diff --git a/CVE-2020/CVE-2020-118xx/CVE-2020-11846.json b/CVE-2020/CVE-2020-118xx/CVE-2020-11846.json index 09be0323af4..0efaa586c1c 100644 --- a/CVE-2020/CVE-2020-118xx/CVE-2020-11846.json +++ b/CVE-2020/CVE-2020-118xx/CVE-2020-11846.json @@ -2,17 +2,41 @@ "id": "CVE-2020-11846", "sourceIdentifier": "security@opentext.com", "published": "2024-08-21T14:15:07.737", - "lastModified": "2024-08-21T16:06:23.153", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-23T17:03:39.093", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability found in OpenText Privileged Access Manager that issues a token. on successful issuance of the token, a cookie gets set that allows unrestricted access to all the application resources.\u00a0This issue affects Privileged Access Manager before 3.7.0.1." + }, + { + "lang": "es", + "value": "Una vulnerabilidad encontrada en OpenText Privileged Access Manager que emite un token. Tras la emisi\u00f3n exitosa del token, se establece una cookie que permite el acceso sin restricciones a todos los recursos de la aplicaci\u00f3n. Este problema afecta a Privileged Access Manager anterior a 3.7.0.1." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security@opentext.com", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "security@opentext.com", "type": "Secondary", @@ -47,10 +81,36 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microfocus:netiq_privileged_access_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.7", + "matchCriteriaId": "FA2CD967-B489-4A21-8B40-77723EA447CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microfocus:netiq_privileged_access_manager:3.7:-:*:*:*:*:*:*", + "matchCriteriaId": "B555DD5F-DF6C-4A46-9F75-C668D9E48D4E" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.netiq.com/documentation/privileged-account-manager-37/npam_3701_releasenotes/data/npam_3701_releasenotes.html", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2020/CVE-2020-118xx/CVE-2020-11847.json b/CVE-2020/CVE-2020-118xx/CVE-2020-11847.json index e5acd3858f0..5553458171d 100644 --- a/CVE-2020/CVE-2020-118xx/CVE-2020-11847.json +++ b/CVE-2020/CVE-2020-118xx/CVE-2020-11847.json @@ -2,17 +2,41 @@ "id": "CVE-2020-11847", "sourceIdentifier": "security@opentext.com", "published": "2024-08-21T14:15:07.957", - "lastModified": "2024-08-21T16:06:23.153", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-23T17:04:30.110", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SSH authenticated user when access the PAM server can execute an OS command to gain the full system access using bash. This issue affects Privileged Access Manager before 3.7.0.1." + }, + { + "lang": "es", + "value": "El usuario autenticado por SSH cuando accede al servidor PAM puede ejecutar un comando del sistema operativo para obtener acceso completo al sistema mediante bash. Este problema afecta a Privileged Access Manager anterior a 3.7.0.1." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "security@opentext.com", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + }, { "source": "security@opentext.com", "type": "Secondary", @@ -47,10 +81,36 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microfocus:netiq_privileged_access_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.7", + "matchCriteriaId": "FA2CD967-B489-4A21-8B40-77723EA447CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microfocus:netiq_privileged_access_manager:3.7:-:*:*:*:*:*:*", + "matchCriteriaId": "B555DD5F-DF6C-4A46-9F75-C668D9E48D4E" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.netiq.com/documentation/privileged-account-manager-37/npam_3701_releasenotes/data/npam_3701_releasenotes.html", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2020/CVE-2020-118xx/CVE-2020-11850.json b/CVE-2020/CVE-2020-118xx/CVE-2020-11850.json index 5c5c6f190e2..83c022b3e46 100644 --- a/CVE-2020/CVE-2020-118xx/CVE-2020-11850.json +++ b/CVE-2020/CVE-2020-118xx/CVE-2020-11850.json @@ -2,17 +2,41 @@ "id": "CVE-2020-11850", "sourceIdentifier": "security@opentext.com", "published": "2024-08-21T13:15:04.027", - "lastModified": "2024-08-21T16:06:23.153", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-23T17:02:39.537", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Input Validation vulnerability in OpenText Self Service Password Reset allows Cross-Site Scripting (XSS).\u00a0This issue affects Self Service Password Reset before 4.5.0.2 and\u00a04.4.0.6" + }, + { + "lang": "es", + "value": "La vulnerabilidad de validaci\u00f3n de entrada incorrecta en OpenText Self Service Password Reset permite cross-site scripting (XSS). Este problema afecta al autoservicio de restablecimiento de contrase\u00f1a antes de 4.5.0.2 y 4.4.0.6" } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "security@opentext.com", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "security@opentext.com", "type": "Secondary", @@ -47,10 +81,71 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microfocus:netiq_self_service_password_reset:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.4", + "matchCriteriaId": "E701C6EC-B62F-41BB-B5AA-CE334DFBD47F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microfocus:netiq_self_service_password_reset:4.4:-:*:*:*:*:*:*", + "matchCriteriaId": "0D2267AA-38A3-4AAC-9CAE-8EBC4FE19A30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microfocus:netiq_self_service_password_reset:4.4:update_1:*:*:*:*:*:*", + "matchCriteriaId": "26CCCD03-813E-4423-8703-81C55839A52E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microfocus:netiq_self_service_password_reset:4.4:update_2:*:*:*:*:*:*", + "matchCriteriaId": "5B7B135B-352A-48CC-B92D-1C5D4725C032" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microfocus:netiq_self_service_password_reset:4.4:update_3:*:*:*:*:*:*", + "matchCriteriaId": "9E6830EE-5BE7-4B31-AAE4-A6EB8B6BA708" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microfocus:netiq_self_service_password_reset:4.4:update_4:*:*:*:*:*:*", + "matchCriteriaId": "7B3B7924-247B-4904-8AD2-11ED4AC93BD0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microfocus:netiq_self_service_password_reset:4.4:update_5:*:*:*:*:*:*", + "matchCriteriaId": "412BB939-68DD-42E4-9489-3147E86D089B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microfocus:netiq_self_service_password_reset:4.5:-:*:*:*:*:*:*", + "matchCriteriaId": "29E8E907-EDC5-4C1B-82A8-9F6003DDC215" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microfocus:netiq_self_service_password_reset:4.5:update_1:*:*:*:*:*:*", + "matchCriteriaId": "6F8A8A2E-7EC0-4E8A-A4E9-F2ED985E229E" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.netiq.com/documentation/self-service-password-reset-45/sspr-4502-release-notes/data/sspr-4502-release-notes.html#b149gz5h", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-225xx/CVE-2023-22576.json b/CVE-2023/CVE-2023-225xx/CVE-2023-22576.json index ada9f8b9f82..273ea0626e4 100644 --- a/CVE-2023/CVE-2023-225xx/CVE-2023-22576.json +++ b/CVE-2023/CVE-2023-225xx/CVE-2023-22576.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22576", "sourceIdentifier": "security_alert@emc.com", "published": "2024-08-21T10:15:04.173", - "lastModified": "2024-08-21T12:30:33.697", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-23T16:56:09.967", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "security_alert@emc.com", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "security_alert@emc.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "security_alert@emc.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:repository_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.4.3", + "matchCriteriaId": "F0FD2AE7-C8C8-4CB0-8C21-A3A8964C9352" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000207513/dsa-2023-017-dell-emc-repository-manager-drm-security-update-for-an-improper-privilege-management-vulnerability", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-438xx/CVE-2023-43847.json b/CVE-2023/CVE-2023-438xx/CVE-2023-43847.json index e4e1f9ed65c..af7cfa66875 100644 --- a/CVE-2023/CVE-2023-438xx/CVE-2023-43847.json +++ b/CVE-2023/CVE-2023-438xx/CVE-2023-43847.json @@ -2,7 +2,7 @@ "id": "CVE-2023-43847", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T19:15:09.523", - "lastModified": "2024-05-29T13:02:09.280", + "lastModified": "2024-08-23T17:35:00.470", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El control de acceso incorrecto en la funci\u00f3n de control de salidas de la interfaz web en Aten PE6208 2.3.228 y 2.4.232 permite a los usuarios autenticados remotamente controlar todas las salidas como si fueran el administrador mediante solicitudes HTTP POST." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://github.com/setersora/pe6208", diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49198.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49198.json index d95b9301159..774957fcedc 100644 --- a/CVE-2023/CVE-2023-491xx/CVE-2023-49198.json +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49198.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49198", "sourceIdentifier": "security@apache.org", "published": "2024-08-21T10:15:04.903", - "lastModified": "2024-08-21T14:35:01.510", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-23T16:56:50.683", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:seatunnel:1.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2275FCE7-D9F5-4541-8193-85423472BC64" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.apache.org/thread/48j9f1nsn037mgzc4j9o51nwglb1s08h", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-64xx/CVE-2023-6452.json b/CVE-2023/CVE-2023-64xx/CVE-2023-6452.json index 49728efdf45..179e8fd1b50 100644 --- a/CVE-2023/CVE-2023-64xx/CVE-2023-6452.json +++ b/CVE-2023/CVE-2023-64xx/CVE-2023-6452.json @@ -2,13 +2,17 @@ "id": "CVE-2023-6452", "sourceIdentifier": "psirt@forcepoint.com", "published": "2024-08-22T16:15:07.997", - "lastModified": "2024-08-22T16:15:07.997", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Forcepoint Web Security (Transaction Viewer) allows Stored XSS.\n\n\n\n\n\nThe\n Forcepoint Web Security portal allows administrators to generate \ndetailed reports on user requests made through the Web proxy. It has \nbeen determined that the \"user agent\" field in the Transaction Viewer is\n vulnerable to a persistent Cross-Site Scripting (XSS) vulnerability, \nwhich can be exploited by any user who can route traffic through the \nForcepoint Web proxy.\n\nThis \nvulnerability enables unauthorized attackers to execute JavaScript \nwithin the browser context of a Forcepoint administrator, thereby \nallowing them to perform actions on the administrator's behalf. Such a \nbreach could lead to unauthorized access or modifications, posing a \nsignificant security risk.\n\n\n\n\n\n\nThis issue affects Web Security: before 8.5.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('cross-site Scripting') en Forcepoint Web Security (Transaction Viewer) permite XSS Almacenado. El portal Forcepoint Web Security permite a los administradores generar informes detallados sobre las solicitudes de los usuarios realizadas a trav\u00e9s del proxy web. Se ha determinado que el campo \"agente de usuario\" en el Visor de transacciones es vulnerable a una vulnerabilidad persistente de Cross-Site Scripting (XSS), que puede ser explotada por cualquier usuario que pueda enrutar el tr\u00e1fico a trav\u00e9s del proxy web de Forcepoint. Esta vulnerabilidad permite a atacantes no autorizados ejecutar JavaScript dentro del contexto del navegador de un administrador de Forcepoint, permiti\u00e9ndoles as\u00ed realizar acciones en nombre del administrador. Una infracci\u00f3n de este tipo podr\u00eda dar lugar a modificaciones o accesos no autorizados, lo que plantear\u00eda un riesgo de seguridad importante. Este problema afecta a Web Security: versiones anteriores a 8.5.6." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7260.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7260.json index 2c5b7c650dc..fea2e92d65d 100644 --- a/CVE-2023/CVE-2023-72xx/CVE-2023-7260.json +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7260.json @@ -2,13 +2,17 @@ "id": "CVE-2023-7260", "sourceIdentifier": "security@opentext.com", "published": "2024-08-22T21:15:16.107", - "lastModified": "2024-08-22T21:15:16.107", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Path Traversal vulnerability discovered in OpenText\u2122 CX-E Voice, \n\naffecting all version through 22.4. The vulnerability could allow\u00a0arbitrarily access files on the system." + }, + { + "lang": "es", + "value": "Vulnerabilidad Path Traversal descubierta en OpenText\u2122 CX-E Voice, que afecta a todas las versiones hasta la 22.4. La vulnerabilidad podr\u00eda permitir acceder arbitrariamente a archivos del sistema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1891.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1891.json index cb0777d8bd7..cede2683e4b 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1891.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1891.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1891", "sourceIdentifier": "vulnreport@tenable.com", "published": "2024-06-12T16:15:10.887", - "lastModified": "2024-06-13T18:36:09.010", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-23T16:05:49.007", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "vulnreport@tenable.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "vulnreport@tenable.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tenable:security_center:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.4.0", + "matchCriteriaId": "2F327CB2-484E-4AA1-9590-2AC897A6E688" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.tenable.com/security/tns-2024-10", - "source": "vulnreport@tenable.com" + "source": "vulnreport@tenable.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21878.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21878.json index 0f7c6b3ea28..47ad25afe04 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21878.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21878.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21878", "sourceIdentifier": "csirt@divd.nl", "published": "2024-08-12T13:38:15.107", - "lastModified": "2024-08-12T13:41:36.517", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-23T17:52:11.777", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,9 +59,41 @@ "baseSeverity": "CRITICAL" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + }, { "source": "csirt@divd.nl", "type": "Secondary", @@ -73,18 +105,58 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:enphase:iq_gateway_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0", + "versionEndExcluding": "8.2.4225", + "matchCriteriaId": "045C0178-42FE-4511-A182-AF3BA9545EF0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:enphase:iq_gateway:-:*:*:*:*:*:*:*", + "matchCriteriaId": "75882BE4-CF58-44B5-BA30-DD13BDFF78C0" + } + ] + } + ] + } + ], "references": [ { "url": "https://csirt.divd.nl/CVE-2024-21878", - "source": "csirt@divd.nl" + "source": "csirt@divd.nl", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://csirt.divd.nl/DIVD-2024-00011", - "source": "csirt@divd.nl" + "source": "csirt@divd.nl", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://enphase.com/cybersecurity/advisories/ensa-2024-3", - "source": "csirt@divd.nl" + "source": "csirt@divd.nl", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21879.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21879.json index 13123a02149..83d0f11187f 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21879.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21879.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21879", "sourceIdentifier": "csirt@divd.nl", "published": "2024-08-12T13:38:15.237", - "lastModified": "2024-08-12T13:41:36.517", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-23T17:49:25.830", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,9 +59,41 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + }, { "source": "csirt@divd.nl", "type": "Secondary", @@ -73,18 +105,58 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:enphase:iq_gateway_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0", + "versionEndExcluding": "8.2.4225", + "matchCriteriaId": "045C0178-42FE-4511-A182-AF3BA9545EF0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:enphase:iq_gateway:-:*:*:*:*:*:*:*", + "matchCriteriaId": "75882BE4-CF58-44B5-BA30-DD13BDFF78C0" + } + ] + } + ] + } + ], "references": [ { "url": "https://csirt.divd.nl/CVE-2024-21879", - "source": "csirt@divd.nl" + "source": "csirt@divd.nl", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://csirt.divd.nl/DIVD-2024-00011", - "source": "csirt@divd.nl" + "source": "csirt@divd.nl", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://enphase.com/cybersecurity/advisories/ensa-2024-4", - "source": "csirt@divd.nl" + "source": "csirt@divd.nl", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21880.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21880.json index cdf11b65e62..c570b9e5110 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21880.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21880.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21880", "sourceIdentifier": "csirt@divd.nl", "published": "2024-08-12T13:38:15.357", - "lastModified": "2024-08-12T13:41:36.517", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-23T17:38:35.193", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,9 +59,41 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + }, { "source": "csirt@divd.nl", "type": "Secondary", @@ -73,18 +105,58 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:enphase:iq_gateway_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0", + "versionEndIncluding": "7.3.120", + "matchCriteriaId": "CF5422A2-2BF6-4B21-ADD1-27B6830A260D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:enphase:iq_gateway:-:*:*:*:*:*:*:*", + "matchCriteriaId": "75882BE4-CF58-44B5-BA30-DD13BDFF78C0" + } + ] + } + ] + } + ], "references": [ { "url": "https://csirt.divd.nl/CVE-2024-21880", - "source": "csirt@divd.nl" + "source": "csirt@divd.nl", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://csirt.divd.nl/DIVD-2024-00011", - "source": "csirt@divd.nl" + "source": "csirt@divd.nl", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://enphase.com/cybersecurity/advisories/ensa-2024-5", - "source": "csirt@divd.nl" + "source": "csirt@divd.nl", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2747.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2747.json index 62a00f8d5cb..ae4ea2fe9c4 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2747.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2747.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2747", "sourceIdentifier": "cybersecurity@se.com", "published": "2024-06-12T18:15:11.680", - "lastModified": "2024-06-13T18:36:09.010", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-23T16:30:43.417", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "cybersecurity@se.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:schneider-electric:easergy_studio:*:*:*:*:*:*:*:*", + "versionEndIncluding": "9.3.3", + "matchCriteriaId": "57D8C08A-39CF-452A-AC1B-0FABB886D5C7" + } + ] + } + ] + } + ], "references": [ { "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-100-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-100-01.pdf", - "source": "cybersecurity@se.com" + "source": "cybersecurity@se.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-282xx/CVE-2024-28298.json b/CVE-2024/CVE-2024-282xx/CVE-2024-28298.json index bdcd0c2d250..ef1a4d51e84 100644 --- a/CVE-2024/CVE-2024-282xx/CVE-2024-28298.json +++ b/CVE-2024/CVE-2024-282xx/CVE-2024-28298.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28298", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-02T19:16:30.467", - "lastModified": "2024-08-05T12:41:45.957", + "lastModified": "2024-08-23T16:35:01.807", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en BM SOFT BMPlanning 1.0.0.1 permite a usuarios autenticados ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s de SEC_IDF, LIE_IDF, PLANF_IDF, CLI_IDF, DOS_IDF y posiblemente otros par\u00e1metros de /BMServerR.dll/BMRest." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 6.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/post-cyberlabs/CVE-Advisory/blob/main/CVE-2024-28298_BMPlanning%28BM-Soft%29_Authenticated%20SQLI.pdf", diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28972.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28972.json index d14c251a8d3..3e844dfad58 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28972.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28972.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28972", "sourceIdentifier": "security_alert@emc.com", "published": "2024-08-01T08:15:02.520", - "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-23T16:59:11.070", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security_alert@emc.com", "type": "Secondary", @@ -51,10 +71,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:insightiq:5.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5569D676-3632-4002-A1FF-56DCF5B2489C" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000226567/dsa-2024-211-security-update-for-a-dell-insightiq-broken-or-risky-cryptographic-algorithm-vulnerability", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2800.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2800.json index 3765d3f2492..f69cb1f23f7 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2800.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2800.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2800", "sourceIdentifier": "cve@gitlab.com", "published": "2024-08-08T11:15:12.210", - "lastModified": "2024-08-08T13:04:18.753", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-23T17:03:41.320", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1333" + } + ] + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -51,14 +81,74 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "11.3.0", + "versionEndExcluding": "17.0.6", + "matchCriteriaId": "BE9FA482-7DD8-4471-AB55-3DCAEA709557" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "11.3.0", + "versionEndExcluding": "17.06", + "matchCriteriaId": "66E5714F-3E5C-4982-BB80-A83CD0BB9B00" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "17.1.0", + "versionEndExcluding": "17.1.4", + "matchCriteriaId": "6CA14692-9997-4A11-8B3D-29199A3498D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.1.0", + "versionEndExcluding": "17.1.4", + "matchCriteriaId": "39754D78-BBE0-41D9-B2AB-5402B32C8ECF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "17.2.0", + "versionEndExcluding": "17.2.2", + "matchCriteriaId": "153C136B-FF14-43EC-AE67-68273DF7D9ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.2.0", + "versionEndExcluding": "17.2.2", + "matchCriteriaId": "2BE7EFA9-D9B4-4E7E-81B2-597D3DC5756E" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/451293", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://hackerone.com/reports/2416332", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-317xx/CVE-2024-31771.json b/CVE-2024/CVE-2024-317xx/CVE-2024-31771.json index 5db33fcc660..a6c7719bd28 100644 --- a/CVE-2024/CVE-2024-317xx/CVE-2024-31771.json +++ b/CVE-2024/CVE-2024-317xx/CVE-2024-31771.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31771", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:25:42.360", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-08-23T16:35:04.007", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La vulnerabilidad de permiso inseguro en TotalAV v.6.0.740 permite a un atacante local escalar privilegios a trav\u00e9s de un archivo manipulado" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + } + ] + } + ], "references": [ { "url": "https://github.com/restdone/CVE-2024-31771", diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3114.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3114.json index a14fcd74095..5e602f60afa 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3114.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3114.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3114", "sourceIdentifier": "cve@gitlab.com", "published": "2024-08-08T11:15:12.733", - "lastModified": "2024-08-08T13:04:18.753", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-23T17:04:56.070", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1333" + } + ] + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -51,14 +81,74 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "11.10.0", + "versionEndExcluding": "17.0.6", + "matchCriteriaId": "03B0A1CC-12FD-4FA4-A818-357F63A5C95A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "11.10.0", + "versionEndExcluding": "17.0.6", + "matchCriteriaId": "BA68FBDF-DCEE-45E0-8A5B-34E128474D88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "17.1.0", + "versionEndExcluding": "17.1.4", + "matchCriteriaId": "6CA14692-9997-4A11-8B3D-29199A3498D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.1.0", + "versionEndExcluding": "17.1.4", + "matchCriteriaId": "39754D78-BBE0-41D9-B2AB-5402B32C8ECF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "17.2.0", + "versionEndExcluding": "17.2.2", + "matchCriteriaId": "153C136B-FF14-43EC-AE67-68273DF7D9ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.2.0", + "versionEndExcluding": "17.2.2", + "matchCriteriaId": "2BE7EFA9-D9B4-4E7E-81B2-597D3DC5756E" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/452547", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://hackerone.com/reports/2416630", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3127.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3127.json index 1039087f4a7..e90ee21616e 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3127.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3127.json @@ -2,13 +2,17 @@ "id": "CVE-2024-3127", "sourceIdentifier": "cve@gitlab.com", "published": "2024-08-22T16:15:08.590", - "lastModified": "2024-08-22T16:15:08.590", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue has been discovered in GitLab EE affecting all versions starting from 12.5 before 17.1.6, all versions starting from 17.2 before 17.2.4, all versions starting from 17.3 before 17.3.1. Under certain conditions it may be possible to bypass the IP restriction for groups through GraphQL allowing unauthorised users to perform some actions at the group level." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en GitLab EE que afecta a todas las versiones desde 12.5 anteriores a 17.1.6, todas las versiones desde 17.2 anteriores a 17.2.4, todas las versiones desde 17.3 anteriores a 17.3.1. Bajo ciertas condiciones, es posible evitar la restricci\u00f3n de IP para grupos a trav\u00e9s de GraphQL, permitiendo a usuarios no autorizados realizar algunas acciones a nivel de grupo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-325xx/CVE-2024-32501.json b/CVE-2024/CVE-2024-325xx/CVE-2024-32501.json new file mode 100644 index 00000000000..95dc272c816 --- /dev/null +++ b/CVE-2024/CVE-2024-325xx/CVE-2024-32501.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-32501", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-23T17:15:06.490", + "lastModified": "2024-08-23T17:15:06.490", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL Injection vulnerability exists in the updateServiceHost functionality in Centreon Web 24.04.x before 24.04.3, 23.10.x before 23.10.13, 23.04.x before 23.04.19, and 22.10.x before 22.10.23." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://centreon.com", + "source": "cve@mitre.org" + }, + { + "url": "https://thewatch.centreon.com/latest-security-bulletins-64/security-bulletin-for-centreon-web-3744", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32939.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32939.json index 6ef88f345a9..32f9f64c793 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32939.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32939.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32939", "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2024-08-22T07:15:03.353", - "lastModified": "2024-08-22T12:48:02.790", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-23T16:17:54.027", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + }, { "source": "responsibledisclosure@mattermost.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] + }, { "source": "responsibledisclosure@mattermost.com", "type": "Secondary", @@ -51,10 +81,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.5.0", + "versionEndExcluding": "9.5.8", + "matchCriteriaId": "7FEEA8D7-745A-49FF-8B01-CA0D1D820D48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.8.0", + "versionEndExcluding": "9.8.3", + "matchCriteriaId": "9B9B4EAB-A618-4823-BECD-0BFD3D76A9D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.9.0", + "versionEndExcluding": "9.9.2", + "matchCriteriaId": "A445A478-E185-49DF-8CDC-F42BBF8577D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.10.0", + "versionEndExcluding": "9.10.1", + "matchCriteriaId": "0CA40F21-914D-4891-A578-02E6F35FE249" + } + ] + } + ] + } + ], "references": [ { "url": "https://mattermost.com/security-updates", - "source": "responsibledisclosure@mattermost.com" + "source": "responsibledisclosure@mattermost.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3282.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3282.json index 2641ce8a27e..80e83c2a33d 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3282.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3282.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3282", "sourceIdentifier": "contact@wpscan.com", "published": "2024-08-23T06:15:03.827", - "lastModified": "2024-08-23T15:35:06.070", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33852.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33852.json new file mode 100644 index 00000000000..26b4e197370 --- /dev/null +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33852.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-33852", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-23T17:15:06.570", + "lastModified": "2024-08-23T17:35:02.260", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL Injection vulnerability exists in the Downtime component in Centreon Web 24.04.x before 24.04.3, 23.10.x before 23.10.13, 23.04.x before 23.04.19, and 22.10.x before 22.10.23." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/centreon/centreon/releases", + "source": "cve@mitre.org" + }, + { + "url": "https://thewatch.centreon.com/latest-security-bulletins-64/security-bulletin-for-centreon-web-3744", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33853.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33853.json new file mode 100644 index 00000000000..9431aa68f48 --- /dev/null +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33853.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-33853", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-23T17:15:06.633", + "lastModified": "2024-08-23T17:35:03.370", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL Injection vulnerability exists in the Timeperiod component in Centreon Web 24.04.x before 24.04.3, 23.10.x before 23.10.13, 23.04.x before 23.04.19, and 22.10.x before 22.10.23." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/centreon/centreon/releases", + "source": "cve@mitre.org" + }, + { + "url": "https://thewatch.centreon.com/latest-security-bulletins-64/security-bulletin-for-centreon-web-3744", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33854.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33854.json new file mode 100644 index 00000000000..67e86b11124 --- /dev/null +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33854.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-33854", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-23T17:15:06.690", + "lastModified": "2024-08-23T17:15:06.690", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL Injection vulnerability exists in the Graph Template component in Centreon Web 24.04.x before 24.04.3, 23.10.x before 23.10.13, 23.04.x before 23.04.19, and 22.10.x before 22.10.23." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/centreon/centreon/releases", + "source": "cve@mitre.org" + }, + { + "url": "https://thewatch.centreon.com/latest-security-bulletins-64/security-bulletin-for-centreon-web-3744", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36439.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36439.json index c727a0419b0..7999f5aa99f 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36439.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36439.json @@ -2,13 +2,17 @@ "id": "CVE-2024-36439", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T15:15:15.883", - "lastModified": "2024-08-22T18:35:12.120", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Swissphone DiCal-RED 4009 devices allow a remote attacker to gain access to the administrative web interface via the device password's hash value, without knowing the actual device password." + }, + { + "lang": "es", + "value": "Los dispositivos Swissphone DiCal-RED 4009 permiten a un atacante remoto obtener acceso a la interfaz web administrativa a trav\u00e9s del valor hash de la contrase\u00f1a del dispositivo, sin conocer la contrase\u00f1a real del dispositivo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36440.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36440.json index 0e970490493..f336dc52c17 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36440.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36440.json @@ -2,13 +2,17 @@ "id": "CVE-2024-36440", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T15:15:15.977", - "lastModified": "2024-08-22T20:35:13.640", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered on Swissphone DiCal-RED 4009 devices. An attacker with access to the file /etc/deviceconfig may recover the administrative device password via password-cracking methods, because unsalted MD5 is used." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en los dispositivos Swissphone DiCal-RED 4009. Un atacante con acceso al archivo /etc/deviceconfig puede recuperar la contrase\u00f1a del dispositivo administrativo mediante m\u00e9todos de descifrado de contrase\u00f1as, porque se utiliza MD5 sin sal." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36441.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36441.json index b9f692b6c0c..a08d4039745 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36441.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36441.json @@ -2,13 +2,17 @@ "id": "CVE-2024-36441", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T16:15:08.433", - "lastModified": "2024-08-22T19:35:29.793", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Swissphone DiCal-RED 4009 devices allow an unauthenticated attacker use a port-2101 TCP connection to gain access to operation messages that are received by the device." + }, + { + "lang": "es", + "value": "Los dispositivos Swissphone DiCal-RED 4009 permiten que un atacante no autenticado utilice una conexi\u00f3n TCP del puerto 2101 para obtener acceso a los mensajes de operaci\u00f3n que recibe el dispositivo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36442.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36442.json index 434ff345a5e..19cbd16b09d 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36442.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36442.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36442", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T15:15:16.047", - "lastModified": "2024-08-23T14:35:01.630", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36443.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36443.json index 2196531a2f5..0286f10cd3c 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36443.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36443.json @@ -2,13 +2,17 @@ "id": "CVE-2024-36443", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T14:15:08.443", - "lastModified": "2024-08-22T19:35:30.730", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Swissphone DiCal-RED 4009 devices allow a remote attacker to gain read access to almost the whole file system via anonymous FTP." + }, + { + "lang": "es", + "value": "Los dispositivos Swissphone DiCal-RED 4009 permiten a un atacante remoto obtener acceso de lectura a casi todo el sistema de archivos a trav\u00e9s de FTP an\u00f3nimo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36444.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36444.json index a4453959b55..e453397fd2f 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36444.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36444.json @@ -2,13 +2,17 @@ "id": "CVE-2024-36444", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T15:15:16.117", - "lastModified": "2024-08-22T15:15:16.117", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "cgi-bin/fdmcgiwebv2.cgi on Swissphone DiCal-RED 4009 devices allows an unauthenticated attacker to gain access to device logs." + }, + { + "lang": "es", + "value": "cgi-bin/fdmcgiwebv2.cgi en dispositivos Swissphone DiCal-RED 4009 permite que un atacante no autenticado obtenga acceso a los registros del dispositivo." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36445.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36445.json index c7bb7d85c3e..24032622a84 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36445.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36445.json @@ -2,13 +2,17 @@ "id": "CVE-2024-36445", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T15:15:16.187", - "lastModified": "2024-08-22T20:35:14.640", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Swissphone DiCal-RED 4009 devices allow a remote attacker to gain a root shell via TELNET without authentication." + }, + { + "lang": "es", + "value": "Los dispositivos Swissphone DiCal-RED 4009 permiten a un atacante remoto obtener un shell ra\u00edz a trav\u00e9s de TELNET sin autenticaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36514.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36514.json index 53e30a36f35..c3400e68011 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36514.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36514.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36514", "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", "published": "2024-08-23T14:15:09.993", - "lastModified": "2024-08-23T14:15:09.993", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36515.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36515.json index f192d133ad6..b61046608c4 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36515.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36515.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36515", "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", "published": "2024-08-23T14:15:10.300", - "lastModified": "2024-08-23T14:15:10.300", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36516.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36516.json index bad33c00f26..4a564cdea05 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36516.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36516.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36516", "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", "published": "2024-08-23T14:15:10.523", - "lastModified": "2024-08-23T14:15:10.523", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36517.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36517.json index 8f270c1083e..784508c872e 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36517.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36517.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36517", "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", "published": "2024-08-23T14:15:10.747", - "lastModified": "2024-08-23T14:15:10.747", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-367xx/CVE-2024-36761.json b/CVE-2024/CVE-2024-367xx/CVE-2024-36761.json index 859f11dfa92..779b96fb215 100644 --- a/CVE-2024/CVE-2024-367xx/CVE-2024-36761.json +++ b/CVE-2024/CVE-2024-367xx/CVE-2024-36761.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36761", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-12T16:15:11.983", - "lastModified": "2024-06-13T18:36:09.010", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-23T16:19:16.607", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "Se descubri\u00f3 que naga v0.14.0 conten\u00eda un desbordamiento de pila a trav\u00e9s del componente /wgsl/parse/mod.rs." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gfx-rs:naga:0.14.0:*:*:*:*:rust:*:*", + "matchCriteriaId": "78CD5E32-2654-480D-99A6-B5B24501BB0D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/MageWeiG/VulnerabilityCollection/blob/main/CVE-2024-36761/info.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/gfx-rs/naga/issues/2591", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37008.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37008.json index 36b0a3e1835..2dd0f683da8 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37008.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37008.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37008", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-08-21T10:15:05.037", - "lastModified": "2024-08-21T12:30:33.697", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-23T16:57:34.547", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "psirt@autodesk.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "psirt@autodesk.com", "type": "Secondary", @@ -51,10 +81,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:autodesk:revit:2022:*:*:*:*:*:*:*", + "matchCriteriaId": "70FD96A0-AC16-4E51-B4C1-6BB14C2D905A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:autodesk:revit:2023:*:*:*:*:*:*:*", + "matchCriteriaId": "2F75A973-839F-4BD0-8603-07AEF3F12476" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:autodesk:revit:2024:*:*:*:*:*:*:*", + "matchCriteriaId": "1F8E8074-7FA0-4257-9DF9-00B0A37D1F92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:autodesk:revit:2025:*:*:*:*:*:*:*", + "matchCriteriaId": "99EC6432-EAE3-4759-A4AF-34B61818EB0E" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0013", - "source": "psirt@autodesk.com" + "source": "psirt@autodesk.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37311.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37311.json index 7c50b44cea1..bec0c08a4aa 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37311.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37311.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37311", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-23T15:15:15.617", - "lastModified": "2024-08-23T15:15:15.617", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38208.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38208.json index 7159a8c974a..050202e2949 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38208.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38208.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38208", "sourceIdentifier": "secure@microsoft.com", "published": "2024-08-22T23:15:07.543", - "lastModified": "2024-08-22T23:15:07.543", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Edge for Android Spoofing Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de suplantaci\u00f3n de identidad de Microsoft Edge para Android" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38209.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38209.json index 12dcd5011d9..5f9076ebca2 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38209.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38209.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38209", "sourceIdentifier": "secure@microsoft.com", "published": "2024-08-22T23:15:07.740", - "lastModified": "2024-08-22T23:15:07.740", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de Microsoft Edge (basado en Chromium)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38210.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38210.json index 157ffb11ec2..9bf889fd603 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38210.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38210.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38210", "sourceIdentifier": "secure@microsoft.com", "published": "2024-08-22T23:15:07.933", - "lastModified": "2024-08-22T23:15:07.933", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de Microsoft Edge (basado en Chromium)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38807.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38807.json index 459e2c7e0a4..00e489d9420 100644 --- a/CVE-2024/CVE-2024-388xx/CVE-2024-38807.json +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38807.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38807", "sourceIdentifier": "security@vmware.com", "published": "2024-08-23T09:15:07.453", - "lastModified": "2024-08-23T09:15:07.453", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Applications that use spring-boot-loader\u00a0or spring-boot-loader-classic\u00a0and contain custom code that performs signature verification of nested jar files may be vulnerable to signature forgery where content that appears to have been signed by one signer has, in fact, been signed by another." + }, + { + "lang": "es", + "value": "Las aplicaciones que utilizan spring-boot-loader o spring-boot-loader-classic y contienen c\u00f3digo personalizado que realiza la verificaci\u00f3n de firmas de archivos jar anidados pueden ser vulnerables a la falsificaci\u00f3n de firmas cuando el contenido que parece haber sido firmado por un firmante, de hecho, sido firmado por otro." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38869.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38869.json index 1c391d2235d..72ca8c27695 100644 --- a/CVE-2024/CVE-2024-388xx/CVE-2024-38869.json +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38869.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38869", "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", "published": "2024-08-23T15:15:15.843", - "lastModified": "2024-08-23T15:15:15.843", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39207.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39207.json index 8513a13f070..09fb8afe9b3 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39207.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39207.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39207", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-27T20:15:22.557", - "lastModified": "2024-06-28T10:27:00.920", + "lastModified": "2024-08-23T16:35:05.620", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que lua-shmem v1.0-1 conten\u00eda un desbordamiento del b\u00fafer a trav\u00e9s de la funci\u00f3n shmem_write." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/yanggao017/5ca24da711cf893bedac38518ec448f1", diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39717.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39717.json index 3fef435569a..9594f03087c 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39717.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39717.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39717", "sourceIdentifier": "support@hackerone.com", "published": "2024-08-22T19:15:09.173", - "lastModified": "2024-08-22T19:15:09.173", - "vulnStatus": "Received", + "lastModified": "2024-08-23T17:35:04.543", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Versa Director GUI provides an option to customize the look and feel of the user interface. This option is only available for a user logged with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin. (Tenant level users do not have this privilege). The \u201cChange Favicon\u201d (Favorite Icon) option can be mis-used to upload a malicious file ending with .png extension to masquerade as image file. This is possible only after a user with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin has successfully authenticated and logged in. \r\n\r\nSeverity: HIGH\r\n \r\nExploitation Status:\r\n\r\nVersa Networks is aware of one confirmed customer reported instance where this vulnerability was exploited because the Firewall guidelines which were published in 2015 & 2017 were not implemented by that customer. This non-implementation resulted in the bad actor being able to exploit this vulnerability without using the GUI. In our testing (not exhaustive, as not all numerical versions of major browsers were tested) the malicious file does not get executed on the client. There are reports of others based on backbone telemetry observations of a 3rd party provider, however these are unconfirmed to date." + }, + { + "lang": "es", + "value": "La GUI de Versa Director ofrece una opci\u00f3n para personalizar la apariencia de la interfaz de usuario. Esta opci\u00f3n solo est\u00e1 disponible para un usuario que haya iniciado sesi\u00f3n con Provider-Data-Center-Admin o Provider-Data-Center-System-Admin. (Los usuarios de nivel de inquilino no tienen este privilegio). La opci\u00f3n \"Cambiar Favicon\" (icono favorito) se puede utilizar incorrectamente para cargar un archivo malicioso que termina con la extensi\u00f3n .png y se hace pasar por un archivo de imagen. Esto solo es posible despu\u00e9s de que un usuario con Provider-Data-Center-Admin o Provider-Data-Center-System-Admin se haya autenticado e iniciado correctamente. Gravedad: ALTA Estado de explotaci\u00f3n: Versa Networks tiene conocimiento de un caso confirmado que inform\u00f3 un cliente en el que esto La vulnerabilidad fue explotada porque ese cliente no implement\u00f3 las pautas de firewall que se publicaron en 2015 y 2017. Esta no implementaci\u00f3n result\u00f3 en que el mal actor pudiera explotar esta vulnerabilidad sin usar la GUI. En nuestras pruebas (no exhaustivas, ya que no se probaron todas las versiones num\u00e9ricas de los principales navegadores), el archivo malicioso no se ejecuta en el cliente. Hay informes de otros basados en observaciones de telemetr\u00eda troncal de un proveedor externo, sin embargo, estos no est\u00e1n confirmados hasta la fecha." } ], "metrics": { @@ -35,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://support.versa-networks.com/support/solutions/articles/23000024323-release-21-2-3", diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39776.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39776.json index 29fb32c37c3..b6914a8e784 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39776.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39776.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39776", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-08-22T20:15:08.750", - "lastModified": "2024-08-22T20:15:08.750", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Avtec Outpost stores sensitive information in an insecure location without proper access controls in place." + }, + { + "lang": "es", + "value": "Avtec Outpost almacena informaci\u00f3n confidencial en una ubicaci\u00f3n insegura sin controles de acceso adecuados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39810.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39810.json index 10d1ca016f1..a1b1d6266e1 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39810.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39810.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39810", "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2024-08-22T07:15:03.743", - "lastModified": "2024-08-22T12:48:02.790", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-23T16:16:36.907", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + }, { "source": "responsibledisclosure@mattermost.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "responsibledisclosure@mattermost.com", "type": "Secondary", @@ -51,10 +81,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.5.0", + "versionEndExcluding": "9.5.8", + "matchCriteriaId": "7FEEA8D7-745A-49FF-8B01-CA0D1D820D48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.10.0", + "versionEndExcluding": "9.10.1", + "matchCriteriaId": "0CA40F21-914D-4891-A578-02E6F35FE249" + } + ] + } + ] + } + ], "references": [ { "url": "https://mattermost.com/security-updates", - "source": "responsibledisclosure@mattermost.com" + "source": "responsibledisclosure@mattermost.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39836.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39836.json index 487af06856e..41235e7cc0b 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39836.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39836.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39836", "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2024-08-22T07:15:03.960", - "lastModified": "2024-08-22T12:48:02.790", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-23T16:16:18.757", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + }, { "source": "responsibledisclosure@mattermost.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "responsibledisclosure@mattermost.com", "type": "Secondary", @@ -51,10 +81,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.5.0", + "versionEndExcluding": "9.5.8", + "matchCriteriaId": "7FEEA8D7-745A-49FF-8B01-CA0D1D820D48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.8.0", + "versionEndExcluding": "9.8.3", + "matchCriteriaId": "9B9B4EAB-A618-4823-BECD-0BFD3D76A9D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.9.0", + "versionEndExcluding": "9.9.2", + "matchCriteriaId": "A445A478-E185-49DF-8CDC-F42BBF8577D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.10.0", + "versionEndExcluding": "9.10.1", + "matchCriteriaId": "0CA40F21-914D-4891-A578-02E6F35FE249" + } + ] + } + ] + } + ], "references": [ { "url": "https://mattermost.com/security-updates", - "source": "responsibledisclosure@mattermost.com" + "source": "responsibledisclosure@mattermost.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39841.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39841.json new file mode 100644 index 00000000000..f02bdc64a9a --- /dev/null +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39841.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-39841", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-23T17:15:06.780", + "lastModified": "2024-08-23T17:15:06.780", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL Injection vulnerability exists in the service configuration functionality in Centreon Web 24.04.x before 24.04.3, 23.10.x before 23.10.13, 23.04.x before 23.04.19, and 22.10.x before 22.10.23." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/centreon/centreon/releases", + "source": "cve@mitre.org" + }, + { + "url": "https://thewatch.centreon.com/latest-security-bulletins-64/security-bulletin-for-centreon-web-3744", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40453.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40453.json index 270e57d21de..ff6e45fdded 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40453.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40453.json @@ -2,28 +2,123 @@ "id": "CVE-2024-40453", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-21T17:15:08.100", - "lastModified": "2024-08-21T17:24:59.627", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-23T17:35:05.463", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "squirrellyjs squirrelly v9.0.0 and fixed in v.9.0.1 was discovered to contain a code injection vulnerability via the component options.varName." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que squirrellyjs squirrelly v9.0.0 y corregido en v.9.0.1 conten\u00eda una vulnerabilidad de inyecci\u00f3n de c\u00f3digo a trav\u00e9s del componente options.varName." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:squirrelly:squirrelly:9.0.0:*:*:*:*:node.js:*:*", + "matchCriteriaId": "A9951264-FE0D-4AA9-88E3-165D84655471" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/squirrellyjs/squirrelly", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/squirrellyjs/squirrelly/pull/262", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://samuzora.com/posts/cve-2024-40453", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40766.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40766.json index 0c98f7f169e..7924922c3e5 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40766.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40766.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40766", "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2024-08-23T07:15:03.643", - "lastModified": "2024-08-23T07:15:03.643", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper access control vulnerability has been identified in the SonicWall SonicOS management access, potentially leading to unauthorized resource access and in specific conditions, causing the firewall to crash. This issue affects SonicWall Firewall Gen 5 and Gen 6 devices, as well as Gen 7 devices running SonicOS 7.0.1-5035 and older versions." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad de control de acceso inadecuado en el acceso de administraci\u00f3n de SonicWall SonicOS, que potencialmente conduce a un acceso no autorizado a recursos y, en condiciones espec\u00edficas, provoca que el firewall falle. Este problema afecta a los dispositivos SonicWall Firewall Gen 5 y Gen 6, as\u00ed como a los dispositivos Gen 7 que ejecutan SonicOS 7.0.1-5035 y versiones anteriores." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40883.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40883.json index 531ae5fb45a..4eaf2b4314f 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40883.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40883.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40883", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-08-01T02:15:02.023", - "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-23T16:52:30.277", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,226 @@ "value": " Existe una vulnerabilidad de Cross-site request forgery en los enrutadores LAN inal\u00e1mbricos ELECOM. Al ver una p\u00e1gina maliciosa mientras inicia sesi\u00f3n en el producto afectado con un privilegio administrativo, se puede dirigir al usuario a realizar operaciones no deseadas, como cambiar el ID de inicio de sesi\u00f3n, la contrase\u00f1a de inicio de sesi\u00f3n, etc." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:wrc-2533gs2-b_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.69", + "matchCriteriaId": "62F4C8BB-6DA7-4227-BDE9-3113CEFA110A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:wrc-2533gs2-b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9FF3CB7-7F2E-472A-A2A3-ED599F4FC99C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:wrc-2533gs2-w_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.69", + "matchCriteriaId": "77A56640-4A80-4338-9BBF-901088D26193" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:wrc-2533gs2-w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECD9F0FE-1232-4C39-AA86-2D616E4D39C6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:wrc-2533gs2v-b_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.69", + "matchCriteriaId": "3892264D-1108-432F-83EA-E027A6AA0610" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:wrc-2533gs2v-b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69FF2911-A946-4E48-B50A-F1F5EC95BBCC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:wrc-x6000xs-g_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.12", + "matchCriteriaId": "A1309B92-8C27-488A-8190-A164502EE615" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:wrc-x6000xs-g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D50F2091-30D4-4A3E-A28A-B9D67D70DB2C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:wrc-x1500gs-b_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.12", + "matchCriteriaId": "C34B5CB1-4483-49B0-B281-1F61045785C7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:wrc-x1500gs-b:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F2B13224-1E88-4415-8B8E-979D00BD68F2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:wrc-x1500gsa-b_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.12", + "matchCriteriaId": "82A4CAE8-0C68-4881-92F3-6BFFD72A58CA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:wrc-x1500gsa-b:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D198866F-7CB3-4EA0-86EA-345CF65E116F" + } + ] + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/jp/JVN06672778/", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.elecom.co.jp/news/security/20240730-01/", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40884.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40884.json index 913dff1d827..88da73657eb 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40884.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40884.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40884", "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2024-08-22T16:15:08.797", - "lastModified": "2024-08-22T16:15:08.797", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mattermost versions 9.5.x <= 9.5.7, 9.10.x <= 9.10.0 fail to properly enforce permissions which allows a team admin user without \"Add Team Members\" permission to disable the invite URL." + }, + { + "lang": "es", + "value": "Las versiones 9.5.x <= 9.5.7, 9.10.x <= 9.10.0 de Mattermost no aplican correctamente los permisos, lo que permite a un usuario administrador del equipo sin el permiso \"Agregar miembros del equipo\" deshabilitar la URL de invitaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40886.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40886.json index b8ef0bf207e..d22a1f58519 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40886.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40886.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40886", "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2024-08-22T07:15:04.183", - "lastModified": "2024-08-22T12:48:02.790", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-23T16:09:31.887", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "responsibledisclosure@mattermost.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + }, { "source": "responsibledisclosure@mattermost.com", "type": "Secondary", @@ -51,10 +81,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.5.0", + "versionEndExcluding": "9.5.8", + "matchCriteriaId": "7FEEA8D7-745A-49FF-8B01-CA0D1D820D48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.8.0", + "versionEndExcluding": "9.8.3", + "matchCriteriaId": "9B9B4EAB-A618-4823-BECD-0BFD3D76A9D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.9.0", + "versionEndExcluding": "9.9.2", + "matchCriteriaId": "A445A478-E185-49DF-8CDC-F42BBF8577D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.10.0", + "versionEndExcluding": "9.10.1", + "matchCriteriaId": "0CA40F21-914D-4891-A578-02E6F35FE249" + } + ] + } + ] + } + ], "references": [ { "url": "https://mattermost.com/security-updates", - "source": "responsibledisclosure@mattermost.com" + "source": "responsibledisclosure@mattermost.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41150.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41150.json index 117ff62d252..a779fb56224 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41150.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41150.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41150", "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", "published": "2024-08-23T15:15:16.120", - "lastModified": "2024-08-23T15:15:16.120", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41304.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41304.json index 9b6effe7d82..d7615b7e214 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41304.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41304.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41304", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-30T18:15:05.817", - "lastModified": "2024-07-31T12:57:02.300", + "lastModified": "2024-08-23T16:35:06.883", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Una vulnerabilidad de carga de archivos arbitrarios en la funci\u00f3n uploadFileAction() de WonderCMS v3.4.3 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de un archivo SVG manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/patrickdeanramos/WonderCMS-version-3.4.3-SVG-Stored-Cross-Site-Scripting", diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41674.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41674.json index ac0bbd38271..809c23cb36c 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41674.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41674.json @@ -2,17 +2,41 @@ "id": "CVE-2024-41674", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-21T15:15:08.770", - "lastModified": "2024-08-21T16:06:23.153", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-23T17:06:58.063", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CKAN is an open-source data management system for powering data hubs and data portals. If there were connection issues with the Solr server, the internal Solr URL (potentially including credentials) could be leaked to package_search calls as part of the returned error message. This has been patched in CKAN 2.10.5 and 2.11.0." + }, + { + "lang": "es", + "value": "CKAN es un sistema de gesti\u00f3n de datos de c\u00f3digo abierto para impulsar centros y portales de datos. Si hubo problemas de conexi\u00f3n con el servidor Solr, la URL interna de Solr (que potencialmente incluye las credenciales) podr\u00eda filtrarse a llamadas package_search como parte del mensaje de error devuelto. Esto ha sido parcheado en CKAN 2.10.5 y 2.11.0." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-209" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -47,14 +81,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:okfn:ckan:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0", + "versionEndExcluding": "2.10.5", + "matchCriteriaId": "E92554C7-B668-4F24-9781-5E5F2A284989" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ckan/ckan/commit/f6b032cd7082d784938165bbd113557639002ca7", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/ckan/ckan/security/advisories/GHSA-2rqw-cfhc-35fh", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41675.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41675.json index 1e2e566d831..b5465524cd7 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41675.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41675.json @@ -2,17 +2,41 @@ "id": "CVE-2024-41675", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-21T15:15:08.963", - "lastModified": "2024-08-21T16:06:23.153", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-23T17:07:28.247", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CKAN is an open-source data management system for powering data hubs and data portals. The Datatables view plugin did not properly escape record data coming from the DataStore, leading to a potential XSS vector. Sites running CKAN >= 2.7.0 with the datatables_view plugin activated. This is a plugin included in CKAN core, that not activated by default but it is widely used to preview tabular data. This vulnerability has been fixed in CKAN 2.10.5 and 2.11.0." + }, + { + "lang": "es", + "value": "CKAN es un sistema de gesti\u00f3n de datos de c\u00f3digo abierto para impulsar centros y portales de datos. El complemento de vista Datatables no escap\u00f3 correctamente de los datos de registro provenientes del DataStore, lo que gener\u00f3 un posible vector XSS. Sitios que ejecutan CKAN >= 2.7.0 con el complemento datatables_view activado. Este es un complemento incluido en el n\u00facleo de CKAN, que no est\u00e1 activado de forma predeterminada pero se usa ampliamente para obtener una vista previa de datos tabulares. Esta vulnerabilidad se ha solucionado en CKAN 2.10.5 y 2.11.0." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -47,18 +81,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:okfn:ckan:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.7.0", + "versionEndExcluding": "2.10.5", + "matchCriteriaId": "A70EB437-0147-41E9-B781-D0F52995B0C4" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ckan/ckan/commit/9e89ce8220ab1445e0bd85a67994a51d9d3d2688", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/ckan/ckan/commit/d7dfe8c427b1c63c75d788a609f3b7d7620a25a1", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/ckan/ckan/security/advisories/GHSA-r3jc-vhf4-6v32", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41841.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41841.json new file mode 100644 index 00000000000..49fa7b2dbce --- /dev/null +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41841.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-41841", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-08-23T17:15:06.847", + "lastModified": "2024-08-23T17:15:06.847", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Experience Manager versions 6.5.20 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41842.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41842.json new file mode 100644 index 00000000000..37505591053 --- /dev/null +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41842.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-41842", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-08-23T17:15:07.100", + "lastModified": "2024-08-23T17:15:07.100", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41843.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41843.json new file mode 100644 index 00000000000..0956cfc4efd --- /dev/null +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41843.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-41843", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-08-23T17:15:07.320", + "lastModified": "2024-08-23T17:15:07.320", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41844.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41844.json new file mode 100644 index 00000000000..5c87b051dd3 --- /dev/null +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41844.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-41844", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-08-23T17:15:07.550", + "lastModified": "2024-08-23T17:15:07.550", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41845.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41845.json new file mode 100644 index 00000000000..629d2ecfc1d --- /dev/null +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41845.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-41845", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-08-23T17:15:07.803", + "lastModified": "2024-08-23T17:15:07.803", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41846.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41846.json new file mode 100644 index 00000000000..c9a2e0272c0 --- /dev/null +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41846.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-41846", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-08-23T17:15:08.033", + "lastModified": "2024-08-23T17:15:08.033", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41847.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41847.json new file mode 100644 index 00000000000..aa036e35a7e --- /dev/null +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41847.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-41847", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-08-23T17:15:08.240", + "lastModified": "2024-08-23T17:15:08.240", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Experience Manager versions 6.5.20 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41848.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41848.json new file mode 100644 index 00000000000..3e54d0da355 --- /dev/null +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41848.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-41848", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-08-23T17:15:08.447", + "lastModified": "2024-08-23T17:15:08.447", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Experience Manager versions 6.5.20 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41849.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41849.json new file mode 100644 index 00000000000..9ad819fc9c8 --- /dev/null +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41849.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-41849", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-08-23T17:15:08.697", + "lastModified": "2024-08-23T17:15:08.697", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Experience Manager versions 6.5.20 and earlier are affected by an Improper Input Validation vulnerability that could lead to a security feature bypass. An low-privileged attacker could leverage this vulnerability to slightly affect the integrity of the page. Exploitation of this issue requires user interaction and scope is changed." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41875.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41875.json new file mode 100644 index 00000000000..e205af8fa19 --- /dev/null +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41875.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-41875", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-08-23T17:15:08.927", + "lastModified": "2024-08-23T17:15:08.927", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41876.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41876.json new file mode 100644 index 00000000000..b14db9bd132 --- /dev/null +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41876.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-41876", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-08-23T17:15:09.137", + "lastModified": "2024-08-23T17:15:09.137", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Experience Manager versions 6.5.20 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41877.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41877.json new file mode 100644 index 00000000000..1a8ddbbd9ea --- /dev/null +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41877.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-41877", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-08-23T17:15:09.370", + "lastModified": "2024-08-23T17:15:09.370", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41878.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41878.json new file mode 100644 index 00000000000..990b63f4f0c --- /dev/null +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41878.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-41878", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-08-23T17:15:09.610", + "lastModified": "2024-08-23T17:15:09.610", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Experience Manager versions 6.5.19 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to inject and execute arbitrary JavaScript code within the context of the user's browser session. Exploitation of this issue requires user interaction, such as convincing a victim to click on a malicious link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41937.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41937.json index c22bb53d91f..b1b0bb1643a 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41937.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41937.json @@ -2,16 +2,43 @@ "id": "CVE-2024-41937", "sourceIdentifier": "security@apache.org", "published": "2024-08-21T16:15:08.107", - "lastModified": "2024-08-21T17:25:08.560", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-23T16:21:21.893", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Airflow, versions before 2.10.0, have a vulnerability that allows the developer of a malicious provider to execute a cross-site scripting attack when clicking on a provider documentation link. This would require the provider to be installed on the web server and the\u00a0user to click the provider link.\nUsers should upgrade to 2.10.0 or later, which fixes this vulnerability." + }, + { + "lang": "es", + "value": "Apache Airflow, versiones anteriores a la 2.10.0, tienen una vulnerabilidad que permite al desarrollador de un proveedor malicioso ejecutar un ataque de cross-site scripting al hacer clic en un enlace de documentaci\u00f3n del proveedor. Esto requerir\u00eda que el proveedor est\u00e9 instalado en el servidor web y que el usuario haga clic en el enlace del proveedor. Los usuarios deben actualizar a 2.10.0 o posterior, lo que soluciona esta vulnerabilidad." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", @@ -24,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.10.0", + "matchCriteriaId": "3762E1D0-9E6E-44EB-82A7-620638F6F9AD" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/apache/airflow/pull/40933", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Patch" + ] }, { "url": "https://lists.apache.org/thread/lwlmgg6hqfmkpvw5py4w53hxyl37jl6d", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42040.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42040.json index b39cc1394b5..68ca4422c56 100644 --- a/CVE-2024/CVE-2024-420xx/CVE-2024-42040.json +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42040.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42040", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-23T15:15:16.323", - "lastModified": "2024-08-23T15:15:16.323", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-423xx/CVE-2024-42364.json b/CVE-2024/CVE-2024-423xx/CVE-2024-42364.json new file mode 100644 index 00000000000..3079e549b21 --- /dev/null +++ b/CVE-2024/CVE-2024-423xx/CVE-2024-42364.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-42364", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-23T16:15:06.510", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Homepage is a highly customizable homepage with Docker and service API integrations. The default setup of homepage 0.9.1 is vulnerable to DNS rebinding. Homepage is setup without certificate and authentication by default, leaving it to vulnerable to DNS rebinding. In this attack, an attacker will ask a user to visit his/her website. The attacker website will then change the DNS records of their domain from their IP address to the internal IP address of the homepage instance. To tell which IP addresses are valid, we can rebind a subdomain to each IP address we want to check, and see if there is a response. Once potential candidates have been found, the attacker can launch the attack by reading the response of the webserver after the IP address has changed. When the attacker domain is fetched, the response will be from the homepage instance, not the attacker website, because the IP address has been changed. Due to a lack of authentication, a user\u2019s private information such as API keys (fixed after first report) and other private information can then be extracted by the attacker website." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-350" + } + ] + } + ], + "references": [ + { + "url": "https://securitylab.github.com/advisories/GHSL-2024-096_homepage/", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42411.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42411.json index fb2b7bbcdff..d8073ec2268 100644 --- a/CVE-2024/CVE-2024-424xx/CVE-2024-42411.json +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42411.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42411", "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2024-08-22T07:15:04.397", - "lastModified": "2024-08-22T12:48:02.790", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-23T16:04:26.227", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "responsibledisclosure@mattermost.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + }, { "source": "responsibledisclosure@mattermost.com", "type": "Secondary", @@ -51,10 +81,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.5.0", + "versionEndExcluding": "9.5.8", + "matchCriteriaId": "7FEEA8D7-745A-49FF-8B01-CA0D1D820D48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.8.0", + "versionEndExcluding": "9.8.3", + "matchCriteriaId": "9B9B4EAB-A618-4823-BECD-0BFD3D76A9D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.9.0", + "versionEndExcluding": "9.9.2", + "matchCriteriaId": "A445A478-E185-49DF-8CDC-F42BBF8577D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.10.0", + "versionEndExcluding": "9.10.1", + "matchCriteriaId": "0CA40F21-914D-4891-A578-02E6F35FE249" + } + ] + } + ] + } + ], "references": [ { "url": "https://mattermost.com/security-updates", - "source": "responsibledisclosure@mattermost.com" + "source": "responsibledisclosure@mattermost.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42418.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42418.json index 4697fe8a186..28dca7cbea3 100644 --- a/CVE-2024/CVE-2024-424xx/CVE-2024-42418.json +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42418.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42418", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-08-22T20:15:09.470", - "lastModified": "2024-08-22T20:15:09.470", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Avtec Outpost uses a default cryptographic key that can be used to decrypt sensitive information." + }, + { + "lang": "es", + "value": "Avtec Outpost utiliza una clave criptogr\u00e1fica predeterminada que se puede utilizar para descifrar informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42490.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42490.json index ab7da1cbe82..bce867ae0d5 100644 --- a/CVE-2024/CVE-2024-424xx/CVE-2024-42490.json +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42490.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42490", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-22T16:15:09.117", - "lastModified": "2024-08-22T16:15:09.117", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "authentik is an open-source Identity Provider. Several API endpoints can be accessed by users without correct authentication/authorization. The main API endpoints affected by this are /api/v3/crypto/certificatekeypairs//view_certificate/, /api/v3/crypto/certificatekeypairs//view_private_key/, and /api/v3/.../used_by/. Note that all of the affected API endpoints require the knowledge of the ID of an object, which especially for certificates is not accessible to an unprivileged user. Additionally the IDs for most objects are UUIDv4, meaning they are not easily guessable/enumerable. authentik 2024.4.4, 2024.6.4 and 2024.8.0 fix this issue." + }, + { + "lang": "es", + "value": "authentik es un proveedor de identidades de c\u00f3digo abierto. Los usuarios pueden acceder a varios endpoints de API sin la autenticaci\u00f3n/autorizaci\u00f3n correcta. Los principales endpoints de API afectados por esto son /api/v3/crypto/certificatekeypairs//view_certificate/, /api/v3/crypto/certificatekeypairs//view_private_key/ y /api/v3/.../ used_by/. Tenga en cuenta que todos los endpoints de API afectados requieren el conocimiento del ID de un objeto, que, especialmente en el caso de los certificados, no es accesible para un usuario sin privilegios. Adem\u00e1s, los ID de la mayor\u00eda de los objetos son UUIDv4, lo que significa que no son f\u00e1ciles de adivinar ni enumerar. authentik 2024.4.4, 2024.6.4 y 2024.8.0 solucionan este problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42497.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42497.json index 223c4c35334..1fce3577786 100644 --- a/CVE-2024/CVE-2024-424xx/CVE-2024-42497.json +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42497.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42497", "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2024-08-22T16:15:09.330", - "lastModified": "2024-08-22T16:15:09.330", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mattermost versions 9.9.x <= 9.9.1, 9.5.x <= 9.5.7, 9.10.x <= 9.10.0, 9.8.x <= 9.8.2 fail to properly enforce permissions which allows a user with systems manager role with read-only access to teams to perform write operations on teams." + }, + { + "lang": "es", + "value": "Las versiones de Mattermost 9.9.x <= 9.9.1, 9.5.x <= 9.5.7, 9.10.x <= 9.10.0, 9.8.x <= 9.8.2 no aplican correctamente los permisos que permiten a un usuario con funci\u00f3n de administrador de sistemas con acceso de solo lectura a los equipos para realizar operaciones de escritura en los equipos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42523.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42523.json new file mode 100644 index 00000000000..b9e7b880c8b --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42523.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-42523", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-23T16:15:06.730", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "publiccms V4.0.202302.e and before is vulnerable to Any File Upload via publiccms/admin/cmsTemplate/saveMetaData" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/ilikeoyt/3dbbca2679c2551eaaeaea9c83acf1a1", + "source": "cve@mitre.org" + }, + { + "url": "https://gitee.com/sanluan/PublicCMS/issues/IADVDM", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42531.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42531.json new file mode 100644 index 00000000000..29d337e9430 --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42531.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-42531", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-23T17:15:09.833", + "lastModified": "2024-08-23T17:15:09.833", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Ezviz Internet PT Camera CS-CV246 D15655150 allows an unauthenticated host to access its live video stream by crafting a set of RTSP packets with a specific set of URLs that can be used to redirect the camera feed." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://ezviz.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Anonymous120386/Anonymous", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42599.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42599.json index 4bb0e352fec..3e89056db02 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42599.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42599.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42599", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T20:15:09.730", - "lastModified": "2024-08-22T20:15:09.730", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SeaCMS 13.0 has a remote code execution vulnerability. The reason for this vulnerability is that although admin_files.php imposes restrictions on edited files, attackers can still bypass these restrictions and write code, allowing authenticated attackers to exploit the vulnerability to execute arbitrary commands and gain system privileges." + }, + { + "lang": "es", + "value": "SeaCMS 13.0 tiene una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo. La raz\u00f3n de esta vulnerabilidad es que, aunque admin_files.php impone restricciones a los archivos editados, los atacantes a\u00fan pueden eludir estas restricciones y escribir c\u00f3digo, lo que permite a los atacantes autenticados explotar la vulnerabilidad para ejecutar comandos arbitrarios y obtener privilegios del sistema." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42636.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42636.json new file mode 100644 index 00000000000..064f5ac7e65 --- /dev/null +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42636.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42636", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-23T16:15:06.787", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "DedeCMS V5.7.115 has a command execution vulnerability via file_manage_view.php?fmdo=newfile&activepath." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/iami233/cve/issues/1", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42756.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42756.json new file mode 100644 index 00000000000..451a7ac028c --- /dev/null +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42756.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-42756", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-23T16:15:06.840", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in Netgear DGN1000WW v.1.1.00.45 allows a remote attacker to execute arbitrary code via the Diagnostics page" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Nop3z/CVE/blob/main/Netgear/Netgear%20DGN1000%20RCE/Netgear%20DGN1000%20RCE.md", + "source": "cve@mitre.org" + }, + { + "url": "https://www.netgear.com/about/security/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42761.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42761.json index 4bf560429c8..39f24d30c0f 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42761.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42761.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42761", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T21:15:17.193", - "lastModified": "2024-08-23T15:35:09.650", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42762.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42762.json index 74b4558b9c3..ba4192c3ecf 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42762.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42762.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42762", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T21:15:17.293", - "lastModified": "2024-08-23T14:35:04.597", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42763.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42763.json index fe9b13c6082..77754cf66b0 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42763.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42763.json @@ -2,16 +2,55 @@ "id": "CVE-2024-42763", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T21:15:17.380", - "lastModified": "2024-08-22T21:15:17.380", - "vulnStatus": "Received", + "lastModified": "2024-08-23T17:35:06.477", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Reflected Cross Site Scripting (XSS) vulnerability was found in the \"/schedule.php\" page of the Kashipara Bus Ticket Reservation System v1.0, which allows remote attackers to execute arbitrary code via the \"bookingdate\" parameter." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de Cross Site Scripting (XSS) Reflejado en la p\u00e1gina \"/schedule.php\" del Kashipara Bus Ticket Reservation System v1.0, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro \"bookingdate\"." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Bus%20Ticket%20Reservation%20System%20v1.0/Reflected%20XSS%20-%20Book%20Ticket.pdf", diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42764.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42764.json index f6026b7c97d..ec4d8b43e0d 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42764.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42764.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42764", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-23T15:15:16.397", - "lastModified": "2024-08-23T15:35:10.780", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42765.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42765.json index 0de562dac53..01161dce6dc 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42765.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42765.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42765", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-23T15:15:16.447", - "lastModified": "2024-08-23T15:35:11.753", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42766.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42766.json index 1a19da15f98..9c06844d415 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42766.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42766.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42766", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-23T15:15:16.497", - "lastModified": "2024-08-23T15:15:16.497", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42767.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42767.json index 2121d399b58..cc87dec5f70 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42767.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42767.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42767", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T18:15:10.280", - "lastModified": "2024-08-22T19:35:36.800", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Kashipara Hotel Management System v1.0 is vulnerable to Unrestricted File Upload RCE via /admin/add_room_controller.php." + }, + { + "lang": "es", + "value": "Kashipara Hotel Management System v1.0 es vulnerable a la carga de archivos sin restricciones RCE a trav\u00e9s de /admin/add_room_controller.php." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42768.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42768.json index b3e4a544755..66f8b34d350 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42768.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42768.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42768", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T17:15:05.693", - "lastModified": "2024-08-22T18:35:16.727", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Cross-Site Request Forgery (CSRF) vulnerability was found in Kashipara Hotel Management System v1.0 via /admin/delete_room.php." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de cross-site request forgery (CSRF) en Kashipara Hotel Management System v1.0 a trav\u00e9s de /admin/delete_room.php." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42769.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42769.json index cdc8419b096..5d626523fe3 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42769.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42769.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42769", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T16:15:09.553", - "lastModified": "2024-08-22T19:35:37.830", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Reflected Cross Site Scripting (XSS) vulnerability was found in \"/core/signup_user.php \" of Kashipara Hotel Management System v1.0, which allows remote attackers to execute arbitrary code via \"user_fname\" and \"user_lname\" parameters." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de Cross Site Scripting (XSS) Reflejado en \"/core/signup_user.php\" de Kashipara Hotel Management System v1.0, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de los par\u00e1metros \"user_fname\" y \"user_lname\"." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42770.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42770.json index 7f8af918cff..a55dd7c5742 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42770.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42770.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42770", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T16:15:09.640", - "lastModified": "2024-08-22T16:35:07.240", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Stored Cross Site Scripting (XSS) vulnerability was found in \"/core/signup_user.php\" of Kashipara Hotel Management System v1.0, which allows remote attackers to execute arbitrary code via the \"user_email\" parameter." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de Cross Site Scripting (XSS) Almacenado en \"/core/signup_user.php\" de Kashipara Hotel Management System v1.0, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro \"user_email\"." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42771.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42771.json index 286f3c19f96..e4e227d7ba0 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42771.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42771.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42771", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T16:15:09.730", - "lastModified": "2024-08-22T20:35:19.220", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Stored Cross Site Scripting (XSS) vulnerability was found in \" /admin/edit_room_controller.php\" of the Kashipara Hotel Management System v1.0, which allows remote attackers to execute arbitrary code via \"room_name\" parameter." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de Cross Site Scripting (XSS) Almacenado en \" /admin/edit_room_controller.php\" de Kashipara Hotel Management System v1.0, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro \"room_name\"." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42772.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42772.json index a46397317dd..fbcd1ed818e 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42772.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42772.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42772", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T17:15:06.070", - "lastModified": "2024-08-22T19:35:38.793", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Incorrect Access Control vulnerability was found in /admin/rooms.php in Kashipara Hotel Management System v1.0, which allows an unauthenticated attacker to view valid hotel room entries in administrator section." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de control de acceso incorrecto en /admin/rooms.php en Kashipara Hotel Management System v1.0, que permite a un atacante no autenticado ver entradas v\u00e1lidas de habitaciones de hotel en la secci\u00f3n de administrador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42773.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42773.json index 5b793906db6..de5270ce5ed 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42773.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42773.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42773", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T18:15:10.367", - "lastModified": "2024-08-22T18:15:10.367", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Incorrect Access Control vulnerability was found in /admin/edit_room_controller.php in Kashipara Hotel Management System v1.0, which allows an unauthenticated attacker to edit the valid hotel room entries in the administrator section." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de control de acceso incorrecto en /admin/edit_room_controller.php en Kashipara Hotel Management System v1.0, que permite a un atacante no autenticado editar las entradas v\u00e1lidas de las habitaciones del hotel en la secci\u00f3n del administrador." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42774.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42774.json index 5bb76656ce5..14626b88e38 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42774.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42774.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42774", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T17:15:06.350", - "lastModified": "2024-08-22T20:35:20.297", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Incorrect Access Control vulnerability was found in /admin/delete_room.php in Kashipara Hotel Management System v1.0, which allows an unauthenticated attacker to delete valid hotel room entries in the administrator section." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de control de acceso incorrecto en /admin/delete_room.php en Kashipara Hotel Management System v1.0, que permite a un atacante no autenticado eliminar entradas v\u00e1lidas de habitaciones de hotel en la secci\u00f3n de administrador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42775.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42775.json index 779f9ece9b3..c5bf0312198 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42775.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42775.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42775", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T17:15:06.580", - "lastModified": "2024-08-22T20:35:21.223", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Incorrect Access Control vulnerability was found in /admin/add_room_controller.php in Kashipara Hotel Management System v1.0, which allows an unauthenticated attacker to add the valid hotel room entries in the administrator section via the direct URL access." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de control de acceso incorrecto en /admin/add_room_controller.php en Kashipara Hotel Management System v1.0, que permite a un atacante no autenticado agregar entradas v\u00e1lidas de habitaciones de hotel en la secci\u00f3n de administrador a trav\u00e9s del acceso URL directo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42776.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42776.json index d65d7e3e45d..9d3e674d689 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42776.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42776.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42776", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T17:15:06.807", - "lastModified": "2024-08-22T20:35:22.323", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Kashipara Hotel Management System v1.0 is vulnerable to Incorrect Access Control via /admin/users.php." + }, + { + "lang": "es", + "value": "Kashipara Hotel Management System v1.0 es vulnerable a un control de acceso incorrecto a trav\u00e9s de /admin/users.php." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42777.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42777.json index 241e344f3b2..6f42056d61f 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42777.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42777.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42777", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-21T18:15:09.930", - "lastModified": "2024-08-22T12:48:02.790", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-23T16:09:28.690", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lopalopa:music_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B9E63270-AF05-41C1-8464-61ECA2425ABA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Unrestricted%20File%20Upload%20-%20SignUp.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42779.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42779.json index 8faaab1a03e..31db5306ca1 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42779.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42779.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42779", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-21T18:15:10.073", - "lastModified": "2024-08-22T14:35:10.640", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-23T16:09:23.920", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lopalopa:music_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B9E63270-AF05-41C1-8464-61ECA2425ABA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Unrestricted%20File%20Upload%20-%20Add%20New%20Music%20List.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.kashipara.com/project/php/12978/music-management-system-in-php-php-project-source-code", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42780.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42780.json index 01a2209682f..8c8a5d1f6b3 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42780.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42780.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42780", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-21T18:15:10.150", - "lastModified": "2024-08-22T19:35:39.710", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-23T16:10:40.947", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lopalopa:music_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B9E63270-AF05-41C1-8464-61ECA2425ABA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Unrestricted%20File%20Upload%20-%20Add%20New%20Genre.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.kashipara.com/project/php/12978/music-management-system-in-php-php-project-source-code", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42781.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42781.json index ebfb4827314..88ae8a3ae15 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42781.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42781.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42781", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-21T18:15:10.227", - "lastModified": "2024-08-22T14:35:11.393", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-23T16:15:43.970", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lopalopa:music_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B9E63270-AF05-41C1-8464-61ECA2425ABA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/SQL%20Injection%20-%20Login.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.kashipara.com/project/php/12978/music-management-system-in-php-php-project-source-code", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42782.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42782.json index 2d4f99a8871..cf6c407c942 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42782.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42782.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42782", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-21T18:15:10.303", - "lastModified": "2024-08-22T15:35:10.447", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-23T16:16:03.363", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lopalopa:music_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B9E63270-AF05-41C1-8464-61ECA2425ABA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/SQL%20Injection%20-%20Find%20Music.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.kashipara.com/project/php/12978/music-management-system-in-php-php-project-source-code", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42915.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42915.json index 4b4e71aabd3..fc0a7f94e9b 100644 --- a/CVE-2024/CVE-2024-429xx/CVE-2024-42915.json +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42915.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42915", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-23T15:15:16.550", - "lastModified": "2024-08-23T15:15:16.550", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42918.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42918.json new file mode 100644 index 00000000000..4f07064f22e --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42918.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-42918", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-23T17:15:09.897", + "lastModified": "2024-08-23T17:15:09.897", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "itsourcecode Online Accreditation Management System contains a Cross Site Scripting vulnerability, which allows an attacker to execute arbitrary code via a crafted payload to the SCHOOLNAME, EMAILADDRES, CONTACTNO, COMPANYNAME and COMPANYCONTACTNO parameters in controller.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/n00bS3cLe4rner/CVE-s/blob/main/CVE-2024-42918.md", + "source": "cve@mitre.org" + }, + { + "url": "https://packetstormsecurity.com", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4210.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4210.json index f317320de6e..26fc3104257 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4210.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4210.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4210", "sourceIdentifier": "cve@gitlab.com", "published": "2024-08-08T10:15:09.040", - "lastModified": "2024-08-08T13:04:18.753", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-23T16:56:07.537", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -51,14 +81,74 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "12.6.0", + "versionEndExcluding": "17.0.6", + "matchCriteriaId": "41442EAB-760D-4621-8FCD-CC1E5E177589" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "12.6.0", + "versionEndExcluding": "17.0.6", + "matchCriteriaId": "2A30CCB8-5728-42E8-8A5E-A326E37293D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "17.1.0", + "versionEndExcluding": "17.1.4", + "matchCriteriaId": "6CA14692-9997-4A11-8B3D-29199A3498D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.1.0", + "versionEndExcluding": "17.1.4", + "matchCriteriaId": "39754D78-BBE0-41D9-B2AB-5402B32C8ECF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "17.2.0", + "versionEndExcluding": "17.2.2", + "matchCriteriaId": "153C136B-FF14-43EC-AE67-68273DF7D9ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.2.0", + "versionEndExcluding": "17.2.2", + "matchCriteriaId": "2BE7EFA9-D9B4-4E7E-81B2-597D3DC5756E" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/458245", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://hackerone.com/reports/2431562", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43031.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43031.json new file mode 100644 index 00000000000..8c66f9b147e --- /dev/null +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43031.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-43031", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-23T16:15:06.890", + "lastModified": "2024-08-23T17:35:07.447", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "autMan v2.9.6 was discovered to contain an access control issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + }, + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "http://autman.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Nop3z/CVE/blob/main/dlink/DI-8100/Dlink-di8100-dbsrv_asp-overflow.md", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/hdbjlizhe/fanli", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43032.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43032.json new file mode 100644 index 00000000000..167ed639003 --- /dev/null +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43032.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-43032", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-23T16:15:06.953", + "lastModified": "2024-08-23T17:35:08.333", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "autMan v2.9.6 allows attackers to bypass authentication via a crafted web request." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Nop3z/CVE/blob/main/dlink/DI-8100/Dlink-di8100-dbsrv_asp-overflow.md", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/hdbjlizhe/fanli/releases/tag/2.9.6", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43105.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43105.json index 8d29f1215a1..2756f210870 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43105.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43105.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43105", "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2024-08-23T08:15:04.063", - "lastModified": "2024-08-23T08:15:04.063", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mattermost Plugin Channel Export versions <=1.0.0 fail to restrict concurrent runs of the /export command which allows a user to consume excessive resource by running the /export command multiple times at once." + }, + { + "lang": "es", + "value": "Las versiones de exportaci\u00f3n del canal de complementos de Mattermost <= 1.0.0 no restringen las ejecuciones simult\u00e1neas del comando /export, lo que permite a un usuario consumir recursos excesivos al ejecutar el comando /export varias veces a la vez." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43371.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43371.json index c8656c1daca..198d988093d 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43371.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43371.json @@ -2,17 +2,41 @@ "id": "CVE-2024-43371", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-21T15:15:09.190", - "lastModified": "2024-08-21T16:06:23.153", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-23T16:20:10.060", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CKAN is an open-source data management system for powering data hubs and data portals. There are a number of CKAN plugins, including XLoader, DataPusher, Resource proxy and ckanext-archiver, that work by downloading the contents of local or remote files in order to perform some actions with their contents (e.g. pushing to the DataStore, streaming contents or saving a local copy). All of them use the resource URL, and there are currently no checks to limit what URLs can be requested. This means that a malicious (or unaware) user can create a resource with a URL pointing to a place where they should not have access in order for one of the previous tools to retrieve it (known as a Server Side Request Forgery). Users wanting to protect against these kinds of attacks can use one or a combination of the following approaches: (1) Use a separate HTTP proxy like Squid that can be used to allow / disallow IPs, domains etc as needed, and make CKAN extensions aware of this setting via the ckan.download_proxy config option. (2) Implement custom firewall rules to prevent access to restricted resources. (3) Use custom validators on the resource url field to block/allow certain domains or IPs. All latest versions of the plugins listed above support the ckan.download_proxy settings. Support for this setting in the Resource Proxy plugin was included in CKAN 2.10.5 and 2.11.0." + }, + { + "lang": "es", + "value": "CKAN es un sistema de gesti\u00f3n de datos de c\u00f3digo abierto para impulsar centros y portales de datos. Hay una serie de complementos de CKAN, incluidos XLoader, DataPusher, Resource proxy y ckanext-archiver, que funcionan descargando el contenido de archivos locales o remotos para realizar algunas acciones con sus contenidos (por ejemplo, enviar al DataStore, transmitir contenidos o guardando una copia local). Todos ellos utilizan la URL del recurso y actualmente no existen comprobaciones para limitar las URL que se pueden solicitar. Esto significa que un usuario malintencionado (o inconsciente) puede crear un recurso con una URL que apunte a un lugar al que no deber\u00eda tener acceso para que una de las herramientas anteriores lo recupere (conocido como Server Side Request Forgery). Los usuarios que deseen protegerse contra este tipo de ataques pueden usar uno o una combinaci\u00f3n de los siguientes enfoques: (1) Usar un proxy HTTP separado como Squid que se puede usar para permitir o no permitir IP, dominios, etc., seg\u00fan sea necesario, y alertar a las extensiones CKAN. de esta configuraci\u00f3n a trav\u00e9s de la opci\u00f3n de configuraci\u00f3n ckan.download_proxy. (2) Implementar reglas de firewall personalizadas para evitar el acceso a recursos restringidos. (3) Utilice validadores personalizados en el campo URL del recurso para bloquear/permitir ciertos dominios o IP. Todas las versiones m\u00e1s recientes de los complementos enumerados anteriormente admiten la configuraci\u00f3n de ckan.download_proxy. La compatibilidad con esta configuraci\u00f3n en el complemento Resource Proxy se incluy\u00f3 en CKAN 2.10.5 y 2.11.0." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -47,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:okfn:ckan:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.10.5", + "matchCriteriaId": "5E427B7D-6C9B-4766-8FF7-A0DF9B5EEAE8" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ckan/ckan/security/advisories/GHSA-g9ph-j5vj-f8wm", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43398.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43398.json index 705897032a1..919475d35e0 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43398.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43398.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43398", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-22T15:15:16.440", - "lastModified": "2024-08-22T15:15:16.440", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "REXML is an XML toolkit for Ruby. The REXML gem before 3.3.6 has a DoS vulnerability when it parses an XML that has many deep elements that have same local name attributes. If you need to parse untrusted XMLs with tree parser API like REXML::Document.new, you may be impacted to this vulnerability. If you use other parser APIs such as stream parser API and SAX2 parser API, this vulnerability is not affected. The REXML gem 3.3.6 or later include the patch to fix the vulnerability." + }, + { + "lang": "es", + "value": "REXML es un conjunto de herramientas XML para Ruby. La gema REXML anterior a 3.3.6 tiene una vulnerabilidad DoS cuando analiza un XML que tiene muchos elementos profundos que tienen los mismos atributos de nombre local. Si necesita analizar archivos XML que no son de confianza con una API de analizador de \u00e1rboles como REXML::Document.new, es posible que se vea afectado por esta vulnerabilidad. Si utiliza otras API de analizador, como la API de analizador de flujo y la API de analizador SAX2, esta vulnerabilidad no se ve afectada. La gema REXML 3.3.6 o posterior incluye el parche para corregir la vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43407.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43407.json index 0b2f5bbaf6c..92130d8969e 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43407.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43407.json @@ -2,17 +2,41 @@ "id": "CVE-2024-43407", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-21T15:15:09.397", - "lastModified": "2024-08-21T16:06:23.153", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-23T16:20:42.363", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. A potential vulnerability has been discovered in CKEditor 4 Code Snippet GeSHi plugin. The vulnerability allowed a reflected XSS attack by exploiting a flaw in the GeSHi syntax highlighter library hosted by the victim. The GeSHi library was included as a vendor dependency in CKEditor 4 source files. In a specific scenario, an attacker could craft a malicious script that could be executed by sending a request to the GeSHi library hosted on a PHP web server. The GeSHi library is no longer actively maintained. Due to the lack of ongoing support and updates, potential security vulnerabilities have been identified with its continued use. To mitigate these risks and enhance the overall security of the CKEditor 4, we have decided to completely remove the GeSHi library as a dependency. This change aims to maintain a secure environment and reduce the risk of any security incidents related to outdated or unsupported software. The fix is be available in version 4.25.0-lts." + }, + { + "lang": "es", + "value": "CKEditor4 es un editor HTML de c\u00f3digo abierto de lo que ves es lo que obtienes. Se ha descubierto una vulnerabilidad potencial en el complemento GeSHi del fragmento de c\u00f3digo de CKEditor 4. La vulnerabilidad permiti\u00f3 un ataque XSS reflejado al explotar una falla en la librer\u00eda de resaltado de sintaxis GeSHi alojada por la v\u00edctima. La librer\u00eda GeSHi se incluy\u00f3 como dependencia del proveedor en los archivos fuente de CKEditor 4. En un escenario espec\u00edfico, un atacante podr\u00eda crear un script malicioso que podr\u00eda ejecutarse enviando una solicitud a la librer\u00eda GeSHi alojada en un servidor web PHP. La librer\u00eda GeSHi ya no se mantiene activamente. Debido a la falta de soporte y actualizaciones continuas, se han identificado posibles vulnerabilidades de seguridad con su uso continuo. Para mitigar estos riesgos y mejorar la seguridad general de CKEditor 4, hemos decidido eliminar por completo la librer\u00eda GeSHi como dependencia. Este cambio tiene como objetivo mantener un entorno seguro y reducir el riesgo de incidentes de seguridad relacionados con software desactualizado o sin soporte. La soluci\u00f3n estar\u00e1 disponible en la versi\u00f3n 4.25.0-lts." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -47,18 +81,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ckeditor:ckeditor:*:*:*:*:lts:*:*:*", + "versionStartIncluding": "4.0", + "versionEndExcluding": "4.25.0", + "matchCriteriaId": "C4754AC3-7A7F-4BFA-BD12-066EE0C46FC3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ckeditor/ckeditor4/commit/71072c9f7f263329841bd38e7e5309074c82ef94", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/ckeditor/ckeditor4/commit/951e7d75fcbcaa2590b0719fb0bb0dd0539ca6fa", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-7r32-vfj5-c2jv", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43477.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43477.json index e8a12032e43..0f422ed439d 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43477.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43477.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43477", "sourceIdentifier": "secure@microsoft.com", "published": "2024-08-23T02:15:07.440", - "lastModified": "2024-08-23T02:15:07.440", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "secure@microsoft.com", @@ -16,6 +16,10 @@ { "lang": "en", "value": "Improper access control in Decentralized Identity Services allows an unathenticated attacker to disable Verifiable ID's on another tenant." + }, + { + "lang": "es", + "value": "Un control de acceso inadecuado en Decentralized Identity Services permite que un atacante no autenticado deshabilite las identificaciones verificables en otro inquilino." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43780.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43780.json index 415e4df275a..e590c09a639 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43780.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43780.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43780", "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2024-08-22T16:15:09.897", - "lastModified": "2024-08-22T16:15:09.897", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mattermost versions 9.9.x <= 9.9.1, 9.5.x <= 9.5.7, 9.10.0, 9.8.x <= 9.8.2 fail to enforce permissions which allows a guest user with read access to upload files to a channel." + }, + { + "lang": "es", + "value": "Las versiones de Mattermost 9.9.x <= 9.9.1, 9.5.x <= 9.5.7, 9.10.0, 9.8.x <= 9.8.2 no aplican los permisos que permiten a un usuario invitado con acceso de lectura cargar archivos en un canal." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43782.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43782.json index b9ff0db6337..707877a1118 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43782.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43782.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43782", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-23T15:15:16.600", - "lastModified": "2024-08-23T15:15:16.600", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43785.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43785.json index 095264b8de7..6f303c31e13 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43785.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43785.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43785", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-22T15:15:16.670", - "lastModified": "2024-08-22T15:15:16.670", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "gitoxide An idiomatic, lean, fast & safe pure Rust implementation of Git. gitoxide-core, which provides most underlying functionality of the gix and ein commands, does not neutralize newlines, backspaces, or control characters\u2014including those that form ANSI escape sequences\u2014that appear in a repository's paths, author and committer names, commit messages, or other metadata. Such text may be written as part of the output of a command, as well as appearing in error messages when an operation fails. This sometimes allows an untrusted repository to misrepresent its contents and to alter or concoct error messages." + }, + { + "lang": "es", + "value": "gitoxide Una implementaci\u00f3n Rust pura, idiom\u00e1tica, sencilla, r\u00e1pida y segura de Git. gitoxide-core, que proporciona la mayor parte de la funcionalidad subyacente de los comandos gix y ein, no neutraliza las nuevas l\u00edneas, los retrocesos ni los caracteres de control (incluidos aquellos que forman secuencias de escape ANSI) que aparecen en las rutas de un repositorio, los nombres de los autores y confirmadores, los mensajes de confirmaci\u00f3n, u otros metadatos. Dicho texto puede escribirse como parte del resultado de un comando, adem\u00e1s de aparecer en mensajes de error cuando falla una operaci\u00f3n. Esto a veces permite que un repositorio que no es de confianza tergiverse su contenido y altere o invente mensajes de error." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43787.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43787.json index 0a99e9612aa..5605bd11eaa 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43787.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43787.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43787", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-22T15:15:16.857", - "lastModified": "2024-08-22T15:15:16.857", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Hono is a Web application framework that provides support for any JavaScript runtime. Hono CSRF middleware can be bypassed using crafted Content-Type header. MIME types are case insensitive, but isRequestedByFormElementRe only matches lower-case. As a result, attacker can bypass csrf middleware using upper-case form-like MIME type. This vulnerability is fixed in 4.5.8." + }, + { + "lang": "es", + "value": "Hono es un framework de aplicaci\u00f3n web que brinda soporte para cualquier tiempo de ejecuci\u00f3n de JavaScript. El middleware Hono CSRF se puede omitir utilizando un encabezado Content-Type manipulado. Los tipos MIME no distinguen entre may\u00fasculas y min\u00fasculas, pero isRequestedByFormElementRe solo coincide con min\u00fasculas. Como resultado, el atacante puede eludir el middleware csrf utilizando el tipo MIME similar a una forma en may\u00fasculas. Esta vulnerabilidad se solucion\u00f3 en 4.5.8." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43790.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43790.json index cf00dfacd75..5a88966773c 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43790.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43790.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43790", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-22T22:15:05.317", - "lastModified": "2024-08-22T22:15:05.317", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vim is an open source command line text editor. When performing a search and displaying the search-count message is disabled (:set shm+=S), the search pattern is displayed at the bottom of the screen in a buffer (msgbuf). When right-left mode (:set rl) is enabled, the search pattern is reversed. This happens by allocating a new buffer. If the search pattern contains some ASCII NUL characters, the buffer allocated will be smaller than the original allocated buffer (because for allocating the reversed buffer, the strlen() function is called, which only counts until it notices an ASCII NUL byte ) and thus the original length indicator is wrong. This causes an overflow when accessing characters inside the msgbuf by the previously (now wrong) length of the msgbuf. The issue has been fixed as of Vim patch v9.1.0689." + }, + { + "lang": "es", + "value": "Vim es un editor de texto de l\u00ednea de comandos de c\u00f3digo abierto. Cuando se realiza una b\u00fasqueda y se deshabilita la visualizaci\u00f3n del mensaje de recuento de b\u00fasqueda (:set shm+=S), el patr\u00f3n de b\u00fasqueda se muestra en la parte inferior de la pantalla en un b\u00fafer (msgbuf). Cuando el modo derecha-izquierda (:set rl) est\u00e1 habilitado, el patr\u00f3n de b\u00fasqueda se invierte. Esto sucede asignando un nuevo b\u00fafer. Si el patr\u00f3n de b\u00fasqueda contiene algunos caracteres ASCII NUL, el b\u00fafer asignado ser\u00e1 m\u00e1s peque\u00f1o que el b\u00fafer asignado original (porque para asignar el b\u00fafer invertido, se llama a la funci\u00f3n strlen(), que solo cuenta hasta que detecta un byte ASCII NUL) y por lo tanto el indicador de longitud original es incorrecto. Esto provoca un desbordamiento al acceder a caracteres dentro del msgbuf por la longitud anterior (ahora incorrecta) del msgbuf. El problema se solucion\u00f3 a partir del parche Vim v9.1.0689." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43791.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43791.json index 9bb238f7320..4d243db91ec 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43791.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43791.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43791", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-23T15:15:16.830", - "lastModified": "2024-08-23T15:15:16.830", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43794.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43794.json new file mode 100644 index 00000000000..d9e808be85f --- /dev/null +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43794.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-43794", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-23T17:15:10.007", + "lastModified": "2024-08-23T17:15:10.007", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "OpenSearch Dashboards Security Plugin adds a configuration management UI for the OpenSearch Security features to OpenSearch Dashboards. Improper validation of the nextUrl parameter can lead to external redirect on login to OpenSearch-Dashboards for specially crafted parameters. A patch is available in 1.3.19 and 2.16.0 for this issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/opensearch-project/security-dashboards-plugin/commit/fc4f6a27c0c80881be9e8ed6b9259a25c3fa0e13", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/opensearch-project/security-dashboards-plugin/security/advisories/GHSA-3fph-6cqp-5mfc", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43883.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43883.json index 883d1155f8f..dd19ced0c47 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43883.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43883.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43883", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-23T13:15:03.873", - "lastModified": "2024-08-23T13:15:03.873", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-443xx/CVE-2024-44381.json b/CVE-2024/CVE-2024-443xx/CVE-2024-44381.json new file mode 100644 index 00000000000..0dad890d3ba --- /dev/null +++ b/CVE-2024/CVE-2024-443xx/CVE-2024-44381.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-44381", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-23T16:15:07.013", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "D-Link DI_8004W 16.07.26A1 contains a command execution vulnerability in jhttpd msp_info_htm function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/GroundCTL2MajorTom/pocs/blob/main/dlink_DI8004W.md", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-443xx/CVE-2024-44382.json b/CVE-2024/CVE-2024-443xx/CVE-2024-44382.json new file mode 100644 index 00000000000..58113705e0a --- /dev/null +++ b/CVE-2024/CVE-2024-443xx/CVE-2024-44382.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-44382", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-23T16:15:07.070", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "D-Link DI_8004W 16.07.26A1 contains a command execution vulnerability in the jhttpd upgrade_filter_asp function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/GroundCTL2MajorTom/pocs/blob/main/dlink_DI8004W.md", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-443xx/CVE-2024-44386.json b/CVE-2024/CVE-2024-443xx/CVE-2024-44386.json new file mode 100644 index 00000000000..13abd4fcf60 --- /dev/null +++ b/CVE-2024/CVE-2024-443xx/CVE-2024-44386.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-44386", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-23T16:15:07.120", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1206 V1.2.0.8(8155)_EN contains a Buffer Overflow vulnerability via the function fromSetIpBind." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/GroundCTL2MajorTom/pocs/blob/main/tenda_FH1206_buffer_overflow2.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-443xx/CVE-2024-44387.json b/CVE-2024/CVE-2024-443xx/CVE-2024-44387.json new file mode 100644 index 00000000000..98c215337d4 --- /dev/null +++ b/CVE-2024/CVE-2024-443xx/CVE-2024-44387.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-44387", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-23T17:15:10.243", + "lastModified": "2024-08-23T17:35:09.583", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1206 V1.2.0.8(8155)_EN contains a Buffer Overflow vulnerability via the functino formWrlExtraGet." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/GroundCTL2MajorTom/pocs/blob/main/tenda_FH1206_buffer_overflow1.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-443xx/CVE-2024-44390.json b/CVE-2024/CVE-2024-443xx/CVE-2024-44390.json new file mode 100644 index 00000000000..4ca0d190971 --- /dev/null +++ b/CVE-2024/CVE-2024-443xx/CVE-2024-44390.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-44390", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-23T17:15:10.300", + "lastModified": "2024-08-23T17:35:10.580", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1206 V1.2.0.8(8155)_EN contains a Buffer Overflow vulnerability via the function formWrlsafeset." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/GroundCTL2MajorTom/pocs/blob/main/tenda_FH1206_buffer_overflow8.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45191.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45191.json index d74f150ed70..24e17ca3da8 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45191.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45191.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45191", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T16:15:10.120", - "lastModified": "2024-08-22T21:35:06.397", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "cve@mitre.org", @@ -16,6 +16,10 @@ { "lang": "en", "value": "An issue was discovered in Matrix libolm (aka Olm) through 3.2.16. The AES implementation is vulnerable to cache-timing attacks due to use of S-boxes. This is related to software that uses a lookup table for the SubWord step. NOTE: This vulnerability only affects products that are no longer supported by the maintainer." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Matrix libolm (tambi\u00e9n conocido como Olm) hasta la versi\u00f3n 3.2.16. La implementaci\u00f3n de AES es vulnerable a ataques de sincronizaci\u00f3n de cach\u00e9 debido al uso de S-boxes. Esto est\u00e1 relacionado con el software que utiliza una tabla de b\u00fasqueda para el paso SubWord. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45192.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45192.json index ab5f8f3e27e..e202aa7ddde 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45192.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45192.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45192", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T16:15:10.237", - "lastModified": "2024-08-22T19:35:40.953", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "cve@mitre.org", @@ -16,6 +16,10 @@ { "lang": "en", "value": "An issue was discovered in Matrix libolm (aka Olm) through 3.2.16. Cache-timing attacks can occur due to use of base64 when decoding group session keys. NOTE: This vulnerability only affects products that are no longer supported by the maintainer." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Matrix libolm (tambi\u00e9n conocido como Olm) hasta la versi\u00f3n 3.2.16. Los ataques de sincronizaci\u00f3n de cach\u00e9 pueden ocurrir debido al uso de base64 al decodificar claves de sesi\u00f3n grupal. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45193.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45193.json index b0b4214bde2..5964b064287 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45193.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45193.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45193", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T16:15:10.300", - "lastModified": "2024-08-22T16:15:10.300", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "cve@mitre.org", @@ -16,6 +16,10 @@ { "lang": "en", "value": "An issue was discovered in Matrix libolm (aka Olm) through 3.2.16. There is Ed25519 signature malleability due to lack of validation criteria (does not ensure that S < n). NOTE: This vulnerability only affects products that are no longer supported by the maintainer." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Matrix libolm (tambi\u00e9n conocido como Olm) hasta la versi\u00f3n 3.2.16. Existe maleabilidad de la firma Ed25519 debido a la falta de criterios de validaci\u00f3n (no asegura que S < n). NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45201.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45201.json index 23a5a76f4a1..a6913f7046a 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45201.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45201.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45201", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T20:15:10.063", - "lastModified": "2024-08-22T20:15:10.063", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in llama_index before 0.10.38. download/integration.py includes an exec call for import {cls_name}." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en llama_index antes del 0.10.38. download/integration.py incluye una llamada ejecutiva para importar {cls_name}." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4784.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4784.json index c6bb9412406..f052ae573f4 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4784.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4784.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4784", "sourceIdentifier": "cve@gitlab.com", "published": "2024-08-08T10:15:09.390", - "lastModified": "2024-08-08T13:04:18.753", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-23T16:59:30.430", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -51,14 +81,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "16.7.0", + "versionEndExcluding": "17.0.6", + "matchCriteriaId": "88D2145D-48F3-40F6-8E31-80DED84A4AA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.1.0", + "versionEndExcluding": "17.1.4", + "matchCriteriaId": "39754D78-BBE0-41D9-B2AB-5402B32C8ECF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.2.0", + "versionEndExcluding": "17.2.2", + "matchCriteriaId": "2BE7EFA9-D9B4-4E7E-81B2-597D3DC5756E" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/461248", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://hackerone.com/reports/2486223", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5056.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5056.json index dcca2b02d0a..b3339307c5a 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5056.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5056.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5056", "sourceIdentifier": "cybersecurity@se.com", "published": "2024-06-12T12:15:10.233", - "lastModified": "2024-06-13T18:36:09.010", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-23T16:04:14.643", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + }, { "source": "cybersecurity@se.com", "type": "Secondary", @@ -51,10 +71,96 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:schneider-electric:modicon_m340_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "05CBA9AD-ECB7-453F-8551-DD176FDE8043" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:schneider-electric:modicon_m340:*:*:*:*:*:*:*:*", + "matchCriteriaId": "874705E0-7A67-4B32-A282-87602D4328AC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:schneider-electric:bmxnoe0100_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6E00817A-E140-418F-93AB-A9B516F090A7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:schneider-electric:bmxnoe0100:*:*:*:*:*:*:*:*", + "matchCriteriaId": "58CD02DB-E0D4-4F78-9743-F455A9E47358" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:schneider-electric:bmxnoe0110_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F2F33A35-37ED-41AD-94A2-34FEA8E7259B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:schneider-electric:bmxnoe0110:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3CCF4860-AE12-4750-8F4A-39D9580A2276" + } + ] + } + ] + } + ], "references": [ { "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-163-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-163-01.pdf", - "source": "cybersecurity@se.com" + "source": "cybersecurity@se.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5466.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5466.json index aa744cc266c..799f26cb106 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5466.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5466.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5466", "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", "published": "2024-08-23T14:15:11.073", - "lastModified": "2024-08-23T14:15:11.073", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5467.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5467.json index 01b03075678..ba86e66fb53 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5467.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5467.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5467", "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", "published": "2024-08-23T14:15:11.270", - "lastModified": "2024-08-23T14:15:11.270", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5490.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5490.json index 6a5cbd32d58..6ef52cd5d70 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5490.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5490.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5490", "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", "published": "2024-08-23T14:15:11.467", - "lastModified": "2024-08-23T14:15:11.467", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5502.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5502.json index 8586425c971..2d5a444e08d 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5502.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5502.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5502", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-23T09:15:07.853", - "lastModified": "2024-08-23T09:15:07.853", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5556.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5556.json index 253fab5c6b2..0981b0047b6 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5556.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5556.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5556", "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", "published": "2024-08-23T14:15:11.697", - "lastModified": "2024-08-23T14:15:11.697", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5559.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5559.json index 8fc9e3879ce..6b15bef0612 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5559.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5559.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5559", "sourceIdentifier": "cybersecurity@se.com", "published": "2024-06-12T18:15:12.493", - "lastModified": "2024-06-13T18:36:09.010", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-23T16:35:30.827", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + }, { "source": "cybersecurity@se.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-327" + } + ] + }, { "source": "cybersecurity@se.com", "type": "Secondary", @@ -51,10 +81,43 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:schneider-electric:powerlogic_p5_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "01.500.104", + "matchCriteriaId": "67DFDA6A-737D-4BB0-9A35-5F14CA09E6DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:schneider-electric:powerlogic_p5:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3EEFB9C4-CB42-46AD-83BE-1344AADC62F5" + } + ] + } + ] + } + ], "references": [ { "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-163-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-163-02.pdf", - "source": "cybersecurity@se.com" + "source": "cybersecurity@se.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5586.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5586.json index 04f8ceebf4d..6bc681842db 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5586.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5586.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5586", "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", "published": "2024-08-23T14:15:11.893", - "lastModified": "2024-08-23T14:15:11.893", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5762.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5762.json index 5b2e1ef3c03..0c52d317522 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5762.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5762.json @@ -2,16 +2,42 @@ "id": "CVE-2024-5762", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-08-21T17:15:08.810", - "lastModified": "2024-08-21T17:24:59.627", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-23T16:43:19.497", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zen Cart findPluginAdminPage Local File Inclusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Zen Cart. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the findPluginAdminPage function. The issue results from the lack of proper validation of user-supplied data prior to passing it to a PHP include function. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the service account. Was ZDI-CAN-21408." + }, + { + "lang": "es", + "value": "Zen Cart findPluginAdminPage Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de inclusi\u00f3n de archivos locales. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de Zen Cart. No se requiere autenticaci\u00f3n para aprovechar esta vulnerabilidad. La falla espec\u00edfica existe dentro de la funci\u00f3n findPluginAdminPage. El problema se debe a la falta de validaci\u00f3n adecuada de los datos proporcionados por el usuario antes de pasarlos a una funci\u00f3n de inclusi\u00f3n de PHP. Un atacante puede aprovechar esto junto con otras vulnerabilidades para ejecutar c\u00f3digo arbitrario en el contexto de la cuenta de servicio. Era ZDI-CAN-21408." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -37,8 +63,18 @@ }, "weaknesses": [ { - "source": "zdi-disclosures@trendmicro.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-829" + } + ] + }, + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -47,14 +83,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zen-cart:zen_cart:1.5.8a:*:*:*:*:*:*:*", + "matchCriteriaId": "6578B396-8063-4E7E-8B7E-F8A7A495D92F" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.zen-cart.com/release/whatsnew_2.0.0", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-883/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5896.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5896.json index ba591a5b3c7..7b174dd564b 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5896.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5896.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5896", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-12T16:15:12.813", - "lastModified": "2024-06-13T18:36:09.010", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-23T16:27:08.800", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:employee_and_visitor_gate_pass_logging_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E79823D1-656B-47ED-B919-817CF98B423B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Hefei-Coffee/cve/blob/main/sql12.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.268140", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.268140", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.354925", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5897.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5897.json index 9a01632c864..5225a2e4c81 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5897.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5897.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5897", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-12T16:15:13.100", - "lastModified": "2024-06-13T18:36:09.010", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-23T16:27:37.923", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:employee_and_visitor_gate_pass_logging_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E79823D1-656B-47ED-B919-817CF98B423B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Hefei-Coffee/cve/blob/main/xss.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.268141", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.268141", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.354923", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5898.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5898.json index 61461c34038..cdd0ef52374 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5898.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5898.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5898", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-12T17:15:52.577", - "lastModified": "2024-06-13T18:36:09.010", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-23T16:29:35.973", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:angeljudesuarez:payroll_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "20FC2EF9-5A2B-4173-8F3B-34B209DA6A10" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/guiyxli/cve/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.268142", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.268142", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.354926", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5928.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5928.json index 720b5521234..b53281e8a95 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5928.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5928.json @@ -2,16 +2,42 @@ "id": "CVE-2024-5928", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-08-21T17:15:09.003", - "lastModified": "2024-08-21T17:24:59.627", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-23T16:47:34.100", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "VIPRE Advanced Security PMAgent Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of VIPRE Advanced Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the Patch Management Agent. By creating a symbolic link, an attacker can abuse the agent to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22315." + }, + { + "lang": "es", + "value": "Vulnerabilidad de escalada de privilegios local VIPRE Advanced Security PMAgent Link Following. Esta vulnerabilidad permite a atacantes locales escalar privilegios en las instalaciones afectadas de VIPRE Advanced Security. Un atacante primero debe obtener la capacidad de ejecutar c\u00f3digo con pocos privilegios en el sistema de destino para poder aprovechar esta vulnerabilidad. La falla espec\u00edfica existe dentro del Agente de administraci\u00f3n de parches. Al crear un enlace simb\u00f3lico, un atacante puede abusar del agente para eliminar un archivo. Un atacante puede aprovechar esta vulnerabilidad para escalar privilegios y ejecutar c\u00f3digo arbitrario en el contexto de SYSTEM. Era ZDI-CAN-22315." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -47,14 +73,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vipre:advanced_security:12.0.1.214:*:*:*:*:*:*:*", + "matchCriteriaId": "9084015C-B278-48A4-BC84-F5ACCD57E585" + } + ] + } + ] + } + ], "references": [ { "url": "https://success.vipre.com/en_US/home-windows-release-notes/home-windows-release-notes-20240227", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-817/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5929.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5929.json index 7fd3a7c077b..147cfe35080 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5929.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5929.json @@ -2,16 +2,42 @@ "id": "CVE-2024-5929", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-08-21T17:15:09.237", - "lastModified": "2024-08-21T17:24:59.627", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-23T16:48:00.907", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "VIPRE Advanced Security PMAgent Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of VIPRE Advanced Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the Patch Management Agent. The issue results from loading a file from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22316." + }, + { + "lang": "es", + "value": "Vulnerabilidad de escalada de privilegios locales del elemento de ruta de b\u00fasqueda no controlada en VIPRE Advanced Security PMAgent. Esta vulnerabilidad permite a atacantes locales escalar privilegios en las instalaciones afectadas de VIPRE Advanced Security. Un atacante primero debe obtener la capacidad de ejecutar c\u00f3digo con pocos privilegios en el sistema de destino para poder aprovechar esta vulnerabilidad. La falla espec\u00edfica existe dentro del Agente de administraci\u00f3n de parches. El problema se debe a la carga de un archivo desde una ubicaci\u00f3n no segura. Un atacante puede aprovechar esta vulnerabilidad para escalar privilegios y ejecutar c\u00f3digo arbitrario en el contexto de SYSTEM. Era ZDI-CAN-22316." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -47,14 +73,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vipre:advanced_security:12.0.1.214:*:*:*:*:*:*:*", + "matchCriteriaId": "9084015C-B278-48A4-BC84-F5ACCD57E585" + } + ] + } + ] + } + ], "references": [ { "url": "https://success.vipre.com/en_US/home-windows-release-notes/home-windows-release-notes-20240227", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-818/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5930.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5930.json index cc25d58fe3a..de15b425598 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5930.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5930.json @@ -2,16 +2,42 @@ "id": "CVE-2024-5930", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-08-21T17:15:09.443", - "lastModified": "2024-08-21T17:24:59.627", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-23T16:48:15.103", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "VIPRE Advanced Security Incorrect Permission Assignment Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of VIPRE Advanced Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the Anti Malware Service. The issue results from incorrect permissions on a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22345." + }, + { + "lang": "es", + "value": "Vulnerabilidad de escalada de privilegios locales en VIPRE Advanced Security Incorrect Permission Assignment. Esta vulnerabilidad permite a atacantes locales escalar privilegios en las instalaciones afectadas de VIPRE Advanced Security. Un atacante primero debe obtener la capacidad de ejecutar c\u00f3digo con pocos privilegios en el sistema de destino para poder explotar esta vulnerabilidad. La falla espec\u00edfica existe dentro del Servicio Anti Malware. El problema se debe a permisos incorrectos en un archivo. Un atacante puede aprovechar esta vulnerabilidad para escalar privilegios y ejecutar c\u00f3digo arbitrario en el contexto de SYSTEM. Era ZDI-CAN-22345." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -47,14 +73,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vipre:advanced_security:12.0.1.214:*:*:*:*:*:*:*", + "matchCriteriaId": "9084015C-B278-48A4-BC84-F5ACCD57E585" + } + ] + } + ] + } + ], "references": [ { "url": "https://success.vipre.com/en_US/home-windows-release-notes/home-windows-release-notes-20240227", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-819/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6109.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6109.json index 51bb83a836f..c7bbcd12250 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6109.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6109.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6109", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-18T12:15:12.987", - "lastModified": "2024-06-20T12:44:01.637", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-23T16:37:19.230", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/PHJ-doit/cve/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.268855", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.268855", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.358590", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6114.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6114.json index 7e383340b88..da0bf7037f5 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6114.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6114.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6114", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-18T13:15:52.897", - "lastModified": "2024-06-20T12:44:01.637", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-23T16:38:30.133", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:monbela_tourist_inn_online_reservation_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E689E6B3-30E9-405A-A3AB-A5597F84A664" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/wangyuan-ui/CVE/issues/4", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.268866", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.268866", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.358995", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6141.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6141.json index 757e760d7a4..9ff8da86de2 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6141.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6141.json @@ -2,16 +2,42 @@ "id": "CVE-2024-6141", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-08-21T17:15:09.660", - "lastModified": "2024-08-21T17:24:59.627", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-23T16:53:48.270", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windscribe Directory Traversal Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Windscribe. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the Windscribe Service. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-23441." + }, + { + "lang": "es", + "value": "Vulnerabilidad de escalada de privilegios locales Directory Traversal de Windscribe. Esta vulnerabilidad permite a los atacantes locales escalar privilegios en las instalaciones afectadas de Windscribe. Un atacante primero debe obtener la capacidad de ejecutar c\u00f3digo con pocos privilegios en el sistema de destino para poder explotar esta vulnerabilidad. La falla espec\u00edfica existe dentro del Servicio Windscribe. El problema se debe a la falta de validaci\u00f3n adecuada de una ruta proporcionada por el usuario antes de usarla en operaciones de archivos. Un atacante puede aprovechar esta vulnerabilidad para escalar privilegios y ejecutar c\u00f3digo arbitrario en el contexto de SYSTEM. Era ZDI-CAN-23441." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -47,14 +73,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:windscribe:windscribe:2.9.9:*:*:*:*:windows:*:*", + "matchCriteriaId": "EF61BFDB-107A-4710-8CEE-1B5ABE987FF9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Windscribe/Desktop-App/blob/90a5cc3c1f50f6545f83969c2ace6b4ac2c91c4e/client/common/changelog.txt#L23", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-820/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6218.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6218.json index 98f3a6ae533..7558d416e4d 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6218.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6218.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6218", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-21T02:15:13.090", - "lastModified": "2024-06-21T15:15:16.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-23T16:39:49.487", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adrianmercurio:vehicle_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "01988E3D-47DA-45BA-97FC-E6EDD88177DB" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/HryspaHodor/CVE/issues/7", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.269282", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.269282", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.360697", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6308.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6308.json index 16ad8daf83f..02cd90477e2 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6308.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6308.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6308", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-25T17:15:11.180", - "lastModified": "2024-06-25T21:16:02.087", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-23T16:44:39.510", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:clivedelacruz:simple_online_hotel_reservation_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BEE3B1B1-BA46-42EB-BF9A-B1A7D52EF741" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/L1OudFd8cl09/CVE/blob/main/25_06_2024_a.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.269620", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.269620", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.363955", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6329.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6329.json index 0042dfdb6b0..af791c1cd4c 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6329.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6329.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6329", "sourceIdentifier": "cve@gitlab.com", "published": "2024-08-08T10:15:09.857", - "lastModified": "2024-08-08T13:04:18.753", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-23T17:01:34.227", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-116" + } + ] + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -51,14 +81,74 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "8.16.0", + "versionEndExcluding": "17.0.6", + "matchCriteriaId": "1B1A6D16-725F-4070-9C2A-C7105AEB8968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "8.16.0", + "versionEndExcluding": "17.0.6", + "matchCriteriaId": "5ADAB032-70C0-4121-9160-97700DA4F348" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "17.1.0", + "versionEndExcluding": "17.1.4", + "matchCriteriaId": "6CA14692-9997-4A11-8B3D-29199A3498D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.1.0", + "versionEndExcluding": "17.1.4", + "matchCriteriaId": "39754D78-BBE0-41D9-B2AB-5402B32C8ECF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "17.2.0", + "versionEndExcluding": "17.2.2", + "matchCriteriaId": "153C136B-FF14-43EC-AE67-68273DF7D9ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.2.0", + "versionEndExcluding": "17.2.2", + "matchCriteriaId": "2BE7EFA9-D9B4-4E7E-81B2-597D3DC5756E" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/468937", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://hackerone.com/reports/2542483", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6471.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6471.json index b8177a5ad50..0a0abe66826 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6471.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6471.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6471", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-03T14:15:06.490", - "lastModified": "2024-07-05T12:55:51.367", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-23T16:47:32.537", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:online_tours_\\&_travels_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "034678D5-42ED-4076-964F-D89620540E75" + } + ] + } + ] + } + ], "references": [ { "url": "https://blog.csdn.net/ENTICE1208/article/details/140141934", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.270279", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.270279", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.367953", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6502.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6502.json index c1ff20efd07..ec04f517a97 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6502.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6502.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6502", "sourceIdentifier": "cve@gitlab.com", "published": "2024-08-22T16:15:10.377", - "lastModified": "2024-08-22T16:15:10.377", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 8.2 prior to 17.1.6 starting from 17.2 prior to 17.2.4, and starting from 17.3 prior to 17.3.1, which allows an attacker to create a branch with the same name as a deleted tag." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en GitLab CE/EE que afecta a todas las versiones desde 8.2 anterior a 17.1.6, desde 17.2 anterior a 17.2.4 y desde 17.3 anterior a 17.3.1, lo que permite a un atacante crear una rama con la misma nombre como una etiqueta eliminada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6715.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6715.json index ced2f48ee60..c152de1e7d8 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6715.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6715.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6715", "sourceIdentifier": "contact@wpscan.com", "published": "2024-08-23T06:15:04.070", - "lastModified": "2024-08-23T06:15:04.070", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Ditty WordPress plugin before 3.1.46 re-introduced a previously fixed security issue (https://wpscan.com/vulnerability/80a9eb3a-2cb1-4844-9004-ba2554b2d46c/) in v3.1.39" + }, + { + "lang": "es", + "value": "El complemento Ditty WordPress anterior a la versi\u00f3n 3.1.46 reintrodujo un problema de seguridad previamente solucionado (https://wpscan.com/vulnerability/80a9eb3a-2cb1-4844-9004-ba2554b2d46c/) en v3.1.39" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6811.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6811.json index cd00fb5caf4..01c1282e6e6 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6811.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6811.json @@ -2,16 +2,42 @@ "id": "CVE-2024-6811", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-08-21T16:15:08.783", - "lastModified": "2024-08-21T17:25:08.560", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-23T16:27:10.317", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IrfanView WSQ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of WSQ files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24192." + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de escritura fuera de l\u00edmites en el an\u00e1lisis de archivos WSQ de IrfanView. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en instalaciones afectadas de IrfanView. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el an\u00e1lisis de archivos WSQ. El problema se debe a la falta de una validaci\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede provocar una escritura m\u00e1s all\u00e1 del final de un b\u00fafer asignado. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-24192." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -47,10 +73,36 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:irfanview:irfanview:4.67:*:*:*:*:*:x32:*", + "matchCriteriaId": "5A6F92E7-FD00-4E90-9E69-EEF0A7CD7EA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:irfanview:wsq:2024.02.16:*:*:*:*:irfanview:x64:*", + "matchCriteriaId": "B21788BE-9B9F-4F66-A5A8-246BD17E10FB" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-903/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6812.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6812.json index ba5af0910f2..cdfae035eb2 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6812.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6812.json @@ -2,16 +2,42 @@ "id": "CVE-2024-6812", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-08-21T16:15:08.970", - "lastModified": "2024-08-21T17:25:08.560", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-23T16:29:39.737", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IrfanView WSQ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of WSQ files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23273." + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de escritura fuera de los l\u00edmites en el an\u00e1lisis de archivos WSQ de IrfanView. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en instalaciones afectadas de IrfanView. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el an\u00e1lisis de archivos WSQ. El problema se debe a la falta de una validaci\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede provocar una escritura m\u00e1s all\u00e1 del final de un b\u00fafer asignado. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-23273." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -47,10 +73,36 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:irfanview:irfanview:4.67:*:*:*:*:*:x32:*", + "matchCriteriaId": "5A6F92E7-FD00-4E90-9E69-EEF0A7CD7EA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:irfanview:wsq:2024.02.16:*:*:*:*:irfanview:x64:*", + "matchCriteriaId": "B21788BE-9B9F-4F66-A5A8-246BD17E10FB" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-904/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7110.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7110.json index 3a63d065d78..b185001026e 100644 --- a/CVE-2024/CVE-2024-71xx/CVE-2024-7110.json +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7110.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7110", "sourceIdentifier": "cve@gitlab.com", "published": "2024-08-22T16:15:10.627", - "lastModified": "2024-08-22T16:15:10.627", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in GitLab EE affecting all versions starting 17.0 to 17.1.6, 17.2 prior to 17.2.4, and 17.3 prior to 17.3.1 allows an attacker to execute arbitrary command in a victim's pipeline through prompt injection." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en GitLab EE que afecta a todas las versiones desde 17.0 a 17.1.6, 17.2 anterior a 17.2.4 y 17.3 anterior a 17.3.1, y permite a un atacante ejecutar comandos arbitrarios en la canalizaci\u00f3n de una v\u00edctima mediante inyecci\u00f3n r\u00e1pida." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7258.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7258.json index dc662537e55..4651ee5a55c 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7258.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7258.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7258", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-23T05:15:15.437", - "lastModified": "2024-08-23T05:15:15.437", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WooCommerce Google Feed Manager plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'wppfm_removeFeedFile' function in all versions up to, and including, 2.8.0. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php)." + }, + { + "lang": "es", + "value": "El complemento WooCommerce Google Feed Manager para WordPress es vulnerable a la p\u00e9rdida no autorizada de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n 'wppfm_removeFeedFile' en todas las versiones hasta la 2.8.0 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel Colaborador y superior, eliminen archivos arbitrarios en el servidor, lo que puede llevar f\u00e1cilmente a la ejecuci\u00f3n remota de c\u00f3digo cuando se elimina el archivo correcto (como wp-config.php)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7327.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7327.json index b35f260a2b4..0a6f4ccfce7 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7327.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7327.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7327", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-31T22:15:02.520", - "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-23T16:41:50.290", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rockoa:xinhu:2.6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "1A295696-C0C9-4059-8E1B-A7197975FDB9" + } + ] + } + ] + } + ], "references": [ { "url": "https://vuldb.com/?ctiid.273250", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.273250", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.378320", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Technical Description", + "VDB Entry" + ] }, { "url": "https://wiki.shikangsi.com/post/share/789dad54-851b-4ec6-a1f6-11271e30db71", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Technical Description", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7329.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7329.json index 9544d665589..2d635bc54fa 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7329.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7329.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7329", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-31T23:15:14.063", - "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-23T16:34:06.267", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:youdiancms:youdiancms:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E7709BEE-0075-4197-A281-0DC6DEA27D8F" + } + ] + } + ] + } + ], "references": [ { "url": "https://vuldb.com/?ctiid.273252", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.273252", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.378324", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://wiki.shikangsi.com/post/share/30c24c77-42e6-4a0c-b60b-e02d09dc325b", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Technical Description", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7330.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7330.json index 363bc6e2dd5..4d9d09605af 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7330.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7330.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7330", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-01T00:15:02.480", - "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-23T16:12:05.500", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:youdiancms:youdiancms:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E7709BEE-0075-4197-A281-0DC6DEA27D8F" + } + ] + } + ] + } + ], "references": [ { "url": "https://vuldb.com/?ctiid.273253", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.273253", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.378325", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://wiki.shikangsi.com/post/share/c065b84c-f2ab-4679-9336-de7fb1ebba1f", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Technical Description", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7339.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7339.json index e379836e476..8543fd7621e 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7339.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7339.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7339", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-01T04:15:05.320", - "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-23T16:53:31.643", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -110,8 +130,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -120,22 +150,126 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tvt:dvr_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB471339-6C04-439B-BD9C-E24C9AAE8533" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tvt:td-2104ts-cl:*:*:*:*:*:*:*:*", + "matchCriteriaId": "041D05A2-AAC2-4C8C-BE37-2689A0660A68" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tvt:td-2108ts-hp:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FFDCC816-5F0C-4620-87CA-26FF282160DC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:provision-isr:dvr_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F5C3CC2-6720-43E7-BC54-FB3EDDD80C13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:provision-isr:sh-4050a5-5l\\(mm\\):*:*:*:*:*:*:*:*", + "matchCriteriaId": "885D1A58-9A4C-43A1-8174-46E65E4A6F1D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:artion-sec:dvr_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BBF72C99-0627-4A39-8875-76817D0771A5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:artion-sec:av108t:*:*:*:*:*:*:*:*", + "matchCriteriaId": "AF52CECB-EFFA-491A-BEE1-2C2649B393DD" + } + ] + } + ] + } + ], "references": [ { "url": "https://netsecfish.notion.site/Sensitive-Device-Information-Disclosure-in-TVT-DVR-fad1cce703d946969be5130bf3aaac0d?pvs=4", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.273262", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.273262", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.379373", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7427.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7427.json new file mode 100644 index 00000000000..0e77582bc36 --- /dev/null +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7427.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-7427", + "sourceIdentifier": "security@opentext.com", + "published": "2024-08-23T17:15:10.360", + "lastModified": "2024-08-23T17:15:10.360", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in OpenText\u2122 Network Node Manager i (NNMi) could allow Cross-Site Scripting (XSS).This issue affects Network Node Manager i (NNMi): 2022.11, 2023.05, 23.4, 24.2." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@opentext.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:A/V:C/RE:L/U:Red", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NEGLIGIBLE", + "automatable": "NO", + "recovery": "AUTOMATIC", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "LOW", + "providerUrgency": "RED", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@opentext.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://portal.microfocus.com/s/article/KM000033018?language=en_US", + "source": "security@opentext.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7428.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7428.json new file mode 100644 index 00000000000..1ec1e38b763 --- /dev/null +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7428.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-7428", + "sourceIdentifier": "security@opentext.com", + "published": "2024-08-23T17:15:10.500", + "lastModified": "2024-08-23T17:15:10.500", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in OpenText\u2122 Network Node Manager i (NNMi) allows URL Redirector Abuse.This issue affects Network Node Manager i (NNMi): 2022.11, 2023.05, 23.4, 24.2." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@opentext.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:A/V:C/RE:L/U:Red", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NEGLIGIBLE", + "automatable": "NO", + "recovery": "AUTOMATIC", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "LOW", + "providerUrgency": "RED", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@opentext.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "references": [ + { + "url": "https://portal.microfocus.com/s/article/KM000033015?language=en_US", + "source": "security@opentext.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7448.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7448.json index 14fb1cf8b4d..ac2553dd17b 100644 --- a/CVE-2024/CVE-2024-74xx/CVE-2024-7448.json +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7448.json @@ -2,16 +2,42 @@ "id": "CVE-2024-7448", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-08-21T17:15:09.860", - "lastModified": "2024-08-21T17:24:59.627", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-23T16:54:45.410", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Magnet Forensics AXIOM Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Magnet Forensics AXIOM. User interaction is required to exploit this vulnerability in that the target must acquire data from a malicious mobile device.\n\nThe specific flaw exists within the Android device image acquisition functionality. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-23964." + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de inyecci\u00f3n de comandos AXIOM de Magnet Forensics. Esta vulnerabilidad permite a atacantes adyacentes a la red ejecutar c\u00f3digo arbitrario en instalaciones afectadas de Magnet Forensics AXIOM. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe adquirir datos de un dispositivo m\u00f3vil malicioso. La falla espec\u00edfica existe en la funcionalidad de adquisici\u00f3n de im\u00e1genes del dispositivo Android. El problema se debe a la falta de validaci\u00f3n adecuada de una cadena proporcionada por el usuario antes de usarla para ejecutar una llamada al sistema. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del usuario actual. Era ZDI-CAN-23964." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -47,14 +73,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:magnetforensics:axiom:8.0.0.39753:*:*:*:*:*:*:*", + "matchCriteriaId": "0A973A89-56CD-41A3-9769-E56CFBA975AF" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.magnetforensics.com/docs/axiom/release_notes.html", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1129/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7559.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7559.json index 53f902ee83d..bc3068e0773 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7559.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7559.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7559", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-23T03:15:04.060", - "lastModified": "2024-08-23T03:15:04.060", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The File Manager Pro plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation and capability checks in the mk_file_folder_manager AJAX action in all versions up to, and including, 8.3.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible." + }, + { + "lang": "es", + "value": "El complemento File Manager Pro para WordPress es vulnerable a cargas de archivos arbitrarias debido a la falta de validaci\u00f3n del tipo de archivo y comprobaciones de capacidad en la acci\u00f3n mk_file_folder_manager AJAX en todas las versiones hasta la 8.3.7 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, carguen archivos arbitrarios en el servidor del sitio afectado, lo que puede hacer posible la ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7600.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7600.json index d860e16b29e..0c17b174e11 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7600.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7600.json @@ -2,16 +2,42 @@ "id": "CVE-2024-7600", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-08-21T16:15:09.570", - "lastModified": "2024-08-21T17:25:08.560", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-23T16:35:31.137", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Logsign Unified SecOps Platform Directory Traversal Arbitrary File Deletion Vulnerability. This vulnerability allows remote attackers to delete arbitrary files on affected installations of Logsign Unified SecOps Platform. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the HTTP API service, which listens on TCP port 443 by default. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to delete files in the context of root. Was ZDI-CAN-25025." + }, + { + "lang": "es", + "value": "Vulnerabilidad de eliminaci\u00f3n arbitraria de archivos Directory Traversal de la plataforma Logsign Unified SecOps. Esta vulnerabilidad permite a atacantes remotos eliminar archivos arbitrarios en las instalaciones afectadas de Logsign Unified SecOps Platform. Se requiere autenticaci\u00f3n para aprovechar esta vulnerabilidad. La falla espec\u00edfica existe dentro del servicio API HTTP, que escucha en el puerto TCP 443 de forma predeterminada. El problema se debe a la falta de validaci\u00f3n adecuada de una ruta proporcionada por el usuario antes de usarla en operaciones de archivos. Un atacante puede aprovechar esta vulnerabilidad para eliminar archivos en el contexto ra\u00edz. Era ZDI-CAN-25025." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -47,14 +73,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:logsign:unified_secops_platform:6.4.20:*:*:*:*:*:*:*", + "matchCriteriaId": "FA92C1EC-6EE6-4576-86D9-355086448B07" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.logsign.net/hc/en-us/articles/20617133769362-06-08-2024-Version-6-4-23-Release-Notes", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1103/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7601.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7601.json index d49363fd3fa..0162453afc7 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7601.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7601.json @@ -2,16 +2,42 @@ "id": "CVE-2024-7601", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-08-21T16:15:09.757", - "lastModified": "2024-08-21T17:25:08.560", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-23T16:35:52.383", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Logsign Unified SecOps Platform Directory data_export_delete_all Traversal Arbitrary File Deletion Vulnerability. This vulnerability allows remote attackers to delete arbitrary files on affected installations of Logsign Unified SecOps Platform. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the HTTP API service, which listens on TCP port 443 by default. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to delete files in the context of root. Was ZDI-CAN-25026." + }, + { + "lang": "es", + "value": "Logsign Unified SecOps Platform Directory data_export_delete_all Vulnerabilidad de eliminaci\u00f3n arbitraria de archivos transversales. Esta vulnerabilidad permite a atacantes remotos eliminar archivos arbitrarios en las instalaciones afectadas de Logsign Unified SecOps Platform. Se requiere autenticaci\u00f3n para aprovechar esta vulnerabilidad. La falla espec\u00edfica existe dentro del servicio API HTTP, que escucha en el puerto TCP 443 de forma predeterminada. El problema se debe a la falta de validaci\u00f3n adecuada de una ruta proporcionada por el usuario antes de usarla en operaciones de archivos. Un atacante puede aprovechar esta vulnerabilidad para eliminar archivos en el contexto ra\u00edz. Era ZDI-CAN-25026." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -47,14 +73,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:logsign:unified_secops_platform:6.4.20:*:*:*:*:*:*:*", + "matchCriteriaId": "FA92C1EC-6EE6-4576-86D9-355086448B07" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.logsign.net/hc/en-us/articles/20617133769362-06-08-2024-Version-6-4-23-Release-Notes", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1106/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7602.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7602.json index c7197215507..a69411e5efe 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7602.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7602.json @@ -2,16 +2,42 @@ "id": "CVE-2024-7602", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-08-21T16:15:09.940", - "lastModified": "2024-08-21T17:25:08.560", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-23T16:36:11.690", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Logsign Unified SecOps Platform Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Logsign Unified SecOps Platform. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the HTTP API service, which listens on TCP port 443 by default. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of root. Was ZDI-CAN-25027." + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n Directory Traversal de la plataforma Logsign Unified SecOps. Esta vulnerabilidad permite a atacantes remotos revelar informaci\u00f3n confidencial sobre las instalaciones afectadas de Logsign Unified SecOps Platform. Se requiere autenticaci\u00f3n para aprovechar esta vulnerabilidad. La falla espec\u00edfica existe dentro del servicio API HTTP, que escucha en el puerto TCP 443 de forma predeterminada. El problema se debe a la falta de validaci\u00f3n adecuada de una ruta proporcionada por el usuario antes de usarla en operaciones de archivos. Un atacante puede aprovechar esta vulnerabilidad para revelar informaci\u00f3n en el contexto de la ra\u00edz. Era ZDI-CAN-25027." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -47,14 +73,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:logsign:unified_secops_platform:6.4.20:*:*:*:*:*:*:*", + "matchCriteriaId": "FA92C1EC-6EE6-4576-86D9-355086448B07" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.logsign.net/hc/en-us/articles/20617133769362-06-08-2024-Version-6-4-23-Release-Notes", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1102/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7603.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7603.json index 426f91e9d63..946399ff90a 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7603.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7603.json @@ -2,16 +2,42 @@ "id": "CVE-2024-7603", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-08-21T16:15:10.123", - "lastModified": "2024-08-21T17:25:08.560", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-23T16:36:28.327", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Logsign Unified SecOps Platform Directory Traversal Arbitrary Directory Deletion Vulnerability. This vulnerability allows remote attackers to delete arbitrary directories on affected installations of Logsign Unified SecOps Platform. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the HTTP API service, which listens on TCP port 443 by default. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to delete directories in the context of root. Was ZDI-CAN-25028." + }, + { + "lang": "es", + "value": "Vulnerabilidad de eliminaci\u00f3n arbitraria de Directory Traversal de directorio de la plataforma Logsign Unified SecOps. Esta vulnerabilidad permite a atacantes remotos eliminar directorios arbitrarios en instalaciones afectadas de Logsign Unified SecOps Platform. Se requiere autenticaci\u00f3n para aprovechar esta vulnerabilidad. La falla espec\u00edfica existe dentro del servicio API HTTP, que escucha en el puerto TCP 443 de forma predeterminada. El problema se debe a la falta de validaci\u00f3n adecuada de una ruta proporcionada por el usuario antes de usarla en operaciones de archivos. Un atacante puede aprovechar esta vulnerabilidad para eliminar directorios en el contexto ra\u00edz. Era ZDI-CAN-25028." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -47,14 +73,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:logsign:unified_secops_platform:6.4.20:*:*:*:*:*:*:*", + "matchCriteriaId": "FA92C1EC-6EE6-4576-86D9-355086448B07" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.logsign.net/hc/en-us/articles/20617133769362-06-08-2024-Version-6-4-23-Release-Notes", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1105/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7604.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7604.json index a275d1b2daa..e9390e97110 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7604.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7604.json @@ -2,16 +2,42 @@ "id": "CVE-2024-7604", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-08-21T16:15:10.330", - "lastModified": "2024-08-21T17:24:59.627", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-23T16:37:09.107", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Logsign Unified SecOps Platform Incorrect Authorization Authentication Bypass Vulnerability. This vulnerability allows local attackers to bypass authentication on affected installations of Logsign Unified SecOps Platform. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the HTTP API service, which listens on TCP port 443 by default. The issue results from the lack of proper validation of the user's license expiration date. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-25029." + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n de autorizaci\u00f3n incorrecta de la plataforma Logsign Unified SecOps. Esta vulnerabilidad permite a los atacantes locales eludir la autenticaci\u00f3n en las instalaciones afectadas de Logsign Unified SecOps Platform. Se requiere autenticaci\u00f3n para aprovechar esta vulnerabilidad. La falla espec\u00edfica existe dentro del servicio API HTTP, que escucha en el puerto TCP 443 de forma predeterminada. El problema se debe a la falta de validaci\u00f3n adecuada de la fecha de vencimiento de la licencia del usuario. Un atacante puede aprovechar esta vulnerabilidad para eludir la autenticaci\u00f3n en el sistema. Era ZDI-CAN-25029." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -36,6 +62,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + }, { "source": "zdi-disclosures@trendmicro.com", "type": "Secondary", @@ -47,14 +83,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:logsign:unified_secops_platform:6.4.20:*:*:*:*:*:*:*", + "matchCriteriaId": "FA92C1EC-6EE6-4576-86D9-355086448B07" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.logsign.net/hc/en-us/articles/20617133769362-06-08-2024-Version-6-4-23-Release-Notes", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1104/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7634.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7634.json index 69915e0ded0..96075cbf1ef 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7634.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7634.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7634", "sourceIdentifier": "f5sirt@f5.com", "published": "2024-08-22T18:15:10.553", - "lastModified": "2024-08-22T18:15:10.553", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "NGINX Agent's \"config_dirs\" restriction feature allows a highly privileged attacker to gain the ability to write/overwrite files outside of the designated secure directory." + }, + { + "lang": "es", + "value": "La funci\u00f3n de restricci\u00f3n \"config_dirs\" del agente NGINX permite a un atacante con privilegios elevados obtener la capacidad de escribir/sobrescribir archivos fuera del directorio seguro designado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7795.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7795.json index 0c09a1c0e55..da31d1d6b05 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7795.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7795.json @@ -2,16 +2,42 @@ "id": "CVE-2024-7795", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-08-21T16:15:11.380", - "lastModified": "2024-08-21T17:24:59.627", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-23T16:39:47.510", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Autel MaxiCharger AC Elite Business C50 AppAuthenExchangeRandomNum Stack-Based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Autel MaxiCharger AC Elite Business C50 EV chargers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of the AppAuthenExchangeRandomNum BLE command. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-23384." + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de desbordamiento de b\u00fafer basado en pila de la aplicaci\u00f3n Autel MaxiCharger AC Elite Business C50. Esta vulnerabilidad permite a atacantes adyacentes a la red ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de los cargadores Autel MaxiCharger AC Elite Business C50 EV. No se requiere autenticaci\u00f3n para aprovechar esta vulnerabilidad. La falla espec\u00edfica existe en el manejo del comando BLE AppAuthenExchangeRandomNum. El problema se debe a la falta de una validaci\u00f3n adecuada de la longitud de los datos proporcionados por el usuario antes de copiarlos en un b\u00fafer basado en pila de longitud fija. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del dispositivo. Era ZDI-CAN-23384." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -37,8 +63,18 @@ }, "weaknesses": [ { - "source": "zdi-disclosures@trendmicro.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + }, + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -47,10 +83,44 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:autel:maxicharger_ac_elite_business_c50_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.36.00", + "matchCriteriaId": "1F631850-3879-43B3-A7CF-7E66954C3AA3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:autel:maxicharger_ac_elite_business_c50:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B2F9001-71B7-4B39-9114-FC54F4EAE9E7" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1154/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7885.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7885.json index dd9af4c6f49..9077c54d15f 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7885.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7885.json @@ -2,17 +2,41 @@ "id": "CVE-2024-7885", "sourceIdentifier": "secalert@redhat.com", "published": "2024-08-21T14:15:09.500", - "lastModified": "2024-08-21T16:06:23.153", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-23T17:05:24.343", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Undertow where the ProxyProtocolReadListener reuses the same StringBuilder instance across multiple requests. This issue occurs when the parseProxyProtocolV1 method processes multiple requests on the same HTTP connection. As a result, different requests may share the same StringBuilder instance, potentially leading to information leakage between requests or responses. In some cases, a value from a previous request or response may be erroneously reused, which could lead to unintended data exposure. This issue primarily results in errors and connection termination but creates a risk of data leakage in multi-request environments." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Undertow donde ProxyProtocolReadListener reutiliza la misma instancia de StringBuilder en m\u00faltiples solicitudes. Este problema ocurre cuando el m\u00e9todo parseProxyProtocolV1 procesa m\u00faltiples solicitudes en la misma conexi\u00f3n HTTP. Como resultado, diferentes solicitudes pueden compartir la misma instancia de StringBuilder, lo que podr\u00eda provocar una fuga de informaci\u00f3n entre solicitudes o respuestas. En algunos casos, un valor de una solicitud o respuesta anterior puede reutilizarse por error, lo que podr\u00eda provocar una exposici\u00f3n no deseada de los datos. Este problema produce principalmente errores y terminaci\u00f3n de la conexi\u00f3n, pero crea un riesgo de fuga de datos en entornos de solicitudes m\u00faltiples." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -37,8 +61,18 @@ }, "weaknesses": [ { - "source": "secalert@redhat.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secalert@redhat.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -47,14 +81,83 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:build_of_apache_camel_-_hawtio:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4B1DC0F4-BF84-4399-9487-DEF10CEC3D97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:build_of_apache_camel_for_spring_boot:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EDE67672-8894-448B-84B5-3CD3610A8117" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:build_of_keycloak:-:*:*:*:*:*:*:*", + "matchCriteriaId": "824BB506-D01A-4C88-AD4A-3C94A2409CD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:data_grid:8.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3311F2A9-C028-4765-BF79-BC370D15550C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B87C8AD3-8878-4546-86C2-BF411876648C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "72A54BDA-311C-413B-8E4D-388AD65A170A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:8.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0D8BC03A-4198-4488-946B-3F6B43962942" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B40CCE4F-EA2C-453D-BB76-6388767E5C6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "20A6B40D-F991-4712-8E30-5FE008505CB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9EFEC7CA-8DDA-48A6-A7B6-1F1D14792890" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2024-7885", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2305290", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7986.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7986.json index e1190340c6d..4c2fd509df8 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7986.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7986.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7986", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2024-08-23T12:15:03.920", - "lastModified": "2024-08-23T12:15:03.920", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8007.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8007.json index aa503529313..85199c70e25 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8007.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8007.json @@ -2,17 +2,41 @@ "id": "CVE-2024-8007", "sourceIdentifier": "secalert@redhat.com", "published": "2024-08-21T14:15:09.753", - "lastModified": "2024-08-21T16:06:23.153", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-23T17:06:04.643", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in the Red Hat OpenStack Platform (RHOSP) director. This vulnerability allows an attacker to deploy potentially compromised container images via disabling TLS certificate verification for registry mirrors, which could enable a man-in-the-middle (MITM) attack." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en el director de Red Hat OpenStack Platform (RHOSP). Esta vulnerabilidad permite a un atacante implementar im\u00e1genes de contenedores potencialmente comprometidas deshabilitando la verificaci\u00f3n de certificados TLS para espejos de registro, lo que podr\u00eda habilitar un ataque de intermediario (MITM)." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -47,14 +71,48 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*", + "matchCriteriaId": "DCC81071-B46D-4F5D-AC25-B4A4CCC20C73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*", + "matchCriteriaId": "4B3000D2-35DF-4A93-9FC0-1AD3AB8349B8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E315FC5C-FF19-43C9-A58A-CF2A5FF13824" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2024-8007", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2305975", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8041.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8041.json index 8c237d7d63f..4b533a1f3f8 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8041.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8041.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8041", "sourceIdentifier": "cve@gitlab.com", "published": "2024-08-22T16:15:10.880", - "lastModified": "2024-08-22T16:15:10.880", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Denial of Service (DoS) issue has been discovered in GitLab CE/EE affecting all versions prior to 17.1.6, 17.2 prior to 17.2.4, and 17.3 prior to 17.3.1. A denial of service could occur upon importing a maliciously crafted repository using the GitHub importer." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema de denegaci\u00f3n de servicio (DoS) en GitLab CE/EE que afecta a todas las versiones anteriores a 17.1.6, 17.2 anterior a 17.2.4 y 17.3 anterior a 17.3.1. Podr\u00eda ocurrir una denegaci\u00f3n de servicio al importar un repositorio creado con fines malintencionados mediante el importador de GitHub." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8075.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8075.json index 9cc2cd6a9e0..b3fac18f015 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8075.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8075.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8075", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-22T20:15:10.210", - "lastModified": "2024-08-22T20:15:10.210", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in TOTOLINK AC1200 T8 4.1.5cu.862_B20230228 and classified as critical. Affected by this vulnerability is the function setDiagnosisCfg. The manipulation leads to os command injection. The attack can be launched remotely. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en TOTOLINK AC1200 T8 4.1.5cu.862_B20230228 y clasificada como cr\u00edtica. La funci\u00f3n setDiagnosisCfg es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a la inyecci\u00f3n de comandos del sistema operativo. El ataque se puede lanzar de forma remota. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8076.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8076.json index 2e0670cf4d3..e1320ca8ca2 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8076.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8076.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8076", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-22T20:15:11.017", - "lastModified": "2024-08-22T20:15:11.017", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in TOTOLINK AC1200 T8 4.1.5cu.862_B20230228 and classified as critical. Affected by this issue is the function setDiagnosisCfg. The manipulation leads to buffer overflow. The attack may be launched remotely. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en TOTOLINK AC1200 T8 4.1.5cu.862_B20230228 y clasificada como cr\u00edtica. La funci\u00f3n setDiagnosisCfg es afectada por esta vulnerabilidad. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer. El ataque puede lanzarse de forma remota. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8077.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8077.json index 534a7b6a6cb..1a171a0b25a 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8077.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8077.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8077", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-22T20:15:11.690", - "lastModified": "2024-08-22T20:15:11.690", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in TOTOLINK AC1200 T8 4.1.5cu.862_B20230228. It has been classified as critical. This affects the function setTracerouteCfg. The manipulation leads to os command injection. It is possible to initiate the attack remotely. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en TOTOLINK AC1200 T8 4.1.5cu.862_B20230228. Ha sido clasificada como cr\u00edtica. Esto afecta a la funci\u00f3n setTracerouteCfg. La manipulaci\u00f3n conduce a la inyecci\u00f3n de comandos del sistema operativo. Es posible iniciar el ataque de forma remota. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8078.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8078.json index 0523f0debbf..db2be866ca8 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8078.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8078.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8078", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-22T21:15:17.603", - "lastModified": "2024-08-22T21:15:17.603", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in TOTOLINK AC1200 T8 4.1.5cu.862_B20230228. It has been declared as critical. This vulnerability affects the function setTracerouteCfg. The manipulation leads to buffer overflow. The attack can be initiated remotely. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en TOTOLINK AC1200 T8 4.1.5cu.862_B20230228. Ha sido declarada cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n setTracerouteCfg. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer. El ataque se puede iniciar de forma remota. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8079.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8079.json index c3a7dd55f24..1b8dabece1d 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8079.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8079.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8079", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-22T21:15:17.910", - "lastModified": "2024-08-22T21:15:17.910", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in TOTOLINK AC1200 T8 4.1.5cu.862_B20230228. It has been rated as critical. This issue affects the function exportOvpn. The manipulation leads to buffer overflow. The attack may be initiated remotely. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en TOTOLINK AC1200 T8 4.1.5cu.862_B20230228. Ha sido calificada como cr\u00edtica. Este problema afecta la funci\u00f3n exportOvpn. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer. El ataque puede iniciarse de forma remota. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8080.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8080.json index 58fe6eb5ca3..a025aaf33f8 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8080.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8080.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8080", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-22T21:15:18.217", - "lastModified": "2024-08-22T21:15:18.217", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in SourceCodester Online Health Care System 1.0. Affected is an unknown function of the file search.php. The manipulation of the argument f_name with the input 1%' or 1=1 ) UNION SELECT 1,2,3,4,5,database(),7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23# as part of string leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en SourceCodester Online Health Care System 1.0 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo search.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento f_name con la entrada 1%' o 1=1 ) UNION SELECT 1,2,3,4,5,database(),7,8,9,10,11,12,13,14,15 ,16,17,18,19,20,21,22,23# como parte de la cadena conduce a la inyecci\u00f3n de SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8081.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8081.json index a3ca8b6a618..4f8ed63aa28 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8081.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8081.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8081", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-22T22:15:05.510", - "lastModified": "2024-08-22T22:15:05.510", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in itsourcecode Payroll Management System 1.0. Affected by this vulnerability is an unknown functionality of the file login.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en itsourcecode Payroll Management System 1.0 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo login.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento nombre de usuario conduce a la inyecci\u00f3n de SQL. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8083.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8083.json index 5b768547284..4da2e1190f7 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8083.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8083.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8083", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-22T22:15:05.760", - "lastModified": "2024-08-22T22:15:05.760", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in SourceCodester Online Computer and Laptop Store 1.0. Affected by this issue is some unknown functionality of the file /php-ocls/classes/Master.php?f=pay_order. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en SourceCodester Online Computer and Laptop Store 1.0 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo /php-ocls/classes/Master.php?f=pay_order es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento id conduce a la inyecci\u00f3n de SQL. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8084.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8084.json index 2dd1c00443a..a2fd15664c9 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8084.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8084.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8084", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-22T22:15:06.010", - "lastModified": "2024-08-22T22:15:06.010", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in SourceCodester Online Computer and Laptop Store 1.0. This affects an unknown part of the file /php-ocls/classes/SystemSettings.php?f=update_settings of the component Setting Handler. The manipulation of the argument System Name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en SourceCodester Online Computer and Laptop Store 1.0 y clasificada como problem\u00e1tica. Una parte desconocida del archivo /php-ocls/classes/SystemSettings.php?f=update_settings del componente Configuration Handler afecta a una parte desconocida. La manipulaci\u00f3n del argumento Nombre del sistema conduce a cross site scripting. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8086.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8086.json index f5d7078dbe7..08b772ea02e 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8086.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8086.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8086", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-22T23:15:08.323", - "lastModified": "2024-08-22T23:15:08.323", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in SourceCodester E-Commerce System 1.0 and classified as critical. This vulnerability affects unknown code of the file /ecommerce/admin/login.php of the component Admin Login. The manipulation of the argument user_email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en SourceCodester E-Commerce System 1.0 y clasificada como cr\u00edtica. Esta vulnerabilidad afecta a un c\u00f3digo desconocido del archivo /ecommerce/admin/login.php del componente Admin Login. La manipulaci\u00f3n del argumento user_email conduce a la inyecci\u00f3n de SQL. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8087.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8087.json index 2b2acba1ea3..eac85902f2c 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8087.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8087.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8087", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-22T23:15:08.633", - "lastModified": "2024-08-22T23:15:08.633", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester E-Commerce System 1.0 and classified as critical. This issue affects some unknown processing of the file /ecommerce/popup_Item.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en SourceCodester E-Commerce System 1.0 y clasificada como cr\u00edtica. Este problema afecta un procesamiento desconocido del archivo /ecommerce/popup_Item.php. La manipulaci\u00f3n del argumento id conduce a la inyecci\u00f3n de SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8088.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8088.json index 972ec094cb5..68cf9d7cce1 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8088.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8088.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8088", "sourceIdentifier": "cna@python.org", "published": "2024-08-22T19:15:09.720", - "lastModified": "2024-08-22T19:15:09.720", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is a HIGH severity vulnerability affecting the CPython \"zipfile\"\nmodule.\n\n\n\n\n\nWhen iterating over names of entries in a zip archive (for example, methods\nof \"zipfile.ZipFile\" like \"namelist()\", \"iterdir()\", \"extractall()\", etc)\nthe process can be put into an infinite loop with a maliciously crafted\nzip archive. This defect applies when reading only metadata or extracting\nthe contents of the zip archive. Programs that are not handling\nuser-controlled zip archives are not affected." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de gravedad ALTA que afecta al m\u00f3dulo \"zipfile\" de CPython. Al iterar sobre nombres de entradas en un archivo zip (por ejemplo, m\u00e9todos de \"zipfile.ZipFile\" como \"namelist()\", \"iterdir()\", \"extractall()\", etc.), el proceso se puede poner en un infinito bucle con un archivo zip creado con fines malintencionados. Este defecto se aplica al leer solo metadatos o extraer el contenido del archivo zip. Los programas que no manejan archivos zip controlados por el usuario no se ven afectados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8089.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8089.json index dc621e6a908..8e821e2312f 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8089.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8089.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8089", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-23T00:15:08.907", - "lastModified": "2024-08-23T00:15:08.907", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester E-Commerce System 1.0. It has been classified as critical. Affected is an unknown function of the file /ecommerce/admin/products/controller.php. The manipulation of the argument photo leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester E-Commerce System 1.0. Ha sido clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo /ecommerce/admin/products/controller.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n de la foto del argumento da lugar a una subida sin restricciones. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8112.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8112.json index 75058a7af7f..ae83a674ac8 100644 --- a/CVE-2024/CVE-2024-81xx/CVE-2024-8112.json +++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8112.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8112", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-23T15:15:17.230", - "lastModified": "2024-08-23T15:15:17.230", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8113.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8113.json index 1ffef3565b4..6d446db356b 100644 --- a/CVE-2024/CVE-2024-81xx/CVE-2024-8113.json +++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8113.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8113", "sourceIdentifier": "655498c3-6ec5-4f0b-aea6-853b334d05a6", "published": "2024-08-23T15:15:17.593", - "lastModified": "2024-08-23T15:15:17.593", - "vulnStatus": "Received", + "lastModified": "2024-08-23T16:18:28.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/README.md b/README.md index 1b1a8f743f1..4dc9cf3b676 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-08-23T16:00:17.783987+00:00 +2024-08-23T18:00:18.654489+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-08-23T15:56:02.240000+00:00 +2024-08-23T17:52:11.777000+00:00 ``` ### Last Data Feed Release @@ -33,65 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -261025 +261059 ``` ### CVEs added in the last Commit -Recently added CVEs: `21` +Recently added CVEs: `34` -- [CVE-2024-36514](CVE-2024/CVE-2024-365xx/CVE-2024-36514.json) (`2024-08-23T14:15:09.993`) -- [CVE-2024-36515](CVE-2024/CVE-2024-365xx/CVE-2024-36515.json) (`2024-08-23T14:15:10.300`) -- [CVE-2024-36516](CVE-2024/CVE-2024-365xx/CVE-2024-36516.json) (`2024-08-23T14:15:10.523`) -- [CVE-2024-36517](CVE-2024/CVE-2024-365xx/CVE-2024-36517.json) (`2024-08-23T14:15:10.747`) -- [CVE-2024-37311](CVE-2024/CVE-2024-373xx/CVE-2024-37311.json) (`2024-08-23T15:15:15.617`) -- [CVE-2024-38869](CVE-2024/CVE-2024-388xx/CVE-2024-38869.json) (`2024-08-23T15:15:15.843`) -- [CVE-2024-41150](CVE-2024/CVE-2024-411xx/CVE-2024-41150.json) (`2024-08-23T15:15:16.120`) -- [CVE-2024-42040](CVE-2024/CVE-2024-420xx/CVE-2024-42040.json) (`2024-08-23T15:15:16.323`) -- [CVE-2024-42764](CVE-2024/CVE-2024-427xx/CVE-2024-42764.json) (`2024-08-23T15:15:16.397`) -- [CVE-2024-42765](CVE-2024/CVE-2024-427xx/CVE-2024-42765.json) (`2024-08-23T15:15:16.447`) -- [CVE-2024-42766](CVE-2024/CVE-2024-427xx/CVE-2024-42766.json) (`2024-08-23T15:15:16.497`) -- [CVE-2024-42915](CVE-2024/CVE-2024-429xx/CVE-2024-42915.json) (`2024-08-23T15:15:16.550`) -- [CVE-2024-43782](CVE-2024/CVE-2024-437xx/CVE-2024-43782.json) (`2024-08-23T15:15:16.600`) -- [CVE-2024-43791](CVE-2024/CVE-2024-437xx/CVE-2024-43791.json) (`2024-08-23T15:15:16.830`) -- [CVE-2024-5466](CVE-2024/CVE-2024-54xx/CVE-2024-5466.json) (`2024-08-23T14:15:11.073`) -- [CVE-2024-5467](CVE-2024/CVE-2024-54xx/CVE-2024-5467.json) (`2024-08-23T14:15:11.270`) -- [CVE-2024-5490](CVE-2024/CVE-2024-54xx/CVE-2024-5490.json) (`2024-08-23T14:15:11.467`) -- [CVE-2024-5556](CVE-2024/CVE-2024-55xx/CVE-2024-5556.json) (`2024-08-23T14:15:11.697`) -- [CVE-2024-5586](CVE-2024/CVE-2024-55xx/CVE-2024-5586.json) (`2024-08-23T14:15:11.893`) -- [CVE-2024-8112](CVE-2024/CVE-2024-81xx/CVE-2024-8112.json) (`2024-08-23T15:15:17.230`) -- [CVE-2024-8113](CVE-2024/CVE-2024-81xx/CVE-2024-8113.json) (`2024-08-23T15:15:17.593`) +- [CVE-2024-41845](CVE-2024/CVE-2024-418xx/CVE-2024-41845.json) (`2024-08-23T17:15:07.803`) +- [CVE-2024-41846](CVE-2024/CVE-2024-418xx/CVE-2024-41846.json) (`2024-08-23T17:15:08.033`) +- [CVE-2024-41847](CVE-2024/CVE-2024-418xx/CVE-2024-41847.json) (`2024-08-23T17:15:08.240`) +- [CVE-2024-41848](CVE-2024/CVE-2024-418xx/CVE-2024-41848.json) (`2024-08-23T17:15:08.447`) +- [CVE-2024-41849](CVE-2024/CVE-2024-418xx/CVE-2024-41849.json) (`2024-08-23T17:15:08.697`) +- [CVE-2024-41875](CVE-2024/CVE-2024-418xx/CVE-2024-41875.json) (`2024-08-23T17:15:08.927`) +- [CVE-2024-41876](CVE-2024/CVE-2024-418xx/CVE-2024-41876.json) (`2024-08-23T17:15:09.137`) +- [CVE-2024-41877](CVE-2024/CVE-2024-418xx/CVE-2024-41877.json) (`2024-08-23T17:15:09.370`) +- [CVE-2024-41878](CVE-2024/CVE-2024-418xx/CVE-2024-41878.json) (`2024-08-23T17:15:09.610`) +- [CVE-2024-42364](CVE-2024/CVE-2024-423xx/CVE-2024-42364.json) (`2024-08-23T16:15:06.510`) +- [CVE-2024-42523](CVE-2024/CVE-2024-425xx/CVE-2024-42523.json) (`2024-08-23T16:15:06.730`) +- [CVE-2024-42531](CVE-2024/CVE-2024-425xx/CVE-2024-42531.json) (`2024-08-23T17:15:09.833`) +- [CVE-2024-42636](CVE-2024/CVE-2024-426xx/CVE-2024-42636.json) (`2024-08-23T16:15:06.787`) +- [CVE-2024-42756](CVE-2024/CVE-2024-427xx/CVE-2024-42756.json) (`2024-08-23T16:15:06.840`) +- [CVE-2024-42918](CVE-2024/CVE-2024-429xx/CVE-2024-42918.json) (`2024-08-23T17:15:09.897`) +- [CVE-2024-43031](CVE-2024/CVE-2024-430xx/CVE-2024-43031.json) (`2024-08-23T16:15:06.890`) +- [CVE-2024-43032](CVE-2024/CVE-2024-430xx/CVE-2024-43032.json) (`2024-08-23T16:15:06.953`) +- [CVE-2024-43794](CVE-2024/CVE-2024-437xx/CVE-2024-43794.json) (`2024-08-23T17:15:10.007`) +- [CVE-2024-44381](CVE-2024/CVE-2024-443xx/CVE-2024-44381.json) (`2024-08-23T16:15:07.013`) +- [CVE-2024-44382](CVE-2024/CVE-2024-443xx/CVE-2024-44382.json) (`2024-08-23T16:15:07.070`) +- [CVE-2024-44386](CVE-2024/CVE-2024-443xx/CVE-2024-44386.json) (`2024-08-23T16:15:07.120`) +- [CVE-2024-44387](CVE-2024/CVE-2024-443xx/CVE-2024-44387.json) (`2024-08-23T17:15:10.243`) +- [CVE-2024-44390](CVE-2024/CVE-2024-443xx/CVE-2024-44390.json) (`2024-08-23T17:15:10.300`) +- [CVE-2024-7427](CVE-2024/CVE-2024-74xx/CVE-2024-7427.json) (`2024-08-23T17:15:10.360`) +- [CVE-2024-7428](CVE-2024/CVE-2024-74xx/CVE-2024-7428.json) (`2024-08-23T17:15:10.500`) ### CVEs modified in the last Commit -Recently modified CVEs: `83` +Recently modified CVEs: `161` -- [CVE-2024-7127](CVE-2024/CVE-2024-71xx/CVE-2024-7127.json) (`2024-08-23T14:00:59.740`) -- [CVE-2024-7179](CVE-2024/CVE-2024-71xx/CVE-2024-7179.json) (`2024-08-23T14:34:36.407`) -- [CVE-2024-7180](CVE-2024/CVE-2024-71xx/CVE-2024-7180.json) (`2024-08-23T14:34:53.593`) -- [CVE-2024-7181](CVE-2024/CVE-2024-71xx/CVE-2024-7181.json) (`2024-08-23T14:35:26.100`) -- [CVE-2024-7182](CVE-2024/CVE-2024-71xx/CVE-2024-7182.json) (`2024-08-23T14:29:14.270`) -- [CVE-2024-7183](CVE-2024/CVE-2024-71xx/CVE-2024-7183.json) (`2024-08-23T14:31:33.570`) -- [CVE-2024-7184](CVE-2024/CVE-2024-71xx/CVE-2024-7184.json) (`2024-08-23T14:32:00.667`) -- [CVE-2024-7185](CVE-2024/CVE-2024-71xx/CVE-2024-7185.json) (`2024-08-23T14:32:46.013`) -- [CVE-2024-7186](CVE-2024/CVE-2024-71xx/CVE-2024-7186.json) (`2024-08-23T14:33:39.350`) -- [CVE-2024-7187](CVE-2024/CVE-2024-71xx/CVE-2024-7187.json) (`2024-08-23T14:34:05.720`) -- [CVE-2024-7189](CVE-2024/CVE-2024-71xx/CVE-2024-7189.json) (`2024-08-23T14:20:26.690`) -- [CVE-2024-7190](CVE-2024/CVE-2024-71xx/CVE-2024-7190.json) (`2024-08-23T14:23:56.243`) -- [CVE-2024-7191](CVE-2024/CVE-2024-71xx/CVE-2024-7191.json) (`2024-08-23T14:24:48.103`) -- [CVE-2024-7192](CVE-2024/CVE-2024-71xx/CVE-2024-7192.json) (`2024-08-23T14:25:37.527`) -- [CVE-2024-7219](CVE-2024/CVE-2024-72xx/CVE-2024-7219.json) (`2024-08-23T14:14:12.883`) -- [CVE-2024-7220](CVE-2024/CVE-2024-72xx/CVE-2024-7220.json) (`2024-08-23T14:15:37.363`) -- [CVE-2024-7221](CVE-2024/CVE-2024-72xx/CVE-2024-7221.json) (`2024-08-23T14:15:55.353`) -- [CVE-2024-7222](CVE-2024/CVE-2024-72xx/CVE-2024-7222.json) (`2024-08-23T14:05:58.410`) -- [CVE-2024-7223](CVE-2024/CVE-2024-72xx/CVE-2024-7223.json) (`2024-08-23T14:05:20.653`) -- [CVE-2024-7224](CVE-2024/CVE-2024-72xx/CVE-2024-7224.json) (`2024-08-23T14:04:48.727`) -- [CVE-2024-7265](CVE-2024/CVE-2024-72xx/CVE-2024-7265.json) (`2024-08-23T15:09:29.843`) -- [CVE-2024-7266](CVE-2024/CVE-2024-72xx/CVE-2024-7266.json) (`2024-08-23T15:09:51.707`) -- [CVE-2024-7267](CVE-2024/CVE-2024-72xx/CVE-2024-7267.json) (`2024-08-23T15:12:23.453`) -- [CVE-2024-7328](CVE-2024/CVE-2024-73xx/CVE-2024-7328.json) (`2024-08-23T15:25:53.017`) -- [CVE-2024-8071](CVE-2024/CVE-2024-80xx/CVE-2024-8071.json) (`2024-08-23T15:34:53.913`) +- [CVE-2024-7601](CVE-2024/CVE-2024-76xx/CVE-2024-7601.json) (`2024-08-23T16:35:52.383`) +- [CVE-2024-7602](CVE-2024/CVE-2024-76xx/CVE-2024-7602.json) (`2024-08-23T16:36:11.690`) +- [CVE-2024-7603](CVE-2024/CVE-2024-76xx/CVE-2024-7603.json) (`2024-08-23T16:36:28.327`) +- [CVE-2024-7604](CVE-2024/CVE-2024-76xx/CVE-2024-7604.json) (`2024-08-23T16:37:09.107`) +- [CVE-2024-7634](CVE-2024/CVE-2024-76xx/CVE-2024-7634.json) (`2024-08-23T16:18:28.547`) +- [CVE-2024-7795](CVE-2024/CVE-2024-77xx/CVE-2024-7795.json) (`2024-08-23T16:39:47.510`) +- [CVE-2024-7885](CVE-2024/CVE-2024-78xx/CVE-2024-7885.json) (`2024-08-23T17:05:24.343`) +- [CVE-2024-7986](CVE-2024/CVE-2024-79xx/CVE-2024-7986.json) (`2024-08-23T16:18:28.547`) +- [CVE-2024-8007](CVE-2024/CVE-2024-80xx/CVE-2024-8007.json) (`2024-08-23T17:06:04.643`) +- [CVE-2024-8041](CVE-2024/CVE-2024-80xx/CVE-2024-8041.json) (`2024-08-23T16:18:28.547`) +- [CVE-2024-8075](CVE-2024/CVE-2024-80xx/CVE-2024-8075.json) (`2024-08-23T16:18:28.547`) +- [CVE-2024-8076](CVE-2024/CVE-2024-80xx/CVE-2024-8076.json) (`2024-08-23T16:18:28.547`) +- [CVE-2024-8077](CVE-2024/CVE-2024-80xx/CVE-2024-8077.json) (`2024-08-23T16:18:28.547`) +- [CVE-2024-8078](CVE-2024/CVE-2024-80xx/CVE-2024-8078.json) (`2024-08-23T16:18:28.547`) +- [CVE-2024-8079](CVE-2024/CVE-2024-80xx/CVE-2024-8079.json) (`2024-08-23T16:18:28.547`) +- [CVE-2024-8080](CVE-2024/CVE-2024-80xx/CVE-2024-8080.json) (`2024-08-23T16:18:28.547`) +- [CVE-2024-8081](CVE-2024/CVE-2024-80xx/CVE-2024-8081.json) (`2024-08-23T16:18:28.547`) +- [CVE-2024-8083](CVE-2024/CVE-2024-80xx/CVE-2024-8083.json) (`2024-08-23T16:18:28.547`) +- [CVE-2024-8084](CVE-2024/CVE-2024-80xx/CVE-2024-8084.json) (`2024-08-23T16:18:28.547`) +- [CVE-2024-8086](CVE-2024/CVE-2024-80xx/CVE-2024-8086.json) (`2024-08-23T16:18:28.547`) +- [CVE-2024-8087](CVE-2024/CVE-2024-80xx/CVE-2024-8087.json) (`2024-08-23T16:18:28.547`) +- [CVE-2024-8088](CVE-2024/CVE-2024-80xx/CVE-2024-8088.json) (`2024-08-23T16:18:28.547`) +- [CVE-2024-8089](CVE-2024/CVE-2024-80xx/CVE-2024-8089.json) (`2024-08-23T16:18:28.547`) +- [CVE-2024-8112](CVE-2024/CVE-2024-81xx/CVE-2024-8112.json) (`2024-08-23T16:18:28.547`) +- [CVE-2024-8113](CVE-2024/CVE-2024-81xx/CVE-2024-8113.json) (`2024-08-23T16:18:28.547`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 977b822f562..3d01343ad0b 100644 --- a/_state.csv +++ b/_state.csv @@ -146816,15 +146816,15 @@ CVE-2020-1184,0,0,c9b015a2a5be45c5f5f42602757821cab2e92869356d00142d3f07cf553f76 CVE-2020-11840,0,0,6a64615855e36a8045e92a90f3196d5f0233d2a8b9d8d35095225b73a6cfc178,2023-11-07T03:15:09.850000 CVE-2020-11841,0,0,88b79a72665cafbef4df581149873b3de54135f0596169941c79d73b8f2864a3,2023-11-07T03:15:10.113000 CVE-2020-11842,0,0,0341f82bc92298980c2fecdf676cf93a6aa4aea6aadcf0c0ab02ee9516b35016,2023-11-07T03:15:10.373000 -CVE-2020-11843,0,1,163a5dd02a18b9de90ba6137579215916e89abeee2c0525d74ff97f76436cee1,2024-08-23T15:48:39.117000 +CVE-2020-11843,0,0,163a5dd02a18b9de90ba6137579215916e89abeee2c0525d74ff97f76436cee1,2024-08-23T15:48:39.117000 CVE-2020-11844,0,0,30484315e297bc9fc671ccde41b4cddacde42e3ca4029c7078a2d75feb874221,2023-11-07T03:15:10.640000 CVE-2020-11845,0,0,7e08b7d4c78c56795d5b38717a7a0c67d123b244dfcc98521773ca6a4bf5f2ad,2023-11-07T03:15:10.940000 -CVE-2020-11846,0,0,dbd105608b278005dce235f9afcae972419aa71ee29f31e97b165f4404c659e5,2024-08-21T16:06:23.153000 -CVE-2020-11847,0,0,af1c03a40751a9ee7eb44b7bfb6ba1826029428dfa156c62c34bd99d228dd3af,2024-08-21T16:06:23.153000 +CVE-2020-11846,0,1,8b8ea5c1f4fc85bd166ce197ac51fae4203d622b0798573bb063411ea0118767,2024-08-23T17:03:39.093000 +CVE-2020-11847,0,1,b00c39a9d8e6f9d6d652e36ba308d72cb51741f89c8d9341b854b868bf525605,2024-08-23T17:04:30.110000 CVE-2020-11848,0,0,8b23a9eceff9959ab288670219d1f6006701c7021ce0c312a1ae7c487d5ba6ee,2023-11-07T03:15:11.227000 CVE-2020-11849,0,0,09295df17fa5dd8adaff1580dbfce546c6c9c519a1569b4961ddc2c9383ed8fb,2023-11-07T03:15:11.503000 CVE-2020-1185,0,0,3316dc17683cc6cc502a5a61a4139663716df73cc9e5aeb1b7b86cd4d9551321,2021-07-21T11:39:23.747000 -CVE-2020-11850,0,0,a880962fc5cb09914969f43c2029ff38c4de972bf755cf56f89f5ef4f32ebcac,2024-08-21T16:06:23.153000 +CVE-2020-11850,0,1,a3d9f9e551a50a87da7c8a265ecf9dea5da39e5b70093e0ec49103dabe170b3c,2024-08-23T17:02:39.537000 CVE-2020-11851,0,0,4ee7500b04ed49333edaab0460360ee6e3c1c64822d3fd6fa5fe961906315d49,2023-11-07T03:15:11.767000 CVE-2020-11852,0,0,112bc0d3fcb0af2373f487930f6d85a8825e32e1638612dc8b7461f6b5afad16,2023-11-07T03:15:12.037000 CVE-2020-11853,0,0,32b8f066baea30ce3a5502342cf34ba35e924476d7f149d54fcc4651ef73cd28,2023-11-07T03:15:12.290000 @@ -187601,7 +187601,7 @@ CVE-2022-0181,0,0,49bbaf20babae092248444f6ddc94fd7d8983bfce62fd846eee38d0176c6ca CVE-2022-0182,0,0,f0d9ba9007437f7d7a66a432fc0d00289cffd4600671c3cebf01d89438097bad,2022-01-24T20:27:33.607000 CVE-2022-0183,0,0,3b28f17534e16919c8c20dabb021bcf588ae9e948de688533d018739b0f1c29e,2022-01-26T15:46:06.490000 CVE-2022-0184,0,0,2796a1b3e55d24a7793b73561ae52ebe8b8c9bdb3af4ee6ae87dd4893719740c,2022-01-28T20:58:56.980000 -CVE-2022-0185,0,1,f2e7dcbc82ad80772e8f3e15c31946c0d2810d34ee75b05277118c88b79b9dfa,2024-08-23T14:04:19.107000 +CVE-2022-0185,0,0,f2e7dcbc82ad80772e8f3e15c31946c0d2810d34ee75b05277118c88b79b9dfa,2024-08-23T14:04:19.107000 CVE-2022-0186,0,0,02b43b39b42feadeed2a3b848b36fe00f387679041bd4cddc14b4f50f18f257c,2022-02-28T20:50:11.233000 CVE-2022-0188,0,0,b8ccca23290559a5b11ded28b5901c560a4c58d0a38271ad31544f41df963cc4,2023-11-07T03:41:08.873000 CVE-2022-0189,0,0,266c58e45b9d9e1080790386b72619f2a8170166f33a359753e82bc61cf4178b,2022-03-08T16:22:14.813000 @@ -191081,7 +191081,7 @@ CVE-2022-21792,0,0,c0dba1c1a5fd35bc61e2f3d624b114fd51699c83527dd11d9a9e09671eabf CVE-2022-21793,0,0,28c3468b764b09aca3ba58f1a0031d86a6117cbbd2e119931ff746ac4787d882,2022-08-26T17:28:19.323000 CVE-2022-21794,0,0,79a575c04e57a77829be36ca93b3ef81dfaacd1f06f06f150171df503fa24fb7,2022-11-17T15:45:08.950000 CVE-2022-21796,0,0,a2b4f33e8eba9a3c90df6699995f8cb6a3d0c5e4409540b55ccc0ff0aafde907,2023-07-24T13:52:34.440000 -CVE-2022-21797,0,1,7291af89002aed93b6a2e006067febc41d8f3b8dd29887d23b76b543f9e06d89,2024-08-23T15:35:00.820000 +CVE-2022-21797,0,0,7291af89002aed93b6a2e006067febc41d8f3b8dd29887d23b76b543f9e06d89,2024-08-23T15:35:00.820000 CVE-2022-21798,0,0,5dde843507c6f7e5c1b6bf8fb96a66ccc7c812bd496cdfb2b9d8f4d42720349a,2022-03-08T15:38:39.317000 CVE-2022-21799,0,0,6d8dfc4f9c2de78dfb905a5ad84250eaf84451fe1219627436d7fe01f75d47d2,2022-02-11T16:18:16.083000 CVE-2022-2180,0,0,f46038dc0dcf4297cba5318ffe4a9b739aa90bbfffd48bae628bd658698909e6,2022-08-16T18:00:37.373000 @@ -216694,7 +216694,7 @@ CVE-2023-22572,0,0,778132e3b3f1c6111ec36dfa71316889039f517589afb27544bf256807f05 CVE-2023-22573,0,0,695940d0a93594287fdbd9acbc9b34e26235c4d79dab66e64e7b07d3ab3ac00f,2023-11-07T04:07:03.490000 CVE-2023-22574,0,0,aabdaef9b03b49d2d5c4e805d45fdd5dedd66691d702929398a4937fd5b7eac8,2023-11-07T04:07:03.700000 CVE-2023-22575,0,0,0fa7814eb835b1136895274bd2531f1a8e8cbfed45eb164215437ecf3caa9fba,2023-11-07T04:07:03.910000 -CVE-2023-22576,0,0,66803a5adeab0382347c0f36ef2052007283687f969f732f04f0db18304bd256,2024-08-21T12:30:33.697000 +CVE-2023-22576,0,1,85ba32eea52019e03b2fded958911d7b0de88ee09bcd2fa9d3e03ee2a97086c0,2024-08-23T16:56:09.967000 CVE-2023-22577,0,0,e60adbac0fa6d3fedb1bcdd27e7e5af2dd2842bde5e722c2b627410b2be78279,2023-05-02T19:13:08.980000 CVE-2023-22578,0,0,aa99ee9b2e1474cc51633927001ee761e43c7fc8e969c212365f2e94662f2910,2023-03-03T19:23:56.890000 CVE-2023-22579,0,0,b50f51817f5ab55f90ca17e0a70b50b2a7f894e20f1a8ab175a13831f05dfd7f,2023-04-28T18:50:21 @@ -217929,7 +217929,7 @@ CVE-2023-24134,0,0,156ab157adf7bea50d09283df2ade9a297a32775320b7cec25ccfc7fb542f CVE-2023-24135,0,0,e617c1724856d088d5cc329b45e241d37f9534b3d6a8a97093b73ecbf55778db,2024-01-29T18:26:55.150000 CVE-2023-24138,0,0,5b7b4eed5ad17ad5d610f0397312d19e35fb7d1fd6a184ba16bfd3270f0568bd,2023-02-10T13:35:38.923000 CVE-2023-24139,0,0,53816b7896c1c11d8bc05b9b44f21b4abe54647cc0a96564d3ec1f5a0cce190b,2023-02-10T13:42:03.507000 -CVE-2023-2414,0,1,b4e7e5a9801909c81180974728dc9e7bb936e8c974fe0e13bc906215baf8ab09,2024-08-23T14:15:09.670000 +CVE-2023-2414,0,0,b4e7e5a9801909c81180974728dc9e7bb936e8c974fe0e13bc906215baf8ab09,2024-08-23T14:15:09.670000 CVE-2023-24140,0,0,6ee553cec2b3ac94e943b071aad246c56375fdd51aba502c03438bacafe76632,2023-02-10T13:43:19.697000 CVE-2023-24141,0,0,7ccb11f0350331595054bb9e5b1aec18672af9e9180eb391dd46a5e43d35ddf3,2023-02-10T14:57:23.833000 CVE-2023-24142,0,0,1cdc5afc5198434b944003549fe2c8c28a2a72388079de1ab5132c34fdc24e52,2023-02-10T14:58:39.327000 @@ -221079,7 +221079,7 @@ CVE-2023-28127,0,0,4fe7cc0c31f715e8c1b348e0bf1ef91aa8c822e9ffb6aeedac1200e5bb524 CVE-2023-28128,0,0,eaaf4099055f64190193cf09b015b0f4d726ed7dd17025820d1a9d6b50229efb,2023-05-16T20:15:09.140000 CVE-2023-28129,0,0,4ed8ab3c33c60e1ac82f8f6b0fe80453918b071a15eb2b0ce2bd3bcfa8c2cccf,2023-10-18T04:15:10.807000 CVE-2023-2813,0,0,15b671f64d453b6daaa812c86c38b923ee0306238dd8226b785e08cf284b1686,2023-11-07T04:13:22.220000 -CVE-2023-28130,0,1,9e5c7d68ae781e4702faa4741f6c9ca91d4a375561cb250199a4cac75ccf8499,2024-08-23T15:35:02.097000 +CVE-2023-28130,0,0,9e5c7d68ae781e4702faa4741f6c9ca91d4a375561cb250199a4cac75ccf8499,2024-08-23T15:35:02.097000 CVE-2023-28131,0,0,6a261341302567d63924e06d70096cab1d12ecabad3196aa7a98114485ed515a,2023-05-25T21:15:09.067000 CVE-2023-28133,0,0,430d71b69bc3693074f1df1c4d893c1b989573e5502f986f209e8ebd775e7532,2023-08-01T16:44:44.847000 CVE-2023-28134,0,0,c626b84e230219bdaa3f37a3b0fb442c69d155af0679eb523091db837c6ad9b4,2023-11-17T20:14:54.230000 @@ -232953,7 +232953,7 @@ CVE-2023-43843,0,0,aef808c71263ea6153f2eb4b7e45ae7b9a73047abeb8810e9698360185074 CVE-2023-43844,0,0,060d731423af6f4711e120eb2a59d74f233fa214c9e9f3f730d535056c38b526,2024-08-22T20:35:01.130000 CVE-2023-43845,0,0,d8c84d9afe0ac5a8afc98f0447d8c6711d3b8b032d2ae653c041ead4ab58d994,2024-07-03T01:41:41.020000 CVE-2023-43846,0,0,fb3201cf7e6c0f2741576b6bdf0ad5f80553de1de784098b61d62597e5d839be,2024-05-29T13:02:09.280000 -CVE-2023-43847,0,0,28c6e47ec33c1957d51359e438da5dfff5700e365d5de705396d6276e82a5e1e,2024-05-29T13:02:09.280000 +CVE-2023-43847,0,1,21acbffc2602166c9413a66a2399100e79dc9eef83bb277103aaade7d5c7b645,2024-08-23T17:35:00.470000 CVE-2023-43848,0,0,966c4d3097d699fb3c697113cdfd2123c20f48ba0018120b5a3b5a086a38c721,2024-08-20T15:35:01.247000 CVE-2023-43849,0,0,0542c1a5b859a23e3f0c4124d7360d8baeed305004e92fadb08a463b761b77ea,2024-08-14T20:35:03.723000 CVE-2023-4385,0,0,b5bb3c59916cebc3c4ff676af8b75b048d7e53ae9df9c8d27d2a9f6e967ad4e8,2023-11-07T04:22:29.887000 @@ -236680,7 +236680,7 @@ CVE-2023-49190,0,0,86cb6859aa19958c166ca64e47676d44af4b98597ca7dd177a61fac83182b CVE-2023-49191,0,0,34969ee3df3717ecd0fd0437e5d4d4fc0bd1f9b89d2160d0adca8969e1a92937,2023-12-21T17:20:50.323000 CVE-2023-49195,0,0,239193d980cfd4324773344b0a932e91919adfb3eac7f01f4cac2dbd41501171,2023-12-18T19:48:51.397000 CVE-2023-49197,0,0,87fee8cafa9bc5eebe7f1b14f5bce64e09cfb3c60a34a1183c07dca6faf91be6,2023-12-21T17:26:04.913000 -CVE-2023-49198,0,0,4d6475dbfe0446a96260537231cb27868b40f11df2bf0eb8c592af5861c0e780,2024-08-21T14:35:01.510000 +CVE-2023-49198,0,1,ac19da202070e70cbe33e0e7f0d8ec06a1ef23f683cbf1d8c569adca8420cbd3,2024-08-23T16:56:50.683000 CVE-2023-4920,0,0,750757ff4ce213882eeb3b1cbdf16aac49f85b0688b4847bcc0bc2036d6471f3,2023-11-07T04:23:10.193000 CVE-2023-49208,0,0,2a9e047f121c5391d797b355b9800029d03397ffa5606d306303c89458886565,2023-11-30T20:47:45.190000 CVE-2023-4921,0,0,d59093adbc168eaf1f1dcabc1b2c8846c3b0575f8dbf1988414be85426e1ed5d,2024-01-11T19:15:12.373000 @@ -237661,7 +237661,7 @@ CVE-2023-50807,0,0,49d7ddd672f2ace5a4bacad8e9a69ecb67c1f752bb20673689176d58cf559 CVE-2023-50808,0,0,f28b2b346351a49c0ccf1d31776f56e7dc93352b8a5ef0a215db353f8073b16d,2024-08-19T15:35:01.787000 CVE-2023-50809,0,0,7719a810705ea5c5a85faa78514d3a43be3a8cdc8a452351afdb2453caacced0,2024-08-13T14:35:00.967000 CVE-2023-5081,0,0,7787e17d39eb5438b4b32a6bbefdad7b23a6aea7d5f6a904017d2dc838411573,2024-01-26T16:02:59.793000 -CVE-2023-50810,0,1,ee660c82097e8ab9c992185745b4404dffd149b82690962a0ed8a0cb829c0aef,2024-08-23T15:35:03.107000 +CVE-2023-50810,0,0,ee660c82097e8ab9c992185745b4404dffd149b82690962a0ed8a0cb829c0aef,2024-08-23T15:35:03.107000 CVE-2023-50811,0,0,094c840cf26fbf426edc4fdb20f1490465693445542cafd34c1943f1940efb84,2024-04-29T19:52:21.503000 CVE-2023-5082,0,0,f1b6df4433c50955b466bebd7c4d10790a8c0df9b9f9b615c6456254fa1fb163,2023-11-14T15:33:18.273000 CVE-2023-50821,0,0,9fbe459b4fd0202b0f005ddc745a01aaa0796a2e9731b864da13cc11ff66f119,2024-07-09T12:15:10.570000 @@ -240372,7 +240372,7 @@ CVE-2023-6448,0,0,f7f271f9b08baff1e70e4a44ec3b05327ba7aad4658ca132cb49aa8e275080 CVE-2023-6449,0,0,a7f9c2b5501cdd9fc21a14160551e18f6c2ae8e1d2fbbd505e7a7b32722bbf0e,2023-12-06T20:56:48.923000 CVE-2023-6450,0,0,e76b7b0addf647726eba5bc734dd23c4b1f2101780b0fb20f535aa0ca20caeb1,2024-01-26T15:59:00.420000 CVE-2023-6451,0,0,f12b562c1c96070fc5e29b85d7db92fde3d7bad88af9e8831d139b62eb69a5b6,2024-02-16T13:37:51.433000 -CVE-2023-6452,0,0,c5299f185bdb32bda151a9967f902be9f9e61a9d314aad85e6e7a6a1642a9854,2024-08-22T16:15:07.997000 +CVE-2023-6452,0,1,4a403935ac18398cc8668e411c25d7ab529c8b44d6a54f7c1e1a856f64c7ea31,2024-08-23T16:18:28.547000 CVE-2023-6456,0,0,e46e0d37304e52e0bebade1bd99fe797a2c17dba35b72ee4232c48409ec0198d,2024-01-25T02:02:23.760000 CVE-2023-6457,0,0,1d0aafe1ff9d8e5471ee20dcac54ea1ba924bf6cb0d15d7ebecd5192eedea5f7,2024-01-22T21:25:07.550000 CVE-2023-6458,0,0,d5ab3aabd050ac001731c9ca925bc1c0303a945e438599593a52c25d763ddeeb,2023-12-12T19:11:36.897000 @@ -241071,7 +241071,7 @@ CVE-2023-7252,0,0,a96b97f43999a9df13dd6b86a1c20c7b99309234cadd0538e19b9a3c2d31e5 CVE-2023-7253,0,0,4436e6df0abbc2be66c875c1a3b7421386cfdc4e7cfd00a94031f9b2a2d0783b,2024-07-03T01:44:30.193000 CVE-2023-7258,0,0,743a17302c5d0deefce3c9c18515bc1a780c1d3e967dd943e69bc9c091c417e4,2024-05-15T18:35:11.453000 CVE-2023-7259,0,0,4927c73cd38943cc915f51b0766c09a76100affe33b1049612344f19331c1f96,2024-08-02T09:15:55.730000 -CVE-2023-7260,0,0,19104bbb4c6e3338ddc0fb4c40d135954a97c9a44f74b63a8a70f0296b3652ac,2024-08-22T21:15:16.107000 +CVE-2023-7260,0,1,a283d80bfb35f6dd126dbb811c8254dc2cb2d619c2a0fdb098a89d48e2a7bedf,2024-08-23T16:18:28.547000 CVE-2023-7261,0,0,44080cc2bc0d6a25d80bc7855327b03309b2d9def17d97f1c55e50122c67ac97,2024-07-03T01:44:30.563000 CVE-2023-7264,0,0,51dd8b83703649c91504628a1d95022ef41c77d28d8363a527e775cafaba1511,2024-06-11T13:54:12.057000 CVE-2023-7265,0,0,f2f550eec8eb52e2d7c6d4751c88c82f6bbba78e56c41a54eac7449c27df676c,2024-08-08T13:04:18.753000 @@ -242760,7 +242760,7 @@ CVE-2024-1863,0,0,d309d0dcaf91ae9730d0618d7e96980c8575232e40dbf336011458a65817a9 CVE-2024-1864,0,0,7540eb10c79c4178ff1d3d38ada50b4803bad985e5def6b198e727bc83e258b4,2024-02-27T22:15:14.807000 CVE-2024-1865,0,0,f956c1fb13f7d8ccb79f0523d8afbbb427264aa98fd91d26d435a4ac5b2b57df,2024-02-27T22:15:14.847000 CVE-2024-1866,0,0,b664e93f02eb3409a7f947b52c90652e506a03ffc3ea2701191144838f6db8e6,2024-02-27T22:15:14.887000 -CVE-2024-1869,0,1,3998fca9aba65da3032051bba49c4c7fbbed3ad27cf86d29260ce751b65a6197,2024-08-23T15:35:04.300000 +CVE-2024-1869,0,0,3998fca9aba65da3032051bba49c4c7fbbed3ad27cf86d29260ce751b65a6197,2024-08-23T15:35:04.300000 CVE-2024-1870,0,0,9043a976525f352aaa6c3d9729ba890eb6378250a18455d48857378e562c62f9,2024-03-11T01:32:29.610000 CVE-2024-1871,0,0,3febb3fff07b16e51c21f3b87748727e6cb83597ff7d412acb640471d56a308d,2024-05-17T02:35:39.620000 CVE-2024-1872,0,0,aa7a68ee0f5f23cfde15f81a4ee68e0aba9fc68928dc131f7d1904269d9689ce,2024-03-29T12:45:02.937000 @@ -242782,7 +242782,7 @@ CVE-2024-1887,0,0,81cc4f194e2e9461c62519703a27975e0e0f61112c772ded90c4470718c66d CVE-2024-1888,0,0,bf57d327ae2263557b0550222c7c752749139f0445ed339755f52cc5494846c8,2024-02-29T13:49:29.390000 CVE-2024-1889,0,0,8f5e4e0bb924f7b8e4ec3e08bae9874b3b2ce85f04f6a8e4e54e83a39adef6fc,2024-08-01T19:15:43.060000 CVE-2024-1890,0,0,531d34422749c817865c7aa12a7511d14a052050d338b19b3e8ad5ee889bb0a6,2024-08-01T19:15:43.170000 -CVE-2024-1891,0,0,28904a6b03ac59792af135dd725cfe1ece93943fb679e79674c0af3d7e31708e,2024-06-13T18:36:09.010000 +CVE-2024-1891,0,1,c102a34290af9e4016cf4ba8a069d311b8a724286c8b07fbdaf22ccf6fb2fef0,2024-08-23T16:05:49.007000 CVE-2024-1892,0,0,4ea1371046f3110575c1ebb13380763c1299cec2bfc76827341dafb05646b78a,2024-04-16T12:15:10.050000 CVE-2024-1893,0,0,850b5579bc5e8ddde9ba564f3dec88ebcb2f0be01744a4f6722a2842aba91c6d,2024-04-10T13:23:38.787000 CVE-2024-1894,0,0,c4f8e5dc56d3391ab69c73e67ffe7140e91631e1574758f42884f053e4c7f193,2024-03-13T18:15:58.530000 @@ -243111,7 +243111,7 @@ CVE-2024-20429,0,0,f467ae3dedce5a1f38518317999bbc8fc79bc2960eb95679505ee1fcb992a CVE-2024-2043,0,0,7a3896d230f6f1ae602a08f92e2eaaa644b5893021849dee8a675eb9b7c81e88,2024-05-02T18:00:37.360000 CVE-2024-20435,0,0,bea0a896db86de220514ce1618de53b05523503910f680b3361f4c8bb8734dd9,2024-07-18T12:28:43.707000 CVE-2024-2044,0,0,20580816ecbcb2d456bf5030911ad2dbba893322604e54631bb30d65d5e1ff74,2024-08-01T13:49:39.293000 -CVE-2024-20443,0,1,272afbe0465f6648950651b716899dcfcb722318ac954aaaf0e63544fb83de9e,2024-08-23T15:18:06.347000 +CVE-2024-20443,0,0,272afbe0465f6648950651b716899dcfcb722318ac954aaaf0e63544fb83de9e,2024-08-23T15:18:06.347000 CVE-2024-2045,0,0,711ac9453656184dc732c4f4633f4f7bda646ec847d7f0c1c60c568976f58aa0,2024-03-01T14:04:26.010000 CVE-2024-20450,0,0,cfe46dc7826c305ab98574cf72ddea7d365b2634d22c5b3d211ce8df40e35a9a,2024-08-07T19:09:46.290000 CVE-2024-20451,0,0,5716a06bbe518ce49d6f96da365d23009de45980184470eb3ddec420dfc210c3,2024-08-07T19:09:46.290000 @@ -243119,7 +243119,7 @@ CVE-2024-20454,0,0,82704fb503b7059454a85ef30e98f2c90abd21a5c3b3087fb54fa9f88dce6 CVE-2024-20456,0,0,bf56f0f0f8d3ed0f6616c43fc8ca6a47b6257ec17aaac25185ba7a05790b5cc9,2024-07-11T13:05:54.930000 CVE-2024-20466,0,0,d9adbd7a5cfca4a39494a47969f1c31ae3805a9aa7b4cd0a12535f31685e123d,2024-08-22T12:48:02.790000 CVE-2024-2047,0,0,65f16d2420b90c918e9e57877aac5f0440eb772d779ccbd58288e6312f3c8025,2024-04-01T01:12:59.077000 -CVE-2024-20479,0,1,ced5b461eb6ab05478119ddf8b399bbc19a6ff248adc19d6fde8eab586c6db76,2024-08-23T15:14:45.913000 +CVE-2024-20479,0,0,ced5b461eb6ab05478119ddf8b399bbc19a6ff248adc19d6fde8eab586c6db76,2024-08-23T15:14:45.913000 CVE-2024-2048,0,0,3fe9d949673d5eedf190595df45c4c7d30c6a66a4722ea0631f740f815dd3cc0,2024-06-10T17:16:25.067000 CVE-2024-20486,0,0,1ec7a6c2a991b67e11827b3b316fed30b5b5340988b303f9088e0f10e2e894f9,2024-08-22T12:48:02.790000 CVE-2024-20488,0,0,fc6ca65423793d813adb7786a7f4f54ac29768af74ad6292f06d6517e15ea15f,2024-08-22T12:48:02.790000 @@ -244188,10 +244188,10 @@ CVE-2024-21872,0,0,53e0faa097226f02f7b28a1019bf889e7e0fb2883871bfc21fe50f5bf87c7 CVE-2024-21875,0,0,e1e3188e4a1a3daa309eabb8117102a0dc6d3aa5e89a469bc9ead0ec383c37f9,2024-04-12T07:15:08.283000 CVE-2024-21876,0,0,ae91aa7aa556d3cce3704479e7f75e62a04c994b20bc5726a4ae070df312ecc8,2024-08-12T13:41:36.517000 CVE-2024-21877,0,0,0669d2adba582d2b41463ba1dc9469a88a963b958c53a165937bbe19570868a9,2024-08-12T13:41:36.517000 -CVE-2024-21878,0,0,7d494ca036e4c8752603f3fcb7219bdbf5bb5253c82663a644d199edb90ac163,2024-08-12T13:41:36.517000 -CVE-2024-21879,0,0,aed3b7dd0361878c79027761db34dd2ec0db4e7fbc319a4e2370a1b85b4b50dc,2024-08-12T13:41:36.517000 +CVE-2024-21878,0,1,789e3fe91c4f9f15772842a823deae244077b3af25e7833e3c5892430f68e0d6,2024-08-23T17:52:11.777000 +CVE-2024-21879,0,1,c2d67747defc315a5cc697760696609f6ec76e4daadd22f878f1c231f6388796,2024-08-23T17:49:25.830000 CVE-2024-2188,0,0,f6397330df5f65b18ad2d13528904ddd0555534adf5d38b75b356026fc82ff57,2024-03-05T13:41:01.900000 -CVE-2024-21880,0,0,d0c05383dad7df57208645be360eb903a5621bfdf7f9e217e4552bfdc93c72b7,2024-08-12T13:41:36.517000 +CVE-2024-21880,0,1,1ddc742a1415ed9c83f0b08f07d66002d3238df7214af576a1aba215e4338749,2024-08-23T17:38:35.193000 CVE-2024-21881,0,0,a3ca078f1a94b860c30187f42bba36f3f423640c700d8c006c38cdeb14d70ba9,2024-08-12T13:41:36.517000 CVE-2024-21885,0,0,70c81d50395e4cc90ed76dbf187dcd1d6628b16e28d002b6bd3113eae9355653,2024-08-01T23:35:23.987000 CVE-2024-21886,0,0,d9ed72d5cc76ab779e42960fcab2b1d8ba99a9322ac8a915c7bbeae73a4df89b,2024-05-22T17:16:14.343000 @@ -248149,12 +248149,12 @@ CVE-2024-27453,0,0,9ef05cf790c264dc788e980768a5a6a3cb502900f86edeb2c3cbde013355c CVE-2024-27454,0,0,779bdca194b0fd7e15d4fb614a41a54cce3a22c81a400a54914ce77bfe4d7130,2024-08-02T18:35:26.947000 CVE-2024-27455,0,0,c38321d72349de04fccc31003825775edb49050b2ce63013697a3990ecbe9fab,2024-08-14T15:35:07.223000 CVE-2024-27456,0,0,f0d8fb5a803e9956fe6ec256a4dcc4781b2e19a5009cb66a9854d4478f56dbb5,2024-08-02T19:35:26.123000 -CVE-2024-27459,0,1,bce97f3eb834dcc00c74dfb6abf98ffc5071ac70577037f22e6e9d74d3163f62,2024-08-23T15:35:05.310000 +CVE-2024-27459,0,0,bce97f3eb834dcc00c74dfb6abf98ffc5071ac70577037f22e6e9d74d3163f62,2024-08-23T15:35:05.310000 CVE-2024-2746,0,0,35843c152725b889a25545af99dfcef9305aac3bf18b4d5c5f191a6ec8073990,2024-07-12T19:15:10.640000 CVE-2024-27460,0,0,8683af8a542feb170a538bcba55c469e083f9924ef0c1691a92718c202474f09,2024-05-14T16:13:02.773000 CVE-2024-27461,0,0,aa8cd584bdc5b8b3d078d3166544e96e10118040c10a5b885de911ca69058c38,2024-08-14T17:49:14.177000 CVE-2024-27462,0,0,2177b080bf16597b1d3af90d404590cae7bb441b9367c276a25f840d3e6c7f9f,2024-04-14T23:15:45.830000 -CVE-2024-2747,0,0,5387110be360e1fd36f0342bcd8dd7e83bfa4eabd929725feec9963b35cc169c,2024-06-13T18:36:09.010000 +CVE-2024-2747,0,1,baae2e4ad262224b7bd783539f8781ff29c46a1f8cdc1bd24812f0d29f991485,2024-08-23T16:30:43.417000 CVE-2024-27474,0,0,4a390a0a495b528719cdfad3c5cdbeeb4b25b7052e56b9b2bf54d8bb9762dcc1,2024-08-21T21:35:05.010000 CVE-2024-27476,0,0,7a4663f499ee23e08c2a048515f5b6745ec9423d99e38efec54dd0ceaf59a3fa,2024-08-01T13:48:28.390000 CVE-2024-27477,0,0,e0cd02f233cdafbc91249b5781d33c91da5035c970dc05ec11d6a3134871bf1b,2024-04-10T19:49:51.183000 @@ -248498,7 +248498,7 @@ CVE-2024-27996,0,0,5aaae661a6fb92b939550d770c3ab033edc85310e1d2be696c3be929f4996 CVE-2024-27997,0,0,38211b675f4409064c6233281099da5f5fa00ff059690325dad2c59b915c01fd,2024-03-20T13:00:16.367000 CVE-2024-27998,0,0,4b6f230fe964647fb680f6367b279bba522ac93005c2e8f6d523205374f3e144,2024-03-20T13:00:16.367000 CVE-2024-27999,0,0,eb71f5e78ce23e710caf587ffd7cde1246a6fc9b58a11c7b1c6cbe38842e0f52,2024-03-28T12:42:56.150000 -CVE-2024-2800,0,0,74596529ca280c923328b734bd86866fc7dbc2558ef74b7cae183f2eae3e1b3f,2024-08-08T13:04:18.753000 +CVE-2024-2800,0,1,721139b51a7197ab0f6c1e7bbb5ac713ef73404a77d2aeeff042ff2442b8050e,2024-08-23T17:03:41.320000 CVE-2024-28000,0,0,08efb1b1c95d7a361c37476c4accc51182840d3e3d04306b3a327b733e837865,2024-08-21T16:06:23.153000 CVE-2024-28001,0,0,769e60058cb29be891e3bd26013be397b6ae5a2c1de4b96ae3237e85af5cdd26,2024-03-28T12:42:56.150000 CVE-2024-28002,0,0,979c468740a66c74eeb1c5784ee90077b381a78255d231d99fff807000c5cb6b,2024-03-28T12:42:56.150000 @@ -248727,7 +248727,7 @@ CVE-2024-28288,0,0,f98f2f651d1f736446516dbdbf0d5790dba9ff7967167e34d1d283eb510a3 CVE-2024-2829,0,0,a34e30cdbcaace33af6819d27727866fac8140ba32c20702ce2f1d25edf955a7,2024-04-25T13:18:02.660000 CVE-2024-28294,0,0,78f4f9cea2d4a1ca93d50c609f48582229009802769f67fd7dc526cc547f67cb,2024-07-03T01:51:34.303000 CVE-2024-28297,0,0,a4b240f33a30c881b1a926a2c492c4fd59edb741a84b1b986f2bad529bc90472,2024-08-05T12:41:45.957000 -CVE-2024-28298,0,0,42fe0255b1ba9d0b1671873946fa54d976be8caa5214aa1370df457890f075b5,2024-08-05T12:41:45.957000 +CVE-2024-28298,0,1,3aa711bdacfbf434dc12fa86d3c93b65281b06b66a9b1b63d3aba96a27fa6c0a,2024-08-23T16:35:01.807000 CVE-2024-2830,0,0,8c004c1c8fc1f8388803620250a49c9771d371ad920b272b660e7e2337499741,2024-04-04T12:48:41.700000 CVE-2024-28303,0,0,a65712a928f1b4a2335837c36c349f7d018e1f7b9e70b27cb7f99f12d8cf7ee1,2024-03-20T13:00:16.367000 CVE-2024-2831,0,0,643c5a916b3e7dd2e502ec8b69ecf4eaeb51af43509d8dd9dee1849a2f658d24,2024-05-02T18:00:37.360000 @@ -249089,7 +249089,7 @@ CVE-2024-28969,0,0,5e2ad811d66709650c6b955b899218a119a75a237da1c6a214e4f23b4fda3 CVE-2024-2897,0,0,cedfc20da5ed85e9f84ef73f96b224aba1a7761f3b26b18165ca182e0276563a,2024-06-04T19:19:19.267000 CVE-2024-28970,0,0,e8f11977500005486cf7671144dacf7215de23ccf91b6c8eb182a0c1c61d7f56,2024-06-13T18:36:09.013000 CVE-2024-28971,0,0,977b1e796a504922885da69c0f7540513ab16cea6a678ad4098d22f0ec570269,2024-05-08T17:05:24.083000 -CVE-2024-28972,0,0,7e0693eec2b0c555920118b0a637e50a7fe7cc9cd0582523106ae0d013ec397a,2024-08-01T12:42:36.933000 +CVE-2024-28972,0,1,dcd09dd1c8cb5d138c9b91d96467fdac02f663b71ca96fca6c2bdc82024bff7c,2024-08-23T16:59:11.070000 CVE-2024-28973,0,0,c5833936687fc47280c5de84f71bab0362ecad8e5c2b89ba9d836c1b9ea2e1df,2024-06-26T12:44:29.693000 CVE-2024-28974,0,0,9abba18f604ec1e999d11794eb149d52c94c8b05cbfba16cb362e87c9a7f33fd,2024-05-29T19:50:25.303000 CVE-2024-28976,0,0,c0cfcb815492d56170eba26ed04c4ed5dc48c34f8cfcf09f6c5238d2d54ddae0,2024-04-24T13:39:42.883000 @@ -249731,7 +249731,7 @@ CVE-2024-29973,0,0,dce7b6fc2379041367d9194a4d489f2740a4e7f8a4fc50009d6741db67b41 CVE-2024-29974,0,0,95c960f3663ca805207b0282e4dd55b7db41b4855a5d3cd2356d3cbb0de9e78f,2024-08-02T02:15:17.627000 CVE-2024-29975,0,0,dd90f52c857658c1e55bb6a9eabcbfa685a04e70242168e88b92597613e79ebb,2024-08-02T02:15:17.723000 CVE-2024-29976,0,0,2e76e5f749f89d166e8f60e11fac3f53e046bc0b5b2bd2c0bb26a6cb79b733c7,2024-08-02T02:15:17.820000 -CVE-2024-29977,0,1,5563b7796409ef117337fa79f3e429d4d505556f415621ebfaf7a5a980fdb6af,2024-08-23T14:52:19.923000 +CVE-2024-29977,0,0,5563b7796409ef117337fa79f3e429d4d505556f415621ebfaf7a5a980fdb6af,2024-08-23T14:52:19.923000 CVE-2024-2998,0,0,529e4d63a60fb43eff1450ddb35e7521c436b06357cd9f933bf7536e9ff53bd8,2024-05-17T02:38:41.883000 CVE-2024-29981,0,0,87a31a61cdf81b98bbc6bd8e79883f9fedc6f421fdbf6cfb239f24353327db62,2024-05-28T23:15:17.270000 CVE-2024-29982,0,0,2b0e311c693a5c01164acb4d684911085c875bf98c0b51fd697730431b87aa78,2024-04-10T13:24:00.070000 @@ -250610,7 +250610,7 @@ CVE-2024-31136,0,0,fc3cbe768e48d4625e33825c87e8160fa75cbd797dbb2249521e321016035 CVE-2024-31137,0,0,24dca0985c04b079d91e4a71b8f459f589e7387b6e8baa6268bf1899b5ce24d9,2024-04-08T22:41:02.117000 CVE-2024-31138,0,0,e862c1086da58a416fbb8daccc103d417726a0d0d62aa3907b1f09b19f01be5e,2024-04-08T22:41:43.087000 CVE-2024-31139,0,0,1f981793bc0ffd1f30ec0eaae2f049959f8e2058241da40737858920eb14a44c,2024-03-28T16:07:30.893000 -CVE-2024-3114,0,0,28e81e315d786a9cdf65dd8197fff4b783e384b8bebbc1c25a3f01ac8969fa0a,2024-08-08T13:04:18.753000 +CVE-2024-3114,0,1,4568a18fb8588d4be1f890fb37ddb68ac84f02ef7275dbee1bb09a2a30ae323d,2024-08-23T17:04:56.070000 CVE-2024-31140,0,0,1880c35ac5ba5af45eb21413401eeeaab09be8abf223654f6041d65ff3324893,2024-03-28T16:07:30.893000 CVE-2024-31142,0,0,16502fe8420294098dded506476ced118645fadee97cfcf27213cce5ae7650bd,2024-05-16T15:44:44.683000 CVE-2024-31143,0,0,1f98a77fde40be218a5d12e6b00af8f536e83110a5110bb36201081d2e6f449f,2024-08-21T14:35:09.100000 @@ -250700,7 +250700,7 @@ CVE-2024-31266,0,0,b92d3472dc7ea2fb235b5bcb68cf81aecc30e7cb1ee1bd1aa6dafd92cf1bd CVE-2024-31267,0,0,040058e14e9fdb721a91dacc70a415fed99bbf6a8b0312f5e05b9e69e9a0c81b,2024-06-10T02:52:08.267000 CVE-2024-31268,0,0,cc3a61e7598538b428678882d7d6fc8be6fe9abdf509b0bae8b464c540b05a25,2024-04-15T13:15:51.577000 CVE-2024-31269,0,0,86a2fc976069d7e9fe6dbc1dcd3b4bc1f5d59b016a301859aeeb8e23bd95e8d6,2024-04-15T13:15:51.577000 -CVE-2024-3127,0,0,6cc9e310e622b055f109ee1067c668db0a55dbf9550eabccd044c67d5bcfc115,2024-08-22T16:15:08.590000 +CVE-2024-3127,0,1,ff67a0298bcd6cf2a7a13cb590352a7ca4f2bad73d0011b74a71b621cea4da5f,2024-08-23T16:18:28.547000 CVE-2024-31270,0,0,0d4fb68db93c302d6959c71357aec0a409fd68ac83d0cfe96c55d4825aec0e52,2024-05-08T17:05:24.083000 CVE-2024-31271,0,0,9ff92eb8bbc3e7bde801b4b1d4c1bb80f0abb134b87ad407d23ab89ee9509ab3,2024-04-15T13:15:51.577000 CVE-2024-31272,0,0,37b5ce6f43ab85f0748383fe28a22f89c4f6f43da0d4ba23932c516627b4eab9,2024-04-15T13:15:51.577000 @@ -251020,7 +251020,7 @@ CVE-2024-31759,0,0,a91ca69c3b65caf8011a472beaa42aae9a0ba32af5a57dbfbe22a6f7bd2fe CVE-2024-3176,0,0,b581b35f96c3e71f6864e9ec04e922ca6011a2abb5dc1a155976a5a31d9d63e9,2024-07-18T14:47:38.093000 CVE-2024-31760,0,0,f16f02679dd1d653421cfa1b377c9d22a632b6c4fccebc3d14af855ae5a31d71,2024-08-01T13:51:06.777000 CVE-2024-3177,0,0,572d97d46eb0c253ee03c3934b9d649f7fc7d88b4a672b4edb358cf1ed9c5fcc,2024-05-01T19:15:27.480000 -CVE-2024-31771,0,0,76e19bcea468daefd8080dca781bac1083b068d292b9de16777cde5001b0299b,2024-05-14T16:12:23.490000 +CVE-2024-31771,0,1,c3825df4b447ac4b345aa011816cd48fbe81f0c245e9701ffd2133b4087f8a30,2024-08-23T16:35:04.007000 CVE-2024-31777,0,0,ef9296c289f84fbcdb21b0dd4c346ef8f49d1c2a11212e62a5ece22535a4ac6c,2024-06-17T12:43:31.090000 CVE-2024-3178,0,0,724b5b9b62dd4e92f1f229f9f28fcb0bddf71f92c79c0b94c18fdb2af7074b09,2024-04-04T12:48:41.700000 CVE-2024-31783,0,0,dea8534fc1b6933b26cda6217a1982520e5d50556b9ff7b4e3fbbb8c80f4a35b,2024-04-16T13:24:07.103000 @@ -251501,6 +251501,7 @@ CVE-2024-32492,0,0,b8f37fd95afd9f3c0db9b82f19324f4f73a560600fb9ed3392952c1c91bb3 CVE-2024-32493,0,0,ffb6c116d41e9a5c89f19db9ee55928315a8849f99630d88960b7d23ca7c5aa5,2024-07-03T01:56:39.257000 CVE-2024-32498,0,0,906a6af4f331d76dafce3172b342bad5a72acec04065280273f5a351dbe47aff,2024-07-08T16:43:34.677000 CVE-2024-3250,0,0,c5f4cddd48066fbb0c4e0be3eeb988cdfc41e3f2cb53a12d5a0c784e567df5aa,2024-04-04T22:15:09.350000 +CVE-2024-32501,1,1,83099b2e387d1f79b9e98a80873d38de606a68b269f3b3e1ec56b45624a0b76d,2024-08-23T17:15:06.490000 CVE-2024-32502,0,0,6c01a3b4b5868656f3d57f70bafd56da976a1e8c28c0eec374ff444b607fb7d0,2024-08-08T15:35:08.940000 CVE-2024-32503,0,0,c69792145ae689a248325da35f7a774598c93088c517597b4569240a45140901,2024-08-19T15:35:05.037000 CVE-2024-32504,0,0,3994b5718a6a88903126308cc0ea3df60ba5aeb7ee0f236d9b16b618e0fabb55,2024-07-16T14:59:17.967000 @@ -251815,7 +251816,7 @@ CVE-2024-32816,0,0,07ef618f38a111b939c1604d02b213ea044873e8a9ea20856dbea33bba01e CVE-2024-32817,0,0,8d2006c9b6a5d6a9b9d5bef70fc5e21bcd93f5001033112c9e1270f7197a4e64,2024-04-24T13:39:42.883000 CVE-2024-32818,0,0,70f4ac55665de3a33130a2dd403b24f66717dd64859ed5b05de619a5101515b6,2024-06-10T02:52:08.267000 CVE-2024-32819,0,0,fe1c0b85edcfac0fa30d340f687f0b522a28c36df349d11be5e0d29d5afa16ed,2024-04-24T13:39:42.883000 -CVE-2024-3282,0,1,63c574ae98586110d5e4db1e559bd817cb68feb891685f3a291e5b35a9650f55,2024-08-23T15:35:06.070000 +CVE-2024-3282,0,1,62c932066f0a67fc99faff4fcbe507c80c1f07a84e066d29cab6b4c1beab1e28,2024-08-23T16:18:28.547000 CVE-2024-32820,0,0,5aa48b1b617dbdcc0e7988625c906afef7054f45e8e50fbfe5c26eaf7cbc525f,2024-06-10T02:52:08.267000 CVE-2024-32821,0,0,0e2e7529c79698d08866d46065126ddb4146f8f4e957c45b537f5173f4723cef,2024-06-10T02:52:08.267000 CVE-2024-32822,0,0,d10684d64aa9071956e86a3b8967958d92847110092eb8c0d01880de097f0ad7,2024-04-26T12:58:17.720000 @@ -251924,7 +251925,7 @@ CVE-2024-32931,0,0,9326e9f8b392349334a86865ecc959dc7773de2f71f9497f72eb74e7b458d CVE-2024-32932,0,0,4fb6f83f101b5683d5a8c45180e3a23cd3f8e2d3acfb194a28f95ea68de1746c,2024-07-02T17:44:45.700000 CVE-2024-32936,0,0,23e0b37e344ddd92e30dd7d9ca686ba35ea7eca4cd8b4bf43262492fe54966c0,2024-06-24T19:26:47.037000 CVE-2024-32937,0,0,652f451b71d39d99a50a831c1d05a67aee4d871187572c128dccbf3c57743878,2024-07-05T12:55:51.367000 -CVE-2024-32939,0,0,11e80ba2575da64eea1e59fabb5af0f80cf4de4d72cd6e77bcf2884a55e98e75,2024-08-22T12:48:02.790000 +CVE-2024-32939,0,1,231a2fa1e4d14286f5b9a08c8a32a2999ba97abf4192ef0188114e2b4511697a,2024-08-23T16:17:54.027000 CVE-2024-32943,0,0,fd4b837b9a53617894ef752d7ffb15062de7d93bb7a78599ea7bd4a8fd1edccf,2024-06-21T11:22:01.687000 CVE-2024-32944,0,0,4fb2f2be57e3c45f28985f6208cc39a6b7c152924d34534ee51269b999eeb2f4,2024-05-28T12:39:28.377000 CVE-2024-32945,0,0,9f5b696ff44fb79b838efdedc4008405b04d813372a113ffadf8b85acf95286e,2024-07-16T18:03:50.067000 @@ -252433,6 +252434,9 @@ CVE-2024-33849,0,0,711285af88da51034d770e4f7dba4f259d947b941ed83e4d1af2a2b96823f CVE-2024-3385,0,0,327b76cedb073b60c4f8c3e90737eb0ba35715647736f9323adf15afbb307026,2024-04-10T19:49:51.183000 CVE-2024-33850,0,0,95f27d9d9e057348262bcab0b02347c6a14020e669eb08e0851a75b104d83e3c,2024-06-11T13:54:12.057000 CVE-2024-33851,0,0,6fe0c9fc7bc19efc32ba623306eecc7b17efe8e6591ad62c2645cb513a9705c0,2024-04-29T12:42:03.667000 +CVE-2024-33852,1,1,70e7d81ba529f552ddade4031e2a7c5fe12dc99d044b09d31cc6e46ba9fabb87,2024-08-23T17:35:02.260000 +CVE-2024-33853,1,1,e2d45a463837bd8b734b26de9f8d90ad38a1f6dba9df34b8d4f2424d98bc1ae1,2024-08-23T17:35:03.370000 +CVE-2024-33854,1,1,a3e1e8087b23da4f9a3d913ac80bf2807864688bc482c0de91bd8e1690a0b213,2024-08-23T17:15:06.690000 CVE-2024-33856,0,0,e1bc615af0caf524dcab77cf6cf6563129862468d325102417ce19fd73712644,2024-07-03T01:58:59.643000 CVE-2024-33857,0,0,b9573703f999cbfa64c65ad4975e76915087495646b59661c3236ffafa92c9ce,2024-07-03T01:59:00.423000 CVE-2024-33858,0,0,b8a7f820dff1964081294a7545b9b29623794842450790b9d58fdec268c8e9d7,2024-05-07T20:07:58.737000 @@ -253292,7 +253296,7 @@ CVE-2024-35140,0,0,f651bda48ef3720086b4e55e66eab6a11168ee8b067c959fc6ebc63397794 CVE-2024-35142,0,0,eff9915c7a0945f0e06d680eabc808e5d5a4e4e1bca0bc89129e9dc0c0bf4eef,2024-05-31T19:14:47.793000 CVE-2024-35143,0,0,157edc929067584960228800256bf7e4e656c8fe568bfebf09213a67a4e1ab8c,2024-08-05T12:41:45.957000 CVE-2024-3515,0,0,8fd4dcadec7780b53436525af06eb6126290740e496ba02261842790bcfc4cf4,2024-07-03T02:06:19.180000 -CVE-2024-35151,0,1,50c46c119b543968ed958ecfb5b487a6d2fa4303602c68e6298210cebc9f30c1,2024-08-23T15:32:15.270000 +CVE-2024-35151,0,0,50c46c119b543968ed958ecfb5b487a6d2fa4303602c68e6298210cebc9f30c1,2024-08-23T15:32:15.270000 CVE-2024-35152,0,0,b41d5d8fb05afbf50d1ef06fd658b7850273eedb06cda6e29568f6ff2e26d7a2,2024-08-15T13:01:10.150000 CVE-2024-35153,0,0,bceffddb04f303a203c6bdd6ad6ed1855809c9b42c9ff2e40956bbe7b4fb3c29,2024-08-02T15:24:29.190000 CVE-2024-35154,0,0,7c994b7a6d7158efefd5e2d9a1e0bdd18fbe7152cacfbfaf67e2a7f91ec1260c,2024-07-11T13:05:54.930000 @@ -253423,7 +253427,7 @@ CVE-2024-35312,0,0,81ee7e5cffa0828718ff42985b5f71e3223019ea36fce71fb3a2d6856e31b CVE-2024-35313,0,0,1eb4867830818e97987762ca58d043d2f7f53fc926bce8bfb2e66b630c99ca4a,2024-05-20T13:00:34.807000 CVE-2024-3532,0,0,861b69b5ea2c2097afdbe40dd2c40123c9da7c07e730e8c939be6340175b992f,2024-05-17T02:39:59.520000 CVE-2024-35324,0,0,97e62876b974bdb37d65a00c14d6ae80121537e286249b5814c033b73ffdbb1b,2024-08-20T16:35:11.473000 -CVE-2024-35325,0,1,7f342c8939e3e3aa37ecb57604b9a53d7d3e875b227b792abf497049e1b7cce8,2024-08-23T15:43:02.650000 +CVE-2024-35325,0,0,7f342c8939e3e3aa37ecb57604b9a53d7d3e875b227b792abf497049e1b7cce8,2024-08-23T15:43:02.650000 CVE-2024-35326,0,0,ad7cc16d1aaa5f108e8887341cf441bba2b53899da4792ec6b77378bf1ba364c,2024-08-06T17:11:56.813000 CVE-2024-35328,0,0,fb4ef24959ef3b86e1d1e2a626668146540c0ab6d259d48f6d635a7a92dd50be,2024-07-19T15:25:50.030000 CVE-2024-35329,0,0,4d7aa78fa054a9381ac03b56ef696af98c93a3855ee38f8a31593aacb03aa73e,2024-08-02T03:15:51.520000 @@ -254279,14 +254283,14 @@ CVE-2024-36433,0,0,2d18270b463db9b276375797189132982b3093c59a94a1ba3c26d6b6e8046 CVE-2024-36434,0,0,8fba84c9c20ed6e9e38e371f6a7314cc80d9ab38ed1fc3ffdc1e7c8b52186a69,2024-08-01T13:52:49.800000 CVE-2024-36435,0,0,42aa941ee425d333c537ed403b5f168d15cf55caec805a299bb4c45521e1c947,2024-08-01T13:52:50.527000 CVE-2024-36438,0,0,fcbe2e02dbfe7753ae10ee196c2c3d66e08c15fdea4edc31b3da8e63f435a898,2024-08-01T13:52:51.240000 -CVE-2024-36439,0,0,edea588a3d58143973d3a88665fe7989ba6a7c452ce1625826da8fe7ccbaec07,2024-08-22T18:35:12.120000 +CVE-2024-36439,0,1,53640dcff33bc5be3aae865e96f45e5b04acc4f9a249851cd066fcd8fafec018,2024-08-23T16:18:28.547000 CVE-2024-3644,0,0,e904dffa636a621d1f1644a68a8bb26342dbf717ae684f12b60a37d102e4d87d,2024-05-16T13:03:05.353000 -CVE-2024-36440,0,0,b326a6820a4986176d290647e2ca4280ea1a45872937a97772f4d16e115926d6,2024-08-22T20:35:13.640000 -CVE-2024-36441,0,0,b7e607580a741b331b28097cfaeea480d665d3502e7441fdb4ad9127149df5d0,2024-08-22T19:35:29.793000 -CVE-2024-36442,0,1,540e2791bdec7c54bf17aba208f74aed8dc505ae469a6208e545b0a51c537fc5,2024-08-23T14:35:01.630000 -CVE-2024-36443,0,0,10f70b00f33288c8118fd3612f1ed4e1a88033326a408ee6f896806864ee0cf3,2024-08-22T19:35:30.730000 -CVE-2024-36444,0,0,7764dcc9d2cad1809eec2f3d12f8959ca5dfa6fa7ba59999bc2fa6d6ce039685,2024-08-22T15:15:16.117000 -CVE-2024-36445,0,0,fa564e1c9d1c227d129e726de305d057f0b73fb302963320d7035e07e6afee8d,2024-08-22T20:35:14.640000 +CVE-2024-36440,0,1,59ab2a39d6c2dd526eff525f8a252fc4b6d83dfd01305d7415645bc4cb89310a,2024-08-23T16:18:28.547000 +CVE-2024-36441,0,1,2b88ed4b9b9e3ad047e589055d5c5d9766a5fd9d7690c7cf12f1bc3c5c619d9d,2024-08-23T16:18:28.547000 +CVE-2024-36442,0,1,1c399162807c537e1f340452dbe4754afa92739719bfa0084f2ebab835ea4147,2024-08-23T16:18:28.547000 +CVE-2024-36443,0,1,38195f7df8580deaa4dd036c38bb714d8d18d45a4faa64844c80b85de41e3514,2024-08-23T16:18:28.547000 +CVE-2024-36444,0,1,701c0ae120419b8b40e9f66acb76f33dccd375668079a7ce4a952604cebbed26,2024-08-23T16:18:28.547000 +CVE-2024-36445,0,1,7d7e8c131c3075facba288799c042e0db5cd29389714aa43c2d4864faad7bb19,2024-08-23T16:18:28.547000 CVE-2024-36446,0,0,fb83b75323b3e400ca2145700cc136f4b6c6846fd602109bf32c3aabc452c8ad,2024-08-14T02:07:05.410000 CVE-2024-36448,0,0,1175cc623301466e8a019bc6e0833d0f29d9f1c79b10495f6dc5ff5c39383d2f,2024-08-05T17:15:41.557000 CVE-2024-3645,0,0,ea45063aa3cff8d7bb517959f0685ad339f1e48c249e10e3851af9fbba289420,2024-04-22T19:24:12.920000 @@ -254320,7 +254324,7 @@ CVE-2024-36484,0,0,d90e8addbe4310fb59424c1e2209c39c8eeed0a72f79133301d102644feba CVE-2024-36489,0,0,dc2f7108dc3678f1fb36a70c7ba7637636e10430721a5dfcf0db7d3d728d6d70,2024-06-21T11:22:01.687000 CVE-2024-3649,0,0,9d2e0b18ffe30ccf7cbc0e74a77daf1869af9483d0413cb80580942eae7d40a2,2024-05-02T18:00:37.360000 CVE-2024-36491,0,0,6efdbfe92fd7b110a7468fc85fb00858571ab2d21b32164f2daefb371e4e6cf2,2024-08-01T13:52:56.787000 -CVE-2024-36492,0,1,b0eb8123326503998f78707e30820b21ee51107ee551426ea35529c00e38520a,2024-08-23T14:51:08.580000 +CVE-2024-36492,0,0,b0eb8123326503998f78707e30820b21ee51107ee551426ea35529c00e38520a,2024-08-23T14:51:08.580000 CVE-2024-36495,0,0,10404a83be52d267985f87debff962346c26dcdc9e1b293bd8df22829bd96214,2024-07-08T14:18:38.843000 CVE-2024-36496,0,0,9b0852e2079a2b8f81e66f1c652acdc8b58764ac010cd86aadd442eb8de70d88,2024-07-03T02:03:14.090000 CVE-2024-36497,0,0,55716469f26311eaa7b551ebbfe7eab2676d8944c191b597609bbd8dff1f73b6,2024-07-03T02:03:14.280000 @@ -254332,10 +254336,10 @@ CVE-2024-36502,0,0,ce6106b712ac934aa3d46433d1d90bd69a47142ad6fe94c097ce1ae7a55cb CVE-2024-36503,0,0,cf0c7df8eb5d0563a3adb9382b90b37caa70a1002731797c28a41bd8794b11f6,2024-07-16T15:19:45.557000 CVE-2024-36505,0,0,5f3f0cdeca57fafe761af488854e771d0523077cbcea5a41dd4a6b4cc9d56e84,2024-08-22T14:36:31.643000 CVE-2024-3651,0,0,3337eb59719c2f9e59e57f7ed588f3375e47160773d149a8aeb60c1398d8674e,2024-07-11T14:58:01.803000 -CVE-2024-36514,1,1,b24c3ce48bf8401564b7fc8dd4318ad5d06f1a38ea78b2a98eb0c251cc3614c0,2024-08-23T14:15:09.993000 -CVE-2024-36515,1,1,52c651147197bf304e9c04d9372c50774b86a1d7ab7268af01983c8ebc4bde9c,2024-08-23T14:15:10.300000 -CVE-2024-36516,1,1,ea70a45b7454f6112c28d5e63be1cd00b84ee48a43dea1e9a52d70a4f843aec8,2024-08-23T14:15:10.523000 -CVE-2024-36517,1,1,86108afda3e11d6e269450271b37ee449ab1cfe8f83eada88313fc7fc688372c,2024-08-23T14:15:10.747000 +CVE-2024-36514,0,1,85a9ab123745e094edc59e335e997d187bf5b56edb405656f3a72d1beeca7831,2024-08-23T16:18:28.547000 +CVE-2024-36515,0,1,89621c0218f23a028220261603a630061b273898db80dacf59eabc0f011b954f,2024-08-23T16:18:28.547000 +CVE-2024-36516,0,1,d7ab0b35a5272807712747f2f295a40ee89fcea51e7a323b1d7c0aaf7573a2e6,2024-08-23T16:18:28.547000 +CVE-2024-36517,0,1,755e6bae28eb1c00d5135d19827beaea4ed136a2a3e907a0b488a2f49bfdaa8b,2024-08-23T16:18:28.547000 CVE-2024-36518,0,0,064cad3de67032c4f830b8ce3196cfd8df79e51094d50317231dcf250dd1a617,2024-08-12T13:41:36.517000 CVE-2024-3652,0,0,df71e97982cfb8bbdea2c8b53979ee8792aae4a73aef6703ec1b621d3f12e772,2024-05-01T17:15:37.793000 CVE-2024-36522,0,0,86674e42114231d1026f4ff35fe6fe6affeea594b7c00b1a81ef4e17dc0fe83d,2024-08-01T13:52:58.033000 @@ -254438,7 +254442,7 @@ CVE-2024-3675,0,0,e972ca8977b016371ea00bb70d419fc74d4c9e67fe4972a9be0bec45043510 CVE-2024-36755,0,0,3b099aa75ed922e8a97936dd1b72e1389b63debead504feb9a9ceec21772665e,2024-08-01T13:53:15.830000 CVE-2024-3676,0,0,8dc193c8609917b35ba91a632e73de4e92ed46289774a677f06060a8b04aac98,2024-05-14T19:17:55.627000 CVE-2024-36760,0,0,841ebe4cb8fe3bd81c22749215bf86b89aa9ddd323f20136f04010af75de3413,2024-07-03T02:03:35.990000 -CVE-2024-36761,0,0,2def433fa1c84a9e275856e3918a20f7afbf72e8563d9face0a26c843d2d46da,2024-06-13T18:36:09.010000 +CVE-2024-36761,0,1,1e5fd51d17b0e21bf35544ac12bdc53182789fbc90fa780c906895d3ededcc6c,2024-08-23T16:19:16.607000 CVE-2024-3677,0,0,6cc15bc7354ad532633e5fc6daa425aea3dc2f25b49c3017f86224f41078ae1a,2024-05-02T18:00:37.360000 CVE-2024-36773,0,0,4ac6d9752deb503d9154cd9b7cfebc1de88c0335c9fecfd94ecc432aebe75b9b,2024-08-22T19:35:32.557000 CVE-2024-36774,0,0,a0f118c44c070f7e889ef45df0f4c9a5fc8bc258ceac7eec500dce645d16bebe,2024-08-19T15:35:09.967000 @@ -254613,7 +254617,7 @@ CVE-2024-37004,0,0,eb821b24aec40cee5d3a4d83d3182056a26abdd06091705aaacecddd90b33 CVE-2024-37005,0,0,6346c3768c56adc2bd0ec197af628ad214cd9981413f2d5df7e8d7f1bc79c5d6,2024-07-03T02:04:00.877000 CVE-2024-37006,0,0,ce197589ee3e9b9abc62e5ee278117c11ae961db1cdfe5fd87c2da96a0f55f85,2024-07-03T02:04:01.090000 CVE-2024-37007,0,0,0fc601714096f5d925a9dbadf52718e2d07645aad03229b4044d058f28f4c32f,2024-07-03T02:04:01.303000 -CVE-2024-37008,0,0,63f0dc5cd207ef15641f66aef3117f90e8b853286deac8238bd90469fdd0043d,2024-08-21T12:30:33.697000 +CVE-2024-37008,0,1,106e1e680021f25ed53f6f8b0aaf520333a4087952b4f91100788e9d9f2839b0,2024-08-23T16:57:34.547000 CVE-2024-3701,0,0,d0eb5159a877411bc688498f011f247ba2357363b8455c201bea5174efe527d7,2024-08-21T03:15:05.297000 CVE-2024-37014,0,0,4d8eebb55f92fd637819ddb88e1adc8dcc510ce2876a7f33ecffd1498dc89404,2024-07-03T02:04:01.523000 CVE-2024-37015,0,0,06f63d10776f12944092a5aeb799730f5be21ccdf02c7eed139cbe7f55ddde9d,2024-08-14T02:07:05.410000 @@ -254838,7 +254842,7 @@ CVE-2024-37308,0,0,336df4ec31b1ef3d883fecdf49bdd16f6377a312101efbba29b098e960cd6 CVE-2024-37309,0,0,8b77a8abce2581f8670d973fc05d76a08446b9e83f8b1259f30461904bc289be,2024-06-13T18:35:19.777000 CVE-2024-3731,0,0,ef8eca77ff9380ae76e470c90fb3d29a9ba51986895ffc0d9d864ff0b2261547,2024-04-19T13:10:25.637000 CVE-2024-37310,0,0,ebbb16db84c251df0a21daf43e05809e2b107f80c6aa44f98ee9248f97601463,2024-07-11T13:05:54.930000 -CVE-2024-37311,1,1,fc2f1dfa7dd1a9c518fd3e57c92430dbbadd12332ecc44a48718ce652a3423f1,2024-08-23T15:15:15.617000 +CVE-2024-37311,0,1,1e56daa981ce349edbf6640ef571321f2d9d20d3be5a04d14dbeffba65f1165a,2024-08-23T16:18:28.547000 CVE-2024-37312,0,0,c9951de02441eaa79d1cb1dd04f0cb479ff9f95a9feb89bd2a12c3935f476481,2024-06-17T12:42:04.623000 CVE-2024-37313,0,0,aa0f6b44a59e1e1c752c1aa0bfc59db8945bb5237a8f4c76a445961f28196802,2024-06-17T12:42:04.623000 CVE-2024-37314,0,0,f12ff71c38b7717fdd7e5e9f4865b5f2a4d0e11306998c4a7309f7e193ab0430,2024-08-16T19:43:13.153000 @@ -255420,10 +255424,10 @@ CVE-2024-38200,0,0,d566a27ccd0b19f8229e9b6ce0a19c6b80662cfcd111693b799cdefa30455 CVE-2024-38201,0,0,53005100dd7a84f045f26370f955e41247a7f9394ca3dbb51556ee597d1af3a2,2024-08-15T20:30:00.737000 CVE-2024-38202,0,0,a5a58b9c1bd065b331e78383a23d6dbade69efe203405d06eac742a5e769b0bf,2024-08-16T19:15:09.843000 CVE-2024-38206,0,0,159422281702f43b217eea303b5c7354ebb2179d51ac658c6c0c018b5ec16a40,2024-08-14T00:15:08.213000 -CVE-2024-38208,0,0,071b4afe11d04b0b7bbc3f5fc553ee9296d20d9dd02aed9bf0e1c13c1e0ea5fc,2024-08-22T23:15:07.543000 -CVE-2024-38209,0,0,73852bece06cfeafeba434dc4c8183233f06affe23a3f3e24f2df29bfd9dc606,2024-08-22T23:15:07.740000 +CVE-2024-38208,0,1,7fc92509a570a1e5d45c63995a5f8b681725c52a83de8f2197ad3ca622a53f89,2024-08-23T16:18:28.547000 +CVE-2024-38209,0,1,df69d29eb26c6340927dbe029fafbfb5551308b10f0c4f3ef2c1acecd61a84ee,2024-08-23T16:18:28.547000 CVE-2024-3821,0,0,3ffbadbdaf34f564e9c498f1baa8fe758531e73989a1bbb861692bcbfdfc262c,2024-06-03T14:46:24.250000 -CVE-2024-38210,0,0,a52099eeb083f5b7dd2168904d746ee0f82984aa4f564de2aa2511374ecf47d4,2024-08-22T23:15:07.933000 +CVE-2024-38210,0,1,b6e3246f61ec567d69cf9c2ec7baf60359c2533e9a2b1500169508e59545a027,2024-08-23T16:18:28.547000 CVE-2024-38211,0,0,51e2e73d6d93c77460ccfd3a0684ba8ffade47d470b416e9dbd607fd57a6c040,2024-08-15T20:29:19.557000 CVE-2024-38213,0,0,a57ec7b97080baf05c7c67e1e8b814c6ef63e8cb4eb809fa5c6a9e16af89b3b3,2024-08-14T14:55:49.887000 CVE-2024-38214,0,0,36d440db09d4a2cbf6127fa4a6571f8fdbf7003c0a2820ce7057958b7fe01f75,2024-08-15T20:28:25.893000 @@ -255837,7 +255841,7 @@ CVE-2024-3879,0,0,a6db760401fb215a79d8f48992cc838e1a5c23839a86defd39dd342ef1c5f8 CVE-2024-38791,0,0,5a7109970d4cb90cfbe2865705276e5511d9a261f6cba475b72302a204ad6517,2024-08-02T12:59:43.990000 CVE-2024-3880,0,0,6dd5da57a8412b823038a64a32d07af4547e4dfdd637b54b90b4556bfd34431d,2024-06-04T19:20:26 CVE-2024-38806,0,0,aa1ff0885d521aab036aaf6506258a484aa869322b524482869e0e1df3ac4a48,2024-07-19T13:01:44.567000 -CVE-2024-38807,0,0,98504364a5f2e08e7b5482e44fe8cf8becbca547e6d346dca497fb37c38131ed,2024-08-23T09:15:07.453000 +CVE-2024-38807,0,1,6663b89433c5ca3162ac8e0676fc16d9b92af7b1823f84debbce11cbc23a4743,2024-08-23T16:18:28.547000 CVE-2024-38808,0,0,53d74bad70081ff05a1300457357e667e449199d0759115b64cb9ca097eeea3f,2024-08-20T15:44:20.567000 CVE-2024-3881,0,0,3699310594a82ce285b52bf9c21755fa8173160a66408c76064512e538b3fcc8,2024-05-17T02:40:10.360000 CVE-2024-38810,0,0,a8d05ba61ad79ab8e573251f3391c7e33071f14ecb67883defa939520cad5b0a,2024-08-20T15:44:20.567000 @@ -255847,7 +255851,7 @@ CVE-2024-3885,0,0,9b28a2ee85edfe77753e71858fb1438bd68a9b6ee299843f3a5752cca4753d CVE-2024-38856,0,0,5bdac33e3c1769f797760792fc523b4e832fcce7196ab622177b90376f5d9d69,2024-08-06T13:35:01.497000 CVE-2024-38857,0,0,857bbf4d5ee889c68ec1450930f0cf323232ab2d5a162824c8153ee668a7e638,2024-07-02T12:09:16.907000 CVE-2024-38867,0,0,0587553b0e73bb3d7fb83caa644dbd7ff748ca26af84fce237e8ae38fe20168b,2024-08-13T08:15:10.817000 -CVE-2024-38869,1,1,19414ab5f096a0c28ff77c66490f5cb5367c085c47f83c82ed83138b8cf4c89e,2024-08-23T15:15:15.843000 +CVE-2024-38869,0,1,2e719256333e68cfc52da08aadad75b750ae8662526d006b5263b89922821fcd,2024-08-23T16:18:28.547000 CVE-2024-3887,0,0,7992ee60f5f26d3f15d818db21e67277dbf02ae9d208c24a54e5c01935424c21,2024-05-16T13:03:05.353000 CVE-2024-38870,0,0,4167db09a3d5f0d1fb37f47670f8f4f5bc2492675561171c559ebd86c6b84b27,2024-07-18T12:28:43.707000 CVE-2024-38871,0,0,7b8770d00947c719a3dd8fe17f4a1ff79757e750998a4996ef9fa64a87345086,2024-07-29T14:12:08.783000 @@ -255992,7 +255996,7 @@ CVE-2024-3920,0,0,d2ca1c7329cc368cadc82dfb98e46c7d8057a15d660865d8baa61df971f743 CVE-2024-39202,0,0,348a7ae5d8dd5240a11e31748e08097038b5b43463791ad3f8bbf301dcb39ab4,2024-08-01T13:55:45.870000 CVE-2024-39203,0,0,18c47ac3dccac84f7f75ab68882aa989c3675ff79ff1b24a1d72e6e148699036,2024-07-09T15:00:49.997000 CVE-2024-39206,0,0,ff238c7a799bd8156023ed396579b78ee6764c0b74ea4e700d568262004d102c,2024-07-08T14:18:50.487000 -CVE-2024-39207,0,0,036923690cb1c7219bdbc37921ba10b53c63e774f7f4be50452133314f36f1c4,2024-06-28T10:27:00.920000 +CVE-2024-39207,0,1,49494954d802f1c665c4a01f3343dfa603146f5c61e074b2d6ca53d1106856d7,2024-08-23T16:35:05.620000 CVE-2024-39208,0,0,bfca919135cb16c924d14a3e46a90c36fb45e8d6f50651e543c7c3b74462722a,2024-07-03T02:05:43.393000 CVE-2024-39209,0,0,7ae48942b6b741e327b80a7d619fe2cbf17f09140a290b1dc29277309cf5b1dc,2024-08-01T13:55:46.647000 CVE-2024-3921,0,0,3df891161d817967027b36a59ee53de2ea83f1b76e0d4238df41e738cf592261,2024-08-09T20:35:04.863000 @@ -256019,7 +256023,7 @@ CVE-2024-39250,0,0,57928bd3b6fed5e7ca24bfa49026f1317017d625b7d77802180f56e1fd67f CVE-2024-39251,0,0,9df7da1e1e27461254efbb4f14985199d1f5c3e4c1c9dbcd995558e03e5bb519,2024-07-11T15:06:10.633000 CVE-2024-3926,0,0,5b04461367e6759c792ebfb9ad8f25b57b29be658a49f3088676d8721c7c2f63,2024-05-22T18:59:20.240000 CVE-2024-3927,0,0,c053c5f2098184ebda7812ad9ad17f8e9bcb0fa48f3cf62ccbd3c0beff2bc975,2024-05-22T12:46:53.887000 -CVE-2024-39274,0,1,6d4b03e5d97ff9e2231b9be6769126c78b619f16e46745a1adeaad7d24bf4316,2024-08-23T14:39:29.247000 +CVE-2024-39274,0,0,6d4b03e5d97ff9e2231b9be6769126c78b619f16e46745a1adeaad7d24bf4316,2024-08-23T14:39:29.247000 CVE-2024-39276,0,0,6f0f039dcabac20e005cba2452b1ca645538948e13817be1991e8b89038bb468,2024-06-25T18:50:42.040000 CVE-2024-39277,0,0,19274852af9a44581ed7b5da931e969f3e8eeda9b8a06df6105e4982b2efa2f4,2024-08-20T14:35:25.887000 CVE-2024-3928,0,0,3771bfd5d61bb660489266159da597b0f2838c8fcc0fdb41f660ee68264744db,2024-06-06T20:15:13.813000 @@ -256348,7 +256352,7 @@ CVE-2024-39705,0,0,91d39f33d5bd2d9618d124407e406b5aefb3921b0f0d526c128476a465358 CVE-2024-39708,0,0,2eafb164d29e8efc470b1c615a7a961efa5060a31edd6795a1174fbb57cde7b9,2024-08-15T16:15:20.100000 CVE-2024-3971,0,0,232de18e9e74ddfe0c81af44fc47161b6db81bcc698685ef24ea3f7084d9ef87,2024-07-29T16:51:34.570000 CVE-2024-39713,0,0,99e8a316dad486c18bb302062018548767182c9767b7c9ef5e1c3b6a3cdb13f2,2024-08-05T12:41:45.957000 -CVE-2024-39717,0,0,0287b7253c42801cd81bb87dcdcd0c884eb32e8da119d94075ee8a696b5cb3b3,2024-08-22T19:15:09.173000 +CVE-2024-39717,0,1,1a1c68364127b310b730570893efe8de086ac87f755e1a815dd5984726c8bce7,2024-08-23T17:35:04.543000 CVE-2024-3972,0,0,0caddd7b34d493c3554c875afe72275890f23d83038241874e85ef811a9076b6,2024-08-01T13:56:47.637000 CVE-2024-39723,0,0,003097d794792a3e1194202f71608927b35e402887d5f5ddf07d35b5dd183916,2024-07-11T14:54:10.243000 CVE-2024-39728,0,0,fba26233ce0c4692619efffa132c45bfb836485ad2132e6f2e6d7ce0ec6f97d0,2024-07-16T13:57:37.203000 @@ -256367,14 +256371,14 @@ CVE-2024-39740,0,0,03acc910317a10fe912464b7efeeb485740a2ca83e55d3c05a65c84915618 CVE-2024-39741,0,0,829c9dc10ec61ebda2ab0b49cc6a9c5e79410be7630ee14de90c81590961617f,2024-07-16T14:03:33.243000 CVE-2024-39742,0,0,d2c383b6f83715e80ad86c53a5952b482038888e11ae903f4721eb34788c653c,2024-08-07T16:08:52.997000 CVE-2024-39743,0,0,9176c5c22c144cd819fc7f93cb765aeb69d23c83aacdd30e057197adb10cc129,2024-08-07T16:10:15.813000 -CVE-2024-39744,0,1,eaaeebefac8456b26ecfd964a052066c190ef164bcd0d35d42d232bd669213ce,2024-08-23T15:25:31.390000 -CVE-2024-39745,0,1,76dcbb05d353e026eccc967feaecdea5409270418987883e30491009b8479ad5,2024-08-23T15:25:13.470000 -CVE-2024-39746,0,1,6375fbb4b5bb9c905c41c7f4d0b9ebb7e249deb4532114f1d7954e0a6335ab2c,2024-08-23T15:25:02.123000 +CVE-2024-39744,0,0,eaaeebefac8456b26ecfd964a052066c190ef164bcd0d35d42d232bd669213ce,2024-08-23T15:25:31.390000 +CVE-2024-39745,0,0,76dcbb05d353e026eccc967feaecdea5409270418987883e30491009b8479ad5,2024-08-23T15:25:13.470000 +CVE-2024-39746,0,0,6375fbb4b5bb9c905c41c7f4d0b9ebb7e249deb4532114f1d7954e0a6335ab2c,2024-08-23T15:25:02.123000 CVE-2024-39751,0,0,ca850876f5c8fc4ecaaca63a8428279a2bd033ba704cbd228180dbe8f0c1635b,2024-08-06T16:30:24.547000 CVE-2024-39767,0,0,3e2d929a0dec960247b2d08752313be7fe5d03de12cbd71addbfff64b71f8489,2024-07-16T18:04:02.993000 CVE-2024-3977,0,0,e9ddc667440c6dcbe059212d85a4e046d10d5ad7b4b151b497bb4963c631de68,2024-08-01T13:56:47.833000 -CVE-2024-39776,0,0,d375cf92d107deb4a4260c0cdd1844c7758bfad179a08835f00260dc4d40ef32,2024-08-22T20:15:08.750000 -CVE-2024-39777,0,1,4bc122687c91590f9c335b41e6e79e33e521fd532335f92edd7cb7db8b08fa07,2024-08-23T14:36:48.817000 +CVE-2024-39776,0,1,8b39df47cbc8ffd8596fdbf74b3d83a860b8891919acced573331707234996bf,2024-08-23T16:18:28.547000 +CVE-2024-39777,0,0,4bc122687c91590f9c335b41e6e79e33e521fd532335f92edd7cb7db8b08fa07,2024-08-23T14:36:48.817000 CVE-2024-39778,0,0,bb2539eb59e56cbeaf6e7ed7999fae0d5792d390eb9e1100733cc6f4b019e4fc,2024-08-19T16:20:52.980000 CVE-2024-3978,0,0,264c95fabf2474878692eedd3d0ccd0dbcfac72fb894e9f86052802e2ea09747,2024-08-01T13:56:48.040000 CVE-2024-3979,0,0,e9e7991f3b86f818ec400b9ec60245e440b2d51744d0b7d3598ed5add4c2b631,2024-06-06T20:15:14.127000 @@ -256382,7 +256386,7 @@ CVE-2024-39791,0,0,67ad59fd29829ae2f24abc2182dde7428e4f74acb93e703ae70c08f625fe2 CVE-2024-39792,0,0,89dfb5d6e1471517d66a74daaa8f0b2947fd2994f2ce01af52b42a5dfe4eec05,2024-08-19T16:20:28.967000 CVE-2024-39807,0,0,ba2c368fe4cdf413290b5bff8a949eddf35bb4de98ed47f43e524e6cb747e010,2024-07-05T17:07:47.090000 CVE-2024-39809,0,0,c569a9d6ae86025131a09eaedcfa15c9c40ca354c9f22b3a0f796bbc84856d4d,2024-08-19T16:19:52.530000 -CVE-2024-39810,0,0,8ffe6106cd3f81e6397f53ddc73e570adbc9f3eccdaec8333407da88229b5c23,2024-08-22T12:48:02.790000 +CVE-2024-39810,0,1,32d906c66fda3178aaaf67b328715612b9d762f16a6ecd0f62d6e5eaf48f095a,2024-08-23T16:16:36.907000 CVE-2024-39815,0,0,2d23504d87a7185e1f6c185524d0f78ab739cf6cb169d8e09b6dc1e083fb2cc8,2024-08-20T17:14:18.587000 CVE-2024-39817,0,0,1d1cd6a9e8c22fcd8349304542868600b6e99673901b52763ffb290c1ead2e5c,2024-08-06T16:30:24.547000 CVE-2024-39818,0,0,23a1489eb93e492f2f531059c176556ef0ad56414a5154c8c0ebf1d474d9bd4f,2024-08-14T17:49:14.177000 @@ -256398,13 +256402,14 @@ CVE-2024-39827,0,0,caf86200bd002a6aa70c894d1a6cc5e050d2263ea7091a801896c357b955c CVE-2024-39828,0,0,37815ac0cb1d59603d10017e1de409a6a7cef6f58ba5d0ea15f1cc9c3c9f34b5,2024-07-11T15:06:13.953000 CVE-2024-3983,0,0,96266c916334fb5a02e4aa53ae15055a84c8153845733e53311fdb712a51a549,2024-08-01T14:35:11.540000 CVE-2024-39830,0,0,fa16449dc31377b10db0f6c8fa3cd2e73175dcab5134adbfb18592dc79a4a80c,2024-07-05T17:08:50.197000 -CVE-2024-39832,0,1,4e3934d2762f9f7037c319199b04232a1818dd1ced3ad84be4d619c335cdb24b,2024-08-23T14:35:13.670000 -CVE-2024-39836,0,0,870699baa42666cb61b0f053e07cca54b7f29f07a2740a233a926d9e677f37c3,2024-08-22T12:48:02.790000 +CVE-2024-39832,0,0,4e3934d2762f9f7037c319199b04232a1818dd1ced3ad84be4d619c335cdb24b,2024-08-23T14:35:13.670000 +CVE-2024-39836,0,1,0d5fe8c5e6b07786a6f137526c846390a0820f10bee6c12207bd00a1009c33ce,2024-08-23T16:16:18.757000 CVE-2024-39837,0,0,c60120742f41154fefe3eaf4e38584ef459a2d1a28dab13e5a0225dc3e52fb1e,2024-08-01T16:45:25.400000 CVE-2024-39838,0,0,f1d266ac929ac8ff4f1b378f7710d38ca9858e2e9c50d8f3f7b866349ff32783,2024-08-05T12:41:45.957000 CVE-2024-39839,0,0,c4552c9b1ee7cea8a178134078e247b54a0ce7f628fb8b4d8589f1118253544d,2024-08-01T16:45:25.400000 CVE-2024-3984,0,0,9fd51fca8e9cb62e411ab69c310516342152a8240e3126272f1618181a2d89aa,2024-06-20T12:44:01.637000 CVE-2024-39840,0,0,5d7e4142131887a411bdbeea93ed887c2e0abb0654faa364c29fef4ac994d185,2024-07-03T02:05:52.307000 +CVE-2024-39841,1,1,a1802514eb8f93d9920c3c123acf53d19ac552f4047561da708e2c222045e17f,2024-08-23T17:15:06.780000 CVE-2024-39844,0,0,24513dbab8cf2462c08846394521d45521a891f52f216d702fb8431100a32c1f,2024-07-08T14:18:55.147000 CVE-2024-39846,0,0,cc3d14fb15e20c985bb7fdeb359e7a12ea1918f79b7c4c3ac03373ad528c69cf,2024-07-01T12:37:24.220000 CVE-2024-39848,0,0,8178bbb2814e5fa60c3351f00827b86e4d6b7b334f71560f5ea323ec84986fcf,2024-07-03T02:05:53.147000 @@ -256576,7 +256581,7 @@ CVE-2024-40430,0,0,819917321160eef63130d1d20449f426edcebc30c5d6dc539b6c68435ff1d CVE-2024-40433,0,0,e7a4ec9affcd5459ba2865b747a3c21f3af0ec6afc5f3d7573785ee38941782a,2024-08-01T13:57:28.500000 CVE-2024-4044,0,0,e5bbe7519a57f32e10b3da751a3cb9112f45a7270ca309aa6997e34b1ffc6b95,2024-05-14T16:11:39.510000 CVE-2024-4045,0,0,2ae0d8f233b2cc7f6d27d9d81b74b74fd6cc2876f88a425dbeb60d35e4802b53,2024-05-28T12:39:42.673000 -CVE-2024-40453,0,0,a63d732012a7b741a18e2d1a2fbf66b31e580a80c16419a5a08f6fa26146d80c,2024-08-21T17:24:59.627000 +CVE-2024-40453,0,1,4483c5209dc00972ed35087fa7a57143bcc3f4e4c2aa05f9c16e6199d4acac45,2024-08-23T17:35:05.463000 CVE-2024-40455,0,0,2b4af03841b1088e106e2c8470bdfc3454c77a8d4b576f687e8da463b4385ab7,2024-08-01T13:57:29.287000 CVE-2024-40456,0,0,f1acaf3e46ce38cdd4b72320186132bab37cc38f6f4c796e31eaece0545a5e4c,2024-08-01T13:57:29.487000 CVE-2024-4046,0,0,b162bb54ae31ac06a54238ce430265f513a39f78ee0aa36d5d6ff941168dcdb1,2024-05-14T16:11:39.510000 @@ -256595,7 +256600,7 @@ CVE-2024-40481,0,0,4827ebaf038f9227afaa10ae59d01fa6610f2bcdbbe677b5840a09b2a1985 CVE-2024-40482,0,0,77b0e0d738c085be01901fe452456d9f6f2c227935acf82b80697b6be23d963f,2024-08-13T01:13:50.130000 CVE-2024-40484,0,0,450f717e0dcf79c0d7625633ec58aab189af6e628b95e324782e3205e6fde516,2024-08-15T13:59:35.813000 CVE-2024-40486,0,0,4cd2f281e08f3291d37d3a4823af93070215d87d687ca41653f1c72ca427a7a7,2024-08-13T01:13:52.383000 -CVE-2024-40487,0,1,41af7da83500c8a75e7df05fb6c9f48916ac5794006d346f5d5ff76e523c1408,2024-08-23T15:35:06.307000 +CVE-2024-40487,0,0,41af7da83500c8a75e7df05fb6c9f48916ac5794006d346f5d5ff76e523c1408,2024-08-23T15:35:06.307000 CVE-2024-40488,0,0,935bd1c3b9e22ad2c8e572783ed910d0a85a3508107693b6f595be8805553bbf,2024-08-13T01:13:53.230000 CVE-2024-40492,0,0,887baeb8c822fbf96c83ae7c8317e551b9d380e125d5f646dfb0a8c0719647ab,2024-08-01T13:57:30.260000 CVE-2024-40495,0,0,0c92b9527f5126e4b4bbf0d1f0a16c194305be9e806244080172bf727ded6b6a,2024-08-01T13:57:31.037000 @@ -256725,7 +256730,7 @@ CVE-2024-4075,0,0,29d19ea935c989efa2e770180ba61eb06fe49f0b181d6d812a7498d3145b98 CVE-2024-40750,0,0,123c568c4a271c6bb023f9091df0f00fec1f937f3d0585148d7948581d7b9455,2024-07-11T13:06:13.187000 CVE-2024-4076,0,0,3600a7160ba6cb63d73da78d982aeb737757fd1783e0b44697873d9ae49c2d36,2024-08-01T13:59:24.073000 CVE-2024-40764,0,0,ab85577e2cb5d9a786ef6b191ba8264da7952ad06ab8f1b0e070c99f55710d56,2024-08-01T13:58:00.227000 -CVE-2024-40766,0,0,b7a2ce0b222ddbb5717399f093b215f1d59e66ecf4ed80615805c9001a7fe379,2024-08-23T07:15:03.643000 +CVE-2024-40766,0,1,9b19e3d52aaa135f9cc56596c996a927986297a8633542c152546999e540f888,2024-08-23T16:18:28.547000 CVE-2024-40767,0,0,0f0f227d49db4f76a18af060eeadd57ea0ca5da0ccc7bd26ef12905f9453740a,2024-07-30T19:19:40.767000 CVE-2024-4077,0,0,d4f08c4fa42913c8d00f3fecbe96233f1448e9383bf97ebcbeca4cc0f2c8ae2b,2024-04-25T13:18:02.660000 CVE-2024-40774,0,0,20f4c2f88088010929acd58158f18d58b2de8f6cd0c1c18a2a116c0b40766ad5,2024-08-20T15:16:40.210000 @@ -256744,19 +256749,19 @@ CVE-2024-40785,0,0,0ebfce5c55bfee438659b0a5ff21c26489a17105755c9acc95a453360d4cf CVE-2024-40786,0,0,1d5a22dc485257f61ad56f387446230ed28d8c6d76c2d4bb7e66185337af2307,2024-08-15T16:44:31.820000 CVE-2024-40787,0,0,5fb33d089922e96d0a9f5b028cf20ac8d3e2ca70e7c2ce76064a53e614698def,2024-07-30T13:32:45.943000 CVE-2024-40788,0,0,3ab0b681f2e6ff524b1a070d28f4a3ddfc36db9cdde8ce43f25cfd6cc37d6325,2024-07-30T13:32:45.943000 -CVE-2024-40789,0,1,d0cba5a2db3863932e9e1a9c379737076ce24b22d2521d505090b6fa80e9acdf,2024-08-23T15:38:01.380000 +CVE-2024-40789,0,0,d0cba5a2db3863932e9e1a9c379737076ce24b22d2521d505090b6fa80e9acdf,2024-08-23T15:38:01.380000 CVE-2024-4079,0,0,77480512c155cc1ba9c6d21d28dd3b07d5f78d0d04ff147411735ae27b258bce,2024-07-24T12:55:13.223000 -CVE-2024-40793,0,1,e270b48bbfb7457af71d2df8b98374cdb1521bf4ad146ca87a93b5903c957504,2024-08-23T15:55:17.410000 -CVE-2024-40794,0,1,0846f939e0e7c288e34ad63bc25a9b5387bb5773e036a49319e63c41d5246c45,2024-08-23T15:18:40.450000 -CVE-2024-40795,0,1,ecb3737fc9c1d9258aa88dabfa79d9f92976c4e445700e54c3486854d82d2502,2024-08-23T15:23:45.990000 -CVE-2024-40796,0,1,167dda6d5b53df5808d22d86ff64345a4ddef11147328dbbb9b5e6428b829c22,2024-08-23T15:11:50.193000 -CVE-2024-40798,0,1,6d1152787dcea537c7e301ba90812de2a5fee24ebce973ba886712a223c78f27,2024-08-23T15:10:16.290000 -CVE-2024-40799,0,1,30d98ec87bf2d9634952ceda39a0df401d585b86f88feda233e1fd632794577c,2024-08-23T15:08:08.647000 +CVE-2024-40793,0,0,e270b48bbfb7457af71d2df8b98374cdb1521bf4ad146ca87a93b5903c957504,2024-08-23T15:55:17.410000 +CVE-2024-40794,0,0,0846f939e0e7c288e34ad63bc25a9b5387bb5773e036a49319e63c41d5246c45,2024-08-23T15:18:40.450000 +CVE-2024-40795,0,0,ecb3737fc9c1d9258aa88dabfa79d9f92976c4e445700e54c3486854d82d2502,2024-08-23T15:23:45.990000 +CVE-2024-40796,0,0,167dda6d5b53df5808d22d86ff64345a4ddef11147328dbbb9b5e6428b829c22,2024-08-23T15:11:50.193000 +CVE-2024-40798,0,0,6d1152787dcea537c7e301ba90812de2a5fee24ebce973ba886712a223c78f27,2024-08-23T15:10:16.290000 +CVE-2024-40799,0,0,30d98ec87bf2d9634952ceda39a0df401d585b86f88feda233e1fd632794577c,2024-08-23T15:08:08.647000 CVE-2024-4080,0,0,6e71df6568bf77146867d1944749c9d0835b7b19c10d04222a53e49f387410f0,2024-07-24T12:55:13.223000 CVE-2024-40800,0,0,8982c6397894b1dc7853d99d7f7ed84917fd2baa65d0f955e452134c8e783d29,2024-08-01T13:58:06.780000 CVE-2024-40802,0,0,2f077053b399c3f7f7833d620863c41648e3e5560dfd43fbc619d567c4540b58,2024-08-01T13:58:07.597000 -CVE-2024-40803,0,1,250e23643ab70825c88d787d0aaf9fc9eb4a1612199960dbb1b65e0a8601ad01,2024-08-23T15:04:55.627000 -CVE-2024-40804,0,1,ab46704977e6768d85f2dbf53139c4a03d68e4040dbba0cf9e68285274f4f021,2024-08-23T14:54:40.643000 +CVE-2024-40803,0,0,250e23643ab70825c88d787d0aaf9fc9eb4a1612199960dbb1b65e0a8601ad01,2024-08-23T15:04:55.627000 +CVE-2024-40804,0,0,ab46704977e6768d85f2dbf53139c4a03d68e4040dbba0cf9e68285274f4f021,2024-08-23T14:54:40.643000 CVE-2024-40805,0,0,4c83496c1a4cb9a07935586f696b204e1383baaded642bf1ae2b05e48dccd547,2024-08-01T13:58:08.603000 CVE-2024-40806,0,0,de19bdc26ad947be78b25439a4c081cef03a9ac0cf8596ce40e06ed6659063cd,2024-08-15T16:42:08.780000 CVE-2024-40807,0,0,a57ec3a3bb089ed252f2f8c175043165750e676422e4f67fbb537c1821f4ad1a,2024-08-15T16:35:50.210000 @@ -256775,14 +256780,14 @@ CVE-2024-40821,0,0,487abc636b37954dfecb8c888cfc309cb83072f61f6b16a4997ec310f3270 CVE-2024-40822,0,0,bb4dda0f197923f13f28883f6d166542a31444c99bd5734a02cac506a8ead59e,2024-08-15T17:06:23.417000 CVE-2024-40823,0,0,67c48af0288d424c08a10899b8005bb32663e89913418e94f646262e5d0a3bd0,2024-08-15T17:08:03.857000 CVE-2024-40824,0,0,f7238499f6070a1c6bcd15f8bf3e89f1de8d2d27cbbecc98c8a027de77cf1ec1,2024-08-01T13:58:12.907000 -CVE-2024-40827,0,1,e7fe54c2477a039a62b334045d9b6bcf45e92847d1542e12e0d01f314b633ab2,2024-08-23T14:53:49.367000 +CVE-2024-40827,0,0,e7fe54c2477a039a62b334045d9b6bcf45e92847d1542e12e0d01f314b633ab2,2024-08-23T14:53:49.367000 CVE-2024-40828,0,0,fb7cd21b5df82c55cfc24f9118f5ae0e27252cbbe3373763d0e4e9ed672ae982,2024-08-01T13:58:13.833000 CVE-2024-40829,0,0,c1ac2731b87d00e7ad818e3a3bfad11d13fdebdc78388d402863b6006e9d6596,2024-08-01T13:58:14.633000 CVE-2024-4083,0,0,1cd1c6384007aa9a5a8af9731386deec2b0818df508019e87115186ced7033b5,2024-05-02T18:00:37.360000 -CVE-2024-40832,0,1,1f6fcc675c8b2967b77c036f65ff3a56745eca986c0523a4ea05d59ab0b0970b,2024-08-23T14:52:21.567000 -CVE-2024-40833,0,1,4f90ec4b62ff58c653ca95f4d7c03b5c77830d8dfff362eaa61fcfa6fd51a05d,2024-08-23T14:50:31.313000 -CVE-2024-40834,0,1,7e20f67bc8b08fc4adc47071793a554467422544bba4ba726067a06c6b9b9ed7,2024-08-23T14:40:52.523000 -CVE-2024-40835,0,1,ffa2d0f502e7a09e89b4898498fc215520bfece3735d19b72358067234b3c222,2024-08-23T14:39:03.070000 +CVE-2024-40832,0,0,1f6fcc675c8b2967b77c036f65ff3a56745eca986c0523a4ea05d59ab0b0970b,2024-08-23T14:52:21.567000 +CVE-2024-40833,0,0,4f90ec4b62ff58c653ca95f4d7c03b5c77830d8dfff362eaa61fcfa6fd51a05d,2024-08-23T14:50:31.313000 +CVE-2024-40834,0,0,7e20f67bc8b08fc4adc47071793a554467422544bba4ba726067a06c6b9b9ed7,2024-08-23T14:40:52.523000 +CVE-2024-40835,0,0,ffa2d0f502e7a09e89b4898498fc215520bfece3735d19b72358067234b3c222,2024-08-23T14:39:03.070000 CVE-2024-40836,0,0,3f8d294ac16d143cb335a801addaeae273151ae88e0d093a406c7dfedffe62dd,2024-08-01T13:58:15.220000 CVE-2024-4084,0,0,aed2355093521159d48a9084a5a18f34499717e2daefb72a4c03148c5f7b9d24,2024-06-11T16:44:49.090000 CVE-2024-4085,0,0,7aad6a4056b6c332cceb43166a488ef1c1b3002f44d4bee7dddba365a66e15ea,2024-05-02T18:00:37.360000 @@ -256791,9 +256796,9 @@ CVE-2024-4087,0,0,559dc8fcb531eb7d96e390fa33463b50a20c5a688e8dbefeb3187bf1d2c5f7 CVE-2024-40872,0,0,61b6054f8d04261e92c08a44feec16dc1d8422a97543a2162e5dea5f0a6c8f9d,2024-07-26T12:38:41.683000 CVE-2024-40873,0,0,6df1707815f9f38105b50cd71b6fad1bdaf7a6f3e3c945bc399ab848fdd0a9bf,2024-08-02T19:57:17.407000 CVE-2024-4088,0,0,61cc31924b86843bbd20c326ef7465dc1aa394b548458b2e1a9fc62c09ede628,2024-06-11T17:11:30.193000 -CVE-2024-40883,0,0,dacd9a67232f6d97da8b548085eb71f69250fd3fec34bd945dc78c157c912274,2024-08-01T12:42:36.933000 -CVE-2024-40884,0,0,9dc081271de7d95f10da0bf793d111f8d53dd0e5b21b249774ac65c34f857073,2024-08-22T16:15:08.797000 -CVE-2024-40886,0,0,956e61b02c76a4462886dd7b546df3fa5ab5cdbdf99796901fd42a9badb0564a,2024-08-22T12:48:02.790000 +CVE-2024-40883,0,1,779af21aee21250f6c415f2fd0adbd2ff021a48fecfce470c43b9db58f959740,2024-08-23T16:52:30.277000 +CVE-2024-40884,0,1,c8797b81ca17f130e9b15061a257e8838b29d835c417f35d4ed5fe661f9275fc,2024-08-23T16:18:28.547000 +CVE-2024-40886,0,1,366f3546e42ed526b269e117ba5fde90b643767db321194ac7a300a3dda42364,2024-08-23T16:09:31.887000 CVE-2024-40892,0,0,80f2c69eafcb531435cc671447d237ff8792f374d8c58f10182688d813811ab4,2024-08-21T18:15:09.710000 CVE-2024-40893,0,0,3220dba971e1861a31a0659deabcf8dc81ec736d5ed6a5b82a9eb1d0c8650fcc,2024-08-21T18:15:09.803000 CVE-2024-40895,0,0,8c1e79c4f9b4c4aa0a454566e9355d762509535d530511413d5b712e02da1fc1,2024-08-01T13:58:15.617000 @@ -257050,7 +257055,7 @@ CVE-2024-41141,0,0,66e666e17c3fd137fec7c9da37ae1ceec042d1fec499bcfa85959d0b04733 CVE-2024-41143,0,0,86895945f47e1361478000a71a2798af8709b921e75a70b1e72755ffb197a147,2024-07-29T14:12:08.783000 CVE-2024-41144,0,0,beef6d47444f75a70cc53f4dcdee75e777176599a5e18a0e5bf9ea36f35cb6ca,2024-08-01T16:45:25.400000 CVE-2024-4115,0,0,89bc89df66a101d446d6568b359dec67345256fa579984420e2e2fe7ea4994ac,2024-06-04T19:20:29.937000 -CVE-2024-41150,1,1,3198759aebcaa54afcd9a84d6b9e8f9160f7f4b351a885a1ba1c757fc06d8687,2024-08-23T15:15:16.120000 +CVE-2024-41150,0,1,be975cfac01fea06f813e839afe5f779f355c1ad5f5bc12f449321d34ced3439,2024-08-23T16:18:28.547000 CVE-2024-4116,0,0,6ee64e85b69f8f11f599040da371bf02d3a94742e1ecd0f467d9a48f26243458,2024-05-17T02:40:16.110000 CVE-2024-41161,0,0,9b33361091df6923832caa53c78a9e46bbbedfd096d5512869c0f1eed0413824,2024-08-20T17:09:50.647000 CVE-2024-41162,0,0,53987655880d54b7aaaa5f090e7e843742788b903e9c4098307440abc2292d17,2024-08-01T16:45:25.400000 @@ -257101,7 +257106,7 @@ CVE-2024-41270,0,0,af12a3d2be324bb3d9e2b16ff7d039367afc9e03066837308e275993680c0 CVE-2024-4128,0,0,68bc0506eec8fccf6c4228f6f90915fa5b089633c8bc20338b2c6bd4b4236a0b,2024-05-02T18:00:37.360000 CVE-2024-41281,0,0,acd5274a5314a460f4482234d2c8af8da53f6324e375946a6feb8a82983d1186,2024-08-01T13:58:25.943000 CVE-2024-4129,0,0,f2fba94e29dd925b8a56a23f2711717731ea628ca4457222b442fc21c3f8c80a,2024-05-14T16:11:39.510000 -CVE-2024-41304,0,0,50eb5d3ccf87bf5dc8e8d40b784bffa46248caaebc645a20bf8eaeddf45f3d43,2024-07-31T12:57:02.300000 +CVE-2024-41304,0,1,97c8e67643f8470191a2e05ce641725b816a8cc5ff59a9e38a00154810fc7f9e,2024-08-23T16:35:06.883000 CVE-2024-41305,0,0,44375e3d9aedae768570d453a5746b314221c07760efe679991b65a52a72cbb1,2024-08-08T14:36:06.423000 CVE-2024-41308,0,0,0cfb1f5a539d1b3ab56fa248bc4e6b56744120f3ffd7eb646c940bb1f8d27a55,2024-08-08T15:04:28.510000 CVE-2024-41309,0,0,b9bc578a75924505757e6c223f9b414f575de364b8af8a3b843d1bd2707bdb26,2024-08-08T15:35:19.553000 @@ -257192,7 +257197,7 @@ CVE-2024-41613,0,0,775a6c9724ba70bc56dce8939e74722c2b403153bd1f36f976e189d003a6a CVE-2024-41614,0,0,97dd4cb6722c16dd67b90bd84237880c8504a680bb995ffa9e8927a86d821a05,2024-08-14T18:14:16.073000 CVE-2024-41616,0,0,a87f80cfe19fdc1adad71691ba6015b314ae0892eefb4d086c289749db2f63df,2024-08-07T20:54:20.793000 CVE-2024-4162,0,0,1a4f39929c1df6d420ff35b2d8de51a57c5e5378a57b6e7a1a35abc1b5a3dc57,2024-05-08T13:15:00.690000 -CVE-2024-41623,0,1,c5ad0592f1bc8234d1c1b4349fa5edc0884d162d738c86d78b923fc809fc8e63,2024-08-23T15:35:07.653000 +CVE-2024-41623,0,0,c5ad0592f1bc8234d1c1b4349fa5edc0884d162d738c86d78b923fc809fc8e63,2024-08-23T15:35:07.653000 CVE-2024-41624,0,0,300a907d59c60bf938fbbe11abf1d1dd305a7cd2619bf29e5e11f38514dc3443,2024-07-29T16:21:52.517000 CVE-2024-41628,0,0,3f95419a732116ba5016aeec3d83a528b6096a3cc023e4d133c06f26311a9cae,2024-08-06T21:16:03.323000 CVE-2024-4163,0,0,69022c7df60536fa7bdfb20d2705efebe8d2d6c2c39bf59b2dcb5940921dba2c,2024-07-03T02:07:10.047000 @@ -257222,8 +257227,8 @@ CVE-2024-4167,0,0,a726fa69800dd2a00fe506dc5d29a370681725e72bfe1ac34a8206d5070886 CVE-2024-41670,0,0,d4de1327e25e7abc39266a562cb92a3c058d45ff783401ce0a66d0266a4c8b41,2024-07-29T14:12:08.783000 CVE-2024-41671,0,0,246285a77daa13e5014904fc895b261c0c0cff4d8c9ca9cc03eeeb85acc4b806,2024-07-29T16:21:52.517000 CVE-2024-41672,0,0,22d9ca4e03b108f26bbb384eff42397f3ecb90b1b86b629c7d5509df37cbcfd2,2024-07-25T12:36:39.947000 -CVE-2024-41674,0,0,2efc360b62688be6ccef330f160a0fdc2fcd4a58aa8980d70f1862bf900859a3,2024-08-21T16:06:23.153000 -CVE-2024-41675,0,0,c552f3fd4715304dafe4a5eed89c59bfbc25d98add0df31c42e0865266e54768,2024-08-21T16:06:23.153000 +CVE-2024-41674,0,1,e673b8205e82a534b9a977608e67254dbf60c56054d2121630b866936cabb953,2024-08-23T17:06:58.063000 +CVE-2024-41675,0,1,99d7bb404b6db7a620ac267d34a06ef7dcdda9c80bdd1ecb6c741290a9b47f60,2024-08-23T17:07:28.247000 CVE-2024-41676,0,0,f8c727903895dd3f774fa8fafadf4d13b194d23bd32750d21228bccd7e3862a1,2024-08-23T13:44:42.487000 CVE-2024-41677,0,0,350177b79949244cfbc185c5f18aee412a8902a49d36a53e1d4b50536f1effd5,2024-08-12T18:51:29.497000 CVE-2024-4168,0,0,7f4f833c88738c683a47d814a058bf8a730868170937a9aca799097bc79bf22f,2024-06-04T19:20:31.690000 @@ -257321,6 +257326,15 @@ CVE-2024-41835,0,0,79c86df6665f091ccf38637e3904931e0a79e20c4f60784272f388a048f56 CVE-2024-41836,0,0,447eeb0d32c0b3fbb708b5b9d75636c09225896b7443055b6e14477ceb9e8a2d,2024-07-24T12:55:13.223000 CVE-2024-41839,0,0,5fe8ccf2e82b1dbd1e8f5be23a4b35f149d0ed119de3feeae98a9459138645a8,2024-07-24T12:55:13.223000 CVE-2024-41840,0,0,3f28aebde978cc1f8839cc676dd62bb75d63b90fe1295e0e4ccf51b0e1e39f51,2024-08-19T18:54:02.200000 +CVE-2024-41841,1,1,4519211bfec6f0ccfdecc51f497af2900f9a7078392ab2e97034f2da2a5ba5cc,2024-08-23T17:15:06.847000 +CVE-2024-41842,1,1,33168dbe70834b41be376e64cf280c686c75fde49fdb779cc8cbc87ea3c20719,2024-08-23T17:15:07.100000 +CVE-2024-41843,1,1,b01c8934bddd0667b3811a0ec05a68e3568affa3a09786c54e6a220ba3b903f5,2024-08-23T17:15:07.320000 +CVE-2024-41844,1,1,90af10d8d6a945a227c2c07db0fce097500db23b2be89348a38a35817a9bf172,2024-08-23T17:15:07.550000 +CVE-2024-41845,1,1,ad7daa73ae6aece18109c2cc9379198930e646ea5c0566de565a52e8c787402e,2024-08-23T17:15:07.803000 +CVE-2024-41846,1,1,db17bb67063003e98d62562da3e0e563a49a7d687546054845775db8d7c29f16,2024-08-23T17:15:08.033000 +CVE-2024-41847,1,1,927bb2d354095623fc976ff81cea7fc146f6702cf5d689dab70e719f92d600bd,2024-08-23T17:15:08.240000 +CVE-2024-41848,1,1,e34a22e17b787be8bb61e9f06bc2e9481565791fddd3b074c61b511772cc5559,2024-08-23T17:15:08.447000 +CVE-2024-41849,1,1,0df0c0da61a409dffe6c667fcbcad0c4579fab2fe3138ce7d6fbea90b1a3c4bc,2024-08-23T17:15:08.697000 CVE-2024-4185,0,0,2ebb1e96affd30f65338d1aa453a686ffeaefddcc6c26d6c3c25de17e937fc18,2024-04-30T13:11:16.690000 CVE-2024-41850,0,0,105ee8d7e128a7bfef46a6f6d9b6049d5c28c9d7445c37259311e21c46bcceec,2024-08-19T18:41:14.083000 CVE-2024-41851,0,0,f382ba2978b7b108b5ca794ab973cbc168b42571d6dd14e506c0111f63fbbf25,2024-08-19T18:41:29.073000 @@ -257338,6 +257352,10 @@ CVE-2024-41864,0,0,59e830b96a597bc93dcda9cbef385e1fdf95773045c5f29bc0bb9381e7cb3 CVE-2024-41865,0,0,f8ad10055028d3dfea657c3bbd8eb5b04fbd0fb8a1dcfeb71cfad07c3751149a,2024-08-19T18:44:04.163000 CVE-2024-41866,0,0,b06a8427315afa6008377ed5627aeeeb7bf41e3428063742d7f1fa0c27e9a784,2024-08-19T18:44:22.577000 CVE-2024-4187,0,0,59e73639acf686e0c0fe315911f8a7728baeee66452eb3299dce70437688c22e,2024-08-15T14:45:27.797000 +CVE-2024-41875,1,1,197d17b000f2b66a28d135f4382a716fc212397979eeb36572d588f80b94a037,2024-08-23T17:15:08.927000 +CVE-2024-41876,1,1,0998fc536523c7b8134f45a909dd6e103e928409e378e567b5e98a09e47f3f34,2024-08-23T17:15:09.137000 +CVE-2024-41877,1,1,1aade1e41caed2c575553ca5fd3c883d10fa7091653e6b2946151ad6966c722c,2024-08-23T17:15:09.370000 +CVE-2024-41878,1,1,e7da989aa90312614a704145ba4b5bf47b36da8f8572e8c195db05cfcd845bd0,2024-08-23T17:15:09.610000 CVE-2024-4188,0,0,5459733739e7d5773814c2ce2922cf5b8b26c5398a641d72cfafdd22a4667489,2024-07-31T12:57:02.300000 CVE-2024-41880,0,0,fb22214cf23b63ecac791ad54f65d75460df9fd80fc112c0736bcd80f342f363,2024-08-01T13:59:12.507000 CVE-2024-41881,0,0,649cc07cf7de21549ce70eef1f2f35714a84b1ff95e773c0e75090d3c6d27c2e,2024-08-01T13:59:13.313000 @@ -257364,7 +257382,7 @@ CVE-2024-41924,0,0,06cc2d8c551d8fd39f4e2ff31447bb4070ddde2d992cf8f0c8cb1b0035280 CVE-2024-41926,0,0,13c43cd281b4a9b74f2496b8daab80f10df1e7e6bc024b50c3c661b49018ccc2,2024-08-01T16:45:25.400000 CVE-2024-4193,0,0,4d4f4fcde78b01b33e30a077c434c1714d01a9ac9cd58d916bc86b963b6ddbd7,2024-05-14T16:11:39.510000 CVE-2024-41936,0,0,d330b2a32a604797fc4eb94f395ba3140911090caf0d19e4d7603d421735298b,2024-08-20T16:26:54.663000 -CVE-2024-41937,0,0,0df28de5643f0c9acf3f67c95f507dc7e1a9360e16ae09e6bb16a4e1b3aaf747,2024-08-21T17:25:08.560000 +CVE-2024-41937,0,1,17d01be9af92612ee6b4d89126a811836507d3fbf35417e172928be42551212a,2024-08-23T16:21:21.893000 CVE-2024-41938,0,0,3ab7c3a39df7962916b58b6a8012e354ce7c2e72731bfa6d3bfa597d2e12afa7,2024-08-14T18:08:42.777000 CVE-2024-41939,0,0,4183ed079a81e71abb2d3254aa5006833dc573353e4bf1b5fd01bacb1a530db3,2024-08-14T18:09:24.030000 CVE-2024-4194,0,0,cb2c64b568e3bd7c78c9d4f736651c66722818abe246f3bc5aedd70e3521cb96,2024-06-06T14:17:35.017000 @@ -257426,7 +257444,7 @@ CVE-2024-42036,0,0,9fa3f6bbe36cdb97c5a73a0d11595979b8342bbc24fd98d5ed835c13ac0fc CVE-2024-42037,0,0,296bbbcc38bf4dc1ee22bb6312f79d292e4b7d911256417ad66b6bb658d995e3,2024-08-08T13:04:18.753000 CVE-2024-42038,0,0,eb94dedf88ce1c88ce5bfbc4f90e50df94d98b05443b426e18ed40ec47c0c549,2024-08-08T13:04:18.753000 CVE-2024-4204,0,0,862cae0d91d079678d989fc30b77e9abff361be6cebd83fcf5dbeecd5c0be203,2024-05-17T18:36:05.263000 -CVE-2024-42040,1,1,fd472e3dc5b239671916b608d45b00fdeb77db2fa235482ca8693ee1f1e3315a,2024-08-23T15:15:16.323000 +CVE-2024-42040,0,1,7c75367ff650806d23d160b17618dc17ae59219f450da0367a1d490a5a6ad6d0,2024-08-23T16:18:28.547000 CVE-2024-42049,0,0,9abf5139ab1afe8d55de5e333c97afa73e09c57ae34abc37f55eb8e975c40df6,2024-08-01T13:59:18.253000 CVE-2024-4205,0,0,3bc679c8856618cb4acfda15e793a18c79adc1e7d27d459136a04f77802a5775,2024-05-31T13:01:46.727000 CVE-2024-42050,0,0,d2a1e67e449aa6326dde0504a879c37570d5ac7e2fe0ffc282ef9a9581af71d3,2024-08-01T13:59:19.083000 @@ -257478,7 +257496,7 @@ CVE-2024-42096,0,0,a51020378e9a53609e2b9850304f0387470e69965face3c10e6612960442f CVE-2024-42097,0,0,daadf967612be031bceee3a5cf360a6b7c8656301780004df63ba219cd6f1380,2024-07-30T13:33:30.653000 CVE-2024-42098,0,0,8a4ff599a1d3537153a17ab56baf7b7f5c48f0c9fee61b69ebcae9dd8a773bcb,2024-07-30T13:33:30.653000 CVE-2024-42099,0,0,3238974df1fe016605810e840ae3252de7cbfd02bda034d599f06c9b461b006a,2024-07-30T13:32:45.943000 -CVE-2024-4210,0,0,3de0526bc7ee4d2ee3e85387e784b47b575c14d9043bdb29c130980f21c212c3,2024-08-08T13:04:18.753000 +CVE-2024-4210,0,1,1de7eb5485317b66c30ef10a923cca5446084d9b34c55d329adb40ead2a3c10b,2024-08-23T16:56:07.537000 CVE-2024-42100,0,0,9f2359920901de15a72f82c74dd31f7cfd476c8a0553c2aa7b3605f8c3eb567f,2024-07-30T13:32:45.943000 CVE-2024-42101,0,0,ee2417d1fe5ad184a427f58671dedfca7c7497bddaa125be1e3080536f8c3d24,2024-08-22T12:58:21.527000 CVE-2024-42102,0,0,6316e9599f21ebdb21ae9fa78c744fcee5e0d5e7ec56a75728d7b5f4ac6d9f1a,2024-08-21T20:48:01.940000 @@ -257503,7 +257521,7 @@ CVE-2024-4212,0,0,5766e7a6d4fbc74d070c835b010281385271ca336cbd1f30b8212e7da6caf8 CVE-2024-42120,0,0,692318adb3e3bc8ee3327c58f85ce2f0a478d2c89b683bc854fcb9227f9c337f,2024-07-30T13:32:45.943000 CVE-2024-42121,0,0,c5e25bbf3c91bf25bcaa878ff72039e7afac3b1d4b647d19649fd2a0460d64a7,2024-07-30T13:32:45.943000 CVE-2024-42122,0,0,7814b08e1378add114153cbf0cc486cf9d6e60b6574ffccedca470eec5c56306,2024-07-30T13:32:45.943000 -CVE-2024-42123,0,1,b9b512a4ac6ec22c9bc1d525d88b6db6a1f01966b278ee4c7ad03b69a5e85a9c,2024-08-23T14:13:05.580000 +CVE-2024-42123,0,0,b9b512a4ac6ec22c9bc1d525d88b6db6a1f01966b278ee4c7ad03b69a5e85a9c,2024-08-23T14:13:05.580000 CVE-2024-42124,0,0,fac73a1c1853cbd61b92ef3a19f9f7f6792c7fb13275a38cdccfee119802151b,2024-07-30T13:32:45.943000 CVE-2024-42125,0,0,623dede6e7a867ee2a4793db37771abbdecba1b4f67d59179866a3aa7e89529c,2024-07-30T13:32:45.943000 CVE-2024-42126,0,0,5ead821db32439b0032661ea186379c9f55f1afa1bc2284b38295084f9f2435e,2024-08-19T05:15:06.927000 @@ -257522,7 +257540,7 @@ CVE-2024-42137,0,0,523cd9dd4235194d000457727c7ba7664f63613021eaea733ce7cdc24a8dd CVE-2024-42138,0,0,66bd3f3c0b6409d31b381c30c4907ff7a898b21b08eef89ddd720c05b185a24c,2024-07-30T13:32:45.943000 CVE-2024-42139,0,0,3bd10747b9eb55753638e6583d2c7f6f99447a69b235be4a494e06bae42b0e90,2024-07-30T13:32:45.943000 CVE-2024-4214,0,0,6dc95cb08891bc473beaea6b69701e404acb0b7494c8f630888ffa867e36a2c9,2024-05-17T18:35:35.070000 -CVE-2024-42140,0,1,01bd7b3e10b61d76ef609a83e68164ffee7900b194476a019947f3ff57644488,2024-08-23T14:08:54.117000 +CVE-2024-42140,0,0,01bd7b3e10b61d76ef609a83e68164ffee7900b194476a019947f3ff57644488,2024-08-23T14:08:54.117000 CVE-2024-42141,0,0,db183b6c33e94886efc2c75f26bcbef46be70e3efb08ba3376b4b377f728d920,2024-07-30T13:32:45.943000 CVE-2024-42142,0,0,ac8a77e5f376a6960fcc1efb160dcd9b39865732a8e7c6e5248ae7e8814cf081,2024-07-30T13:32:45.943000 CVE-2024-42143,0,0,b791ee8584aad3fab0f6133b2c42055a932f86f21da9efd809060c7844d97c38,2024-08-22T00:15:06.020000 @@ -257689,6 +257707,7 @@ CVE-2024-42360,0,0,c0e81a640f58f96b9fc0250139f55b49001f14d12c83fe8a549cad0d8c4e0 CVE-2024-42361,0,0,5d36be7b51525539b0b8ae62b66b7f8640ec3cb8e6a3450f2b1ad7da62e59af6,2024-08-21T12:30:33.697000 CVE-2024-42362,0,0,31ef3287f3935e217a1d7bfe2a60b1c3c47582894049ac650e7ed832aa61c859,2024-08-21T12:30:33.697000 CVE-2024-42363,0,0,845d80b3d90627c09cd2ebcd1015d3397a70bb5dfd2fb99126f84654bc7633e2,2024-08-21T12:30:33.697000 +CVE-2024-42364,1,1,4c3af5024e60bada8ffc9756b86fe112164c9d8aeb4b4858c936071d813f7c5c,2024-08-23T16:18:28.547000 CVE-2024-42365,0,0,cd9316acef63aa01c9388716e86faa1c498776bc0209be92960fb577e4f0b965,2024-08-08T18:55:19.180000 CVE-2024-42366,0,0,26d79ce86c657c865adda744afaa0f4e93052091893cacc16340b64f87dbee28,2024-08-08T18:55:19.180000 CVE-2024-42367,0,0,78b96b1f30a7354fdfb7431aa08d9784ec8c3726b77126448b6109517286436c,2024-08-12T13:41:36.517000 @@ -257707,16 +257726,16 @@ CVE-2024-4239,0,0,cecc2be82896f12bf6cdae75a3b125d58c075d387f3da865cfaf565a2c4548 CVE-2024-42393,0,0,dccd6d06051b1376b790b00ce1bb00ad00ff605de076bb7cd98815c096883960,2024-08-12T18:22:45.023000 CVE-2024-42394,0,0,3fe51273497ddc687f2c439e086f8a7a30ea6afb40f9bca0dc53718488d7bc49,2024-08-12T18:23:19.533000 CVE-2024-42395,0,0,5ee69c7240e27d4f3c6f1cb04e94fbb984a7c6f59b13e977c958944ad3c06ea4,2024-08-12T18:23:57.077000 -CVE-2024-42396,0,1,61842c663617981875ce1b14ffadee0cdbdbdaa8d4c54b13c16553eef26dc132,2024-08-23T15:07:02.900000 -CVE-2024-42397,0,1,8c2898f9f7624317e7a3e507ec3f15e8992c38cc7e65a1696439891437bceba6,2024-08-23T15:06:46.023000 -CVE-2024-42398,0,1,ecec97745a6273f6b5e5720bfa1d0ff4b8e46532c92273931272e35e326b7069,2024-08-23T15:06:25.930000 -CVE-2024-42399,0,1,b2d8d291d138c04491424e6796bb04940f5bfb5f03fc0a00b681faa84689b158,2024-08-23T15:06:13.350000 +CVE-2024-42396,0,0,61842c663617981875ce1b14ffadee0cdbdbdaa8d4c54b13c16553eef26dc132,2024-08-23T15:07:02.900000 +CVE-2024-42397,0,0,8c2898f9f7624317e7a3e507ec3f15e8992c38cc7e65a1696439891437bceba6,2024-08-23T15:06:46.023000 +CVE-2024-42398,0,0,ecec97745a6273f6b5e5720bfa1d0ff4b8e46532c92273931272e35e326b7069,2024-08-23T15:06:25.930000 +CVE-2024-42399,0,0,b2d8d291d138c04491424e6796bb04940f5bfb5f03fc0a00b681faa84689b158,2024-08-23T15:06:13.350000 CVE-2024-4240,0,0,c278b752586c1bf53091999087140c7ddb924945ab9e2c19f82d090171b2b4e6,2024-06-04T19:20:33.263000 -CVE-2024-42400,0,1,bada445f5210525c2b124a846736c128f6bdefeabff1b80f8c8c07a166ac65a5,2024-08-23T15:06:00 +CVE-2024-42400,0,0,bada445f5210525c2b124a846736c128f6bdefeabff1b80f8c8c07a166ac65a5,2024-08-23T15:06:00 CVE-2024-42408,0,0,0fd118b3a6a95e06e83a123b887271565b346236de9b0c1f76b537fd25503dbf,2024-08-08T18:55:19.180000 CVE-2024-4241,0,0,1e8cfaace7e8ae3194846b1351a77e14aef6cd3a07b429e780198fa55ccad7c3,2024-05-17T02:40:19.957000 -CVE-2024-42411,0,0,360764fbabb5526d62eb9cda2dd54e09c418816d92416be6dbb84277b3e794f4,2024-08-22T12:48:02.790000 -CVE-2024-42418,0,0,ed1a91e2514a20155cb45746dd2dd22745796ef58e5d081f231343d5c83982e8,2024-08-22T20:15:09.470000 +CVE-2024-42411,0,1,3fcf900cd705b45045cb94d8edb3d48eeb6b58809490fd9c74760d8ca62aa9ff,2024-08-23T16:04:26.227000 +CVE-2024-42418,0,1,cd8cebc8a20c18f0027a896396b37c57ee369fd63657ca2801f50759cb9c420b,2024-08-23T16:18:28.547000 CVE-2024-4242,0,0,9c58e9b9e77452c845f3c5179c3be4415982efd0430d3da14ab0345d444eccfb,2024-06-04T19:20:33.363000 CVE-2024-4243,0,0,d19512e4db8434daba47c490442c83df13ecbcadaf4fb9c501fe6a2c921256d5,2024-06-04T19:20:33.497000 CVE-2024-42434,0,0,9a2fab3c0bfcfe26ad4bc7e023423fbf9916073a1831f3237f47ba85a53a41b9,2024-08-14T17:49:14.177000 @@ -257763,14 +257782,16 @@ CVE-2024-42487,0,0,2efeb3a744823d93cb77dca921c5d1e1876bd604d6d9b9e3d12e2ec5d005b CVE-2024-42488,0,0,d4b28d6f7587a9892f3e1f2f60f322ad605b2174a3099ed0ae0224cdeca7655d,2024-08-19T13:00:23.117000 CVE-2024-42489,0,0,cdd86cc62ae99e91c414cd210e2840035f1a515c38caae18a4e22c79cdb0af72,2024-08-12T18:57:17.383000 CVE-2024-4249,0,0,20dbadf05c38d413ed14f5d424310da5ffa119a0ccbbcb5b690e0c54ceac344f,2024-06-04T19:20:34.093000 -CVE-2024-42490,0,0,3eec40446c13f9eb28bd32bc94ff39cd886335dbb08831b09e891eacc1349c53,2024-08-22T16:15:09.117000 +CVE-2024-42490,0,1,c74b5a356197cfdd591b442b14ff2431ae7b9dd31d3d19cabc69311edc084829,2024-08-23T16:18:28.547000 CVE-2024-42493,0,0,f6b5486c33bc66cf003608659d12007760e6f11e14f162d8f0f6b524c3d0cd10,2024-08-08T18:55:19.180000 -CVE-2024-42497,0,0,d0db13532a5ddb0f8eb4c11c984e4109db7e68721821582b492c07273b6e93f5,2024-08-22T16:15:09.330000 +CVE-2024-42497,0,1,262b8d15cef13f44f6c11c9732e86216b599547f262ceb2ec772c87233738fc0,2024-08-23T16:18:28.547000 CVE-2024-4250,0,0,29d8096febeb47af7a705b5c5f44b0e0121b5483d3074c39ff1bff1155e9a3a5,2024-06-04T19:20:34.200000 CVE-2024-4251,0,0,4911c8bef2a1e60ace7e3694403733ed66cd48ed80870211c4240e0e24584389,2024-06-04T19:20:34.297000 CVE-2024-4252,0,0,9237a844d9d9b4c175441eb52c39ce07fc14167f47531df4616e5c1079e2e93b,2024-05-17T02:40:21.053000 CVE-2024-42520,0,0,64dffe6569e4f4099d9df2249ffa95a5cd3b2fdfe3c5c543c43632b62f26d14c,2024-08-13T15:35:16.110000 +CVE-2024-42523,1,1,b75c834a9a74dbe7bac6d2b6ac25f8b0d4c9f8a64010f7d4149660a9eb78284e,2024-08-23T16:18:28.547000 CVE-2024-4253,0,0,c9c68d543bb45de2537aab443ac18ac0d0ac2996dd48a0a792630e0df378eb1e,2024-06-04T16:57:41.053000 +CVE-2024-42531,1,1,cbbb4ffeb2744a1bb8871771d2444079962578984084f81010bcd8f4981193d6,2024-08-23T17:15:09.833000 CVE-2024-4254,0,0,3b60c29b2fffc26e81ef054aaff64665b1e9fde72fa8de5968c25c437cecbbf1,2024-06-04T16:57:41.053000 CVE-2024-42543,0,0,89bf04af083c2e91e2e9ba214be5b3aa8827ce84405f38705010996fc0353810,2024-08-13T19:35:10.380000 CVE-2024-42545,0,0,f468a16273bd93e60bf7c85edbb037a37f95ddbef27d46e806b8081634956ff0,2024-08-13T15:35:16.993000 @@ -257791,7 +257812,7 @@ CVE-2024-42560,0,0,77c3eb361010feb420ff28950817a9c1609b41f6e3fa7cd1b726ce40de2e0 CVE-2024-42561,0,0,851b224ad04a9881247fc5fa1c3fb46325b04d8a33b689b57f61279bf963ea10,2024-08-20T15:44:20.567000 CVE-2024-42562,0,0,95374f95cddb8581f360fb4a8bda45010193fe86e767e637b2647fc080f29add,2024-08-20T16:35:25.820000 CVE-2024-42563,0,0,baa18250040bc5196343ebfbb432817447c4a3a44057e8dbcc112bc7387d631c,2024-08-21T16:35:09.490000 -CVE-2024-42564,0,1,9221095140948579dd9be97bef335789b409d7edd1ec30ff0fce26ad8aad5955,2024-08-23T15:35:08.560000 +CVE-2024-42564,0,0,9221095140948579dd9be97bef335789b409d7edd1ec30ff0fce26ad8aad5955,2024-08-23T15:35:08.560000 CVE-2024-42565,0,0,1591c4cab80f6693619cd5a4da52c8a7cd3181b67994b124b718c4e4c7faf1a2,2024-08-20T21:35:05.227000 CVE-2024-42566,0,0,98ae4d4c54aadbbb33d8445750ac45a5fb4d45d2ba72f710ffd19034073726bc,2024-08-21T13:47:05.013000 CVE-2024-42567,0,0,fa925fac4049dc81680b6b86d83a2403e69ca3e4e76faf0a9fa11845b2f9f031,2024-08-21T13:46:48.087000 @@ -257817,7 +257838,7 @@ CVE-2024-42584,0,0,1d49fc6ba26b04e6a414935584dbbc10ccedbe7e9c02f914a1b9e55e37306 CVE-2024-42585,0,0,a5c96f6969903c085392629454a335ad16ad53dd668e8958bf965c31b35d6775,2024-08-20T16:35:31.307000 CVE-2024-42586,0,0,cbadbedcb4b3c2d2ab907140f92a66b7af1f959a0d34de9272c8d68911fd44f3,2024-08-20T16:35:33.523000 CVE-2024-42598,0,0,f71051f9c507db6076bf3717820c0c67d1cab35bfba6f04f909801baaae9d568,2024-08-22T18:15:10.187000 -CVE-2024-42599,0,0,af0c7758e4fae58f5f3fab3c39c9fe73a105a9457488ef47408afb1c1cb07d8a,2024-08-22T20:15:09.730000 +CVE-2024-42599,0,1,23cc3537f23ddeea8e108ca711b97addede5bcdfc199596ad145201c2c4751d3,2024-08-23T16:18:28.547000 CVE-2024-4260,0,0,16d46a0b5bcb66a093fc7ed1472e8a955d65f29368360dc29eff1d3d84145b9b,2024-08-01T13:59:29.547000 CVE-2024-42603,0,0,994e52c74dfb66d27249c2b65181ca74c70f6e7f1904d6fd7ee8f461dc2cc6fb,2024-08-21T13:21:56.383000 CVE-2024-42604,0,0,53718c28d04ee9ff5e5273896e62f5eef0651385f9073829087b371924096be7,2024-08-21T20:35:05.780000 @@ -257850,6 +257871,7 @@ CVE-2024-42631,0,0,1f47f8877d49e8628a42d74c73cac60b8f382fa6d5b7f60da5c7487aa880a CVE-2024-42632,0,0,6db2b07353e1fe8433bb94ce7c82367301221ecd513a59df2e5f1960150683fd,2024-08-13T15:35:23.410000 CVE-2024-42633,0,0,473aa05a963f1464fb8e8cf24d0628ed2c7bd564dd81ca02deb577e15a8449fd,2024-08-20T16:18:24.300000 CVE-2024-42634,0,0,6658d1cc4139c37b2ef0667c6ab1d67862bb441366a987a8fc3849f65e0dd18f,2024-08-19T13:00:23.117000 +CVE-2024-42636,1,1,3fea3445cd5a0802de08358950f9f5800bdaa3995b275b838ec289f23288bc7c,2024-08-23T16:18:28.547000 CVE-2024-42637,0,0,91efd00f3a0c93af0bfc6d360416502bb044589161185dddb1564bcf24f65c8f,2024-08-19T13:00:23.117000 CVE-2024-42638,0,0,f8a971101f7cdf9fa56d822dabf1a1d2d2e6eccbd0431f9555d3577ca133854c,2024-08-19T13:00:23.117000 CVE-2024-42639,0,0,1a5c2259211b7b8d7a3c9ad7a85700d339edaffc744195b682680689ea5c39c4,2024-08-19T18:35:13.310000 @@ -257887,31 +257909,32 @@ CVE-2024-42745,0,0,d2f467113cda4cc30e7255dcf19a80218eafc314dce633f11469c2e4a02ca CVE-2024-42747,0,0,4d1c99e860bf6905b5d644799ef0c78895a722730457e9c7bd1d214b39f83bc6,2024-08-13T17:35:04.540000 CVE-2024-42748,0,0,52e6e14746af30f6f3124891b89bbdbe775ebb6c4232d3347332f267006d05fd,2024-08-13T17:08:53.510000 CVE-2024-4275,0,0,c229bc373f94c5248df137d0b0d9ca9d61bf79f845040a419335cc081cba5e27,2024-05-14T16:11:39.510000 +CVE-2024-42756,1,1,73cf94846a3708bca06bd9a1d095d2b82838e18840da4b6dfe517310ec20a877,2024-08-23T16:18:28.547000 CVE-2024-42757,0,0,7f6ba25a82908bfc7acb20e761fdbba6f23f597232f39843fc1cc43949e3074d,2024-08-20T15:35:25.190000 CVE-2024-42758,0,0,78591070e9343c09b0ea814d5b331b967691862f9b02d6e8c624fb011530a86d,2024-08-19T18:35:14.237000 -CVE-2024-42761,0,1,4603772f73c391d0290514dd3de22984fee9b25b978a90007f7e965bf34ee510,2024-08-23T15:35:09.650000 -CVE-2024-42762,0,1,8207bb8095f64e93b5461415054f308d63d234b3a4527b9864e8fb2a0ce71f49,2024-08-23T14:35:04.597000 -CVE-2024-42763,0,0,735e3da39deff34346e84ecd6fa3b45243704f42eb840457ded8ef73e6d196c6,2024-08-22T21:15:17.380000 -CVE-2024-42764,1,1,3087488d616bdbc0a25fc501fcfd70de74cf1415b611fda0d70cce6ea882be80,2024-08-23T15:35:10.780000 -CVE-2024-42765,1,1,1834a9b664dec513d5120052520ac779c7edfde3af9251e5767526674b1bd3c8,2024-08-23T15:35:11.753000 -CVE-2024-42766,1,1,070fa77918d30bc37f4a7160fc48cff6124c3ac9a9757f55ed2698c96e27a693,2024-08-23T15:15:16.497000 -CVE-2024-42767,0,0,a9af70e60ae4729616c8e41d35684a991996bffe02660ccbde0c88c3b2e5580a,2024-08-22T19:35:36.800000 -CVE-2024-42768,0,0,01c9a577e2113a24d25ad4019b4f4d6fb1431167eec95d87d5c825a8100aef1a,2024-08-22T18:35:16.727000 -CVE-2024-42769,0,0,41a04011f2437869f03856eeb060f408751a3c896461d4ab1914e040758874a0,2024-08-22T19:35:37.830000 +CVE-2024-42761,0,1,33c8e57e29c80d5ab961692c95c32ec38cca8789d3650f2c188fd350c643ff13,2024-08-23T16:18:28.547000 +CVE-2024-42762,0,1,72ec602fc53ee57aef43714af8d33108807c25cff9ab4122dccfb6373af1e78c,2024-08-23T16:18:28.547000 +CVE-2024-42763,0,1,a111402090b60e50fe4bee869a5fbabeff40957f7ec249ab20f07b5214e58d6c,2024-08-23T17:35:06.477000 +CVE-2024-42764,0,1,264637809ab426819b5c8ede016ca30ee810d51228d72e0d48a730c8ad77bf45,2024-08-23T16:18:28.547000 +CVE-2024-42765,0,1,52e27f365c1ef8f89d4a2ca064c065cbce336b3b0b303a0372b7eda8ed935e22,2024-08-23T16:18:28.547000 +CVE-2024-42766,0,1,5099d5e9e0640e5f6243cfe250c0688d65973439fb5f2d9c4d6284d4c2377b9c,2024-08-23T16:18:28.547000 +CVE-2024-42767,0,1,8525eec8e46bb3b0f36eefdf2b2640be84f1795593d499bdbb1bb93a7bbff32a,2024-08-23T16:18:28.547000 +CVE-2024-42768,0,1,57827d2b35f89da9142d8fc24a9a3f451dfaacc9a736c5b419f5bf6da2a99c6f,2024-08-23T16:18:28.547000 +CVE-2024-42769,0,1,64b978de08915811d1bbc3f6d7be005b6a35be6155b1249c96fe1d1a0dddc27f,2024-08-23T16:18:28.547000 CVE-2024-4277,0,0,ec975a6ab8cd435ccab2b915965095df8c992e1e8e765cf73bc6d545aa3b1e0a,2024-05-14T16:11:39.510000 -CVE-2024-42770,0,0,213f338c118c1cbe17f8bc7d2011a969fb5d543d85c27b7a3da8ddf6af65531b,2024-08-22T16:35:07.240000 -CVE-2024-42771,0,0,8a6776e936284bf431b85500960417f150ea6f356fbe5a41f7e8048c36e3a27c,2024-08-22T20:35:19.220000 -CVE-2024-42772,0,0,c6fa15cc52f56ae33a3ddb59b887f84ca8d6a3d0b94bc71565f13766c07aa3e6,2024-08-22T19:35:38.793000 -CVE-2024-42773,0,0,a15b1dba4fd49bdf1bafdb1dd4446c4b47f48e6ccfe35acb5b3c465b2444e8d0,2024-08-22T18:15:10.367000 -CVE-2024-42774,0,0,d6b497b74223592e0aaadab0ba1724b646e73c13f25cfe2c430987e37aa4b077,2024-08-22T20:35:20.297000 -CVE-2024-42775,0,0,18cbd0d1c764e7cf72a48985672f628f2f56479c5638cf3e733448c67269c381,2024-08-22T20:35:21.223000 -CVE-2024-42776,0,0,0f1b241b50bf4862f737c1887d1ca871138724163a8e58e8e94932d3b2fab0d1,2024-08-22T20:35:22.323000 -CVE-2024-42777,0,0,a3a6a3f436d63757d909e35bf85227d948a610bf403bbf409724424474f99244,2024-08-22T12:48:02.790000 +CVE-2024-42770,0,1,ccf27258059742f30039f25eabe805a716273ffffea4887a407f7c06ff126127,2024-08-23T16:18:28.547000 +CVE-2024-42771,0,1,5fdcb56cf08499a310f992440d0313771a9be4d7b03efd3bc89c6197593aef49,2024-08-23T16:18:28.547000 +CVE-2024-42772,0,1,696b421ee5330a21266b6aa072d94bc1e6999c999020a22e65be5a516d7a0228,2024-08-23T16:18:28.547000 +CVE-2024-42773,0,1,34c39e43ac98653dd5878d415187537cb412da60db984cceea2f4dcb2392e077,2024-08-23T16:18:28.547000 +CVE-2024-42774,0,1,27b7ef559df712c1e02dab261626cae6adfc4f6835af7e4e148c48a0c674d991,2024-08-23T16:18:28.547000 +CVE-2024-42775,0,1,297e3ca5ab15f5eef0dab7843e2d79e7376219bea97dae70bd476621f2410adc,2024-08-23T16:18:28.547000 +CVE-2024-42776,0,1,49df09a24f284e86d715f5abaeb464734905bffafaa3c39e989586ce48e5c098,2024-08-23T16:18:28.547000 +CVE-2024-42777,0,1,2d230367a378a9892fa5e7e584a572024e69880eb5ef983adbd6c5d7ede9cb62,2024-08-23T16:09:28.690000 CVE-2024-42778,0,0,d764d72d39cc4183a1af0d7e19f09d7d0960ab591232c3ea88adf9b672102c66,2024-08-22T17:46:56.953000 -CVE-2024-42779,0,0,7fa9347fecf8bb1f718d36d92bb608ba8868bf482dadae633b850723bf230632,2024-08-22T14:35:10.640000 -CVE-2024-42780,0,0,7efc9b98ef0d9ac4794d44ec0ccbc388ea7d3e0de2d27e8b96a32d176c23f637,2024-08-22T19:35:39.710000 -CVE-2024-42781,0,0,68007156c17ee47f298a37cc150f13de3eb35249db160856cb2b8565b92d98bf,2024-08-22T14:35:11.393000 -CVE-2024-42782,0,0,c88036a1a9c99d71bfc251d5b6c0be95ab852a5980a0325b1c2181381dc03814,2024-08-22T15:35:10.447000 +CVE-2024-42779,0,1,ae01f66ce27224f61751e4dafb37d2b39d06767c7fe94153b5b7da202b1526ce,2024-08-23T16:09:23.920000 +CVE-2024-42780,0,1,537c9f50d7bf7aff4a7dcaebb00f14c413786f21facf19fc25a8c5636cf9e75f,2024-08-23T16:10:40.947000 +CVE-2024-42781,0,1,5fe3337a96f08751b7c7216bb6725505d019cc107e8415ab36e312b9eeb7008d,2024-08-23T16:15:43.970000 +CVE-2024-42782,0,1,3c8ffc34a25045001d9e172592762ed86784c661fcffd202cee24448d96b5daa,2024-08-23T16:16:03.363000 CVE-2024-42783,0,0,a90f42465fb73d63717350e61bed2a1d2459bfb1585238e07a16ef63fa6fdfc7,2024-08-22T17:35:07.750000 CVE-2024-42784,0,0,ae6453c1305840d7826f5fb04807ac2e6014377b83456873440c2250d93d806e,2024-08-22T14:35:12.170000 CVE-2024-42785,0,0,b5ca1c8cf409a09fd190be5882a3f1065d93ed2d64fe581fb5571056dcc4c9c5,2024-08-22T15:35:11.450000 @@ -257932,7 +257955,8 @@ CVE-2024-4288,0,0,98dba4b61502f5abd6b75fde706ee82a9bae31a5b0be7db458ed8cfdf0d8bf CVE-2024-4289,0,0,00867bfd0f1ec036543766f70ad029cfafef69b68de16bba7569db7276222c78,2024-05-21T12:37:59.687000 CVE-2024-4290,0,0,96468cd9b26f589eaa99a2991d568962f6532fbc65b02b2950965134d65bb1ac,2024-08-01T13:59:30.177000 CVE-2024-4291,0,0,3555454673f17bb302e51e81ea2fe7cd049aabde203c094d5792666ddbcea9c8,2024-07-03T02:07:20.773000 -CVE-2024-42915,1,1,3796a6e066ddd3df0e09164148d203d66daa736d71be940f3c44fbba7db7e8b8,2024-08-23T15:15:16.550000 +CVE-2024-42915,0,1,af2b791e9b8f0fd036a23bfdf93083973659b900c4cf044584b634024d23fff0,2024-08-23T16:18:28.547000 +CVE-2024-42918,1,1,57285d12f82aa49daf48c4f43fc7bc6e4679c2e23ad9ff0defea104846de77cd,2024-08-23T17:15:09.897000 CVE-2024-42919,0,0,7884ca2db3b42df8cea014fe9c7f92e13b5906264980e99d7b276d089e845d16,2024-08-21T12:30:33.697000 CVE-2024-4292,0,0,3da8afef6eac3f0e74c17cae2760dab77b8f6d77627214b0783fc9bf5f2f59b0,2024-06-04T19:20:35.097000 CVE-2024-4293,0,0,32ea35cbc5ba91cf83ff71be9c2b19347dd1b3b0949ec88573415a66fabe3aec,2024-06-04T19:20:35.203000 @@ -257989,6 +258013,8 @@ CVE-2024-4302,0,0,3989b291497fea424d341ee8d50afc238ccc795cfb4606a4430491f615d9ea CVE-2024-43022,0,0,60b15925d48bd4a0544b6a90b44d37dd7b45f132534cfb6161c485e040769eb2,2024-08-21T18:35:09.733000 CVE-2024-43027,0,0,023646627aeb42c9f27c70e233b2b26c2ec04024033b793398340bc23e8b2b89,2024-08-21T17:25:08.560000 CVE-2024-4303,0,0,83a712aebf2d4281174fc319c5a3b5ed1f6b2a8b7c1590974611c884faeb0657,2024-04-29T12:42:03.667000 +CVE-2024-43031,1,1,a8128722af6e581cda251c8e9ed4e155df556e682371ad9a6c0e3c26e1f1690d,2024-08-23T17:35:07.447000 +CVE-2024-43032,1,1,07110e0ffc81990454c17c470fb69734af4efb9b04b7743303f16bdd713ef988,2024-08-23T17:35:08.333000 CVE-2024-43033,0,0,fd57d359a27fcaf19587aca04a23681152ba867b02d3eb512220398c8467fb35,2024-08-22T16:35:08.663000 CVE-2024-4304,0,0,cc036c021f3a6e70e19e6533fc0c5b7e8e9615d68f40d67450c876ce97ebcd8f,2024-04-29T12:42:03.667000 CVE-2024-43042,0,0,b853bda14fa02964a16c19d1896f72364ccfb9e1c7f5c0faac2a5ae6d185d191,2024-08-19T13:00:23.117000 @@ -258000,7 +258026,7 @@ CVE-2024-4307,0,0,9af1fe76e1dfb80a8368bbb3fc69b1f2cbb4fca53c0870243e2c9aa4c3d839 CVE-2024-4308,0,0,63b73a2fc8e8d5be636a84f19daeea12c1e2d5b3b652e500f77934bf4e894f3b,2024-07-03T02:07:22.320000 CVE-2024-4309,0,0,5b40a8fbb2137dd0d77fe6c4c1c586190f4489f813d005ab45d5553c299b0b73,2024-04-30T13:11:16.690000 CVE-2024-4310,0,0,08f5e8e76073c3640785934b5dbc198d89dde47497c02b1ac3fc670d20c22fd2,2024-04-30T13:11:16.690000 -CVE-2024-43105,0,0,88d2cb86dcf2ab6eeb763847136c2cdad50616c14ef16f7e4be1f1249bef14ee,2024-08-23T08:15:04.063000 +CVE-2024-43105,0,1,65a66601afd2de184f3745e025013cb99c4a6cae651d4eabc58a96778d4da9f8,2024-08-23T16:18:28.547000 CVE-2024-43111,0,0,f62efcceb5ca8831b50b8cf6203a83ed8d98a025353eabc40d90f197fefec403,2024-08-07T15:35:08.127000 CVE-2024-43112,0,0,adba1dfd679ff5e6d46afc8c8dcdec70df81430cc85737d48e09fa02ef6ca28a,2024-08-06T16:30:24.547000 CVE-2024-43113,0,0,6573240be25b6af3e51d92f2a835e3694315e36c10003c73af950ce730fbb885,2024-08-06T16:30:24.547000 @@ -258161,7 +258187,7 @@ CVE-2024-43368,0,0,1d00a2d97832bca557e0027710c3b9dd305a4196742f053b6b5599e12fe83 CVE-2024-43369,0,0,3f715b9274c2b9674573124fd01c9f3a8a848640345dd0ef56c5a08f4595beba,2024-08-19T13:00:23.117000 CVE-2024-4337,0,0,87f9a4f489ef032776e3da435c02385147be0cf8fdf2fdcc393190f8f887eca5,2024-04-30T13:11:16.690000 CVE-2024-43370,0,0,63a4b6e00d1567d9d6f653490e2b73cb49023bb731b98d8f0b3fa5d3f581b5b7,2024-08-19T13:00:23.117000 -CVE-2024-43371,0,0,3a2a473e40f31fc3b260341cd4e0913415db50eacb872b2b6c13cad2ec020f0c,2024-08-21T16:06:23.153000 +CVE-2024-43371,0,1,d6913fe6f553061ad400a89ad22521f6877de05c39a44dbdc5bb0b36ecceb1b7,2024-08-23T16:20:10.060000 CVE-2024-43372,0,0,a043dcae2b6cd795ef3b53e2a2297979218d8f1c42273b50d63478eed641cb64,2024-08-19T14:15:23.140000 CVE-2024-43373,0,0,db91654b81ea063be92db1e222d81162a2c449df0cbfa02fb41874b948a4c8f0,2024-08-16T21:46:08.440000 CVE-2024-43374,0,0,985df10ab42e21b923c86b553c9d031d32672b2cc13ac7d069fd0fa1d25bd2e8,2024-08-19T13:00:23.117000 @@ -258175,7 +258201,7 @@ CVE-2024-4339,0,0,240ed7230e0a6e458ae0cd6534f1dc024d6c16f3537e0357643e823e6aa095 CVE-2024-43395,0,0,e2392bf6475b12db51f31adf2ecd9f40f62cf7ccf326ac732a93b8b209786a49,2024-08-19T13:00:23.117000 CVE-2024-43396,0,0,72cb7f8de5e6cc0fddf41576db9b3a5c979441bdbeba09448d4bb5c685d81cca,2024-08-21T12:30:33.697000 CVE-2024-43397,0,0,264c2f81cd99428d5aa158f1dc2af7c3c349186ea362901e061722c9a7a0394f,2024-08-20T15:44:20.567000 -CVE-2024-43398,0,0,a88a0edf1fdebfdbb2faeb4a91b7e6ae77f78605c717ab0209af377bd1e321d9,2024-08-22T15:15:16.440000 +CVE-2024-43398,0,1,4d6e82045f81d26be52a0544b93b6b51c3a3ff0c00d0592d874e8bb80bdcc430,2024-08-23T16:18:28.547000 CVE-2024-43399,0,0,72972aa8210630cb7e9ed019395b1964574a7b9fdb0cdecaf47d033016a56fac,2024-08-20T16:21:22.747000 CVE-2024-4340,0,0,47279ef0860b5c8c8bd0a3697c64eecb43c1be11e1b93224b8fe23143c960d81,2024-04-30T17:52:35.057000 CVE-2024-43400,0,0,a74902014f54105a8fa235ae36e5688fa3ffdb525b8d03b30be1350fafa88962,2024-08-20T16:10:29.987000 @@ -258183,7 +258209,7 @@ CVE-2024-43401,0,0,15903cc3c455a698e44524d269216ecf71232ae93f3f18482e5b95f18bb9a CVE-2024-43403,0,0,2d2fd26bb8b3833065b554e3ee4081855a0a04ca3de9ec4a77dfc795be220eec,2024-08-21T12:30:33.697000 CVE-2024-43404,0,0,20af26cd731b3ba8b34b0057b5259bd09cfea8cca89a07a9d1aba2ec472dceb0,2024-08-20T15:44:20.567000 CVE-2024-43406,0,0,73b0ba9348d7fda79585237be1ca1a5ac69ce938ffa97f7ec991727d16bb5e34,2024-08-20T15:44:20.567000 -CVE-2024-43407,0,0,7d467f466ef499beae825bf32e799dcad5cd40ef566d80f60a26b3cbd900e048,2024-08-21T16:06:23.153000 +CVE-2024-43407,0,1,e2ea80f87c66143027da11cf79f2cd80121ef59cc1cf87c24a28fe2c518a474a,2024-08-23T16:20:42.363000 CVE-2024-43408,0,0,d4537cc05369b1073eab6be6b0c0270081103ca8bf402f8fafe9ed3f7a29471a,2024-08-21T12:30:33.697000 CVE-2024-43409,0,0,936bb6be49fd3f1a52856d091099b7d0ee01c9becc80fdf8cce500121c258f30,2024-08-20T15:44:20.567000 CVE-2024-4341,0,0,60a5b39ccdef4d059dc8073670ab0aea750a7880bf4e71543025f3d18b32ff1e,2024-07-08T15:49:22.437000 @@ -258195,7 +258221,7 @@ CVE-2024-4345,0,0,991a52fb88968c952c460a76f59f283c0ad80fedc25d9533338fbc3b0d515f CVE-2024-4346,0,0,9d7617b39f85e35f3b425bc36c01c8cc51c24d84e65ff0d34bf4ea7488f000ec,2024-05-07T13:39:32.710000 CVE-2024-4347,0,0,f9a9185c34e13435315e8c5679dcdbef88eacdd68a031d012b94daf573ce3f3f,2024-05-24T01:15:30.977000 CVE-2024-43472,0,0,5e8b1f10b1ac66b87fc99a4bc40fd92adf2d19366f98cc60bf0ef2a8a8249713,2024-08-19T13:00:23.117000 -CVE-2024-43477,0,0,5faec321d3dfdc0711212e1dfae5e8677fffe678709ee6cd6e6bc5eb2e240d66,2024-08-23T02:15:07.440000 +CVE-2024-43477,0,1,7032b6e49493834ede52e5f56f0a124d3ffe61f7e9da696a9c0c79526fdcc194,2024-08-23T16:18:28.547000 CVE-2024-4348,0,0,6e86bc5560fea8dde0d2ebca4133582cb5d1167a5aec18ad6c6b9b23741c69df,2024-06-04T19:20:36.223000 CVE-2024-4349,0,0,a8b03025f36b8713c52951e7ebcf312d165d904bb8cd188665520ff04ec5e58b,2024-06-04T19:20:36.340000 CVE-2024-4350,0,0,1a6f5a846c08d92d747bb60db8b475cd9e2a367d1319390edc34eccdbc5075d5,2024-08-19T21:15:10.053000 @@ -258228,19 +258254,20 @@ CVE-2024-4375,0,0,a80e63d12c12bb1a4c76673525f796ba2c31674a917e8feea214a8d89539b3 CVE-2024-4376,0,0,7b257e3003fee7879c886112d028b58d973966a06334b732b2628be71d9e1e45,2024-05-31T13:01:46.727000 CVE-2024-4377,0,0,1f0bc109d8a6e47162fe7e13cb7db22957e997f770c56ad1361c99539d4a2fb0,2024-07-17T02:53:06.217000 CVE-2024-4378,0,0,09f9e04bae659373b82712486e7efa4baa3211e21ee904b68f572ef978953753,2024-05-24T01:15:30.977000 -CVE-2024-43780,0,0,68f06be6c51bd11b2023e49700a53e54fa3dac62a141055bb7230734e17bb0b3,2024-08-22T16:15:09.897000 -CVE-2024-43782,1,1,1925b64bdcb2f38e9823a9e7fa7164f8073ea385feae7aa7ee4dd8f93cd333f9,2024-08-23T15:15:16.600000 -CVE-2024-43785,0,0,28e6190998a7b50827ca97edc90f225bf92dffe8990a6186f86e2a71f0d4359d,2024-08-22T15:15:16.670000 -CVE-2024-43787,0,0,f61db6f79a1095039a5ac89944b6da6b584fb7e6ecf3d75d3d252fa665e365d1,2024-08-22T15:15:16.857000 +CVE-2024-43780,0,1,5217ce0351fcb75bd7982f01c3d436316e02e5a2bb3d0e7b3ad2fd10f4519787,2024-08-23T16:18:28.547000 +CVE-2024-43782,0,1,640aa820b0ca467d38719c873a53febd1944feccce46dcf0202ccc162637d808,2024-08-23T16:18:28.547000 +CVE-2024-43785,0,1,865f9ddb4537abd892462a2be2c5b215baf0c6c5f01c60dc5f4805d59a23b528,2024-08-23T16:18:28.547000 +CVE-2024-43787,0,1,2409e45336c28eaec7950310efc31a1dfcd5144f7967b659eb1779c444e8beaf,2024-08-23T16:18:28.547000 CVE-2024-4379,0,0,21c1593ccdc9c542b9ca9b0ba403ad32afbc0c98a6b0c8f514039e188e2373a7,2024-05-31T13:01:46.727000 -CVE-2024-43790,0,0,af83646dbbfa542db9044d0cb2b9df635a0c7cf39ac8c73565cbb1429a60cdb3,2024-08-22T22:15:05.317000 -CVE-2024-43791,1,1,d3d2e359564b09c61b38f2e6e2197a72eda5f9833d902a8fbf47b595ee4d44be,2024-08-23T15:15:16.830000 +CVE-2024-43790,0,1,c3cb5748c434505823d489a50a95032a1f25244b73b9e74701de9974c3846229,2024-08-23T16:18:28.547000 +CVE-2024-43791,0,1,343f2e18bef5efeacf2cd8005024025a5d76578a60f2c9c2f207bc81f2ca8e37,2024-08-23T16:18:28.547000 +CVE-2024-43794,1,1,e736ba3e58015629667400f9dcd4d2fcd7d76daae3fbfc72cb61387f7255114a,2024-08-23T17:15:10.007000 CVE-2024-43807,0,0,3f91dd87019f53cf891d3a83100dd5c601626acd9f1336f0bde904afb8c4caa9,2024-08-19T21:09:42.313000 CVE-2024-43808,0,0,5904dacb826507090b9d583058f58aa9b73c36079d8a4861440bfd52d34f3890,2024-08-19T21:10:14.093000 CVE-2024-43809,0,0,83732ae5b37d299f4c52d51b00d231c62060b5df8f6e1ebed9668263f47472ea,2024-08-19T21:11:28.327000 CVE-2024-4381,0,0,acf3a4021017fa63457aceda91db3b255168337a90160e11d4caaf0dc88c06d3,2024-07-17T02:54:24.913000 CVE-2024-43810,0,0,3423aa76d2322965ee6b2f07b882867425d31c3e78ec55c0a16ed8dcb25e9221,2024-08-19T21:11:45.823000 -CVE-2024-43813,0,1,0eeebfc2e52232a1c410e398d59e84b3ed93d69c2f86a7c29afdb248f4d5f622,2024-08-23T15:35:12.617000 +CVE-2024-43813,0,0,0eeebfc2e52232a1c410e398d59e84b3ed93d69c2f86a7c29afdb248f4d5f622,2024-08-23T15:35:12.617000 CVE-2024-43815,0,0,982a00e3a03355b9c82b813d4044e6da96d5259d4a40715b1b2b57e8056ddfef,2024-08-19T12:59:59.177000 CVE-2024-43816,0,0,44d0571961b52b51ae89fc464c69e8f5e9bafc93420d249ab2ac48cf3e8eb3af,2024-08-19T12:59:59.177000 CVE-2024-43817,0,0,7d65ded527da72f977763f6595da9be484a0a5a4216969a1232f7957de06d139,2024-08-19T12:59:59.177000 @@ -258316,7 +258343,7 @@ CVE-2024-4388,0,0,4ca48ea0d089cba19e1c949c534ac5647f38f1d5d242799ab5ca49dfb89ed8 CVE-2024-43880,0,0,620881f474d97ec9d89405e6ef8dfb0deeccc719de94ff3b069983055d50d4fe,2024-08-21T12:30:33.697000 CVE-2024-43881,0,0,a40946e430007d3d83ea6de83f76454a9e9d71f940866bbda51302ab2716b573,2024-08-21T12:30:33.697000 CVE-2024-43882,0,0,d55668215cd6d665e2480e5f531dc425652dbf9b52271fdc563c400a262ed289,2024-08-21T12:30:33.697000 -CVE-2024-43883,0,0,d366ebdb32f2a9ae37f4f499296ecfa2e7c80923bd248724d74de0c2fbfd0bab,2024-08-23T13:15:03.873000 +CVE-2024-43883,0,1,91d9dc24243e1eb7439b854fe03a12be52a8a2651dc7ad627233ff467dccabae,2024-08-23T16:18:28.547000 CVE-2024-4389,0,0,ea54671e2f1f297a2bfa11e14d812b86fa7a7f36f3487a0625bc52be81ee66b3,2024-08-14T13:00:37.107000 CVE-2024-4390,0,0,e7e7976abdd60c38776b1ca6e6489a541123a6d22aaefce9d02ee1d97e2bf9c9,2024-07-17T14:10:55.550000 CVE-2024-4391,0,0,3c50ad807a6efe83c676c20cbd033bdfc9a5c436710b6a08536dff480db62e6d,2024-05-16T13:03:05.353000 @@ -258361,7 +258388,12 @@ CVE-2024-4435,0,0,de8e3bf570f6ad4a46d29ba9fea181676ce0f6a2152ced144579ea87a60a79 CVE-2024-4436,0,0,17e0d77b7422c134d8a6b2f19c763597337490777ba51623e74515d13a757b13,2024-05-30T02:15:47.300000 CVE-2024-4437,0,0,8daf6b009e7d35d5422b21cbeb277c609e9541d61900da1da050701f495da62e,2024-05-30T02:15:47.433000 CVE-2024-4438,0,0,c9e78eceead232fab4ea3d7a8e75969ea230a5ce0230a2d24b6f718c51f9cf30,2024-05-30T02:15:47.537000 +CVE-2024-44381,1,1,dac0db1487998cd1f4265ed621203d77b7aea6a97009d061998af33afa2a447a,2024-08-23T16:18:28.547000 +CVE-2024-44382,1,1,7280d04c056ab1258ff901f7791213ad9901c5c6cdaedacaee1b18f27f52e6dc,2024-08-23T16:18:28.547000 +CVE-2024-44386,1,1,27302ea287247c6a8d7903c69c42ef3886196885ea4179f4508110727d8c6274,2024-08-23T16:18:28.547000 +CVE-2024-44387,1,1,e4652e748b77164364c2fa11c4300f2aa2fd01f8d46e31b64e67132f5f853680,2024-08-23T17:35:09.583000 CVE-2024-4439,0,0,18d544a04352d4558f54a1793cd800ab605d9132c8464460d2f7ebbde183ef12,2024-07-03T02:07:34.593000 +CVE-2024-44390,1,1,00ecb0e8d4b021ec6a770987adcac16c37877fb4c2387a4d42b3e952a823be9c,2024-08-23T17:35:10.580000 CVE-2024-4440,0,0,32e49728cdc055a1dbfbd90b8e03664859c56d56e36afdc46644ff6b145c71da,2024-05-14T19:17:55.627000 CVE-2024-4441,0,0,ac0779300bad801b6c25a6a11418596c16f707acafd8505b85edf037d6de9dc4,2024-05-14T16:11:39.510000 CVE-2024-4442,0,0,9c1eda6fa3435f8c4d08218c5481ff931fe1467531bf106c3f2c1021638ef5a8,2024-05-21T12:37:59.687000 @@ -258443,11 +258475,11 @@ CVE-2024-45169,0,0,9c1ccfed5f8c51cc81c5cd2eec094329fe2aa7c6c132e4f4099baad9dc306 CVE-2024-4517,0,0,3fa4b03e407f8fc963e6e42e2d6f56f1c6623d21471e9883bdedad7e9bb00507,2024-06-04T19:20:41.030000 CVE-2024-4518,0,0,64c3b6e6e74f6d9fd929463119875b686279109a997143c5dd3ad8e2c1af1355,2024-05-17T02:40:27.187000 CVE-2024-4519,0,0,5f7c1c0aa362af4fc3ba7e1d12e176f4028e88f0167af6f63c30c7ec7da86837,2024-06-04T19:20:41.127000 -CVE-2024-45191,0,0,6e362ad118273f4202bdc6854a76c33f6ead6f18b708e6e6c5e428cb771cc872,2024-08-22T21:35:06.397000 -CVE-2024-45192,0,0,0fc95418e65db4d92a13ea1880011534b2cfc4ab1403f85d1ff524c8b4c52075,2024-08-22T19:35:40.953000 -CVE-2024-45193,0,0,e2d2a95ce15a049c74af7a52d095d6013d9809c1ea23c07c1fdda34b6d50e120,2024-08-22T16:15:10.300000 +CVE-2024-45191,0,1,2a889b4602938b6e2674b0bf815335db30baaadca4c51b450f01e34042d695de,2024-08-23T16:18:28.547000 +CVE-2024-45192,0,1,30eddbb92dad40ea47915eb7180399e22941399795ea5b18c4d640a6070b3421,2024-08-23T16:18:28.547000 +CVE-2024-45193,0,1,d6f872fc649469c5b3046e7ef10246f8b1741f908732214cb33afbe1f14b40ed,2024-08-23T16:18:28.547000 CVE-2024-4520,0,0,b2949348c863aeabf77cf8262dadc8a1301ac645ed88723ebde503df8cb28e51,2024-06-11T17:02:16.967000 -CVE-2024-45201,0,0,3beba8e0e0c40151876f7bf97d547955727b1d2b25312099976993b69ba37344,2024-08-22T20:15:10.063000 +CVE-2024-45201,0,1,83db05d7484ca5c2638e18e64e3b5c06d28a9caaae332ad6d01f844ea902b04a,2024-08-23T16:18:28.547000 CVE-2024-4521,0,0,a1d240438f25322e21494c2ddd2f5ee26b23410f012534bc2c27a0a49b09a860,2024-06-04T19:20:41.223000 CVE-2024-4522,0,0,acd0b6b231758473c48ed22daa75c2f0d87280406667aa3ced0f39aaa73cb777,2024-06-04T19:20:41.320000 CVE-2024-4523,0,0,e149ff229bd41b5a453469b36d558b5c1f467161b85c2884a74fe2177217c73a,2024-06-04T19:20:41.420000 @@ -258686,7 +258718,7 @@ CVE-2024-4780,0,0,4aec24b958d50bff73d14c7bd2f67b2a9793d4893d5ddbdba18f0fb02ea18c CVE-2024-4781,0,0,75b4bbbeaedf32c6df964ae89a5896455d04ecbdf24f849877528cd42d17cfaf,2024-08-19T13:00:23.117000 CVE-2024-4782,0,0,37dcdb14f7d23ae467b62646ac8eb504448e2a7781e3c175892c72dc54d3aebf,2024-08-19T13:00:23.117000 CVE-2024-4783,0,0,413c0436e6758a988a0c847533b21e34b17a9d936626eba8cda1a5d1f87e0181,2024-05-24T01:15:30.977000 -CVE-2024-4784,0,0,9aaebc683fa580787b3fd96a509a375fe0be341d6b1720ff572edca3637a16b2,2024-08-08T13:04:18.753000 +CVE-2024-4784,0,1,4cc2a5a387e2d44a289947f3cae3cd294fd9977dc8f62a4a2754567f4ad78544,2024-08-23T16:59:30.430000 CVE-2024-4785,0,0,86459565331431d4effe5c5baf904159b952a2a7d490db9da0fcd3795764e799,2024-08-20T15:44:20.567000 CVE-2024-4786,0,0,bbc8c5b9b549878acd4ee1e5896d7add0ba995b55e84e619083dd37cca26f8f1,2024-07-29T14:12:08.783000 CVE-2024-4787,0,0,6e9b8652de9328ef9248746b2fe52f715cb97566c59048ae6277a1aaed304f45,2024-06-20T12:44:01.637000 @@ -258913,7 +258945,7 @@ CVE-2024-5050,0,0,619081545361528557d824107c37f32918188d04adf33ba524a4859e2e6341 CVE-2024-5051,0,0,f233f4614a9daf0499b6db53ac9877312730fd59d85cfffcfb1c75738230a757,2024-06-04T19:20:57.557000 CVE-2024-5052,0,0,1db4612270fc4085b1cc808dfe93eaa2dc99045707c3296716068fcb2c40c936,2024-05-17T18:35:35.070000 CVE-2024-5055,0,0,346404cc585681a2fe5319ad3cd387f2171e7718710adaf135152ad352635ebd,2024-05-17T18:35:35.070000 -CVE-2024-5056,0,0,e1d03c88d872cdf904f996ddd0c44a42c46c29f4f47c658c86206a3f64af2f13,2024-06-13T18:36:09.010000 +CVE-2024-5056,0,1,b09a6a74de5b053675f9afc4f104e067ee8a59f791091ecbf85080c4327f1e74,2024-08-23T16:04:14.643000 CVE-2024-5058,0,0,d66647bea5b47dc02b284e54d31404fc6795bd8a11a408fc146959769533c076,2024-06-24T19:18:35.517000 CVE-2024-5059,0,0,b0901ef33b8b4d50fbd07542bb49b954ef3e45e5d8bea77c76cb9c3c21bd9422,2024-06-24T18:49:29.467000 CVE-2024-5060,0,0,70a4b23a22f78db2884c1ce0fa906b767ee25d155e7de23427bff751940319e4,2024-05-24T13:03:05.093000 @@ -258989,7 +259021,7 @@ CVE-2024-5136,0,0,00acd0d99ac180a457379231db172c8713de0958aea5d4d69a24c443710504 CVE-2024-5137,0,0,1c94e90fa849c62df03c5c4f490c71de8dac579e548f5eda16234216f611cd2a,2024-06-04T19:21:01.370000 CVE-2024-5138,0,0,f1b79bdf375efa3e69b9bd2975c7545f101040d8757ad73fa8febb232dcb7ec1,2024-06-03T14:46:24.250000 CVE-2024-5141,0,0,5b006751fd2d8ca9e95fc8cef49a641b35089e8e5594eecd996fab7cf0d4e5e8,2024-07-24T17:58:54.867000 -CVE-2024-5142,0,1,eddac91196f83d1bbb073c06b46038bbca944f66d10667065ae0dbf9ee03adb6,2024-08-23T14:15:10.980000 +CVE-2024-5142,0,0,eddac91196f83d1bbb073c06b46038bbca944f66d10667065ae0dbf9ee03adb6,2024-08-23T14:15:10.980000 CVE-2024-5143,0,0,e21a987518c06589a6da36e0d35257f005aa787fff502677dfeaefae4b228c17,2024-05-24T01:15:30.977000 CVE-2024-5144,0,0,6bbfaf13c1764c4fefc00893d80de8b864d8af9b05653210d129c904ab48e8ed,2024-05-31T18:15:13.217000 CVE-2024-5145,0,0,e9d5b011678068f9e46540aba9b4c166c9546581cf81cda6f6984ec899d8b7b6,2024-06-04T19:21:01.520000 @@ -259138,10 +259170,10 @@ CVE-2024-5299,0,0,ec4fa401441140dbf77742461a619e82e80b0b3301518890cfd68e9b147d30 CVE-2024-5301,0,0,631251dc8f6415bf091aa08e2ea2da13f6061c1ab67496346dc0cfe0b1ae5be9,2024-06-07T14:56:05.647000 CVE-2024-5302,0,0,deeb456931ade644343b30803e618ef0f81ff404153eb750decd43b50182e979,2024-06-07T14:56:05.647000 CVE-2024-5303,0,0,18c90649e048ff76fd16bfc83427991bcbb5495253928d269d57afb5cdffca0b,2024-06-07T14:56:05.647000 -CVE-2024-5304,0,1,d968010935b9808df14ec3827c68c660e5030ff1e10dd473ede1e120c2d0020a,2024-08-23T15:06:10.100000 -CVE-2024-5305,0,1,d7ef5e26da1b4b55d5a1323c739605451e8b0fffa749e9d5cf8a79ba440fa94f,2024-08-23T15:05:41.013000 -CVE-2024-5306,0,1,d647292a2595d4b4621658b069669f43be59c7629ba28057e1c1f9a15fcc4dc0,2024-08-23T15:01:42.337000 -CVE-2024-5307,0,1,9f60aac251e2e03d9552a0394a9c798214f03b8e43e7cbb0dd9de3359653dec5,2024-08-23T15:00:25.687000 +CVE-2024-5304,0,0,d968010935b9808df14ec3827c68c660e5030ff1e10dd473ede1e120c2d0020a,2024-08-23T15:06:10.100000 +CVE-2024-5305,0,0,d7ef5e26da1b4b55d5a1323c739605451e8b0fffa749e9d5cf8a79ba440fa94f,2024-08-23T15:05:41.013000 +CVE-2024-5306,0,0,d647292a2595d4b4621658b069669f43be59c7629ba28057e1c1f9a15fcc4dc0,2024-08-23T15:01:42.337000 +CVE-2024-5307,0,0,9f60aac251e2e03d9552a0394a9c798214f03b8e43e7cbb0dd9de3359653dec5,2024-08-23T15:00:25.687000 CVE-2024-5310,0,0,be68f6d898e4e59f65162318c0ea0836be8ef675c080dff90d77e5a0c98b0b1e,2024-06-04T19:21:04.583000 CVE-2024-5311,0,0,4e4e9b4edb642fa4d04760ded51b93254fd12f5bde190a96e2c1818c58cf4797,2024-06-03T14:46:24.250000 CVE-2024-5312,0,0,18bbe6bd336686ff14003841f43dce1a45b7d1ab8cfffd6fca5539a180b7243f,2024-05-24T13:03:05.093000 @@ -259281,8 +259313,8 @@ CVE-2024-5460,0,0,4e099435e4545094901bd58b61fc926119ab5684f745a9d9aa540744798c10 CVE-2024-5463,0,0,4d43b352cf9202f80c2f04ee56f4d6c5363c98e3eebea680338a85f124fca31c,2024-06-04T16:57:41.053000 CVE-2024-5464,0,0,87d260a13f52f3a01db81247aa60ad8629b4b67f72e7ca5812703b2de9e3fb0a,2024-07-16T15:19:27.493000 CVE-2024-5465,0,0,c54306dfcc71e50bcd77c603fadee0b02af76d4cc30340f017524a72c7deac1a,2024-07-16T15:19:04.987000 -CVE-2024-5466,1,1,76f58976f8620d37763ec2c892ac019b10346913fcc276496c4868d0971a6159,2024-08-23T14:15:11.073000 -CVE-2024-5467,1,1,4c5e8f291fb9a600f54064d96714e22a7ebeab50deb2843be9ff0c627125d4ac,2024-08-23T14:15:11.270000 +CVE-2024-5466,0,1,8f08663538d2aee36e25ab136d5801f7f29d0dd6729ee216c1ccf0fc6f5a9509,2024-08-23T16:18:28.547000 +CVE-2024-5467,0,1,daaf8408a275eb1f38d1031f36910f26b631857beb77d46dc8d12272186a45de,2024-08-23T16:18:28.547000 CVE-2024-5468,0,0,a9b6881473aab66cd93b6151044b19528c011d8001f0e2556b425e826958e7fb,2024-06-13T18:36:09.010000 CVE-2024-5469,0,0,379bb9230b13b3cc6c5badc54ed7dbfea438613371475736e27add03b9354c6d,2024-08-16T19:59:15.573000 CVE-2024-5470,0,0,6ad8fffdbc9fc3c2ca94bc381d3be223e310676e26148212c497e243b6c17473,2024-07-12T16:52:52.883000 @@ -259302,7 +259334,7 @@ CVE-2024-5486,0,0,f91d9d4f8dd33400d578f70c776b5213e5c4514fd91351556f80643703e916 CVE-2024-5487,0,0,603a9f7b9f0723e5fc42b5dbe6b305c40aa06a72aafc0fdd27e92237c27fc66f,2024-08-16T20:22:51.930000 CVE-2024-5488,0,0,1ba8afad84fb064b3094b3beeaef45abdf0d0012417462bce1916c1780ec0647,2024-07-11T15:06:31.120000 CVE-2024-5489,0,0,855f98d82c4255d7a1decf5a548f61d8944b9bffb6e3f6a5299c190e758f26a4,2024-06-11T18:15:01.617000 -CVE-2024-5490,1,1,642a45585c49cbda76574866cb759404d9d8559b66d9bccdff4abe2b7ef0d787,2024-08-23T14:15:11.467000 +CVE-2024-5490,0,1,9d3af352369a8d67f6e17b752664cb9ab4b01be028753e716533db7d1f8d3d48,2024-08-23T16:18:28.547000 CVE-2024-5491,0,0,c9a62638dd7b2098d22ccc85d55914e20b3d8c19adc41e6518825648965a51ba,2024-07-11T13:05:54.930000 CVE-2024-5492,0,0,c1b752674fdbd97871ded2471e93cce68a0c42e212cdcca0b70fc8b5a2b6c4b2,2024-08-01T13:59:48.837000 CVE-2024-5493,0,0,6197d264f9043f6827bed7540062d250b0374cc18469d389f548454d0f106bc1,2024-07-03T02:08:58.650000 @@ -259314,7 +259346,7 @@ CVE-2024-5498,0,0,249bc82e919537483fbbd7e36f7610746bc1d1c9ddc202b4c423e6c0b454fd CVE-2024-5499,0,0,35dd9c6b1c2542f41b348af6ab7b219dd2f92d9ae3c52132e0b08b696c15d780,2024-07-03T02:09:01.860000 CVE-2024-5500,0,0,08dbbebab53ed3353be996009fd4c1da58d2bb9845253d44287e5f1fec38cdbb,2024-08-01T13:59:52.040000 CVE-2024-5501,0,0,26070cb64be69726a3e53d21c4a7b37433e6fc5848925edeefa1dca5b1a345a3,2024-06-03T14:46:24.250000 -CVE-2024-5502,0,0,90dce12c88b9d7ec56b40a1832ccea990763b032bf5eb3ce7e0e00c127b7999a,2024-08-23T09:15:07.853000 +CVE-2024-5502,0,1,468b46a44fb2a8e855d9bf193538ccbddc6334be62c760a9a5d5952c3644b05d,2024-08-23T16:18:28.547000 CVE-2024-5503,0,0,1cb7ec9812df8ec09d21a8b50ab54c8421f9f9a3696399f8cf01057ff5629e64,2024-07-17T13:53:37.643000 CVE-2024-5504,0,0,c9387f8cc727d3178a2e16ac3c8996c4ce5ec1145aa8a5124e81e8cb3cf535a8,2024-07-05T14:46:38.860000 CVE-2024-5505,0,0,1c3992bc63f7227d162e21046bb65e254ca8028b79f3c4549059f0cdf09e2564,2024-06-07T14:56:05.647000 @@ -259358,10 +259390,10 @@ CVE-2024-5552,0,0,7f73b574dd8e83d52dd7f28ecc579b960fbf7de562da98c7e63b5b8e0fd54b CVE-2024-5553,0,0,c4739ca4bfc71591786473d36aff26ccf561ba778e4c902dca863cedff7bba13,2024-06-13T18:36:09.013000 CVE-2024-5554,0,0,0f1d3226bb0a486c4b917c91c2f0f711d8f9d9fbb5ad6f69f3a6a7fdce6ab9ad,2024-08-22T16:43:52.650000 CVE-2024-5555,0,0,ea0332df14a2e6edd0aa953ada9ade3a1da4ea6fb56dda0883a54ace27f96d97,2024-08-22T16:46:14.177000 -CVE-2024-5556,1,1,4571cbb794e8bdb3def2b688e54d4e7bf8b1c10856b53c162e01e97f4cb22d99,2024-08-23T14:15:11.697000 +CVE-2024-5556,0,1,a7738a82bce49c429bd860cc60195d10ba237a1e25458742aab70229dcc4a4e1,2024-08-23T16:18:28.547000 CVE-2024-5557,0,0,71e19027344115370537e5e9f2ac729a9013865b6ffe7632f9b652113dae4753,2024-07-25T20:00:46.653000 CVE-2024-5558,0,0,d7061155c6f430b38a1e769635e4eca1c24478e5beedfff7ff120ab1f85e7481,2024-07-25T20:00:25.773000 -CVE-2024-5559,0,0,0c59604cbf219c2ba1c247f52c304752b12dd0f3c92c8b3c96e21ad233f99b0a,2024-06-13T18:36:09.010000 +CVE-2024-5559,0,1,ff51559fb7e7362b104a8f1f28895eef2d8f7eb659f926ae6c1cbfda694d488d,2024-08-23T16:35:30.827000 CVE-2024-5560,0,0,002123ffc16696131d663e9c06724d8fb4501ef3ca4bc4191b4229c106e3346c,2024-07-25T19:59:58.017000 CVE-2024-5564,0,0,582ae8d6e013444879054c957a9f974e1fbdab4bea18417275b8c53698226d12,2024-07-19T16:15:03.193000 CVE-2024-5565,0,0,e1d36fa68b4a73d6b78bd8eb39c3f27f14d8d32dc884b4fdfa0f8545d690e8d1,2024-07-03T02:09:05.567000 @@ -259378,7 +259410,7 @@ CVE-2024-5582,0,0,3868d6c914880d2428453bd960a7aeb89cb5bb99f0fc09b9de444e14a34c60 CVE-2024-5583,0,0,a52c5f9a8d9ac0fe663104ce6a0dba81953ccf58fcb95200cb4b374852c72783,2024-08-22T12:48:02.790000 CVE-2024-5584,0,0,7705ff7ae1b4fd1342d12756cedf379ac85bb5a3b8398b6b986f5e220e43afde,2024-06-11T13:54:12.057000 CVE-2024-5585,0,0,b8a6130124c428c97635ba022f402f27dfa4e9cda99398d4024d0e451e3796fc,2024-07-28T14:15:11.033000 -CVE-2024-5586,1,1,0c00cc8d81ccd58252689c3feab24cc705359af5b73b646fa618b61405c3215b,2024-08-23T14:15:11.893000 +CVE-2024-5586,0,1,95e1465560242f6e651ff1f4c1b6c501d7035958b7820a99f61fffc94d09c3e1,2024-08-23T16:18:28.547000 CVE-2024-5587,0,0,6b9958828217f46ad00f93a8982028b537e303232ee58bb83f00389806575abd,2024-06-03T14:46:24.250000 CVE-2024-5588,0,0,acef4f2a5b13b06d4d5ee520a9930094f7a31b3a0afbb85d203e32266b0c3daf,2024-06-04T19:21:10.267000 CVE-2024-5589,0,0,b953e771129cea5914eaea0b8a60776be2e7649c39db097d6b9bdb3cfd517741,2024-06-03T14:46:24.250000 @@ -259471,8 +259503,8 @@ CVE-2024-5693,0,0,0c0efe07ae7eccba3dbeb9fe7241e864745aeb8b41f02dc5d33a8371321e74 CVE-2024-5694,0,0,275b578189d93f8e1ff5fb24ee08b4deeac272512e00405f2d220d413d57023d,2024-06-11T13:54:12.057000 CVE-2024-5695,0,0,5c1c35f0ec6580e07f73e1a07a8ae630ee78fe7f1d5e3c7dbc856e78693a01eb,2024-06-11T13:54:12.057000 CVE-2024-5696,0,0,fa7fca85e8582886b101603c50bdb44ca98f1e5885ef874b4a6ee74a96bce0a1,2024-08-01T13:59:57.203000 -CVE-2024-5697,0,1,06452bf48aa37ad04061ffb4c87c934e4b6e078d1729c773deb048b1e305163c,2024-08-23T15:53:28.170000 -CVE-2024-5698,0,1,350d2c2ffccd9a9cd3aa4bc7145d24efc7fb94f482a5ce8b779ec7cc0a225af1,2024-08-23T15:56:02.240000 +CVE-2024-5697,0,0,06452bf48aa37ad04061ffb4c87c934e4b6e078d1729c773deb048b1e305163c,2024-08-23T15:53:28.170000 +CVE-2024-5698,0,0,350d2c2ffccd9a9cd3aa4bc7145d24efc7fb94f482a5ce8b779ec7cc0a225af1,2024-08-23T15:56:02.240000 CVE-2024-5699,0,0,c21f163e6735ee0c21602548dfa2bea7fdc25d4c8237f21d4a6dc39c506b5e79,2024-08-12T17:35:12.843000 CVE-2024-5700,0,0,75281b3d92ab48138fa84376c62cf06e3b235ecbf0492685b83c4b5de8ec6545,2024-07-03T02:09:12.470000 CVE-2024-5701,0,0,a37fba50f7abd03ec6f3f8d10471b68ca825e312e3157d5f51714744bf060118,2024-08-12T17:35:13.687000 @@ -259517,7 +259549,7 @@ CVE-2024-5757,0,0,5cb8c18a619114307d2634441346064118b79a7aeac4723897e195eaa5132d CVE-2024-5758,0,0,c078716fbf80b259c8ceac06415d3d039d4ef773f8ae701649c6b0b1483ee99e,2024-06-13T21:15:57.543000 CVE-2024-5759,0,0,63cf4f5f11600a3e2abf833e3aff1a738015e39c1ce27037c94f84f83452efea,2024-07-19T18:40:53.863000 CVE-2024-5761,0,0,1fdad964c86313b412878f67fac5999c9a1ea015b844614bc58b000414661a53,2024-06-07T19:15:24.467000 -CVE-2024-5762,0,0,7685db622b0ef316fe47b270e1905d87606eb2d71fbd315bb90522388aafa70f,2024-08-21T17:24:59.627000 +CVE-2024-5762,0,1,d5bc2d8a653cdaa83874769146506405c53a3f453aeae45d89ba66c89c40de90,2024-08-23T16:43:19.497000 CVE-2024-5763,0,0,d5a17677db04dab40e7ba46a3004731b252dfa637f97a1e637824a196a22c6e9,2024-08-20T15:44:20.567000 CVE-2024-5765,0,0,79117abfade54ce3ab13d72bbbbedb2fc58ed3797b29d0ebf953e2abb4b24073,2024-08-01T13:59:59.193000 CVE-2024-5766,0,0,1263d0917882c36f131e194bb6b44630da06ab1a17b9faa93d76c1b934e8029c,2024-06-10T02:52:08.267000 @@ -259527,8 +259559,8 @@ CVE-2024-5770,0,0,4bca1b783fab441ac96e2081292bf7a961039192f4cb006a7b822eed7d2abd CVE-2024-5771,0,0,9279677701f72e58df3eeb7baa3d1d7e55447f394eec836bc1f43570eba66aed,2024-06-10T02:52:08.267000 CVE-2024-5772,0,0,c4a46b23ffc556efa99c28642545134299fd33c8b9c1546a4857f8dbeb47fbb1,2024-06-10T02:52:08.267000 CVE-2024-5773,0,0,05e5548b38830f0a6e8f7e181401978a8fc65449c4af72078e90130f871624a7,2024-06-10T20:15:15.387000 -CVE-2024-5774,0,1,cb33518c48480f54d4eaddcdfe492cd86bf29e549b204e3b3743e85122bc4d70,2024-08-23T14:49:02.650000 -CVE-2024-5775,0,1,ca3d208ceb056021f21d27e2c64e88ec2799b91cc5839afbb841bab4bd960af7,2024-08-23T14:03:33.590000 +CVE-2024-5774,0,0,cb33518c48480f54d4eaddcdfe492cd86bf29e549b204e3b3743e85122bc4d70,2024-08-23T14:49:02.650000 +CVE-2024-5775,0,0,ca3d208ceb056021f21d27e2c64e88ec2799b91cc5839afbb841bab4bd960af7,2024-08-23T14:03:33.590000 CVE-2024-5776,0,0,86888fe7b4b003fb18d3d2ba32b739edbd6c9d68a474b51eae89ea9740b7db86,2024-06-12T08:15:50.920000 CVE-2024-5777,0,0,36540573098e4e57e2480cda4540050e04f465dce04feabfdc311a1dd5bf4bae,2024-06-12T08:15:51.113000 CVE-2024-5778,0,0,44ca5dca3141a6d37f6826ebacfa9246d365e941b7c28662690166013bb5bd71,2024-06-12T08:15:51.173000 @@ -259624,9 +259656,9 @@ CVE-2024-5892,0,0,c827287e71db613eefb73da2ddb327e45b7bab6b508053dda1226986578187 CVE-2024-5893,0,0,78ef67dfe3790c320a0f9ba1a7349940f70da93d76f5f0750d1f242e1c8acc0a,2024-08-14T14:02:14.170000 CVE-2024-5894,0,0,2ca8d7bc4f289327e2cc7549cb6900713929f3b52dcc0a719c523dd433b7a91c,2024-08-14T14:05:24.070000 CVE-2024-5895,0,0,a23d85672d43ff9439839eb8de542e89afa2e33b06950acfc1ecdb88a5e1c1a3,2024-08-14T15:12:22.450000 -CVE-2024-5896,0,0,543a9739bb7994a5cf7a44d8a031ddac2c68327e324b7d90a0e38059960eb029,2024-06-13T18:36:09.010000 -CVE-2024-5897,0,0,7705294a726132fe76b260cca78d94d4cdc2b24feee8f8352eb858eb73b1c164,2024-06-13T18:36:09.010000 -CVE-2024-5898,0,0,0514997e9a16e932b4bae6c16e61e0724aa85046156dacb25935f77f1e43af81,2024-06-13T18:36:09.010000 +CVE-2024-5896,0,1,0eda12b4563b4ed63b24721988b1081a3e362fbd5f62e16a27a312f532ef223c,2024-08-23T16:27:08.800000 +CVE-2024-5897,0,1,7aa01d1a7d7c524a91f4ff25bdf870c02e5d60694ed805f7564ab89e6c4a474f,2024-08-23T16:27:37.923000 +CVE-2024-5898,0,1,61e8f19c54483b3cca7ec9863e2a6bb9250fb6c30b935beff7c7fac97070413f,2024-08-23T16:29:35.973000 CVE-2024-5899,0,0,9a50f1672a8f19c78e5991e440d5a0c2d46a5e3e821843d3d776673ac7766d57,2024-06-20T12:44:01.637000 CVE-2024-5901,0,0,c7025d21d7cefd8a737ac6a16c68fff1a0fe38b52cd112c652dcfaf982c97225,2024-07-31T12:57:02.300000 CVE-2024-5902,0,0,7888af9d367c2dddb4d6f8ca0d5bee140123446fdb703c2c12cdc94e6e9d8ba4,2024-07-15T13:00:34.853000 @@ -259647,9 +259679,9 @@ CVE-2024-5924,0,0,4b7e4b611121f550bcb0fd877a4f853b37b9df78f8237b70038811b9cca802 CVE-2024-5925,0,0,e946172587053e70c75c453600b6000de540319095aebb04cea6cd10cd2597bf,2024-06-28T10:27:00.920000 CVE-2024-5926,0,0,c0270df40bf1e286ad8957d3baf72bffff8cfb079896c2cd70dab328142b04f1,2024-07-12T08:15:11.797000 CVE-2024-5927,0,0,1b7b6c83db008ddacf60314208106fd6b62f6e315f688ea9bb13e1efdd6d20e3,2024-06-13T11:15:48.917000 -CVE-2024-5928,0,0,8e96cb1349d05ce42218ec5722a6c8fedfe5b7ea558f0ba73b9d78cf5ff9764b,2024-08-21T17:24:59.627000 -CVE-2024-5929,0,0,b0d1da24c71fba23c3303c17605e904ab46e3ebfdb8608536ce60a3f6f8c124a,2024-08-21T17:24:59.627000 -CVE-2024-5930,0,0,73ee32316144a9b3ec88d84547f2a32a4ae1a786d53fe53103f45358dec30f7f,2024-08-21T17:24:59.627000 +CVE-2024-5928,0,1,065180dc816d6768a80630eb0526fd0ad0770440e65f1ad606ffbf7997d4dae8,2024-08-23T16:47:34.100000 +CVE-2024-5929,0,1,547b1d1269945a5f94b9f310fc42040f5b5a64e33b67ca655dd7f52feb9f00d4,2024-08-23T16:48:00.907000 +CVE-2024-5930,0,1,801f56bcd1ea0f18ede683739787e6e80ff5c6bc8c67275c0d1547a50c51d174,2024-08-23T16:48:15.103000 CVE-2024-5932,0,0,39314038664af0ba6a59940f14f6f4752329a2f5be1b3f0fdde557c7381d5472,2024-08-20T15:44:20.567000 CVE-2024-5933,0,0,4b5b8ee984dca52e93a5c74fef0bbbf1e4141af006167bcc3f0d3b5bd5eb1afc,2024-08-19T21:07:56.627000 CVE-2024-5934,0,0,16721403d72b0462a70f000841eb683fbbdcd68e0952cf56add7902c00813b6e,2024-06-14T16:15:14.647000 @@ -259784,12 +259816,12 @@ CVE-2024-6102,0,0,1ba1817630dabd1d86deec5e027a2cd559fc5de63b986886b08c689d57cce7 CVE-2024-6103,0,0,5e29bc37d9d7a304c867024ebdb6c9635d505e152b36dfc1b31a9280adb1e2de,2024-07-03T02:09:43.923000 CVE-2024-6104,0,0,108534f982ecedc8e18a75e604642b0e40fef80fdd2c5d6c473bb0683c303507,2024-06-26T17:19:40.850000 CVE-2024-6108,0,0,8dcf8c978ffd08a68470779b67afcba2ef4b72c9a7a6acbd6d0451b159e2f4f9,2024-06-25T18:15:11.730000 -CVE-2024-6109,0,0,bb0e3455a169d6bebc9d8b88e9df5fdfc40e2e3982d9fbc581f71bdf8363e7cb,2024-06-20T12:44:01.637000 +CVE-2024-6109,0,1,691b3bbed7fb4087403723ca2239e60c82c89bb00a6000077065689afba666e8,2024-08-23T16:37:19.230000 CVE-2024-6110,0,0,b63b3d86bda62f504e857148e856fae2084982d1fba5e9f950f2c7804e723853,2024-08-08T16:12:55.633000 CVE-2024-6111,0,0,0f5dcaf3bb90cd2b4a56b273b49e8495a655ec2b0e964da5b85ab541216d1365,2024-08-23T02:24:17.607000 CVE-2024-6112,0,0,2f1dc59ba703cae38b91f780aba33aeeba31c527cd98a9cab51e900a1c049136,2024-08-23T02:21:49.173000 CVE-2024-6113,0,0,0258a013a0633b4223d3b34fa713df1179bb149b5036cecf3e425f58a1718b67,2024-08-19T15:24:11.240000 -CVE-2024-6114,0,0,1d496eb490a052b12517f100a93bb767cf2cf15a2c008e0693dc387c679adba3,2024-06-20T12:44:01.637000 +CVE-2024-6114,0,1,807e490413847463615484f6207707764c80caa646855a88799bba65a3d69870,2024-08-23T16:38:30.133000 CVE-2024-6115,0,0,15dd6157449ec10d31fd4366fb8ca14f8fe35af7e4b7d4c1bf3f3f7159a1a698,2024-08-23T02:20:09.017000 CVE-2024-6116,0,0,f2ada37f40e94dafdc5d43df86df5904a49741c82bcc90227e41dbb655a1d08c,2024-08-23T02:19:51.723000 CVE-2024-6117,0,0,945b820f6f991f5a73623e522c44ca579eef282abb0425df98e1503fa24d0166,2024-08-05T12:41:45.957000 @@ -259811,7 +259843,7 @@ CVE-2024-6134,0,0,c8a0602d6db0f3051b72e96c7e16fe4780a3ce250e242879d4a8baa99538dd CVE-2024-6136,0,0,2425dc33d9a66499cd0e61ed788949ec618401c3fdf6a1fd388e70bf34e3cc7e,2024-08-13T01:18:26.820000 CVE-2024-6138,0,0,fc35836bd5348e7eb9a778e4240c73e0ce52b6c3e53dfd414d6ee066e94e6acd,2024-07-12T16:54:53.997000 CVE-2024-6139,0,0,5132030314b9a0ca48cecf9e1dd593f9b9cec1db256d0c213c6569e108426fbe,2024-06-27T19:25:12.067000 -CVE-2024-6141,0,0,60bae7861d68ff1bc8bd02ee2d76eaed6edd65267cee4671dff7614eee7383ed,2024-08-21T17:24:59.627000 +CVE-2024-6141,0,1,1d5a717ee6e758ce9e5016396a1ddc2e4691c96cb20e6973eb41cca889dc4be3,2024-08-23T16:53:48.270000 CVE-2024-6142,0,0,b186966dd1e43431007a65ef388b5fc16ca959c5df4a79ac4b3d70a69eba9543,2024-06-20T12:44:01.637000 CVE-2024-6143,0,0,809bcaf623fc8bb8a94d0137b3cba55dd5f1f165d6e316c641180eb9262d20ee,2024-06-20T12:44:01.637000 CVE-2024-6144,0,0,34fdda404a75a4c4d6599bec7541c145a061f61832fb3538fd14d272d1558c83,2024-06-20T12:44:01.637000 @@ -259877,7 +259909,7 @@ CVE-2024-6214,0,0,a8e239af08d0ab1246993374aef8204661658830db0ca6fca456fce88752f6 CVE-2024-6215,0,0,d01466c5e4679da2e3cdde9d249cad88f46489a58c2f36859f7f149e67c89660,2024-08-23T02:14:03.990000 CVE-2024-6216,0,0,fe1f34e9619d7bae700607092872e4843797973f7a0c9714b25790af3f1b2538,2024-08-23T02:22:23.120000 CVE-2024-6217,0,0,f28648e0277ddbd712b9473f83f11301c76893b98cd82a40d2daa67293b40bfa,2024-08-23T02:22:56.160000 -CVE-2024-6218,0,0,3cb8a30d4ddfe61bdea61d401bfb5f7d243e9ab40309c0377a9f4fcd89ff6826,2024-06-21T15:15:16.547000 +CVE-2024-6218,0,1,68b875a1a263799f2f3717a6585787b268a1f6dea7053cae20430ca2c3ccf3fc,2024-08-23T16:39:49.487000 CVE-2024-6220,0,0,e02b2d21f9831e678f98a588025ea8ceab0b9f96191557805441514ff6bc987f,2024-08-01T22:15:41.733000 CVE-2024-6221,0,0,61f042058b385b7bc60c2d633e822b23c6dcddf14b1004ade2fb997e73ad48f8,2024-08-20T19:37:23.077000 CVE-2024-6222,0,0,7da69ce6fbc5989cf8dc00c0967cc47c0670f03447330ea36d4de40ed4ce08ae,2024-07-12T17:05:39.070000 @@ -259951,7 +259983,7 @@ CVE-2024-6303,0,0,6baba87ebef380da9b7b68ccb75fb7650d40ef7ddb3237802c8e0923b7cd88 CVE-2024-6305,0,0,87f4eab923a348ce2da7e5df1ccd921242bd2eeb6bab5e4beeb71bb03d817e81,2024-06-25T17:15:11.020000 CVE-2024-6306,0,0,9afef2f765ecf08b1d6c75a6e5cb3afa373820869b5e2eced2eb43fea970c328,2024-06-25T17:15:11.107000 CVE-2024-6307,0,0,a6037df0fa8617c9aaeffdc703000fa7423e885d439338f30eb38eb0279e87b9,2024-06-28T13:15:03.453000 -CVE-2024-6308,0,0,7fe5875e7792a7be16eef25cf50438d51c729111830cd6ccb7ed85e37f183080,2024-06-25T21:16:02.087000 +CVE-2024-6308,0,1,12cda7fc9db6b7d83d3e1c89cfc2efc823dbf7a87e765e6ea66a01700b6fc7c7,2024-08-23T16:44:39.510000 CVE-2024-6309,0,0,81d9ed106c3d88c28590c6ed22c5b32147121a952907a1333c0b11de5b47c5b3,2024-07-09T18:19:14.047000 CVE-2024-6310,0,0,c979f814f3e48b96dc9635b552e8c56621ee7c90068be27a9e484f3e9730aa89,2024-07-09T18:19:14.047000 CVE-2024-6313,0,0,3f3a1eb3f6568b25e7e4a0a5a221dc14475a69801be2f42305fb08dd6e12247b,2024-07-09T18:19:14.047000 @@ -259969,7 +260001,7 @@ CVE-2024-6325,0,0,3ea6578ebdd2a7633259d686c429ab9b3e7708f0e981d10184478f4442c008 CVE-2024-6326,0,0,e689387b2cb49e7365da7fd7c751e52e0ede20a7a6c6966f5f5b92a6b53089de,2024-07-16T18:00:02.110000 CVE-2024-6327,0,0,2921f8f8780ecccf64e99daaa57d4495895350cac37fbdf3fcfbbaadf3869269,2024-07-26T13:03:00.473000 CVE-2024-6328,0,0,1dc9c3c4a448080717651ebabfb2fc281b4a1c036cabba31a96124b6cb4e8cbc,2024-07-12T12:49:07.030000 -CVE-2024-6329,0,0,0297471d5ff859b5002d32cf7c9376114df7d0652dd734345b853093c75ae3a1,2024-08-08T13:04:18.753000 +CVE-2024-6329,0,1,86251ab842ffcb900239f67c839645a87676821122e9a881854a92c1e2f082f5,2024-08-23T17:01:34.227000 CVE-2024-6330,0,0,e1243e86845c9ad8bb8e14e862db7cae433088225de72050fd359fe249b90cd8,2024-08-19T16:35:30.907000 CVE-2024-6331,0,0,170e6a9ca8d17834b0d067352ac524c06575a24a7d50c9bc89357069533d125d,2024-08-20T19:55:35.153000 CVE-2024-6334,0,0,3daf0dfe09252e7765ca30c739cfcc033a43a657c17c0275e173ac670504522a,2024-07-09T18:19:14.047000 @@ -260073,7 +260105,7 @@ CVE-2024-6467,0,0,40d89c875ad7013f32015f1ef7736b3fb0ce3fd8c16e4649f7f0da01810ff4 CVE-2024-6468,0,0,35510ca663346ec39c4261a703db141288708f1a8a294ff4bff13dfd2b2ac57d,2024-07-12T12:49:11.340000 CVE-2024-6469,0,0,8a9cc14cdc15687cebe1f067587bd279bfc289daac6283040462018576c0d534,2024-07-05T17:09:54.870000 CVE-2024-6470,0,0,c9a33c23ec7370c50b4df58ad71ec5e181cf8d29947a984c43804e0a58dc7723,2024-07-05T12:55:51.367000 -CVE-2024-6471,0,0,f732e100289c893532526b33b46541a39ba52ce518f7e90d2f97ec4bb67cf877,2024-07-05T12:55:51.367000 +CVE-2024-6471,0,1,09d48a1225aac8158aa4c1ca2c8aef77a523ae62ed5b11e34f01b64da625d366,2024-08-23T16:47:32.537000 CVE-2024-6472,0,0,06cfc3c26e9764572c1adb3e446cad13cb9599b02c4c47946f6698a134e25867,2024-08-06T16:31:05.780000 CVE-2024-6477,0,0,af465e59718721c7b727c1ec6a265ade947c829c05464c1090814aa1a74a6b13,2024-08-05T12:41:45.957000 CVE-2024-6481,0,0,8a6ed16cb15e9b1be7b8ecc3c869a269748ddec5ecbc3504e8d7f068ea116af3,2024-08-08T14:35:14.190000 @@ -260092,7 +260124,7 @@ CVE-2024-6497,0,0,b980a8afca3367d307f1b8ae084c1de1478e48fcb0a6d42a16be67c3823c34 CVE-2024-6498,0,0,630981d31a800e5a325158bdb522b2e1db688d536ea57caaef1013f6348f0ce8,2024-08-05T12:41:45.957000 CVE-2024-6500,0,0,d6e17cf29259cccc059c07e88e123ff08e9fd8308cfe5e11844bc5a9a1491c18,2024-08-19T13:00:23.117000 CVE-2024-6501,0,0,45d58d6fcd90c3b83531e796541078a549af17f7a81eb1fbfe7d6944aa2bc8ac,2024-07-11T13:06:13.187000 -CVE-2024-6502,0,0,1f22fb0e7d7ba54b58395d225d1dfe244f49ebfd7f5ec9024690cf313b498a4a,2024-08-22T16:15:10.377000 +CVE-2024-6502,0,1,1bc7a02b7adac3c3c39f580498dad5b63a09e0317ed17f3552fb92e571ad563e,2024-08-23T16:18:28.547000 CVE-2024-6504,0,0,8b12236aeea36b8f50ca52878af23b200b8eec2ab40fe418832b1f4c4c6b95f9,2024-07-18T12:28:43.707000 CVE-2024-6505,0,0,b8708084cd092b6ca88acb18ad5e80f748f8e2829ec040b8958bfe3c1fee2cd6,2024-07-08T15:41:17.883000 CVE-2024-6506,0,0,58310ca3e68e3dacb16dafd9b32db187bdf111a88d3da008267c8c84bbec48d6,2024-07-05T12:55:51.367000 @@ -260231,7 +260263,7 @@ CVE-2024-6707,0,0,0dfe7a21a9f5f3f2c918856e8a22bd010b2f6875b837d373eb17e1778a3c84 CVE-2024-6709,0,0,6fe2e770615cb1cdf14ac6a1be894b0afc1b11da8138a88bedb96b5baf70b602,2024-08-05T12:41:45.957000 CVE-2024-6710,0,0,4e918da09846cceb474e5a8b11ef31c34f74c44e6fb5c62544fbedf363b9f5e1,2024-08-07T21:35:11.673000 CVE-2024-6714,0,0,11b717ebe6f787348133e2783f9d140b140bb610f91df0dde9f6c41f4dbdce83,2024-07-24T12:55:13.223000 -CVE-2024-6715,0,0,48a76114cbb320a86b433f2c50ad51fcadc00b9730ba5849459403d19dd65833,2024-08-23T06:15:04.070000 +CVE-2024-6715,0,1,f51b8c547fcb5e185cd0b33e013054ae728e401290324167d0a09ef035511aef,2024-08-23T16:18:28.547000 CVE-2024-6716,0,0,8ffb92442f0506288b44c8e147b3f474301f4b7d486d9477f8f7548823d67c07,2024-07-17T14:15:04.210000 CVE-2024-6717,0,0,0b065284c5a83df80f016d53c3ebe26a820992221428250ad8b4acf1f2d75be1,2024-07-24T12:55:13.223000 CVE-2024-6720,0,0,1dc3a2e2b9f95baf4f0364462830a2005109f2f0ee9a4c40c2088696994c0bf6,2024-08-07T20:53:27.343000 @@ -260301,8 +260333,8 @@ CVE-2024-6805,0,0,df9c24152184824aaec79a13a2bf3e8af4b412b0a659321142aa5850936d97 CVE-2024-6806,0,0,ee5c95118c41ce11e7d4b52c5bbead77dffa73ecabb9abea55db46ee557c211f,2024-07-24T12:55:13.223000 CVE-2024-6807,0,0,e4d3dc581aa656108086542a60085fb674561ed6b78bc58e0e899b44edae1d40,2024-08-06T11:16:07.450000 CVE-2024-6808,0,0,2df5a702fa4af6687f0c8dc8e100812ff9b6b346801edb239f41e0ca638c0076,2024-07-19T15:04:43.837000 -CVE-2024-6811,0,0,fcb69062318962c7f29c346967edc4eb346df61c05dace675d77661f13d3ec68,2024-08-21T17:25:08.560000 -CVE-2024-6812,0,0,c41f54f4372a4b179105459f6c49696d7184de4b816295370f5ab8028207d0e1,2024-08-21T17:25:08.560000 +CVE-2024-6811,0,1,3783c4b19c44b2b3a4352141b8d7f3cd7a14a6c6285a64de15dc2bfb019618a1,2024-08-23T16:27:10.317000 +CVE-2024-6812,0,1,8e1121952c5aeb16bf1d39eda593e33b37b43c381863d39f50a5660da76ba8d3,2024-08-23T16:29:39.737000 CVE-2024-6813,0,0,6a21a5d43037bfd5d84ad70a83159aae7019b35c5a800088a530166c72802e27,2024-08-21T17:25:08.560000 CVE-2024-6814,0,0,036c0b46f25187b9181e8a78842498f582eb75e5fcb228478713dbfcd9caea2d,2024-08-21T17:25:08.560000 CVE-2024-6823,0,0,1e2d1c8757819689d6550f5aeeb754dc03b20b4dd91487b47d8b2bbdb01a8e63,2024-08-13T12:58:25.437000 @@ -260457,7 +260489,7 @@ CVE-2024-7100,0,0,dcfec02e0ae4a6f64f97ae0297c66dfbc0aebe11e663bfc596e9b5b147ad74 CVE-2024-7101,0,0,5454c1208509de59c11b3527ed3914e0b9b453785a2425c8a2e412da33d0d539,2024-07-26T12:38:41.683000 CVE-2024-7105,0,0,a997b2c0e4e91d96626adcc721c978e22c9883ba6b9b8f61b29dff1a03ad516f,2024-07-26T12:38:41.683000 CVE-2024-7106,0,0,ff3ffd817a427576052bad31a6af61e50bfb0473d392446ac87a1106350f920d,2024-08-13T14:15:31.030000 -CVE-2024-7110,0,0,f89c34f450c50e2099e6f7cb76c4d9dbe54e7cd373814ff226a3ae48feb13a3d,2024-08-22T16:15:10.627000 +CVE-2024-7110,0,1,c48f3494a9e776d1fc0d0ba8245b8f81c82b4cb848c19603ead8a6796e97d8e2,2024-08-23T16:18:28.547000 CVE-2024-7113,0,0,0a8f4221b6e071d6c72a8ad7c45f4c251b092637dae636c0dfdbfb44a73d4a6e,2024-08-14T02:07:05.410000 CVE-2024-7114,0,0,63b5a866782f89fc9f6ac1d30b03e6de66da2ca9dd341d6c07330fc52fb56b69,2024-07-26T12:38:41.683000 CVE-2024-7115,0,0,d198b7c0d1a7a67e83535bd15c8ec8b27ae3282d7abe6e695fb34b6781238fb3,2024-08-08T19:06:00.017000 @@ -260468,7 +260500,7 @@ CVE-2024-7119,0,0,6b773d2ee0198b8c2555adc9c1a3fd196ed4373805abfd3c2f3d4a0da9be44 CVE-2024-7120,0,0,dd88c4d4f5099fe6bbb2fa59d0942931f85db230d235608307fdbb069312e6ec,2024-08-13T14:06:57.033000 CVE-2024-7121,0,0,fdae6687b65374b6aec5500198958517002acfa86b757e82c1fe85c4c568e879,2024-08-08T17:15:19.820000 CVE-2024-7123,0,0,9cd56c5d21be01850838f11a2df252558cd6c9b176bc2485ad2b1b549f072ade,2024-08-08T17:15:19.970000 -CVE-2024-7127,0,1,2842be40cd41bba2687b1d2d238a3a521369bfe05553f868496bd1f3f7f4951f,2024-08-23T14:00:59.740000 +CVE-2024-7127,0,0,2842be40cd41bba2687b1d2d238a3a521369bfe05553f868496bd1f3f7f4951f,2024-08-23T14:00:59.740000 CVE-2024-7128,0,0,22b40e3236f05da8de2b73f629340b5796a3b45429dedc50864bf862ccb583f9,2024-07-29T14:12:08.783000 CVE-2024-7134,0,0,c5170ada8be1ea583d3dc92d1c0c20ff0ddcfa0f860d82c947cda0aff2380786,2024-08-21T12:30:33.697000 CVE-2024-7135,0,0,31437d1db396166831d3abd18bbeb77eef50ad11110b9df0f25d86e90a9b1fe1,2024-07-31T12:57:02.300000 @@ -260507,20 +260539,20 @@ CVE-2024-7175,0,0,17f9f11ad73b0149cbe68b3610e56dfc726e43ad613a2d806a5692ca782805 CVE-2024-7176,0,0,f0ec24b818ba0ff9dd236590bd5667a208b3bab5b5698785324754427c7e3ea5,2024-08-06T12:58:00.850000 CVE-2024-7177,0,0,32745634451f9d23649acc91ceb28c69502a441cced914546f92ea612c820689,2024-08-06T13:15:14.603000 CVE-2024-7178,0,0,9fcf4f0d4009fbbe1d73388d7f5f6c7cba7d46fc9fcc396b1d731744ea7fcfc7,2024-08-23T02:55:43.233000 -CVE-2024-7179,0,1,48cafbf308c87c658a864a058a3151cf5688729e46b0b747c870eaa3a34a01bf,2024-08-23T14:34:36.407000 -CVE-2024-7180,0,1,7e388528f93c4350f8e624ac9014c1b54d5dc34413151851a5a4367a418e0b6f,2024-08-23T14:34:53.593000 -CVE-2024-7181,0,1,cd3fc421391d528dc112e53b1d4eababa88333da2abddb27d98ac8077beda2c1,2024-08-23T14:35:26.100000 -CVE-2024-7182,0,1,f7bbe25f3acb7e98b34f1b0f6c2c7e2e14ad3548e742dd0e09c5378e0a972229,2024-08-23T14:29:14.270000 -CVE-2024-7183,0,1,0b202bb54b985021429d53561e835d2d065c3cb412e4775bc76c778093dd7b11,2024-08-23T14:31:33.570000 -CVE-2024-7184,0,1,4e0e6a1685ade25eaeea82f073609012adbefcf61765a423b0285c0f65b5ae1e,2024-08-23T14:32:00.667000 -CVE-2024-7185,0,1,dd3bbb1c40fa419fb6333043b53ae306d09c3fc015bc1aa03ef3c1f0692cd8db,2024-08-23T14:32:46.013000 -CVE-2024-7186,0,1,b6273ef830a8a44b3054d8c5acefb07dd976adaac6eab6251f007c5ec9f38ee3,2024-08-23T14:33:39.350000 -CVE-2024-7187,0,1,777fe9df9d9a58a762cb55db1cb95d6eafba78251de3b7c1a7e3c376b6697e7c,2024-08-23T14:34:05.720000 +CVE-2024-7179,0,0,48cafbf308c87c658a864a058a3151cf5688729e46b0b747c870eaa3a34a01bf,2024-08-23T14:34:36.407000 +CVE-2024-7180,0,0,7e388528f93c4350f8e624ac9014c1b54d5dc34413151851a5a4367a418e0b6f,2024-08-23T14:34:53.593000 +CVE-2024-7181,0,0,cd3fc421391d528dc112e53b1d4eababa88333da2abddb27d98ac8077beda2c1,2024-08-23T14:35:26.100000 +CVE-2024-7182,0,0,f7bbe25f3acb7e98b34f1b0f6c2c7e2e14ad3548e742dd0e09c5378e0a972229,2024-08-23T14:29:14.270000 +CVE-2024-7183,0,0,0b202bb54b985021429d53561e835d2d065c3cb412e4775bc76c778093dd7b11,2024-08-23T14:31:33.570000 +CVE-2024-7184,0,0,4e0e6a1685ade25eaeea82f073609012adbefcf61765a423b0285c0f65b5ae1e,2024-08-23T14:32:00.667000 +CVE-2024-7185,0,0,dd3bbb1c40fa419fb6333043b53ae306d09c3fc015bc1aa03ef3c1f0692cd8db,2024-08-23T14:32:46.013000 +CVE-2024-7186,0,0,b6273ef830a8a44b3054d8c5acefb07dd976adaac6eab6251f007c5ec9f38ee3,2024-08-23T14:33:39.350000 +CVE-2024-7187,0,0,777fe9df9d9a58a762cb55db1cb95d6eafba78251de3b7c1a7e3c376b6697e7c,2024-08-23T14:34:05.720000 CVE-2024-7188,0,0,4b4e672447c0b6e89b97b7fbc1448d8f9bd8f8a454ffa3eacb9aed7610d4148a,2024-07-29T14:12:08.783000 -CVE-2024-7189,0,1,ff23bad07ab6275204285dcbecd341c53e0f43077ff255ee222be124d95deb08,2024-08-23T14:20:26.690000 -CVE-2024-7190,0,1,6b10a3300e7f1568fb96fd13af7e875d61c31bab7b7b7e6416cbb0109bea73d4,2024-08-23T14:23:56.243000 -CVE-2024-7191,0,1,05a58f0ea89619617ea6d05464587bd2a57828801e18ec1f64442f7e68c768f8,2024-08-23T14:24:48.103000 -CVE-2024-7192,0,1,6102e2c061b392d7cc60badb5f7058fe4f352fff0fcb923589fe1aff828e98a0,2024-08-23T14:25:37.527000 +CVE-2024-7189,0,0,ff23bad07ab6275204285dcbecd341c53e0f43077ff255ee222be124d95deb08,2024-08-23T14:20:26.690000 +CVE-2024-7190,0,0,6b10a3300e7f1568fb96fd13af7e875d61c31bab7b7b7e6416cbb0109bea73d4,2024-08-23T14:23:56.243000 +CVE-2024-7191,0,0,05a58f0ea89619617ea6d05464587bd2a57828801e18ec1f64442f7e68c768f8,2024-08-23T14:24:48.103000 +CVE-2024-7192,0,0,6102e2c061b392d7cc60badb5f7058fe4f352fff0fcb923589fe1aff828e98a0,2024-08-23T14:25:37.527000 CVE-2024-7193,0,0,471f89b1f9e21dd135e74be96458737d2a22d1977909084981ac0db538f96c8f,2024-07-29T14:12:08.783000 CVE-2024-7194,0,0,fb8fb327a2568c1f320f1950bfd0d09d6807afbd06bbd21f9382e7a1490f26a5,2024-08-12T14:35:56.040000 CVE-2024-7195,0,0,6200e8d18c215bbfa8ef0be79e3a73b7174d7501600a48a5810d4c572cbb7769,2024-08-12T14:35:58.443000 @@ -260543,12 +260575,12 @@ CVE-2024-7215,0,0,1ccd67c4053d473d76bae939b895612b63aea586e844e49a089165eb2effbb CVE-2024-7216,0,0,235180a54ea7f2ef077cfee27bcc7d839591542d508b94dc70e3dbb3739843eb,2024-08-06T14:28:51.927000 CVE-2024-7217,0,0,7e7819767ae3464765ef049cf303542c287ee1345ab7dba2b9a6e7c05c9c0062,2024-08-06T13:54:06.807000 CVE-2024-7218,0,0,5d0054c3fdbf03d2b2f068cbdbe6251db2dbd2a118324c2439603e07b3cc1979,2024-07-30T13:32:45.943000 -CVE-2024-7219,0,1,4d519d170b1c51762fe4fa72f5a7b1fdedb52bc8828c8d6bb4a10f468eeb941f,2024-08-23T14:14:12.883000 -CVE-2024-7220,0,1,e3590840b9bbf9e5cc7c3bbba6d698ce62553f807069fceee7e6e64a56a99d19,2024-08-23T14:15:37.363000 -CVE-2024-7221,0,1,91364786dd57514521ef9df7d9a02aab371dd4b0f0fea8cc17ce30c56001d60f,2024-08-23T14:15:55.353000 -CVE-2024-7222,0,1,9c8fd2f4aa7131d604c442a0fe3808ade856766e897c609e634be9bb8e4dccfb,2024-08-23T14:05:58.410000 -CVE-2024-7223,0,1,b1447efb4a824b74760ba7f495d92a752443a6efbb1ca614f8407746a0b02065,2024-08-23T14:05:20.653000 -CVE-2024-7224,0,1,f4c5b0187c56d32b7a2e1e8c149c392599c03c601da5b9a81710cc2031d4ae5f,2024-08-23T14:04:48.727000 +CVE-2024-7219,0,0,4d519d170b1c51762fe4fa72f5a7b1fdedb52bc8828c8d6bb4a10f468eeb941f,2024-08-23T14:14:12.883000 +CVE-2024-7220,0,0,e3590840b9bbf9e5cc7c3bbba6d698ce62553f807069fceee7e6e64a56a99d19,2024-08-23T14:15:37.363000 +CVE-2024-7221,0,0,91364786dd57514521ef9df7d9a02aab371dd4b0f0fea8cc17ce30c56001d60f,2024-08-23T14:15:55.353000 +CVE-2024-7222,0,0,9c8fd2f4aa7131d604c442a0fe3808ade856766e897c609e634be9bb8e4dccfb,2024-08-23T14:05:58.410000 +CVE-2024-7223,0,0,b1447efb4a824b74760ba7f495d92a752443a6efbb1ca614f8407746a0b02065,2024-08-23T14:05:20.653000 +CVE-2024-7224,0,0,f4c5b0187c56d32b7a2e1e8c149c392599c03c601da5b9a81710cc2031d4ae5f,2024-08-23T14:04:48.727000 CVE-2024-7225,0,0,f6b7a5a2ac3e59704ed6ff994e447ad38c84eed49d8cb19f1c1208cd01aab3b3,2024-08-13T14:17:10.833000 CVE-2024-7226,0,0,7be6f6e57b1777b742474ebcd204597686d04a1987b04bb682ec599818c11481,2024-08-13T14:19:04.147000 CVE-2024-7246,0,0,b268ee120ca92b4c7d0a004d06b39e1ba37d5fd50d8d0e082e72d2daefd1725e,2024-08-06T16:30:24.547000 @@ -260561,13 +260593,13 @@ CVE-2024-7252,0,0,490536b1b267bc05e09f33c429c150806f5477f059597f5cad78d37cad62a6 CVE-2024-7255,0,0,a4eb887a2aa91b61ced64af6faa636cef124d2fd1032af5abcd1e986918698ff,2024-08-16T15:23:19.167000 CVE-2024-7256,0,0,28c6c5405ca0661376f4706f7e75647b14826bc648847c0c2ef29d4ee5bafea0,2024-08-03T18:35:04.003000 CVE-2024-7257,0,0,e6ef266df52e25692b132cfb6522d79defb5eb3e548daae54be1d69b0c3ab16e,2024-08-05T12:41:45.957000 -CVE-2024-7258,0,0,b8a200982000a2891227a1513c5a157cf4fea7675fe684028aca0e4807be9f50,2024-08-23T05:15:15.437000 +CVE-2024-7258,0,1,7daa83813c091cf4943890cfcc79fb77dbec053060dc3ee1861fb34d4faa0557,2024-08-23T16:18:28.547000 CVE-2024-7262,0,0,6eb890539ac6ea65f95d63d1cc2b2db839fe55351667e7e39ec8c244bb43a119,2024-08-22T06:15:04.173000 CVE-2024-7263,0,0,9d6df8d57145d860b9f285c4defefe5eae42f914cf87b79ed3fa24860767bd90,2024-08-22T06:15:04.510000 CVE-2024-7264,0,0,12a75b53a7f63996bb7b4af3d1a6b7462e167bb63f5a12a5607f29e5ee63586a,2024-08-12T17:30:51.880000 -CVE-2024-7265,0,1,7744849ec550e14a15ade5689dd13e89a671dd2d7872009d179abef8fe868c92,2024-08-23T15:09:29.843000 -CVE-2024-7266,0,1,6254ba9d278e387df53e686fa5a3601176a5b5e90ff24b9b7119a368e812b840,2024-08-23T15:09:51.707000 -CVE-2024-7267,0,1,d99f3d8b6ba6fe3542d0e70da6abdfbfdfd1dfb75ac1c1edca9979fafd8e77bc,2024-08-23T15:12:23.453000 +CVE-2024-7265,0,0,7744849ec550e14a15ade5689dd13e89a671dd2d7872009d179abef8fe868c92,2024-08-23T15:09:29.843000 +CVE-2024-7266,0,0,6254ba9d278e387df53e686fa5a3601176a5b5e90ff24b9b7119a368e812b840,2024-08-23T15:09:51.707000 +CVE-2024-7267,0,0,d99f3d8b6ba6fe3542d0e70da6abdfbfdfd1dfb75ac1c1edca9979fafd8e77bc,2024-08-23T15:12:23.453000 CVE-2024-7272,0,0,a75598507b088cf5d38e53c97b1d09abbaa1cacf367aa16e740665d3e61a447d,2024-08-13T15:16:23.837000 CVE-2024-7273,0,0,a61ca64a6342f77fae831271fd2a6739b41d99aa7d580eadbf400f237355e05e,2024-08-13T16:10:45.057000 CVE-2024-7274,0,0,42267a3d3600167277031a12316bb396bcb62aa3302bf81726cca9e052e280df,2024-08-13T16:10:42.520000 @@ -260610,10 +260642,10 @@ CVE-2024-7323,0,0,9ade4a736dcd7d946c31626909fde6ca44169336c2686d18f85ae47322aa81 CVE-2024-7324,0,0,095fe191ca170a7ec3aafa46faf9007b467b7e450c1bcd7d0af0a45c400bd246,2024-08-01T12:42:36.933000 CVE-2024-7325,0,0,a6bde1ed410a10749d44bba07a55a46b87addce8acb914516046e9ef7fd987c8,2024-08-01T12:42:36.933000 CVE-2024-7326,0,0,e3f620860b2c85477fb2efe05441eb7c734011e1cba89f910fddb650411bf7ba,2024-08-15T19:03:41.457000 -CVE-2024-7327,0,0,9ec7c5b4f3fea2ac5f9abdae5d7475fef06eab11099d18f41ef0237ea3e05b7b,2024-08-01T12:42:36.933000 -CVE-2024-7328,0,1,e6c98f125062c3817b9a6e58eed6b1a1c25e930c55618550491c8fbabc1ab30f,2024-08-23T15:25:53.017000 -CVE-2024-7329,0,0,f2ada99243d0f575b81eec21f3148ca66fce3d9559ae9316ecf85d94bc4c0b72,2024-08-01T12:42:36.933000 -CVE-2024-7330,0,0,a0d90f27df0d1d8acc92db1ac146dc79ec66c02483d0fbebb438d850d8cdcf9e,2024-08-01T12:42:36.933000 +CVE-2024-7327,0,1,93bc3f76451ae651bc4cc95aaf37590625e834a0b5eccd18b26422d55be3a3a1,2024-08-23T16:41:50.290000 +CVE-2024-7328,0,0,e6c98f125062c3817b9a6e58eed6b1a1c25e930c55618550491c8fbabc1ab30f,2024-08-23T15:25:53.017000 +CVE-2024-7329,0,1,86519d0fe633d7a3b560f1937d0cf9a549848524507e6d6d4b9019785e22cbb2,2024-08-23T16:34:06.267000 +CVE-2024-7330,0,1,0204887759404b941f4c78f090af911807d609a362af008c5a0802c841ed1d08,2024-08-23T16:12:05.500000 CVE-2024-7331,0,0,b740f062346a9fa2712074e24c9e0d1ce4d148884dac19c4cc72ee657acd38b6,2024-08-01T17:42:09.417000 CVE-2024-7332,0,0,3089497ba846bc4a9cbab4bce145eb3ea3ed052e66e6684a180cc65ac853dc18,2024-08-09T13:55:52.587000 CVE-2024-7333,0,0,298f2e2e03c22f1f74c3e7734b77671a2b905a2effef838cf20a3e983f6f559a,2024-08-09T13:56:43.783000 @@ -260622,7 +260654,7 @@ CVE-2024-7335,0,0,50bba08337bc3f518f338a3ebdc255b86c516e721d876b56eff7a6174bdc78 CVE-2024-7336,0,0,7039a792519f9f6bfd944e76e753e4868d6e66e426315a5e2732b19e5d26adfa,2024-08-09T14:38:01.050000 CVE-2024-7337,0,0,bb4e29754f24508ee03646d09f02a9e9792b2bdc0b40ad3f742f7daf359e305a,2024-08-09T14:15:19.283000 CVE-2024-7338,0,0,40f9236687cb1fba08bae47e5bce5fdf8596baa7faf10b9e6c7a335576e73829,2024-08-09T14:51:45.677000 -CVE-2024-7339,0,0,b22bc8c3b0525a6c98a03e6df13c491f10ced24284b84aa3889a1e52c55f16a5,2024-08-01T12:42:36.933000 +CVE-2024-7339,0,1,57ec1e872e2326d7636a6cda3d278abfe9440d76240320c6c9e4335e8a941603,2024-08-23T16:53:31.643000 CVE-2024-7340,0,0,a3f98c82759b3c1463da2160a8c456e9c18de4cdd89227049824622069589bfd,2024-08-01T14:01:07.677000 CVE-2024-7342,0,0,92ad1e6857e9b0cace198602fda8e3b1ec6edbf7f40f7b078718810def4495b5,2024-08-15T18:40:22.537000 CVE-2024-7343,0,0,b6b73fa45089899a04dcf5d8ab6e4cd843be4b35e1b528d7d577722e09cd2c25,2024-08-15T18:40:52.707000 @@ -260675,6 +260707,8 @@ CVE-2024-7414,0,0,ec5a655568a866725caccc407e481351f1a5df496455996ee3102ef3dac59f CVE-2024-7416,0,0,67a9ab6c88d18462429964f1183d705aa9fe2b8f49f4e7e013c20651e7dbf059,2024-08-12T13:41:36.517000 CVE-2024-7420,0,0,212201dc70782f8f787a94c9803febdbce3768abc9739a3b9300a43932a4c1b3,2024-08-15T13:01:10.150000 CVE-2024-7422,0,0,36692ebd2df61833999819382a06fe94bffc446bd5a7ed95f5ad6f2f1be17d62,2024-08-19T13:00:23.117000 +CVE-2024-7427,1,1,42e3d6ed5383ab68eb9db9056ecff1e659205d89386ddba540fc614f244d39a6,2024-08-23T17:15:10.360000 +CVE-2024-7428,1,1,ac98153c626bee317d656393b6ab1dfc85cea963187038e39f0b2803b74f1959,2024-08-23T17:15:10.500000 CVE-2024-7436,0,0,4e5f8b4434de8d3be7545b252fde74866f6d1e15f143f31c26845d516524cae6,2024-08-05T12:41:45.957000 CVE-2024-7437,0,0,6536d7f97d7ad58b67ec8c23497b1bab63383020d43415bc5b4c83af23e0fa6d,2024-08-12T13:38:43.060000 CVE-2024-7438,0,0,e0751aac5a1208089fd3136e155c05769dcef78130a2d9c6fdc04c87ca92fb9a,2024-08-12T13:38:43.203000 @@ -260686,7 +260720,7 @@ CVE-2024-7443,0,0,6fd967d6e919ba4fd37dfeb9ebba86f65e44a71c337f483ada629ef6535926 CVE-2024-7444,0,0,ca3d64055e225d6b5e8eee0e0444f0cb79935fb72609b2a9f4d68e4b74c3192c,2024-08-20T19:56:15.850000 CVE-2024-7445,0,0,cfdc75d4fec77cd886589c658aa3dd464f31452c81f68546e40e8c22e50a8eed,2024-08-09T15:36:06.757000 CVE-2024-7446,0,0,e26be21c8dbcfe67dfe123a70d3d827309d2b8d2fde731242ee6ec383c477df8,2024-08-09T15:36:35.453000 -CVE-2024-7448,0,0,ae9849032eac16c236c4781468f5868682dc2760c8d4f5d5b735d0acf907ec20,2024-08-21T17:24:59.627000 +CVE-2024-7448,0,1,45c3f7d454a0be35da8c66f5dc9a08909cac5ebb23ff5c9ca2703711c198acbe,2024-08-23T16:54:45.410000 CVE-2024-7449,0,0,31b14531757b0311680dadfa626760cb5034a4ff48ce18c613a332462c638a89,2024-08-20T19:49:11.947000 CVE-2024-7450,0,0,f36a88ecb7cf7b37b6090837acfb29fe52cc382469b7cf045e11a727c85c93f7,2024-08-09T15:33:58.153000 CVE-2024-7451,0,0,6c3c74a805aba0686ff087a4aeedf52269a2704aceeaba8fd15f2602a7b0b5b8,2024-08-09T15:33:56.027000 @@ -260767,7 +260801,7 @@ CVE-2024-7552,0,0,811aa90d2d18bb406f73befc3765a8f78539782307b57a4dcd481925c3ed1f CVE-2024-7553,0,0,423c29f04f0f081a0c5d9465a918cf0ed131ece97e02d2f5996269c83101214a,2024-08-07T15:17:46.717000 CVE-2024-7554,0,0,4a573fb2ab24355a17092729215e215195bfd8edf91c08645b945dde25aae201,2024-08-08T13:04:18.753000 CVE-2024-7557,0,0,689a9daa3ab546590d7c99bd152e6a8f70602c50080585be6131605a7c141656,2024-08-13T17:00:53.670000 -CVE-2024-7559,0,0,2e7824eef5c242ea87ab859b0dacac2433ea95fdf12fc737458a6e5eef0b4117,2024-08-23T03:15:04.060000 +CVE-2024-7559,0,1,4dc25ec2b0f2eec8919ecc81f209446d933d662f72b02d2630c82c602d53e698,2024-08-23T16:18:28.547000 CVE-2024-7560,0,0,69bf0d3c1d2353061d3a66813d4df2a8a02417391648b6018a10fb1d777785c6,2024-08-08T13:04:18.753000 CVE-2024-7561,0,0,4f145ac8bff9e09f18481f098864cf0c68d07bfaa0facd60438519477eaf9cd1,2024-08-08T13:04:18.753000 CVE-2024-7564,0,0,9647575e3fbd33f04dc9f7112e25f0abbbf3e6266c5fe28f9ec18868dfbd0106,2024-08-07T19:59:36.240000 @@ -260788,11 +260822,11 @@ CVE-2024-7589,0,0,aa1647eb6c306ec7b876b5795f9775a883f5cc7b06ae7ba418ac0c8e496652 CVE-2024-7590,0,0,7c97d5aae327ca695e1cd419af58bc8aaacb7517411055405e5e64d98b0261a2,2024-08-13T12:58:25.437000 CVE-2024-7592,0,0,8fcc04f54e061bfd6e46ae198ccc83c91032e0aab9065b8f437b9e9535665aed,2024-08-20T16:02:16.280000 CVE-2024-7593,0,0,2efb8857fe8e314338e0788060f0e22f0d56642d5618c3e3d62e70b5e7e24bac,2024-08-14T02:07:05.410000 -CVE-2024-7600,0,0,df9ea5382ae76eaa07d2038f3c1a261b5dab3a8d51edba8a1615dd75b8a7ae86,2024-08-21T17:25:08.560000 -CVE-2024-7601,0,0,0cd0cc3e9b592f69c60fa9525e9b4044ea678650dac96bf878bb0bc12d18b5f7,2024-08-21T17:25:08.560000 -CVE-2024-7602,0,0,681670da0d5ea368276c458bfd335dc84142a379f35cd9d1072e79c0c0968dd3,2024-08-21T17:25:08.560000 -CVE-2024-7603,0,0,ee75ca73d9ff000a521d60dd2bd96d940a61dcfaa024b75a8d0f0f33bb52d71c,2024-08-21T17:25:08.560000 -CVE-2024-7604,0,0,58eb9c041603c3622120dc34dbfc5b0275d32c68e3480a84279fede21b10ec78,2024-08-21T17:24:59.627000 +CVE-2024-7600,0,1,456ca552c9a809b72d1cc9f2b35e12282778424a2ecdfd82d7e98a6e39cd97fa,2024-08-23T16:35:31.137000 +CVE-2024-7601,0,1,db9958425836572eda0b52c7e651aff0e41e4dc47ec55ea348bc5752e1b198d2,2024-08-23T16:35:52.383000 +CVE-2024-7602,0,1,1295ede0549ca488da522cbefe2db5abad88498e69c53af1f38f0ee81eb69b62,2024-08-23T16:36:11.690000 +CVE-2024-7603,0,1,026c301c8508bb2890d37936199245036e5a5160d5195c848eb9252477eef559,2024-08-23T16:36:28.327000 +CVE-2024-7604,0,1,2ca377c2d37b9340c6f7d1612379ed11f338df19f0e6ffae40ca1da8c016df51,2024-08-23T16:37:09.107000 CVE-2024-7610,0,0,a10689bea1d0fbdec4f1b8819e74182773158d5010cb9fbea2ce46532922c645,2024-08-08T13:04:18.753000 CVE-2024-7613,0,0,595ae1d3f56b81eeb34ef1e184ddf7962f3a8fbfc042ff77a8fcf0bd3f10f263,2024-08-21T18:47:11.523000 CVE-2024-7614,0,0,70ea68e630891f9909a0a8afd3fe5566dad840edc8df033b5c308064cf074a69,2024-08-21T18:48:47.273000 @@ -260805,7 +260839,7 @@ CVE-2024-7628,0,0,13c6e75993fc4e0ea638854e2c037e11703f2e05b1bb0a7d2173b121da5472 CVE-2024-7629,0,0,45eb45459388d6798e88edee38a7dd2ceac912098ce5cc3a42af5f252bb2fbc1,2024-08-21T12:30:33.697000 CVE-2024-7630,0,0,418e383b03350a1fa5d21be50b8eebc36b3c165fb7c794a3b77aa7313e9af0aa,2024-08-19T13:00:23.117000 CVE-2024-7633,0,0,3b1df1487eb71af2061753f656e2660f3fdd60b89404cd84fa2c01a4dff29ee6,2024-08-12T13:38:45.690000 -CVE-2024-7634,0,0,d6d95d6be7118359eb1835d8d0fa1c2d139f74d8132d5d9170668a31dc0ed049,2024-08-22T18:15:10.553000 +CVE-2024-7634,0,1,4dd527529f9a56c919574759618ccb2ce269642e54da32ff8c65cd32bfe0a65f,2024-08-23T16:18:28.547000 CVE-2024-7635,0,0,77137333cb856f76f03e4b50e0e5dbce5cc99fa466aafebf6530d8cfb2e96fdd,2024-08-15T18:12:33.270000 CVE-2024-7636,0,0,81414365f80fa57b345628baccc97b68e4a32475a3dd61fce01a599a3ee31eee,2024-08-15T18:13:23.327000 CVE-2024-7637,0,0,07fff1a7df418b9e3b67d234f6aa590337509d3b6198aaa332e768f862723c65,2024-08-15T18:15:15.667000 @@ -260891,7 +260925,7 @@ CVE-2024-7790,0,0,456afed422d8355372643bd567f11679217bfde5ad866de9b559c62284a4c7 CVE-2024-7792,0,0,780efb1d4f2f4b2b409fe743d3f22e99dbfd1dd19ca4b6135b1d10d208fddc9f,2024-08-20T19:08:12.970000 CVE-2024-7793,0,0,bb4d13faa2c61a286b24cee75d87f2b6ca9a8400f7f1f86af9de88e306f04a14,2024-08-19T16:25:22.220000 CVE-2024-7794,0,0,518887acdec1d096ed1811f068ac701594939d9da7ca16210cb9fbd6cafa8631,2024-08-19T16:27:08.303000 -CVE-2024-7795,0,0,73ce209254878b5c3098ccd867b236fd49d4addfc3fae20ed136f1d0f4a7a1ff,2024-08-21T17:24:59.627000 +CVE-2024-7795,0,1,cc18f776b054beb7b333cbdad796402f3e4dae99e6e87ed5d90a61d9e08d20c8,2024-08-23T16:39:47.510000 CVE-2024-7797,0,0,3430cadba65aedfbf772af49a9e572a3ca306c1e3cba3762823768d5585ee5fe,2024-08-19T16:28:23.557000 CVE-2024-7798,0,0,fb236dc26edd7cd7b8d8ddc705b6042a9a0956f84b8af7a488e63270aae0e9d8,2024-08-19T16:42:32.480000 CVE-2024-7799,0,0,00b687245dbb834ce768a34773e6d247f116248fb1170e2cff00e71dda4a9f73,2024-08-19T16:47:37.860000 @@ -260929,7 +260963,7 @@ CVE-2024-7854,0,0,c7d42abb2b322c04201a8af34648ccfdb0ede7da24776e4c0b3ca238a25bf3 CVE-2024-7866,0,0,4c0cb0c858c0ff2de3d3bc9c6187348080bb51d5934bb16167513e626d441be5,2024-08-20T19:23:02.780000 CVE-2024-7867,0,0,6a317fb9db8a508202f8841173e6c3d2bd77edc707a891aff0fcaf7f472e0f1b,2024-08-19T13:00:23.117000 CVE-2024-7868,0,0,426aac72107d4f020c4b4c2ec1e49b6873953f44556989351b1605a1e98035d8,2024-08-19T13:00:23.117000 -CVE-2024-7885,0,0,d4e86ffa8f6c41db8fd62899fcadef82a76f3f1405a536b574424e08695e6cf7,2024-08-21T16:06:23.153000 +CVE-2024-7885,0,1,53926a53ab4f71fc31c04b79b6d61e8c39bb180f373c05a721578db45aa87a6a,2024-08-23T17:05:24.343000 CVE-2024-7886,0,0,b8c1f856b8479c6982faa8a2fc4a6d8b2480e045b8b096d9bd3b8640a06eb6f3,2024-08-19T13:00:23.117000 CVE-2024-7887,0,0,ba2ac28c88e5c856e9fa78c00b11f37e0df98a3508bf609dc9edbaa04a8fdb8e,2024-08-19T12:59:59.177000 CVE-2024-7896,0,0,d80047a3d1d6cdcff2bc1adb680d3fdbda8db4b01c807c4a42d25c13d72803dc,2024-08-19T17:15:11.543000 @@ -260996,31 +261030,31 @@ CVE-2024-7978,0,0,67c4229f7235438f3aa7b05e7807f93765050dcc016da021af4e6ebc6fa52e CVE-2024-7979,0,0,078bf6b1178f274a34fc1356c3dbffb7074d9c903c74e589d1b081f58230d3ec,2024-08-22T15:35:16.610000 CVE-2024-7980,0,0,1661097b9193f473ee067de4d4f40312756af353419ed3265d5438cf70d837f5,2024-08-22T15:35:17.610000 CVE-2024-7981,0,0,558a7e30af48c73a27172093229eee673e34b504c9731b910b5af4369614c86c,2024-08-22T17:36:24.803000 -CVE-2024-7986,0,0,4b4be1ce299fc8765807b9f6aae526757339b781b3016894d983f936af089685,2024-08-23T12:15:03.920000 +CVE-2024-7986,0,1,c7458253d91e1e23c614a9f566a13ac1c4d3fb8524a5b23e4c160cc8176489bb,2024-08-23T16:18:28.547000 CVE-2024-7998,0,0,8aa3505a1b6ed462573d7b65c55c5633ff88a81168885ae03bec6b1db69a2167,2024-08-21T12:30:33.697000 CVE-2024-8003,0,0,1eb6cc8bd16248d54ed281136e233da0a723cb74879af6e3337c9532a3caf8e1,2024-08-21T15:51:28.397000 CVE-2024-8005,0,0,c059370cb975aea915e5671e32cb80d879151797480dbd5423b1593aeba96675,2024-08-21T15:49:59.470000 -CVE-2024-8007,0,0,d227b03f895ef761f269cb1491d7d5722db05e40b51b1467b77f2f84ee5beceb,2024-08-21T16:06:23.153000 +CVE-2024-8007,0,1,52ca9c0e82e8a1b579386af92379a7290d3dc66a84196be21e42591213ed68f8,2024-08-23T17:06:04.643000 CVE-2024-8022,0,0,469d074c70ed4d6e1b7ca7023005d3bb3e3f23419b5a39b3540fd69e34fadcaa,2024-08-21T12:30:33.697000 CVE-2024-8023,0,0,7f1c10536d9d4e1a728f09b10c1ff35f77d0bba503a7c61c411fbfd5f6584d46,2024-08-21T12:30:33.697000 CVE-2024-8033,0,0,a55cf019f91370d30ea7734ed696c6e008634912634c88c606ef5f6209b81cb2,2024-08-22T17:36:07.673000 CVE-2024-8034,0,0,990fb53670bf6f787a3d54c0392722fc0a67a939e8056c22142bc6f2bee92a38,2024-08-22T17:35:30.003000 CVE-2024-8035,0,0,e11fe8c378f080395f404658baee2e1c5cd70ef826bdf0b13fe46f85c653ad4a,2024-08-22T17:33:37.407000 -CVE-2024-8041,0,0,a1cbdddbce69857892b2d0881ba6bfcc668b66194ac3d90441c1bdbb66f0dae3,2024-08-22T16:15:10.880000 -CVE-2024-8071,0,1,ac7c2c7e7df896f6bfe7f17a6e74f8de236e5ec843865384cdf53fde1e533098,2024-08-23T15:34:53.913000 +CVE-2024-8041,0,1,530afb8d20f30d401c1d7f8908c798a45edf30b2f924035dda7c4300ee7ef6f4,2024-08-23T16:18:28.547000 +CVE-2024-8071,0,0,ac7c2c7e7df896f6bfe7f17a6e74f8de236e5ec843865384cdf53fde1e533098,2024-08-23T15:34:53.913000 CVE-2024-8072,0,0,08fafb0bed7b0568fefcb8938e0e01cf4acf3cb153d4b847bc3e1d9427344a62,2024-08-22T14:35:18.797000 -CVE-2024-8075,0,0,7079b719572b53350db51e194b079bb027ed093b84ca2288274afcc9c61e18e9,2024-08-22T20:15:10.210000 -CVE-2024-8076,0,0,5422ff555378339e3db32bbb4b4a84b33933a93def5de9c6bbe2c92bdf4d6eb0,2024-08-22T20:15:11.017000 -CVE-2024-8077,0,0,dfda6dec69a8c0f0b52ef8c08df76e2bad192b6161a8d6308689618841f71875,2024-08-22T20:15:11.690000 -CVE-2024-8078,0,0,2411dc17166c6e2b6a2c4099cd4a7c0f52610cbc3a42ead6750f7228a1af594b,2024-08-22T21:15:17.603000 -CVE-2024-8079,0,0,4926967e2b3295baddb2321c216aff25029967f573a76b1e6e5c30e67c6da0d4,2024-08-22T21:15:17.910000 -CVE-2024-8080,0,0,b7396789c05f63952d87297908119d6db13570ae1754c0bf6c6b54a52e342c2d,2024-08-22T21:15:18.217000 -CVE-2024-8081,0,0,f6704f98c24d84c5f9715f1e2595ffffa989151e2f49381b8d0d0bfc7d6dcfe3,2024-08-22T22:15:05.510000 -CVE-2024-8083,0,0,6e911e9d947a6b867db25452fc337b13ddb897e44b3bf715c83b1727ac1094a0,2024-08-22T22:15:05.760000 -CVE-2024-8084,0,0,54ebf9dbea9be8ad7540cd39535abccca8c201930c031c649424305284722070,2024-08-22T22:15:06.010000 -CVE-2024-8086,0,0,0032322cb5219616ff9e8ac2385cd94278f0a48a10ad2e858e6762ceae5e7fac,2024-08-22T23:15:08.323000 -CVE-2024-8087,0,0,ce74b4ff6db63303399517b3cc8a3518d37d14104709e6d8caee468523387dff,2024-08-22T23:15:08.633000 -CVE-2024-8088,0,0,4ef83eee673ee14bb05eb2757d0f3a4f17e1e757b372b527d200b6de8438c4b6,2024-08-22T19:15:09.720000 -CVE-2024-8089,0,0,ecdc3c0a902521d8446bfc643aa4dadd0823df6493ad03befc85ba1d3e8d640f,2024-08-23T00:15:08.907000 -CVE-2024-8112,1,1,f25b5ffa5643cf2615c63ad2a96ffedf2d72cda570617f8cf94f91d0711341e8,2024-08-23T15:15:17.230000 -CVE-2024-8113,1,1,e1f86f88dc5b7257d939e629ca56ee66d21f951c6738994060a4d0c003077aba,2024-08-23T15:15:17.593000 +CVE-2024-8075,0,1,8f01959220c32e8ddcbc58487f8fa6b34cdc1a5defab50c9b78b1ba461583006,2024-08-23T16:18:28.547000 +CVE-2024-8076,0,1,10377596855ef60bf83b0daca578a2df05cf4e44ae663aebcbbf7ceaec7d91f8,2024-08-23T16:18:28.547000 +CVE-2024-8077,0,1,dfaba62e1a5ac86b8269d34e4d8f061b3115ba664d3b281f9df2a189f223678e,2024-08-23T16:18:28.547000 +CVE-2024-8078,0,1,56fa022d353460bea9cc13531e8ff39ff18a56376aa15fa3c7ad1544c4d78eb9,2024-08-23T16:18:28.547000 +CVE-2024-8079,0,1,45e2451b8ff502b01a62e2eb189952370de6cb2828a8e3600f61fbc081041d88,2024-08-23T16:18:28.547000 +CVE-2024-8080,0,1,c8da83ed651e2e78327dca04cb45f8efec07e44d550ef7a9ff0faf681234c986,2024-08-23T16:18:28.547000 +CVE-2024-8081,0,1,228978e462b6f531f1f028628affa80e6a3b9dae3f5e4460d54f618867e8c24f,2024-08-23T16:18:28.547000 +CVE-2024-8083,0,1,d9a82ea9f31532bfda37fecac751c04bbca7fe5c3cf11f74c5dbd79505058775,2024-08-23T16:18:28.547000 +CVE-2024-8084,0,1,e168cbe5513918328c29c72c3002ff2a8e46fd9d48bec9183a6df1817fe95bb9,2024-08-23T16:18:28.547000 +CVE-2024-8086,0,1,733b474363dbcad808b8e4398baa4c9f8448867ada7c056f937ef59dcf22a744,2024-08-23T16:18:28.547000 +CVE-2024-8087,0,1,bb0c790350b9ce0a319264c0c4effab193cca462b01a1701bf8a998b8698db5a,2024-08-23T16:18:28.547000 +CVE-2024-8088,0,1,e5a9ec72942c4296b8a014a720b88a7b876f02b4fa3c4aa7bb07daba3bf232cc,2024-08-23T16:18:28.547000 +CVE-2024-8089,0,1,fe8d41ba149aaae8be5bcde261fbae8cee913e6a537c9c73424591ad94ea6fed,2024-08-23T16:18:28.547000 +CVE-2024-8112,0,1,53bc9e4fb84bb028363b46c3cb18428063770b5e5c085f93ec85e24d18222c0b,2024-08-23T16:18:28.547000 +CVE-2024-8113,0,1,663828d204cb9ecb17f530ae295b4541dee23e7a4b7b9d658530d5cb44ff87e3,2024-08-23T16:18:28.547000