From d5cf1808b82bb8505ab20fa779a0b8873bed7b8d Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 13 Aug 2024 02:03:12 +0000 Subject: [PATCH] Auto-Update: 2024-08-13T02:00:17.173553+00:00 --- CVE-2024/CVE-2024-211xx/CVE-2024-21147.json | 14 +- CVE-2024/CVE-2024-377xx/CVE-2024-37742.json | 39 +++++- CVE-2024/CVE-2024-382xx/CVE-2024-38218.json | 16 ++- CVE-2024/CVE-2024-399xx/CVE-2024-39949.json | 14 +- CVE-2024/CVE-2024-404xx/CVE-2024-40472.json | 41 +++++- CVE-2024/CVE-2024-404xx/CVE-2024-40474.json | 41 +++++- CVE-2024/CVE-2024-404xx/CVE-2024-40475.json | 41 +++++- CVE-2024/CVE-2024-404xx/CVE-2024-40476.json | 41 +++++- CVE-2024/CVE-2024-404xx/CVE-2024-40477.json | 39 +++++- CVE-2024/CVE-2024-404xx/CVE-2024-40479.json | 39 +++++- CVE-2024/CVE-2024-404xx/CVE-2024-40481.json | 41 +++++- CVE-2024/CVE-2024-404xx/CVE-2024-40482.json | 39 +++++- CVE-2024/CVE-2024-404xx/CVE-2024-40484.json | 41 +++++- CVE-2024/CVE-2024-404xx/CVE-2024-40486.json | 39 +++++- CVE-2024/CVE-2024-404xx/CVE-2024-40488.json | 41 +++++- CVE-2024/CVE-2024-413xx/CVE-2024-41332.json | 41 +++++- CVE-2024/CVE-2024-415xx/CVE-2024-41570.json | 41 +++++- CVE-2024/CVE-2024-61xx/CVE-2024-6133.json | 27 +++- CVE-2024/CVE-2024-61xx/CVE-2024-6136.json | 27 +++- CVE-2024/CVE-2024-77xx/CVE-2024-7707.json | 137 +++++++++++++++++++ CVE-2024/CVE-2024-77xx/CVE-2024-7709.json | 141 ++++++++++++++++++++ README.md | 58 ++++---- _state.csv | 112 ++++++++-------- 23 files changed, 979 insertions(+), 131 deletions(-) create mode 100644 CVE-2024/CVE-2024-77xx/CVE-2024-7707.json create mode 100644 CVE-2024/CVE-2024-77xx/CVE-2024-7709.json diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21147.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21147.json index 3308491d63d..91bfd4c2a8b 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21147.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21147.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21147", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-07-16T23:15:16.377", - "lastModified": "2024-07-19T14:15:05.667", + "lastModified": "2024-08-13T00:49:47.367", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://security.netapp.com/advisory/ntap-20240719-0008/", diff --git a/CVE-2024/CVE-2024-377xx/CVE-2024-37742.json b/CVE-2024/CVE-2024-377xx/CVE-2024-37742.json index 9e52ef0106c..7ce04161cea 100644 --- a/CVE-2024/CVE-2024-377xx/CVE-2024-37742.json +++ b/CVE-2024/CVE-2024-377xx/CVE-2024-37742.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37742", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-25T22:15:35.183", - "lastModified": "2024-06-26T20:15:15.917", + "lastModified": "2024-08-13T01:09:33.383", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en Safe Exam Browser para Windows anterior a 3.6 permite a un atacante compartir datos del portapapeles entre el modo quiosco SEB y el sistema subyacente, comprometiendo la integridad del examen, lo que puede llevar a la ejecuci\u00f3n de c\u00f3digo arbitrario y a la obtenci\u00f3n de informaci\u00f3n confidencial a trav\u00e9s del componente de administraci\u00f3n del portapapeles." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://github.com/Eteblue/CVE-2024-37742", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38218.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38218.json index e16210fd8b4..6257a1e146b 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38218.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38218.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38218", "sourceIdentifier": "secure@microsoft.com", "published": "2024-08-12T13:38:23.933", - "lastModified": "2024-08-12T13:41:36.517", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-13T01:10:06.100", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -35,6 +35,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38218", diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39949.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39949.json index 61dce11a5e5..f234d15a8f5 100644 --- a/CVE-2024/CVE-2024-399xx/CVE-2024-39949.json +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39949.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39949", "sourceIdentifier": "cybersecurity@dahuatech.com", "published": "2024-07-31T04:15:05.503", - "lastModified": "2024-07-31T12:57:02.300", + "lastModified": "2024-08-13T01:11:46.520", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "https://www.dahuasecurity.com/aboutUs/trustedCenter/details/768", diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40472.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40472.json index c86aa8a8e95..4d6026b5e7f 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40472.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40472.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40472", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-12T13:38:28.273", - "lastModified": "2024-08-12T13:41:36.517", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-13T01:13:41.263", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "Sourcecodester Daily Calories Monitoring Tool v1.0 is vulnerable to SQL Injection via \"delete-calorie.php.\"" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Sourcecodester/Daily%20Calories%20Monitoring%20Tool%20v1.0/SQL%20Injection.pdf", diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40474.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40474.json index a0c8ee4f580..694e9177121 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40474.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40474.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40474", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-12T13:38:28.463", - "lastModified": "2024-08-12T13:41:36.517", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-13T01:13:42.670", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "A Reflected Cross Site Scripting (XSS) vulnerability was found in \"edit-cate.php\" in SourceCodester House Rental Management System v1.0." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Sourcecodester/Best%20House%20Rental%20Management%20System%20v1.0/Reflected%20XSS.pdf", diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40475.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40475.json index 92cf430fd3a..c872a399cd7 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40475.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40475.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40475", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-12T13:38:28.553", - "lastModified": "2024-08-12T13:41:36.517", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-13T01:13:44.077", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "SourceCodester Best House Rental Management System v1.0 is vulnerable to Incorrect Access Control via /rental/payment_report.php, /rental/balance_report.php, /rental/invoices.php, /rental/tenants.php, and /rental/users.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Sourcecodester/Best%20House%20Rental%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20Deep%20URL.pdf", diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40476.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40476.json index a0ed3db25f0..02fffd7ebab 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40476.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40476.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40476", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-12T13:38:28.637", - "lastModified": "2024-08-12T13:41:36.517", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-13T01:13:45.497", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "A Cross-Site Request Forgery (CSRF) vulnerability was found in SourceCodester Best House Rental Management System v1.0. This could lead to an attacker tricking the administrator into adding/modifying/deleting valid tenant data via a crafted HTML page, as demonstrated by a Delete Tenant action at the /rental/ajax.php?action=delete_tenant." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Sourcecodester/Best%20House%20Rental%20Management%20System%20v1.0/CSRF.pdf", diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40477.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40477.json index 8d35a2ce661..942a02e4361 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40477.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40477.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40477", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-12T13:38:28.727", - "lastModified": "2024-08-12T13:41:36.517", + "lastModified": "2024-08-13T01:13:46.877", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A SQL injection vulnerability in \"/oahms/admin/forgot-password.php\" in PHPGurukul Old Age Home Management System v1.0 allows an attacker to execute arbitrary SQL commands via the \"email\" parameter." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/PHPGurukul/Old%20Age%20Home%20Mgmt%20System%20v1.0/SQL%20Injection.pdf", diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40479.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40479.json index cf1305c580f..72e5d37b27c 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40479.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40479.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40479", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-12T13:38:28.913", - "lastModified": "2024-08-12T13:41:36.517", + "lastModified": "2024-08-13T01:13:47.860", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A SQL injection vulnerability in \"/admin/quizquestion.php\" in Kashipara Online Exam System v1.0 allows remote attackers to execute arbitrary SQL commands via the \"eid\" parameter." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Online%20Exam%20System%20v1.0/SQL%20Injection.pdf", diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40481.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40481.json index 5f010e7f65d..5b424ce738f 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40481.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40481.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40481", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-12T13:38:29.093", - "lastModified": "2024-08-12T13:41:36.517", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-13T01:13:48.730", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "A Stored Cross Site Scripting (XSS) vulnerability was found in \"/admin/view-enquiry.php\" in PHPGurukul Old Age Home Management System v1.0, which allows remote attackers to execute arbitrary code via the Contact Us page \"message\" parameter." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/PHPGurukul/Old%20Age%20Home%20Mgmt%20System%20v1.0/Stored%20XSS.pdf", diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40482.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40482.json index 88509340ba6..9d8794cdecc 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40482.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40482.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40482", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-12T13:38:29.180", - "lastModified": "2024-08-12T13:41:36.517", + "lastModified": "2024-08-13T01:13:50.130", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An Unrestricted file upload vulnerability was found in \"/Membership/edit_member.php\" of Kashipara Live Membership System v1.0, which allows attackers to execute arbitrary code via uploading a crafted PHP file." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Live%20Membership%20System%20v1.0/Unrestricted%20File%20Upload.pdf", diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40484.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40484.json index 49841142f35..b34ca360378 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40484.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40484.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40484", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-12T13:38:29.273", - "lastModified": "2024-08-12T13:41:36.517", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-13T01:13:50.997", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "A Reflected Cross Site Scripting (XSS) vulnerability was found in \"/oahms/search.php\" in PHPGurukul Old Age Home Management System v1.0, which allows remote attackers to execute arbitrary code via the \"searchdata\" parameter." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/PHPGurukul/Old%20Age%20Home%20Mgmt%20System%20v1.0/Reflected%20XSS.pdf", diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40486.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40486.json index 26525832f2a..a3b48acdb2a 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40486.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40486.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40486", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-12T13:38:29.360", - "lastModified": "2024-08-12T13:41:36.517", + "lastModified": "2024-08-13T01:13:52.383", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A SQL injection vulnerability in \"/index.php\" of Kashipara Live Membership System v1.0 allows remote attackers to execute arbitrary SQL commands and bypass Login via the email or password Login parameters." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Live%20Membership%20System%20v1.0/SQL%20Injection.pdf", diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40488.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40488.json index 3210a43114d..bd84cce6016 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40488.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40488.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40488", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-12T13:38:29.537", - "lastModified": "2024-08-12T13:41:36.517", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-13T01:13:53.230", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "A Cross-Site Request Forgery (CSRF) vulnerability was found in the Kashipara Live Membership System v1.0. This could lead to an attacker tricking the administrator into deleting valid member data via a crafted HTML page, as demonstrated by a Delete Member action at the /delete_members.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://capec.mitre.org/data/definitions/62.html", diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41332.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41332.json index 6b9f7b16e8d..184a2d3163a 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41332.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41332.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41332", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-12T13:38:30.150", - "lastModified": "2024-08-12T13:41:36.517", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-13T01:14:31.280", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "Incorrect access control in the delete_category function of Sourcecodester Computer Laboratory Management System v1.0 allows authenticated attackers with low-level privileges to arbitrarily delete categories." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://packetstormsecurity.com/files/179890/Computer-Laboratory-Management-System-1.0-Privilege-Escalation.html", diff --git a/CVE-2024/CVE-2024-415xx/CVE-2024-41570.json b/CVE-2024/CVE-2024-415xx/CVE-2024-41570.json index 2bd719bf612..9ffdc400c85 100644 --- a/CVE-2024/CVE-2024-415xx/CVE-2024-41570.json +++ b/CVE-2024/CVE-2024-415xx/CVE-2024-41570.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41570", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-12T13:38:31.277", - "lastModified": "2024-08-12T13:41:36.517", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-13T01:14:38.880", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "An Unauthenticated Server-Side Request Forgery (SSRF) in demon callback handling in Havoc 2 0.7 allows attackers to send arbitrary network traffic originating from the team server." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], "references": [ { "url": "https://blog.chebuya.com/posts/server-side-request-forgery-on-havoc-c2/", diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6133.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6133.json index 48de65dd596..1d5687796ac 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6133.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6133.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6133", "sourceIdentifier": "contact@wpscan.com", "published": "2024-08-12T13:38:38.703", - "lastModified": "2024-08-12T13:41:36.517", + "lastModified": "2024-08-13T01:18:26.570", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "The wp-cart-for-digital-products WordPress plugin before 8.5.6 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/fd613e1e-557c-4383-a3e9-4c14bc0be0c5/", diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6136.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6136.json index 758f2d543d5..7e91ba0fe24 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6136.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6136.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6136", "sourceIdentifier": "contact@wpscan.com", "published": "2024-08-12T13:38:38.850", - "lastModified": "2024-08-12T13:41:36.517", + "lastModified": "2024-08-13T01:18:26.820", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "The wp-cart-for-digital-products WordPress plugin before 8.5.6 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/7d85cfe4-4878-4530-ba78-7cfe33f3a8d5/", diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7707.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7707.json new file mode 100644 index 00000000000..ca05f21f349 --- /dev/null +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7707.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7707", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-13T01:24:09.723", + "lastModified": "2024-08-13T01:24:09.723", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Tenda FH1206 02.03.01.35 and classified as critical. Affected by this issue is the function formSafeEmailFilter of the file /goform/SafeEmailFilter of the component HTTP POST Request Handler. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/VodkaVortex/IoT/blob/main/formSafeEmailFilter.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274190", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274190", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.385670", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7709.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7709.json new file mode 100644 index 00000000000..559810d6d61 --- /dev/null +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7709.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-7709", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-13T01:24:10.067", + "lastModified": "2024-08-13T01:24:10.067", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, has been found in OcoMon 4.0. This issue affects some unknown processing of the file /includes/common/require_access_recovery.php of the component URL Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.0.1 and 5.0 is able to address this issue. It is recommended to upgrade the affected component." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 5.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://ocomon.com.br/site/atualizacao-de-seguranca/", + "source": "cna@vuldb.com" + }, + { + "url": "https://ocomon.com.br/site/downloads/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274205", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274205", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.388843", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 8041194a969..5ce2cb53c46 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-08-12T23:55:17.211334+00:00 +2024-08-13T02:00:17.173553+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-08-12T23:15:19.417000+00:00 +2024-08-13T01:24:10.067000+00:00 ``` ### Last Data Feed Release @@ -27,50 +27,46 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-08-12T00:00:08.652221+00:00 +2024-08-13T00:00:08.646570+00:00 ``` ### Total Number of included CVEs ```plain -259640 +259642 ``` ### CVEs added in the last Commit -Recently added CVEs: `36` +Recently added CVEs: `2` -- [CVE-2024-43137](CVE-2024/CVE-2024-431xx/CVE-2024-43137.json) (`2024-08-12T23:15:17.773`) -- [CVE-2024-43139](CVE-2024/CVE-2024-431xx/CVE-2024-43139.json) (`2024-08-12T23:15:17.997`) -- [CVE-2024-43147](CVE-2024/CVE-2024-431xx/CVE-2024-43147.json) (`2024-08-12T23:15:18.230`) -- [CVE-2024-43148](CVE-2024/CVE-2024-431xx/CVE-2024-43148.json) (`2024-08-12T23:15:18.457`) -- [CVE-2024-43149](CVE-2024/CVE-2024-431xx/CVE-2024-43149.json) (`2024-08-12T23:15:18.673`) -- [CVE-2024-43150](CVE-2024/CVE-2024-431xx/CVE-2024-43150.json) (`2024-08-12T23:15:18.897`) -- [CVE-2024-43151](CVE-2024/CVE-2024-431xx/CVE-2024-43151.json) (`2024-08-12T22:15:09.070`) -- [CVE-2024-43152](CVE-2024/CVE-2024-431xx/CVE-2024-43152.json) (`2024-08-12T22:15:09.310`) -- [CVE-2024-43155](CVE-2024/CVE-2024-431xx/CVE-2024-43155.json) (`2024-08-12T22:15:09.550`) -- [CVE-2024-43156](CVE-2024/CVE-2024-431xx/CVE-2024-43156.json) (`2024-08-12T22:15:09.780`) -- [CVE-2024-43161](CVE-2024/CVE-2024-431xx/CVE-2024-43161.json) (`2024-08-12T22:15:10.003`) -- [CVE-2024-43163](CVE-2024/CVE-2024-431xx/CVE-2024-43163.json) (`2024-08-12T22:15:10.233`) -- [CVE-2024-43164](CVE-2024/CVE-2024-431xx/CVE-2024-43164.json) (`2024-08-12T22:15:10.453`) -- [CVE-2024-43210](CVE-2024/CVE-2024-432xx/CVE-2024-43210.json) (`2024-08-12T22:15:10.690`) -- [CVE-2024-43213](CVE-2024/CVE-2024-432xx/CVE-2024-43213.json) (`2024-08-12T22:15:10.917`) -- [CVE-2024-43216](CVE-2024/CVE-2024-432xx/CVE-2024-43216.json) (`2024-08-12T22:15:11.153`) -- [CVE-2024-43217](CVE-2024/CVE-2024-432xx/CVE-2024-43217.json) (`2024-08-12T22:15:11.383`) -- [CVE-2024-43218](CVE-2024/CVE-2024-432xx/CVE-2024-43218.json) (`2024-08-12T22:15:11.603`) -- [CVE-2024-43220](CVE-2024/CVE-2024-432xx/CVE-2024-43220.json) (`2024-08-12T22:15:11.827`) -- [CVE-2024-43224](CVE-2024/CVE-2024-432xx/CVE-2024-43224.json) (`2024-08-12T22:15:12.057`) -- [CVE-2024-43225](CVE-2024/CVE-2024-432xx/CVE-2024-43225.json) (`2024-08-12T22:15:12.293`) -- [CVE-2024-43226](CVE-2024/CVE-2024-432xx/CVE-2024-43226.json) (`2024-08-12T22:15:12.520`) -- [CVE-2024-7590](CVE-2024/CVE-2024-75xx/CVE-2024-7590.json) (`2024-08-12T22:15:12.750`) -- [CVE-2024-7705](CVE-2024/CVE-2024-77xx/CVE-2024-7705.json) (`2024-08-12T23:15:19.113`) -- [CVE-2024-7706](CVE-2024/CVE-2024-77xx/CVE-2024-7706.json) (`2024-08-12T23:15:19.417`) +- [CVE-2024-7707](CVE-2024/CVE-2024-77xx/CVE-2024-7707.json) (`2024-08-13T01:24:09.723`) +- [CVE-2024-7709](CVE-2024/CVE-2024-77xx/CVE-2024-7709.json) (`2024-08-13T01:24:10.067`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `19` +- [CVE-2024-21147](CVE-2024/CVE-2024-211xx/CVE-2024-21147.json) (`2024-08-13T00:49:47.367`) +- [CVE-2024-37742](CVE-2024/CVE-2024-377xx/CVE-2024-37742.json) (`2024-08-13T01:09:33.383`) +- [CVE-2024-38218](CVE-2024/CVE-2024-382xx/CVE-2024-38218.json) (`2024-08-13T01:10:06.100`) +- [CVE-2024-39949](CVE-2024/CVE-2024-399xx/CVE-2024-39949.json) (`2024-08-13T01:11:46.520`) +- [CVE-2024-40472](CVE-2024/CVE-2024-404xx/CVE-2024-40472.json) (`2024-08-13T01:13:41.263`) +- [CVE-2024-40474](CVE-2024/CVE-2024-404xx/CVE-2024-40474.json) (`2024-08-13T01:13:42.670`) +- [CVE-2024-40475](CVE-2024/CVE-2024-404xx/CVE-2024-40475.json) (`2024-08-13T01:13:44.077`) +- [CVE-2024-40476](CVE-2024/CVE-2024-404xx/CVE-2024-40476.json) (`2024-08-13T01:13:45.497`) +- [CVE-2024-40477](CVE-2024/CVE-2024-404xx/CVE-2024-40477.json) (`2024-08-13T01:13:46.877`) +- [CVE-2024-40479](CVE-2024/CVE-2024-404xx/CVE-2024-40479.json) (`2024-08-13T01:13:47.860`) +- [CVE-2024-40481](CVE-2024/CVE-2024-404xx/CVE-2024-40481.json) (`2024-08-13T01:13:48.730`) +- [CVE-2024-40482](CVE-2024/CVE-2024-404xx/CVE-2024-40482.json) (`2024-08-13T01:13:50.130`) +- [CVE-2024-40484](CVE-2024/CVE-2024-404xx/CVE-2024-40484.json) (`2024-08-13T01:13:50.997`) +- [CVE-2024-40486](CVE-2024/CVE-2024-404xx/CVE-2024-40486.json) (`2024-08-13T01:13:52.383`) +- [CVE-2024-40488](CVE-2024/CVE-2024-404xx/CVE-2024-40488.json) (`2024-08-13T01:13:53.230`) +- [CVE-2024-41332](CVE-2024/CVE-2024-413xx/CVE-2024-41332.json) (`2024-08-13T01:14:31.280`) +- [CVE-2024-41570](CVE-2024/CVE-2024-415xx/CVE-2024-41570.json) (`2024-08-13T01:14:38.880`) +- [CVE-2024-6133](CVE-2024/CVE-2024-61xx/CVE-2024-6133.json) (`2024-08-13T01:18:26.570`) +- [CVE-2024-6136](CVE-2024/CVE-2024-61xx/CVE-2024-6136.json) (`2024-08-13T01:18:26.820`) ## Download and Usage diff --git a/_state.csv b/_state.csv index e96b600acb1..abd3877d429 100644 --- a/_state.csv +++ b/_state.csv @@ -240723,7 +240723,7 @@ CVE-2023-7062,0,0,3a1384a593cf152e366a728afe5a537e5564a111dceb33df09a757d554c48c CVE-2023-7063,0,0,a70eaf68fc7417ce794998ee774eb52a272a3335bd687053e59996226f95eaaa,2024-01-30T23:02:10.287000 CVE-2023-7064,0,0,893764021ac36e56fb425978b9c0fe444e7d7382c4148ca0b308b12be70459a1,2024-05-02T18:00:37.360000 CVE-2023-7065,0,0,56ad85a9f778da0dacae256a17e9f54a48bb66bb1d9f0de63c0c37a650069950,2024-05-06T12:44:56.377000 -CVE-2023-7066,1,1,13b6222827af5173dbe36c458d7805857373b7b38d38f0a0e8f4c55228206704,2024-08-12T22:15:08.770000 +CVE-2023-7066,0,0,13b6222827af5173dbe36c458d7805857373b7b38d38f0a0e8f4c55228206704,2024-08-12T22:15:08.770000 CVE-2023-7067,0,0,d251fedac3953c556b2fae675b30174d6cef931689e18f0c7f5dabce8da9f8a8,2024-05-02T18:00:37.360000 CVE-2023-7068,0,0,7cd804daabb13f07758b06c47cadf4e49acc509b298d07d52e072e7d9588adca,2024-01-09T20:19:48.597000 CVE-2023-7069,0,0,348519c1ee085e4d109b6f90b6ff63f6d5a582ce97e3f91d1eb069ee9d1eaaa4,2024-02-07T16:28:40.250000 @@ -243461,7 +243461,7 @@ CVE-2024-21143,0,0,00d3158bf58fdef1b0ea359eb4fd1877d407a38c8141a35ed2d92f7d5fd7f CVE-2024-21144,0,0,a6e0220af7613c1fe6414e49d55f78f0a709fc1177b6fe6b6e15840375ef4e2d,2024-07-19T14:15:05.497000 CVE-2024-21145,0,0,77d6b8d482bc9fea478023a3ac3b96ff89a156b807bd0fe4072eea7489b1a76c,2024-07-19T14:15:05.580000 CVE-2024-21146,0,0,c75b160e4e3c99880ff62d36e7e801ade0e912daea3b1e5430c44ac99095338a,2024-07-17T13:34:20.520000 -CVE-2024-21147,0,0,84f7acc7bc3a20d2859db41d6e11faaeb2b951c493091b63d082c86a294a3902,2024-07-19T14:15:05.667000 +CVE-2024-21147,0,1,d581db22cc70629aa91eb51c988684be29e1ff1430ebd94500067b05edd568f0,2024-08-13T00:49:47.367000 CVE-2024-21148,0,0,7bc96a76ce0077505eae8d68abc8206f3ba6f186267ade9b3eedb49371d494f1,2024-07-17T13:34:20.520000 CVE-2024-21149,0,0,ee2bd3223896d48493ed4bc80a50d18703c1a2b0e21db09049566849fca16635,2024-07-17T13:34:20.520000 CVE-2024-2115,0,0,66506b198b4ece0adfc9016031263e6294a50c545f577c56b849d0c705d750c7,2024-04-05T12:40:52.763000 @@ -253379,7 +253379,7 @@ CVE-2024-35771,0,0,da094131a898160f7d7534ebd658d9f6c0a47dcb5974f75d3d7653ce22b76 CVE-2024-35772,0,0,67c04a52c2580bba2b2143b8a9e3a147188afdddd51ee8f46047ed6b048599a3,2024-06-24T19:26:14.460000 CVE-2024-35773,0,0,edf644c32dc0e69969a2e651ff67d0bafccf9621547e03428fff35ea895725bb,2024-07-12T16:34:58.687000 CVE-2024-35774,0,0,eade8c8b3f01bcf230b9a96162b1334f062933da0f10549431055a0386eca873,2024-06-24T18:43:57.633000 -CVE-2024-35775,1,1,518da236919df970cd5c17117821a744c7c1b2b229313b9338b80ee8aa864621,2024-08-12T23:15:15.467000 +CVE-2024-35775,0,0,518da236919df970cd5c17117821a744c7c1b2b229313b9338b80ee8aa864621,2024-08-12T23:15:15.467000 CVE-2024-35776,0,0,e4d3227671df814d3a4852e5c0b87fcdc40bc918afeafb90df6afc52f9dfd1c7,2024-06-24T18:49:09.500000 CVE-2024-35777,0,0,7515dddc5351fc16fba23045723f9d79e6a247348fcb082c517c87296afa7e23,2024-07-09T18:19:14.047000 CVE-2024-35778,0,0,a2dbf9dff5fc4d667e192112da54beac103433f06409a60ab480bcea7a5ac138,2024-07-08T10:15:03.573000 @@ -254737,7 +254737,7 @@ CVE-2024-37732,0,0,8bcaa977ac18e5833de4fd0520da90883ea1f9cf5405317587bb381c54de8 CVE-2024-37734,0,0,0e5d8052c40ece19eb47666a762eea5411abf63f936921b36baec3d43e53baa8,2024-07-03T02:04:39.343000 CVE-2024-3774,0,0,593479bdd908b3498d235d74677575dd1f3896886cab276c51a981ed2e66af92,2024-04-15T13:15:31.997000 CVE-2024-37741,0,0,f5ed3254675cb5ce3a67ab08ad08f5443ff303292af76c58fe640715a6de27a4,2024-07-03T14:27:08.057000 -CVE-2024-37742,0,0,d9a8d475a25ae5af7e676e3139aadefd87352b16945b084f30458dff1ae4be53,2024-06-26T20:15:15.917000 +CVE-2024-37742,0,1,d5dbae2c1e5299395df558941706d9c9b36228086895b2fc3724f0d65b486081,2024-08-13T01:09:33.383000 CVE-2024-3775,0,0,b7d2a473bac9537035a8d6df6a365ee3b93ba49aa9ce7163db0aba168893a523,2024-04-15T13:15:31.997000 CVE-2024-37759,0,0,fcc8ead5df9d431db40c232755b8d406131bfe6bf2637fa79e9581b47deb8f46,2024-07-03T02:04:41.510000 CVE-2024-3776,0,0,5922bebf01d008693e127ff3a5039fdad8dc9d22a230cf3268767563dfe95a49,2024-04-15T13:15:31.997000 @@ -254830,11 +254830,11 @@ CVE-2024-3792,0,0,b2d7f7e579eff1bf3cc457c41f5782185342411a77aac1022f0e4393ef1fd1 CVE-2024-37920,0,0,841ece9aa1ea243835cd263b19315e4e373408e20d05486ce82b531c5a2511e0,2024-07-22T13:00:31.330000 CVE-2024-37922,0,0,2f4d0819be87ffb0bb4af4138b7ceba5a758a2030a859f8658eef95358ab0782,2024-07-22T13:00:31.330000 CVE-2024-37923,0,0,0f277f016f5fbeb4c94053f1c3c5921e348aa14bf063918224f804db2fff94d1,2024-07-09T18:19:14.047000 -CVE-2024-37924,1,1,c1a5493170bfcfcffe112d3be3d055ca91035a819470c1518d8cd88b85578cb9,2024-08-12T23:15:15.703000 +CVE-2024-37924,0,0,c1a5493170bfcfcffe112d3be3d055ca91035a819470c1518d8cd88b85578cb9,2024-08-12T23:15:15.703000 CVE-2024-37927,0,0,560584f6e7ef315723501d3c62881a4e0c9b3ad1204b52ebcac93863b05e014f,2024-07-12T16:34:58.687000 CVE-2024-37928,0,0,d7c23cfa28358062117e75a096fd1b2a1412e40b95d290b44dda94129c8901b3,2024-07-12T16:34:58.687000 CVE-2024-3793,0,0,45180ff35ea2c7285cdd371de1244c7a4424d1261f14c1bf7f3ac3169f3ba4b9,2024-05-14T16:11:39.510000 -CVE-2024-37930,1,1,b47abc968f9ae33d4c1793c2ea75018720d800e5bffc0a66cb656a6f077d606f,2024-08-12T23:15:15.940000 +CVE-2024-37930,0,0,b47abc968f9ae33d4c1793c2ea75018720d800e5bffc0a66cb656a6f077d606f,2024-08-12T23:15:15.940000 CVE-2024-37932,0,0,a3ce9ecce9fdf6d7e055cae05e400292dfd3fd5ac50cdfaa9f84e0caa41c69f3,2024-07-12T16:34:58.687000 CVE-2024-37933,0,0,89aadc1bfbd864beebf6ce61583dd3e0e43426698e502bc5c6a9b9f602b29135,2024-07-12T16:34:58.687000 CVE-2024-37934,0,0,20d80f75e222e93cd8bf312483db42a7dd2efce13206dab8e3080dada5a4be9e,2024-07-09T18:19:14.047000 @@ -254991,7 +254991,7 @@ CVE-2024-38200,0,0,30f61ef0f341771cb3da7c017f647bc0d7ca72b8b83eb77e95bb1ef00a376 CVE-2024-38202,0,0,5f1ef47a3badff97031fb210a5df27c56cf4132700b07b21ac067d757e50d1a2,2024-08-08T13:04:18.753000 CVE-2024-38206,0,0,cb12af303c16bd7b14ab90d82849698a892f6215e2a01ea7e92b5cbb9057d49d,2024-08-12T18:33:38.273000 CVE-2024-3821,0,0,3ffbadbdaf34f564e9c498f1baa8fe758531e73989a1bbb861692bcbfdfc262c,2024-06-03T14:46:24.250000 -CVE-2024-38218,0,0,3a49c7dc6bb0374d11da99e5a55b6986d36c1cf5da3a51c54b24361dc5409e9c,2024-08-12T13:41:36.517000 +CVE-2024-38218,0,1,e7342866ef3a16926b143aa0008fc6184a292d9f61fe4cbeef73ff44ee02181a,2024-08-13T01:10:06.100000 CVE-2024-38219,0,0,2fca9f35b77d67770864b68108bd122ee00786d86b3d46defa01ed91881911bc,2024-08-12T13:41:36.517000 CVE-2024-3822,0,0,51b0f82a9028abb2f3a6ab312236a4c8392000a211092257ada320c541b18cc9,2024-05-15T16:40:19.330000 CVE-2024-3823,0,0,53ae63b27eb43a6740a92f1ff13f05ddd2a8941167fdfb2924cdfa6b561369e6,2024-05-15T16:40:19.330000 @@ -255962,7 +255962,7 @@ CVE-2024-39945,0,0,016efe8f11127d24055a64c694862171837d767c0c5c6ed8678f4cc93196a CVE-2024-39946,0,0,4a4a188acaefae77f3ab150f76fb0d9f81d61e7ac6fd6bc8974d0fe50fd6a2a2,2024-07-31T12:57:02.300000 CVE-2024-39947,0,0,80805e63343ea3a4bb64a84b8dbe9c1530e7f2159ab58409767f1aadf46ab125,2024-07-31T12:57:02.300000 CVE-2024-39948,0,0,ee424b189b0cfbdde47c11058cfacdc178076b71067d33cd2bbe727742314ac4,2024-08-01T13:56:05.350000 -CVE-2024-39949,0,0,92b1523f2a3a126ed9cc65192947af848f33d01f398349b5751a172588fdfb77,2024-07-31T12:57:02.300000 +CVE-2024-39949,0,1,db3d180841122ee223993df4a5b148e4eb1d4081aaaa0353c06a8b7332e63281,2024-08-13T01:11:46.520000 CVE-2024-3995,0,0,a7fe690817691037765b680c602849c2a36e767bb2849159693fe5a7864f46cb,2024-07-01T14:15:05.680000 CVE-2024-39950,0,0,0a5af814b405869cb4bc1326a5d163c966c476b51ac00ace4bb3ecf06791ecff,2024-08-01T13:56:11.127000 CVE-2024-39962,0,0,88f72130b2e330c20b5ac0702cd6d158cd0cb6e08e9ed8a9d4ac60ee5a0c3f4d,2024-08-01T13:56:13.933000 @@ -256057,21 +256057,21 @@ CVE-2024-40456,0,0,f1acaf3e46ce38cdd4b72320186132bab37cc38f6f4c796e31eaece0545a5 CVE-2024-4046,0,0,b162bb54ae31ac06a54238ce430265f513a39f78ee0aa36d5d6ff941168dcdb1,2024-05-14T16:11:39.510000 CVE-2024-40464,0,0,e0961ca0a3aa848ce7061cc7ba1fa2af403b350ed8107067aa6b807e1e6fd113,2024-08-06T18:35:03.237000 CVE-2024-40465,0,0,15986f29ff1e8aef63181dd9799f409f46000c95ad7d745708fb5f0091003f8f,2024-08-02T19:35:37.367000 -CVE-2024-40472,0,0,c3f1304f7f6a6f624b7992076e6d1fe56be5759b9209d182514f1119084b99df,2024-08-12T13:41:36.517000 +CVE-2024-40472,0,1,048983e26a97fabf3ef9ca5655a978196b7c91c33fe00b9ba0aef70a8e3c74ba,2024-08-13T01:13:41.263000 CVE-2024-40473,0,0,bac23d9f20af7f79a5f607e2c6e42e1aebf64fb29289b84bea57158dbb904513,2024-08-12T13:41:36.517000 -CVE-2024-40474,0,0,a440456ffce69fd544d7ccf24f6ae0e281bea37b7085e3b0d5340bed1d1eb38a,2024-08-12T13:41:36.517000 -CVE-2024-40475,0,0,bd96a8830e2160ceaf3b5df2cbdff8ea34b2418fe575f31155dfe3d080cc68ff,2024-08-12T13:41:36.517000 -CVE-2024-40476,0,0,2d968dbde1713118e363b700724fb5eb4428d21626fa8c69e3e4fb0e0605ef6a,2024-08-12T13:41:36.517000 -CVE-2024-40477,0,0,b99c59eda73224f5c34d4cda807e556646f39c9d25b5c311b583cf18d8afdfc5,2024-08-12T13:41:36.517000 +CVE-2024-40474,0,1,ed9bcaa0816a8b1627787d387aa64a764a9f0d1a8060bb791a43106b521b0b3f,2024-08-13T01:13:42.670000 +CVE-2024-40475,0,1,6dbb9fe9aa654118a15979c2f781ea7f22dc9683d057f6a3dda190241670bcd9,2024-08-13T01:13:44.077000 +CVE-2024-40476,0,1,8d4c9cf39ae6a94779797a1345413413cadee5ca02ebe610a223f3ff94fdbd0c,2024-08-13T01:13:45.497000 +CVE-2024-40477,0,1,0ebd8b8f59a35dda2b3e292f3675b27eb6ffc42149072e05c13180f024ce3e21,2024-08-13T01:13:46.877000 CVE-2024-40478,0,0,c52d89ab86aaf3f734a40597d5b00313c948fc2e1e77e0656955644084643dfa,2024-08-12T13:41:36.517000 -CVE-2024-40479,0,0,73cf6dde7ba74cacdf9c3d36464146c03f587233ecc67eb1d261bf639fa26bd5,2024-08-12T13:41:36.517000 +CVE-2024-40479,0,1,0e859692d2dcdb68471916e06e469ab263533fd2f9afcecfe52d53c988a5da77,2024-08-13T01:13:47.860000 CVE-2024-40480,0,0,ffebbe104e7e5f7fc549389d2cc74047baebdb21bfa45794fe18ca9250ab02be,2024-08-12T13:41:36.517000 -CVE-2024-40481,0,0,e8cd1e3d6e210748f3a90997731d666b0805aedb865a25165fa50c4b18dd69e6,2024-08-12T13:41:36.517000 -CVE-2024-40482,0,0,31b235f6aeb322009edaf43befaea2002d52cb8d281c9d30f51fd88c792be3aa,2024-08-12T13:41:36.517000 -CVE-2024-40484,0,0,85c8a875926bd96379e78d76b30418e68ae2c0e615dce37b875916d332c19edd,2024-08-12T13:41:36.517000 -CVE-2024-40486,0,0,d13c18293ea3f5b839ec8274b4c792b5fe0f48540f599e2e17ba8e594b6c8ee5,2024-08-12T13:41:36.517000 +CVE-2024-40481,0,1,e86ef06aa0938d9c99b8c98ae77f72fb6ac894109e31c03c83342c579c430962,2024-08-13T01:13:48.730000 +CVE-2024-40482,0,1,9a3a01b5782aa51ef209e482e70f047b430b9828561a94171012474df4d532a4,2024-08-13T01:13:50.130000 +CVE-2024-40484,0,1,694fee47c259d31c851a9966b5a0a3c0598a5ae04cd749dc08bd07981a6111ab,2024-08-13T01:13:50.997000 +CVE-2024-40486,0,1,206068d4d3a686bb79ffe5f57501930cd1fe13ada3eb39bb4b41ff953c8c8a8c,2024-08-13T01:13:52.383000 CVE-2024-40487,0,0,005a09265ebc099b9fcb5976da33b894e6213384a847e53e8ae4a2bd87b7e372,2024-08-12T13:41:36.517000 -CVE-2024-40488,0,0,b3e51fd8218a45b1f5ac6aff4a38b8cfd150d0b9486d5a376f112926ee4befe8,2024-08-12T13:41:36.517000 +CVE-2024-40488,0,1,29149e46f549d6c8fa1979da87e45c07630bc970cf31d75d73d9d6723dc075d0,2024-08-13T01:13:53.230000 CVE-2024-40492,0,0,887baeb8c822fbf96c83ae7c8317e551b9d380e125d5f646dfb0a8c0719647ab,2024-08-01T13:57:30.260000 CVE-2024-40495,0,0,0c92b9527f5126e4b4bbf0d1f0a16c194305be9e806244080172bf727ded6b6a,2024-08-01T13:57:31.037000 CVE-2024-40498,0,0,5810ed5aa59e12db14c51ce30325d1c0d70a5c997d2111b8b796a66ebc036219,2024-08-06T16:30:24.547000 @@ -256578,7 +256578,7 @@ CVE-2024-41318,0,0,9b1c1d0472f281a532ac7cd9f50c0be0ec0f55b0327046bb10ee1709062e9 CVE-2024-41319,0,0,1899a3684e8a27d8d6402d107bc11ca910ee14276fc605936dd401557907d526,2024-08-01T13:58:31.957000 CVE-2024-41320,0,0,6629b2c1bbc9cd1b160b7b0f9c935334633b6b47708e3a65ad0ff69abde9e8ce,2024-08-01T13:58:32.723000 CVE-2024-4133,0,0,809a3aebbf4e63405fb2f0740c9908f3dfcf1d711b93379e5d465ea9e56d3cba,2024-05-02T18:00:37.360000 -CVE-2024-41332,0,0,56ad202b80efa610d5c6ce283a82b14a04739c8323421c543c839229ab8bd6c1,2024-08-12T13:41:36.517000 +CVE-2024-41332,0,1,e6fa5010b9024e0af46a147ba4070b726f6dce97083dedbf0dda2c9127c835eb,2024-08-13T01:14:31.280000 CVE-2024-41333,0,0,cddcfe88014fc883d7c26828c1a1c1f213d8d1e951fc2a526ac4569575e77f96,2024-08-07T20:54:44.060000 CVE-2024-4135,0,0,3adddfced77f8fc8630aec5e175734a40783e3f6b247cb0614a312485a8097a3,2024-05-08T13:15:00.690000 CVE-2024-41353,0,0,283f710ae1d74e1c389a6d83c71bf34f8cb957eca1e713efb25da5fc972611a3,2024-08-01T13:58:33.490000 @@ -256637,7 +256637,7 @@ CVE-2024-41550,0,0,6726e0c6849e70c536d9bf6936241acc920718305f74521a185836b6b5189 CVE-2024-41551,0,0,a47b3d6d1401636bd7731728d6fcb9c38717d9cec4c98b37b50c290693f43ad0,2024-08-01T13:58:54.023000 CVE-2024-4156,0,0,31cc9500838d0dc99d5959700d84ebbac93048893a2eb67f37ed77d13093550c,2024-05-02T18:00:37.360000 CVE-2024-4157,0,0,ac5ec2e690c76b81403cfa49bc63d1a8caa2fb9d97d28a1055398849720db727,2024-05-22T12:46:53.887000 -CVE-2024-41570,0,0,ef1bf59c27127ff158179f33921003a804caaf6660e1a7e2b6ec3f026dc6edfc,2024-08-12T13:41:36.517000 +CVE-2024-41570,0,1,aeeff334d8e94264f5528f4e2cc6e3775fd5da44784345b666e0ce860bb11372,2024-08-13T01:14:38.880000 CVE-2024-41577,0,0,e7e693181f88ef240813103b284f71ca31f9c53b9cb63293a922ae2ded80048a,2024-08-12T13:41:36.517000 CVE-2024-4158,0,0,9bd0a38e47c5b6d26f1e587737a0ffeb7c251278f38061995fc29ba309646aa6,2024-05-14T16:11:39.510000 CVE-2024-4159,0,0,72a4ec46db1a22f62474bfa22a14f37a28a6ceba3042de92b905fca6cc58c082,2024-04-25T23:15:47.087000 @@ -257144,30 +257144,30 @@ CVE-2024-43112,0,0,adba1dfd679ff5e6d46afc8c8dcdec70df81430cc85737d48e09fa02ef6ca CVE-2024-43113,0,0,6573240be25b6af3e51d92f2a835e3694315e36c10003c73af950ce730fbb885,2024-08-06T16:30:24.547000 CVE-2024-43114,0,0,6c710d141dc94fd27ccf4c35d8ed8fed217c18d925335ce65015d178fb239e9f,2024-08-06T16:30:24.547000 CVE-2024-4312,0,0,82451935a132459ec3a52babe511fed0dc0447cacf13fc78eab91e8a5c0d303b,2024-05-14T16:11:39.510000 -CVE-2024-43123,1,1,2e2c050e05eceebebb6764bf76439c256ea30edeaf99f7777c98dcb013d605b5,2024-08-12T23:15:16.177000 -CVE-2024-43124,1,1,159a6e3a5154401c268b9283252d7586e765ab7a3b09a609d57c59d73980ec29,2024-08-12T23:15:16.407000 -CVE-2024-43125,1,1,6f8ec68758ec079ee9729debe12e8e02714b04708086483fe3f3e1be363e8ea4,2024-08-12T23:15:16.637000 -CVE-2024-43126,1,1,740227e0fc9eabd775401b86378322641fa395c98aaa294b0e51f66d78b9c273,2024-08-12T23:15:16.863000 -CVE-2024-43127,1,1,d4f5c1b20e60840e320608c58c84e0ac666a5976f98e74b730764b8f3b2a598f,2024-08-12T23:15:17.097000 +CVE-2024-43123,0,0,2e2c050e05eceebebb6764bf76439c256ea30edeaf99f7777c98dcb013d605b5,2024-08-12T23:15:16.177000 +CVE-2024-43124,0,0,159a6e3a5154401c268b9283252d7586e765ab7a3b09a609d57c59d73980ec29,2024-08-12T23:15:16.407000 +CVE-2024-43125,0,0,6f8ec68758ec079ee9729debe12e8e02714b04708086483fe3f3e1be363e8ea4,2024-08-12T23:15:16.637000 +CVE-2024-43126,0,0,740227e0fc9eabd775401b86378322641fa395c98aaa294b0e51f66d78b9c273,2024-08-12T23:15:16.863000 +CVE-2024-43127,0,0,d4f5c1b20e60840e320608c58c84e0ac666a5976f98e74b730764b8f3b2a598f,2024-08-12T23:15:17.097000 CVE-2024-4313,0,0,04786fcee0b11c58facf347077c0fb8e17faddbc064f2c4dc547a3be70193e4e,2024-06-24T20:01:09.330000 -CVE-2024-43130,1,1,f0c894fb49048185e3da95689d302b7c2e99c7b3677710d304a8e2f1785c5edc,2024-08-12T23:15:17.320000 -CVE-2024-43133,1,1,2c0100fa05c934b61e5c9a46d226b379db3a64e04b2a9f1bc46b8ad6b2d21213,2024-08-12T23:15:17.560000 -CVE-2024-43137,1,1,f3fc866897aede9c70e5951a4c9720e4cf044f3eeb210af260c38a29b016593e,2024-08-12T23:15:17.773000 -CVE-2024-43139,1,1,55eb0f9a37bda0bafd1339d01b07e485dfec14707f0813bce22c8fefee993094,2024-08-12T23:15:17.997000 +CVE-2024-43130,0,0,f0c894fb49048185e3da95689d302b7c2e99c7b3677710d304a8e2f1785c5edc,2024-08-12T23:15:17.320000 +CVE-2024-43133,0,0,2c0100fa05c934b61e5c9a46d226b379db3a64e04b2a9f1bc46b8ad6b2d21213,2024-08-12T23:15:17.560000 +CVE-2024-43137,0,0,f3fc866897aede9c70e5951a4c9720e4cf044f3eeb210af260c38a29b016593e,2024-08-12T23:15:17.773000 +CVE-2024-43139,0,0,55eb0f9a37bda0bafd1339d01b07e485dfec14707f0813bce22c8fefee993094,2024-08-12T23:15:17.997000 CVE-2024-4314,0,0,5b91c731cc96c112e4837604681a355586cd629f1c71449572dfc7eb6fafd4a6,2024-05-14T16:11:39.510000 -CVE-2024-43147,1,1,0fccae4ec698a6099621600bfc058755995742cd82334607f2abebe509b1a9f2,2024-08-12T23:15:18.230000 -CVE-2024-43148,1,1,c9700795fcfb2515ed9e39c35827905d49e04b567d0dad47c62be4149e09af7a,2024-08-12T23:15:18.457000 -CVE-2024-43149,1,1,7a8613d3b83fae33d5c75c8aeb5125a3d81feadd8cdf554f9c66f3d85c38b332,2024-08-12T23:15:18.673000 +CVE-2024-43147,0,0,0fccae4ec698a6099621600bfc058755995742cd82334607f2abebe509b1a9f2,2024-08-12T23:15:18.230000 +CVE-2024-43148,0,0,c9700795fcfb2515ed9e39c35827905d49e04b567d0dad47c62be4149e09af7a,2024-08-12T23:15:18.457000 +CVE-2024-43149,0,0,7a8613d3b83fae33d5c75c8aeb5125a3d81feadd8cdf554f9c66f3d85c38b332,2024-08-12T23:15:18.673000 CVE-2024-4315,0,0,392e78ede02028792ceca327e706bfb19bc55163d6718415b77f2fda1df1c705,2024-06-13T18:36:09.013000 -CVE-2024-43150,1,1,72b8e4f4c43893a3b9fafa5060a9c521d5aa29cfdf1db735092a4d1cdac7297a,2024-08-12T23:15:18.897000 -CVE-2024-43151,1,1,40dd109fffd05a29237e940bc5a1cdf6e67a881049be4c557b0156f61f930757,2024-08-12T22:15:09.070000 -CVE-2024-43152,1,1,493963c06fcb84dbb83289191927e0a37275e54b8136b0017aba59da882c02d0,2024-08-12T22:15:09.310000 -CVE-2024-43155,1,1,46e2681a7fd5bd5c24a335d616cbc9030fcc9cab633298d648476bbaed053da2,2024-08-12T22:15:09.550000 -CVE-2024-43156,1,1,8f92ab41c4ed087540245f68044db41ffe862a501b703246e20ed6276e3e2760,2024-08-12T22:15:09.780000 +CVE-2024-43150,0,0,72b8e4f4c43893a3b9fafa5060a9c521d5aa29cfdf1db735092a4d1cdac7297a,2024-08-12T23:15:18.897000 +CVE-2024-43151,0,0,40dd109fffd05a29237e940bc5a1cdf6e67a881049be4c557b0156f61f930757,2024-08-12T22:15:09.070000 +CVE-2024-43152,0,0,493963c06fcb84dbb83289191927e0a37275e54b8136b0017aba59da882c02d0,2024-08-12T22:15:09.310000 +CVE-2024-43155,0,0,46e2681a7fd5bd5c24a335d616cbc9030fcc9cab633298d648476bbaed053da2,2024-08-12T22:15:09.550000 +CVE-2024-43156,0,0,8f92ab41c4ed087540245f68044db41ffe862a501b703246e20ed6276e3e2760,2024-08-12T22:15:09.780000 CVE-2024-4316,0,0,1f2d235ec208ef46fe57643aa08db6f0cf549b33584dbdea1429e6bdf8a86d5e,2024-05-14T16:11:39.510000 -CVE-2024-43161,1,1,3e0e1cd106d7beea6d1de08e9591b5020f6dbc7d0287dfb199c0cf3c902eca5f,2024-08-12T22:15:10.003000 -CVE-2024-43163,1,1,47e94f16c835dfc9cf43d5d03675691ae35c713ac7d72a19c9683ce08a8d1e21,2024-08-12T22:15:10.233000 -CVE-2024-43164,1,1,d2e791dc4d2e7fe7c5f02b7096283d295af90b80817bca033d0e4314db105c56,2024-08-12T22:15:10.453000 +CVE-2024-43161,0,0,3e0e1cd106d7beea6d1de08e9591b5020f6dbc7d0287dfb199c0cf3c902eca5f,2024-08-12T22:15:10.003000 +CVE-2024-43163,0,0,47e94f16c835dfc9cf43d5d03675691ae35c713ac7d72a19c9683ce08a8d1e21,2024-08-12T22:15:10.233000 +CVE-2024-43164,0,0,d2e791dc4d2e7fe7c5f02b7096283d295af90b80817bca033d0e4314db105c56,2024-08-12T22:15:10.453000 CVE-2024-43167,0,0,01f17fcd63c756d83b948d0875b4414e12688ba0576962ac27da499c54ee819d,2024-08-12T13:41:36.517000 CVE-2024-43168,0,0,6f1ce3e85e6cec75b3ae8101a2990b1aa3eb274cac98a0b799813d7d71452062,2024-08-12T13:41:36.517000 CVE-2024-4317,0,0,2ab51635ebb5a78f9093ee7220532c2f98c47bcb30186dfa33cf412783a7fe8e,2024-05-14T16:11:39.510000 @@ -257176,16 +257176,16 @@ CVE-2024-4319,0,0,7ca0245a01df3d5ced472265b32f90c6f6a22a37af3715d5589379ecac1f6a CVE-2024-43199,0,0,94150f8459e19abf18625a946d8a507867275817cd3d9928084030fcb7fa8330,2024-08-12T12:59:48.253000 CVE-2024-4320,0,0,f21f873c3bfeb896c071276000f6bbe2ae4420d2f2c3184178334c98a666705b,2024-06-07T14:56:05.647000 CVE-2024-4321,0,0,9cab2a859d144dd765da27aaa03d49bb12083c0b11abfa900a9b065f4ea718e1,2024-05-16T13:03:05.353000 -CVE-2024-43210,1,1,f5d2dfaff0f6aad12a7313f08f25d34b70199fa6e246c6b43be95bed42a9581d,2024-08-12T22:15:10.690000 -CVE-2024-43213,1,1,65ac589c972c45a3a89f2e3b6f81303e3c6cc9e95a316bdfe6c4b0514d961bd2,2024-08-12T22:15:10.917000 -CVE-2024-43216,1,1,9593ec79059e860deaf013a478b93b87414de3abc93a8553db8255cbcfe4c593,2024-08-12T22:15:11.153000 -CVE-2024-43217,1,1,81eff7fc515b3d1f5f1e802fc56c2d6f4ae578d4a5a0e83370286cbc81ac0412,2024-08-12T22:15:11.383000 -CVE-2024-43218,1,1,69f5d38ecde05bf96ba9a5a479907c39dc4f39e977d798a4c6b0831c5b4f6998,2024-08-12T22:15:11.603000 +CVE-2024-43210,0,0,f5d2dfaff0f6aad12a7313f08f25d34b70199fa6e246c6b43be95bed42a9581d,2024-08-12T22:15:10.690000 +CVE-2024-43213,0,0,65ac589c972c45a3a89f2e3b6f81303e3c6cc9e95a316bdfe6c4b0514d961bd2,2024-08-12T22:15:10.917000 +CVE-2024-43216,0,0,9593ec79059e860deaf013a478b93b87414de3abc93a8553db8255cbcfe4c593,2024-08-12T22:15:11.153000 +CVE-2024-43217,0,0,81eff7fc515b3d1f5f1e802fc56c2d6f4ae578d4a5a0e83370286cbc81ac0412,2024-08-12T22:15:11.383000 +CVE-2024-43218,0,0,69f5d38ecde05bf96ba9a5a479907c39dc4f39e977d798a4c6b0831c5b4f6998,2024-08-12T22:15:11.603000 CVE-2024-4322,0,0,1d1748b4ac4d92a791836ec730671d75744c804cc2e9189accf3943e4e00efc0,2024-05-16T13:03:05.353000 -CVE-2024-43220,1,1,03928570b08971a10a9792fcec4384007d4af89d60f962519aa9e2b4be6c2a97,2024-08-12T22:15:11.827000 -CVE-2024-43224,1,1,14ef55b6f233abbe4c55ee5b24591a3059b6a2797ad7b9f47292419afa508eb3,2024-08-12T22:15:12.057000 -CVE-2024-43225,1,1,8d3db48602caeb59473413007be626fbc33e6de2b06bc8d6c41cb12160ed3000,2024-08-12T22:15:12.293000 -CVE-2024-43226,1,1,e78a3db63ad6a3c0ba71cef4e9c688dfb4aa9a8b2d02c9369a27a80a68cc1fd8,2024-08-12T22:15:12.520000 +CVE-2024-43220,0,0,03928570b08971a10a9792fcec4384007d4af89d60f962519aa9e2b4be6c2a97,2024-08-12T22:15:11.827000 +CVE-2024-43224,0,0,14ef55b6f233abbe4c55ee5b24591a3059b6a2797ad7b9f47292419afa508eb3,2024-08-12T22:15:12.057000 +CVE-2024-43225,0,0,8d3db48602caeb59473413007be626fbc33e6de2b06bc8d6c41cb12160ed3000,2024-08-12T22:15:12.293000 +CVE-2024-43226,0,0,e78a3db63ad6a3c0ba71cef4e9c688dfb4aa9a8b2d02c9369a27a80a68cc1fd8,2024-08-12T22:15:12.520000 CVE-2024-43227,0,0,d06cb872fe104f2d375e915815c778ec356d02a1a0f692c097804c415c1da56b,2024-08-12T21:15:32.603000 CVE-2024-4323,0,0,8795dbc0ef00377d638f97794032c86e045103be19a16a47714b9d0a60088551,2024-05-20T13:00:04.957000 CVE-2024-43231,0,0,1825e1ecffddba056fa98f16e33df7d0d3576f5c19e0c6ce8dd3e877c464fcaf,2024-08-12T21:15:32.890000 @@ -258692,9 +258692,9 @@ CVE-2024-6128,0,0,e064ff8d5dabba517cce591bd7ae4e33f1f46e689b63e72521fbd8f55a944d CVE-2024-6129,0,0,7933292aa403a14b0748017ae2569e039b43c54c319d4b3589a08b9d05be42b3,2024-06-20T12:44:01.637000 CVE-2024-6130,0,0,f4b647f0047f578fe057faac21db7670b7977afa1d31bb2fa4fd50dc12004c54,2024-07-01T12:37:24.220000 CVE-2024-6132,0,0,83486b9bda06b2bfd8b6c6e0e87eac1b4d59232f4be914a093590a57da1cf4d5,2024-06-20T12:44:01.637000 -CVE-2024-6133,0,0,11351dbf03414755557a4338a4e441faef4dbbe801099e87415062f11fdcaa9d,2024-08-12T13:41:36.517000 +CVE-2024-6133,0,1,2337ffd9cad2357491c8f783d0b691c0b27d4405be8ab2d34dc8ce60f34a6000,2024-08-13T01:18:26.570000 CVE-2024-6134,0,0,e3ef2ea84bcff820ce2b4e452d500e8e9e5be6a6b81c054bf5cac514a6a5608b,2024-08-12T13:41:36.517000 -CVE-2024-6136,0,0,3854e1d581f6127f9b8244a143e3c0b775f6e26042c869e1df7f773222d1ecd1,2024-08-12T13:41:36.517000 +CVE-2024-6136,0,1,b5f2fd8869742060eab1f7acc4116cefd24c0a3b003f1c5a14cb58f5ac02f037,2024-08-13T01:18:26.820000 CVE-2024-6138,0,0,fc35836bd5348e7eb9a778e4240c73e0ce52b6c3e53dfd414d6ee066e94e6acd,2024-07-12T16:54:53.997000 CVE-2024-6139,0,0,5132030314b9a0ca48cecf9e1dd593f9b9cec1db256d0c213c6569e108426fbe,2024-06-27T19:25:12.067000 CVE-2024-6142,0,0,b186966dd1e43431007a65ef388b5fc16ca959c5df4a79ac4b3d70a69eba9543,2024-06-20T12:44:01.637000 @@ -259588,7 +259588,7 @@ CVE-2024-7583,0,0,b2c70b6258cd9101ea44bd72a9a7bee40fdef17b5833e45029641b6b1054cd CVE-2024-7584,0,0,88e393ed083253249958807c1b676f862629edacea69fa08e833cacac796d57a,2024-08-07T19:09:46.290000 CVE-2024-7585,0,0,5e2ff565ca20d01ef68f8422fbeb35a8929478e27cc3f0f142481fee7317e65c,2024-08-07T19:09:46.290000 CVE-2024-7589,0,0,ec264cfa06d74adc18884d15f0bb08d50afb3ff7b46d5f725f942909f4b4dc96,2024-08-12T16:35:05.763000 -CVE-2024-7590,1,1,35da26593bcbaca2b731a65c264ea6c48a52b27db0860d7bda278a5558fb3fb1,2024-08-12T22:15:12.750000 +CVE-2024-7590,0,0,35da26593bcbaca2b731a65c264ea6c48a52b27db0860d7bda278a5558fb3fb1,2024-08-12T22:15:12.750000 CVE-2024-7610,0,0,a10689bea1d0fbdec4f1b8819e74182773158d5010cb9fbea2ce46532922c645,2024-08-08T13:04:18.753000 CVE-2024-7613,0,0,51cb787f464113bd96bef73c3a1496b2c8fdb1709edd4dc30393e6a61466a202,2024-08-12T13:41:36.517000 CVE-2024-7614,0,0,d7cc9c45c708dde228724405eed42fed1e1e5a328ee0ca2886de1c39b6c0c7dc,2024-08-12T13:41:36.517000 @@ -259637,5 +259637,7 @@ CVE-2024-7694,0,0,7eb01f663f1a6ae6fa8d343bc54dd9427e90e5a6b166e3bddc2347c03fdce9 CVE-2024-7697,0,0,509c155762486c19cfc0dceb2044f7d5dc23072793fd0a597d3f1e860d0ba6cd,2024-08-12T15:35:07.293000 CVE-2024-7700,0,0,a9f0ec07b98990fe42b46daef65c8e0b5a8fa0712121f2027b841fccbefa3e8e,2024-08-12T18:57:17.383000 CVE-2024-7704,0,0,f1d408cfe4afc78820402b7d84e076c7097b231b26bbe412a10057a3525a73da,2024-08-12T21:15:34.100000 -CVE-2024-7705,1,1,cf95b489808fa8132dfdd8d11fdf93e486e1b455e83524c7ef4630f887c0783a,2024-08-12T23:15:19.113000 -CVE-2024-7706,1,1,dddae6f8d636e0e2c3ba2b1628309dfeb1aca307337fd2625268eab5b9b234c9,2024-08-12T23:15:19.417000 +CVE-2024-7705,0,0,cf95b489808fa8132dfdd8d11fdf93e486e1b455e83524c7ef4630f887c0783a,2024-08-12T23:15:19.113000 +CVE-2024-7706,0,0,dddae6f8d636e0e2c3ba2b1628309dfeb1aca307337fd2625268eab5b9b234c9,2024-08-12T23:15:19.417000 +CVE-2024-7707,1,1,21170f2707eddb1f88d3623b0eff5f0856514ae1fb599ac77f04f14c1cb19563,2024-08-13T01:24:09.723000 +CVE-2024-7709,1,1,7f617395257f5decd3ca8318abe3ce517c53d7b8c4baa7edc2f2c2b481a048c8,2024-08-13T01:24:10.067000