07-29T06:15:02.873`) -- [CVE-2024-7185](CVE-2024/CVE-2024-71xx/CVE-2024-7185.json) (`2024-07-29T06:15:02.980`) -- [CVE-2024-7186](CVE-2024/CVE-2024-71xx/CVE-2024-7186.json) (`2024-07-29T06:15:03.420`) -- [CVE-2024-7187](CVE-2024/CVE-2024-71xx/CVE-2024-7187.json) (`2024-07-29T07:15:07.830`) -- [CVE-2024-7188](CVE-2024/CVE-2024-71xx/CVE-2024-7188.json) (`2024-07-29T07:15:08.713`) +- [CVE-2024-41139](CVE-2024/CVE-2024-411xx/CVE-2024-41139.json) (`2024-07-29T09:15:02.563`) +- [CVE-2024-41143](CVE-2024/CVE-2024-411xx/CVE-2024-41143.json) (`2024-07-29T09:15:02.640`) +- [CVE-2024-41726](CVE-2024/CVE-2024-417xx/CVE-2024-41726.json) (`2024-07-29T09:15:02.703`) +- [CVE-2024-41881](CVE-2024/CVE-2024-418xx/CVE-2024-41881.json) (`2024-07-29T09:15:02.773`) +- [CVE-2024-7189](CVE-2024/CVE-2024-71xx/CVE-2024-7189.json) (`2024-07-29T08:15:01.703`) +- [CVE-2024-7190](CVE-2024/CVE-2024-71xx/CVE-2024-7190.json) (`2024-07-29T08:15:02.010`) +- [CVE-2024-7191](CVE-2024/CVE-2024-71xx/CVE-2024-7191.json) (`2024-07-29T09:15:03.410`) +- [CVE-2024-7192](CVE-2024/CVE-2024-71xx/CVE-2024-7192.json) (`2024-07-29T09:15:03.693`) ### CVEs modified in the last Commit -Recently modified CVEs: `5` +Recently modified CVEs: `2` -- [CVE-2022-48666](CVE-2022/CVE-2022-486xx/CVE-2022-48666.json) (`2024-07-29T07:15:02.030`) -- [CVE-2024-36484](CVE-2024/CVE-2024-364xx/CVE-2024-36484.json) (`2024-07-29T07:15:03.447`) -- [CVE-2024-36938](CVE-2024/CVE-2024-369xx/CVE-2024-36938.json) (`2024-07-29T07:15:03.883`) -- [CVE-2024-41009](CVE-2024/CVE-2024-410xx/CVE-2024-41009.json) (`2024-07-29T07:15:04.560`) -- [CVE-2024-41012](CVE-2024/CVE-2024-410xx/CVE-2024-41012.json) (`2024-07-29T07:15:05.083`) +- [CVE-2024-26621](CVE-2024/CVE-2024-266xx/CVE-2024-26621.json) (`2024-07-29T09:15:02.400`) +- [CVE-2024-6387](CVE-2024/CVE-2024-63xx/CVE-2024-6387.json) (`2024-07-29T09:15:02.853`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 25b838ffca3..58b68b29e5e 100644 --- a/_state.csv +++ b/_state.csv @@ -212111,7 +212111,7 @@ CVE-2022-48662,0,0,107826e06defd05649e280a189037cc55d251feb868d97da90eaf9a041435 CVE-2022-48663,0,0,faa35d27b468e0fe98ba3119f078a76fddc46319da6c037dd74eacad5fe5db95,2024-04-29T12:42:03.667000 CVE-2022-48664,0,0,98f5b9aae9394a787d88883dde988c23ff88ed82e2585a6fbf2ab1feed010f18,2024-04-29T12:42:03.667000 CVE-2022-48665,0,0,61f8dd0c53e94318dbff1c099a7764d159a4ff134c1b49d99d2540fba60ac74e,2024-04-29T12:42:03.667000 -CVE-2022-48666,0,1,a2bc98594445b6df1bd47c97ff822bb8a7beebd8a5e4e345cf76f70dcad5d756,2024-07-29T07:15:02.030000 +CVE-2022-48666,0,0,a2bc98594445b6df1bd47c97ff822bb8a7beebd8a5e4e345cf76f70dcad5d756,2024-07-29T07:15:02.030000 CVE-2022-48667,0,0,5bbad8b7071d12ed897487a37454167ea6546dbc00672f8a744c08c8f65a23ab,2024-04-29T12:42:03.667000 CVE-2022-48668,0,0,ffa47e0d1e12cf1e004440647944ea09831e32184ce4ba444d32b7e58f5b8e56,2024-04-29T12:42:03.667000 CVE-2022-48669,0,0,b75e24834cb956f9b083af7948c6a93e9b0d3029023bb994e0c7901a89d4151e,2024-05-01T19:50:25.633000 @@ -246920,7 +246920,7 @@ CVE-2024-26618,0,0,60b49f9e86fa8f37acfeac63f8f4575f9654dbd2ab502c8b6c5996ed00c24 CVE-2024-26619,0,0,3a172888bab0a927d52b4fdd413d891b072fc341af639a3741034834064d6310,2024-03-12T12:40:13.500000 CVE-2024-2662,0,0,a2a94c73f74aa4424a4c3682e7ac78c6136565b797b4f728bf1a976cab864da5,2024-05-14T16:13:02.773000 CVE-2024-26620,0,0,65e5941945418b21a4c03b7b48584bf25732d23092fb7ebb20991b07ac64fe5a,2024-03-12T12:40:13.500000 -CVE-2024-26621,0,0,62ddb14eaa79da39c16cb8648c9e4220c813aa1e1923a6f6fff34b8b90a8da4f,2024-07-16T02:15:12.500000 +CVE-2024-26621,0,1,86dd105998222d554e0d89a99385ede99614096aaab551dd47af98d6befbdb87,2024-07-29T09:15:02.400000 CVE-2024-26622,0,0,4cd7d655a251310c444f077e2df4271fb89c449a25650c0bd38a0c088f0ade16,2024-06-25T22:15:19.240000 CVE-2024-26623,0,0,072badb03b6dfd11f30eaa3dc91549de4bb838c1b1cb59508b9c081211145520,2024-03-06T15:18:08.093000 CVE-2024-26624,0,0,dfec722c86cb19deabe85be0fdccacdcf71bc34ee8cead4ebe6ca2d88e75d73c,2024-03-27T14:15:10.163000 @@ -253673,7 +253673,7 @@ CVE-2024-36479,0,0,dee4352def0751c2293c7f9148494e529c22ac95426bcab70e58c8c955d6c CVE-2024-3648,0,0,8ea394456a868f5cb440700cb4f3d40035b05f4bd668cd1adcf2b942f06e8067,2024-05-24T01:15:30.977000 CVE-2024-36480,0,0,467634cd317ccf32154f72ed3d837c9ab87c9927c3f4f2a0848f910fa3a76e62,2024-06-20T12:44:01.637000 CVE-2024-36481,0,0,c20069fe9216cf7ae5e42e62fc886e320b7997d027cb5be79eafe3b725910b77,2024-06-24T18:35:33.157000 -CVE-2024-36484,0,1,d90e8addbe4310fb59424c1e2209c39c8eeed0a72f79133301d102644feba769,2024-07-29T07:15:03.447000 +CVE-2024-36484,0,0,d90e8addbe4310fb59424c1e2209c39c8eeed0a72f79133301d102644feba769,2024-07-29T07:15:03.447000 CVE-2024-36489,0,0,dc2f7108dc3678f1fb36a70c7ba7637636e10430721a5dfcf0db7d3d728d6d70,2024-06-21T11:22:01.687000 CVE-2024-3649,0,0,9d2e0b18ffe30ccf7cbc0e74a77daf1869af9483d0413cb80580942eae7d40a2,2024-05-02T18:00:37.360000 CVE-2024-36491,0,0,c6dd1ef3c6745f768d62d62ea4add65925f5aec7ffd7e126f15c9ed745598bc0,2024-07-17T13:34:20.520000 @@ -253887,7 +253887,7 @@ CVE-2024-36934,0,0,69c3127eb80f1c3d27222b7e8d459b701638abf40b50f92ff99862699bda2 CVE-2024-36935,0,0,c956a025e647b997e271ce533b3229e1031e8431a54472f528946dfc3671394a,2024-05-30T18:18:58.870000 CVE-2024-36936,0,0,8f5cc1028b2d46957993a0bef95c544f5440f0e6544e5c2e7784aef732d9e93a,2024-05-30T18:18:58.870000 CVE-2024-36937,0,0,587115a073ece738242335fb650146c6aa7d51a5138082890a3a8d657d2dddcf,2024-05-30T18:18:58.870000 -CVE-2024-36938,0,1,5f996360f7a179b962f4e24c798747a3d10ac7a5a7d3f7e6a769b5d2f7e677d4,2024-07-29T07:15:03.883000 +CVE-2024-36938,0,0,5f996360f7a179b962f4e24c798747a3d10ac7a5a7d3f7e6a769b5d2f7e677d4,2024-07-29T07:15:03.883000 CVE-2024-36939,0,0,82d0833c24e3b117aa9c5869741c78835915247496909f88fa02d5cbb879e28d,2024-06-27T14:15:14.810000 CVE-2024-36940,0,0,465e05b45828a5806578841110d5d3986173d3974a74d8f01326c22ee79f9a71,2024-06-27T14:15:14.890000 CVE-2024-36941,0,0,086f19350d3c8fb67c945796850f1ec98ad9b8ccd8e484367cd329bc31c41ae2,2024-06-27T14:15:14.957000 @@ -254220,7 +254220,7 @@ CVE-2024-37370,0,0,8a7076b3e8e134b661d21db6f90c7a50b93b1e481cf692861b0a2c3450767 CVE-2024-37371,0,0,70d55bf05c2eee0a9f3b94ddc604e302a9c39f7d842ab9266b20a4c2d600c9ba,2024-07-01T12:37:24.220000 CVE-2024-3738,0,0,cebdf6c67207ccd8240919e9596b8485c51e6607a12a8dcdfff13f6ddbdbfe32,2024-05-17T02:40:05.977000 CVE-2024-37380,0,0,4ce1330fb679655262ab3b818cd133f9eef1b7c4341268f445fa1434d34f9951,2024-07-24T12:55:13.223000 -CVE-2024-37381,1,1,01fcad08baf608c8c6c5a6aaff0e96954a2f5621890d5663fb47ead7c68f4646,2024-07-29T06:15:01.827000 +CVE-2024-37381,0,0,01fcad08baf608c8c6c5a6aaff0e96954a2f5621890d5663fb47ead7c68f4646,2024-07-29T06:15:01.827000 CVE-2024-37383,0,0,3a9597c771ab199850aaeee94068cbc0182ff2bfcefd23d631ce0d7808f3745f,2024-07-03T02:04:16.250000 CVE-2024-37384,0,0,4ede7c4b4e1e1de259445d49ca3b43a6d0a75b7dcaf1ea245b8f6306c1e67bb9,2024-07-03T02:04:17.060000 CVE-2024-37385,0,0,1af5dbf4fe496116fcfe8797458a2e9292fd2ddec99a563e5137c9d207fb12bc,2024-06-07T14:56:05.647000 @@ -255845,25 +255845,25 @@ CVE-2024-41005,0,0,0581c40a7d6578257fb62f4f8b7b249bca4b3435363decba2015a514cb7ba CVE-2024-41006,0,0,78b02ce41a2812d6a9b9c45636d9257fa02b9d4a961be98a78ad8fd604a5b390,2024-07-12T16:34:58.687000 CVE-2024-41007,0,0,557d3d79f36960ef2852244da6d9d8db811ba2a987274c1ebfaa71dd3034b15a,2024-07-19T18:24:59.197000 CVE-2024-41008,0,0,86de6e2be092cac70f5596fb96d0253f26291855f34ae4ddc015775261181c4a,2024-07-16T13:43:58.773000 -CVE-2024-41009,0,1,c4729b5cb64b59a8130835040cce4fcac734ad6152593d4547aa0a45482d47fd,2024-07-29T07:15:04.560000 +CVE-2024-41009,0,0,c4729b5cb64b59a8130835040cce4fcac734ad6152593d4547aa0a45482d47fd,2024-07-29T07:15:04.560000 CVE-2024-41010,0,0,ae8d1d1b3ebaab40dc6ac6afde49ce66895bb7f4e7ee92f295ff5ca1fa79b217,2024-07-19T15:24:59.137000 CVE-2024-41011,0,0,4c2c460e7d99f33158a9c285f2b0882c56a6716b8d689bc4bd4c6463e3fba1ea,2024-07-18T12:28:43.707000 -CVE-2024-41012,0,1,d7bf6b58a6ff44e671cb5bc351efe42ddfb2e8e00009bebf997b623f0e3128b6,2024-07-29T07:15:05.083000 -CVE-2024-41013,1,1,f3863cba9f57107c61bbb62c34d31cc7b7073ce24e4fc50afa282d8598d930cf,2024-07-29T07:15:05.430000 -CVE-2024-41014,1,1,40b01b095b5a437e757d432f861f0375c7d9a90926b7cad990bad16e4fc2bca5,2024-07-29T07:15:05.810000 -CVE-2024-41015,1,1,e181f3351e8fa0d3d8700179ff37d31fed131f3030c0f5854dcdfa6f29297a39,2024-07-29T07:15:06.033000 -CVE-2024-41016,1,1,2835a7145cb074ced01d97e28966ee08492d39f023160eddaa9b14c66826bf1d,2024-07-29T07:15:06.293000 -CVE-2024-41017,1,1,9b09969ae04bcdba4ca8016986588d81c56641f1f8aabb06391a78ac2664c717,2024-07-29T07:15:06.523000 -CVE-2024-41018,1,1,3e1bf69eaade8b5fc410451e427f08b4caf311f828d669fc02a6bc54fe0027c7,2024-07-29T07:15:06.790000 -CVE-2024-41019,1,1,e372051a5e462f9aec40eb1ee32a809d67ae1cf52d5fb980f3035c6437f088c0,2024-07-29T07:15:07.023000 +CVE-2024-41012,0,0,d7bf6b58a6ff44e671cb5bc351efe42ddfb2e8e00009bebf997b623f0e3128b6,2024-07-29T07:15:05.083000 +CVE-2024-41013,0,0,f3863cba9f57107c61bbb62c34d31cc7b7073ce24e4fc50afa282d8598d930cf,2024-07-29T07:15:05.430000 +CVE-2024-41014,0,0,40b01b095b5a437e757d432f861f0375c7d9a90926b7cad990bad16e4fc2bca5,2024-07-29T07:15:05.810000 +CVE-2024-41015,0,0,e181f3351e8fa0d3d8700179ff37d31fed131f3030c0f5854dcdfa6f29297a39,2024-07-29T07:15:06.033000 +CVE-2024-41016,0,0,2835a7145cb074ced01d97e28966ee08492d39f023160eddaa9b14c66826bf1d,2024-07-29T07:15:06.293000 +CVE-2024-41017,0,0,9b09969ae04bcdba4ca8016986588d81c56641f1f8aabb06391a78ac2664c717,2024-07-29T07:15:06.523000 +CVE-2024-41018,0,0,3e1bf69eaade8b5fc410451e427f08b4caf311f828d669fc02a6bc54fe0027c7,2024-07-29T07:15:06.790000 +CVE-2024-41019,0,0,e372051a5e462f9aec40eb1ee32a809d67ae1cf52d5fb980f3035c6437f088c0,2024-07-29T07:15:07.023000 CVE-2024-4102,0,0,1b0aaa7efbf772a3034d5138f2cde018af6a8f41a0229b0c5f36e4d66092a2a3,2024-07-09T18:19:14.047000 CVE-2024-4103,0,0,ff27f3988e30e41f465bfc5b7800f7ae2f96b1e2cd71c1414de16617b75fe4fe,2024-05-14T16:11:39.510000 CVE-2024-4104,0,0,069e7afb1610585640d00d566d3fc4756dff3571ed269cd2ef1d63c8e8ce45e5,2024-05-14T16:11:39.510000 CVE-2024-4105,0,0,5dcbaf8d64f37f58816de0666875f99544dc68f0a9ee2a9bf8d53a5a9c60191e,2024-06-26T12:44:29.693000 CVE-2024-4106,0,0,3fc11eee434aa540a2e37440bd2e3ba6e18faae117022d3f68496d405f62ba7f,2024-06-26T12:44:29.693000 CVE-2024-4107,0,0,ce88498baf95f06d1267d29854f2a9888ac0ddfe7fc00ea3036ccad453e487fa,2024-05-14T16:11:39.510000 -CVE-2024-41090,1,1,78ed623a608e103e3c59c7523733e3ea072241a493ca7aed5554264c7ebaebeb,2024-07-29T07:15:07.287000 -CVE-2024-41091,1,1,39154eee21fc3590cb616807259967af83b8390e8856e93f9fa6e721122c9371,2024-07-29T07:15:07.553000 +CVE-2024-41090,0,0,78ed623a608e103e3c59c7523733e3ea072241a493ca7aed5554264c7ebaebeb,2024-07-29T07:15:07.287000 +CVE-2024-41091,0,0,39154eee21fc3590cb616807259967af83b8390e8856e93f9fa6e721122c9371,2024-07-29T07:15:07.553000 CVE-2024-41107,0,0,8900de25677c2ad7075ce083b915bd87b6a95be071804b0852c57c05697761e4,2024-07-19T14:15:06.080000 CVE-2024-4111,0,0,a3e4bcb39778569b3be84e8d38a6497dbc2fc6b5a3693d9cc21532b8df994ada,2024-06-04T19:20:29.827000 CVE-2024-41110,0,0,6ff3558a253c7fb43657a983fdd8f716059d35d04d5c39b9395ecb33c679f6d6,2024-07-25T12:36:39.947000 @@ -255890,7 +255890,9 @@ CVE-2024-41133,0,0,a5a4a3159caddd26c0f915a077a27191a1bfb56c31d18d6814d32ccb9198e CVE-2024-41134,0,0,8fa2334156a39d1ebf7e99e45685034ae3d6b02c155d7c1f1ec7acc21744b79d,2024-07-25T12:36:39.947000 CVE-2024-41135,0,0,66c622d4a15bea76906fc51ad68d43d1d4fd2725282204f137e1bed500fb2fb7,2024-07-25T12:36:39.947000 CVE-2024-41136,0,0,020b11b93feff063252b1869b912101e066c5fabc26a5328aa1d1ff14a3e25e0,2024-07-26T13:22:02.033000 +CVE-2024-41139,1,1,64f5dee7b2554e7c4591201cd1f90856f38818ef633fdc0df3197e870bc65ffc,2024-07-29T09:15:02.563000 CVE-2024-4114,0,0,387f9ca6df27ba000d0f44d990ccd6bb074258bb946c87938379db9652dc0a14,2024-05-17T02:40:15.917000 +CVE-2024-41143,1,1,90b6b330637709750a9782da2f64b8e9e33bddb28d06be1bfcc042cebbc98779,2024-07-29T09:15:02.640000 CVE-2024-4115,0,0,89bc89df66a101d446d6568b359dec67345256fa579984420e2e2fe7ea4994ac,2024-06-04T19:20:29.937000 CVE-2024-4116,0,0,6ee64e85b69f8f11f599040da371bf02d3a94742e1ecd0f467d9a48f26243458,2024-05-17T02:40:16.110000 CVE-2024-4117,0,0,439d2da59fd01a25f254df6698027149837f261eb1a16ba5752d7e62667d1bfc,2024-06-04T19:20:30.043000 @@ -255972,7 +255974,7 @@ CVE-2024-4161,0,0,818606f25cf93cd94814d58a9247fa25de635b9142e537f83382fb857b8b71 CVE-2024-4162,0,0,1a4f39929c1df6d420ff35b2d8de51a57c5e5378a57b6e7a1a35abc1b5a3dc57,2024-05-08T13:15:00.690000 CVE-2024-41628,0,0,31020953ef6de7e0104a79a9286098322fc7dbbf28fce9b1e3c1bc0ec9fa77cd,2024-07-26T21:15:14.303000 CVE-2024-4163,0,0,69022c7df60536fa7bdfb20d2705efebe8d2d6c2c39bf59b2dcb5940921dba2c,2024-07-03T02:07:10.047000 -CVE-2024-41637,1,1,1463da8ce55cf61bc6c37e2dc6f41aafefa1bfbe0f3a3a16be513ffc0c497586,2024-07-29T06:15:02.267000 +CVE-2024-41637,0,0,1463da8ce55cf61bc6c37e2dc6f41aafefa1bfbe0f3a3a16be513ffc0c497586,2024-07-29T06:15:02.267000 CVE-2024-4164,0,0,5c582c5408e712b207393008a4bc438580820bad61af8c831d6d320440184b2c,2024-05-17T02:40:17.710000 CVE-2024-4165,0,0,1335796556da8c6a778d77814a8f1d84d8c2dc18b70d9de88815783ed1aa0d77,2024-06-04T19:20:31.500000 CVE-2024-41655,0,0,ef3400d9e58c2cde6c539334829c8042d5ee995783a74a46bd16638786b0b6db,2024-07-24T12:55:13.223000 @@ -256009,6 +256011,7 @@ CVE-2024-41707,0,0,3c5ea333b2404f7e0d9195aa6339fef455f6fa8292255904be4c6dce5c96f CVE-2024-41709,0,0,6713bfc73e81c65bc7923627db30413fcbe413ec587fff89449c3abd86e7e93b,2024-07-25T15:22:06.140000 CVE-2024-4171,0,0,87597e8caa4479ab69c883527c35fc22af72d614757313d16953f50dcfa107c2,2024-06-04T19:20:31.980000 CVE-2024-4172,0,0,ae5cefdd41ee745a5f3463347f20f3f77110439c81ed1ad285dedf4b40da1c57,2024-06-04T19:20:32.077000 +CVE-2024-41726,1,1,88f414969bd3200f6ad1a06603de912af8c9a5c4b5de27c4b2891456308d4dd9,2024-07-29T09:15:02.703000 CVE-2024-4173,0,0,47f39f3e8e603eac743ed4815cd724decf015716a2f0d9c17daf4d8fa3affc2d,2024-04-25T23:15:47.240000 CVE-2024-4174,0,0,e168dfb28a2573f66b3120de326c0954bda564c12e3831aed75de7f1338d3089,2024-04-25T13:18:02.660000 CVE-2024-4175,0,0,2f40401bb337bcc37138495e1928fb4d762f69fc829f768d707a278e8a423e1a,2024-04-25T13:18:02.660000 @@ -256039,6 +256042,7 @@ CVE-2024-41839,0,0,5fe8ccf2e82b1dbd1e8f5be23a4b35f149d0ed119de3feeae98a945913864 CVE-2024-4185,0,0,2ebb1e96affd30f65338d1aa453a686ffeaefddcc6c26d6c3c25de17e937fc18,2024-04-30T13:11:16.690000 CVE-2024-4186,0,0,c07cd0df6ca0a9d2dc3c3ba29e1f05004c0a2ac49601b699a13f07e112f9c5ca,2024-05-07T13:39:32.710000 CVE-2024-41880,0,0,2045bc24fb104b692bbe32c5951eb01a25f3639f665062ea76ff47318e893861,2024-07-24T12:55:13.223000 +CVE-2024-41881,1,1,b5402f88b0c46cef5e334380d91d9e96c28f6965e9ee0d73c905b76c007d1742,2024-07-29T09:15:02.773000 CVE-2024-4190,0,0,937461468fcd73b26e47070e7d0620ac3009210ef2f47e2156f0b87dd1c21bc4,2024-06-13T18:36:09.013000 CVE-2024-41914,0,0,3890dc2e9dfadd1c89a9c37c2efa6249276e0e28c3236b40dae7af311b3a8be5,2024-07-25T17:47:35.247000 CVE-2024-4192,0,0,0768e429bccaed861e82d220deefd437e5feb26a94e95c7a121626318970662c,2024-05-01T13:02:20.750000 @@ -256302,7 +256306,7 @@ CVE-2024-4479,0,0,19a5d52fe32f562c79c648f88a021706b773334e3193aa8af739d9d0094fe3 CVE-2024-4480,0,0,f67562e05d6ec09870268aa7f7fb2c1f10d5ffdcd82e1a66baa51eee0cc1551d,2024-06-17T12:42:04.623000 CVE-2024-4481,0,0,c2852db732c7c65c13524ea22e5406663429c55dff3bfe0d5bbffa299f48bbd3,2024-05-14T16:11:39.510000 CVE-2024-4482,0,0,30c719bdf44110f5d77595f668147507c21a010645f412257434e159bd101a38,2024-07-03T18:24:41.627000 -CVE-2024-4483,1,1,89bcd0c34166fcf7585b7b1701f7f1795de252a314df689bf888a86fccb000a3,2024-07-29T06:15:02.357000 +CVE-2024-4483,0,0,89bcd0c34166fcf7585b7b1701f7f1795de252a314df689bf888a86fccb000a3,2024-07-29T06:15:02.357000 CVE-2024-4484,0,0,f8c7c7a90ad9fb2504d28a2d6c05b973f8e6ce86f54104c89b314d37b71fcc46,2024-05-24T13:03:05.093000 CVE-2024-4485,0,0,a27e77eb6786137f1ff33a4e5e44b17657a4b120ca60b51b6c6a25a52d6e7411,2024-05-24T13:03:05.093000 CVE-2024-4486,0,0,ae6967e9ce7769ae98c2cf87c0bc0fbb14e19b3005ed8a961bec51e7089d074a,2024-05-24T01:15:30.977000 @@ -256999,7 +257003,7 @@ CVE-2024-5281,0,0,060b06867a1a1c8ae3c49fd1bf435135d5f31c9df63d2fac2402a303dd1dca CVE-2024-5282,0,0,0e38a64d94c307cdd25aa8c70504121a3cc6e789cf8bf74fef94d0d9b37394df,2024-07-15T13:00:34.853000 CVE-2024-5283,0,0,158766c6fc63e1521af07a024c96b4a9ea5b7a8f36231f7ef52200c9bb9d7eae,2024-07-15T13:00:34.853000 CVE-2024-5284,0,0,4bfe0f5610c04cde5b0cb2c3dc3ab239b1848149dd6bfd8b564acd2ee160cb2a,2024-07-15T13:00:34.853000 -CVE-2024-5285,1,1,e8f7ea28a01e13485f45d0964d75631c339dee1d815a9e6a26a9c1034538e679,2024-07-29T06:15:02.463000 +CVE-2024-5285,0,0,e8f7ea28a01e13485f45d0964d75631c339dee1d815a9e6a26a9c1034538e679,2024-07-29T06:15:02.463000 CVE-2024-5286,0,0,fc7b78be4389acfb6eeeebdbd1c2b2010558b9a0f60282696859e3db27abfc46,2024-07-15T13:00:34.853000 CVE-2024-5287,0,0,d91964abcbe9a10e4df96379d6411e36555098088be8c568765ee25103481fbe,2024-07-15T13:00:34.853000 CVE-2024-5289,0,0,a02da373ddf627c39a88f09ba37230dcf191b29c84a32613f97fcb834cd9c524,2024-06-28T13:13:36.980000 @@ -257455,8 +257459,8 @@ CVE-2024-5868,0,0,9a8536b47a27c25b7062405f8aad2263147d3121835e9d2d4eb9b37e61c344 CVE-2024-5871,0,0,bfc23a1063e8c2c3d98988ddd8df8ea7002d8802bf04bd4c0c941cb9250f6a3f,2024-06-17T12:42:04.623000 CVE-2024-5873,0,0,5735eb2853c46a5b255fc10b814ec1b6c4f29d136a3521fa8f4d7be256150249,2024-06-12T08:15:51.550000 CVE-2024-5881,0,0,3ae006c5e782ce634c6c6fd24fda313894dca095797874331692050dc97499bf,2024-07-09T18:19:14.047000 -CVE-2024-5882,1,1,54cf41d45cd79d3b39e08bd47f590a63a708c434380f522deb018251c45f47b3,2024-07-29T06:15:02.547000 -CVE-2024-5883,1,1,b845f7dcc53012e04f19c21e4b3c7e7574b7636c513928ad8052b0676664d5e0,2024-07-29T06:15:02.627000 +CVE-2024-5882,0,0,54cf41d45cd79d3b39e08bd47f590a63a708c434380f522deb018251c45f47b3,2024-07-29T06:15:02.547000 +CVE-2024-5883,0,0,b845f7dcc53012e04f19c21e4b3c7e7574b7636c513928ad8052b0676664d5e0,2024-07-29T06:15:02.627000 CVE-2024-5885,0,0,4946e96abf9096ba44688feaf0b247be9bc7227d3f0040d31298fc7792a9ccc3,2024-06-27T19:25:12.067000 CVE-2024-5886,0,0,c6e7cb024adb68ffe24a326928e4d7c782b39c0023921bf84bad462101dad3b7,2024-06-20T11:15:56.580000 CVE-2024-5887,0,0,9566859cf83ab696aed1d992c858295b1ee73a5dd4c0fa67df0787b71b1dba0d,2024-07-17T12:15:02.013000 @@ -257777,10 +257781,10 @@ CVE-2024-6349,0,0,427eeb1c49748085f9d6a97a6add4281bc215342d4df9759ae2f609f0d24cf CVE-2024-6353,0,0,3e7ee1ed054bc0661b7c1f2f3de9fe2ed8be61a7a777eee50734c66af6748302,2024-07-12T12:49:07.030000 CVE-2024-6354,0,0,c9410e2fdcd521ee7fa5aea0abe57bbff6ce1153eea9fc9c27ad647524c61c5c,2024-07-03T02:09:53.917000 CVE-2024-6355,0,0,7f4c7fb5a41a7b4cf241f6b370777bf2a8cf0ede73cf75d47093e841c71a69f9,2024-06-27T14:15:16.753000 -CVE-2024-6362,1,1,4dee41b47b73d10d4eba22354921879c4feaf29e561c3dd84888b855b83cd1cc,2024-07-29T06:15:02.700000 +CVE-2024-6362,0,0,4dee41b47b73d10d4eba22354921879c4feaf29e561c3dd84888b855b83cd1cc,2024-07-29T06:15:02.700000 CVE-2024-6363,0,0,994b1c51b9c796771fbc515a7c8c263a84417d1a8472c73bc862555e8a8b6fdf,2024-07-01T12:37:24.220000 CVE-2024-6365,0,0,4363950e80c53434fcfd5afd5a384a9df5c49d102c20d1b50eb31e33005d9f26,2024-07-09T18:19:14.047000 -CVE-2024-6366,1,1,ec28110fa3f09bba4b114119146ff2b4a3d72063f14c44994ece3d869cf72b37,2024-07-29T06:15:02.790000 +CVE-2024-6366,0,0,ec28110fa3f09bba4b114119146ff2b4a3d72063f14c44994ece3d869cf72b37,2024-07-29T06:15:02.790000 CVE-2024-6367,0,0,0657e75ca91976d2d4beca477f8339cebb9a03d943acbd557f57c4bf89b57702,2024-06-27T12:47:19.847000 CVE-2024-6368,0,0,e298d701aa6c568232c2a1685979818386124e299e97d71dced43164a82e13ff,2024-06-27T18:15:21.083000 CVE-2024-6369,0,0,8b09ff85e5acb66c2b30feef0f9adfffd0c06196dfcccda2083a0a13ec885594,2024-06-27T12:47:19.847000 @@ -257795,7 +257799,7 @@ CVE-2024-6381,0,0,2822fb12d769fe1cca32125b45cae52ba3e5807419213b6087c6db8de8d2b3 CVE-2024-6382,0,0,9f140af24f460b4413fa844f95383cc153754360a136939b8743c2d8327ebf99,2024-07-03T12:53:24.977000 CVE-2024-6383,0,0,4622f4fc90fbde51d6570a14e2ee494e3e71659c68201475e4e4eb659c036ac0,2024-07-05T12:55:51.367000 CVE-2024-6385,0,0,13d2095bcd11ed43b6c47262c7b96c8a9e162b20cb975895bc98c3af67d39ff6,2024-07-12T16:49:14.047000 -CVE-2024-6387,0,0,173e264102785aff2d2221497f9b6a60ed7728b5324e3a48ddf25856405ee116,2024-07-28T21:15:10.480000 +CVE-2024-6387,0,1,18a0eee254c378cec8300ccfc21cb8052a8dc8829e64291b38d5c6284633aacb,2024-07-29T09:15:02.853000 CVE-2024-6388,0,0,0ce37f83493b5d79bb3fdc963327390bc09266ac17f5f1de660cf43d4cdce70d,2024-06-27T17:11:52.390000 CVE-2024-6391,0,0,f39301e9680e09028795caddd1f0219ac421e8fbe3773aa2e024531728c8f9e1,2024-07-09T18:19:14.047000 CVE-2024-6392,0,0,59a0778055c9ae4fa55c964a2a449c5eba0adacd372cf3ba0a728f148d4da23a,2024-07-12T12:49:07.030000 @@ -257849,7 +257853,7 @@ CVE-2024-6470,0,0,c9a33c23ec7370c50b4df58ad71ec5e181cf8d29947a984c43804e0a58dc77 CVE-2024-6471,0,0,f732e100289c893532526b33b46541a39ba52ce518f7e90d2f97ec4bb67cf877,2024-07-05T12:55:51.367000 CVE-2024-6484,0,0,bc633abd6bfb9da06585afdfb273066dfbc508847026385eb612d46f7c70ed29,2024-07-11T18:09:58.777000 CVE-2024-6485,0,0,b143d2f5de1cad2c57f83d18fe64abfe0ba2da69210341aec4863f07cdd850cb,2024-07-11T18:09:58.777000 -CVE-2024-6487,1,1,5f5355443347e274d682cedd60565bdf2ebb5b8ce4f4b4a0557d897fd36ca492,2024-07-29T06:15:02.873000 +CVE-2024-6487,0,0,5f5355443347e274d682cedd60565bdf2ebb5b8ce4f4b4a0557d897fd36ca492,2024-07-29T06:15:02.873000 CVE-2024-6488,0,0,0c5ecb49d7296b409f5d61bd70a5d017ad6f69068345855a00f0bd7c78566faa,2024-07-04T21:15:10.403000 CVE-2024-6489,0,0,9e9ca0d507c7dd8804b1fd0a0aa043e3fe6638bfc4af4b9ea109d44e00b0a114,2024-07-22T13:00:53.287000 CVE-2024-6490,0,0,8a5877d317a0eed7b1ae7b123dbc62aa28ad8c8fd8f1b2bd14476905cfed0a05,2024-07-26T12:38:41.683000 @@ -258144,9 +258148,13 @@ CVE-2024-7181,0,0,ec774c75c90b4c019fd6836b41d886ae8fdad52692ded8b3101bdf0e9965b3 CVE-2024-7182,0,0,a840bbbf4c86cb7b1060f7dfdeedcec84fdc7e091c2fc826cf697d52f91a8d86,2024-07-29T04:15:02.473000 CVE-2024-7183,0,0,7b2532f176b2f24dd5232f9e391254061f920c7e382fc99d4788606a854dce29,2024-07-29T05:15:01.820000 CVE-2024-7184,0,0,6417003ca7661607867b29229dc79991a8c0f5c529ccf8e7ff86605e25673ced,2024-07-29T05:15:02.203000 -CVE-2024-7185,1,1,c52e16bf9f9f42a8927241cae4302277dea92592a051435fb99b8b22f06fb122,2024-07-29T06:15:02.980000 -CVE-2024-7186,1,1,1fca5bf3b4e197b63e258046d7ceffac9bb5f4226bedafb5e3b93fcdf29c8281,2024-07-29T06:15:03.420000 -CVE-2024-7187,1,1,f35654ac501888a0f278af49d6fb4bcb3ef738af2e2b97cc401df743772848a7,2024-07-29T07:15:07.830000 -CVE-2024-7188,1,1,becd39a6aa7990584748f5287876db63518ab0ae9f2005c4ef08178e66949aa8,2024-07-29T07:15:08.713000 +CVE-2024-7185,0,0,c52e16bf9f9f42a8927241cae4302277dea92592a051435fb99b8b22f06fb122,2024-07-29T06:15:02.980000 +CVE-2024-7186,0,0,1fca5bf3b4e197b63e258046d7ceffac9bb5f4226bedafb5e3b93fcdf29c8281,2024-07-29T06:15:03.420000 +CVE-2024-7187,0,0,f35654ac501888a0f278af49d6fb4bcb3ef738af2e2b97cc401df743772848a7,2024-07-29T07:15:07.830000 +CVE-2024-7188,0,0,becd39a6aa7990584748f5287876db63518ab0ae9f2005c4ef08178e66949aa8,2024-07-29T07:15:08.713000 +CVE-2024-7189,1,1,35eeb18c886375b73bd239786d0dd9e06eb28ad1148bfdbab13be9366afd5de7,2024-07-29T08:15:01.703000 +CVE-2024-7190,1,1,ca1374ebbe0d80aa77b5e602ff3d9a9186474bf4da7cd883864d55234de117dc,2024-07-29T08:15:02.010000 +CVE-2024-7191,1,1,03be4729ed5cdd408154ea492efb83ab303676d2b1c6438848697eed77545b91,2024-07-29T09:15:03.410000 +CVE-2024-7192,1,1,56eab8502537289b54abe11e07f961272986215cef710818328b47882c39c7d0,2024-07-29T09:15:03.693000 CVE-2024-7201,0,0,7be4dae6a4185f4cd25c1f8f884039dbbeadd8a2aceec8d6c898f20222370dfb,2024-07-29T03:15:03.267000 CVE-2024-7202,0,0,65ac55258284a64f4b9d6679d59d4464aa901cdf53880e6ffdc4430ae23e65ac,2024-07-29T04:15:02.807000