mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-08-13T02:00:17.173553+00:00
This commit is contained in:
parent
f53b0b8689
commit
d5cf1808b8
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21147",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-07-16T23:15:16.377",
|
||||
"lastModified": "2024-07-19T14:15:05.667",
|
||||
"lastModified": "2024-08-13T00:49:47.367",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240719-0008/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-37742",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-25T22:15:35.183",
|
||||
"lastModified": "2024-06-26T20:15:15.917",
|
||||
"lastModified": "2024-08-13T01:09:33.383",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un problema en Safe Exam Browser para Windows anterior a 3.6 permite a un atacante compartir datos del portapapeles entre el modo quiosco SEB y el sistema subyacente, comprometiendo la integridad del examen, lo que puede llevar a la ejecuci\u00f3n de c\u00f3digo arbitrario y a la obtenci\u00f3n de informaci\u00f3n confidencial a trav\u00e9s del componente de administraci\u00f3n del portapapeles."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Eteblue/CVE-2024-37742",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-38218",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-08-12T13:38:23.933",
|
||||
"lastModified": "2024-08-12T13:41:36.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-13T01:10:06.100",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -35,6 +35,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38218",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-39949",
|
||||
"sourceIdentifier": "cybersecurity@dahuatech.com",
|
||||
"published": "2024-07-31T04:15:05.503",
|
||||
"lastModified": "2024-07-31T12:57:02.300",
|
||||
"lastModified": "2024-08-13T01:11:46.520",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dahuasecurity.com/aboutUs/trustedCenter/details/768",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40472",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T13:38:28.273",
|
||||
"lastModified": "2024-08-12T13:41:36.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-13T01:13:41.263",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Sourcecodester Daily Calories Monitoring Tool v1.0 is vulnerable to SQL Injection via \"delete-calorie.php.\""
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Sourcecodester/Daily%20Calories%20Monitoring%20Tool%20v1.0/SQL%20Injection.pdf",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40474",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T13:38:28.463",
|
||||
"lastModified": "2024-08-12T13:41:36.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-13T01:13:42.670",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A Reflected Cross Site Scripting (XSS) vulnerability was found in \"edit-cate.php\" in SourceCodester House Rental Management System v1.0."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Sourcecodester/Best%20House%20Rental%20Management%20System%20v1.0/Reflected%20XSS.pdf",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40475",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T13:38:28.553",
|
||||
"lastModified": "2024-08-12T13:41:36.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-13T01:13:44.077",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "SourceCodester Best House Rental Management System v1.0 is vulnerable to Incorrect Access Control via /rental/payment_report.php, /rental/balance_report.php, /rental/invoices.php, /rental/tenants.php, and /rental/users.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Sourcecodester/Best%20House%20Rental%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20Deep%20URL.pdf",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40476",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T13:38:28.637",
|
||||
"lastModified": "2024-08-12T13:41:36.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-13T01:13:45.497",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A Cross-Site Request Forgery (CSRF) vulnerability was found in SourceCodester Best House Rental Management System v1.0. This could lead to an attacker tricking the administrator into adding/modifying/deleting valid tenant data via a crafted HTML page, as demonstrated by a Delete Tenant action at the /rental/ajax.php?action=delete_tenant."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Sourcecodester/Best%20House%20Rental%20Management%20System%20v1.0/CSRF.pdf",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-40477",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T13:38:28.727",
|
||||
"lastModified": "2024-08-12T13:41:36.517",
|
||||
"lastModified": "2024-08-13T01:13:46.877",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A SQL injection vulnerability in \"/oahms/admin/forgot-password.php\" in PHPGurukul Old Age Home Management System v1.0 allows an attacker to execute arbitrary SQL commands via the \"email\" parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/PHPGurukul/Old%20Age%20Home%20Mgmt%20System%20v1.0/SQL%20Injection.pdf",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-40479",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T13:38:28.913",
|
||||
"lastModified": "2024-08-12T13:41:36.517",
|
||||
"lastModified": "2024-08-13T01:13:47.860",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A SQL injection vulnerability in \"/admin/quizquestion.php\" in Kashipara Online Exam System v1.0 allows remote attackers to execute arbitrary SQL commands via the \"eid\" parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Online%20Exam%20System%20v1.0/SQL%20Injection.pdf",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40481",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T13:38:29.093",
|
||||
"lastModified": "2024-08-12T13:41:36.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-13T01:13:48.730",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A Stored Cross Site Scripting (XSS) vulnerability was found in \"/admin/view-enquiry.php\" in PHPGurukul Old Age Home Management System v1.0, which allows remote attackers to execute arbitrary code via the Contact Us page \"message\" parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/PHPGurukul/Old%20Age%20Home%20Mgmt%20System%20v1.0/Stored%20XSS.pdf",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-40482",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T13:38:29.180",
|
||||
"lastModified": "2024-08-12T13:41:36.517",
|
||||
"lastModified": "2024-08-13T01:13:50.130",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "An Unrestricted file upload vulnerability was found in \"/Membership/edit_member.php\" of Kashipara Live Membership System v1.0, which allows attackers to execute arbitrary code via uploading a crafted PHP file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Live%20Membership%20System%20v1.0/Unrestricted%20File%20Upload.pdf",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40484",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T13:38:29.273",
|
||||
"lastModified": "2024-08-12T13:41:36.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-13T01:13:50.997",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A Reflected Cross Site Scripting (XSS) vulnerability was found in \"/oahms/search.php\" in PHPGurukul Old Age Home Management System v1.0, which allows remote attackers to execute arbitrary code via the \"searchdata\" parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/PHPGurukul/Old%20Age%20Home%20Mgmt%20System%20v1.0/Reflected%20XSS.pdf",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-40486",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T13:38:29.360",
|
||||
"lastModified": "2024-08-12T13:41:36.517",
|
||||
"lastModified": "2024-08-13T01:13:52.383",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A SQL injection vulnerability in \"/index.php\" of Kashipara Live Membership System v1.0 allows remote attackers to execute arbitrary SQL commands and bypass Login via the email or password Login parameters."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Live%20Membership%20System%20v1.0/SQL%20Injection.pdf",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40488",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T13:38:29.537",
|
||||
"lastModified": "2024-08-12T13:41:36.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-13T01:13:53.230",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A Cross-Site Request Forgery (CSRF) vulnerability was found in the Kashipara Live Membership System v1.0. This could lead to an attacker tricking the administrator into deleting valid member data via a crafted HTML page, as demonstrated by a Delete Member action at the /delete_members.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://capec.mitre.org/data/definitions/62.html",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41332",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T13:38:30.150",
|
||||
"lastModified": "2024-08-12T13:41:36.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-13T01:14:31.280",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Incorrect access control in the delete_category function of Sourcecodester Computer Laboratory Management System v1.0 allows authenticated attackers with low-level privileges to arbitrarily delete categories."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://packetstormsecurity.com/files/179890/Computer-Laboratory-Management-System-1.0-Privilege-Escalation.html",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41570",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T13:38:31.277",
|
||||
"lastModified": "2024-08-12T13:41:36.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-13T01:14:38.880",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "An Unauthenticated Server-Side Request Forgery (SSRF) in demon callback handling in Havoc 2 0.7 allows attackers to send arbitrary network traffic originating from the team server."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://blog.chebuya.com/posts/server-side-request-forgery-on-havoc-c2/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-6133",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-08-12T13:38:38.703",
|
||||
"lastModified": "2024-08-12T13:41:36.517",
|
||||
"lastModified": "2024-08-13T01:18:26.570",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,30 @@
|
||||
"value": "The wp-cart-for-digital-products WordPress plugin before 8.5.6 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/fd613e1e-557c-4383-a3e9-4c14bc0be0c5/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-6136",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-08-12T13:38:38.850",
|
||||
"lastModified": "2024-08-12T13:41:36.517",
|
||||
"lastModified": "2024-08-13T01:18:26.820",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,30 @@
|
||||
"value": "The wp-cart-for-digital-products WordPress plugin before 8.5.6 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/7d85cfe4-4878-4530-ba78-7cfe33f3a8d5/",
|
||||
|
137
CVE-2024/CVE-2024-77xx/CVE-2024-7707.json
Normal file
137
CVE-2024/CVE-2024-77xx/CVE-2024-7707.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-7707",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-13T01:24:09.723",
|
||||
"lastModified": "2024-08-13T01:24:09.723",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Tenda FH1206 02.03.01.35 and classified as critical. Affected by this issue is the function formSafeEmailFilter of the file /goform/SafeEmailFilter of the component HTTP POST Request Handler. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 9.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/VodkaVortex/IoT/blob/main/formSafeEmailFilter.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.274190",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.274190",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.385670",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2024/CVE-2024-77xx/CVE-2024-7709.json
Normal file
141
CVE-2024/CVE-2024-77xx/CVE-2024-7709.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2024-7709",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-13T01:24:10.067",
|
||||
"lastModified": "2024-08-13T01:24:10.067",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, has been found in OcoMon 4.0. This issue affects some unknown processing of the file /includes/common/require_access_recovery.php of the component URL Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.0.1 and 5.0 is able to address this issue. It is recommended to upgrade the affected component."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://ocomon.com.br/site/atualizacao-de-seguranca/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://ocomon.com.br/site/downloads/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.274205",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.274205",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.388843",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
58
README.md
58
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-08-12T23:55:17.211334+00:00
|
||||
2024-08-13T02:00:17.173553+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-08-12T23:15:19.417000+00:00
|
||||
2024-08-13T01:24:10.067000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -27,50 +27,46 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2024-08-12T00:00:08.652221+00:00
|
||||
2024-08-13T00:00:08.646570+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
259640
|
||||
259642
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `36`
|
||||
Recently added CVEs: `2`
|
||||
|
||||
- [CVE-2024-43137](CVE-2024/CVE-2024-431xx/CVE-2024-43137.json) (`2024-08-12T23:15:17.773`)
|
||||
- [CVE-2024-43139](CVE-2024/CVE-2024-431xx/CVE-2024-43139.json) (`2024-08-12T23:15:17.997`)
|
||||
- [CVE-2024-43147](CVE-2024/CVE-2024-431xx/CVE-2024-43147.json) (`2024-08-12T23:15:18.230`)
|
||||
- [CVE-2024-43148](CVE-2024/CVE-2024-431xx/CVE-2024-43148.json) (`2024-08-12T23:15:18.457`)
|
||||
- [CVE-2024-43149](CVE-2024/CVE-2024-431xx/CVE-2024-43149.json) (`2024-08-12T23:15:18.673`)
|
||||
- [CVE-2024-43150](CVE-2024/CVE-2024-431xx/CVE-2024-43150.json) (`2024-08-12T23:15:18.897`)
|
||||
- [CVE-2024-43151](CVE-2024/CVE-2024-431xx/CVE-2024-43151.json) (`2024-08-12T22:15:09.070`)
|
||||
- [CVE-2024-43152](CVE-2024/CVE-2024-431xx/CVE-2024-43152.json) (`2024-08-12T22:15:09.310`)
|
||||
- [CVE-2024-43155](CVE-2024/CVE-2024-431xx/CVE-2024-43155.json) (`2024-08-12T22:15:09.550`)
|
||||
- [CVE-2024-43156](CVE-2024/CVE-2024-431xx/CVE-2024-43156.json) (`2024-08-12T22:15:09.780`)
|
||||
- [CVE-2024-43161](CVE-2024/CVE-2024-431xx/CVE-2024-43161.json) (`2024-08-12T22:15:10.003`)
|
||||
- [CVE-2024-43163](CVE-2024/CVE-2024-431xx/CVE-2024-43163.json) (`2024-08-12T22:15:10.233`)
|
||||
- [CVE-2024-43164](CVE-2024/CVE-2024-431xx/CVE-2024-43164.json) (`2024-08-12T22:15:10.453`)
|
||||
- [CVE-2024-43210](CVE-2024/CVE-2024-432xx/CVE-2024-43210.json) (`2024-08-12T22:15:10.690`)
|
||||
- [CVE-2024-43213](CVE-2024/CVE-2024-432xx/CVE-2024-43213.json) (`2024-08-12T22:15:10.917`)
|
||||
- [CVE-2024-43216](CVE-2024/CVE-2024-432xx/CVE-2024-43216.json) (`2024-08-12T22:15:11.153`)
|
||||
- [CVE-2024-43217](CVE-2024/CVE-2024-432xx/CVE-2024-43217.json) (`2024-08-12T22:15:11.383`)
|
||||
- [CVE-2024-43218](CVE-2024/CVE-2024-432xx/CVE-2024-43218.json) (`2024-08-12T22:15:11.603`)
|
||||
- [CVE-2024-43220](CVE-2024/CVE-2024-432xx/CVE-2024-43220.json) (`2024-08-12T22:15:11.827`)
|
||||
- [CVE-2024-43224](CVE-2024/CVE-2024-432xx/CVE-2024-43224.json) (`2024-08-12T22:15:12.057`)
|
||||
- [CVE-2024-43225](CVE-2024/CVE-2024-432xx/CVE-2024-43225.json) (`2024-08-12T22:15:12.293`)
|
||||
- [CVE-2024-43226](CVE-2024/CVE-2024-432xx/CVE-2024-43226.json) (`2024-08-12T22:15:12.520`)
|
||||
- [CVE-2024-7590](CVE-2024/CVE-2024-75xx/CVE-2024-7590.json) (`2024-08-12T22:15:12.750`)
|
||||
- [CVE-2024-7705](CVE-2024/CVE-2024-77xx/CVE-2024-7705.json) (`2024-08-12T23:15:19.113`)
|
||||
- [CVE-2024-7706](CVE-2024/CVE-2024-77xx/CVE-2024-7706.json) (`2024-08-12T23:15:19.417`)
|
||||
- [CVE-2024-7707](CVE-2024/CVE-2024-77xx/CVE-2024-7707.json) (`2024-08-13T01:24:09.723`)
|
||||
- [CVE-2024-7709](CVE-2024/CVE-2024-77xx/CVE-2024-7709.json) (`2024-08-13T01:24:10.067`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `19`
|
||||
|
||||
- [CVE-2024-21147](CVE-2024/CVE-2024-211xx/CVE-2024-21147.json) (`2024-08-13T00:49:47.367`)
|
||||
- [CVE-2024-37742](CVE-2024/CVE-2024-377xx/CVE-2024-37742.json) (`2024-08-13T01:09:33.383`)
|
||||
- [CVE-2024-38218](CVE-2024/CVE-2024-382xx/CVE-2024-38218.json) (`2024-08-13T01:10:06.100`)
|
||||
- [CVE-2024-39949](CVE-2024/CVE-2024-399xx/CVE-2024-39949.json) (`2024-08-13T01:11:46.520`)
|
||||
- [CVE-2024-40472](CVE-2024/CVE-2024-404xx/CVE-2024-40472.json) (`2024-08-13T01:13:41.263`)
|
||||
- [CVE-2024-40474](CVE-2024/CVE-2024-404xx/CVE-2024-40474.json) (`2024-08-13T01:13:42.670`)
|
||||
- [CVE-2024-40475](CVE-2024/CVE-2024-404xx/CVE-2024-40475.json) (`2024-08-13T01:13:44.077`)
|
||||
- [CVE-2024-40476](CVE-2024/CVE-2024-404xx/CVE-2024-40476.json) (`2024-08-13T01:13:45.497`)
|
||||
- [CVE-2024-40477](CVE-2024/CVE-2024-404xx/CVE-2024-40477.json) (`2024-08-13T01:13:46.877`)
|
||||
- [CVE-2024-40479](CVE-2024/CVE-2024-404xx/CVE-2024-40479.json) (`2024-08-13T01:13:47.860`)
|
||||
- [CVE-2024-40481](CVE-2024/CVE-2024-404xx/CVE-2024-40481.json) (`2024-08-13T01:13:48.730`)
|
||||
- [CVE-2024-40482](CVE-2024/CVE-2024-404xx/CVE-2024-40482.json) (`2024-08-13T01:13:50.130`)
|
||||
- [CVE-2024-40484](CVE-2024/CVE-2024-404xx/CVE-2024-40484.json) (`2024-08-13T01:13:50.997`)
|
||||
- [CVE-2024-40486](CVE-2024/CVE-2024-404xx/CVE-2024-40486.json) (`2024-08-13T01:13:52.383`)
|
||||
- [CVE-2024-40488](CVE-2024/CVE-2024-404xx/CVE-2024-40488.json) (`2024-08-13T01:13:53.230`)
|
||||
- [CVE-2024-41332](CVE-2024/CVE-2024-413xx/CVE-2024-41332.json) (`2024-08-13T01:14:31.280`)
|
||||
- [CVE-2024-41570](CVE-2024/CVE-2024-415xx/CVE-2024-41570.json) (`2024-08-13T01:14:38.880`)
|
||||
- [CVE-2024-6133](CVE-2024/CVE-2024-61xx/CVE-2024-6133.json) (`2024-08-13T01:18:26.570`)
|
||||
- [CVE-2024-6136](CVE-2024/CVE-2024-61xx/CVE-2024-6136.json) (`2024-08-13T01:18:26.820`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
112
_state.csv
112
_state.csv
@ -240723,7 +240723,7 @@ CVE-2023-7062,0,0,3a1384a593cf152e366a728afe5a537e5564a111dceb33df09a757d554c48c
|
||||
CVE-2023-7063,0,0,a70eaf68fc7417ce794998ee774eb52a272a3335bd687053e59996226f95eaaa,2024-01-30T23:02:10.287000
|
||||
CVE-2023-7064,0,0,893764021ac36e56fb425978b9c0fe444e7d7382c4148ca0b308b12be70459a1,2024-05-02T18:00:37.360000
|
||||
CVE-2023-7065,0,0,56ad85a9f778da0dacae256a17e9f54a48bb66bb1d9f0de63c0c37a650069950,2024-05-06T12:44:56.377000
|
||||
CVE-2023-7066,1,1,13b6222827af5173dbe36c458d7805857373b7b38d38f0a0e8f4c55228206704,2024-08-12T22:15:08.770000
|
||||
CVE-2023-7066,0,0,13b6222827af5173dbe36c458d7805857373b7b38d38f0a0e8f4c55228206704,2024-08-12T22:15:08.770000
|
||||
CVE-2023-7067,0,0,d251fedac3953c556b2fae675b30174d6cef931689e18f0c7f5dabce8da9f8a8,2024-05-02T18:00:37.360000
|
||||
CVE-2023-7068,0,0,7cd804daabb13f07758b06c47cadf4e49acc509b298d07d52e072e7d9588adca,2024-01-09T20:19:48.597000
|
||||
CVE-2023-7069,0,0,348519c1ee085e4d109b6f90b6ff63f6d5a582ce97e3f91d1eb069ee9d1eaaa4,2024-02-07T16:28:40.250000
|
||||
@ -243461,7 +243461,7 @@ CVE-2024-21143,0,0,00d3158bf58fdef1b0ea359eb4fd1877d407a38c8141a35ed2d92f7d5fd7f
|
||||
CVE-2024-21144,0,0,a6e0220af7613c1fe6414e49d55f78f0a709fc1177b6fe6b6e15840375ef4e2d,2024-07-19T14:15:05.497000
|
||||
CVE-2024-21145,0,0,77d6b8d482bc9fea478023a3ac3b96ff89a156b807bd0fe4072eea7489b1a76c,2024-07-19T14:15:05.580000
|
||||
CVE-2024-21146,0,0,c75b160e4e3c99880ff62d36e7e801ade0e912daea3b1e5430c44ac99095338a,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21147,0,0,84f7acc7bc3a20d2859db41d6e11faaeb2b951c493091b63d082c86a294a3902,2024-07-19T14:15:05.667000
|
||||
CVE-2024-21147,0,1,d581db22cc70629aa91eb51c988684be29e1ff1430ebd94500067b05edd568f0,2024-08-13T00:49:47.367000
|
||||
CVE-2024-21148,0,0,7bc96a76ce0077505eae8d68abc8206f3ba6f186267ade9b3eedb49371d494f1,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21149,0,0,ee2bd3223896d48493ed4bc80a50d18703c1a2b0e21db09049566849fca16635,2024-07-17T13:34:20.520000
|
||||
CVE-2024-2115,0,0,66506b198b4ece0adfc9016031263e6294a50c545f577c56b849d0c705d750c7,2024-04-05T12:40:52.763000
|
||||
@ -253379,7 +253379,7 @@ CVE-2024-35771,0,0,da094131a898160f7d7534ebd658d9f6c0a47dcb5974f75d3d7653ce22b76
|
||||
CVE-2024-35772,0,0,67c04a52c2580bba2b2143b8a9e3a147188afdddd51ee8f46047ed6b048599a3,2024-06-24T19:26:14.460000
|
||||
CVE-2024-35773,0,0,edf644c32dc0e69969a2e651ff67d0bafccf9621547e03428fff35ea895725bb,2024-07-12T16:34:58.687000
|
||||
CVE-2024-35774,0,0,eade8c8b3f01bcf230b9a96162b1334f062933da0f10549431055a0386eca873,2024-06-24T18:43:57.633000
|
||||
CVE-2024-35775,1,1,518da236919df970cd5c17117821a744c7c1b2b229313b9338b80ee8aa864621,2024-08-12T23:15:15.467000
|
||||
CVE-2024-35775,0,0,518da236919df970cd5c17117821a744c7c1b2b229313b9338b80ee8aa864621,2024-08-12T23:15:15.467000
|
||||
CVE-2024-35776,0,0,e4d3227671df814d3a4852e5c0b87fcdc40bc918afeafb90df6afc52f9dfd1c7,2024-06-24T18:49:09.500000
|
||||
CVE-2024-35777,0,0,7515dddc5351fc16fba23045723f9d79e6a247348fcb082c517c87296afa7e23,2024-07-09T18:19:14.047000
|
||||
CVE-2024-35778,0,0,a2dbf9dff5fc4d667e192112da54beac103433f06409a60ab480bcea7a5ac138,2024-07-08T10:15:03.573000
|
||||
@ -254737,7 +254737,7 @@ CVE-2024-37732,0,0,8bcaa977ac18e5833de4fd0520da90883ea1f9cf5405317587bb381c54de8
|
||||
CVE-2024-37734,0,0,0e5d8052c40ece19eb47666a762eea5411abf63f936921b36baec3d43e53baa8,2024-07-03T02:04:39.343000
|
||||
CVE-2024-3774,0,0,593479bdd908b3498d235d74677575dd1f3896886cab276c51a981ed2e66af92,2024-04-15T13:15:31.997000
|
||||
CVE-2024-37741,0,0,f5ed3254675cb5ce3a67ab08ad08f5443ff303292af76c58fe640715a6de27a4,2024-07-03T14:27:08.057000
|
||||
CVE-2024-37742,0,0,d9a8d475a25ae5af7e676e3139aadefd87352b16945b084f30458dff1ae4be53,2024-06-26T20:15:15.917000
|
||||
CVE-2024-37742,0,1,d5dbae2c1e5299395df558941706d9c9b36228086895b2fc3724f0d65b486081,2024-08-13T01:09:33.383000
|
||||
CVE-2024-3775,0,0,b7d2a473bac9537035a8d6df6a365ee3b93ba49aa9ce7163db0aba168893a523,2024-04-15T13:15:31.997000
|
||||
CVE-2024-37759,0,0,fcc8ead5df9d431db40c232755b8d406131bfe6bf2637fa79e9581b47deb8f46,2024-07-03T02:04:41.510000
|
||||
CVE-2024-3776,0,0,5922bebf01d008693e127ff3a5039fdad8dc9d22a230cf3268767563dfe95a49,2024-04-15T13:15:31.997000
|
||||
@ -254830,11 +254830,11 @@ CVE-2024-3792,0,0,b2d7f7e579eff1bf3cc457c41f5782185342411a77aac1022f0e4393ef1fd1
|
||||
CVE-2024-37920,0,0,841ece9aa1ea243835cd263b19315e4e373408e20d05486ce82b531c5a2511e0,2024-07-22T13:00:31.330000
|
||||
CVE-2024-37922,0,0,2f4d0819be87ffb0bb4af4138b7ceba5a758a2030a859f8658eef95358ab0782,2024-07-22T13:00:31.330000
|
||||
CVE-2024-37923,0,0,0f277f016f5fbeb4c94053f1c3c5921e348aa14bf063918224f804db2fff94d1,2024-07-09T18:19:14.047000
|
||||
CVE-2024-37924,1,1,c1a5493170bfcfcffe112d3be3d055ca91035a819470c1518d8cd88b85578cb9,2024-08-12T23:15:15.703000
|
||||
CVE-2024-37924,0,0,c1a5493170bfcfcffe112d3be3d055ca91035a819470c1518d8cd88b85578cb9,2024-08-12T23:15:15.703000
|
||||
CVE-2024-37927,0,0,560584f6e7ef315723501d3c62881a4e0c9b3ad1204b52ebcac93863b05e014f,2024-07-12T16:34:58.687000
|
||||
CVE-2024-37928,0,0,d7c23cfa28358062117e75a096fd1b2a1412e40b95d290b44dda94129c8901b3,2024-07-12T16:34:58.687000
|
||||
CVE-2024-3793,0,0,45180ff35ea2c7285cdd371de1244c7a4424d1261f14c1bf7f3ac3169f3ba4b9,2024-05-14T16:11:39.510000
|
||||
CVE-2024-37930,1,1,b47abc968f9ae33d4c1793c2ea75018720d800e5bffc0a66cb656a6f077d606f,2024-08-12T23:15:15.940000
|
||||
CVE-2024-37930,0,0,b47abc968f9ae33d4c1793c2ea75018720d800e5bffc0a66cb656a6f077d606f,2024-08-12T23:15:15.940000
|
||||
CVE-2024-37932,0,0,a3ce9ecce9fdf6d7e055cae05e400292dfd3fd5ac50cdfaa9f84e0caa41c69f3,2024-07-12T16:34:58.687000
|
||||
CVE-2024-37933,0,0,89aadc1bfbd864beebf6ce61583dd3e0e43426698e502bc5c6a9b9f602b29135,2024-07-12T16:34:58.687000
|
||||
CVE-2024-37934,0,0,20d80f75e222e93cd8bf312483db42a7dd2efce13206dab8e3080dada5a4be9e,2024-07-09T18:19:14.047000
|
||||
@ -254991,7 +254991,7 @@ CVE-2024-38200,0,0,30f61ef0f341771cb3da7c017f647bc0d7ca72b8b83eb77e95bb1ef00a376
|
||||
CVE-2024-38202,0,0,5f1ef47a3badff97031fb210a5df27c56cf4132700b07b21ac067d757e50d1a2,2024-08-08T13:04:18.753000
|
||||
CVE-2024-38206,0,0,cb12af303c16bd7b14ab90d82849698a892f6215e2a01ea7e92b5cbb9057d49d,2024-08-12T18:33:38.273000
|
||||
CVE-2024-3821,0,0,3ffbadbdaf34f564e9c498f1baa8fe758531e73989a1bbb861692bcbfdfc262c,2024-06-03T14:46:24.250000
|
||||
CVE-2024-38218,0,0,3a49c7dc6bb0374d11da99e5a55b6986d36c1cf5da3a51c54b24361dc5409e9c,2024-08-12T13:41:36.517000
|
||||
CVE-2024-38218,0,1,e7342866ef3a16926b143aa0008fc6184a292d9f61fe4cbeef73ff44ee02181a,2024-08-13T01:10:06.100000
|
||||
CVE-2024-38219,0,0,2fca9f35b77d67770864b68108bd122ee00786d86b3d46defa01ed91881911bc,2024-08-12T13:41:36.517000
|
||||
CVE-2024-3822,0,0,51b0f82a9028abb2f3a6ab312236a4c8392000a211092257ada320c541b18cc9,2024-05-15T16:40:19.330000
|
||||
CVE-2024-3823,0,0,53ae63b27eb43a6740a92f1ff13f05ddd2a8941167fdfb2924cdfa6b561369e6,2024-05-15T16:40:19.330000
|
||||
@ -255962,7 +255962,7 @@ CVE-2024-39945,0,0,016efe8f11127d24055a64c694862171837d767c0c5c6ed8678f4cc93196a
|
||||
CVE-2024-39946,0,0,4a4a188acaefae77f3ab150f76fb0d9f81d61e7ac6fd6bc8974d0fe50fd6a2a2,2024-07-31T12:57:02.300000
|
||||
CVE-2024-39947,0,0,80805e63343ea3a4bb64a84b8dbe9c1530e7f2159ab58409767f1aadf46ab125,2024-07-31T12:57:02.300000
|
||||
CVE-2024-39948,0,0,ee424b189b0cfbdde47c11058cfacdc178076b71067d33cd2bbe727742314ac4,2024-08-01T13:56:05.350000
|
||||
CVE-2024-39949,0,0,92b1523f2a3a126ed9cc65192947af848f33d01f398349b5751a172588fdfb77,2024-07-31T12:57:02.300000
|
||||
CVE-2024-39949,0,1,db3d180841122ee223993df4a5b148e4eb1d4081aaaa0353c06a8b7332e63281,2024-08-13T01:11:46.520000
|
||||
CVE-2024-3995,0,0,a7fe690817691037765b680c602849c2a36e767bb2849159693fe5a7864f46cb,2024-07-01T14:15:05.680000
|
||||
CVE-2024-39950,0,0,0a5af814b405869cb4bc1326a5d163c966c476b51ac00ace4bb3ecf06791ecff,2024-08-01T13:56:11.127000
|
||||
CVE-2024-39962,0,0,88f72130b2e330c20b5ac0702cd6d158cd0cb6e08e9ed8a9d4ac60ee5a0c3f4d,2024-08-01T13:56:13.933000
|
||||
@ -256057,21 +256057,21 @@ CVE-2024-40456,0,0,f1acaf3e46ce38cdd4b72320186132bab37cc38f6f4c796e31eaece0545a5
|
||||
CVE-2024-4046,0,0,b162bb54ae31ac06a54238ce430265f513a39f78ee0aa36d5d6ff941168dcdb1,2024-05-14T16:11:39.510000
|
||||
CVE-2024-40464,0,0,e0961ca0a3aa848ce7061cc7ba1fa2af403b350ed8107067aa6b807e1e6fd113,2024-08-06T18:35:03.237000
|
||||
CVE-2024-40465,0,0,15986f29ff1e8aef63181dd9799f409f46000c95ad7d745708fb5f0091003f8f,2024-08-02T19:35:37.367000
|
||||
CVE-2024-40472,0,0,c3f1304f7f6a6f624b7992076e6d1fe56be5759b9209d182514f1119084b99df,2024-08-12T13:41:36.517000
|
||||
CVE-2024-40472,0,1,048983e26a97fabf3ef9ca5655a978196b7c91c33fe00b9ba0aef70a8e3c74ba,2024-08-13T01:13:41.263000
|
||||
CVE-2024-40473,0,0,bac23d9f20af7f79a5f607e2c6e42e1aebf64fb29289b84bea57158dbb904513,2024-08-12T13:41:36.517000
|
||||
CVE-2024-40474,0,0,a440456ffce69fd544d7ccf24f6ae0e281bea37b7085e3b0d5340bed1d1eb38a,2024-08-12T13:41:36.517000
|
||||
CVE-2024-40475,0,0,bd96a8830e2160ceaf3b5df2cbdff8ea34b2418fe575f31155dfe3d080cc68ff,2024-08-12T13:41:36.517000
|
||||
CVE-2024-40476,0,0,2d968dbde1713118e363b700724fb5eb4428d21626fa8c69e3e4fb0e0605ef6a,2024-08-12T13:41:36.517000
|
||||
CVE-2024-40477,0,0,b99c59eda73224f5c34d4cda807e556646f39c9d25b5c311b583cf18d8afdfc5,2024-08-12T13:41:36.517000
|
||||
CVE-2024-40474,0,1,ed9bcaa0816a8b1627787d387aa64a764a9f0d1a8060bb791a43106b521b0b3f,2024-08-13T01:13:42.670000
|
||||
CVE-2024-40475,0,1,6dbb9fe9aa654118a15979c2f781ea7f22dc9683d057f6a3dda190241670bcd9,2024-08-13T01:13:44.077000
|
||||
CVE-2024-40476,0,1,8d4c9cf39ae6a94779797a1345413413cadee5ca02ebe610a223f3ff94fdbd0c,2024-08-13T01:13:45.497000
|
||||
CVE-2024-40477,0,1,0ebd8b8f59a35dda2b3e292f3675b27eb6ffc42149072e05c13180f024ce3e21,2024-08-13T01:13:46.877000
|
||||
CVE-2024-40478,0,0,c52d89ab86aaf3f734a40597d5b00313c948fc2e1e77e0656955644084643dfa,2024-08-12T13:41:36.517000
|
||||
CVE-2024-40479,0,0,73cf6dde7ba74cacdf9c3d36464146c03f587233ecc67eb1d261bf639fa26bd5,2024-08-12T13:41:36.517000
|
||||
CVE-2024-40479,0,1,0e859692d2dcdb68471916e06e469ab263533fd2f9afcecfe52d53c988a5da77,2024-08-13T01:13:47.860000
|
||||
CVE-2024-40480,0,0,ffebbe104e7e5f7fc549389d2cc74047baebdb21bfa45794fe18ca9250ab02be,2024-08-12T13:41:36.517000
|
||||
CVE-2024-40481,0,0,e8cd1e3d6e210748f3a90997731d666b0805aedb865a25165fa50c4b18dd69e6,2024-08-12T13:41:36.517000
|
||||
CVE-2024-40482,0,0,31b235f6aeb322009edaf43befaea2002d52cb8d281c9d30f51fd88c792be3aa,2024-08-12T13:41:36.517000
|
||||
CVE-2024-40484,0,0,85c8a875926bd96379e78d76b30418e68ae2c0e615dce37b875916d332c19edd,2024-08-12T13:41:36.517000
|
||||
CVE-2024-40486,0,0,d13c18293ea3f5b839ec8274b4c792b5fe0f48540f599e2e17ba8e594b6c8ee5,2024-08-12T13:41:36.517000
|
||||
CVE-2024-40481,0,1,e86ef06aa0938d9c99b8c98ae77f72fb6ac894109e31c03c83342c579c430962,2024-08-13T01:13:48.730000
|
||||
CVE-2024-40482,0,1,9a3a01b5782aa51ef209e482e70f047b430b9828561a94171012474df4d532a4,2024-08-13T01:13:50.130000
|
||||
CVE-2024-40484,0,1,694fee47c259d31c851a9966b5a0a3c0598a5ae04cd749dc08bd07981a6111ab,2024-08-13T01:13:50.997000
|
||||
CVE-2024-40486,0,1,206068d4d3a686bb79ffe5f57501930cd1fe13ada3eb39bb4b41ff953c8c8a8c,2024-08-13T01:13:52.383000
|
||||
CVE-2024-40487,0,0,005a09265ebc099b9fcb5976da33b894e6213384a847e53e8ae4a2bd87b7e372,2024-08-12T13:41:36.517000
|
||||
CVE-2024-40488,0,0,b3e51fd8218a45b1f5ac6aff4a38b8cfd150d0b9486d5a376f112926ee4befe8,2024-08-12T13:41:36.517000
|
||||
CVE-2024-40488,0,1,29149e46f549d6c8fa1979da87e45c07630bc970cf31d75d73d9d6723dc075d0,2024-08-13T01:13:53.230000
|
||||
CVE-2024-40492,0,0,887baeb8c822fbf96c83ae7c8317e551b9d380e125d5f646dfb0a8c0719647ab,2024-08-01T13:57:30.260000
|
||||
CVE-2024-40495,0,0,0c92b9527f5126e4b4bbf0d1f0a16c194305be9e806244080172bf727ded6b6a,2024-08-01T13:57:31.037000
|
||||
CVE-2024-40498,0,0,5810ed5aa59e12db14c51ce30325d1c0d70a5c997d2111b8b796a66ebc036219,2024-08-06T16:30:24.547000
|
||||
@ -256578,7 +256578,7 @@ CVE-2024-41318,0,0,9b1c1d0472f281a532ac7cd9f50c0be0ec0f55b0327046bb10ee1709062e9
|
||||
CVE-2024-41319,0,0,1899a3684e8a27d8d6402d107bc11ca910ee14276fc605936dd401557907d526,2024-08-01T13:58:31.957000
|
||||
CVE-2024-41320,0,0,6629b2c1bbc9cd1b160b7b0f9c935334633b6b47708e3a65ad0ff69abde9e8ce,2024-08-01T13:58:32.723000
|
||||
CVE-2024-4133,0,0,809a3aebbf4e63405fb2f0740c9908f3dfcf1d711b93379e5d465ea9e56d3cba,2024-05-02T18:00:37.360000
|
||||
CVE-2024-41332,0,0,56ad202b80efa610d5c6ce283a82b14a04739c8323421c543c839229ab8bd6c1,2024-08-12T13:41:36.517000
|
||||
CVE-2024-41332,0,1,e6fa5010b9024e0af46a147ba4070b726f6dce97083dedbf0dda2c9127c835eb,2024-08-13T01:14:31.280000
|
||||
CVE-2024-41333,0,0,cddcfe88014fc883d7c26828c1a1c1f213d8d1e951fc2a526ac4569575e77f96,2024-08-07T20:54:44.060000
|
||||
CVE-2024-4135,0,0,3adddfced77f8fc8630aec5e175734a40783e3f6b247cb0614a312485a8097a3,2024-05-08T13:15:00.690000
|
||||
CVE-2024-41353,0,0,283f710ae1d74e1c389a6d83c71bf34f8cb957eca1e713efb25da5fc972611a3,2024-08-01T13:58:33.490000
|
||||
@ -256637,7 +256637,7 @@ CVE-2024-41550,0,0,6726e0c6849e70c536d9bf6936241acc920718305f74521a185836b6b5189
|
||||
CVE-2024-41551,0,0,a47b3d6d1401636bd7731728d6fcb9c38717d9cec4c98b37b50c290693f43ad0,2024-08-01T13:58:54.023000
|
||||
CVE-2024-4156,0,0,31cc9500838d0dc99d5959700d84ebbac93048893a2eb67f37ed77d13093550c,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4157,0,0,ac5ec2e690c76b81403cfa49bc63d1a8caa2fb9d97d28a1055398849720db727,2024-05-22T12:46:53.887000
|
||||
CVE-2024-41570,0,0,ef1bf59c27127ff158179f33921003a804caaf6660e1a7e2b6ec3f026dc6edfc,2024-08-12T13:41:36.517000
|
||||
CVE-2024-41570,0,1,aeeff334d8e94264f5528f4e2cc6e3775fd5da44784345b666e0ce860bb11372,2024-08-13T01:14:38.880000
|
||||
CVE-2024-41577,0,0,e7e693181f88ef240813103b284f71ca31f9c53b9cb63293a922ae2ded80048a,2024-08-12T13:41:36.517000
|
||||
CVE-2024-4158,0,0,9bd0a38e47c5b6d26f1e587737a0ffeb7c251278f38061995fc29ba309646aa6,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4159,0,0,72a4ec46db1a22f62474bfa22a14f37a28a6ceba3042de92b905fca6cc58c082,2024-04-25T23:15:47.087000
|
||||
@ -257144,30 +257144,30 @@ CVE-2024-43112,0,0,adba1dfd679ff5e6d46afc8c8dcdec70df81430cc85737d48e09fa02ef6ca
|
||||
CVE-2024-43113,0,0,6573240be25b6af3e51d92f2a835e3694315e36c10003c73af950ce730fbb885,2024-08-06T16:30:24.547000
|
||||
CVE-2024-43114,0,0,6c710d141dc94fd27ccf4c35d8ed8fed217c18d925335ce65015d178fb239e9f,2024-08-06T16:30:24.547000
|
||||
CVE-2024-4312,0,0,82451935a132459ec3a52babe511fed0dc0447cacf13fc78eab91e8a5c0d303b,2024-05-14T16:11:39.510000
|
||||
CVE-2024-43123,1,1,2e2c050e05eceebebb6764bf76439c256ea30edeaf99f7777c98dcb013d605b5,2024-08-12T23:15:16.177000
|
||||
CVE-2024-43124,1,1,159a6e3a5154401c268b9283252d7586e765ab7a3b09a609d57c59d73980ec29,2024-08-12T23:15:16.407000
|
||||
CVE-2024-43125,1,1,6f8ec68758ec079ee9729debe12e8e02714b04708086483fe3f3e1be363e8ea4,2024-08-12T23:15:16.637000
|
||||
CVE-2024-43126,1,1,740227e0fc9eabd775401b86378322641fa395c98aaa294b0e51f66d78b9c273,2024-08-12T23:15:16.863000
|
||||
CVE-2024-43127,1,1,d4f5c1b20e60840e320608c58c84e0ac666a5976f98e74b730764b8f3b2a598f,2024-08-12T23:15:17.097000
|
||||
CVE-2024-43123,0,0,2e2c050e05eceebebb6764bf76439c256ea30edeaf99f7777c98dcb013d605b5,2024-08-12T23:15:16.177000
|
||||
CVE-2024-43124,0,0,159a6e3a5154401c268b9283252d7586e765ab7a3b09a609d57c59d73980ec29,2024-08-12T23:15:16.407000
|
||||
CVE-2024-43125,0,0,6f8ec68758ec079ee9729debe12e8e02714b04708086483fe3f3e1be363e8ea4,2024-08-12T23:15:16.637000
|
||||
CVE-2024-43126,0,0,740227e0fc9eabd775401b86378322641fa395c98aaa294b0e51f66d78b9c273,2024-08-12T23:15:16.863000
|
||||
CVE-2024-43127,0,0,d4f5c1b20e60840e320608c58c84e0ac666a5976f98e74b730764b8f3b2a598f,2024-08-12T23:15:17.097000
|
||||
CVE-2024-4313,0,0,04786fcee0b11c58facf347077c0fb8e17faddbc064f2c4dc547a3be70193e4e,2024-06-24T20:01:09.330000
|
||||
CVE-2024-43130,1,1,f0c894fb49048185e3da95689d302b7c2e99c7b3677710d304a8e2f1785c5edc,2024-08-12T23:15:17.320000
|
||||
CVE-2024-43133,1,1,2c0100fa05c934b61e5c9a46d226b379db3a64e04b2a9f1bc46b8ad6b2d21213,2024-08-12T23:15:17.560000
|
||||
CVE-2024-43137,1,1,f3fc866897aede9c70e5951a4c9720e4cf044f3eeb210af260c38a29b016593e,2024-08-12T23:15:17.773000
|
||||
CVE-2024-43139,1,1,55eb0f9a37bda0bafd1339d01b07e485dfec14707f0813bce22c8fefee993094,2024-08-12T23:15:17.997000
|
||||
CVE-2024-43130,0,0,f0c894fb49048185e3da95689d302b7c2e99c7b3677710d304a8e2f1785c5edc,2024-08-12T23:15:17.320000
|
||||
CVE-2024-43133,0,0,2c0100fa05c934b61e5c9a46d226b379db3a64e04b2a9f1bc46b8ad6b2d21213,2024-08-12T23:15:17.560000
|
||||
CVE-2024-43137,0,0,f3fc866897aede9c70e5951a4c9720e4cf044f3eeb210af260c38a29b016593e,2024-08-12T23:15:17.773000
|
||||
CVE-2024-43139,0,0,55eb0f9a37bda0bafd1339d01b07e485dfec14707f0813bce22c8fefee993094,2024-08-12T23:15:17.997000
|
||||
CVE-2024-4314,0,0,5b91c731cc96c112e4837604681a355586cd629f1c71449572dfc7eb6fafd4a6,2024-05-14T16:11:39.510000
|
||||
CVE-2024-43147,1,1,0fccae4ec698a6099621600bfc058755995742cd82334607f2abebe509b1a9f2,2024-08-12T23:15:18.230000
|
||||
CVE-2024-43148,1,1,c9700795fcfb2515ed9e39c35827905d49e04b567d0dad47c62be4149e09af7a,2024-08-12T23:15:18.457000
|
||||
CVE-2024-43149,1,1,7a8613d3b83fae33d5c75c8aeb5125a3d81feadd8cdf554f9c66f3d85c38b332,2024-08-12T23:15:18.673000
|
||||
CVE-2024-43147,0,0,0fccae4ec698a6099621600bfc058755995742cd82334607f2abebe509b1a9f2,2024-08-12T23:15:18.230000
|
||||
CVE-2024-43148,0,0,c9700795fcfb2515ed9e39c35827905d49e04b567d0dad47c62be4149e09af7a,2024-08-12T23:15:18.457000
|
||||
CVE-2024-43149,0,0,7a8613d3b83fae33d5c75c8aeb5125a3d81feadd8cdf554f9c66f3d85c38b332,2024-08-12T23:15:18.673000
|
||||
CVE-2024-4315,0,0,392e78ede02028792ceca327e706bfb19bc55163d6718415b77f2fda1df1c705,2024-06-13T18:36:09.013000
|
||||
CVE-2024-43150,1,1,72b8e4f4c43893a3b9fafa5060a9c521d5aa29cfdf1db735092a4d1cdac7297a,2024-08-12T23:15:18.897000
|
||||
CVE-2024-43151,1,1,40dd109fffd05a29237e940bc5a1cdf6e67a881049be4c557b0156f61f930757,2024-08-12T22:15:09.070000
|
||||
CVE-2024-43152,1,1,493963c06fcb84dbb83289191927e0a37275e54b8136b0017aba59da882c02d0,2024-08-12T22:15:09.310000
|
||||
CVE-2024-43155,1,1,46e2681a7fd5bd5c24a335d616cbc9030fcc9cab633298d648476bbaed053da2,2024-08-12T22:15:09.550000
|
||||
CVE-2024-43156,1,1,8f92ab41c4ed087540245f68044db41ffe862a501b703246e20ed6276e3e2760,2024-08-12T22:15:09.780000
|
||||
CVE-2024-43150,0,0,72b8e4f4c43893a3b9fafa5060a9c521d5aa29cfdf1db735092a4d1cdac7297a,2024-08-12T23:15:18.897000
|
||||
CVE-2024-43151,0,0,40dd109fffd05a29237e940bc5a1cdf6e67a881049be4c557b0156f61f930757,2024-08-12T22:15:09.070000
|
||||
CVE-2024-43152,0,0,493963c06fcb84dbb83289191927e0a37275e54b8136b0017aba59da882c02d0,2024-08-12T22:15:09.310000
|
||||
CVE-2024-43155,0,0,46e2681a7fd5bd5c24a335d616cbc9030fcc9cab633298d648476bbaed053da2,2024-08-12T22:15:09.550000
|
||||
CVE-2024-43156,0,0,8f92ab41c4ed087540245f68044db41ffe862a501b703246e20ed6276e3e2760,2024-08-12T22:15:09.780000
|
||||
CVE-2024-4316,0,0,1f2d235ec208ef46fe57643aa08db6f0cf549b33584dbdea1429e6bdf8a86d5e,2024-05-14T16:11:39.510000
|
||||
CVE-2024-43161,1,1,3e0e1cd106d7beea6d1de08e9591b5020f6dbc7d0287dfb199c0cf3c902eca5f,2024-08-12T22:15:10.003000
|
||||
CVE-2024-43163,1,1,47e94f16c835dfc9cf43d5d03675691ae35c713ac7d72a19c9683ce08a8d1e21,2024-08-12T22:15:10.233000
|
||||
CVE-2024-43164,1,1,d2e791dc4d2e7fe7c5f02b7096283d295af90b80817bca033d0e4314db105c56,2024-08-12T22:15:10.453000
|
||||
CVE-2024-43161,0,0,3e0e1cd106d7beea6d1de08e9591b5020f6dbc7d0287dfb199c0cf3c902eca5f,2024-08-12T22:15:10.003000
|
||||
CVE-2024-43163,0,0,47e94f16c835dfc9cf43d5d03675691ae35c713ac7d72a19c9683ce08a8d1e21,2024-08-12T22:15:10.233000
|
||||
CVE-2024-43164,0,0,d2e791dc4d2e7fe7c5f02b7096283d295af90b80817bca033d0e4314db105c56,2024-08-12T22:15:10.453000
|
||||
CVE-2024-43167,0,0,01f17fcd63c756d83b948d0875b4414e12688ba0576962ac27da499c54ee819d,2024-08-12T13:41:36.517000
|
||||
CVE-2024-43168,0,0,6f1ce3e85e6cec75b3ae8101a2990b1aa3eb274cac98a0b799813d7d71452062,2024-08-12T13:41:36.517000
|
||||
CVE-2024-4317,0,0,2ab51635ebb5a78f9093ee7220532c2f98c47bcb30186dfa33cf412783a7fe8e,2024-05-14T16:11:39.510000
|
||||
@ -257176,16 +257176,16 @@ CVE-2024-4319,0,0,7ca0245a01df3d5ced472265b32f90c6f6a22a37af3715d5589379ecac1f6a
|
||||
CVE-2024-43199,0,0,94150f8459e19abf18625a946d8a507867275817cd3d9928084030fcb7fa8330,2024-08-12T12:59:48.253000
|
||||
CVE-2024-4320,0,0,f21f873c3bfeb896c071276000f6bbe2ae4420d2f2c3184178334c98a666705b,2024-06-07T14:56:05.647000
|
||||
CVE-2024-4321,0,0,9cab2a859d144dd765da27aaa03d49bb12083c0b11abfa900a9b065f4ea718e1,2024-05-16T13:03:05.353000
|
||||
CVE-2024-43210,1,1,f5d2dfaff0f6aad12a7313f08f25d34b70199fa6e246c6b43be95bed42a9581d,2024-08-12T22:15:10.690000
|
||||
CVE-2024-43213,1,1,65ac589c972c45a3a89f2e3b6f81303e3c6cc9e95a316bdfe6c4b0514d961bd2,2024-08-12T22:15:10.917000
|
||||
CVE-2024-43216,1,1,9593ec79059e860deaf013a478b93b87414de3abc93a8553db8255cbcfe4c593,2024-08-12T22:15:11.153000
|
||||
CVE-2024-43217,1,1,81eff7fc515b3d1f5f1e802fc56c2d6f4ae578d4a5a0e83370286cbc81ac0412,2024-08-12T22:15:11.383000
|
||||
CVE-2024-43218,1,1,69f5d38ecde05bf96ba9a5a479907c39dc4f39e977d798a4c6b0831c5b4f6998,2024-08-12T22:15:11.603000
|
||||
CVE-2024-43210,0,0,f5d2dfaff0f6aad12a7313f08f25d34b70199fa6e246c6b43be95bed42a9581d,2024-08-12T22:15:10.690000
|
||||
CVE-2024-43213,0,0,65ac589c972c45a3a89f2e3b6f81303e3c6cc9e95a316bdfe6c4b0514d961bd2,2024-08-12T22:15:10.917000
|
||||
CVE-2024-43216,0,0,9593ec79059e860deaf013a478b93b87414de3abc93a8553db8255cbcfe4c593,2024-08-12T22:15:11.153000
|
||||
CVE-2024-43217,0,0,81eff7fc515b3d1f5f1e802fc56c2d6f4ae578d4a5a0e83370286cbc81ac0412,2024-08-12T22:15:11.383000
|
||||
CVE-2024-43218,0,0,69f5d38ecde05bf96ba9a5a479907c39dc4f39e977d798a4c6b0831c5b4f6998,2024-08-12T22:15:11.603000
|
||||
CVE-2024-4322,0,0,1d1748b4ac4d92a791836ec730671d75744c804cc2e9189accf3943e4e00efc0,2024-05-16T13:03:05.353000
|
||||
CVE-2024-43220,1,1,03928570b08971a10a9792fcec4384007d4af89d60f962519aa9e2b4be6c2a97,2024-08-12T22:15:11.827000
|
||||
CVE-2024-43224,1,1,14ef55b6f233abbe4c55ee5b24591a3059b6a2797ad7b9f47292419afa508eb3,2024-08-12T22:15:12.057000
|
||||
CVE-2024-43225,1,1,8d3db48602caeb59473413007be626fbc33e6de2b06bc8d6c41cb12160ed3000,2024-08-12T22:15:12.293000
|
||||
CVE-2024-43226,1,1,e78a3db63ad6a3c0ba71cef4e9c688dfb4aa9a8b2d02c9369a27a80a68cc1fd8,2024-08-12T22:15:12.520000
|
||||
CVE-2024-43220,0,0,03928570b08971a10a9792fcec4384007d4af89d60f962519aa9e2b4be6c2a97,2024-08-12T22:15:11.827000
|
||||
CVE-2024-43224,0,0,14ef55b6f233abbe4c55ee5b24591a3059b6a2797ad7b9f47292419afa508eb3,2024-08-12T22:15:12.057000
|
||||
CVE-2024-43225,0,0,8d3db48602caeb59473413007be626fbc33e6de2b06bc8d6c41cb12160ed3000,2024-08-12T22:15:12.293000
|
||||
CVE-2024-43226,0,0,e78a3db63ad6a3c0ba71cef4e9c688dfb4aa9a8b2d02c9369a27a80a68cc1fd8,2024-08-12T22:15:12.520000
|
||||
CVE-2024-43227,0,0,d06cb872fe104f2d375e915815c778ec356d02a1a0f692c097804c415c1da56b,2024-08-12T21:15:32.603000
|
||||
CVE-2024-4323,0,0,8795dbc0ef00377d638f97794032c86e045103be19a16a47714b9d0a60088551,2024-05-20T13:00:04.957000
|
||||
CVE-2024-43231,0,0,1825e1ecffddba056fa98f16e33df7d0d3576f5c19e0c6ce8dd3e877c464fcaf,2024-08-12T21:15:32.890000
|
||||
@ -258692,9 +258692,9 @@ CVE-2024-6128,0,0,e064ff8d5dabba517cce591bd7ae4e33f1f46e689b63e72521fbd8f55a944d
|
||||
CVE-2024-6129,0,0,7933292aa403a14b0748017ae2569e039b43c54c319d4b3589a08b9d05be42b3,2024-06-20T12:44:01.637000
|
||||
CVE-2024-6130,0,0,f4b647f0047f578fe057faac21db7670b7977afa1d31bb2fa4fd50dc12004c54,2024-07-01T12:37:24.220000
|
||||
CVE-2024-6132,0,0,83486b9bda06b2bfd8b6c6e0e87eac1b4d59232f4be914a093590a57da1cf4d5,2024-06-20T12:44:01.637000
|
||||
CVE-2024-6133,0,0,11351dbf03414755557a4338a4e441faef4dbbe801099e87415062f11fdcaa9d,2024-08-12T13:41:36.517000
|
||||
CVE-2024-6133,0,1,2337ffd9cad2357491c8f783d0b691c0b27d4405be8ab2d34dc8ce60f34a6000,2024-08-13T01:18:26.570000
|
||||
CVE-2024-6134,0,0,e3ef2ea84bcff820ce2b4e452d500e8e9e5be6a6b81c054bf5cac514a6a5608b,2024-08-12T13:41:36.517000
|
||||
CVE-2024-6136,0,0,3854e1d581f6127f9b8244a143e3c0b775f6e26042c869e1df7f773222d1ecd1,2024-08-12T13:41:36.517000
|
||||
CVE-2024-6136,0,1,b5f2fd8869742060eab1f7acc4116cefd24c0a3b003f1c5a14cb58f5ac02f037,2024-08-13T01:18:26.820000
|
||||
CVE-2024-6138,0,0,fc35836bd5348e7eb9a778e4240c73e0ce52b6c3e53dfd414d6ee066e94e6acd,2024-07-12T16:54:53.997000
|
||||
CVE-2024-6139,0,0,5132030314b9a0ca48cecf9e1dd593f9b9cec1db256d0c213c6569e108426fbe,2024-06-27T19:25:12.067000
|
||||
CVE-2024-6142,0,0,b186966dd1e43431007a65ef388b5fc16ca959c5df4a79ac4b3d70a69eba9543,2024-06-20T12:44:01.637000
|
||||
@ -259588,7 +259588,7 @@ CVE-2024-7583,0,0,b2c70b6258cd9101ea44bd72a9a7bee40fdef17b5833e45029641b6b1054cd
|
||||
CVE-2024-7584,0,0,88e393ed083253249958807c1b676f862629edacea69fa08e833cacac796d57a,2024-08-07T19:09:46.290000
|
||||
CVE-2024-7585,0,0,5e2ff565ca20d01ef68f8422fbeb35a8929478e27cc3f0f142481fee7317e65c,2024-08-07T19:09:46.290000
|
||||
CVE-2024-7589,0,0,ec264cfa06d74adc18884d15f0bb08d50afb3ff7b46d5f725f942909f4b4dc96,2024-08-12T16:35:05.763000
|
||||
CVE-2024-7590,1,1,35da26593bcbaca2b731a65c264ea6c48a52b27db0860d7bda278a5558fb3fb1,2024-08-12T22:15:12.750000
|
||||
CVE-2024-7590,0,0,35da26593bcbaca2b731a65c264ea6c48a52b27db0860d7bda278a5558fb3fb1,2024-08-12T22:15:12.750000
|
||||
CVE-2024-7610,0,0,a10689bea1d0fbdec4f1b8819e74182773158d5010cb9fbea2ce46532922c645,2024-08-08T13:04:18.753000
|
||||
CVE-2024-7613,0,0,51cb787f464113bd96bef73c3a1496b2c8fdb1709edd4dc30393e6a61466a202,2024-08-12T13:41:36.517000
|
||||
CVE-2024-7614,0,0,d7cc9c45c708dde228724405eed42fed1e1e5a328ee0ca2886de1c39b6c0c7dc,2024-08-12T13:41:36.517000
|
||||
@ -259637,5 +259637,7 @@ CVE-2024-7694,0,0,7eb01f663f1a6ae6fa8d343bc54dd9427e90e5a6b166e3bddc2347c03fdce9
|
||||
CVE-2024-7697,0,0,509c155762486c19cfc0dceb2044f7d5dc23072793fd0a597d3f1e860d0ba6cd,2024-08-12T15:35:07.293000
|
||||
CVE-2024-7700,0,0,a9f0ec07b98990fe42b46daef65c8e0b5a8fa0712121f2027b841fccbefa3e8e,2024-08-12T18:57:17.383000
|
||||
CVE-2024-7704,0,0,f1d408cfe4afc78820402b7d84e076c7097b231b26bbe412a10057a3525a73da,2024-08-12T21:15:34.100000
|
||||
CVE-2024-7705,1,1,cf95b489808fa8132dfdd8d11fdf93e486e1b455e83524c7ef4630f887c0783a,2024-08-12T23:15:19.113000
|
||||
CVE-2024-7706,1,1,dddae6f8d636e0e2c3ba2b1628309dfeb1aca307337fd2625268eab5b9b234c9,2024-08-12T23:15:19.417000
|
||||
CVE-2024-7705,0,0,cf95b489808fa8132dfdd8d11fdf93e486e1b455e83524c7ef4630f887c0783a,2024-08-12T23:15:19.113000
|
||||
CVE-2024-7706,0,0,dddae6f8d636e0e2c3ba2b1628309dfeb1aca307337fd2625268eab5b9b234c9,2024-08-12T23:15:19.417000
|
||||
CVE-2024-7707,1,1,21170f2707eddb1f88d3623b0eff5f0856514ae1fb599ac77f04f14c1cb19563,2024-08-13T01:24:09.723000
|
||||
CVE-2024-7709,1,1,7f617395257f5decd3ca8318abe3ce517c53d7b8c4baa7edc2f2c2b481a048c8,2024-08-13T01:24:10.067000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user