Auto-Update: 2024-08-13T02:00:17.173553+00:00

This commit is contained in:
cad-safe-bot 2024-08-13 02:03:12 +00:00
parent f53b0b8689
commit d5cf1808b8
23 changed files with 979 additions and 131 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21147",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:16.377",
"lastModified": "2024-07-19T14:15:05.667",
"lastModified": "2024-08-13T00:49:47.367",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240719-0008/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-37742",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-25T22:15:35.183",
"lastModified": "2024-06-26T20:15:15.917",
"lastModified": "2024-08-13T01:09:33.383",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Un problema en Safe Exam Browser para Windows anterior a 3.6 permite a un atacante compartir datos del portapapeles entre el modo quiosco SEB y el sistema subyacente, comprometiendo la integridad del examen, lo que puede llevar a la ejecuci\u00f3n de c\u00f3digo arbitrario y a la obtenci\u00f3n de informaci\u00f3n confidencial a trav\u00e9s del componente de administraci\u00f3n del portapapeles."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://github.com/Eteblue/CVE-2024-37742",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38218",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-08-12T13:38:23.933",
"lastModified": "2024-08-12T13:41:36.517",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-13T01:10:06.100",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -35,6 +35,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38218",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-39949",
"sourceIdentifier": "cybersecurity@dahuatech.com",
"published": "2024-07-31T04:15:05.503",
"lastModified": "2024-07-31T12:57:02.300",
"lastModified": "2024-08-13T01:11:46.520",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://www.dahuasecurity.com/aboutUs/trustedCenter/details/768",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40472",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T13:38:28.273",
"lastModified": "2024-08-12T13:41:36.517",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-13T01:13:41.263",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,7 +11,42 @@
"value": "Sourcecodester Daily Calories Monitoring Tool v1.0 is vulnerable to SQL Injection via \"delete-calorie.php.\""
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Sourcecodester/Daily%20Calories%20Monitoring%20Tool%20v1.0/SQL%20Injection.pdf",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40474",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T13:38:28.463",
"lastModified": "2024-08-12T13:41:36.517",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-13T01:13:42.670",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,7 +11,42 @@
"value": "A Reflected Cross Site Scripting (XSS) vulnerability was found in \"edit-cate.php\" in SourceCodester House Rental Management System v1.0."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Sourcecodester/Best%20House%20Rental%20Management%20System%20v1.0/Reflected%20XSS.pdf",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40475",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T13:38:28.553",
"lastModified": "2024-08-12T13:41:36.517",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-13T01:13:44.077",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,7 +11,42 @@
"value": "SourceCodester Best House Rental Management System v1.0 is vulnerable to Incorrect Access Control via /rental/payment_report.php, /rental/balance_report.php, /rental/invoices.php, /rental/tenants.php, and /rental/users.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Sourcecodester/Best%20House%20Rental%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20Deep%20URL.pdf",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40476",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T13:38:28.637",
"lastModified": "2024-08-12T13:41:36.517",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-13T01:13:45.497",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,7 +11,42 @@
"value": "A Cross-Site Request Forgery (CSRF) vulnerability was found in SourceCodester Best House Rental Management System v1.0. This could lead to an attacker tricking the administrator into adding/modifying/deleting valid tenant data via a crafted HTML page, as demonstrated by a Delete Tenant action at the /rental/ajax.php?action=delete_tenant."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Sourcecodester/Best%20House%20Rental%20Management%20System%20v1.0/CSRF.pdf",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-40477",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T13:38:28.727",
"lastModified": "2024-08-12T13:41:36.517",
"lastModified": "2024-08-13T01:13:46.877",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A SQL injection vulnerability in \"/oahms/admin/forgot-password.php\" in PHPGurukul Old Age Home Management System v1.0 allows an attacker to execute arbitrary SQL commands via the \"email\" parameter."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/PHPGurukul/Old%20Age%20Home%20Mgmt%20System%20v1.0/SQL%20Injection.pdf",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-40479",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T13:38:28.913",
"lastModified": "2024-08-12T13:41:36.517",
"lastModified": "2024-08-13T01:13:47.860",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A SQL injection vulnerability in \"/admin/quizquestion.php\" in Kashipara Online Exam System v1.0 allows remote attackers to execute arbitrary SQL commands via the \"eid\" parameter."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Online%20Exam%20System%20v1.0/SQL%20Injection.pdf",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40481",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T13:38:29.093",
"lastModified": "2024-08-12T13:41:36.517",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-13T01:13:48.730",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,7 +11,42 @@
"value": "A Stored Cross Site Scripting (XSS) vulnerability was found in \"/admin/view-enquiry.php\" in PHPGurukul Old Age Home Management System v1.0, which allows remote attackers to execute arbitrary code via the Contact Us page \"message\" parameter."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/PHPGurukul/Old%20Age%20Home%20Mgmt%20System%20v1.0/Stored%20XSS.pdf",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-40482",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T13:38:29.180",
"lastModified": "2024-08-12T13:41:36.517",
"lastModified": "2024-08-13T01:13:50.130",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "An Unrestricted file upload vulnerability was found in \"/Membership/edit_member.php\" of Kashipara Live Membership System v1.0, which allows attackers to execute arbitrary code via uploading a crafted PHP file."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Live%20Membership%20System%20v1.0/Unrestricted%20File%20Upload.pdf",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40484",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T13:38:29.273",
"lastModified": "2024-08-12T13:41:36.517",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-13T01:13:50.997",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,7 +11,42 @@
"value": "A Reflected Cross Site Scripting (XSS) vulnerability was found in \"/oahms/search.php\" in PHPGurukul Old Age Home Management System v1.0, which allows remote attackers to execute arbitrary code via the \"searchdata\" parameter."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/PHPGurukul/Old%20Age%20Home%20Mgmt%20System%20v1.0/Reflected%20XSS.pdf",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-40486",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T13:38:29.360",
"lastModified": "2024-08-12T13:41:36.517",
"lastModified": "2024-08-13T01:13:52.383",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A SQL injection vulnerability in \"/index.php\" of Kashipara Live Membership System v1.0 allows remote attackers to execute arbitrary SQL commands and bypass Login via the email or password Login parameters."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Live%20Membership%20System%20v1.0/SQL%20Injection.pdf",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40488",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T13:38:29.537",
"lastModified": "2024-08-12T13:41:36.517",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-13T01:13:53.230",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,7 +11,42 @@
"value": "A Cross-Site Request Forgery (CSRF) vulnerability was found in the Kashipara Live Membership System v1.0. This could lead to an attacker tricking the administrator into deleting valid member data via a crafted HTML page, as demonstrated by a Delete Member action at the /delete_members.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://capec.mitre.org/data/definitions/62.html",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41332",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T13:38:30.150",
"lastModified": "2024-08-12T13:41:36.517",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-13T01:14:31.280",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,7 +11,42 @@
"value": "Incorrect access control in the delete_category function of Sourcecodester Computer Laboratory Management System v1.0 allows authenticated attackers with low-level privileges to arbitrarily delete categories."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://packetstormsecurity.com/files/179890/Computer-Laboratory-Management-System-1.0-Privilege-Escalation.html",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41570",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T13:38:31.277",
"lastModified": "2024-08-12T13:41:36.517",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-13T01:14:38.880",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,7 +11,42 @@
"value": "An Unauthenticated Server-Side Request Forgery (SSRF) in demon callback handling in Havoc 2 0.7 allows attackers to send arbitrary network traffic originating from the team server."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://blog.chebuya.com/posts/server-side-request-forgery-on-havoc-c2/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-6133",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-08-12T13:38:38.703",
"lastModified": "2024-08-12T13:41:36.517",
"lastModified": "2024-08-13T01:18:26.570",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -11,7 +11,30 @@
"value": "The wp-cart-for-digital-products WordPress plugin before 8.5.6 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/fd613e1e-557c-4383-a3e9-4c14bc0be0c5/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-6136",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-08-12T13:38:38.850",
"lastModified": "2024-08-12T13:41:36.517",
"lastModified": "2024-08-13T01:18:26.820",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -11,7 +11,30 @@
"value": "The wp-cart-for-digital-products WordPress plugin before 8.5.6 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/7d85cfe4-4878-4530-ba78-7cfe33f3a8d5/",

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-7707",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-13T01:24:09.723",
"lastModified": "2024-08-13T01:24:09.723",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Tenda FH1206 02.03.01.35 and classified as critical. Affected by this issue is the function formSafeEmailFilter of the file /goform/SafeEmailFilter of the component HTTP POST Request Handler. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.7,
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/VodkaVortex/IoT/blob/main/formSafeEmailFilter.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.274190",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.274190",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.385670",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-7709",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-13T01:24:10.067",
"lastModified": "2024-08-13T01:24:10.067",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in OcoMon 4.0. This issue affects some unknown processing of the file /includes/common/require_access_recovery.php of the component URL Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.0.1 and 5.0 is able to address this issue. It is recommended to upgrade the affected component."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://ocomon.com.br/site/atualizacao-de-seguranca/",
"source": "cna@vuldb.com"
},
{
"url": "https://ocomon.com.br/site/downloads/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.274205",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.274205",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.388843",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-08-12T23:55:17.211334+00:00
2024-08-13T02:00:17.173553+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-08-12T23:15:19.417000+00:00
2024-08-13T01:24:10.067000+00:00
```
### Last Data Feed Release
@ -27,50 +27,46 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2024-08-12T00:00:08.652221+00:00
2024-08-13T00:00:08.646570+00:00
```
### Total Number of included CVEs
```plain
259640
259642
```
### CVEs added in the last Commit
Recently added CVEs: `36`
Recently added CVEs: `2`
- [CVE-2024-43137](CVE-2024/CVE-2024-431xx/CVE-2024-43137.json) (`2024-08-12T23:15:17.773`)
- [CVE-2024-43139](CVE-2024/CVE-2024-431xx/CVE-2024-43139.json) (`2024-08-12T23:15:17.997`)
- [CVE-2024-43147](CVE-2024/CVE-2024-431xx/CVE-2024-43147.json) (`2024-08-12T23:15:18.230`)
- [CVE-2024-43148](CVE-2024/CVE-2024-431xx/CVE-2024-43148.json) (`2024-08-12T23:15:18.457`)
- [CVE-2024-43149](CVE-2024/CVE-2024-431xx/CVE-2024-43149.json) (`2024-08-12T23:15:18.673`)
- [CVE-2024-43150](CVE-2024/CVE-2024-431xx/CVE-2024-43150.json) (`2024-08-12T23:15:18.897`)
- [CVE-2024-43151](CVE-2024/CVE-2024-431xx/CVE-2024-43151.json) (`2024-08-12T22:15:09.070`)
- [CVE-2024-43152](CVE-2024/CVE-2024-431xx/CVE-2024-43152.json) (`2024-08-12T22:15:09.310`)
- [CVE-2024-43155](CVE-2024/CVE-2024-431xx/CVE-2024-43155.json) (`2024-08-12T22:15:09.550`)
- [CVE-2024-43156](CVE-2024/CVE-2024-431xx/CVE-2024-43156.json) (`2024-08-12T22:15:09.780`)
- [CVE-2024-43161](CVE-2024/CVE-2024-431xx/CVE-2024-43161.json) (`2024-08-12T22:15:10.003`)
- [CVE-2024-43163](CVE-2024/CVE-2024-431xx/CVE-2024-43163.json) (`2024-08-12T22:15:10.233`)
- [CVE-2024-43164](CVE-2024/CVE-2024-431xx/CVE-2024-43164.json) (`2024-08-12T22:15:10.453`)
- [CVE-2024-43210](CVE-2024/CVE-2024-432xx/CVE-2024-43210.json) (`2024-08-12T22:15:10.690`)
- [CVE-2024-43213](CVE-2024/CVE-2024-432xx/CVE-2024-43213.json) (`2024-08-12T22:15:10.917`)
- [CVE-2024-43216](CVE-2024/CVE-2024-432xx/CVE-2024-43216.json) (`2024-08-12T22:15:11.153`)
- [CVE-2024-43217](CVE-2024/CVE-2024-432xx/CVE-2024-43217.json) (`2024-08-12T22:15:11.383`)
- [CVE-2024-43218](CVE-2024/CVE-2024-432xx/CVE-2024-43218.json) (`2024-08-12T22:15:11.603`)
- [CVE-2024-43220](CVE-2024/CVE-2024-432xx/CVE-2024-43220.json) (`2024-08-12T22:15:11.827`)
- [CVE-2024-43224](CVE-2024/CVE-2024-432xx/CVE-2024-43224.json) (`2024-08-12T22:15:12.057`)
- [CVE-2024-43225](CVE-2024/CVE-2024-432xx/CVE-2024-43225.json) (`2024-08-12T22:15:12.293`)
- [CVE-2024-43226](CVE-2024/CVE-2024-432xx/CVE-2024-43226.json) (`2024-08-12T22:15:12.520`)
- [CVE-2024-7590](CVE-2024/CVE-2024-75xx/CVE-2024-7590.json) (`2024-08-12T22:15:12.750`)
- [CVE-2024-7705](CVE-2024/CVE-2024-77xx/CVE-2024-7705.json) (`2024-08-12T23:15:19.113`)
- [CVE-2024-7706](CVE-2024/CVE-2024-77xx/CVE-2024-7706.json) (`2024-08-12T23:15:19.417`)
- [CVE-2024-7707](CVE-2024/CVE-2024-77xx/CVE-2024-7707.json) (`2024-08-13T01:24:09.723`)
- [CVE-2024-7709](CVE-2024/CVE-2024-77xx/CVE-2024-7709.json) (`2024-08-13T01:24:10.067`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `19`
- [CVE-2024-21147](CVE-2024/CVE-2024-211xx/CVE-2024-21147.json) (`2024-08-13T00:49:47.367`)
- [CVE-2024-37742](CVE-2024/CVE-2024-377xx/CVE-2024-37742.json) (`2024-08-13T01:09:33.383`)
- [CVE-2024-38218](CVE-2024/CVE-2024-382xx/CVE-2024-38218.json) (`2024-08-13T01:10:06.100`)
- [CVE-2024-39949](CVE-2024/CVE-2024-399xx/CVE-2024-39949.json) (`2024-08-13T01:11:46.520`)
- [CVE-2024-40472](CVE-2024/CVE-2024-404xx/CVE-2024-40472.json) (`2024-08-13T01:13:41.263`)
- [CVE-2024-40474](CVE-2024/CVE-2024-404xx/CVE-2024-40474.json) (`2024-08-13T01:13:42.670`)
- [CVE-2024-40475](CVE-2024/CVE-2024-404xx/CVE-2024-40475.json) (`2024-08-13T01:13:44.077`)
- [CVE-2024-40476](CVE-2024/CVE-2024-404xx/CVE-2024-40476.json) (`2024-08-13T01:13:45.497`)
- [CVE-2024-40477](CVE-2024/CVE-2024-404xx/CVE-2024-40477.json) (`2024-08-13T01:13:46.877`)
- [CVE-2024-40479](CVE-2024/CVE-2024-404xx/CVE-2024-40479.json) (`2024-08-13T01:13:47.860`)
- [CVE-2024-40481](CVE-2024/CVE-2024-404xx/CVE-2024-40481.json) (`2024-08-13T01:13:48.730`)
- [CVE-2024-40482](CVE-2024/CVE-2024-404xx/CVE-2024-40482.json) (`2024-08-13T01:13:50.130`)
- [CVE-2024-40484](CVE-2024/CVE-2024-404xx/CVE-2024-40484.json) (`2024-08-13T01:13:50.997`)
- [CVE-2024-40486](CVE-2024/CVE-2024-404xx/CVE-2024-40486.json) (`2024-08-13T01:13:52.383`)
- [CVE-2024-40488](CVE-2024/CVE-2024-404xx/CVE-2024-40488.json) (`2024-08-13T01:13:53.230`)
- [CVE-2024-41332](CVE-2024/CVE-2024-413xx/CVE-2024-41332.json) (`2024-08-13T01:14:31.280`)
- [CVE-2024-41570](CVE-2024/CVE-2024-415xx/CVE-2024-41570.json) (`2024-08-13T01:14:38.880`)
- [CVE-2024-6133](CVE-2024/CVE-2024-61xx/CVE-2024-6133.json) (`2024-08-13T01:18:26.570`)
- [CVE-2024-6136](CVE-2024/CVE-2024-61xx/CVE-2024-6136.json) (`2024-08-13T01:18:26.820`)
## Download and Usage

View File

@ -240723,7 +240723,7 @@ CVE-2023-7062,0,0,3a1384a593cf152e366a728afe5a537e5564a111dceb33df09a757d554c48c
CVE-2023-7063,0,0,a70eaf68fc7417ce794998ee774eb52a272a3335bd687053e59996226f95eaaa,2024-01-30T23:02:10.287000
CVE-2023-7064,0,0,893764021ac36e56fb425978b9c0fe444e7d7382c4148ca0b308b12be70459a1,2024-05-02T18:00:37.360000
CVE-2023-7065,0,0,56ad85a9f778da0dacae256a17e9f54a48bb66bb1d9f0de63c0c37a650069950,2024-05-06T12:44:56.377000
CVE-2023-7066,1,1,13b6222827af5173dbe36c458d7805857373b7b38d38f0a0e8f4c55228206704,2024-08-12T22:15:08.770000
CVE-2023-7066,0,0,13b6222827af5173dbe36c458d7805857373b7b38d38f0a0e8f4c55228206704,2024-08-12T22:15:08.770000
CVE-2023-7067,0,0,d251fedac3953c556b2fae675b30174d6cef931689e18f0c7f5dabce8da9f8a8,2024-05-02T18:00:37.360000
CVE-2023-7068,0,0,7cd804daabb13f07758b06c47cadf4e49acc509b298d07d52e072e7d9588adca,2024-01-09T20:19:48.597000
CVE-2023-7069,0,0,348519c1ee085e4d109b6f90b6ff63f6d5a582ce97e3f91d1eb069ee9d1eaaa4,2024-02-07T16:28:40.250000
@ -243461,7 +243461,7 @@ CVE-2024-21143,0,0,00d3158bf58fdef1b0ea359eb4fd1877d407a38c8141a35ed2d92f7d5fd7f
CVE-2024-21144,0,0,a6e0220af7613c1fe6414e49d55f78f0a709fc1177b6fe6b6e15840375ef4e2d,2024-07-19T14:15:05.497000
CVE-2024-21145,0,0,77d6b8d482bc9fea478023a3ac3b96ff89a156b807bd0fe4072eea7489b1a76c,2024-07-19T14:15:05.580000
CVE-2024-21146,0,0,c75b160e4e3c99880ff62d36e7e801ade0e912daea3b1e5430c44ac99095338a,2024-07-17T13:34:20.520000
CVE-2024-21147,0,0,84f7acc7bc3a20d2859db41d6e11faaeb2b951c493091b63d082c86a294a3902,2024-07-19T14:15:05.667000
CVE-2024-21147,0,1,d581db22cc70629aa91eb51c988684be29e1ff1430ebd94500067b05edd568f0,2024-08-13T00:49:47.367000
CVE-2024-21148,0,0,7bc96a76ce0077505eae8d68abc8206f3ba6f186267ade9b3eedb49371d494f1,2024-07-17T13:34:20.520000
CVE-2024-21149,0,0,ee2bd3223896d48493ed4bc80a50d18703c1a2b0e21db09049566849fca16635,2024-07-17T13:34:20.520000
CVE-2024-2115,0,0,66506b198b4ece0adfc9016031263e6294a50c545f577c56b849d0c705d750c7,2024-04-05T12:40:52.763000
@ -253379,7 +253379,7 @@ CVE-2024-35771,0,0,da094131a898160f7d7534ebd658d9f6c0a47dcb5974f75d3d7653ce22b76
CVE-2024-35772,0,0,67c04a52c2580bba2b2143b8a9e3a147188afdddd51ee8f46047ed6b048599a3,2024-06-24T19:26:14.460000
CVE-2024-35773,0,0,edf644c32dc0e69969a2e651ff67d0bafccf9621547e03428fff35ea895725bb,2024-07-12T16:34:58.687000
CVE-2024-35774,0,0,eade8c8b3f01bcf230b9a96162b1334f062933da0f10549431055a0386eca873,2024-06-24T18:43:57.633000
CVE-2024-35775,1,1,518da236919df970cd5c17117821a744c7c1b2b229313b9338b80ee8aa864621,2024-08-12T23:15:15.467000
CVE-2024-35775,0,0,518da236919df970cd5c17117821a744c7c1b2b229313b9338b80ee8aa864621,2024-08-12T23:15:15.467000
CVE-2024-35776,0,0,e4d3227671df814d3a4852e5c0b87fcdc40bc918afeafb90df6afc52f9dfd1c7,2024-06-24T18:49:09.500000
CVE-2024-35777,0,0,7515dddc5351fc16fba23045723f9d79e6a247348fcb082c517c87296afa7e23,2024-07-09T18:19:14.047000
CVE-2024-35778,0,0,a2dbf9dff5fc4d667e192112da54beac103433f06409a60ab480bcea7a5ac138,2024-07-08T10:15:03.573000
@ -254737,7 +254737,7 @@ CVE-2024-37732,0,0,8bcaa977ac18e5833de4fd0520da90883ea1f9cf5405317587bb381c54de8
CVE-2024-37734,0,0,0e5d8052c40ece19eb47666a762eea5411abf63f936921b36baec3d43e53baa8,2024-07-03T02:04:39.343000
CVE-2024-3774,0,0,593479bdd908b3498d235d74677575dd1f3896886cab276c51a981ed2e66af92,2024-04-15T13:15:31.997000
CVE-2024-37741,0,0,f5ed3254675cb5ce3a67ab08ad08f5443ff303292af76c58fe640715a6de27a4,2024-07-03T14:27:08.057000
CVE-2024-37742,0,0,d9a8d475a25ae5af7e676e3139aadefd87352b16945b084f30458dff1ae4be53,2024-06-26T20:15:15.917000
CVE-2024-37742,0,1,d5dbae2c1e5299395df558941706d9c9b36228086895b2fc3724f0d65b486081,2024-08-13T01:09:33.383000
CVE-2024-3775,0,0,b7d2a473bac9537035a8d6df6a365ee3b93ba49aa9ce7163db0aba168893a523,2024-04-15T13:15:31.997000
CVE-2024-37759,0,0,fcc8ead5df9d431db40c232755b8d406131bfe6bf2637fa79e9581b47deb8f46,2024-07-03T02:04:41.510000
CVE-2024-3776,0,0,5922bebf01d008693e127ff3a5039fdad8dc9d22a230cf3268767563dfe95a49,2024-04-15T13:15:31.997000
@ -254830,11 +254830,11 @@ CVE-2024-3792,0,0,b2d7f7e579eff1bf3cc457c41f5782185342411a77aac1022f0e4393ef1fd1
CVE-2024-37920,0,0,841ece9aa1ea243835cd263b19315e4e373408e20d05486ce82b531c5a2511e0,2024-07-22T13:00:31.330000
CVE-2024-37922,0,0,2f4d0819be87ffb0bb4af4138b7ceba5a758a2030a859f8658eef95358ab0782,2024-07-22T13:00:31.330000
CVE-2024-37923,0,0,0f277f016f5fbeb4c94053f1c3c5921e348aa14bf063918224f804db2fff94d1,2024-07-09T18:19:14.047000
CVE-2024-37924,1,1,c1a5493170bfcfcffe112d3be3d055ca91035a819470c1518d8cd88b85578cb9,2024-08-12T23:15:15.703000
CVE-2024-37924,0,0,c1a5493170bfcfcffe112d3be3d055ca91035a819470c1518d8cd88b85578cb9,2024-08-12T23:15:15.703000
CVE-2024-37927,0,0,560584f6e7ef315723501d3c62881a4e0c9b3ad1204b52ebcac93863b05e014f,2024-07-12T16:34:58.687000
CVE-2024-37928,0,0,d7c23cfa28358062117e75a096fd1b2a1412e40b95d290b44dda94129c8901b3,2024-07-12T16:34:58.687000
CVE-2024-3793,0,0,45180ff35ea2c7285cdd371de1244c7a4424d1261f14c1bf7f3ac3169f3ba4b9,2024-05-14T16:11:39.510000
CVE-2024-37930,1,1,b47abc968f9ae33d4c1793c2ea75018720d800e5bffc0a66cb656a6f077d606f,2024-08-12T23:15:15.940000
CVE-2024-37930,0,0,b47abc968f9ae33d4c1793c2ea75018720d800e5bffc0a66cb656a6f077d606f,2024-08-12T23:15:15.940000
CVE-2024-37932,0,0,a3ce9ecce9fdf6d7e055cae05e400292dfd3fd5ac50cdfaa9f84e0caa41c69f3,2024-07-12T16:34:58.687000
CVE-2024-37933,0,0,89aadc1bfbd864beebf6ce61583dd3e0e43426698e502bc5c6a9b9f602b29135,2024-07-12T16:34:58.687000
CVE-2024-37934,0,0,20d80f75e222e93cd8bf312483db42a7dd2efce13206dab8e3080dada5a4be9e,2024-07-09T18:19:14.047000
@ -254991,7 +254991,7 @@ CVE-2024-38200,0,0,30f61ef0f341771cb3da7c017f647bc0d7ca72b8b83eb77e95bb1ef00a376
CVE-2024-38202,0,0,5f1ef47a3badff97031fb210a5df27c56cf4132700b07b21ac067d757e50d1a2,2024-08-08T13:04:18.753000
CVE-2024-38206,0,0,cb12af303c16bd7b14ab90d82849698a892f6215e2a01ea7e92b5cbb9057d49d,2024-08-12T18:33:38.273000
CVE-2024-3821,0,0,3ffbadbdaf34f564e9c498f1baa8fe758531e73989a1bbb861692bcbfdfc262c,2024-06-03T14:46:24.250000
CVE-2024-38218,0,0,3a49c7dc6bb0374d11da99e5a55b6986d36c1cf5da3a51c54b24361dc5409e9c,2024-08-12T13:41:36.517000
CVE-2024-38218,0,1,e7342866ef3a16926b143aa0008fc6184a292d9f61fe4cbeef73ff44ee02181a,2024-08-13T01:10:06.100000
CVE-2024-38219,0,0,2fca9f35b77d67770864b68108bd122ee00786d86b3d46defa01ed91881911bc,2024-08-12T13:41:36.517000
CVE-2024-3822,0,0,51b0f82a9028abb2f3a6ab312236a4c8392000a211092257ada320c541b18cc9,2024-05-15T16:40:19.330000
CVE-2024-3823,0,0,53ae63b27eb43a6740a92f1ff13f05ddd2a8941167fdfb2924cdfa6b561369e6,2024-05-15T16:40:19.330000
@ -255962,7 +255962,7 @@ CVE-2024-39945,0,0,016efe8f11127d24055a64c694862171837d767c0c5c6ed8678f4cc93196a
CVE-2024-39946,0,0,4a4a188acaefae77f3ab150f76fb0d9f81d61e7ac6fd6bc8974d0fe50fd6a2a2,2024-07-31T12:57:02.300000
CVE-2024-39947,0,0,80805e63343ea3a4bb64a84b8dbe9c1530e7f2159ab58409767f1aadf46ab125,2024-07-31T12:57:02.300000
CVE-2024-39948,0,0,ee424b189b0cfbdde47c11058cfacdc178076b71067d33cd2bbe727742314ac4,2024-08-01T13:56:05.350000
CVE-2024-39949,0,0,92b1523f2a3a126ed9cc65192947af848f33d01f398349b5751a172588fdfb77,2024-07-31T12:57:02.300000
CVE-2024-39949,0,1,db3d180841122ee223993df4a5b148e4eb1d4081aaaa0353c06a8b7332e63281,2024-08-13T01:11:46.520000
CVE-2024-3995,0,0,a7fe690817691037765b680c602849c2a36e767bb2849159693fe5a7864f46cb,2024-07-01T14:15:05.680000
CVE-2024-39950,0,0,0a5af814b405869cb4bc1326a5d163c966c476b51ac00ace4bb3ecf06791ecff,2024-08-01T13:56:11.127000
CVE-2024-39962,0,0,88f72130b2e330c20b5ac0702cd6d158cd0cb6e08e9ed8a9d4ac60ee5a0c3f4d,2024-08-01T13:56:13.933000
@ -256057,21 +256057,21 @@ CVE-2024-40456,0,0,f1acaf3e46ce38cdd4b72320186132bab37cc38f6f4c796e31eaece0545a5
CVE-2024-4046,0,0,b162bb54ae31ac06a54238ce430265f513a39f78ee0aa36d5d6ff941168dcdb1,2024-05-14T16:11:39.510000
CVE-2024-40464,0,0,e0961ca0a3aa848ce7061cc7ba1fa2af403b350ed8107067aa6b807e1e6fd113,2024-08-06T18:35:03.237000
CVE-2024-40465,0,0,15986f29ff1e8aef63181dd9799f409f46000c95ad7d745708fb5f0091003f8f,2024-08-02T19:35:37.367000
CVE-2024-40472,0,0,c3f1304f7f6a6f624b7992076e6d1fe56be5759b9209d182514f1119084b99df,2024-08-12T13:41:36.517000
CVE-2024-40472,0,1,048983e26a97fabf3ef9ca5655a978196b7c91c33fe00b9ba0aef70a8e3c74ba,2024-08-13T01:13:41.263000
CVE-2024-40473,0,0,bac23d9f20af7f79a5f607e2c6e42e1aebf64fb29289b84bea57158dbb904513,2024-08-12T13:41:36.517000
CVE-2024-40474,0,0,a440456ffce69fd544d7ccf24f6ae0e281bea37b7085e3b0d5340bed1d1eb38a,2024-08-12T13:41:36.517000
CVE-2024-40475,0,0,bd96a8830e2160ceaf3b5df2cbdff8ea34b2418fe575f31155dfe3d080cc68ff,2024-08-12T13:41:36.517000
CVE-2024-40476,0,0,2d968dbde1713118e363b700724fb5eb4428d21626fa8c69e3e4fb0e0605ef6a,2024-08-12T13:41:36.517000
CVE-2024-40477,0,0,b99c59eda73224f5c34d4cda807e556646f39c9d25b5c311b583cf18d8afdfc5,2024-08-12T13:41:36.517000
CVE-2024-40474,0,1,ed9bcaa0816a8b1627787d387aa64a764a9f0d1a8060bb791a43106b521b0b3f,2024-08-13T01:13:42.670000
CVE-2024-40475,0,1,6dbb9fe9aa654118a15979c2f781ea7f22dc9683d057f6a3dda190241670bcd9,2024-08-13T01:13:44.077000
CVE-2024-40476,0,1,8d4c9cf39ae6a94779797a1345413413cadee5ca02ebe610a223f3ff94fdbd0c,2024-08-13T01:13:45.497000
CVE-2024-40477,0,1,0ebd8b8f59a35dda2b3e292f3675b27eb6ffc42149072e05c13180f024ce3e21,2024-08-13T01:13:46.877000
CVE-2024-40478,0,0,c52d89ab86aaf3f734a40597d5b00313c948fc2e1e77e0656955644084643dfa,2024-08-12T13:41:36.517000
CVE-2024-40479,0,0,73cf6dde7ba74cacdf9c3d36464146c03f587233ecc67eb1d261bf639fa26bd5,2024-08-12T13:41:36.517000
CVE-2024-40479,0,1,0e859692d2dcdb68471916e06e469ab263533fd2f9afcecfe52d53c988a5da77,2024-08-13T01:13:47.860000
CVE-2024-40480,0,0,ffebbe104e7e5f7fc549389d2cc74047baebdb21bfa45794fe18ca9250ab02be,2024-08-12T13:41:36.517000
CVE-2024-40481,0,0,e8cd1e3d6e210748f3a90997731d666b0805aedb865a25165fa50c4b18dd69e6,2024-08-12T13:41:36.517000
CVE-2024-40482,0,0,31b235f6aeb322009edaf43befaea2002d52cb8d281c9d30f51fd88c792be3aa,2024-08-12T13:41:36.517000
CVE-2024-40484,0,0,85c8a875926bd96379e78d76b30418e68ae2c0e615dce37b875916d332c19edd,2024-08-12T13:41:36.517000
CVE-2024-40486,0,0,d13c18293ea3f5b839ec8274b4c792b5fe0f48540f599e2e17ba8e594b6c8ee5,2024-08-12T13:41:36.517000
CVE-2024-40481,0,1,e86ef06aa0938d9c99b8c98ae77f72fb6ac894109e31c03c83342c579c430962,2024-08-13T01:13:48.730000
CVE-2024-40482,0,1,9a3a01b5782aa51ef209e482e70f047b430b9828561a94171012474df4d532a4,2024-08-13T01:13:50.130000
CVE-2024-40484,0,1,694fee47c259d31c851a9966b5a0a3c0598a5ae04cd749dc08bd07981a6111ab,2024-08-13T01:13:50.997000
CVE-2024-40486,0,1,206068d4d3a686bb79ffe5f57501930cd1fe13ada3eb39bb4b41ff953c8c8a8c,2024-08-13T01:13:52.383000
CVE-2024-40487,0,0,005a09265ebc099b9fcb5976da33b894e6213384a847e53e8ae4a2bd87b7e372,2024-08-12T13:41:36.517000
CVE-2024-40488,0,0,b3e51fd8218a45b1f5ac6aff4a38b8cfd150d0b9486d5a376f112926ee4befe8,2024-08-12T13:41:36.517000
CVE-2024-40488,0,1,29149e46f549d6c8fa1979da87e45c07630bc970cf31d75d73d9d6723dc075d0,2024-08-13T01:13:53.230000
CVE-2024-40492,0,0,887baeb8c822fbf96c83ae7c8317e551b9d380e125d5f646dfb0a8c0719647ab,2024-08-01T13:57:30.260000
CVE-2024-40495,0,0,0c92b9527f5126e4b4bbf0d1f0a16c194305be9e806244080172bf727ded6b6a,2024-08-01T13:57:31.037000
CVE-2024-40498,0,0,5810ed5aa59e12db14c51ce30325d1c0d70a5c997d2111b8b796a66ebc036219,2024-08-06T16:30:24.547000
@ -256578,7 +256578,7 @@ CVE-2024-41318,0,0,9b1c1d0472f281a532ac7cd9f50c0be0ec0f55b0327046bb10ee1709062e9
CVE-2024-41319,0,0,1899a3684e8a27d8d6402d107bc11ca910ee14276fc605936dd401557907d526,2024-08-01T13:58:31.957000
CVE-2024-41320,0,0,6629b2c1bbc9cd1b160b7b0f9c935334633b6b47708e3a65ad0ff69abde9e8ce,2024-08-01T13:58:32.723000
CVE-2024-4133,0,0,809a3aebbf4e63405fb2f0740c9908f3dfcf1d711b93379e5d465ea9e56d3cba,2024-05-02T18:00:37.360000
CVE-2024-41332,0,0,56ad202b80efa610d5c6ce283a82b14a04739c8323421c543c839229ab8bd6c1,2024-08-12T13:41:36.517000
CVE-2024-41332,0,1,e6fa5010b9024e0af46a147ba4070b726f6dce97083dedbf0dda2c9127c835eb,2024-08-13T01:14:31.280000
CVE-2024-41333,0,0,cddcfe88014fc883d7c26828c1a1c1f213d8d1e951fc2a526ac4569575e77f96,2024-08-07T20:54:44.060000
CVE-2024-4135,0,0,3adddfced77f8fc8630aec5e175734a40783e3f6b247cb0614a312485a8097a3,2024-05-08T13:15:00.690000
CVE-2024-41353,0,0,283f710ae1d74e1c389a6d83c71bf34f8cb957eca1e713efb25da5fc972611a3,2024-08-01T13:58:33.490000
@ -256637,7 +256637,7 @@ CVE-2024-41550,0,0,6726e0c6849e70c536d9bf6936241acc920718305f74521a185836b6b5189
CVE-2024-41551,0,0,a47b3d6d1401636bd7731728d6fcb9c38717d9cec4c98b37b50c290693f43ad0,2024-08-01T13:58:54.023000
CVE-2024-4156,0,0,31cc9500838d0dc99d5959700d84ebbac93048893a2eb67f37ed77d13093550c,2024-05-02T18:00:37.360000
CVE-2024-4157,0,0,ac5ec2e690c76b81403cfa49bc63d1a8caa2fb9d97d28a1055398849720db727,2024-05-22T12:46:53.887000
CVE-2024-41570,0,0,ef1bf59c27127ff158179f33921003a804caaf6660e1a7e2b6ec3f026dc6edfc,2024-08-12T13:41:36.517000
CVE-2024-41570,0,1,aeeff334d8e94264f5528f4e2cc6e3775fd5da44784345b666e0ce860bb11372,2024-08-13T01:14:38.880000
CVE-2024-41577,0,0,e7e693181f88ef240813103b284f71ca31f9c53b9cb63293a922ae2ded80048a,2024-08-12T13:41:36.517000
CVE-2024-4158,0,0,9bd0a38e47c5b6d26f1e587737a0ffeb7c251278f38061995fc29ba309646aa6,2024-05-14T16:11:39.510000
CVE-2024-4159,0,0,72a4ec46db1a22f62474bfa22a14f37a28a6ceba3042de92b905fca6cc58c082,2024-04-25T23:15:47.087000
@ -257144,30 +257144,30 @@ CVE-2024-43112,0,0,adba1dfd679ff5e6d46afc8c8dcdec70df81430cc85737d48e09fa02ef6ca
CVE-2024-43113,0,0,6573240be25b6af3e51d92f2a835e3694315e36c10003c73af950ce730fbb885,2024-08-06T16:30:24.547000
CVE-2024-43114,0,0,6c710d141dc94fd27ccf4c35d8ed8fed217c18d925335ce65015d178fb239e9f,2024-08-06T16:30:24.547000
CVE-2024-4312,0,0,82451935a132459ec3a52babe511fed0dc0447cacf13fc78eab91e8a5c0d303b,2024-05-14T16:11:39.510000
CVE-2024-43123,1,1,2e2c050e05eceebebb6764bf76439c256ea30edeaf99f7777c98dcb013d605b5,2024-08-12T23:15:16.177000
CVE-2024-43124,1,1,159a6e3a5154401c268b9283252d7586e765ab7a3b09a609d57c59d73980ec29,2024-08-12T23:15:16.407000
CVE-2024-43125,1,1,6f8ec68758ec079ee9729debe12e8e02714b04708086483fe3f3e1be363e8ea4,2024-08-12T23:15:16.637000
CVE-2024-43126,1,1,740227e0fc9eabd775401b86378322641fa395c98aaa294b0e51f66d78b9c273,2024-08-12T23:15:16.863000
CVE-2024-43127,1,1,d4f5c1b20e60840e320608c58c84e0ac666a5976f98e74b730764b8f3b2a598f,2024-08-12T23:15:17.097000
CVE-2024-43123,0,0,2e2c050e05eceebebb6764bf76439c256ea30edeaf99f7777c98dcb013d605b5,2024-08-12T23:15:16.177000
CVE-2024-43124,0,0,159a6e3a5154401c268b9283252d7586e765ab7a3b09a609d57c59d73980ec29,2024-08-12T23:15:16.407000
CVE-2024-43125,0,0,6f8ec68758ec079ee9729debe12e8e02714b04708086483fe3f3e1be363e8ea4,2024-08-12T23:15:16.637000
CVE-2024-43126,0,0,740227e0fc9eabd775401b86378322641fa395c98aaa294b0e51f66d78b9c273,2024-08-12T23:15:16.863000
CVE-2024-43127,0,0,d4f5c1b20e60840e320608c58c84e0ac666a5976f98e74b730764b8f3b2a598f,2024-08-12T23:15:17.097000
CVE-2024-4313,0,0,04786fcee0b11c58facf347077c0fb8e17faddbc064f2c4dc547a3be70193e4e,2024-06-24T20:01:09.330000
CVE-2024-43130,1,1,f0c894fb49048185e3da95689d302b7c2e99c7b3677710d304a8e2f1785c5edc,2024-08-12T23:15:17.320000
CVE-2024-43133,1,1,2c0100fa05c934b61e5c9a46d226b379db3a64e04b2a9f1bc46b8ad6b2d21213,2024-08-12T23:15:17.560000
CVE-2024-43137,1,1,f3fc866897aede9c70e5951a4c9720e4cf044f3eeb210af260c38a29b016593e,2024-08-12T23:15:17.773000
CVE-2024-43139,1,1,55eb0f9a37bda0bafd1339d01b07e485dfec14707f0813bce22c8fefee993094,2024-08-12T23:15:17.997000
CVE-2024-43130,0,0,f0c894fb49048185e3da95689d302b7c2e99c7b3677710d304a8e2f1785c5edc,2024-08-12T23:15:17.320000
CVE-2024-43133,0,0,2c0100fa05c934b61e5c9a46d226b379db3a64e04b2a9f1bc46b8ad6b2d21213,2024-08-12T23:15:17.560000
CVE-2024-43137,0,0,f3fc866897aede9c70e5951a4c9720e4cf044f3eeb210af260c38a29b016593e,2024-08-12T23:15:17.773000
CVE-2024-43139,0,0,55eb0f9a37bda0bafd1339d01b07e485dfec14707f0813bce22c8fefee993094,2024-08-12T23:15:17.997000
CVE-2024-4314,0,0,5b91c731cc96c112e4837604681a355586cd629f1c71449572dfc7eb6fafd4a6,2024-05-14T16:11:39.510000
CVE-2024-43147,1,1,0fccae4ec698a6099621600bfc058755995742cd82334607f2abebe509b1a9f2,2024-08-12T23:15:18.230000
CVE-2024-43148,1,1,c9700795fcfb2515ed9e39c35827905d49e04b567d0dad47c62be4149e09af7a,2024-08-12T23:15:18.457000
CVE-2024-43149,1,1,7a8613d3b83fae33d5c75c8aeb5125a3d81feadd8cdf554f9c66f3d85c38b332,2024-08-12T23:15:18.673000
CVE-2024-43147,0,0,0fccae4ec698a6099621600bfc058755995742cd82334607f2abebe509b1a9f2,2024-08-12T23:15:18.230000
CVE-2024-43148,0,0,c9700795fcfb2515ed9e39c35827905d49e04b567d0dad47c62be4149e09af7a,2024-08-12T23:15:18.457000
CVE-2024-43149,0,0,7a8613d3b83fae33d5c75c8aeb5125a3d81feadd8cdf554f9c66f3d85c38b332,2024-08-12T23:15:18.673000
CVE-2024-4315,0,0,392e78ede02028792ceca327e706bfb19bc55163d6718415b77f2fda1df1c705,2024-06-13T18:36:09.013000
CVE-2024-43150,1,1,72b8e4f4c43893a3b9fafa5060a9c521d5aa29cfdf1db735092a4d1cdac7297a,2024-08-12T23:15:18.897000
CVE-2024-43151,1,1,40dd109fffd05a29237e940bc5a1cdf6e67a881049be4c557b0156f61f930757,2024-08-12T22:15:09.070000
CVE-2024-43152,1,1,493963c06fcb84dbb83289191927e0a37275e54b8136b0017aba59da882c02d0,2024-08-12T22:15:09.310000
CVE-2024-43155,1,1,46e2681a7fd5bd5c24a335d616cbc9030fcc9cab633298d648476bbaed053da2,2024-08-12T22:15:09.550000
CVE-2024-43156,1,1,8f92ab41c4ed087540245f68044db41ffe862a501b703246e20ed6276e3e2760,2024-08-12T22:15:09.780000
CVE-2024-43150,0,0,72b8e4f4c43893a3b9fafa5060a9c521d5aa29cfdf1db735092a4d1cdac7297a,2024-08-12T23:15:18.897000
CVE-2024-43151,0,0,40dd109fffd05a29237e940bc5a1cdf6e67a881049be4c557b0156f61f930757,2024-08-12T22:15:09.070000
CVE-2024-43152,0,0,493963c06fcb84dbb83289191927e0a37275e54b8136b0017aba59da882c02d0,2024-08-12T22:15:09.310000
CVE-2024-43155,0,0,46e2681a7fd5bd5c24a335d616cbc9030fcc9cab633298d648476bbaed053da2,2024-08-12T22:15:09.550000
CVE-2024-43156,0,0,8f92ab41c4ed087540245f68044db41ffe862a501b703246e20ed6276e3e2760,2024-08-12T22:15:09.780000
CVE-2024-4316,0,0,1f2d235ec208ef46fe57643aa08db6f0cf549b33584dbdea1429e6bdf8a86d5e,2024-05-14T16:11:39.510000
CVE-2024-43161,1,1,3e0e1cd106d7beea6d1de08e9591b5020f6dbc7d0287dfb199c0cf3c902eca5f,2024-08-12T22:15:10.003000
CVE-2024-43163,1,1,47e94f16c835dfc9cf43d5d03675691ae35c713ac7d72a19c9683ce08a8d1e21,2024-08-12T22:15:10.233000
CVE-2024-43164,1,1,d2e791dc4d2e7fe7c5f02b7096283d295af90b80817bca033d0e4314db105c56,2024-08-12T22:15:10.453000
CVE-2024-43161,0,0,3e0e1cd106d7beea6d1de08e9591b5020f6dbc7d0287dfb199c0cf3c902eca5f,2024-08-12T22:15:10.003000
CVE-2024-43163,0,0,47e94f16c835dfc9cf43d5d03675691ae35c713ac7d72a19c9683ce08a8d1e21,2024-08-12T22:15:10.233000
CVE-2024-43164,0,0,d2e791dc4d2e7fe7c5f02b7096283d295af90b80817bca033d0e4314db105c56,2024-08-12T22:15:10.453000
CVE-2024-43167,0,0,01f17fcd63c756d83b948d0875b4414e12688ba0576962ac27da499c54ee819d,2024-08-12T13:41:36.517000
CVE-2024-43168,0,0,6f1ce3e85e6cec75b3ae8101a2990b1aa3eb274cac98a0b799813d7d71452062,2024-08-12T13:41:36.517000
CVE-2024-4317,0,0,2ab51635ebb5a78f9093ee7220532c2f98c47bcb30186dfa33cf412783a7fe8e,2024-05-14T16:11:39.510000
@ -257176,16 +257176,16 @@ CVE-2024-4319,0,0,7ca0245a01df3d5ced472265b32f90c6f6a22a37af3715d5589379ecac1f6a
CVE-2024-43199,0,0,94150f8459e19abf18625a946d8a507867275817cd3d9928084030fcb7fa8330,2024-08-12T12:59:48.253000
CVE-2024-4320,0,0,f21f873c3bfeb896c071276000f6bbe2ae4420d2f2c3184178334c98a666705b,2024-06-07T14:56:05.647000
CVE-2024-4321,0,0,9cab2a859d144dd765da27aaa03d49bb12083c0b11abfa900a9b065f4ea718e1,2024-05-16T13:03:05.353000
CVE-2024-43210,1,1,f5d2dfaff0f6aad12a7313f08f25d34b70199fa6e246c6b43be95bed42a9581d,2024-08-12T22:15:10.690000
CVE-2024-43213,1,1,65ac589c972c45a3a89f2e3b6f81303e3c6cc9e95a316bdfe6c4b0514d961bd2,2024-08-12T22:15:10.917000
CVE-2024-43216,1,1,9593ec79059e860deaf013a478b93b87414de3abc93a8553db8255cbcfe4c593,2024-08-12T22:15:11.153000
CVE-2024-43217,1,1,81eff7fc515b3d1f5f1e802fc56c2d6f4ae578d4a5a0e83370286cbc81ac0412,2024-08-12T22:15:11.383000
CVE-2024-43218,1,1,69f5d38ecde05bf96ba9a5a479907c39dc4f39e977d798a4c6b0831c5b4f6998,2024-08-12T22:15:11.603000
CVE-2024-43210,0,0,f5d2dfaff0f6aad12a7313f08f25d34b70199fa6e246c6b43be95bed42a9581d,2024-08-12T22:15:10.690000
CVE-2024-43213,0,0,65ac589c972c45a3a89f2e3b6f81303e3c6cc9e95a316bdfe6c4b0514d961bd2,2024-08-12T22:15:10.917000
CVE-2024-43216,0,0,9593ec79059e860deaf013a478b93b87414de3abc93a8553db8255cbcfe4c593,2024-08-12T22:15:11.153000
CVE-2024-43217,0,0,81eff7fc515b3d1f5f1e802fc56c2d6f4ae578d4a5a0e83370286cbc81ac0412,2024-08-12T22:15:11.383000
CVE-2024-43218,0,0,69f5d38ecde05bf96ba9a5a479907c39dc4f39e977d798a4c6b0831c5b4f6998,2024-08-12T22:15:11.603000
CVE-2024-4322,0,0,1d1748b4ac4d92a791836ec730671d75744c804cc2e9189accf3943e4e00efc0,2024-05-16T13:03:05.353000
CVE-2024-43220,1,1,03928570b08971a10a9792fcec4384007d4af89d60f962519aa9e2b4be6c2a97,2024-08-12T22:15:11.827000
CVE-2024-43224,1,1,14ef55b6f233abbe4c55ee5b24591a3059b6a2797ad7b9f47292419afa508eb3,2024-08-12T22:15:12.057000
CVE-2024-43225,1,1,8d3db48602caeb59473413007be626fbc33e6de2b06bc8d6c41cb12160ed3000,2024-08-12T22:15:12.293000
CVE-2024-43226,1,1,e78a3db63ad6a3c0ba71cef4e9c688dfb4aa9a8b2d02c9369a27a80a68cc1fd8,2024-08-12T22:15:12.520000
CVE-2024-43220,0,0,03928570b08971a10a9792fcec4384007d4af89d60f962519aa9e2b4be6c2a97,2024-08-12T22:15:11.827000
CVE-2024-43224,0,0,14ef55b6f233abbe4c55ee5b24591a3059b6a2797ad7b9f47292419afa508eb3,2024-08-12T22:15:12.057000
CVE-2024-43225,0,0,8d3db48602caeb59473413007be626fbc33e6de2b06bc8d6c41cb12160ed3000,2024-08-12T22:15:12.293000
CVE-2024-43226,0,0,e78a3db63ad6a3c0ba71cef4e9c688dfb4aa9a8b2d02c9369a27a80a68cc1fd8,2024-08-12T22:15:12.520000
CVE-2024-43227,0,0,d06cb872fe104f2d375e915815c778ec356d02a1a0f692c097804c415c1da56b,2024-08-12T21:15:32.603000
CVE-2024-4323,0,0,8795dbc0ef00377d638f97794032c86e045103be19a16a47714b9d0a60088551,2024-05-20T13:00:04.957000
CVE-2024-43231,0,0,1825e1ecffddba056fa98f16e33df7d0d3576f5c19e0c6ce8dd3e877c464fcaf,2024-08-12T21:15:32.890000
@ -258692,9 +258692,9 @@ CVE-2024-6128,0,0,e064ff8d5dabba517cce591bd7ae4e33f1f46e689b63e72521fbd8f55a944d
CVE-2024-6129,0,0,7933292aa403a14b0748017ae2569e039b43c54c319d4b3589a08b9d05be42b3,2024-06-20T12:44:01.637000
CVE-2024-6130,0,0,f4b647f0047f578fe057faac21db7670b7977afa1d31bb2fa4fd50dc12004c54,2024-07-01T12:37:24.220000
CVE-2024-6132,0,0,83486b9bda06b2bfd8b6c6e0e87eac1b4d59232f4be914a093590a57da1cf4d5,2024-06-20T12:44:01.637000
CVE-2024-6133,0,0,11351dbf03414755557a4338a4e441faef4dbbe801099e87415062f11fdcaa9d,2024-08-12T13:41:36.517000
CVE-2024-6133,0,1,2337ffd9cad2357491c8f783d0b691c0b27d4405be8ab2d34dc8ce60f34a6000,2024-08-13T01:18:26.570000
CVE-2024-6134,0,0,e3ef2ea84bcff820ce2b4e452d500e8e9e5be6a6b81c054bf5cac514a6a5608b,2024-08-12T13:41:36.517000
CVE-2024-6136,0,0,3854e1d581f6127f9b8244a143e3c0b775f6e26042c869e1df7f773222d1ecd1,2024-08-12T13:41:36.517000
CVE-2024-6136,0,1,b5f2fd8869742060eab1f7acc4116cefd24c0a3b003f1c5a14cb58f5ac02f037,2024-08-13T01:18:26.820000
CVE-2024-6138,0,0,fc35836bd5348e7eb9a778e4240c73e0ce52b6c3e53dfd414d6ee066e94e6acd,2024-07-12T16:54:53.997000
CVE-2024-6139,0,0,5132030314b9a0ca48cecf9e1dd593f9b9cec1db256d0c213c6569e108426fbe,2024-06-27T19:25:12.067000
CVE-2024-6142,0,0,b186966dd1e43431007a65ef388b5fc16ca959c5df4a79ac4b3d70a69eba9543,2024-06-20T12:44:01.637000
@ -259588,7 +259588,7 @@ CVE-2024-7583,0,0,b2c70b6258cd9101ea44bd72a9a7bee40fdef17b5833e45029641b6b1054cd
CVE-2024-7584,0,0,88e393ed083253249958807c1b676f862629edacea69fa08e833cacac796d57a,2024-08-07T19:09:46.290000
CVE-2024-7585,0,0,5e2ff565ca20d01ef68f8422fbeb35a8929478e27cc3f0f142481fee7317e65c,2024-08-07T19:09:46.290000
CVE-2024-7589,0,0,ec264cfa06d74adc18884d15f0bb08d50afb3ff7b46d5f725f942909f4b4dc96,2024-08-12T16:35:05.763000
CVE-2024-7590,1,1,35da26593bcbaca2b731a65c264ea6c48a52b27db0860d7bda278a5558fb3fb1,2024-08-12T22:15:12.750000
CVE-2024-7590,0,0,35da26593bcbaca2b731a65c264ea6c48a52b27db0860d7bda278a5558fb3fb1,2024-08-12T22:15:12.750000
CVE-2024-7610,0,0,a10689bea1d0fbdec4f1b8819e74182773158d5010cb9fbea2ce46532922c645,2024-08-08T13:04:18.753000
CVE-2024-7613,0,0,51cb787f464113bd96bef73c3a1496b2c8fdb1709edd4dc30393e6a61466a202,2024-08-12T13:41:36.517000
CVE-2024-7614,0,0,d7cc9c45c708dde228724405eed42fed1e1e5a328ee0ca2886de1c39b6c0c7dc,2024-08-12T13:41:36.517000
@ -259637,5 +259637,7 @@ CVE-2024-7694,0,0,7eb01f663f1a6ae6fa8d343bc54dd9427e90e5a6b166e3bddc2347c03fdce9
CVE-2024-7697,0,0,509c155762486c19cfc0dceb2044f7d5dc23072793fd0a597d3f1e860d0ba6cd,2024-08-12T15:35:07.293000
CVE-2024-7700,0,0,a9f0ec07b98990fe42b46daef65c8e0b5a8fa0712121f2027b841fccbefa3e8e,2024-08-12T18:57:17.383000
CVE-2024-7704,0,0,f1d408cfe4afc78820402b7d84e076c7097b231b26bbe412a10057a3525a73da,2024-08-12T21:15:34.100000
CVE-2024-7705,1,1,cf95b489808fa8132dfdd8d11fdf93e486e1b455e83524c7ef4630f887c0783a,2024-08-12T23:15:19.113000
CVE-2024-7706,1,1,dddae6f8d636e0e2c3ba2b1628309dfeb1aca307337fd2625268eab5b9b234c9,2024-08-12T23:15:19.417000
CVE-2024-7705,0,0,cf95b489808fa8132dfdd8d11fdf93e486e1b455e83524c7ef4630f887c0783a,2024-08-12T23:15:19.113000
CVE-2024-7706,0,0,dddae6f8d636e0e2c3ba2b1628309dfeb1aca307337fd2625268eab5b9b234c9,2024-08-12T23:15:19.417000
CVE-2024-7707,1,1,21170f2707eddb1f88d3623b0eff5f0856514ae1fb599ac77f04f14c1cb19563,2024-08-13T01:24:09.723000
CVE-2024-7709,1,1,7f617395257f5decd3ca8318abe3ce517c53d7b8c4baa7edc2f2c2b481a048c8,2024-08-13T01:24:10.067000

Can't render this file because it is too large.